Black Book Format
Black Book Format
Submitted by
ANIRUDH SHETTY
SAMARTH BEDARE
DIVYESH VARADE
of
DIPLOMA
in
COMPUTER ENGINEERING
CERTIFICATE
Perseverance, Inspiration & Motivation have always played a key role in the
success of any venture.
At this level of understanding it is difficult to understand the wide
spectrum of knowledge without proper guidance and advice, Hence we take
this o to express our sincere gratitude to our respected Project Guide Mr.
Vikas Solanke who as a guide evolved an interest in us to work and select
an entirely new idea for project work. He has been keenly co-operative and
helpful to us in sorting out all the difficulties.
We would also like to thank our Principal Mrs. Geeta Joshi, for their
continuous advice and support.
My deep sense of gratitude to Marathwada MitraMandal’s Polytechnic
for their timely advice and encouragement in our project development.
I would also thank my Institution and my faculty members without
whom this project would have been a distant reality.
ANIRUDH SHETTY
SAMARTH BEDARE
DIVYESH VARADE
ABSTRACT
1 INTRODUCTION
1.1 Institutional Profile
1.2 Introduction to the system
1.3 Detailed description of project
1.4 Objective of proposed system
2 ANALYSIS
2.1 Project Management
2.2 System Design
3 REQUIRED ANALYSIS
3.1 Requirement analysis
3.2 Feasibility Study
3.3 Technical Feasibility
3.4 Operational Feasibility
3.5 Economic Feasibility
4 DESIGN PHASE
4.1 Activity Diagram
4.2 Use Case Diagram
4.3 Sequence Diagram
4.4 Deployment Diagram
5 CODING
5.1 Hardware Specification
5.2 Platform
5.3 Programming Language Used
5.4 Software Tools Used
5.5 Coding Style Followed
Security Deals with playing major role in today’s life. Here we have made use of RFID and
keypad technology. The RFID is initially provided the authorized address and the
password is set for the keypad module. If the person is authorized then the RFID passes
the access to the keypad to ensure the second security level and if the person is
unauthorized the RFID goes to the false/ fail state and indicates the unauthenticated
access by buzzer beep. This system can be implemented in places where security is major
requirement like house, bank, offices, etc. In every sector security plays major role and
the aim of this project is to provide the required level of security with low cost. The
implementation of this security system is limited to the automation of the door
automation in home automation. This system is controlled by Arduino At Mega 2560.
The microcontroller detects the output of the RFID, 3X4 Keypad. The response given by
the microcontroller will be controlled by the buzzer.
2.1 REQUIREMENTANALYSIS
1. Arduino AtMega 2560- The Arduino MEGA 2560 is designed for projects that
require more I/O lines, more sketch memory and more RAM. With 54 digital I/O
pins, 16 analog inputs and a larger space for your sketch it is the recommended
board for 3D printers and robotics projects [4].
3. 3X4 Keypad- A 4×3 matrix keypad is interfaced to the microcontroller, which is a 12-
key keypad consisting of four rows and three columns [5].
5. Servomotor- A servo motor is an electrical device which can push or rotate an object
with great precision. If you want to rotate and object at some specific angles or distance,
then you use servo motor. It is just made up of simple motor which run
through servo mechanism.
7. Breadboard- The Arduino has multiple power and ground pins that you can connect
to the power rails or other rows on a breadboard. Connecting the Ground (GND) pin from
an Arduino to a row on a mini breadboard.
A Reader consists of a Radio Frequency module and an antenna which generates high
frequency electromagnetic field [6]. On the other hand, the tag is usually a passive
device, meaning it doesn’t contain a battery. Instead it contains a microchip that stores
and processes information, and an antenna to receive and transmit a signal.
To read the information encoded on a tag, it is placed in close proximity to the Reader
(does not need to be within direct line-of-sight of the reader) [7]. A Reader generates an
electromagnetic field which causes electrons to move through the tag’s antenna and
subsequently power the chip.
