SIDNEY Final
SIDNEY Final
Project Context
1
door. Designed to be implemented in any area that uses security to keep
people's assets safe from outsiders, such as doors, lockers, etc., the
system is usually used during door lock and unlock activities.
2
Scope and limitation of the study
3. The system will help reduce the threat of theft in the Datu Ibrahim
Paglas Memorial College Registrar’s office.
3
CHAPTER II
SYSTEM TECHNICAL BACKGROUND
In this 21st century there are just a few digital approaches for door
security locks in the current system. This contemporary smart locking
system takes the place of the classic lock and key locking method. Modern
living is largely reliant on technological advancements, such as opening
doors, managing the air conditioning, and regulating the curtains. People
want to feel safe in their own homes, offices, and stores. The primary
motivation for the development of smart locks is to meet the needs of
people. As theft is increasing day by day, security is becoming a major
concern. In this project, we will make a digital door lock system with
keypad using an Arduino Uno. It will open your door only when the right
password, is entered and it will start beeping for a wrong password
Arpita Mishra etal [3] This paper proposed idea that in day to day
life security of any object or place password based system plays a major
role. This paper has considered about this and created a secure access
for a door which needs a password to unlock the door. Using keypad it
enters a password to the system and if entered password is correct then
door is open by motor which is used to rotate the handle of the door lock.
When it is entered incorrectly at the first time it will give three attempts to
enter the password. Some extra features like adding new users and
changing old password are configured by the keypad as usual. To display
messages to the user LCD module is used. Now a day’smost of the
systems are automated in order to face new challenges to achieve good
results. These systems have less manual operations, so the flexibility,
reliabilities are high and accurate are there characteristics. Hence every
field prefers automated control systems especially in the field of
electronics.
4
The main objective of this project is to style a secure door lockup
system. to make this project they’ve to perform sure task like, planning the
facility provide for the whole electronic equipment. choice of
Microcontroller, Key pad, DC motor and conjointly choice of buzzer in line
with the necessity for his or her project. (Anuj Kumar Gupta, Prachi
Sharma, Sahil Pandey,Surabhi, "Password based door lockup system",
2015.)
5
Protected Locking System Using Arduino” Sriharsha B S1, Zabiullah2,
Vishnu S B3 and Sanju V 4 Submitted in August, 2015, Accepted in
January, 2016)
Hacking has been the greatest threat in this time where everything
is driven by technology. Nearly 4,000 new attacks occur every day. Every
14 seconds, a company falls victim to a ransomware attack, which can
result in devastating financial losses. As computers became more popular
and started to go mainstream, with major functions on the business side
and eventually on personal computers becoming the norm, so did hacking.
6
With these incidents, the proponents further aims to provide its own
institution, Datu Ibrahim Paglas Memorial College, with the option of
providing additional security, specifically in the Registrar’s office to avoid
felony and give them the assurance that their personal belongings used for
daily routines will be kept safe and will remain confidential. In this way, the
institution, DIMPC Registrar’s office will provide both the convenience and
security that everyone needs.
Chapter III
METHODOLOGY, RESULTS & DISCUSSION
7
Requirements Analysis
GND VCC
LOCKER
12V INPUT
5V INPUT
VCC GND S
RELAY
2 3 4 5 6 7 8 9 11 13 GND
LCD (16, 2) ARDUINO UNO
GND 5V
220V INPUT
54
1 2 3 A
4 5 6 B
7 8 9 C
* 0 # D
SCHEMATIC DIAGRAM
SYSTEM FLOWCHART
8
START
SYSTEM INITIALIZATION
NO
VERIFICATION
YES
INPUT NEW PW
NEW PASSWORD
STOP
Door lock a secure and user-friendly access control solution, allowing users to enter,
After 6’s
verify, and change passwords efficiently while ensuring the security of the
designated area.
Requirements Documentation
9
Hardware Specification
The table below presents the hardware specifications that are
crucial for the development of the system. The proponents will utilize these
specifications to ensure the system functions effectively and is not
compromised by its peripherals. This will also help prevent any delays in
processing operations.
wires
Software Specification
10
lock mechanism, and providing feedback through the LCD and LED
indicators.
Participants
Data Collection
DESIGN OF SYSTEM
11
Figure 4: Design of Arduino-Based
Locker System
12
DEVELOPMENT AND TESTING
Planning Phase
13
features, user interactions, and security measures that need to be
incorporated into the design and development of the security system.
By diligently planning and documenting these key aspects in the
planning phase, the proponents can lay a solid foundation for the
successful development and implementation of the security system. This
strategic approach will ensure that the project aligns with its objectives and
requirements, ultimately leading to a robust and effective security solution
for the institute.
Coding Phase
During the coding phase the proponents used the Arduino IDE
software for the development of the Arduino-based locker system, code
was meticulously written, compiled, and uploaded to the Arduino board.
Extensive testing, debugging, and optimization were conducted to ensure
functionality and efficiency. Documentation and version control practices
were maintained to facilitate understanding and collaboration. The coding
phase played a crucial role in refining the system's functionality and
performance, laying a solid foundation for the successful implementation
of the Arduino door lock system.
Building Phase
During the building phase of the Arduino based locker project, the
focus was on assembling the physical components of the system to bring
the design to life. This phase involved connecting the Arduino board,
keypad module, LED light, relay module, solenoid door lock, and LCD
screen according to the system architecture. Careful attention was paid to
wiring and component placement to ensure proper functionality and
interaction. The building phase also included the physical installation of the
system components in the designated locations, such as door frames and
cabinets, to create a functional prototype. Through meticulous construction
14
and assembly, the Arduino-based locker system began to take shape,
setting the stage for the subsequent testing and refinement phases.
Testing Phase
15
discrepancies discovered during testing were addressed promptly through
debugging and refinement of the system code. The testing phase played a
crucial role in validating the functionality and security of the Arduino-based
locker system, ensuring that it met the specified requirements and
provided a reliable and secure access control solution for the institute.
Operational Phase
TESTING PROCEDURES
16
Security Testing: Assessed the system's capability to differentiate
between authorized and unauthorized access attempts and evaluated the
effectiveness of security features.
IMPLEMENTATION PLAN
PERSONS
STRATEGY ACTIVITIES DURATIONS
INVOLVED
17
- Integrate the hardware and
software components
Conduct unit testing on
individual components
- Perform integration testing
System on the complete system Proponents April to May
Testing - Carry out user acceptance End-users (2024)
testing
- Evaluate security and
performance -
Chapter IV
RESULTS
Functionality Testing Results: The system accurately processed
passcodes, controlled the door lock, and provided timely feedback through
LED indicators and the LCD display.
18
Security Testing Results: The system effectively differentiated
between authorized and unauthorized access attempts.
User Experience Testing Results: Users reported high satisfaction
with the system's ease of use, convenience, and overall performance,
indicating a positive user experience.
DISCUSSION
System Reliability: The system demonstrated consistent and
accurate recognition and processing of passcodes, ensuring reliable
access control.
Security Features: The system's security features effectively
prevented unauthorized access and maintained data integrity, enhancing
overall security measures.
User-Friendliness: User feedback highlighted the system's user-
friendly interface, accessibility, and satisfaction, indicating a positive user
experience.
CONCLUSION
RECOMMENDATION
19
1. Enhance Password Recovery Mechanism:
Recommendation: Implement a robust password recovery mechanism to
address the limitation of users forgetting their passcodes. This could
include features like a "Forgot Password" option that allows users to reset
their passwords securely, either through a predefined backup password or
by verifying their identity through an alternative method (e.g., biometric
authentication).
20