You are on page 1of 5

2020 Asia-Pacific Conference on Image Processing, Electronics and Computers (IPEC)

Investigation and Application of Smart Door Locks


based on Bluetooth Control Technology

Zhaonan Mu Wenting Li* Chao Lou Mengzhu Liu


Guizhou University of Guizhou University of Guizhou University of Guizhou University of
Commerce Commerce Commerce Commerce
Guiyan, China Guiyan, China Guiyan, China Guiyan, China
54762999@qq.com wendyworkmail@163.com 420518971@qq.com m.z.liu@foxmail.com

Abstract—Recent studies show the design of smart door cracked. Adopting RF card reading module MFRC530 and
locks is mainly based on CPU card technology. However, this GPRS communication module SIM900A of smart door
design is costly with poor confidentiality. In this paper, a new locks, a design method of CPU card-based intelligent door
method of smart door locks which can be controlled through lock has provided by Hesong Huang et al. [9]. This method
Bluetooth is proposed. The first process of the method is an uses CPU card as users’ verification card and lock device
overall design of smart door locks based on Bluetooth control, based on FM1208-10 CPU card and New hualong
including central controller, door locks controller, Bluetooth c8051f340 microprocessor. However, the method has its
communication module and system keyboard. The second disadvantages, such as high cost and poor safety. Zhenya
process is hardware design of smart door locks, which mainly
Chen and Tai Jiang have conduct their design which based
adopts Bluetooth serial port module, drive motor, limit switch
and current detection module of smart door locks system and
on STM32 Single Chip Microcomputer and adopt embedded
STC15F2K32S2 single chip microcomputer. The last process is technology, image recognition technology and RFID,
software design. The software consists of the control software realizing network monitoring and personnel organization
of smart door locks and client Bluetooth software for mobile [10]. The design lock system adopts STM32F407 as the
intelligent terminal. Experiments show that this new method of main control chip and hasμC/OS-II real-time operating
smart door locks based on Bluetooth control is more system. By connecting Ethernet and routers, it achieves real-
economical, safer, more flexible, and more efficient. time communication between smart door locks and
administration servers. But this design has problem with
Keywords—Bluetooth Control, Smart Door Locks, Bluetooth poor security performance and complicated operation.
Communication Module, Bluetooth Serial Port Module,
STC15F2K32S2 Single Chip Microcomputer Based on previous researches and methods, a new design
method of Bluetooth control-based intelligent door lock is
I. INTRODUCTION proposed, which considers the requirements of economic
cost, safety performance and unlocking efficiency, sensitivity
The development of door locks can traceback to 5000
etc., realizing identify authentication and smart lock
years ago, they evolve with the development of human
controlling through Bluetooth [11-12]. Therefore, a wide
civilization as people’s security guard [1]. From earliest
range of applications of this technology may come into
mechanical locks to nowadays smart locks, various smart
reality in the future.
door locks with functions become more and more popular
[2]. The smart door locks balance workload for traditional II. DESIGN OF INTELLIGENT DOOR LOCKS DEVICE BASED ON
managers considerably [3-4]. However, most of the existing BLUETOOTH CONTROL
door locks have poor security management performance
which contributes safety risk, designing a more reliable and A. The Overall Design of Intelligent Door Locks Device
convenient anti-theft door locks becomes one of the hottest The overall design of the device mainly includes the
studies for lock engineers and related researchers [5-6]. central controller, the access controller, the Bluetooth
Based on the design of GPRS wireless network smart door communication module and the system keyboard of the
locks [7]. Researchers propose to use MSP430F149 Single device. The central controller completes the authentication
Chip Microcomputer works as the main control unit of operation of the device and receives signals from peripheral
smart door locks, Siemens GPRS wireless unit MC39i devices of the lock and controls the peripheral devices
works as the communication unit, and the AES encrypted accordingly.
electronic intelligent device works as control unit. However,
some security problems are still left in this design. Luan The device controls its Bluetooth communication module
(2016) put forward an intelligent door locks design method switch and controls communication with other Bluetooth
based on GPRS and laser virtual keyboard [8]. The method devices through the central controller and utilizes its
utilizes Single Chip Microcomputer as the core processor of encryption operation to realize the authentication of mobile
the lock which stores, matches password of smart door locks, terminals. The functions of the Bluetooth communication
and controls the whole lock device. The buzzer of smart module of the device mainly focus on two aspects: actively
door locks works as a reminder device and notices the users search accessible mobile Bluetooth devices nearby and
to input correct password. Moreover, the password uses an support the communication between the locks’ central
electromagnetic relay to control the automatic switching of controller and mobile intelligent terminals. The main
intelligent door locks. However, there are risks of being functions of the access controller are open or close the door

