Design and Construction of A Door Securrity Alarm System Based On Sms Verification and Voice Recognition
Design and Construction of A Door Securrity Alarm System Based On Sms Verification and Voice Recognition
Design and Construction of A Door Securrity Alarm System Based On Sms Verification and Voice Recognition
6705
ISSN No. 0976-5697
Volume 12, No. 3, May-June 2021
International Journal of Advanced Research in Computer Science
RESEARCH PAPER
Available Online at www.ijarcs.info
F. W. Akinleye
T. H. Akin-Olayemi Department of Computer Science
Department of Computer Science, Igbajo Polytechnic, Igbajo
Federal Polytechnic, Ado-Ekiti Osun State.
Abstract: Home security is very crucial, different ways of security system have been enhanced such as the use of alarms, monitoring system,
through the interaction of electronic hardware, software and much more. This project involves SMS verification and voice message based door
access system to detect intruders, trespassers, criminals or any form of criminal act. The project is to design and construct a door security alarm
system based on SMS verification and voice recognition. The objectives of this project are as follows: To design a security system that would
automatically control the operations of a door via voice command through android application development and via SMS verification using
GSM module. To develop and implement a system that utilizes voice command and SMS verification technology for access. To provide perfect
security for door access, this project made use of two different technologies viz SMS verification and voice recognition. The microcontroller
continuously receives command from the GSM module and the android application which is connected through the Bluetooth module. It then
takes decision on the basis of the command received. The system has been designed to work with GSM technology, which will generate a
message, every time an intruder tries to get an unauthorized access to the house. There is a unique voice keyword that grants access to the door
via Google’s open-source speech-to-text on the android application using HC-05 Bluetooth module is employed to serve as a wireless link
between the android application and the door. Having designed the system and found it working properly according to its design, the aim of the
project can be said to be achieved. Thus, Voice Recognition and SMS verification offers a better security than traditional methods of security.
Keywords: Security, GSM Module, Voice recognition module, Microcontroller, Access control system, Arduino
controlled computer systems). The term false intrusion is Since last 4-5 decades, the concept of home automation
used to mean any form of attempt to gain entry without has been there. People’s expectations regarding home
following the proper pre-designed protocol(s) [7]. automation and security have changed during the course of
From time past till present, there are some earlier time due to the advancement of technology and services.
development like; security locks devices made of forged Different security systems over the time tried to provide
metal i.e. simple lock and bolt, the door chain, pin tumbler efficient convenient and safe way for home inhabitants to
lock, the jam lock and padlock etc. Other recently developed access their homes. Irrespective of the change in user
security devices are gadgets like laser beam detectors, expectations, advancement of technology, or change of time,
motion detectors, magnetic card readers. Most recent of the role of a home automation system has remained the
these devices are offshoots of biometric engineering. They same [22]. The tasks of a modern security system include
include voice recognition systems, finger print readers, identifying an intruder trying to gain access to the home,
retina eye scanners etc. The major characteristic of security alerting the homeowner about the intrusion or intrusion
devices is to prevent an intruder from gaining access to a attempt, preventing the intruder from gaining access to the
location [26]. In recent years, home security has shifted home, and gathering or collecting evidence regarding the
away from simple control panels and deadbolt locks into intrusion so that the perpetuators can be brought to justice
cool, coveted high-tech gadgets. There are so many new [32].
things that have been invented when it comes to providing
security. To understand how home security evolved into II. OVERVIEW OF SECURITY ALARM
what it is today, It is necessary to take a look back at the SYSTE
past [23].
When World War I ended, an increase in crime A security alarm is a system designed to detect
followed. As a result, People became sensitive to security intrusion – unauthorized entry – into a building or other area
needs and were eager to find ways to protect themselves and such as a home or school. Some alarm systems serve a
their property. Additionally, many insurance companies single purpose of burglary protection; combination systems
began offering premium discounts to alarm subscribers. provide both fire and intrusion protection [18].Alarm
These events produced a consumer demand for alarm systems serve a single purpose of burglary protection;
systems. During this time, homeowners may have combination systems provide both fire and intrusion
subscribed to a service called door shakers— a group of protection. Intrusion alarm systems may also be combined
night watchmen who would shake subscribers’ doors each with closed-circuit television surveillance (CCTV) systems
night to ensure they were locked. More advanced users may to automatically record the activities of intruders, and may
have installed an alarm system that used electromagnetic interface to access control systems for electrically locked
contacts fastened to doors and windows, which were doors [28]. Systems range from small, self-contained
connected to a battery and bell. These systems were noisemakers, to complicated, multirally systems with
monitored by a central station that sent a guard to the computer monitoring and control. It may even include two-
residence when the alarm was triggered. Fast forward to way voice which allows communication between the panel
today, homeowners have traded door shakers for automated, and Monitoring station [18].
sophisticated systems. Now, to ensure that doors are locked There are different types of Home Security Alarm
and the alarm is set, users simply log in remotely via a web- system. They are:
enabled device and check the status of their homes. They i. Electric Current Alarm System
can lock doors, arm the system, or adjust the thermostat with Electric current systems are the most basic monitoring tool,
the touch of a button[32]. in that they only monitor entry points like doors and
Video surveillance technology was developed in the windows, and are often installed when a home is being built.
