A SURVEY ON SMART DOOR LOCK SECURITY METHODOLOGIES IMPLEMENTED USING VARIOUS WIRELESS ACCESS TECHNOL

Page 1

e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science Volume:02/Issue:09/September -2020

Impact Factor- 5.354

www.irjmets.com

A SURVEY ON SMART DOOR LOCK SECURITY METHODOLOGIES IMPLEMENTED USING VARIOUS WIRELESS ACCESS TECHNOLOGIES Aiswarya I P*1 *1M.

Tech, Department Of Computer Science and Engineering, Mar Baselios College of Engineering & Technology, Thiruvananthapuram, Kerala, India.

ABSTRACT In day to day life, security plays an important role in our life. This paper presents a survey on various Smart Door Lock Security methodologies using Wireless access technologies that have been used frequently to prevent unauthorized access. Different methodologies provide different level of security for the door lock system. This paper explores the various wireless access technologies such as Bluetooth, Wi-Fi, Zigbee and RFID. Older traditional lock systems were not secure. IoT-based smart door lock systems were introduced to improve security for homes, offices, lockers etc. The various methodologies and technologies that are used for door lock security systems are surveyed. KEYWORDS: Door Lock, Zigbee, Wi-Fi, Internet of Things, Bluetooth, RFID.

I.

INTRODUCTION

Home automation system is used for controlling home appliances and security systems such as access controls and alarms. Access control is used to control the door lock systems. Previously, alarms and mechanical locks were used for home security. But recently these security methods have been breached by burglars. So, new techniques for door lock systems are introduced. The home automation systems are primarily connected to the Internet and the connected devices, when combined, form the Internet of Things. IoT security is a technology implementation that safeguards a network and connected devices to the Internet. To ensure home security, there are IoT network protocols that use different methodologies, and also different wireless protocol such as Bluetooth, Zigbee, Wi-Fi and RFID technology. Bluetooth technology is often used in Smart Door Lock systems. It is a low-powered wireless technology used to connect phones or other portable equipment together. To ensure security, a short distance i.e., usually 10 meters, is covered for wireless signals transmissions; security is valid only for that area. The power consumption is low, which uses least amount of battery life. Bluetooth is used for both transferring data and voice communication. Zigbee is a wireless communication protocol used for creating Personal Area Networks that are small in size, consume low amounts of power, and low data rate. This technology is widely used for home automation, is simpler, and less expensive than other networks. Zigbee devices have a long data transmission range that is possible by transmitting data through a mesh network containing other devices that act as intermediate nodes, to reach far away nodes. Use of Zigbee provides longer battery life and a secure network. Networks are encrypted using a 128-bit symmetric encryption. Wi-Fi is a radio access technology that is used to network several devices for real-time communication. There are several versions ranging from 802.11a to 802.11ax. It offers improved security over Bluetooth and is harder to intercept by hackers. Thus Wi-Fi is an excellent choice for IoT devices. Radio-frequency identification (RFID) uses electromagnetic fields. This technology is used for highlysecure zones. RFID provides automatic identification and data capture. An RFID card is brought close to the reader and it reads the tag. The tag holds electronic information like passwords, and can be used in door lock security systems to unlock electronically-locked doors. These technologies enable door lock systems to be smart and secure while minimizing the need for manual human intervention.

www.irjmets.com

@International Research Journal of Modernization in Engineering, Technology and Science

[1814]


e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science Volume:02/Issue:09/September -2020

II.

