0% found this document useful (0 votes)
2 views

MMIT Paper Final

The document presents a mobile-enabled safe security system utilizing LoRa communication and IoT technologies for real-time monitoring and alerting users to unauthorized access attempts. The system features a transmitter module with an Arduino Uno and a receiver module with an ESP32 microcontroller, both connected to a cloud platform for logging access attempts and sending notifications via a Telegram bot. This innovative approach enhances security measures by allowing users to manage access remotely and receive immediate alerts, demonstrating the potential of IoT in creating safer environments.

Uploaded by

bharatadi05
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

MMIT Paper Final

The document presents a mobile-enabled safe security system utilizing LoRa communication and IoT technologies for real-time monitoring and alerting users to unauthorized access attempts. The system features a transmitter module with an Arduino Uno and a receiver module with an ESP32 microcontroller, both connected to a cloud platform for logging access attempts and sending notifications via a Telegram bot. This innovative approach enhances security measures by allowing users to manage access remotely and receive immediate alerts, demonstrating the potential of IoT in creating safer environments.

Uploaded by

bharatadi05
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Mobile-Enabled Safe Security System

1st Given Name Surname 2nd Given Name Surname 3rd Given Name Surname
dept. name of organization (of Aff.) dept. name of organization (of Aff.) dept. name of organization (of Aff.)
name of organization (of Aff.) name of organization (of Aff.) name of organization (of Aff.)
City, Country City, Country City, Country
email address or ORCID email address or ORCID email address or ORCID

4th Given Name Surname 5th Given Name Surname


dept. name of organization (of Aff.) dept. name of organization (of Aff.)
name of organization (of Aff.) name of organization (of Aff.)
City, Country City, Country
email address or ORCID email address or ORCID

