Security locks play a crucial role in the protection of materials valuable to a person or a group of people. These locks vary from being simple in design to complex. Locks that are simple in design and easy to use often are easy to breach into and locks that are complex in design are tough to breach but tedious to use. High end lock systems are expensive and difficult to install. This project aims to add simplicity to the present complex lock system by incorporating an android phone’s Bluetooth connection. This project uses an electromagnetic lock that is triggered to lock or unlock using electric signals from a controller board. The uniqueness of this project is that it has no keypad or visible lock. Without the keypad available or lock visible makes this lock system even more secure than traditional locks.
TABLE OF CONTENTS
COVER PAGE
TITLE PAGE
APPROVAL PAGE
DEDICATION
ACKNOWELDGEMENT
ABSTRACT
CHAPTER ONE
1.0 INTRODUCTION
1.1 BACKGROUND OF THE PROJECT
- OBJECTIVE OF THE PROJECT
- SIGNIFICANCE OF THE PROJECT
- APPLICATION OF THE PROJECT
- SCOPE OF THE PROJECT
- LIMITATION OF THE PROJECT
- PROJECT ORGANISATION
CHAPTER TWO
LITERATURE REVIEW
- OVERVIEW OF ACCESS CONTROL
- REVIEW OF ACCESS CONTROL SYSTEM COMPONENTS
- BLUETOOTH TECHNOLOGY
- HISTORICAL BACKGROUND OF BLUETOOTH
- REVIEW OF RELATED WORKS
CHAPTER THREE
3.0 CONSTRUCTION METHODOLOGY
3.1 BLOCK DIAGRAM
3.2 SYSTEM OPERATION
3.3 CIRCUIT DESCRIPTION
3.4 WORKING PRINCIPLE
3.5 POWER SUPPLY UNIT
CHAPTER FOUR
4.0 TESTING AND RESULTS
- CONSTRUCTION PROCEDURE AND TESTING
- INSTALLATION OF THE COMPLET DESIGN
- ASSEMBLING OF SECTIONS
- TESTING OF SYSTEM OPERATION
- PRECAUSION
- ECONOMICS OF THE PROJECT
- PROJECT VIABILITY
- RELIABILITY
- MAINTAINABILITY
- PROJECT EVALUATION
CHAPTER FIVE
- CONCLUSION
- RECOMMENDATION
- REFERENCES
CHAPTER ONE
1.0 INTRODUCTION
Maslow’s hierarchy theory suggests that safety and security are the primary needs of a human being. Every person finds the need to have a secure security system for protecting their money, important documents, precious metals/stones and one’s life itself. This project now comes into picture. Security locks range from basic lock and key type to high end security locks with biometric inputs as its key for those who desire higher level of security. High end security locks offer higher security compared to low end locks. Installation of such complex locks is sometimes expensive and requires skilled personnel for installation. Low end locks are easy to install but often fall prey to tampering and get breached into easily.
This project uses an electromagnetic lock that is triggered to lock or unlock using electric signals from a controller board. This project uses a controller board called Arduino. This board is simple to use and program compared to other controller boards available in the open market. It is an open source physical computing platform based on a simple microcontroller. Arduino boards take inputs from various sensors or array of sensors and produce a respective digital signal. Arduino can easily establish a link between a computer and controller using respective software that is easily available in the market. Arduino uses an Atmega microcontroller as its heart to perform various operations. In our project we have established a link between the lock and the android phone using the phones Bluetooth. The main Arduino board contains a serial Bluetooth module connected to it. The android phone contains an application that is openly available to any one free of cost on the android play store. This applications establishes a connection with the serial Bluetooth modem attached to the Arduino board.
The android application for Bluetooth pairing has a UUID for user identification purpose. The Bluetooth connection will be established when the password entered is correct. Multiple phones can be used as a key to the lock if the password is known.
- OBJECTIVE OF THE PROJECT
The main objective of this project is to develop an embedded system, which is used to verify and authenticate the authorized and person enter the room. This code is entered from a handheld unit.
1.3 SIGNIFICANCE OF THE PROJECT
- Easy to install and use since there are no interconnecting
- Friction less operation since the lock used is Electromagnetic in
- Since the lock is present behind the door it more secure and less susceptible to
- Low maintenance compared to traditional
- Customizable since keys can be changed [7]Locks permits long distance buzz in
- This project provides security
- Power consumption is less
- Used commonly available components
1.4 APPLICATIONS OF THE PROJECT
· This simple circuit can be used at residential places to ensure better safety.
- It can be used at organizations to ensure authorized access to highly secured places.
- With a slight modification this Project can be used to control the switching of loads through bluetooth.
1.5 SCOPE OF THE PROJECT
The main component in the circuit is the arduino and the Bluetooth module used. In this project, the link is established between the lock and the android phone using the phones Bluetooth. The main Arduino board contains a serial Bluetooth module connected to it. The android phone contains an application that is openly available to any one free of cost on the android play store. This applications establishes a connection with the serial Bluetooth modem attached to the Arduino board.
The android application for Bluetooth pairing has a UUID for user identification purpose. The Bluetooth connection will be established when the password entered is correct.
1.6 LIMITATIONS OF THE PROJECT
· It is a low range circuit, i.e. it is not possible to operate the circuit remotely.
- If you forget the password it is not possible to open the door.
- Multiple phones can be used as a key to the lock if the password is known.
1.7 PURPOSE OF THE SYSTEM
The purpose of the system is to provide a user friendly security system for organizations and homes. This system is bluetooth based and allows only authorized person to access it with a password. It also has the provision of changing the password.
1.8 PROJECT WORK ORGANISATION
The various stages involved in the development of this project have been properly put into five chapters to enhance comprehensive and concise reading. In this project thesis, the project is organized sequentially as follows:
Chapter one of this work is on the introduction to bluetooth based security system. In this chapter, the background, significance, objective limitation and problem of bluetooth based security system were discussed.
Chapter two is on literature review of bluetooth based security system. In this chapter, all the literature pertaining to this work was reviewed.
Chapter three is on design methodology. In this chapter all the method involved during the design and construction were discussed.
Chapter four is on testing analysis. All testing that result accurate functionality was analyzed.
Chapter five is on conclusion, recommendation and references.
Design And Construction Of A Bluetooth Based Security System. (n.d.). UniTopics. https://www.unitopics.com/project/material/design-and-construction-of-a-bluetooth-based-security-system/
“Design And Construction Of A Bluetooth Based Security System.” UniTopics, https://www.unitopics.com/project/material/design-and-construction-of-a-bluetooth-based-security-system/. Accessed 22 November 2024.
“Design And Construction Of A Bluetooth Based Security System.” UniTopics, Accessed November 22, 2024. https://www.unitopics.com/project/material/design-and-construction-of-a-bluetooth-based-security-system/
Here’s a typical structure for Design And Construction Of A Bluetooth Based Security System research projects:
- The title page of Design And Construction Of A Bluetooth Based Security System should include the project title, your name, institution, and date.
- The abstract of Design And Construction Of A Bluetooth Based Security System should be a summary of around 150-250 words and should highlight the main objectives, methods, results, and conclusions.
- The introduction of Design And Construction Of A Bluetooth Based Security System should provide the background information, outline the research problem, and state the objectives and significance of the study.
- Review existing research related to Design And Construction Of A Bluetooth Based Security System, identifying gaps the study aims to fill.
- The methodology section of Design And Construction Of A Bluetooth Based Security System should describe the research design, data collection methods, and analytical techniques used.
- Present the findings of the Design And Construction Of A Bluetooth Based Security System research study using tables, charts, and graphs to illustrate key points.
- Interpret Design And Construction Of A Bluetooth Based Security System results, discussing their implications, limitations, and potential areas for future research.
- Summarize the main findings of the Design And Construction Of A Bluetooth Based Security System study and restate its significance.
- List all the sources you cited in Design And Construction Of A Bluetooth Based Security System project, following a specific citation style (e.g., APA, MLA, Chicago).