Professional Documents
Culture Documents
Sandesh para Juli
Sandesh para Juli
net/publication/356785805
CITATIONS READS
0 1,281
1 author:
Sandesh Parajuli
London Metropolitan University
111 PUBLICATIONS 2,568 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Sandesh Parajuli on 05 December 2021.
This report is based on the smart door locking technology to develop a Smart door
lock system using RFID sensor, Bluetooth module, Android App and Arduino Uno that
allows convenience and security for the users in the field of door lock system. In this
project, RFID and Bluetooth based smart door lock system is proposed. This system is
Bluetooth to the Arduino circuit to monitor the door lock system. Moreover, this door lock
RFID tag work as a task handler, Bluetooth module and RFID reader as command agent,
Arduino UNO as controlling and data processing unit and solenoid lock as the output unit.
Acknowledgment
I specially want to thank Islington College for giving me this opportunity to enhance
my knowledge of report writing and project development skills. Without the support of our
college this report, and the project would not have been possible.
I am highly indebted to my project supervisor, Mr. Dipeshor Silwal, and Ms. Swarupa
Gurung for their continuous support, motivation, and guidance throughout the complete
duration of my project. Despite this pandemic situation and their hectic schedule, they
keep me updated and truly remained driving spirit in my project. Their experience on the
report writing and project development skills has truly helped a lot to develop this project
to them because they helped me a lot to understand my project and always suggested
University who gave the access to IEEE library which really helped me a lot while
researching about my project and I was able to complete my project on time. Finally, I
would like to thank my friend and my family who helped me a lot and motivated me and
2.5 Critical Comparison with RFID and Bluetooth based Smart Door Lock ....................... 14
3. Methodology........................................................................................................................16
3.4 Survey............................................................................................................................................. 37
3.6 Design............................................................................................................................................. 46
3.6.1 Circuit Design for RFID Reader Interfacing with Arduino ......................................... 46
3.6.2 Circuit Design for Bluetooth (HC-05) module Interfacing with Arduino ................ 48
3.6.3 Circuit Design for RFID reader, Buzzer, Led, Solenoid lock, Battery, and Relay
module Interfacing with Arduino ............................................................................................... 50
3.6.4 Circuit Design for All hardware components Interfacing with Arduino ................ 52
4.1 Testing............................................................................................................................................ 57
4.2.1 Test case 1: Assigning new RFID tag into the Arduino Uno .................................... 58
4.2.2 Test Case 2: Using Right “authorized” RFID tag in RFID Reader. .......................... 59
4.2.3 Test Case 3: Using Wrong “unauthorized” RFID tag in RFID Reader. ................... 60
4.2.4 Test Case 4: Using Right RFID tag to unlock the door. ............................................. 61
4.2.5 Test Case 5: When wrong RFID tag is used to unlock the door. ............................. 63
4.2.6 Test Case 6: Unlocking the door through Smartphone application. ...................... 65
4.2.7 Test Case 7: Locking the door through Smartphone application ........................... 67
4.2.8 Test Case 8: Turning OFF the RFID Reader through a smartphone ...................... 69
4.2.9 Test Case 9: Turning ON the RFID Reader through Smartphone application. .... 70
4.3.1 Test Case 01: Signing up the new user in Smart Door lock android application71
4.3.2 Test Case 2: Login into Smart Door lock android application ................................. 74
4.4.4 Test Case 4: The use of Forget password? option to set the password of the
user. ................................................................................................................................................... 78
4.4.5 Test Case 5: Paring Bluetooth of Smartphone with Bluetooth module HC-05. ... 81
CHAPTER 5: CONCLUSION....................................................................................................84
5.3 Limitations..................................................................................................................................... 85
6. References...........................................................................................................................90
7. Appendix .............................................................................................................................93
7.1Appendix A: History..................................................................................................................... 93
7.5.6 ER-Diagram of the Database of Smart Door Lock Application .............................. 137
7.4.8 Relational Diagram of the database of Smart Door Lock System ......................... 138
7.6.1 Hardware components of this RFID and Bluetooth Based Smart Door Lock .... 142
Table of figures
Table 1 Comparison of RFID and Bluetooth Technology (Juan Jose Echevarria, 2012) 2
Table 2 Comparison with a similar system .................................................................... 13
Table3: Assigning-new-RFID-tag-into-the-ArduinoUno ................................................. 58
Table 4 Test case 2: Using-Right-“authorized”-RFID-tag-in-RFID-Reader. ................... 59
Table 5 Test case 3: Using-Wrong-“unauthorized”-RFID-tag-in-RFID-Reader.............. 60
Table 6 Test case 4: Using-Right-RFID-tag-to-unlock-the-door. ................................... 61
Table 7 Test case 5: When-wrong-RFI- tag-is-used-to-unlock-the-door........................ 63
Table 8 Test case 6: Unlocking-the-door-through-Smartphone-application. ................. 65
Table 9 Test case 7: Locking-the-door-through-Smartphone-application. ..................... 67
Table 10 Test case 8: Turning-OFF-the-RFID-Reader-through-a-smartphone ............. 69
Table 11 Test case 9: Turning-ON-the-RFID-Reader-through-Smartphone-application.
...................................................................................................................................... 70
Table 12 Test case 1: Signing-up-the-new-user-in-Smart-Door-lock-android-application
...................................................................................................................................... 71
Table 13 Test case 2: Login-into-Smart-Door-lock-android-application ........................ 74
Table 14 Test case 3: When-the-wrong-password-is-entered. ...................................... 76
Table 15 Test case 4: The-use-of-Forget-password?-option-to-set-the-password-of-the-
user. .............................................................................................................................. 78
Table 16 Test case 5: Paring-Bluetooth-of-Smartphone-with-Bluetooth-module(HC-05).
...................................................................................................................................... 81
CS6P05 FYP Final Report
CHAPTER 1: INTRODUCTION
1.1 Introduction
In the context of the modern world, the IoT market is growing rapidly. With the rapid
growth and advancement of IoT, companies are focusing on time to time market and
releasing more products at a pace rather than focusing on the development of secure
products. This results in many IoT products to have insufficient protection against various
types of security attacks. The IoT products are getting more expensive, thus it is getting
inappropriate for the consumers. However, the advancement of IoT and digital technology
have also brought new possibilities and improvement on different types of system that
also includes the door locking system. The ever-growing needs of security, privacy, and
safety in modern society lead to the innovation of a smart door locking system that
integrates the concept of digital technology with various traditional lock systems.
Likewise, when we see a sophisticated door locking system, the price tag struck
immediately along with the utility. In countries like Nepal, such door lock systems are not
cheap. This is an RFID and Bluetooth based Smart Door Lock project using RFID
sensor, Bluetooth module, Android App and Arduino Uno to develop an affordable
automatic door lock device that enhance household security. This system uses both RFID
and Bluetooth technology together to develop a smart door locking system.
