ArticlePDF Available

Rfid based automated gate security system

Authors:

Abstract and Figures

Here has been rising enthusiasm for secure structure that must be attempted and genuine and smart respond for the organizations and companions. RFID (Radio Frequency Identification) is one of the consistent and speedy techniques for perceive the material dissent. In the long-back the institutionalized distinguishing pieces of proof are more perfect when stood out from RFID because of their cost yet now day by day's RFID are viably open and are more beneficial to use. Research has revealed some exceptional enhancements which make its programming significantly shorter and less requesting is an immediate consequence of supplanting microcontroller with Arduino. Arduino makes the circuit and programming a significant measure easier to get it. Paper relies upon security access and control system using RFID and Arduino with GSM module. A segment of the sensors are used like PIR, LPG for spillage area. Security get to system is astoundingly beneficial to use at home, office and business structures.
Content may be subject to copyright.
VOL. 13, NO. 22, NOVEMBER 2018 ISSN 1819-6608
ARPN Journal of Engineering and Applied Sciences
©2006-2018 Asian Research Publishing Network (ARPN). All rights reserved.
www.arpnjournals.com
8901
RFID BASED AUTOMATED GATE SECURITY SYSTEM
Asha. N1, A. S. Syed Navaz2, J. Jayashree1 and J. Vijayashree1
1Vellore Institute of Technology University, Vellore, Tamil Nadu, India
2Computer Applications, Muthayammal College of Arts and Science, Namakkal, Tamil Nadu, India
E-Mail: asha333.spring@gmail.com
ABSTRACT
Here has been rising enthusiasm for secure structure that must be attempted and genuine and smart respond for the
organizations and companions. RFID (Radio Frequency Identification) is one of the consistent and speedy techniques for
perceive the material dissent. In the long-back the institutionalized distinguishing pieces of proof are more perfect when
stood out from RFID because of their cost yet now day by day's RFID are viably open and are more beneficial to use.
Research has revealed some exceptional enhancements which make its programming significantly shorter and less
requesting is an immediate consequence of supplanting microcontroller with Arduino. Arduino makes the circuit and
programming a significant measure easier to get it. Paper relies upon security access and control system using RFID and
Arduino with GSM module. A segment of the sensors are used like PIR, LPG for spillage area. Security get to system is
astoundingly beneficial to use at home, office and business structures.
Keywords: RFID, GSM, GPS, MATLAB, Arduino, sensors.
INTRODUCTION
RFID, Radio Frequency Identification is a central
and cheap innovation that empowers remote information
transmission. This innovation has not been all the time
utilized as a part of industry because of absence of
institutionalization among the assembling organizations
prior. RFID advances are productive and secure contrast
with other system. With RFID, remote programmed
recognizable proof takes a certain frame: the question,
area, or individual is set apart with a remarkable identifier
code contained with a RFID tag, which is somehow
connected to or implanted in the objective. RFID isn't a
solitary item however a complete framework, an ordinary
RFID framework incorporate three essential components:
RFID tag, peruser and back-end application framework,
which requests the help of the PC organize.
A RFID peruser produces a low-level radio
recurrence attractive field that empowers the tag. The label
reacts to the peruser's inquiry and reports its quality
through radio waves, transmitting its interesting ID
information. This information is decoded by the peruser
and go to the nearby application framework by means of
middleware. The middleware goes about as an interface
between the peruser and the RFID application framework.
The framework at that point looks and matches the
personality code with data put away in the host database or
backend framework. Along these lines, openness or
approval for additionally preparing can be conceded or
cannot, contingent upon comes about got by the peruser
and handled by the database.
BACKGROUND AND RELATED WORK
Today individuals are confronting more issues
about security in all finished world, these days security is
the most fundamental issue wherever on the planet; so
security of everything increases increasingly elevated
significance as of late. Here in this paper, endeavouring to
repeat the thorough writing study identified with the
different entryway bolts and gate security frameworks that
are vital in the fields, for example, home, businesses and
vehicle security where potential outcomes of invasion are
expanding step by step. In past days, the exploration is
gone on different entryway bolt security frameworks like
customary security frameworks which give signs utilizing
caution. Because of the headway in late strategies, some
entryway bolt security frameworks depend on
microcontroller, GSM, GPS, numerous sensors,
programming like MATLAB, PROTEUS, and biometrics
like face acknowledgment, Iris scanner, RFID, Smart Card
and secret key and so on. Every framework has its own
points of interest and weaknesses. In the greater part of
frameworks, SMS method is utilized for correspondence
so the framework will move toward becoming savvy, more
dependable and it will require less investment to convey
message. As security ends up real issue these days, the
security checking frameworks today needs to make
utilization of the most recent innovation. In a few papers,
the creators have introduced entryway bolt security
observing framework in light of inserted and Zigbee and
once in a while the bolt is ensured via programmed secret
key henceforth it couldn't without much of a stretch hack
by programmers. Additionally the upgraded security
frameworks are accessible in light of android stage, remote
methods and inserted frameworks. A great deal of
adjustment takes puts in different Gate bolt security from
the most recent couple of years, in next coming years
numerous progressions will happens.
