You are on page 1of 14

FEDERAL TVET INSTITUTE WOLKITE

SATELLITE CAMPUS
DEPARTMENT OF INFORMATION TECHNOLOGY

Proposal Title: password based door lock system

Name of Students ID Number


1. BIZUNH GETU ETUBSR/1175
2. GEZU DABA ETUBSR/1198
3. ZINABU SEGOYE ETUBSR/1189

Submitted to
Mr. Tesefaye Y

April, 2024

Wolkite, Ethiopa.
Declaration
We declare that this project is our original work and has not been submitted earlier either to this or any
other universities, and all sources of materials used for the project have been fully acknowledged.
Whenever we use materials from other sources, we have given due credit to them by citing them in the
references. We understand that copyright in our semester project is transferred to the department of

information technology in federal TVET institute wolkite Satellite campus.

Name of Student Signature ID NO

BIZUNH GETU ___________ ________

GEZU DABA ___________ ________

ZINABU SEGOYE ___________ ________

Advisor Approval This semester project has been submitted for examination with my approval as a institute
advisor.

Name of Advisor Signature Date


Mr. TESEFAY Y. ___________ __________
ACKNOWLEDGMENT
First, we would like to thank God Almighty for the provision, knowledge, strength, ability and
opportunity to undertake this project study and to complete it satisfactorily. Without His blessings, this
achievement would not have been possible. We are extremely grateful to the department of information
technology, for giving us the opportunity to carry out this project, which is an integral part of the
curriculum in BSC. We would like to express our earnest gratitude and regards to our semester project
advisor Mr tesefay y, department of information technology, for his supervision and support in making
this. It was his continuous encouragement, invaluable supervision, and guidance during the period of
doubts and uncertainties. We would also like to use this opportunity to thank our lecturers in the
information technology department for a good job done in imparting a great deal of knowledge in us.
Without them, we would not be the person we are today. Our parents deserve endless thanks for their
investment, advice, patience, support and contribution to the success of this work. The education we have
is thanks to them. Finally, we would like to thank our friends who helped us finalize this semester project
within the limited period.
Abstract
The need of safety can be achieved by making locks which can be electrical or mechanical with one or a
few keys, but for locking a big area many locks are required. As everyone knows old fashioned locks are
heavy weight and fragile also depending on the tools therefore electronic locks are given more value than
those of mechanical locks. Nowadays every device’s operation is based on digital technology. For
example, technology based identity devices are used for automatic door unlocking or locking. These
locking systems are used to control the movement of door and are functional without requiring a key to
lock or unlock the door. These locking systems are controlled by a keypad and are installed at the side
hedge of the door. The main objective of this project is to give safety at every common places like home,
public places. In this user would give a known password. The information will be stored in database.
When the correct passcode will be entered, the microcontroller will give instruction to servo motor.
Servo motor will perform the action on door unlocking. Thus, what we want is digital technology to
construct an integrated and well customized safety system at a price which is reasonable.
Keywords: Arduino Uno, 4*4 Keypad, Distance Ultrasonic Sensor, 16*2 LCD, Buzzer, Servo Motor
Contents
Declaration........................................................................................................................................I
ACKNOWLEDGMENT.................................................................................................................II
Abstract..........................................................................................................................................III
1.1 INTRODUCTION.....................................................................................................................1
1.2 BACKGROUND OF THE STUDY..........................................................................................2
1.3 Statement of the problem............................................................................................................I
1.4 Objectives of the study...............................................................................................................I
Aim..............................................................................................................................................II
1.5 Scopes of the Study...................................................................................................................II
1.6 Limitation of project..................................................................................................................II
1.7 Methodologies of the study......................................................................................................III
1.7. 1 Tools................................................................................................................................III
1.7.1. 1 hard ware tools..........................................................................................................III
1.7.1.2 Software tools............................................................................................................III
1.8 Project Design and Overview..................................................................................................IV
1.9 Significant of the Project.........................................................................................................IV
1.10 Work Plan [Time Table]........................................................................................................IV
1.13. Work Plan [Time Table]...................................................................................................IV
1.12 Team composition...................................................................................................................V
1.11 Budget and Resource..............................................................................................................V
Table Cost Estimation....................................................................................................................VI
Acronym and Abbreviation...........................................................................................................VI
REFERENCES.............................................................................................................................VII
1. INTRODUCTION