1940s; it wasn’t until the 1970s that it was used in homes as With these systems, a low-voltage electrical circuit flows
a security measure. An early model of an advanced video between two points.[51]
home security system included a large motorized camera ii. Wired Alarm System
that moved down a track to view the exterior of the home A hardwired alarm system describes a number of sensors
through four peepholes mounted in the front door [3]. The throughout the home that are connected to a control panel,
video camera transmitted grainy images of visitors to a via a network of wires that run inside the walls and under
stationary television monitor that also served as the control the floors [51].
panel where the homeowner could remotely control the iii. Wireless Alarm System
camera’s movements [32]. The panel, which was located in Wireless security systems are the next generation of security
a separate room away from the camera, was equipped with equipment. They offer comprehensive protection, lower
security features such as an intercom to communicate with installation costs, and easy upgrades. Essentially, a wireless
visitors, a door lock switch and an alarm button that could security system is comprised of alarms, sensors, cameras,
activate the alarm at the central station that monitors the and various detectors all connected to a main control panel
residence[3]. Now, surveillance cameras are as small as one via radio signals [51].
square inch, connected to the Internet and outfitted with iv. Unmonitored Alarm System
powerful lenses that can capture and stream high definition Unmonitored (or self-monitored) security systems consist of
video online that can be viewed from anywhere in the world equipment you can have a professional install or install
[20]. Additionally, with a connected smart home, yourself. Equipment can vary greatly between systems, but
homeowners can program their security systems to send a typical items include a control panel, motion sensors, door
live video clip of an area if motion is detected when the and window sensors, glass-break sensors, smoke detectors,
home is unoccupied and the alarm is activated [18] and sirens [51].
iv. Biometric readers usefulness of this module is its ability to interface with other
These special biometric readers are designed to read circuit elements like the microprocessor; hence making it
biometric information instead of a card that is carried. This possible to embed it with other systems.
makes use of fingerprint, facial, finger vein, voice ii. GSM Module (SIM800L)
recognition, iris recognition and others that is a much more GSM (Global System for Mobile Communication)
secure system and costs more [55]. is a wireless network system that uses a mobile operator and
functions just like a mobile phone. The GSM module has a
SMS (Short Message Service) System SIM card slot, thus making the module have a mobile
SMS (Short Message Service) is a text messaging number of its own and enabling it to activate communication
service component of most telephone, internet, and mobile over the network. The user can send or receive an SMS as
device systems. It uses standardized communication well as make or receive voice calls over the module
protocols that let mobile devices exchange short text interface. The GSM module can be connected through the
messages. An intermediary service can facilitate a text-to- serial port or to a microcontroller. There are a set of AT
voice conversion to be sent to landlines. SMS as used on commands that are used to establish communication
modern devices, originated from radio telegraphy in radio between the microcontroller and the GSM module. The
memo pagers that used standardized phone protocols. These GSM module used in this security system uses SIM800L
were defined in 1985 as part of the Global System for module [37].
Mobile Communications (GSM) series of standards. SIM800L is a miniature GSM modem, which
The first test SMS message was sent on December allows for GPRS transmission, sending or receiving SMS, as
3,1992, when Neil Papwort, a test engineer for Sema Group, well as making or receiving phone calls. Its low cost, small
used a personal computer to send “Merry Christmas” to footprint and quad brand frequency support make it to be a
phone of colleague Richard Jarvis. SMS rolled out perfect solution for any project that requires long range
commercially on many cellular networks that decade and connectivity. SIM800L has two antennas. It consumes about
became hugely popular worldwide as a method of text 300mA in idle mode and about 2A in busy mode. It needs
communication. By the end of 2010, SMS was the most between 3.8V to 4.2V, in which 4V is recommended in most
widely used data application, with an estimated 3.5 billion cases. It uses UART (serial) means of communication.
active users, or about 80% of all mobile phone subscribers.