978-1-7281-6067-2/20/$31.00 ©2020 IEEE 68 Dalian, China


April 14-16, 2020
Authorized licensed use limited to: UNIVERSITI TEKNOLOGI MARA. Downloaded on June 06,2023 at 17:07:59 UTC from IEEE Xplore. Restrictions apply.
lock and feedback the present state of the door lock to the during the identity authentication. The specific process is as
central controller through the Bluetooth device. The states follow:
are generated by the central controller and then the central
controller creates the corresponding access control record (1)The authentication mode of intelligent door lock
sheet. The keyboard controls and manipulates the reception device based on Bluetooth control. When a user approaches
and transmission of the locks’ signal. The structure is shown the smart door lock device, the user’s mobile terminal
in figure1. automatically establishes a connection with the device, and
then the device repeatedly sends the verification request to
the terminal several times. After the calculation conducted by
this terminal, the calculated result is fed back to the lock
device and this device verifies the user’s identity and soon
give response. If the verification successes, the door lock
will be open but the connection between the device and
mobile terminal will be interrupted as soon as the mobile
terminal is away with the lock device. While if the
verification fails, the device records the MAC address of the
Figure 1 Structure of intelligent door lock device based on Bluetooth control terminal and disconnects fast. If a user has failed verification
multiple times, the devices will add his MAC address to the
B. The Control Process of Bluetooth Control-Based blacklist of Bluetooth connection and this MAC address will
Intelligent Door Locks be forbidden to connect with the device again.
The peripheral device of the smart door lock controls and (2) Authentication method of intelligent door lock device
manipulates by the central controller. When the door lock is based on Bluetooth control: The door lock device sends the
turned on, the Bluetooth communication module of the user a signal encrypted by the data encryption method to
device actively searches for a mobile intelligent terminal that repeatedly verify the identity of the user. The encryption
can perform Bluetooth connection nearby. After the adopts the modern cryptography principle. Moreover, this
connectable mobile terminal is connected, the Bluetooth lock device uses the finite field closed calculation on the GF
communication module of the device sends request for (28) to provide a higher security guarantee level for the
information verification to the door lock and then obtains a device.
verification code from it. If the verification code which
processed by the mobile terminal conforms the In the modern cryptography stream cipher system, there
authentication operation requirement of the device, the are two main ways in which a door lock generates a key, one
central controller sends an unlock signal to the controller. On is a door lock TRNG that uses physical information; the
the contrast, if the verification of the code fails, the device other is a door lock pseudo-random number generator uses
actively disconnects from the connected mobile terminal and mathematical functions. Door lock pseudo-random number
add this terminal to the blacklist of the Bluetooth connection generator can generate non-user subjective key which has
of the device very quickly. Figure2 shows verification superiority in efficient storage. This method can realize
information interaction structure of the door lock device. information synchronization between different devices and
occupy less space. According to door lock pseudo-random
number generator, different device seeds generate different
random sequence of the door locks. The mobile terminal
saves the same range > x, y @ and seed s as the device. If
Ci is the item i of the random sequence of the door locks,
Ci is a fixed value when the seed is fixed and the range is
generated. The device transmits the value of i to the user's
mobile terminal multiple times, and the mobile terminal
calculates and returns the result to the device which then
accomplishes the identity verification of the users.
III. HARDWARE DESIGN OF INTELLIGENT DOOR LOCKS
DEVICE
The hardware of the door lock device adopts
STC15F2K32S2 single chip, the Bluetooth serial port
Figure 2 Verification information interaction structure of door lock device
module, drive motor, limit switch and current monitoring
C. Identity Authentication of Intelligent Door Locks Device module of door lock to realize the hardware design of
intelligent door lock device.
based on Bluetooth Control
The authentication process of the intelligent door lock: The operating voltage of the hardware such as
Firstly, the controller of the door lock device matches and STC15F2K32S2 single clip, electronic relay, and
connects with a user’s mobile terminal. Then, the controller ACS712ELC clip is 5v. This requires large power.
sends verification code to the user and the user needs to Therefore, the device utilizes efficient and powerful DC-DC
feedback the verification code to the controller. Thirdly, the converter LM2576-5.0. LM2576-5.0 is produced by an
identity of the user is verified. Finally, the controller American company. This company specializes in
controls the respond of the door lock. To guarantee the semiconductor production and has the integrated voltage
security of the device, the transmission data is encrypted regulator circuit of 3A current output buck switch type. The

