0% found this document useful (0 votes)
195 views38 pages

IoT Smart Door Lock System Project

for download

Uploaded by

someshyadav9383
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
195 views38 pages

IoT Smart Door Lock System Project

for download

Uploaded by

someshyadav9383
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

IOT Based Smart Lock System

Project -II
Submitted in partial fulfillment of the requirement for the award
of Degree of Bachelor of Technology in Computer Science
&Engineering (IoT)

Submitted to: -

RAJIV GANDHI PRODYOGIKI VISHWAVIDYALAYA, BHOPAL (M.

Submitted by:

Lagan Koolwal – 0808io211020


Nitish Singh– 0808io211028
Somesh Yadav – 0808io211044
Vikas Yadav-0808io211047

Under The Supervision Of:

Ms. Kalyani Tiwari

IPS ACADEMY, INDORE


INSTITUTE OF ENGINEERING & SCIENCE
(A UGC Autonomous Institute Affiliated to RGPV)
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING (IoT)
SESSION: 2024-25
IPS ACADEMY, INDORE
INSTITUTE OF ENGINEERING & SCIENCE
(A UGC Autonomous Institute Affiliated to RGPV)
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING (IoT)
2024-25

Project-II entitled

“IOT Based Smart Lock System”

For the partial fulfilment for the award of the Bachelor


of Technology (Computer Science & Engineering-IoT)
Degree by Rajiv Gandhi Proudyogiki Vishwavidhyalaya,
Bhopal.

Guided by: - Submitted by: -

MS. Kalyani Tiwari Lagan


Koolwal – 0808io211020
Nitish
Singh– 0808io211028
So
mesh Yadav – 0808io211044
Vikas
Yadav-0808io211047
IPS ACADEMY, INDORE
INSTITUTE OF ENGINEERING & SCIENCE
(A UGC Autonomous Institute Affiliated to RGPV)
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING (IoT)
2024-25

CERTIFICATE
This is to certify that Project -I entitled

“IOT Based Smart Lock System”

has been successfully completed by the following


students

Lagan Koolwal-Nitish Singh-Somesh Yadav-Vikas Yadav

in partial fulfilment for the award of the Bachelor of


Technology (Computer Science & Engineering-IoT)
Degree by Rajiv Gandhi Proudyogiki Vishwavidhyalaya,
Bhopal during the academic year 2024-25 under our
guidance.

Ms. Kalyani Tiwari Ms. Kalyani Tiwari Dr


Neeraj Shrivastava
Guide Designation Branch Coordinator
HOD
Dr Archana Keerti Chowdhary
Principal

Acknowledgement

I would like to express my heartfelt thanks to my guide, Ms. Kalyani


Tiwari, CSE(IoT), for his/her guidance, support, and encouragement
during the course of my study for B. Tech (CSE-IoT) at IPS Academy,
Institute of Engineering & Science, Indore. Without his/her endless
effort, knowledge, patience, and answers to my numerous questions,
this Project would have never been possible. It has been great honour
and pleasure for me to do Project under her supervision.

My gratitude will not be complete without mention of Rd. Archana


Keerti Chowdhary, Principal, IPS Academy, Institute of Engineering &
Science, Dr. Neeraj Shrivastava, HOD CSE and Ms. Angita Hirwe, Branch
Coordinator CSE (IoT), for the encouragement and giving me the
opportunity for this project work.

I also thank my friends who have spread their valuable time for
discussion/suggestion on the critical aspects of this report. I want to
acknowledge the contribution of my parents and my family members,
for their constant motivation and inspiration.

Finally, I thank the almighty God who has been my guardian and a
source of strength and hope in this period.