The service allows users to send and receive messages
of up to 160 characters (entirely alpha-numeric) to and from
GSM mobiles. Although most SMS messages are sent from
one mobile phone to another, support for service has
expanded to include other mobile technologies such as
ANSI CDMA networks and Digital AMPS. Mobile
marketing, a type of direct marketing, uses SMS [54].
part of the system. The command to the microcontroller is It acts a slave only, that is, it cannot initiate
sent through text messages from the mobile phone and the communication. Figure 3.1 shows the Bluetooth module
alert from the microcontroller is received as a text as well.
Table 3.1 shows the AT commands used in the system [29]. Technical Specifications
Operating Voltage: 4V to 6V (Typically +5V)
iv. Advantages of Short Message Service Operating Current: 30mA
(SMS) System Range: up to 10meters
- Message can be sent at any time, day or night. Communication Mode: Serial communication (UART)
- Less time is needed to communicate hence, it is the Supported baud rate: 9600, 19200, 38400, 57600, 115200,
fastest way to reach anyone. 230400, and 460800.
- Anyone can send a message to the recipient even if
he/she is available or not. Advantages of voice recognition via Bluetooth
- Good for informal messages. - Generate personalization, personal conversations
can be accomplished by voice.
- Talking is better than typing, life is easier and more
Limitations of Short Message Service (SMS) System efficient as voice inputs than typing.
- There is no guarantee that the text message will be - Voice recognition is a great option for people with
delivered to its destination. motoric disabilities or difficulties to communicate
- The delivery can happen very late due to much easier.
congestion or the delivery may fail due to - Enables you to perform task or job more easily.
destination mobile is busy or out of service
- The SMS size is limited to about 160 characters. Limitations of voice recognition via Bluetooth
- Voice recognition remains useful for security
system, however has certain limitations;
Voice Recognition - Voice recognition via Bluetooth only work up to a
An Android application (voice recognition on range of 10meters because the maximum range for
Android) was used for the voice recognition stage of this a Bluetooth connection is 10meters.
design. There are several platforms for developing - Bluetooth connection has a limited connection of
smartphone applications such as Windows Mobile, one phone at a time; it can’t connect two phones at
Symbian, iOS and Android. The Android platform is an same time to grant access to the door.
open-source whereby users can easily customize the tools
and develop applications according to their needs [18].
The Android SDK (Software Development Kit) provides a
wide range of useful libraries, tools necessary to develop
applications on the Android platform using the Java
programming language. Any sound could be trained as voice
command. Users need to train the application on android
first before letting it recognize any voice command.
The interest in voice recognition is continually growing
nowadays. Today, we distinguish two types of voice
recognition;
Text-Dependent: depends on the specific sets of words the
person says- you need step-up authentication and identity
verification and in order to be activated, the user has to say
the necessary phrase.
Text-Independent: does not depend on a specific text yet
relies on conversation speech. The authentication does not
require for the user to say a set of required phrases [34].
will be highlighted. The advantages, disadvantage and through a DTMF decoder interfaced with microcontroller
possible improvement (research gap) were enumerated. unit and a stepper motor. It provides an easy way of
[12] designed a digital door lock security system using controlling a lock without physical contact, but the system
the RFID technology. After receiving the tag information, lack true user identification system such as biometric and
the reader sends this information to the database for face detection facility. It also lacks notification and alarming
confirmation. If it holds, the information is stored for further system. An improvement can be made by adding another
operation. The central server queries to database and retrieve security feature to increase the security reliability.
corresponding information after receiving the query from [24] designed security door that opened by pressing the
the reader. The reader computes timestamp (date, time) after keys of the assigned codes on the mobile phone, or by
receiving the reply form server and creates a log. Once the entering the corresponding code in a computer set interfaced
tag information is verified, the system generates a control with the system. The door opens automatically when the
signal through parallel port which controls the opening/ right code is entered and remains open for 10 seconds before
closing of door by means of stepper motor. Creating a log closing back. The security system is affordable but lack
which contains information of the user is another vital auto-generation code and registration mode mechanism. An
security feature to the system, but it lacks notification and improvement can be made by adding biometric, auto-
alarming facilities. The system can be improved by adding generation and registration mode mechanism.
security feature(s) such as GSM module and buzzer. [2] designed a GSM based automated embedded system
[17] implemented a storage locker system. The system for monitoring and controlling of smart grid. The device
uses the technique of fingerprint recognition as the means to acquire the remote electrical parameters like Voltage,
actuate the opening and closure of the lock. Biometric is a Current and Frequency from Smart grid and send these real
reliable security feature, but lack security feature for time values over GSM network using GSM Modem/phone
physically impaired person (amputee) and notification along with temperature at power station. It operates an
mechanism in case of an intruder, An improvement can be Electromagnetic Relay. The Relay is used to operate a
made by adding another security feature(s) such as RFID Circuit Breaker to switch off the main electrical supply. It is
system to take care of such people and to strengthen the a good protective system but has no sensor and transducer
security of the system. for measuring environmental condition such as temperature,
[10] designed an RFID based automatic access control humidity etc. And improvement can be made by adding
system. The USB serial communication was used to environmental condition measuring facilities.