69
Authorized licensed use limited to: UNIVERSITI TEKNOLOGI MARA. Downloaded on June 06,2023 at 17:07:59 UTC from IEEE Xplore. Restrictions apply.
oscillator frequency of LM2576-5.0 is relatively fixed. The device of the mobile terminal is successful connected.
frequency of LM2576-5.0 reference regulator is also
relatively fixed and can protect overall power supply circuit The STC15 single chip microcomputer has its own A/D
of the smart lock by limiting the current of the device, by converter, which can realize the functions of collecting the
controlling the thermal-shutdown circuit of the device and so signal VOUT of the door lock current sensor and timely
on. Besides, the LM2576-5.0 semiconductor converter only switching. Comparing the safety of the door lock and door
needs a high-efficiency voltage regulator circuit which can lock motor by setting the current threshold. By pressing the
form a door lock device. buttons K1 and K2, the user can not only manually unlock or
lock, but also selectively shield the Bluetooth client. The
The normal operating voltage of the motor of the door limit switch of the door lock is used to detect whether the
lock is 12v, and powered by the power transformer and the door lock latch is in the correct position. If the STC15 single
backup battery of the device through J2. When the output chip microcomputer detects the P2.4 port or the P2.5 port of
voltage of the device exceeds 5.3v due to sudden causes, the the door lock is low, the latch of the device should be in
D2 is automatically breakover and the self-recovering fuse place. Then the door lock motor is immediately stopped
F1 of the lock is quickly disconnected to protect the lock rotating, thereby securing the door lock. If the user's door
device in time. D4, D5 is the LED status indicator of the lock is not locked, the device's Hall switch sensor U7 will
device. The power circuit design of the intelligent door lock output a high-level signal to the door lock microcontroller
device is shown in Figure 3. and then it will control the buzzer of the door lock to alarm.
The main control circuit design of the door lock is shown in
Figure 4.

Figure 3 Power circuit design of smart door lock device system

Considering the economic cost and performance of the Figure 4 Intelligent door lock device main control circuit design
door lock device, the main control chip of the door lock
adopts the SOP28 single chip microcomputer produced by IV. SOFTWARE DESIGN OF INTELLIGENT DOOR LOCKS DEVICE
Hongjing Technology Company. This control chip has the The software design of the intelligent door lock device
characteristics of high information processing efficiency, based on Bluetooth control is mainly composed of two parts:
strong reliability, low power consumption and strong anti- the door lock control software and the Bluetooth client
interference. The device instruction code is fully compatible software design, which can be accomplished by JAVA and C
with the traditional 8051. The internal EEPROM of the language respectively.
single clip of the lock device can realize the door lock
password storage, the door lock pairing address storage, the When the door lock device is powered on, the STC15
related parameters storage of the door lock, and so on, and SINGLE CHIP MICROCOMPUTER of the door lock firstly
the memory of the device does not need to be expanded. conducts the initialization, and then sends related parameter
information of the lock to the Bluetooth serial port module,
The Bluetooth serial port module is FBT-06 which has such as sending the user Bluetooth pairing address and the
small size. The module has a PCB antenna, which has the user authentication password. The limit switch of the door
advantages of low cost and high sensitivity of signal lock can detect the current operating state of the door lock
transmit-receiving. The EN Bluetooth module of the door while STC15 single-chip microcomputer detects the state of
lock device basing on Bluetooth control connects the power the door lock’s switch K1, K2, and implement unlocking and
terminal with the P3.4 of the single chip to achieve active blocking action accordingly. What’s more, according to the
high. The working voltage of the Bluetooth serial port information about whether the operation of the buttons K1
module of the device is 3.3v-6v and 5v power supply can be and K2 are shielded by the users’ Bluetooth device, it can be
realized by Normal operation. The AT command is sent to judged whether the unlocking and blocking actions are
the Bluetooth module of the Bluetooth control-based door shielded by the user equipment.
lock device through the serial port of the STC15 single-chip.
Bluetooth serial data wireless transparent transmission of the In general, the Bluetooth device of the door lock is
device is realized. The STATE port of the Bluetooth serial regarded as the master device and after the user's identity
port module of the device and the P3 .2 port of the device verification, the Bluetooth device and the door lock device
single-chip device is connected. And the single-chip start to communicate and transmit the door lock signal
microcomputer of the door lock device can obtain the current through special encryption methods. The data packet of the
working state of the Bluetooth module of the door lock from device is composed of a door lock command word, a door
its detecting result of the STATE port in time. The P3.2 port lock data length, a door lock data and a door lock verification
of the device is high level, indicating that the Bluetooth code. Only when the serial port interrupts the service

