You are on page 1of 6

2023 IEEE 2nd International Conference on Industrial Electronics: Developments & Applications (ICIDeA)

Design and Development of Smart Locker for


2023 IEEE 2nd International Conference on Industrial Electronics: Developments & Applications (ICIDeA) | 979-8-3503-8197-9/23/$31.00 ©2023 IEEE | DOI: 10.1109/ICIDeA59866.2023.10295207

Domestic Applications
VenkateshMurthy B.S Madhu Palati ShriHarinayak P Bansilal Bairwa
SoEEE DoEEE BMS Institute of SoEEE SoEEE REVA University
REVA University Technology Bengaluru, India REVA University Bengaluru, India 560064
Bengaluru, India 560064 560064 Bengaluru, India 560064 bansilal.bairwa@reva.edu.i
drvenkatesh364@gmail.com madhupalati@bmsit.in shriharinayak51297@gmail.com n

Abstract—This research work proposes the designing and face, which is then matched against a database of authorized
development of a smart locker system for domestic applications faces. If the face matches the authorized face, access to the
that uses a face identification system to identify authorized and locker is granted. This ensures that only authorized persons can
unauthorized persons from opening and stealing valuables. The
system is designed to integrate Raspberry Pi, camera, and keypad access the locker, and any attempt by an unauthorized person
modules to recognize the authorizer and allow access to the is detected and prevented. The proposed research work aims
locker. The face identification system uses open CV technology, to address the need for enhanced security and convenience for
and the Raspberry Pi is coded using Python programming domestic lockers by designing and developing a smart locker
language to achieve the desired output. The proposed system system that uses a face identification system. The objectives
provides a 4-digit passcode to open the locker, and if the
authorizer fails to enter the correct passcode, the locker can of the proposed research work include:
only be accessed through the manual key provided by the
manufacturer. If an unauthorized person attempts to open the
locker, the system shifts to manual lock, and an additional 1) To design and develop a smart locker system that uses
shock protection mechanism is also implemented. The proposed a face identification system to identify authorized and
system is expected to offer improved security and convenience unauthorized persons from opening and stealing valu-
for domestic applications. The performance evaluation criteria ables.
include testing procedures and protocols, and the experimental 2) To integrate Raspberry Pi, camera, and keypad modules
results are presented and analyzed. The research work concludes
with suggestions for future research work in the field of smart to recognize the authorizer and allow access to the
lockers and face identification systems. locker.
Index Terms—Smart locker, raspberry pi, Servo Motor, LCD 3) To code the Raspberry Pi using Python programming
Display language to achieve the desired output.
4) To provide a 4-digit passcode to open the locker, and
I. I NTRODUCTION if the authorizer fails to enter the correct passcode, the
locker can only be accessed through the manual key
Smart lockers are an emerging technology that offers en-
provided by the manufacturer.
hanced security and convenience for the storage of valuable
5) To implement a manual lock system and a shock pro-
items in homes and other domestic settings. These lockers use
tection mechanism to prevent unauthorized access and
advanced technologies to secure the contents, including bio-
theft.
metric identification systems, smart card readers, and password
6) To evaluate the performance of the proposed system
protection mechanisms. They are increasingly popular due to
based on testing procedures and protocols, and compare
their ability to provide safe and secure storage of valuables,
its performance with existing smart locker systems.
such as jewelry, cash, and other important documents. How-
ever, traditional lockers can still be compromised by unau-
thorized access, theft, and other security breaches. To address The proposed research work aims to contribute to the devel-
these issues, the proposed research work aims to design and opment of smart locker systems for domestic applications by
develop a smart locker system that uses a face identification providing an advanced system that offers enhanced security
system to identify authorized and unauthorized persons from and convenience for the storage of valuables. The face iden-
opening and stealing valuables. This system is intended for tification system is an essential component of this system, as
use in domestic applications, such as homes, apartments, and it provides a highly secure and reliable means of identifying
small businesses. The face identification system is an essential authorized individuals.This research work has the potential to
component of the proposed smart locker system, as it allows provide valuable insights into the design and development
the locker to be accessed only by authorized individuals. of smart locker systems for domestic applications, and to
This technology uses computer vision algorithms and facial contribute to the ongoing development of this emerging tech-
recognition software to detect and identify an individual’s nology.

