2019 IoT and Wi Fi Based Door Access Control System Using Mobile Application
2019 IoT and Wi Fi Based Door Access Control System Using Mobile Application
2019 IoT and Wi Fi Based Door Access Control System Using Mobile Application
1RYHPEHU'HFHPEHU'KDND%DQJODGHVK
Abstract—With the advent of technology, it is hard to find such IoT-based [2] door access system has been evolved from
such field where technology has not appeared. One of the most there. The Wi-Fi and cloud based door access system will
citable area where technology is applied is security. Door access ensure that only the authorized user can access the door. We
system is one of the major concern of home security. It has been
enhanced with the days using different techniques such as, mobile also get encouraged from the fact that, the android app based
application, real-time authentication system (e.g. audio and video door lock system is available everywhere, however, the access
processing), Bluetooth and other technological inventions. Later, techniques completely depend only on the app which is a
Internet of Things (IoT) has been introduced to this field as drawback because it can cause system vulnerability. So, The
well. This paper illustrates, an IoT and Wi-Fi based door access motivation of our project is to overcome these drawbacks and
control system, where a user can control the access to the door
using his phone remotely within the coverage area provided create an efficient system that is safe and secured.
by the wireless Access-Point that is situated inside the home. In this research, we propose a door access system which
This system takes advantage of Biometric feature of the Android is activated on Wi-Fi [3] TCP/IP communication and is to
phone which is used to validate authorized user and a cloud based be operated using only a mobile application that will take the
server as the medium of user verification. The strong point of
biometric feature of the user and then perform another authen-
our system is multiple layered automated security system where
authentication is performed on both ends (mobile application and tication process beyond the user’s perception, using mobile
door access controller) beyond user’s perception which prohibits specific IMEI number by comparing it with the registered one
unauthorized access or manipulation. We have used Raspberry stored on the cloud server to make sure that only registered
Pi as the door access controller and other state-of-the art devices phone is using as a key.
to create testbed of the system and verified its use in practical
environment.
This paper conveys the details of related works done in
Index Terms—Internet of Things (IoT), Android, Door access this field in section II. In section III, the system architecture
system, Biometric feature. has been depicted with adequate diagrams. Section IV and V
contains the system security and the system implementation
I. I NTRODUCTION and evaluation respectively. Section VI concludes this paper
The security has always been a matter of concern since the with some future works.
dawn of the evolution of community. The origin of door lock
[1] can be traced back as far as 4000 B.C., in Egypt,Greece II. R ELATED W ORKS
and Iraq. These locks shared the same basic principle of pin
Many door access control based researches can be found
locks today where pins of varying length prevented access
in literature. However, none of them has presented similar
to the door unless the matching key was inserted to line up
advanced features as our proposed system.
the pins and access the door. Then, all the door access system
In [4], Kamelia et al. has proposed a Bluetooth based
were provided with traditional deadlock system where a person
automation system .The system has been designed to simulate
needed to keep his keys with himself all the time when he/she
a Bluetooth controlled electronic key, which is controlled by
is not at home. This traditional system often leads to the
a smart phone.
situation of losing keys and breaking the door to access as
a consequence. Moreover, carrying keys all the time is not a In [5], Britto et al. has given proposal on a Sixth Sense
safe enough. This is when the technology arrived to ease the Door using Internet of Things. They have provided the concept
door access system. of sensing movement in front door. An attached camera will
Security for home appliances has become a challenge capture image of the person after a motion sensation. The
in these present days. Even though lot of techniques and image will be transmitted to the owner’s phone which will
measures exist to provide security over them, there are still appear as a push notification.
questions on ease of their uses. The motivation for developing In [6], Sarika et al. has proposed a smart login system using
biometrics. The system is motivated to use fingerprint scanner
to unlock the door.
,(((
Authorized licensed use limited to: Auckland University of Technology. Downloaded on May 23,2020 at 22:55:34 UTC from IEEE Xplore. Restrictions apply.
In [7], Burns et al. has proposed a RFID controlled door
lock . where the door lock is controlled with an exterior RFID
card input.
In [8], Pang et al. has patented on Bluetooth and Biometric
feature based Access Control System. They have proposed that
the door will be unlocked using the biometric features as an
authentication media and setting a Bluetooth communication
link between app and the controller.
In [9], Kassem et al. has proposed a smart door lock pro-
viding security via WiFi . The system has been implemented
by generating digital keys on user’s phone which is used as
the authentication method for validating the legitimate user’s
identity.
In [10], Hadis et al. has proposed a smart door lock system
using IoT where the door will be unlocked automatically if
the user’s phone has reached within the Bluetooth range.
In [11], Thakur et al. has proposed a door lock system which
is controlled using biometric or facial recognition via mobile
application using WiFi or Bluetooth as the communication
link.
III. S YSTEM A RCHITECTURE Fig. 1. System Architecture
Authorized licensed use limited to: Auckland University of Technology. Downloaded on May 23,2020 at 22:55:34 UTC from IEEE Xplore. Restrictions apply.
TABLE I TABLE II
S TEPS OF SYSTEM OPERATION D ETAILS OF R EQUIRED S OFTWARE
Authorized licensed use limited to: Auckland University of Technology. Downloaded on May 23,2020 at 22:55:34 UTC from IEEE Xplore. Restrictions apply.
TABLE III Fi communication to conduct all form of communication and
D ETAILS OF H ARDWARE signal passing.