RFID, Radio Frequency Identification is a modest
innovation, can be executed for a few applications, for
example, security, resource following, individuals
following, stock discovery, get to control applications. The
principle target of this paper is to plan and actualize an
advanced security framework which can send in secured
zone where just legitimate individual can be entered. We
actualized a security framework containing entryway
locking framework utilizing detached kind of RFID which
can initiate, confirm, and approve the client and open the
entryway progressively for secure access. The upside of
VOL. 13, NO. 22, NOVEMBER 2018 ISSN 1819-6608
ARPN Journal of Engineering and Applied Sciences
©2006-2018 Asian Research Publishing Network (ARPN). All rights reserved.
www.arpnjournals.com
8902
utilizing uninvolved RFID is that it capacities without a
battery and latent labels are lighter and are more
affordable than the dynamic labels. A brought together
framework deals with the controlling, exchange and
activity errand. The entryway securing framework works
constant as the entryway open immediately when client
put their tag in contact of peruser. The framework
additionally makes a log containing registration and
registration of every client alongside fundamental data of
client.
There has been rising interest for secure
framework that must be tried and true and fast reaction for
the businesses and friends. RFID (Radio Frequency
Identification) is one of the predictable and quick methods
for distinguish the material protest. In the long-prior the
standardized tags are more ideal when contrasted with
RFID in light of their cost however now daily's RFID are
effortlessly accessible and are more helpful to utilize.
Research has rolled out some extraordinary improvements
which makes its programming a considerable measure
shorter and less demanding is a result of supplanting
microcontroller with arduino. Arduino makes the circuit
and programming a considerable measure less demanding
to get it. Paper depends on security access and control
framework utilizing RFID and Arduino with GSM
module. A portion of the sensors are utilized like PIR,
LPG for spillage identification. Security get to framework
is exceptionally helpful to use at home, office and business
structures.
We depict RFID innovation, compress our
approach and our exploration, and above all, portray the
examination openings in RFID for specialists in
cryptography and data security. The regular topic in ease
RFID frameworks is that calculation assets are extremely
restricted, and all parts of the RFID framework are
associated with each other. Understanding these
associations and the subsequent outline trade-offs is a vital
essential to adequately noting the difficulties of security
and protection in ease RFID frameworks.
Since its creation in the 1940s, RFID has been a
conspicuous focus for mishandle. Remote ID is an intense
capacity, and RFID uncovers both a physical protest's
inclination and area. Anybody can without much of a
stretch increase unapproved access to RFID information
since they needn't bother with an observable pathway to
accumulate it. For instance, in the first RFID-based
applicationIdentification Friend or Foe (IFF)
frameworkssecurity ruptures brought about Allied
planes being shot down. An easy-going spectator may
imagine that the circumstance hasn't enhanced in light of
the fact that in spite of worries that RFID frameworks are
available to mishandle, it is presently accomplishing wide
organization. RFID works as a medium for various errands
including overseeing supply chains, following
domesticated animals, counteracting forging, controlling
building access, supporting computerized checkout,
creating brilliant home apparatuses, finding kids, and
notwithstanding thwarting grave looters. Intellectuals and
activists caution that advanced RFID frameworks could be
utilized for an extensive variety of exercises, from
corporate security ruptures to behavioural profiling to
general observation. In spite of the fact that this is valid,
recall that issues have a tendency to move brave
arrangements. RFID and data security have been truly
entwined in a fortunate marriage of innovative advance.
Assaults against unique IFF frameworks gave the scenery
to the advancement of both traditional and present day
security methods, going from flag sticking to challenge-
reaction distinguishing proof. It's likewise likely that RFID
will keep on inspiring advancement in security and
protection look into, as it has improved the situation
decades.
OVERVIEW
The product is utilized for administration,
controlling, exchange, activity and keeping up record of
the different clients. A computerized entryway locking
framework is additionally actualized and administered by
RFID peruser which verify and approve the client and
open the entryway naturally. It additionally keeps the
record of registration and registration of the client. It's
essential to verify the client before going into a safe space
and RFID give this arrangement. The framework
empowers client to registration and registration under
quick, secure and advantageous conditions. The
framework incorporate entryway locking framework
which open when the client put their tag in contact with
peruser and the client data coordinated with the data as of
now put away in database. The RFID controls the opening
and shutting of the entryway. In this investigation we use
RFID innovation to give answer for secure access of a
space while keeping record of the client. We utilize the
latent sort of RFID here. The inactive kinds of RFID are
battery-less and they get energy to work from peruser. The
real focal points of latent RFID are its financially savvy
and little in estimate. Due to above favourable
circumstances, it is generally utilized by stock following
innovation. Current reception apparatus innovation makes
it conceivable to littler in measure.
PROPOSED SYSTEM
The paper is primarily divided into two phase i.e.
registering the master RFID and authenticate the RFID
key. So, the first phase comprises of checking the ID of
the RFID key in order register it as the master key. Then
after that the latter phases comprises of identifying the
scanned RFID key and verify if it is an invalid one or the
master key. If it is valid then the gate would open granting
access if it is invalid then we get warning alarm.
CHALLENGES PRESENT IN THE SYSTEM
Universally deploying RFID tags offers many
potential security benefits, yet may expose new privacy
threats. Otherwise intrusive or cumbersome security
practices, such as airline passenger and baggage tracking,
can be made practical by using
RFID systems. Authentication systems already
take advantage of RFID technology, for example car key-
less entry systems. Embedding RFID tags as seals of
authenticity in documents, designer products, and currency
VOL. 13, NO. 22, NOVEMBER 2018 ISSN 1819-6608
ARPN Journal of Engineering and Applied Sciences
©2006-2018 Asian Research Publishing Network (ARPN). All rights reserved.
www.arpnjournals.com
8903
may discourage forgery. While RFID tags improve certain
security properties in these applications, they may
exacerbate privacy threats or pose new security risks.
RFID systems are different from other means of
identification because RF communication is non-contact
and non-line-of-sight, whereas other means of
identification are either contact-based or require line-of
sight. In other words, it is more difficult for the owner of
the RF tag to physically impede communication with the
tag. The promiscuity of RF tags is not unique; magnetic
stripe cards, for example, are promiscuous, but we assume
that the owner of the card takes the physical responsibility
of preventing unauthorized users from physically
accessing the card. Of course, the propagation
characteristics of electromagnetic fields do limit the range
from which passive RFID cards can be read. In fact, most
tags operating at 13.56 MHz cannot be read from more
than a meter away, and 915 MHz tags are difficult to read
through most materials. Yet, as the information stored on
the tag becomes more and more valuable, it is necessary to
think through some of the security and privacy related
issues in RFID.
OBJECTIVES
In this paper, the proposed security system
contains gate locking system using passive type of RFID.
The system stores all the necessary information about the
user. A new user is first registered with the system and the
corresponding information is burn in RFID tag. This RFID
tag will be accessible through the system. When a
registered user comes to the entry point, and put the tag
into reader, the system checks whether it is registered user
or imposter. If the user is registered one then the tab
information is matched with the user information stored in
system. The gate is open to entry of the user after
successful authentication and close automatically after a
specified time interval.
The principle target of this framework is to plan
and execute an advanced security framework which can
convey in secured zone where just credible individual can
be entered. We actualized a security framework containing
entryway locking framework utilizing uninvolved sort of
RFID which can actuate, confirm, and approve the client
and open the entryway progressively for secure access.
The upside of utilizing detached RFID is that it capacities
without a battery and inactive labels are lighter and are
more affordable than the dynamic labels. A concentrated
framework deals with the controlling, exchange and
activity errand. The entryway securing framework works
ongoing as the entryway open immediately when client
put their tag in contact of peruser.
The undertaking additionally points in planning a
totally robotized security get to framework for residential
and modern applications. Security is the greater worry for
an individual or a firm. Perceiving the need of security we
built up a mechanized security get to framework with easy
to understand get to.
Mechanization is the most much of the time
spelled term in the field of gadgets. The long for
computerization got numerous upsets the current
advances. One among the innovations which had more
prominent advancements is RF correspondences. The after
effect of this is the RFID cards which transmit a one of a
kind distinguishing proof number. This number
transmitted by the RFID can be perused with the
assistance of a RF peruser.
The confirmation to the house/business can be
given in full or constrained relying upon the RFID cards.
The choices like full access or constrained access are taken
by an installed PC to which the RF peruser is interfaced.
The entryways of the house/business shape the yield
module and are interfaced to the same locally available PC
through a servo engine.
This locally available PC comprises of number of
info and yield ports. The installed PC is usually named as
small scale controller. The information and yield port of
the controller are interfaced with various information and
yield modules relying upon the necessities. As it were
miniaturized scale controller goes about as a
correspondence medium for every one of the modules
associated with the task. The gadget additionally
comprises of graphical LCD which shows the data about
entryways open and close.
SCOPE OF THE PAPER
It depends upon how original one could be to
enhance the use of this paper. But for us this paper is
practical for future uses such as Smart cart can be
interfaced with wireless technologies to make it completely
portable in the near future. Payment of bills using mobile
can be implemented. A low cost RFID scanner can be
manufactured and used which can scan multiple tags
(products) simultaneously for faster processing and lesser
resources. Automatic scanning & availability of products
can be introduced. Pay preparation feature will be the latest
trend in upcoming years due to the boost in the ecommerce
industry.
