SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4890
Android based Secure and Smart Home Application using IoT
Sandnya Patil1, Muhammad Tabish Quadri2, Riya John3, Sanket Said4, Ranjita Gaonkar5
1,2,3,4Student, Dept .of Computer Engineering, Pillai College of Engineering, Maharashtra, India
5Professor, Dept. of Computer Engineering, Pillai College of Engineering, Maharashtra, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Recent advances in smart technology design
with integration of smart sensors and embedded
components have enhanced human life quickly in so many
fields such as home automation, smart phones, smart cars,
etc. Enhanced home security has become the need of the
hour with the introduction of luxury residences and multi
facility realty projects. Considering the increasing demand
for home security and automation, an Android-based
control system is proposed which can maintain residential
security and provides an application which remotely
controls all the functions and features of home appliances
using Internet of Things (IOT). The details of the users and
devices are stored in a database on the server. The central
device connects to the internet and the application presents
the user with a list of devices to interact with. The server
manages the users and devices, and handles the
communication between the application and the central
device. . The system proposed will be economical and can be
expanded as it allows connection and control of a number of
different devices.
Key Words: Home Security System, Home Automation,
IoT, Smart App
1. INTRODUCTION
Technology has become an important aspect of human life.
It has a great influence in many facets of our day to day life
and has also helped improved our environment. The
introduction of technology in communication with the
invention of mobile phones and the internet has caused
many people to rely on it to improve their way of working
and also provide easy way to use various applications to
enhance their standard of living. This establishment of
technology in one's life has enhanced not only the way
people communicate or trade goods but also in a variety of
fields such as medicine, agriculture, home security, etc.
With the rise of luxury residential projects and an increase
in the number of smart home products in the market,
home security and home automation have become very
popular.
A secure home system consists of a door lock system
which has been one of the most popular consumer devices
replacing many of the conventional locks because of sheer
user convenience and affordable prices. Many wireless
network solutions such as bluetooth, ultra wide band
(UWB), wireless Ethernet and many more belong to the
area of home networking [1]. From among these,
bluetooth has become the most attractive technique in the
research and commercial domain as bluetooth enables to
develop various kind of wireless system via handsets or
smartphones and also conduct research by using handset
and actuator by remote operation of various electrical
devices at home. Since bluetooth is so prevalent in mobile
devices, it was seen as a simple, economical and secure
solution for wireless network for connecting a mobile
device to home network system.
Home automation system is a emerging field of
computerized and intelligent network of electronic
devices which are designed to monitor and control home
appliances. Wired home networks were given importance
in the earlier stages of home automation but as technology
is emerging, people have started adopting technology to a
greater aspects. Wireless system provides more flexibility
and extensibility, its installation is free from construction
works as it requires no cabling cost.
This paper proposes a novel system for access monitoring
and control on digital door lock that uses bluetooth and
server based technology. By adopting the system, users
can be provided with a safe and convenient life. The
objective is to develop a system with a wireless module
and a digital door. Implementation of the prototype
system would be good solution for access monitoring and
control system.
2. LITERATURE SURVEY
A. App controlled smart locking system[1]
The proposed IoT based system facilitate the user hazard
free, simple, robust and secure solution for home security
and eradicate manual effort towards door lock – unlock
issues. The owner can lock or unlock the door remotely
through the secure app installed in a smart phone.
The app has additional feature to take exterior image or
video for monitoring the activity going on outside the
door. The system has the capability of sending a
notification if the door - lock goes offline. Raspberry pi
camera worked as main door camera and the locking
function was programmed in such a way that whenever it
receives lock string it rotate the stepper motor clockwise
and when it receives unlock string it rotates the stepper
motor anticlockwise.
B. A Smart Door Security-Based Home
Automation System[2]
The smart home automation door security was
implemented by integrating the smart embedded sensor
system with android mobile application using eclipse IDE.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4891
The embedded software coding was implemented in
Arduino IDE using C language. When the system is power
ON, it will initialize all the modules connected to it which
includes servo motor, keypad, LCD display, buzzer,
Bluetooth module, and GSM module. This will control the
door opening (access granted) and send message to the
home user for the security notification but if the password
is invalid, it will deny the user access to the entrance of the
building (denied access) and send messages for wrong
password user trial.
C. Android based Security and Home Automation
System[3]
The proposed Android application can be interfaced with
3 different systems home security, home automation, car
security the system uses Bluetooth as the means of
communication between the lock and the mobile
application the security measures include the use of a
username password system in the application and a
keypad to turn on Bluetooth of the lock an alarm rings on
multiple wrong attempts and SMS is sent to the user. The
mobile application is also used to control the lights and
fans of the house as well as the lock of the car.
D. Smart Door Lock System: Improving Home
Security using Bluetooth Technology[4]
Using eye movement for controlling the computer, Ramsha
Fatima [5] improves the experience of working with the
computer as it is faster and gives the illusion that the
computer is complying with the users' thought. It can be
used either exclusively or in combination with other input
technologies such as eye movement can be used along with
a button so that it confirms the users' intentions for
performing critical tasks and reduce the chances of error. It
does not require any training and can thus be used by a
layman. It can act as a boon for a person with motor
disability as it does not require any motion but simple eye
movements. It can give them a greater controlled over their
surrounding and help them in interacting with the world.
3. PROPOSED WORK
The proposed system is keyless that is we will not be
having an extra key such as the RFID tags. There are
different mechanisms of security such as fingerprint scan,
facial recognition, pin, password. The application will
learn from the user behavior and increase security
accordingly .The details of the user accessing the lock will
be stored in the server along with date and time which can
be further used to predict the times when the user will
enter the house and handle security accordingly .On
locking the door, the lights that are on will automatically
turn off .On unlocking the door the lights turn on
accordingly. User can set vacation days and the system will
be on maximum security till the user comes back. User can
also set temporary keys (will be active for a set time) for
domestic help or for guests.
3.1 Existing System Architecture
Fig. 1- Existing system architecture
The existing system uses simple devices and is not much
secure and versatile and does not have the feature of video
monitoring or home automation. The existing system uses
simple architecture to provide a smart locking system.
3.2 Proposed System Architecture
The system architecture is given in Figure 1. Each block is
described in this Section.
Fig. 2- Proposed system architecture
A. Control Module
 Android application: The application provides and
interface between the user and the lock and it is used to
control the lock and the other components of the system.
 Server, DB: The server is used to store the user activities
and all the users that are allowed to access the lock and
store the authorized users credentials such as login id or
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4892
password.
 Raspberry pi: Raspberry pi is the central controlling unit
and is used to communicate with and control all the
components used in the system.
B. Door/Window Module
 Camera: The camera is used to capture anyone accessing
the lock and in case of an unidentified user the user is
alerted about the same, the camera turns on only when
there is someone near the door or the windows.
 Motor: The motor is the device that controls the latch.
 Fingerprint sensor: Fingerprint sensor is used to
authenticate the user and provide a faster, secure and
more efficient way to unlock the door.
 Motion sensor: The motion sensors monitor the activity
in front of the door and near the windows the places that
can be used to gain entrance in the house in case of
movement near these places the camera is activated to
record the person entering the house.
C. House Module
 Relay: The relay module is a separate hardware device
used for remote device switching. With it you can
remotely control devices over a network or the Internet.
Devices can be remotely powered on or off with
commands.
 Smoke/gas sensor: This sensor is used to check if there is
a fire or a gas leakage in the house and alert the user and
trigger the alarm if there is any.
 Light sensor: Light sensors check if the room needs
artificial lighting when the user enters the house if the
room is dark and the user enters the house the lights turn
on automatically.
D. Alert Module
 Alarm: The alarm is used to alert the surrounding in case
of an emergency such as fire, gas leakage or forced entry in
the house.
 GSM module: The gsm module is a device that will be
able to send sms to the user it helps in alerting the user
even without an internet connection
3.3 Activity Diagram
Fig. 3- Activity Diagram
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4893
4. REQUIREMENT ANALYSIS
All the modules present in the system communicate with
one another so as to provide smooth functioning of the
system. The doors and the windows have motion sensors
that can sense movement in front of them in case someone
approaches the doors or the windows the user is alerted
and if someone breaks in and the motion sensors detect
movement inside the house even though the lock was not
accessed the alarm is sounded.
The user can unlock the door using the fingerprint sensor
or if the user wants the door will unlock itself when the
user comes near the door with the authorized device or
can use the face unlock there are multiple methods of
unlocking the door such as using a pin or a password that
can be entered in the phone, can be setup by the
authorized user and could keep more than one way to
authenticate a person entering the house. The owner can
also create temporary keys for the guest and add their
fingerprints too this key is temporary as the owner can set
the time till which the guest will be an authorized user.
The light sensors check the light intensity in the room and
if it is dark the raspberry pi will turn on the lights using
the relay board.
The mobile application tracks the user behaviour and in
case of a different behaviour then the user usually exhibits
the lock increases the security measures and also alerts
the other authorized users. In case of a gas leakage or fire
the alarm is sounded so as to alert the surroundings the
gsm module alerts the user via an SMS in case the user
fails to receive any app notification due to lack of internet
connection .
4.1 Software
The software in the proposed system consists of a real
time database which is firebase the lock is controlled by an
android application thus the android operating system is
required by the user the development of the application
requires JAVA, Python, XML and the operating system used
in the Raspberry pi is Raspbian OS.
4.2 Hardware
The hardware requirement for the proposed system are as
follows: Servo motor to operate the lock , piCam to record
and stream the happenings around the house, a
fingerprint sensor that will help in user authentication a
relay board to control the lights and fans ,Raspberry pi
light sensor to detect the level of darkness an MQ2 smoke
sensor for the purpose of detecting fire, Raspberry pi 3
acts as the control controlling unit and a GSM module to
alert the user in case the user is not connected to the
internet.
5. CONCLUSION
Home automation, being one of the most integral parts of
the budding realty industry paves forth the need to
establish a simple yet efficient system that through
training, anticipates the user’s actions and executes it for
them. This paper presents a flexible and user friendly
method to implement the same by integrating relays to
Raspberry pi for controlling home appliances from a
remote location in a real scenario. As an extension,
authors propose a generic loT framework and use cloud
computing infrastructure for connecting and managing
remote devices and also store sensor data. The proposed
system can be used in multiple scenarios like parking lots,
cars, etc, apart from one’s home.
ACKNOWLEDGEMENT
It is our privilege to express our sincerest regards to our
supervisor Prof. Ranjita Gaonkar for the valuable inputs, able
guidance, encouragement, whole-hearted cooperation and
constructive criticism throughout the duration of this work.
We deeply express our sincere thanks our Head of the
Department Dr. Sharvari Govilkar and our Principal Dr.
Sandeep M. Joshi for encouraging and allowing us to
presenting this work.
REFERENCES
[1] Suvam Basak, Sreeja Chowdhury, Aritra
Chakraborty,Sudipta Sahana, “App controlled smart
locking system for advanced home security”,
International Journal of Engineering Science
Invention, vol. 7, Mar. 2018, pp. 1-12
[2] Ajao LA, Kolo JG, Olaniyi OM, Inalegwu OC, Abolade
SK,“A Smart Door Security-Based Home Automation
System: An Internet of Things”, SciFed Journal of
Telecommunication, vol. 2, 2018, pp. 1-9
[3] Sadeque Reza Khan, Farzana Sultana Dristy, March
“Android based Security and Home Automation
System”, International Journal of Ambient Systems
and Applications, vol. 3, Mar. 2015, pp. 16-22,
doi:10.5121/ijasa.2014.3102
[4] Jayant Dabhade Amirush Javare, Tushar Ghayal, Ankur
Shelar, Ankita Gupta, “Smart Door Lock System:
Improving Home Security using Bluetooth
Technology”, International Journal of Computer
Applications, vol. 160, Feb. 2017, pp. 19-21
[5] Shopan Dey, Ayon Roy, Sandip Das, “Home Automation
Using Internet of Things”, IEEE, 2016, pp. 1-6
[6] Mile Mrinal and Lakade Priyanka, Mashayak Saniya ,
Katkar Poonam and A.B. Gavali, “Smart Home –
Automation and Security System Based on Sensing
Mechanism”, IEEE, 2017, pp. 1-3
[7] Rahul Satoskar and Akarsh Mishra, “Smart Door Lock
and Lighting System using Internet of Things”,
International Journal of Computer Science and
Information Technologies, vol. 9, 2018, pp. 1-4