• RFID technology: RFID is an inexpensive technology that is used for wireless data
transmission. The RFID tag and card are the key components of RFID-technology that
is used for tracking and controlling the movement of RFID sensors. There are two
types of RFID tags that are Active and Passive tags. In this project, a passive tag is
used for developing a smart door lock. The active tag needs a battery or source to
operates whereas the Passive tag does not require any power source. (Juan Jose
Echevarria, 2012)
1
Sandesh Parajuli
CS6P05 FYP Final Report
• Bluetooth Technology: Bluetooth is a low power wireless technology that is used for
exchanging data within a short distance. In this project, the HC-05 Bluetooth module
is used as a Bluetooth device to pair with a Smartphone. This technology can
communicate easily with a smartphone. In this project, the smartphone application is
developed to connect with the Bluetooth module and to control the movement of the
door lock. (ScientificAmercican.com, 2007)
The comparison between Bluetooth and RFID technology is shown in the table below: -
Moreover, there are various types of smart lock available in the market. The market of a
smart lock is increasing, and the use of such Smart Lock has been proved to minimize
household burglary rate in the world. It is estimated that the global smart door lock market
is expected to reach $2.4 billion by selling 26 million units by 2023, recording a CAGR of
19% from 2014 to 2023. This indicates that the number of active users and the market of
smart door locks are increasing and resulting in good market views in the sector of door
locks. (ResearchAndMarkets.com, 2020).
3
Sandesh Parajuli
CS6P05 FYP Final Report
5
Sandesh Parajuli
CS6P05 FYP Final Report
1.5.1 Aim
The main aim of this project is to design and implement an RFID and Bluetooth
based Smart Door Lock using the Arduino microcontroller which can be deployed for
the secured passage of an authorized user.
1.5.2 Objectives
The objectives of this smart door lock are given below: -
• To develop a smartphone application and door lock device that can lock the door
virtually.
• To develop a reliable and convenient smart door lock so that people will have an
easier time unlocking their doors.
6
Sandesh Parajuli
CS6P05 FYP Final Report
Briefly, the report will contain five main chapters which will represent the overall
progression from the commencement to the result of the project. At last, a conclusion and
appendix will be written according to the findings of the project.
Chapter 1-Introduction: In this chapter, the brief introduction to the subject matter is
discussed that includes an intro to the subject matter, problem statements, current
scenario, the scope of the project, and the project as a solution. The Aim and objectives
of the project are also mentioned.
Chapter 2-Background: This chapter is about the details of the background of a project
that includes About the end-user, Understanding the solution, Literature review, a Similar
system. The critical comparison with similar systems is also discussed in this chapter.
Chapter 4-Testing: This chapter is about the testing where the white box testing is used
for performing the testing of System and the application. This chapter also includes the
critical analysis of the project.
Chapter 5-Conclusion: In this chapter, the conclusion and summary are mentioned that
includes Advantages, limitation of the developed project. The security, ethical and the
social issues are also presented in this chapter. Moreover, appendix, references and the
future development is also included in this chapter.
7
Sandesh Parajuli
CS6P05 FYP Final Report
CHAPTER 2: BACKGROUND
This door lock system is provided with a smartphone application, where the user must
register. After registering, the user can log-in to the Smart door lock application. This
application stores all the essentials information about the user into the database. The
user is also provided with an RFID tag, which is used for unlocking the door. After
unlocking the door, it gets automatically locked within a few seconds. Therefore, to
enhance the strength and to maintain the security of the household individual this door
locks can be deployed.
Moreover, the below graph shows the actual growth of home-users, who are using the
smart locks in their household. According to the security segment, the number of active
house users having a smart door lock system is expected to amount to 115.8M by 2022.
(Statista, 2020)
8
Sandesh Parajuli
CS6P05 FYP Final Report
1. User-Based IoT-based Smart locks are operated primarily by actuators and sensors
that allow the devices to communicate with the user's physical environment. Likewise,
in this project, the door lock is provided with RFID tags and cards to unlock the door.
Thus, when the device is compromised it can cause serious harm as the device can
contain private data as well as the possibility of monitoring it.
9
Sandesh Parajuli
CS6P05 FYP Final Report
intermediaries. The indirect attack includes gaining access to the device by exploiting
the existing vulnerabilities of the device while the users are unaware of the attack.
10
Sandesh Parajuli
CS6P05 FYP Final Report
11
Sandesh Parajuli
CS6P05 FYP Final Report
12
Sandesh Parajuli
CS6P05 FYP Final Report
Table 2 Comparison-with-a-similar-system
Door Lock Smart Home Automatic Door Electronic RFID and
Hardware Security Using Locking System Using Door Lock Bluetooth based
Component RFID System Bluetooth Module using RFID Smart Door Lock
and Password
Arduino ✘ ✔ ✔ ✔
PIC 16F877A ✔ ✘ ✘ ✘
RFID Sensor ✔ ✘ ✔ ✔
Relay Module ✔ ✘ ✔ ✔
Servo motor ✘ ✔ ✘ ✘
Bluetooth ✘ ✔ ✘ ✔
(HC-05)
Keypad ✘ ✘ ✔ ✘
Led lights ✘ ✔ ✔ ✔
Buzzer ✘ ✘ ✘ ✔
Breadboard ✘ ✘ ✔ ✔
Solenoid ✔ ✘ ✔ ✔
Lock
Android App ✘ ✔ ✘ ✔
(Smartphone)
Power Supply ✔ ✔ ✔ ✔
Battery ✘ ✔ ✘ ✔
Voltage ✘ ✘ ✔ ✘
Regulator
13
Sandesh Parajuli
CS6P05 FYP Final Report
2.5 Critical Comparison with RFID and Bluetooth based Smart Door Lock
This door locking system is simply an RFID Based system that needs an RFID tag to
unlock the door. As compared with this system, it lacks security features like alert function,
indication features, and so on. This door lock system does not have batteries for failsafe
which creates problems during the power cut.
This door lock system is only controlled by smartphones and needs a smartphone
to unlock or lock the door. Similarly, this door lock system also lacks security features
such as alerting function and do not have another method to unlock the door rather than
via smartphone. This door lock system uses a servo motor for controlling the motion of
the door lock which is less secure as compared to the solenoid lock.
This electronic door lock uses RFID and password-based technology. Although
the extra password function of this project makes the door lock more secure, it lacks
security features like alert function and does not have any battery backup. Moreover, this
system has a voltage regulator is relatively big then comparing to our system.
14
Sandesh Parajuli
CS6P05 FYP Final Report
Generally, there are so many factors that are needed for consideration while
building and designing a smart door locking system. The system is designed to be cost-
effective, versatile, hassle-free, and more user-friendly so that these modern devices can
be integrated into everyone's system. The main goal of such a system is to maintain and
to enhance the strength of security to the next level.
(Ralph Ting, 2014) proposed an RFID door lock that is based on security and access
control. It is designed to create a convenient way to unlock the door than the traditional
key. The components included in this system are simple and uses only an RFID
technology to develop a door lock. This system lacks the important security features as it
has no any alerting system. This system suggests adding additional features such as
buzzer for alerting purpose, SMS alert, and so on.
