The Design And Construction Of Door Security System Using Remote Control And Sensors (PDF/DOC)
ABSTRACT
The ultimate purpose of this paper is to develop a remote controlled security door using a microcontroller. It is a means of enforcing security features of the entire building structure, equipped with appropriate management control. In this paper we have designed system that allows unlocking a secure door remotely. The main aim of this paper is to help users improve the door security of sensitive locations, from car parks, shopping centres or corporate head offices to airports, banks or nuclear power plants. This paper takes a cursory look at other security methods of controlling access, their disadvantages and then goes on to the design of the hardware as well as software programming to lock or unlock the door. Both software and hardware for the system were developed in this paper by using arduino microcontrollers, relays, sensors, induction motors and some mechanical system to demonstrate the response of the output and input devices.
TABLE OF CONTENTS
COVER PAGE
TITLE PAGE
APPROVAL PAGE
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
CHAPTER ONE
INTRODUCTION
1.1 BACKGROUND OF THE PROJECT
- PROBLEM STATEMENT
- AIM AND OBJECTIVE OF THE PROJECT
- SCOPE OF THE PROJECT
- APPLICATION OF THE PROJECT
- LIMITATION OF THE PROJECT
- DEFINITION OF TERMS
CHAPTER TWO
LITERATURE REVIEW
- REVIEW OF RELATED WORKS
- REVIEW ON LOCKS
- STRENGTHS AND WEAKNESSES
CHAPTER THREE
METHODOLOGY
- INTRODUCTION
- HARDWARE DESIGN
- SYSTEM BLOCK DIAGRAM
- SYSTEM FLOW CHART
- SYSTEM CIRCUIT DIAGRAM
- PROGRAM CODE
CHAPTER FOUR
TESTING AND RESULTS
- CONSTRUCTION PROCEDURE AND TESTING
- INSTALLATION OF THE COMPLET DESIGN
- CASING AND PACKAGING
- ASSEMBLING OF SECTIONS
- TESTING OF SYSTEM OPERATION
- RESULT
- DISCUSSION
CHAPTER FIVE
- SUMMARY
- CONCLUSION
- RECOMMENDATION
- REFERENCES
CHAPTER ONE
1.0 INTRODUCTION
1.1 BACKGROUND OF THE STUDY
Due to the need to increase the security of life and properties in our environment, security systems are used as selective systems to decide who have access to a given location based on a personal distinctive trait of the user. It also serves the function of sensing or detecting false intrusion (using input sensory devices and gives early warning using audio warning devices alarm – light indicators and remotely controlled computer systems etc). The term false intrusion here is used to mean any form of attempt to gain entry without following the proper pre- designed protocol(s). From time past until present, security locks usually includes mechanical devices made of forged metal i.e. simple lock and bolt, the door chain, pin tumbler lock, the jam lock and padlock etc. Other recently developed security devices are gadgets like laser beam detectors, motion detectors and magnetic card readers. Most recent of these devices are offshoots of biometric engineering. They include voice recognition systems, finger print readers, retina eye scanners, etc. (Prabhakar, 2003). The major characteristic of security devices is to prevent an intruder from gaining access to a location. Most of these devices however have lapses which give an unauthorized person access to where they are barred i.e. the simple jam lock and pad lock can be forced open or the keys duplicated by unauthorized persons and under certain conditions, i.e. physical changes of the individual concerned, the biometric devices sometimes fail in recognizing the authentic individual concerned (Matyás, 2012). Hence they cannot be totally relied on. Furthermore, these devices are very expensive (Chien, 2011), its use is restricted to only a few individuals or organizations that can afford it. Biometric systems may violate users privacy while some users consider them to be personally invasive and may also imply loss of anonymity (Matyás et al., 2012). Devices such as motion detectors, light detectors among others are susceptible to be triggered by false signals such as noise impulses, whenever its sensitivity is increased (Matyás et al., 2012). They are not suitable for most outdoor security protection due to the fact that they don’t posses high discriminative capability during operation and they are fairly expensive.
It is hence imperative to provide a security door, one which is also efficient and reliable; with high discriminative capability, non reliance on the physical quality of the individual concerned does not have key access or any physical locking interface and which is by far less expensive than their counterparts (Alsaadi, 2015). This has led to the design and construction a remote control security door using microcontroller. It includes remote control and using correct personal identification numbers to operate the locking device manually, by conditioning the access based on the configuration of the security device thereby granting access to the user with correct pin number.
The remote control security door finds application in homes, banks in the field of military applications i.e. ammunition ware house, industries and ministries and Government Parastatals, airports nuclear power plants etc.
There are three important components of access control: Identification, Authentication, and Authorization. Identification is the activity of the subject supplying information to identify itself to an authentication service. Authentication is the second part of a credential set to verify the identity of the subject. These mechanisms could be passphrases, passwords, cryptographic keys, PIN numbers, or tokens. Authorization is the process of determining what this identified subject can actually access and what operations it can carry out (Mahdi, 2013).
1.2 Problem statement
The security situation in many parts of the world today leaves much to be desired. In Nigeria particularly, the prevalence of armed robbers and other groups that constitute nuisance to the society has led to the loss of lives and properties worth millions of dollars. Many of the attacks that led to the loss have occurred in the homes or in guarded compounds and the attacks took place in spite of the existence of seemingly impregnable security gates that were designed to ward off intruders. The needs for remote controlled gates that have superior security features to those operated manually thus exist and have been on the increase in recent times.
1.3 Aim and objectives of the study
The main aim of this work is to build a remote control door Lock Circuit for safety purposes. The objectives of this work are:
- To improve security in our homes and industries
- To replace metallic keys by building a fully featured remote enabled electronic security system prototype
- To study the workings of an infrared sensor
1.4 Scope of the study
The scope of this work covers the building of a Remote control Door Lock Circuit for safety purposes. Remote Control Door Locks allow Wireless Control. This means one can unlock or lock their doors with just one click from remote control. It replaces the traditional lock system and provides a modern lock that is way more secure.
Arduino microcontroller is used making this circuit. Electromagnetic door lockwas used in building the device. The Magnetic locks use electromagnetism to deal with the entire locking mechanism. The circuit is easy to build and simple to use required few electronic components.
1.5 Applications of the scope
- We can use it in industries, homes, offices for the security purpose.
- Safety devices.
- Home automation system
1.6 LIMITATIONS OF THE PROJECT
· It is a low range circuit, i.e. it has limited coverage.
- If there is no power supply and the battery is not charged, it is not possible to open the door.
- IR Transmitter and Receiver require line of sight communication i.e. they need to be facing each other.
- The range of IR communication is less and is reliable for short range and small amounts of data.
1.7 DEFINITION OF TERMS
Secure Area: A designated area in which access into and out of is controlled and can be monitored.
Secure Door: A door in which access through is controlled and can be monitored.
Short Circuit: An unintentional connection that provides a low resistance path between two points in a circuit or between a point in a circuit and ground. A Short Circuit can drastically affect the operation of a circuit. If excessive current flow results from the Short Circuit, a device may be damaged or ruined.
Switch: A device used to either connect or interrupt an electronic circuit.
Click the button below to INSTANTLY subscribe and download the COMPLETE MATERIAL (PDF/DOC)!