SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1400
Smart Door Security System using Raspberry Pi with Telegram
Shivani Desai1, Virendra D Pawar2
1Shivani Desai, Dept. of Computer Engineering, Vishwakarma Institute of Technology, Pune, Maharashtra
2Virendra D Pawar, Asst. Professor, Dept. of computer Engineering, Vishwakarma Institute of Technology, Pune,
Maharashtra
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - In modern world, the IoT is at its peak. Theworld
is becoming smarter, the homeautomationisemerging. Smart
Door control system is a latest technology in home
automation. The main purpose of smart Door technology is to
provide a complete security to the door, ease and comfort for
users. The aim of this paper is to enlarge the door automation
technique using Raspberry pi andandroidphone. Raspberrypi
controls PIR sensor, camera module, bell button, whichis used
in detecting the motion of a arrival of a person, capturing an
image of a person as soon as the bell is being pressed and
sends the still image to the android device through telegram
app and alerts the owner about the person standing at the
door. The entire systems programminghasbeenestablishedin
python 3.5 domains for raspberry pi operations.
Key Words: IoT, Telegram, Raspberry pi, python, Putty,
Security
1. INTRODUCTION
In today’s era every “thing” has its unique identity that is
what IoT (Internet of Things) is. It enables the connectivity
with physical devices and allows user to transfer the data
across the world through the networks. The technology is
playing a vital role in day-to-days life. Likewise the security.
The main objective of this project is to build a system that
will control the door using a smart phone. This system
includes various components like a Raspberry Pi model B3
(Inbuilt-Wi-Fi), PIR Sensor, Bell, Camera Module and a
Telegram App for getting the notification on an Android
Device.
The Purpose of this system is that whenever the person
arrives in front of the door , the person’s motion is been
detected by a PIR sensor and as soon as he/she presses the
bell button, the camera captures the image and the still
image is sent on a telegram app of an android device. The
components are connected via raspberry pi which has an
internet connection through Wi-Fi.
The user can unlock the door with the help of a mobile
phone as soon as he/she gets notification. The user will
unlock the door if the person is known and will give
authentication to enter the house.
Now a day’s security plays a foremost role as per as high-
tech things are taken into the consideration “more the
technology, higher the security”. This paper procures the
security to the raspberry pi, to secure it from gettinghacked.
SSH keys (asymmetric cryptography) network security is
being used in this project. User can also use a FAIL2BAN
method to secure your raspberry pi.
2. LITERATURE REVIEW
Nareshkumar R.[1]This paper is related to design a home
based automation system using smart phone andRPIhaving
biometric system. It captures the images when sensed
through PIR sensor, and using GSM technology the
communication has been done between the system and a
computer.
Reeta R[2]This paper uses the Eigen face detection
technique, where image is been captured using a snippet
code detecting the features of a person, the captured images
are stored into the database and. Access is given to the
members particularly whose image is already in the
database , alert is send if unauthorized face is detectedusing
GSM.
Rishabh Kumar Gupta [3] This paper consist of remote
access control system, switch and the speaker is used for
interacting with the guest standing right outside at thedoor.
Zigbee module is designed to support wireless sensor
network. Image is captured to the primary host and if
needed then to the secondary host, so locking and unlocking
of door is done.
D.Kishore[4]This paper uses the Raspberry pi, PIR sensor
which captures the images, saves it on the system and sends
it through Email via TCP/IP. Entire system is built using
ARM1176JZF-S microcontroller, implementation is done on
smart phone using JavaScript.
3. SYSTEM OVERVIEW
Fig-1 Functional Block Diagram
Motion
Detected
Bell
Pressed
Sent on
Android
Image
Captured
User
notified
Person
known
Door
Unlocked
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1401
As shown in fig-1 The Motion is detected using PIR sensor,
and when bell is pressed still image is captured and sent to a
user on an android app ,user gets notified , and if the person
is known then the door is unlocked by the owner. System
requires following components:
1. Raspberry pi B3
2. PIR Sensor
3. Camera Module
4. Wi-Fi Module
5. Telegram App
1 Raspberry pi-3 Model B:
Fig-2 Raspberry pi-3 ModelB
Raspberry pi is a small credit card size computer, which acts
as a heart of the whole system. Its a BCM2837 processor,
System on chip (SoC) With an ARM having a CPU and GPU.
The CPU consist of Quad core ARM-Cortex A53, 64 bit.
Consisting of 1GB RAM. The RPI include a wireless
connectivity with802.11 wirelessLAN (Wi-Fi)andBluetooth
4.1, 4*USB 2.0 ports, a set of GPIO (2*20 pins) header. It also
has an audio jack, a camera interface,display interface,HDMI
port. It requires a power supply of min 2.5 A for glowing up
the repositioned Led’s. It has a small SD card slot at its back,
inserting the OS, other files import it in the card and then
export all the files and get started .Changes can be made as
per the requirements.
$sudo apt-get update && sudo apt-get update
$Sudo reboot
The above commands will help user to update the raspberry
pi and can proceed further to configure the pi.
2 PIR sensor:
Fig-3 PIR Sensor
PIR (Passive Infrared sensor) is an electronic component
that measures any kind of object (person / animal in the
field. The window behind the lens is made up of IR-
transmissive material. TheFresnel lenscondenseslightupto
some 6-7 meters and its highly sensitive. It has a pins
consisting of VCC, Ground and the Output. The output is
given to GPIO pins of Raspberry pi through 5V of power
supply to the VCC.
3 Camera Module
Fig-4 Camera Module
The camera module is a 5MP customized designed camera
for a raspberry pi. It has a small socket at the board named
as ‘Camera Interface’ situated between HDMI port and
Ethernet. Insert the camera module intoits slot,designed for
interfacing a camera. This module allows the user tocapture
the still images and also to record a video in full HD. When
the picture is taken its camera preview is opened for few
seconds, using python coding adjust the resolution andsend
the image to an android app.
“Sudo raspi-config” is the command which allows you to
enable the camera module on raspberry pi.
4 Wi-Fi Module:
Wi-Fi is a wireless technology that provides high speed
connectivity. It is trademarked as IEEE 802.11x. it is
supported by many applications such as videogames , home
