Contents
CHAPTER NO 1.................................................................................................................................1
INTRODUCTION................................................................................................................................1
1.1 BACKGROUND...................................................................................................................1
1.2 INTRODUCTION.................................................................................................................2
1.3 PROBLEM STATEMENT......................................................................................................3
1.4 AIMS AND OBJECTIVES......................................................................................................4
1.5 APPLICATIONS...................................................................................................................4
1.6 REPORT STRUCTURE.........................................................................................................4
CHAPTER NO 2.................................................................................................................................6
LITERATURE REVIEW........................................................................................................................6
2.1 LITERATURE REVIEW.........................................................................................................6
2.1.1 Password based System.............................................................................................6
2.1.2 Biometric Recognition Technologies.........................................................................8
2.1.3 Drawbacks of Existing Systems................................................................................12
CHAPTER NO 3...............................................................................................................................13
METHODOLOGY.............................................................................................................................13
3.1 HARDWARE COMPONENTS............................................................................................13
3.1.1 Arduino UNO............................................................................................................13
3.1.2 Nodemcu ESP8266...................................................................................................14
3.1.3 LCD...........................................................................................................................16
3.1.4 Relay........................................................................................................................17
3.1.5 Solenoid Lock...........................................................................................................19
3.1.6 Battery.....................................................................................................................20
3.1.7 Buzzer......................................................................................................................21
3.1.8 Fingerprint Sensor...................................................................................................21
3.2 SOFTWARE COMPONENTS..............................................................................................22
3.2.1 Arduino IDE..............................................................................................................22
3.2.2 Blynk App.................................................................................................................23
3.3 PROCESS FLOW...............................................................................................................23
3.4 CIRCUIT VIEW..................................................................................................................25
3.5 BLOCK DIAGRAM.............................................................................................................26
CHAPTER NO 04.............................................................................................................................27
RESULTS AND DISCUSSION............................................................................................................27
4.1 TESTING AND RESLUTS....................................................................................................27
4.1.1 Accuracy Test...........................................................................................................27
4.1.2 LCD Testing..............................................................................................................28
CHAPTER NO 05.............................................................................................................................31
CONCLUSION.................................................................................................................................31
5.1 SUMMARY.......................................................................................................................31
5.2 LIMITATINOS...................................................................................................................31
5.3 CONCLUSION...................................................................................................................31
5.4 FUTURE RECOMMENDATIONS........................................................................................32
REFERENCES...............................................................................................................................33
LIST OF FIGURES
Figure 1. Programmable Electronic Code Lock................................................................................6
Figure 2. Password Protected Door Lock System based on cell phones.........................................7
Figure 3. Face detection Technology...............................................................................................9
Figure 4. Arduino UNO...................................................................................................................14
Figure 5. Nodemcu ESP8266..........................................................................................................15
Figure 6. LCD..................................................................................................................................16
Figure 7. Relay Module..................................................................................................................18
Figure 8. Solenoid Lock..................................................................................................................20
Figure 9. Battery............................................................................................................................20
Figure 10. Buzzer...........................................................................................................................21
Figure 11. Fingerprint Scanner......................................................................................................22
Figure 12. Arduino IDE...................................................................................................................23
Figure 13. Flowchart......................................................................................................................24
Figure 14. Circuit Diagram.............................................................................................................25
Figure 15. Block Diagram...............................................................................................................26
Figure 16.Accuracy Test.................................................................................................................27
Figure 17. Testing of LCD...............................................................................................................28
Figure 18. Result: Fingerprint Detection.......................................................................................28
Figure 19. Result: Unauthorized person........................................................................................29
Figure 20. Result: Fingerprint Successfully Recognized................................................................29
Figure 21. Complete Hardware......................................................................................................30
LIST OF TABLES
Table I. Different Biometric Recognition Technologies.................................................................10
Table II. PIN Configuration of LCD.................................................................................................17
CHAPTER NO 1
INTRODUCTION
1.1 BACKGROUND
The Internet of Things (IoT) is a network of physical devices, vehicles, home appliances, and
other embedded electronics, software, sensors, and connected objects that enable these
objects to connect and exchange data or information. Each can be uniquely identified
through its on-board computer system but can interact with the existing Internet
infrastructure. Over the past year, this technology has gradually become an indispensable
part of people's lives. It continues to affect many aspects of daily life and promotes better
social interaction, convenient transportation, entertainment, and media opportunities, and
contributes to the development of medicine. The emergence of many devices such as
mobile phones and computers has made it possible for people to rely on technology for
communication, information storage, entertainment and to improve people's way of life by
enabling them to easily access all of the above content. Since its launch, the number of
people using cell phones and the internet has grown dramatically, becoming one of the
main means of communication. Smartphones allow people to connect to the Internet
without using a computer, while providing the same functionality in different ways. With
the introduction of better software and better hardware, smart phones have become a
powerful device that plays an important role in people's lives.