Lagan Koolwal – 0808io211020


Nitish
Singh– 0808io211028
Somesh
Yadav – 0808io211044
Vikas Yadav-
0808io211047

CONTENTS

List of Figures vi
List of Tables vii
List of Abbreviation viii
Abstract ix

CHAPTER 1: INTRODUCTION
1.1 Overview
1.2 Literature Survey
ABSTRACT:
The IoT-Based Smart Door Security System will serve
to provide smart, automated access control using an
ESP32 microcontroller, RFID reader, and solenoid
lock. It denies or grants access based on the scanned
RFID card. In case of unauthenticated attempts, it
triggers alerts by displaying red LED and buzzing, and
the event is logged in a Google Sheet for record
keeping. It unlocks the door and activates the
solenoid lock, buzzers indicated as successful, and
the green LED for authorized access. Card information
is recorded in the Google sheet and allows one to
view live remote monitoring and logging of access
events. This interconnection of IoT with security
enhances the access control system perfectly for
homes or offices.
Keywords:
Internet of Things; home automation; smart homes; sensors
INTRODUCTION

IoT-based Smart Door Security System


It is a leverages modern technology to provide a
secure, automated access control solution. The
system is built using an ESP32 microcontroller, an
RFID reader, and a solenoid lock. The core
functionality revolves around reading RFID cards to
grant or deny access.

When a card is scanned by the RFID reader, the


system checks whether it is authorized. If the
scanned card is invalid, the system triggers a red LED
to blink, the buzzer sounds as an alert, and the event
is logged in a Google Sheet for record-keeping. This
ensures that any unauthorized access attempt is
immediately flagged and tracked.

If the correct card is presented, the system activates


a green LED, the buzzer sounds briefly to indicate
success, and the door unlocks by powering the
solenoid lock. Additionally, the card details, such as
the user ID, are sent to the Google Sheet for logging
purposes, providing a record of each successful entry.

This project integrates IoT with security systems to


create a smart and efficient door locking solution. The
remote monitoring and data logging in real time
enhance security while allowing users to monitor
access from anywhere, making it ideal for home or
office automation.

TABLE1.1
Features comparison of my project Based on last 10
years.
Feature Your IoT- Other Smart Door
Based Smart Lock Systems (Last
Door 10 Years)
Security
System
Microcontrolle ESP32 Varied: Arduino,
r ESP8266, Raspberry Pi,
custom controllers
RFID Reader Yes (RC522) RFID used in some, but
many use keypads,
biometrics, or mobile app
integration
Yes (12V Often uses motorized
solenoid lock) deadbolts, smart cylinder
locks, or electronic
strikes
Access Control RFID Cards Keypads, biometric
Method (fingerprint), mobile
apps, Bluetooth, NFC
Alerts for Red LED + Push notifications
Unauthorized Buzzer + Google (mobile apps), SMS
Access Sheets Logging alerts, emails, or just
visual/audio alarms
Remote Google Sheets Cloud-based apps, home
Monitoring integration for automation hubs (e.g.,
logs Alexa, Google Home),
dedicated mobile apps
Logging Card UID, name, Typically integrated with
date, time proprietary cloud
logged in Google services or mobile apps
Sheets for logging and access
history
Real-Time Google Sheets Cloud-based platforms
Data Sync API for immediate sync to
mobile apps
Wi-Fi Enabled Yes (ESP32 with Often uses Wi-Fi,
Wi-Fi) Bluetooth, or Zigbee for
connectivity
User Based on card Most modern systems
Authorization UID use cloud databases for
System user management (via
apps or web interfaces)
Cost Efficiency Cost-effective Varies widely, with many
(using off-the- commercial systems
shelf being relatively
components) expensive
DIY Capability Fully Most commercial
customizable and products are plug-and-
DIY play, with limited or no
customizability
Integration Can integrate Full integration with
with Other with Google smart home ecosystems
Systems Sheets like Alexa, Google Home,
IFTTT
Power Source Powered via Battery-powered, USB-
external 12V powered, or hardwired
supply (solenoid options available
lock)

