SlideShare a Scribd company logo
1 of 16
A Presentation on
iSecure – 3FA Smart Lock
- PresentedBy-
SamiranDas
(CSM16015)
External Guide
Mr.Suresh V
Associate Director
HCDCGroup
CDAC,Pune
Internal Guide
Dr.Nabajyoti Medhi
Assistant Professor
Dept. ofCSE,
Tezpur University
Date – 03.06.2019
CONTENTS
1. Introductionto IoT --------------------------------------- Slide 3
2. Problem Definition ----------------------------------- Slide 4
3. Objectives & Goals --------------------------------------------- Slide 5
4. MarketStudy --------------------------------------------- Slide 6
5. TheProposed System --------------------------------------------- Slide 7
6. Hardware &Software Used ------------------------------------ Slide 8-9
7. System Design &Analysis ------------------------------------- Slide 10-12
8. System Implementation ----------------------------------------------- Slide 13
9. Conclusion & FutureScope ----------------------------------- Slide 14-15
10. References ------------------------------------------- Slide 16
INTRODUCTIONTOIoT
Internet of Things (IoT) is an ecosystem of
connected physical objects that are accessible
through internet.
IoT enforces –
 Communication
 Automation
 Information
PROBLEM DEFINITION
The security aspect of IoT connected devices is of higher significance.
For a product owner to hold an acceptable implementation of the smart lock,
we generalized the problems as follows -
☞ How to setup a smart lock that is sufficiently secure so that the breaching factor can be minimized
ensuring strong privacy?
☞ How to provide a user friendly interface and experience regardless of how complex the security
architecture is?
☞ How to provide a lock that is durable, reliable and efficient yet budget friendly?
☞ How to develop a lock that can keep logs of all ethical and suspicious attempts to unlock the door?
OBJECTIVES& GOALS
The main objectives of the proposed system are as follows –
 To provide a secure locking mechanism to the user that is trustworthy and acceptable.
 To provide an easy user interface to the user so that the operations with lock can be made hassle free.
 To develop a system which can communicate with the lock and keep all its logs may it be authenticated or
an unauthorized attempt.
 To develop a lock that is durable, robust and yet economical.
The proposed system implements the following functions –
 Will able to unlock the lock using a three factor authentication mechanism
 Will able to get the logs of all authorized and unauthorized attempts
 Will be able to add, remove and change user information on the database.
 Will be able to track faulty attempts as each events will be recorded.
MARKET STUDY
 The global smart lock market size was estimated at USD 559.4 million in 2016.
 The demand for smart locks is expected to exceed 135 million units by 2024.
 The demand for smart lock is
increased exponentially.
 Around 50% smart locks are used
In residential areas.
Adoption of sophisticated keyless
access devices is relatively more
conventional in mature markets.
Global Market of Smart Lock
PROPOSED SYSTEM
iSECURE – 3FA SMART LOCK
INTELLIGENT
SECURE
THREE FACTOR AUTHENTICATION
SMART LOCK
Block Diagram of Proposed System
iSECURE – 3FA SMART LOCK is a intelligent secure smart lock powered by three factor
authentication security.
[ 3FA are RFID , PIN & OTP ]
HARDWARE& SOFTWAREUSED
Hardware Used -
Raspberry Pi 3 B 3.5 inch Touch Screen USB RFID Card Reader
12V Electric Strike 1 – Channel Relay Module DC – DC Converter
HARDWARE& SOFTWAREUSED
Software Used -
Twilio Cloud Messaging API
Spyder IDE
Raspbian Stretch GUI
My-SQL Apache Web Server
SYSTEMANALYSIS& DESIGN
The proposed three factor authentication smart lock will provide a 3 step authentication process via
🔑 RFID, 🔑PIN  and 🔑a random 6-digit generated OTP.
Features
☞ Secure access to resources
☞ Fast and reliable
☞ Keeps logs of all attempts
