ArticlePDF Available

Design and Implementation of an Automated Security Gate System using Global System for Mobile Communication Network

Authors:

Abstract and Figures

This research aims to design and fabricate an automated security gate using the Global System of Mobile communication network. The need for efficient control of access for persons and vehicles going in and out of the facilities has placed demands for automation of security gates. This research seeks to improve the management of access to restricted areas through an automated gate control network. The system design and construction utilized both hardware and software components. Fritzing and Proteus8.9 software were used in simulating the circuit for the automatic gate control system. Arduino IDE software, written in C-Programming Language with the ASCII code, enabled the code programming. The automated gate was designed, the prototype fabricated, tested, and the response met the project objective. The findings contribute to theoretical knowledge by providing information about GSM networks' usability as a platform to control automated security gates. The practical implication is that the results could inform the industrial community to innovate and make the technology commercially available for use. The study's limitations include the inefficiency of the 2G modem used compared to the response rate of a 4G modem with the current 4G network deployed by GSM couriers in Nigeria.
Content may be subject to copyright.
1
Page 1-10 © MAT Journals 2021. All Rights Reserved
e-ISSN: 2581-639X
Volume-7, Issue-1 (January-April, 2021)
Journal of
Network Security Computer Networks
www.matjournals.com
Design and Implementation of an Automated Security Gate System using
Global System for Mobile Communication Network
Elechi P.1*, Ahiakwo C. O.2, Shir S. T.3
1Senior Lecturer, Department of Electrical/Electronic Engineering, Rivers State University, Port
Harcourt, Nigeria
2Professor, Department of Electrical/Electronic Engineering, Rivers State University, Port Harcourt,
Nigeria
3PG Student, Department of Electrical/Electronic Engineering, Rivers State University, Port Harcourt,
Nigeria
*Corresponding Author: elechi.promise@ust.edu.ng
ABSTRACT
This research aims to design and fabricate
an automated security gate using the Global
System of Mobile communication network.
The need for efficient control of access for
persons and vehicles going in and out of the
facilities has placed demands for automation
of security gates. This research seeks to
improve the management of access to
restricted areas through an automated gate
control network. The system design and
construction utilized both hardware and
software components. Fritzing and
Proteus8.9 software were used in simulating
the circuit for the automatic gate control
system. Arduino IDE software, written in C-
Programming Language with the ASCII
code, enabled the code programming. The
automated gate was designed, the prototype
fabricated, tested, and the response met the
project objective. The findings contribute to
theoretical knowledge by providing
information about GSM networks' usability
as a platform to control automated security
gates. The practical implication is that the
results could inform the industrial
community to innovate and make the
technology commercially available for use.
The study's limitations include the
inefficiency of the 2G modem used compared
to the response rate of a 4G modem with the
current 4G network deployed by GSM
couriers in Nigeria.
Keywords-- Automation, Control, Gate, GSM,
Security, SMS
INTRODUCTION
Background of the Study
The security challenges encountered in
many places require efficient means of
controlling access to high-interest areas such as
communities, recreational centres, offices, and
homes, preventing unwanted access. Security
arises from the need to be safe and not feel
endangered [1]. In Nigeria mainly, the
prevalence of armed robbers and other groups
that constitute a nuisance to society has led to
the loss of lives and properties worth millions
of naira. Point out that many of the attacks that
led to significant loss of lives and properties
have occurred in unguarded homes [2]. Posited
that, since, the creation of early societies and
residential complexes, the human being has
tried to control his own built environment and
world [3]. Despite seemingly impregnable
security gates designed to ward off intruders,
many attacks still took place, presenting
significant concern about the efficiency of
gates.
Referred to gates as a point of entry to a
space enclosed by walls or an opening in a fence
[4]. Gates may prevent or control entry or exit,
or they may be merely decorative. Gates play a
vital role in providing controlled access to
specific areas of interest, thereby safeguarding
such places. There exist different designs and
construction styles of gates based on particular
principles of operations. These classifications
fall into three groups which are sliding, swing,
and collapsible gates. Sliding gates slide along
tracks commonly used in southern Europe and
the United States of America. Swing or hinged
2
Page 1-10 © MAT Journals 2021. All Rights Reserved
e-ISSN: 2581-639X
Volume-7, Issue-1 (January-April, 2021)
Journal of
Network Security Computer Networks
www.matjournals.com
gates are hinged along one side to allow the gate
to pivot away from the gateway in one direction
but not in the other. Collapsible gates have
multiple panels that fold upon one another
when such a gate is opened.
Private and commercial environments
that require controlled access need to restrict
how people move in and out of the places.