With the rapid development of the IoT market, companies tend to focus on time to market
and launch products as soon as possible, rather than developing secure entities product.
This makes many IoT products unable to adequately prevent various forms of attack on
purpose. IoT security is a growing problem, even though there are major issues Lots of
research on the subject, little in-depth production work or a standardization that can solve
this problem. IoT security is very important, as the consequences of IoT security breaches is
devastating. Vulnerabilities in smart cars or smart door locks could lead to product theft
even in some extreme cases, it can cause losses. Even if undiscovered vulnerabilities are not
1
exploited but there is always a false sense of security that this gives to the product owner,
which is ethical
Unacceptable. Due to the inconsistency of IoT products, their architecture and the
technology used impossible to develop coherent security measures covering the entire
perimeter different equipment. Therefore, should IoT products be developed around
security standards? In today's world, people are still busy with their daily work. Sometimes
they tend to forget the necessary keys when going to work. At the same time, they also
want to ensure the safety of their favorite things at home. Using the Internet of Things
allows people to communicate with their home devices (such as security systems) using
smart devices such as smartphones to help keep their property safe at home.
1.2 INTRODUCTION
With the increase in thefts, safety has become a major issue today. In many cases, we also
need to ensure the safety of our home or office, no one can enter the room without our
permission, and make sure that our important accessories and possessions will not be
stolen or lost. You can use traditional locks to solve security issues but there is always the
possibility that someone will open the lock even without using duplicate keys to destroy it.
If we lose, the use of these types of locks will also cause problems Keys, and we must
always have the keys with us. Likewise, the use of patterns in the locks can improve
security but if the password or password is reopened somehow the model is known.
Doors locked with traditional locks are not as secure as they used to be; yes, anyone can
break in by breaking these locks. Therefore, we need to develop a framework capable of
providing 24/7 service. Therefore, the digital code lock can easily protect our house or
locker. The door will not open until the correct password is entered. There are many types
of security systems out there today, but behind the scenes to perform identity verification
they all rely on fingerprints, retina scanners, iris scanners, facial IDs, language scanners,
RFID readers, passwords, templates, etc. Disable all solutions, the cheapest is to use a
system based on a password or PIN code. Therefore, in this project we have built a
password-based door lock system that can be installed on any of our existing doors to
2
protect them with digital passwords. The password-based door lock system has taken a
bold step towards the future of electronic door locks replacing mechanical door locks.
Automatic fingerprint door lock is a system used to control the access. It is a system put in
place on buildings to maintain make sure that people and property in the building are not
affected by the outside world. The system is generally used during activities when people
enter and exit the building. Access door the system makes it possible to distinguish between
unauthorized persons and authorized persons, because the system is fair allow authorized
personnel to enter the building. This system holds the fingerprints of only authorized
persons. Any person who wants to enter the room will first have to put his thumb on the for
verification of fingerprints. The fingerprint sensor will compare it with the fingerprints that
we have already stored in the system, the system automatically sends a notification on the
mobile that fingerprint is successful, and door will open. If it does not match with the stored
fingerprints, the door will never open, and it also sends a notification to the mobile. In this
way only authorized persons can enter the room or building. Since banks and many other
companies have some important data and resources that needs more security. This system
helps to protect their resources and confidential data.
1.3 PROBLEM STATEMENT
The safety of the family has always been a concern for people, especially those in need of
not always available in their homes, children, the elderly and physically challenger. Incidents
such as theft, theft or accidental entry may occur unexpectedly. It can cause problems for
people who are uncomfortable to encounter such issues.
Before the era of the Internet of Things, different types of security systems were invented,
such as systems based on passwords or systems based on smart cards. The system provides
comfort users keep the family safe through continuous safety monitoring the company and
the alarm system sound an alarm when an intrusion occurs. But these types of security
system is a subscription-based system, where users have to pay a monthly fee make sure
the system is online. These systems can only be managed at the door, this means that they
can only be unlocked at the door and require a password or a smart card. Yes the method of
3
unlocking these systems is obtained by others, and they may be able to break into the user's
home without warning the alarm system.
The problem with the existing system is security theft. Since many big companies
introduced smart system for security purpose but still not much efficient and needs
improvements. Some companies and banks have introduced passwords system but there a
major chance for cracking the passwords.
1.4 AIMS AND OBJECTIVES
The main objective of the project is to improve the home security system using advanced
technology. In our project, the fingerprint of a specific person is detected and stored as
data, and it is used to detect the fingerprints of other people and compare them with the
stored data optical impression.