☞ Easy and lucid UI
☞ Touch based for better UX
☞ Add multiple users
☞ Manipulate existing users
☞ Less space requirement
☞ User Privacy
SYSTEMANALYSIS& DESIGN
Work Flow Architecture
SYSTEMANALYSIS& DESIGN
Database of the System
SYSTEMIMPLEMENTATION
Sl No. Components Purpose
Raspberry Pi It is considered as the heart and the
brain of the system. It checks the RFID,
PIN and OTP data entered as an input,
sends signal to the relay to activate and
deactivate the lock accordingly.
Relay Module It works as a switch that works on
signal receives from raspberry pi to
drive the electric lock.
DC Power Module It satisfies the power need of the
system. It provides 5V to raspberry pi
and the relay module and 12V to the
electric lock.
RFID Reader It reads the data of RFID card or key
fob and fetches it to raspberry pi.
TFT Touch Screen It presents a GUI for the whole system
to interact with the user as well as
takes input such as PIN and OTP.
System
Prototype
Internal
Circuitry
Conclusion
Thus, the iSecure – 3FA Smart Lock prototype designed and implemented
is an innovative physical securing mechanism. The system employs three
factor authentication (3FA) which makes it robust to bypass or break.
The event logging facility ensures that all the events along with
relevant data and time stamp are recorded for analytics, audit and
future investigations. The system deploys open source hardware and
embraces simple and affordable building blocks, thereby reducing the
overall cost.
The proposed system has much scope of futuristic improvements. The
smart lock can be customized for easy configuration such that any
number or any type of authentication factor can be included. The
authentication layers such as face detection, bio-metric, GPS, Voice
enabled and the likes can be included as desired. The proposed Smart
lock prototype can be embedded with tampered-proof, battery backup
along with power indications and similar mechanisms and necessary
notifications.
Futurescope
References
[1] Kristoffer Djupsjö Masar Almosawi, “IoT Security Applied on a Smart Door Lock Application”, KTH Royal Institute of Technology,
2018
[2] Region, And Segment Forecasts, “Smart Lock Market Size, Share & Trends Analysis Report By Type (Deadbolt, Lever Handle,
Padlock), By Application (Residential, Hospitality, Enterprise, Critical Infrastructure)”, Grand View Research, Inc.: Market Research
Reports & Consulting, 2018
[3] Are smart locks secure? AV-TEST has the answer, https://www.techrepublic.com/article/are-smart-locks-secure-av-test-has-the-answer.
[4] Jayant Dabhade, Amirush Javare, Tushar Ghayal, Ankur Shelar, Ankita Gupta, “Smart Door Lock System: Improving Home Security
using Bluetooth Technology”, International Journal of Computer Applications (0975 – 8887) Volume 160 – No 8, February 2017
[5] Rahul Satoskar , Akarsh Mishra, “Smart Door Lock and Lighting System using Internet of Things”, International Journal of Computer
Science and Information Technologies, Vol. 9 (5) , 2018, 132-135
[6] Adarsh V Patil , Akshay S, CHandanB Patgar, Sreevarsha Prakash, Mahadevaswamy, Sharath Kumar A J, “Android Based Smart Door
Locking System ", International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Published by, www.ijert.org
NCESC - 2018 Conference Proceedings, Volume 6, Issue 13
[7] Nareshkumar R. M., Apoorva Kamat, Dnyaneshvari Shinde, “Smart Door Security Control System Using Raspberry Pi”, International
Journal of Innovations & Advancement in Computer Science, ISSN 2347 – 8616 Volume 6, Issue 11 November 2017
[8] Chi-Huang Hung, Ying-Wen Bai, Je-Hong Ren, “Design and implementation of a door lock control based on a near field communication
of a smartphone”, IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW), 2015, DOI: 10.1109/ICCE-
TW.2015.7216992
[9] Bill Phillips, “The Complete Book of Locks and Locksmithing, Seventh Edition”, McGraw Hill Professional, 21-Oct-2016

