0% found this document useful (0 votes)
67 views20 pages

SIDNEY Final

The document discusses the development of an Arduino-based locker system to enhance security at a college registrar's office. It aims to provide secure storage and reduce theft by only allowing access with a password. The system uses an Arduino board, keypad, LED, relay module, and LCD to take a password and unlock the door if correct. It also aims to help prevent unauthorized access to confidential records.

Uploaded by

AHOUR PANGILAYAN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views20 pages

SIDNEY Final

The document discusses the development of an Arduino-based locker system to enhance security at a college registrar's office. It aims to provide secure storage and reduce theft by only allowing access with a password. The system uses an Arduino board, keypad, LED, relay module, and LCD to take a password and unlock the door if correct. It also aims to help prevent unauthorized access to confidential records.

Uploaded by

AHOUR PANGILAYAN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 20

CHAPTER I

Project Context

Confidentiality, safekeeping, and unauthorized transactions are


where this research comes into action. DIPMC, specifically the registrar's
office, where important documents are being stored and the locker areas
that are provided for the students where their essentials have been prone
to theft and are more likely to be exposed, is the main subject of this
research.

In these times where technology plays an important role in the daily


lifestyle and workday of a person, it is important to maintain confidentiality
and security on things that have value and importance. Thus, using
personal identification becomes a necessity, for which password and
identification card techniques are commonly used. Furthermore, this
method requires additional personnel to keep their locker keys and cards.

This research aims to provide an alternative technology called the


Arduino -based locker system. It is a system that uses an open-source
electronic platform based on easy-to-use software and hardware. The
latter can provide better security through password input. Thus, the user
can have security without compromising their personal identification.

Purpose and Description

The Datu Ibrahim Paglas Memorial College Registrar’s Office


contains several documents that are classified specifically for the school
and student records, where they should be kept in safekeeping. Through
this research, the proponents developed an Arduino-based locker system,
a type of control system that controls the opening and closing of the locker

1
door. Designed to be implemented in any area that uses security to keep
people's assets safe from outsiders, such as doors, lockers, etc., the
system is usually used during door lock and unlock activities.

The Arduino-based locker system helps to differentiate between


unauthorized and authorized transactions, as it is designed to only allow
the person who knows the password to unlock the door. This will give the
research subject convenience for its users.

This project is not complex; it simply contains an Arduino Uno, a


4*4 keypad module, a LED light, a 5V relay module, wire, a solenoid door
lock, a 1A adapter, and an LCD. Arduino controls complete processes like
taking a password from the keypad module, comparing passwords, turning
the lock on and off, and sending status to the LCD display. The keypad is
used for encoding the password, the led light is for indications, the relay
module is for locking and unlocking the door, and the LCD for the display
of status or messages on it.

General Objective of the Study

This research study, which is based on security mechanisms, aims to:

1. Lessen the threat of theft, hacking, and fraud, specifically in the


Datu Ibrahim Paglas Memorial College’s registrar's offices.
2. This system is also proposed to provide a storage solution for the
registrar’s office staff, enabling them to avoid carrying heavy items
in their bags.

3. Help the institute provide a security system that prevents the


leakage of confidential records and decreases the possibility of
unauthorized transactions.

2
Scope and limitation of the study

Scope of the Study

1. The system is designed to control the opening and closing of locker


doors to enhance security in Registrar’s office.
2. The project aims to provide convenience to users by allowing only
authorized individuals with the correct password to unlock the door.

3. The system will help reduce the threat of theft in the Datu Ibrahim
Paglas Memorial College Registrar’s office.

4. It is proposed to enhance security in locker or cabinets where the


Registrar’s office staffs stores their essentials, by reducing the need
to carry heavy items in their bags.

Limitations of the Study

1. The system is designed for a specific number of users, and its


complexity may limit the scalability to accommodate a large number
of users or multiple access points.
2. The system relies on password for access control, which may pose
a limitation in cases where users forget their passcode. While a
"forgot password" feature is proposed, the effectiveness and
reliability of this feature need to be further evaluated.

3. The research study focuses on the security aspects of the Arduino-


based locker system and may not address other potential security
vulnerabilities or integration with the institution’s existing security
systems.

