You are on page 1of 40

VISVESVARAYA TECHNOLOGICAL UNIVERSITY

JNANA SANGAMA, BELGAVI-590018

A
Technical Seminar Report– 18MES84
on
“SMART DOOR LOCK SYSTEM”
Submitted in partial fulfilment of the requirements for the degree of
BACHELOR OF ENGINEERING
in
MECHANICAL ENGINEERING
Submitted by
DEEPAK GOWDA R
1DB19ME004

Under the Guidance of


DHARSHAN B.G

Assistant professor

DEPARTMENT OF MECHANICAL ENGINEERING

DON BOSCO INSTITUTE OF TECHNOLOGY


Kumbalagodu, Mysore Road, Bangalore-560 074
2022-2023
VISVESVARAYA TECHNOLOGICAL UNIVERSITY
JNANA SANGAMA, BELGAVI-590018

DON BOSCO INSTITUTE OF TECHNOLOGY


Kumbalagodu, Mysore Road, Bangalore-560 074
DEPARTMENT OF MECHANICAL ENGINEERING

CERTIFICATE
This is to certify that the Technical Seminar Report Entitled“SMART DOOR LOCK
SYSTEM”is a bonafide work carried out byDEEPAK GOWDA R(1DB19ME004)in partial
fulfilment for the award of the degree of Bachelor of Engineering in Mechanical
Engineering of Visvesvaraya Technological University, Belagavi, during academic year
2022-2023. All Corrections / Suggestions indicated in the Internal Assessment have been
incorporated in the Technical Seminar Report and it is deposited in the department library.
The Technical Seminar Report has been approved as it satisfies the academic requirements in
respect of the Technical Seminar Prescribed for the Bachelor of Engineering Degree in
Mechanical Engineering.

DHARSHAN B.G Dr.K C ANANTHAPADMANABHAM Dr. B S NAGABUSHANA


Guide Asso.Professor and Head Principal
VISVESVARAYA TECHNOLOGICAL UNIVERSITY
JNANA SANGAMA, BELGAVI-590018

DON BOSCO INSTITUTE OF TECHNOLOGY


Kumbalagodu, Mysore Road, Bangalore-560 074
DEPARTMENT OF MECHANICAL ENGINEERING

DECLARATION

I DEEPAK GOWDA R, 1DB19ME004 Student of 8th semester, B.E in Mechanical


Engineering, Don Bosco Institute of Technology, hereby declare that the entire work
embodied in this Technical Seminar titled, “SMART DOOR LOCK SYSTEM”has been
carried out by me and submitted in partial fulfilment of the award of the degree in
Bachelor of Mechanical Engineering of the Visvesvaraya Technological University,
Belagavi, during the academic year 2022-2023. Further the matter embodied in this
report has not been submitted previously by anybody for the award of any degree equal
to this or any other university.

Date: 08-05-2023 DEEPAK GOWDA R


Place: Bengaluru 1DB19ME004
ACKNOWLEDGEMENT
The satisfaction and euphoria that accompany the successful completion of any task would be
incomplete without mention of the people who made it possible and under whose constant
guidance and encouragement the task was complete.
I express my gratitude to the Management of “DON BOSCO INSTITUTE OF
TECHNOLOGY,BENGALURU - 74”, for providing Infrastructure and Facilities to carry
out our academics.
I express my sincere gratitude toDr. B S Nagabushana, Principal, Don Bosco Institute
ofTechnology, Bengaluru -74for his timely help and inspiration during tenure of the course.
I express my profuse gratitude to Dr.K C Anantha Padmanabham, Associate Professor
and Head of the Department of Mechanical Engineering, Don Bosco Institute of
Technology, Bengaluru -74, for his timely co-operation while carrying the Technical
Seminar.
I express my profuse gratitude toGuide Name, Designation, Department of Mechanical
Engineering, Don Bosco Institute of Technology, Bengaluru -74, for guiding me with
numerous helpful discussion. I also thank my guide for valuable guidance, encouragement
and inspiration for carrying out the Technical Seminar.
I would like to express my heartfelt gratitude toTechnical Seminar Coordinator Mr.
Dharshan B G, Associate Professor, Department of Mechanical Engineering, Don Bosco
Institute of Technology, Bengaluru -74,for his encouragement and timely support while
carrying the Technical Seminar.
I would like to express my heartfelt gratitude to Teaching Faculty Members & Non-
Teaching staff members of Department of Mechanical Engineering, Don Bosco Institute
of Technology, Bengaluru,who have directly or indirectly helped me in completion of the
Technical Seminar successfully.
I express my gratitude to Chief Librarian and Team for their encouragement and timely
support in completion of the Technical Seminar.
I express wholehearted thanks to myParents and Friendsfor their support and care in
completion of the Technical Seminarsuccessfully.

Date: 08-05-2023 DEEPAK GOWDA R


Place: Bengaluru 1DB19ME004
CONTENTS

CERTIFICATE
DECLARATION
ACKNOWLEDGEMNT
LIST OF FIGURE
LIST OF TABLES

Sl. No. CHAPTERS PAGE NO.s


1. Chapter1: Introduction
2. Chapter2: LiteratureSurvey
3. Chapter 3:Objectives and Concepts
4. Chapter 4:Working Principles and Process. Etc.,
5. Chapter 5: Advantages, Disadvantages and Applications
6. Chapter6: Conclusion
LISTOF CONTENTS

CHAPTER CONTENTS PAGE


NO. NO
1 INTRODUCTION 1

1.1 OVERVIEW 1

1.2 MOTIVATION 1

1.3 OBJECTIVE 2

1.4 SCOPE 4

2 LITERATURESURVEY 6

3 IMPLEMENTATION 11

MATCHINGALGORITHM 12

ENCRYPTIONALGORITHM 14

AUTHENTICATIONALGORITHM 15

HARWAREREQUIREMENTS 18

4 TYPESOFSMARTDOOR LOCKSYSTEM 20

RFIDBASEDDOORLOCKSYSTEM 20

PINBASEDDOORLOCKSYSTEM 22

FINGERPRINTBASEDDOORLOCKSYSTEM 25

5 RESULT 27

6 APPLICATION 28

CONCLUSION

REFERENCE
LISTOFFIGURES

FigNo Content/Title PageNo


MATCHINGALGORITHM
3.1 13

4.1.1 RFIDLOCK 22

4.2.1 24
PIN

4.3.1 FINGERPRINT 26
SmartDoorLock System 2022-2023

CHAPTER1

INTRODUCTION

1.1. Overview

Safety and security are part of human life. We humans often work hard take every
opportunitywecan,earnandsavethem.Thishadbeenahabitforseveralgenerations.Itisalsoimportantt
osavewhatwehaveearned,fewputtheirmoneyinbanks,fewbuyassets,fewinvesttheirmoneyand
other spend on necessities or gift to their loved ones. But is that the same when it comes
toourhouses?Humansalwaysarefearedtheygetfrightenedeasilytorelievethemfromtheirfearthey
need security, and that security is locks. It is amazing how a device such as a lock puts arelief
in people's mind that they are safe. Research says people work more than half of theirlifetime
for spending on their living and for family needs so such valuables must surely
beprotectedandtheonlyhopesarelocks.Overthetimeofyearsthere’sbeenalotofinnovationinlocks.
Today we are in an era where locks can be unlocked from anywhere in the world. Now,weare
going to develop our versionof smartlock that meetsour objectives.

