SlideShare a Scribd company logo
A Presentation on
iSecure – 3FA Smart Lock
- PresentedBy-
SamiranDas
(CSM16015)
External Guide
Mr.Suresh V
Associate Director
HCDCGroup
CDAC,Pune
Internal Guide
Dr.Nabajyoti Medhi
Assistant Professor
Dept. ofCSE,
Tezpur University
Date – 03.06.2019
CONTENTS
1. Introductionto IoT --------------------------------------- Slide 3
2. Problem Definition ----------------------------------- Slide 4
3. Objectives & Goals --------------------------------------------- Slide 5
4. MarketStudy --------------------------------------------- Slide 6
5. TheProposed System --------------------------------------------- Slide 7
6. Hardware &Software Used ------------------------------------ Slide 8-9
7. System Design &Analysis ------------------------------------- Slide 10-12
8. System Implementation ----------------------------------------------- Slide 13
9. Conclusion & FutureScope ----------------------------------- Slide 14-15
10. References ------------------------------------------- Slide 16
INTRODUCTIONTOIoT
Internet of Things (IoT) is an ecosystem of
connected physical objects that are accessible
through internet.
IoT enforces –
 Communication
 Automation
 Information
PROBLEM DEFINITION
The security aspect of IoT connected devices is of higher significance.
For a product owner to hold an acceptable implementation of the smart lock,
we generalized the problems as follows -
☞ How to setup a smart lock that is sufficiently secure so that the breaching factor can be minimized
ensuring strong privacy?
☞ How to provide a user friendly interface and experience regardless of how complex the security
architecture is?
☞ How to provide a lock that is durable, reliable and efficient yet budget friendly?
☞ How to develop a lock that can keep logs of all ethical and suspicious attempts to unlock the door?
OBJECTIVES& GOALS
The main objectives of the proposed system are as follows –
 To provide a secure locking mechanism to the user that is trustworthy and acceptable.
 To provide an easy user interface to the user so that the operations with lock can be made hassle free.
 To develop a system which can communicate with the lock and keep all its logs may it be authenticated or
an unauthorized attempt.
 To develop a lock that is durable, robust and yet economical.
The proposed system implements the following functions –
 Will able to unlock the lock using a three factor authentication mechanism
 Will able to get the logs of all authorized and unauthorized attempts
 Will be able to add, remove and change user information on the database.
 Will be able to track faulty attempts as each events will be recorded.
MARKET STUDY
 The global smart lock market size was estimated at USD 559.4 million in 2016.
 The demand for smart locks is expected to exceed 135 million units by 2024.
 The demand for smart lock is
increased exponentially.
 Around 50% smart locks are used
In residential areas.
Adoption of sophisticated keyless
access devices is relatively more
conventional in mature markets.
Global Market of Smart Lock
PROPOSED SYSTEM
iSECURE – 3FA SMART LOCK
INTELLIGENT
SECURE
THREE FACTOR AUTHENTICATION
SMART LOCK
Block Diagram of Proposed System
iSECURE – 3FA SMART LOCK is a intelligent secure smart lock powered by three factor
authentication security.
[ 3FA are RFID , PIN & OTP ]
HARDWARE& SOFTWAREUSED
Hardware Used -
Raspberry Pi 3 B 3.5 inch Touch Screen USB RFID Card Reader
12V Electric Strike 1 – Channel Relay Module DC – DC Converter
HARDWARE& SOFTWAREUSED
Software Used -
Twilio Cloud Messaging API
Spyder IDE
Raspbian Stretch GUI
My-SQL Apache Web Server
SYSTEMANALYSIS& DESIGN
The proposed three factor authentication smart lock will provide a 3 step authentication process via
🔑 RFID, 🔑PIN  and 🔑a random 6-digit generated OTP.
Features
☞ Secure access to resources
☞ Fast and reliable
☞ Keeps logs of all attempts
☞ Easy and lucid UI