Literature Review: IoT-Based Smart Door Security


System
The Internet of Things has revolutionized the face of
other sectors, from home automation to security
systems, in the last few years. Intelligent door locking
systems, implemented with wireless communication,
advanced methods of authentication, and so much
more, have attracted extensive attention because their
human needs increase day by day for better security
and accessibility in domestic and commercial scenarios.
1. Development of Smart Lock Systems
This concept of smart door locks has very much evolved
over the last decade. Although the early systems were
mechanical or electronic, early versions used a keypad
and mechanical locks. With the growth and
advancement of IoT technologies, modern versions will
include wireless communication protocols such as Wi-Fi,
Bluetooth, and Zigbee, giving the user remote control
and monitoring capability (Kumar & Lee, 2016). Many
research has been presented on security aspects of
these systems mostly in domestic settings, where user-
friendly interface and real-time control is very much in
demand (Zhu et al., 2019).
2. RFID-Based Access Control
RFID is one of the most popular technologies used for
access control applications of smart locks. It offers
contactless authentication. It is very easy to handle and
secure for door lock applications. A product by
Lehpamer (2018), RFID holds much strength and
reliability in secure access control, with low-cost
implementation and high scalability. This RFID-based
systems became very much prevalent in offices and
homes where all user identification on behalf of a
unique card UID ensures only authorized personnel can
access restricted places.
This aspect is carried out in your project by employing
an RFID-based RC522 for authentication. It is further
followed by a simple, secure form of access control.
Further connectivity and advancement have been
established with the addition of an ESP32
microcontroller. This will enable the system to carry out
IoT features such as remote monitoring and data
logging capability (Gaur et al., 2018). It has been
studied that RFID-based smart locks are known to
efficiently strike a balance between security and ease of
use, especially when a wireless communication-based
system is accessed remotely.

3. IoT and Cloud Integration


The IoT integration is one of the factors that have led to
such access and real-time monitoring- access to the
door locks. Nowadays, some of these platforms, instead
of in-site servers, store and keep tabs on such access
logs using cloud-based systems like Google Sheets or
proprietary apps. Mehta and Raskar 2020 research
identifies the added benefits in cloud integration such
as data logging in real-time improves security, while
access history is maintained to track attempted
breaches made by admins. Integration idea is quite
suitable to your project on the utilization of Google
Sheets for logging card UID, information of users, and
timestamps for each occurring access event.
In addition, IoT-enabled systems feature the ability of
users to set control for lock devices using mobile
applications or web interfaces. These are highly sought
after features in the contemporary smart home
environment. Commercial products such as August
Smart Lock and Yale's Assure Lock have these
capabilities but at cost more plus low customizability
options. Therefore, DIY projects like yours show
flexibility and possibilities to customize based on
specific user requirements.

4. Security of IoT-Based Door Locks


While IoT-based door locks have various advantages,
there are some security threats that inculcate in the
deployment process. According to various reports, such
potential weaknesses include unauthorized access
because of weak encryption, signal interference or
interception, and physical tampering (Römer et al.,
2019). In consideration of such factors, researchers took
it upon themselves to explore secure communication
protocols like TLS to ensure the data shared between
the lock and the cloud or a mobile application was
encrypted in the process (Wu et al., 2020).
Your project counters some of these risks by logging all
attempts for accessing the system, including failure to
scan cards, thus offering a log of such suspicious
activity; yet additional measures such as encrypting
data before any form of transmission, and having
several layers of authentication before a user gains
access to the system can guarantee higher security for
your system.

5. Usability and Cost-Effectiveness


DIY IoT projects, like the one you are building, were
found to be much cheaper and customizable. As Shah et
al. pointed out, considering DIY smart door lock systems
over the commercial ones, the research about it reveals
that the DIY systems are more difficult to install while
the same time offer much more flexibility and are much
less expensive. Because components such as the ESP32
microcontroller and RFID modules are used, it is a very
cost-effective system, and hence it extends its reach to
a larger audience.
In fact, user-friendly design is an important factor for
the application of smart locks in the consumer market.
Ease of installation and user experience are prominent
concerns for commercial smart locks. But obviously,
such benefits can be realized with suitable
documentation and proper design for DIY systems
without necessarily referring to a specialist.

6. Emerging Trends and Future Directions


The latest innovations of the smart door locks are now
manifesting at the biometric level. Biometric
Authentication: No longer is it about keypads, or even
RFID-based methods; the next thing would be
fingerprint recognition, facial recognition, and even
voice commands (Ahmed et al., 2021). They are much
more secure than keypad locking or RFID but could be
pricier. There has also been a trend for smart home
ecosys- tems to incorporate these into the space, where
you could gain control with voice commanded digital
assistants, like Amazon Alexa or Google Assistant, in
place.
Though it is concentrated on RFID and cloud-based
logging, your project can be built into the future with a
biometric or voice-controlled facility. It will enhance
security, deliver a seamless user experience, and align
with the latest trends in smart home automation.
AIM

The aim of this project is to create a smart,


automated door lock system using IoT
technology that enhances security, provides real-
time monitoring, logs access data, and grants or
denies entry based on RFID card verification.

NEED
The need of this project arises from the
increasing demand for secure, automated access
control in homes and offices. Traditional locks
can be vulnerable to theft or duplication. An IoT-
Based Smart Door Security System offers
enhanced security, real-time monitoring, and
data logging, providing a more reliable and
efficient way to manage and track entry
access remotely.
Project Implementation Explanation: RFID-Based
Smart Door Lock System
1. Overview of the System
The project is a Smart Door Lock System that
uses an RFID reader to scan RFID cards and
either grant or deny access. If an authorized card
is scanned, the system unlocks a solenoid lock,
and if an unauthorized card is scanned, it gives a
visual and audio alert.

2. Components Used
Node MCU ESP8266-32 (CP2102-based ESP-
WROOM-32): The microcontroller that processes
the data from the RFID reader.
RFID (RC522) Module: Reads the card's UID.
12V Solenoid Lock: Controls the door mechanism.
12V Relay Module: Acts as a switch to control the
solenoid lock.
LEDs (Green and Red): Provide visual feedback
for authorized and unauthorized cards.
I2C 16x2 LCD Display: Displays messages to the
user.
Mini Buzzer: Sounds alerts for unauthorized
access or successful unlock.
Breadboard and Jumper Wires: For connecting all
components.
3. How the System Works
Step 1: Card Scanning
When an RFID card is brought near the RFID
module, the system reads the card's UID (Unique
Identifier).

Step 2: UID Authorization Check


The system compares the scanned UID with a
predefined list of authorized UIDs. In your case,
the authorized UID is 63 24 a7 50.

Step 3: Response to Unauthorized Cards


If the card is unauthorized:

The red LED blinks.


The buzzer sounds multiple times to indicate
unauthorized access.
The LCD shows the message "Wrong Card".
The solenoid lock remains locked.
Step 4: Response to Authorized Cards
If the card is authorized:

The green LED turns on.


The buzzer beeps once to signal successful
access.
The solenoid lock is unlocked for 3 seconds by
powering it through the relay module.
The LCD displays the message "Correct Card".
After 3 seconds, the solenoid lock automatically
locks again.
4. Key Features
Security: Unauthorized cards trigger an alert,
ensuring no unauthorized access.
Automation: The solenoid lock automatically
locks and unlocks based on the card scanned.
User Feedback: LEDs, buzzer, and LCD provide
real-time feedback on the access status.
5. Hardware Connections
RFID Module (RC522):

SDA (SS) → GPIO 5


SCK → GPIO 18
MOSI → GPIO 23
MISO → GPIO 19
RST → GPIO 4
VCC → 3.3V
GND → GND
Relay Module:

IN → GPIO 13 (to control the solenoid lock)


VCC → 5V
GND → GND
Solenoid Lock:
Positive terminal → Relay NO (Normally Open) pin
Negative terminal → Ground of the 12V power
supply.
LEDs:

Green LED → GPIO 12


Red LED → GPIO 14
Both LEDs are connected with resistors.
Buzzer:

Buzzer → GPIO 15
LCD Display (I2C):

SDA → GPIO 21
SCL → GPIO 22
6. Code Explanation
Libraries: The code uses the MFRC522 library for
RFID functionality and the LiquidCrystal_PCF8574
library for controlling the I2C LCD display.
Card UID Comparison: The scanned card's UID is
compared to the predefined authorized UID.
Control of LEDs, Buzzer, and Solenoid Lock: If the
UID matches, the system lights the green LED,
sounds the buzzer, and powers the relay to
unlock the solenoid. If the UID does not match,
the red LED blinks, and the buzzer sounds an
alert.
7. Running the System
Upload the code to your NodeMCU ESP8266-32
using the Arduino IDE.
Power the system by connecting the
microcontroller and the external 12V power
supply for the solenoid lock.
Scan RFID cards:
If an authorized card is scanned, the door
unlocks for 3 seconds.
If an unauthorized card is scanned, the system
alerts and denies access.
8. Conclusion
This project automates the process of locking
and unlocking doors based on RFID card
authorization, making it ideal for security
purposes. With real-time feedback using LEDs, a
buzzer, and a display, the system ensures that all
access attempts are logged and easily visible.

This implementation guide should help you


explain your project clearly to others.
FUTURE SCOPE
The future scope of this IoT-Based Smart Door
Security System is vast. It can be expanded by
integrating additional security features such as
facial recognition, biometric authentication, or
motion sensors for enhanced access control. The
system could also be linked to mobile
applications for remote management and real-
time alerts, allowing users to control and monitor
access from anywhere. Integration with home
automation platforms like Alexa or Google Home
could further increase its convenience. With
advancements in IoT technology, this system
could be adapted for large-scale
applications,such as smart offices, hotels, or
industrial security solutions.
FEATURES
[Link] Card Authentication: Grants or denies
access based on scanned RFID cards.
[Link]-Time Data Logging: Logs access events
and card details to a Google Sheet.
[Link] Locking Mechanism: Controls the
solenoid lock to secure or unlock the door.
[Link] Feedback: Uses LEDs (green for correct
access, red for incorrect) to indicate status.
[Link] Alerts: Buzzer sounds for both correct
and incorrect card scans.
[Link] Monitoring: Enables tracking and
management of access events
via Google Sheets.
ABOUT COMPONENT
1.ESP32 MODULE
ESP32 is a chip that provides Wi-Fi and (in
some models) Bluetooth connectivity for
embedded devices – in other words, for IoT
devices. While ESP32 is technically just the
chip, the modules and development boards
that contain this chip are often also referred to
as “ESP32” by the manufacturer.
The original ESP32 chip had a single core Ten
silica Xtensa LX6 microprocessor. The
processor had a clock rate of over 240 MHz,
which made for a relatively high data
processing speed.
2. RFID READER MODULE
An RFID reader module is a device that scans
Radio Frequency Identification (RFID) tags. It
emits radio waves to power the RFID tag, which
then sends back its stored data (like an ID
number). The reader processes this data to
identify objects or people. RFID reader modules
are commonly used in access control, inventory
management, and tracking systems.
3. RELAY MODULE
The primary function of a relay module is to
switch electrical devices or systems on and
off. It also serves to isolate control circuits,
ensuring that low-power devices, such as
microcontrollers, can safely control higher
voltages and currents. This capability is
particularly beneficial in scenarios where a
small control signal from a microcontroller
needs to switch `-higher currents. In
essence, a relay module amplifies this control
signal, enabling it to manage more
substantial electrical loads.