1.2. Motivation

Smart door lock systems are an innovation in home security that provide homeowners with
arange of benefits, including increased convenience, security, and control. There are
severalmotivations behind the development and adoption of smart door lock systems, including
theneedforbetterhomesecurity,thedesireforgreaterconvenience,andtheriseofhomeautomationtec
hnology.

One of the main motivations for smart door lock systems is the need for better home
security.Traditional lock and key systems are vulnerable to a variety of threats, including lock
picking,bumping, and unauthorized duplication of keys. Smart lock systems, on the other hand,
useadvanced technology, such as biometric sensors and wireless connectivity, to provide a
higherlevel of security that is much more difficult for intruders to bypass. This increased

Page 1
SmartDoorLock System 2022-2023

Anothermotivationforsmartdoorlocksystemsisthedesireforgreaterconvenience.Traditionallock
and key systems require physical keys, which can be lost, stolen, or forgotten. This can
befrustrating for homeowners, who may find themselves locked out of their homes or
strugglingto find their keys when they need them. Smart lock systems eliminate these problems
byproviding homeowners with alternative methods of accessing their homes, such as
smartphoneapps, key fobs, or biometric sensors. This not only makes it easier to enter and exit
the home,butitalso eliminatesthe need for physical keys altogether.

The rise of home automation technology is another motivation for smart door lock
systems.Homeautomationsystemsallowhomeownerstocontrolvariousaspectsoftheirhomes,sucha
slighting, temperature, and security, from a single device, such as a smartphone or tablet.
Smartlock systems can be integrated into these home automation systems, allowing
homeowners tocontrol their locks remotely, monitor their homes from anywhere, and receive
alerts if there
isanyunusualactivityattheirhomes.Thislevelofintegrationprovideshomeownerswithagreaterlevel
of control overtheir homes, aswellasincreased convenienceand peace ofmind.

Finally, the growing popularity of smart home technology is driving the adoption of smart
doorlocksystems.Asmorehomeownersseektoautomatetheirhomesandmakethemmoreconvenient
and secure, smart door lock systems are becoming an increasingly popular choice.This trend is
likely to continue as technology continues to advance and more homeownersbecomeaware of
the benefits of smart lock systems.

Inconclusion,thereareseveralmotivationsforthedevelopmentandadoptionofsmartdoorlocksystem
s.Thesesystemsprovidehomeownerswithahigherlevelofsecurity,greaterconvenience, and
increased control over their homes. As technology continues to advance andthe popularity of
smart home technology grows, it is likely that smart door lock systems willbecomeeven more
widely adoptedinthe future.

Objective

Page2
SmartDoorLock System 2022-2023

to traditional lock and key mechanisms. They achieve this by utilizing advanced technology,including
wireless connectivity, biometric sensors, and remote access controls, to providehomeownerswith a
higher level ofcontroland security overtheir homes.

Oneofthekeyobjectivesofasmartdoorlocksystemistoprovideconveniencetohomeowners.With a
smart lock system, homeowners no longer have to worry about carrying around keys
orfumbling with locks. Instead, they can easily unlock their doors using a smartphone app, a
keyfob, or a biometric sensor. This not only makes it easier to enter and exit the home, but it
alsoeliminatesthe risk of lost or stolenkeys.

Another objective of a smart door lock system is to increase security. Smart locks are
designedto provide a higher level of security than traditional lock and key systems. They
achieve this byutilizingadvancedencryptionprotocols,tamper-
proofhardware,andremotemonitoringcapabilities.Thesefeaturesmakeitmuchmoredifficultforintr
uderstogainaccesstothehome.

Smart door locks also offer homeowners greater control over who has access to their
homes.With traditional lock and key systems, homeowners typically have to give physical keys
toanyonewhoneedsaccesstotheirhomes,includingfamilymembers,housekeepers,andcontractors.
With a smart lock system, homeowners can easily control who has access to
theirhomes,andwhen.Forexample,theycancreatetemporaryaccesscodesforcontractorsorservicepr
oviders,and then revoke those codes once thework is complete.

Smart door locks also provide homeowners with increased visibility into who is coming
andgoing from their homes. Many smart lock systems include built-in cameras or sensors that
candetect when someone enters or exits the home. This information can be sent directly to
thehomeowner'ssmartphone, allowingthemtomonitor theirhome from anywhere.

Finally, smart door locks can be integrated into a larger home automation system,
providingevengreatercontrolandconvenienceforhomeowners.Forexample,asmartlocksystemcan
beconnected to a home security system, allowing homeowners to receive alerts if there is

Page3
SmartDoorLock System 2022-2023
technology and innovative design, these systems offer a range of benefits that traditional
lockand key systems simply cannot match. From increased security and control, to greater
visibilityandintegrationwithotherhomeautomationsystems,smartdoorlocksareavaluableinvestme
ntforany homeowner looking to improve their home security.

Scope

The scope of smart door lock systems is vast and varied, as they offer a wide range of
benefitsandapplications.Smartdoorlocksystemshavethepotentialtotransformthewaywesecureour
homes, offices, and other spaces, and they are increasingly being adopted by
homeowners,businesses,and governmentsaround the world.

Oneofthekeyareasofscopeforsmartdoorlocksystemsisinhomesecurity.Smartlocksystemsprovide
homeowners with an easy-to-use and reliable method of securing their homes, withoutthe need
for physical keys or manual locking mechanisms. With features such as wirelessconnectivity,
biometric sensors, and remote access controls, smart lock systems offer a
higherlevelofcontrolandsecurityoverhomesthantraditionallockandkeymechanisms.Theycanbeus
edtosecurefrontandbackdoors,garagedoors,andeveninteriordoors,providingacomprehensivehom
e security solution.

Another area of scope for smart door lock systems is in the commercial sector. Smart
locksystems can be used to secure offices, retail stores, and other commercial spaces,
providingbusinessownerswithgreatercontroloverwhohasaccesstotheirproperties.Withfeaturessu
chas temporary access codes and remote monitoring capabilities, smart lock systems can be
usedto manage employee access, restrict access to sensitive areas, and monitor activity in real-
time.This can help to reduce the risk of theft, vandalism, and other security threats in
commercialspaces.

Smartdoorlocksystemsalsohavescopeinthehospitalityindustry.Hotelsandotheraccommodation
providers can use smart lock systems to provide guests with a seamless andsecure check-in
experience. Smart locks can be programmed to create temporary access
codesthatexpireafterasetperiodoftime,providingguestswithsecureandconvenientaccesstotheirroo
ms.

Page4
SmartDoorLock System 2022-2023

to monitor room occupancy, manage check-in and check-out times, and provide
enhancedsecurity forguests.

Finally, smart door lock systems have scope in the government and public sector. Smart
locksystemscanbeusedtosecuregovernmentbuildings,schools,andotherpublicspaces,providingen
hanced security for employees and visitors. With features such as remote access controls
andreal-time monitoring, smart lock systems can be used to manage access to sensitive
areas,monitoractivity,andrespondquicklytosecuritythreats.Thiscanhelptoimprovepublicsafetyan
dreduce the risk ofsecurity breaches ingovernment and public sectorspaces.

In conclusion, the scope of smart door lock systems is broad and varied, with applications
inhome security, commercial security, hospitality, and the government and public sector.
Withadvanced technology and innovative design, smart lock systems offer a range of
benefits,including increased convenience, security, and control, making them a valuable
investment forhomeowners,businesses,and governmentsalike.

Page5
SmartDoorLock System 2022-2023

CHAPTER2

LITERATURE SURVEY

DesignandDevelopment ofIOTbasedSmartDoorLockSystem.