The powered chip inside the tag then responds by sending its stored information back to
the reader in the form of another radio signal. This is called backscatter [8]. The
backscatter, or change in the electromagnetic/RF wave, is detected and interpreted by the
reader which then sends the data out to a computer or microcontroller.
This DC 12V 4×3 Matrix 12 keys Membrane Switch Keypad is high-quality soft
touch feeling button keypad with 100 million life-stroke lifespans and good resistance to
environmental conditions [5].
This DC 12V 4×3 Key Matrix Membrane Switch Keypad is a high-quality product at
very low cost for your application needs.
This 12-button keypad provides a useful human interface component for microcontroller
projects. Convenient adhesive backing provides a simple way to mount the keypad in a
variety of applications.
The Keypad 4×3 features a total of 12 buttons in Matrix form. This is a membrane
keypad with no moving parts. A female 7-pin berg connector is required for interfacing it
with your microcontroller circuits [9].
SYSTEM SPECIFICATION
The Smart Door Lock system commonly uses RFID and Keypad technology for home
automation process. It provides two-way authentication via using RFID and Keypad. The
system will indicate the presence of unauthorized access to the door and alert the
authorized person.
3.2 HARDWARE
The Mega 2560 is a microcontroller board based on the ATmega2560. It has 54 digital
input/output pins (of which 15 can be used as PWM outputs), 16 analog inputs, 4 UARTs
3.3 ADVANTAGES
SYSTEM MODELLING
4.7 FLOWCHART
A flow chart is a graphical or symbolic representation of a process. Each step in the
process is represented by a different symbol and contains a short description of the
process step. The flow chart symbols are linked together with arrows showing the process
flow direction.
CHAPTER 5
DESCRIPTION
The Arduino Integrated Development Environment (IDE) is the main text editing program
used for Arduino programming. It is where you’ll be typing up your code before
uploading it to the board you want to program. Arduino code is referred to as sketches.
Arduino programs can be divided in three main parts: Structure, Values (variables and
constants), and Functions. Software structure consist of two main functions −
• Setup( ) function
• Loop( ) function
1) Setup(): - The setup() function is called when a sketch starts. Use it to initialize the
variables, pin modes, start using libraries, etc. The setup function will only run once, after
each power up or reset of the Arduino board.
2) Loop(): - After creating a setup() function, which initializes and sets the initial values,
the loop() function does precisely what its name suggests, and loops consecutively,
allowing your program to change and respond. Use it to actively control the Arduino
board.
#include <MFRC522.h>
#include <Keypad.h>
#include <Servo.h>
#include <SPI.h>
#define SS_PIN 53
Servo sg90;
# define servoPin 9
# define buzzerPin 8
MFRC522 mfrc522(SS_PIN, RST_PIN);
char initial_password[3] = {'8', '6', '8'}; // Variable to store initial password
String tagUID = "37 5F 42 34"; // String to store UID of tag. Change it with your tag's
UID
char password[3]; // Variable to store users password
boolean RFIDMode = true; // boolean to change modes
char key_pressed = 0; // Variable to store incoming keys
uint8_t i = 0;
char hexaKeys[rows][columns] =
{
{'1', '2', '3'},
{'4', '5', '6'},
{'7', '8', '9'},
{'*', '0', '#'}
};
bool door = true;
byte row_pins[rows] = {1, 2, 3, 4}; //connect to the row pinouts of the keypad
byte column_pins[columns] = {12, 6, 7};
void loop() {
// System will first look for mode
if (RFIDMode == true) {
if ( ! mfrc522.PICC_IsNewCardPresent()) {
return;
}
// Select one of the cards
if ( ! mfrc522.PICC_ReadCardSerial()) {
return;
}
digitalWrite(buzzerPin, LOW);
delay(3000);
else
{
// If UID of tag is not matched.
digitalWrite(buzzerPin, HIGH);
delay(3000);
digitalWrite(buzzerPin, LOW);
}
}
if (RFIDMode == false) {
key_pressed = keypad_key.getKey(); // Storing keys
if (key_pressed)
{
password[i++] = key_pressed; // Storing in password variable
}
if (i == 3) // If 6 keys are completed
{
delay(200);
delay(3000);
i = 0;
RFIDMode = true; // Make RFID mode true
}
digitalWrite(buzzerPin, HIGH);
delay(3000);
digitalWrite(buzzerPin, LOW);
i = 0;
RFIDMode = true; // Make RFID mode true
}
}
}
}
CHAPTER 6
1. When the user will place the RFID card to the RFID reader then the RC522 RFID
reader will check for the access of the card.