(Ni Ni San Hlaing, 2019), in his research on RFID door lock system suggests the use of
keypad to secure the system by adding a password after scanning the RFID tag. The
extra password function in the system makes the door lock more secure.
(Lia Kamelia, 2014) in her research on smart door lock recommends that to be able to
unlock the door using smartphone helps the users to interact more easily than other door
locking system. The proposed door lock is the combination of different technologies in
which an android smartphone works as a task handler, Bluetooth module as command
agent, Arduino Uno as controlling and data processing unit, and solenoid as the output.
(Peter Adole, 2016) introduced an RFID Based Security Access Control System with
GSM Technology. Although this is an advanced system that uses a GSM technology to
alert the user, the additional technology gives rise to the cost of the overall system. Thus,
the system fails to be cost-effective as compared to other systems.
As compared with these doors locking system proposed by different authors, our project
has extra features and uses more technology to build a door lock. The two-way
authentication feature of this project add extra security to the system and the use of
smartphone makes it more user-friendly.
15
Sandesh Parajuli
CS6P05 FYP Final Report
CHAPTER 3: DEVELOPMENT
3. Methodology
16
Sandesh Parajuli
CS6P05 FYP Final Report
17
Sandesh Parajuli
CS6P05 FYP Final Report
The main goal of this project is to design a smart door lock and Bluetooth based
android application. Therefore, after researching and by discussing the need for a
potential user Agile methodology is followed in this project. The description of the phase
of agile approach for this project is presented in 3.3.
The agile methodology was developed after the downfall of a traditional methodology
called the Waterfall methodology. Usually, In the waterfall methodology, the testing team
does not get enough time to complete the testing process as more time is spent and
wasted during the early phase for detailed documentation. But, in Agile methodology
testing is not taken as a separate phase but as an important phase of the development
process. Therefore, the agile methodology is used in this project because of the following
reasons: -
The below diagram shows the Agile methodology approach that is used for developing
this RFID and Bluetooth based Smart Door Lock: -
18
Sandesh Parajuli
CS6P05 FYP Final Report
Figure9:Agile-Methodology-for-RFID-and-Bluetooth-based-Smart-Door Lock
3.3.1 Brainstorm
This phase deals with the research done about the smart door locking
system by reading journals, articles, and by watching video tutorials. In this phase,
the hardware components got delivered and required research was done regarding
hardware components.
19
Sandesh Parajuli
CS6P05 FYP Final Report
3.3.2 Design
After having all the required hardware components, circuit diagram and schematic
diagrams were constructed by using Fritzing software. Many types of research were done
to build the circuit diagram. Thus, by researching and after acquiring knowledge of all the
components features, the circuit diagrams were successfully constructed. The design of
this project is discussed in 3.6.
The RFID sensor usually comes with the 8-pins unsoldered version in a packet.
At first, the RFID sensor was soldered using an iron with corresponding 8-pins. The
picture of the RFID Sensor before and after soldering is shown below: -
Figure10: Picture-of-before-and-After-of-RFID-Sensor
20
Sandesh Parajuli
CS6P05 FYP Final Report
Figure11: Circuit-Diagram-of-Arduino-Uno-and-RFID-Reader
After finishing connecting the wire, the RFID reader library is added and the SDK
and Reset pin is defined into the Arduino UNO.
21
Sandesh Parajuli
CS6P05 FYP Final Report
Figure12:Code-for-defining-RFID-reader
3.3.3.3 Burning the RFID tag and assigning its information into Arduino Uno:
After setting up the RFID reader MFRC522 into the Arduino, the RFID tag
is burned, and the information of the respective tag is added for the movement of
the solenoid lock. To set up the communication between RFID tag and RFID
reader, the serial port is started and MFRC522 RFID reader is initiated by the
following command.
Figure13: Initiating-RFID-reader
Next, the RFID tag information is printed on the serial monitor. The below screenshot is
the code for displaying the UID of RFID tag on serial monitor.
Figure14:Code-to-print-UID-of-tag
22
Sandesh Parajuli
CS6P05 FYP Final Report
The below screenshot displays the RFID code of the authorized RFID tag in serial
monitor.
Figure15:Authorized-RFID-tag-UID
The below screenshot displays the unauthorized RFID tag in serial monitor:
Figure16: Unauthorized-RFID-tag-UID
23
Sandesh Parajuli
CS6P05 FYP Final Report
The Bluetooth module HC-05 is connected to the Arduino Uno as shown in the figure
below.
Figure17:Interfacing(HC-05)-with-Arduino-Uno
The Rxd and Txd of HC-05 is connected to the digital pin 7 and 8 of Arduino UNO. Then,
it is defined as Software serial and Software serial library is also included. The software
serial is used for connecting the smartphone and Bluetooth module with Arduino Uno to
control the movement of solenoid lock and to monitor RFID sensor through a smartphone.
The below screenshot shows the code for defining RX and TX as a SoftwareSerial.
24
Sandesh Parajuli
CS6P05 FYP Final Report
Figure18:Defining-Rx-and-Tx-as-SoftwareSerial
To transmit the data from Smartphone to Arduino Uno, two variables are assigned. The
variable “a” is used for opening the door and “b” is used for closing the door. Respectively
to monitor the RFID sensor, the variable “1” is used for Turing ON and “2” is used for
turning OFF the RFID sensor.
25
Sandesh Parajuli
CS6P05 FYP Final Report
All the hardware components i.e. RFID reader, HC-05, relay module, Red LED, Green
LED and Solenoid lock is connected with Arduino UNO as shown in the diagram below:
Figure20:Circuit-diagram-of-all-components
Next, the green LED, red LED, Relay, Buzzer are defined in the Arduino IDE. The access
delay and denied delay is also defined as 2000ms and 1000ms which is further used for
closing the door automatically after opening it. The below screenshot displays the code
for defining all the components.
26
Sandesh Parajuli
CS6P05 FYP Final Report
The buzzer, LED lights, movement of the door is controlled through the given code which
is shown in the screenshot below-
27
Sandesh Parajuli
CS6P05 FYP Final Report
The android application was build using the open-source android application
development software called MIT App Inventor 2. The developed application is based on
Bluetooth clients in which users get connected and interact with the smart door lock
system. The overall system is controlled by the Arduino board. One can either lock or
unlock the door through the application. This application is also used for two-way
authentication which means the RFID Sensor can be turned off or on respectively. The
developed smartphone application consists of 3 screens that are Login Portal, Signup
portal, and Main Screen.
This is the login portal where the user login through smartphone by entering their
signup credential. The user must have a Gmail account to get logged in. Firstly, the user
should signup and after signing the user can use their username and password to get
logged. If the user forgets their password, they can easily change their password by
clicking the Forgot Password option. The below screenshot shows the login portal of the
smartphone app. This login portal uses Firebase authentication to save the username
and password.
Figure23:Login-Portal
28
Sandesh Parajuli
CS6P05 FYP Final Report
When the signup button is clicked it take to another screen that is Signup portal which is
shown below: -
The below block shows the code for calling Firebase Authentication when the username
and password is entered.
29
Sandesh Parajuli
CS6P05 FYP Final Report
When Forget password button is clicked it send the reset password link to email address
of the user. The firebase Reset password API is used for sending the reset link. The code
blocks to reset the password is given below.
30
Sandesh Parajuli
CS6P05 FYP Final Report
This portal is the user interface portal where the user creates an account by submitting
their details which includes Name, Phone No, Email address and Password. The user
detail is stored on a firebase database and the email and password is stored in firebase
authentication.
Figure24:Signup-Portal
31
Sandesh Parajuli
CS6P05 FYP Final Report
The below code is used for calling the Firebase authentication to store the Email and
Password of the users.
32
Sandesh Parajuli
CS6P05 FYP Final Report
This is the main screen where the user controls the movement of door lock and monitor
the RFID reader after logged in successfully. The below screenshot shows the Main
Screen of the smartphone application where the connection is establishment between the
user and smart door lock.
Figure25:Main-Screen
The Bluetooth client is used in this screen to form a connection between smartphone and
the door lock. The user uses their smartphone’s Bluetooth to connect the door lock and
to establish a connection between them. The code block of the Bluetooth client is given
below:
33
Sandesh Parajuli
CS6P05 FYP Final Report
When the user clicks the “Door Unlock” button the variable “a” pass to the system and
door is unlocked. Likewise, when the user clicks the “Door Lock” button the variable “b”
is pass and the door is locked which is shown below in code block:
34
Sandesh Parajuli
CS6P05 FYP Final Report
The smartphone is also used to turn on and off the RFID reader to form a Two-factor
authentication. The user must turn on the RFID reader to unlock the door through RFID
tag. The code blocks for Turing ON and OFF RFID reader is given below:
The user can even use their fingerprint to Unlock the door. This is the additional feature
of this application. The application uses the inbuilt fingerprint sensor of the Smartphone
to unlock the door.
The code block for Unlocking the door through fingerprint are:
35
Sandesh Parajuli
CS6P05 FYP Final Report
3.3.5 Testing
This is the important phase where the testing was performed for the entire system. In this
phase the testing of the system and the smartphone application is done by using white
box testing techniques. All the errors and bugs of the door lock device is fixed in this
phase. The detail of the testing is presented on the Chapter 4.
3.3.6 Deployment
In this phase, the smart door lock is deployed for the household security after finishing
designing, development and testing of the project. The device is ready for deployment
and to sell after this phase.
36
Sandesh Parajuli
CS6P05 FYP Final Report
3.4 Survey
At the beginning of this project, the survey was done asking people about this
RFID and Bluetooth based smart door lock. The total of 34 individuals have filled the pre-
survey form. The result of the pre-survey indicates that the additional security is require
for the door lock these days. Among 34 peoples only few were familiar with smart
technology that indicate only half of the individuals are familiar with the smart door locking
system. It also pointed out the smart lock needs to user friendly, so that everyone can
have easier time using the lock. The pre-survey also pointed out the obvious fact that the
people like to use of RFID and Smartphone for unlocking the door. Moreover, the pre-
survey feedback result has provided new ideas and view through which project could be
better.
The detailed of the survey result and the summary can be obtained from Appendix B.
After finishing the development of this project, another survey was done. The total
number of 36 individuals filled the post survey form. The post-survey indicate that the first
prototype of this project was satisfactory. The individuals liked the approach of using
smartphone and RFID tag to unlock the door. Moreover, the two-factor authentication of
the smart door lock was also appreciated. Although, the consumers wanted the additional
feature of biometrics and iris scanner, the current features were marked satisfactory and
interface friendly. The post-survey result indicates that adding those features on the smart
door lock would be ready for deployment and to compete in the market
The survey result and the summary are described below in the following bar diagrams
and pie chart Appendix C.
37
Sandesh Parajuli
CS6P05 FYP Final Report
Figure26:Arduino-IDE-User-Interface
38
Sandesh Parajuli
CS6P05 FYP Final Report
3.5.1.2 Fritzing
Fritzing is an open-source software that is used for developing a breadboard diagram,
schematics circuit diagram to design electronics hardware. It helps the designers to
develop a prototype to build a permanent circuit. It was developed at the University of
Applied Sciences Potsdam. All the circuit and the breadboard designs is done using this
software for this smart door lock project (Fritzing, 2015)
Figure27:Fritzing
39
Sandesh Parajuli
CS6P05 FYP Final Report
40
Sandesh Parajuli
CS6P05 FYP Final Report
41
Sandesh Parajuli
CS6P05 FYP Final Report
➢ Arduino UNO
In this project, the Arduino microcontroller is used for monitoring and coding all the
necessary hardware to develop a smart door locking device using RFID Senor to
unlock the door. This microcontroller consists of 14 digital input/output pins, 6
analogs I/pins and a power jack. (WWW.ARDUINO.CC, 2019)
Figure32:Arduino-Uno
➢ RFID Reader
In this project, the RFID reader is used for reading the RFID cards and tags to
unlock the door. The RFID reader is a wireless device that is usually used for
transferring data to recognize and to track tags that are connected. (Tlasrfidstore,
2019).
43
Sandesh Parajuli
CS6P05 FYP Final Report
Figure33:RFID-Reader/Sensor
Figure34:Bluetooth-module(HC-05)
➢ Relay Module
Figure35: Single-channel-Relay
44
Sandesh Parajuli
CS6P05 FYP Final Report
➢ Solenoid Lock
Figure36:12V-Solenoid-Lock
➢ LED
Two LED lights green and red are used for an indication in this project. The red
LED indicate the wrong RFID and the green LED indicate the correct RFID tag.
➢ Buzzer
It is used for alerting by making buzz sound. In this project it is used as an altering
mechanism, when the intruder or the wrong RFID tag is used it alert the user about
the situation.
➢ Breadboard
It is a mini solderless prototype breadboard used for the Arduino shield to connect
the wires. It is used for interconnecting all the hardware components in this project
45
Sandesh Parajuli
CS6P05 FYP Final Report
➢ Jumper Wires
It is wired which used for connecting all the components. It is used for wiring all
the hardware components in this project.
3.6 Design
The circuit and schematic design for all the hardware components of this project is
given below: -
The Arduino and RFID reader are connected as shown in the figures below:
Figure37:Circuit-Diagram-of-Arduino-Uno-and-RFID-Reader
46
Sandesh Parajuli
CS6P05 FYP Final Report
Figure38: Schematic-Diagram-ArduinoUno-and-RFID-Sensor
47
Sandesh Parajuli
CS6P05 FYP Final Report
3.6.2 Circuit Design for Bluetooth (HC-05) module Interfacing with Arduino
The Bluetooth module and Arduino Uno are connected as shown in the figures below:
Figure39:Circuit-Diagram-of-ArduinoUno-and-Bluetooth-Module
48
Sandesh Parajuli
CS6P05 FYP Final Report
Figure40:Schematic-diagram-of-ArduinoUno-and-Bluetooth-Module
49
Sandesh Parajuli
CS6P05 FYP Final Report
3.6.3 Circuit Design for RFID reader, Buzzer, Led, Solenoid lock, Battery, and Relay
module Interfacing with Arduino
The RFID reader, buzzer, led, solenoid lock, battery and Relay module are connected
with Arduino as shown in the figure below:
Figure41:Circuit-Diagram-of-ArduinoUno-and-Bluetooth-Module
50
Sandesh Parajuli
CS6P05 FYP Final Report
Figure42:Schematic -Diagram-of-Arduino-Uno-and-Bluetooth-Module
51
Sandesh Parajuli
CS6P05 FYP Final Report
3.6.4 Circuit Design for All hardware components Interfacing with Arduino
All hardware components are connected with Arduino as shown in the figures below.
Figure43:Circuit-Diagram-of-All-Hardware-Components
52
Sandesh Parajuli
CS6P05 FYP Final Report
Figure44:Schematic-Diagram-of-all-hardware-components-together
53
Sandesh Parajuli
CS6P05 FYP Final Report
Figure45:Activity-Diagram-of-RFID-and-Bluetooth-Based-Smart-Door-Lock
54
Sandesh Parajuli
CS6P05 FYP Final Report
3.7 Implementation
The below figure shows the block diagram of the whole door lock system. This door lock
system is the combination of different technologies in which an android smartphone and
RFID tag work as a task handler, Bluetooth module and RFID reader as command agent,
Arduino UNO as controlling and data processing unit and solenoid as the output.
Figure46:Block-Diagram-of-RFID-and-Bluetooth-based-Smart-Door-Lock
55
Sandesh Parajuli
CS6P05 FYP Final Report
Figure47:Flowchart-of-RFID-and-Bluetooth-based-Smart-Door-Lock
56
Sandesh Parajuli
CS6P05 FYP Final Report
CHAPTER 4: TESTING
4.1 Testing
There are different types of methodologies that are available to test the system and its
software whose main motive is to address the bugs in the system and to fix it. The bugs
are the error in the system which can be seen while running the system. (Mohd Ehmer,
2012) The main objectives of the testing are given below: -
- To ensure the smartphone application and the device works correctly as specified by
the developer
- To ensure the bug and error-free application and system.
- To achieve user satisfaction.
After researching the various testing methodologies, white box testing is followed in this
project to test the door lock device and the smartphone application. As this project is
developed for the user, the white box testing is appropriate and meets all the objectives
mentioned above for testing. The tester should know the source code of the system and
should completely understand the working mechanism of the system and the software to
perform the testing. Thus, when the error or bugs are found while performing the testing,
it should be resolved as soon as possible. The testing was done using white box testing
because: -
- It assures that all the unit of the device and the software is working as all the units
are tested at least once.
- It helps to find out the differences between expected results and the actual results
and shows the behavior of the device and the application.
- It covers maximum areas during test scenario that helps to optimize the code by
finding the errors. (Gaurav Saini, 2013)
The white box testing implements three levels for testing that are unit, integration and
system testing. The testing of the Smart door lock system is shown in the below tables:
57
Sandesh Parajuli
CS6P05 FYP Final Report
4.2.1 Test case 1: Assigning new RFID tag into the Arduino Uno
Table3: Assigning-new-RFID-tag-into-the-Arduino Uno
Test Case 01
Objective To assign the new RFID tag into the door lock system to unlock the
door.
Expected Results. 1. The RFID tag UID number should display in the serial monitor
of Arduino IDE.
Actual Results The RFID Tag is successfully displayed on the serial monitor. Task1
successful!
Analysis The UID of the RFID tag is later used for the access control and
unlocking the solenoid lock.
Proof:
58
Sandesh Parajuli
CS6P05 FYP Final Report
4.2.2 Test Case 2: Using Right “authorized” RFID tag in RFID Reader.
Table 4 Test case 2: Using-Right-“authorized”-RFID-tag-in-RFID-Reader.
Test Case 0w
Expected Results. 1. The serial monitor should display the message “Authorized
access”
Actual Results The serial monitor displays the message successfully. Test 2
successful!
Analysis The authorized RFID tag can be used for unlocking the solenoid lock
of the door
Proof:
59
Sandesh Parajuli
CS6P05 FYP Final Report
4.2.3 Test Case 3: Using Wrong “unauthorized” RFID tag in RFID Reader.
Table 5 Test case 3: Using-Wrong- “unauthorized”-RFID-tag-in-RFID-Reader
Test Case 03
Expected Results. 1. The serial monitor should display the message “Access
denied”
Actual Results The serial monitor displays the message successfully. Test 3
successful!
Analysis When an unauthorized RFID tag is used the door is locked and the
user is alert by a buzzer.
Proof:
60
Sandesh Parajuli
CS6P05 FYP Final Report
4.2.4 Test Case 4: Using Right RFID tag to unlock the door.
Table 6 Test case 4: Using-Right-RFID-tag-to-unlock-the-door.
Test Case 04
Objective To test the system that should work when the Right RFID tag is used
Expected Results. 1. The serial monitor should display the message authorized access.
2. The Green LED light should turn on.
3. The solenoid lock should be pushed backed to unlock the door.
4. The buzzer should turned off.
Actual Results The serial monitor prompt the message, Green LED is turned On, the door
is unlocked and the buzzer did not turn on. Test 4 successful!
Analysis The door should be unlocked for the secure passage to the user.
Proof:
61
Sandesh Parajuli
CS6P05 FYP Final Report
62
Sandesh Parajuli
CS6P05 FYP Final Report
4.2.5 Test Case 5: When wrong RFID tag is used to unlock the door.
Table 7 Test case 5: When-wrong-RFID- tag-is-used-to-unlock-the-door.
Test Case 05
Objective To test the system that should not work when the wrong RFID tag is used
Expected Results. 1. The serial monitor should display the message “access denied”.
2. The Red LED light should turn on.
3. The solenoid lock should be at initial stage and door shoulde be
locked.
4. The buzzer should turn on.
Actual Results The serial monitor prompt the message, Red LED is turned On, the door
is locked, and the buzzer is turned on. Test 5 Successful!
Analysis The buzzer should alert the user about the intruder on the house.
Proof:
63
Sandesh Parajuli
CS6P05 FYP Final Report
64
Sandesh Parajuli
CS6P05 FYP Final Report
Test Case 06
Objective To test the system that should work when the smartphone is used to
unlock the door.
Actual Results The serial monitor prompts the message, and the door should is unlocked.
Test 6 Successful!
Analysis The smartphone is used for unlocking the door when the user is inside the
house, as the RFID reader is placed outside the door.
Proof:
65
Sandesh Parajuli
CS6P05 FYP Final Report
66
Sandesh Parajuli
CS6P05 FYP Final Report
Test Case 07
Objective To test the system that should work when the smartphone is used to lock
the door.
Actual Results The serial monitor prompts the message, and the door locked. Test 07
Successful!
Analysis The smartphone is used for locking the door when the user is inside the
house, as the RFID reader is placed outside the door.