Installing an automatic gate help prevent people
from gaining access at will. Gate designs have
utilized mechanical and automated opening
technologies. Existing gate opening technology
has used different methodologies, including
biometrics, voice, and facial authentication, to
control automatic gates [5]. Other gate designs
have implemented remote control technologies
to open and close automatic gates. Remote-
control systems have evolved and advanced
over the years to include infrared, Bluetooth
connectivity, motion sensor-enabled
capabilities, and voice control [6]. The primary
remote-control technology used in the home
utilizes infrared signals.
The use of various technologies to
operate automatic gates offers different levels
of convenience and security. Specifically,
informed that biometric recognition systems
provide more excellent protection and comfort
than traditional personal recognition methods
[7]. There remains, however, an unending list
of technologies that can be deployed in the
control of automatic gates. Demonstrated that
two entrances could be monitored using a
microprocessor [8]. The design operated such
that when the gates sense a vehicle's approach,
they will automatically open, wait for a
specified time, and then close. Cell phones can
also be deployed to control automatic gates
using the Global System of Mobile (GSM)
communication. GSM is a platform that offers
an enormous communication-based design [9].
This research employs the GSM network to
control an automated security gate.
Research Problems
Society today is witnessing several
security threats from theft, vandalism, violent
crime, and terrorism. These threats usually
target people in public and private buildings. To
minimize unauthorized access, facility owners
manually operated security gates to deter
unauthorized people from accessing restricted
areas. However, a manual sliding gate uses
sizeable human efforts in opening and closing
the gates. The manual gates' operation caused
friction between the rollers and the metal they
roll on, creating unwanted noise. The use of
human efforts in opening gates has also placed
a demand for human resources. The
development and deployment of automated
gates offer enormous advantages over
mechanical gates. For example, the man-hour
required in operating manual gates could be
useful in other activities that achieve equally
significant results, creating more value in
society. Also, the design uses technology that
ensures better efficiency and control.
Review of Related Work
Some researchers designed an automatic
gate control using an infrared remote with a
password protection feature [6]. The gate
operating device was controlled by a
microcontroller programmed with assembled
language and logic circuit. The processor used
an 8-bit microcontroller that receives the
infrared signal from the transmitter of a remote-
control using IR sensor, decodes it, and
switches ON the relay that controls the DC
motor. The DC motor uses gears to control the
movement of the gate, either forward or
backward. When a wrong password is used, the
gate will not open, and the security alarm will
sound. The alarm system was incorporated in
the design to create awareness when an
unauthorized attempt is made to access the
protected area. The challenge with Ayodele et
al. (2014) design is that using a password in
opening the gate led to some delay and waste of
time. Some researchers developed an IoT-
based RFID gate automation system [10]. A
feature of the IoT-based RFID design is that it
allowed access to the owner anywhere in the
world. The features of this gate, however, made
it costly, thus, limiting its affordability.
Designed a sensor-based automatic control of
railway gates [11]. The project does close and
open gates, but it could not control cars and
vehicle crossing. The non-use of load sensors
3
Page 1-10 © MAT Journals 2021. All Rights Reserved
e-ISSN: 2581-639X
Volume-7, Issue-1 (January-April, 2021)
Journal of
Network Security Computer Networks
www.matjournals.com
made the project unsuitable for use. Designed a
home automation system using Arduino, and
the system could connect to phones which have
a connection to Wi-Fi or Bluetooth [12]. A
better approach to this system could involve the
use of SMS, call alerts.
Types of Automated Gate System
Automatic gates are utilized over a wide
range of industries and generally come in three
basic types - the swing gate, the slide gate, and
the tilt security gate [12-14]. A swing gate is an
open/close entry way consisting of one or two
gates that swing horizontally inward to allow
vehicles' passage. On single-gate assemblies,
the swing gate opens at one end and pulls
inward and aside at the other. On double-gate
assemblies, the two gates parts at the middle
and pull inward and sideways [12-14]. A slide
gate is an open/close entryway consisting of
one or two gates that slide horizontally aside to
allow vehicles' passage. The gate opens at one
end and slides left or right on single-gate
assemblies until it has cleared from the
driveway [15]. The two gates parts at the
middle and slide to their respective ends on
double-gate assembly until the driveway have
cleared for traffic. A tilt gate is an open/close
entryway that rises vertically to allow the
passage of vehicles. On single-gate assemblies,
the gate pulls up and aside to one end of the
entrance. On double-gate assemblies, the two
gates part at the middle and pull up and aside to
their respective entrance ends.
Mobile Phone-Based Gate Access System
Mobile Phone-based gate access system
utilizes the GSM network for communication
and control [16]. GSM is a digital cellular
communication standard that is accepted
globally [9]. GSM originated as a European
mobile telephone standard established in 1982
to formulate specifications for a pan-European
mobile cellular radio system [17, 18]. GSM
specifications fundamentally focused on
defining functions and interface requirements.