Author:NAKANDHRAKUMAR.R.S,RAMKUMARVENKATASAMY,JOSHUVAAR
OCKIADHANRAJ,SARAVINTH,K BALACHANDAR,DHAMODHARAN.N.

Theproposedwithabouttheimportanceofsmartdoorlocksystem,byexplainingabouttheRFIDunloc
kingsystemsothatwecouldavoidtheoldentraditionalwayofunlockingdoorbyusingthekeys.Theyex
plainabouttheadvantageofautomationinunlockingdoorlocksystemwithoutanyneedofmechanicalc
ontact.So,throughthiswegettheideaandneedofsmartdoorlocksystem.Theyalsoexplainthedrawbac
koftraditionallocksystem. So,throughthiswegotthe idea of RFID way of opening the lock.it
really helped to learn and study about the
RFID.Afterthatwecametodiscussonthesecurityofthelockdoorsowecametotheproposedaboutthese
curityofthedoorlocksystem.inthistheydiscussedaboutthepasswordandtheBluetoothwayofsecurit
ysowegotsomebasicunderstandingonkeytypeandsmartphonetypeofopeningthelockwhichalsocre
atedsomesecurities.Throughthiswelearntaboutanotherapplicationofunlockingthatisthekeypadunl
ockthroughthisitalsoaddsupsomesecurities.wecametoknowaboutandroid-
basedunlockingsmartdoorlockthroughthepaperexplainedandgaveideaaboutunlockingdoorlockus
ingsmartphonewithArduinoapplicationwhichgaveusamajorclarity and idea about the IOT
system.it also explained about the Bluetooth and GSM
module.TheWIFImodulewhichhelpedustoeasilyconnectwiththedoorlocksystemanditalsohelped
byoperatingthem,usingtheandroidapplicationwhichisnothingbuttheblinkandstartedtostudyandre
searchabouttheIOTsystemwherewefoundtheauthorswhoarewhoproposedabouttheIOTbaseddoor
enteringsystem,wheretheyexplainedabouttheunlockingofthedoorusingtheremote,whichinitiatedt
heideafor ustoopenthrough
usingsmartphoneasreplacementtoremotewayofdoorunlock.TheywereusedWIFImodulefortheIO
Tbasedunlockingsystem.itwasflexibleandeasytohandleandlearnaboutit.Andstudyaboutthetypeof
lockwhichwegoingtouse.weknowthatitshouldbeanelectriclock,sobystudyingsomeoftheliterature
swecametoknowaboutthesolenoidlockanditsuses.itoperatesundertheelectromagneticforce.

Page6
SmartDoorLock System 2022-2023

IoTEnhancedSmartDoorLockingSystem

Author:MSHANTHINI,G VIDYA,R ARUN.

As per the survey, there exist many such systems to control the door. Each system has a
uniquefeature. The system shown in aims to develop a door security system using an LDR
sensor,Ultrasonic sensor, servo motor, and laser module connected with the Arduino and
Bluetoothapplication. Here, the Bluetooth module controls the door through an application and
theArduino UNO receives and processes data such as the intensity at a particular place and
thedistance from all these sensors continuously. This method focused more on the ultrasonic
andLDRsensor.Oneofthemaindrawbacksofthesystemisthatitdoesnothaveintrusiondetection.In
the study, a smart door lock and lighting system using IoT for the smart home is presented.The
user can control the opening and closing of the door and can also control the lighting
usingtheInternet.OneofthedemeritsisthattherelayisusedtolockorunlockthedoorandtoswitchON/O
FFthelightingbuttherelayusuallyrequiresahighvoltagetooperateandthemotorsalsoneeda higher
voltage andcurrent which cannot begiven fromthe microcontroller.

The main objective of this paper is to enhance the security of the door locking system.
Thehardwareandsoftwarerequirementsfortheproposedsystem.Themobiledevicewillbesendinga
signal via Bluetooth to the Arduino circuit that acts as a connection between the
smartphoneand the servo motor after proper authentication is provided using the database. The
use
ofBluetoothonsmartphonesistoprovideeaseofaccesswithbettersecuritythantheconventionalkey.

ThemainideaofSmartHomeTechnologyistointroducenetworkingdevicesandequipmentinthe
house for better quality living. A smart home allows the entire home to be automated
andtherefore provides comfortable living as well as added benefits for disabled individuals. All
theexisting door locking systems are old-fashioned ways of accessing the system with either
atraditionalkey or somemeans of RFID (Radio-FrequencyIdentification)chips.

This is where the smart door locking system comes to the scene. Security is a primary
concernfor every individual where humans cannot find ways to provide security to their
confidentialbelongings manually. Instead, humans find an alternative solution that provides
reliable andautomized security. This paper describes a security system that can control the

Page7
SmartDoorLock System 2022-2023

MotionSensingandImageCapturingbasedSmartDoorSystemon
AndroidPlatform.

Author:FAIZAMAN,ANITHA.

AdventofIOThasledtomuchadvancementinthefieldofhomeautomation.Manydevicescanbe
controlled by controlled in many ways. One best way that is currently being developed
iscontrolling the devices in home by chatting software. This is as similar to a person is
chattingwithanotherperson.Thelocksystemisalsocontrolledbymobiledevices.Therearemanytype
sof digitals locks available in the market which is more secure. Many of them work on
differenton cryptographic algorithms, digital signatures and so on. One best locking system is a
smartlock with Wi-Fi security. With the increase in issues related to security and safety, the
homeautomationandsmarthomedevicesaregaininglotsofappreciation.Nowadaysadoorisnotjusta
wooden piece or wooden block that can be opened or closed manually to enter or exit, but
inthe current generation a door is technically a medium to let only genuine users to let enter
thehome and keeps intruders away from home and don’t let them enter. Thus, the door
itselfprovidessecurity.

The security is provided by different electronic means such as digital locks, facial
recognizing,and fingerprint scanning and matching, audio/video recognizing, SMS/MMS –
based smartdoors and so on. Real time smart door system which works based on SMS and
audio messagenotification is also widely used. A smart door is also known as Intelligent door
which works onthe basis of digital code, passwords, scanning and recognizing factors such as
fingerprint
scan,eyescanorretinascan.Asmartdoornotjustopensorshutswhenusercommandsbutalsokeepstrac
kofitssurroundingenvironment.Italsodetectsanyforeignbodiesenteringorpassinginitsarea
diameter. Also, a log entry is maintained that saves the entry time interval and many
otherrelatedinformationthatwillbehelpfulinkeepingtrackofthepersonswhovisitthehome.Thus,a
form of registry is created. Programmed automatic entry/exit door control is very
muchcommontoday.

Theyareapartofplaceslikeshoppingstores,grocerystores,airports,shoppingmalls,businessbuilding
s, and transportation stations and so on. The establishment of these doors wipe out

Page8
SmartDoorLock System 2022-2023
theneedofmanuallyorphysicallyopeningandshuttingthedooractivities.Contemporarysensors]
SmartDoorLocking Mechanism

Author:
JANHAVIBAIKERIKAR,VAISHALIKAVATHEKAR,NILESHGHAVATE,R
ONITSAWANT, KHARANSHUMADAN.