☞ Touch based for better UX
☞ Add multiple users
☞ Manipulate existing users
☞ Less space requirement
☞ User Privacy
SYSTEMANALYSIS& DESIGN
Work Flow Architecture
SYSTEMANALYSIS& DESIGN
Database of the System
SYSTEMIMPLEMENTATION
Sl No. Components Purpose
Raspberry Pi It is considered as the heart and the
brain of the system. It checks the RFID,
PIN and OTP data entered as an input,
sends signal to the relay to activate and
deactivate the lock accordingly.
Relay Module It works as a switch that works on
signal receives from raspberry pi to
drive the electric lock.
DC Power Module It satisfies the power need of the
system. It provides 5V to raspberry pi
and the relay module and 12V to the
electric lock.
RFID Reader It reads the data of RFID card or key
fob and fetches it to raspberry pi.
TFT Touch Screen It presents a GUI for the whole system
to interact with the user as well as
takes input such as PIN and OTP.
System
Prototype
Internal
Circuitry
Conclusion
Thus, the iSecure – 3FA Smart Lock prototype designed and implemented
is an innovative physical securing mechanism. The system employs three
factor authentication (3FA) which makes it robust to bypass or break.
The event logging facility ensures that all the events along with
relevant data and time stamp are recorded for analytics, audit and
future investigations. The system deploys open source hardware and
embraces simple and affordable building blocks, thereby reducing the
overall cost.
The proposed system has much scope of futuristic improvements. The
smart lock can be customized for easy configuration such that any
number or any type of authentication factor can be included. The
authentication layers such as face detection, bio-metric, GPS, Voice
enabled and the likes can be included as desired. The proposed Smart
lock prototype can be embedded with tampered-proof, battery backup
along with power indications and similar mechanisms and necessary
notifications.
Futurescope
References
[1] Kristoffer Djupsjö Masar Almosawi, “IoT Security Applied on a Smart Door Lock Application”, KTH Royal Institute of Technology,
2018
[2] Region, And Segment Forecasts, “Smart Lock Market Size, Share & Trends Analysis Report By Type (Deadbolt, Lever Handle,
Padlock), By Application (Residential, Hospitality, Enterprise, Critical Infrastructure)”, Grand View Research, Inc.: Market Research
Reports & Consulting, 2018
[3] Are smart locks secure? AV-TEST has the answer, https://www.techrepublic.com/article/are-smart-locks-secure-av-test-has-the-answer.
[4] Jayant Dabhade, Amirush Javare, Tushar Ghayal, Ankur Shelar, Ankita Gupta, “Smart Door Lock System: Improving Home Security
using Bluetooth Technology”, International Journal of Computer Applications (0975 – 8887) Volume 160 – No 8, February 2017
[5] Rahul Satoskar , Akarsh Mishra, “Smart Door Lock and Lighting System using Internet of Things”, International Journal of Computer
Science and Information Technologies, Vol. 9 (5) , 2018, 132-135
[6] Adarsh V Patil , Akshay S, CHandanB Patgar, Sreevarsha Prakash, Mahadevaswamy, Sharath Kumar A J, “Android Based Smart Door
Locking System ", International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Published by, www.ijert.org
NCESC - 2018 Conference Proceedings, Volume 6, Issue 13
[7] Nareshkumar R. M., Apoorva Kamat, Dnyaneshvari Shinde, “Smart Door Security Control System Using Raspberry Pi”, International
Journal of Innovations & Advancement in Computer Science, ISSN 2347 – 8616 Volume 6, Issue 11 November 2017
[8] Chi-Huang Hung, Ying-Wen Bai, Je-Hong Ren, “Design and implementation of a door lock control based on a near field communication
of a smartphone”, IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW), 2015, DOI: 10.1109/ICCE-
TW.2015.7216992
[9] Bill Phillips, “The Complete Book of Locks and Locksmithing, Seventh Edition”, McGraw Hill Professional, 21-Oct-2016