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

IRJET- Implementation of Smart Surveillance System Based on Bio-Metrics
IRJET-  	  Implementation of Smart Surveillance System Based on Bio-MetricsIRJET-  	  Implementation of Smart Surveillance System Based on Bio-Metrics
IRJET- Implementation of Smart Surveillance System Based on Bio-Metrics
 
IRJET - Safety and Security Aspects of Smart Home Applications using Face...
IRJET -  	  Safety and Security Aspects of Smart Home Applications using Face...IRJET -  	  Safety and Security Aspects of Smart Home Applications using Face...
IRJET - Safety and Security Aspects of Smart Home Applications using Face...
 
IRJET- Theft Control using IoT
IRJET-  	  Theft Control using IoTIRJET-  	  Theft Control using IoT
IRJET- Theft Control using IoT
 
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET-  	  Internet of Things (IoT), and the Security Issues Surrounding it: ...IRJET-  	  Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security System
 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
 
IRJET - Smart Doorbell System
 IRJET - Smart Doorbell System IRJET - Smart Doorbell System
IRJET - Smart Doorbell System
 
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- 	  Design and Development Modish Smart Key Box using RFID based on Ard...IRJET- 	  Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
 
Energy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoTEnergy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoT
 
IRJET- Smart Door Security System using Raspberry Pi with Telegram
IRJET- Smart Door Security System using Raspberry Pi with TelegramIRJET- Smart Door Security System using Raspberry Pi with Telegram
IRJET- Smart Door Security System using Raspberry Pi with Telegram
 
Home Security System and Door Access Control Based on Face Recognition
Home Security System and Door Access Control Based on Face RecognitionHome Security System and Door Access Control Based on Face Recognition
Home Security System and Door Access Control Based on Face Recognition
 
IRJET - Home Security System using Arduino
IRJET -  	  Home Security System using ArduinoIRJET -  	  Home Security System using Arduino
IRJET - Home Security System using Arduino
 
Design and implementation a security system for bank using voice recognition
Design and implementation a security system for bank using voice recognitionDesign and implementation a security system for bank using voice recognition
Design and implementation a security system for bank using voice recognition
 
IRJET- Design and Implementation of Integrated Smart Home System (ISHS)
IRJET- Design and Implementation of Integrated Smart Home System (ISHS)IRJET- Design and Implementation of Integrated Smart Home System (ISHS)
IRJET- Design and Implementation of Integrated Smart Home System (ISHS)
 
General Overview of IOT Empower Technology
General Overview of IOT Empower TechnologyGeneral Overview of IOT Empower Technology
General Overview of IOT Empower Technology
 
IRJET- Enhance Smart Cities Security by Mitigating IoT Vulnerabilities
IRJET-  	  Enhance Smart Cities Security by Mitigating IoT VulnerabilitiesIRJET-  	  Enhance Smart Cities Security by Mitigating IoT Vulnerabilities
IRJET- Enhance Smart Cities Security by Mitigating IoT Vulnerabilities
 
Improved authentication using arduino based voice
Improved authentication using arduino based voiceImproved authentication using arduino based voice
Improved authentication using arduino based voice
 
IRJET- GSM based Home Automation
IRJET-  	  GSM based Home AutomationIRJET-  	  GSM based Home Automation
IRJET- GSM based Home Automation
 
IRJET- A Survey on Secure Protocols of Communication for IoT Components i...
IRJET-  	  A Survey on Secure Protocols of Communication for IoT Components i...IRJET-  	  A Survey on Secure Protocols of Communication for IoT Components i...
IRJET- A Survey on Secure Protocols of Communication for IoT Components i...
 
IRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking System
 

Ähnlich wie IRJET - Android based Secure and Smart Home Application using IoT

Ähnlich wie IRJET - Android based Secure and Smart Home Application using IoT (20)

IRJET - Smart Classroom Automation based on IoT
IRJET -  	  Smart Classroom Automation based on IoTIRJET -  	  Smart Classroom Automation based on IoT
IRJET - Smart Classroom Automation based on IoT
 
IRJET- Smart Home Automation using IoT with Security Features
IRJET- Smart Home Automation using IoT with Security FeaturesIRJET- Smart Home Automation using IoT with Security Features
IRJET- Smart Home Automation using IoT with Security Features
 
IRJET- IoT based Home Automation and Smart Security System
IRJET- IoT based Home Automation and Smart Security SystemIRJET- IoT based Home Automation and Smart Security System
IRJET- IoT based Home Automation and Smart Security System
 
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: Review
 
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
 
Home security based on Internet of things Review paper
Home security based on Internet of things Review paperHome security based on Internet of things Review paper
Home security based on Internet of things Review paper
 
IRJET- A Review on: Smart and Advanced Living Technology (SALT)
IRJET- A Review on: Smart and Advanced Living Technology (SALT)IRJET- A Review on: Smart and Advanced Living Technology (SALT)
IRJET- A Review on: Smart and Advanced Living Technology (SALT)
 
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
 
IRJET - IoT based Advanced Home Automation
IRJET -  	  IoT based Advanced Home AutomationIRJET -  	  IoT based Advanced Home Automation
IRJET - IoT based Advanced Home Automation
 
A Short Review on the Perspective of Home Automation Technology
A Short Review on the Perspective of Home Automation TechnologyA Short Review on the Perspective of Home Automation Technology
A Short Review on the Perspective of Home Automation Technology
 
IRJET-A Nodemcu based Home Automation System
IRJET-A Nodemcu based Home Automation SystemIRJET-A Nodemcu based Home Automation System
IRJET-A Nodemcu based Home Automation System
 
IRJET- An Intelligent Remote Controlled System for Smart Home Automation
IRJET- An Intelligent Remote Controlled System for Smart Home AutomationIRJET- An Intelligent Remote Controlled System for Smart Home Automation
IRJET- An Intelligent Remote Controlled System for Smart Home Automation
 
Design and Development of IntelliHome
Design and Development of IntelliHomeDesign and Development of IntelliHome
Design and Development of IntelliHome
 
IRJET- Home Automation System for Disable People using Bluetooth Technology a...
IRJET- Home Automation System for Disable People using Bluetooth Technology a...IRJET- Home Automation System for Disable People using Bluetooth Technology a...
IRJET- Home Automation System for Disable People using Bluetooth Technology a...
 
Home Automation Control System
Home Automation Control SystemHome Automation Control System
Home Automation Control System
 
IRJET- Voice Controlled Home Automation System
IRJET- Voice Controlled Home Automation SystemIRJET- Voice Controlled Home Automation System
IRJET- Voice Controlled Home Automation System
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
 
IRJET - Smart Home with Power Consumed Statistics using Android Application
IRJET - Smart Home with Power Consumed Statistics using Android ApplicationIRJET - Smart Home with Power Consumed Statistics using Android Application
IRJET - Smart Home with Power Consumed Statistics using Android Application
 
A Review of Cyber Security Challenges, Attacks and Solutions for Internet Bas...
A Review of Cyber Security Challenges, Attacks and Solutions for Internet Bas...A Review of Cyber Security Challenges, Attacks and Solutions for Internet Bas...
A Review of Cyber Security Challenges, Attacks and Solutions for Internet Bas...
 
Home Automation using IOT and Mobile App
Home Automation using IOT and Mobile AppHome Automation using IOT and Mobile App
Home Automation using IOT and Mobile App
 

Mehr von IRJET Journal

Mehr von IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Kürzlich hochgeladen

VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 

Kürzlich hochgeladen (20)

Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf
 

IRJET - Android based Secure and Smart Home Application using IoT

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4890 Android based Secure and Smart Home Application using IoT Sandnya Patil1, Muhammad Tabish Quadri2, Riya John3, Sanket Said4, Ranjita Gaonkar5 1,2,3,4Student, Dept .of Computer Engineering, Pillai College of Engineering, Maharashtra, India 5Professor, Dept. of Computer Engineering, Pillai College of Engineering, Maharashtra, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Recent advances in smart technology design with integration of smart sensors and embedded components have enhanced human life quickly in so many fields such as home automation, smart phones, smart cars, etc. Enhanced home security has become the need of the hour with the introduction of luxury residences and multi facility realty projects. Considering the increasing demand for home security and automation, an Android-based control system is proposed which can maintain residential security and provides an application which remotely controls all the functions and features of home appliances using Internet of Things (IOT). The details of the users and devices are stored in a database on the server. The central device connects to the internet and the application presents the user with a list of devices to interact with. The server manages the users and devices, and handles the communication between the application and the central device. . The system proposed will be economical and can be expanded as it allows connection and control of a number of different devices. Key Words: Home Security System, Home Automation, IoT, Smart App 1. INTRODUCTION Technology has become an important aspect of human life. It has a great influence in many facets of our day to day life and has also helped improved our environment. The introduction of technology in communication with the invention of mobile phones and the internet has caused many people to rely on it to improve their way of working and also provide easy way to use various applications to enhance their standard of living. This establishment of technology in one's life has enhanced not only the way people communicate or trade goods but also in a variety of fields such as medicine, agriculture, home security, etc. With the rise of luxury residential projects and an increase in the number of smart home products in the market, home security and home automation have become very popular. A secure home system consists of a door lock system which has been one of the most popular consumer devices replacing many of the conventional locks because of sheer user convenience and affordable prices. Many wireless network solutions such as bluetooth, ultra wide band (UWB), wireless Ethernet and many more belong to the area of home networking [1]. From among these, bluetooth has become the most attractive technique in the research and commercial domain as bluetooth enables to develop various kind of wireless system via handsets or smartphones and also conduct research by using handset and actuator by remote operation of various electrical devices at home. Since bluetooth is so prevalent in mobile devices, it was seen as a simple, economical and secure solution for wireless network for connecting a mobile device to home network system. Home automation system is a emerging field of computerized and intelligent network of electronic devices which are designed to monitor and control home appliances. Wired home networks were given importance in the earlier stages of home automation but as technology is emerging, people have started adopting technology to a greater aspects. Wireless system provides more flexibility and extensibility, its installation is free from construction works as it requires no cabling cost. This paper proposes a novel system for access monitoring and control on digital door lock that uses bluetooth and server based technology. By adopting the system, users can be provided with a safe and convenient life. The objective is to develop a system with a wireless module and a digital door. Implementation of the prototype system would be good solution for access monitoring and control system. 2. LITERATURE SURVEY A. App controlled smart locking system[1] The proposed IoT based system facilitate the user hazard free, simple, robust and secure solution for home security and eradicate manual effort towards door lock – unlock issues. The owner can lock or unlock the door remotely through the secure app installed in a smart phone. The app has additional feature to take exterior image or video for monitoring the activity going on outside the door. The system has the capability of sending a notification if the door - lock goes offline. Raspberry pi camera worked as main door camera and the locking function was programmed in such a way that whenever it receives lock string it rotate the stepper motor clockwise and when it receives unlock string it rotates the stepper motor anticlockwise. B. A Smart Door Security-Based Home Automation System[2] The smart home automation door security was implemented by integrating the smart embedded sensor system with android mobile application using eclipse IDE.