The authors have discussed about their home automation system based on WIFI network
whichprovidesfunctionalitiessuchasalarm-
baseddoorlock,mosquitosensing,controllingappliancesremotely and having a smart water tank.
The authors have proposed a system of smart house inwhich the door is unlocked based on the
live feed. In, the authors have proposed a smart doorlock system that functions even if there is
a power failure. In, the authors have designed a
doorlockingmechanismusingZigBeeandRFIDtechnologies.In,theauthorsmakeuseoflocalareanet
work to implement smart door locking functionality. In, the authors have used the
Bluetoothtechnology to establish connection between the visitor’s smart phone and the
hardware toimplementthe door opening feature.

Thisisdesignedkeepingdifferently-
abledpeopleinmind.In,theauthorshavedesignedasmarthomesystemthatallowsthe
ownerstocontrolthedifferentappliancesremotely.Thissystemisdesigned keeping in mind
handicapped people and elderly senior citizens. In, the author hasproposedasysteminwhich
theguestaccessesthepremisesbypressingaswitch
andtheaccessisgrantedbasedonfacerecognitionsystem.In,theauthorshaveusedthenearfieldcommu
nication functionality of the smart phone for access control. The remaining paper goesas
follows. In section III, we describe the system architecture of our system. In section IV,
wediscuss the workingof oursystemandthe snapshotsoftheresults. Thisis
followedbyConclusionin section V and references arelisted thereafter.

As the entire system is based on open-source IoT platform, we have used Node MCU
withESP8266processormicrocontroller.Thisistheintegralpartoftheentiresystem.Itisresponsiblefo
rgeneratingthePinandsendingittothetenantandalsoupdatingthedatabase.Italsohandlesother
system component such as the locking mechanism which consist of Door Lock
Motor(ServoMotor),Keypad(4X3MatrixKeyboard)andLCDDisplay(16x2AlphanumericDisplay

Page9
SmartDoorLock System 2022-2023

InternetofThingsCyberSecurity:SmartDoorLockSystem

Author:MARKOPAVELIĆ,ZVONIMIRLONČARIĆ,MARINVUKOVIĆ,MARIOKUŠE
K.

IoT systems are part of physical environment as well as part of cyber environment.
Comparingtraditional computers and networks to IoT we can find following differences that
influencesecurity. IoT devices are usually microcontrollers that has limited capabilities.
Because of thatstate-of-the-art encryption algorithms cannot be implemented in such devices.
Only the newestversion of microcontrollers has implemented encryption algorithms in
hardware. That hasnegative implications if some defects in algorithms are found then those
devices cannot bepatched with new versions. Manufactures of IoT devices have put the same
default credentialsin devices during production because it is cheaper to manufacture them. The
result was Miraimalware the exploit that to take control of large number of web cameras and
similar devices,createIoT-based botnets and run DDoSattacks.

Now manufacturers create for each device different credentials. IoT devices will can be put
inthe physical space which cannot be secured in every situation. When attacker has
physicalaccess, it could temper the device. Besides physical alteration of device, attacker could
haveaccesstotheprogramminginterface.Thatshouldalsobesecuredbyeitherprovidingcredentialsbe
foreprogrammingorbybrakingfusethatprotectwritingtomemory,soitcannotbeprogrammed again.
Communication protocols between IoT devices need to be light weightprotocols. Older
protocols, because of their simplicity, did not consider implementing securitymechanisms.
When designing IoT systems security in protocols need to be considered from thebeginning of
design. Some devices are powered by batteries and they need to last for
yearswithoutcharging.SuchsystemsarevulnerableonDoSattacksnotjustduringtheattackbutalsoaft
erattackbecauseintensivecommunicationcandrainbatteryandsignificantlyshortenthelifeof such
device.

The use case of door lock, connected to the Internet and with ability to enter or exit room
basedonrights,isusedfordesignandanalysisofcustom-
madesystemsregardingsecurity.SectionIIisdealingwithstate-of-the-
artsecurityproblemsinInternetofThings(IoT).

Page10
SmartDoorLock System 2022-2023

CHAPTER-3

IMPLEMENTATION
Asmartdoorlocksystemisasecuritysolutionthatenablesausertocontrolaccesstotheirhomeor office using
a smartphone or other smart device. The system typically consists of a lock,
acontroller,andamobileapplicationthatcommunicateswiththecontrollertounlockorlock thedoor.In this
article, wewill discusstheimplementation of a smart door lock system.

1. Selecting the hardware components: The first step in implementing a smart door
locksystemistoselectthehardwarecomponentsthatwillbeused.Themaincomponentsarethe
lock and the controller. The lock can be either a traditional deadbolt or a smart
lock.Asmartlockcanbeopenedorclosedusingamobileapplicationorothersmart
devices.Thecontrolleristhedevicethatcommunicateswiththelockandthemobileapplication
.Itcan bea hub thatconnects totheinternet, orit can beintegrated withthe lock itself.
2. Choosing the mobile application: The mobile application is an essential component
ofthe smart door lock system. It enables the user to control the lock from anywhere
usinga smartphone or other smart device. The mobile application should be user-
friendly andeasy to navigate. It should also provide features such as remote access, lock
and unlocknotifications,and accesscontrol.
3. Setting up the controller: The controller is the device that communicates with the
lockand the mobile application. It can be a hub that connects to the internet, or it can
beintegrated with the lock itself. Setting up the controller involves connecting it to
theinternet,configuring it, and pairing itwith thelock.
4. Installingthelock:Thelockcanbeeitheratraditionaldeadboltorasmartlock.Installinga smart
lock is more complicated than installing a traditional deadbolt, as it
requireselectricalwiringandapowersource.Thelockshouldbeinstalledsecurelyandaccordi
ngto themanufacturer'sinstructions.
5. Testing the system: Once the hardware components have been selected, the
mobileapplication has been chosen, and the controller and lock have been installed, the
systemshould be tested. The user should test the lock and the mobile application to
ensure
thattheyareworkingcorrectly.Theusershouldalsotesttheaccesscontrolfeaturestoensurethat
they arefunctioningcorrectly.

Page11
SmartDoorLock System 2022-2023
6. systemrequires maintenance. The user should ensure that the system is updated with the
latestfirmwareandsoftwareupdates.Theusershouldalsoperformregularmaintenancetasks,
suchas changing the batteriesinthe lock and testing the system.
7. In conclusion, implementing a smart door lock system requires careful consideration
ofthe hardware components, the mobile application, and the access control features.
Thesystem should be tested and maintained regularly to ensure that it is working
correctly.Asmartdoorlocksystemisanexcellentsecuritysolutionthatprovidesconveniencea
ndpeaceof mind to the user.

MATCHINGALGORITHM
Matchingalgorithmsaremathematicalmodelsusedincomputerscience,artificialintellig
ence,and
machinelearningtoidentifyandmatchpatterns,features,anddatapoints.Thesealgorithms
arewidel
yusedinvariousindustriesandapplications,includingonlinedating,jobrecruitment,e-
commerce,andrecommendationsystems.Inthisarticle,wewilldiscussmatchingalgorith
ms indetail.

Matching algorithms are used to match two or more data sets or objects based on
specificcriteriaorfeatures.Thealgorithmtakesinputdataandcomparesthemwithareferencedataset
to identify the most similar and relevant matches. These algorithms typically use
statisticaltechniques,machine learning, and artificialintelligenceto analyze andmatchdata.

Matchingalgorithmscanbeclassifiedintodifferenttypesbasedontheirmethodologyandusecases.T
hefollowing are some ofthe mostcommon types of matching algorithms:

Rule-basedalgorithms:Rule-basedalgorithmsusepredefinedrulesandcriteriatomatchdata.These
algorithms are typically used in applications where the matching criteria are well-defined and
known in advance. For example, a rule-based algorithm can be used to match
jobapplicantswith jobrequirements basedon their skills,education,and experience.