3
CHAPTER II
SYSTEM TECHNICAL BACKGROUND

In this 21st century there are just a few digital approaches for door
security locks in the current system. This contemporary smart locking
system takes the place of the classic lock and key locking method. Modern
living is largely reliant on technological advancements, such as opening
doors, managing the air conditioning, and regulating the curtains. People
want to feel safe in their own homes, offices, and stores. The primary
motivation for the development of smart locks is to meet the needs of
people. As theft is increasing day by day, security is becoming a major
concern. In this project, we will make a digital door lock system with
keypad using an Arduino Uno. It will open your door only when the right
password, is entered and it will start beeping for a wrong password
Arpita Mishra etal [3] This paper proposed idea that in day to day
life security of any object or place password based system plays a major
role. This paper has considered about this and created a secure access
for a door which needs a password to unlock the door. Using keypad it
enters a password to the system and if entered password is correct then
door is open by motor which is used to rotate the handle of the door lock.
When it is entered incorrectly at the first time it will give three attempts to
enter the password. Some extra features like adding new users and
changing old password are configured by the keypad as usual. To display
messages to the user LCD module is used. Now a day’smost of the
systems are automated in order to face new challenges to achieve good
results. These systems have less manual operations, so the flexibility,
reliabilities are high and accurate are there characteristics. Hence every
field prefers automated control systems especially in the field of
electronics.

4
The main objective of this project is to style a secure door lockup
system. to make this project they’ve to perform sure task like, planning the
facility provide for the whole electronic equipment. choice of
Microcontroller, Key pad, DC motor and conjointly choice of buzzer in line
with the necessity for his or her project. (Anuj Kumar Gupta, Prachi
Sharma, Sahil Pandey,Surabhi, "Password based door lockup system",
2015.)

The main objective of this project is to relinquish safety at each


common place like home, public places. During this project all the data
hold on within the info. once the proper word are going to be entered, the
microcontroller can provide steering to servo engine then door can unlock.
What we want is computerised innovation to develop a coordinated and
everyone around alteredupbeat framework at a worth that is wise.
(Prof.A.Y.Prabhakar1,Prof. Dr. Shruti K Oza2, Nayan Shrivastava3,
Prakhar Srivastava4, Garvit Wadhwa5, "Password based Door lock
System", Volume: 06 Issue:02 | 2019).

In this current situation, the degree of security is feeble. So there is


a lot of robbery, theft going on in and around the world. So, people fear to
keep any of their valuables in their homes. Henceforth, many people prefer
to keep it in banks. However, in this insecure world even
banks are not too safe enough to satisfy people needs. A common man
feels his valuables are secured if there is efficiency in security. Hence this
project can give effective security in minimal cost. In this project we are
providing enough security to satisfy the user’s needs. The user will be
prompted to enter a password to unlock the door. On successful password
entry, the door unlocks for a specified amount of time enabling him/her to
store or restore his/her valuables. On the other hand, if the user enters an
invalid password then corresponding equivalent message will be
displayed. This project “Arduino based password protected locking
system” can be used to provide enough security in various places like
bank lockers, security doors, BIOS locking in computer etc. (“Password

5
Protected Locking System Using Arduino” Sriharsha B S1, Zabiullah2,
Vishnu S B3 and Sanju V 4 Submitted in August, 2015, Accepted in
January, 2016)

Hacking has been the greatest threat in this time where everything
is driven by technology. Nearly 4,000 new attacks occur every day. Every
14 seconds, a company falls victim to a ransomware attack, which can
result in devastating financial losses. As computers became more popular
and started to go mainstream, with major functions on the business side
and eventually on personal computers becoming the norm, so did hacking.

With this constant threat, modern technology has been re-invented


to prevent or alleviate such incidents. It was in 2005 that the first ever
Arduino board was born in the classrooms of the Interactive Design
Institute in Ivrea, Italy. The system is called Arduino, which is an open-
source microcontroller and a low-cost microcontroller board that allows
even a novice to do great things in electronics. An Arduino can be
connected to all kinds of lights, motors, sensors, and other devices; an
easy-to-learn programming language can be used to program how the
new creation behaves. It is based on a development board where you can
design your own security system.

Over the years, Arduino has been the brain of thousands of


projects, from everyday objects to complex scientific instruments. As the
Arduino system is being designed, it has been a great help for a lot of
consumers to re-invent, modify, and innovate their own security program.
This system research is configured to create and implement a locker
security system based on RFID and GSM technology that we can use in
bank-secured offices, houses, and to secure personal belongings. The
plan is to have a sensor that can detect any motion within its permissible
range and will trigger an alarm system along with its digital display to notify
users of errors or not-verified transactions.