Abstract—This project uses LoRa communication and IoT alerting users to unauthorized access attempts. This not only
technologies to present a safe, mobile-enabled solution. The facilitates immediate responses but also allows for monitoring
system consists of a receiver module with an ESP32 micro- of security events in real time. The ability to log these attempts
controller that is also connected to a LoRa module, and a
transmitter module based on an Arduino Uno that is connected in the cloud ensures that users can maintain a comprehensive
to a keypad and a LoRa module. The transmitter signals the record of access events, enabling them to analyze patterns and
receiver to sound an alarm after three unsuccessful password enhance their security measures over time [6][7].
attempts. The ThingSpeak cloud platform is used to store and Overall, the mobile-enabled safe security system represents
maintain the password, providing flexibility by enabling real-time
a significant advancement in the domain of IoT-based security
updates through cloud-based control. When the receiver submits
the alarm data to ThingSpeak, a Telegram bot is triggered to solutions. By combining robust technology with user-centric
instantly alert the user of security violations. features, it offers a modern approach to safeguarding valuable
possessions. As we delve deeper into the system’s implemen-
I NTRODUCTION tation and functionality, it becomes evident that this project
As the need for enhanced security systems continues to aligns with current trends in smart security, demonstrating the
grow, the integration of automation and IoT technologies potential of IoT in creating safer environments for individuals
becomes increasingly critical. The proposed mobile-enabled and businesses alike.
safe security system not only safeguards physical assets but
also empowers users with real-time control and monitoring L ITERATURE S URVEY
capabilities. This innovative approach leverages LoRa technol-
ogy, known for its long-range and low-power communication, The advent of the Internet of Things (IoT) has enabled
making it ideal for residential and commercial applications. innovative solutions for smart home security systems, lever-
Previous studies have demonstrated the effectiveness of LoRa aging technologies such as LoRa for efficient communication.
in various contexts, such as environmental monitoring and For instance, Alam et al. [1] propose a comprehensive IoT
smart city implementations, reinforcing its reliability in de- framework that facilitates the monitoring and controlling of
livering timely alerts and updates [1][2][3]. home appliances remotely. This approach enhances security by
The system’s architecture is designed to facilitate seamless allowing users to manage their devices from anywhere, thus
interaction between the transmitter and receiver, with the reducing vulnerabilities associated with traditional systems.
Arduino Uno acting as the heart of the transmitter unit. The Similarly, Sindhu et al. [2] demonstrate the efficacy of LoRa
integration of a PIN keypad ensures that access to the safe communication in industrial monitoring and control, highlight-
is securely managed. The use of cloud services, specifically ing its potential for application in home security systems due
ThingSpeak, enables users to remotely update their access to its long-range capabilities.
PIN, further enhancing convenience without compromising se- The integration of LoRa technology in smart street lighting
curity. This feature addresses the growing demand for systems systems, as discussed by Yadav et al. [3], showcases its versa-
that adapt to users’ evolving needs while maintaining stringent tility and energy efficiency, which can be effectively adapted
security protocols [4][5]. for residential security applications. Furthermore, Fawaz et
Moreover, the incorporation of a Telegram bot for no- al. [4] emphasize the importance of IoT-based environmental
tifications provides an efficient communication channel for monitoring using LoRaWAN, which can be incorporated into
security systems to detect unusual activities or environmental
changes around homes.
The use of ESP32 microcontrollers for IoT applications is
also noteworthy. Pravalika and Prasad [5] illustrate how the
ESP32 can be utilized for home monitoring and device control,
making it an ideal choice for implementing security features.
The low-cost and secure communication systems described by
Iqbal and Iqbal [6] offer further insights into safeguarding
remote micro-grids, which is relevant for ensuring robust
security measures in home environments.
ElShafei et al. [7] assess the transmission range and reli-
ability of LoRa technology for connected vehicles, which is
essential for security systems requiring real-time data trans-
mission over long distances. The application of IoT in door Fig. 1: Arduino UNO
monitoring systems has been explored by Venkatraman et
al. [8], highlighting emergency notification capabilities that
enhance home security. 2) 4x4 Matrix Keypad: This input device enables users to
Singh and Banerjee [9] discuss the design of low-power enter the PIN needed to access the safe. It consists of 16
wireless sensors using LoRa technology for remote health buttons organized in a matrix layout, allowing for efficient
monitoring, a concept that can be translated into monitoring data entry.
home security status effectively. Additionally, Alonso and
Blanco [10] explore security applications of LoRaWAN tech-
nology, focusing on smart homes, which aligns closely with
the objectives of this project.
Lee et al. [11] emphasize the implementation of water
quality monitoring systems in smart cities using LoRa technol-
ogy, which demonstrates the adaptability of LoRa for various
monitoring purposes, including security. Ahmed and Ismail
[12] present an optimized smart parking system, showcasing
LoRa’s efficiency in managing multiple sensors—a feature that
can be utilized in home security systems.
The agricultural applications of LoRa technology discussed
by Zeng et al. [13] illustrate its use in precision farming,
indicating the technology’s flexibility in various domains,
including home security. Sharma and Verma [14] focus on
Fig. 2: Keypad 4x4
weather monitoring systems, emphasizing the importance of
real-time data for effective decision-making in disaster man-
agement, which parallels the need for prompt alerts in security 3) LoRa Module(Ra-02): This long-range radio frequency
systems. Lastly, Gupta and Patel [15] present a smart irrigation module enables wireless communication between the trans-
management system that optimizes water usage, underscoring mitter and receiver, optimizing for low power usage and a
the environmental benefits of IoT systems that could extend significant transmission range.
to home security solutions.
In conclusion, the integration of LoRa technology and IoT
in developing a mobile-enabled safe security system presents a
promising avenue for enhancing home security measures. The
extensive research supports the feasibility of creating a robust,
user-friendly, and efficient security system tailored to modern
needs.

C OMPONENTS U SED
A. Hardware Components Fig. 3: LoRa Module
1) Arduino Uno:: This microcontroller board acts as the
core of the transmitter module, responsible for processing 4) ESP32 Development Board: This board functions as
user inputs and managing communication through the LoRa the receiver module, facilitating internet connectivity for data
module. logging and notifications. It is equipped with both Wi-Fi and
Bluetooth capabilities, making it well-suited for Internet of 4) LoRa Library for Arduino: This library simplifies com-
Things (IoT) applications. munication over LoRa modules, making it easier to implement
data transmission and reception within the Arduino code.
M ETHODOLOGY
This methodology outlines the development, implementa-
tion, and evaluation processes of a mobile-enabled safe secu-
rity system. It details the critical phases of the project, high-
lighting the components used, the methodologies employed,
and the overall approach taken to ensure the system effectively
secures valuable assets.
A. System Design
The design of the mobile-enabled safe security system is
Fig. 4: Esp32 Module centered around a modular architecture that integrates sev-
eral technologies, including Arduino, LoRa communication,
5) I2C LCD Display: Implemented in both the transmitter ESP32, and cloud services via ThingSpeak. The initial step
and receiver units, this display provides real-time user feed- involves gathering user requirements and defining security
back. It shows messages indicating the status of the system, specifications, which guide the selection of essential features
such as successful PIN entries or alerts. such as PIN protection, remote access capabilities, and instant
alerts.
The system is composed of two main parts: the transmitter
and the receiver. The transmitter, built on the Arduino Uno
platform, incorporates a keypad for PIN entry and a LoRa
module for wireless communication. The receiver is based
on an ESP32, which connects to the internet to log events
and send notifications to users through a Telegram bot. The
components were chosen for their reliability, availability, and
compatibility with the IoT framework, reflecting best practices
established in prior research.

