0% found this document useful (0 votes)
231 views51 pages

Smart Door Locking System Based On OTPFinal Doc

This document describes a major project report on a smart door locking system based on one-time passwords (OTPs). The system was developed by 4 students under the guidance of a faculty member at Balaji Institute of Technology and Science. It uses a NodeMCU microcontroller to connect an Android application to a door lock via WiFi. When the correct OTP is entered into the app, it will send a signal to unlock the door, improving home security and management of door access. The report outlines the existing problems with traditional locks, the proposed smart locking system, technical feasibility analysis, software and hardware requirements, system design diagrams, technologies used, screenshots and future enhancements.

Uploaded by

md amaan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
231 views51 pages

Smart Door Locking System Based On OTPFinal Doc

This document describes a major project report on a smart door locking system based on one-time passwords (OTPs). The system was developed by 4 students under the guidance of a faculty member at Balaji Institute of Technology and Science. It uses a NodeMCU microcontroller to connect an Android application to a door lock via WiFi. When the correct OTP is entered into the app, it will send a signal to unlock the door, improving home security and management of door access. The report outlines the existing problems with traditional locks, the proposed smart locking system, technical feasibility analysis, software and hardware requirements, system design diagrams, technologies used, screenshots and future enhancements.

Uploaded by

md amaan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 51

INDUSTRY ORIENTED MAJOR PROJECT REPORT

ON
SMART DOOR LOCKING SYSTEM BASED ON OTP
Submitted in Partial Fulfillment of the Requirements for
The Award of
BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE & ENGINEERING
BY
K.SAIKRISHNA (19C31A0520)
S.NAVYASHRI (19C31A0554)
N.PREETHI (19C31A0538)
MD.AKTHARALI (19C31A0535)

UNDER THE GUIDANCE OF


Mr.J.Chaitanya
Assistant Professor, Department of CSE

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

BALAJI INSTITUTE OF TECHNOLOGY AND SCIENCE


Accredited by NBA (UG-CE,ECE,ME,CSE,EEE Programs) & NAAC A+ Grade
(Affliated to JNTU Hyderabad and Aprroved by the AICTE, New Delhi)
NARSAMPET, WARANGAL – 506331.

i
BALAJI INSTITUTE OF TECHNOLOGY & SCIENCE
Accredited by NBA (UG-CE,ECE,ME,CSE Programs) & NAAC A+ Grade
(Affliated by JNTU Hyderabad and Approved by the AICTE, New Delhi)
NARSAMPET, WARANGAL – 506331.
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

CERTIFICATE
This is to certify that K. SAI KRISHNA (19C31A0520),
S. NAVYASHRI (19C31A0554), N. PREETHI (19C31A0538) and
MD. AKTHAR ALI (19C31A0535) of B. Tech IV–II Sem has satisfactorily
completed the Major Project entitled “SMART DOOR LOCKING SYSTEM
BASED ON OTP”, as part of curriculum in Computer Science Engineering during
academic year 2022-2023.

Name of Supervisor Head of Department

Mr. J. Chaitanya Mr. Fazi Ahmed Parvez


Assistant Professor Associate Professor
Department of CSE Head of Department of CSE
BITS, Narsampet-506331 BITS, Narsampet-506331

External Examiner

ii
ACKNOWLEDGEMENT

We would like to express our sincere gratitude to our guide, Mr. J. Chaitanya
whose knowledge and guidance have motivated us to achieve goals. We never thought
possible. He has consistently been a source of motivation, encouragement and
inspiration. The time we have spent working under his supervision has truly been a
pleasure.

We thank our HoD, Mr. Fasi Ahmed Parvez of his effort and guidance and all
senior faculty members for their help during our course. Thanks to programmers
and non-teaching staff of CSE Department of our college.

We heartily thank to our Principal Dr. V. S. HARIHARAN for giving this great
opportunity and his support to complete our project.

We would to appreciate the guidance given by project coordinator as well as the


panels especially in our project presentation that has improved our presentation skills
by their comment and tips.

Finally Special thanks to our parents for their support and encouragement
throughout our life and this course. Thanks to all my friends and well-wishers for their
constant support.

K. SAI KRISHNA 19C31A0520


S. NAVYASHRI 19C31A0554
N. PREETHI 19C31A0538
MD.AKTHAR ALI 19C31A0535

iii
ABSTRACT
Today’s world is a smart world we live in and Smart Phones have a major
contribution in it. A smart phone is now a very common device that everyone carries
with them all the time. Smart phones have enabled us to perform various tasks while
using a single device. Considering this phenomenon we can exploit the idea of remote-
controlling a door with the help of a smart phone. Physical keys and a lock are the basic
requirements for a door. However managing these keys has become cumbersome. To
overcome this, we present a solution which is a smart and a secure way of remote-
controlling the door using a smart phone. This project consist of a door locking system
which provides a great solution to improve the home safety management of doors.
Arduino IDE software and a wi-fi were used to connect between the smartphone, the
microcontroller and the door lock to give an easy access to authorized persons. The
person with the authority to open the door can have access within their fingertips by
installing the required application which has open/close button

KEYWORDS: 1.Node MCU, 2.Android App, 3.Smart Phone

iv
TABLE OF CONTENTS

S.NO. CONTENTS PAGENO.

