Beruflich Dokumente
Kultur Dokumente
*Note: Sub-titles are not captured in Xplore and should not be used
The Internet of Things, an emerging global Internet-based biometric based locks. Under significant instances
technical architecture facilitating the exchange of goods and fingerprints were also faked through forensic studies. After
services in global supply chain networks has an impact on the this era, emerged the Global System for Mobile(GSM) based
security and privacy of the involved stakeholders. Measures system, which used mobile communications for the purpose
ensuring the architecture's resilience to attacks, data
of unlocking the door each time[1]. Then came the Radio
authentication, access control and client privacy need to be
established. An adequate legal framework must take the Frequency Identification(RFID) based System. In this system,
underlying technology into account and would best be established the authorized users are required to place the card tag in RFID
by an international legislator, which is supplemented by the detector[2]. This system was outdated due to frequency issues
private sector according to specific needs and thereby becomes and manufacture issues. After this time period, bluetooth
easily adjustable. The contents of the respective legislation must based system came into existence. It uses he bluetooth module
encompass the right to information, provisions prohibiting or connected to smart devices to operate the access. This
restricting the use of mechanisms of the Internet of Things, rules technology was not efficient enough for large companies and
on IT-security-legislation, provisions supporting the use of were implemented for only domestic low strength people.
mechanisms of the Internet of Things and the establishment of a
Then came the social networking sites based Systems. It was
task force doing research on the legal challenges of the IoT.
hacked easily and was not efficient. One Time Period (OTP)
Finger print based security system can be used at many places based system used to send a OTP everytime it requires access
like Industries, Offices, and Colleges or even at our home. This and the OTP should be entered[3]. This had it own defects viz
project is a fine combination of “Biometrics technology” and missing their mobile, more time taken to access etc. Motion
“Embedded system technology”. Fingerprint sensor is the main detector based system was introduced after this period. It was
part of this system. It makes use of Biometric sensor to detect based on the principle of light falling on the photodiode. Once
fingerprint. It is also called as Biometric sensor. Fingerprint the motion(key to unlock) was leaked the security no more
sensor uses various types of techniques like ultrasonic method, seemed to be a threat. Visual Biometric(VB) system which
optical method or thermal technique. In this project we have used
optical fingerprint sensor. Main blocks of this project are
was published after this which used electronic eye
Microcontroller, Fingerprint module, Buzzer, Relay, Keypad, representation[4]. It is a module for capturing the door images
LCD display and Motor. User has to place his/her finger on the whenever the door was opened or closed. This security cannot
optical sensor part of fingerprint module. We have seen Password be used in areas where even a one way entry should be
based security system RFID based security system. The main restricted. At last came the combined system, which made use
feature or specialty of fingerprint is that it is unique. It gives this of two or more of the above mentioned methods to access the
project the high level security than other security systems. Person locks[5]. This System remains the latest high end security
recognition using the Fingerprint identification is used since a protocol for banks and other important sectors. This System
long time. Most common example is use in the criminal cases. has the defects of each methods combined which can be done
Keywords— Internet of things, fingerprint, security. by professional hackers. The defects of these methods made
us realize the need for security issues. The efficiency of the
I. INTRODUCTION (HEADING 1) security can be further increased only when there is a
Security represents protection of our life and assets. Ensuring combination of several methods.[6] Instead of combining two
safety of people and their valuable things is very important for methods, we integrated two methods of security and made one
the prevention of illegal handling. Hence, mainly focusing on method hidden and only the other method visible to the
door lock security or gate security is very important to avoid people. In detail, this project uses the password based system
the further problems in the monitored area. Initially, there was integrated long with the finger print based system. The later
mechanical locks, robberies get happened due to the fact that method is kept as a hidden feature so that it becomes
those locks were broken. So followed by that, digital password impossible for the hosts to break the security. Hence, this
locks were introduced. This method was outdated when system would rise as the best security system available till
passwords were hacked by thieves. There was then came the date.