communicate with the host computer which is interfaced [25] developed a programmable electronic digital code
with the PIC 16f877A. Therefore, the graphic user interface lock system. In the design, a device is locked using a six-
program provides the functionalities of the overall system digit code (password). The electronic code lock system was
such as displaying live ID tags transactions, registering ID, activated by switching to alarm mode when any wrong code
deleting ID, recording attendance and other minor functions is entered for four consecutive times and allows the user to
which were developed using visual basic 2010. Having stop it only when a proper 6-digit code is entered in the
feature for registering and deleting ID make the system correct sequence. it is an affordable and simple security
more flexible but the system lack facilities for true user system, but the system lacks notification facilities,
identification such as fingerprint scanner, camera etc. An registration mechanism to change the pass-code. Other
improvement can be made on this system by RFID finger security feature such as GSM system can be incorporated for
print scanner instead of Tag to rule the possibility of notification information to dedicated person in case of any
unauthorized access. attempted intruder.
[27] proposed an idea of solving problems arising in [11] designed a system that work base on the principle
logistics management with the aid of wireless of face recognition. If iris is matched, the door automatically
communication. The proposed system works as thus: If will be opened otherwise it will remain close. Infrared
overloaded, a Buzzer is triggered. Vehicle starts to move sensor was used to detect the human in or out. It is a reliable
from source to destination while GPS starts getting location security system but the system lacks other sensor(s) for
and sending the details on Request. When the vehicle sensing other parameters for physically impaired person
reaches destination the unloading of goods take place, also (without iris). Modification can be made on the system by
the RFID tag is read and validation of tag takes place. If incorporating a biometric system to be used by such person.
successful, user is allowed to access the goods, If not, SMS [19] designed a system to simulate an electronic key,
based indication will be provided. GSM will indicate the which is controlled through a Bluetooth enabled smart
unloading details of goods on regular intervals. The phone. Controlling is conducted by sending a command via
misplacement of the goods is indicated with the help of a Bluetooth to the Arduino circuit that acts as an interface
Buzzer. If misplaced goods are not reloaded into the vehicle, between the Android smart phone and solenoid. The security
SMS will be sent to the base station and will not allow the system is simple with low failure rate but lack notification
vehicle to move. This approach is a secured way of guiding system. Modification can be made by adding another
goods but system is not likened to an online Google map. security feature to increase the reliability of the security
An improvement can be made by considering misplacement system.
of goods while unloading and the system should be linked to [4] proposed a lock system that provides the MMS to
an online map for real time location. identify intruder by sending MMS from transmitter phone to
[39] designed and constructed a prototype security door receiver phone. If anyone uses the system, image will be
that can be remotely controlled. A GSM phone set acting as captured by using web camera. The captured image will be
the transmitter and another GSM phone set with dual tone viewed in PC by using MATLAB and the image will be
multi-frequency (DTMF) connected to the door motor compared with the stored images, if it is matched with
stored images the door will be automatically opened. If it is on this system by using biometric instead of RFID and
not matched, the image will be transmitted to mobile phone alarming facility.
by using mobile data cable. After intruder detection the [36] designed a security system in which RFID reader
Alarm and Door Lock Gun will be activated by sending reads the fingerprint from passive tag and sends it to the
commands from receiver to transmitter. The main advantage microcontroller, if the fingerprint is matched then
of this technique is its high speed processing capability and microcontroller sends the password to the authenticated
low computational requirements, in terms of both speed and prisoner mobile number then the authenticated prisoner
memory utilization but lack true identification system for a enters both passwords in the keyboard which was already
facially deformed user due to accident whose facial image given to the user and that received from the microcontroller.
was earlier captured. The system can be modified by If these two passwords are matched then the locker will be
providing another security feature to increase the security opened otherwise the microcontroller sends a warning
reliability of the system. message to the authenticated prisoner mobile number. It is a
[13] designed a microcontroller-based home security secure way of guiding prison using multiple protocols. The
system with GSM technology. Mobile phone is interfaced system has no registration mode to allow for change of
with the microcontroller through a Bluetooth device in order phone number and RFID number without altering the
to control the system. A manual keypad is another way to program in case of change of user. An improvement can be
lock or unlock the system. It is a reliable security system made on the system by incorporating registration mode and
because its bi-modal (parallel) nature, but the system lacks allowing the system to generate codes instead of using an
code registration mechanism and the microcontroller established password.
program lacks auto generated code routine. Modifications [9] proposed an intelligent security system for vehicles
can be made in the design by adding auto-generated code in which the manufacturer initializes the immobilizer and
device and making the security features work serially, thus near field communication (NFC) tag with authentication
making it multiprotocol device. key. The manufacturer also installs the smart secure mobile
[1] designed GSM based authorized access with application in smart phone which is NFC enabled. The
separate user password door lock/unlock control system. vehicle user reads the authentication key from NFC tag
SMS application sends data through GSM Modem. Another using NFC reader and stores the key in encrypted form.