1. Introduction 1

1.1 Introduction 1

1.2 Purpose 2

2. System Analysis 3

2.1 Introduction 3

2.2 Analysis Model 3

2.3 Modules of the System 4

2.4 Existing System 5

2.5 Proposed System 6

3. Feasibility Study 8

3.1 Technical Feasibility 8

3.2 Operational Feasibility 9

3.3 Economical Feasibility 10

4. Software Requirement Specification 12

4.1 Functional Requirements 12

4.2 Non-Functional Requirements 12

4.3 Performance Requirements 14

4.4 Hardware Requirements 15

4.5 Software Requirements 17

v
5. System Design 19

5.1 Introduction 19

5.2 UML Diagrams 19

6. Technology Description 22

7. Screenshots 31

8. Testing 37

8.1 Introduction 37

8.2 Strategic approach for Software Testing 37

8.3 Unit Testing 38

9. Future Enhancements 42

10. Conclusion 43

11. BIBILIOGRAPHY 44

vi
ABBREVIATIONS

S.NO. Acronym Abbreviation

1. NODEMCU Node Micro Controller Unit

2. OTP One Time Password

3. GSM Global System for Mobile Communication

4. DTMF Dual Tone Multi Frequency

5. IoT Internet of Things

6. IDE Integrated Developed Environment

7. PIN Personal Identification Number

8. SPI Success Rate

9. BaaS Backend as a Service

10. SDK Software Development Kit

11. SoC System on Chip

12. DC Direct Current

13. IR Sensor Infrared Sensor

vii
SMART DOOR LOCKING SYSTEM BASED ON OTP

1.INTRODUCTION
1.1 Introduction
Smart door locking system based on OTP is designed using NodeMCU where
in once the correct code or password is entered, the lock is unlocked, and the concerned
person is allowed access to the secured area. Smart door locking system based on OTP
using NodeMCU is a simple project where a secure password will act as a door
unlocking system. Old fashioned lock systems use mechanical locking and these can be
replaced by new advanced techniques of locking systems. These methods are a
combination of mechanical and electronic devices and are highly intelligent. One of the
distinct features of these intelligent lock systems is their simplicity and high efficiency.
Such an automated lock system consists of electronic control assembly, which controls
the output load through a password.

With the rapid increase in the proportion of single households, vulnerability to


crime is emerging as a new social problem. Especially as a new social problem.
Especially for single female families, the anxiety of stranger visitors is known as the
biggest problem. In this project, we propose an OTP-based IoT door-lock system to
enhance the security of digital door-locks. The system consists of a door-lock with
features such as OTP password generation, lock remote control, door lock control and
event logging.

The example of this output load can be a motor or a lamp or any other
mechanical/electrical load. Here, we made an electronic code lock system using
NodeMCU, which provides control to the actuating the load. It is a simple embedded
system which takes input from the application and the output being actuated
accordingly. This system demonstrates Smart door locking system based on OTP using
NodeMCU, wherein once the correct code or password is entered, the door is opened
and the concerned person is allowed access to the secured area. If another person
arrives, it will ask to enter the password again. If the password is wrong, then door
would remain locked, denying access to the person.

Smart door locking system based on OTP using NodeMCU. It can generate a
new password every time you try to unlock it, which gives you extra security.

1
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

1.2 Purpose
A key-based locking system has now become outdated because if your key is
lost or stolen, it creates a huge problem. Also, the electronic wireless locking system is
not that safe because you might forget your password, or it might get stolen by others
while entering the password on your device. So, we can make a DIY smart lock that
has the capability to remove all these security threats and problems.

Instead of a key, this type of lock system requires a numerical code to grant
entry to a facility or property. The code is punched in by users via a numerical pad,
similar to those on a basic calculator. If the correct code is entered, the door lock or
deadbolt should release. The biggest advantage is convenience. It eliminates the
necessity of keys. There’s no need to carry them around, keep track of copies and spares,
or change locks when a key is stolen or misplaced. Children, guests and service
providers can be given their own code or a temporary code, rather than a key.

Keypad locks have a different hardware design than other types of locks. They
don’t have cylinder mechanisms, so they essentially cannot be picked or bumped like
conventional locks. This keeps the building more secure. Instead of risking losing keys
and having to rekey or change out the lock. With a keypad system, it’s easy to change
the security pin code whenever necessary. Traditional keys and locks wear down over
time; it becomes more difficult to get it to turn and function properly. Keypads are much
more durable than conventional locks. A high-quality lock and keypad device should
last longer with standard hardware. Many property owners think that if they want to
install a keypad lock, they’ll have to make major adjustments to door or frames. That’s
not true. In most cases, keypad locks can be easily, installed on standard doors, just like
any standard lock. Mechanical and battery-powered keypad locks are available which
don’t require connection to a power source.

2
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

2. SYSTEM ANALYSIS

2.1 Introduction
After analysing the requirements of the task to be performed, the next step is to
analyse the problem and understand its context. The first activity in the phase is
studying the existing system and other is to understand the requirements and domain of
the new system. Both the activities are equally important, but the first activity serves as
a basis of giving the functional specifications and then successful design of the
proposed system. Understanding the properties and requirements of a new system is
more difficult and requires creative thinking and understanding of existing running
system is also difficult.

2.2 Analysis Model


The Model that is basically being followed is the WATERFALL MODEL, which
states that the phases are organized in a linear order. First of all the feasibility study is
done. Once that part is over the requirement analysis and project planning begins. If
system exists one and modification and addition of new module is needed, analysis of
present system can be used as basic model. The design starts after the requirement
analysis is complete and the coding begins after the design is complete. Once the
programming is completed, the testing is done. In this model the sequence of activities
performed in a software development project are:

➢ Requirement Analysis
➢ Project Planning
➢ System design
➢ Coding
➢ Unit testing
➢ System integration & testing

Here the linear ordering of these activities is critical. End of the phase and the
output of the one phase is the input of another phase. Some of the qualities of spiral
model are also incorporated like after the people concerned with the project review
completion of each of the phase the work done. WATERFALL MODEL was being

3
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

chosen because all requirements were known beforehand and the objective of our
software development is the online house rental system.

Fig: Waterfall Model

2.3 Modules of the System


The system after careful analysis has been identified to be presented with the
following modules:

The modules involved are:

• Administration
• User

Admin Module

Admin module allows system administrator to set up back-end of the system


and perform basic system configuration, mainly definition of predefined password,
definition of time schedule, etc. Part of the admin set up is users management which
allows users to be set up with definable access level/roles, access to single or multiple
branches. Admin can also set up overall system security settings such as required
password strength, inactive session time out, inactive accounts lock out, password reset,
etc.

4
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

User Module

The user module allows users to use the functionality of the system. The
administrator will give the password details to the user and the user can make the use
of it. By using the password the user can access the door.

