Sie sind auf Seite 1von 2

Smart Security System

*Note: Sub-titles are not captured in Xplore and should not be used

Kanchanpally Pruthvi Raju


Kanchan Tamlurkar Kokkiligadda Lavanya
Computer Science and Engineering
Computer Science and Engineering Computer Science and Engineering
MLR Institute of Technology
MLR Institute of Technology MLR Institute of Technology
Hyderabad, Telangana
Hyderabad, Telangana Hyderabad, Telangana
kpruthvirj@gmail.com
kanchan199763@gmail.com lavanya.kokkiligadda.96@gmail.com

The Internet of Things, an emerging global Internet-based biometric based locks. Under significant instances
technical architecture facilitating the exchange of goods and fingerprints were also faked through forensic studies. After
services in global supply chain networks has an impact on the this era, emerged the Global System for Mobile(GSM) based
security and privacy of the involved stakeholders. Measures system, which used mobile communications for the purpose
ensuring the architecture's resilience to attacks, data
of unlocking the door each time[1]. Then came the Radio
authentication, access control and client privacy need to be
established. An adequate legal framework must take the Frequency Identification(RFID) based System. In this system,
underlying technology into account and would best be established the authorized users are required to place the card tag in RFID
by an international legislator, which is supplemented by the detector[2]. This system was outdated due to frequency issues
private sector according to specific needs and thereby becomes and manufacture issues. After this time period, bluetooth
easily adjustable. The contents of the respective legislation must based system came into existence. It uses he bluetooth module
encompass the right to information, provisions prohibiting or connected to smart devices to operate the access. This
restricting the use of mechanisms of the Internet of Things, rules technology was not efficient enough for large companies and
on IT-security-legislation, provisions supporting the use of were implemented for only domestic low strength people.
mechanisms of the Internet of Things and the establishment of a
Then came the social networking sites based Systems. It was
task force doing research on the legal challenges of the IoT.
hacked easily and was not efficient. One Time Period (OTP)
Finger print based security system can be used at many places based system used to send a OTP everytime it requires access
like Industries, Offices, and Colleges or even at our home. This and the OTP should be entered[3]. This had it own defects viz
project is a fine combination of “Biometrics technology” and missing their mobile, more time taken to access etc. Motion
“Embedded system technology”. Fingerprint sensor is the main detector based system was introduced after this period. It was
part of this system. It makes use of Biometric sensor to detect based on the principle of light falling on the photodiode. Once
fingerprint. It is also called as Biometric sensor. Fingerprint the motion(key to unlock) was leaked the security no more
sensor uses various types of techniques like ultrasonic method, seemed to be a threat. Visual Biometric(VB) system which
optical method or thermal technique. In this project we have used
optical fingerprint sensor. Main blocks of this project are
was published after this which used electronic eye
Microcontroller, Fingerprint module, Buzzer, Relay, Keypad, representation[4]. It is a module for capturing the door images
LCD display and Motor. User has to place his/her finger on the whenever the door was opened or closed. This security cannot
optical sensor part of fingerprint module. We have seen Password be used in areas where even a one way entry should be
based security system RFID based security system. The main restricted. At last came the combined system, which made use
feature or specialty of fingerprint is that it is unique. It gives this of two or more of the above mentioned methods to access the
project the high level security than other security systems. Person locks[5]. This System remains the latest high end security
recognition using the Fingerprint identification is used since a protocol for banks and other important sectors. This System
long time. Most common example is use in the criminal cases. has the defects of each methods combined which can be done
Keywords— Internet of things, fingerprint, security. by professional hackers. The defects of these methods made
us realize the need for security issues. The efficiency of the
I. INTRODUCTION (HEADING 1) security can be further increased only when there is a
Security represents protection of our life and assets. Ensuring combination of several methods.[6] Instead of combining two
safety of people and their valuable things is very important for methods, we integrated two methods of security and made one
the prevention of illegal handling. Hence, mainly focusing on method hidden and only the other method visible to the
door lock security or gate security is very important to avoid people. In detail, this project uses the password based system
the further problems in the monitored area. Initially, there was integrated long with the finger print based system. The later
mechanical locks, robberies get happened due to the fact that method is kept as a hidden feature so that it becomes
those locks were broken. So followed by that, digital password impossible for the hosts to break the security. Hence, this
locks were introduced. This method was outdated when system would rise as the best security system available till
passwords were hacked by thieves. There was then came the date.

XXX-X-XXXX-XXXX-X/XX/$XX.00 ©20XX IEEE


II. LITERATURE SURVEY First of all I would like to express my deep gratitude
I. EXISTING SYSTEM: towards my internal guide G. SOWMYA (Asst Professor).
Department of CSE for her support in the completion of my
 The existing security systems are the door bolts.
dissertation. I wish to express my sincere thanks to, Prof. N.
 To add security traditional padlocks which are CHANDRASHEKHAR REDDY HOD, Dept. of CSE and
locked on to the bolts. also to our principal Dr. K. SRINIVAS RAO for providing
 But the traditional locks and bolts are easy to break the facilities to complete the dissertation.
and provide a feeble security.
I would like to thank all our faculty and friends for their
II DISADVANTAGES OF EXISTING SYSTEM: help and constructive criticism during the project period.
 The existing locks are the traditional locks. Finally, I am very much indebted to our parents for their moral
 The traditional locks are the regular padlocks that can support and encouragement to achieve goals.
easily be broken.
 The traditional locks can be easily opened even with REFERENCES
the help of a hair pin which is just too easy to break [1] Koichi I., Ayumi M., Takafumi A., Hiroshi N., Koji
in. Kobayashi, and Tatsuo H. (2005) “A Fingerprint Recognition
 Thus providing little or no security. Algorithm Combining Phase-Based Image Matching and
 Also if a password is added for additional security FeatureBasedMatching”,
there is chance that the person who ever knows the http://www.aoki.ecei.tohoku.ac.jp/~ito/cr2114.pdf -00
password has access to open the lock.
[2] Anton S. (2002) “Sorting it out: Machine learning
III PROPOSED SYSTEM: and fingerprints”, Paper presented at the seminar on Telematik
 In the proposed system we are introducing a security fingerprint, Siemens Corporate Technology, Munich,
system which is a combination of both Bluetooth Germany.
module and a fingerprint scanner. [3] Graevenitz G.A. (2003) “Introduction to fingerprint
 The finger print scanner gives the access only to the technology”, A&S International, Vol. 53,pp. 84 – 86.
finger prints that are stored in the database, thus
providing exclusivity. [4] Thai R. (2003) “Fingerprint Image Enhancement and
 The Bluetooth module helps in controlling multiple Minutiae Extraction“, Unpublished B.Sc Thesis, School of
doors. Computer Science and Software Engineering, The University
 The inner doors are access through android mobile of Western Australia, Australia
application which is connected to the bluetooth [5] http://www.crimtrac.gov.au/fingerprintanalysis.htm,
module. “Fingerprint Analysis – The Basics”
[6]
http://www.biometricinfo.org/fingerprintrecognition.htm,
IV ADVANTAGES OF PROPOSED SYSTEM: “Bio metrics Information Resource”
[7]
 Better security.
http://webfealb.fea.aub.edu.lb/dsa/labs/projectv1.1.pdf
 Access is provided exclusively to only a certain
[8] http://www.computer-
people.
.howstuffworks.com/fingerprintscanner.htm
It provides a two step authentication security through
[9]
finger print scanner and bluetooth module
http://www.computer.howstuffworks.com/fingerprintscan
ACKNOWLEDGMENT (Heading 5) ner .htm
There are many people who helped me directly and [10] http://www.crimtrac.gov.au/fingerprintanalysis.htm
indirectly to complete my project successfully. I would like to
take this opportunity to thank one and all.

Das könnte Ihnen auch gefallen