networks , mobile phone etc. The Wi-Fi is the mostfavorable
choice for IoT now days which will increase the speed of
connecting the network worldwide. In this system the
Raspberry pi has a in-built Wi-Fi, hence accessing it from
anywhere, controlling the raspberry pi
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1402
5 Telegram App on Android Phone:
Fig-5 Telegram App
The telegram app is heavily encrypted app. It delivers the
messages, images, documents, files faster than other apps.It
is highly secured from attackers, as it has end – to end
encryption and it is a cloud based app. It can be accessed
from multiple devices as well. It also procures a “Secret
Chat” facility which has self destructing feature.
4. METHODOLOGY
When the person arrives at a home and stands in the front
on the door, he/she will get detected byPIR motiondetector,
Led glows as motion is detected, ThePIR sensorisconnected
to raspberry pi, it has three pins. The GND pin is connected
to GND of RPI, VCC is connected to 5V and the output is
connected with any GPIO pin. As soon as the person will
press the bell the image is captured with the help of a
camera module. The push button is used as a switch,
inserted in a breadboard, one wire is connected with GND
and other is connected to some GPIO pin. The image of a
person is captured and stored in a RPI andimmediatelysend
on an android phone, whenever the bell is pressed. The CLI-
Telegram is used on an mobile phone, Linux commands are
used for the installation process, since telegram is highly
secured app, has various features like Secret chat, hasendto
end encryption and also can send data and files up to 1.5 GB.
User need to add the contact details while installation
process , the data will be save in the script call tg.sh and the
photos will be saved in a script tg_photo.sh , thesescriptsare
saved in home/pi/tg.
Then after the still image is been sent, the user will unlock
the door if the person is known. The unlocking of door is
done when a user presses ‘’1” on a telegram itwill unlock the
door.
The requirement of this projects include a Raspberry pi
model 3B having a SD card which has a Raspbian OS , a
switch , a camera module of 5Mp , a PIR sensor and an
android phone with installation of an telegram app in it. It
also requires a power supply of 1.5A to even 2A, a USB cable.
The coding is done in python having a python IDLE version
3.6. The necessary modules and libraries are also imported.
The Network security is playing a Vital role, the PUTTY and
PUTTY GEN are used for SSH (secure shell) The SSH key is
generated using a asymmetric cipher i.e. generation one
public and private key. The public key can be shared among
users, while a private key remains with the owner.
5. FLOWCHART AND ALGORITHM
No
No Yes
Yes
No Yes
Intruder Detected
Door remain
close
PIR
Sensor
Person Arrives
Start
Initialize Raspberry pi,
Camera, PIR sensor, Bell
Button
Bell
presse
d
Image Sent & user notified
on mobile phone
User
choice
Unlock the
door
Stop
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1403
1. Start
2. Initialize Raspberry pi, camera module, PIR sensor,
Bell Button etc
3. If person arrives, he/she will get detected by PIR
sensor
4. If the person presses the bell, then the image is
captured by the camera and will send a notification
and a snap on a smart phone.
5. The telegram app is been used to get the
notification on a smart phone.
6. The snap is sent, it’s a user choice to open a door or
to keep it close.
7. Stop.
Fig-6 Complete Setup
6. NETWORK SECURITY
SSH (Secure Shell) is a cryptographic Network protocol
which is used for securing a raspberry pi.
SSH uses an Asymmetric Cipher an algorithm that performs
encryption and decryption.
As SSH key has a user name and password which can be
stolen in the middle, but the SSH generates a pair of key:
Public and Private Key.
The data can be encrypted by using a user’s public key and
can be only decrypted by the private key.
In this project Putty and putty Generator are used for
generating the SSH for securing a raspberry pi
HOW TO SECURE RPI USING SSH:
1. Download Putty and key Generator.
2. Select key generator and click on “import- key”.
3. Generate the passphrase.
4. Putty will generate the public and private key
5. Save the private key with .ppk file
6. Now open the Putty and enter the host name, select SSH-
> authentication -> browse the private key and close it.
User must change the default “User name” and “Password”
$sudo raspi-config
Improve SSH security by using the following command -
$sudo nano /etc/ssh /sshd_config
User can make a use of FAIL2BAN, it is an intrusion
prevention software framework that protects computer
servers from malicious attacks, hence improves the security
of the Raspberry pi
It scans log files and bans IPs which are showing the
malicious signs, which make too many log in attempts or
performs unwanted activity.
HOW TO SET UP FAIL2BAN IN RPI?
Step1:$sudo apt-get installs fail2ban
During installation create a file “jail.conf”
Step2:$sudo
cp/etc/fail2ban/jail.conf/etc/fail2ban/jail.local
Step3: open file in nano editor:
sudo nano /etc/fail2ban/jail.local
Step4: within that use CTRL + W and search sshd
Type: enable = true
Filter =sshd
This shall process and enable the fail2ban and configure it.
7. CONCLUSION
We have a designed a smart system which reduces the
human efforts and provide the ease to operate the Smart
door, can access it from any corner of the world, providing a
good security. It is easy to upgrade, portable.Thesmartdoor
lock system using telegram is very efficient technique, which
allows the user to grant the access to the known person by
sending a back message to RPI and unlock the door. The
system uses various components like PIR sensor, camera
module, switch and telegram app on an android phone. The
networks security is also playing a vital role so that
raspberry pi could not be hacked. The coding is done using
python language and installation of a telegram is done using
CLI Telegram and some concept of Linux The networks
security is also playing a vital role so that raspberry pi could
not be hacked. The SSH key is used, which provides a good
network security. The Fail2ban software can also be used as
an additional security to Raspberry pi.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1404
REFERENCES
[1] Nareshkumar R. M.,Dnyaneshvari Shinde,- Smart Door
Security Control System Using Raspberry Pi Volume 6,
2347 – 8616 Issue 11 November 2017
[2] Reeta R -Smart Secure Door Lock System Using IoT And
Eigenface Approach,Volume 5, Issue 4 December 2017,
2320-2882
[3] Rishabh Kumar Gupta, S. Balamurugan, K. Aroul-IoT
Based Door Entry System Vol 9(37), DOI:
10.17485/ijst/2016/v9i37/102136,October2016,0974-
6846
[4] D.Kishore ,Shaik Anwar-Iot Based smart Home Security
System with Alert Door And Access Control UsingSmart
phone, vol-5 Issue 12,December 2016,2278-0181