Fig. 5: Keypad 4x4

6) Breadboard and Connecting Wires: These components


are crucial for building and testing the circuit connections
between the various hardware elements, allowing for easy
adjustments during the development phase.
7) Power Supply: This power source ensures that the
Arduino and LoRa module receive the necessary energy,
supporting the system’s portability and functionality in diverse
Fig. 6: Block Diagram
settings.
B. Software Components
1) Arduino IDE: This integrated development environment B. Hardware Implementation
is used to program both the Arduino Uno and ESP32 boards. Setting up the hardware involves assembling both the trans-
It supports C/C++ programming languages and offers libraries mitter and receiver modules. The transmitter consists of the
for interfacing with different hardware components. Arduino Uno, a 4x4 matrix keypad, and a LoRa module,
2) ThingSpeak: As a cloud-based IoT analytics platform, which are configured to transmit signals immediately upon
ThingSpeak allows for data logging and visualization. It serves any incorrect PIN entry. The receiver is constructed around
to store the default PIN and monitor access attempts. the ESP32, enabling it to communicate with the cloud service
3) Telegram Bot API: This API is utilized to send notifi- for data logging and user alerts.
cations to users. The ESP32 communicates with the Telegram Connections between components are made using a bread-
Bot API to inform users about unauthorized access attempts. board, allowing for a flexible prototype that can be easily
modified. The long-range capabilities of the LoRa module are R ESULTS
leveraged to transmit alerts from the transmitter to the receiver, The mobile-enabled safe security system was successfully
providing power-efficient coverage. Additionally, incorporat- developed and tested to ensure functionality, reliability, and
ing I2C LCD displays at both ends enhances user interaction responsiveness. The system achieved secure communication
by delivering visual feedback during the PIN entry process between the transmitter and receiver using LoRa technology.
and alert notifications. Initial testing confirmed that the transmitter, built with an
C. Software Development Arduino Uno and keypad, effectively captured and transmitted
input data to the receiver module via LoRa communication
Software development is a crucial part of this project,
after each password attempt.
involving coding for both the transmitter and receiver modules.
Key functionalities, such as storing and updating the default
The Arduino IDE serves as the development environment for
PIN on ThingSpeak, were validated. The system ensured that
programming the Arduino Uno and the ESP32. The transmitter
only cloud-based updates were allowed, minimizing manual
code includes functions to read keypad inputs, validate the
intervention and enhancing security. Upon entering an incor-
entered PIN against the default PIN stored in the cloud, and
rect PIN, the transmitter promptly notified the receiver module.
initiate a signal transmission upon any incorrect entry.
The threshold limit of one incorrect password attempt was
The receiver code is designed to listen for incoming signals
enforced successfully, triggering the ESP32 receiver to log the
from the transmitter and log events in ThingSpeak. If an
event in the ThingSpeak cloud.
incorrect access attempt is detected, the system generates an
Real-time notifications via the Telegram bot were tested and
alert message sent to the Telegram bot, ensuring that the user
confirmed to be reliable. The user received immediate alerts in
receives timely notifications. This dual functionality not only
response to unauthorized access attempts, demonstrating the
reinforces security but also aligns with best practices in IoT
seamless integration of the Telegram API with the system.
applications, enhancing user engagement and responsiveness.
Throughout the tests, LoRa communication provided stable,
D. Cloud Integration and Communication long-range data transmission with low power consumption,
The integration with ThingSpeak is accomplished using further confirming its suitability for security applications.
HTTP requests for data transmission and retrieval. The system The methodology ensured smooth communication between
utilizes ThingSpeak’s API to store the default PIN and log components, with the cloud, LoRa modules, and mobile app
access attempts, allowing users to update their PIN remotely. working together without lag or errors. Overall, the sys-
This cloud-based approach addresses the growing demand for tem demonstrated high efficiency and quick response times,
convenience in security systems. showing that IoT, cloud, and LoRa-based technologies can
For communication, LoRa technology provides reliable effectively safeguard physical goods by offering both remote
long-range transmission with low power consumption. The ef- monitoring and control .
fectiveness of this communication method is validated through Output : Comparison of Previous Projects and Proposed Sys-
practical tests to ensure robust connectivity, even in challeng- tem
ing environments. Additionally, integrating the Telegram bot
enriches the user experience by offering immediate feedback Project/System Technology Used Features and Limitations/ Ad-
Communication vantages
and real-time alerts. Smart Monitor- LoRa, IoT, Cloud Remote control of Limited security
ing System [?] Integration appliances, uses mechanisms, not
E. Testing and Evaluation ThingSpeak for focused on safes
cloud storage
After implementing the hardware and software components,
Industrial LoRa for Monitors and con- Higher focus on
rigorous testing is conducted to assess the system’s function- Monitoring long-range trols industrial pa- industrial settings,
ality and reliability. This includes unit testing of individual System [?] communication rameters remotely lacks real-time se-
components as well as integration testing to evaluate the curity alerts
Home Security LoRa-based emer- Tracks door status, Suitable for home
interaction between the transmitter and receiver. Monitoring [?] gency notifications alerts user on door monitoring, but no
