Smart Lock Technology Developing and Enhancing Hom
Smart Lock Technology Developing and Enhancing Hom
net/publication/372641811
Article in International Journal of Advanced Research in Science Communication and Technology · July 2023
DOI: 10.48175/IJARSCT-12176
CITATION READS
1 1,368
1 author:
SEE PROFILE
All content following this page was uploaded by Perfecto Ravina Ruaya on 16 August 2023.
Abstract: This study presents an overview of the study on the implementation and potential of a novel
Android-based controlled door locking app to advance home security in the context of smart homes. The
app leverages the capabilities of android devices to offer remote access and management of door locks,
empowering homeowners with seamless control over their access points. The study evaluates the app's
performance in usability, accuracy, efficiency, portability, security, and maintainability, revealing its
commendable capabilities with an average score of 4.17 out of 5. With minor enhancements, the app
shows promising potential as a reliable and user-friendly access control solution, driving the evolution
of smart lock technology and home security in the modern era.
Keywords: Android-based, evaluation, controlled locking apps, home security, home security
I. INTRODUCTION
In an increasingly interconnected world, the concept of a "smart home" has emerged as a revolutionary solution for
modern living, providing enhanced convenience and security to homeowners[1][2]. Among the key components driving
the evolution of smart homes is the advent of smart lock technology. Integrating the power of mobile devices and
internet connectivity, smart lock systems offer a sophisticated approach to access control, allowing homeowners to
remotely manage and monitor their doors through smartphone applications[3][4].
This research journal delves into the realm of smart lock technology, with a specific focus on the development and
utilization of an Android-Based Controlled Door Locking App. As technology continues to advance rapidly, the need to
fortify home security has become paramount, and this study aims to explore the potential of Android-based apps in
achieving this objective.
The primary objective of this research is twofold: first, to investigate the development process of an Android-based
controlled door locking app, and second, to assess its effectiveness in enhancing home security. By exploring the
underlying technology, usability, and security aspects, this research seeks to provide valuable insights into the
integration of mobile devices and smart lock systems, with the ultimate goal of fostering a safer and more convenient
living environment for homeowners.
In the following sections, it will delve into the existing literature on smart lock technology, examining the evolution of
access control systems from traditional locks to cutting-edge smart lock solutions. It will also review the current
landscape of Android-based controlled door locking apps, exploring their features and functionalities[5]. Moreover, this
research will delve into the challenges and opportunities presented by the adoption of smart lock technology in a home
setting, considering factors such as user acceptance, data privacy, and vulnerability to cyber threats.
The experimental aspect of this study involves the development and implementation of a prototype Android-based
controlled door locking app, which will be rigorously tested in various real-world scenarios to evaluate its performance,
reliability, and security. The results of these experiments will be analyzed and discussed, shedding light on the potential
benefits and limitations of such applications.
This research study aims to contribute to the growing body of knowledge surrounding smart lock technology and its
role in enhancing home security. By unraveling the intricacies of Android-based controlled door locking apps, we
aspire to equip homeowners, technology developers, and researchers with valuable insights that can shape the future of
access control systems, making homes safer and more intelligent in the process.
valuable insights for researchers, developers, and consumers alike. By addressing usability, security, user acceptance,
and privacy concerns, this literature guides the development and implementation of Android-based controlled door
locking apps that enhance home security and redefine the way we interact with our living spaces.
IV. METHODS
The method that is used in implementing and designing the system is the Rapid Application Model (RAD), SDLC as it
is commonly used in prototype systems. The RAD model is a software development that uses minimal planning in
favor of rapid prototyping. There are four steps of RAD such as follows:
Planning Requirements: During this initial stage the researchers agreed Modular open-source on project scope
and application requirements, so that future stages with prototyping can begin.
System Requirements: Security Check. This module contains the security countermeasures of the system. It
serves as validation of different types of reporters to ensure the correctness of data. Lastly, this security
measure was executed only once, after successful installation.
Bluetooth/Wireless Transmission. The transmission of connecting devices is done by the use of Bluetooth
technology through a wireless connection. This mobile application checked the availability of this
communication medium upon transmission. After the successful connection, the android mobile can access the
scanning of fingerprints for the authorization process.
Prototype: This is where the actual development takes place. It allows the researchers to create initial
modeling and prototype with different features and functions. These prototypes are then shown to the users
who decide what they like and what they don't. These prototypes are quickly made to work, just to show off
certain features, without proper polish. The developments are discussed below
System Development Testing: This module is the testing phase of the system execution to identify its usability
and reliability. The researcher selected the programming environment and standards used in building the
system. The Kodular Creator is used in developing the android application because it fits the requirements
needed in developing an Android app. In developing the android-based interface application, an open source
Kodular Creator that uses a block-based programming language was used. Another language used is the
Arduino IDE as it uses C++ language for programming the microcontroller board Arduino Uno in the
operation of the door lock. An Arduino Uno is an open-source platform based on easy-to-use hardware and
software. This was chosen because it's affordable, rather the most available option the researchers had at a
time. The programming languages were chosen because they have met the requirements for the development
of the study.