2.4 Existing System


There are many automated advanced door locking system has been developed
and it’s popularly used in commercial buildings and organization. Some of these
automated doors locking system are based on RFID (Radio Frequency Identification).
The RFID cards are used as a key. The RFID card reader detects and validates the user
accessibility. When the card is brought near the reader, it identifies the radio frequency
of the card and thus verifies the key. However, these systems are expensive. Various
control systems have been designed over the years to prevent access to unauthorized
user. The main aim for providing locks for our home, school, office, and building is for
security of our lives and property. It is therefore important to have convenient way of
achieving this goal. Automatic door locking system has become a standard feature on
many different types of buildings and homes. With this proposed system the
implementation cost is less and affordable by a common user.

Disadvantages

Basically, a traditional locks or mechanical locks - that is, they operate by


human. Just put the key in the lock and turn the key clockwise or anticlockwise to open
as the door lock will open. Locks of traditional door locks include lock cylinder, lock
and key lock. When user inserts the key into the correct drive, the locking levers will
move to lift the locking piece. It will allow the key to rotate in the direction; if the key
does not fit the lock or the wrong position, the saw tooth components are not. Fits
together, the key does not spin and cannot unlock.

5
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

2.5 Proposed System


Nowadays security is the main concern. Each and every individual needs to feel
secure. The main entrances, lockers, cabinets, etc should be protected with some kind
of security systems. Doors locked using the conventional locks not as safe as they used
to be in the past, nowadays anyone can easily break-in by breaking these locks.

The password-based door lock system allows only authorized persons to access
the restricted areas. This smart lock can generate a new password every time you unlock
it, which further enhances your security level. This new device is much safer than the
traditional key-based system and electronic wireless lock system. If you are still using
the key-based system, you are likely to land in a big problem if your key gets lost or
stolen. The electronic wireless lock system is not safe either. You might forget the
password and there is also a high risk being hacked.

This is a one-time password (OTP) based smart locking system using Arduino
and Bluetooth. It can generate a new password every time you try to unlock it, which
gives you extra security. A key-based locking system has now become outdated because
if your key is lost or stolen, it creates a huge problem. Also, the electronic wireless
locking system is not that safe because you might forget your password, or it might get
stolen by others while entering the password on your device.

Advantages

Keyless entry and exit


This is surely one of the most prominent advantages of using a keypad lock.
They work just like an ATM machine, where you just need to punch in your secret code
combination to lock or unlock the doors. One no longer needs to worry about
misplacing their keys, since the security code can be shared by the homeowner with
any number of people.

Enhanced Home Security


The state of the art technology of the security locks makes it impossible for
intruders to break into your home. Moreover, one can forget about their keys falling
into the wrong hands. When you have a keypad lock at your home, anyone wishing to
enter will need to know the security code.

6
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

Changable entry codes

In case security code is known by unauthorized people, can always choose to


change code combination in a jiffy. In addition, if shifting or renting property, need not
to change the locks; all you need to do is notify your tenants of the access code.

Unique designs

One can choose from a while range of electronic locks to suit their individual
requirements, taste and everyday lifestyle. You can find a wide array of lock designs,
ranging from the traditional to the futuristic and minimalistic ones. Moreover, the high
tech designs of these locks make it much harder to copy than traditional options. A
machine for duplicating this kind of locks has not yet been invented.

Durability

The keypad locks come with a superior level of durability. Unlike traditional
locks, they never get worn out or malfunction. The fact that these locks don’t need to
sustain the constant friction of turning and inserting keys makes it a much more durable
option. When it comes to security, convenience and ease of use, nothing can beat the
advantages that a keypad lock has to offer.

7
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

3. FEASIBILITY STUDY

Feasibility study is a high-level capsule version of the entire process intended


to answer a number of questions like: What is the problem? Are there any feasible
solutions to the given problem? Is the problem even worth solving? Feasibility study is
conducted once the problem is clearly understood. Feasibility study is necessary to
determine that the proposed system is feasible by considering the technical,
Operational, and Economical factors. By having a detailed feasibility study the
management will have a clear-cut view of the proposed system.

Preliminary investigation examines project feasibility, the likelihood the


systems will be use full to the organization. The main objective of the feasibility is to
test the Technical, Operational, Economical feasibility if they are unlimited resources
and infinite time. The following feasibilities are considered for the project in order to
ensure that the project is variable and it does not have any major obstructions.
Feasibility study encompasses the following thing:

1. Technical Feasibility

2. Operational Feasibility

3. Economical Feasibility

3.1 Technical Feasibility

Technical feasibility is one of the first studies that must be conducted after the
project has been identified. In large engineering projects consulting agencies that have
large staffs of engineers and technicians conduct technical studies dealing with the
projects. For example, In individual agricultural projects financed by local agricultural
credit corporations, the technical staff composed of specialized agricultural engineers,
irrigation and construction engineers, and other technicians are responsible for
conducting such feasibility studies.

8
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

The First step in the feasibility stage, Technical Feasibility, involves


development of a working model of the product or service. It is not necessary that the
initial materials and components of the working model represent those that actually will
be used in the finished product or service. The purpose of the working model is to
demonstrate, to your own satisfaction, that the product or service is functional and
producible. It also provides a visual means to share your concept with others. The
concept of a mechanical working model is easier to grasp and understand than software,
ecommerce or service-related products. E-commerce models require verification of the
ability to integrate the computers, servers, software and programming needed to support
the operational concept. Services, packaged as a set of value-added activities, should
deliver observable benefits.

• A brief description of the business to assess more possible factors which could
affect the study.
• All necessary technology exists to develop the system.
• This system is too flexible and it can be expanded further.
• This system can give guarantees of accuracy, ease of use, reliability and the data
security.
• This system can give instant response to inquire.
• The human and economic factor.
• The possible solutions to the problem.

The technical feasibility assessment is focused on gaining an understanding of


the present technical resources of the organization and their applicability to the expected
needs of the proposed system. It is an evaluation of the hardware and software.

3.2 Operational Feasibility

Operational feasibility assesses the extent to which the required software


performs a series of steps to solve business problems and user requirements. This
feasibility is dependent on human resources (software development team) and involves
visualizing whether the software will operate after it is developed and be operative once
it is installed.

9
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

In this step, we verify different operational factors of the proposed system like
man-power, time etc, whichever solution uses less operational resources, is the best
operationally feasible solution. The solution should also be operationally possible to
implement. Operational Feasibility determines if the proposed system user objectives
could be fitted into the current system operation.