It’s essential to differentiate between a relay


and a relay module. While a relay is a single
device comprising an electromagnet and a
switch, a relay module encompasses multiple
relays and additional components. These
extra components provide added layers of
isolation and protection, ensuring the
module’s safe and efficient operation.
4. JUMPER WIRE

Jumper wires are electrical wires with


connector pins at each end. They are used to
connect two points in a circuit without
soldering.

You can use jumper wires to modify a circuit


or diagnose problems in a circuit.
5. I2C MODULE

I2C Module has an inbuilt PCF8574 I2C chip


that converts I2C serial data to parallel data
for the LCD display.

These modules are currently supplied with a


default I2C address of either 0x27 or 0x3F. To
determine which version you have check the
black I2C adaptor board on the underside of
the module. If there 3 sets of pads labelled
A0, A1, & A2 then the default address will be
0x3F. If there are no pads the default address
will be 0x27.

The module has a contrast adjustment pot on


the underside of the display. This may
require adjusting for the screen to display
text correctly.

6. LCD DISPLAY

A liquid-crystal display (LCD) is a flat-panel


display or other
electronically modulated optical device
that uses the light -
modulating properties of liquid crystals
combined with polarizer
. Liquid crystals do not emit light directly
but instead
use a backlight or reflector to produce
images in colour
or monochrome.
LCDs are available to display arbitrary
images (as in a
general-purpose computer display) or fixed
images with
low information content, which can be
displayed or hidden:
preset words, digits, and seven-segment
displays (as in a digital
clock) are all examples of devices with
these displays. They use
the same basic technology, except that
arbitrary images are
made from a matrix of small pixels, while
other displays have
larger elements.
[Link] LOCK
5V electromagnetic solenoid lock uses
electricity to generate a magnetic field
inside a coil, which moves a metal rod
(plunger) to unlock the mechanism.
When 5V power is supplied, the
magnetic force pulls the plunger,
unlocking the lock. Once power is
turned off, a spring pushes the plunger
back, locking it again. It’s commonly
used in electronic locking systems.
[Link] BULBS
A red & green LED bulb is an energy-
efficient light source that emits a red &
green light using light-emitting diodes
(LEDs). Unlike traditional bulbs, it uses
less electricity and lasts longer.
Commonly used for decorative
purposes, indicators, or special effects,
red LED bulbs are durable and provide a
vivid, consistent red light. They are
ideal for both functional and aesthetic
applications.
9. BUZZER
A buzzer, also known as a beeper, is
a small electronic device that
produces sound when an external
voltage is applied. Buzzers are used
in many electronic products,
including computers, printers,
photocopiers, and alarm devices.
They can also be used to confirm
user input, such as a mouse click or
keystroke.
Project Outcome: RFID-Based
Intelligent Door Lock System
Card Identification with Correct UID
as Success:
Once the card is detected through
the RFID module, then its unique ID
is scanned appropriately and is
shown on the LCD.

Card Identification with Incorrect


UID as Failure:
Once it has scanned through with
the support of the RFID module,
though the system responds back to
the valid cardUID: 63 24 a7 50 is
going to be :
Green LED is on One beep from the
buzzer, which shows it is a success
The Solenoid lock gets opened and
the door unlocks.
LCD shows "Correct Card"
The system gets secured when the
lock gets locked up automatically
within 3 seconds
Reaction on reading of an
unauthorized card in the system:

Every time that an unauthorized


card gets read into the system:
Red LED blinks
Buzzer gives continuous On and off
sound showing unauthorized access
has been made.
LCD displays "Wrong Card."
The solenoid lock is not unlocked for
it is left on the intruder
Visual and Audio Feedback:
Feedback is immediate through the
LEDs, Buzzer, and LCD display to
finally decide whether access has
been granted or not.

Trusted Lock Mechanism:


The solenoid lock is very efficient for
it opens and closes the door
according to the status given out by
card authorization.