More Related Content

What's hot

Home automation using blynk app with fan direction control and displaying sta...
Home automation using blynk app with fan direction control and displaying sta...Home automation using blynk app with fan direction control and displaying sta...
Home automation using blynk app with fan direction control and displaying sta...
Diwash Kapil Chettri
 
IoT Based Home Automation System over Cloud
IoT Based Home Automation System over CloudIoT Based Home Automation System over Cloud
IoT Based Home Automation System over Cloud
ijtsrd
 
Home automation using IOT
Home automation using IOTHome automation using IOT
Home automation using IOT
Maneesh Devanaboyina
 
Home automation using wifi
Home automation using wifiHome automation using wifi
Home automation using wifi
Khairunnisa Naaz
 
Iot home automation varsha,ashish,sagar,arvind
Iot home automation  varsha,ashish,sagar,arvindIot home automation  varsha,ashish,sagar,arvind
Iot home automation varsha,ashish,sagar,arvind
Ashish Chourasiya
 
Automated home secuirty project
Automated home secuirty projectAutomated home secuirty project
Automated home secuirty project
Siddharth Chaudhary
 
Home automation using IoT literature review ppt
Home automation using IoT literature review pptHome automation using IoT literature review ppt
Home automation using IoT literature review ppt
Tanujkumar101
 
IoT home automation project
IoT home automation projectIoT home automation project
IoT home automation project
Shohin Aheleroff
 
IRJET- Smart Home Automation using IoT with Security Features
IRJET- Smart Home Automation using IoT with Security FeaturesIRJET- Smart Home Automation using IoT with Security Features
IRJET- Smart Home Automation using IoT with Security Features
IRJET Journal
 
Home automation in client server using NodeMcu approach along with user notif...
Home automation in client server using NodeMcu approach along with user notif...Home automation in client server using NodeMcu approach along with user notif...
Home automation in client server using NodeMcu approach along with user notif...
Brundha Sholaganga
 
IoT Based home automation system using Arduino board
IoT Based home automation system using Arduino boardIoT Based home automation system using Arduino board
IoT Based home automation system using Arduino board
IRJET Journal
 
IoT Home Automation System
IoT Home Automation SystemIoT Home Automation System
IoT Home Automation System
Pratibha Chaudhary
 
Women Security Assistance system with GPS tracking and messaging system
Women Security Assistance system with GPS tracking and messaging system Women Security Assistance system with GPS tracking and messaging system
Women Security Assistance system with GPS tracking and messaging system
Uttej Kumar Palavai
 
Home automation using internet of things
Home automation using internet of thingsHome automation using internet of things
Home automation using internet of things
Abhishek Bhadoria
 
home automation using esp8266
home automation using esp8266home automation using esp8266
home automation using esp8266
smit bakori
 
Home automation based iot
Home automation based iotHome automation based iot
Home automation based iot
tashushy
 
Smart home automation - Internet of Things
Smart home automation - Internet of ThingsSmart home automation - Internet of Things
Smart home automation - Internet of Things
Vinsol
 
Home automation- An Iot application
Home automation- An Iot applicationHome automation- An Iot application
Home automation- An Iot application
Archana Golhar
 
CEIS101: IoT Home Security System
CEIS101: IoT Home Security SystemCEIS101: IoT Home Security System
CEIS101: IoT Home Security System
BillBlanco
 
Iot based home automation
Iot based home automationIot based home automation
Iot based home automation
geetha chandrathi
 

What's hot (20)

Home automation using blynk app with fan direction control and displaying sta...
Home automation using blynk app with fan direction control and displaying sta...Home automation using blynk app with fan direction control and displaying sta...
Home automation using blynk app with fan direction control and displaying sta...
 
IoT Based Home Automation System over Cloud
IoT Based Home Automation System over CloudIoT Based Home Automation System over Cloud
IoT Based Home Automation System over Cloud
 
Home automation using IOT
Home automation using IOTHome automation using IOT
Home automation using IOT
 
Home automation using wifi
Home automation using wifiHome automation using wifi
Home automation using wifi
 
Iot home automation varsha,ashish,sagar,arvind
Iot home automation  varsha,ashish,sagar,arvindIot home automation  varsha,ashish,sagar,arvind
Iot home automation varsha,ashish,sagar,arvind
 
Automated home secuirty project
Automated home secuirty projectAutomated home secuirty project
Automated home secuirty project
 
Home automation using IoT literature review ppt
Home automation using IoT literature review pptHome automation using IoT literature review ppt
Home automation using IoT literature review ppt
 
IoT home automation project
IoT home automation projectIoT home automation project
IoT home automation project
 
IRJET- Smart Home Automation using IoT with Security Features
IRJET- Smart Home Automation using IoT with Security FeaturesIRJET- Smart Home Automation using IoT with Security Features
IRJET- Smart Home Automation using IoT with Security Features
 
Home automation in client server using NodeMcu approach along with user notif...
Home automation in client server using NodeMcu approach along with user notif...Home automation in client server using NodeMcu approach along with user notif...
Home automation in client server using NodeMcu approach along with user notif...
 
IoT Based home automation system using Arduino board
IoT Based home automation system using Arduino boardIoT Based home automation system using Arduino board
IoT Based home automation system using Arduino board
 
IoT Home Automation System
IoT Home Automation SystemIoT Home Automation System
IoT Home Automation System
 
Women Security Assistance system with GPS tracking and messaging system
Women Security Assistance system with GPS tracking and messaging system Women Security Assistance system with GPS tracking and messaging system
Women Security Assistance system with GPS tracking and messaging system
 
Home automation using internet of things
Home automation using internet of thingsHome automation using internet of things
Home automation using internet of things
 
home automation using esp8266
home automation using esp8266home automation using esp8266
home automation using esp8266
 
Home automation based iot
Home automation based iotHome automation based iot
Home automation based iot
 
Smart home automation - Internet of Things
Smart home automation - Internet of ThingsSmart home automation - Internet of Things
Smart home automation - Internet of Things
 
Home automation- An Iot application
Home automation- An Iot applicationHome automation- An Iot application
Home automation- An Iot application
 
CEIS101: IoT Home Security System
CEIS101: IoT Home Security SystemCEIS101: IoT Home Security System
CEIS101: IoT Home Security System
 
Iot based home automation
Iot based home automationIot based home automation
Iot based home automation
 

Similar to i-Secure - 3FA Smart Lock

IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET Journal
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET Journal
 
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- 	  Design and Development Modish Smart Key Box using RFID based on Ard...IRJET- 	  Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET Journal
 
Design of Banking Security System Using Mems And Rfid Technology
Design of Banking Security System Using Mems And Rfid TechnologyDesign of Banking Security System Using Mems And Rfid Technology
Design of Banking Security System Using Mems And Rfid Technology
theijes
 
To protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technologyTo protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technology
eSAT Journals
 
IRJET - Smart Doorbell System
 IRJET - Smart Doorbell System IRJET - Smart Doorbell System
IRJET - Smart Doorbell System
IRJET Journal
 
IRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFIDIRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFID
IRJET Journal
 
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET-  	  Enhanced SIT Algorithm for Embedded SystemsIRJET-  	  Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET Journal
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security System
IJERA Editor
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security System
IJERA Editor
 
IRJET - Android based Secure and Smart Home Application using IoT
IRJET -  	  Android based Secure and Smart Home Application using IoTIRJET -  	  Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoT
IRJET Journal
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
IRJET Journal
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
IRJET Journal
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET Journal
 
Artificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber SecurityArtificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber Security
IRJET Journal
 
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdfIRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET Journal
 
IRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking System
IRJET Journal
 
IoT and Fingerprint Based Door Looking System
IoT and Fingerprint Based Door Looking SystemIoT and Fingerprint Based Door Looking System
IoT and Fingerprint Based Door Looking System
rahulmonikasharma
 
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET-  	  Identification of Location of Laptop Devices using Raspberry Pi Mo...IRJET-  	  Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET Journal
 
IRJET- Smart Monitoring System for Industrial Automation (IoT Based)
IRJET- Smart Monitoring System for Industrial Automation (IoT Based)IRJET- Smart Monitoring System for Industrial Automation (IoT Based)
IRJET- Smart Monitoring System for Industrial Automation (IoT Based)
IRJET Journal
 

Similar to i-Secure - 3FA Smart Lock (20)

IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
 
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- 	  Design and Development Modish Smart Key Box using RFID based on Ard...IRJET- 	  Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
 
Design of Banking Security System Using Mems And Rfid Technology
Design of Banking Security System Using Mems And Rfid TechnologyDesign of Banking Security System Using Mems And Rfid Technology
Design of Banking Security System Using Mems And Rfid Technology
 
To protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technologyTo protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technology
 
IRJET - Smart Doorbell System
 IRJET - Smart Doorbell System IRJET - Smart Doorbell System
IRJET - Smart Doorbell System
 
IRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFIDIRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFID
 
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET-  	  Enhanced SIT Algorithm for Embedded SystemsIRJET-  	  Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded Systems
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security System
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security System
 