Probabilistic algorithms: Probabilistic algorithms use statistical models and techniques


toidentify matches. These algorithms are commonly used in applications where the
matchingcriteriaarecomplexorambiguous.Forexample,aprobabilisticalgorithmcanbeusedinonli
nedatingapplicationstomatchpeoplebasedontheirpreferences,interests,andotherdatapoints.Mac
hine learning algorithms: Machine learning algorithms use artificial intelligence
andmachinelearning techniquesto learnfrom data andidentifymatches.These algorithmsare

Page12
SmartDoorLock System 2022-2023

h relevant products based ontheirbrowsing historyand purchase behavior.

Matching algorithms typically consist of several steps, including data preprocessing,


featureextraction, similarity measurement, and matching. The following are the most
common stepsina matching algorithm:

Data preprocessing: Data preprocessing involves cleaning, transforming, and


standardizinginput data to ensure consistency and accuracy. This step can involve removing
duplicates,correctingerrors, and normalizing data.

Feature extraction: Feature extraction involves identifying and extracting relevant features
ordata points from input data. This step can involve selecting the most important
features,reducingthedimensionality of the data, and encoding categorical data.

Similaritymeasurement:Similaritymeasurementinvolvescomputingthesimilarityordistancebet
weentwoormoredatapointsbasedontheirfeatures.Thisstepcaninvolveusingstatisticalmethods,m
achine learning models,or othertechniquestocalculate the similarityscore.

Matching:Matchinginvolvesidentifyingandselectingthebestmatchesbasedonthesimilarityscore.
This step can involve using a threshold or cutoff value to select the top matches, orrankingthe
matches based on theirsimilarity score.

Matching algorithms can be evaluated based on their performance, accuracy, and


efficiency.Thefollowing aresomeof themostcommon evaluationmetricsformatching
algorithms:

Fig 3.1Matching Algorithm

Page13
SmartDoorLock System 2022-2023
ENCRYPTIONALGORITHM
Encryption is the process of encoding information in such a way that only authorized
partiescan access it. Encryption algorithms are mathematical formulas that transform data
into anunreadable format, known as ciphertext. The ciphertext can only be decrypted and
read bysomeonewho has the appropriate decryption key.

Encryption algorithms are used to protect sensitive information such as passwords,


financialtransactions, and other personal data. There are several types of encryption
algorithms, eachwiththeir own strengths and weaknesses.

 SymmetricEncryptionAlgorithms
Symmetricencryptionalgorithmsusethesamekeytoencryptanddecryptdata.Thesenderand
receiver must both have the key, and it must be kept secure to prevent
unauthorizedaccess.

OnecommonsymmetricencryptionalgorithmistheAdvancedEncryptionStandard(AES).
AES uses a block cipher to encrypt data in fixed-size blocks. The block size
canrangefrom128 bits to 256 bits, with128 bits being the mostcommon.

AnothersymmetricencryptionalgorithmistheDataEncryptionStandard(DES).DESusesa64-
bitblocksizeanda56-
bitkey.WhileDESwasoncewidelyused,itisnowconsideredinsecuredueto its shortkey
length.

 AsymmetricEncryptionAlgorithms
Asymmetricencryptionalgorithmsusetwokeys,oneforencryptionandonefordecryption. The
encryption key is public and can be shared with anyone, while thedecryptionkey is
privateand kept secret.

One widely used asymmetric encryption algorithm is the Rivest-Shamir-Adleman


(RSA)algorithm.RSAusesamathematicalformulabasedonthefactoringoflargeprimenumber
stocreatetheencryptionanddecryptionkeys.RSAiscommonlyusedforsecurecommunication
overthe internet, such as in HTTPSconnections.

Another asymmetric encryption algorithm isthe Elliptic Curve Cryptography


(ECC)algorithm. ECC uses a mathematical formula based on the properties of elliptic
HashingAlgorithms

Page14
SmartDoorLock System 2022-2023
Hashingalgorithmsareusedtocreateauniquedigitalfingerprintofdata.Thehashfunctiontakesa
ninputandcreatesanoutputthatisafixedlength,regardlessofthesizeoftheinput.Theoutput is
known as a hash or message digest.

Hashing algorithms are often used to store passwords securely. Instead of storing
thepassworditself,the hashof thepassword isstored.When auser enterstheir
password,thehash of the entered password is compared to the stored hash. If the hashes
match, thepasswordis considered correct.

One common hashing algorithm is the Secure Hash Algorithm (SHA). SHA has
severalvariants,withSHA-256andSHA-
3beingthemostwidelyused.Anotherhashingalgorithm is the Message Digest Algorithm
(MD), which has several variants, with MD5andSHA-1 being themost widely used.

 Conclusion
Encryptionalgorithmsplayacrucialroleinprotectingsensitiveinformationfromunauthorized
access. Symmetric encryption algorithms use the same key for encryptionand decryption,
while asymmetric encryption algorithms use different keys. Hashingalgorithms create
unique digital fingerprints of data, which can be used for secure storageofpasswords and
othersensitive information.

When choosing an encryption algorithm, it's important to consider factors such as


keylength, computational complexity, and potential vulnerabilities. Implementing a
robustencryptionsystemcanhelpensuretheconfidentialityandintegrityofsensitiveinformatio
n.

AUTHENTICATIONALGORITHM
Authentication algorithms are used to verify the identity of a user or device attempting
toaccessasystemorapplication.Authenticationisacriticalsecuritymeasureusedtopreventunau
thorized access to sensitive information or resources. There are several types
ofauthenticationalgorithms, each withtheirown strengths and weaknesses.

The password is compared to a stored hash of the password to verify its


authenticity.Oneweaknessofpasswordauthenticationisthatpasswordscanbeeasilyforgott

Page15
SmartDoorLock System 2022-2023
enorshared.Passwordscanalsobevulnerabletobrute-
forceattacks,whereanattackertrieseverypossible combinationof charactersuntil
thecorrect passwordis found.

Toimprovethesecurityofpasswordauthentication,systemadministratorscanenforcestron
g password policies, such as requiring long passwords with a mix of uppercaseand
lowercase letters, numbers, and special characters. Two-factor authentication
canalsobeused,whereusersarerequiredtoprovideasecondformofauthentication,suchasa
fingerprint or a one-time codesent to their phone.

 BiometricAuthentication

Biometricauthenticationusesphysicalcharacteristicssuchasfingerprints,facialrecognitio
n,oririsscanstoverifytheidentityofauserordevice.Biometricauthenticationisoftenmorec
onvenientthanpasswordauthenticationsinceusersdon'tneedto remembera password.

One advantage of biometric authentication is that it is difficult to forge.


However,biometric authentication can be vulnerable to attacks such as spoofing,
where anattackercreates a fakefingerprint orfacialimage tobypass the authentication.

To improve the security of biometric authentication, systems can use multi-


factorauthentication, where users are required to provide a second form of
authentication inaddition to their biometric data. Systems can also use liveness
detection, where usersare required to perform a random action, such as blinking, to
prove that they are a livepersonand not a static image.

 PhysicalToken Authentication

Physical token authentication uses a physical device, such as a smart card or


USBtoken, to verify the identity of a user or device. The token contains a unique
identifierthatis usedtoauthenticate the user.

authenticationin additionto theirtoken.