In short, the project was


accomplished to an objective: to
build a safe and an automatic
locking of a door that is responding
correctly to an authorized or
unauthorized RFID card.
Conclusion
Literature regarding the IoT-based smart door locks
indicates that the RFID-based systems, like the one in
your project, are practical, cost-effective, and secure
solutions for access control. IoT integration
technologies, such as Google Sheets for real-time data
logging, will be key to the adaptation of smart home
security systems with today's trends of greater reliance
on remote monitoring and control. As well, safety
challenges still come up, but ongoing advancements in
encryption and biometric authentication present some
of the areas where such systems can improve in the
future.
This project aligns with the trends listed above as it
provides a smart locking mechanism configurable and
efficient with further opportunities for enhancement to
improve security and friendliness.

References
Ahmed, S., Khan, M., & Ali, M. (2021). Emerging trends
in biometric-based smart locks. International Journal of
Security Technology, 45(3), 567-589.
Gaur, P., Singh, A., & Sharma, V. (2018). IoT-Based Smart
Door Security System using ESP32 and RFID.
International Journal of Advances in IoT Technology,
9(2), 87-95.
Kumar, P., & Lee, H. J. (2016). Security issues in smart
home door lock systems. Journal of Communications and
Networks, 18(2), 123-130.
Lehpamer, H. (2018). RFID Design Principles and
Applications. Artech House.
Mehta, R., & Raskar, A. (2020). Cloud integration in IoT
smart locks: A survey. Journal of Smart System Design,
7(1), 34-45.
Römer, K., Scholz, M., & Wiese, T. (2019). Securing IoT-
based smart locks: Challenges and solutions. Security in
IoT Applications, 24(4), 78-93.
Shah, V., Patel, D., & Joshi, K. (2021). Comparing DIY
and commercial smart door lock systems. Journal of
Engineering and Technology, 12(5), 156-165.
Wu, J., Chen, X., & Li, Y. Secure communication protocols
for IoT-based smart home devices. Journal of Information
Security and Applications, vol. 52, no. 1, 2020, pp. 24-
35.
Zhu, H., Li, Z., & Xu, W. Real-time monitoring and access
control in smart door locks: A review. IoT Security
Journal, vol. 5, no. 3, 2019, pp. 233-245.

Common questions

Powered by AI

Key features of the IoT-based smart door security system include RFID card authentication for granting or denying access, real-time data logging to Google Sheets, and an automated locking mechanism using a 12V solenoid lock . Security mechanisms involve alerting unauthorized access attempts with a red LED, sounding a buzzer, and logging events for monitoring . These features enhance security by providing immediate feedback on access attempts and maintaining an access log that can be reviewed remotely . The system's design ensures unauthorized access attempts are quickly identified and stored for further security assessment, thus significantly enhancing overall security through proactive monitoring and convenient logging .

The IoT-Based Smart Door Security System balances security and user-friendly design through its straightforward RFID authentication process and real-time feedback mechanisms. The use of RFID cards simplifies user access by providing a contactless and rapid authentication method, which is less complex compared to alternative methods like biometrics . User-friendly visual and audible feedback mechanisms immediately inform users of their access status, contributing to seamless operation and user comfort . The system’s integration with Google Sheets for logging maintains transparent security tracking while offering ease of use in data management . Overall, the system combines advanced security features with intuitive operation, ensuring robust access control without compromising user convenience .

The IoT-based smart door security system incorporates remote monitoring capabilities through its integration with Google Sheets, allowing for real-time access log management and monitoring from any location with internet access . This feature enhances user convenience by enabling security oversight without the need for physical presence at the location. Users can check access history, discern patterns, and track unauthorized attempts remotely . This capability not only boosts security by providing continuous real-time surveillance but also facilitates swift responses to potential security breaches, thereby reinforcing overall user security management . The ability to monitor and manage access remotely aligns with modern expectations for IoT smart home systems, providing an efficient and effective approach to maintaining security and user convenience .