70
Authorized licensed use limited to: UNIVERSITI TEKNOLOGI MARA. Downloaded on June 06,2023 at 17:07:59 UTC from IEEE Xplore. Restrictions apply.
subroutine and receives the verification information that
meet the user’s requirement, does the decryption work start.
Then the door lock command code is generated and the door
performs unlocking/blocking action. And the door lock
parameter is set. The software flow of the intelligent door
lock device based on Bluetooth control is shown in Figure 5.

Figure 6 Comparison of unlocking efficiency of different methods


Figure 5 Software flow of intelligent door lock device based on Bluetooth
control It can be seen from Fig. 6 that the unlocking efficiency of
the method [9] is gradually reducing as the number of
V. EXPERIMENTAL RESULTS AND ANALYSIS unlocking increasing. The unlocking efficiency of the
method [8] is more efficient when the number of unlocking
The experiment uses OPPOR9S, Android system, 4 GB is small, and efficiency tend to decrease when the number of
running memory, 64GB body memory, Snapdragon chip, unlocking starts to increase. It has been shown by Fig.6 that
eight-core processor, 2.0GHz frequency. In the experimental the door lock designed in this project have the highest
section, the Bluetooth module of the intelligent door lock unlocking efficiency (80% in average). Besides, the
device is firstly tested. The test process is as follows: unlocking efficiency is not reduced with the increasing
(1) Test the communication situation. Send: AT (return number of unlocking. This proves the effectivity of design of
OK, send it once every second in average) Return: OK. the intelligent door lock device based on Bluetooth control.
Therefore, for the aspect of unlocking efficiency, Bluetooth
(2) Modify baud rate of the Bluetooth serial control-based intelligent door lock device is significantly
communication of the smart door lock device. Send: better than the GPRS and laser virtual keyboard control-
AT+BAUD4, return: OK9600. based method of reference [8], and the CPU card control-
(3) Modify the Bluetooth name of the smart door lock based method of reference [9].
device. Send AT+NAMEname, return: Oksetname. The success rate of identity authentication is another
(4) Change the pairing password of the smart door lock assessment measure of the smart door lock device, which is
device. Send AT+PINXXXX and return: OKset-pin. Among related to the decryption speed of the smart door lock device
them, the parameter XXXX: the pairing password of the (i.e. the unlocking efficiency). The authentication methods of
smart door lock device that can be set, usually 4 bytes in different methods are different, and the success rates of
length, this command can be used for host operation or slave authentication also have difference. This experiment
operation. compares our design method with the design of literature 9
and the design of literature 10 from the aspect of success rate
The above are general setting methods of the Bluetooth of identity authentication of the smart locks. The analysis
slave module of the smart door lock device. Except adding results are as follows. Figure 7 shows.
the paired device name, other settings for the Bluetooth host
module are same with the setting for the Bluetooth slave
module of the smart door lock device.
In the experiment, to facilitate the observation of the door
lock opening and closing effect, an LED light is used to
simulate the switch state of the intelligent door lock device.
That is, turning on the LED light to simulate opening of the
lock while turning off the light to simulate the closing.
The unlocking efficiency is one of the important
indicators to assess intelligent door lock device. The
calculation expression is:

number of fixed time unlocks (1)


unlocking efficiency
fixed time
Figure 7 Comparison of success rate of identity authentication of different
methods
The experiment randomly selected 100 intelligent door
lock devices from Alibaba, comparing unlocking efficiency It can be analyzed from Figure7 that success rate of the
(%) of the method of this paper, the method of reference [8] identity authentication using the method of literature [9] is
and method of reference [9]. The experimental results are always low. This method utilizes CPU card to control the
shown in Figure 6. intelligent door lock. The method adopting STM32 single

