Exp 1
Exp 1
Exp 1
Experiment No. 1
Objective: To address the real-world problems and find the required solution.
Theory:
[1] Compared with the traditional door lock, the intelligent door lock has higher security and
convenience. The user controls the door lock through the mobile device, and the apartment
controls the door lock through the computer. Compared with the traditional apartment door lock
or electronic access card, it is more convenient. Therefore, a management system that can
manage the door locks intelligently through the Internet is of great significance to the real estate
industry and social development.
[2] This paper is about solving the problem regarding security of unauthorized people trespassing
in our home, shops or offices. Security issues can be fixed using traditional locks but there is
always possibility of someone opening the lock even without breaking it with the use of
duplicate key. Using these kinds of locks also create problem if we lose keys and also, we have
to carry keys along with us always. Again, using patterns in the locks can increase security but
again it can be opened if somehow the passwords or patterns are known. So, leaving every
system in this project we will implement a system using biometrics. In case of biometrics, the
DEPARTMENT OF INFORMATION TECHNOLOGY / CLASS- SY / SEM-IV / SUB-IoT LAB) / ACADEMIC YEAR-2021-22(EVEN) / Abdurrahman Chauhan (07)
K. J. SOMAIYA INSTITUTE OF ENGINEERING AND INFORMATION TECHNOLOGY, SION, MUMBAI-400022
pattern which will be used as key will be unique. Here, to implement the project we will use
fingerprint as the key. This Arduino project will make use of differ devices for the
implementation of the security lock where there will be different features to increase the security
level.
[3] This paper presents a double authentication IoT security door technique which uses
fingerprint technology to provide a well secured and access to both the users and the
administrators in homes and hotels. The advantage that this has over other common security
doors is the ease of changing access rights to the door whenever a client tenancy expires in a
room and facilitates booking online and controlling your door lock during your tenancy periods.
[4] Smart Doorbell System is designed to provide home’s occupants with the ability of accessing
home using their fingerprint instead of traditional systems. For example, when someone comes
to our home but when we are not available at home but tries to get inside our house a video of 10
seconds will be captured and sent to the user through the internet over Wi-Fi on the user's
application. Multiple fingerprints of same persons can be stored in the database and can be use
the same name will be announced inside the home.
[5] Recently proposed door lock systems based on Biometric Techniques and Password Based
Systems are studied and their problems are enlisted. As per the requirements, authors developed
the systems. And as per our knowledge, not a single system is suitable for all types of
applications. Day by day technologies are developing and techniques of robbery are also
developing. So, need is to develop a new smart and unbreakable technique in further studies. Due
to the recent trends in various methods of security for home, buildings, companies‟ vehicles etc,
there is no need to worry about this security any longer, as automatic security systems are here to
deal with it. This paper tries to focus all recent door lock security systems in a comprehensive
way.
DEPARTMENT OF INFORMATION TECHNOLOGY / CLASS- SY / SEM-IV / SUB-IoT LAB) / ACADEMIC YEAR-2021-22(EVEN) / Abdurrahman Chauhan (07)
K. J. SOMAIYA INSTITUTE OF ENGINEERING AND INFORMATION TECHNOLOGY, SION, MUMBAI-400022
[7] The designed system is mainly focused on security via the use of IoT-based implementation
on doors and doorbells. The designed system had features like video calls to the owner when
they have a visitor, an intruder alarm system, a visitor video log, etc. It uses Google and Alexa-
based technology to let the owner communicate with the visitor via the bell itself. The design is
such that if someone the doorbell, it automatically makes a video call to the registered number
and lets them decide whether to open the door or not. The intruder alarm and the steal alarm
system integrated with the system add to the security it provides. It also provides a video log of
all the visitors the house/office had for security purposes as and when needed.
[8] This remotely accessible smart lock system emphasizes the concept of real-time remote
accessibility in the owner’s hand via the use of IoT based system integrated with an android
application to access the system from anywhere. The main concept of this system is that when a
visitor presses the doorbell, it turns on the camera installed near the gate and simultaneously
sends a text message to the registered user with the live video feed and lets them decide whether
to open the door or not. The additional security provided to the user is that of a PIN system on
the android application which authenticates the user identity and only opens the door to the
house/office. The system also provides a voice message feature to convey a message to the
visitor.
[9] The system proposed in the paper is a distributed home automation system. The Arduino
controls and monitors the various sensors, and can be easily configured to handle more hardware
interface modules (sensors). A Wi-Fi module is used to connect to the internet. Automation
System can be accessed from the web browser of any local LAN using server IP, or remotely
from any PC or device connected to the internet. The system designed is human face recognition
and remote monitoring technology. The application telegram and image processing technology
LBP has been used to design this system. It also monitors access and sends alerts based on the
events it monitors and records.
[10] The model designed here using the electric solenoid lock captures the image of the face of
the person standing in front of the door and matches it with the stored facials from the database
and if recognized, it unlocks the door and waits for 30 seconds before locking the door again.
