A Revolutionary Approach to Smart Applications Using IoT: Two-Level Authentication for Automatic Safety Door and Main Door Unlocking System using IoT and Deep Learning

Main Article Content

Ms. Rinkuben N. Patel
Mr. Dharmen B. Shah
Mr. Mayurdhwajsinh B. Gohil

Abstract

The increasing adoption of innovative door systems in residential and commercial usage has improved convenience in accessing the doors, but also introduced new security threats. Conventional approaches, such as facial recognition or pin code-based authentication, often rely on single-layer mechanisms, which can be vulnerable to intrusions. This paper proposes a two-level authentication framework to enhance door security and reliability. The primary level utilises facial recognition to grant access through a security door to registered users, including family members, authorised personnel, and trusted visitors. The second level secures the main entry door, which unlocks exclusively for recognized family members, thereby introducing an additional layer of protection. A key contribution of this approach is its ability to perform facial recognition once and leverage the verified data across both security stages, reducing redundancy while strengthening overall access control. The proposed system demonstrates the potential to improve innovative security solutions by integrating multi-layered authentication for enhanced safety in residential and office environments.

Downloads

Download data is not yet available.

Article Details

Section

Articles

How to Cite

[1]
Ms. Rinkuben N. Patel, Mr. Dharmen B. Shah, and Mr. Mayurdhwajsinh B. Gohil , Trans., “A Revolutionary Approach to Smart Applications Using IoT: Two-Level Authentication for Automatic Safety Door and Main Door Unlocking System using IoT and Deep Learning”, IJITEE, vol. 14, no. 10, pp. 9–15, Sep. 2025, doi: 10.35940/ijitee.I1139.14100925.
Share |

References

B. Zia and K. Chauhan, “A Research Paper on Internet of Things based upon Smart Homes with Security Risk Assessment using OCTAVE Allegro,” International Journal of Engineering Research & Technology (IJERT), vol. 9, no. 06, Jun. 2020. DOI: http://dx.doi.org/10.17577/IJERTV9IS060692

G. Y. Odongo, R. Musabe, D. Hanyurwimfura, and A. D. Bakari, “An Efficient LoRa-Enabled Smart Fault Detection and Monitoring Platform for the Power Distribution System Using Self-Powered IoT Devices,” IEEE Access, vol. 10, Jul. 2022. DOI: https://doi.org/10.1109/ACCESS.2022.3189002.

O. Said, Y. Albagory, M. Nofal, and F. Al Raddady, “IoT-RTP and IoT-RTCP: Adaptive Protocols for Multimedia Transmission over the Internet of Things Environments,” IEEE Access, vol. 5, Sep. 2017. DOI: https://doi.org/10.1109/ACCESS.2017.2726902

S. N. Swamy and S. R. Kota, “An Empirical Study on System Level Aspects of the Internet of Things (IoT),” IEEE Access, vol. 8, Oct. 2020. DOI: https://doi.org/10.1109/ACCESS.2020.3029847

M. A. C. Alvarado and P. Bazán, “Understanding the Internet of Nano Things: overview, trends, and challenges,” e-Ciencias de la Información, vol. 9, no. 1, Jun. 2019. DOI: https://doi.org/10.15517/eci.v1i1.33807

M. Ishaq, M. H. Afzal, S. Tahir, and K. Ullah, “A Compact Study of Recent Trends of Challenges and Opportunities in Integrating the Internet of Things (IoT) and Cloud Computing,” International Conference on Computing, Electronic and Electrical Engineering (ICE Cube), IEEE, 2021. DOI: 1https://doi.org/10.1109/ICECube53880.2021.9628191

S. Siddiqui, S. Hameed, S. A. Shah, I. Ahmad, A. Aneiba, D. Draheim, and S. Dustdar, “Toward Software-Defined Networking-Based IoT Frameworks: A Systematic Literature Review, Taxonomy, Open Challenges and Prospects,” IEEE Access, vol. 8, Jul. 2020. DOI: https://doi.org/10.1109/ACCESS.2022.3188311

M. G. Samaila, J. B. F. Sequeiros, T. Simões, M. M. Freire, and P. R. M. Inácio, “IoT-HarPSecA: A Framework and Roadmap for Secure Design and Development of Devices and Applications in the IoT Space,” IEEE Access, vol. 10, Jan. 2020.