Operational feasibility also performs the following tasks:

• Determines whether the problem anticipated in user requirements are of high


priority.
• Determines whether the solution suggested by the software development team
is acceptable.
• Analyse whether users will adapt to a new software.
• Determines whether the organization is satisfied by the alternative solutions
proposed by the software development team.
• The methods of proposing and presentation are completely accepted by the
clients since they can meet all user requirements.
• The clients have been involved in the planning and development of the system.
• The proposed system will not cause any problem under any circumstances. Our
project is operationally feasible because the time requirements and personal
requirements are satisfied.

3.3 Economical Feasibility

Economic feasibility determines whether the required software is capable of


generating financial gains for an organization. It involves the cost incurred on the
software development team, estimated cost of hardware and software, cost of
performing feasibility study and so on.

Economically, this project is completely feasible because it requires no extra


financial investment and with respect to time, it’s completely possible to complete this
project in 6 months. In this step, we verify which proposal is more economical. We
compare the financial benefits of the new system with new investment.

10
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

The new system is economically feasible only when the financial benefits are
more than the investments and expenditure. Economic feasibility determines whether
the project goal can be within the resource limit allocated to it or not. It must determine
whether it is worthwhile to process with the entire project or whether the benefits
obtained from the new system are not worth the costs. Financial benefits must be equal
or exceed the costs.

Software is said to be economically feasible if it focuses on the issues listed below.

• Cost incurred on software development to produce long-term gains for an


organization.
• Cost required conducting full software investigation (such as requirements
elicitation and requirements analysis).
• Cost of hardware, software, development team, and training.
• The cost to conduct a full system investigation.
• The cost of hardware and software for the class of application being considered.
• The development tools.
• The cost of maintenance etc. Our project is economically feasible because the
cost of development is very minimal when compared to financial benefits of the
application.

11
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

4. SOFTWARE REQUIREMENT SPECIFICATION


The main purpose for preparing this document is to give a general insight into
the analysis and requirements of the existing system or situation and for determining
the operating characteristics of the system. This document plays a vital role in the
development life cycle and it describes the complete requirement of the system. It is
meant for use by the developers and will be the basic during testing phase. Any changes
made to the requirements in the future will have to go through formal changes and
approval process.

4.1 Functional Requirements

We should react to particular inputs, and how the system should behave in
particular situations, it specifies the application functionality that the developers must
build into the product to enable users to accomplish their tasks. switch on your Smart
door locking system based on OTP system and follow the steps given below:

1. Open the installed OTP_Smartlock app and connect it with the system
2. Touch on the send OTP button
3. On successful connection, you will receive an OTP to the registered mobile.
4. On successful entry of OTP, you will be able to lock and unlock the door.
5. And you will also be able to setup IR Lock and also the Buzzer.

4.2 Non-Functional Requirements

Access Security

The extent to which the system is safeguarded against deliberate and intrusive faults
from internal and external sources.

Accessibility

The extent to which the software system can be used by people with the widest range
of capabilities to achieve a specified goal in a specified context of use.

12
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

Availability

The degree to which users can depend on the system to be up (able to function) during
“normal operating times”.

Confidentiality

The degree to which the software system protects sensitive data and allows only
authorized access to the data.

Efficiency

The extent to which the software system handles capacity, throughput, and response
time.

Integrity

The degree to which the data maintained by the software system are accurate, authentic,
and without corruption.

Reliability

The extent to which the software system consistently performs the specified functions
without failure.

Safety

The degree to which a software system prevents harm to people or damage to the
environment in the intended context of use.

Survivability

The extent to which the software system continues to function and recovers in the
presence of a system failure.

Usability

The ease with which the user is able to learn, operate, prepare inputs, and interpret
outputs through interaction with a system.

13
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

Flexibility

The ease with which the software can be modified to adapt to different environments,
configurations, and user expectations.

Maintainability

The ease with which faults in a software system can be found and fixed.

Modifiability

The degree to which changes to a software system can be developed and deployed
efficiently and cost effectively.

4.3 Performance Requirements

Performance requirements are the requirements that are not directly concerned
with the specific services delivered by the system to its users. They may define
constraints on the system implementation such as the capabilities of input devices or
the data representation used in interfaces with other system.

Security

The system should provide a high level of security and integrity of the data and
only authorized persons can gain access to the system; and only users with valid
password can open the lock. The person will fail to unlock the door if the person
provides the wrong password. So this project will enhance the security concerns to
higher level. In traditional door lock system, we will be using a physical key to unlock
a door. But there is a probability where the key may be missed or a thief can theft it.
Hence, usage of digital door lock will avoid all these issues and will provide more
security.

Access Permission

The Arduino will contain the predefined secured password. The person who
enters the correct password which matches with the password stored in Arduino will be
given the access to open the door. The password entered by a person if not matches with
the password stored in the Arduino will not be given the access to unlock the door.

14
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

Maintainability

The system shall provide the capability to work efficiently and the time must be
required less for processing the request. The maintenance of this project is pretty easy
and cost effective which can be affordable by most of the people.

Reliability

The system shall be available 99.9% of the time.

Performance

The system should have high performance rate when executing user’s input and
should be able to provide process the request on time. The door must be lock or unlock
on time by taking limited period of time. The performance of this project will be at
higher levels.

4.4 Hardware Requirements

The section of hardware configuration is an important task related to the software


development that may affect adversely on the speed and efficiency of the entire system.
The process should be powerful to handle the entire operations.

List of components

➢ NodeMCU
➢ IR Sensor
➢ Servo Motor
➢ Buzzer

15
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

Node MCU:
The NodeMCU (Node MicroController Unit) is an open source software and hardware
development environment that is built around a very inexpensive System-on-a-Chip
(SoC) called the ESP8266.

IR Sensor:

IR sensor is an electronic device, that emits the light in order to sense some object of
the surroundings.

Servo Motor:

A servo motor is a type of motor that can rotate with great precision. Normally
this type of motor consists of a control circuit that provides feedback on the current
position of the motor shaft, this feedback allows the servo motors to rotate with great
precision.

16
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

Buzzer:

The buzzer is a sounding device that can convert audio signals into sound
signals. It is usually powered by DC voltage.

