Skip to main content

Exploring the Efficiencies and Vulnerabilities of Smart Door Control Systems: A Systematic Review

  • Conference paper
  • First Online:
Internet of Things, Smart Spaces, and Next Generation Networks and Systems (NEW2AN 2023, ruSMART 2023)

Abstract

A smart door system, also known as a smart lock or intelligent door access system, is a modern Internet of Things (IoT) security technology that allows for remote and automated control of entry and exit within buildings or rooms in any smart environment (SE). These systems which frequently integrate with smartphones, keycards, or biometric authentication methods to improve security, convenience, and access control exhibit inefficiencies and setbacks for relying on various edge devices which introduce new vulnerabilities on daily basis. To mitigate these inefficiencies in future designs, this study considers it imperative to comprehensively understand the inefficiencies and related vulnerabilities of existing smart door systems in order to better design a robust system. Meanwhile, no systematic research has explored smart door control systems to identify the level of inefficiency and vulnerability each possesses, for a better design. Therefore, this study will explore the IoT automation and smart lock systems, highlighting their combined impact on increasing security, efficiency and their related vulnerabilities to guide for a more efficient design. Apart from contributing to usability research, this research will lead to a robust door control design implication, which is future consideration of our research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Ali, B., Awad, A.I.: Cyber and physical security vulnerability assessment for IoT-based smart homes. Sensors 18(3), 817 (2018)

    Article  Google Scholar 

  2. Anajemba, J.H., Yue, T., Iwendi, C., Chatterjee, P., Ngabo, D., Alnumay, W.S.: A secure multiuser privacy technique for wireless IoT networks using stochastic privacy optimization. IEEE Internet Things J. 9(4), 2566–2577 (2021)

    Article  Google Scholar 

  3. Ariff, M.I.M., Fadzir, F.D.M., Arshad, N.I., Ahmad, S., Salleh, K.A., Wahab, J.A.: Design and development of a smart garage door system. In: 2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), pp. 1–6. IEEE (2022)

    Google Scholar 

  4. Athalla, R., Mandala, S.: Analysis of smart home security system design based on facial recognition with application of deep learning. KLIK: Kajian Ilmiah Informatika dan Komputer 3(6), 680–687 (2023)

    Google Scholar 

  5. Bahalul Haque, A., Bhushan, B., Nawar, A., Talha, K.R., Ayesha, S.J.: Attacks and countermeasures in IoT based smart healthcare applications. In: Balas, V.E., Solanki, V.K., Kumar, R. (eds.) Recent Advances in Internet of Things and Machine Learning: Real-World Applications, pp. 67–90. Springer, Cham (2022). https://doi.org/10.1007/978-3-030-90119-6_6

    Chapter  Google Scholar 

  6. Bhatlawande, S., Shilaskar, S., Gadad, T., Ghulaxe, S., Gaikwad, R.: Smart home security monitoring system based on face recognition and android application. In: 2023 International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT), pp. 222–227. IEEE (2023)

    Google Scholar 

  7. Brunner, H., et al.: Leveraging cross-technology broadcast communication to build gateway-free smart homes. In: 2021 17th International Conference on Distributed Computing in Sensor Systems (DCOSS), pp. 1–9. IEEE (2021)

    Google Scholar 

  8. Dargan, S., Kumar, M.: A comprehensive survey on the biometric recognition systems based on physiological and behavioral modalities. Expert Syst. Appl. 143, 113114 (2020)

    Article  Google Scholar 

  9. Davis, B.D., Mason, J.C., Anwar, M.: Vulnerability studies and security postures of IoT devices: a smart home case study. IEEE Internet Things J. 7(10), 10102–10110 (2020)

    Article  Google Scholar 

  10. Efendi, A.M., Oh, S., Choi, D.: 6lowpan-based wireless home automation: from secure system development to building energy management. SmartCR 3(2), 123–138 (2013)

    Article  Google Scholar 

  11. Fernandes, E., Jung, J., Prakash, A.: Security analysis of emerging smart home applications. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 636–654. IEEE (2016)

    Google Scholar 

  12. Giri, D., Maitra, T., Amin, R., Srivastava, P.: An efficient and robust RSA-based remote user authentication for telecare medical information systems. J. Med. Syst. 39, 1–9 (2015)

    Article  Google Scholar 

  13. Ha, I.: Security and usability improvement on a digital door lock system based on internet of things. Int. J. Secur. Appl. 9(8), 45–54 (2015)

    Google Scholar 

  14. Hammi, B., Zeadally, S., Khatoun, R., Nebhen, J.: Survey on smart homes: vulnerabilities, risks, and countermeasures. Comput. Secur. 117, 102677 (2022)

    Article  Google Scholar 

  15. Heiding, F., Süren, E., Olegård, J., Lagerström, R.: Penetration testing of connected households. Comput. Secur. 126, 103067 (2023)

    Article  Google Scholar 

  16. Ho, G., Leung, D., Mishra, P., Hosseini, A., Song, D., Wagner, D.: Smart locks: lessons for securing commodity internet of things devices. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp. 461–472 (2016)

    Google Scholar 

  17. Iwendi, C., Uddin, M., Ansere, J.A., Nkurunziza, P., Anajemba, J.H., Bashir, A.K.: On detection of sybil attack in large-scale vanets using spider-monkey technique. IEEE Access 6, 47258–47267 (2018)

