DOI QR코드

DOI QR Code

IOT를 이용한 소규모 공간의 융합 잠금 장치 제안

Design of Small Space Convergence Locking device Using IoT

  • 박현주 (상명대학교 스마트 정보통신공학과)
  • Park, Hyun-Joo (Department of Smart Information and Communication Engineering Sang-Myung University)
  • 투고 : 2021.01.15
  • 심사 : 2021.02.20
  • 발행 : 2021.02.28

초록

본 논문에서는 IoT를 이용하여 원격 개폐가 가능한 스마트 공간 보안에 대한 장치 개발을 제안한다. 기존의 공간 보안 장치는 하드웨어를 부수거나 버튼 장치 또는 복제된 열쇠를 사용하여 개폐를 제어할 수 있었다. 최근 COVID-19 사태로 비접촉 장치에 대한 여러 응용 분야가 생겨났다. 본 연구에서는 장치에 접촉하지 않아도 앱을 통해 잠금을 해제 하는 기능을 가진 소형 공간 보안 장치 개발을 제안한다. 제어의 권한을 스마트폰으로 이전하여 사용자의 선택에 따라 하드웨어 조작만으로는 개폐할 수 없는 기능을 가진 장치를 고안하였다. 잠금 장치 접촉을 하지 않아도 앱을 이용하여 개폐가 가능하므로 편리하고 위생적이다. 스마트폰의 지문 인식 및 패턴 입력으로 사용자 인증 후 앱을 이용하므로 다중보안 기능을 가지고 있다. 사용자가 원한다면 앱 보안 해제 후 금고 또는 공간에 장착된 버튼을 직접 터치하거나 열쇠로 열면 보안이 해제된다. 또한 앱에 비활성 기능을 추가시켜 열쇠를 분실하거나 소형의 금고를 분실했을 경우 사용이 불가능하게 되어 금고의 문이 열리지 않도록 설계하였다. 본 연구는 보안이 필요한 사물에 다양하게 응용하여 효과적으로 확장할 수 있을 것으로 기대한다.

In this paper, we propose the development of a smart space security device that can be opened and closed remotely using IoT. Existing space security devices can control opening and closing by breaking hardware or only using button devices or replicated keys. The recent COVID-19 crisis has created several applications for non-contact devices. In this study, we propose the development of a small space security device that has the function of unlocking through an app without touching the device. By transferring the control authority to a smartphone, device that cannot be opened or closed by only operating hardware at the user's option. It is convenient and hygienic because it can be opened and closed using an app without touching the locking device. Multiple security is possible because security can be released using an app after user authentication by fingerprint recognition and pattern input on a smartphone. If the user wishes, after using the app security, the security is released by directly touching a button installed in the safe or space or opening it with a key. In addition, by adding an inactive function to the app, it is designed so that the door of the safe cannot be opened when the key is lost or the small safe is lost. This study is expected to be able to effectively expand the security system by applying variously to objects that require security.

키워드

참고문헌

  1. J. H. Yang, J. S. Lee, S. W. Ko, K. W. Lee & Y. S. Shin. (2018). Design and implementation of electronic control-based locking system. KOREA INFORMATION SCIENCE SOCIETY, pp. 337-339.
  2. S. W. Lee, J. H. Yoo & K. B. Shim. (2015). IoT-based real-time streaming and remote control for smart door lock systems. Journal of Korean Institute of Intelligent Systems 25(6), 565-570. https://doi.org/10.5391/JKIIS.2015.25.6.565
  3. O. Doh & I. Ha. (2015). A digital Door Lock System for the Internet of Things with Improved Security and Usability. Advanced Science and Technology Letters, 109, 33-38. https://doi.org/10.14257/astl.2015.107.09
  4. H. J. Seo & H. W. Kim. (2016), Design and implementation of multi-channel authentication based security card. Journal of the Korea Information and Communication Society, 20(1), 81-86. https://doi.org/10.6109/jkiice.2016.20.1.81
  5. H. J. Song, T. K. Park, S. S. Ham, K. H. Park & Y. H. Kim (2016). Design of multiple security safe system using remote control. Proceedings of KIIT Conference, pp. 220-222.
  6. J. S. Ahn, M. S. Park & J. I. Park. (2015). Remote control smart lock. KISS Conference, pp. 294-296.
  7. M. S. Jang, T. M. Park, J. K. Lee & B. H. Wang. (2016). One grip-based door lock integrated door lock system using fingerprint recognition and touch patterns. Journal of the Korean Intelligent Systems Society, 26(1), 30-36. https://doi.org/10.5391/JKIIS.2016.26.1.030
  8. J. Lim, C. Kim, W cha, T. Han, G. Huh, S. Song & S. Lee. (2013). Reliable Digital Door Lock Control System using Face Recognition. Journal of IKEEE, 17, 499-504. https://doi.org/10.7471/ikeee.2013.17.4.499
  9. M. Sahinani, C. Nanda, A. K. Sahu & B. Pattnaik. (2015). Web-based online embedded door access control and home security system based on face recognition, International Conference on Circuit, Power and Computing Technologies, pp. 19-20.
  10. M. K. Lee. (2010). Implementation of remote physical security system using smartphone. Korean Society of Electronics Engineers Conference, pp. 1630-1631.
  11. B. Yuksekkaya, A. A. Kayalar, M. B. Tosun, M. K. Ozcan & A. Z. Alkar. (2006). A GSM, internet and speech controlled wireless interactive home automation system, IEEE Transactions on Consumer Electronics, 52, 837-843. https://doi.org/10.1109/TCE.2006.1706478
  12. Y. W. Park & Digital doorlock. (2010). A method to expand market for small and medium companies, KISTI Market Report, 6, pp. 11-14.
  13. Peter Ha. (2015). Are smart locks secure, or just dumb? http://gizmodo.com/aresmart-locks-secure-or-just-dumb-511093690,2013
  14. S. R. Kwon. (2005). Study on development of the remote control door lock system including speeker verification function in real time. Korean Institute of Intelligent Systems, 15 pp. 714-719. https://doi.org/10.5391/JKIIS.2005.15.6.714
  15. A. W. Ahmad, N. Jan, S. Iqbal & C. Lee. (2011). Implementation of ZigBee-GSM based home security monitoring and remote control system. International Midwest Symposium on Circuits and System. pp. 1-4.
  16. Y. T. Park, P. Sthapit & J. Y. Pyun. (2009). Smart digital door lock for the home automation", TENCON 2009 - 2009 IEEE Region 10 Conferene, pp. 1-6.
  17. S. W. Cho & S. W. YEOM. (2016). Realization of smart vault using IoT technology. ieee.IEEK_Magazine, pp. 851-852.
  18. "Arduino", https://www.arduino.cc/
  19. S. J. Kim & J. B. Heo. (2019). Mobile Application Leak Detection and Security Enhancement. Journal of the Society for Information Protection, 29(1), 195-203.
  20. S. Hong, D. W. Kim & H. S. Kim. (2019). Design and implementation of Android app cache modulation attacks. Journal of the Society for Information Protection, 29(1), 205-214.
  21. H. E. Ju, J. H. Park, C. H. Lee, D. W. Kang & J. H. Jung. (2015). Digital door lock using NFC and app. Journal of the Korean Society of Machinery and Machinery Engineering Spring Conference, pp. 191-192.