71
Authorized licensed use limited to: UNIVERSITI TEKNOLOGI MARA. Downloaded on June 06,2023 at 17:07:59 UTC from IEEE Xplore. Restrictions apply.
chip which conducted in literature [10] has a better success unlocking, locking, alarm reminding and setting changes. It
rate than the method given by literature [9]. The method enhances the convenience and the efficiency of unlocking the
proposed in this project have the highest success rate and intelligent door. Therefore, a wide range of applications of
compared with the other two comparison methods, it has this technology could be prospected in the future.
obvious advantages.
ACKNOWLEDGMENT
To prove the validity and rationality of the proposed
method, the safety, sensitivity, anti-interference and stability This work supported by Guizhou University Science and
of the intelligent door lock device were used to do Technology Talent Support Program (No.KY [2016] 086)
comparative analysis. The method of literature [8], literature and Engineering Research Center of Guizhou University,
[9], literature [10] were selected to be compare with the China (No.KY [2016] 061).
method proposed in this paper. The results of the analysis REFERENCES
are shown in Table I.
[1] Zhang, Jingduan, and D. University. "Study on library access control
system based on face recognition technology." Modern Electronics
TABLE I. PERFORMANCE COMPARISON OF INTELLIGENT DOOR LOCK Technique, 2016.
DEVICE
[2] Li, Zhongkui, and X. Liu. "Distributed tracking control for linear
security sensitivity anti- stability multi-agent systems with a leader of bounded input using output
interference information." Intelligent Control and Automation IEEE, 2012, pp:
Literature[8] general low general good 1756-1761.
Literature[9] Good general Bad General [3] Hou, Jinwang, X. Feng, and X. Hua. "Designed of Temperature
Literature[10] Good Good general General Control System for Microsphere Cavity Based on SCM." Chinese
This Literature good Good good Good Journal of Electron Devices, 2016.
[4] Jin, Chun, et al. "A Method of RSSI Fingerprint Interpolation Based
It can be summarized from table 1 that the design method on Spatial-temporal Similarity Model for Bluetooth Indoor
of smart door lock provided by literature [8] has general Positioning." Science Technology & Engineering, 2016.
security level and anti-interference performance and poor [5] Lu, Tian, and Y. Yang. "The Design of Electric Vehicle Charging
sensitivity. These factors have bad effect on the unlocking Station Communication Gateway Based on IEC61850." Electric
efficiency. The safety and sensitivity of the intelligent door Power Science & Engineering, 2014.
lock device of the method 9 are both good. But the anti- [6] Sun, Wei, et al. "Design of Access Control Management System
interference performance is general, which tends to lead to Based on Three Times of Face Recognition
Authentication." Computer Measurement & Control, 2016.
relatively poor stability. With the increase of the number of
[7] Hongping Shi, Zhiyu Li, Yihua Xu. The Communication System of
unlocking, the unlocking efficiency is likely to be slower and Small Quadrotor UAV Based on Bluetooth and Digital Radio.
slower; the security and sensitivity of the intelligent door Electronic Design Engineering, 24(17), 2016, pp: 81-84.
lock device of the method 10 is better than method 9 and 8. [8] Luan, Luxiang, and D. O. Information. "Intelligent electronic door
The device put forward in this paper has superiority on lock system based on GPRS and laser virtual keyboard." Journal of
security, sensitivity, anti-interference and stability and can Computer Applications, 2016.
improve unlocking efficiency significantly. [9] Huang, Hesong, et al. "The design of access control system on CPU
card." Application of Electronic Technique, 2017.
VI. CONCLUSIONS [10] Zhenya Chen, Tai Jiang.Anti-trailing Elevator Entrance Guard
Control System Based on Ethernet. Computer Engineering and
Due to the problem that the intelligent door lock devices Applications, 2016.
have poor security and low unlocking efficiency, a new [11] Piyare, M. Tazil. 2011. Bluetooth Based Home Automation System
design method of intelligent door lock devices based on Using Cell Phone, 2011 IEEE 15th International Symposium on
Bluetooth control technology is proposed. Experiment results Consumer Electronics.
show that this method is capable to unlock intelligent doors [12] John Robles and Tai-hoon Kim. Applications Systems and Methods
by remote control. Moreover, it is possible to realize the in Smart Home Technology: A Review, International Journal of
human-computer interaction operations through Bluetooth Advanced Science and Technology. 15, pp: 37-48.
device without touching the intelligent doors, such as

72
Authorized licensed use limited to: UNIVERSITI TEKNOLOGI MARA. Downloaded on June 06,2023 at 17:07:59 UTC from IEEE Xplore. Restrictions apply.

You might also like