More Related Content

What's hot

Home Automation System using iot
Home Automation System using iotHome Automation System using iot
Home Automation System using iot
Kowshik Deb
 
Home automation using internet of things
Home automation using internet of thingsHome automation using internet of things
Home automation using internet of things
Abhishek Bhadoria
 
IoT BASED SMART HOME USING ARDUINO
IoT BASED SMART HOME USING ARDUINOIoT BASED SMART HOME USING ARDUINO
IoT BASED SMART HOME USING ARDUINO
AYSHA S KABEER
 
Smart DoorBell - Make your door smart with Raspberry Pi!
Smart DoorBell - Make your door smart with Raspberry Pi!Smart DoorBell - Make your door smart with Raspberry Pi!
Smart DoorBell - Make your door smart with Raspberry Pi!
Mattia Brunetti
 
Home automation using IOT
Home automation using IOTHome automation using IOT
Home automation using IOT
Maneesh Devanaboyina
 
RFID BASED ATTENDANCE SYSTEM.pptx
RFID BASED ATTENDANCE SYSTEM.pptxRFID BASED ATTENDANCE SYSTEM.pptx
RFID BASED ATTENDANCE SYSTEM.pptx
Sudipto Krishna Dutta
 
Home Automation using Iot
Home Automation using IotHome Automation using Iot
Home Automation using Iot
Rabiya Mustafa
 
IoT home automation project
IoT home automation projectIoT home automation project
IoT home automation project
Shohin Aheleroff
 
Smart Shopping System
Smart Shopping SystemSmart Shopping System
Smart Shopping System
Mahantesh Hiremath
 
Home automation based iot
Home automation based iotHome automation based iot
Home automation based iot
tashushy
 
Final year project presentation IOT Based home security system
Final year project presentation IOT Based home security systemFinal year project presentation IOT Based home security system
Final year project presentation IOT Based home security system
SarmadMalik18
 
Presentation on home automation
Presentation on home automationPresentation on home automation
Presentation on home automation
Subhash Kumar Yadav
 
IOT: Home Automation using Android Application
IOT: Home Automation using Android ApplicationIOT: Home Automation using Android Application
IOT: Home Automation using Android Application
Nikhil Jadav
 
Smart Blind stick by using arduino uno and sensor
 Smart Blind stick  by using arduino  uno  and sensor Smart Blind stick  by using arduino  uno  and sensor
Smart Blind stick by using arduino uno and sensor
Mizoram University( A Central University)
 
Iot based home automation
Iot based home automationIot based home automation
Iot based home automation
geetha chandrathi
 
Iot based water quality monitoring system
Iot based water quality monitoring systemIot based water quality monitoring system
Iot based water quality monitoring system
Binayakreddy
 
smart Home security
smart Home securitysmart Home security
smart Home security
Arvind Narayanan
 
Smart digital door locking system
Smart digital door locking systemSmart digital door locking system
Smart digital door locking system
VISHAL NAGAR
 
RFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEMRFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEMavinash yada
 
Android Based Home Automation Control
Android Based Home Automation ControlAndroid Based Home Automation Control
Android Based Home Automation Control
Vivek Porwal
 

What's hot (20)

Home Automation System using iot
Home Automation System using iotHome Automation System using iot
Home Automation System using iot
 
Home automation using internet of things
Home automation using internet of thingsHome automation using internet of things
Home automation using internet of things
 
IoT BASED SMART HOME USING ARDUINO
IoT BASED SMART HOME USING ARDUINOIoT BASED SMART HOME USING ARDUINO
IoT BASED SMART HOME USING ARDUINO
 
Smart DoorBell - Make your door smart with Raspberry Pi!
Smart DoorBell - Make your door smart with Raspberry Pi!Smart DoorBell - Make your door smart with Raspberry Pi!
Smart DoorBell - Make your door smart with Raspberry Pi!
 
Home automation using IOT
Home automation using IOTHome automation using IOT
Home automation using IOT
 
RFID BASED ATTENDANCE SYSTEM.pptx
RFID BASED ATTENDANCE SYSTEM.pptxRFID BASED ATTENDANCE SYSTEM.pptx
RFID BASED ATTENDANCE SYSTEM.pptx
 
Home Automation using Iot
Home Automation using IotHome Automation using Iot
Home Automation using Iot
 
IoT home automation project
IoT home automation projectIoT home automation project
IoT home automation project
 
Smart Shopping System
Smart Shopping SystemSmart Shopping System
Smart Shopping System
 
Home automation based iot
Home automation based iotHome automation based iot
Home automation based iot
 
Final year project presentation IOT Based home security system
Final year project presentation IOT Based home security systemFinal year project presentation IOT Based home security system
Final year project presentation IOT Based home security system
 
Presentation on home automation
Presentation on home automationPresentation on home automation
Presentation on home automation
 
IOT: Home Automation using Android Application
IOT: Home Automation using Android ApplicationIOT: Home Automation using Android Application
IOT: Home Automation using Android Application
 
Smart Blind stick by using arduino uno and sensor
 Smart Blind stick  by using arduino  uno  and sensor Smart Blind stick  by using arduino  uno  and sensor
Smart Blind stick by using arduino uno and sensor
 
Iot based home automation
Iot based home automationIot based home automation
Iot based home automation
 
Iot based water quality monitoring system
Iot based water quality monitoring systemIot based water quality monitoring system
Iot based water quality monitoring system
 
smart Home security
smart Home securitysmart Home security
smart Home security
 
Smart digital door locking system
Smart digital door locking systemSmart digital door locking system
Smart digital door locking system
 
RFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEMRFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEM
 
Android Based Home Automation Control
Android Based Home Automation ControlAndroid Based Home Automation Control
Android Based Home Automation Control
 

Similar to IRJET- Smart Door Security System using Raspberry Pi with Telegram

Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemFace Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock System
IRJET Journal
 
Home Security System based on IOT: A Systematic Alert System
Home Security System based on IOT: A Systematic Alert SystemHome Security System based on IOT: A Systematic Alert System
Home Security System based on IOT: A Systematic Alert System
IRJET Journal
 
IRJET- Motion Activated Security System
IRJET-  	  Motion Activated Security SystemIRJET-  	  Motion Activated Security System
IRJET- Motion Activated Security System
IRJET Journal
 
S.W.A.T – Motion Based Intrusion Detection System
S.W.A.T – Motion Based Intrusion Detection SystemS.W.A.T – Motion Based Intrusion Detection System
S.W.A.T – Motion Based Intrusion Detection System
IRJET Journal
 
Bank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image ProcessingBank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image Processing
IRJET Journal
 
Designing Of Multifunctional Surveillance And Security System
Designing Of Multifunctional Surveillance And Security SystemDesigning Of Multifunctional Surveillance And Security System
Designing Of Multifunctional Surveillance And Security System
IRJET Journal
 
Secured Spy for Highly Secured Areas
Secured Spy for Highly Secured AreasSecured Spy for Highly Secured Areas
Secured Spy for Highly Secured Areas
IRJET Journal
 
IRJET- IOT based Intrusion Detection and Tracking System
IRJET- IOT based Intrusion Detection and Tracking SystemIRJET- IOT based Intrusion Detection and Tracking System
IRJET- IOT based Intrusion Detection and Tracking System
IRJET Journal
 
Raspberry pi ppt
Raspberry pi pptRaspberry pi ppt
Raspberry pi ppt
gummaavinash7
 
Comparative Study on Various System Based on Raspberry-Pi Technology
Comparative Study on Various System Based on Raspberry-Pi TechnologyComparative Study on Various System Based on Raspberry-Pi Technology
Comparative Study on Various System Based on Raspberry-Pi Technology
IRJET Journal
 
IRJET - Raspberry Pi based Intelligent Security System
IRJET -  	  Raspberry Pi based Intelligent Security SystemIRJET -  	  Raspberry Pi based Intelligent Security System
IRJET - Raspberry Pi based Intelligent Security System
IRJET Journal
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IRJET Journal
 
Home Automation System using Raspberry Pi
Home Automation System using Raspberry PiHome Automation System using Raspberry Pi
Home Automation System using Raspberry Pi
IRJET Journal
 
IRJET- Iot based Interactive Display Unit using Raspberry PI
IRJET- Iot based Interactive Display Unit using Raspberry PIIRJET- Iot based Interactive Display Unit using Raspberry PI
IRJET- Iot based Interactive Display Unit using Raspberry PI
IRJET Journal
 
IRJET- Iot Based Home Visitor Monitoring System using Raspberry Pi
IRJET-  	  Iot Based Home Visitor Monitoring System using Raspberry PiIRJET-  	  Iot Based Home Visitor Monitoring System using Raspberry Pi
IRJET- Iot Based Home Visitor Monitoring System using Raspberry Pi
IRJET Journal
 
Q180203109113
Q180203109113Q180203109113
Q180203109113
IOSR Journals
 
IRJET- H-Box (Connecting Homes)
IRJET- H-Box (Connecting Homes)IRJET- H-Box (Connecting Homes)
IRJET- H-Box (Connecting Homes)
IRJET Journal
 
Raspberry pi project smart motion detection system using raspberry pi 3
Raspberry pi project smart motion detection system using raspberry pi 3Raspberry pi project smart motion detection system using raspberry pi 3
Raspberry pi project smart motion detection system using raspberry pi 3
Bhaskar Nemala
 
IRJET - Smart Door System
IRJET - Smart Door SystemIRJET - Smart Door System
IRJET - Smart Door System
IRJET Journal
 
IRJET - IoT based Anti Theft Detection and Alerting System using Raspberry Pi
IRJET - IoT based Anti Theft Detection and Alerting System using Raspberry PiIRJET - IoT based Anti Theft Detection and Alerting System using Raspberry Pi
IRJET - IoT based Anti Theft Detection and Alerting System using Raspberry Pi
IRJET Journal
 

Similar to IRJET- Smart Door Security System using Raspberry Pi with Telegram (20)

Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemFace Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock System
 
Home Security System based on IOT: A Systematic Alert System
Home Security System based on IOT: A Systematic Alert SystemHome Security System based on IOT: A Systematic Alert System
Home Security System based on IOT: A Systematic Alert System
 
IRJET- Motion Activated Security System
IRJET-  	  Motion Activated Security SystemIRJET-  	  Motion Activated Security System
IRJET- Motion Activated Security System
 
S.W.A.T – Motion Based Intrusion Detection System
S.W.A.T – Motion Based Intrusion Detection SystemS.W.A.T – Motion Based Intrusion Detection System
S.W.A.T – Motion Based Intrusion Detection System
 
Bank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image ProcessingBank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image Processing
 
Designing Of Multifunctional Surveillance And Security System
Designing Of Multifunctional Surveillance And Security SystemDesigning Of Multifunctional Surveillance And Security System
Designing Of Multifunctional Surveillance And Security System
 
Secured Spy for Highly Secured Areas
Secured Spy for Highly Secured AreasSecured Spy for Highly Secured Areas
Secured Spy for Highly Secured Areas
 
IRJET- IOT based Intrusion Detection and Tracking System
IRJET- IOT based Intrusion Detection and Tracking SystemIRJET- IOT based Intrusion Detection and Tracking System
IRJET- IOT based Intrusion Detection and Tracking System
 
Raspberry pi ppt
Raspberry pi pptRaspberry pi ppt
Raspberry pi ppt
 
Comparative Study on Various System Based on Raspberry-Pi Technology
Comparative Study on Various System Based on Raspberry-Pi TechnologyComparative Study on Various System Based on Raspberry-Pi Technology
Comparative Study on Various System Based on Raspberry-Pi Technology
 
IRJET - Raspberry Pi based Intelligent Security System
IRJET -  	  Raspberry Pi based Intelligent Security SystemIRJET -  	  Raspberry Pi based Intelligent Security System
IRJET - Raspberry Pi based Intelligent Security System
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
 
Home Automation System using Raspberry Pi
Home Automation System using Raspberry PiHome Automation System using Raspberry Pi
Home Automation System using Raspberry Pi
 
IRJET- Iot based Interactive Display Unit using Raspberry PI
IRJET- Iot based Interactive Display Unit using Raspberry PIIRJET- Iot based Interactive Display Unit using Raspberry PI
IRJET- Iot based Interactive Display Unit using Raspberry PI
 
IRJET- Iot Based Home Visitor Monitoring System using Raspberry Pi
IRJET-  	  Iot Based Home Visitor Monitoring System using Raspberry PiIRJET-  	  Iot Based Home Visitor Monitoring System using Raspberry Pi
IRJET- Iot Based Home Visitor Monitoring System using Raspberry Pi
 
Q180203109113
Q180203109113Q180203109113
Q180203109113
 
IRJET- H-Box (Connecting Homes)
IRJET- H-Box (Connecting Homes)IRJET- H-Box (Connecting Homes)
IRJET- H-Box (Connecting Homes)
 
Raspberry pi project smart motion detection system using raspberry pi 3
Raspberry pi project smart motion detection system using raspberry pi 3Raspberry pi project smart motion detection system using raspberry pi 3
Raspberry pi project smart motion detection system using raspberry pi 3
 
IRJET - Smart Door System
IRJET - Smart Door SystemIRJET - Smart Door System
IRJET - Smart Door System
 
IRJET - IoT based Anti Theft Detection and Alerting System using Raspberry Pi
IRJET - IoT based Anti Theft Detection and Alerting System using Raspberry PiIRJET - IoT based Anti Theft Detection and Alerting System using Raspberry Pi
IRJET - IoT based Anti Theft Detection and Alerting System using Raspberry Pi
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 

Recently uploaded (20)

ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 

IRJET- Smart Door Security System using Raspberry Pi with Telegram

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1400 Smart Door Security System using Raspberry Pi with Telegram Shivani Desai1, Virendra D Pawar2 1Shivani Desai, Dept. of Computer Engineering, Vishwakarma Institute of Technology, Pune, Maharashtra 2Virendra D Pawar, Asst. Professor, Dept. of computer Engineering, Vishwakarma Institute of Technology, Pune, Maharashtra ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - In modern world, the IoT is at its peak. Theworld is becoming smarter, the homeautomationisemerging. Smart Door control system is a latest technology in home automation. The main purpose of smart Door technology is to provide a complete security to the door, ease and comfort for users. The aim of this paper is to enlarge the door automation technique using Raspberry pi andandroidphone. Raspberrypi controls PIR sensor, camera module, bell button, whichis used in detecting the motion of a arrival of a person, capturing an image of a person as soon as the bell is being pressed and sends the still image to the android device through telegram app and alerts the owner about the person standing at the door. The entire systems programminghasbeenestablishedin python 3.5 domains for raspberry pi operations. Key Words: IoT, Telegram, Raspberry pi, python, Putty, Security 1. INTRODUCTION In today’s era every “thing” has its unique identity that is what IoT (Internet of Things) is. It enables the connectivity with physical devices and allows user to transfer the data across the world through the networks. The technology is playing a vital role in day-to-days life. Likewise the security. The main objective of this project is to build a system that will control the door using a smart phone. This system includes various components like a Raspberry Pi model B3 (Inbuilt-Wi-Fi), PIR Sensor, Bell, Camera Module and a Telegram App for getting the notification on an Android Device. The Purpose of this system is that whenever the person arrives in front of the door , the person’s motion is been detected by a PIR sensor and as soon as he/she presses the bell button, the camera captures the image and the still image is sent on a telegram app of an android device. The components are connected via raspberry pi which has an internet connection through Wi-Fi. The user can unlock the door with the help of a mobile phone as soon as he/she gets notification. The user will unlock the door if the person is known and will give authentication to enter the house. Now a day’s security plays a foremost role as per as high- tech things are taken into the consideration “more the technology, higher the security”. This paper procures the security to the raspberry pi, to secure it from gettinghacked. SSH keys (asymmetric cryptography) network security is being used in this project. User can also use a FAIL2BAN method to secure your raspberry pi. 2. LITERATURE REVIEW Nareshkumar R.[1]This paper is related to design a home based automation system using smart phone andRPIhaving biometric system. It captures the images when sensed through PIR sensor, and using GSM technology the communication has been done between the system and a computer. Reeta R[2]This paper uses the Eigen face detection technique, where image is been captured using a snippet code detecting the features of a person, the captured images are stored into the database and. Access is given to the members particularly whose image is already in the database , alert is send if unauthorized face is detectedusing GSM. Rishabh Kumar Gupta [3] This paper consist of remote access control system, switch and the speaker is used for interacting with the guest standing right outside at thedoor. Zigbee module is designed to support wireless sensor network. Image is captured to the primary host and if needed then to the secondary host, so locking and unlocking of door is done. D.Kishore[4]This paper uses the Raspberry pi, PIR sensor which captures the images, saves it on the system and sends it through Email via TCP/IP. Entire system is built using ARM1176JZF-S microcontroller, implementation is done on smart phone using JavaScript. 3. SYSTEM OVERVIEW Fig-1 Functional Block Diagram Motion Detected Bell Pressed Sent on Android Image Captured User notified Person known Door Unlocked
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1401 As shown in fig-1 The Motion is detected using PIR sensor, and when bell is pressed still image is captured and sent to a user on an android app ,user gets notified , and if the person is known then the door is unlocked by the owner. System requires following components: 1. Raspberry pi B3 2. PIR Sensor 3. Camera Module 4. Wi-Fi Module 5. Telegram App 1 Raspberry pi-3 Model B: Fig-2 Raspberry pi-3 ModelB Raspberry pi is a small credit card size computer, which acts as a heart of the whole system. Its a BCM2837 processor, System on chip (SoC) With an ARM having a CPU and GPU. The CPU consist of Quad core ARM-Cortex A53, 64 bit. Consisting of 1GB RAM. The RPI include a wireless connectivity with802.11 wirelessLAN (Wi-Fi)andBluetooth 4.1, 4*USB 2.0 ports, a set of GPIO (2*20 pins) header. It also has an audio jack, a camera interface,display interface,HDMI port. It requires a power supply of min 2.5 A for glowing up the repositioned Led’s. It has a small SD card slot at its back, inserting the OS, other files import it in the card and then export all the files and get started .Changes can be made as per the requirements. $sudo apt-get update && sudo apt-get update $Sudo reboot The above commands will help user to update the raspberry pi and can proceed further to configure the pi. 2 PIR sensor: Fig-3 PIR Sensor PIR (Passive Infrared sensor) is an electronic component that measures any kind of object (person / animal in the field. The window behind the lens is made up of IR- transmissive material. TheFresnel lenscondenseslightupto some 6-7 meters and its highly sensitive. It has a pins consisting of VCC, Ground and the Output. The output is given to GPIO pins of Raspberry pi through 5V of power supply to the VCC. 3 Camera Module Fig-4 Camera Module The camera module is a 5MP customized designed camera for a raspberry pi. It has a small socket at the board named as ‘Camera Interface’ situated between HDMI port and Ethernet. Insert the camera module intoits slot,designed for interfacing a camera. This module allows the user tocapture the still images and also to record a video in full HD. When the picture is taken its camera preview is opened for few seconds, using python coding adjust the resolution andsend the image to an android app. “Sudo raspi-config” is the command which allows you to enable the camera module on raspberry pi. 4 Wi-Fi Module: Wi-Fi is a wireless technology that provides high speed connectivity. It is trademarked as IEEE 802.11x. it is supported by many applications such as videogames , home networks , mobile phone etc. The Wi-Fi is the mostfavorable choice for IoT now days which will increase the speed of connecting the network worldwide. In this system the Raspberry pi has a in-built Wi-Fi, hence accessing it from anywhere, controlling the raspberry pi