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4891 The embedded software coding was implemented in Arduino IDE using C language. When the system is power ON, it will initialize all the modules connected to it which includes servo motor, keypad, LCD display, buzzer, Bluetooth module, and GSM module. This will control the door opening (access granted) and send message to the home user for the security notification but if the password is invalid, it will deny the user access to the entrance of the building (denied access) and send messages for wrong password user trial. C. Android based Security and Home Automation System[3] The proposed Android application can be interfaced with 3 different systems home security, home automation, car security the system uses Bluetooth as the means of communication between the lock and the mobile application the security measures include the use of a username password system in the application and a keypad to turn on Bluetooth of the lock an alarm rings on multiple wrong attempts and SMS is sent to the user. The mobile application is also used to control the lights and fans of the house as well as the lock of the car. D. Smart Door Lock System: Improving Home Security using Bluetooth Technology[4] Using eye movement for controlling the computer, Ramsha Fatima [5] improves the experience of working with the computer as it is faster and gives the illusion that the computer is complying with the users' thought. It can be used either exclusively or in combination with other input technologies such as eye movement can be used along with a button so that it confirms the users' intentions for performing critical tasks and reduce the chances of error. It does not require any training and can thus be used by a layman. It can act as a boon for a person with motor disability as it does not require any motion but simple eye movements. It can give them a greater controlled over their surrounding and help them in interacting with the world. 3. PROPOSED WORK The proposed system is keyless that is we will not be having an extra key such as the RFID tags. There are different mechanisms of security such as fingerprint scan, facial recognition, pin, password. The application will learn from the user behavior and increase security accordingly .The details of the user accessing the lock will be stored in the server along with date and time which can be further used to predict the times when the user will enter the house and handle security accordingly .On locking the door, the lights that are on will automatically turn off .On unlocking the door the lights turn on accordingly. User can set vacation days and the system will be on maximum security till the user comes back. User can also set temporary keys (will be active for a set time) for domestic help or for guests. 3.1 Existing System Architecture Fig. 1- Existing system architecture The existing system uses simple devices and is not much secure and versatile and does not have the feature of video monitoring or home automation. The existing system uses simple architecture to provide a smart locking system. 3.2 Proposed System Architecture The system architecture is given in Figure 1. Each block is described in this Section. Fig. 2- Proposed system architecture A. Control Module  Android application: The application provides and interface between the user and the lock and it is used to control the lock and the other components of the system.  Server, DB: The server is used to store the user activities and all the users that are allowed to access the lock and store the authorized users credentials such as login id or
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4892 password.  Raspberry pi: Raspberry pi is the central controlling unit and is used to communicate with and control all the components used in the system. B. Door/Window Module  Camera: The camera is used to capture anyone accessing the lock and in case of an unidentified user the user is alerted about the same, the camera turns on only when there is someone near the door or the windows.  Motor: The motor is the device that controls the latch.  Fingerprint sensor: Fingerprint sensor is used to authenticate the user and provide a faster, secure and more efficient way to unlock the door.  Motion sensor: The motion sensors monitor the activity in front of the door and near the windows the places that can be used to gain entrance in the house in case of movement near these places the camera is activated to record the person entering the house. C. House Module  Relay: The relay module is a separate hardware device used for remote device switching. With it you can remotely control devices over a network or the Internet. Devices can be remotely powered on or off with commands.  Smoke/gas sensor: This sensor is used to check if there is a fire or a gas leakage in the house and alert the user and trigger the alarm if there is any.  Light sensor: Light sensors check if the room needs artificial lighting when the user enters the house if the room is dark and the user enters the house the lights turn on automatically. D. Alert Module  Alarm: The alarm is used to alert the surrounding in case of an emergency such as fire, gas leakage or forced entry in the house.  GSM module: The gsm module is a device that will be able to send sms to the user it helps in alerting the user even without an internet connection 3.3 Activity Diagram Fig. 3- Activity Diagram