The integration of IoT and cloud technologies in the smart door security system enables real-time monitoring and effective security management by utilizing components such as the ESP32 microcontroller for connectivity and Google Sheets for data logging . This setup allows for remote access management and event logging from anywhere with internet connectivity . By storing access events and user data in Google Sheets, users can maintain up-to-date access logs and track attempted breaches, thereby improving overall security and facilitating quick responses to unauthorized access attempts . Cloud integration allows for scalability in access log storage and user management, providing robust data persistence and ease of integration with other systems for enhanced security management .

The IoT-Based Smart Door Security System is considered cost-effective because it uses readily available off-the-shelf components like the ESP32 microcontroller and RFID modules, which are generally cheaper than components used in many commercial systems . This DIY approach allows for significant cost savings on hardware expenses and offers more flexibility and customization according to specific user needs . Compared to commercial smart lock systems, which often include proprietary technologies and services resulting in higher costs and limited customization, this system provides a budget-friendly alternative accessible to a broader audience . The use of Google Sheets for logging and monitoring further lowers costs by eliminating the need for proprietary cloud services .

IoT-based smart door locks face security vulnerabilities such as unauthorized access due to weak encryption, signal interception, or physical tampering . To mitigate these risks, deploying strong encryption protocols such as TLS can secure data transmission between the lock and the cloud or mobile applications . Implementing additional layers of authentication, such as two-factor authentication or biometric verification, would also reinforce security . Regular updates and patches to the system can prevent exploits caused by software vulnerabilities. Furthermore, setting up secure Wi-Fi networks and monitoring logs for suspicious activities can aid in identifying potential breaches promptly. Adopting best practices for IoT security, such as disabling unnecessary services, can also reduce exposure to security threats .

The IoT-Based Smart Door Security System has significant future potential for scalability and integration with other smart home technologies. Its modular setup, based on common IoT components like the ESP32 microcontroller, allows easy expansion and customization of functionality, making it suitable for integration with existing smart home ecosystems such as Alexa or Google Home . The system's open architecture permits adding features like biometric authentication or facial recognition, enhancing security, and user control . The ability to adopt cloud-based solutions for more extensive data logging and user management further supports scalability. Such integration and adaptation not only cater to growing security demands but also augment the convenience of unified smart home management, appealing to evolving consumer expectations .

User feedback mechanisms in the IoT-Based Smart Door Security System include visual indicators such as green and red LEDs, an LCD display, and audible alerts via a buzzer . These components provide immediate feedback on the status of access attempts, showing users whether an attempt was successful or unauthorized. This real-time feedback enhances user experience by offering clarity and reassurance about the security status. It helps users quickly identify and rectify issues, such as presenting unauthorized cards, and ensures smooth operation of the access system . By providing this immediate and understandable feedback, the system supports user interaction and reliability, reducing confusion and enhancing the overall user experience with well-defined indicators .

The IoT-Based Smart Door Security System employs RFID technology by using an RFID reader to scan an RFID card for its unique identifier (UID), which is compared against a list of authorized UIDs stored in the system . This method offers contactless authentication and is easy to handle, making it secure and efficient for door lock applications . RFID technology is advantageous over other methods such as biometrics or mobile apps because it provides a low-cost implementation, high scalability, and simplicity in managing access control . Unlike biometric systems which can be costly and require more complex infrastructure, RFID is more straightforward and cost-effective. In comparison to mobile app-based systems, RFID does not depend on smart devices or connectivity issues, thus enhancing reliability and ease of use .

The DIY capability of the IoT-Based Smart Door Security System offers significant advantages over commercial smart lock products by providing a highly customizable platform that users can tailor to specific needs . Unlike commercial products, which often come with pre-defined features and limited customization options, this system allows users to select components, adjust functionalities, and integrate additional technologies, such as mobile app controls, to suit their preferences and applications . This customizability fosters greater user engagement, as individuals can actively participate in the development and enhancement of their security system. Additionally, the DIY nature encourages learning and experimentation, which can lead to innovative personal solutions not available in standard commercial offerings .

You might also like