E.g.:
a) In malls for generating bills without standing in
queue.
b) Gaming zone
c) Environmental problems to control and make nature
friendly.
d) Uses in ATM machines
SYSTEM ARCHITECTURE
The system architecture depicts the higher level
design of the software product. The user must have the
master key to enter the room. Once the user shows his/her
key to the RFID reader, it scans the card and opens the
gate and the will close after a few seconds. When there is
an illicit entry i.e. when a person shows a wrong RFID
card then there will be a warning sign and also an alarm
will be triggered.
VOL. 13, NO. 22, NOVEMBER 2018 ISSN 1819-6608
ARPN Journal of Engineering and Applied Sciences
©2006-2018 Asian Research Publishing Network (ARPN). All rights reserved.
www.arpnjournals.com
8904
Figure-1. System architecture.
Working of the system
Basically the system is developed in such a way
that it provides a quick response to the user and enhances
the use of simple technologies in an efficient manner. Now
coming to the working, the system consists of a unique
security key access card which is saved in the system
database and it will allow the user to go through the gate
only if the unique key card is detected. If the detected key
card is not authorized then, there will be an alarm
triggered from the system software.
We also have two modules in the system software
namely the registration phase and the recognition phase.
The registration phase is where the unique key card of the
user is registered in the system software. This is an
important step because we need to add the unique key into
the system with utmost precision because this is the key
that will be used in the recognition phase. The recognition
phase is where the detected key card is checked for its
authentication. Thus these are the two most important
phases that play a very significant role in the product
system.
Figure-2. Working of the system in a flowchart.
RESULTS
Figure-3. Paper preview.
In Figure-3 we can see all the components
connected in their respective ports and the display also
works remarkably. We can see all the components in this
snapshot and also we can identify them with ease.
VOL. 13, NO. 22, NOVEMBER 2018 ISSN 1819-6608
ARPN Journal of Engineering and Applied Sciences
©2006-2018 Asian Research Publishing Network (ARPN). All rights reserved.
www.arpnjournals.com
8905
Figure-4. Welcome message displayed on detecting
valid key.
In Figure-4 we can see that the RFID reader
detects the valid RFID key card and the LCD display
shows the welcome message. We can also see that a blue
LED is turned ON when the card is detected; this is a sign
of valid entry by the user. So whenever a valid user key
card is detected the display will show a welcome message
and a blue LED will be turned ON.
Figure-5. Warning message displayed on detecting
invalid key.
In Figure.5 we can clearly see that the RFID
reader detects a different RFID key card which seems to
be invalid. And so, a warning message is displayed on the
LCD display. We can also see that a pink LED is turned
ON after the card detection; this is a sign of illicit entry.
Thus when an invalid key card is detected, the LCD
display will show a warning message and a pink LED will
be turned ON.
Future works and enhancements
The RFID business is going to enter an
energizing period in which expanded selection will give
the way to innovation suppliers to put resources into new,
energizing developments. Alongside the new
improvements depicted above, headways in materials,
natural polymers, Nano innovation, and different
territories will change the way RFID is fused into items. It
relies on how unique one could be to improve the
utilization of this venture. Yet, for us this task is
reasonable for future uses, for example, Smart truck can be
interfaced with remote innovations to make it totally
versatile sooner rather than later. Instalment of bills
utilizing portable can be actualized. A minimal effort
RFID scanner can be fabricated and utilized which can
check different labels (items) all the while for speedier
preparing and lesser assets. Programmed examining and
accessibility of items can be presented. Pay planning
highlight will be the most recent pattern in up and coming
a very long time because of the lift in the internet business
industry. Rather than a label connected to a piece of
clothing, for instance, a RFID transponder could be
printed straightforwardly into fabric or bundling utilizing
biodegradable conductive inks. The eventual fate of RFID
is here, so both end clients and RFID makers ought to be
set up to use these new advances and prepare themselves
for more boundless utilization of RFID.
CONCLUSIONS
RFID based security and access control system is
more secure and fast responded as compared to the other
system like biometric. The advantage of the RFID system
is contact-less and works without-line-of-sight. By using
Arduino it is easy to access and works very quickly while
burning the code it is like Plug and Play device. Users can
change the function accordingly by using Arduino. It is
easier to use and accurate also. Hence this paper can be
useful for implementation of access control application for
tracking system as well as providing the security benefits.
This paper can improve by raising the range of reader in
which the tag read.
REFERENCES
[1] Nehete P. R., Chaudhari J. P., Pachpande S. R. &
Rane K. P. Literature Survey on Door Lock Security
Systems.
[2] Verma G. K. & Tripathi P. 2010. A digital security
system with door locks system using RFID
technology. International Journal of Computer
Applications (IJCA) (09758887): 5(11).
[3] Kaushal G., Mishra R., Chaurasiya N. & Singh P.
2015. RFID based security and access control system
using arduino with GSM module. International
Journal of Electrical & Electronics Engineering. 2(2):
5-8.
VOL. 13, NO. 22, NOVEMBER 2018 ISSN 1819-6608
ARPN Journal of Engineering and Applied Sciences
©2006-2018 Asian Research Publishing Network (ARPN). All rights reserved.
www.arpnjournals.com
8906
[4] Sarma S. E., Weis S. A. & Engels D. W. 2002,
August. RFID systems and security and privacy
implications. In CHES. 2: 454-469.
[5] Rieback M. R., Crispo B. & Tanenbaum A. S. 2006.
The evolution of RFID security. IEEE Pervasive
Computing. 5(1): 62-69.
[6] Weis S. A., Sarma S. E., Rivest R. L. & Engels D. W.
2004. Security and privacy aspects of low-cost radio
frequency identification systems. In Security in
pervasive computing (pp. 201-212). Springer, Berlin,
Heidelberg.
[7] Li M., Poovendran R., Falk R., Koepf A.,
Sampigethaya K., Robinson R. & Seuschek H.2008,
September. Multi-domain RFID access control using
asymmetric key based tag-reader mutual
authentication. In ICAS2008-Proceedings of the 26th
international Congress of the Aeronautical Sciences.
[8] Juels A. 2006. RFID security and privacy: A research
survey. IEEE journal on selected areas in
communications. 24(2): 381-394.
[9] Shepard S. 2005. RFID: radio frequency
identification. McGraw Hill Professional.
[10] Goodrum P. M., McLaren M. A. & Durfee A. 2006.
The application of active radio frequency
identification technology for tool tracking on
construction job sites. Automation in Construction.
15(3): 292-302.
[11] Ting R. & Keane M. 2014. RFID Door Lock.
[12] Wright M., Moon C., Mitchell E., Tran T., Beigel M.,
Remenih M. & Waldron S. 2006. U.S. Patent
Application No. 11/101,863.
[13] Ha I. 2015. Security and Usability Improvement on a
Digital Door Lock System based on Internet of
Things. International Journal of Security and Its
Applications. 9(8): 45-54.
[14] Nath S., Banerjee P., Biswas R. N., Mitra S. K. &
Naskar M. K. 2016, December. Arduino based door
unlocking system with real time control. In
Contemporary Computing and Informatics (IC3I),
2016 2nd International Conference on (pp. 358-362).
IEEE.
[15] A. S. Syed Navaz, P. Jayalakshmi, N. Asha. 2015.
Optimization of Real-Time Video Over 3G Wireless
Networks. September 2015, International Journal of
Applied Engineering Research. 10(18): 39724-39730.
[16] A. S. Syed Fiaz, N. Asha, D. Sumathi & A. S. Syed
Navaz. 2016. Data Visualization: Enhancing Big
Data More Adaptable and Valuable. February 2016,
International Journal of Applied Engineering
Research.11(4): 2801-2804.
[17] A. S. Syed Navaz & Dr. G. M. Kadhar Nawaz. 2016.
Flow Based Layer Selection Algorithm for Data
Collection in Tree Structure Wireless Sensor
Networks. March 2016, International Journal of
Applied Engineering Research.11(5): 3359-3363.
[18] A. S. Syed Navaz & Dr. G. M. Kadhar Nawaz. 2016.
Layer Orient Time Domain Density Estimation
Technique Based Channel Assignment in Tree
Structure Wireless Sensor Networks for Fast Data
Collection. June - 2016, International Journal of
Engineering and Technology.8(3): 1506-1512.
[19]
A. S. Syed Navaz, N. Asha & D. Sumath. 2017.
Energy Efficient Consumption for Quality Based
Sleep Scheduling in Wireless Sensor Networks.
March - 2017, ARPN Journal of Engineering and
Applied Sciences.12(5): 1494-1498.
[20] A. S. Syed Fiaz, K. S. Guruprakash & A. S. Syed
Navaz. 2018. Prediction of Best Cloud Service
Provider using the QoS Ranking Framework. January
2018, International Journal of Engineering &
Technology. 7(1.1): 486-488.
[21] A. S .Syed Navaz, Asha.N, Vanmathi Chandrasekaran
& J. Jayashree. 2018 Resourceful Investigate
Encryption Method Using Data Hunt in Mobile Cloud
Service. August- 2018, ARPN Journal of Engineering
and Applied Sciences.13(15): 4543-4549.
[22] M. Usha, J. Akilandeswari and A. S. Syed Fiaz. 2012.
An efficient QoS framework for Cloud Brokerage
Services. International Symposium on Cloud and
Service Computing, pp: 76-79, 17-18, IEEE Xplore.
... However, in that study, there was no log usage gate, user details, and photos of gate users at that time. Another study was conducted in 2018 where the gate security system has been running well [2]. However, in that study, there were no logs related to gate usage and no photo features related to users entering the area at that time. ...
... However, previous studies [1][2][3] were less efficient from an economic perspective. Using an RFID card costs more for both the reader and the RFID tag. ...