Impact Factor- 5.354

www.irjmets.com

LITERATURE SURVEY

A. Using Bluetooth technology Sabirin Hadis et al. [1] proposed a smart door lock system that uses Bluetooth technology. Bluetooth technology is used as a communication protocol between the user accessing the system, and the lock systems. Bluetooth provides low power compared to Wi-Fi. The system worked on a validation area and Bluetooth signal area. Device activates Bluetooth to scan and identfy users located in the Bluetooth signal area. If any identity match occurs then system initiates communications between the user accessing the system, and the lock control. Disadvantages of Bluetooth technology is low network access control, slow transfer rate and distance limitation. Faiz Aman et al.[2] proposed an android based door lock system using Motion sensing and image capturing method. The system eliminated the concept of manual lock system by providing automatic door lock security. The door controlled by Raspberry Pi and related embedded software.The system worked on motion detector that detects any movement in front of a door. Any movement detected causes the USB camera to capture an image, which captures the image, and uses ROI method to detect if it is a person. The image data is then checked with server database. If any match occurs, the owner gets notified and enables the door controller to lock or unlock the door. Mohan M et al. [8] proposed a Phone Controlled Security Lock Systems with minimal human intervention. An android-powered door lock system is used with Bluetooth protocol. All possible scenarios involving the door lock system are evaluated. The door can be accessed in two ways, through Bluetooth or SMS. A microcontroller is programmed to perform the necessary operations. The mobile is paired with the Bluetooth module. A password is requested to enhance security. Once the phone is paired, the door can be opened and closed using “OPEN” and “CLOSE” buttons in the application. When OPEN is pressed, the respective frequency signal is transmitted to the Bluetooth module. The Bluetooth module decodes the signal and sends information to the microcontroller. This microcontroller then actuates the servo motor to rotate, which is coupled with rack and pinion arrangement. This shifts the rack into the door lock and allows access to the door. When the CLOSE button is pressed, the operation similar to OPEN operation is performed, but to lock the door. Jayant Dabhade et al. [10] proposed a key less door lock system using smart phone, and also a wireless access and monitoring control system that uses a novel approach, which has different phases such as detecting a user, fetching b-id for authentication, verification of the user, displaying notifications, processing requests and performing actions in case of an emergency. This authentication system is lowcost and based on Bluetooth. The smart phone can send SMS, E-mail and Image. A unique b-id is generated for each guest. This is an anti-burglar measure. This allows a guest user’s key access to the door at a particular pre-specified time. The system consists of a motion detector and camera to prevent unauthorized access. If any intrusion occurs the camera take a snap of the person and send the image to the owner, also generating an alert. This image can be sent to the police or other concerned people. B. Using Wi-Fi technology Arun Cyril Jose et al. [4] proposed a smart wireless home security system that sends alerts to the owner of the system whenever any trespass occurs, via the Internet, and optionally raises an alarm. The same setup can also be deployed for home automation purposes, using the same set of sensors. The microcontroller used in the current prototype is a TI-CC3200 Launchpad board, which contains an embedded micro-controller and an onboard Wi-Fi shield, that control and manages all the indoor electrical appliances. As the system depends on the user’s decisions during a situation, the lack of a camera may cause confusion and prevent accurate decisions from being made i.e. whether to activate the security system or welcome the guest. The system can also be enhanced by integrating voice call feature. Freddy K Santoso et al. [6] proposed an approach for incorporating strong security while deploying Internet of Things (IoT) for smart home system. user convenience is also considered in operating the

www.irjmets.com

@International Research Journal of Modernization in Engineering, Technology and Science

[1815]


e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science Volume:02/Issue:09/September -2020

Impact Factor- 5.354

www.irjmets.com

system. The IoT smart home system runs on a conventional WiFi network, and is based on the AllJoyn framework. An asymmetric Elliptic Curve Cryptography method is used to perform authentication while the system is in operation. A WiFi gateway acts as the central node of the system, for performing initial configuration of the system. The central node is also responsible for authenticating communication between IoT devices, and to provide the means for the user to perform setup, access and system control via an Android mobile device. The current method is inconvenient to the user, as it involves entering device ID, a pre-shared secret key and the AP name manually whenever a new device is added to the network. A viable improvement to this whole procedure is to embed each device’s relevant information in a QR code sticker, which can be scanned and parsed by an Android application that the user has. C. Using Zigbee technology Ravi Kishore Kodali et al. [5] proposed a security system that identifies user behaviour and understands their logic to enforce security. The authors classify natural entry points in a home, as primary and secondary access points which depends on their use. This work proposed usage of motion and proximity sensors for detecting user behavior at primary access points. The front door is designated as the primary access point for any home; residents use this as the main way to exit or enter their home. Secondary access points could be designated as windows and balcony doors. User behaviour is identified at the designated access points and user verification is requested as required. A user’s position is also considered when access points change states. The urgency and legitimacy of a fire alarm is verified by gauging change in levels of temperature, humidity, and carbon monoxide. This thwarts deceptive attackers. The security model uses sensors, microcontrollers, Raspberry Pi and ZigBee communication protocols, for identification of user behavior at various access points and for implementing the logical sensing algorithm. ZigBee is based on IEEE 802.15.4 standard and has a communication range that varies from 10 to 100 meters. It also makes possible large-scale network configurations utilizing low-power radio, with a datarate of 250 kilobits per second. These features make ZigBee the most suited communication protocol for use in smart home networks. ZigBee modules make use of AES encryption algorithm. For enhancing network security, a designated coordinator is configured to block unsecured devices from joining the network. The encryption key is never sent as plain-text over-the-air. Every ZigBee module is programmed by a free XCTU software utility, allowing communication with Digi RF modules. Yong Tae Park et al. [9] proposed a smart digital door lock system suited for home automation purposes. A digital door lock system uses information like secret codes, semiconductors, smart cards, and fingerprints as an authentication method, instead of a regular physical key-based system. A ZigBee module is set inside the digital door lock. The door lock itself acts as a central controller for the entire home automation system. The system contains sensor nodes and actuators that are networked with the digital door lock, which acts as the base station. The following parts are also present in the system: an RFID reader that authenticates users, a touch-enabled LCD, a module that contains a motor to open and close the door, sensor modules that detect the conditions inside the house, a system-wide communication module, and a central control module that controls every other module present in the system. The sensor nodes are used for environmental sensing, and are deployed at appropriate places inside the home. The centralized controller can monitor and control each ZigBee module. Remote monitoring via the Internet, is useful as a means to monitor the conditions inside the house. D. RFID technology Meera Mathew et al. [3] this work implemented a digital security system where only authorized persons can enter, using RFID technology for a door locking system. User can set a secret key for data encryption. User ID and Password are also used as a secret key. User can set the key at any time they need . An OTP is generated for secure door lock operation, when an RFID card touches the sensor. The user then enters the OTP received on the phone, into the secure system keypad. Once authenticated, the door is unlocked.

www.irjmets.com

@International Research Journal of Modernization in Engineering, Technology and Science

[1816]


e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science Volume:02/Issue:09/September -2020

Impact Factor- 5.354

www.irjmets.com

Gyanendra K Verma et al. [7] proposed a digital secure door lock system that uses RFID technology, which only allows an authenticated person to enter. The lock system contains a passive RFID system that activates, authenticates and validates the user and their access, and unlock the door when a secure access occurs. Passive RFID works without a power source. Passive tags are lighter in weight and much less expensive than active RFID tags. A centralized system manages the system’s control, transaction and operation tasks. The door locking system is real time, as the door is opened immediately upon an RFID tag making contact with the reader and successfully being authenticated. The system also creates a log containing sign-in and sign-out details for each user of the system, along with their basic information. Table 1: Comparison Between Different Methodologies Title of paper

Methodology

Advantages

Disadvantages

Design of Smart Lock System for Doors with Special Features using Bluetooth Technology

A smart door lock system, Bluetooth technology is used as a communication protocol between the users accessing the system, and the lock systems.

Bluetooth required low power compare to Wi-Fi

Slow transfer rate

Motion Sensing and Image Capturing based Smart Door System on Android Platform

The system detects the motion and capture image, compare image with database then allow/deny the entry by any match occurred.

Used Wi-Fi technology

No two way authentication

Super Secure Door Lock System For Critical Zones

A digital door locking security system where only authorized persons can enter, using RFID technology.

ZigBee technology

Improving Smart Home Security: Integrating Logical Sensing Into Smart Home

A smart wireless home security system that sends the system owner alerts whenever any trespass occurs.

Wi-Fi technology

Lack of camera may cause confusion on decision making.

IoT Based Smart Security and Home Automation System

The security system that identifies user behaviour and enforce security.

Zigbee technology use AES encryption.

Low data rate.

www.irjmets.com

Distance limitation

High data transfer

Not useful for disable access.

OTP generated for secure access.

@International Research Journal of Modernization in Engineering, Technology and Science

[1817]


e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science Volume:02/Issue:09/September -2020

Impact Factor- 5.354

www.irjmets.com

Securing IoT for smart home system

IoT smart home system functions using a conventional WiFi network, and is based on the AllJoyn framework.

Asymmetric Elliptic Curve Cryptography method is used.

Not applicable for multiple devices.

A Digital Security System with Door Lock System Using RFID Technology

The lock system contains a passive RFID reader, which activates, authenticates and validates the user’s access and unlocks the door.

Passive RFID works without a battery.

The system is inefficient when the card lost.

Phone Controlled Security Lock Systems

Once the phone is paired, the door can be opened and closed using “OPEN” and “CLOSE” buttons in the application.

The door accessed through Bluetooth or SMS.

The system inefficient without a phone.

Smart Digital Door Lock for the Home Automation

A digital door lock system that uses information such as secret codes, for authentication purposes.

A ZigBee module is set inside the door lock.

Distance limitation

III.

Lighter in weight and much less expensive than active RFID tags.

CONCLUSION

Different methods of door lock system has been analyzed and surveyed. Based on this survey, the suitability of each methods and their application in different areas is understood. Since technology evolves, the methods to bypass or defeat the security systems are evolving as well. An advanced door-lock security system must be designed and developed, either by combining currently-present security techniques or by introducing a novel technique that overcomes the various issues in existing systems.

IV. [1]

[2]

[3] [4]

REFERENCES

Muhammad Sabirin Hadis, Amil Ahmad Ilham and Akbar Hendra and Elyas Palantei, “Design of Smart Lock System for Doors with Special Features using Bluetooth Technology”, 2018 International Conference on Information and Communications Technology (ICOIACT). Faizaman, Anitha C, “Motion Sensing and Image Capturing based Smart Door System on Android Platform”, International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS-2017). Meera Mathew, Divya R S, “Super Secure Door Lock System For Critical Zones”, 2017 International Conference on Networks & Advances in Computational Technologies (NetACT) |20-22 July 2017. Arun Cyril Jose ; Reza Malekian “Improving Smart Home Security: Integrating Logical Sensing Into Smart Home”, Journals & Magazines , IEEE Sensors Journal Volume: 17 Issue: 13.

www.irjmets.com

@International Research Journal of Modernization in Engineering, Technology and Science

[1818]


e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science Volume:02/Issue:09/September -2020

Impact Factor- 5.354

www.irjmets.com

[5]

Ravi Kishore Kodali, Vishal Jain, Suvadeep Bose and Lakshmi Boppana,” IoT Based Smart Security and Home Automation System”, International Conference on Computing, Communication and Automation (ICCCA2016). [6] Freddy K Santoso , Nicholas C H Vun “Securing IoT for smart home system”, 2015 International Symposium on Consumer Electronics (ISCE). [7] Gyanendra K Verma and Pawan Tripathi, “A Digital Security System with Door Lock System Using RFID Technology”, International Journal of Computer Applications (0975 – 8887) Volume 5– No.11, August 2010. [8] Mohan M, Vishal Kannan, M Keshav,” Phone Controlled Security Lock Systems “, International journal of Advanced Research Vol. 6, Issue 4, April 2017. [9] Yong Tae Park, Pranesh Sthapit and Jae-Young Pyun,”Smart Digital Door Lock for the Home Automation”, TENCON 2009 - 2009 IEEE Region 10 Conference. [10] Jayant Dabhade, Amirush Javare, Tushar Ghayal, Ankur Shelar and Ankita Gupta,” Smart Door Lock System: Improving Home Security using Bluetooth Technology”, International Journal of Computer Applications (0975 – 8887) Volume 160 – No 8, February 2017.

www.irjmets.com

@International Research Journal of Modernization in Engineering, Technology and Science

[1819]


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.