IRJET - Android based Secure and Smart Home Application using IoT
IRJET -  	  Android based Secure and Smart Home Application using IoTIRJET -  	  Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoT
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
 
Artificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber SecurityArtificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber Security
 
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdfIRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
 
IRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking System
 
IoT and Fingerprint Based Door Looking System
IoT and Fingerprint Based Door Looking SystemIoT and Fingerprint Based Door Looking System
IoT and Fingerprint Based Door Looking System
 
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET-  	  Identification of Location of Laptop Devices using Raspberry Pi Mo...IRJET-  	  Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
 
IRJET- Smart Monitoring System for Industrial Automation (IoT Based)
IRJET- Smart Monitoring System for Industrial Automation (IoT Based)IRJET- Smart Monitoring System for Industrial Automation (IoT Based)
IRJET- Smart Monitoring System for Industrial Automation (IoT Based)
 

Recently uploaded

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 

Recently uploaded (20)

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 

i-Secure - 3FA Smart Lock

  • 1. A Presentation on iSecure – 3FA Smart Lock - PresentedBy- SamiranDas (CSM16015) External Guide Mr.Suresh V Associate Director HCDCGroup CDAC,Pune Internal Guide Dr.Nabajyoti Medhi Assistant Professor Dept. ofCSE, Tezpur University Date – 03.06.2019
  • 2. CONTENTS 1. Introductionto IoT --------------------------------------- Slide 3 2. Problem Definition ----------------------------------- Slide 4 3. Objectives & Goals --------------------------------------------- Slide 5 4. MarketStudy --------------------------------------------- Slide 6 5. TheProposed System --------------------------------------------- Slide 7 6. Hardware &Software Used ------------------------------------ Slide 8-9 7. System Design &Analysis ------------------------------------- Slide 10-12 8. System Implementation ----------------------------------------------- Slide 13 9. Conclusion & FutureScope ----------------------------------- Slide 14-15 10. References ------------------------------------------- Slide 16
  • 3. INTRODUCTIONTOIoT Internet of Things (IoT) is an ecosystem of connected physical objects that are accessible through internet. IoT enforces –  Communication  Automation  Information
  • 4. PROBLEM DEFINITION The security aspect of IoT connected devices is of higher significance. For a product owner to hold an acceptable implementation of the smart lock, we generalized the problems as follows - ☞ How to setup a smart lock that is sufficiently secure so that the breaching factor can be minimized ensuring strong privacy? ☞ How to provide a user friendly interface and experience regardless of how complex the security architecture is? ☞ How to provide a lock that is durable, reliable and efficient yet budget friendly? ☞ How to develop a lock that can keep logs of all ethical and suspicious attempts to unlock the door?
  • 5. OBJECTIVES& GOALS The main objectives of the proposed system are as follows –  To provide a secure locking mechanism to the user that is trustworthy and acceptable.  To provide an easy user interface to the user so that the operations with lock can be made hassle free.  To develop a system which can communicate with the lock and keep all its logs may it be authenticated or an unauthorized attempt.  To develop a lock that is durable, robust and yet economical. The proposed system implements the following functions –  Will able to unlock the lock using a three factor authentication mechanism  Will able to get the logs of all authorized and unauthorized attempts  Will be able to add, remove and change user information on the database.  Will be able to track faulty attempts as each events will be recorded.
  • 6. MARKET STUDY  The global smart lock market size was estimated at USD 559.4 million in 2016.  The demand for smart locks is expected to exceed 135 million units by 2024.  The demand for smart lock is increased exponentially.  Around 50% smart locks are used In residential areas. Adoption of sophisticated keyless access devices is relatively more conventional in mature markets. Global Market of Smart Lock
