An IoT-Enabled Bicycle Access and Monitoring System with Geo-Fence-Based Location Restriction

IoT Bicycle Access & Monitoring Geo-Fence Campus Mobility OTP Authentication

Authors

July 30, 2025
September 21, 2025
October 10, 2025

Downloads

Managing shared bicycle usage within a university campus can be challenging, especially when relying on manual systems that are slow, difficult to track, and offer limited security. This paper propose the development of an IoT-based Bicycle Access and Monitoring System designed to make borrowing bikes easier for users and more manageable for campus administrators. The system allows users to borrow bicycles independently through a mobile application developed for Android devices. Each bicycle is equipped with a QR code, which users scan to initiate the borrowing process. After scanning, the application generates a One-Time Password (OTP), which is entered into a keypad embedded on the bicycle. After successful verification, the bicycle is automatically unlocked. To ensure bicycles remain within the designated campus boundaries, the system includes a geo-fencing feature that continuously monitors GPS coordinates. If a bicycle crosses the predefined boundary, the system triggers an alert and logs the event to a cloud-based database. All borrowing data including time, user ID, and location, are recorded in real time and accessible by campus administrators via a web interface. According experimental result show that the system functions reliably, with successful access control, accurate event logging, and an average GPS horizontal error of 1.48 meters. The proposed system provides a scalable, secure, and user-friendly solution for improving bicycle-sharing system in university area, enhancing both operational efficiency and student convenience.

How to Cite

Christian, H. ., Yusuf, Y. G., & Ainul, R. D. (2025). An IoT-Enabled Bicycle Access and Monitoring System with Geo-Fence-Based Location Restriction. Indonesian Journal of Electronics, Electromedical Engineering, and Medical Informatics, 7(4), 619-629. https://doi.org/10.35882/ijeeemi.v7i4.123

Similar Articles

1-10 of 64

You may also start an advanced similarity search for this article.