GSM device connected at the receiving end which is fed to When it is necessary to unlock the vehicle, smart phone is
the microcontroller. The microcontroller initiates a placed closer to immobilizer. After placing, immobilizer
mechanism to open the door through a motor driver reads the key and decrypts the key. Then immobilizer
interface, if the sent data (password entered by the user) verifies the key with authentication key. If it is matched, it
matches with the password stored in the microcontroller. unlocks the vehicle; otherwise it sends an alert message. It
This is simple and will give a good value for investment but provides more security to the vehicles using secure
the program in the microcontroller lacks auto-generated hardware, but lack vehicle location facilities and notification
code routine. Improvement can be made by programming mechanism to notify the owner of an intruder. An
the microcontroller to generate codes. improvement can be made by the combination of biometric,
[5] designed a GSM based attendance monitoring GPS and GSM technology, i.e. biometric for unlocking,
systems which lock/unlock the door whenever the student GPS to locate the position of vehicle and GSM for
sweeps the RFID tag near RFID Reader. The Student notification.
Details will be indicated on the LCD display and send [8] developed a microcontroller-based biometric locker
through GSM SIM 300 Modem to parents to display system with short message service (SMS). The system scans
whether the student is present or not. It is a reliable fingerprint, match it with the saved pattern and unlock the
attendance base system especially with the feature of parent locker. The global system for mobile (GSM) module was
notification, but the system lacks registration mechanism able to send text message containing the auto-generated pass
and true identification system to alert the administrator of code of the locker when an unrecognized fingerprint was
any manipulated intruder. The system can be improved encountered. It is a simple and reliable way of safeguarding
further by adding registration mechanism, alarming a lock system, but the system has no registration mode
mechanism and true identification system. Extending the mechanism to register finger pattern of new user. An
system with Online Web based attendance system that can improvement can be made by incorporating registration
be made by providing the Student Database to the host mode and adding another security features to increase the
Computer so that the Student’s Record is to be updated security reliability.
automatically could also be feasible. [40] designed and implemented a door locking system
[16] designed a Campus Access Management System using android app. The software was designed using an
based on RFID technology. The data from RFID reader is android app that generates a password that is recognized by
transmitted to a Centralized Remote Computer or Server the Bluetooth to control opening and closing of the door
located in the administrative office of the college through a located at some distance from the user. The Bluetooth
RS-232 interface. The centralized server determines the module that is installed on the door receives the command
authorization & access control rights. Access codes are from the android phones and passes these commands to the
entered through a Keypad. The entire program code was microcontroller that control opening and closing of the door.
written in Microsoft Visual Basic 6.0 Software. This This design was simulated in Proteus integrated
approach presents a highly coordinated attendance system, development environment after which the hardware was
but the system lacks secured security feature and alarming built on experimental boards. The performance of the
mechanism to notify the security. Modification can be made system agrees excellently with its conception. The system
can be used in various situation where access to an presented. The methodology used in achieving this smart
enclosure need to be secured. lock system was also discussed using block diagram. The
[41]designed motion detector alarm and security various methods of the door operations using Camera view
system. The project is built using an embedded and button, STSP button, GSM call, and Mobile App were
microcontroller system capable of detecting motion of an tested and it was successful. Plates of the prototype of the
intruder in a restricted area and then triggering an alarm smart lock system were presented and discussed. Though it
system, motion detector system, however passive infrared may be impossible to guarantee absolute security, threat
sensor detected the motion of the person using the person identifying and risks of this system are vital steps toward
body heat. The passive infrared (PIR) sensor which is the improving security.
option detector used in this project is attached to a
microcontroller which activates the alarm system and any IV. METHODOLOGY
other attached output device to notify the house owner. The This android and GSM based door security system
future improvement of the project are great considering the is a microcontroller-based design which controls a door via
amount of time and resources it saves. This system van be voice input using Google’s open-source speech-to-text on
used as a reference for project of greater level including the android application as well as via SMS through the
audio-visual cameral by sending the captured image to an mobile phone.
email instantly. However, regardless of all the above revised An HC-05 Bluetooth module is employed to serve
numerous accomplishments, a door security alarm system as a wireless link between the android application and the
using SMS verification and Voice Recognition is effective door while a SIM800L GSM module is employed also to
to ensure security for door security alarm systems. serve as a wireless link between the microcontroller
[42] A Review Advancement of Security Alarm System (ATMEGA328P) unit and the mobile station (i.e. the mobile
Using Internet of Things (IoT). A home security alarm phone). The communication between the microcontroller
system was designed and implemented based on the and other components of the system takes place serially.