6
With these incidents, the proponents further aims to provide its own
institution, Datu Ibrahim Paglas Memorial College, with the option of
providing additional security, specifically in the Registrar’s office to avoid
felony and give them the assurance that their personal belongings used for
daily routines will be kept safe and will remain confidential. In this way, the
institution, DIMPC Registrar’s office will provide both the convenience and
security that everyone needs.

Chapter III
METHODOLOGY, RESULTS & DISCUSSION

7
Requirements Analysis

GND VCC
LOCKER

12V INPUT

5V INPUT

VCC GND S
RELAY

2 3 4 5 6 7 8 9 11 13 GND
LCD (16, 2) ARDUINO UNO

VCC GRND SDA SCL

GND 5V
220V INPUT

54

1 2 3 A

4 5 6 B

7 8 9 C

* 0 # D

Figure 1: Schematic Diagram

SCHEMATIC DIAGRAM

The Arduino system with its components, including the Arduino


Uno, keypad module, relay module, LCD display, wires, LED light,
solenoid lock, and breadboard, illustrates the interconnected elements that
work together to create a functional locker system.

SYSTEM FLOWCHART

8
START

SYSTEM INITIALIZATION

CHANGED PASSWORD ENTER PASSWORD

INPUT CURRENT PW UNLOCK DOOR

NO
VERIFICATION

YES

INPUT NEW PW

NEW PASSWORD

STOP

Figure 2: System Flow Chart

By following this flow chart, the Arduino-based locker system provides

Door lock a secure and user-friendly access control solution, allowing users to enter,
After 6’s
verify, and change passwords efficiently while ensuring the security of the
designated area.

Requirements Documentation

9
 Hardware Specification
The table below presents the hardware specifications that are
crucial for the development of the system. The proponents will utilize these
specifications to ensure the system functions effectively and is not
compromised by its peripherals. This will also help prevent any delays in
processing operations.

Table 1. Hardware Requirements Specification


HARDWARE SPECIFICATION

Arduino Uno Microcontroller

Keypad module 16-key matrix keypad

Relay module 5v coil voltage

LCD display 16 columns, 2 rows, HD44780


controller

wires

LED light 5mm

Solenoid lock 12v dc,1a

Power Supply 220v

Table 1. Hardware Requirements Specification

 Software Specification

The software used for the Arduino-based locker system is Arduino


IDE. The Arduino IDE provides an integrated development environment for
writing, compiling, and uploading the code to the Arduino Uno board. The
system utilizes standard Arduino libraries to interface with the various
hardware components, such as the keypad, LCD display, and servo motor.
The software is responsible for processing user input, controlling the door

10
lock mechanism, and providing feedback through the LCD and LED
indicators.

Figure 3: System Software

 Participants

Ten participants were involved in the study to interact with the


locker system for testing and evaluation purposes, providing feedback on
usability and performance.

 Data Collection

During the testing phase, data gathering regarding system


performance, user experience, and security aspects were gathered
through observation surveys and system logs. The data collection process
involved utilizing structured questionnaires to gather information on user
satisfaction and perceptions of security.

DESIGN OF SYSTEM

11
Figure 4: Design of Arduino-Based
Locker System

The Arduino-based locker system is initialized when the Arduino


starts up. The user is then prompted to enter a password to access the
system. The system evaluates the entered password, and if it is correct,
the door will unlock and remain open for 6 seconds before automatically
locking again. If the password entered is incorrect, the system will prompt
the user to try entering the password again. To change the password, the
user can press the "#" key and enter the current password. If the current
password is entered correctly, the system will then ask the user to set a
new 4-digit password. Once the new password is entered, the password
change process is completed. However, if the current password entered
during the change process is incorrect, the system will revert back to the
initial password entry step, prompting the user to try again. This structured
flow ensures secure access control and allows authorized users to update
the password as needed.

12
DEVELOPMENT AND TESTING

The development of the Arduino-based locker system followed a


structured software development lifecycle to ensure a comprehensive and
systematic approach. The process involved thorough planning, coding,
building, testing and operational phases to ensure the systems
functionality, reliability and user-friendliness. Rigorous testing procedures
were conducted to evaluate the system’s performance, security features,
and user-experience, leading to refinement and optimizations throughout
the development lifecycle.

 Planning Phase

In the planning phase of the project, the proponents have identified


the primary objective of the study: to assist the institute in implementing a
security system that safeguards confidential records and minimizes the
risk of unauthorized transactions. Additionally, the goal is to offer security
solutions for registrar’s office spaces, particularly in locker or cabinets
where essential items are stored, reducing the need to carry heavy loads.

To support this objective, the proponents have identified the


necessary resources for the study, including essential software
components and hardware components such as Arduino Uno, 4x4 keypad
module, LED light, 5V relay module, wires, solenoid door lock, and LCD.
These resources are essential for the development and implementation of
the security system.

Furthermore, the proponents have established a realistic timeline


with milestones and deadlines to track progress and ensure timely
completion. This structured timeline will help monitor the project's progress
and ensure that key deliverables are met within the specified timeframes.

In addition, the proponents have conducted a comprehensive


analysis to collect and document the functional and non-functional
requirements of the project. This step is crucial for outlining the system

13
features, user interactions, and security measures that need to be
incorporated into the design and development of the security system.
By diligently planning and documenting these key aspects in the
planning phase, the proponents can lay a solid foundation for the
successful development and implementation of the security system. This
strategic approach will ensure that the project aligns with its objectives and
requirements, ultimately leading to a robust and effective security solution
for the institute.

 Coding Phase

During the coding phase the proponents used the Arduino IDE
software for the development of the Arduino-based locker system, code
was meticulously written, compiled, and uploaded to the Arduino board.
Extensive testing, debugging, and optimization were conducted to ensure
functionality and efficiency. Documentation and version control practices
were maintained to facilitate understanding and collaboration. The coding
phase played a crucial role in refining the system's functionality and
performance, laying a solid foundation for the successful implementation
of the Arduino door lock system.

 Building Phase

During the building phase of the Arduino based locker project, the
focus was on assembling the physical components of the system to bring
the design to life. This phase involved connecting the Arduino board,
keypad module, LED light, relay module, solenoid door lock, and LCD
screen according to the system architecture. Careful attention was paid to
wiring and component placement to ensure proper functionality and
interaction. The building phase also included the physical installation of the
system components in the designated locations, such as door frames and
cabinets, to create a functional prototype. Through meticulous construction

14
and assembly, the Arduino-based locker system began to take shape,
setting the stage for the subsequent testing and refinement phases.

 Testing Phase

During the testing phase of the Arduino based locker, rigorous


testing procedures were conducted to evaluate the functionality, reliability,
and security of the system. The testing phase involved various types of
testing, including:

Unit Testing: Individual components of the Arduino based locker system,


such as the keypad module, LED light, relay module, and solenoid door
lock, were tested to ensure they functioned correctly and responded as
intended.

Integration Testing: The integrated system components were tested


together to verify that they communicated effectively and operated
seamlessly as a unified system.

User Acceptance Testing: End-users, participated in user acceptance


testing to assess the system's usability, user interface, and overall user
experience.

Security Testing: Security testing was conducted to identify and address


vulnerabilities in the system, such as unauthorized access attempts or
potential security breaches.

Performance Testing: Performance testing was carried out to evaluate


the system's speed, responsiveness, and efficiency in processing user
inputs and executing commands.

Error Handling Testing: The system's error handling capabilities were


tested to ensure that it responded appropriately to invalid inputs,
exceptions, and error conditions.

Throughout the testing phase, meticulous documentation of test


cases, results, and any identified issues was maintained. Any defects or

15
discrepancies discovered during testing were addressed promptly through
debugging and refinement of the system code. The testing phase played a
crucial role in validating the functionality and security of the Arduino-based
locker system, ensuring that it met the specified requirements and
provided a reliable and secure access control solution for the institute.
 Operational Phase

During the operation phase of the Arduino-based locker project, the


focus shifted towards the practical implementation and use of the system
in real-world scenarios. The system was deployed and put into operation
in Registrar’s office such as locker or cabinets, where security measures
were needed. Users were trained on how to interact with the system,
including entering passwords on the keypad, interpreting feedback from
the LED display, and understanding the system's response to unlocking
doors or cabinets. The system's performance, reliability, and user
friendliness were monitored during the operation phase to ensure
seamless operation and address any issues that arose. Regular
maintenance and support were provided to address any system updates,
user queries, or technical issues, ensuring the continued functionality and
security of the Arduino-based locker system in everyday use. The
operation phase marked the transition from development to practical
application, emphasizing the importance of user engagement, system
reliability, and ongoing support for a successful implementation.

