Anda di halaman 1dari 6

2015 IEEE International Conference on Power, Instrumentation, Control and Computing (PICC)

GSM Based Digital Door Lock Security System

Adnan Ibrahim, Afhal Paravath, Aswin P. K., Shijin Mohammed Iqbal and Shaeez Usman Abdulla
Dept. of Applied Electronics and Instrumentation
M.E.S. College of Engineering, Kuttippuram
Kerala, India, PIN-679573
adnantharayil@gmail.com, afhal.paravath5@gmail.com, shaeez@mesce.ac.in

AbstractThis paper discusses the design and implementa- Murakami et al. [6] described a home security system which
tion of a GSM based digital door lock security system using includes a number of sensors detect an alarming situation
PIC platform. A 5-digit password was used to lock/unlock in different locations inside a facility. Cameras captured
the doors by employing a gear motor. Three consecutive
unsuccessful attempts in entering the correct password results images of different locations and a controller memorized the
in sending a warning message, was sent to preset mobile associations between sensors and cameras. Similarly, Pyle et
numbers, as a means of detecting unauthorized intrusion. al. [7] had developed a system which alerted an intrusion
A 3D scaled model of a house with door controlled by a disturbance at an entry point to a residence or alerting
gear motor was constructed to implement and demonstrate as to other emergency conditions by producing an alarm.
the proposed system. A separate arrangement was made to
install the control. The experimental result and analysis were There are security systems interfaced with GSM module,
promising. as the one described in Zhao et al. [8]. The system was
a wireless home network which contained a GSM/GPRS
Keywords-Microcontroller PIC 16F877A, GSM module, 16x2
LCD display, Gear motor, switches, buzzer . gateway and three kinds of wireless security sensor nodes
that are door security nodes, infrared security nodes and
re alarm nodes. This system was designed for nocturnal
I. I NTRODUCTION
security and power saving purpose. PIC was used for the
In 2010, the Federal Bureau of Investigation (FBI) [1] re- programming purpose. Another system was proposed by
ports that there were more than two million home burglaries Ushie et al.[9], wherein security door that can be remotely
in the United States, over 70 percent of which took place controlled by a GSM phone set acting as the transmitter and
in residential homes. According to 2011 reports by National another GSM phone set with a dual tone multi frequency
Crime Records Bureau (NCRB) [2], in India, the number of (DTMF) connected to the door motor through a DTMF
burglary cases registered was 58862 cases, with a total worth decoder interfaced with microcontroller unit and a stepper
of USD 50 million. According to a 2010 study by the Alarm motor. Similarly, SMS Technology was collaborated with
Industry Research and Educational Foundation (AIREF) [3], GSM/GPRS services to achieve controlling of door lock
burglars spend less than 60 seconds for breaking into a by Pratiksha et al [10], where they could lock/unlock the
home. So, anything that made a house harder to access, door by receiving a predened message from the user. In
including home security systems, deadbolt locks, bars on this paper we discuss the design and development of a PIC
windows, acted as a deterrent. Further, according to the supported security system prototype with 5 digit passwords
Electronic Security Associations (ESA) [4] Home Safety and GSM system for sending out intrusion alerts.
Fast Factsreport, 9 out of 10 burglars avoid homes with
alarm systems and said if they did encounter an alarm, they
would not attack the home and drop the attempt. These
facts have encouraged the development of numerous security
systems for both residential and commercial applications.
Security alarm systems employing various sensors are
becoming increasingly popular in residential communities.
Mallory et al. [5] implemented a security alarm system
that has a number of sensors for re, smoke, intrusion and
appliance operation. A central monitor was provided for
monitoring and continuously indicating the status of the sen-
sors. Transmitters were placed on the sensors and receivers Figure 1. Block Diagram
were placed on the monitor for effective communication.
The central monitor then indicates the appropriate alarm
based on the identied transmitter of a particular sensor.

978-1-4673-8072-0/15/$31.00 2015 IEEE


2015 IEEE International Conference on Power, Instrumentation, Control and Computing (PICC)

II. C OMPONENTS D. Gear Motor


A. Microcontroller PIC 16F877A A gear motor was used to control the door lock. The
PIC 16F877A is a 40-pin 8-Bit CMOS FLASH micro- output shaft has a hold for best mounting for wheels and
controller from Microchip [11]. Since it follows the RISC pulleys. Specication of motor are: Output rpm: 30 rpm,
architecture, all single cycle instructions take only one Input Voltage: 6-12 V, Torque: upto 7kg/cm, Stall Current:
instruction cycle except for program branches which take 500 - 750 mA, Shaft length: 2.4 cm, Shaft diameter: 6mm
two cycles. 16F877 comes with 3 operating speeds with 4, with internal hole,Motor weight:160gms.
8, or 20 MHz clock input. Here we use 20 MHz crystal
oscillator for the same which is fed through the OSC1 and E. Motor Controlling IC L293D
OSC2 ports of PIC. The ports 11 and 32 are shorted wherein L293D is a typical Motor driver or Motor Driver IC which
+5V is given for working of PIC. The ports 12 and 31 are can control two DC motors to drive in either direction [14].
grounded. There are two Enable pins on L293D. For being able to drive
the motor, pin 1 and 9 need to be high. For driving the motor
B. GSM Module with left H-bridge we need to enable pin 1 to high. And for
GSM (Global System for Mobile Communications) [12], right H-Bridge we need to make the pin 9 to high. There 4
is a standard developed by the European Telecommunica- input pins for this L293D, pin 2, 7 on the left and pin 15,
tions Standards Institute (ETSI) to describe protocols for 10 on the right. Left input pins will regulate the rotation of
second-generation (2G) digital cellular networks used by motor connected across left side, and right input for motor
mobile phones .The GSM module is interfaced with the PIC on the right hand side . The motors are rotated on the basis
for sending warning messages at time of intruder attack. The of the inputs provided across the input pins as LOGIC 0 or
port number 25, which is TX port of PIC, is interfaced to LOGIC 1. L293D will not use the Vcc supply for driving the
GSM module via RX port of GSM and the GND port of motor. For driving the motors it has a separate provision to
GSM is grounded. provide motor supply VSS. The maximum voltage for VSS
motor supply is 36 V. It can supply a max current of 600
C. 16 x 2 LCD display mA per channel.
The JHD162A 16 x 2 LCD has 16 pins and can be The pins 2, 7 of IC are connected to pins 19, 20 of PIC
operated in 4-bit mode or 8-bit mode[13]. Here we are using for locking and unlocking action of motor. The Motor was
the LCD module in 4-bit mode. The name and functions connected across pins 3, 6 of IC. The pin 8 was given +12
of each pin of the JHD162A LCD module is as explained V for motor operation and the pin 1, 9, 16 are shorted and
below. Pin 1 (VSS ): Ground pin of the LCD module.Pin 2 a +5 V was given for IC operation.
(VCC ): +5 V supply is given to this pin . Pin 3 (VEE ):
Contrast adjustment pin. This is done by connecting the F. Switch
ends of a 10K potentiometer to +5 V and Ground, and In this project we used push switches in order to enter
then connecting the slider pin to the VEE pin. Pin 4 (RS): password and for lock, unlock and password change com-
Register select pin . The JHD162A has two registers namely mands. The password entering switches are connected to
command register and data register. Logic HIGH at RS pin ports 15, 16, 17, 18 and 23 of PIC. The lock command
selects data register and logic LOW at RS pin will select switch was connected to pin 21, the unlock command switch
command register. If we make the RS pin HIGH and put a to pin 22 and the password change command switch to pin
data on the data lines (DB0 to DB7) it will be recognized as 27 of microcontroller.
a data. If we make the RS pin LOW and put a data on the
data lines, then it will be taken as a command. Pin 5(R/W): G. Voltage Regulator IC 7805
Read/Write modes. This pin is used for selecting between
read and write modes. Logic HIGH at this pin activates read IC 7805 gives a constant 5V DC output when it is supplied
mode and logic LOW at this pin activates write mode. Pin with 5-18 V DC [15]. The output of IC was given across
6 (E): This pin is meant for enabling the LCD module. A ports 11, 32 and 12,31 of the PIC.
HIGH to LOW signal at this pin will enable the module. Pin
7(DB0) to Pin 14 (DB7): These are data pins. The commands H. Buzzer
and data are put on these pins. A piezoelectric element may be driven by an oscillating
The pins 11,12,13,14 of LCD module are interfaced electronic circuit or other audio signal source, driven with
through ports 35,36,37,38 respectively of PIC. The pins a piezoelectric audio amplier. Sounds commonly used to
4, 6 of LCD module are interfaced through ports 33, 34 indicate that a button has been pressed are a click, a ring or
respectively of PIC. The pins 1, 5 of LCD module are a beep. In this project, the signal to buzzer is given via port
shorted and grounded and pin 2 is supplied with +5V. 28 of PIC to positive terminal of buzzer.