A typical GSM network comprises the base
station system (BSS), the switching system
(SS), and the operation and support system
(OSS) [19]. A GSM modem is an electronic
device that uses a sim card and works with a
GSM network wirelessly [20]. GSM modems
are designed in the form of PC and PCMCIA
Cards. A GSM modem requires a SIM card to
operate just as in a cell phone. The operation of
a GSM modem is similar to that of a dial-up
modem.
MATERIALS AND METHOD
Materials
The materials used include AC/DC
power supply unit, GSM modem,
Microcontroller, Veroboard, Stepper Motor
Driver, Stepper Motor, Gate structure, and
wiring cables/accessories. Table 1 and 2 shows
the materials used to design and construct the
prototype GSM interfaced automated security
gate system.
Table 1: Software.
S/N
Software
1
Fritzing Software
2
Proteus 8.9 Software
3
Arduino Software IDE
4
C Programing Software
Table 2: Materials.
S/N
Hardwares
1
SIM800L GSM Modem
2
ATmega328 Microcontroller
3
Power Supply 230/12, 1.5A
4
ULN2003 Stepper Motor Driver
5
Motor 12V, 200mA
4
Page 1-10 © MAT Journals 2021. All Rights Reserved
e-ISSN: 2581-639X
Volume-7, Issue-1 (January-April, 2021)
Journal of
Network Security Computer Networks
www.matjournals.com
6
Atmel AVR (LM317, LM7805, and
LM7812).
7
Mechanical Fabrication Tools
8
Wiring Cables/Accessories
Power Supply Unit
A power supply circuit is required to
supply power/voltage for the operation of the
overall circuit. This project needs three
different direct current voltage levels; 4.4V for
the GSM modem, 5V for the microcontroller
operation, and 12V for powering the motor.
Hence, three various voltage regulators
(LM317, LM7805, and LM7812) were used to
achieve this. The voltage regulators were used
to filter out the required voltage levels from the
rectifier's generated dc voltage. This
automatically maintains a constant voltage
level to be supplied to the respective units of the
system. Filtering capacitors are used to stabilize
and reduce the ripples of the supply voltages.
GSM Modem
The GSM modem provides an interface
between the system communication protocol
and the user. It is the device that receives the
user instruction to either opens or closes the
gate. The GSM modern used is SIM800L.
SIM800L is a quad-band GSM/GPRS module
that works on frequencies 850MHz GSM,
900MHz EGSM, 1800MHz DCS, and
1900MHz PCS. It also features GPRS multi-
slot class 12/class 10 (optional), and supports
CS-1, CS-2, CS-3, and CS-4 GPRS coding
schemes.
ATmega328 Microcontroller
Atmega328 Microcontroller serves as the
brain of the system receiving, sending, and
sharing data with both the GSM modem and the
stepper motor driver. Atmega328 is a
programable embedded microcontroller (chip),
which has a computer processor with all its
support function (clocking and reset), memory
(both program storage and RAM), and I/O
(including bus interfaces) built into the device.
These built-in functions minimize the need for
external circuits and devices to the designed in
the final applications. It is an 8bit 28-pin AVR
Microcontroller with 32k of flash memory, 1k
of EEPROM, and 2k of internal SRAM, two 8-
bit timers' 23 I/O pins, and six channels PWM
with an inbuilt USART. The Atmega328
supports an external oscillator up to 20MHz. It
comes in 28 pin DIP.
Stepper Motor Driver
The Stepper motor driver controls the
rotation of the stepper motor that drives the
gate. The ULN2003 is a 16-pin IC and powers
the stepper motor. It has seven Darlington Pairs
inside that serve as Input and Output Pins. It
also has ground and common pins. By
controlling the exact spot without using a
feedback system, the ULN2003 motor driver
can control the gate drive motor efficiently. It
mainly provides variable current control and
several step resolutions that include fixed
translators to allow the motor control by easy
step and direction inputs producing a smooth
motor operation.
DC Stepper Motor
The stepper motor drives the gate
through a gear system. The stepper motor is
connected to the ULN2003 motor driver and
interfaced with Arduino for proper
communication. The control of the Stepper
Motor movement angle is done by controlling
the number of stepper motor driver pulses. The
speed of the stepper motor rotation is also
controllable by controlling the frequency of the
pulses. The motor has a reduction ratio of 64:1,
so it offers a decent torque for its size at speeds
of about 15 RPM.
Automatic Sliding Gate Block Diagram
The automatic sliding gate block diagram
consists of a GSM module/modem as a link for
communication between the user (mobile
phone) and the gate control system. The
ATtmega328 Microcontroller interface with the
GSM modem and the stepper motor driver. The
Stepper Motor receives user instructions from
the ATtmega328 Microcontroller and passes
5
Page 1-10 © MAT Journals 2021. All Rights Reserved
e-ISSN: 2581-639X
Volume-7, Issue-1 (January-April, 2021)
Journal of
Network Security Computer Networks
www.matjournals.com
instructions to the motor. The motors drive the
gear system to move the gate in the desired direction. Fig. 1 shows the block diagram of the
automated gate system
Figure 1: The block diagram of the automatic gate system.
Circuit Design
The circuit for automatic gate control is
designed using Automation Studio 6.0 and
Proteus 8.9 Software. The software enables the
configuration and interface of the various
components. The operating system's major
components, such as the GSM module, the
microcontroller, the stepper motor drive, and
the motor, were outsourced. Fig. 2 shows the
Veroboard circuit design, and Fig. 3 shows the
wiring circuit.
Figure 2: Circuit design.
Wired connection
Wireless connection
User
Stepper
Motor
Gear system connection
Stepper
Motor Driver
Microcontroller
(ATmega328)
GSM
Module
Password
encrypted SMS
Mobile
Phone
6
Page 1-10 © MAT Journals 2021. All Rights Reserved
e-ISSN: 2581-639X
Volume-7, Issue-1 (January-April, 2021)
Journal of
Network Security Computer Networks
www.matjournals.com
Figure 3: Circuit Diagram.
Software Development
The computer program used to carry out
the programming of the ATmega328
microcontroller is Arduino IDE software which
was written in C-Programming Language. The
system flowchart shown in Fig. 4 indicates the
implementation of the programs using Arduino
IDE. All the components and peripherals used
in the program were initialized. While writing
the coding, ASCII code was used in declaring
the code for receiving and reading SMS
messages. To avoid the SMS interrupt with the
previous message, a declared delete SMS
coding is used. This ensures that any message
received that is not valid to the pre-programmed
password will be deleted. After that, the code
for comparing the suitable password was
written. If the password is valid, the
microcontroller will direct the stepper motor
driver operation according to the received
signal otherwise, the Atmel microcontroller
loop will go back to receiving and reading SMS
for searching the valid password that matches
the pre-programmed password.
7
Page 1-10 © MAT Journals 2021. All Rights Reserved
e-ISSN: 2581-639X
Volume-7, Issue-1 (January-April, 2021)
Journal of
Network Security Computer Networks
www.matjournals.com
Figure 4: System flowchart.
Intruder Permutation
A longer character code will make the
system more secure, since, more trials will be
required to break into the system.

󰇛󰇜 (1)
 
  

    

The permutation formula given in equation (1)
shows that for a 5-character code, it will require
60233040 trials for an intruder to break into the
system.
System of works
The GSM controlled automated gate is
designed and constructed to operate using SMS
communication between the user, the control
panel to be installed in the house, and the gate
drive system installed at the gate in a real-world
scenario. To demonstrate the concept's
practicality, a prototype gate is constructed and
interfaced with a control panel. When the
automatic gate control system is powered on,
the SIM800L GSM modem connects the system
service provider of the Sim-card network,
making the system ready to receive a command
from the user. When a user sends an opening
command (OPQ1#) from a mobile phone to the
Simcard's number inside the SIM800L modem,
the code is read by the ATmega 328
Microcontroller. The microcontroller executes
the code instructions and gives a command to
the ULN2003 stepper motor driver. The stepper
motor driver, in turn, passes a command to the
motor to open the gate. Similarly, to close the
gate, the user will have to send a closing
command (CLQ2#) from the mobile phone to
the Simcard's number inside the SIM800L
modem. In the same manner, the code is read by
the ATmega 328 Microcontroller. The
microcontroller executes the code instructions
and gives a command to the ULN2003 stepper
START
Initialized all peripherals (Ports, UART and
Variables)
Delete Previous SMS Message
Compare Passwords
Send the signal to output circuits
Receiving and Reading SMS
messages
END
VALID
INVALID
8
Page 1-10 © MAT Journals 2021. All Rights Reserved
e-ISSN: 2581-639X
Volume-7, Issue-1 (January-April, 2021)
Journal of
Network Security Computer Networks
www.matjournals.com
motor driver. The stepper motor driver then
passes a command to the motor to close the
gate. The microcontroller is programmed to
recognize only codes included in it and do not
recognize codes not written. If a wrong SMS is
sent to the Simcard, the microcontroller will
read it as an invalid SMS message. It will then
execute a delete SMS code to ensure that any
message received that is not included in the
program is not executed. Once an SMS function
is executed, the massage is also deleted to avoid
executing a previous SMS message. To protect
the executable codes from being hacked, the
code for comparing a suitable password code is
written that requires 60233040 permutations or
trials for an intruder to break into the system.
The control panel has a manual push-button
switch for resetting the system. The gate opens
and closes automatically when the correct code
to the sim card in SIM800L.
RESULTS AND DISCUSSION
The aim of the research was to design and
implement an automated security gate system
using GSM Network as a medium for
communication with the gate. The design has
been executed and tested to be work in line with
the objectives of the study. Fig. 5 illustrates the
performance of the gate.
Figure 5: Response time curve.
Whenever a user sent an opening
command, the system will process the
instruction, and the OPEN indicator LED will
light yellow. At that point, the gate will begin
to open and take 25 seconds to reach the end of
the gate, and then the OPEN light will go off,
indicating that the instruction has been fully
executed. When a closing command is sent, the
system will process the instruction, and the
CLOSE indicator LED will light green. At that
point, the gate will begin to close, and it also
takes 25 seconds for the drive gate to fully
close, and then the CLOSE light will go off,
indicating that the instruction has been fully
executed. The Response Time Curve
represents the system's performance, and from
the graph, you could see a linear relationship
between the run time and the distance of the
drive.
CONCLUSION
The need to provide a convenient way of
securing restricted areas cannot be over-
emphasized. Automated gates controlled using
mobile phones offer a unique, secure, and
9
Page 1-10 © MAT Journals 2021. All Rights Reserved
e-ISSN: 2581-639X
Volume-7, Issue-1 (January-April, 2021)
Journal of
Network Security Computer Networks
www.matjournals.com
convenient way of controlling access to
facilities. This research's success is achieved
using contributions from the literature that
offered a wealth of information that forms the
research's theoretical underpinnings. The
automatic gate was designed, developed, and
tested from materials selected and fabricated
locally. The technology can be used on a variety
of gate types. The framework portrayed in this
undertaking has been planned and built to work
a little entryway to exhibit the plan's usefulness.
It very well may be altered to suit various
applications like an electronic cost assortment
and other passage or pass-through frameworks
that require client distinguishing proof. The
consideration of a secret key that will be entered
on a telephone or keypad causes this plan to
have improved security. A superior security
level can be accomplished by causing the secret
word to have more characters and could
incorporate two-factor validations. A greater
entryway can in any case be worked with the
control framework portrayed, however, the
driver hardware should utilize parts that can
deal with more force needed to drive the gate.
RECOMMENDATION
Like every other research, this work is
not with limitations. The study employs a 2G
network modem which made connectivity to
the current 4G network deployed by GSM
couriers in Nigeria today a bit difficult to
establish. We recommend future research to
employ 4G or 5G network GSM modules to
improve the system's connectivity to the courier
network. We also recommend using two-factor
authentications to enhance the security of the
system.
REFERENCES
1. Rahul K., Raviraj D., Akash I., Suraj M.
(2018), Solar-powered remote-controlled
smart security gate”, 8th National
Conference on emerging trends in
Engineering and Technology.
2. Enokela J. A., Tyowuah M. N. (2014), An
electronically controlled automatic security
access gate”, Leonardo J. of Sci., Issue 25,
pp. 85-96
3. Velashani S. T., Madani I., Azeri A. R. K.,
Hosseini S. B. (2015), Effect of physical
factors on the sense of security of the
people in Isfahan's traditional bazaar”,
Social and Behav. Sci., Volume 201, pp.
165-174, DOI:
10.1016/j.sbspro.2015.08.165.
4. Ikpeze O. F., Uwaezuoke E. C., Samiat B
M., Kareem K. M. (2019), Design and
construction of an automatic gate”, ABUAD
J. of Eng. Res. and Develop., Volume 2,
Issue 2, pp. 123-131.
5. Pious T., Sujina K, Sneha K. (2017),
Fingerprint-based automatic door lock
system”, Internat. J. of Adv. Res. in Electri.,
Electron. and Instrumen. Eng., Volume 6,
Issue 4, pp. 2475-2478, DOI:
10.15662/IJAREEIE.2017.0604045.
6. Ayodele S. O., Temitope A., Kehinde O.,
Adedayo B, Ezea H., (2014), Design of
automatic gate control using infrared
remote with password-protected features”,
Internat. J. for Res. & Develop. in Tech.,
Volume 2, Issue 5, pp. 6-12.
7. Inamdar V., Khaire A., Patait S. B. (2016),
Rack and pinion operated automatic
sliding gate”, Global J. of Eng. Sci. and
Res., pp. 111-114.
8. Shoewu O., Baruwa O. T. (2006), Design
of a microprocessor based automatic gate”,
The Pacific J. of Sci. and Tech., Volume 7,
Issue 1, pp. 31-44.
9. Lawrance M. E., Gobiya C., Gowsalya V.,
Masi R., Priyanka R. M. (2019), Flood
gate control using Arduino UNO with GSM
technology (flood gate controller)”,
ICNSCET19- International Conference on
New Scientific Creations in Engineering
and Technology.