TESTING PROCEDURES

Functionality Testing: Verified the system's ability to process


passcodes, control the door lock, and provide feedback through LED
indicators and the LCD display.

16
Security Testing: Assessed the system's capability to differentiate
between authorized and unauthorized access attempts and evaluated the
effectiveness of security features.

User Experience Testing: Gathered feedback on user satisfaction,


ease of use, and overall experience with the door lock system.

IMPLEMENTATION PLAN

PERSONS
STRATEGY ACTIVITIES DURATIONS
INVOLVED

-Define project objectives


- Identify hardware and
December
Planning software requirements Proponents
(2023)
- Establish project timeline and
milestones
- Collect and document
functional requirements
Requirement - Identify non-functional Proponents
January (2024)
Gathering requirements (security, End-users
usability, performance)
- Conduct interviews
- Design the system
architecture
- Select and finalize hardware
System components Proponents
February (2024)
Design - Develop the design and data
flow
- Create the schematic
diagram
System -Procure and assemble the Proponents March (2024)
Development hardware components
- Write and test the Arduino
code

17
- Integrate the hardware and
software components
Conduct unit testing on
individual components
- Perform integration testing
System on the complete system Proponents April to May
Testing - Carry out user acceptance End-users (2024)
testing
- Evaluate security and
performance -

Table 2. Implementation Plan


This implementation plan outlines the key strategies, activities,
responsible personnel, and estimated durations for each phase of the
Arduino-based locker system development. The plan ensures a structured
and comprehensive approach to successfully implement the security
solution in the Datu Ibrahim Paglas Memorial College Registrar's office.

Chapter IV

METHODOLOGY, RESULTS AND DISCUSSION

RESULTS
Functionality Testing Results: The system accurately processed
passcodes, controlled the door lock, and provided timely feedback through
LED indicators and the LCD display.

18
Security Testing Results: The system effectively differentiated
between authorized and unauthorized access attempts.
User Experience Testing Results: Users reported high satisfaction
with the system's ease of use, convenience, and overall performance,
indicating a positive user experience.

DISCUSSION
System Reliability: The system demonstrated consistent and
accurate recognition and processing of passcodes, ensuring reliable
access control.
Security Features: The system's security features effectively
prevented unauthorized access and maintained data integrity, enhancing
overall security measures.
User-Friendliness: User feedback highlighted the system's user-
friendly interface, accessibility, and satisfaction, indicating a positive user
experience.

CONCLUSION

The methodology employed in developing and evaluating the


Arduino-based locker system proved successful in achieving the research
objectives. The results demonstrated the system's functionality, security,
and user-friendliness, validating its effectiveness in enhancing security and
access control. The positive outcomes from the testing phase support the
system's potential for practical implementation in real-world settings,
providing a reliable and efficient solution for access management and
security enhancement.

RECOMMENDATION

To further enhance the effectiveness and versatility of the Arduino-


based locker system, the following recommendations are provided:

19
1. Enhance Password Recovery Mechanism:
Recommendation: Implement a robust password recovery mechanism to
address the limitation of users forgetting their passcodes. This could
include features like a "Forgot Password" option that allows users to reset
their passwords securely, either through a predefined backup password or
by verifying their identity through an alternative method (e.g., biometric
authentication).

2. Explore Biometric Authentication:


Recommendation: Consider integrating biometric authentication, such as
fingerprint or facial recognition, as an additional security layer alongside
the password-based access control. This would provide a more secure
and convenient option for users, reducing the risk of forgotten passwords
and improving overall system security.

3. Improve Scalability and Expandability:


Recommendation: Evaluate the system's scalability to accommodate a
larger number of users or multiple access points in the future. Ensure that
the system design and architecture can be easily expanded or replicated
to meet the growing security needs of the institution.

By addressing these recommendations, the Arduino-based locker


system can be further enhanced to provide a more robust, scalable, and
user-friendly security solution for the DIPMC Registrar's Office, ensuring
the confidentiality and integrity of the institution's sensitive records and
assets.

20

You might also like