1.1 INTRODUCTION
Password Based Door Lock System is designed using ARDUINO UNO where in once the
correct code or password is entered, the door is opened and the concerned person is allowed
access to the secured area. Password Based Door Lock System using Arduino UNO is a simple
project where a secure password will act as a door unlocking system. Old fashioned lock systems
use mechanical locking and these can be replaced by new advanced techniques of locking
systems. These methods are a combination of mechanical and electronic devices and are highly
intelligent. One of the distinct features of these intelligent lock systems is their simplicity and
high efficiency. Such an automated lock system consists of electronic control assembly, which
controls the output load through a password. The example of this output load can be a motor or a
lamp or any other mechanical/electrical load. Here, we made an electronic code lock system
using Arduino UNO, which provides control to the actuating the load. It is a simple embedded
system with takes input from the keyboard and the output being actuated accordingly. This
system demonstrates a Password based Door Lock System using Arduino UNO, wherein once
the correct code or password is entered, the door is opened and the concerned person is allowed
access to the secured area. If another person arrives, it will ask to enter the password again. If the
password is wrong, then door would remain locked, denying access to the person. Main idea
behind this project is of a door-latch opening using a password entered through keypad. As well
as turning on the Buzzer when passcode is entered wrong for multiple times. User can modify
this password anytime he/she wishes using a keypad. The main component in the circuit is
Arduino UNO which is basically used to send a text message to owner of the house about the
breach of security.4*4 keypad is used to enter the password. The entered password is compared
with the known password. If it is correct password, the system opens the door by servo motor
and displays the status of door on LCD. If the password is wrong then door remains closed and
displays “WRONG PASSWORD” on LCD.

1.2 BACKGROUND OF THE STUDY


Over the years, various control systems have been designed to prevent access to an unauthorized user.
The main reason for providing locks for our buildings (home, office, church and school) is for security of
our lives and property. It is therefore important to have a stress free and convenient means of achieving
this purpose. In order to save the belongings most of the people employed
watch dogs and security personnel. They both did well for some time. But both of them can be easily
deceived. If properly planned, the burglars could easily deceive a watchman and could even kill him. A
single watchman can't fight against 3 or 4 burglars. Even the watchdogs can be made unconscious with
the help of chloroform.

As everyone knows old fashioned locks are heavy weight and fragile also depending on the tools
therefore electronic locks are given more value than those of mechanical locks. These failures paved way
for the development of intelligent door security systems, which have promised perfect protection of the
assets and life. Nowadays every device’s operation is based on digital technology. For example,
technology based identity devices are used for automatic door unlocking or locking. These locking
systems are used to control the movement of door and are functional without requiring a key to lock or
unlock the door. These locking systems are controlled by a keypad and are installed at the side edge of
the door. The main objective of this project is to give safety at every common place like home, public
places. The solutions currently available in the market are satisfactory but high security solutions come at
an expensive price. Hence an economically feasible security system has become the need of the hour.

1.3 Statement of the problem


This RFID DOOR LOCK ACCESS CONTROL can solve many problems. One of them is to be able to
save time, when using a key and the movement will be slower and waste a lot of time to open the lock or
handle, in terms of security it will be more guaranteed because when robbers or looters want to commit a
crime, security will be more guaranteed because the door can open faster and faster to enter the door.