4.5 Software Requirements

A major element in building a system is the section of compatible software since


the software in the market is experiencing in geometric progression. Selected software
should be acceptable by the user and as well as it should be feasible for the system.This
document gives a detailed description of the software requirement specification. The
study of requirement specification is focused specially on the functioning of the system.
It allows the developer or analyst to understand the system, function to be carried out
the performance level to be obtained and corresponding interfaces to be established.

Arduino IDE The open-source Arduino software (IDE) makes it easy to write
code and upload it to the board. This software can be used with any Arduino. The
Arduino Integrated Development Environment - or Arduino Software (IDE) - contains
a text editor for writing code, a message area, a text console, a toolbar with buttons for
common functions and a series of menus. It connects to the Arduino and Genuine
hardware to upload programs and communicate with them. Programs written using
Arduino Software (IDE) are called sketches. These sketches are written in the text editor
and are saved with the file extension.ino. The editor has features for cutting/pasting and
for searching/replacing text.

17
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

The open-source Arduino software (IDE) makes it easy to write code and upload
it to the board. This software can be used with any Arduino. The Arduino Integrated
Development Environment - or Arduino Software (IDE) - contains a text editor for
writing code, a message area, a text console, a toolbar with buttons for common
functions and a series of menus. It connects to the Arduino and Genuine hardware to
upload programs and communicate with them. Programs written using Arduino
Software (IDE) are called sketches. These sketches are written in the text editor and are
saved with the file extension.ino. The editor has features for cutting/pasting and for
searching/replacing text.

Android application

This application is useful for generating the different one-time passwords every
time. The installed OTP Smart lock app when opened. On successful tapping of send
OTP button, it will show a OTP message on the app. Then an OTP will be received in
the app next to the key icon. Touch the lock icon and enter OTP in the text bar. If
everything is fine, the servo motor will move to unlock the lock.

18
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

5. SYSTEM DESIGN

5.1 Introduction

Software design sits at the technical kernel of the software engineering process
and is applied regardless of the development paradigm and area of application. Design
is the first step in the development phase for any engineered product or system. The
designer’s goal is to produce a model or representation of an entity that will later be
built. Beginning, once system requirement have been specified and analysed, system
design is the first of the three technical activities design, code and test that is required
to build and verify software.

During design, progressive refinement of the data structure, program structure,


and procedural details are developed reviewed and documented. System design can be
viewed from either technical or project management perspective. From the technical
point of view, design is comprised of four activities – architectural design, data structure
design, interface design and procedural design.

5.2 UML diagrams

A UML diagram is a diagram based on the UML (Unified Modeling Language)


with the purpose of visually representing a system along with its main actors, roles,
actions, artifacts or classes, in order to better understand, alter, maintain, or document
information about the system. Simply put, UML is a modern approach to modeling and
documenting software. In fact, it’s one of the most popular business process modelling
techniques.

It is based on diagrammatic representations of software components. As the old


proverb says: “a picture is worth a thousand words”. By using visual representations,
we are able to better understand possible flaws or errors in software or business
processes.

19
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

Use Case

A use case diagram at its simplest is a representation of a user’s interaction with


the system that shows the relationship between the user and the different use cases in
which the user is involved

Fig: Use Case Diagram

Class

Class diagram consists of classes, interfaces, associations, and collaboration.


Class diagrams basically represent the object-oriented view of a system, which is static
in nature. The class diagram depicts a static view of an application. It represents the
types of objects residing in the system and the relationships between them. A class
consists of its objects, and also it may inherit from other classes. A class diagram is used
to visualize, describe, document various different aspects of the system, and also
construct executable software code.

20
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

It shows the attributes, classes, functions, and relationships to give an overview


of the software system. It constitutes class names, attributes, and functions in a separate
compartment that helps in software development. Since it is a collection of classes,
interfaces, associations, collaborations, and constraints, it is termed as a structural
diagram.

Fig: Class diagram

Activity

An activity diagram is a behavioural diagram i.e. it depicts the behaviour of a


system. An activity diagram portrays the control flow from a start point to a finish
point showing the various decision paths that exist while the activity is being
executed.

Fig: Activity Diagram

21
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

6.TECHNOLOGY DESCRIPTION

Arduino IDE

The Arduino Integrated Development Environment - or Arduino Software (IDE)


- contains a text editor for writing code, a message area, a text console, a toolbar with
buttons for common functions and a series of menus. It connects to the Arduino and
Genuino hardware to upload programs and communicate with them.

• Arduino IDE is an open source software that is mainly used for writing and
compiling the code into the Arduino Module.
• It is an official Arduino software, making code compilation too easy that
even a common person with no prior technical knowledge can get their feet
wet with the learning process.
• It is easily available for operating systems like MAC, Windows, Linux and
runs on the Java Platform that comes with inbuilt functions and commands
that play a vital role for debugging, editing and compiling the code in the
environment.
• A range of Arduino modules available including Arduino Uno, Arduino
Mega, Arduino Leonardo, Arduino Micro and many more.
• Each of them contains a microcontroller on the board that is actually
programmed and accepts the information in the form of code.
• The main code, also known as a sketch, created on the IDE platform will
ultimately generate a Hex File which is then transferred and uploaded in the
controller on the board.
• The IDE environment mainly contains two basic parts: Editor and Compiler
where former is used for writing the required code and later is used for
compiling and uploading the code into the given Arduino Module.

Download the IDE

First, download the IDE and install it. The IDE is available for most common
operating systems, including Windows, Mac OS X, and Linux, so be sure to download
the correct version for your OS. Once the installer has downloaded, go ahead and install
the IDE.
22
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

The Arduino IDE

The Arduino IDE is incredibly minimalistic, yet it provides a near-complete


environment for most Arduino-based projects. The top menu bar has the standard
options, including “File” (new, load save, etc.), “Edit” (font, copy, paste, etc.), “Sketch”
(for compiling and programming), “Tools” (useful options for testing projects), and
“Help”. The middle section of the IDE is a simple text editor that where you can enter
the program code. The bottom section of the IDE is dedicated to an output window that
is used to see the status of the compilation, how much memory has been used, any errors
that were found in the program, and various other useful messages.