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1402 5 Telegram App on Android Phone: Fig-5 Telegram App The telegram app is heavily encrypted app. It delivers the messages, images, documents, files faster than other apps.It is highly secured from attackers, as it has end – to end encryption and it is a cloud based app. It can be accessed from multiple devices as well. It also procures a “Secret Chat” facility which has self destructing feature. 4. METHODOLOGY When the person arrives at a home and stands in the front on the door, he/she will get detected byPIR motiondetector, Led glows as motion is detected, ThePIR sensorisconnected to raspberry pi, it has three pins. The GND pin is connected to GND of RPI, VCC is connected to 5V and the output is connected with any GPIO pin. As soon as the person will press the bell the image is captured with the help of a camera module. The push button is used as a switch, inserted in a breadboard, one wire is connected with GND and other is connected to some GPIO pin. The image of a person is captured and stored in a RPI andimmediatelysend on an android phone, whenever the bell is pressed. The CLI- Telegram is used on an mobile phone, Linux commands are used for the installation process, since telegram is highly secured app, has various features like Secret chat, hasendto end encryption and also can send data and files up to 1.5 GB. User need to add the contact details while installation process , the data will be save in the script call tg.sh and the photos will be saved in a script tg_photo.sh , thesescriptsare saved in home/pi/tg. Then after the still image is been sent, the user will unlock the door if the person is known. The unlocking of door is done when a user presses ‘’1” on a telegram itwill unlock the door. The requirement of this projects include a Raspberry pi model 3B having a SD card which has a Raspbian OS , a switch , a camera module of 5Mp , a PIR sensor and an android phone with installation of an telegram app in it. It also requires a power supply of 1.5A to even 2A, a USB cable. The coding is done in python having a python IDLE version 3.6. The necessary modules and libraries are also imported. The Network security is playing a Vital role, the PUTTY and PUTTY GEN are used for SSH (secure shell) The SSH key is generated using a asymmetric cipher i.e. generation one public and private key. The public key can be shared among users, while a private key remains with the owner. 5. FLOWCHART AND ALGORITHM No No Yes Yes No Yes Intruder Detected Door remain close PIR Sensor Person Arrives Start Initialize Raspberry pi, Camera, PIR sensor, Bell Button Bell presse d Image Sent & user notified on mobile phone User choice Unlock the door Stop
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1403 1. Start 2. Initialize Raspberry pi, camera module, PIR sensor, Bell Button etc 3. If person arrives, he/she will get detected by PIR sensor 4. If the person presses the bell, then the image is captured by the camera and will send a notification and a snap on a smart phone. 5. The telegram app is been used to get the notification on a smart phone. 6. The snap is sent, it’s a user choice to open a door or to keep it close. 7. Stop. Fig-6 Complete Setup 6. NETWORK SECURITY SSH (Secure Shell) is a cryptographic Network protocol which is used for securing a raspberry pi. SSH uses an Asymmetric Cipher an algorithm that performs encryption and decryption. As SSH key has a user name and password which can be stolen in the middle, but the SSH generates a pair of key: Public and Private Key. The data can be encrypted by using a user’s public key and can be only decrypted by the private key. In this project Putty and putty Generator are used for generating the SSH for securing a raspberry pi HOW TO SECURE RPI USING SSH: 1. Download Putty and key Generator. 2. Select key generator and click on “import- key”. 3. Generate the passphrase. 4. Putty will generate the public and private key 5. Save the private key with .ppk file 6. Now open the Putty and enter the host name, select SSH- > authentication -> browse the private key and close it. User must change the default “User name” and “Password” $sudo raspi-config Improve SSH security by using the following command - $sudo nano /etc/ssh /sshd_config User can make a use of FAIL2BAN, it is an intrusion prevention software framework that protects computer servers from malicious attacks, hence improves the security of the Raspberry pi It scans log files and bans IPs which are showing the malicious signs, which make too many log in attempts or performs unwanted activity. HOW TO SET UP FAIL2BAN IN RPI? Step1:$sudo apt-get installs fail2ban During installation create a file “jail.conf” Step2:$sudo cp/etc/fail2ban/jail.conf/etc/fail2ban/jail.local Step3: open file in nano editor: sudo nano /etc/fail2ban/jail.local Step4: within that use CTRL + W and search sshd Type: enable = true Filter =sshd This shall process and enable the fail2ban and configure it. 7. CONCLUSION We have a designed a smart system which reduces the human efforts and provide the ease to operate the Smart door, can access it from any corner of the world, providing a good security. It is easy to upgrade, portable.Thesmartdoor lock system using telegram is very efficient technique, which allows the user to grant the access to the known person by sending a back message to RPI and unlock the door. The system uses various components like PIR sensor, camera module, switch and telegram app on an android phone. The networks security is also playing a vital role so that raspberry pi could not be hacked. The coding is done using python language and installation of a telegram is done using CLI Telegram and some concept of Linux The networks security is also playing a vital role so that raspberry pi could not be hacked. The SSH key is used, which provides a good network security. The Fail2ban software can also be used as an additional security to Raspberry pi.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1404 REFERENCES [1] Nareshkumar R. M.,Dnyaneshvari Shinde,- Smart Door Security Control System Using Raspberry Pi Volume 6, 2347 – 8616 Issue 11 November 2017 [2] Reeta R -Smart Secure Door Lock System Using IoT And Eigenface Approach,Volume 5, Issue 4 December 2017, 2320-2882 [3] Rishabh Kumar Gupta, S. Balamurugan, K. Aroul-IoT Based Door Entry System Vol 9(37), DOI: 10.17485/ijst/2016/v9i37/102136,October2016,0974- 6846 [4] D.Kishore ,Shaik Anwar-Iot Based smart Home Security System with Alert Door And Access Control UsingSmart phone, vol-5 Issue 12,December 2016,2278-0181