Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Exp 1

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 8

K. J.

SOMAIYA INSTITUTE OF ENGINEERING AND INFORMATION TECHNOLOGY, SION, MUMBAI-400022

Experiment No. 1

Aim: Conduction of a survey of several available literatures in the preferred field


of study.

Objective: To address the real-world problems and find the required solution.

Theory:

[1] Compared with the traditional door lock, the intelligent door lock has higher security and
convenience. The user controls the door lock through the mobile device, and the apartment
controls the door lock through the computer. Compared with the traditional apartment door lock
or electronic access card, it is more convenient. Therefore, a management system that can
manage the door locks intelligently through the Internet is of great significance to the real estate
industry and social development.

[2] This paper is about solving the problem regarding security of unauthorized people trespassing
in our home, shops or offices. Security issues can be fixed using traditional locks but there is
always possibility of someone opening the lock even without breaking it with the use of
duplicate key. Using these kinds of locks also create problem if we lose keys and also, we have
to carry keys along with us always. Again, using patterns in the locks can increase security but
again it can be opened if somehow the passwords or patterns are known. So, leaving every
system in this project we will implement a system using biometrics. In case of biometrics, the

DEPARTMENT OF INFORMATION TECHNOLOGY / CLASS- SY / SEM-IV / SUB-IoT LAB) / ACADEMIC YEAR-2021-22(EVEN) / Abdurrahman Chauhan (07)
K. J. SOMAIYA INSTITUTE OF ENGINEERING AND INFORMATION TECHNOLOGY, SION, MUMBAI-400022

pattern which will be used as key will be unique. Here, to implement the project we will use
fingerprint as the key. This Arduino project will make use of differ devices for the
implementation of the security lock where there will be different features to increase the security
level.

[3] This paper presents a double authentication IoT security door technique which uses
fingerprint technology to provide a well secured and access to both the users and the
administrators in homes and hotels. The advantage that this has over other common security
doors is the ease of changing access rights to the door whenever a client tenancy expires in a
room and facilitates booking online and controlling your door lock during your tenancy periods.

[4] Smart Doorbell System is designed to provide home’s occupants with the ability of accessing
home using their fingerprint instead of traditional systems. For example, when someone comes
to our home but when we are not available at home but tries to get inside our house a video of 10
seconds will be captured and sent to the user through the internet over Wi-Fi on the user's
application. Multiple fingerprints of same persons can be stored in the database and can be use
the same name will be announced inside the home.

[5] Recently proposed door lock systems based on Biometric Techniques and Password Based
Systems are studied and their problems are enlisted. As per the requirements, authors developed
the systems. And as per our knowledge, not a single system is suitable for all types of
applications. Day by day technologies are developing and techniques of robbery are also
developing. So, need is to develop a new smart and unbreakable technique in further studies. Due
to the recent trends in various methods of security for home, buildings, companies‟ vehicles etc,
there is no need to worry about this security any longer, as automatic security systems are here to
deal with it. This paper tries to focus all recent door lock security systems in a comprehensive
way.

[6] Implementation of a door access system using Arduino.


Arduino is a less time-consuming programming because it is an open-source
microcontroller. It has high quality system compared to the existing door access
system. The features used in this system helps to overcome the security issues. The
proposed system overcomes the issues of maintaining the device in future as Arduino
comes with ATMEGA2560 microcontroller that can be edited to comply with any
changing system. Adopting the keypad and fingerprint scanner features, creating a
door access system- Arduino Based brings a whole new high security access system

DEPARTMENT OF INFORMATION TECHNOLOGY / CLASS- SY / SEM-IV / SUB-IoT LAB) / ACADEMIC YEAR-2021-22(EVEN) / Abdurrahman Chauhan (07)
K. J. SOMAIYA INSTITUTE OF ENGINEERING AND INFORMATION TECHNOLOGY, SION, MUMBAI-400022

with a simple new approach.