Article
Full-text available
The access time of using the portal in certain blocks in a residential area can be a problem for some residents. Another problem that arises is if the officer holding the portal key is not in place. The purpose of this study is to create a system to regulate access rights to a particular block within a residential area so that the opening and closing of the portal can be done at any time by residents in the intended area. There are several blocks of this system, namely the NodeMCU controller block, ESP32CAM, Android applications, and web applications that are built using the PHP and MySQL programming languages. NodeMCU is used as the main controller to manage servo motors, send and receive data to and from the server, receive input related to open and close portals from the android application. The web application is used to register users, view the portal usage log, and verify the login process of the application. This system has been running well based on the results of tests that have been carried out, where the registration process, login, opening and closing portals, log usage is in accordance with the objectives to be achieved. Index Terms—Portal; NodeMCU; ESP32CAM; Android; Web Application
... Brankas telah tercipta seiring dengan meningkatnya kebutuhan manusia dalam mengatasi masalah keamanan terhadap barang-barang berharga, termasuk aset, uang, perhiasan, surat-surat, dan dokumen penting [3]. Agar kerahasiaan dokumen perusahaan terjamin, tidak semua anggota karyawan perusahaan diberikan izin untuk mengakses brankas, sehingga perlu diterapkan pembatasan akses pengguna [4]. System keamanan dilakukan dengan izin akses yang hanya diberikan kepada sejumlah pengguna tertentu [5], [6]. ...
Article
Full-text available
This research focuses on developing a security key control device using RFID and a keypad with a prototyping design method. The goal is to enhance the convenience and security of managing security keys quickly and effectively. The system requires the correct recognition of RFID tags and the entry of the correct password before granting access to the security keys. Stringent security measures are in place, preventing access when incorrect RFID tags or passwords are detected. The prototype device comprises an Arduino UNO as the main controller, a keypad, RFID technology, an LCD, and a servo as the actuator. The prototyping design method enables us to iteratively design, test, and refine the system over time. The design process involves initial requirement identification, analysis, hardware and software design, prototype device fabrication, and testing. The prototyping approach facilitates design adjustments throughout the development process. This research demonstrates that prototyping can significantly contribute to security key management using RFID and a keypad, emphasizing the importance of the prototyping method in effective system design.
... The app is written in VB.NET, and the QR recognition accuracy is about 99 percent. Similar studies about automatic gate also performed by (Asha, Syed Navaz, Jayashree, & Vijayashree, 2018;Khreasarn & Hantrakul, 2018) that also feature motion detection. ...
Article
Full-text available
This automatic sterilization gate tool is a simple tool that changes the manual method to a systemized and more efficient way. This tool uses an infrared motion sensor in which there is a main component, namely the PIR (Pyroelectric Infra-Red) sensor, which is a material that reacts to radiation and movement in front of it. This tool also uses a 12v dc pump which is used to draw out the disinfectant liquid stored in the container. This gate tool is designed using the main material and some additional materials, the automatic gate can discharge about 11 seconds of liquid from objects or people that pass through the sensor range, 11 seconds is the minimum time for this tool to work while a distance of 6 meters is the range from where the sensor is located. From that time it proved that this gate tool has 100% accuracy and runs well. This gate tool is used every day, turned on from the morning, and turned off at night. Every 17.00 hours this gate tool is always replenished with supplies of disinfectant liquid. The automatic gate has helped the community to reduce the risk of transmission of the coronavirus, it also raises the awareness of the covid-19 pandemic. The whole system is implemented and is tested for real-time operation. It is found working satisfactorily. The gate tool can be further improved by adding a scanning device to perform tracing for passersby.
... gives trigger event service. G. RFID RFID [7], Radio Frequency Identification is a reasonable innovation, can be Radio Frequency Identification is a reasonable innovation, can be executed in a few applications, for example, security, resource tracking, individuals tracking and get to control applications. The main purpose of this paper is to structure and actualize a digital security system which can convey in a secured zone where just a genuine person can be entered. ...
Preprint
Full-text available
We often find illegal immigrants moving from one country to another. By means of land these illegal immigrants move over the fence cut the border wires and moves to the other part of the land. What do you think our soldiers are not doing their job? It is not that actually. It is very difficult to watch consistently over the border. Soldiers have a limited vision to check around the whole land mass. So for them we have come up with a solution that we have built a device that will sense the presence of an intruder (illegal immigrant). This device will be installed over the fences. When an intruder passes over the fence this device will transmit the signal to the soldiers Smartphone app (BLYNK app). The soldier will be notified with the signal and after receiving the signal, the soldier can switch on the alarm and the emergency lights via the app. By this the soldiers in the camp will be alerted and can take their respective positions and arrest the intruder which was passing the border illegally. By this device we can alert the soldiers in the border to take more safety precautions to keep our country safe. Index Terms-Node MCU ESP32, infrared sensor, Blynk app.
... gives trigger event service. G. RFID RFID [7], Radio Frequency Identification is a reasonable innovation, can be Radio Frequency Identification is a reasonable innovation, can be executed in a few applications, for example, security, resource tracking, individuals tracking and get to control applications. The main purpose of this paper is to structure and actualize a digital security system which can convey in a secured zone where just a genuine person can be entered. ...
Article
Full-text available
We often find illegal immigrants moving from one country to another. By means of land these illegal immigrants move over the fence cut the border wires and moves to the other part of the land. What do you think our soldiers are not doing their job? It is not that actually. It is very difficult to watch consistently over the border. Soldiers have a limited vision to check around the whole land mass. So for them we have come up with a solution that we have built a device that will sense the presence of an intruder (illegal immigrant). This device will be installed over the fences. When an intruder passes over the fence this device will transmit the signal to the soldiers Smartphone app (BLYNK app). The soldier will be notified with the signal and after receiving the signal, the soldier can switch on the alarm and the emergency lights via the app. By this the soldiers in the camp will be alerted and can take their respective positions and arrest the intruder which was passing the border illegally. By this device we can alert the soldiers in the border to take more safety precautions to keep our country safe. Index Terms-Node MCU ESP32, infrared sensor, Blynk app.
Article
Full-text available
The project's objective is to develop a fully automated security access system for both household and industrial use. Security is a key concern for both individuals and firms. In response to the demand for security, we have created an automated security access system that is easy for users to navigate. Automation is the most commonly written word in the domain of electronics. The need for automation has sparked numerous technological breakthroughs. RF communications is one of the technologies that has experienced significant advancements. The outcome of this process is the production of RFID cards that transmit a distinct identifying number. The RFID number can be detected using an RF reader. The level of access to the house or industry might be granted in its entirety or restricted based on the RFID cards. The determination of granting either full access or limited access is made by an onboard computer that is connected to the RF reader. The doors of the house/industry serve as the output module and are connected to the onboard computer via a motor. This onboard computer has a variety of input and output ports. The word typically used to refer to the onboard computer is microcontroller. The controller's input and output ports are connected to various input and output modules based on specific needs. Put simply, the microcontroller serves as a means of communication amongst all the modules in the project. The device is equipped with an LCD screen that provides information regarding the status of the doors, whether they are open or closed.
Article
In the modern environment, the innovations emerging in information technology has driven us to focus on strengthening the security process. This led to the recent advancement in face recognition technology and special attention is given to the recognition process by applying a biometric system for personal identification. Face recognition is renowned as one of the efficacious applications of picture study, popularly applied for reliable biometric where security is the important quality attribute to be achieved. In this paper, a highly effective face recognition system has been proposed by incorporating genetic algorithms for better search strategy. The proposed model works in two-step processes: face feature extraction and face pattern matching. The Haralick features and features extracted from face databases using PCA are used for face recognition. The most eminent artificial firefirefly swarm optimization algorithm is employed for better searching and matching of facial features. From the simulation experiments performed on the faces warehoused in the OUR database, the result has shown that the model is highly efficient, the PCA method has achieved 80.6% of recognition rate and the AFSA has acquired 88.9% accuracy in correct recognition rate.
Article
Full-text available
In Information harmonizing in a finest way is dropping matching data of information. In the present method seriously used in the cloud, it outcome by declining space as well as group bandwidth used for upload, It is enough that simply single data of documentation are stored in the cloud still if many owners of a record. As an outcome, harmonizing structure improves storage, use even as dropping dependability. Furthermore, the disputes about privacy for responsive information as well arise when it is outsourced by user to the cloud. In a recent distributed Harmonizing system with higher consistency is applied here, in which the huge information storage is disseminated transversely numerous cloud servers and the information is stored only once in the server to avoid density. If the Client system wants to store the similar document the Information harmonizing method is worn to reduce the storage room. The Safety necessities of information time alone and tag dependability are as well achieved by introducing a deterministic underground distributing method within disseminated by keeping the systems. As an outcome, we execute new methods and exhibit to the attained overhead is restricted in realistic environments.
Article
Full-text available
This paper deals with a low cost solution to problem avoidance for a mobile machine using just a single Artifical Intelligennce. It allows the machine to navigate smoothly in an unknown environment, avoiding collisions, without having to stop in front of problems. The problem avoidance process is made up of three distinct stages - the mapping algorithm, the core problem avoidance algorithm, and the steering algorithm. The mapping algorithm takes the raw Artifical Intelligennce readings and processes them to create higher resolution maps from the wide-angle Artifical Intelligennce. The problem avoidance algorithm is based on the potential field theory which considers the machine to be a test charge that is repelled by all the problems around it, and which moves in the direction of the resultant of the forces acting on it. An algorithm which steers a mobile machine based on the differential drive system is also discussed.
Article
Full-text available
Recently, digital door locks have been widely used as part of the loT (Internet of Things). However, the media has reported digital door locks being opened by invalid users to invade homes and offices. In this study, a digital door lock system that can work with the IoT environment is proposed. It is designed and implemented to enhance security and convenience.The proposed system provides strengthened security functions that can transfer recorded images to a user's mobile device when an invalid user attempts an illegal operation; it can also deliver alarm information to the mobile device when the door lock is physically damaged. The proposed system enables a user to check the access information and remotely operate the door lock to enhance convenience.
Article
Full-text available
The current 3G technologies provide many other services like video telecast, video conferencing, broadcasting TV programs, movies etc. This is achieved by feedback adaptation, whereby the media being sent is adapted in real time according to feedback information about the observed network state and application state. For the success of such adaptive schemes, the feedback must: 1) arrive in a timely manner and 2) carry enough information to effect useful adaptation. In this paper, we exploit the use of feedback adaptation for media streaming in 3G wireless networks, where the media servers are located in wired networks while the clients are wireless. The argument is that end-to-end feedback adaptation using only information provided by 3G standards is neither timely nor contain enough information for media adaptation at the server. The introduction of a streaming agent (SA) at the junction of the wired and wireless network provides useful information in a timely manner for media adaptation. Henceforth optimization algorithms can be designed to take advantage of SA feedbacks to improve performance. The improvement of SA feedbacks in peak signal-to-noise ratio is significant over non agent-based systems
Article
Full-text available
RFID, Radio Frequency Identification is an inexpensivetechnology, can be implemented for several applications such assecurity, asset tracking, people tracking, inventory detection,access control applications. The main objective of this paper is todesign and implement a digital security system which can deployin secured zone where only authentic person can be entered. Weimplemented a security system containing door locking systemusing passive type of RFID which can activate, authenticate, andvalidate the user and unlock the door in real time for secureaccess. The advantage of using passive RFID is that it functionswithout a battery and passive tags are lighter and are lessexpensive than the active tags. A centralized system manages thecontrolling, transaction and operation task. The door lockingsystem functions in real time as the door open quickly when userput their tag in contact of reader. The system also creates a logcontaining check-in and check-out of each user along with basicinformation of user.
Article
Full-text available
The advantages and drawbacks associated with the use of RFID technology, are discussed. The RFID functions as a medium for numerous tasks including managing supply chains, tracking livestock, preventing counterfeiting, controlling building access, supporting automated checkout, developing smart home appliances, locating children, and even foiling grave robbers. The RFID tags that optimize supply chains can also violate a person's privacy by tracking the tagged item's owner and muggers with RFID readers could scan crowds for high-value banknotes, whereas, terrorists could scan digital passports to target specific nationalities.
Article
Full-text available
This paper surveys recent technical research on the problems of privacy and security for radio frequency identification (RFID). RFID tags are small, wireless devices that help identify objects and people. Thanks to dropping cost, they are likely to proliferate into the billions in the next several years-and eventually into the trillions. RFID tags track objects in supply chains, and are working their way into the pockets, belongings, and even the bodies of consumers. This survey examines approaches proposed by scientists for privacy protection and integrity assurance in RFID systems, and treats the social and technical context of their work. While geared toward the nonspecialist, the survey may also serve as a reference for specialist readers.
Article
Full-text available
Like many technologies, low-cost Radio Frequency Identification (RFID) systems will become pervasive in our daily lives when affixed to everyday consumer items as ``smart labels''. While yielding great productivity gains, RFID systems may create new threats to the security and privacy of individuals or organizations. This paper presents a brief description of RFID systems and their operation. We describe privacy and security risks and how they apply to the unique setting of low-cost RFID devices. We propose several security mechanisms and suggest areas for future research.
Article
Cloud computing is the rapidly evolving area that offers the potential for federal agencies of all the sizes to increase flexibility and efficiency. A cloud broker acts as an intermediary between various service providers and the cloud users. It will take responsibility in handling the services offered by cloud service providers (CSP). Any requests from the users will be processed by the cloud broker and the services are allocated to the users according to their requirements. In this paper, we are proposing a cloud broker service framework to decide on an appropriate service offered by different CSPs depending on the QoS requirements from the users. The framework incorporates multi-criteria optimization technique to analyze the non dominant or Pareto optimal sets. The Pareto optimization technique is used to find the non dominated set from the available n number of service providers.
Article
Tool availability is a critical factor in the productivity of construction crews. In an effort to improve the efficiency of tracking tools and improve their availability, this research effort developed a tool tracking and inventory system which is also capable of storing operation and maintenance (O&M) data using commercially available active radio frequency identification (RFID) tags. With participation of two electrical construction firms, the system was tested on a number of construction jobsites. The project demonstrated that active RFID can be used to inventory small tools and store pertinent O&M data on the tools in construction environments despite metal interference and low temperatures. Economics, lack of standardization, and lack of direction and range data from the tags were identified as the most significant constraints limiting active RFID commercialization for tool tracking.
Article
Presents an overall view of RFID technology and some of its applications. Also, investigates RFID system architecture and the design of an RFID system prototype. "December 2005." "In partial fulfillment of the requirements for the degree of Master of Science in Engineering." "Presented to the faculty of California Polytechnic State University, San Luis Obispo." Includes bibliographical references (leaf 71). Thesis (M.S.)--California Polytechnic State University, 2005.