Major objectives of the project are:
To develop a secure system on the latest technology of internet of things.
Implementation of the developed secured system with on smart phones.
Analysis of the results.
1.5 APPLICATIONS
The automatic fingerprint door lock system can be used in
Homes
Offices
Hospitals
Banks
Registration for voter ID
All other places that need security.
1.6 REPORT STRUCTURE
The thesis report has five sections.
4
Section 1 refers to the background, introduction, Problem statement, Aims and objectives
and applications of the project.
In Section 2, Literature Review is given. All the traditional methods are explained, and
comparison is given to show the best method. In the end of this section drawbacks of
existing systems are briefly demonstrated.
Section 3 is about the methods and procedures used in this project. It contains all the
hardware and software components that are used in the proposed system. Specifications,
features, and applications of these components are also described.
In Section 4, testing and results of the designed system are shown.
Section 5 describes the Summary, Limitations, conclusion, and future work of the project.
5
CHAPTER NO 2
LITERATURE REVIEW
The fingerprint scanner is a kind of biometric sensor, it can detect human footprint for
identification. Biometric recognition includes several recognition methods such as voice
recognition, facial recognition, fingerprint recognition, etc. consists of parts of the human body.
2.1 LITERATURE REVIEW
The most common systems used to lock and unlock doors are physical locks and keys. The
whole process is a mechanical process. If the key is lost, misplaced, or stolen, the entire locking
mechanism must be replaced. This physical key problem is exacerbated when it comes to large
companies that require employees to carry multiple keys for different doors.
2.1.1 Password based System
The programmable electronic interlock is programmed to operate only with a predetermined
number of correct inputs. The type of lock is also referred to as integration compatibility. The
programmable lock icon is shown in the figure.
Figure 1. Programmable Electronic Code Lock
6
The Programmable Electronic Code Lock is programmed to operate only when the preset
number is entered correctly. This is also called an integrated combination lock. Figure 2.1 shows
the programmable password lock. An example is an electronic safe. Based on the
programmable electronic code lock, a reprogrammable digital door lock was invented, the code
is stored in the PROM and can be changed at any time. You can use the GSM / CDMA module to
operate the device. When someone answers the phone call, the system receives the call. In
addition, the door is only open for calls from specific users.
As shown in figure below, the password locks the cell phone door lock system, as shown in
figure below, allowing you to open the door by entering a specific password using the l mobile
device. Someone mentioned it. The user can dial the system number. This call uses the correct
password to open and close the entry.
Figure 2. Password Protected Door Lock System based on cell phones
In modern password-based systems, when an unauthorized person tries to open the password
by providing the correct password, a more complex system will continue to evolve, connecting
to the owner in the office or in the House. When closing the office / residence door, the owner
must exit the system by pressing the “available” 0 key on the hexadecimal keypad. A system
developed by Annie P. Oommen et al. It is God. Change Password. To open the lock, the
7
entered password must be consistent with the modified password. In some systems, an
unauthorized person enters an invalid password. When the controller informs the owner
through the GSM modem, it can safely dial through the GSM modem. The latest protection
system is designed to improve RF and GSM RF protection security system by providing
authentication with 4-digit password.
2.1.2 Biometric Recognition Technologies
On the basis of a Journal on face recognition system, the system takes a long time to build
because users need to have multiple images to distinguish between ID and non-ID images in
order to store the identification data. Despite its advantages in internal recognition and
interdependence, the system has proven ineffective as it takes 6 seconds to make a decision
while the target is within 2 seconds. [ CITATION Whe002 \l 1033 ].
The fact that the system is time consuming is also mentioned in a journal about the face
recognition system. Face recognition is difficult construction, as there are many factors that
need to be considered in the image capture process, it is lighting, distance, and personal
direction of the head. This system is also sensitive to aging and facial expressions. It's also
embarrassing when experimenting the job requires photographing many faces from nine
different angles. [ CITATION Ibr11 \l 1033 ].
Cui agree that the voice recognition system is difficult. The reason is that he needs to create a
voice model for users to must be spoken according to the prescribed content. Although it is
missing efficiency, this project of Cui Bo and Xue Tongze has its advantages using the technique
of filtering low frequencies to other projects with similar characteristics disturbing. [ CITATION
Cui09 \l 1033 ].
8
Figure 3. Face detection Technology
Compared to the fingerprint scanner used in this project, in the experimental work, the factors
which must be taken into consideration are slight and human sweat can appear on individual
fingers. Implement the fingerprint, the scanner produces a system that takes less time because
it can easily perceive humans’ fingerprint and its accuracy is higher. The reason is that the
accuracy of the fingerprint reader is only human sweat and scratches have little effect on
checking the face the surface of the scanner. In addition, the fingerprint reader used in this
project can make a decision in less than a second.