Microsoft Kinect sensor. The introduced system can detect The microcontroller continuously receives command
intrusion and respond to it in real-time. If the intrusion is from the GSM module and the android application
detected, the system sends SMS as a notification to the connected through the Bluetooth module. It then takes
authorized user. Moreover, as soon as the intrusion is decision on the basis of the command received. The system
detected, pictures will be taken using the RGB camera of the has been designed to work with GSM technology, which
Kinect. These pictures will be sent to the authorized user via will generate a message, every time an intruder tries to get
email, and saved on the local drive. Simultaneously, the an unauthorized access to the house.
proposed system emits a loud sound to frighten away The hardware design will consist of the microcontroller
intruders. The proposed system could be used in homes, (ATMega328P), Bluetooth module (HC-05), GSM module
offices, warehouses, banks, hospitals, etc. (SIM800L), button, motor driver (L298N) and the buzzer.
[43] build a Real-Time Home Security Alarm System From the circuit diagram, the Bluetooth module, GSM
Using a Kinect Sensor, Home monitoring systems are module and the button (this will be used to open the door
widely used nowadays. This project focuses on the design from inside) are the inputs into the microcontroller while the
and implementation of a low cost, smart and compact real- motor driver and the buzzer are the outputs of the
time monitoring home security system using the Kinect microcontroller.
sensor and the Kinect SDK. Instead of developing new
methods to detect and track humans, this work focuses on
developing a high-level approach based on the Kinect
Windows SDK. The results have shown the use of the
Kinect device to build the introduced system as efficient
with a low computational complexity. Although the
proposed system’s algorithm presents a promising method to
build home security systems, further development may be
added. For example, the system performance can be
improved by applying multithreading techniques. In
addition, video-recording feature may be added to the
proposed system. Figure 7: Generalized block diagram of the door security
However, in view of the different design done by alarm system [5]
previous researchers, it was noticed that the researchers
worked with either Voice command using android The design of the door security alarm system
application or SMS verification via SM module but didn’t involved calculation of component values and their
incorporate the use of voice command and SMS verification specifications, stage by stage presentation of all individual
together some loophole are it doesn’t generate automatic modules and their operational principles. The design
intruder message which will indicate the number trying to consists of the following stages/units;
access the security keyword or call the house owners once a i. The Microcontroller
wrong voice command is used, that is where this project The microcontroller system is designed around the
comes handy to bridge the gap by making use of the two Atmel’s ATMEGA328P microcontroller. ATmega328P
security measures. microcontroller is the most popular of all AVR controllers
In this paper, the design and construction of a Prototype as it is used in Arduino boards. It is a high performance, low
smart door lock with an embedded spy camera was power controller from Microchip and an 8-bit
was implemented for this stage using LM317, an adjustable its working ability. The construction of this project was
output positive voltage regulator. done in three different stages.
Power supply stage for the Microcontroller - The implementation of the whole project on a
The output of the LM317 is obtained thus: solder-less experiment board (bread board).
- The soldering of the circuits on printed circuit
board.
- The coupling of the entire project to the casing.
i. Implementation
The implementation of this project was done on the
breadboard. The power supply was first derived from a
bench power supply in the school electronics laboratory to
confirm the workability of the circuits before the power
Mini Battery backup Stage supply stage was soldered. The implementation of the
This stage seeks to provide an uninterrupted source of project on bread board was successful and it met the desired
power for the design. When mains supply is available, the design aims with each stage performing as designed.
mini battery backup stage charges the battery and power the ii. Soldering
design using main supply. In the event of mains failure, with The various circuits and stages of this project were
the switch turned on, the design runs on the battery backup. soldered in tandem to meet desired workability of the
For the battery charging part, a limiting resistor is used to project. The power supply stage was first soldered before
limit the current delivered to the battery. The value of the the microcontroller, digital display and transistor- relay
resistor is chosen so that the charging current to the cells is switching stages were done. The soldering of the project
not greater than of the cell capacity. For this design, was done on a printed circuit board.
a battery rated at 4500mAh is used; the charging current Plate 4.1 below shows the soldering and component
must not exceed 450mA. arrangement on the printed circuit board.
When calculating the value of the resistor, the value of the
no-load voltage should be used. This will give the highest
charging current. The battery terminal voltage measures
6.9V when fully charged and the no-load output voltage of
the power supply is 11.33V.
Plate 6: Shows the initialization of the android app using Plate 8: Shows the keyword is wrong.
the Google speech recognition.
Testing
Computer, Energetic, Electronic and Communication [16] Komal,K.M. &Dhiraj,G.A. (2015): Campus Access
Engineering Vol. 7(12), pp 1748-1752. Management System via RFID, International Journal
of Innovative Technology and Exploring Engineering
[3] Anubala,B., Rahini,M. &Bavithra,T. (2014): (IJITEE), ISSN: 2278-3075, Vol.4(8), pp 23-27.
Intelligent Door Locking System.International Journal
of Engineering Research and Applications (IJERA) [17] Lay,Y. L., Yang,H. J. &Tsai,C. H. (2011): Biometric
ISSN: 2248-9622 International Conference on Locker System, Proceedings of the World Congress on
Humming Bird,pp 50-53. Engineering and Computer Science (WCECS) 2011,
San Francisco, USA, Vol. I, pp 1-4.
[4] Anupriya,S., Elakya,P., Kamatchi,B., Manasa,D. &
Rohini,G.(2014): Advanced Entry Level Protection [18] Lee, Seungmug; Wilson, Harry (2013). "Spatial impact
System for Theft.International Journal of Computer of burglar alarms on the decline of residential
Networks and Communications Security, Vol. 2(4), pp burglary" . Security Journal. 26 (2): 180–198.
125–128. doi:10.1057/sj.2012.8 . ISSN 0955-1662
[5] Anushri J, Vijay L K & Barkha N (2015): RFID and [19] Lia, K, Alfin,N.S.R, Mada S.W.S. &Edi,M. (2014):
GSM Based Attendance Monitoring System using Door-Automation System Using Bluetooth-Based
door locking/unlocking system and Its Hardware Android for Mobile Phone,Asian Research Publishing
Implementation, Journal of Management Engineering Network (ARPN) Journal of Engineering and Applied
and Information Technology (JMEIT), Vol. 2(3), pp 5- Sciences, Vol. 9(10), pp 1759-1762.
10.
[20] Lynn,A.D & Anne,L.O. (2009): RFID and Application
[6] Chen, Pin-Wei; Young, Gregory (December 1984). Security, Journal of Research and Practice in
"Ported coax intrusion detection sensor". Information Technology, Vol. 41(3),pp 209-221.
IEEETransactions on Antennas and Propagation. 32
(12): 1313–1317. [21] Manasee,P. & Reddy,S.R.N. (2013): Design and
Implementation of Home/Office Automation System
[7] Chilo, José; Lindblad, Thomas (2008). "Wireless data based on Wireless Technologies,International Journal
acquisition system using Bluetooth technology of Computer Applications,Vol. 79(6), pp 19-22.
forinfrasonic records". Computing. 7 (2): 18–21
[22] Mohammed Mynuddin Sayidul Morsalin Md. Kamal
[8] Crystalynne,D. C., Jaswinder,S. B., Jocelyn,R. H., Hossain Prodip Biswas Design and
Ditche,J. C. A., Melvie,S. D. C.&Jaira,C. I.(2016): Implementation of Smart Home Security System
Development of Microcontroller-Based Biometric International Journal of Modern Embedded System
Locker System with Short Message Service” Lecture (IJMES) Volume No.-2, Issue No.-6, December, 2014
Notes on Software Engineering, Vol. 4(2), pp 103-106.
[23] Mohan,P. & Vinoth,K.M. (2014): Development of
[9] Fathima G. DivyaBarathi A, Jaya S & Manjushree R Individual Home Security System Using CAN and
(2015): Intelligent Secure System for ZIGBEE Protocol, International Journal of Research in
Vehicles,International Journal for Scientific Research Engineering and Technology,Vol. 03(07), pp581-585.
& Development(IJSRD), Vol. 3(02), pp 438-442,
[24] Nwankwo,P.N., Nsionu,I.I. &Ezeilo,C.J. (2013):
[10] Geoffrey,C.T. S. (2012): Automatic Access Control Design and Implementation of Microcontroller Based
System using Student Identification Card Based on Security Door System (Using Mobile Phone &
RFID Technology, Unpublished Undergraduate Computer Set), Journal of Automation and Control
Projectof Faculty of Electrical Engineering Universiti Engineering, Vol. 1(1), pp65-69.
Teknologi Malaysia, pp 1-4.
[25] Oke,A.O., Adigun,A.A., Falohun,A.S., &Alamu,F.O.