2. If the RFID access is granted then the servo motor will move from its initial
position and open the door if the access is granted.
CHAPTER 7
RISK ANALYSIS
The biggest risk are they destroy the equipment, not that they get hurt. At least not until
you introduce them to soldering irons.
It would recommend not using lithium ion batteries for power – since they can explode if
shorted. The regular power banks are a source for efficient power supply and aren’t likely
to get explode. The best power supply would be one with an adjustable current limit
which helps avoiding equipment or people.
In the module of RC522 RFID Reader electromagnetic interference (or Noise) from other
RF devices, as well as factory machines or fluorescent lights, can either block waves
from getting to the tag (if they are employing the same frequency) or corrupt
transmission.
If the application is very low and high margin (like a specialized lab instrument or
machine for a factory), then the disadvantage of the additional unit cost of the Arduino
can be outweighed by the reduction in development time. The Arduino can reduce the
amount of money it takes to get something in production and reduce the risk of having to
commit to the high volumes necessary for low-cost manufacturing.
Multiple RFID cards would not work on one device but were not recognized on another
device. You have to make sure to have 1 or 2 backup MFRC522. You can figure out why
one device would not read the tags when connected, you can swap it with one of backups
and it will start working. Keep in mind that the device that could not read the card still
works when connected on my breadboard. So maybe there is just too much interference
for that device.
In this phase of prediction, the RFID reader would read the RFID tag without knowing to the
user when the person comes in the range of the RC522 RFID reader and continue
operating further.
CHAPTER 8
TESTING
Software testing is the process of executing a program or application with the intent of
finding the software bugs. It can also be stated as the process of the validity and verifying
The FTR also serves to promote backup and continuity because a member of people
become familiar with the parts that they may not have otherwise seen. The FTR is
actually a set of reviews that includes walkthrough, inspection, etc. Each FTR is
conducted as a meeting and will be successful only if it is properly planned, controlled
and attended. In the section that follow, guideline similar to those for a walkthrough are
presented as a representative formal technical.
What is Testing?
Testing is the process of evaluating a system or its component(s) with the intent to find
whether it satisfies the specified requirements or not. In simple words, testing is
executing a system in order to identify any gaps, errors, or missing requirements in
contrary to the actual requirements.
Hardware testing is usually more detailed and thorough than verification. Testing is needed
to ensure that every component of a system is operating as it should, and that the
system is performing exactly in accordance with the specific local requirements.
A comprehensive structured testing program is one that ensures that all aspects of a system
are tested. This is especially important for key systems such as electronic voting systems.
Testing measures that could be followed include:
A TEST CASE is a set of conditions or variables under which a tester will determine
whether a system under test satisfies requirements or works correctly. The process
of developing test cases can also help find problems in the requirements or design of
an application.
Following are testcases for Smart Door Lock using RFID and Keypad Technology:
2.
Enter
valid
passw
ord.
2.
Enter
invalid
passw
ord.
CHAPTER 9
SNAPSHOTS
CONCLUSION
General purpose door locks using key have an issue of security and many more
general-purpose locks like these may face a problem dealing with security. Thus, two
steps verification locks get much more popular. So, it’s a need to replace the old system
with new and advance systems. Smart Door Lock will deal with providing more safe lock
to the door and minimize the security issue. It is very easy to use and its implementation
is also easy. The user can always have a concern with the system and feel safe. Incase of
loosing the first step verification card the user doesn’t have to worry about security as the
password level protection will not be asked and to open your door you will have to create
a new card and grant the permissions to it. So, this door lock will prove to provide more
security than any other general-purpose locks.
