ABSTRACT In home we have doors like main door

ABSTRACT
In home we have doors like main door, locker door. Door’s are locked and open by an authorized person only. This paper we used altering and controlling of the locker from thief. This system implemented mainly to protect lockers/doors from the thief. In this paper, an innovative tap lock system prototype using today’s? technology. The main aim of this model is based on the fact that using new technologies along with old ones will result in a smart and more efficient. We propose a smart security digital door lock system for any lock system. A digital door lock system is an equipment which alerts when the lock is disturbed. In our proposed system, a Central Control module is embedded in the door itself, this is required to prevent additional complications and more robust mechanism for the door as a whole. Technically, this system embeds itself in the Local Area Network/ Wi-fi connection in the house. This adds extra security layers and prevents access to the system only through the network. Furthermore, the biggest advantage of the proposed system over existing ones is that it can be secure and maintained minimal requirement of infrastructures and planning.

INTRODUCTION
In rapidly developing technological world, people are searching devices to ensure security and convenience in their home. Considering the increasing demand researchers are trying to develop security devices for smart home with more intelligence and convenience to user. Devices are developed from different perspective based on application. This security device are concerned about the entry of authorized person in home. In this paper, a security device is proposed considering the home security and reduction of human effort. The device act as finger print based calling bell and door lock as well as users inside home can open the entrance door from any place of home by a remote controller through this device. The device takes the finger print from a person wish to enter the home by a finger print scanning module. The module match it with finger print data base stored in its memory and categorize the person among any one of three categories indicated as ‘home member’ and ‘known guest’ and. Here we define ‘home member’ as regular family member who are staying at home, ‘known guest’ are those relatives or people who frequently visit at home. The finger print of home member and known guest should be stored in the database of fingerprint module. For a home member the device directly opens the door and generates no sound. When device gets a known guest it does not open the door but generates a sound which indicates the sound of known guest. In this case people inside home should not come towards door to open it as the visitor is known to them. So, they can open the door from any place of home by using a remote. Security alarm systems employing various sensors are becoming increasingly popular in residential communities. Mallory et al. implemented a security alarm system that has a number of sensors for ?re, smoke, intrusion and appliance operation. A central monitor was provided for monitoring and continuously indicating the status of the sensors. Transmitters were placed on the sensors and receivers were placed on the monitor for effective communication. The central monitor then indicates the appropriate alarm based on the identi?ief transmitter of a particular sensor. A number of sensors detect an alarming situation in different locations inside a facility. Cameras captured images of different locations and a controller memorized the associations between sensors and cameras. Similarly, Pyle et al. had developed a system which alerted an intrusion disturbance at an entry point to a residence or alerting as to other emergency conditions by producing an alarm. There are security systems interfaced with GSM module, as the one described in Zhao et al. The system was a wireless home network which contained a GSM/GPRS gateway and three kinds of wireless security sensor nodes that are door security nodes, infrared security nodes and ?re alarm nodes. This system was designed for nocturnal security and power saving purpose. PIC was used for the programming purpose. Another system was proposed by Ushie et al, wherein security door that can be remotely controlled by a GSM phone set acting as the transmitter and another GSM phone set with a dual tone multi frequency (DTMF) connected to the door motor through a DTMF decoder interfaced with microcontroller unit and a stepper motor. Similarly, SMS Technology was collaborated with GSM/GPRS services to achieve controlling of door lock by Pratiksha et al, where they could lock/unlock the door by receiving a pre-de?ned message from the user. In this paper we discuss the design and development of a PIC supported security system prototype with 5 digit passwords and GSM system for sending out intrusion alerts.

Best services for writing your paper according to Trustpilot

Premium Partner
From $18.00 per page
4,8 / 5
4,80
Writers Experience
4,80
Delivery
4,90
Support
4,70
Price
Recommended Service
From $13.90 per page
4,6 / 5
4,70
Writers Experience
4,70
Delivery
4,60
Support
4,60
Price
From $20.00 per page
4,5 / 5
4,80
Writers Experience
4,50
Delivery
4,40
Support
4,10
Price
* All Partners were chosen among 50+ writing services by our Customer Satisfaction Team

LITERATURE SURVEY
GSM Based Digital Door Lock Security System discusses the design and implementation of a GSM based digital door lock security system using PIC platform. A 5-digit password was used to lock/unlock the doors by employing a gear motor. Three consecutive unsuccessful attempts in entering the correct password results in sending a warning message, was sent to pre-defined mobile numbers, as a means of detecting unauthorized intrusion. A 3D scaled model of a house with door controlled by a gear motor was constructed to implement and demonstrate the proposed system. A separate arrangement was made to install the control. The experimental result and analysis were promising.
Adnan Ibrahimet al(2015)International Conference on Power, Instrumentation, Control and Computing
Design And Implementation Of A Digital Calling Bell With Door Lock Security System Using Fingerprint the term ‘Home Security’ numerously growing as a major concerning issue in today’s life. The challenge of developing a home security device is to make it user friendly which can reduce human effort as well as ensure safety and security of people and their home. In this paper, a security device is proposed which is developed from the concept of conventional calling bell. The device analysis the fingerprint of a person and matches it with stored fingerprint database to categorize the person as home member or known guest or unknown guest. When it detects a home member the entrance door automatically opens. In case, the person categorize as known guest, the device sounds a tune but don’t open the door automatically rather people inside home can open the entrance door from anywhere of the home. As guest is known people don’t need to walk towards door to open it. And when device detects the person as unknown guest, it generates a tunes which is different from previous one making aware the people inside that an unknown person wish to enter your home.
M.A. Kader et al (2016) International Conference on Innovation and Science, Engineering and Technology

A Smart Lock System using Wi-Fi Security: In large apartment complexes, fraternities, or even for an owner having many keys for each and every apartment, car, or gate he owns, maintaining entry to authorized personnel only is a problem. Besides the costs involved in fabrication, duplication, and distribution of keys, there are security problems in case of lost keys. In this paper an innovative lock system prototype using today’s technologies will be presented. The novelty of this prototype relies on the fact that using new technologies along with old ones will result in a smart and more efficient. We propose a smart digital door lock system for any lock system. A digital door lock system is any equipment that uses the digital information such as a secret code instead of the legacy key system. In our proposed system, a Central Control module is embedded in the door itself, this is required to prevent additional complications and more robust mechanism for the door as a whole. Technically, this system embeds itself in the Local Area Network of the house. This adds extra security layers and prevents access to the system only through the network. Furthermore, the biggest advantage of the proposed system over existing ones is that it can be easily installed with minimal requirement of infrastructures and planning.
Sami El Murr et al(2016) Advances in Computational Tools for Engineering Applications.
Smart Digital Door Lock for the Home Automation: A smart digital door lock system for home automation. A digital door lock system is equipment that uses the digital information such as a secret code, semi-conductors, smart card, and finger prints as the method for authentication instead of the legacy key system. In our proposed system, a ZigBee module is embedded in digital door lock and the door lock acts as a central main controller of the overall home automation system. Technically, our proposed system is the network of sensor nodes and actuators with digital door lock as base station. A door lock system proposed here consists of RFID reader for user authentication, touch LCD, motor module for opening and closing of the door, sensor modules for detecting the condition inside the house, communication module, and control module for controlling other modules. Sensor nodes for environment sensing are deployed at appropriate places at home. Status of individual ZigBee module can be monitored and controlled by the centralized controller, digital door lock. As the door lock is the first and last thing people come across in entering and leaving the home respectively, the home automation function in digital door lock system enables user to conveniently control and monitor home environment and condition all at once before entering or leaving the house. Furthermore, it also allows users to remotely monitor the condition inside the house through Internet or any other public network. The biggest advantage of our proposed system over existing ones is that it can be easily installed when and where necessary without requirement of any infrastructures and proper planning.
PraneshSthapit (2009) TENCON 2009-2009 IEEE Region 10 Conference.

MERITS AND DEMERITS & SUGGESTIONS
MERITS:
NO MORE KEYS:
You no need to carry keys and they will be less likely to be lost or stolen. Also if you are a owner you need not give keys to residents.
CONTROL:
You can control and restrict who goes into the building. Also owner of house/ apartments can control who can enter their house/ apartments with one PIN code.
REDUCES THEFT:
Since the lock is digitalized with camera, sensor and buzzer possibilities of theft will be reduced.
SECURITY:
These locks gives more security to residents, because the camera has been attached with lock it will automatically sends the picture of unauthorized person to authorized person mail.

DEMERITS:
FAILURE OF POWER:
Generally digital locks are powered up by electricity, if your house/ apartments has a power failure then the door will not work especially during rainy season.
FORGETFUL:
Sometimes there is a chance that authorized person may have possibilities to forget the PIN.
HACKING:
Since the lock is digitalized and deals with the technology there is a chance for hackers to hack our PIN/Key.
JAMMING:
A fault model door lock may lead to jamming of the security system.
SUGGESTIONS:
• If in case of power failure it is suggested that spare key can be given during power failure like keys given for keyless cars.
• Pin can be linked with mobile to retrieve during pin loss.
• If any threats found then you can go for second level authentication in case of doubtful hacking
• Periodic maintenance should be done in order to avoid jamming.
CONCLUSION
This study tried to give new insights to the existing security system in door locks. This article discussed about the latest technology and use of buzzer, sensor, camera for better security. It is clear from the study that identification of the unauthorized person can be viewed and cannot be exactly traced during uncertain conditions such as fully covered with helmets or mask, etc. it can be updated in near future.

You Might Also Like
x

Hi!
I'm Alejandro!

Would you like to get a custom essay? How about receiving a customized one?

Check it out