Projects made using the Arduino are called sketches, and such sketches are
usually written in a cut-down version of C++ (a number of C++ features are not
included). Because programming a microcontroller is somewhat different from
programming a computer, there are a number of device-specific libraries (e.g., changing
pin modes, output data on pins, reading analog values, and timers). This sometimes
confuses users who think Arduino is programmed in an “Arduino language.” However,
the Arduino is, in fact, programmed in C++. It just uses unique libraries for the device.

23
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

Writing Sketches

Programs written using Arduino Software (IDE) are called sketches. These
sketches are written in the text editor and are saved with the file extension .ino. The
editor has features for cutting/pasting and for searching/replacing text. The message
area gives feedback while saving and exporting and also displays errors. The console
displays text output by the Arduino Software (IDE), including complete error messages
and other information. The bottom right hand corner of the window displays the
configured board and serial port. The toolbar buttons allow you to verify and upload
programs, create, open, and save sketches, and open the serial monitor.

• The main code, also known as a sketch, created on the IDE platform will
ultimately generate a Hex File which is then transferred and uploaded in
the controller on the board.
• The IDE environment mainly contains two basic parts: Editor and
Compiler where former is used for writing the required code and later is
used for compiling and uploading the code into the given Arduino
Module.
• This environment supports both C and C++ languages.

It includes following:

Upload: Compiles your code and uploads it to the configured board

New: Creates a new sketch.

Open: Presents a menu of all the sketches in your sketchbook.

Save: Saves your sketch.

Serial Monitor: Opens the serial monitor.

24
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

Additional commands are found within the five menus: File, Edit, Sketch, Tools, Help.
The menus are context sensitive, which means only those items relevant to the work
currently being carried out are available.

File

• New
Creates a new instance of the editor, with the bare minimum structure of a sketch
already in place.
• Open
Allows to load a sketch file browsing through the computer drives and folders.
• Open Recent
Provides a short list of the most recent sketches, ready to be opened.
• Sketchbook
Shows the current sketches within the sketchbook folder structure; clicking on
any name opens the corresponding sketch in a new editor instance.
• Examples
Any example provided by the Arduino Software (IDE) or library shows up in
this menu item. All the examples are structured in a tree that allows easy access
by topic or library.
• Close
Closes the instance of the Arduino Software from which it is clicked.
• Save
Saves the sketch with the current name. If the file hasn't been named before, a
name will be provided in a "Save as.." window.
• Save as
Allows to save the current sketch with a different name.
• Page Setup
It shows the Page Setup window for printing.
• Print
Sends the current sketch to the printer according to the settings defined in Page
Setup.

25
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

• Preferences
Opens the Preferences window where some settings of the IDE may be
customized, as the language of the IDE interface.
• Quit
Closes all IDE windows. The same sketches open when Quit was chosen will
be automatically reopened the next time you start the IDE.
• Find
Opens the Find and Replace window where you can specify text to search inside
the current sketch according to several options.
• Find Next
Highlights the next occurrence - if any - of the string specified as the search
item in the Find window, relative to the cursor position.
• Find Previous
Highlights the previous occurrence - if any - of the string specified as the search
item in the Find window relative to the cursor position.

Sketch

• Verify/Compile
Checks your sketch for errors compiling it; it will report memory usage for code
and variables in the console area.
• Upload
Compiles and loads the binary file onto the configured board through the
configured Port.
• Upload Using Programmer
This will overwrite the bootloader on the board; you will need to use Tools >
Burn Bootloader to restore it and be able to Upload to USB serial port again.
However, it allows you to use the full capacity of the Flash memory for your
sketch.
• Export Compiled Binary
Saves a .hex file that may be kept as archive or sent to the board using other
tools.

26
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

• Show Sketch Folder


Opens the current sketch folder.
• Include Library
Adds a library to your sketch by inserting #include statements at the start of
your code.
• Add File
Adds a source file to the sketch it will be copied from its current location. The
new file appears in a new tab in the sketch window. Files can be removed from
the sketch using the tab menu accessible clicking on the small triangle icon
below the serial monitor one on the right side of the toolbar.

Tools

• Auto Format
This formats your code nicely: i.e. indents it so that opening and closing curly
braces line up, and that the statements inside curly braces are indented more.
• Archive Sketch
Archives a copy of the current sketch in .zip format. The archive is placed in the
same directory as the sketch.
• Fix Encoding & Reload
Fixes possible discrepancies between the editor char map encoding and other
operating systems char maps.
• SerialMonitor
Opens the serial monitor window and initiates the exchange of data with any
connected board on the currently selected Port. This usually resets the board, if
the board supports Reset over serial port opening.
• Board
Select the board that you're using. See below for descriptions of the various
boards.
• Port
This menu contains all the serial devices (real or virtual) on your machine. It
should automatically refresh every time you open the top-level tools menu.

27
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

• Programmer
For selecting a hardware programmer when programming a board or chip and
not using the onboard USB-serial connection. Normally you won't need this, but
if you're burning a bootloader to a new microcontroller, you will use this.
• BurnBootloader
The items in this menu allow you to burn a bootloader onto the microcontroller
on an Arduino board. This is not required for normal use of an Arduino or
Genuino board but is useful if you purchase a new ATmega microcontroller
(which normally come without a bootloader). Ensure that you've selected the
correct board from the Boards menu before burning the bootloader on the target
board. This command also set the right fuses.

Help

Here you find easy access to a number of documents that come with the Arduino
Software (IDE). You have access to Getting Started, Reference, this guide to the IDE
and other documents locally, without an internet connection.

Find in Reference

This is the only interactive function of the Help menu: it directly selects the
relevant page in the local copy of the Reference for the function or command under the
cursor.

Sketchbook

The Arduino Software (IDE) uses the concept of a sketchbook: a standard place to store
your programs (or sketches). The sketches in your sketchbook can be opened from the
File > Sketchbook menu or from the Open button on the toolbar. The first time you run
the Arduino software, it will automatically create a directory for your sketchbook. You
can view or change the location of the sketchbook location from with the Preferences
dialog.

Beginning with version 1.0, files are saved with a .ino file extension. Previous
versions use the .pde extension. You may still open .pde named files in version 1.0 and
later, the software will automatically rename the extension to .ino.

