Development and Implementation of an ESP32 Microcontroller and Monitoring System for Smart Door Lock Using RFID Sensor for E-KTP ID and Fingerprint Based on the Internet of Things
DOI:
https://doi.org/10.29103/micoms.v4i.908Keywords:
Smart door lock, E-KTP, Fingerprint, ESP32, Monitoring systemAbstract
This study aims to improve the effectiveness and efficiency of door security systems by integrating RFID technology, fingerprint recognition, and the Internet of Things (IoT). This system not only enables automatic locking but also provides real-time access control and monitoring through a web-based application. The technology supports high-level security through dual authentication methods, using E-ID cards and fingerprint sensors. Additionally, the implementation of IoT allows users to monitor and manage door access remotely, offering added flexibility and convenience. The system's trial shows high reliability in reading RFID and fingerprint data, with significant accuracy in various conditions. The results of this study contribute to the development of modern security solutions that can be applied in various environments, such as residential homes, offices, and public facilities, with the potential to reduce overall crime rates
References
[1] Syahputra, D. (2022). Angka Kriminalitas di Lhokseumawe Naik di 2022, Didominasi Pencurian dengan Kekerasan. INews Aceh.
[2] Pratama, Heroik M., and Nurul Amalia. Adoption of Voting Technology: A Guide for Electoral Stakeholders in Indonesia. International Institute for Democracy and Electoral Assistance (International IDEA), 2020.
[3] Budiman, Shahril, and Kedah Darul Aman. "DECLARATION OF ORIGINALITY..
[4] Ho, Grant, et al. "Smart locks: Lessons for securing commodity internet of things devices." Proceedings of the 11th ACM on Asia conference on computer and communications security. 2016.
[5] Hazazi, Hussein. Understanding and Improving the Usability, Security, and Privacy of Smart Locks from the Perspective of the End User. Diss. The University of North Carolina at Charlotte, 2024.
[6] Sahani, Mrutyunjaya, et al. "Web-based online embedded door access control and home security system based on face recognition." 2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]. IEEE, 2015.
[7] Pavithra, D., and Ranjith Balakrishnan. "IoT based monitoring and control system for home automation." 2015 global conference on communication technologies (GCCT). IEEE, 2015.
[8] Faisal, Mohammad Adrian, and Erwin Sitompul. "Door Security System Using e-KTP RFID Reading and Passive Infrared Sensor." (2019).
[9] Soemartono, Triyuni. "The Dynamic of e-KTP Evaluation Program in DKI Jakarta." BISNIS & BIROKRASI: Jurnal Ilmu Administrasi dan Organisasi 20.2 (2014): 5.
[10] Jain, Anil, and Sharath Pankanti. "Fingerprint classification and matching." Handbook for Image and Video Processing (2000): 821-836.
[11] Allen, Robert, Pat Sankar, and Salil Prabhakar. "Fingerprint identification technology." Biometric systems: Technology, design and performance evaluation. London: Springer London, 2005. 22-61.
[12] Tucker-Drob, Elliot M., and Daniel A. Briley. "Continuity of genetic and environmental influences on cognition across the life span: a meta-analysis of longitudinal twin and adoption studies." Psychological bulletin 140.4 (2014): 949.
[13] Finkenzeller, Klaus. RFID handbook: fundamentals and applications in contactless smart cards, radio frequency identification and near-field communication. John wiley & sons, 2010.
[14] Jia, Xiaolin, et al. "RFID technology and its applications in Internet of Things (IoT)." 2012 2nd international conference on consumer electronics, communications and networks (CECNet). IEEE, 2012.
[15] Katuk, Norliza, and Ikenna Rene Chiadighikaobi. "An enhanced block pre-processing of PRESENT algorithm for fingerprint template encryption in the internet of things environment." International Journal of Communication Networks and Information Security 13.3 (2021): 474-481.
[16] Ammar, Mahmoud, Giovanni Russello, and Bruno Crispo. "Internet of Things: A survey on the security of IoT frameworks." Journal of Information Security and Applications 38 (2018): 8-27.
[17] Al-Fuqaha, Ala, et al. "Internet of things: A survey on enabling technologies, protocols, and applications." IEEE communications surveys & tutorials 17.4 (2015): 2347-2376.
[18] Nurwijayanti, K. N., & Abdul Basyir. (2021). IoT-based Automated Door-Lock System
Integrated with RFID for Improved Security
[19] Najib, A. A., Munadi, R., & Karna, N. B. A. (2021). RFID with E-KTP Integration for IoT Home
Security Systems
[20] Yulisman, N. I., Sabna, E., & Fonda, H. (2021). IoT-Based Smart Door Lock with E-KTP for
Enhanced Home Security
[21] Alvayen, S., & Karnadi, K. (2022). Real-Time Monitoring and Access Control with IoTIntegrated RFID Systems
[22] Wiranata, A., Rizalitaher, A. S., & Daulay, W. A. A. (2023). Educational Application of IoTEnabled RFID for Remote Door Control and Monitoring
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Attariq Ziad, Eva Darnila, Kurniawati
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
COPYRIGHT NOTICE
Authors retain copyright and grant the journal right of first publication and this work is licensed under a Creative Commons Attribution-ShareAlike 4.0 that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
All articles in this journal may be disseminated by listing valid sources and the title of the article should not be omitted. The content of the article is liable to the author.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
In the dissemination of articles, the author must declare https://proceedings.unimal.ac.id/micoms/index as the first party to publish the article.