Currently, the system is developed for providing two step authentications. As this
is starting of this kind of initiative, majority of uses, “Security” is considered as first
choice. For the future development of this project we will maintain a universal keypad for
ease of use to the user as in this system if you lose your RFID permission granted card
you will not be able to open your door. By using the Universal keypad technology in this
system, we will add a password through which you can open your door by entering that
password and you will not require your card. We can add more functionality to the door
lock like using GSM module to inform the user about the security status. The user can
open and close the door by giving command “open” and “close” using their android
device. Universal keypad module can be implemented in the existing system.
SCOPE
BIBILIOGRAPHY
[1] Aman Pathak1, Utakarsh Sundaram2, Smart Locking System for Homes, International
Science Press, 2016.
[2] Dhrubajyoti Adak1, Manoj Kumar Pain2, Uttam Kumar Dey3, RFID BASED
SECURITY SYSTEM USING ARDUINO MODULE, International Journal of
Scientific and Engineering Research, Volume 8, Issue 3, March-2017.
[3] Lia Kamelia, Mufid Ridlo Effendi, Integrated Smart Housr Security System Using
Sensors and RFID, IEEE 2018
[4] Karabi Deka, Raktim Jyoti Gogoi, Design a RFID Technology Based Door Security
System Using GSM Module, International Journal of Advaced Research in
Electrical, Electronics and Instrumental Engineering, Vol.6, July 2017.
[5] Md.Makasudur Rahman, Dr.Mohammed Sowket Ali, Password Protected Electronic
Lock System for Smart Home Security, International Journal of Engineering
Research & Technology, Vol.7,April 2018.
[6] Gyanendra K Verm, Pawan Tripathi, A Digital Security System with Door Lock
System Using RFID Technology, International Journal of Computer Applications,
Vol.5, August 2010.
[7] Janaki Venukumar1, Naveen.S2, Arduino Based Door Access Control, International
Journal of Research in Advent Technology, Vol.4, August 2018
[8] S.Umbarkar, G. Rajput, S. Halder, P. Harname and S. Mendgudle,
Keypad/Bluetooth/GSM Based Digital Door Lock Security System, International
Journal, Vol.137, July 2018
[9] Ni Ni San Hlaing | San San Lwin, Electronic Door Lock using RFID and
Password Based on Arduino IJTSRD, International Journal of Trend in Scientific
Research and Development, Vol.3, April 2019
[12] Panguluri Srinivasa Rao, Mohammed Ali Hussain, Ch.Sriharika ,Automatic Door
Unlock System Using IOTand RFID, International Journal of Innovative Technology
and Exploring Engineering, Vol.8, March 2019
[13] Orji EZ*, Oleka CV, Nduanya UI, Automatic Access Control System using
Arduino and RFID, Journal of Scientific and Engineering Research, Vol.5, Issue
2018
[14] Yong Tae Park Pranesh Sthapit Jae-Young Pyun, Smart digital door lock for
the home automation, Journal of Scientific and Engineering Research, Vol.6, Issue
2019
[15] Kalaimagal.R,Gowri Shankar.S, Abdhul Asif.N.S ,IOT Based Smart Door Locks,
National Conference on Innovative Research Trends in Computer Science and
Technology, Vol.4, Issue 2018
[17] Panguluri Srinivasa Rao, Mohammed Ali Hussain, Ch.Sriharika ,Automatic Door
Unlock System Using IOT and RFID, International Journal of Innovative
Technology and Exploring Engineering, Vol.8, March 2019
[18] Dr. Manish Kumar1, Dr. M Hanumanthappa2, Dr. T V Suresh Kumar3, Mr. Amit
Kumar Ojha4, Android Based Smart Door Locking System with Multi User and
Multi Level Functionalities, International Journal of Advanced Research in
Computer and Communication Engineering, Vol.5, October 2018
[19] Karan Khar, Electronic Door Lock using RFID, Journal Of Information,
Knowledge And Research In Electronics And Communication Engineering, Vol.4,
October 2019
[21] Pradnya Joshi, Shivani Mane, RFID Based Security System using Arduino
module, Conference paper, March 2019