DOI: https://doi.org/10.1109/ACCESS.2020.2965925

A.-R. H. Hussein, “Internet of Things (IoT): Research Challenges and Future Applications,” International Journal of Advanced Computer Science and Applications (IJACSA), vol. 10, no. 6, 2019. LINK DOI: http://dx.doi.org/10.14569/IJACSA.2019.0100611

S. A. Nama and K. A. Neamah, “Securing the Internet of Things,” Texas Journal of Engineering and Technology, vol. 7, no. 3, 2022.LINK: https://zienjournals.com/index.php/tjet/article/view/943

S. Kumar, P. Tiwari, and M. Zymbler, “Internet of Things is a revolutionary approach for future technology enhancement: a review,” Journal of Big Data, vol. 6, 2019. DOI: https://doi.org/10.1186/s40537-019-0268-2

L. -W. Tai, C.-E. Li, C.-L. Chen, C.-J. Tsai, H.-T. Chen and T. -L. Liu, "EigenGS Representation: From Eigenspace to Gaussian Image Space," 2025 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Nashville, TN, USA, 2025, pp. 13487-13496, DOI: https://doi.org/10.1109/CVPR52734.2025.01259

R. Rahim, T. Afriliansyah, H. Winata, D. Nofriansyah, Ratnadewi, and S. Aryza, “Research of Face Recognition with Fisher Linear Discriminant,” 4th International Conference on Operational Research (InteriOR), IOP Conf. Series: Materials Science and Engineering, vol. 300, 2018, p. 012037. DOI: 10.1088/1757-899X/300/1/012037

Rahmad, C., & Andrie, R. (2020). Comparison of the Viola-Jones Haar Cascade Classifier and Histogram of Oriented Gradients (HOG) for Face Detection. IOP Conference Series: Materials Science and Engineering, 732(1), 012038.

DOI: https://doi.org/10.1088/1757-899X/732/1/012038

J. Cervantes, F. García Lamont, L. Rodríguez Mazahua, and A. López Chau, "A comprehensive survey on support vector machine classification: Applications, challenges and trends," Neurocomputing, vol. 408, pp. 189–215, May 2020.

DOI: https://doi.org/10.1016/j.neucom.2019.10.118

R. Yamashita, M. Nishio, R. K. G. Do, and K. Togashi, “Convolutional neural networks: an overview and application in radiology,” Insights into Imaging, vol. 9, pp. 611–629, 2018. DOI: https://doi.org/10.1007/s13244-018-0639-9

S. Uddin, I. Haque, H. Lu, M. A. Moni, and E. Gide, “Comparative performance analysis of K nearest neighbour (KNN) algorithm and its different variants for disease prediction,” Scientific Reports, vol. 12, p. 6256, 2022. DOI: https://doi.org/10.1038/s41598-022-10358-x

F. Faisal and S. A. Hossain, “Smart security system using face recognition on Raspberry Pi,” 13th International Conference on Software, Knowledge, Information Management and Applications (SKIMA), 2019, pp. 1–8.

DOI: https://doi.org/10.1109/SKIMA47702.2019.8982466

J. Ijaradar and J. Xu, “A Cost-efficient Real-time Security Surveillance System Based on Facial Recognition Using Raspberry Pi and OpenCV,” Current Journal of Applied Science and Technology, vol. 41, no. 53, Apr. 2022. DOI: https://doi.org/10.9734/cjast/2022/v41i531665

Al Sadawi, M. S. Hassan, and M. Ndiaye, “A Survey on the Integration of Blockchain with IoT to Enhance Performance and Eliminate Challenges,” IEEE Access, vol. 9, Apr. 2021. DOI: https://doi.org/10.1109/ACCESS.2021.3070555

Most read articles by the same author(s)

<< < 5 6 7 8 9 10 11 12 13 14 > >>