A Journal also mentioned the benefits of using a fingerprint reader about fingerprint verification
overcomes loss of identity problem in their project, it is the key to the car. Another advantage is
that the property will never be pass it on to others [ CITATION GZh11 \l 1033 ]. The project
implemented an optical fingerprint reader compared to other biometric features; it has more
advantages as stated in the table below.
9
Table I. Different Biometric Recognition Technologies
Aditya Shankar and others focused on projects related to the replacement of traditional
technologies in locking systems. They replaced old methods such as lock and key systems and
password authentication systems with biometric systems. They basically use fingerprints as an
authentication system, and people whose fingerprints are stored in the database can easily
access the lockers. If an unauthorized person or a thief tries to enter the locker, they also
provide an alarm system to alert the neighbors. In order to prove who has the right to open the
locker door, they have to scan their fingerprint image. The scanner is connected to an 8051
microcontroller: this controller will control the scanning process. They also provide a password
keypad after fingerprint scanning. This two-step verification is for double security and provides
a buzzer to trigger an alarm in the event of unauthorized access to the locker.
Omidiola E.O. et al. They rejected the traditional bicycle lock system method and introduced
fingerprint-based lockers, which are powerful security mechanisms in various areas of security.
In their prototype, the software module is used for database storage for efficient users and
provides the hardware for the interface. Programming is done using Visual Basics, Visual C and
Visual C ++. The programming of this prototype was done in Visual Basic 6.0 Enterprise Edition.
The prototype was tested using 20 test images stored in the database. The implementation is
successful, and the microcontroller clearly distinguishes between authorized and unauthorized
users. Logic 1 is passed for authorized users and logic 0 is passed for unauthorized users.
10
Kasikyan. A et al. Everyone is said to have a unique fingerprint. They added a secure keyboard
to add and remove the number of users from the database which is a great concept. NITGEN's
FIM3030 fingerprint module is used for this purpose. Use the AT89C52 microcontroller to
control the entire drive unit. It also provides information on the LCD screen about authorized
and unauthorized users. The DM742S138 decoder is used for data routing and interfacing with
fast storage units, because the decoder has a short propagation delay. A 74HC373 latch is
provided, which is a high speed silicon gate CMOS device. The relay is used as an interface
circuit between the output of the microcontroller and the ignition system of the car.
Pavithra .b.c etc. This project is mainly about security. They use the R303A as a scanner. The
module has built-in ROM, DSP and RAM. The storage capacity of the fingerprint module is 100
The user's fingerprint. The module works in two modes, these are the main mode and the user
mode. Main mode is used to register fingerprints, which will be stored in the scanner ROM and
will have a unique ID. They provided a unique ID number for the final verification step, which
resulted in three erroneous attempts. They provide a digital code lock on the door of each
locker, which is operated by a code. The password consists of six mandatory digits without any
characters. The lock system is connected to the microcontroller for storage and password
verification. This lock is composed of an LCD screen and a keypad. And an 8051 microcontroller.
This can be done on every door lock because it is commercially available.
Crystalynne D. Cortez el Al. Focus on the development of a biometric locker system based on a
microcontroller with SMS service. 9-12Vdc is used to power the system. The ATMEGA 644
microcontroller on the Arduino board is used to connect input and output hardware devices.
The input device includes a fingerprint sensor for biometric identification, a keypad for
encoding passwords, and a real-time clock to display the current date and time. The
microcontroller is programmed using the Arduino integrated development environment.
ATmega644 is installed in the Arduino board and is the microcontroller unit used in the system.
It controls the functions of the biometric locker system. ATmega644 is a low power 40 pin
complementary metal oxide semiconductor (CMOS) 8-bit microcontroller based on the AVR
Enhanced Reduced Instruction Set (RISC) computer architecture. ATmega644 can achieve a
throughput of nearly 1 million instructions / MHz per second by executing powerful instructions
11
in a single clock cycle. This helps optimize power consumption and processing speed in the
system design. It can store up to 64 KB of program instructions.
2.1.3 Drawbacks of Existing Systems
Here are some drawbacks of passwords protected and face recognition smart door locks.
The keyless door locks are not much reliable as anyone can guess the password or may
gain unauthorized access.
Another problem is forgetting a password. The authorized person may forget the
password. Although the password can be reset but it may take some time and is
troublesome.
The face recognition gives 100 percent accuracy, but it might be a problem in case if
face is damaged. The function of system still works according to applied conditions and
the damaged face is not recognized. Even if the person was authorized, he cannot enter
the room.
There is no backup plan for above problem nor an alternating method to enter the
room.
12
CHAPTER NO 3
METHODOLOGY
This chapter elaborates all the hardware and software components used in this project.
Applications and specifications of all entities are described to understand the working as well.
Description of design and procedures we used in our project are also stated.
Following are the components used in this project:
3.1 HARDWARE COMPONENTS
Following hardware components used in this project are:
Arduino UNO
Nodemcu ESP8266
LCD
Relay
Lock
Battery
Buzzer
Fingerprint Sensor
3.1.1 Arduino UNO
From the point of view of the ATmega328, ARDUINO UNO is a microcontroller board. This giant
adapts very well to most Arduino shields. It has 14 advanced information / output pins (6 of
which can be used for PWM production), 6 simple data sources, a 16 MHz gem oscillator, a USB
connection, a power socket, an ICSP connector and a reset button. It contains everything that is
expected to support microcontrollers; it is basically connected to a PC via a USB link or powered
by an air conditioner to a DC connector or to a battery.
13
Figure 4. Arduino UNO
3.1.1.1 Features of Arduino UNO
3.1.2 Nodemcu ESP8266
NodeMCU is a low-priced open-source IoT platform. It at first enclosed code that runs on the
ESP8266 Wi-Fi SoC from Espressif Systems and hardware that was supported the ESP-12
module. Later on, the support for the ESP32 32-bit MCU was additional. NodeMCU is an
associate degree ASCII text file code that ASCII text file prototyping board styles area unit out
there. The name "NodeMCU" combines "node" and micro-controller unit (MCU). The term
"NodeMCU" to be precise refers to the code rather than the associated development kits. each
the code and prototyping board styles area unit open supply.
14
Figure 5. Nodemcu ESP8266
3.1.2.1 Features
15
3.1.2.2 Applications
3.1.3 LCD
A liquid crystal display (LCD) is a flat panel display or other electronic modulation optics using
optical modulation properties of liquid crystal. Rather than emitting light directly, liquid crystal
created monochrome image or a color with the help of backlight or a mirror. A liquid crystal
display is used to flash any image (such as a general-purpose computer monitor) or a fixed
image that can display or hide low information content, such as preset words, numbers, and 7-
segment displays, such as digital clocks. They used the same basic technique, except that any
image consists of a large number of small pixels, while the other displays have larger elements.
Figure 6. LCD
16
3.1.3.1 PIN Configuration of LCD
Table II. PIN Configuration of LCD
3.1.4 Relay
A relay is an electrical switch that can be turned on or off to pass current or not, and it can be
controlled with a low voltage, like the 5V provided by the Arduino pin. The relay module is an
electrical switch that allows you to open or turn off circuits that use much higher voltage and /
17
or current than the microcontroller treat with. There is no connection between the low voltage
circuits operated by this device high power microcontroller and circuit. The relay protects each
circuit of each other.
Using Arduino to control the relay module is as easy as controlling any other output.
Figure 7. Relay Module
3.1.4.1 Specifications
The on-board EL817 photoelectric coupler has strong photoelectric isolation and anti-
interference ability.
On-board relay 5V, 10A / 250VAC, 10A / 30VDC.
The relay has a long service life and can continuously absorb 100,000 times.
The module can be directly linked to MCU I / O, with output signal indicator.
The module is equipped with diode current protection and has a short response time.
PCB size: 45.8mm x 32.4mm.
18
3.1.4.2 PIN Configuration
3.1.4.3 Applications of Relay Module
Relay Drive by Means of a Transistor
Relay Drive by Means of SCR
Relay Drive from External Contacts
LED Series and Parallel Connections
Electronic Circuit Drive by Means of a Relay
Power Source Circuit
PC Board Design Considerations
3.1.5 Solenoid Lock
In traditional door locks, there is a key to pull or push the door latch. We have to operate it
manually, but in electromagnetic locks, the door latch can be operated automatically by
applying voltage. The electromagnetic lock is fitted with a low-pressure solenoid valve which
returns the latch to the door when an interrupt (button, relay, etc.) is activated. The lock will
hold its position until the interrupt is activated. The working voltage of the electromagnetic lock
is 12V. You can also use 9V, but it will slow down the running speed. Electromagnetic door locks
are mainly used in remote areas to achieve automated operation without any labor.
19
Figure 8. Solenoid Lock
3.1.6 Battery
A battery is a device that stores electrical energy in the form of voltage. It basically converts the
energy by chemical reaction into electrical energy. It has a positive terminal and a negative
terminal. Batteries that we are using in our system for charging and driving the load is 12v 27
AH battery.
Figure 9. Battery
20
3.1.7 Buzzer
A buzzer or buzzer is a signaling device, usually electronic, and is typically used in household
appliances such as automobiles, microwave ovens, or game programs. It is most often made up
of many switches or sensors.These switches or sensors are connected to a control unit to
determine whether and which button is pressed or a preset time has passed, usually turning on
the corresponding button or light on the control panel, And give a warning in the form of a
continuous or intermittent hum or buzz. Initially, the device was based on an electromechanical
system, which was the same as an electric bell, but without a metal gong (it produced a ringing
noise). Usually, these units are mounted on a wall or ceiling, and the ceiling or wall is used as a
sound box. Another implementation of some AC connected devices is to implement a circuit
that turns AC current into noise loud enough to drive the speaker and connect this circuit to a
cheap 8-ohm speaker. Nowadays, it is more common to use ceramic piezoelectric sound
generators, like the Sound siren which emits a high-pitched sound. They are usually connected
to "pilot" circuits that change the pitch of the sound or turn the sound on and off.
Figure 10. Buzzer
3.1.8 Fingerprint Sensor
The fingerprint reader is a technology that recognizes and verifies personal fingerprints to grant
or deny access to computer systems or physical facilities. It is a biometric security technology,
which uses a combination of hardware and software technology to identify the scan of an
individual's fingerprints.
21
Fingerprint scanners typically work by first registering the fingerprints of everyone authorized
for a particular system or facility. These scans are saved in the database. The user needing
access places their finger on the hardware scanner, which scans and replicates the individual's
entries and looks for similarities in the scans already stored. If there is a positive match,
personal access is granted. Fingerprint scanners most often use personal fingerprints as
identification.
Figure 11. Fingerprint Scanner
3.2 SOFTWARE COMPONENTS
Two software are being used in this project. One is blynk IoT Server. The purpose of using this
is to store data.
Arduino IDE
Blynk Application
3.2.1 Arduino IDE
Coding is done in Arduino IDE.
Arduino IDE (Integrated Development Environment) is used to write computer code and
download this code to the physical board. The Arduino IDE is very simple, and this simplicity can
22
be one of the main reasons Arduino is so popular. It can be said with certainty that
compatibility with the Arduino IDE is now one of the main requirements of the new
microcontroller board. Over the years, many useful functions have been added to the Arduino
IDE, now you can manage third-party libraries and boards from the IDE while still maintaining
the ease of programming the board.
Figure 12. Arduino IDE
3.2.2 Blynk App
The blynk app is developed that accepts the data from blynk server. The app uses SPI
communication. Consumers will receive alert messages and notifications using this app via
GSM. The app is used to display the notification on smart phone when an unauthorized person
will try to open the door.
3.3 PROCESS FLOW
Firstly, the user will put his finger on the scanner. The fingerprint scanner scans the fingerprint.
The fingerprints of authorized persons are already stored in the system. The system will match
the fingerprint of user with those that are stored in the system. If it matches with any of the
stored fingerprints, the door automatically opens and let the user to enter. The system also
sends message about the fingerprint detection to the owner that the fingerprint is successful. If
it does not match, the door will not open, and an alarm will bell. The system sends a
23
notification to the owner on his smart phone that an authorized person is trying to open the
door. The flow chart of our system is given below.
Figure 13. Flowchart
24
3.4 CIRCUIT VIEW
Figure 14. Circuit Diagram
Here above is the circuit view of our project. The whole process is managed by Arduino UNO.
The buzzer, fingerprint sensor, LCD and Relay along with Arduino is controlling the overall
process.
The Rx and Tx of the fingerprint module are directly connected to the serial or digital pins of the
D11 and D10 software of Arduino UNO. The 5v power supply is used to power the fingerprint
module pulled from the Arduino pin. A 16 × 2 LCD display is configured in 4-bit mode, and its
25
RS, EN, D4, D5, D6 and D7 are directly connected to digital pins D13, D12, D6, D7, D9 and D8 of
Arduino UNO. The buzzer is connected to digital pin D14 of the Arduino UNO and is relative to
ground. DHT is connected to digital pin D2 of Arduino UNO and is relative to ground and Vcc.
The potentiometer on the middle pin is connected to the LCD display (Vo).
3.5 BLOCK DIAGRAM
Figure 15. Block Diagram
Arduino and Nodemcu are interfacing with each other. Nodemcu works as a Wi-Fi module and
communication device that will send notifications on mobile using blynk app. The fingerprint
scanner is attached with Arduino module. The fingerprints are sends to Arduino, Arduino
detects the fingerprints and lcd is attached with Arduino for displaying the fingerprint results on
the screen. A buzzer is also attached with Arduino. If fingerprint does not match, the buzzer will
bell. Door lock is attached with Relay module. This relay module receives data from Arduino and
on the basis of this data, the door will open or remain close.
26
CHAPTER NO 04
RESULTS AND DISCUSSION
4.1 TESTING AND RESLUTS
After the construction of circuit, testing has been done. The results of fingerprint detection,
notification and opening of door in the form of pictures are clearly seen on the figures
illustrated below:
4.1.1 Accuracy Test
Perform an accuracy test to observe the security level of the fingerprint reader. The below
Figure shows the results of the precision test as a function of the confidence level. The test is
performed on five people, each having thumb and a finger, and each of them has one. The
scanned fingers are the fingerprints of the left and right thumbs and the left and right index
fingers. As the results below show, the finger with the most accurate result was left fingerprints
are 70% of the percentage, then right fingerprint, right index finger the accuracy of the finger
and index finger of the left hand was 67.2%, 41.4% and 30%, respectively.
Figure 16.Accuracy Test
27
4.1.2 LCD Testing
Figure 17. Testing of LCD
Figure 18. Result: Fingerprint Detection
When user placed his finger on the sensor, the sensor senses the fingerprint and matches his
fingerprint with the stored fingerprints. As shown in Figure 17, the user is not authorized so the
door is not open, and the system sends the notification on the owner’s mobile.
28
Figure 19. Result: Unauthorized person
Figure 20. Result: Fingerprint Successfully Recognized
When its about authorized user, the system automatically unlocks the door and sends
notification that fingerprint successfully recognized as illustrated in above Figure 18.
29
Figure 21. Complete Hardware
30
CHAPTER NO 05
CONCLUSION
5.1 SUMMARY
The Advanced Security method of Door Locking based on Fingerprint is designed for security
purpose. Arduino is used for developing the system. The project accepts inputs in the form of
user’s fingerprints and compared it with the fingerprints of authorized persons. The authorized
person’s fingerprints are already store in the system. On the basis of fingerprints stored in the
system, it unlocks the door. The system also provides the feature of sending notification about
the user’s verification. The system has fingerprint sensor interfacing with Arduino that sense
the fingerprints. The results of sensing the fingerprints are shown on the screen of LCD.
5.2 LIMITATINOS
Following are the limitations of Advanced Security Method of Door Locking Based on
Fingerprint:
The users will have to make sure that his fingers are clean or there may be possibility of
fluctuating in performance.
The sensor may not give expected results if users having skin disease use the system.
If there is a new authorized person whose fingerprint is not stored in the system, he’ll
not be able to unlock the door.
Adding new authorized persons require some steps that may be troublesome and
complex.
5.3 CONCLUSION
After construction and testing of each component, we concluded that Advanced Security
Method of Door Locking Based on Fingerprint is working according to the requirements we
proposed before starting this project. The solenoid lock is automatically unlocked when only
authorized persons want to open the door. All the components are worked according to the
purpose for which they are meant to interface in this project. Their functionality is not affected
31
by large community of users who used the system. The system is giving expected results
without any error.
The project is a great investment for big companies i.e., banks and other multinational
companies. It is providing them with high security, and they can rely on the system without any
doubt. The system is providing user satisfaction with 99% accuracy.
5.4 FUTURE RECOMMENDATIONS
Further future recommendations can be
Adding Smart Card for extensive security.
User ID and password will be stored for backup i.e., in case if sensor will not detect
fingerprint due to skin disease.
Retina sensor can also be used.
32
REFERENCES
[1] Siswanto, A., Katuk, N. and Ku-Mahamud, K.R., 2016, October. Biometric fingerprint architecture
for home security system. In Proceedings of the 3rd Innovation and Analytics Conference &
Exhibition (IACE) (Vol. 3, pp. 137-41).
[2] Kader, M.A., Haider, M.Y., Karim, M.R., Islam, M.S. and Uddin, M.M., 2016, October. Design and
implementation of a digital calling bell with door lock security system using fingerprint. In 2016
International Conference on Innovations in Science, Engineering and Technology (ICISET) (pp.
1-5). IEEE.
[3] Baidya, J., Saha, T., Moyashir, R. and Palit, R., 2017, January. Design and implementation of a
fingerprint based lock system for shared access. In 2017 IEEE 7th Annual Computing and
Communication Workshop and Conference (CCWC) (pp. 1-6). IEEE.
[4] Nafi, K.W., Kar, T.S. and Hoque, S.A., 2012. An advanced door lock security system using
palmtop recognition system. International Journal of Computer Applications, 56(17).
[5] Jang, M.S., Park, T.M., Lee, J.K. and Wang, B.H., 2016. One grip based doorpull shaped
doorlock system using fingerprint recognition and touch pattern. Journal of Korean Institute of
Intelligent Systems, 26(1), pp.30-36.
[6] Seo, D.G., Ko, H.S. and Noh, Y.D., 2015. Design and implementation of digital door lock by
iot. KIISE Transactions on Computing Practices, 21(3), pp.215-222.
[7] Prasad, H.H., 2019. IOT BASED DOOR ACCESS CONTROL USING FACE RECOGNITION.
[8] Adiono, T., Fuada, S., Anindya, S.F., Purwanda, I.G. and Fathany, M.Y., 2019. IoT-enabled door
lock system. Int. J. Adv. Comput. Sci. Appl, 10(5), pp.445-449.
[9] Pavelić, M., Lončarić, Z., Vuković, M. and Kušek, M., 2018, October. Internet of things cyber
security: Smart door lock system. In 2018 international conference on smart systems and
technologies (SST) (pp. 227-232). IEEE.
[10] Chaithanya, J.K., Kumar, G.S. and Ramasri, T., 2018, May. IoT-based embedded smart
lock control using face recognition system. In International Conference on ISMAC in
Computational Vision and Bio-Engineering (pp. 1089-1098). Springer, Cham.
[11] Akanbi, C.O., Ogundoyin, I.K., Akintola, J.O. and Ameenah, K., 2020. A prototype model
of an iot-based door system using double-access fingerprint technique. Nigerian Journal of
Technological Development, 17(2).
[12] Meenakshi, N., Monish, M., Dikshit, K.J. and Bharath, S., 2019, April. Arduino based
smart fingerprint authentication system. In 2019 1st International Conference on Innovations in
Information and Communication Technology (ICIICT) (pp. 1-7). IEEE.
[13] MOHD ZAINOR, S.N., 2012. DOOR ACCESS SYSTEM–ARDUINO BASED.
33
[14] HEMON, H., MAMDUD, M., ONY, H., SAFIU, M. and RABBANY, M.G., 2018. 2-STEP
DOOR LOCK SECURITY SYSTEM.
[15] AL-NABH, H.A.Q.S., 2018. FINGERPRINT BASED SECURITY DYDTEM (Doctoral
dissertation, Sri Venkateswara College of Engineering).
[16] KUNDU, S., BOSE, S., MANNA, S. and CHOWDHURY, S.R., HIGH SECURITY DOOR
LOCK SYSTEM: A SOLUTION FOR SMART HOME.
[17] Sohel, A. and Hossain, Z., 2018. Final Year Project Report On Automated Infrangible
Home Security.
[18] Yedulapuram, S., Arabelli, R., Mahender, K. and Sidhardha, C., 2020, December.
Automatic Door Lock System by Face Recognition. In IOP Conference Series: Materials Science
and Engineering (Vol. 981, No. 3, p. 032036). IOP Publishing.
[19] Hassan, H., Bakar, R.A. and Mokhtar, A.T.F., 2012, September. Face recognition based
on auto-switching magnetic door lock system using microcontroller. In 2012 International
Conference on System Engineering and Technology (ICSET) (pp. 1-6). IEEE.
[20] Lim, J., Kim, C., Cha, W., Han, T., Huh, G., Song, S. and Lee, S., 2013. Reliable digital
door lock control system using face recognition. Journal of IKEEE, 17(4), pp.499-504.
[21] Sandar, S. and Oo, S.A.N., 2019. Development of a secured door lock system based on
face recognition using Raspberry Pi and GSM module. Development, 3(5).
[22] Manurung, M.J., Poningsih, P., Andani, S.R., Safii, M. and Irawan, I., 2021. Door Security
Design Using Fingerprint and Buzzer Alarm Based on Arduino. Journal of Computer Networks,
Architecture and High Performance Computing, 3(1), pp.42-51.
[23] Kondaveeti, H.K., Kumaravelu, N.K., Vanambathina, S.D., Mathe, S.E. and Vappangi, S.,
2021. A systematic literature review on prototyping with Arduino: Applications, challenges,
advantages, and limitations. Computer Science Review, 40, p.100364.
[24] Cahyaningtiyas, R., Arianto, R. and Yosrita, E., 2016, November. Fingerprint for
automatic Door integrated with Absence and User Access. In 2016 International Symposium on
Electronics and Smart Devices (ISESD) (pp. 26-29). IEEE.
[25] Cahyaningtiyas, R., Yosrita, E. and Arianto, R., The Automatic Doors Integrated Absence
and User Access Using Fingerprint. Jurnal Ilmiah Fifo, 8(2), pp.147-150.
34