Device Name Specification
Door Access Controller Raspberry Pi 3 Model B
VI. C ONCLUSION
Keypad 4X4 Matrix keypad In this paper, we have introduced a robust and secured sys-
Door Lock 12 volt solenoid electric lock
Relay Module 5 volt Relay module tem with a simple user interface. This system is implemented
Resistor Red and Green (Optional) using raspberry pi as the controller, mobile application as user-
access device and firebase as cloud data storage. One of the
most signicant characteristics of this mobile application is
that it automates the generations of IMEI to the Raspberry
Pi beyond the user’s perception. This makes the mobile
application more adaptable and feasible because users do not
need to memorize the whole chunk of patterns or password
to automate the access system. In future, we would like to
enhance the system to support multi-user and extend it as one-
spot home automation and security system.
R EFERENCES
[1] T. Young, “The Evolution History Of Smart Door Locks,” WiredS-
mart, 25-Nov-2018. [Online]. Available: https://wiredsmart.io/smart-door-
locks/evolution-and-history-door-locks/. [Accessed: 27-Aug-2019].
[2] R. Buyya and A. V. Dastjerdi, Internet of Things: principles and
paradigms. Amsterdam: Morgan Kaufmann, 2016.
Fig. 2. Implemented System [3] M. Gast, 802.11 wireless networks: the definitive guide. Sebastopol, CA:
OReilly, 2005.
[4] L. Kamelia, A. Noorhassan S.R, M. Sanjaya and W. Mulyana, ”Door-
F. System Evaluation Automation System Using Bluetooth-Based Android for Mobile Phone”,
ARPN Journal of Engineering and Applied Sciences, vol. 9, no. 1819-
We have compared our proposed system with few other 6608, pp. 1759-1762, 2014.
papers which we have reviewed to clearly depict the robustness [5] J. Britto, V. Chaudhari, D. Mehta, A. Kale, and J. Ramteke, “A Sixth
Sense Door using Internet of Things,” International Conference on
of our system. A comparison table based on used features is Computer Networks and Communication Technologies Lecture Notes on
shown in Table IV. Data Engineering and Communications Technologies, pp. 545–555, 2018.
Through comparing our system with others, we found that [6] C. G. Sarika, A. B. Malakreddy, and H. N. Harinath, “IoT-Based
Smart Login Using Biometrics,” International Conference on Computer
no one ever have implemented any authentication process Networks and Communication Technologies Lecture Notes on Data
for user specific mobile even though mobile phone has been Engineering and Communications Technologies, pp. 589–597, 2018.
used as an important factor. But we have added a “Mobile [7] Burns, D. Dahlinger, B. Guenther and T. Johnson, ”RFID Controlled
Door Lock”, Mechatronics Final Projects., vol. 9, 2018. [Accessed 12
Specific Authentication” which makes our proposed system July 2019].
more robust. This system can be easily deployed in any place, [8] K. Loong Pang and H. Seng Teh, ”MOBILE - BASED ACCESS
such as, home, vault locker, hostel etc. where security and CONTROL SYSTEM”, 16 / 059 , 537, 2019.
[9] A. Kassem, S. E. Murr, G. Jamous, E. Saad, and M. Geagea, “A smart lock
confidentiality is a matter of concern. system using Wi-Fi security,” 2016 3rd International Conference on Ad-
Also most of the researches shows that they had used vances in Computational Tools for Engineering Applications (ACTEA),
both the Wi-Fi and Bluetooth as communication link from 2016.
[10] M. S. Hadis, E. Palantei, A. A. Ilham, and A. Hendra, “Design of smart
Android device to controller and cloud server that could lock system for doors with special features using bluetooth technology,”
make the system more ill-shaped. We have used Only Wi- 2018 International Conference on Information and Communications Tech-
nology (ICOIACT), 2018.
[11] P. Thakur, A. Shetty, M. Parvadia, O. Pokharkar, and S. Shinde, “IoT
Based Portable Smart Lock,” SSRN Electronic Journal, 2019.
TABLE IV [12] “BiometricPrompt,” Developers. [Online]. Available:
C OMPARISON OF OUR PROPOSED SYSTEM WITH PREVIOUS WORKS https://developer.android.com/reference/android/hardware/biometrics/Bio-
Researches Biometric Wi-Fi Bluetooth Mobile Based Real-time Android
metricPrompt. [Accessed: 02-Aug-2019].
Features Identification Database Application [13] “IMEI.INFO,” IMEI.info, 08-Apr-2019. [Online]. Available:
Kamelia https://www.imei.info/faq-what-is-IMEI/. [Accessed: 27-Aug-2019].
et al. [4] [14] ”Retrieving Data — Firebase Realtime Database”, Firebase, 2019. [On-
Britto
et al. [5] line]. Available: https://firebase.google.com/docs/database/admin/retrieve-
Sarika data. [Accessed: 25- May- 2019].
et al. [6] [15] C. Dow, Internet of things programming projects: build modern IoT
Pang
et al. [8]
solutions with the Raspberry Pi 3 and Python. Birmingham: Packt Pub.,
Kassem 2018.
et al. [9] [16] “TCP Server-Client implementation in C,” GeeksforGeeks, 12-
Hadis Sep-2018. [Online]. Available: https://www.geeksforgeeks.org/tcp-server-
et al. [10]
Thakur client-implementation-in-c/. [Accessed: 27-Aug-2019].
et al. [11]
Our Proposed
System
Authorized licensed use limited to: Auckland University of Technology. Downloaded on May 23,2020 at 22:55:34 UTC from IEEE Xplore. Restrictions apply.