[7] The designed system is mainly focused on security via the use of IoT-based implementation
on doors and doorbells. The designed system had features like video calls to the owner when
they have a visitor, an intruder alarm system, a visitor video log, etc. It uses Google and Alexa-
based technology to let the owner communicate with the visitor via the bell itself. The design is
such that if someone the doorbell, it automatically makes a video call to the registered number
and lets them decide whether to open the door or not. The intruder alarm and the steal alarm
system integrated with the system add to the security it provides. It also provides a video log of
all the visitors the house/office had for security purposes as and when needed.
[8] This remotely accessible smart lock system emphasizes the concept of real-time remote
accessibility in the owner’s hand via the use of IoT based system integrated with an android
application to access the system from anywhere. The main concept of this system is that when a
visitor presses the doorbell, it turns on the camera installed near the gate and simultaneously
sends a text message to the registered user with the live video feed and lets them decide whether
to open the door or not. The additional security provided to the user is that of a PIN system on
the android application which authenticates the user identity and only opens the door to the
house/office. The system also provides a voice message feature to convey a message to the
visitor.
[9] The system proposed in the paper is a distributed home automation system. The Arduino
controls and monitors the various sensors, and can be easily configured to handle more hardware
interface modules (sensors). A Wi-Fi module is used to connect to the internet. Automation
System can be accessed from the web browser of any local LAN using server IP, or remotely
from any PC or device connected to the internet. The system designed is human face recognition
and remote monitoring technology. The application telegram and image processing technology
LBP has been used to design this system. It also monitors access and sends alerts based on the
events it monitors and records.

[10] The model designed here using the electric solenoid lock captures the image of the face of
the person standing in front of the door and matches it with the stored facials from the database
and if recognized, it unlocks the door and waits for 30 seconds before locking the door again.
The system uses the Raspberry Pi-3 along with its camera module as main components and
Raspbian OS and various facial recognition libraries for the system to work. This design doesn’t

DEPARTMENT OF INFORMATION TECHNOLOGY / CLASS- SY / SEM-IV / SUB-IoT LAB) / ACADEMIC YEAR-2021-22(EVEN) / Abdurrahman Chauhan (07)
K. J. SOMAIYA INSTITUTE OF ENGINEERING AND INFORMATION TECHNOLOGY, SION, MUMBAI-400022

need any human interaction or interference to work and automatically unlocks and locks the door
as and when conditions are satisfied.

[11] The system designed and discussed in this paper contains a three-point authentication in the
form of facial, fingerprint, and voice message-based modules that work to unlock the door.
When there’s a visitor at the door, the face camera installed captures an image and compares it
with the database at the backend. If there’s a match, it unlocks the door, if not, it goes on to scan
the fingerprints from the database to see if there is a match. If a match is found, it unlocks the
door, and if no recognition here as well, it simply notifies it to the owner who can then take
whether to open the door or not or simply pass a voice message over.
[12] The built system can be used for homes and mini offices. When anyone presses the bell, the
user hears it and opens the p2p camera app, and watches the live feed of the camera installed. If
he wishes to open the door, he can switch to the app via Bluetooth and an app installed from the
play store. He can then open the door. To make this system, the p2p camera, servo motor, and
Arduino are the main components used. 

Paper
no. Year Title  Technology Used Open Loop

1 Intelligent Door Debugging of the whole Need to improve


May 2021 Lock System system. It includes the reliability
Based on debugging of and robustness.
Raspberry Pi fingerprint module,
serial communication,
mobile app, raspberry
pie, server and mobile
phone. After the final
overall debugging, the
system has basically
realized the expected
functions.
2. August Fingerprint In this paper, they have User using these
2020 Based Door tried to solve the kinds of bolting
Access security matter in door system either

DEPARTMENT OF INFORMATION TECHNOLOGY / CLASS- SY / SEM-IV / SUB-IoT LAB) / ACADEMIC YEAR-2021-22(EVEN) / Abdurrahman Chauhan (07)
K. J. SOMAIYA INSTITUTE OF ENGINEERING AND INFORMATION TECHNOLOGY, SION, MUMBAI-400022

System by bringing the concept utilize pin number


using of biometrics along with or fingerprint or
Arduino the door lock. So, for RFID card to
that purpose we are unlock the system.
using finger prints as These system does
unique key to not have security
implement a device so pecking order to
as to lock or unlock a grow the security.
door. We have To grow the
discussed about the security the user
different components should unbolt the
using Arduino we system by minimal
would require to two security order.
implement our project In house lock
i.e. we have given the system there have
hardware and software to be unlocking
requirements in the option for guest.
project. Sometime burglars
may miss use the
option and get into
the home. So, we
can supply two
level of security
for guest also. This
procedure have to
be finished with
the use of owner
for security
motive.
3. JUNE A Prototype model of an IoT-based The major limitation of
2020 Model of an IoT- fingerprint- this method is that it has
based Door controlled door system a single authentication
System that uses multi access right. As a
using Double- authentication result, it can be easily
access Fingerprint compromised in terms of
Technique method was presented. room property