    Article  Google Scholar 

  18. Jain, A.K., Flynn, P., Ross, A.A.: Handbook of Biometrics. Springer, New York (2007)

    Google Scholar 

  19. Lu, M., Fu, G., Osman, N.B., Konbr, U.: Green energy harvesting strategies on edge-based urban computing in sustainable internet of things. Sustain. Urban Areas 75, 103349 (2021)

    Google Scholar 

  20. Mahmoud, R., Yousuf, T., Aloul, F., Zualkernan, I.: Internet of things (IoT) security: current status, challenges and prospective measures. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 336–341. IEEE (2015)

    Google Scholar 

  21. Mamonov, S., Benbunan-Fich, R.: Unlocking the smart home: exploring key factors affecting the smart lock adoption intention. Inf. Technol. People 34(2), 835–861 (2021)

    Article  Google Scholar 

  22. Mehmood, M.Q., Malik, M.S., Zulfiqar, M.H., Khan, M.A., Zubair, M., Massoud, Y.: Invisible touch sensors-based smart and disposable door locking system for security applications. Heliyon 9(2) (2023)

    Google Scholar 

  23. Motwani, Y., Seth, S., Dixit, D., Bagubali, A., Rajesh, R.: Multifactor door locking systems: a review. Mater. Today Proc. 46, 7973–7979 (2021)

    Article  Google Scholar 

  24. Pathmabandu, C., Grundy, J., Chhetri, M.B., Baig, Z.: Privacy for IoT: informed consent management in smart buildings. Futur. Gener. Comput. Syst. 145, 367–383 (2023)

    Article  Google Scholar 

  25. Patil, K.A., Vittalkar, N., Hiremath, P., Murthy, M.A.: Smart door locking system using IoT. Int. Res. J. EngTechnol (IRJET) 3090–3094 (2020)

    Google Scholar 

  26. Pawar, S., Kithani, V., Ahuja, S., Sahu, S.: Smart home security using IoT and face recognition. In: 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), pp. 1–6. IEEE (2018)

    Google Scholar 

  27. Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40(3), 614–634 (2001)

    Article  Google Scholar 

  28. Ravi, D., Honnavalli, P.B., Vijay, C.N.: A system to retrofit existing infrastructure to be smart and IoT ready. In: Proceedings of the 2020 4th International Conference on Vision, Image and Signal Processing, pp. 1–6 (2020)

    Google Scholar 

  29. Roy, S., Uddin, M.N., Haque, M.Z., Kabir, M.J.: Design and implementation of the smart door lock system with face recognition method using the linux platform raspberry pi. IJCSN-Int. J. Comput. Sci. Network 7(6) (2018)

    Google Scholar 

  30. Said, A., Jama, A., Mahamud, F., Mohan, J., Ranganathan, P.: Smart home vulnerabilities–a survey. In: Proceedings of the International Conference on Embedded Systems, Cyber-physical Systems, and Applications (ESCS), pp. 83–87. The Steering Committee of The World Congress in Computer Science, Computer ... (2018)

    Google Scholar 

  31. Sarp, B., Karalar, T.: Real time smart door system for home security. Int. J. Sci. Res. Inf. Syst. Eng. (IJSRISE) 1(2), 121–123 (2015)

    Google Scholar 

  32. Toutsop, O., Das, S., Kornegay, K.: Exploring the security issues in home-based IoT devices through denial of service attacks. In: 2021 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/IOP/SCI), pp. 407–415. IEEE (2021)

    Google Scholar 

  33. Trivedi, H., Parmar, S., Gajjar, S.: Smart door system to prevent covid-19 transmission. In: 2023 International Conference on Inventive Computation Technologies (ICICT), pp. 976–981. IEEE (2023)

    Google Scholar 

  34. Wang, Z., et al.: A survey on IoT-enabled home automation systems: attacks and defenses. IEEE Commun. Surv. Tutor. (2022)

    Google Scholar 

  35. Wayman, J.L., Jain, A.K., Maltoni, D., Maio, D.: Biometric Systems: Technology, Design and Performance Evaluation. Springer, London (2005). https://doi.org/10.1007/b138151

  36. Xin, T.Y., Katuk, N., Arif, A.S.C.M.: Smart home multi-factor authentication using face recognition and one-time password on smartphone. iJIM 15(24), 33 (2021)

    Google Scholar 

  37. Yang, J., Sun, L.: A comprehensive survey of security issues of smart home system: “spear” and “shields”, theory and practice. IEEE Access (2022)

    Google Scholar 

  38. Yang, Y., Wu, L., Yin, G., Li, L., Zhao, H.: A survey on security and privacy issues in internet-of-things. IEEE Internet Things J. 4(5), 1250–1258 (2017)

    Article  Google Scholar 

  39. Ye, M., Jiang, N., Yang, H., Yan, Q.: Security analysis of internet-of-things: a case study of august smart lock. In: 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 499–504. IEEE (2017)

    Google Scholar 

  40. Zhang, X., Song, M., Xu, Y., Dai, Z., Zhang, W.: Intelligent door lock system based on raspberry pi. In: 2021 2nd International Conference on Artificial Intelligence and Information Systems, pp. 1–7 (2021)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Joseph Henry Anajemba .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Almheiri, S. et al. (2024). Exploring the Efficiencies and Vulnerabilities of Smart Door Control Systems: A Systematic Review. In: Koucheryavy, Y., Aziz, A. (eds) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN ruSMART 2023 2023. Lecture Notes in Computer Science, vol 14542. Springer, Cham. https://doi.org/10.1007/978-3-031-60994-7_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-60994-7_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-60993-0

  • Online ISBN: 978-3-031-60994-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics