1. Trang chủ
  2. » Luận Văn - Báo Cáo

Thiết kế hệ thống khóa cửa điện tử

66 99 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 66
Dung lượng 2,06 MB

Nội dung

ĐẠI HỌC QUỐC GIA TP HCM TRƯỜNG ĐẠI HỌC BÁCH KHOA TRẦN BẢO ÂN THIẾT KẾ HỆ THỐNG KHÓA CỬA ĐIỆN TỬ DESIGN AN ELECTRONIC DOOR LOCK SYSTEM Chuyên ngành : Cơ điện tử Mã số: 60520114 LUẬN VĂN THẠC SĨ TP HƠ CHÍ MINH, tháng 12 năm 2017 ĐẠI HỌC QUỐC GIA TP.HCM TRƯỜNG DẠI HỌC BÁCH KHOA CỘNG HÒA XẢ HỘI CHỦ NGHĨA VIỆT NAM Độc lập - Tự - Hạnh phúc NHIỆM VỤ LUẬN VĂN THẠC SĨ Họ tên học viên: Trần Bảo Ân MSHV: 1670543 Ngày, tháng, năm sinh: 22/10/1993 Nơi sinh: Tp HCM Chuyên ngành: Kỹ thuật điện tử Mã số : 60520114 I TÊN ĐỀ TÀI: THIẾT KẾ HỆ THỐNG KHÓA CỬA ĐIỆN TỬ DESIGN AN ELECTRONIC DOOR LOCK SYSTEM II NHIỆM VỤ VÀ NỘI DUNG: - Tìm hiểu tổng quan sản phẩm khóa cửa điện tử - Tìm hiểu thiết kế giải thuật kết nối mạng bảo mật cho khóa cửa điện tử - Thiết kế lược đồ hoạt động hệ thống thực nghiệm III NGÀY GIAO NHIỆM VỤ : (Ghi theo QĐ giao đề tài) IV NGÀY HOÀN THÀNH NHIỆM VỤ: (Ghi theo QĐ giao đề tài) V CẤN BỘ HƯỚNG DẨN (Ghi rõ học hàm, học vị, họ, tên): Tiến sĩ Trần Việt Hồng Tp HCM, ngày tháng năm20 CÁN BỘ HƯỚNG DẪN (Họ tên chữ ký) CHỦ NHIỆM BỘ MÔN ĐÀO TẠO (Họ tên chữ ký) TRƯỞNG KHOA (Họ tên chữ ký) 11 PREFACE I appreciate Ho Chi Minh City University of Technology to give me a chance to improve my technical skill and documentation skill throughout the master thesis Thanks my faculty, Mechatronics, to provide me information and all supports Last words, I want to send great thank to my supervisor - Dr Trần Việt Hồng who has given me lots of advice and instruction along the way Ho Chi Minh city, 4th Dec, 2017 Trần Bảo Ân iii INTRODUCTION Trong trình nghiên cứu báo cáo khoa học, nghe lời khuyên: “Nghiên cứu khoa học báo cáo đon thuần, mà phải câu chuyên sống động” Tôi viết chuông câu chuyện vào năm 2016 Câu chuyện chưa kết thúc vào năm ấy, câu chuyên tiếp nối Một chưong đầy hấp dẫn kể phần báo cáo Phần tổng quan cung cấp thông tin tưong lai sản phẩm Smart lock Nó có tiềm có rủi ro phát triển Và rủi ro lớn An ninh mạng Thiết kế hộp đen đến thiết kế chi tiết, từ kết nối đon đến bảo mật cấp cao Mơ hình dòng chảy liệu thiết kế kiểm chứng thực nghiệm Charlie Munger nói: “Lấy ý tưởng đơn giản giải nghiêm túc” Đó ý tưởng mà câu chuyện mà mang đến, không đưa cách diet kế Smart lock mà sản phẩm IoT sau During research and technical presentation, I always heard that:“A Scientific Research should be a story, instead of a mere report” I have written its first season during my thesis in 2016 - Design a electronic Door Lock Stories doesn’t end up like that Now, I continue to write the following season A very sexy one that bring you a panoramic and structured view of the whole Door Lock system An overview section win bring information about future of Smart lock product It has potential as well as risk when developing The most critical issue is cyber attack on Smart lock A design win go from Black box to detail design, from connectivity to security A model of data stream win also given A prototype is built up to validate designed function “Take a simple idea and take it seriously” - Charlie Munger That is the idea of this document which not only shows the way to design Smart lock but also to design IoT devices in the future Trần Bảo Ân IV GUARANTEE I will guarantee this research is my independent study All data and figure have reference and publish correctly All results has been written myself and they have never been published in other technical research Trần Bảo Ân TABLE OF CONTENT CHAPTER 1: OVERVIEW 1.1 Reason to develop a Smart Lock 1.1.1 Customer need 1.1.2 Market trend 1.2 Downside of having a Smart Lock 1.2.1 Its technology is expensive 1.2.2 Steep learning curve 1.2.3 Internet reliability 1.2.4 Cyber attack 1.2.5 Invasion of Privacy 1.2.6 Security Flaws 1.2.7 Summary 1.3 Cyber attack on Smart Lock 1.4 Design of a Doorlock system 1.4.1 Blackbox 1.4.2 Interstice for cyber attack 1.4.3 Function of existing product 1.5 Research of previous study 1.6 Objective, purpose and scope 1.6.1 Objective 1.6.2 Purpose 1.6.3 Scope 1.7 Thesis structure 10 CHAPTER2: SELECTION OF DESIGN PLAN 11 2.1 Smart lock design in the previous study 11 2.2 Plan selection 11 2.3 Connection selection 11 2.4 IoT Platform - Cloud service selection 13 2.4.1 Hunger.io platform 14 2.4.2 ThingSpeak platform 15 2.4.3 Ibm platform 16 2.4.4 Comparison 16 2.5 Wireless module selection 17 2.6 Schematic 18 CHAP TER 3: SYSTEM DESIGN 19 3.1 Black box revealing 19 3.2 Design for communication 21 3.2.1 Bluetooth communication 21 3.2.2 WiFi communication - Microcontroller, ESP8266 and IhingSpeak 21 3.2.3 WiFi communication - ThingSpeak and App 22 3.3 Design for security 23 3.3.1 Connection - Bluetooth connection with advance protection 23 3.3.2 Connection - WiFi connection between ESP8266 and Modem 26 3.3.3 Connection - Security of Cloud Platform 27 3.3.4 Connection - WiFi connection between Phone and Cloud Platform 28 3.4 Conclusion 28 CHAPTER 4: INNOVATION AND FINALIZATION 30 viii Chapter 4: Innovation and finalization Figure 4.8 Data streaming in closed range access via Bluetooth Figure 4.9 Data streaming in wide range access via Internet 36 Chapter 4: Innovation and finalization Figure 4.10 Data streaming in getting Lock notification and Tracking Log Figure 4.11 Data streaming in Password changing 37 Chapter 4: Innovation and finalization Anhiino Anhiino L'l'Yvu |£|>_I Pnrn "wn krrrxr n c fi V DBcryptKd) 11 (V patfOMi l-IT> — IruE ORĨN; *W(X tUlffl- KTwfcedi -pun 141 } Keypad npul a 4.5 Figure 4.12 Data streaming in processing of one-time key access via SMS System under harsh conditions When operating, unexpected events can always happen Here it is some cases: • Phone lost • Electricity and Internet lost Two cases above are always questioned when people hearing about concept ‘Smart lock” 4.5.1 Phone lost When loosing phone, user will face major issues: 4.5.I.I • 1st issue: User cannot enter their house • 2nd issue: Villains can enter their house User cannot enter their house There are solutions for 1st issue First way: borrow a phone with Application They can use the secondary phone (their secondary phone or borrow someone) which has Smartlock Application and open the door 38 Chapter 4: Innovation and finalization Second wav: pick up a phone and call their relative to open the door They can go to the phone booth or borrow a phone to call their family - who also has access to the house (know the password) Their relative will open the phone via Internet 4.5.1.2 Villains can enter user’s house Even when bad guys have user’s phone, they still have to break password to enter Ihe only way to break the code is approaching the home, connecting to Bluetooth and starting to hack Therefore, user has enough time to change their password After entering home without their phone, user is recommened to change their password instantly! Thus, their house is safe! 4.5.2 Electricity and Internet lost Most product on market has only one function remaining to work under loosing power condition: closed range access In the designed system, there is one more function working: one-time key access via SMS It brings product a huge advantages when developing in Vietnam where infrastructure for IoT such as Internet and Electricity are not stable 4.6 Conclusion This chapter discuss about five functions that all Smartlock have Study design provides same functions but provide more secure service and more options to choose when facing harsh conditions There are ways to grant access to lock: • Correct phone ID with correct password using Bluetooth • Correct phone ID with correct password using Wi-Fi • Grant access from Host’s phone (host enters correct password) Thus, design will give customer more options to choose, depend on situations A model of data stream is also given It can be a reference to other IoT devices later 39 Chapter 5: Experiments CHAPTER 5: EXPERIMENTS Design and implementation are completely different To make sure system can work on the field, experiments are necessary Therefore, a testing will be set up to validate design After getting the results from experiments, the design will be had confidence enough to release 5.1 Purpose of experiments Design has five functions in total: closed range access via Bluetooth, wide range access via Internet, lock status notification I tracking log, password changing and onetime key access for Friend/Shipper/Neighbor In which closed range access via Bluetooth has been tested in the previous work Due to lack of resources, only critical function is chosen to be implemented An old prototype will be used again to validate two functions: 5.2 • Wide range access via Internet • One-time key access for Friend/Shipper/Neighbor Set-up a model Past model is used (Fig.5.2) Model consists of: • Microcontroller Arduino Mega 2560 • Smartphone already installed Application “Khóa cửa thơng minh ver 2.0” • LCD module 1602 (Fig.5.1) Figure 5.1 Blue LCD module 1602 Figure from buydisplay.com product 1602 Blue LCD Module HD44780 • Module Bluetooth HC05 • Servo motor • Power backup circuit 40 Chapter 5: Experiments • Adapter 9V • Resistor, wire and battery • Wooden door 30cm X 30cm X 2cm • Door latch from mica • Plastic protection box Figure 5.2 Some picture of used model for testing In this experiment, ESP8266 NodeMCU will be added to the prototype (Fig.5.3) Figure 5.3 Module NodeMCU WIFI ESP8266 VI.0 Source 5.3 Wide range access via Internet A setup is built up as Figure 5.4 41 Chapter 5: Experiments Figure 5.4 Test setup for wide range access ria Internet A prototype has limit It is the capability of ThingSpeak platform Free version only allows send message update per 15 second (Fig.5.5) License optìữỉì Free :ll nc n-t ommcrcial Uw project a rd for evaluation of the service Scalable for larger projects h|Qr Annual Itsagi IS capped Number Df messages rrilli'Jii/yeaf Message Lipdate interval limit Every 1Ỉseconds Compute Timeout 2D seconds Technical Support Forum Number oralmuliỉanecus MQTT su Ascriptions Lim íted to Figure 5.5 Capability of IhingiSpeak’s free user 42 Chapter 5: Experiments Enter correct password (in this case is 9999) Click send (Fig.5.6 and Fig.5.7) Figure 5.6 Test procedure for Internet access: door closed Figure 5.7 Test procedure fer Internet access: door opened Field Chart shows value of sent Password Red marked peaks are 9999 where door will open (Fig.5.8) 43 Chapter 5: Experiments □ ThingSpeak™ Channel Stats CrMttd: J-UBtHbiUje UpdMicf: ib^\l?.h.wr: MP 1H-il y 2betJi._v tys&ĩl Ẹrựii^ị: ID Ftakj Chart GF it AndrfliiJC 15k — oo9 fl '** 1” : - — ■ - - - ™z " 5L II it II K- Il 3b Dll? Figure 5.8 A graph of sent data to IhingSpeak Ihe correct pass has been entered three times System time response can be found in the table 5.1 No Password Response of IhingSpeak Response of Doorlock system 9999 seconds seconds 9999 seconds seconds 9999 seconds seconds Table 5.1 System response when using Wide range access function Table shows that the response time is stable and consistent - seconds after clicking open button This response time is OK for Smart lock application 5.4 One-time key access via SMS A setup is built up as Fig.5.9 Phone in the left represent for guest’s phone, on the right is the home owner’s phone 44 Chapter 5: Experiments Figure 5.9 Test setup fer one-time key access function Below is some figures of the test procedure Figure 5.10 Guest successfully sent SMS to Host Figure 5.12 Text message the Guest received 45 Chapter 5: Experiments Hi thrrc, I11IĨ 15 An Public r0){ int phil=al*(p-1)+1; sl=phil%e; al++; } dP= ( (al-1) *(p-l)+l)/e; //Tim dQ int s2=l; int a2=l; while (s2>0) { int phi2=a2*(q-1)+1; ... thuật điện tử Mã số : 60520114 I TÊN ĐỀ TÀI: THIẾT KẾ HỆ THỐNG KHÓA CỬA ĐIỆN TỬ DESIGN AN ELECTRONIC DOOR LOCK SYSTEM II NHIỆM VỤ VÀ NỘI DUNG: - Tìm hiểu tổng quan sản phẩm khóa cửa điện tử. .. quan sản phẩm khóa cửa điện tử - Tìm hiểu thiết kế giải thuật kết nối mạng bảo mật cho khóa cửa điện tử - Thiết kế lược đồ hoạt động hệ thống thực nghiệm III NGÀY GIAO NHIỆM VỤ :... rủi ro phát triển Và rủi ro lớn An ninh mạng Thiết kế hộp đen đến thiết kế chi tiết, từ kết nối đon đến bảo mật cấp cao Mơ hình dòng chảy liệu thiết kế kiểm chứng thực nghiệm Charlie Munger nói:

Ngày đăng: 04/02/2020, 20:28

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN

w