1.4 Objectives of the study


RFID locker locks offer convenient installation, as the tag card is easy to use and more convenient to
carry around compared to keys. RFID locker lock keycards can be carried in your wallet or clipped to
your shirt. Unlike magnetic stripe cards, the RFID keycards do not need to make physical contact with the
locker locks. One only has to come close enough to the reader to trigger the system and unlock the door.
This feature is quite useful, especially when a person is carrying a number of boxes or luggage. While
magnetic stripe locks can only be opened by using a key card, RFID locker locks can be opened not only
by a card but also through mobiles. As the RFID uses wireless technology to trigger the lock system,
Bluetooth Low Energy (BLE) technology can also be used to access the locks. Therefore, if you find
carrying a key card cumbersome, you can register your smartphone as the key and open RFID locker
locks easily using your phone. Many organizations these days install RFID locker locks and RFID Mobile
Access Locks to ensure enhanced safety and security of the employees and the establishment as a whole.
Keys might often be misplaced or lost by individuals. Keycards are less likely to of getting lost, damaged,
or stolen. Even if a person loses a keycard, it is much easier, cheaper, and faster to create a new one than
replacing a lost key. Moreover, RFID locks with mobile access can be opened by a smartphone,
eliminating the need for a key card as well.

Aim
The research seeks to design and implement password based locking system. The application will
integrate a power supply, an arduino uno, a distance ultrasonic sensor, LCD, buzzer, servo motor, 4*4
keypad and a camera to capture pictures of the visitors as evidence that would be needed if any unwanted
situation occurs like stealing, and robbery.

1.5 Scopes of the Study


House breaking has consistently been the most common crime experienced by households, banks and
institutions in ETHIOPIA. Nowadays it is most important to keep our valuable things safe. The world is
also growing digitally dependent, and we can even design the doors to be more secure. The aim of this
project is to come out with a password based door lock system which is more secure than traditional lock
system. It will be more efficient for the peoples in the field of security. It will be implemented in any
places like our Houses, Institutions, Banks and any Public Places.
1. This Project is focusing safety door lock
2. The emphasis is to those who are always careless
3. The main controller is using ARDUINO UNO

1.6 Limitation of project

 Vulnerability to Password Theft: Passwords can be vulnerable to theft or hacking,


especially if they are not changed regularly or are easily guessed. It is crucial to choose
strong, unique passwords and change them frequently to mitigate this risk.

 Susceptibility to Shoulder Surfing: There is a risk of unauthorized individuals observing


the password being entered from a close distance, known as shoulder surfing. This can
compromise the security of the system and allow unauthorized access.

 Potential for System Malfunctions: As with any electronic system, there is a possibility of
malfunctions or technical issues that may impede the functionality of the password-based
door lock system. Regular maintenance and testing are essential to address and prevent
such issues.

1.7 Methodologies of the study


Methodology refers to the practical "how" of any given piece of research. It is largely concerned with
how a researcher designs a study in order to obtain accurate and reliable data that address the research
aims and objectives. A comprehensive approach is being taken to realize this project as a ready-to-use
device with safety features. To ensure that the Project is completed on time, a step-by-step approach is
used

1.7. 1 Tools
1.7.1. 1 hard ware tools
 Arduino Nano
 Arduino Nano cable
 LED
 220-ohm Resistor
 5V Relay
 Solenoid lock
 Zero PCB
 Soldering Iron
 Soldering Wire
 Hookup wire
 16×2 LCD
 Breadboard
 Jumper Wire

1.7.1.2 Software tools


 Ardunio uno
 Proteus pro 8

1.8 Project Design and Overview


The designed controller, as mentioned in the previous chapter, employs a closed loop system using
Arduino as the primary controller. The controller circuit is designed using Arduino with components such
as wire jumper cable, adapter, RFID reader, and relay 2 channel, which is then realized using Proteus
Software and converted to PCB circuit.

3.3Block Diagram of the Project


1.9 Significant of the Project
As we all are facing the fear of robbery, people cannot keep their valuable things safely even at their own
houses, banks or in any other places. They are always in fear of losing their valuable things. Old
traditional locking system is not that safe as password based door locking system. So this project
provides much more lock security as compared to traditional lock security. The old traditional lock
system has been replaced with password. This project will provide efficient security to the users at low
cost. It will be also easy to implement and give safety in any places like our houses, institutions, banks or
any other public places. If the users forget the password, then they will have to change or reset the
password, which gives the more flexibility to the users.

1.10 Work Plan [Time Table]


1.13. Work Plan [Time Table]

Table 1: Work plan time table


Weeks
Activities 1-3 4-6 7-9 10-12 13-14 15-20 21-23
Choosing title
Proposal
preparation

Requirement
Specification

Analysis
Implementatio
n
Design
Testing

1.12 Team composition

Password based door lock system

No NAME ID No E-Mail Responsibility

1. BIZUNEH GETU ETU/BSR bizuneh12getu@gmail.com Designing, implementing, monitoring


/1175/13

2. GEZU DABA ETU/BSR/ Gezudaba12@gmail.com Requirement gathering, designing


1189/13

3. ZINABU SEGOYE ETU/BSR/ Zinabu7263@gmail.com Implementing,


requirement gathering
1198/13

4. Implementing,
testing, maintenance

Instructor TESEFAY Y.

1.11 Budget and Resource


Cost Estimation

Item Quantity Price per Total Item


Item
Arduino Nano 2000
Arduino Nano cable 250
LED 500
220-ohm Resistor 150
Solenoid lock 150
Zero PCB 300
Soldering Iron 300
Soldering Wire 100
Hookup wire 100
5V Relay 200
Jumper Wire 150
Breadboard 900
16×2 LCD 500
Total 5600 birr

Table Cost Estimation

Acronym and Abbreviation


TVET= Technical and vocational

LCD

RDLAC = RFID DOOR LOCK ACCESS CONTROL

BLE = Bluetooth Low Energy

REFERENCES
1. Goswami, S., Choudhury, A., Das, S., Banerjee, T., & Ghosh, S. (2017). Automated password
protected door lock system. Advances in Industrial Engineering and Management, 6(1), 48-52.
2. San Hlaing, N. N., & San Lwin, S. (2019). Electronic Door Lock using RFID and Password
Based on Arduino. International Journal of Trend in Scientific Research and Development, 3(2),
799802.
3. Motwani, Y., Seth, S., Dixit, D., Bagubali, A., & Rajesh, R. (2021). Multifactor door locking
systems: A review. Materials Today:
Proceedings, 46, 7973-7979.
4. Rahman, M. M., Ali, M. S., & Akther, M. S. (2018). Password Protected Electronic Lock
System for Smart Home Security. International
Journal of Engineering Research and

Technology, 7(4), 541-544.


5. Rane, C. (2015). Password Based Door Locking System Using GSM. International Journal of
Engineering Trends and Applications
(IJETA), 2(4), 48-53.

1. Ray, I. (2022) Password based door lock system.


International Research Journal of Modernization in Engineering Technology and Science, 4(5),
2405-2413.
2. Sia, B. J., Wong, W. K., & Min, T. S. (2022, April). Voice Activated Storage Locker for
Visually Impaired. In 2022 6th International
Conference on Trends in Electronics and

Informatics (ICOEI) (pp. 442-447). IEEE.


3. Vadakkan, A., Babu, A. V. K., Pappachan, C. and Sunny, A. (2021) Door locking using keypad
and ARDUINO. International Research Journal of Modernization in Engineering Technology
and Science, 3(11), 780-787.
4. Vamsi, T.K., Sai, K.C., & Vijayalakshmi, M. (2019). Face recognition based door unlocking
system using Raspberry Pi. International Journal of Advance Research, Ideas and Innovations in
Technology, 5(2), 1320-1324.

You might also like