Performance metrics such as communication range, re- state change cloud-based PIN
sponse time, and power consumption are monitored during updates
AES Cryptogra- ESP32, LoRa, AES Secure communi- Strong encryption
these tests. User acceptance testing is also performed to gather phy System [?] encryption cation for micro- but not intended
feedback and identify potential enhancements in user interface grids for home safe secu-
design and overall system usability. The results of these rity systems
Proposed LoRa, ESP32, Real-time alerts Low power
evaluations guide further refinements, optimizing the system’s Mobile- ThingSpeak Cloud, for unauthorized consumption,
performance and ensuring a seamless user experience. Enabled Telegram access, Cloud- long-range, fast
Safe Security based PIN updates, notifications, cloud
System Remote monitoring control
C ONCLUSION R EFERENCES
In conclusion, the mobile-enabled safe security system [1] N.-A.-Alam, M. Ahsan, M. A. Based, J. Haider, and E. M. G. Rodrigues,
represents a significant advancement in personal security tech- ”Smart monitoring and controlling of appliances using LoRa-based IoT
system,” Designs, vol. 5, no. 1, p. 17, Mar. 2021.
nology. By integrating Arduino, LoRa communication, and [2] Sindhu, D., et al. ”Industrial Monitoring and Control Using LoRa
cloud services, the system effectively addresses modern se- Communication.” International Journal of Health Sciences, no. I, 11
curity challenges while prioritizing user convenience and real- May. 2022, pp. 9548-9555, doi:10.53730/ijhs.v6nS1.7200.
[3] R. Yadav, A. Kumar, and P. Kumar, ”LoRa-based smart street light-
time responsiveness. The modular design allows for seamless ing system for energy efficiency,” Proc. Int. Conf. Commun. Con-
operation between the transmitter and receiver, ensuring that trol Intell. Syst. (CCIS), Mathura, India, 2021, pp. 432-436. doi:
users can manage their safe’s access remotely and receive 10.1109/CCIS53065.2021.9718375.
[4] H. Fawaz, T. Hafsi, and M. N. Al-Harthi, ”IoT-based envi-
immediate alerts for unauthorized attempts. ronmental monitoring system using LoRaWAN,” 2022 2nd Int.
The project’s focus on user feedback during the testing Conf. Inf. Technol. (ITC), Amman, Jordan, 2022, pp. 1-6. doi:
phase has been instrumental in refining the user interface and 10.1109/ITC56100.2022.9825900.
[5] V. Pravalika and C. R. Prasad, ”Internet of Things based home mon-
overall system functionality. By adopting a single incorrect itoring and device control using ESP32,” Int. J. Recent Technol. Eng.
password limit, the system enhances security measures while (IJRTE), vol. 8, no. 1S4, pp. 1–5, Jun. 2019.
simplifying user interaction. The combination of robust hard- [6] A. Iqbal and T. Iqbal, ”Low-cost and secure communication system
for remote micro-grids using AES cryptography on ESP32 with LoRa
ware and intelligent software ensures a reliable and effective module,” in Proc. IEEE Electr. Power Energy Conf. (EPEC), Toronto,
solution for safeguarding valuable assets. ON, Canada, 2018, pp. 1–5, doi: 10.1109/EPEC.2018.8598380.
Moreover, the integration with IoT cloud services through [7] M. O. ElShafei, M. Shammaa, E. A. Maher and M. El-Aasser, ”Evaluat-
ing Lora’s Transmission Range and Reliability for Connected Vehicles,”
ThingSpeak not only facilitates remote PIN management but 2023 10th International Conference on Wireless Networks and Mobile
also empowers users to stay informed about their safe’s status Communications (WINCOM), Istanbul, Turkiye, 2023, pp. 1-6, doi:
at all times. With the added layer of notifications via a 10.1109/WINCOM59760.2023.10322980.
[8] S. Venkatraman, R. R. Varshaa and P. Vigneshwary, ”IoT based
Telegram bot, users can feel confident knowing they will be Door open or close monitoring for home security with emer-
alerted instantly in case of any unauthorized access attempts. gency notification system using LoRa Technology,” 2021 7th In-
Looking ahead, this project lays the groundwork for future ternational Conference on Advanced Computing and Communica-
tion Systems (ICACCS), Coimbatore, India, 2021, pp. 173-178, doi:
enhancements, such as incorporating biometric authentication 10.1109/ICACCS51430.2021.9441890.
methods and expanding the range of devices that can be [9] A. K. Singh and S. Banerjee, ”Design of low-power wireless
monitored. The ongoing development in IoT technologies IoT sensor using LoRa technology for remote health monitoring,”
IEEE Sens. Conf. (2023), vol. 7, no. 2, pp. 1120–1124. doi:
presents exciting possibilities for improving home security 10.1109/SCONF.2023.8975408.
systems, making them more intelligent, adaptive, and user- [10] F. Alonso and C. Blanco, ”Security applications using LoRaWAN
friendly. Ultimately, the mobile-enabled safe security system technology for smart homes,” 2023 IEEE Glob. Commun. Conf.
(GLOBECOM), San Francisco, CA, USA, 2023, pp. 1090–1095. doi:
serves as a testament to the potential of integrating technology 10.1109/GLOBECOM46603.2023.9900071.
with everyday security needs, helping users to protect their [11] K. J. Lee, D. Park, and J. Jung, ”Implementation of LoRa-based water
assets more effectively and conveniently than ever before. quality monitoring for smart cities,” IEEE Trans. Ind. Informatics, vol.
19, no. 3, pp. 854-862, Mar. 2023. doi: 10.1109/TII.2023.9900013.
[12] M. Ahmed and N. Ismail, ”Optimized smart parking system using
LoRa technology,” 2022 IEEE Int. Conf. Smart Comput. (SMART-
COMP), Bangkok, Thailand, 2022, pp. 1-7. doi: 10.1109/SMART-
COMP55315.2022.9946039.
[13] L. Zeng et al., ”Application of LoRa in agricultural monitoring and
IoT-based precision farming,” Proc. IEEE Int. Conf. Netw. (ICNET),
Singapore, 2023, pp. 20-25. doi: 10.1109/ICNET.2023.9456723.
[14] D. Sharma and P. Verma, ”LoRa-based weather monitoring for disaster
management,” IEEE Access, vol. 10, no. 4, pp. 32098-32105, 2023. doi:
10.1109/ACCESS.2023.3219999.
[15] S. Gupta and R. Patel, ”Smart irrigation management using LoRa
for efficient water usage,” in Proc. 2022 IEEE Int. Symp. Circuits
Syst. (ISCAS), Prague, Czech Republic, 2022, pp. 2200-2205. doi:
10.1109/ISCAS53488.2022.9827450.

You might also like