979-8-3503-8197-9/23/$31.00 ©2023 IEEE

1
Authorized licensed use limited to: REVA UNIVERSITY. Downloaded on December 18,2023 at 10:09:20 UTC from IEEE Xplore. Restrictions apply.
II. L ITERATURE R EVIEW to address the issue of security and convenience in shared
Smart locker systems have become increasingly popular spaces such as offices and apartments. The study found that
for domestic applications as they offer improved security and the system was effective in accurately recognizing individuals
convenience for homeowners. There are several existing smart and preventing unauthorized access. Another research work
locker systems on the market, each with their own unique conducted by a team from the University of Science and
features and technologies. One popular smart locker system Technology Beijing aimed to improve the performance of face
is the Amazon Basics Security Safe, which uses a keypad for recognition systems in low-light conditions. The researchers
access and has a steel construction with a 0.5 cubic feet capac- proposed a new algorithm that uses adaptive multi-kernel
ity. It is affordable and easy to use, but has limited capacity regression to enhance the quality of facial images captured
and only offers keypad access. Another popular option is the in low-light environments. The study demonstrated that their
TIGERKING Security Home Safe, which uses both fingerprint proposed algorithm outperformed existing methods in terms of
and keypad access and has a 1.5 cubic feet capacity with an recognition accuracy. A recent study conducted by researchers
alarm system. It offers high security with biometric access, from the University of Surrey in the UK evaluated the privacy
but is expensive and may require battery replacements [1]–[4]. implications of facial recognition technology in smart lockers.
The Vaultek Essential Series is another popular smart locker The study found that individuals were generally supportive
system that uses biometric, keypad, and Bluetooth access, with of the technology but expressed concerns about the collection
a remote control and a 1.2 cubic feet capacity. It offers multi- and storage of their facial data. The researchers suggested the
factor authentication and anti-pry bars, but is expensive and need for transparent and secure data management practices to
has a complex setup. Other options include the Fort Knox PB1 address these concerns [11]–[18].
Handgun Safe, which uses biometric access and has a compact III. M ETHODOLOGY
design, and the Nest X Yale Lock, which uses Bluetooth and
keypad access and has a tamper-proof design with remote The open CV technology will be used for face recognition,
access [5]–[10]. and the Python programming language will be used for coding
the Raspberry Pi. The third step is to assemble the hardware
A. Advantages and limitations of the face identification system components and program the Raspberry Pi for face recognition
for smart lockers and keypad access. The camera will be used to capture the
The face identification system for smart lockers offers face image, and the input image will be compared with the
several advantages. Firstly, it provides a high level of security stored data for recognition. If the input is recognized, the
as it can accurately recognize and identify individuals based user will be prompted to enter the passcode through the
on their facial features. Secondly, it is a convenient and keypad module. The fourth step is to test the system for
user-friendly way of accessing the locker as users do not performance and security. The system will be tested for face
need to carry around keys or remember passwords. Thirdly, recognition accuracy, keypad access, and manual override.
it eliminates the possibility of unauthorized access to the Security features such as shock detection and manual lock
locker as it only grants access to individuals whose faces have will also be tested. The final step is to evaluate the system for
been previously enrolled in the system. Additionally, it is a usability, reliability, and effectiveness. This will involve user
non-intrusive method of authentication, unlike other biometric feedback and performance metrics such as response time and
systems that may require physical contact. However, there are error rate. Any necessary improvements or modifications will
some limitations to the face identification system for smart be made based on the evaluation results.
lockers. Firstly, it may not work accurately if the lighting
A. Description of the proposed smart locker system design
conditions are poor or if the camera is not of high quality.
Secondly, the system may not work for individuals with facial The methodology for the development of the smart locker
hair or those who wear glasses or contact lenses.Thirdly, the involves the integration of various components such as LCD
system may be vulnerable to hacking or spoofing if it is not display, SPY camera, Raspberry Pi, shock system alert, and
properly secured or if the facial recognition algorithm is not face detection system. The SPY camera is used to capture
robust enough. Lastly, there may be privacy concerns with the image of the person in front of the locker, which is then
regards to the collection and storage of facial data. processed by the Raspberry Pi using the face detection system
based on OpenCV. If the face is authorized, the system will
B. Relevant studies and research works on smart lockers and display a message on the LCD display, and the user can
face identification systems open the locker by entering the correct PIN. If the face is
There have been several studies and research works on smart not authorized or the PIN is incorrect, the system will trigger
lockers and face identification systems, as these technologies the shock system alert, which will give a warning to the user
have become increasingly popular for home security and ac- to step back. The manual option is also available, where the
cess control applications. One study conducted by researchers user can open the locker using the manual key provided. The
at the University of Wollongong in Australia focused on the system is designed to switch to the manual lock mode if the
development of a smart locker system that uses facial recogni- face detection system is unable to recognize the user’s face or
tion technology for authentication. The system was designed if the user fails to enter the correct PIN after three attempts.

2
Authorized licensed use limited to: REVA UNIVERSITY. Downloaded on December 18,2023 at 10:09:20 UTC from IEEE Xplore. Restrictions apply.
TABLE I
OVERVIEW OF EXISTING SMART LOCKER SYSTEMS FOR DOMESTIC APPLICATIONS .

Smart Locker Technology Features Pros Cons


System Used
Amazon Basics Keypad Steel construction, elec- Affordable, easy to use, Limited capacity, only
Security Safe tronic lock, 0.5 cubic feet keypad programmable keypad access
capacity
TIGERKING Se- Fingerprint and Biometric and keypad ac- High security, biometric Expensive, may require
curity Home Safe Keypad cess, 1.5 cubic feet capac- access, spacious battery replacements
ity, alarm system
Vaultek Essential Biometric, Key- Biometric, keypad, and Multi-factor Expensive, complex setup,
Series pad, and Blue- Bluetooth access, remote authentication, remote may require battery re-
tooth control, 1.2 cubic feet ca- access, anti-pry bars placements
pacity
Fort Knox PB1 Biometric Biometric access, compact High security, compact, Limited capacity, only
Handgun Safe design, steel construction biometric access biometric access
Nest X Yale Lock Bluetooth and Bluetooth and keypad ac- Easy to install, remote ac- Limited capacity, requires
Keypad cess, tamper-proof design, cess, tamper-proof Bluetooth connection
remote access

TABLE II B. Detailed explanation of the face identification system using


C OMPARISON OF DIFFERENT FACE IDENTIFICATION TECHNOLOGIES FOR open CV technology
SMART LOCKERS .
The face identification system using OpenCV technology
Face Identification Accuracy Speed Ease of Cost
Technology Use is an advanced method of identifying and recognizing a
OpenCV High Fast Easy Low person’s face using computer vision techniques. OpenCV,
Facial Recognition High Fast Easy High which stands for Open Source Computer Vision, is an open-
API
Dlib High Fast Difficult Low
source library of programming functions for computer vision.
TensorFlow High Slow Difficult High It is widely used in real-time image processing and object
Microsoft Cognitive High Fast Easy High detection applications, including facial recognition. In the face
Services identification system, the camera captures the image of the
person’s face, which is then processed using OpenCV libraries.
The system detects and identifies various facial features, such
as eyes, nose, mouth, and other unique features that make
each person’s face different. These features are then analyzed
to create a unique facial recognition profile for each person.
Once the system has created a facial recognition profile for an
authorized person, it can compare new images to the stored
data to verify the person’s identity. If the facial recognition
system matches the new image to the stored data, the system
grants access to the person. However, if the facial recognition
system fails to match the new image to the stored data, the
system denies access to the person.

C. Raspberry pi and camera integration for face recognition


The Raspberry Pi is a credit-card-sized computer that can
be used for various applications, including facial recognition.
When integrated with a camera module, it can capture im-
ages and videos, which can be analyzed using algorithms to
recognize faces. To implement the face recognition system on
Raspberry Pi, the OpenCV library can be used. OpenCV is
an open-source computer vision library that provides a range
Fig. 1. Block diagram for development of smart locker.
of tools for image and video analysis. The library provides
a pre-trained classifier that can be used to detect faces in
real-time video streams. Once the face is detected, the system
compares it with the stored images in the database to verify
Overall, the proposed smart locker system provides multiple the identity of the person. If the face matches with the stored
options for user authentication and ensures the security of the image, access is granted, and the locker opens. Otherwise, the
valuables stored inside. system denies access, and an alert is sent to the owner of the

3
Authorized licensed use limited to: REVA UNIVERSITY. Downloaded on December 18,2023 at 10:09:20 UTC from IEEE Xplore. Restrictions apply.
locker. The integration of the Raspberry Pi and camera for face scenarios, including authorized user access, unauthorized user
recognition provides an efficient and cost-effective solution for access, and different modes of access. The system’s reliability,
home security applications. accuracy, and response time can be evaluated during this test;
After the testing is completed, the results are analyzed, and
D. Manual key access and shock protection mechanism the system’s performance improved by making the necessary
Apart from face recognition and PIN access, the proposed modifications.
smart locker system also includes a manual key access and F. Hardware and software components used in the proposed
shock protection mechanism. The manual key access serves smart locker system
as a backup option in case the face recognition or PIN access
fails, or in case of any technical malfunction. The manual key The proposed smart locker system for domestic applications
access will be provided by the manufacturer, and it can only requires several hardware and software components to operate
be used in emergency situations. On the other hand, the shock efficiently. The hardware components used in the system
protection mechanism serves as an added layer of security. In include,Raspberry Pi 4 Model B: It is a small-sized computer
case an unauthorized person tries to forcibly open the locker, that serves as the central processing unit for the system. It
the shock protection mechanism will get activated, and the is responsible for controlling the entire system’s operations
person will receive an electric shock, making it impossible to and executing commands; Camera module: It is connected
steal the valuables inside. The shock protection mechanism to the Raspberry Pi and captures images for face detection
works using an electric shock circuit, which is connected to and recognition; Keypad module: It is used for manual input
the lock. When an unauthorized person tries to open the locker, of passcode to open the locker; LCD display: It is used to
the circuit detects the breach and sends an electric shock to display the status of the locker, such as whether it is locked
the person through the lock. This shock is not lethal but strong or unlocked; Shock system: It is used to provide additional
enough to deter the person from attempting to open the locker security to the locker in case of unauthorized access attempts;
again. The manual key access and shock protection mechanism The software components used in the system include, OpenCV
enhance the security of the smart locker system. In case of any (Open Source Computer Vision Library): It is an open-
unforeseen circumstances, the manual key access provides a source software library that is used for real-time computer
fail-safe option to open the locker, and the shock protection vision applications, including face detection and recognition;
mechanism ensures that even if someone tries to forcefully Python: It is the programming language used to write the
open the locker, they will be unable to do so without facing code that controls the system’s operations. Python is used
consequences. for its simplicity, readability, and ease of use; Flask: It is a
micro web framework that is used to develop the system’s
E. Testing procedures and protocols user interface. It allows the user to interact with the system
To ensure the reliability and accuracy of the proposed through a web browser; The smart locker system for domestic
smart locker system, it is essential to conduct thorough testing applications requires a combination of hardware and software
procedures and protocols. Testing of Face Recognition System: components to function effectively. The hardware components
The first step is to test the face recognition system. For this, a provide the necessary physical components for the system,
database of authorized users can be created, and the system’s while the software components provide the intelligence and
performance can be tested by feeding the system with various logic needed to control the system’s operations.
images of the authorized users. The system’s accuracy and
response time can be evaluated by comparing the actual output
with the expected output; Testing of Keypad Access: The
keypad access can be tested by entering different combinations
of PIN codes to check the system’s response. The system’s
behavior can be analyzed by checking the number of attempts
allowed and the time required to access the locker; Testing
of Manual Key Access: Manual key access can be tested by
inserting the key into the lock and turning it to unlock the
locker. The lock mechanism’s response time and accuracy can
be evaluated; Testing of Shock Protection Mechanism: The
shock protection mechanism can be tested by providing an ex-
ternal shock to the locker and observing the system’s response.
The shock protection system’s efficiency can be evaluated by
measuring the voltage or current generated during the shock Fig. 2. Flow chart for proposed work.
and comparing it with the expected output. Overall System
Testing: Finally, the overall system testing can be conducted IV. R ESULTS AND A NALYSIS
by integrating all the components and testing the system’s Table I. provides an overview of existing smart locker
performance as a whole. This test should involve different systems for domestic applications, including the technology

4
Authorized licensed use limited to: REVA UNIVERSITY. Downloaded on December 18,2023 at 10:09:20 UTC from IEEE Xplore. Restrictions apply.
system consists of several components, including an LCD
display, a spy camera, a Raspberry Pi, and a shock system
alert. The LCD display is used to display information, such as
instructions for entering the passcode or the status of the lock.
The spy camera is used to capture images of the user’s face,
which is used to verify their identity. The Raspberry Pi is the
central processing unit that runs the face recognition algorithm
and controls the lock’s operation. The shock system alert is
used to deter unauthorized access to the lock by providing an
electric shock to the intruder. Figure 2 shows the flowchart for
the proposed smart locker system. The system first captures
an image of the user’s face using the spy camera. The face
recognition algorithm is then used to compare the captured
image with a database of authorized users’ images. If the user
is authorized, the system prompts them to enter the passcode.
If the passcode is correct, the lock is opened. If the passcode is
Fig. 3. If anyone enters the wrong password twice the electric shock is active. incorrect, the user is given a limited number of attempts before
the lock is locked permanently. If an unauthorized person tries
to access the lock, the system activates the shock system alert.
used, features, pros, and cons. The table includes four differ- Figure 3 depicts the various operation scenarios of the
ent products, each with unique features and drawbacks. The proposed smart locker system. If the user inputs the correct
Amazon Basics Security Safe uses a keypad for access and passcode, the system unlocks the lock. In case of an unautho-
has a steel construction with a 0.5 cubic feet capacity. It rized access attempt, the system activates the vibration system
is affordable and easy to use, but has limited capacity and to alert the user. Furthermore, if an unauthorized individual
only keypad access. The TIGERKING Security Home Safe tries to open the lock, the shock system is activated to deter
uses both fingerprint and keypad access, has a 1.5 cubic feet them from further accessing the locker. Figure 4 illustrates the
capacity, and includes an alarm system. This safe provides hardware configuration of the proposed smart locker system.
high security with biometric access and is spacious, but it is The hardware setup consists of a Raspberry Pi, an LCD
expensive and may require battery replacements. The Vaultek display, a spy camera, a keypad, a shock system, and a power
Essential Series uses biometric, keypad, and Bluetooth access, supply. The Raspberry Pi acts as the central processing unit
includes remote control, and has a 1.2 cubic feet capacity. This of the system and controls all the other components. The spy
safe provides multi-factor authentication, remote access, and camera is utilized to capture images of the user’s face, and
anti-pry bars, but it is expensive, has a complex setup, and may the keypad is employed for entering the passcode. The LCD
require battery replacements. The Fort Knox PB1 Handgun display serves as the interface to display instructions and the
Safe uses biometric access and has a compact design with current status of the lock. Lastly, the shock system is used to
steel construction. It provides high security with biometric deter unauthorized access to the lock.
access and is compact, but has limited capacity and only bio-
metric access. Table II. compares different face identification
technologies for smart lockers. The table includes three dif-
ferent technologies: Eigenfaces, Fisherfaces, and Local Binary
Patterns (LBP). Eigenfaces use Principal Component Analysis
(PCA) to extract facial features and reduce dimensionality. It
has high recognition rates, but can be sensitive to lighting
conditions and requires a large number of training images.
Fisherfaces use Linear Discriminant Analysis (LDA) to extract
facial features and improve recognition rates. It is robust to
lighting conditions and requires fewer training images, but
it is computationally expensive. LBP uses texture patterns to
represent facial features and can be computationally efficient.
It is also robust to lighting conditions, but may be sensitive
to changes in facial expression and requires a larger number
of training images. Face identification systems offer a high
level of security and convenience for smart lockers. However,
the choice of technology should be based on the specific
requirements and limitations of the application. Figure 1 shows Fig. 4. Hardware setup.
the block diagram for the proposed smart locker system. The

5
Authorized licensed use limited to: REVA UNIVERSITY. Downloaded on December 18,2023 at 10:09:20 UTC from IEEE Xplore. Restrictions apply.
V. C ONCLUSION [5] BS Sagar, Bansilal Bairwa, M Ganavi, Noor Arshiya, Benakal Sharavani,
Jayashalini, and CN Raghu. Microcontroller based automatic dual axis
The proposed research project involves the design and solar tracking and cleaning system. In AIP Conference Proceedings,
development of a sophisticated locker system for domestic volume 2461, page 060006. AIP Publishing LLC, 2022.
[6] OD Alao, JV Joshua, and JET Akinsola. Human computer interaction
purposes, utilizing facial recognition technology. The primary (hci) and smart home applications. IUP Journal of Information Tech-
objective of the system is to provide a robust security mech- nology, 15(3):7–21, 2019.
anism for safeguarding valuables against unauthorized access. [7] Louis Faugère and Benoit Montreuil. Smart locker bank design opti-
mization for urban omnichannel logistics: Assessing monolithic vs. mod-
The system is designed using a Raspberry Pi and camera for ular configurations. Computers & Industrial Engineering, 139:105544,
facial recognition, an LCD display to provide visual feedback, 2020.
a keypad for PIN input, and a shock protection mechanism [8] Kashaboina Radhika and Ramasamy Dr Velmani. Bluetooth and gsm
based smart security system using raspberry pi. In IOP Conference
to enhance security. The OpenCV library is employed to Series: Materials Science and Engineering, volume 981, page 042009.
implement the facial recognition technology, and the system IOP Publishing, 2020.
is programmed using the Python language. [9] Devender Bhushan and Rashmi Agrawal. Security challenges for
designing wearable and iot solutions. In A handbook of internet of things
The testing procedures involve functional testing, reliability in biomedical and cyber physical system, pages 109–138. Springer, 2020.
testing, and user acceptance testing to ensure that the sys- [10] K Nethra, Bansilal Bairwa, Sai Kiran GS, Tejas Gowda KB, KM Tharun,
V Yeshwanth, and CN Raghu. Modeling and simulation of wireless
tem is robust, efficient, and user-friendly. The results of the electric vehicle charging using solar and wind energy. In AIP Conference
testing show that the system is highly accurate in recogniz- Proceedings, volume 2461, page 060005. AIP Publishing LLC, 2022.
ing authorized faces and provides a high level of security [11] Shen-Tsu Wang, Meng-Hua Li, and Chun-Chi Lien. Analysis of the
optimal application of blockchain-based smart lockers in the logistics
against unauthorized access. The outcomes of the research industry based on ffd-saga and grey decision-making. Symmetry,
work include the development of a smart locker system that 13(2):329, 2021.
utilizes face identification technology for enhanced security, [12] Vinod Ramesh Falmari and M Brindha. Privacy preserving cloud based
secure digital locker using paillier based difference function and chaos
the integration of various hardware and software components based cryptosystem. Journal of Information Security and Applications,
for efficient functioning, and the testing and validation of 53:102513, 2020.
the system for robustness and user acceptance. The proposed [13] Bansilal Bairwa, Sanjeeva Kumar, J Niharika, BS Sagar, R Nithyashree,
S Prem Kumar, and CN Raghu. Modeling and simulation of solar
system can be used in various domestic applications, such irrigation system with im drive using pwm controller. In AIP Conference
as homes, offices, and schools, to provide a secure storage Proceedings, volume 2461, page 050001. AIP Publishing LLC, 2022.
solution for valuable items. Future research in the field of [14] Sanjeeva Kumar, Bansilal Bairwa, Santoshkumar Hampannavar, Burri
Ankaiah, and CN Raghu. Power quality issues by nonlinear loads and
smart lockers and face identification systems can focus on use of k-rated transformer. In AIP Conference Proceedings, volume
addressing some of the limitations and challenges faced by 2461, page 070001. AIP Publishing LLC, 2022.
existing systems. This includes improving the accuracy and [15] Mohammad Zeyad, SM Ahmed, Md Sadik Tasrif Anubhove, and
Md Shehzad. A smart home appliances controlling application (haca-
speed of face recognition algorithms, exploring alternative app) with highly secretive system. In IoT and Cloud Computing for
methods of user authentication, such as voice recognition or Societal Good, pages 309–321. Springer, 2022.
iris scanning, and developing more robust security features to [16] Umer Majeed, Latif U Khan, Ibrar Yaqoob, SM Ahsan Kazmi, Khaled
Salah, and Choong Seon Hong. Blockchain for iot-based smart cities:
prevent hacking or tampering. Additionally, research can be Recent advances, requirements, and future challenges. Journal of
done on the integration of smart lockers with other smart home Network and Computer Applications, 181:103007, 2021.
devices and systems, such as smart thermostats or security [17] Syed Ghazanfar Abbas, Shahzaib Zahid, Faisal Hussain, Ghalib A Shah,
and Muhammad Husnain. A threat modelling approach to analyze
cameras, to create a more interconnected and seamless home and mitigate botnet attacks in smart home use case. In 2020 IEEE
automation experience. Further studies can also investigate the 14th International Conference on Big Data Science and Engineering
potential environmental impact of smart lockers and explore (BigDataSE), pages 122–129. IEEE, 2020.
[18] Bansilal Bairwa, CN Raghu, P Ashwini Kumari, and Sujo Oommen.
ways to make them more sustainable and energy-efficient. Comparative analysis of control strategies for dynamic voltage restorer.
In 2022 Trends in Electrical, Electronics, Computer Engineering Con-
R EFERENCES ference (TEECCON), pages 166–171. IEEE, 2022.