Validation, verification, and testing are done in this phase. They are conducted according to the plan and conclusively
demonstrate that both user and system requirements have been met. The first testing done was done checking the
program in which the researcher reviewed the entire system process to check for logical and physical errors. Next, the
researcher conducted a series of unit testing to identify and solve different system errors that caused the program to end
abnormally.
Receive Feedback: In this stage, feedback on what’s good, what’s not, what works, and what doesn’t is shared.
This feedback isn’t limited to just pure functionality, but also visuals and interfaces.
System Check: This section deals with the various feedback to the system after conducting tests that have been
made as to what should be improved, changed, or even what is not appropriate especially on the user
interfaces.
Finalize Software: Here, the researchers finalize the features, functions,to make and interface of the software.
The stability, usability, and maintainability are paramount as well before being delivered to the user.
System Implementation :This is the last and final checking of the system after a long process of developing,
improving, and testing before it is approved and even be implemented to the public.
In this database class diagram, it has four main entities: User, DoorLock, AccessLog, and Authorization.
The User entity represents the users of the Android-based
Android based door locking app. It contains attributes such as id (primary
key), name, email, password (hashedhed for security), created_at, and updated_at.
The DoorLock entity represents the door locks that users can control using the app. It contains attributes such as id
(primary key), name, status (e.g., locked or unlocked), created_at, and updated_at.
The AccessLog
essLog entity represents the logs of user actions related to door locks. It contains attributes such as id (primary
key), user_id (foreign key referencing User entity), doorlock_id (foreign key referencing DoorLock entity), action (e.g.,
lock or unlock), and timestamp.
The Authorization entity represents the permissions granted to users to control specific door locks. It contains attributes
such as id (primary key), user_id (foreign key referencing User entity), and doorlock_id (foreign key referencing
DoorLock entity).
The relationships between the entities are as follows:
A User entity can have multiple access logs and authorizations, so there is a one-to-many
one many relationship between User and
AccessLog, and a one-to-many
many relationship between User and Authorization.
Authori
A DoorLock entity can have multiple access logs and authorizations, so there is a one-to-many
one many relationship between
DoorLock and AccessLog, and a one-to to-many
many relationship between DoorLock and Authorization.
These relationships are established through
through the use of foreign key references in the AccessLog and Authorization
entities, linking them to the corresponding User and DoorLock entities.
Figure 4 shows the first page of the Application. Since our system uses wireless connectivity, it doesn’t have a user
login interface because it used fingerprint as an authentication of the user. All we have to do is to connect the
Bluetooth device to the Bluetooth assigned in the system.
low power consumption, with door locking and unlocking occurring in approximately 4 seconds on average. Thus, the
system's feasibility is validated
VI. CONCLUSION
In conclusion, the study on Smart Lock Technology and its implementation through the Android-Based Controlled
Door Locking App has proven to be a significant step towards developing and enhancing home security in the context
of modern smart homes. The app's commendable performance across key aspects of usability, accuracy, efficiency,
portability, security, and maintainability underscores its potential as a reliable and user-friendly access control solution.
The evaluation of the app reveals promising results, with an impressive average score of 4.17 out of 5. This score
indicates that the app is already effective in fulfilling its primary objectives, providing homeowners with a convenient
and secure way to remotely manage their door access.
Although the app showcases excellent capabilities, minor enhancements and updates can be made to further optimize its
functionalities. By addressing areas of improvement, such as refining the user interface for enhanced usability and
incorporating additional security measures like multi-factor authentication, the app can further bolster its position as a
robust smart home security solution.
The Android-Based Controlled Door Locking App represents a significant advancement in smart lock technology,
capitalizing on the power of Android devices to offer remote access and management of door locks. Its high portability
and compatibility with various devices make it a versatile choice for homeowners seeking a seamless integration of
access control into their smart homes.
As the field of smart home technology continues to evolve, ongoing research and development efforts will play a vital
role in further optimizing the app's performance and security. Additionally, user feedback and real-world testing will
contribute to refining the app to meet the dynamic needs of homeowners.
In conclusion, the Android-Based Controlled Door Locking App, coupled with Smart Lock Technology, holds the
promise of transforming how we secure and manage our homes. With its commendable performance and potential for
growth, it represents a stepping stone towards a more secure and technologically advanced future for home security in
the era of smart homes.
REFERENCES
[1]. Yar, H., Imran, A. S., Khan, Z. A., Sajjad, M., & Kastrati, Z. (2021). Towards smart home automation using
IoT-enabled edge-computing paradigm. Sensors, 21(14), 4932.
[2]. Ray, A. K., & Bagwari, A. (2020, April). IoT based Smart home: Security Aspects and security architecture.
In 2020 IEEE 9th international conference on communication systems and network technologies
(CSNT) (pp. 218-222). IEEE.
[3]. Aung, Y. N., & Tantidham, T. (2017, November). Review of Ethereum: Smart home case study. In 2017 2nd
International Conference on Information Technology (INCIT) (pp. 1-4). IEEE.
