Security Lock Project
Security Lock Project
Security Lock Project
ABSTRACT
The increasing rate of crime, attacks by thieves, intruders and vandals, despite all forms of security
gadgets and locks still need the attention of researchers to find a permanent solution to the well being of
lives and properties of individuals. To this end, we design a cheap and effective security system for
buildings, cars, safes, doors and gates, so as to prevent unauthorized person from having access to ones
properties through the use of codes, we therefore experiment the application of electronic devices as
locks. However, a modular approach was employed in the design in which the combination lock was
divided into units and each unit designed separately before being coupled to form a whole functional
system. During the design, we conducted Twenty tests with the first eight combinations being four in
number, the next seven tests being five and the last five combinations being six. This was done because of
the incorporation of 2 dummy switches in the combinations. From the result obtained, combinations 8,
11, 13 gave the correct output combination. However, 8 being the actual combination gave the required
output. The general operation of the system and performance is dependent on the key combinations. The
overall system was constructed and tested and it works perfectly.
KEYWORDS
Security system, Motion Detector, Transducers, Buzzer, Ultrasonic Sound, Electronic Circuit Design.
1. INTRODUCTION
Due to the advancement of science and technology throughout the world, there is a consequent
increase in the rate and sophistication of crime [1]. As a result, it is necessary to ensure security
of oneself and ones valuable belongings. Even with the use of mechanical locks, the crime rate
still has increased due to the fact that these locks are easily broken. Consequently, there is a
need for other types of locks especially electronic ones [2-4].
This work is on the design and construction of an electronic combination lock with a keyboard
to be mounted on the door for keying in the secret code. The code unit, which operates with a
10-switch (non- matrix) keyboard was designed to control an electromagnetic door lock with a
four digit code. Unlike other keyboard combination locks this lock is constructed in such a
way that once any of the wrong keys is pressed, it resets automatically making it harder for an
intruder to break into [2,5].
The increasing rate of crime, attacks by thieves, intruders, vandals etc., despite all forms of
security gadgets and lock constitute the main factor that prompts the selection of this design.
Therefore, the main aims of the design are: (1) To design a cheap and effective security system
for buildings, cars, safes, doors and gates etc., (2) To experiment the application of electronic
devices as locks, and (3) To prevent unauthorized person from having access to ones properties
through the use of codes. This research work is limited to the historical development of very
large integrated (VLI) Circuit and the working principle of various models. Materials used for
the construction of the Circuit were sourced and put together locally. Due to financial and time
constraints a 4043 IC was used instead of programmable IC. As limitations for the design, the
4043IC is a data latch used for data storage, the data stored cannot be changed in the case of the
code being compromised but the data can be changed in the programmable IC if there is any
compromise.
For clarity and neatness of presentation, we outlined the article into five major sections. The
First Section gives a general introduction of security systems and combinational lock. Section
two gives presentation of related work. In Section Three, detail descriptions of the design and
implementation procedures are presented. Section Four presents the experimental results and
discussion of the results. In Section Five, we conclude the work with some recommendations.
Finally, references used in the manuscript are presented at the end of the paper.
2. RELATED WORK
This section brings to light the historical development of the lock, the types and functions of
locks. A brief review of electronic combination locks and a discussion of major components that
are used in electronic locks are presented.
a.
Key
b. Key hole
Fig. 1: Diagram of a Mechanical Key Lock
2. Magnetic Lock: These are locks that are operated based on the theory of magnetism. These
types of locks consist of bolts connected with magnets to ensure that they are locked. The
key (which is usually a ferrous metal foil) when inserted pulls the bolts thereby releasing the
lock to ensure it is opened (e.g. Solenoid). It is mainly used in residential as well as
administrative areas (e.g. Offices). This mechanism is illustrated in Fig. 2.
S
N
DNA Sensor Locks: these are electronic locks that compute into their memories, the
genetic make-up of the individual such that only individuals that have their DNA
computed into its memory would be allowed to enter. This is used in foreign countries
in places like the Pentagon where a high level of security is needed.
ii. Card sensor Locks: These are electronics locks that use the cards as keys such that when
the card if inserted, it generates voltage by closing the circuit and energizing the relay
which then opens the lock. These are used in industrial areas. This is shown in Fig. 3.
Lock
(a) Card (Conducting foil)
POWER
SUPPLY
UNIT
INPUT
UNIT
CONTROL
UNIT
OUTPUT
UNIT
0
1
By using the ten switches, the number of possible combinations was calculated. By applying the
permutation principle, the numbers of entries that can be made is given by;
P=
=
10
C4
(1)
!