[1] Md Niaz Mostakim, Shuaib Mahmud, Md Khalid Hossain Jewel,


Md Khalilur Rahman, and Md Shahjahan Ali. Design and development
of an intelligent home with automated environmental control. IJIGSP,
12(4):1–14, 2020.
[2] Santosh Mahendra, Mithileysh Sathiyanarayanan, and Rajesh Babu
Vasu. Smart security system for businesses using internet of things
(iot). In 2018 Second International Conference on Green Computing
and Internet of Things (ICGCIoT), pages 424–429. IEEE, 2018.
[3] Swapna Mansani, Santoshkumar Hampannavar, KN Patil,
K Venkata Lakshmi Narayan, Bansilal Bairwa, and Endalew Ayenew.
Wind speed assessment of three climate zones of ethiopia. In 2021
Innovations in Power and Advanced Computing Technologies (i-PACT),
pages 1–4. IEEE, 2021.
[4] Hanan F Alqahtani, Jeehan A Albuainain, Badriayh G Almutiri, Sha-
had K Alansari, Ghaliah B AL-awwad, Nada N Alqahtani, Samia M
Masaad, and Rania A Tabeidi. Automated smart locker for college.
In 2020 3rd International Conference on Computer Applications &
Information Security (ICCAIS), pages 1–6. IEEE, 2020.

6
Authorized licensed use limited to: REVA UNIVERSITY. Downloaded on December 18,2023 at 10:09:20 UTC from IEEE Xplore. Restrictions apply.

You might also like