2020
DOI: 10.5120/ijca2020919882
|View full text |Cite
|
Sign up to set email alerts
|

Smart Lock Systems: An Overview

Abstract: Smart lock can be regarded as the modern successor of the traditional lock. This paper provides an overview of different smart lock technologies. The smart lock system being adopted in many homes and other commercial buildings today is an innovative approach that provides many user-friendly benefits with its tolerable downsides.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…To determine the neighbor detecting ability of BLE, a model was built and was also utilized to determine the latency of the device discovery and derived the performance under various conditions. Diamond Celestine Aluri [3] proposed a smart door locking system which uses a cryptographic key to open the door via Bluetooth Low Energy (BLE) enabled devices. These smart locks have to be associated with smartphone applications to authenticate.…”
Section: Proposed Algorithmmentioning
confidence: 99%
“…To determine the neighbor detecting ability of BLE, a model was built and was also utilized to determine the latency of the device discovery and derived the performance under various conditions. Diamond Celestine Aluri [3] proposed a smart door locking system which uses a cryptographic key to open the door via Bluetooth Low Energy (BLE) enabled devices. These smart locks have to be associated with smartphone applications to authenticate.…”
Section: Proposed Algorithmmentioning
confidence: 99%
“…To prevent such spoofing and cloning, the Pi's UUID is changed and regenerated at regular intervals by running cron jobs on the Pi to prevent spoofing and cloning. A normal Bluetooth connection as used in [27] needs both devices to approve of the connection since it involves two-way pairing but in the proposed method BLE is used and it is more efficient for the requirement since the Pi sends out an ID and all nearby devices can capture the ID [28]. The only drawback of BLE is the possibility of cloning which has been solved by the system as well.…”
Section: Bluetooth Low Energymentioning
confidence: 99%