!!
= 210
This means that there are 210 ways in which this combination can be set, which means that the
probability of an intruder to break the code is 1 out of 210 ways. The keys that set up the code
are 9,5,0,2, which are switches S1 to S4 in Fig. 5 and 6 respectively. Each of these switches is
linked to a bi-stable (flip-flop). The reset switches are 3,4,7,8, while keys 1 and 6 are the decoy.
The figure below show the details of the input unit.
The combination switches are connected to the set input of their respective bistables such that
for there to be a logic HIGH at Q-output , the set input of the bistable must be high. The dummy
switches are not connected in the circuit so they act as a decoy to any burglar who tries to break
in the lock.
The RC circuit forms a debunking network whose function is to perform a timing operation of
the circuit. In designing it, a time of 4.7seconds was chosen which is long enough for the user to
open the lock and then lock it again. The formula is given by:
=R6C1
(2)
.
The transistor used is the BC547 with the following data; VCC = 12V, VBE = 0.7V,
RB = 4.7K, hFE =320.
Using the equation below, we can find the collector current as follows:
(3)
" = 0
(4)
3
.'(
.
= 2.4)*
Also, IC = hFEIB
(5)
= 320 x 2.4mA
= 0.769A
But IE = IB + IC
(6)
= (0.769 + 0.002)A
= 0. 771A.
It can be seen from equation that the current flowing into the base of the transistor is small (i.e.
2.4mA) because of the value of the resistor (4.7K). This is to ensure that the transistor does
not burn as a result of high voltage across the output Q1.
In the circuit, the double pole relay was used because it could switch the solenoid and lock and
open indicators.
3.4. The Power Supply Unit
The power supply unit was bearing in mind that the CMOS logic IC requires a DC regulated
voltage of 12V. The unit is made up of a step-down transformer, a bridge rectifier and a voltage
regulator. Fig. 7 shows the circuit diagram of the power supply.
The transformer is a step down type rated 500mA, 240V/12V. The a.c. Mains supply is applied
to the primary winding, which is stepped down to 12V across the secondary winding.
A full wave rectification of this 12V is achieved using a bridge rectifier to allow for the current
needed by the electronic circuit and to provide some allowance to improve the reliability of the
circuit. It also occupies lesser space than four diodes would. The capacitor C2 (shown in Fig. 7),
which has a value of 470F smoothens the ripple voltage from the rectifying diode output. C2 is
electrolyte because it is a power filtering capacitor. Normally, voltage regulator circuits are
designed to give the specific output required to make the circuit function. For this design, the IC
regulator 7812 was used which gives an output of +12V d.c. required by the electronic circuit.
Fig 8 shows the circuit diagram of the regulator circuit.
10
Different
number
combinations
Output
Q0
Q1
Q2
Q3
Solenoid
1,7,5,2
HIGH
LOW
LOW
LOW
CLOSE
Green
Indicatior
OFF
Red
Indicator
ON
1,5,9,7
HIGH
LOW
LOW
LOW
CLOSE
OFF
ON
1,9,2,2
HIGH
HIGH
LOW
LOW
CLOSE
OFF
ON
1,5,7,9
HIGH
LOW
LOW
LOW
CLOSE
OFF
ON
1,9,5,3
LOW
LOW
LOW
LOW
CLOSE
OFF
ON
8,4,9,3
LOW
LOW
LOW
LOW
CLOSE
OFF
ON
1,9,5,2
LOW
LOW
HIGH
LOW
CLOSE
OFF
ON
9,5,0,2
HIGH
HIGH
HIGH
HIGH
OPEN
ON
OFF
3,8,7,9,0
HIGH
HIGH
LOW
LOW
CLOSE
OFF
ON
10
1,9,5,3,5
LOW
LOW
HIGH
LOW
CLOSE
OFF
ON
11
9,5,0,1,2
HIGH
HIGH
HIGH
HIGH
OPEN
ON
OFF
12
2,1,9,5,6
HIGH
HIGH
HIGH
LOW
CLOSE
OFF
ON
13
9,5,0,6,2
HIGH
HIGH
HIGH
HIGH
OPEN
ON
OFF
14
1,9,0,5,3
HIGH
HIGH
LOW
LOW
CLOSE
OFF
ON
15
1,9,5,3,4
HIGH
HIGH
HIGH
LOW
CLOSE
OFF
ON
16
8,6,1,0,9,3
LOW
LOW
LOW
LOW
CLOSE
OFF
ON
17
1,2,9,6,5,3
HIGH
HIGH
HIGH
LOW
CLOSE
OFF
ON
18
1,4,9,2,7,3
HIGH
LOW
LOW
LOW
CLOSE
OFF
ON
19
3,7,5,1,3,6
LOW
LOW
LOW
LOW
CLOSE
OFF
ON
20
0,9,1,5,2,3
LOW
LOW
LOW
LOW
CLOSE
OFF
ON
5. CONCLUSIONS
The increasing rate of crime, attacks by thieves, intruders and vandals, despite all forms of
security gadgets and locks still need the attention of researchers to find a permanent solution to
the well being of lives and properties of individuals. As such, we design a cheap and effective
security system for buildings, cars, safes, doors and gates, so as to prevent unauthorized person
from having access to ones properties through the use of codes, we therefore experiment the
application of electronic devices as locks. The system works by combination lock which was
divided into units and each unit designed separately before being coupled to form a whole
functional system. Twenty tests were conducted to ascertain the reliability of the design with the
first eight combinations being four in number, the next seven tests being five and the last five
combinations being six. This was done because of the incorporation of 2 dummy switches in the
combinations. From the result obtained, combinations 8, 11, 13 gave the correct output
combination. However, 8 as the actual combination gave the required output. The general
11
operation of the system and performance is dependent on the key combinations. The overall
system was constructed and tested and it works perfectly.