DEPARTMENT OF INFORMATION TECHNOLOGY / CLASS- SY / SEM-IV / SUB-IoT LAB) / ACADEMIC YEAR-2021-22(EVEN) / Abdurrahman Chauhan (07)
K. J. SOMAIYA INSTITUTE OF ENGINEERING AND INFORMATION TECHNOLOGY, SION, MUMBAI-400022

The system architecture theft by unauthorized


resent how persons posing as visitors
different components or hotel staff.
exchange data through
IOT.
4. February Smart Doorbell Ability of accessing Video of 10 seconds will
2019 System home using their be captured
fingerprint instead of
traditional systems
5. November Door Lock The proposed method in Can’t change the
2016 Security Systems latest work does not password,
password need during power failure
Administrator’s help to system
access the facility if the will gets off. Timeout in
user knows few seconds and multiple
OTP technique and has uses means multiple
a registered mobile lockouts.
phone [30].
Likewise, the OTP is
generated and sent to
the proprietor’s
mobile phone whenever
user requests to access
facility.
Then the OTP should
enter through keypad on
the door
the door will open. In
case if the mobile is not
available or off then the
option to open the door
is to
answer the security
question ask by system.
6. September DOOR ACCESS To add another feature
2012 SYSTEM – such as smart card

DEPARTMENT OF INFORMATION TECHNOLOGY / CLASS- SY / SEM-IV / SUB-IoT LAB) / ACADEMIC YEAR-2021-22(EVEN) / Abdurrahman Chauhan (07)
K. J. SOMAIYA INSTITUTE OF ENGINEERING AND INFORMATION TECHNOLOGY, SION, MUMBAI-400022

ARDUINO to increase the security


BASED level. Smart card stores
data such as name and ID
of the owner and in
future it can be used to
match the entered ID
using keypad.

p-ISSN: 2021 A Study on IoT Raspberry Pi, PIR Sensor, Time consuming to video
2395- Smart Doorbells SD Card, DC motor call and open the door
0072 Python, PHP, Raspbian
Jessie OS, Apache
p-ISSN: 2020 Smart Door System Raspberry Pi, Node MCU Not much real-time
2395- ESP8266, Blynk implementation in the
0072 Application, Relay system
module
Raspberry Pi-3, Raspberry The door unlocks for 30
Cam, storage card, voltageseconds which can be
ISSN: regulator, electric solenoid
dangerous and unsafe, it
2578- 2022 Facial Recognition lock, Raspbian OS, also has no feature to
1129 Based Smart Door OpenCV /Facial open if someone whose
Lock System recognition lib, Python
facial scan is not there
comes
Fingerprint sensor(R307), The process is quite long
ISSN Arduino  board, Raspberry and time consuming.
(Online): Pi, Firebase
2020 Real-Time Door
2454 - Security System
7190 with Three Point
Authentication
The system is inefficient
and time consuming to
978-1- switch from live feed
Arduino based Arduino, P2P, Servo
5386- 2018 application to servo
Auto door unlock motor, Android app
1508-9 control system by motor app and connect to
Android mobile Bluetooth every time.
through Bluetooth

DEPARTMENT OF INFORMATION TECHNOLOGY / CLASS- SY / SEM-IV / SUB-IoT LAB) / ACADEMIC YEAR-2021-22(EVEN) / Abdurrahman Chauhan (07)
K. J. SOMAIYA INSTITUTE OF ENGINEERING AND INFORMATION TECHNOLOGY, SION, MUMBAI-400022

and Wi-Fi

Conclusion:
Literature surveys are utilized in making certain that the used experiments, methodologies and
experiments supply reliability and validity within the analysis being carried out. The surveys
want to indicate important content material avoiding a lot interpretation. One’s opinions and
conclusions require to be separated from the content material within the cited sources.

Outcome:
Conduct a survey of several available literatures in the preferred field of study.

DEPARTMENT OF INFORMATION TECHNOLOGY / CLASS- SY / SEM-IV / SUB-IoT LAB) / ACADEMIC YEAR-2021-22(EVEN) / Abdurrahman Chauhan (07)

You might also like