The system uses the Raspberry Pi-3 along with its camera module as main components and
Raspbian OS and various facial recognition libraries for the system to work. This design doesn’t
DEPARTMENT OF INFORMATION TECHNOLOGY / CLASS- SY / SEM-IV / SUB-IoT LAB) / ACADEMIC YEAR-2021-22(EVEN) / Abdurrahman Chauhan (07)
K. J. SOMAIYA INSTITUTE OF ENGINEERING AND INFORMATION TECHNOLOGY, SION, MUMBAI-400022
need any human interaction or interference to work and automatically unlocks and locks the door
as and when conditions are satisfied.
[11] The system designed and discussed in this paper contains a three-point authentication in the
form of facial, fingerprint, and voice message-based modules that work to unlock the door.
When there’s a visitor at the door, the face camera installed captures an image and compares it
with the database at the backend. If there’s a match, it unlocks the door, if not, it goes on to scan
the fingerprints from the database to see if there is a match. If a match is found, it unlocks the
door, and if no recognition here as well, it simply notifies it to the owner who can then take
whether to open the door or not or simply pass a voice message over.
[12] The built system can be used for homes and mini offices. When anyone presses the bell, the
user hears it and opens the p2p camera app, and watches the live feed of the camera installed. If
he wishes to open the door, he can switch to the app via Bluetooth and an app installed from the
play store. He can then open the door. To make this system, the p2p camera, servo motor, and
Arduino are the main components used.
Paper
no. Year Title Technology Used Open Loop
DEPARTMENT OF INFORMATION TECHNOLOGY / CLASS- SY / SEM-IV / SUB-IoT LAB) / ACADEMIC YEAR-2021-22(EVEN) / Abdurrahman Chauhan (07)
K. J. SOMAIYA INSTITUTE OF ENGINEERING AND INFORMATION TECHNOLOGY, SION, MUMBAI-400022
DEPARTMENT OF INFORMATION TECHNOLOGY / CLASS- SY / SEM-IV / SUB-IoT LAB) / ACADEMIC YEAR-2021-22(EVEN) / Abdurrahman Chauhan (07)
K. J. SOMAIYA INSTITUTE OF ENGINEERING AND INFORMATION TECHNOLOGY, SION, MUMBAI-400022
DEPARTMENT OF INFORMATION TECHNOLOGY / CLASS- SY / SEM-IV / SUB-IoT LAB) / ACADEMIC YEAR-2021-22(EVEN) / Abdurrahman Chauhan (07)
K. J. SOMAIYA INSTITUTE OF ENGINEERING AND INFORMATION TECHNOLOGY, SION, MUMBAI-400022
p-ISSN: 2021 A Study on IoT Raspberry Pi, PIR Sensor, Time consuming to video
2395- Smart Doorbells SD Card, DC motor call and open the door
0072 Python, PHP, Raspbian
Jessie OS, Apache
p-ISSN: 2020 Smart Door System Raspberry Pi, Node MCU Not much real-time
2395- ESP8266, Blynk implementation in the
0072 Application, Relay system
module
Raspberry Pi-3, Raspberry The door unlocks for 30
Cam, storage card, voltageseconds which can be
ISSN: regulator, electric solenoid
dangerous and unsafe, it
2578- 2022 Facial Recognition lock, Raspbian OS, also has no feature to
1129 Based Smart Door OpenCV /Facial open if someone whose
Lock System recognition lib, Python
facial scan is not there
comes
Fingerprint sensor(R307), The process is quite long
ISSN Arduino board, Raspberry and time consuming.
(Online): Pi, Firebase
2020 Real-Time Door
2454 - Security System
7190 with Three Point
Authentication
The system is inefficient
and time consuming to
978-1- switch from live feed
Arduino based Arduino, P2P, Servo
5386- 2018 application to servo
Auto door unlock motor, Android app
1508-9 control system by motor app and connect to
Android mobile Bluetooth every time.
through Bluetooth
DEPARTMENT OF INFORMATION TECHNOLOGY / CLASS- SY / SEM-IV / SUB-IoT LAB) / ACADEMIC YEAR-2021-22(EVEN) / Abdurrahman Chauhan (07)
K. J. SOMAIYA INSTITUTE OF ENGINEERING AND INFORMATION TECHNOLOGY, SION, MUMBAI-400022
and Wi-Fi
Conclusion:
Literature surveys are utilized in making certain that the used experiments, methodologies and
experiments supply reliability and validity within the analysis being carried out. The surveys
want to indicate important content material avoiding a lot interpretation. One’s opinions and
conclusions require to be separated from the content material within the cited sources.
Outcome:
Conduct a survey of several available literatures in the preferred field of study.
DEPARTMENT OF INFORMATION TECHNOLOGY / CLASS- SY / SEM-IV / SUB-IoT LAB) / ACADEMIC YEAR-2021-22(EVEN) / Abdurrahman Chauhan (07)