[4]. Shruthi, C. M., Bandari, S. K., Ala, C. K. R., & Reddy, M. (2023). Locker Security System using Internet of
Things. In E3S Web of Conferences (Vol. 391, p. 01153). EDP Sciences.
[5]. Siegel, J. E., Erb, D. C., & Sarma, S. E. (2017). A survey of the connected vehicle landscape—Architectures,
enabling technologies, applications, and development areas. IEEE Transactions on Intelligent Transportation
Systems, 19(8), 2391-2406.
[6]. Mocrii, D., Chen, Y., & Musilek, P. (2018). IoT-based smart homes: A review of system architecture,
software, communications, privacy and security. Internet of Things, 1, 81-98.
[7]. Zhou, W., Jia, Y., Peng, A., Zhang, Y., & Liu, P. (2018). The effect of iot new features on security and
privacy: New threats, existing solutions, and challenges yet to be solved. IEEE Internet of things
Journal, 6(2), 1606-1616.
[8]. Philip, N. Y., Rodrigues, J. J., Wang, H., Fong, S. J., & Chen, J. (2021). Internet of Things for in-home
health monitoring systems: Current advances, challenges and future directions. IEEE Journal on Selected
Areas in Communications, 39(2), 300-310.
[9]. Patil, B. S., Mahajan, V. A., Suryawanshi, S. A., & Pawar, M. B. (2018). Automatic door lock system using
pin on android phone. International Research Journal of Engineering and Technology (IRJET), 5(11), 1007-
1011.
[10]. Rajpoot, Q. M. (2016). Enhancing Security and Privacy in Video Surveillance through Role-Oriented Access
Control Mechanism.
[11]. Basole, R. C., & Karla, J. (2012). Value transformation in the mobile service ecosystem: A study of app store
emergence and growth. Service Science, 4(1), 24-41.
[12]. Taivalsaari, A., Mikkonen, T., & Pautasso, C. (2021, May). Towards Seamless IoT Device-Edge-Cloud
Continuum: Software Architecture Options of IoT Devices Revisited. In International Conference on Web
Engineering (pp. 82-98). Cham: Springer International Publishing.
[13]. Enck, W., Ongtang, M., & McDaniel, P. (2009, November). On lightweight mobile phone application
certification. In Proceedings of the 16th ACM conference on Computer and communications security (pp.
235-245).
[14]. Macis, S., Loi, D., Ulgheri, A., Pani, D., Solinas, G., La Manna, S., ... & Raffo, L. (2019). Design and
usability assessment of a multi-device SOA-based telecare framework for the elderly. IEEE Journal of
Biomedical and Health Informatics, 24(1), 268-279.
Copyright to IJARSCT DOI: 10.48175/IJARSCT-12176 546
www.ijarsct.co.in
ISSN (Online) 2581-9429
IJARSCT
International Journal of Advanced Research in Science, Communication and Technology (IJARSCT)
International Open-Access, Double-Blind, Peer-Reviewed, Refereed, Multidisciplinary Online Journal
Impact Factor: 7.301 Volume 3, Issue 2, July 2023
[15]. Dabekar, S. B., Lahade, S. A., Lunge, M. S., & Yewale, D. IOT Based Smart Door Locked System Using
Node MCU.
[16]. Liao, L. D., Wang, Y., Tsao, Y. C., Wang, I. J., Jhang, D. F., Chu, T. S., ... & Ger, T. R. (2019). Design and
validation of a multifunctional android-based smart home control and monitoring system. IEEE Access, 7,
163313-163322.
[17]. Duong, L. (2023). The techniques of IoT and it's applications for smart homes: internet of things techniques
and standards for building smart homes.
[18]. Lang, N., von Szczepanski, K., & Wurzer, C. (2019). The emerging art of ecosystem management. Boston
Consulting Group, 1-20.
[19]. Prasad, S., Harshe, D., Kaur, N., Jangannavar, S., Srivastava, A., Achanta, U., ... & Harshe, G. (2018). A
study of magnitude and psychological correlates of smartphone use in medical students: A pilot study with a
novel telemetric approach. Indian journal of psychological medicine, 40(5), 468-475.
[20]. Abdulla, A. I., Abdulraheem, A. S., Salih, A. A., Sadeeq, M. A., Ahmed, A. J., Ferzor, B. M., ... &
Mohammed, S. I. (2020). Internet of things and smart home security. Technol. Rep. Kansai Univ, 62(5),
2465-2476.
[21]. Abawajy, J., Huda, S., Sharmeen, S., Hassan, M. M., & Almogren, A. (2018). Identifying cyber threats to
mobile-IoT applications in edge computing paradigm. Future Generation Computer Systems, 89, 525-538.
[22]. Liu, H. (2022, July). Privacy Computing Issues in Collecting and Using Customer Data of Mobile Devices.
In 2022 7th International Conference on Signal and Image Processing (ICSIP) (pp. 382-389). IEEE.
[23]. Elahi, H., Wang, G., & Chen, J. (2020). Pleasure or pain? An evaluation of the costs and utilities of
bloatware applications in android smartphones. Journal of Network and Computer Applications, 157,
102578.