ACKNOWLEDGEMENTS
The author would like to thank Col. Muhammed Sani Bello (RTD), OON, Vice Chairman of
MTN Nigeria Communications Limited for supporting the research.
REFERENCES
[1]
Graw-Hill, M.C. (1985), Encyclopedia of Science and Technology (5th Edition), Cambridge
University Press 1985, ISBN 042507843, pp. 2-253.
[2]
Weber, & Thad-L. (1985), Alarm Systems and Theft Protection, 2nd edition,Stoncham, MA:
Uutterworth, pp. 7-8.
[3]
Koenig, J.A., & Taylor, L. (1998), Perimeter Security Sensor Technology Handbook,
Electronic Security Systems Engineering Division, North Charleston, U.S.A, pp. 67-86.
[4]
Theraja, B. L., & Theraja, B.K (2002), A textbook of Electrical Technology, S. Chand and
Company Ltd. New Delhi, India 2002, pp. 220, 920, 924, 1712 1716.
[5]
Mehta, V.K., & Mehta, S. (1993), Principles of Electronics, S. Chand and Company Ltd. New
Delhi, India 2002, pp. 149-166.
[6]
Rashid, M.A. (1986), Power Electronic Circuits, Devices and Applications, Longman, 1986,
pp. 245-248
[7]
Zungeru, A..M., Kolo, J.G., & Olumide, I. (2012), A Simple and Reliable Touch sensitive
security System, International Journal of Network Security & Its Applications (IJNSA), 4(5), pp.
149165.
[8]
Zungeru, A.M. et al. (2012), Design and Implementation of a Low Cost Digital Bus
Passenger Counter, Innovative Systems Design and Engineering, 3(4), pp. 2941.
Authors
Engr. (Dr) Adamu Murtala Zungeru received
his BEng in electrical and computer engineering
from the Federal University of Technology
(FUT) Minna, Nigeria in 2004, MSc in
electronic and telecommunication engineering
from the Ahmadu Bello University (ABU)
Zaria, Nigeria in 2009, and his PhD in Electrical
Engineering from the Univeristy of Nottingham
in 2013. He is currently a lecturer two (LII) at
the FUT Minna, Nigeria, a position which he
started in 2005. He is a registered engineer with
the Council for the Regulation of Engineering in
Nigeria (COREN), a professional member of
the Institute of Electrical and Electronics
Engineers (IEEE), and a professional member
of the Association for Computing Machinery
(ACM). His research interests are in the fields
of swarm intelligence, routing algorithms,
12
APPENDIX I
Components List
RESISTORS
VALUE
RATING
R1
10K
1/4w
R2
10K
1/4w
R3
10K
1/4w
R4
10K
1/4w
R5
680K
1/4w
R6
470K
1/4w
R7
100
1/4w
R8
10M
1/4w
R9
10K
1/4w
R10
4.7K
1/4w
CAPACITORS
VALUE
Rating
C1
10F
16v
C2
470F
16v
C3
100NF
Standard
C4
100nF
Standard
C5
100F
25V
INTEGRATED CIRCUITS
I.C1
I.C2
I.C3
TRANSISTOR
T1 BC 547
DIODES
D1, D2 IN 4148 SWITCHING DIODES
MISCELLANEOUS
10 PUSH ON/RELEASE OFF MINIATURE BUTTON SWITCHES
1
13