Proof:
67
Sandesh Parajuli
CS6P05 FYP Final Report
68
Sandesh Parajuli
CS6P05 FYP Final Report
4.2.8 Test Case 8: Turning OFF the RFID Reader through a smartphone
Table 10 Test case 8: Turning-OFF-the-RFID-Reader-through-a-smartphone
Test Case 08
Objective To test the system that should work when the smartphone is used to turn
OFF the RFID reader.
Actual Results The serial monitor prompts the message, and the RFID reader is turned
off. Test 08 Successful!
Analysis This creates a two-factor authentication in such a way that the RFID
reader should be turned ON through a smartphone to unlock the door by
using an RFID tag.
Proof:
69
Sandesh Parajuli
CS6P05 FYP Final Report
4.2.9 Test Case 9: Turning ON the RFID Reader through Smartphone application.
Table 11 Test case 9: Turning-ON-the-RFID-Reader-through-Smartphone-
application.
Test Case 09
Objective To test the system that should work when the smartphone is used to turn
ON the RFID reader.
Actual Results The serial monitor prompts the message, and the RFID reader is turned
on. Test 09 Successful!
Analysis This creates a two-factor authentication in such a way that the RFID
reader should be turned ON through a smartphone to unlock the door by
using an RFID tag.
Proof:
70
Sandesh Parajuli
CS6P05 FYP Final Report
4.3.1 Test Case 01: Signing up the new user in Smart Door lock android application
Table 12 Test case 1: Signing-up-the-new-user-in-Smart-Door-lock-android-
application
Test Case 01
Objective To test the application that should register the new user in the Smart Door
lock application
Expected Results. 1. The user details should be added to the firebase database.
2. The new user should be registered.
3. The username and the password should be store into the Firebase
authentication
Actual Results The new user is successfully registered and the user details are stored in
the Firebase database.
Analysis This application uses the Firebase database to store the user details and
the firebase authentication is used for logging in the user into the Smart
Door Lock application
Proof:
71
Sandesh Parajuli
CS6P05 FYP Final Report
72
Sandesh Parajuli
CS6P05 FYP Final Report
73
Sandesh Parajuli
CS6P05 FYP Final Report
4.3.2 Test Case 2: Login into Smart Door lock android application
Table 13 Test case 2: Login-into-Smart-Door-lock-android-application
Test Case 02
Objective To test the application that should work when the correct login credential
is used.
Expected Results. 1. The user should be logged in into the Smart Door Lock application
Actual Results The user is successfully logged in the Smart Door Lock application. Test
02 Successful!
Analysis While logging in the application the Firebase Authentication call the data
stored into firebase application to log in the user into the application
Proof:
74
Sandesh Parajuli
CS6P05 FYP Final Report
75
Sandesh Parajuli
CS6P05 FYP Final Report
Test Case 03
Objective To test the application should deny the user when the wrong password is
entered
Expected Results. 1. The pop-up message should appear saying login failed
Actual Results The pop-up message is successfully displayed the user is denied to login.
Analysis The Firebase authentication validates the password with the actual
password of the user and prompt login failed when the password is
incorrect.
Proof:
76
Sandesh Parajuli
CS6P05 FYP Final Report
77
Sandesh Parajuli
CS6P05 FYP Final Report
4.4.4 Test Case 4: The use of Forget password? option to set the password of the
user.
Table 15 Test case 4: The-use-of-Forget-password?-option-to-set-the-password-of-the-
user.
Test Case 09
Objective To test the application that works when the forget password option is
clicked to reset the password
Expected Results. 1. The reset link should be sent to change the password
Actual Results The reset link is sent successfully, and the password is changed. Task 4
successful!
Analysis The firebase API is used for sending the reset email on the respective
email address of the user
Proof:
78
Sandesh Parajuli
CS6P05 FYP Final Report
79
Sandesh Parajuli
CS6P05 FYP Final Report
80
Sandesh Parajuli
CS6P05 FYP Final Report
4.4.5 Test Case 5: Paring Bluetooth of Smartphone with Bluetooth module HC-05.
Table 16 Test case 5: Paring-Bluetooth-of-Smartphone-with-Bluetooth-module(HC-05).
Test Case 04
Objective To test the application that should work when the smartphone is used to
connect with Bluetooth module HC-05.
Actual Results All the Bluetooth devices available are displayed and the smartphone is
successfully paired with the Bluetooth module HC-05. Test
04 successful!
Analysis After connecting the smartphone Bluetooth with the HC-05 module, the
connection is established between the smartphone and the Smart Door
lock system to monitor and to control the door lock and the RFID
reader/sensor.
Proof:
81
Sandesh Parajuli
CS6P05 FYP Final Report
82
Sandesh Parajuli
CS6P05 FYP Final Report
Rather than using a key, this device uses a passive RFID tag. Moreover, to make this
device more secure two- way authentication is created between the RFID reader and a
smartphone to lock or unlock the door. Thus, the RFID reader must be turned on through
a smartphone to be able to read the RFID tag to unlock the door. Moreover, this door lock
device provides a safe and efficient solution for controlling the movement of the door
through a smartphone. Firstly, the user should register through a smartphone application.
After registering, the user can log-in to the Smart door lock application and can control
the door through the smartphone.
83
Sandesh Parajuli
CS6P05 FYP Final Report
CHAPTER 5: CONCLUSION
This project is an affordable design of smart lock that enhance the security of the houses.
This design is comparatively small and easy to install with just a pair of screws. Similarly,
this door lock device is advanced and secure than any other traditional locks. Moreover,
this type of door lock is not only for the house door, but also it can be great in use for
hotels, motels, hospitals, and other commercial buildings for access control and safe. It
can even be used in the car door too. Moreover, this lock can be a simple and cost-
effective upgrade to the average consumer’s security.
5.2 Advantages
There are many advantages associated while using this smart door lock. Some of
them are given below: -
1. Simple to use
Nowadays, technology is getting more complex with extra features and uses tons
of technologies. This door lock system is simple to use and very convenient as the
user will have an easier time unlocking their doors. It is hassle-free to install so
that anyone can install it into their house’s door with ease.
2. Cost-effective
The hardware components and the technologies used while developing this door
lock is very cheap. Therefore, this smart door lock device is very cheap comparing
84
Sandesh Parajuli
CS6P05 FYP Final Report
to other smart door lock devices on the market. It is a simple and cost-effective
upgrade to the average consumer’s security.
4. Alerting feature:
This smart door lock has a buzzer so that when the intruder tries to open the door,
it alerts the user.
5. Two-Factor Authentication
This smart door lock has the two-factor authentication feature as the RFID reader
can be turned ON and OFF via smartphone application. Thus, to unlock the door
through the RFID tag it must be turned on. This helps to minimize different security
attacks of RFID tag and makes the lock secure.
5.3 Limitations
1. One of the major disadvantages is that if the phone ran out of charge then the user
cannot use their application to lock or unlock the door.
2. This smart door lock uses a power source that is batteries to run the system, in
case of power failure, the user cannot have access to the door. The batteries
should be changed in time.
3. This application is only developed in the android platform so, the people having
IOS and windows phone cannot access to this smart door lock.
4. This smart door lock is the IoT based device so the security attack performs by
hackers can damage the system and can even compromise it.
85
Sandesh Parajuli
CS6P05 FYP Final Report
86
Sandesh Parajuli
CS6P05 FYP Final Report
87
Sandesh Parajuli
CS6P05 FYP Final Report
1. Adding biometrics features in this smart door lock. So, the user can have an easier
time unlocking the door just by using their thumbprint.
2. Adding NFC technology to the smart door lock that allows the user to unlock the
door through NFC just by holding their smartphone to the lock.
3. Adding LED or AMOLED display, this feature can be implemented to provide the
status of the door, so that the user can know door status.
88
Sandesh Parajuli
CS6P05 FYP Final Report
4. The most important feature would be adding different language in the application.
Generally, this application is based on the English language so adding the Nepali
language would help the Nepalese people to use the app without a struggle.
5. This application can only be used in the android platform. To make it more
accessible, the IOS and Windows version can also be developed for the users.
89
Sandesh Parajuli
CS6P05 FYP Final Report
6. References
Lubhansh Kumar Bhute, .G.S.A.S. (2017) Automatic Door Locking System Using Bluetooth. International
Journal for Research in Applied Science & Engineering, 5(V), pp.1128-31. Available at:
https://www.ijraset.com/fileserve.php?FID=7810.
ADAM, N.A.B. (2016) SMART HOME SECURITY USING RFID SYSTEM. SMART HOME SECURITY USING RFID
SYSTEM , 1(1), pp.1-24. Available at: http://eprints.utem.edu.my/16257/.
Bayoumi, A.K.J.A. (2016) RFID Security Threats and Basic Solutions. RFID Security, I(1), pp.27-41. Available
at: https://link.springer.com/chapter/10.1007/978-3-319-47545-5_2#citeas.
Dijk, J.V. (2015) Property Crime: Victimization and Trends. International Encyclopedia of the Social &
Behavioral Sciences, 2nd(1), pp.100-13. Available at: https://www.sciencedirect.com/topics/social-
sciences/burglary.
Gaurav Saini, K.R. (2013) An Analysison Objectives, Importanceand Typesof SoftwareTesting. International
Journal of Computer Science and Mobile Computing (IJCSMC), 2(9), pp.18-23. Available at:
https://docplayer.net/16691951-An-analysis-on-objectives-importance-and-types-of-software-
testing.html.
Gyanendra Kumar Verma, T.P. (2010) A Digital Security System with Door Lock System Using RFID
Technology. International Journal of Computer Applications, 5(11), pp.1-10. Available at:
https://www.researchgate.net/publication/45602075_A_Digital_Security_System_with_Door_Lock_Syst
em_Using_RFID_Technology.
Hany F. Atlam, G.B.W. (2019) IoT Security, Privacy, Safety and Ethics. In Springer, ed. Digital Twin
Technologies and Smart Cities. 1st ed. Springer, Cham. pp.123-49.
90
Sandesh Parajuli
CS6P05 FYP Final Report
Inventor, M.A. (2019) MIT App Inventor [Online]. (3.0) Available from:
https://appinventor.mit.edu/about-us [Accessed 1 January 2012].
Juan Jose Echevarria, J.R.-d.-G.J.L.M.A. (2012) Comaprision of RFID and Bluetooth technology. WebTag:
Web browsing into sensor tags over NFC, 12(7), pp.8670- 8690. Available at:
https://www.researchgate.net/publication/231212227_WebTag_Web_browsing_into_sensor_tags_ove
r_NFC.
Lia Kamelia, A.N.S.R.M.S.a.W.S..E.M. (2014) ARPN Journal of Engineering and Applied Sciences. DOOR-
AUTOMATION SYSTEM USING BLUETOOTH-BASED ANDROID, 9(10), pp.1759-62. Available at:
https://www.researchgate.net/publication/292624568_Door-automation_system_using_bluetooth-
based_android_for_mobile_phone/citation/download.
LTD, A.T.C. (2015) Security for Home and Business. Advantages and disadvantages of RFID Door Locks,
I(2), pp.1-10. Available at: http://www.astclock.com/advantages-of-rfid-door-locks/.
Lubhansh Kumar Bhute, .G.S.A.S. (2017) Automatic Door Locking System Using Bluetooth. International
Journal for Research in Applied Science & Engineering, 5(V), pp.1128-31. Available at:
https://www.ijraset.com/fileserve.php?FID=7810.
Mohd Ehmer, F.K. (2012) A Comparative Study of White Box, Black Box and Grey Box Testing Techniques.
(IJACSA) International Journal of Advanced Computer Science and Applications, 3(6), pp.12-15.
MyRepublica. (2019) Theft cases on rise. Theft cases on rise, p.3. Available at:
https://myrepublica.nagariknetwork.com/news/theft-cases-on-rise/.
Ni Ni San Hlaing, S.S.L. (2019) International Journal of Trend in Scientific Research and Development
(IJTSRD). Electronic Door Lock using RFID andPassword Based on Arduino, 3(3), pp.799-802. Available at:
https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/22875/electronic-
door-lock-using-rfid-and-password-based-on-arduino/ni-ni-san-hlaing.
Pal, S.K. (2020) About Us: A computer science portal foor geeks [Online]. (1) Available from:
https://www.geeksforgeeks.org/software-engineering-spiral-model/ [Accessed 5 January 2015].
Peter Adole, J.M.M.G.A.I. (2016) RFID Based Security Access Control System with GSM. American Journal
of Engineering Research (AJER), 5(7), pp.236-42. Available at:
http://www.ajer.org/papers/v5(07)/ZE050702360242.pdf.
Ralph Ting, M.K. (2014) RFID Door Lock. RFID Door Lock | Senior Project | Electrical Engineering
Department, 1(1), pp.1-37. Available at:
https://digitalcommons.calpoly.edu/cgi/viewcontent.cgi?article=1267&context=eesp.
ResearchAndMarkets.com. (2020) Global Smart Lock Market Report 2020: Size, Share & Trends Through
2016-2027. Home Security and Safety. Dublin: Research and Markets Research and Markets.
ScientificAmercican.com. (2007) How does Bluetooth work? [Online]. (1) Available from:
https://www.scientificamerican.com/article/experts-how-does-bluetooth-work/ [Accessed 01 May
2020].
91
Sandesh Parajuli
CS6P05 FYP Final Report
Statista, I. (2020) Number of Smart Homes forecast worldwide from 2016 to 2022. Smart Homes forecast
worldwide from 2017 to 2024. New York, 55 Broad Street : www.statista.com Statista, Inc.
UNODC. (2015) Nepal : Burglary (rate per 100,000 population). Ranking of Satistics. Kathmandu: -
Actualitix – All right reserved United Nations Office on Drugs and Crime (UNODC).
92
Sandesh Parajuli
CS6P05 FYP Final Report
7. Appendix
7.1Appendix A: History
All through human history, door locks have been regarded as the basis of a security
system and been used with an essential function of limiting or restricting access to certain
spaces from undesirable users. Along with history, these lock systems have gone through
many enhancement and variations over centuries and have formed the establishment of
modern security systems nowadays.