10. Sighila P., Valsan V., Preethibha C. (2016),
IOT based RFID gate automation system”,
Internat. J. of Eng. Trends and Tech.,
Volume 36, Issue 9, pp. 471-473, DOI:
10.14445/22315381/IJETT-V36P285.
11. Krishnamurthi K., Bobby M., Vidya V,
Baby E. (2015), Sensor based automatic
control of railway gates”, Internat. J. of
Adv. Res. in Comp. Eng. & Tech., Volume
4, Issue 2, pp. 539-543.
12. Nathan D., Chima A., Ugochukwu A.,
Obinna E. (2015), Design of a home
automation system using Arduino”,
Internat. J. of Scient. & Eng. Res., Volume
6, Issue 6, pp. 795-801.
13. Kwon D., Kim H., An D., Ju H. (2016),
Container based testbed for gate security
using open API mashup”, Proced. Comp.
10
Page 1-10 © MAT Journals 2021. All Rights Reserved
e-ISSN: 2581-639X
Volume-7, Issue-1 (January-April, 2021)
Journal of
Network Security Computer Networks
www.matjournals.com
Sci., Volume 111, pp. 260-267, DOI:
10.1016/j.procs.2017.06.062.
14. Elechi P. (2015), Design and development
of sound control door lock system,
American J. of Eng. Res., Volume 4, Issue
9, pp. 96-107.
15. Arulogun O. T., Olaniyi O. M., Ipadeola A.
A. (2008), Development of a computer-
controlled security gate system”, The
Pacific J. of Sci. and Tech., Volume 9, Issue
2, pp. 371-376.
16. Bhatia V., Whig P. (2013), A secure
frequency-based smart elevator control
system control system control system
control system”, Internat. J. of Res. in Eng.
& Adv. Tech., Volume 1, Issue 4, pp. 1-5.
17. Hu V. C., Ferraiolo D. F., Kuhn D. R.
(2006), Assessment of access control
systems”, Available from:
https://csrc.nist.gov/publications/detail/nist
ir/7316/final.
18. Xiao Liu, et al. (2019), “Design of remote
security control system based on 4G”, J. of
Phy.: Conf. Series, pp. 1-8,
DOI: 10.1088/1742-6596/1176/5/052026.
19. Jackson J. (2017), A guide on different
types of gate motors [Online] Available
from
https://medium.com/@centuriond5evo/a-
guide-on-different-types-of-gate-motors-
7f939a691d67.
20. Elechi P., Orike S., Onu K. E. (2020),
Cellular planning of GSM network in
Rivers State, Nigeria, Journal of
Telecommun., Electron. and Comp. Eng.,
Volume 12, Issue 1, pp. 45-52.
... Gates are points of entry or exit to areas defined by fences. [1,2,3] Gates function to facilitate traffic control and flow to these defined areas. They thus restrict access to defined areas, thereby safeguarding these areas. ...
... However, they may be merely decorative. [1,3] Gates can be made from metallic or wooden materials. They can be manually or power (automatic) operated. ...
... They can be manually or power (automatic) operated. [1,2,3] Gates can be classified as swing, sliding, vertical lift, special gates such as turnstile (rotational) gates and collapsible gates. [1,3,4] Swing or hinged gates are hinged along a side and allow the gate to rotate round a fulcrum in a particular direction. ...
... K. Pandu Naik et al. [9], developed an automated gateopening system designed for restricted areas using IoT technology. The methodology employed in this research was based on the application of RFID technology which incorporated RFID tags and readers as the primary access control mechanism. ...
... Wireless Communications and Mobile Computing the fitness function that meets these conditions can improve the fitness between individuals, reduce differentiation, and obtain the optimal results as a whole [13,14]. In practice, this transformation process is relatively simple, as shown in the following formula: ...
Article
Full-text available
In order to solve the problem of online inspection of students’ theoretical knowledge of Japanese, this paper further optimizes and adjusts the design of the online Japanese examination system and presents an online Japanese examination system based on genetic algorithm. Taking the Japanese test as the research object, on the basis of comprehensively analyzing the problems of slow test paper composition, low success rate, and low quality of traditional online test systems, an intelligent test composition model based on genetic algorithm is proposed, and the implementation process of genetic algorithm and the key steps are described in detail. The results show that the online Japanese examination system based on genetic algorithm can meet the needs of test paper generation in more complex situations. After a long time of operation and continuous improvement, the online Japanese examination system has obtained the adaptability of the best solution. The value of the fitness is 99.666667; when the fitness is at this value, the error of the question type score of the test paper is 0, the average difficulty error on the test paper is 0, and the error of the section test point distribution is 0.666667. This fully illustrates the stability and effectiveness of the Japanese online examination system, which can meet the needs of daily Japanese majors and improve the efficiency of Japanese teaching.
... Systematically and reasonably use the security technology and control the security granularity to balance the security and other characteristics of the system. ese features include capability, efficiency, flexibility, friendly user interface, and cost [19]. When safety and other characteristics cannot be consistent, or when some safety protection cannot or is difficult to be achieved by technical means, technical deficiencies can be made up by formulating safety operation procedures for personnel at all levels, clarifying safety responsibilities, and implementing them by administrative means. ...
Article
Full-text available
In order to solve the network security problem of data encryption technology, this paper proposes a research method of computer network information security maintenance based on data encryption technology. Taking the network reporting system of a mining enterprise as the research object, this paper comprehensively expounds on the design of network reporting system and data encryption in network communication from the aspects of demand investigation, demand analysis, system design, software system development, and so on and implements the development by using BS architecture + independent client. The experimental results show that the AES algorithm can be independently designated as 128 bits, 192 bits, and 256 bits. Conclusion. This scheme can realize the rapid and safe transmission of data information and provide an effective means for the transmission of confidential documents on the network, so it has a good application prospect.
... Then micro-controller close or open the gate by servo motor. Besides, authors of [2] and [3] also proposed bluetooth and GSM communication. In 2020, Authors of [4] have discussed ensuring the security of a network through GSM encryption, authentication and access control. ...
Conference Paper
Full-text available
In this 21st century, ensuring the security of a place is one of the most crucial things. We have to use either manual or semi-autonomous entrances and human security guards in most of the security systems. Many sophisticated apartments are still now using a traditional security system to ensure safety. Besides, monitoring only by the camera in a certain area is not a better solution to confirm safety. A lot of paperwork has been proposed to make security system as efficient as possible. But a few methods have been proposed an intelligent security system with integrated hardware and automation. The proposed methodology has emphasized building a robotics ecosystem of security that control entrances to give access to authentic people, making decisions and taking actions in any circumstances automatically by itself. These tasks are being performed based on a collective method of image processing, natural language processing, supervised learning, IoT, automation and web server technology. This robotic system is capable of memorizing previously identified humans with their information, talking with users in a local language, gathering the necessary information and detecting everything with the user. By this method, there has been proposed a solution to overcome the limitations of a manual or semi-autonomous security system and provide intelligent AI-based security with a robotic ecosystem at a minimum cost.
Article
Full-text available
Automatic gate is one of the most useful things to use in companies, industries, colleges and schools. Automatic gates are important and very useful because it helps save time, reduces the human force applied to the opening and closing of the manual gate which saves energy and also saves gate operators from health hazards caused by exposing themselves to harsh weather conditions in the course of operating the manual gate. The design and construction of the automatic gate sited at the main entrance of Afe Babalola University Ado-Ekiti, Ekiti State, Nigeria was achieved by designing the gate, control unit and the power supply unit. The gate was designed, constructed and mounted, the control unit and power supply unit were also designed and implemented. These various units were incorporated and implemented. The automatic gate was tested for speed and efficiency and from the generated results, it can be said that the gate is 90% efficient. The automatic gate senses an object either human or vehicular within a distance of 0.42m to 0.52m and operates at a speed of 0.186m/s. The automatic gate has helped reduce the stress of opening and closing the gate where buttons are pressed rather than the usual manpower used in operating the gate. This has made life easier and more comfortable. The gate can be further improved my adding a scanning device to perform the searching operation done by the securities thereby making their work easier and more comfortable.
Article
Full-text available
Global system for mobile communication has witnessed tremendous growth. This is due largely to the fact that it enables people to make quality calls, send messages, browse the internet etc. at any time and for any period. The huge number of GSM subscribers has resulted in the system being overloaded. This research work is aimed at optimizing Global System for Mobile Communication (GSM) network in Rivers State. The behavior of GSM network under four different conditions were examined. The work also aimed to determine the number of base stations required to provide adequate GSM network coverage in Rivers State. Erlang B technique was employed to achieve the aim of this research work. This research work found that when the traffic load is greater than, or too close to, the voice channels (in magnitude), the system denied many callers access from making calls. However, when the voice channels are greater than traffic load, the system performed well. But voice channels must not be far greater than traffic load and should not be too close to it, to avoid under-utilization or over-utilization of the channels. The work also revealed that the number of base stations required in any given place varies inversely proportional to the square of the cell radius. Hence, for Rivers State, the number of base stations to provide 100% network coverage for a cell radius of 3km was found to be 474.
Article
Full-text available
With the rise of the concept of "smart earth", the new generation of information technology has changed the way information interacts. The combination of things, intelligence and interconnection has made people's daily life more convenient. However, while enjoying convenience, information security has become a bottleneck restricting comprehensive interconnection. A variety of devices can be remotely controlled through public networks and sensor networks, but a large number of facts show that in an open network environment, information is easily stolen and tampered, and the resulting security problems are becoming more serious. The 4G (the 4 Generation mobile communication technology) remote security control system implemented in this paper consists of a main controller, a cloud server and an Android client. The information of the main controller and the client is encrypted by the national secret algorithms SM2 and SM4, the information exchange is performed by the cloud server, and the main controller establishes a connection with the terminal device through the short-range wireless network. Compared with the remote control system that usually uses international algorithms, this system has advantages in terms of ensuring the security and control on the basis of satisfying convenience and intelligence.
Article
Full-text available
In this paper, we propose a container based testbed for the gate security system for a smart campus. The security system incorporated two-factor authentication, ID card based identification and face recognition, and authorization which were implemented using an open application programming interface (API) mashup. We analyzed requirements to provide an efficient and flexible testbed to developers and testers working simultaneously. Then, we designed and constructed a container based structure to satisfy the requirements including lightweight virtualization technology and dynamic private domain name management. Finally, we present the automation script to build the testbed and test the security system.
Article
Full-text available
Infrared or wireless technology provides an alternate, more portable, more independent means of accessing, opening and closing of a gate and other electronic information.This research work examines how users can open and close the gate with password using IR control. The device connected to this gate is working through the process from microcontroller that has been programmed with assembled language and logic circuit.This process is controlled by 8-bit microcontroller AT89C2051, the microcontroller receives the infrared signal from the transmitter which remote control through IR sensor, decode it and switch ON the relay that control the DC motor which incorporate with gear that control the movement of the gate forward and backward, when the wrong password enters through IR remote control designed for the circuit and open button is press the gate will not open, the security alarm will sound for security purpose. This alarm system is incorporated with design in order to impede intruders from gaining entrance to the opening of the gate.
Article
Full-text available
Sense of security is one of the efficient characteristics in an urban place. One of the sites in Iran is the traditional bazaar that has been active as the heart of traditional cities since many years ago. The purpose of this research is to study the effects of some of the physical factors, in traditional Bazaar, on the sense of security. The method of this study was descriptive-analytical, and we collected the data through survey and questionnaires. After, Friedman test was used to determine the level of significance and the classification of the main factors. The finding results show that factors like the shape of ceiling and the apparent similarity of rooms have the most influence and ceiling height has the least influence on the sense of security.
Article
Full-text available
Security is very important, especially the security of lives and properties. This work involves the use of sound in controlling the opening and closing of doors using electromechanical application. In this work, sound is used to activate the mechanisms which opens and closes the door without any external effort. The system is made up of two main features, the Security Access system and Control Mechanism. The security access system was designed using circuit wizard software and then constructed on a veroboard and other materials while the control mechanism was constructed using a simple DC motor for the opening and closing of the door. In its operation, a specific sound pattern in form of a positive voltage is sent to pin 14 of IC1, pin 14 of IC1 is connected to a transistor(Q2) which causes the 555timer to oscillate sending pulses to pin 14 of IC2, during this, the output of IC2 then operates in a sequential mode. The code switch then sets the number of beat that will set IC3 into the desire sequential output set by the operator. The output signal energizes the relay which controls the DC motor to open the door and closes after a preset time.The testing showed quick and fast response in operation of the door lock system.
Article
Full-text available
This paper presents a low cost and flexible home control and environmental monitoring system. It employs an embedded micro – web server in Arduino Mega 2560 microcontroller, with IP connectivity for accessing and controlling devices and appliances remotely. These devices can be controlled through a web application or via Bluetooth Android based Smart phone app. The proposed system does not require a dedicated server PC with respect to similar systems and offers a novel communication protocol to monitor and control the home environment with more than just the switching functionality. To demonstrate the feasibility and effectiveness of this system, devices such as light switches, power plug, temperature sensor, gas sensor and motion sensors have been integrated with the proposed home control system.
Article
Full-text available
The security challenges being encountered in many places require electronic means of controlling access to communities, recreational centres, offices, and homes. The electronically controlled automated security access gate being proposed in this work helps to prevent an unwanted access to controlled environments. This is achieved mainly through the use of a Radio Frequency (RF) transmitter-receiver pair. In the design a microcontroller is programmed to decode a given sequence of keys that is entered on a keypad and commands a transmitter module to send out this code as signal at a given radio frequency. Upon reception of this RF signal by the receiver module, another microcontroller activates a driver circuitry to operate the gate automatically. The codes for the microcontrollers were written in C language and were debugged and compiled using the KEIL Micro vision 4 integrated development environment. The resultant Hex files were programmed into the memories of the microcontrollers with the aid of a universal programmer. Software simulation was carried out using the Proteus Virtual System Modeling (VSM) version 7.7. A scaled-down prototype of the system was built and tested. The electronically controlled automated security access gate can be useful in providing security for homes, organizations, and automobile terminals. The four-character password required to operate the gate gives the system an increased level of security. Due to its standalone nature of operation