Smart Door Locker Security System Using Iot: Asst Prof - Archana M, Gayathri G D, Jayabharathi R, Jayasudha I

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

SSRG International Journal of Computer Science and Engineering ( SSRG - IJCSE ) - Special Issue ICFTESH Feb 2019

SMART DOOR LOCKER SECURITY SYSTEM USING IOT


Asst Prof . Archana M , Gayathri G D, Jayabharathi R, Jayasudha I
Adhiyamaan College Of Engineering ,Hosur, India
Email id:archu2fly@gmail.com
gayathrigd2505@gmail.com,
jayabharathi101010@gmail.com,
jayasudha864@gmail.com.

ABSTRACT: Smart Door Locker Security System people that use mobile phones and the internet to
is a process for enhancing the quality of residents communicate with other people has increased
life by facilitating a secure environment. Since less dramatically to become one of the major means of
alertness worry on door locking system. So to communication. Smart phones have allowed people
overcome this problem, this project suggest the use to connect to the internet without the need for a
of Internet Of Things(IOT) to provide secure computer, while still offering the same
access only to the authenticated person then the functionality but through different means. With the
door will opens and light’s will on. The project is introduction of better hardware and better software,
aimed at developing an application for the smart phones have become powerful devices and
“optimized locking and unlocking a system using have become an important part of people’s daily
mega controller” Smart Door Locker Security lives. A major aspect is how the smart phone is
System playing a major role which benefits in able to connect and communicate with other
decreasing a work by managing some technologies. devices. For example, smart phones can be used as
It is used to transmit a signal to door from a mobile a mouse for a computer, or it can connect to the
by using wireless system. This lets the user to speakers of cars allowing consumers to play their
unlock a door from inside or outside a house with a own music. There are many applications of this
Wi-Fi range. The ideal purpose of the work is, if sort. A field that is recently gaining popularity is
the door is not locked in First floor or in any other home automation which can also use smart phones
floor, the user from ground floor they can open the as information or functionality hubs.
door from mobile phone or Laptop, which makes a The purpose of the system is to create
person to reduce its energy or save time. The major convenient and easy-to-use system for users. Smart
components of the system are Latest MEGA Board, Home Automation System plays a major role in
Servo Motor and Wi-Fi MODULE which forms helping reduce the work by using some
and develops an activity. The open source Software Technologies especially for children , old aged
and Hardware is used to complete a task. In case of people and physically challenged. The proposed
unauthenticated person the door will remain closed. work is to send a signal to door from a Computer or
It can also deliver alert message to the mobile Tablet or mobile devices by using wireless system.
device and alarmed when the door lock is This allows the user to lock and unlock a door from
physically damaged and any fire in the house. inside or outside a house with a Wi-Fi range
available. The ideal purpose of the work is, if the
door is not locked in First floor or in any other
1. INTRODUCTION floor, the user from ground floor they can open the
door or unlock the door from mobile phone or
Today, technology has become an integrated part Laptop, which makes a person to reduce its energy
of people's lives. It has, and continues to influence or save time. The major components of the system
many aspects of daily life and has allowed better are Latest mega Board, Servo Motor and Wi-Fi
social interaction, ease of transportation, the ability standard protocol for wireless communication
to indulge in entertainment and media and has which combines and forms an activity. The open
helped in the development in medicine. The source Software and Hardware with embedded
creation of many devices such as mobile phones device is used to give a complete task.
and computers have caused many people to rely on
technology to communicate with their friends, store
information such as pictures, movies, documents, 2. EXISTING SYSTEM
and music. The internet has become a common
interface that many devices use in order to simplify In RFID technology someone tries to open the
the daily life of many people. The Internet has locker it will be sensed and sends the indication
given people the ability to search for information, message to the user via GSM. Using Arduino Uno
store their own information in the cloud while also method, user will open your door only when the
giving them better ways of managing information. right password is entered and it will start beeping
From the time of its introduction, the amount of when a wrong password is entered. In fingerprint
method, the locker will be opened only when the

ISSN: 2348 - 8387 www.internationaljournalssrg.org Page 42


SSRG International Journal of Computer Science and Engineering ( SSRG - IJCSE ) - Special Issue ICFTESH Feb 2019

unique graphical security is drawn on the screen 5. DESIGN AND ARCHITECTURE


and also the pattern can be easily identified by
unknown person and that person can easily open
the locker without any exception from the user. Indoor light on
.
3. PROPOSED FEATURES
Camera LCD display
The wireless LAN module fixed on the board Alarm
receives the transmitted signal and transmits to the Notification
microcontroller. The microcontroller passes the Mega Buzzer
data to the servo motor in order to complete the
Wifi Module controller Indicator
operations on the Door. The working principles and
design of a full system is shown in our proposed
work. This proposed work system of design
Notification to
consists of four major components. They are mega
controller Board, Servo Motor and web page. the User GSM module Fire sense Relay
Optimized door locking and unlocking using
controller has modules like

• Controlling dc motor using controller


• Developing web page
• Pairing with a device
• Fire sensing and water spraying.

4.Hardware
Mega microcontroller

The Mega 2560 is a microcontroller board based on UART Wifi device


the ATmega2560 (datasheet). It has 54 digital Monitor
input/output pins (of which 14 can be used as
PWM outputs), 16 analog inputs, 4 UARTs Audio
Mobile
&video
(hardware serial ports), a 16 MHz crystal oscillator, convertor notifications
a USB connection, a power jack, an ICSP header,
and a reset button. It contains everything needed to
support the microcontroller; simply connect it to a
computer with a USB cable or power it with a AC
to-DC adapter or battery to get started. Fig 5.1.Architecture Diagram

Fire sensor:
In this project we are using an IR based fire
sensor. It is based on the YG1006 sensor which is
a high speed and high sensitive NPN silicon
phototransistor. It can detect infrared light with a
wavelength ranging from 700nm to 1000nm and its
detection angle is about 60°.

LCD (LIQUID CRYSTAL DISPLAY)

ISSN: 2348 - 8387 www.internationaljournalssrg.org Page 43


SSRG International Journal of Computer Science and Engineering ( SSRG - IJCSE ) - Special Issue ICFTESH Feb 2019

interaction point. The developed APIs can be seen


as the "delegate"-part and the Bluetooth beacons
can be interpreted as the "sensors". It was
important that the product followed this typical
infrastructure as we wanted our prototype to act
and behave like a common IoT-product.

ACKNOWLEGMENT

First, we would like to express our sincere


thanks to our beloved Principal Dr G.
RANGANATH, M.E, Ph.D., for providing
various facilities to carry out this project.
We are highly indebted to Dr G.
FATHIMA M.E, Ph.D., Head of the Department,
Department of Computer Science and Engineering,
Adhiyamaan College of Engineering, Hosur, for
her guidance and valuable comments received
through our project.
We are grateful to Mrs.M.ARCHANA
M.E., Assistant Professor, Department of
Computer Science and Engineering, Adhiyamaan
College of Engineering, for his valuable guidance
throughout our project
Finally, we would like to thank our all
teaching, non-teaching staff of the college and
friends for their moral support rendered during the
course of the project work and for their direct and
indirect involvement in the completion of our
project work, which made our endeavor fruitful.

REFERENCES

1. Assaf MH, Mootoo R, Das SR, Emil M, Petriu,


Groza V,Biswas S. Sensor based home
automation and security system. IEEE
5. CONCLUSION International Instrumentation and
Measurement Technology Conference
Internet of things is one of the hugest revolutions in (I2MTC). 2012 May. p. 722–7.
2. B. R. Pavithra, D., “ Iot based monitoring and
the technological field. It is the concept that control system for homeautomation,” pp. 169 –
describes the idea of connecting everyday physical 173, April 2015.
objects to the internet trying to digitalize it. As we 3. Hteik Htar Lwin, Aung Soe Khaing, Hla Myo
mentioned before it is expected to have more than Tun, “Automatic Door Access System Using
18 billion devices connected . The risks we are Face Recognition”, International Journal of
facing are the security aspects when connecting Scientific & Technology Research Volume 4,
these devices and applications to the internet. The Issue 06, June 2015.
problem is that each of these devices and 4. J. Shankar Kartik, K. Ram Kumar and V.S.
Srimadhavan3, “SMS Alert and Embedded
applications have it is own security gaps that
Network Video Monitoring Terminal”,
should be considered making it hard to standardize International Journal of Security, Privacy and
the security aspects in all the devices. Trust Management ( IJSPTM), Volume 2,
October 2013.
Understanding the basics principles of IoT 5. Motion Based Security Alarming System for
architectures is a must when developing a product Video Surveillance.
that is going to interact with the nearby
environment. The product of this thesis is a fully
functional smart door application. This system
follows the typical IoT infrastructure Where the
smart phone application works as the user-centric

ISSN: 2348 - 8387 www.internationaljournalssrg.org Page 44

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy