CFP last date
22 December 2025
Call for Paper
January Edition
IJCA solicits high quality original research papers for the upcoming January edition of the journal. The last date of research paper submission is 22 December 2025

Submit your paper
Know more
Random Articles
Reseach Article

Design and Development of an IoT-Based Room Access Security System with Password Authentication and Real-Time Notification

by Ali Ramschie, Ronny Katuuk, Fanny Doringin, Sulastri Eksan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 187 - Number 52
Year of Publication: 2025
Authors: Ali Ramschie, Ronny Katuuk, Fanny Doringin, Sulastri Eksan
10.5120/ijca2025925891

Ali Ramschie, Ronny Katuuk, Fanny Doringin, Sulastri Eksan . Design and Development of an IoT-Based Room Access Security System with Password Authentication and Real-Time Notification. International Journal of Computer Applications. 187, 52 ( Nov 2025), 59-67. DOI=10.5120/ijca2025925891

@article{ 10.5120/ijca2025925891,
author = { Ali Ramschie, Ronny Katuuk, Fanny Doringin, Sulastri Eksan },
title = { Design and Development of an IoT-Based Room Access Security System with Password Authentication and Real-Time Notification },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2025 },
volume = { 187 },
number = { 52 },
month = { Nov },
year = { 2025 },
issn = { 0975-8887 },
pages = { 59-67 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume187/number52/design-and-development-of-an-iot-based-room-access-security-system-with-password-authentication-and-real-time-notification/ },
doi = { 10.5120/ijca2025925891 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2025-11-18T21:10:23.098837+05:30
%A Ali Ramschie
%A Ronny Katuuk
%A Fanny Doringin
%A Sulastri Eksan
%T Design and Development of an IoT-Based Room Access Security System with Password Authentication and Real-Time Notification
%J International Journal of Computer Applications
%@ 0975-8887
%V 187
%N 52
%P 59-67
%D 2025
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Room access security is an essential aspect of safeguarding both physical assets and sensitive data. Although the use of physical keys and access cards is still common, both methods have their weaknesses. Keys can be lost or duplicated, while access cards are at risk of being misused by unauthorized individuals. Such situations may reduce the level of security, especially if not supported by a reliable monitoring system. Therefore, a more modern and secure technology-based solution is needed to ensure room security through the implementation of an IoT-based access control system. This research designs a room access security system utilizing Internet of Things (IoT) technology, with authentication carried out through password input on a keypad device. If any suspicious access activity occurs, the system will automatically send a notification to the room owner’s smartphone. With this feature, the owner can directly receive information about both authorized and unauthorized access activities. The method applied in this research is prototyping, with a workflow that includes problem identification, data collection, system design, prototype development, implementation, and system evaluation. The results show that the IoT-based room access security system with password authentication via keypad functions properly. When the detected password input is correct, the door will unlock, and the electrical system in the room will be activated. If the password input is incorrect, the alarm will sound, and the system will send a notification to the owner’s smartphone. Consequently, the room owner can disable the password input function via the keypad and also monitor the room condition through CCTV access.

References
  1. J. S. Sonamoni, M. S. Islam, and M. M. Rahman, “IoT-Based Smart Remote Door Lock and Monitoring System Using an Android Application,” Int. J. Comput. Appl., vol. 183, no. 18, pp. 25–30, 2021, doi: 10.5120/ijca2021921534.
  2. Alotaibi, H. Sedky, and A. M. Alshamrani, “A Review of Authentication Techniques for Internet of Things,” Sensors, vol. 25, no. 7, pp. 3215–3233, 2025, doi: 10.3390/s25073215.
  3. M. Kokila, S. Srivastava, and R. Gupta, “Authentication, Access Control and Scalability Models in IoT Environments: A Review,” Future Generation Computer Systems, vol. 156, pp. 170–186, 2025, doi: 10.1016/j.future.2025.01.019.
  4. K. Ragothaman et al., “Access Control for IoT: A State-of-the-Art Survey,” ACM Comput. Surv., vol. 56, no. 3, pp. 1–37, 2023, doi: 10.1145/3560897.
  5. W. He, X. Liu, and M. Ren, “Rethinking Access Control and Authentication for the Home IoT,” in Proc. 27th USENIX Security Symposium, 2018, pp. 255–272.
  6. Y. Akbari et al., “A New Framework for Smart Doors Using mmWave Radar and Camera-Based Face Detection and Recognition Techniques,” Sensors, vol. 24, no. 1, pp. 1–17, 2024, doi: 10.3390/s24010172.
  7. G. Vardakis, P. Liaskos, and I. Tsetsos, “Review of Smart-Home Security Using the Internet of Things,” Electronics, vol. 13, no. 16, pp. 3343–3357, 2024, doi: 10.3390/electronics13163343.
  8. S. Uppuluri and G. Lakshmeeswari, “Secure User Authentication and Key Agreement Scheme for IoT Device Access Control Based Smart Home Communications,” Wireless Netw., vol. 29, no. 3, pp. 1333–1354, 2023, doi: 10.1007/s11276-022-03197-1.
  9. M. A. Khan, H. Abbas, and S. F. Abid, “A Survey of Authentication in Internet-of-Things Enabled Systems,” Sensors, vol. 22, no. 22, pp. 8793–8812, 2022, doi: 10.3390/s22228793.
  10. M. Choi, K. Lee, and Y. Kim, “Keystroke Dynamics-Based Authentication Using Unique Keypads,” Sensors, vol. 21, no. 4, pp. 1245–1258, 2021, doi: 10.3390/s21041245.
  11. A. Ramzan, S. Iqbal, and F. Ahmad, “Double-Layered Authentication Door-Lock System Utilizing Multiple Factors,” Sensors, vol. 25, no. 3, pp. 1153–1166, 2025, doi: 10.3390/s25031153.
  12. Y. Tian, Z. Li, and H. Xu, “Semi-Quantum Secure Protocols for Smart Door Lock Scenarios,” Sensors, vol. 24, no. 5, pp. 1987–2001, 2024, doi: 10.3390/s24051987.
  13. P. Satanasaowapak, C. Srisomboon, and T. Maneerat, “Residential Access Control System Using QR Code and the IoT,” in Proc. IEEE Int. Conf. on Smart IoT, 2021, pp. 87–92, doi: 10.1109/SmartIoT52359.2021.00020.
  14. K. Ragothaman et al., “Access Control for IoT-Based Big Data: A State-of-the-Art Discussion,” in Proc. ACM Symp. on Access Control Models and Technologies, 2024, pp. 115–126, doi: 10.1145/3641234.3641245.
  15. J. Liu, Y. Zhang, and T. Wang, “Blockchain-Based Dynamic Key Authentication Protocol for IoT Access Control,” IEEE Internet Things J., vol. 12, no. 4, pp. 3450–3462, 2025, doi: 10.1109/JIOT.2025.3345678.
Index Terms

Computer Science
Information Sciences

Keywords

IoT Room Access Security Password Authentication Real-Time Notification Prototyping Method