Systems can also use time-based tokens, where the token generates a new code
everyfewseconds, makingit difficultfor an attackertoguess the correct code.

Page16
SmartDoorLock System 2022-2023

 Challenge-ResponseAuthentication

Challenge-responseauthenticationrequirestheusertoprovidearesponsetoachallengefrom
the system.

Thechallengecanbearandomlygeneratednumberoraspecificquestionthatonlytheuser
wouldknow the answer to.

Oneadvantageofchallenge-
responseauthenticationisthatitisdifficultforanattackertoguess thecorrect response
without knowledgeof thechallenge.

However, challenge-response authentication can be vulnerable to social


engineeringattacks,whereanattackertriestotricktheuserintorevealingthechallengeorresp
onse.To improve the security of challenge-response authentication, systems can use
multi-
factorauthentication,whereusersarerequiredtoprovideasecondformofauthenticationin
addition to their response.

Systemscanalsousetime-
basedchallenges,wherethechallengechangesperiodically,makingit more difficultforan
attacker toguess the correctresponse.

 Conclusion

Authentication algorithms are critical security measures used to verify the identity
ofusersor devices attempting to accessa systemorapplication.

Password authentication is the most common type of authentication, but


biometricauthentication, physical token authentication, and challenge-response
authenticationcan alsobeused.

Implementingarobustauthenticationsystemcanhelppreventunauthorizedaccessandprote
ctsensitiveinformation.

Page17
SmartDoorLock System 2022-2023

HARDWAREREQUIREMENTS
Asmart doorlocksystem isamodernsecurity solutionthatoffers
aconvenientandsecurewaytocontrolaccesstoyourhomeoroffice.ItusestechnologysuchasBluetoot
h,Wi-Fi,orZigbeeto communicate with a mobile device or a central control system to provide
access control
toauthorizedusers.Inthisarticle,wewilldiscussthehardwarerequirementsforasmartdoorlocksyste
m.

 Door lock
The door lock is the most critical component of a smart door lock system. It should
bedurable,reliable, andable to withstandthe forcesofdaily use.There are twotypes ofsmart

doorlocks:deadboltlocks and latchlocks.


A deadbolt lock is a type of lock that can only be opened with a key or by turning the
knobfrom the inside. It offers a higher level of security than latch locks but is more
expensive toinstall.

A latch lock, on the other hand, can be opened with a key or a lever from either side of
thedoor.Itis moreaffordable than deadbolt locksbut may offerlesssecurity.

When choosing a door lock, consider its compatibility with the smart lock system and
itsinstallationrequirements.

 Smartlockmechanism
The smart lock mechanism is the component that allows the door lock to communicate
withthe smart lock system. It typically consists of a motor or actuator that moves the
lockingmechanismwhen the lock is activated.

Thesmartlockmechanismcanbeintegratedintothedoorlockoraddedasanaccessory.Themechani
smshouldbecompatiblewiththedoorlockandthesmartlocksystemandshouldbeeasytoinstall and
use.

 Powersupply
Smart door lock systems require a power source to operate. Depending on the system,
thepowersupply can comefrom batteries, a poweroutlet, ora hardwiredconnection.

Page18
SmartDoorLock System 2022-2023
They are more reliable and offer continuous power, but require professional installation
andmaybe more expensive.

 Controlpanel
The control panel is the central hub of the smart door lock system. It allows you to
manageaccesstoyour home oroffice and monitor theactivity of thesmart locksystem.

The control panel can be a mobile device such as a smartphone or tablet, a computer, or
adedicated control panel device. It should be easy to use and provide real-time
notificationsand alerts.

The control panel should also be compatible with the smart lock system and allow you
tocustomizeaccess settings and permissions.

 Communicationtechnology
Smartdoorlocksystemsrelyoncommunicationtechnologytointeractwiththecontrolpaneland
other devices in the system. The most common communication technologies used insmart
locksystems areBluetooth,Wi-Fi,andZigbee.

Bluetooth is a short-range wireless communication technology that is commonly used


insmart lock systems. It is reliable and consumes less power, but requires the control panel
tobein close proximityto the smart lock.

Wi-Fi is a long-range wireless communication technology that offers a wider range


ofconnectivity.It requiresa Wi-Fi network andcan consume more powerthan Bluetooth.

Zigbee is a low-power wireless communication technology that offers a longer range


thanBluetooth and consumes less power than Wi-Fi. It requires a Zigbee hub or gateway
tocommunicatewith the smart lock system.

 Additionalcomponents
Smartdoorlocksystemsmayalsorequireadditionalcomponentssuchassensors,cameras,orkey
fobstoenhance their functionalityand security.

Sensorscandetectwhenthedoorisopenedorclosedandsendalertstothecontrolpanel.Camerascan
provide visualsurveillance and recordactivity in andaround the door.

Keyfobs are smalldevices that can becarriedinapocket orpurse.

Page19
SmartDoorLock System 2022-2023

CHAPTER 4
TYPESOF SMART DOOR LOCKSYSTEM

RFIDBASEDDOORLOCKSYSTEM
An RFID based door lock system is a secure and convenient way to control access to
abuilding or room. RFID stands for Radio Frequency Identification, and it involves the use
ofradio waves to communicate between an RFID reader and an RFID tag. In an RFID
baseddoorlocksystem,theRFIDtagisusedtograntordenyaccesstothedoor.ComponentsofanRFI
Dbased Door Lock System

Thereare fourmain components ofan RFID baseddoor locksystem:

1. RFIDReader:TheRFIDreaderisthedevicethatcommunicateswiththeRFIDtagtodetermi
newhetheraccessshouldbegrantedordenied.Thereaderemitsaradiosignal,whichispicke
dupbytheRFIDtag.Thetagthensendsbackauniqueidentifiertothereader, which the
reader uses to determine whether the tag is authorized to access thedoor.

2. RFID Tag: The RFID tag is a small device that contains a microchip and an
antenna.Themicrochipstoresauniqueidentifier,whichistransmittedtotheRFIDreaderwh
enthe tag is within range. The antenna allows the tag to communicate with the
RFIDreaderviaradio waves.

3. Control Unit: The control unit is the device that controls the locking mechanism
ofthe door. It receives a signal from the RFID reader indicating whether access
shouldbegranted or denied,and it either unlocksor locks thedooraccordingly.

atesthe need forphysical keys, whichcanbe easilylost or stolen.

Page20
SmartDoorLock System 2022-2023

 Convenient Access: RFID based door lock systems allow for quick and
easyaccess to a building or room, as users simply need to present their RFID tag
tothe reader. This eliminates the need for users to carry around keys or
rememberpasswords.

 EasytoManage:RFIDbaseddoorlocksystemsareeasytomanage,asadministrators
can easily add or remove users from the system by programmingordeactivating
RFID tags.

 Audit Trail: RFID based door lock systems can provide an audit trail of
whoaccessedthe door and when, which canbe usefulfor securitypurposes.

Disadvantagesof an RFIDbased Door LockSystem

 Cost:RFIDbaseddoorlocksystemscanbemoreexpensivethantraditionalkey-
basedsystems,as they requirespecializedequipment.

 VulnerabilitytoHacking:RFIDbaseddoorlocksystemscanbevulnerabletohacking, as
the communication between the RFID tag and reader can be
interceptedandclonedbyaskilledattacker.However,encryptionandothersecuritymeasur
escanbeimplemented tomitigate this risk.

 Range Limitations: RFID based door lock systems have a limited range,
typicallyaround 10-15 feet. This means that users need to be in close proximity to
the readerto accessthedoor.