More Related Content

What's hot

Home automation using blynk app with fan direction control and displaying sta...
Home automation using blynk app with fan direction control and displaying sta...Home automation using blynk app with fan direction control and displaying sta...
Home automation using blynk app with fan direction control and displaying sta...Diwash Kapil Chettri
 
IoT Based Home Automation System over Cloud
IoT Based Home Automation System over CloudIoT Based Home Automation System over Cloud
IoT Based Home Automation System over Cloudijtsrd
 
Home automation using wifi
Home automation using wifiHome automation using wifi
Home automation using wifiKhairunnisa Naaz
 
Iot home automation varsha,ashish,sagar,arvind
Iot home automation  varsha,ashish,sagar,arvindIot home automation  varsha,ashish,sagar,arvind
Iot home automation varsha,ashish,sagar,arvindAshish Chourasiya
 
Home automation using IoT literature review ppt
Home automation using IoT literature review pptHome automation using IoT literature review ppt
Home automation using IoT literature review pptTanujkumar101
 
IoT home automation project
IoT home automation projectIoT home automation project
IoT home automation projectShohin Aheleroff
 
IRJET- Smart Home Automation using IoT with Security Features
IRJET- Smart Home Automation using IoT with Security FeaturesIRJET- Smart Home Automation using IoT with Security Features
IRJET- Smart Home Automation using IoT with Security FeaturesIRJET Journal
 
Home automation in client server using NodeMcu approach along with user notif...
Home automation in client server using NodeMcu approach along with user notif...Home automation in client server using NodeMcu approach along with user notif...
Home automation in client server using NodeMcu approach along with user notif...Brundha Sholaganga
 
IoT Based home automation system using Arduino board
IoT Based home automation system using Arduino boardIoT Based home automation system using Arduino board
IoT Based home automation system using Arduino boardIRJET Journal
 
Women Security Assistance system with GPS tracking and messaging system
Women Security Assistance system with GPS tracking and messaging system Women Security Assistance system with GPS tracking and messaging system
Women Security Assistance system with GPS tracking and messaging system Uttej Kumar Palavai
 
Home automation using internet of things
Home automation using internet of thingsHome automation using internet of things
Home automation using internet of thingsAbhishek Bhadoria
 
home automation using esp8266
home automation using esp8266home automation using esp8266
home automation using esp8266smit bakori
 
Home automation based iot
Home automation based iotHome automation based iot
Home automation based iottashushy
 
Smart home automation - Internet of Things
Smart home automation - Internet of ThingsSmart home automation - Internet of Things
Smart home automation - Internet of ThingsVinsol
 
Home automation- An Iot application
Home automation- An Iot applicationHome automation- An Iot application
Home automation- An Iot applicationArchana Golhar
 
CEIS101: IoT Home Security System
CEIS101: IoT Home Security SystemCEIS101: IoT Home Security System
CEIS101: IoT Home Security SystemBillBlanco
 

What's hot (20)

Home automation using blynk app with fan direction control and displaying sta...
Home automation using blynk app with fan direction control and displaying sta...Home automation using blynk app with fan direction control and displaying sta...
Home automation using blynk app with fan direction control and displaying sta...
 
IoT Based Home Automation System over Cloud
IoT Based Home Automation System over CloudIoT Based Home Automation System over Cloud
IoT Based Home Automation System over Cloud
 
Home automation using IOT
Home automation using IOTHome automation using IOT
Home automation using IOT
 
Home automation using wifi
Home automation using wifiHome automation using wifi
Home automation using wifi
 
Iot home automation varsha,ashish,sagar,arvind
Iot home automation  varsha,ashish,sagar,arvindIot home automation  varsha,ashish,sagar,arvind
Iot home automation varsha,ashish,sagar,arvind
 
Automated home secuirty project
Automated home secuirty projectAutomated home secuirty project
Automated home secuirty project
 
Home automation using IoT literature review ppt
Home automation using IoT literature review pptHome automation using IoT literature review ppt
Home automation using IoT literature review ppt
 
IoT home automation project
IoT home automation projectIoT home automation project
IoT home automation project
 
IRJET- Smart Home Automation using IoT with Security Features
IRJET- Smart Home Automation using IoT with Security FeaturesIRJET- Smart Home Automation using IoT with Security Features
IRJET- Smart Home Automation using IoT with Security Features
 
Home automation in client server using NodeMcu approach along with user notif...
Home automation in client server using NodeMcu approach along with user notif...Home automation in client server using NodeMcu approach along with user notif...
Home automation in client server using NodeMcu approach along with user notif...
 
IoT Based home automation system using Arduino board
IoT Based home automation system using Arduino boardIoT Based home automation system using Arduino board
IoT Based home automation system using Arduino board
 
IoT Home Automation System
IoT Home Automation SystemIoT Home Automation System
IoT Home Automation System
 
Women Security Assistance system with GPS tracking and messaging system
Women Security Assistance system with GPS tracking and messaging system Women Security Assistance system with GPS tracking and messaging system
Women Security Assistance system with GPS tracking and messaging system
 
Home automation using internet of things
Home automation using internet of thingsHome automation using internet of things
Home automation using internet of things
 
home automation using esp8266
home automation using esp8266home automation using esp8266
home automation using esp8266
 
Home automation based iot
Home automation based iotHome automation based iot
Home automation based iot
 
Smart home automation - Internet of Things
Smart home automation - Internet of ThingsSmart home automation - Internet of Things
Smart home automation - Internet of Things
 
Home automation- An Iot application
Home automation- An Iot applicationHome automation- An Iot application
Home automation- An Iot application
 
CEIS101: IoT Home Security System
CEIS101: IoT Home Security SystemCEIS101: IoT Home Security System
CEIS101: IoT Home Security System
 
Iot based home automation
Iot based home automationIot based home automation
Iot based home automation
 

Similar to i-Secure - 3FA Smart Lock

IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET Journal
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET Journal
 
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- 	  Design and Development Modish Smart Key Box using RFID based on Ard...IRJET- 	  Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...IRJET Journal
 
Design of Banking Security System Using Mems And Rfid Technology
Design of Banking Security System Using Mems And Rfid TechnologyDesign of Banking Security System Using Mems And Rfid Technology
Design of Banking Security System Using Mems And Rfid Technologytheijes
 
To protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technologyTo protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technologyeSAT Journals
 
IRJET - Smart Doorbell System
 IRJET - Smart Doorbell System IRJET - Smart Doorbell System
IRJET - Smart Doorbell SystemIRJET Journal
 
IRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFIDIRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFIDIRJET Journal
 
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET-  	  Enhanced SIT Algorithm for Embedded SystemsIRJET-  	  Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded SystemsIRJET Journal
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIJERA Editor
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIJERA Editor
 
IRJET - Android based Secure and Smart Home Application using IoT
IRJET -  	  Android based Secure and Smart Home Application using IoTIRJET -  	  Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoTIRJET Journal
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoTIRJET Journal
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoTIRJET Journal
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET Journal
 
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdfIRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdfIRJET Journal
 
Artificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber SecurityArtificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber SecurityIRJET Journal
 
IRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET Journal
 
IoT and Fingerprint Based Door Looking System
IoT and Fingerprint Based Door Looking SystemIoT and Fingerprint Based Door Looking System
IoT and Fingerprint Based Door Looking Systemrahulmonikasharma
 
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET-  	  Identification of Location of Laptop Devices using Raspberry Pi Mo...IRJET-  	  Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...IRJET Journal
 
IRJET- Smart Monitoring System for Industrial Automation (IoT Based)
IRJET- Smart Monitoring System for Industrial Automation (IoT Based)IRJET- Smart Monitoring System for Industrial Automation (IoT Based)
IRJET- Smart Monitoring System for Industrial Automation (IoT Based)IRJET Journal
 

Similar to i-Secure - 3FA Smart Lock (20)

IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
 
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- 	  Design and Development Modish Smart Key Box using RFID based on Ard...IRJET- 	  Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
 
Design of Banking Security System Using Mems And Rfid Technology
Design of Banking Security System Using Mems And Rfid TechnologyDesign of Banking Security System Using Mems And Rfid Technology
Design of Banking Security System Using Mems And Rfid Technology
 
To protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technologyTo protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technology
 
IRJET - Smart Doorbell System
 IRJET - Smart Doorbell System IRJET - Smart Doorbell System
IRJET - Smart Doorbell System
 
IRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFIDIRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFID
 
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET-  	  Enhanced SIT Algorithm for Embedded SystemsIRJET-  	  Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded Systems
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security System
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security System
 
IRJET - Android based Secure and Smart Home Application using IoT
IRJET -  	  Android based Secure and Smart Home Application using IoTIRJET -  	  Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoT
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
 
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdfIRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
 
Artificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber SecurityArtificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber Security
 
IRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking System
 
IoT and Fingerprint Based Door Looking System
IoT and Fingerprint Based Door Looking SystemIoT and Fingerprint Based Door Looking System
IoT and Fingerprint Based Door Looking System
 
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET-  	  Identification of Location of Laptop Devices using Raspberry Pi Mo...IRJET-  	  Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
 
IRJET- Smart Monitoring System for Industrial Automation (IoT Based)
IRJET- Smart Monitoring System for Industrial Automation (IoT Based)IRJET- Smart Monitoring System for Industrial Automation (IoT Based)
IRJET- Smart Monitoring System for Industrial Automation (IoT Based)
 

Recently uploaded

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

i-Secure - 3FA Smart Lock

  • 1. A Presentation on iSecure – 3FA Smart Lock - PresentedBy- SamiranDas (CSM16015) External Guide Mr.Suresh V Associate Director HCDCGroup CDAC,Pune Internal Guide Dr.Nabajyoti Medhi Assistant Professor Dept. ofCSE, Tezpur University Date – 03.06.2019
  • 2. CONTENTS 1. Introductionto IoT --------------------------------------- Slide 3 2. Problem Definition ----------------------------------- Slide 4 3. Objectives & Goals --------------------------------------------- Slide 5 4. MarketStudy --------------------------------------------- Slide 6 5. TheProposed System --------------------------------------------- Slide 7 6. Hardware &Software Used ------------------------------------ Slide 8-9 7. System Design &Analysis ------------------------------------- Slide 10-12 8. System Implementation ----------------------------------------------- Slide 13 9. Conclusion & FutureScope ----------------------------------- Slide 14-15 10. References ------------------------------------------- Slide 16
  • 3. INTRODUCTIONTOIoT Internet of Things (IoT) is an ecosystem of connected physical objects that are accessible through internet. IoT enforces –  Communication  Automation  Information
  • 4. PROBLEM DEFINITION The security aspect of IoT connected devices is of higher significance. For a product owner to hold an acceptable implementation of the smart lock, we generalized the problems as follows - ☞ How to setup a smart lock that is sufficiently secure so that the breaching factor can be minimized ensuring strong privacy? ☞ How to provide a user friendly interface and experience regardless of how complex the security architecture is? ☞ How to provide a lock that is durable, reliable and efficient yet budget friendly? ☞ How to develop a lock that can keep logs of all ethical and suspicious attempts to unlock the door?
  • 5. OBJECTIVES& GOALS The main objectives of the proposed system are as follows –  To provide a secure locking mechanism to the user that is trustworthy and acceptable.  To provide an easy user interface to the user so that the operations with lock can be made hassle free.  To develop a system which can communicate with the lock and keep all its logs may it be authenticated or an unauthorized attempt.  To develop a lock that is durable, robust and yet economical. The proposed system implements the following functions –  Will able to unlock the lock using a three factor authentication mechanism  Will able to get the logs of all authorized and unauthorized attempts  Will be able to add, remove and change user information on the database.  Will be able to track faulty attempts as each events will be recorded.
  • 6. MARKET STUDY  The global smart lock market size was estimated at USD 559.4 million in 2016.  The demand for smart locks is expected to exceed 135 million units by 2024.  The demand for smart lock is increased exponentially.  Around 50% smart locks are used In residential areas. Adoption of sophisticated keyless access devices is relatively more conventional in mature markets. Global Market of Smart Lock
  • 7. PROPOSED SYSTEM iSECURE – 3FA SMART LOCK INTELLIGENT SECURE THREE FACTOR AUTHENTICATION SMART LOCK Block Diagram of Proposed System iSECURE – 3FA SMART LOCK is a intelligent secure smart lock powered by three factor authentication security. [ 3FA are RFID , PIN & OTP ]
  • 8. HARDWARE& SOFTWAREUSED Hardware Used - Raspberry Pi 3 B 3.5 inch Touch Screen USB RFID Card Reader 12V Electric Strike 1 – Channel Relay Module DC – DC Converter
  • 9. HARDWARE& SOFTWAREUSED Software Used - Twilio Cloud Messaging API Spyder IDE Raspbian Stretch GUI My-SQL Apache Web Server
  • 10. SYSTEMANALYSIS& DESIGN The proposed three factor authentication smart lock will provide a 3 step authentication process via 🔑 RFID, 🔑PIN  and 🔑a random 6-digit generated OTP. Features ☞ Secure access to resources ☞ Fast and reliable ☞ Keeps logs of all attempts ☞ Easy and lucid UI ☞ Touch based for better UX ☞ Add multiple users ☞ Manipulate existing users ☞ Less space requirement ☞ User Privacy
  • 13. SYSTEMIMPLEMENTATION Sl No. Components Purpose Raspberry Pi It is considered as the heart and the brain of the system. It checks the RFID, PIN and OTP data entered as an input, sends signal to the relay to activate and deactivate the lock accordingly. Relay Module It works as a switch that works on signal receives from raspberry pi to drive the electric lock. DC Power Module It satisfies the power need of the system. It provides 5V to raspberry pi and the relay module and 12V to the electric lock. RFID Reader It reads the data of RFID card or key fob and fetches it to raspberry pi. TFT Touch Screen It presents a GUI for the whole system to interact with the user as well as takes input such as PIN and OTP. System Prototype Internal Circuitry
  • 14. Conclusion Thus, the iSecure – 3FA Smart Lock prototype designed and implemented is an innovative physical securing mechanism. The system employs three factor authentication (3FA) which makes it robust to bypass or break. The event logging facility ensures that all the events along with relevant data and time stamp are recorded for analytics, audit and future investigations. The system deploys open source hardware and embraces simple and affordable building blocks, thereby reducing the overall cost.
  • 15. The proposed system has much scope of futuristic improvements. The smart lock can be customized for easy configuration such that any number or any type of authentication factor can be included. The authentication layers such as face detection, bio-metric, GPS, Voice enabled and the likes can be included as desired. The proposed Smart lock prototype can be embedded with tampered-proof, battery backup along with power indications and similar mechanisms and necessary notifications. Futurescope
  • 16. References [1] Kristoffer Djupsjö Masar Almosawi, “IoT Security Applied on a Smart Door Lock Application”, KTH Royal Institute of Technology, 2018 [2] Region, And Segment Forecasts, “Smart Lock Market Size, Share & Trends Analysis Report By Type (Deadbolt, Lever Handle, Padlock), By Application (Residential, Hospitality, Enterprise, Critical Infrastructure)”, Grand View Research, Inc.: Market Research Reports & Consulting, 2018 [3] Are smart locks secure? AV-TEST has the answer, https://www.techrepublic.com/article/are-smart-locks-secure-av-test-has-the-answer. [4] Jayant Dabhade, Amirush Javare, Tushar Ghayal, Ankur Shelar, Ankita Gupta, “Smart Door Lock System: Improving Home Security using Bluetooth Technology”, International Journal of Computer Applications (0975 – 8887) Volume 160 – No 8, February 2017 [5] Rahul Satoskar , Akarsh Mishra, “Smart Door Lock and Lighting System using Internet of Things”, International Journal of Computer Science and Information Technologies, Vol. 9 (5) , 2018, 132-135 [6] Adarsh V Patil , Akshay S, CHandanB Patgar, Sreevarsha Prakash, Mahadevaswamy, Sharath Kumar A J, “Android Based Smart Door Locking System ", International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Published by, www.ijert.org NCESC - 2018 Conference Proceedings, Volume 6, Issue 13 [7] Nareshkumar R. M., Apoorva Kamat, Dnyaneshvari Shinde, “Smart Door Security Control System Using Raspberry Pi”, International Journal of Innovations & Advancement in Computer Science, ISSN 2347 – 8616 Volume 6, Issue 11 November 2017 [8] Chi-Huang Hung, Ying-Wen Bai, Je-Hong Ren, “Design and implementation of a door lock control based on a near field communication of a smartphone”, IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW), 2015, DOI: 10.1109/ICCE- TW.2015.7216992 [9] Bill Phillips, “The Complete Book of Locks and Locksmithing, Seventh Edition”, McGraw Hill Professional, 21-Oct-2016