  • 7. PROPOSED SYSTEM iSECURE – 3FA SMART LOCK INTELLIGENT SECURE THREE FACTOR AUTHENTICATION SMART LOCK Block Diagram of Proposed System iSECURE – 3FA SMART LOCK is a intelligent secure smart lock powered by three factor authentication security. [ 3FA are RFID , PIN & OTP ]
  • 8. HARDWARE& SOFTWAREUSED Hardware Used - Raspberry Pi 3 B 3.5 inch Touch Screen USB RFID Card Reader 12V Electric Strike 1 – Channel Relay Module DC – DC Converter
  • 9. HARDWARE& SOFTWAREUSED Software Used - Twilio Cloud Messaging API Spyder IDE Raspbian Stretch GUI My-SQL Apache Web Server
  • 10. SYSTEMANALYSIS& DESIGN The proposed three factor authentication smart lock will provide a 3 step authentication process via 🔑 RFID, 🔑PIN  and 🔑a random 6-digit generated OTP. Features ☞ Secure access to resources ☞ Fast and reliable ☞ Keeps logs of all attempts ☞ Easy and lucid UI ☞ Touch based for better UX ☞ Add multiple users ☞ Manipulate existing users ☞ Less space requirement ☞ User Privacy
  • 13. SYSTEMIMPLEMENTATION Sl No. Components Purpose Raspberry Pi It is considered as the heart and the brain of the system. It checks the RFID, PIN and OTP data entered as an input, sends signal to the relay to activate and deactivate the lock accordingly. Relay Module It works as a switch that works on signal receives from raspberry pi to drive the electric lock. DC Power Module It satisfies the power need of the system. It provides 5V to raspberry pi and the relay module and 12V to the electric lock. RFID Reader It reads the data of RFID card or key fob and fetches it to raspberry pi. TFT Touch Screen It presents a GUI for the whole system to interact with the user as well as takes input such as PIN and OTP. System Prototype Internal Circuitry
  • 14. Conclusion Thus, the iSecure – 3FA Smart Lock prototype designed and implemented is an innovative physical securing mechanism. The system employs three factor authentication (3FA) which makes it robust to bypass or break. The event logging facility ensures that all the events along with relevant data and time stamp are recorded for analytics, audit and future investigations. The system deploys open source hardware and embraces simple and affordable building blocks, thereby reducing the overall cost.
  • 15. The proposed system has much scope of futuristic improvements. The smart lock can be customized for easy configuration such that any number or any type of authentication factor can be included. The authentication layers such as face detection, bio-metric, GPS, Voice enabled and the likes can be included as desired. The proposed Smart lock prototype can be embedded with tampered-proof, battery backup along with power indications and similar mechanisms and necessary notifications. Futurescope
  • 16. References [1] Kristoffer Djupsjö Masar Almosawi, “IoT Security Applied on a Smart Door Lock Application”, KTH Royal Institute of Technology, 2018 [2] Region, And Segment Forecasts, “Smart Lock Market Size, Share & Trends Analysis Report By Type (Deadbolt, Lever Handle, Padlock), By Application (Residential, Hospitality, Enterprise, Critical Infrastructure)”, Grand View Research, Inc.: Market Research Reports & Consulting, 2018 [3] Are smart locks secure? AV-TEST has the answer, https://www.techrepublic.com/article/are-smart-locks-secure-av-test-has-the-answer. [4] Jayant Dabhade, Amirush Javare, Tushar Ghayal, Ankur Shelar, Ankita Gupta, “Smart Door Lock System: Improving Home Security using Bluetooth Technology”, International Journal of Computer Applications (0975 – 8887) Volume 160 – No 8, February 2017 [5] Rahul Satoskar , Akarsh Mishra, “Smart Door Lock and Lighting System using Internet of Things”, International Journal of Computer Science and Information Technologies, Vol. 9 (5) , 2018, 132-135 [6] Adarsh V Patil , Akshay S, CHandanB Patgar, Sreevarsha Prakash, Mahadevaswamy, Sharath Kumar A J, “Android Based Smart Door Locking System ", International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Published by, www.ijert.org NCESC - 2018 Conference Proceedings, Volume 6, Issue 13 [7] Nareshkumar R. M., Apoorva Kamat, Dnyaneshvari Shinde, “Smart Door Security Control System Using Raspberry Pi”, International Journal of Innovations & Advancement in Computer Science, ISSN 2347 – 8616 Volume 6, Issue 11 November 2017 [8] Chi-Huang Hung, Ying-Wen Bai, Je-Hong Ren, “Design and implementation of a door lock control based on a near field communication of a smartphone”, IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW), 2015, DOI: 10.1109/ICCE- TW.2015.7216992 [9] Bill Phillips, “The Complete Book of Locks and Locksmithing, Seventh Edition”, McGraw Hill Professional, 21-Oct-2016