978-1-4673-8072-0/15/$31.00 2015 IEEE


2015 IEEE International Conference on Power, Instrumentation, Control and Computing (PICC)

Figure 2. Unlocking Stage Block Diagram

Figure 3. Password Changing Stage Block Diagram

Figure 4. Intruder Response Stage Block Diagram

III. B LOCK D IAGRAM D ESCRIPTION OF THE S YSTEM The password was entered through the switches S1,S2,S3,
The Block Diagram (Fig.1) shows the connections of S4 and S5. Now each switch must be consecutively pressed
GSM module, 16x2 display,gear motor,switches and buzzer a specied number of times in order to enter each number
with the PIC. The working of the system can be divided into of the password. For example, if the password is 34256,
4 stages: then S1 must be pressed 3 times, S2 must be pressed 4
times,... and so on. Upon each press the number at respective
A. Unlocking Stage position of the password, which is displayed live on the
Fig.2 shows the block diagram representation of the Un- screen, will be incremented by a single value (scroll from 0
locking stage. Initially when the system is powered on, after to 9). After entering the correct password, one should press
initializing the GSM, the LCD will display LOCKED. UNLOCK again for conrmation. The PIC then signals the
For unlocking the system, one has to press the UNLOCK gear motor to unlock door and the LCD displays the message
switch and the LCD will display ENTER PASSWORD. UNLOCKED.

978-1-4673-8072-0/15/$31.00 2015 IEEE


2015 IEEE International Conference on Power, Instrumentation, Control and Computing (PICC)

B. Password Changing Stage interface was made possible by making LCD and switches
Fig.3 shows the block diagram representation of the Pass- slots on the box (Fig.9). Different slots were given for the
word Changing stage. After entering the correct password, GSM antenna, the motor interface terminals and the DC
a user is able to change his door lock password only input power supply. The unit had a removable lid at back
after unlocking the door lock with correct password. In for maintenance purposes (Fig.8).
order to change the current password, SET PASSWORD
switch is pressed and LCD displays the message EN-
TER OLD PASSWORDand the current password is to be
entered followed by pressing the UNLOCK switch again
for conrmation. Now the LCD displays ENTER NEW
PASSWORDand the new password is to be entered. Again
the UNLOCK switch is pressed for conrmation. The LCD
displays SAVEDsignalling that the password has been
changed successfully.
C. Intruder Response Stage
Fig.4 shows the block diagram representation of the
Intruder Response stage. Initially,the door lock system is in
the locked position and LCD displays LOCKED. When an
intruder enters the wrong password, the LCD will display
PASSWORD ERROR. When a wrong password is entered
for the third time, the buzzer is triggered and the GSM
module sends a warning message to owner and neighbors
cell phones. The LCD displays BLOCKEDmessage and
the system will remain in blocked state for the next 10
seconds.
D. Locking Stage
Fig.5 shows block diagram representation of the Locking
stage.In order to lock the door lock, one has to return the
door into the closed position and press the LOCK switch.
It will signal the PIC to make the gear motor rotate, thus
locking the door. Figure 6. Front view of the the Control Unit.

Figure 5. Locking Stage Block Diagram Figure 7. Inside view of the Control Unit.

2) Demonstration model: For the purpose of a real-time


IV. T HE P ROTOTYPE
demonstration of locking and unlocking of door lock we
A. Design constructed a scaled model of a house with three walls and
1) The Control Unit: The control unit (Fig.6) was housed roof (Fig.12). The door lock was coupled to the motor using
in a 19.3 cm x 15.3 cm x 5 cm PVC box(Fig.7). The user a metal hook and a wood piece (Fig. 10). The model was

978-1-4673-8072-0/15/$31.00 2015 IEEE


2015 IEEE International Conference on Power, Instrumentation, Control and Computing (PICC)

Figure 8. Inside view of the Control Unit.

Figure 10. Inside view of the prototype.

Figure 9. Inside view of the Control Unit.

made out of articial wood (Hexwud) which made the model


stiff and durable. The motor was kept stationary by using a
holding stand made from the same articial wood (Fig.10).
The dimension of the demo house was 36 cm x 20 cm x 20
cm.
V. R ESULTS AND A NALYSIS
Figure 11. Frontal view of the prototype.
The prototype of the GSM Based Digital Door Lock
Security System was designed and implemented successfully
(Fig.12). A detailed analysis was done on the working and
stability of the system. Our ndings were: For locking the door it took approximately 2.33 seconds. For
changing the password to 99999from the default value,
A. Temporal Analysis the system took 33.29 seconds for the process. When the
For the initial startup of the system, it took 11.13 seconds. system entered into the blocked mode, it took about 12-15
Using the default password 00000, the system took 3.8 seconds for the owner to get the warning message from the
seconds to unlock the lock. Meanwhile, when we used the GSM module via registered mobile. Of course, this depended
password 99999, the system took 23.89 seconds to unlock. heavily on the network range and trafc.

978-1-4673-8072-0/15/$31.00 2015 IEEE


2015 IEEE International Conference on Power, Instrumentation, Control and Computing (PICC)

B. Trials R EFERENCES
A variety of trials were done using different combinations [1] Available at https://www.fbi.gov/about-us/cjis/ucr/crime-
of passwords. As mentioned before, the locking phase time in-the-u.s/2010/crime-in-the-u.s.-2010/property-
crime/burglarymain
increased depending on the complexity of password used.
None of the combinations of passwords created any insta- [2] National Crime Records Bureau, Statistics2011,2011
bility in the system. A geographic area with good GSM
reception resulted in the delivery of the warning message [3] Available at http://airef.org/burglars-conrm-value-of-alarms/
in a few seconds. It was also noted that the dedicated
[4] Available at http://www.alarm.org/HomeSafety/FastFacts.aspx
power supply helped the system to provide a uctuation-
free service. [5] John Mallory, Central Monitor for Home Security System,
US4581606A, Apr8, 1986.
C. Cost
[6] Takashi Murakami, Yasuyuki Shintani, Kazuhiro Aizu, Home
The whole Prototype cost US$37 with the following split security system , US6759957 B2,Jul 6, 2004.
up: US$18 for the GSM Module, US$4 for the gear motor
and US$3 for the PIC. It goes without saying that the cost [7] Ronald E Pyle, Home Security System, US4446454A, May1,
will go down on large scale production. 1984.

[8] Yanbo Zhao, Zhaohui Ye, A low cost GSM/GPRS based


wireless home security system, Consumer Electronics, IEEE
Transactions on (Volume:54 , Issue: 2 ), May 2008.

[9] Ushie James Ogri, Donatus Enang Bassey Okwong, Akaiso


Etim,Design and construction of Door Locking Security Sys-
tem Using GSM,International Journal Of Engineering And
Computer Science ISSN:2319-7242 Volume 2 Issue 7,Page No.
2235-2257,July 2013

[10] Pratiksha Misal, Madhura Karule, Dhanshree Birdawade,


Anjali Deshmukh, Mrunal Pathak,Door Locking/Unlocking
System using SMS Technology with GSM/GPRS Ser-
vices,International Journal of Electronics Communication and
Computer Engineering Volume 5, Issue (4) July, Technovision-
2014, ISSN 2249071X, April 2014
Figure 12. Overall view of the Prototype and the Control Unit. [11] Datasheet PIC16F87XA

[12] Available at https://en.wikipedia.org/wiki/GSM


VI. C ONCLUSION
[13] Datasheet JHD162A
The GSM Based Digital Door Lock Security System
was designed and implemented successfully. On basis of [14] Datasheet L293D
detailed analysis and trials, we could conclude that the
[15] Datasheet LM7805
system was stable and can be an emerging product in eld
of security systems for both residential and commercial
applications. We suggest the following improvements in
future development of system:-
1) Integrating with face detecting sensors
2) Integrating with gesture sensors
3) Interfacing with CCTV network
4) Integrating with 3D holographic password input key-
board
5) Integrating with multiple locks on multiple doors
inside a facility
6) Replacing motors with pneumatic valves
7) Addition of a lock tampering detection system
8) Addition of backup battery supply to facilitate unin-
terrupted service

978-1-4673-8072-0/15/$31.00 2015 IEEE

Anda mungkin juga menyukai