[11] Gowsalya,M., Sangeetha,M., Sri,D.K.K., Divya,N. & (2013): Development of a Programmable Electronic
Devika,T. (2014): A Novel Approach Automatic Digital Code lock system, International Journal of
Digital Door Opening and Closing Security System, Computer and Information Technology, Vol. 02(01),
International Journal of Innovative Research in pp 127-131.
Electrical, Electronic, Instrumentation and Control
Engineering, Vol.2(2), pp 991-996. [26] Oyebola B. O. Development of HCO6 Bluetooth
Based Switching Automation of Domestic Electrical
[12] Gyanendra,K. V. &Pawan,T. (2010): A Digital Powered Appliances through an Application Software
Security System with Door Lock System Using RFID on Android Phone Platform international Journal of
Technology,international Journal of Computer Smart Home Vol. 9, No. 12, 2015
Applications,Vol. 5(11), pp 6-8.
[27] Prasanna,K.R. &Hemalatha,M. (2012): Secure
[13] Hasan,R., Khan,M. M., Ashek,A. &Rumpa, I. J. Logistic Management System Using Wireless
(2015): Microcontroller Based Home Security System Technologies, Research Journal of Applied Sciences,
with GSM Technology, Open Journal of Safety Engineering and Technology, Vol. 4(12), pp1785-
Science and Technology, 5, pp 55-62. 1789.
[14] Hussaini, H., Adamu,M.Z, Ajagun,A.S., Ijemaru,G. [28] Prashantkumar,R., Sagar,V. C., Santosh,S.
K.&Oresanya,B.O.(2014): Design of a GSM-Based &Siddharth,N.(2013): Two Wheeler Vehicle Security
Biometric Access Control System Control Theory and System, International Journal of Engineering Sciences
Informatics, Vol.4(8), pp 1-21. & Emerging Technologies, Vol. 6(3), pp 324-334.
[15] Jaykrishan,P., Joyson,B., Ketan,P., Viral,P., [29] Priti,K.P.&Zadem,G. N. (2014): Realtime Car
&Ramanuj,G. (2014): Armoured Infrastructure using Antitheft System with Accident Detection using AVR
Multiple Protocols, International Journal of Computer Microcontroller; A Review, International Journal of
Science and Information Technology Research, Vol. Advance Research in Computer Science and
2(4), pp: 170-174. Management Studies, Vol. 2(1), pp 509-512.
[30] Raghu,R.G. &SubhramanyaSarma,G. (2013): Locker [41] Kamoru O.I., Olukayode M. F., Shadrack A. E., Akin
Opening and Closing System Using RFID, Fingerprint, J. A., Olatunji T. O. “Design and Implementation of
Password and GSM, International journal of emerging Motion Detection Alarm and Security System”.
trends & technology in computer science (IJETTCS), Innovation: International Journal of Applied Research;
Vol. 2(2), pp 142-145. ISSN: 2347 9272 (Volume-5, Issue-1) , 2017.
[31] Ramani,R., Valarmathy,S., Suthanthira,V.N., [42] Mehmet Cavas and Muhammad Baballe Ahmad “A
Selvaraju,S., Thiruppathi,M. & Thangam,R. (2013): Review Advancement of Security Alarm System using
Vehicle Tracking and Locking System Based on GSM Internet of Things (Iot)” International Journal of New
and GPS, I.J. Intelligent Systems and Application, Computer Architectures and their
(IJISA.),pp 86-93. Applications 9(02):38-49 DOI:10.17781/P002617.
November 2019.
[32] RS Ragmahale. "A Literature Survey on Smart Home
Automation Security." International Journal of [43] Zaid A. Mundher; Khalida Basheer; Safaa Ayad
Computer Networks and Communications Security 6, Najeeb; Rami Zuhair. “Build a Real-Time Home
no. 1 (2018): 1-8. Security Alarm System Using a Kinect Sensor” AL-
Rafidain Journal of Computer Sciences and
[33] Sandeep,S. R., Feroz,M., Sadiya,T. &Mohamed,N. S. Mathematics, 2019, Volume 13, Issue 2, Pages 26-34
(2014): Tracking and Checking Cargo Containers 10.33899/csmj.2020.163512.
Pilferage Using Electronic Lock, International Journal
of Technical Research and Applications,Vol.2(5), PP [44] https://nettigo.eu/products/sim800l-gsm-grps-module
113-116.
[45]https://components101.com/microcontrollers/atmega32
[34] Sen,M. (2006):Lecture Notes on Intelligent Systems, 8p-pinout-features-datasheet
Department of Aerospace and Mechanical Engineering
University of Notre Dame, Notre Dame, IN 46556, [46]https://www.theengineeringprojects.com/2017/08/i
U.S.A. nt roduction-to-atmega328.html