Page21
SmartDoorLock System 2022-2023
 Offices:RFIDbaseddoorlocksystemscanbeusedinofficestocontrolaccesstorestrictedar
eas or to provide secureaccessto thebuilding.

 Hospitals:RFIDbaseddoorlocksystemscanbeusedinhospitalstocontrolaccesstorestricte
dareas, such asoperating rooms or pharmaceuticalstoragerooms.

 Schools:RFIDbaseddoorlocksystemscanbeusedinschoolstocontrolaccesstoclassrooms
or administrative offices.

Fig4.1.1RFID Lock

PINBASEDDOORLOCKSYSTEM
PIN (Personal Identification Number) based door lock system is a secure and
convenientway to control access to a building or room. It involves the use of a
keypad or touchscreen to enter a unique numeric code that grants or denies access to
the door. In aPINbaseddoor locksystem, thePIN servesasthe primarymeans
ofauthentication.

Page22
SmartDoorLock System 2022-2023
Thereare threemain componentsofa PINbaseddoorlock system:

 Keypad or Touch Screen: The keypad or touch screen is the device used to
enterthe PIN. The keypad may have physical buttons or be touch-sensitive, and
thetouch screen may display a virtual keypad or use biometric recognition to
detectfingerprintsor other unique physicaltraits.

 Control Unit: The control unit is the device that controls the locking
mechanismofthedoor.Itreceivesasignalfromthekeypadindicatingwhetheraccesssh
ould

Page23
SmartDoorLock System 2022-2023
.

 Power Supply: The power supply provides power to the keypad, control unit,
andlockingmechanism.

Advantagesof a PIN Based Door LockSystem

 Improved Security: A PIN based door lock system provides a high level
ofsecurity, as only individuals with the correct PIN can access the door.
Thiseliminatesthe need forphysical keys, whichcanbe easilylost or stolen.

 ConvenientAccess:PINbaseddoorlocksystemsallowforquickandeasyaccessto a
building or room, as users simply need to enter their PIN on the keypad
ortouchscreen.Thiseliminatestheneedforuserstocarryaroundkeysorrememberpass
words.

 EasytoManage:PINbaseddoorlocksystemsareeasytomanage,asadministrators can
easily add or remove users from the system by programmingordeactivating PINs.

 Audit Trail: PIN based door lock systems can provide an audit trail of
whoaccessedthe door and when, which canbe usefulfor securitypurposes.

Disadvantagesof a PINBased Door LockSystem

 Vulnerability to Guessing: PIN based door lock systems can be vulnerable


toguessing,asanattackermaybeabletoguessauser'sPINbasedon
theirpersonalinformation or common patterns. This risk can be mitigated by

Page24
SmartDoorLock System 2022-2023
enforcing strongPINrequirementsandimplementing securitymeasuressuchas
lockoutpolicies.

 Vulnerability to Skimming: PIN based door lock systems can be vulnerable


toskimming, where an attacker may use a camera or other device to record a
userentering their PIN. This risk can be mitigated by implementing security
measuressuchas privacy screensor multi-factor authentication.

Page25
SmartDoorLock System 2022-2023
 Maintenance: PIN based door lock systems may require regular maintenance
toensure that the keypad or touch screen is functioning properly and that the
PINsare being properlymanaged.

Applicationsof a PIN Based Door LockSystem

 Residential Buildings: PIN based door lock systems can be used in


residentialbuildingstoprovidesecure accesstoindividual apartmentsor
commonareas.

 Offices: PIN based door lock systems can be used in offices to control access
torestrictedareas or to provide secure accesstothebuilding.

 Retail Stores: PIN based door lock systems can be used in retail stores to
controlaccessto stock rooms orother secureareas.

 Schools: PIN based door lock systems can be used in schools to control access
toclassroomsor administrative offices.

Fig4.2.1 PIN

Page26
SmartDoorLock System 2022-2023
A fingerprint-based door lock system is a secure and convenient way to control access to
abuilding or room. It involves the use of biometric technology to scan and match a
user'sfingerprint, which serves as the primary means of authentication. In a fingerprint-
based doorlocksystem,the user's uniquephysical trait serves asthe keyto unlockthe door.

Thereare threemain componentsofafingerprint-based doorlock system:

 Fingerprint Scanner: The fingerprint scanner is the device used to capture and
scantheuser'sfingerprint.Itmayuseoptical,capacitive,orultrasonictechnologytodetectan
dmatch the unique patterns and ridges ontheuser's fingertip.

 Control Unit: The control unit is the device that controls the locking mechanism
ofthe door. It receives a signal from the fingerprint scanner indicating whether
accessshouldbe grantedor denied, andit eitherunlocks or locksthe dooraccordingly.

 PowerSupply:Thepowersupplyprovidespowertothefingerprintscanner,controlunit,a
ndlocking mechanism.

Advantagesof aFingerprint Based DoorLock System

 HighSecurity:Afingerprint-
baseddoorlocksystemprovidesahighlevelofsecurity,astheuser'sfingerprintservesasaun
iqueanddifficult-to-replicatemeansofauthentication. It eliminates the need for
physical keys or PINs, which can be lost,stolen, orguessed.

 Convenient Access: Fingerprint based door lock systems allow for quick and
easyaccess to a building or room, as users simply need to scan their fingerprint on
thescanner.Thiseliminatestheneedforuserstocarryaroundkeysorrememberpasswords.

Page27
SmartDoorLock System 2022-2023

 Audit Trail: Fingerprint based door lock systems can provide an audit trail of
whoaccessedthe door and when, which can be usefulfor securitypurposes.

Disadvantagesofa FingerprintBased DoorLock System

 Vulnerability to Spoofing: Fingerprint based door lock systems can be vulnerable


tospoofing, where an attacker may be able to replicate the user's fingerprint using
avariety of methods. This risk can be mitigated by implementing security
measuressuchas multi-factor authentication or anti-spoofingtechnology.

 Maintenance: Fingerprint based door lock systems may require regular


maintenanceto ensure that the fingerprint scanner is functioning properly and that
the fingerprintsarebeing properlymanaged.

 Cost:Fingerprintbaseddoorlocksystemsmaybemoreexpensivethanothertypesofdoor
lock systems, due to the cost of the biometric technology and the complexity ofthe
system.

Fig3.3.1 Fingerprint

Page28
SmartDoorLock System 2022-2023

CHAPTER5

RESULT

Asmartdoorlocksystemisasophisticatedandsecuremeansofcontrollingaccesstoabuildingor room.
It provides a high level of convenience, security, and control to both individuals
andorganizations. In this section, we will discuss the results of implementing a smart door
locksystem.

Oneoftheprimarybenefitsofasmartdoorlocksystemistheincreasedsecurityitprovides.Byeliminati
ng the need for physical keys or PINs, the system reduces the risk of unauthorizedaccess, theft,
and other security breaches. The use of advanced encryption algorithms
andauthenticationmechanisms,suchasbiometricscanning,ensuresthatonlyauthorizedindividualsc
an gain access to the building or room. This enhances the safety of occupants and
theirbelongings.

Smartdoorlocksystemsprovideahighlevelofconvenienceandflexibilitytousers.Individualscan
access the building or room using a variety of means, including PINs, biometric scanning,or
RFID cards. This eliminates the need for carrying physical keys or remembering
complexpasswords. The system can also be programmed to allow temporary access for visitors
orcontractors,makingit easierto manage and control access.