Tabs, Multiple Files, and Compilation


28
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

Allows you to manage sketches with more than one file (each of which appears
in its own tab). These can be normal Arduino code files (no visible extension), C files
(.c extension), C++ files (.cpp), or header files (.h).

Uploading

Before uploading sketch, select the correct items from the Tools > Board and
Tools > Port menus. The boards are described below. On the Mac, the serial port is
probably something like /dev/tty.usbmodem241 for an Uno or Mega2560 or Leonardo
or /dev/tty.usbserial-1B1 for a Duemilanove or earlier USB board, or
/dev/tty.USA19QW1b1P1.1 for a serial board connected with a Keyspan USB-toSerial
adapter. On Windows, it's probably COM1 or COM2 (for a serial board) or COM4,
COM5, COM7, or higher for a USB board - to find out, you look for USB serial device
in the ports section of the Windows Device Manager. On Linux, it should be
/dev/ttyACMx , /dev/ttyUSBx or similar. Once you've selected the correct serial port
and board, press the upload button in the toolbar or select the Upload item from the
Sketch menu. Current Arduino boards will reset automatically and begin the upload.
With older boards (pre-Diecimila) that lack auto-reset, you'll need to press the reset
button on the board just before starting the upload. On most boards, you'll see the RX
and TX LEDs blink as the sketch is uploaded. The Arduino Software (IDE) will display
a message when the upload is complete, or show an error.

When you upload a sketch, you're using the Arduino bootloader, a small
program that has been loaded on to the microcontroller on your board. It allows you to
upload code without using any additional hardware. The bootloader is active for a few
seconds when the board resets; then it starts whichever sketch was most recently
uploaded to the microcontroller. The bootloader will blink the on-board (pin 13) LED
when it starts (i.e. when the board resets).

Libraries

Libraries provide extra functionality for use in sketches, e.g. working with
hardware or manipulating data. To use a library in a sketch, select it from the Sketch >
Import Library menu. This will insert one or more #include statements at the top of the
sketch and compile the library with your sketch. Because libraries are uploaded to the

29
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

board with sketch, they increase the amount of space it takes up. If a sketch no longer
needs a library, simply delete its #include statements from the top of your code.

C language

Technology is constantly changing. New microcontrollers become available


every year. The one thing that has stayed the same is the C programming language used
to program these microcontrollers.

Arduino is the hardware platform used to teach the C programming language as


Arduino boards are available worldwide and contain the popular AVR microcontrollers
from Atmel. Arduino uses its own language to program Arduino boards, Because its
programming language is easy to understand. But it can also be programmed in C
language.

C language is very efficient, popular and well understood. C language is much


popular for embedded systems programming due to its flexibility. Programs written in
C programming language are easy to read, understand and edit. C language is free, and
you do not have to pay anything even if you are using C language for embedded
systems.

There are many languages in the market, which are using to develop
applications; still C programming language is much popular due to following reasons:
C language has less number of keywords, as we know that in a standard version

30
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

7.SCREENSHOTS

Fig: Application before entering OTP

Fig: After tapping on send otp, the otp is sent to registered mobile number

31
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

Fig : If wrong otp is entered, no action is taken

Fig: If the otp entered is correct,the it allows the user to lock or unlock the door by
displaying lock or unlock door buttons

32
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

Initially door will be in closed state, when user taps on door open then the
door will be unlocked and door status will be updated in the application, it is
displayed as opened.

When the user tries to open the door using mobile application to latch the
servo motor will be opened as shown below

When user taps on door close, the door gets closed and it displays as closed in the
application.

33
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

Fig: Status of the door when tapped on door close


When the user tries to close the door using the mobile application the latch to
the solenoid lock will be closed as shown below.

Fig : Door is locked


When the user taps on ir lock button, the buzzer will always gets activated
whenever someone passes through the door and it is updated in the application
displaying as lock activated.

34
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

Fig: Status of the lock when tapped on ir lock


When the user taps on ir unlock button, the buzzer will not turn on even if someone passes
through the door and the lock status will be shown as deactivated in the application.

Fig : Status of the lock when tapped on ir unlocked


Call and message will be sent to the registered mobile number when the lock
status is active and when someone passes through the door.

35
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

Fig : Message is sent


User can on and off the buzzer using alert on and alert off buttons and it is updated in
the application displaying as alert activated and deactivated.

Fig: Status of alert when tapped alert off

36
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

8.TESTING

8.1 Introduction

Software testing is a critical element of software quality assurance and


represents the ultimate review of specification, design and coding. In fact, testing is the
one step in the software engineering process that could be viewed as destructive rather
than constructive. A strategy for software testing integrates software test case design
methods into a well-planned series of steps that result in the successful construction of
software. Testing is the set of activities that can be planned in advance and conducted
systematically. The underlying motivation of program testing is to affirm software
quality with methods that can economically and effectively apply to both strategic to
both large and small-scale systems.

8.2 Strategic approach to Software Testing

The Software engineering process can be viewed as a spiral. Initially system


engineering defines the role of software and leads to software requirement analysis
where the information domain, functions, behaviour, performance, constraints and
validation criteria for software are established. Moving inward along the spiral, we
come to design and finally to coding. To develop computer software we spiral in along
streamlines that decrease the level of abstraction on each turn.

A Strategy for software testing may also be viewed in the context of the spiral.
Unit testing begins at the vertex of the spiral and concentrates on each unit of the
software as implemented in source code. Testing progress by moving outward along the
spiral to integration testing, where the focus is on the design and the construction of the
software architecture talking another turn on outward on the spiral we encounter
validation testing where requirements established as part of software requirements
analysis are validated against the software that has been constructed. Finally we arrive
at system testing, where the software and other system elements are tested as a whole.

37
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

Fig : Software Testing Approach

8.3 Unit Testing

The software units in the system are modules and routines that are assembled
and integrated to perform a specific function. As a part of unit testing, we executed the
program for individual modules independently. This enables, to detect errors in coding
and logic that are contained within each of the three modules. This testing includes
entering data that is filling forms and ascertaining if the value matches to the type and
entered into the database. The various controls are tested to ensure that each performs
its action as required.