The origin of door lock can be traced from ancient time back in 4000 B.C when the
archaeologist around the world found a symbol of lock system in Egypt and Greece.
These lock systems were similar as today as it is based on the same principle of pin lock
system varying length and needs a key to unlock the door by matching and lining up the
pins to get access. By the medieval age and the industrial revolution, the door lock system
has gone through many variations in order to strengthen the security of the locking
system.(Wiredsmart, 2019)
93
Sandesh Parajuli
CS6P05 FYP Final Report
Today is the digital age, many progressions on digital and computer innovation have
brought numerous changes and improvements in the door locking system. The rising
needs of security and privacy in present society have brought a massive change and
formed a new door lock technology which coordinates the concept of traditional lock
system with computerized and smart technologies.
Although many changes and advancements are made on door lock throughout history
however their ultimate principle of keeping out the unwanted user has always been the
same. While the use of door lock in history might have been simple but their applications
in this modern world is limitless. (Estes, 2019)
94
Sandesh Parajuli
CS6P05 FYP Final Report
95
Sandesh Parajuli
CS6P05 FYP Final Report
96
Sandesh Parajuli
CS6P05 FYP Final Report
97
Sandesh Parajuli
CS6P05 FYP Final Report
98
Sandesh Parajuli
CS6P05 FYP Final Report
99
Sandesh Parajuli
CS6P05 FYP Final Report
100
Sandesh Parajuli
CS6P05 FYP Final Report
101
Sandesh Parajuli
CS6P05 FYP Final Report
102
Sandesh Parajuli
CS6P05 FYP Final Report
Maybe 7
No 4
Yes 23
Grand Total 34
103
Sandesh Parajuli
CS6P05 FYP Final Report
Do you think additional security is required for the Door lock these days? COUNT
Maybe 2
No 2
Yes 30
Grand Total 34
104
Sandesh Parajuli
CS6P05 FYP Final Report
Would you like to use a secure and cheap technology for your home security? COUNT
Maybe 5
No 2
Yes 27
Grand Total 34
105
Sandesh Parajuli
CS6P05 FYP Final Report
How much you are familiar with the Smart Door Locking System? COUNT
Less 18
More 11
Unknown 5
Grand Total 34
106
Sandesh Parajuli
CS6P05 FYP Final Report
Would you like using your smartphone to unlock your door? Count
Maybe 6
No 2
Yes 26
Grand Total 34
107
Sandesh Parajuli
CS6P05 FYP Final Report
Would you like to use RFID tag to unlock your door? Count
Maybe 9
No 4
Yes 21
Grand Total 34
108
Sandesh Parajuli
CS6P05 FYP Final Report
Do you think user should get notified when someone tries to unlock the door? Count
Maybe 1
No 2
Yes 31
Grand Total 34
109
Sandesh Parajuli
CS6P05 FYP Final Report
Would you feel safe using smart technology for household security? Count
Maybe 9
No 2
Yes 23
Grand Total 34
110
Sandesh Parajuli
CS6P05 FYP Final Report
Maybe 3
No 2
Yes 29
Grand Total 34
111
Sandesh Parajuli
CS6P05 FYP Final Report
Feedback
112
Sandesh Parajuli
CS6P05 FYP Final Report
113
Sandesh Parajuli
CS6P05 FYP Final Report
114
Sandesh Parajuli
CS6P05 FYP Final Report
115
Sandesh Parajuli
CS6P05 FYP Final Report
116
Sandesh Parajuli
CS6P05 FYP Final Report
117
Sandesh Parajuli
CS6P05 FYP Final Report
118
Sandesh Parajuli
CS6P05 FYP Final Report
Bad 0
Good 10
Great 26
Grand Total 36
119
Sandesh Parajuli
CS6P05 FYP Final Report
Maybe 3
No 5
Yes 28
Grand Total 36
120
Sandesh Parajuli
CS6P05 FYP Final Report
Do you think RFID card access is good for the Security in door lock system? Count
Maybe 5
No 5
Yes 26
Grand Total 36
121
Sandesh Parajuli
CS6P05 FYP Final Report
Do you like the approach of using your smartphone as a medium to unlock the door? Count
Maybe 2
No 6
Yes 28
Grand Total 36
122
Sandesh Parajuli
CS6P05 FYP Final Report
Bad 0
Good 34
Great 2
Grand Total 36
123
Sandesh Parajuli
CS6P05 FYP Final Report
D0 you like to use this Smart Door Lock device in your house? Count
Maybe 0
No 0
Yes 36
Grand Total 36
124
Sandesh Parajuli
CS6P05 FYP Final Report
Will you encourage others to use this Smart Door Lock? Count
Maybe 3
No 4
Yes 29
Grand Total 36
125
Sandesh Parajuli
CS6P05 FYP Final Report
Feedback
126
Sandesh Parajuli
CS6P05 FYP Final Report
127
Sandesh Parajuli
CS6P05 FYP Final Report
128
Sandesh Parajuli
CS6P05 FYP Final Report
129
Sandesh Parajuli
CS6P05 FYP Final Report
130
Sandesh Parajuli
CS6P05 FYP Final Report
131
Sandesh Parajuli
CS6P05 FYP Final Report
132
Sandesh Parajuli
CS6P05 FYP Final Report
133
Sandesh Parajuli
CS6P05 FYP Final Report
Figure 61 Hardware Component Circuit Diagram of Bluetooth Authentication RFID Door Lock
134
Sandesh Parajuli
CS6P05 FYP Final Report
135
Sandesh Parajuli
CS6P05 FYP Final Report
136
Sandesh Parajuli
CS6P05 FYP Final Report
Figure 64 ER-Diagram
137
Sandesh Parajuli
CS6P05 FYP Final Report
Figure 65 Class-Diagram
138
Sandesh Parajuli
CS6P05 FYP Final Report
7.5.9 Wireframes
7.5.9.1 Login Portal
139
Sandesh Parajuli
CS6P05 FYP Final Report
140
Sandesh Parajuli
CS6P05 FYP Final Report
141
Sandesh Parajuli
CS6P05 FYP Final Report
7.6.1 Hardware components of this RFID and Bluetooth Based Smart Door Lock
142
Sandesh Parajuli
CS6P05 FYP Final Report
143
Sandesh Parajuli
CS6P05 FYP Final Report
Figure72:Login-Portal
144
Sandesh Parajuli
CS6P05 FYP Final Report
Figure73:Signup-Portal
145
Sandesh Parajuli
CS6P05 FYP Final Report
Figure74:Main-Screen
146
Sandesh Parajuli
CS6P05 FYP Final Report
147
Sandesh Parajuli
CS6P05 FYP Final Report
148
Sandesh Parajuli
CS6P05 FYP Final Report
149
Sandesh Parajuli
CS6P05 FYP Final Report
150
Sandesh Parajuli
CS6P05 FYP Final Report
151
Sandesh Parajuli
CS6P05 FYP Final Report
152
Sandesh Parajuli
CS6P05 FYP Final Report
153
Sandesh Parajuli