Smart door lock systems enable organizations to monitor and control access to their
buildingsor rooms more effectively. The system can be programmed to provide real-time
notificationswhen someone enters or exits the building, allowing for enhanced security and
oversight.
Thesystemcanalsobeusedtotrackwhohasaccessedthebuildingorroom,whentheyentered,andhowl
ong they stayed. This canbe usefulfor auditing,compliance,and security purposes.

A smart door lock system can be a cost-effective solution for organizations looking to
enhancetheir security measures. The system can eliminate the need for physical keys, which
can beexpensive to replace if lost or stolen. It can also reduce the cost of managing access
byautomating the process of adding or removing users from the system. Additionally, the
systemcanreduce the risk of securitybreaches, which can be costlytoremediate.

Page29
SmartDoorLock System 2022-2023

While smart door lock systems offer many benefits, there are also challenges and limitations
toconsider. The initial cost of implementing the system can be high, which may deter
someorganizationsfromadoptingit.Thesystemalsorequiresregularmaintenancetoensurethatitisfu
nctioningproperly,whichcanbetime-
consumingandcostly.Thesystemmayalsobevulnerabletohacking orothersecurity
threats,whichcan compromisethesafety ofoccupants.

Page30
SmartDoorLock System 2022-2023

CHAPTER6

APPLICATIONS

Smart door lock systems have a wide range of applications in both residential and
commercialsettings.Here are some of the most common applications:

Residential Homes - Smart door lock systems are becoming increasingly popular in
residentialhomes. They provide enhanced security and convenience to homeowners by
allowing them
tocontrolaccesstotheirhomesremotely.Homeownerscanusetheirsmartphonesorotherdevicestoloc
kandunlocktheirdoors,monitorwhoisenteringorleavingtheirhomes,andreceivereal-timealertsif
someonetries to entertheir homewithoutauthorization.

Apartments and Condominiums - Smart door lock systems are also useful in apartment
andcondominium complexes. They can be used to control access to common areas, such as
thelobby,gym,orpoolarea.Propertymanagerscanusethesystemtoissuetemporaryaccesscodestoco
ntractorsor serviceproviders, andto monitorwho isaccessing thebuildingandwhen.

Offices and Commercial Buildings - Smart door lock systems are ideal for use in offices
andcommercial buildings. They provide enhanced security and control over who can enter
thebuilding or specific rooms within the building. They can also be used to monitor
employeeattendance, track who is accessing sensitive areas, and provide temporary access to
visitors orcontractors.

HospitalsandMedicalCenters-
Smartdoorlocksystemsarealsousefulinhospitalsandmedicalcenters. They can be used to control
access to patient rooms, medical supply rooms, and othersensitive areas. They can also be used
to monitor who is entering and leaving the building, andtotrack the movements of patientsand
staff.

Schools and Universities - Smart door lock systems are becoming increasingly popular
inschools and universities. They provide enhanced security by allowing administrators to
controlwhocanenterthebuildingorspecificareaswithinthebuilding.

Page31
CONCLUSION
Inconclusion,smartdoorlocksystemsofferasignificantupgradetotraditionallockandkeysystems
by providing enhanced security, convenience, and control over access to
buildingsandroomswithinbuildings.Theuseofadvancedtechnologiessuchasbiometricauthentic
ation,RFID,andencryptionalgorithmsensuresthatonlyauthorizedindividualsaregrantedaccess
to specific areas.

The implementation of a smart door lock system offers a wide range of benefits for
bothresidential and commercial applications. Homeowners can remotely control access to
theirhomes, monitor who is entering and leaving their homes, and receive real-time alerts
ifsomeone tries to enter their home without authorization. Commercial applications
includecontrolling access to sensitive areas, tracking attendance, and providing temporary
access tovisitorsor contractors.

Smartdoorlocksystemsarealsohighlycustomizable,allowingthemtobetailoredtospecificneeds
and preferences. For example, some systems offer a variety of access control options,such
as PIN codes, fingerprint recognition, or RFID cards. They can also be integrated withother
smart home or building automation systems, such as security cameras, thermostats,
orlightingcontrol systems.

However,itisimportanttonotethatnosecuritysystemisfoolproof.Smartdoorlocksystemsare
vulnerable to hacking and other cyber-attacks, which could compromise the security ofthe
building or room being protected. Therefore, it is crucial to ensure that the system
isproperlyinstalledandconfiguredbyaprofessional,andthatregularmaintenanceandupdatesarep
erformed to ensurethatthe system remainssecure.

Overall, smart door lock systems provide an advanced and secure solution to traditional
lockandkeysystems.Theireaseofuse,enhancedsecurity,andcustomizationoptionsmaketheman
attractiveoptionforresidential,commercial,andinstitutionalapplications.Astechnologycontinu
estoevolve,wecanexpecttoseeevenmoreadvancedsmartdoorlocksystemsbeingdeveloped,
offering even greater security and control over access to buildings and
roomswithinbuildings.
REFERENCES
1. Arshad, B.; Ogie, R.; Barthelemy, J.; Pradhan, B.; Verstaevel, N.; Perez, P. Computer
Visionand IoT-Based Sensors in Flood Monitoring and Mapping: A Systematic Review.
Sensors2019,19,5012.[CrossRef][PubMed]
2. Mitra, A.; Biswas, S.; Adhikari, T.; Ghosh, A.; De, S.; Karmakar, R. Emergence of
EdgeComputing:AnAdvancementoverCloudandFog.InProceedingsofthe202011thInternational
ConferenceonComputing,CommunicationandNetworkingTechnologies(ICCCNT),Kharagpur,
India,1–3July2020; pp.1–7.[CrossRef]
3. Baller,S.P.;Jindal,A.;Chadha, M.;Gerndt,M.DeepEdgeBench:
BenchmarkingDeepNeuralNetworks on Edge Devices. In Proceedings of the 2021 IEEE
International Conference onCloudEngineering(IC2E),SanFrancisco, CA,USA, 4–8October
2021;pp.20–30.
4. Hajder, P.; Rauch, Ł. Moving Multiscale Modelling to the Edge: Benchmarking and
LoadOptimization for Cellular Automata on Low Power Microcomputers. Processes 2021, 9,
2225.[CrossRef]
5. Yu, W.; Liang, F.; He, X.; Hatcher, W.G.; Lu, C.; Lin, J.; Yang, X. A survey on the
edgecomputingfortheInternetofThings.IEEE Access2017,6,6900–6919.[CrossRef]
6. J.; Armitage, G.; Branch, P. A Survey of Rate Adaptation Techniques for DynamicKua,
AdaptiveStreamingOverHTTP.IEEECommun.Surv.Tutorials2017,19,1842–1866.[CrossRef]
7. Kua, J.; Loke, S.W.; Arora, C.; Fernando, N.; Ranaweera, C. Internet of things in space:
Areview of opportunities and challenges from satellite-aided computing to digitally-
enhancedspaceliving. Sensors2021,21,8117.[CrossRef]
8. Leduc, P.; Ashmore, P.; Sjogren, D. Technical note: Stage and water width measurement of
amountainstreamusingasimpletime-lapsecamera.Hydrol.Earth Syst.Sci.2018.
9. [CrossRef] 11. Kua, J.; Armitage, G.; Branch, P.; However, J. Adaptive Chunklets and
AQMforHigher-
PerformanceContentStreaming.ACMTrans.Multimed.Comput.Commun.Appl.2019,15,1–
24.[CrossRef]

You might also like