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4893 4. REQUIREMENT ANALYSIS All the modules present in the system communicate with one another so as to provide smooth functioning of the system. The doors and the windows have motion sensors that can sense movement in front of them in case someone approaches the doors or the windows the user is alerted and if someone breaks in and the motion sensors detect movement inside the house even though the lock was not accessed the alarm is sounded. The user can unlock the door using the fingerprint sensor or if the user wants the door will unlock itself when the user comes near the door with the authorized device or can use the face unlock there are multiple methods of unlocking the door such as using a pin or a password that can be entered in the phone, can be setup by the authorized user and could keep more than one way to authenticate a person entering the house. The owner can also create temporary keys for the guest and add their fingerprints too this key is temporary as the owner can set the time till which the guest will be an authorized user. The light sensors check the light intensity in the room and if it is dark the raspberry pi will turn on the lights using the relay board. The mobile application tracks the user behaviour and in case of a different behaviour then the user usually exhibits the lock increases the security measures and also alerts the other authorized users. In case of a gas leakage or fire the alarm is sounded so as to alert the surroundings the gsm module alerts the user via an SMS in case the user fails to receive any app notification due to lack of internet connection . 4.1 Software The software in the proposed system consists of a real time database which is firebase the lock is controlled by an android application thus the android operating system is required by the user the development of the application requires JAVA, Python, XML and the operating system used in the Raspberry pi is Raspbian OS. 4.2 Hardware The hardware requirement for the proposed system are as follows: Servo motor to operate the lock , piCam to record and stream the happenings around the house, a fingerprint sensor that will help in user authentication a relay board to control the lights and fans ,Raspberry pi light sensor to detect the level of darkness an MQ2 smoke sensor for the purpose of detecting fire, Raspberry pi 3 acts as the control controlling unit and a GSM module to alert the user in case the user is not connected to the internet. 5. CONCLUSION Home automation, being one of the most integral parts of the budding realty industry paves forth the need to establish a simple yet efficient system that through training, anticipates the user’s actions and executes it for them. This paper presents a flexible and user friendly method to implement the same by integrating relays to Raspberry pi for controlling home appliances from a remote location in a real scenario. As an extension, authors propose a generic loT framework and use cloud computing infrastructure for connecting and managing remote devices and also store sensor data. The proposed system can be used in multiple scenarios like parking lots, cars, etc, apart from one’s home. ACKNOWLEDGEMENT It is our privilege to express our sincerest regards to our supervisor Prof. Ranjita Gaonkar for the valuable inputs, able guidance, encouragement, whole-hearted cooperation and constructive criticism throughout the duration of this work. We deeply express our sincere thanks our Head of the Department Dr. Sharvari Govilkar and our Principal Dr. Sandeep M. Joshi for encouraging and allowing us to presenting this work. REFERENCES [1] Suvam Basak, Sreeja Chowdhury, Aritra Chakraborty,Sudipta Sahana, “App controlled smart locking system for advanced home security”, International Journal of Engineering Science Invention, vol. 7, Mar. 2018, pp. 1-12 [2] Ajao LA, Kolo JG, Olaniyi OM, Inalegwu OC, Abolade SK,“A Smart Door Security-Based Home Automation System: An Internet of Things”, SciFed Journal of Telecommunication, vol. 2, 2018, pp. 1-9 [3] Sadeque Reza Khan, Farzana Sultana Dristy, March “Android based Security and Home Automation System”, International Journal of Ambient Systems and Applications, vol. 3, Mar. 2015, pp. 16-22, doi:10.5121/ijasa.2014.3102 [4] Jayant Dabhade Amirush Javare, Tushar Ghayal, Ankur Shelar, Ankita Gupta, “Smart Door Lock System: Improving Home Security using Bluetooth Technology”, International Journal of Computer Applications, vol. 160, Feb. 2017, pp. 19-21 [5] Shopan Dey, Ayon Roy, Sandip Das, “Home Automation Using Internet of Things”, IEEE, 2016, pp. 1-6 [6] Mile Mrinal and Lakade Priyanka, Mashayak Saniya , Katkar Poonam and A.B. Gavali, “Smart Home – Automation and Security System Based on Sensing Mechanism”, IEEE, 2017, pp. 1-3 [7] Rahul Satoskar and Akarsh Mishra, “Smart Door Lock and Lighting System using Internet of Things”, International Journal of Computer Science and Information Technologies, vol. 9, 2018, pp. 1-4