38
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

Arduino Code or sketch


#include<SoftwareSerial.h>
#include <ESP8266WiFi.h>
#include <FirebaseArduino.h>
#define FIREBASE "srdoor-fb9bf-default-rtdb.firebaseio.com"
#define WIFI_SSID "dooriot"
#define WIFI_PASSWORD "dooriot01"
int buz=D8;
int ir=D2;
int relay=D1;
int i,j,k,l,u,d,v,l_v,lc_v;
int m,n,o,p,y,z,g,r_v;
int q,r,s,t,L,temp_v;
void setup()
{
Serial.begin(115200);
pinMode(buz,OUTPUT);
pinMode(relay,OUTPUT);
pinMode(ir,INPUT);
digitalWrite(buz,LOW);
digitalWrite(relay,LOW);
WiFi.begin(WIFI_SSID,WIFI_PASSWORD);
Serial.print("Connecting");
while(WiFi.status() != WL_CONNECTED)
{
Serial.print(".");
delay(500);
}
Serial.println();
Serial.print("connected: ");

39
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

Serial.println(WiFi.localIP());
digitalWrite(relay,LOW);
}
void loop()
{
if(Firebase.failed())
{
Serial.print("Firebase error");
Serial.println(Firebase.error());
}
Serial.print("IR:");
Serial.println(digitalRead(ir));

if(Firebase("DOORLOCK/DOOR") == "\"OPEN\"")
{
Serial.println("OPEN");
digitalWrite(relay,HIGH);
}
if(Firebase("DOORLOCK/DOOR") == "\"CLOSE\"")
{
lc_v=0;
Serial.println("CLOSE");
digitalWrite(relay,LOW);
}
if(Firebase("DOORLOCK/DOOR") == "\"LOCK\"")
{
Serial.println("LOCK");
lc_v=1;
l_v=1;
digitalWrite(relay,LOW);

40
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

}
if(Firebase("DOORLOCK/DOOR") == "\"UNLOCK\"")
{
Serial.println("UNLOCK");
l_v=0;
lc_v=0;
digitalWrite(buz,LOW);
}

if(Firebase("DOORLOCK/DOOR") == "\"ALERTON\"")
{
Serial.println("ALKERTON");
digitalWrite(buz,HIGH);
}
if(Firebase("DOORLOCK/DOOR") == "\"ALERTOFF\"")
{
Serial.println("ALKERTOFF");
digitalWrite(buz,LOW);
}
if((!digitalRead(ir)) && (lc_v==1))
{
digitalWrite(buz,HIGH);
Serial.println("ALERT");
Serial.write('A');
if(r_v==0)
{
}
r_v++;
delay(500);
}

41
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

9.FUTURE ENHANCEMEMNTS
A rechargeable battery can be provided which can give power backup of 3-4hrs
in case of power failure. It can also be implemented using cloud computing where user
can control the lock irrespective of his location. Use of camera can also be done for
surveillance. For further security, finger scanner, face recognizes or etc can be used. To
avoid opening of door every time, voice conversation can also be done with the person
on the other side of the door. This system can also be installed with a fire alarm. Usually
at home we don't have fire alarms, so this system can work as both - lock and fire alarm.
This system can be used in hotels, banks, motels, or any other place as an alternative
lock for additional security.

42
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

10.CONCLUSION
“Smart Door Locking System Based On OTP” is a modern successor of the
conventional door locking system. This system is very cost effective and easy to install
and is designed under different modes which makes it useful. This system allows single-
person residents to relieve the anxiety caused by the password leakage and unforeseen
visitors, making solve the growing social problems occurring in single person
households. It is expected that this system not only contributes to relieving the anxiety
about the social safety for single-person households, but also be applied to various
sharing economy platforms such as lodging facilities and personal lockers.

43
CSE Department,BITS
SMART DOOR LOCKING SYSTEM BASED ON OTP

11.BIBILIOGRAPHY
1. https://create.arduino.cc/projecthub/chummer1010/electronic-safe-with
arduino25d039?ref=tag&ref_id=lock&offset=1
2. https://create.arduino.cc/projecthub/rampi/rampiot-cool-smart
locka6d816?ref=tag&ref_id=lock&offset=9
3. https://create.arduino.cc/projecthub/arun8/smart-bt-door-lock-simple-
arduino69e6d7?ref=tag&ref_id=lock&offset=20
4. https://create.arduino.cc/projecthub/jegatheesan/smart-bt-lock-with-custom-
numberc15c7b?ref=tag&ref_id=lock&offset=18
5. Ushie James Ogri, Donatus Enang Bassey Okwong, Akaiso Etim, “DESIGN
AND CONSTRUCTION OF DOOR LOCKING SECURITY SYSTEM
USING GSM”, International Journal Of Engineering And Computer Science
ISSN:2319-7242 Volume 2 Issue 7 (July 2013), Page No. 2235-2257
6. Oleka C.V, Nduanya U.I. and Orji E.Z, “Microcontroller Based Digital Door
Lock Security System Using Keypad”, International Journal of Latest
Technology in Engineering, Management & Applied Science (IJLTEMAS)
Volume VIII, Issue I, January 2019 | ISSN 2278-2540
7. Halliru, Umar Muhammad, “Design and Construction of Smartdoor Security
System Using Arduino and Bluetooth Application”
8. Arpita Mishra , Siddharth Sharma , Sachin Dubey , S.K.Dubey, “Password
Based Security Lock System”, International Journal of Advanced Technology
in Engineering and Science www.ijates.com Volume No.02, Issue No. 05, May
2014 ISSN (online): 2348 – 7550
9. Aqib, “RFID and Keypad Door lock and Alert System Using Arduino”
10. "NodeMCU - A Perfect Board for IoT". circuito.io blog. 2018-11-21. Retrieved
2021-05-27.
11. https://www.theengineeringprojects.com/2018/10/introduction-to-nodemcu-
v3.html
12. https://www.androiderode.com/relay-module-and-working-details/
13. https://www.flyrobo.in/12v-piezo-electric-buzzer-alarm
14. https://robu.in/ir-sensor-working/
15. https://quartzcomponents.com/products/12v-solenoid-lock-0-6a-electric-door-
lock

44
CSE Department,BITS

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy