SlideShare a Scribd company logo
1 of 7
Download to read offline
Indonesian Journal of Electrical Engineering and Computer Science
Vol. 21, No. 1, January 2021, pp. 271~277
ISSN: 2502-4752, DOI: 10.11591/ijeecs.v21.i1.pp271-277  271
Journal homepage: http://ijeecs.iaescore.com
Towards secure smart cities: design and implementation of
smart home digital communication system
Nael A. Al-Shareefi1
, Sura Adil Abbas2
, Mohanad S. Alkhazraji3
, Ammar AbdRaba Sakran4
1,4
College of Biomedical Informatics, University of Information Technology and Communications (UOITC),
Baghdad, Iraq
2
College of Engineering, University of Information Technology and Communications (UOITC), Baghdad, Iraq
3
Electrical and Electronic Engineering Department, University of Technology (UOT), Iraq
Article Info ABSTRACT
Article history:
Received Mar 24, 2020
Revised Jun 27, 2020
Accepted Jul 14, 2020
Home and building security are major concern in our daily life and digital
smart door lock (DSDL) have become an essential part of these systems. In
this paper, a secure DSDL which can grant access to home with a fingerprint
is designed and implemented. An Arduino Nano microcontroller board,
finger print sensor and servo motor have been utilized for lock/unlock door
based on finger print. The DSDL is an automatic authenticate and validate
the user for secure access. The implemented system aims to develop a cost
effective DSDL based on low cost components compared to the systems
already on the domestic market. The ease of use and cost effectiveness makes
the DSDL a strong competitor to the digital security system on the domestic
market and outperforms it and suitable for security–based home automation
systems.
Keywords:
Atmega328 microcontroller
DSDL
Home automation system
Sensors
Smart cities This is an open access article under the CC BY-SA license.
Corresponding Author:
Nael A. Al-Shareefi
College of Biomedical Informatics
University of Information Technology and Communications (UOITC)
Baghdad, Iraq
Email: dr.nael.al_shareefi@uoitc.edu.iq
1. INTRODUCTION
Home automation system (HAS) is the fastest emerging technology that contains many smart home
appliances for the convenience of the homeowner. HAS includes home security, e.g. access control systems,
control appliances, climate and lighting [1, 2]. Embedded systems, smart sensors and wireless technology
with the recent developments in interactive applications have improved the quality of human life in various
areas including HAS, smart healthcare and smart cars [3]. Smart home appliances based built in sensors have
improved the home live through many home appliances that include refrigerators, sewing machines, washing
machines, television, etc. As a consequence, security of property and life requires serious attention,
particularly with the advent of the era of 5G and internet of things (IoT) [4-7].
Home security is essential. A major component of home security is the increasing number of
criminal activities worldwide. DSDLs put an obstacle to criminal acts. DSDLs will definitely be a favorite for
every homeowner. They provide identical level of safety as traditional door locks, with aset of alternatives to
the traditional key [8-10]. Previously, there was only one authentication method available for door locks the
mechanical key. However, the keys are usually misplaced, left at home or lost. DSDLs offer a variety of
authentication techniques to choose from suitable for user specific needs and offer total peace of
mind [11, 12].
 ISSN: 2502-4752
Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 1, January 2021 : 271 - 277
272
2. LITERATURE SURVEY
Many DSDL systems was developed recently and commonly used in commercials homes and
buildings [13-20]. Based on RFID (radio frequency identification) technology, low cost technology.
P. Tripathi proposed a technique to realize DSDL system [13]. The user is first registered in the security
system and his data is copied into the RFID tag. When the user comes to the entry/exit point and places the
RFID tag in the reader, the security system checks if a user is registered or not. If registered, the door will
open and close immediately after a fixed time period. Otherwise, user does not pass. B. Saraladevi has
designed and implemented a password based security lock system. If the entered password is correct, the
door will be opened by an actuator which is utilized to rotate the door lock handle [16]. In [14], Kamelia
et al. have purposed a secure HAS using Bluetooth technology. The purposed HAS is relies on Android
platform. Y. T. Park had purposed a digital door lock based HAS which exploits the full advantage of ZigBee
technology based wireless sensor networks [15]. We found through the survey, some of the pervious
implemented DSDL systems are expensive. Others do not provide multi level functionalities.
3. HARDWARE COMPONENTS
3.1. Actuator
Actuator or servo motor (DS04–NFC), is a cheap, high–torque and 3600 rotation motor which can
rotate continually with forward/reverse direction [21]. DS04–NFC is capable of lock/unlock the door in real–
time. In the implemented system, DS04–NFC is activated via fingerprint reader. Some of the main features of
the DS04–NFC motor we used are listed below [22]
a) Operating voltage: 4.8 – 6v.
b) Current:< 1000mA.
c) Dimensions: 39.5 x 40.8 x 20mm.
d) Operating temperature: 0 – 600C.
3.2. Grove - fingerprint sensor
One of the most common devices in use which acts as a data entry device is the fingerprint sensor.
Fingerprint sensor, is an optical sensor that will allow adding fingerprint identification and verification [23].
The sensor can record up to 200 fingerprints, and each recorded fingerprint appoints an ID from 0 to 199.
This sensor comes with four wires in different colors as depicted in Table 1 [24].
Table 1. Finger print sensor wires function description [24]
Pin number Color Function description
1 Red + 5V Power supply input
2 Yellow Tx wire for TTL sensor
3 White Rx wire for TTL sensor
4 black GND
3.3. Arduino nano board
Arduino Nano is a breadboard–friendly micro–controller which communicates with DS04–NFC
servo motor and triggers a door based on the command received from fingerprint sensor [25]. It contains
USB connection, crystal oscillator, eight analogs (I/O), twelve digitals (I/O), and a reset button. Its operating
voltage is 5v [26, 27].
4. DSDL SYSTEM IMPLEMENTATION
As shown in Figure 1, authorized users should be first registered with the system. Registration is
done through finger print sensor. Fingerprints will be saved on different IDs in the Arduino Nano
microcontroller. When a user comes to access the door, the system examines if it is registered user or
pretender. If the entered ID is matched the saved, the user is trusted, the lock is open, if not, the access is not
allowed.
Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752 
Towards secure smart cities: design and implementation of smart home digital... (Nael A. Al-Shareefi)
273
Figure 1. Block diagram of the DSDL system
4.1. Practical design of the DSDL system
Figure 2 depicts the circuit diagram and practical design of the DSDL system. The following steps
explain the circuit diagram of the fingerprint DSDL.
1) Connect Arduino Nano via a USB–Type B port.
2) Connect the yellow terminal of servo motor to the pin D9 of Arduino Nano board.
3) Connect red terminals of both fingerprint sensor and the servo motor with the 5v of Arduino Nano
board.
4) Connect black terminals of both fingerprint sensor and servo motor with the GND.
5) Connect the yellow terminal of fingerprint sensor into the pin D3 of Arduino Nano board.
6) Connect the green terminal of fingerprint sensor into the pin D2 of Arduino Nano board.
7) Connect one end of both the opening and closing buttons to the GND.
8) Connect the Open lock button from inside with pin D6 of Arduino Nano board.
9) Connect Lock Buttons from Inside and outside with pin D5 of Arduino Nano board.
10) Connect short terminals of the LEDs and positive terminals of the resistors1K–Ohm with the GND port.
11) Connect red LEDs with pin D12 and green LEDs with pin D11 of Arduino Nano board.
Figure 2. Circuit diagram of the DSDL
 ISSN: 2502-4752
Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 1, January 2021 : 271 - 277
274
4.2. Working of the DSDL system
4.2.1. Fingerprint registration
The following steps are undertaken to record a new fingerprint [28].
a) Arduino IDE, run → File → Examples → Sensor Library → Enroll Fingerprint.
b) Upload Arduino code, then initiate COM4 at 9600 baud–rate.
c) At the top left corner, you must enter the fingerprint ID to be stored. At the top right corner click
send.
d) On the Grove-fingerprint sensor, put your finger, then follow the procedures on COM4 screen,
as shown Figure 3, you will be prompted to put identical finger two times. If the fingerprint similar your
fingerprint recorded successfully.
Figure 3. Register a fingerprint
4.2.2. Fingerprint matching
Multiple fingerprints have been recorded with different identifiers (IDs). The following steps are
excuted to find similarity with the sensor fingerprint [29].
a) Arduino IDE, File → Examples → Sensor Library → Fingerprint.
b) Upload Arduino code.
c) Initiate the serial COM4 with 9600 baud–rate.
d) Place the finger to be recognized on the scan. COM4 screen, reveals that the ID matches the saved, as
depicated in Figure 4.
Figure 4. Fingerprint matching
Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752 
Towards secure smart cities: design and implementation of smart home digital... (Nael A. Al-Shareefi)
275
4.2.3. Working of the DSDL system (outside door)
Pressing the red push-button will lock the door from the outside. When the lock is activated, the red
light will turn on to indicate that the door is locked as shown in Figure 5(a). The DSDL opens from
the outside with only the mateched fingerprint ID, allows authorized persons to access the door,
then the green light will activate to indicate that the door is open as shown in Figure 5(b).
(a) (b)
Figure 5. (a) Outside door (locking), (b) Outside door (opening)
4.2.4. Working of the DSDL system (inside door)
Locking the door from the inside pressing is done by pressing the red button. When the lock is
activated the red light will be turned on to indicate that the door is locked as depicted in Figure 6(a). The door
opens from the inside by pressing the green button. When the lock is open, the red light will be turned on to
indicate that the door is opened as depicted in Figure 6(b).
(a) (b)
Figure 6. (a) Inside door (locking), (b) Inside door (opening)
 ISSN: 2502-4752
Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 1, January 2021 : 271 - 277
276
5. SMART DOOR LOCK SYSTEM PROGRAM DESIGN
C–language code used to configure hardware−based Arduino DSDL system is listed below:
6. CONCLUSION
In this paper, a secure and fully–automated DSDL is designed and implemented using Arduino
Nano. An Arduino Nano based on Atmega328 microcontroller has been utilized for lock/unlock the door of
home or building based on user’s finger print so that only authorized users will grant access. The DSDL
system is an automatic authentication and authorization system that can be installed at the bilidings or home
to grant access to authorized people. The main objective of designing and implementing this system is to
compare the cost with the existing DSDL systems. The cost of the whole implemented (prototype) system is
only about 75$ which is cheap compared with existing secure access systems which cost about 150$–300$.
Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752 
Towards secure smart cities: design and implementation of smart home digital... (Nael A. Al-Shareefi)
277
REFERENCES
[1] A. C. Jose and R. Malekian, “Smart home automation security: a literature review,” SmartCR, vol. 5, pp. 269-285,
2015.
[2] K. E. Skouby and P. Lynggaard, “Smart home and smart city solutions enabled by 5G, IoT, AAI and CoT
services,” 2014 International Conference on Contemporary Computing and Informatics (IC3I), Mysore,
pp. 874-878, 2014.
[3] N. A. B. Zainal, et al., “Gateway sink placement for sensor node grid distribution in LoRa smart city networks,”
Indonesian Journal of Electrical Engineering and Computer Science, vol. 14, pp. 834-842, 2019.
[4] N. Al-Shareefi, “Comparison of Three Different EOU Techniques gor Fifth−Generation MM−W Wireless
Networks,” Iraqi Journal for Computers and Informatics, vol. 45, pp. 9-14, 2019.
[5] C. P. Ooi, et al., “FPGA-based embedded architecture for IoT home automation application,” Indonesian Journal of
Electrical Engineering and Computer Science (IJEECS), vol. 14, no. 2, pp. 646-652, 2019.
[6] J. A. Aldhaibani, et al., “Effect of relay location on two-way DF and AF relay in LTE-A cellular networks,”
International Journal of Electronics and Communication Engineering & Technology (IJECET), vol. 3,
pp. 385-399, 2012.
[7] H. S. Obaid, et al., “Internet of Things and Wireless Sensor Networks for Environmental Noise Sensing: Issues and
Challenges,” Journal of Southwest Jiaotong University, vol. 54, no. 6, pp. 1-11, 2019.
[8] R. Beatty, et al., “Network security analysis for smart appliances,” Google Patents, 2019.
[9] A. Gharaibeh, et al., “Smart Cities: A Survey on Data Management, Security, and Enabling Technologies,” in IEEE
Communications Surveys & Tutorials, vol. 19, no. 4, pp. 2456-2501, 2017.
[10] L. Cui, et al., “Security and Privacy in Smart Cities: Challenges and Opportunities,” in IEEE Access, vol. 6,
pp. 46134-46145, 2018.
[11] P. Hong, et al., “Threat-Based Security Analysis for the Domestic Smart Home Appliance,” KIPS Transactions on
Computer and Communication Systems, vol. 6, pp. 143-158, 2017.
[12] P. McDaniel and S. McLaughlin, “Security and privacy challenges in the smart grid,” IEEE Security & Privacy,
vol. 7, pp. 75-77, 2009.
[13] G. K. Verma and P. Tripathi, “A digital security system with door lock system using RFID technology,”
International Journal of Computer Applications, vol. 5, pp. 6-8, 2010.
[14] L. Kamelia, et al., “Door–automation system using bluetooth–based android for mobile phone,” ARPN Journal of
Engineering and Applied Sciences, vol. 9, pp. 1759-1762, 2014.
[15] Y. T. Park, et al., “Smart digital door lock for the home automation,” in TENCON 2009-2009 IEEE Region 10
Conference, pp. 1-6, 2009.
[16] S. Sedhumadhavan and B. Saraladevi, “Optimized Locking and Unlocking a System Using Arduino,” International
Journal of Innovative Research in Computer and Communication Engineering, vol. 2, no. 11, pp. 6658-6663, 2014.
[17] D. M. Kumar, et al., “Android based smart door locking system with multi user and multi level functionalities,”
International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), vol. 5,
no. 2, pp. 115-118, 2016.
[18] Y. T. Park, et al., “Smart digital door lock for the home automation,” TENCON 2009 - 2009 IEEE Region 10
Conference, Singapore, pp. 1-6, 2009.
[19] N. Kumbhar and P. Mane-Deshmukh, “Smart door locking system using Wireless Communication Technology,”
International Journal for Research in Applied Science & Engineering Technology, vol. 5, pp. 507-512, 2017.
[20] J. I. Jeong, “A study on the IoT based smart door lock system,” in Information Science and Applications (ICISA),
pp. 1307-1318, 2016.
[21] https://www.robomart.com/ds04-nfc-servo-360-degree-continuous-rotation-servos-dc-gear-motor.
[22] A. T. Rashid, et al., “Design and Construction Objects Store System using Line Follower Robot,” International
Journal of Computer Applications, vol. 181, no. 15, pp. 27-35, 2018.
[23] https://www.seeedstudio.com/Grove-Fingerprint-Sensor.html.
[24] J. S. Bartunek, “Fingerprint Image Enhancement, Segmentation and Minutiae Detection,” Blekinge Tekniska
Högskola, 2016.
[25] A. LLC, “Arduino Nano Manual.”
[26] T. S. Gunawan, et al., “Design and implementation of portable outdoor air quality measurement systemn using
arduino,” International Journal of Electrical and Computer Engineering, vol. 8, no. 1, pp. 280-290, 2018.
[27] A. Budianto, et al., “PID control design for biofuel furnace using arduino,” TELKOMNIKA Telecommunication
Computing Electronics and Control, vol. 16, no. 6, pp. 3016-3023, 2018.
[28] A. K. Jain, et al., “Fingerprint matching,” Computer, vol. 43, pp. 36-44, 2010.
[29] https://randomnerdtutorials.com/fingerprint-sensor-module-with-arduino/.

More Related Content

Similar to Towards secure smart cities: design and implementation of smart home digital communication system

IRJET- Smart Vehicle Security System using Finger Print Sensor
IRJET- Smart Vehicle Security System using Finger Print SensorIRJET- Smart Vehicle Security System using Finger Print Sensor
IRJET- Smart Vehicle Security System using Finger Print SensorIRJET Journal
 
Design and implement a smart system to detect intruders and firing using IoT
Design and implement a smart system to detect intruders and firing using IoT Design and implement a smart system to detect intruders and firing using IoT
Design and implement a smart system to detect intruders and firing using IoT IJECEIAES
 
WIRELESS LOCKSYSTEM THROUGH OTP.docx
WIRELESS LOCKSYSTEM THROUGH OTP.docxWIRELESS LOCKSYSTEM THROUGH OTP.docx
WIRELESS LOCKSYSTEM THROUGH OTP.docxAnimeshBasak13
 
Decibel meter using IoT with notice board
Decibel meter using IoT with notice boardDecibel meter using IoT with notice board
Decibel meter using IoT with notice boardIRJET Journal
 
IRJET - Home Automation for Physically Challenged and Elder People
IRJET -  	  Home Automation for Physically Challenged and Elder PeopleIRJET -  	  Home Automation for Physically Challenged and Elder People
IRJET - Home Automation for Physically Challenged and Elder PeopleIRJET Journal
 
IRJET- Smart Home: Speech Recognition based Home Automation using IoT
IRJET-  	  Smart Home: Speech Recognition based Home Automation using IoTIRJET-  	  Smart Home: Speech Recognition based Home Automation using IoT
IRJET- Smart Home: Speech Recognition based Home Automation using IoTIRJET Journal
 
IRJET - Smart Door System
IRJET - Smart Door SystemIRJET - Smart Door System
IRJET - Smart Door SystemIRJET Journal
 
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET Journal
 
Intelligent Device TO Device Communication Using IoT
 Intelligent Device TO Device Communication Using IoT Intelligent Device TO Device Communication Using IoT
Intelligent Device TO Device Communication Using IoTIJCERT
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET Journal
 
ESP32 CAM Face Detection Door Lock
ESP32 CAM Face Detection Door LockESP32 CAM Face Detection Door Lock
ESP32 CAM Face Detection Door LockIRJET Journal
 
Integrated Security System With Remot Controlling Of Appliances
Integrated Security System With Remot Controlling Of AppliancesIntegrated Security System With Remot Controlling Of Appliances
Integrated Security System With Remot Controlling Of AppliancesIRJET Journal
 
Ijarcet vol-2-issue-7-2389-2397
Ijarcet vol-2-issue-7-2389-2397Ijarcet vol-2-issue-7-2389-2397
Ijarcet vol-2-issue-7-2389-2397Editor IJARCET
 
Ijarcet vol-2-issue-7-2389-2397
Ijarcet vol-2-issue-7-2389-2397Ijarcet vol-2-issue-7-2389-2397
Ijarcet vol-2-issue-7-2389-2397Editor IJARCET
 
Smart Home Automation using Wi-Fi
Smart Home Automation using Wi-FiSmart Home Automation using Wi-Fi
Smart Home Automation using Wi-Fiijtsrd
 
RAHUL NASKAR IOT.ppt
RAHUL NASKAR IOT.pptRAHUL NASKAR IOT.ppt
RAHUL NASKAR IOT.pptPrakasBhowmik
 
An IOT Project Integrated with RFID and GPRS
An IOT Project Integrated with RFID and GPRSAn IOT Project Integrated with RFID and GPRS
An IOT Project Integrated with RFID and GPRSIJMTST Journal
 

Similar to Towards secure smart cities: design and implementation of smart home digital communication system (20)

IRJET- Smart Vehicle Security System using Finger Print Sensor
IRJET- Smart Vehicle Security System using Finger Print SensorIRJET- Smart Vehicle Security System using Finger Print Sensor
IRJET- Smart Vehicle Security System using Finger Print Sensor
 
Design and implement a smart system to detect intruders and firing using IoT
Design and implement a smart system to detect intruders and firing using IoT Design and implement a smart system to detect intruders and firing using IoT
Design and implement a smart system to detect intruders and firing using IoT
 
WIRELESS LOCKSYSTEM THROUGH OTP.docx
WIRELESS LOCKSYSTEM THROUGH OTP.docxWIRELESS LOCKSYSTEM THROUGH OTP.docx
WIRELESS LOCKSYSTEM THROUGH OTP.docx
 
Decibel meter using IoT with notice board
Decibel meter using IoT with notice boardDecibel meter using IoT with notice board
Decibel meter using IoT with notice board
 
IRJET - Home Automation for Physically Challenged and Elder People
IRJET -  	  Home Automation for Physically Challenged and Elder PeopleIRJET -  	  Home Automation for Physically Challenged and Elder People
IRJET - Home Automation for Physically Challenged and Elder People
 
IRJET- Smart Home: Speech Recognition based Home Automation using IoT
IRJET-  	  Smart Home: Speech Recognition based Home Automation using IoTIRJET-  	  Smart Home: Speech Recognition based Home Automation using IoT
IRJET- Smart Home: Speech Recognition based Home Automation using IoT
 
J04701080085
J04701080085J04701080085
J04701080085
 
IRJET - Smart Door System
IRJET - Smart Door SystemIRJET - Smart Door System
IRJET - Smart Door System
 
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: Review
 
Intelligent Device TO Device Communication Using IoT
 Intelligent Device TO Device Communication Using IoT Intelligent Device TO Device Communication Using IoT
Intelligent Device TO Device Communication Using IoT
 
Project PPT.pptx
Project PPT.pptxProject PPT.pptx
Project PPT.pptx
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
 
ESP32 CAM Face Detection Door Lock
ESP32 CAM Face Detection Door LockESP32 CAM Face Detection Door Lock
ESP32 CAM Face Detection Door Lock
 
finger print sensor
finger print sensor finger print sensor
finger print sensor
 
Integrated Security System With Remot Controlling Of Appliances
Integrated Security System With Remot Controlling Of AppliancesIntegrated Security System With Remot Controlling Of Appliances
Integrated Security System With Remot Controlling Of Appliances
 
Ijarcet vol-2-issue-7-2389-2397
Ijarcet vol-2-issue-7-2389-2397Ijarcet vol-2-issue-7-2389-2397
Ijarcet vol-2-issue-7-2389-2397
 
Ijarcet vol-2-issue-7-2389-2397
Ijarcet vol-2-issue-7-2389-2397Ijarcet vol-2-issue-7-2389-2397
Ijarcet vol-2-issue-7-2389-2397
 
Smart Home Automation using Wi-Fi
Smart Home Automation using Wi-FiSmart Home Automation using Wi-Fi
Smart Home Automation using Wi-Fi
 
RAHUL NASKAR IOT.ppt
RAHUL NASKAR IOT.pptRAHUL NASKAR IOT.ppt
RAHUL NASKAR IOT.ppt
 
An IOT Project Integrated with RFID and GPRS
An IOT Project Integrated with RFID and GPRSAn IOT Project Integrated with RFID and GPRS
An IOT Project Integrated with RFID and GPRS
 

More from nooriasukmaningtyas

A deep learning approach based on stochastic gradient descent and least absol...
A deep learning approach based on stochastic gradient descent and least absol...A deep learning approach based on stochastic gradient descent and least absol...
A deep learning approach based on stochastic gradient descent and least absol...nooriasukmaningtyas
 
Automated breast cancer detection system from breast mammogram using deep neu...
Automated breast cancer detection system from breast mammogram using deep neu...Automated breast cancer detection system from breast mammogram using deep neu...
Automated breast cancer detection system from breast mammogram using deep neu...nooriasukmaningtyas
 
Max stable set problem to found the initial centroids in clustering problem
Max stable set problem to found the initial centroids in clustering problemMax stable set problem to found the initial centroids in clustering problem
Max stable set problem to found the initial centroids in clustering problemnooriasukmaningtyas
 
Intelligent aquaculture system for pisciculture simulation using deep learnin...
Intelligent aquaculture system for pisciculture simulation using deep learnin...Intelligent aquaculture system for pisciculture simulation using deep learnin...
Intelligent aquaculture system for pisciculture simulation using deep learnin...nooriasukmaningtyas
 
Effective task scheduling algorithm in cloud computing with quality of servic...
Effective task scheduling algorithm in cloud computing with quality of servic...Effective task scheduling algorithm in cloud computing with quality of servic...
Effective task scheduling algorithm in cloud computing with quality of servic...nooriasukmaningtyas
 
Fixed point theorem between cone metric space and quasi-cone metric space
Fixed point theorem between cone metric space and quasi-cone metric spaceFixed point theorem between cone metric space and quasi-cone metric space
Fixed point theorem between cone metric space and quasi-cone metric spacenooriasukmaningtyas
 
Design of an environmental management information system for the Universidad ...
Design of an environmental management information system for the Universidad ...Design of an environmental management information system for the Universidad ...
Design of an environmental management information system for the Universidad ...nooriasukmaningtyas
 
K-NN supervised learning algorithm in the predictive analysis of the quality ...
K-NN supervised learning algorithm in the predictive analysis of the quality ...K-NN supervised learning algorithm in the predictive analysis of the quality ...
K-NN supervised learning algorithm in the predictive analysis of the quality ...nooriasukmaningtyas
 
Systematic literature review on university website quality
Systematic literature review on university website qualitySystematic literature review on university website quality
Systematic literature review on university website qualitynooriasukmaningtyas
 
An intelligent irrigation system based on internet of things (IoT) to minimiz...
An intelligent irrigation system based on internet of things (IoT) to minimiz...An intelligent irrigation system based on internet of things (IoT) to minimiz...
An intelligent irrigation system based on internet of things (IoT) to minimiz...nooriasukmaningtyas
 
Enhancement of observability using Kubernetes operator
Enhancement of observability using Kubernetes operatorEnhancement of observability using Kubernetes operator
Enhancement of observability using Kubernetes operatornooriasukmaningtyas
 
Customer churn analysis using XGBoosted decision trees
Customer churn analysis using XGBoosted decision treesCustomer churn analysis using XGBoosted decision trees
Customer churn analysis using XGBoosted decision treesnooriasukmaningtyas
 
Smart solution for reducing COVID-19 risk using internet of things
Smart solution for reducing COVID-19 risk using internet of thingsSmart solution for reducing COVID-19 risk using internet of things
Smart solution for reducing COVID-19 risk using internet of thingsnooriasukmaningtyas
 
Development of computer-based learning system for learning behavior analytics
Development of computer-based learning system for learning behavior analyticsDevelopment of computer-based learning system for learning behavior analytics
Development of computer-based learning system for learning behavior analyticsnooriasukmaningtyas
 
Efficiency of hybrid algorithm for COVID-19 online screening test based on it...
Efficiency of hybrid algorithm for COVID-19 online screening test based on it...Efficiency of hybrid algorithm for COVID-19 online screening test based on it...
Efficiency of hybrid algorithm for COVID-19 online screening test based on it...nooriasukmaningtyas
 
Comparative study of low power wide area network based on internet of things ...
Comparative study of low power wide area network based on internet of things ...Comparative study of low power wide area network based on internet of things ...
Comparative study of low power wide area network based on internet of things ...nooriasukmaningtyas
 
Fog attenuation penalty analysis in terrestrial optical wireless communicatio...
Fog attenuation penalty analysis in terrestrial optical wireless communicatio...Fog attenuation penalty analysis in terrestrial optical wireless communicatio...
Fog attenuation penalty analysis in terrestrial optical wireless communicatio...nooriasukmaningtyas
 
An approach for slow distributed denial of service attack detection and allev...
An approach for slow distributed denial of service attack detection and allev...An approach for slow distributed denial of service attack detection and allev...
An approach for slow distributed denial of service attack detection and allev...nooriasukmaningtyas
 
Design and simulation double Ku-band Vivaldi antenna
Design and simulation double Ku-band Vivaldi antennaDesign and simulation double Ku-band Vivaldi antenna
Design and simulation double Ku-band Vivaldi antennanooriasukmaningtyas
 
Coverage enhancements of vehicles users using mobile stations at 5G cellular ...
Coverage enhancements of vehicles users using mobile stations at 5G cellular ...Coverage enhancements of vehicles users using mobile stations at 5G cellular ...
Coverage enhancements of vehicles users using mobile stations at 5G cellular ...nooriasukmaningtyas
 

More from nooriasukmaningtyas (20)

A deep learning approach based on stochastic gradient descent and least absol...
A deep learning approach based on stochastic gradient descent and least absol...A deep learning approach based on stochastic gradient descent and least absol...
A deep learning approach based on stochastic gradient descent and least absol...
 
Automated breast cancer detection system from breast mammogram using deep neu...
Automated breast cancer detection system from breast mammogram using deep neu...Automated breast cancer detection system from breast mammogram using deep neu...
Automated breast cancer detection system from breast mammogram using deep neu...
 
Max stable set problem to found the initial centroids in clustering problem
Max stable set problem to found the initial centroids in clustering problemMax stable set problem to found the initial centroids in clustering problem
Max stable set problem to found the initial centroids in clustering problem
 
Intelligent aquaculture system for pisciculture simulation using deep learnin...
Intelligent aquaculture system for pisciculture simulation using deep learnin...Intelligent aquaculture system for pisciculture simulation using deep learnin...
Intelligent aquaculture system for pisciculture simulation using deep learnin...
 
Effective task scheduling algorithm in cloud computing with quality of servic...
Effective task scheduling algorithm in cloud computing with quality of servic...Effective task scheduling algorithm in cloud computing with quality of servic...
Effective task scheduling algorithm in cloud computing with quality of servic...
 
Fixed point theorem between cone metric space and quasi-cone metric space
Fixed point theorem between cone metric space and quasi-cone metric spaceFixed point theorem between cone metric space and quasi-cone metric space
Fixed point theorem between cone metric space and quasi-cone metric space
 
Design of an environmental management information system for the Universidad ...
Design of an environmental management information system for the Universidad ...Design of an environmental management information system for the Universidad ...
Design of an environmental management information system for the Universidad ...
 
K-NN supervised learning algorithm in the predictive analysis of the quality ...
K-NN supervised learning algorithm in the predictive analysis of the quality ...K-NN supervised learning algorithm in the predictive analysis of the quality ...
K-NN supervised learning algorithm in the predictive analysis of the quality ...
 
Systematic literature review on university website quality
Systematic literature review on university website qualitySystematic literature review on university website quality
Systematic literature review on university website quality
 
An intelligent irrigation system based on internet of things (IoT) to minimiz...
An intelligent irrigation system based on internet of things (IoT) to minimiz...An intelligent irrigation system based on internet of things (IoT) to minimiz...
An intelligent irrigation system based on internet of things (IoT) to minimiz...
 
Enhancement of observability using Kubernetes operator
Enhancement of observability using Kubernetes operatorEnhancement of observability using Kubernetes operator
Enhancement of observability using Kubernetes operator
 
Customer churn analysis using XGBoosted decision trees
Customer churn analysis using XGBoosted decision treesCustomer churn analysis using XGBoosted decision trees
Customer churn analysis using XGBoosted decision trees
 
Smart solution for reducing COVID-19 risk using internet of things
Smart solution for reducing COVID-19 risk using internet of thingsSmart solution for reducing COVID-19 risk using internet of things
Smart solution for reducing COVID-19 risk using internet of things
 
Development of computer-based learning system for learning behavior analytics
Development of computer-based learning system for learning behavior analyticsDevelopment of computer-based learning system for learning behavior analytics
Development of computer-based learning system for learning behavior analytics
 
Efficiency of hybrid algorithm for COVID-19 online screening test based on it...
Efficiency of hybrid algorithm for COVID-19 online screening test based on it...Efficiency of hybrid algorithm for COVID-19 online screening test based on it...
Efficiency of hybrid algorithm for COVID-19 online screening test based on it...
 
Comparative study of low power wide area network based on internet of things ...
Comparative study of low power wide area network based on internet of things ...Comparative study of low power wide area network based on internet of things ...
Comparative study of low power wide area network based on internet of things ...
 
Fog attenuation penalty analysis in terrestrial optical wireless communicatio...
Fog attenuation penalty analysis in terrestrial optical wireless communicatio...Fog attenuation penalty analysis in terrestrial optical wireless communicatio...
Fog attenuation penalty analysis in terrestrial optical wireless communicatio...
 
An approach for slow distributed denial of service attack detection and allev...
An approach for slow distributed denial of service attack detection and allev...An approach for slow distributed denial of service attack detection and allev...
An approach for slow distributed denial of service attack detection and allev...
 
Design and simulation double Ku-band Vivaldi antenna
Design and simulation double Ku-band Vivaldi antennaDesign and simulation double Ku-band Vivaldi antenna
Design and simulation double Ku-band Vivaldi antenna
 
Coverage enhancements of vehicles users using mobile stations at 5G cellular ...
Coverage enhancements of vehicles users using mobile stations at 5G cellular ...Coverage enhancements of vehicles users using mobile stations at 5G cellular ...
Coverage enhancements of vehicles users using mobile stations at 5G cellular ...
 

Recently uploaded

Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...HenryBriggs2
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilVinayVitekari
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...jabtakhaidam7
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksMagic Marks
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 

Recently uploaded (20)

Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 

Towards secure smart cities: design and implementation of smart home digital communication system

  • 1. Indonesian Journal of Electrical Engineering and Computer Science Vol. 21, No. 1, January 2021, pp. 271~277 ISSN: 2502-4752, DOI: 10.11591/ijeecs.v21.i1.pp271-277  271 Journal homepage: http://ijeecs.iaescore.com Towards secure smart cities: design and implementation of smart home digital communication system Nael A. Al-Shareefi1 , Sura Adil Abbas2 , Mohanad S. Alkhazraji3 , Ammar AbdRaba Sakran4 1,4 College of Biomedical Informatics, University of Information Technology and Communications (UOITC), Baghdad, Iraq 2 College of Engineering, University of Information Technology and Communications (UOITC), Baghdad, Iraq 3 Electrical and Electronic Engineering Department, University of Technology (UOT), Iraq Article Info ABSTRACT Article history: Received Mar 24, 2020 Revised Jun 27, 2020 Accepted Jul 14, 2020 Home and building security are major concern in our daily life and digital smart door lock (DSDL) have become an essential part of these systems. In this paper, a secure DSDL which can grant access to home with a fingerprint is designed and implemented. An Arduino Nano microcontroller board, finger print sensor and servo motor have been utilized for lock/unlock door based on finger print. The DSDL is an automatic authenticate and validate the user for secure access. The implemented system aims to develop a cost effective DSDL based on low cost components compared to the systems already on the domestic market. The ease of use and cost effectiveness makes the DSDL a strong competitor to the digital security system on the domestic market and outperforms it and suitable for security–based home automation systems. Keywords: Atmega328 microcontroller DSDL Home automation system Sensors Smart cities This is an open access article under the CC BY-SA license. Corresponding Author: Nael A. Al-Shareefi College of Biomedical Informatics University of Information Technology and Communications (UOITC) Baghdad, Iraq Email: dr.nael.al_shareefi@uoitc.edu.iq 1. INTRODUCTION Home automation system (HAS) is the fastest emerging technology that contains many smart home appliances for the convenience of the homeowner. HAS includes home security, e.g. access control systems, control appliances, climate and lighting [1, 2]. Embedded systems, smart sensors and wireless technology with the recent developments in interactive applications have improved the quality of human life in various areas including HAS, smart healthcare and smart cars [3]. Smart home appliances based built in sensors have improved the home live through many home appliances that include refrigerators, sewing machines, washing machines, television, etc. As a consequence, security of property and life requires serious attention, particularly with the advent of the era of 5G and internet of things (IoT) [4-7]. Home security is essential. A major component of home security is the increasing number of criminal activities worldwide. DSDLs put an obstacle to criminal acts. DSDLs will definitely be a favorite for every homeowner. They provide identical level of safety as traditional door locks, with aset of alternatives to the traditional key [8-10]. Previously, there was only one authentication method available for door locks the mechanical key. However, the keys are usually misplaced, left at home or lost. DSDLs offer a variety of authentication techniques to choose from suitable for user specific needs and offer total peace of mind [11, 12].
  • 2.  ISSN: 2502-4752 Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 1, January 2021 : 271 - 277 272 2. LITERATURE SURVEY Many DSDL systems was developed recently and commonly used in commercials homes and buildings [13-20]. Based on RFID (radio frequency identification) technology, low cost technology. P. Tripathi proposed a technique to realize DSDL system [13]. The user is first registered in the security system and his data is copied into the RFID tag. When the user comes to the entry/exit point and places the RFID tag in the reader, the security system checks if a user is registered or not. If registered, the door will open and close immediately after a fixed time period. Otherwise, user does not pass. B. Saraladevi has designed and implemented a password based security lock system. If the entered password is correct, the door will be opened by an actuator which is utilized to rotate the door lock handle [16]. In [14], Kamelia et al. have purposed a secure HAS using Bluetooth technology. The purposed HAS is relies on Android platform. Y. T. Park had purposed a digital door lock based HAS which exploits the full advantage of ZigBee technology based wireless sensor networks [15]. We found through the survey, some of the pervious implemented DSDL systems are expensive. Others do not provide multi level functionalities. 3. HARDWARE COMPONENTS 3.1. Actuator Actuator or servo motor (DS04–NFC), is a cheap, high–torque and 3600 rotation motor which can rotate continually with forward/reverse direction [21]. DS04–NFC is capable of lock/unlock the door in real– time. In the implemented system, DS04–NFC is activated via fingerprint reader. Some of the main features of the DS04–NFC motor we used are listed below [22] a) Operating voltage: 4.8 – 6v. b) Current:< 1000mA. c) Dimensions: 39.5 x 40.8 x 20mm. d) Operating temperature: 0 – 600C. 3.2. Grove - fingerprint sensor One of the most common devices in use which acts as a data entry device is the fingerprint sensor. Fingerprint sensor, is an optical sensor that will allow adding fingerprint identification and verification [23]. The sensor can record up to 200 fingerprints, and each recorded fingerprint appoints an ID from 0 to 199. This sensor comes with four wires in different colors as depicted in Table 1 [24]. Table 1. Finger print sensor wires function description [24] Pin number Color Function description 1 Red + 5V Power supply input 2 Yellow Tx wire for TTL sensor 3 White Rx wire for TTL sensor 4 black GND 3.3. Arduino nano board Arduino Nano is a breadboard–friendly micro–controller which communicates with DS04–NFC servo motor and triggers a door based on the command received from fingerprint sensor [25]. It contains USB connection, crystal oscillator, eight analogs (I/O), twelve digitals (I/O), and a reset button. Its operating voltage is 5v [26, 27]. 4. DSDL SYSTEM IMPLEMENTATION As shown in Figure 1, authorized users should be first registered with the system. Registration is done through finger print sensor. Fingerprints will be saved on different IDs in the Arduino Nano microcontroller. When a user comes to access the door, the system examines if it is registered user or pretender. If the entered ID is matched the saved, the user is trusted, the lock is open, if not, the access is not allowed.
  • 3. Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752  Towards secure smart cities: design and implementation of smart home digital... (Nael A. Al-Shareefi) 273 Figure 1. Block diagram of the DSDL system 4.1. Practical design of the DSDL system Figure 2 depicts the circuit diagram and practical design of the DSDL system. The following steps explain the circuit diagram of the fingerprint DSDL. 1) Connect Arduino Nano via a USB–Type B port. 2) Connect the yellow terminal of servo motor to the pin D9 of Arduino Nano board. 3) Connect red terminals of both fingerprint sensor and the servo motor with the 5v of Arduino Nano board. 4) Connect black terminals of both fingerprint sensor and servo motor with the GND. 5) Connect the yellow terminal of fingerprint sensor into the pin D3 of Arduino Nano board. 6) Connect the green terminal of fingerprint sensor into the pin D2 of Arduino Nano board. 7) Connect one end of both the opening and closing buttons to the GND. 8) Connect the Open lock button from inside with pin D6 of Arduino Nano board. 9) Connect Lock Buttons from Inside and outside with pin D5 of Arduino Nano board. 10) Connect short terminals of the LEDs and positive terminals of the resistors1K–Ohm with the GND port. 11) Connect red LEDs with pin D12 and green LEDs with pin D11 of Arduino Nano board. Figure 2. Circuit diagram of the DSDL
  • 4.  ISSN: 2502-4752 Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 1, January 2021 : 271 - 277 274 4.2. Working of the DSDL system 4.2.1. Fingerprint registration The following steps are undertaken to record a new fingerprint [28]. a) Arduino IDE, run → File → Examples → Sensor Library → Enroll Fingerprint. b) Upload Arduino code, then initiate COM4 at 9600 baud–rate. c) At the top left corner, you must enter the fingerprint ID to be stored. At the top right corner click send. d) On the Grove-fingerprint sensor, put your finger, then follow the procedures on COM4 screen, as shown Figure 3, you will be prompted to put identical finger two times. If the fingerprint similar your fingerprint recorded successfully. Figure 3. Register a fingerprint 4.2.2. Fingerprint matching Multiple fingerprints have been recorded with different identifiers (IDs). The following steps are excuted to find similarity with the sensor fingerprint [29]. a) Arduino IDE, File → Examples → Sensor Library → Fingerprint. b) Upload Arduino code. c) Initiate the serial COM4 with 9600 baud–rate. d) Place the finger to be recognized on the scan. COM4 screen, reveals that the ID matches the saved, as depicated in Figure 4. Figure 4. Fingerprint matching
  • 5. Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752  Towards secure smart cities: design and implementation of smart home digital... (Nael A. Al-Shareefi) 275 4.2.3. Working of the DSDL system (outside door) Pressing the red push-button will lock the door from the outside. When the lock is activated, the red light will turn on to indicate that the door is locked as shown in Figure 5(a). The DSDL opens from the outside with only the mateched fingerprint ID, allows authorized persons to access the door, then the green light will activate to indicate that the door is open as shown in Figure 5(b). (a) (b) Figure 5. (a) Outside door (locking), (b) Outside door (opening) 4.2.4. Working of the DSDL system (inside door) Locking the door from the inside pressing is done by pressing the red button. When the lock is activated the red light will be turned on to indicate that the door is locked as depicted in Figure 6(a). The door opens from the inside by pressing the green button. When the lock is open, the red light will be turned on to indicate that the door is opened as depicted in Figure 6(b). (a) (b) Figure 6. (a) Inside door (locking), (b) Inside door (opening)
  • 6.  ISSN: 2502-4752 Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 1, January 2021 : 271 - 277 276 5. SMART DOOR LOCK SYSTEM PROGRAM DESIGN C–language code used to configure hardware−based Arduino DSDL system is listed below: 6. CONCLUSION In this paper, a secure and fully–automated DSDL is designed and implemented using Arduino Nano. An Arduino Nano based on Atmega328 microcontroller has been utilized for lock/unlock the door of home or building based on user’s finger print so that only authorized users will grant access. The DSDL system is an automatic authentication and authorization system that can be installed at the bilidings or home to grant access to authorized people. The main objective of designing and implementing this system is to compare the cost with the existing DSDL systems. The cost of the whole implemented (prototype) system is only about 75$ which is cheap compared with existing secure access systems which cost about 150$–300$.
  • 7. Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752  Towards secure smart cities: design and implementation of smart home digital... (Nael A. Al-Shareefi) 277 REFERENCES [1] A. C. Jose and R. Malekian, “Smart home automation security: a literature review,” SmartCR, vol. 5, pp. 269-285, 2015. [2] K. E. Skouby and P. Lynggaard, “Smart home and smart city solutions enabled by 5G, IoT, AAI and CoT services,” 2014 International Conference on Contemporary Computing and Informatics (IC3I), Mysore, pp. 874-878, 2014. [3] N. A. B. Zainal, et al., “Gateway sink placement for sensor node grid distribution in LoRa smart city networks,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 14, pp. 834-842, 2019. [4] N. Al-Shareefi, “Comparison of Three Different EOU Techniques gor Fifth−Generation MM−W Wireless Networks,” Iraqi Journal for Computers and Informatics, vol. 45, pp. 9-14, 2019. [5] C. P. Ooi, et al., “FPGA-based embedded architecture for IoT home automation application,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 14, no. 2, pp. 646-652, 2019. [6] J. A. Aldhaibani, et al., “Effect of relay location on two-way DF and AF relay in LTE-A cellular networks,” International Journal of Electronics and Communication Engineering & Technology (IJECET), vol. 3, pp. 385-399, 2012. [7] H. S. Obaid, et al., “Internet of Things and Wireless Sensor Networks for Environmental Noise Sensing: Issues and Challenges,” Journal of Southwest Jiaotong University, vol. 54, no. 6, pp. 1-11, 2019. [8] R. Beatty, et al., “Network security analysis for smart appliances,” Google Patents, 2019. [9] A. Gharaibeh, et al., “Smart Cities: A Survey on Data Management, Security, and Enabling Technologies,” in IEEE Communications Surveys & Tutorials, vol. 19, no. 4, pp. 2456-2501, 2017. [10] L. Cui, et al., “Security and Privacy in Smart Cities: Challenges and Opportunities,” in IEEE Access, vol. 6, pp. 46134-46145, 2018. [11] P. Hong, et al., “Threat-Based Security Analysis for the Domestic Smart Home Appliance,” KIPS Transactions on Computer and Communication Systems, vol. 6, pp. 143-158, 2017. [12] P. McDaniel and S. McLaughlin, “Security and privacy challenges in the smart grid,” IEEE Security & Privacy, vol. 7, pp. 75-77, 2009. [13] G. K. Verma and P. Tripathi, “A digital security system with door lock system using RFID technology,” International Journal of Computer Applications, vol. 5, pp. 6-8, 2010. [14] L. Kamelia, et al., “Door–automation system using bluetooth–based android for mobile phone,” ARPN Journal of Engineering and Applied Sciences, vol. 9, pp. 1759-1762, 2014. [15] Y. T. Park, et al., “Smart digital door lock for the home automation,” in TENCON 2009-2009 IEEE Region 10 Conference, pp. 1-6, 2009. [16] S. Sedhumadhavan and B. Saraladevi, “Optimized Locking and Unlocking a System Using Arduino,” International Journal of Innovative Research in Computer and Communication Engineering, vol. 2, no. 11, pp. 6658-6663, 2014. [17] D. M. Kumar, et al., “Android based smart door locking system with multi user and multi level functionalities,” International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), vol. 5, no. 2, pp. 115-118, 2016. [18] Y. T. Park, et al., “Smart digital door lock for the home automation,” TENCON 2009 - 2009 IEEE Region 10 Conference, Singapore, pp. 1-6, 2009. [19] N. Kumbhar and P. Mane-Deshmukh, “Smart door locking system using Wireless Communication Technology,” International Journal for Research in Applied Science & Engineering Technology, vol. 5, pp. 507-512, 2017. [20] J. I. Jeong, “A study on the IoT based smart door lock system,” in Information Science and Applications (ICISA), pp. 1307-1318, 2016. [21] https://www.robomart.com/ds04-nfc-servo-360-degree-continuous-rotation-servos-dc-gear-motor. [22] A. T. Rashid, et al., “Design and Construction Objects Store System using Line Follower Robot,” International Journal of Computer Applications, vol. 181, no. 15, pp. 27-35, 2018. [23] https://www.seeedstudio.com/Grove-Fingerprint-Sensor.html. [24] J. S. Bartunek, “Fingerprint Image Enhancement, Segmentation and Minutiae Detection,” Blekinge Tekniska Högskola, 2016. [25] A. LLC, “Arduino Nano Manual.” [26] T. S. Gunawan, et al., “Design and implementation of portable outdoor air quality measurement systemn using arduino,” International Journal of Electrical and Computer Engineering, vol. 8, no. 1, pp. 280-290, 2018. [27] A. Budianto, et al., “PID control design for biofuel furnace using arduino,” TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 16, no. 6, pp. 3016-3023, 2018. [28] A. K. Jain, et al., “Fingerprint matching,” Computer, vol. 43, pp. 36-44, 2010. [29] https://randomnerdtutorials.com/fingerprint-sensor-module-with-arduino/.