Implementation of Secure Door Automation Systems Using Infrared Sensors
Implementation of Secure Door Automation Systems Using Infrared Sensors
Implementation of Secure Door Automation Systems Using Infrared Sensors
ABSTRACT
Wireless home automation networks comprise wireless embedded sensors and actuators that enable monitoring and control
applications for home user comfort and efficient home management. This article surveys the main current and emerging solutions
that are suitable for WHANs , including ZigBee, Z-Wave, INSTEON, Wavenis, and IP-based technology. In the EXISTING
SYSTEM, Control of Door is achieved using ZigBee, IR (Infrared sensor), Wi-Fi or by GSM (GLOBAL SYSTEM MOBILE
MANAGEMENT). In the PROPOSED SYSTEM, Same is achieved using Easiest way without touching any sensors.
MODIFICATION of the Project is our implementation, Authenticated users will register to the House Server with set of Questions
and relevant Answer to it along with the Standard PIN Numbers for authentication. Android Application is deployed to verify all
these User will have sent a Voice command for PIN number. IR sensor is deployed to detect Human, If a new user enters to the
home IR is initiated and Camera picks a snap and emails to the all the members in the house. If anyone knows the person then he
could share the PIN number and Session Key so that Door can be opened.
Keywords – Door Lock System; Pin code; Android; Arduino; Home Automation.
www.trendytechjournals.com 1
International Journal of Trendy Research in Engineering and Technology
Volume 4 Issue 6 Oct’ 2020
ISSN NO 2582-0958
________________________________________________________________________________________________________________________
Version Codename API Fig 2 Architecture for Secure Door Automation System
1.5 Cupcake 3
A component is simply a piece of code that has a well-
1.6 Donut 4
defined life cycle e.g. Activity, Receiver, and Service etc.
2.1 Éclair 7 The core building blocks or fundamental components of
android are activities, views, intents, services, content
2.2 Froyo 8 providers, fragments and AndroidManifest.xml.
Service
Service is a background process that can run for a
long time. There are two types of services local and remote.
Local service is accessed from within the application whereas
remote service is accessed remotely from other applications
running on the same device.
www.trendytechjournals.com 2
International Journal of Trendy Research in Engineering and Technology
Volume 4 Issue 6 Oct’ 2020
ISSN NO 2582-0958
________________________________________________________________________________________________________________________
www.trendytechjournals.com 3
International Journal of Trendy Research in Engineering and Technology
Volume 4 Issue 6 Oct’ 2020
ISSN NO 2582-0958
________________________________________________________________________________________________________________________
automation system has two modes, is change pin mode and 2) Hardware Implementation
open door mode, also in the button display.
The pin data, which is sent by the android
application via smartphone Bluetooth, will be received by
After design the GUI in the designer tab, the code of the Arduino microcontroller via Bluetooth module which
how the program run is made in the blocks tab. MIT app has been installed on it. Arduino microcontroller has non-
inventor is different with android application development volatile memory storage, EEPROM. This memory is used to
environment in general which is using script based. To save the pin password in order to the stored memory will
arrange the program, MIT app inventor use blocks code not be lost even when there is no power supply given.
program. It is easier to understand and more interesting for
new learner android programming.
The protocols are defined correlated with the
android application. The corresponding received data is
identified by the header data, using #. Data with different
The Bluetooth connection between android protocol will not be processed. Data with the # header will
smartphone and the door automation hardware is very continue to the next authentication. The next flag is used to
important. When the android smartphone Bluetooth is turn distinguish the speech data or pin data. As explained before,
on, the Bluetooth client function of the program start to speech authentication uses 0 as flag, while pin
make list all paired Bluetooth and save the address and authentication uses 1 as flag. The password setting is sent
name. It can be saved using Tiny DB component. From that through protocol 1 after #1. While the open the door
paired Bluetooth list, the address and the name of Bluetooth function is sent with 0 after #1. So, the protocol of pin
hardware is selected in order to make connection between authenticationwillbelike#1then0/1followedwiththepin.The
the both. There will appear warning text if the connection whole algorithm of door automation with pin authentication
failed. is shown in the figure4.
Figure 3. User Interface for PIN Authentication The pin only can be sent when the Bluetooth is
connected. If the Bluetooth is still not connected, the
warning will appear in the screen to notice. If the
connection success, the data of protocols and pin will be
www.trendytechjournals.com 4
International Journal of Trendy Research in Engineering and Technology
Volume 4 Issue 6 Oct’ 2020
ISSN NO 2582-0958
________________________________________________________________________________________________________________________
received by the Bluetooth in the hardware. After the header [6] X.Wu,C.Hu, C.Zhengand Q.Zhang.(2016). Solar
authentication, the received pin as the key to open door will street lamp system using GPRS and ZIGBEE
be checked the sequence of the pin digits, is that the same technology. IEEE llth Conference on Industrial
with the stored pin or not. For the pin setting, it is need Electronics and Applications(ICIEA).pp.2561-
parsing the serial received data to be stored in the micro 2564.DOI: 10.1109/ICIEA.2016.7604025.
controller of every new digit pin, which next is used to be [7] N. M. Morshed, G. M.Muid-Ur-Rahman, M.R. Karim
recognized as a new pin for authentication. and H. U.Zaman. (2015). Microcontroller based home
V CONCLUSION automation system using Bluetooth, GSM, Wi-Fi and
DTMF. International Conference on Advances in
This project presents a new method for intelligent Electrical Engineering (ICAEE), pp. 101-104. DOI:
surveillance utilizing the capabilities of a smartphone along 10.1109/ICAEE.2015.7506806.
with infrared sensor. The network and computational powers [8] Sarno, R., & Alfin, A. A.. (2017). Soil Irrigation Fuzzy
of the smartphone is utilized for surveillance. The energy Estimation Approach Based On Decision Making
usage is reduced by activating the camera only when the InSugarcane Industry. International Conference on
movement detected by the infrared sensor. A real-time Information & Communication Technology and System
notification feature notifies the user about the intrusion (ICTS),pp. 137-142. DOI:10.1109/ICTS.2017.8265659.
through SMS.