Smart Security Solutions Dependent on IoT: Design and Implementation
VerifiedAdded on 2020/03/07
|9
|1383
|42
Report
AI Summary
This report delves into smart security solutions that leverage the Internet of Things (IoT) to enhance access control systems. The core of the system involves the integration of biometric sensors, RFID readers, and microcontrollers (specifically the EKTM4C123GXL board) to create a secure and efficient access control system. The report outlines the functionality of the biometric sensor, which utilizes a SmackFinger 3.0 Algorithm for high-accuracy fingerprint identification, and an RFID reader to verify user credentials. The data from these sensors is processed by a microcontroller, which then activates a WiFi module to control electromagnetic locks. The report details the working process, advantages, and disadvantages of this security system, including the use of Wiegand protocol for RFID communication and UART for data transfer from the fingerprint scanner. The advantages include ease of use, data security, and flexibility, while the disadvantages include potential issues with fingerprint matching, WiFi connection failures, and the need for external memory. The report concludes by emphasizing the importance of IoT in modern security systems and the potential for future advancements in this field.

Running head: SMART SECURITY SOLUTIONS DEPENDED ON IoT
Smart Security Solutions Depended on IoT (Internet of Things)
Name of Student-
Name of University-
Author Note-
Smart Security Solutions Depended on IoT (Internet of Things)
Name of Student-
Name of University-
Author Note-
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1SMART SECURITY SOLUTIONS DEPENDED ON IoT
Introduction
Alongside the expanding request from the enterprises for a superior access on control
frameworks, this paper reveals insight into the best approach to make the control frameworks
more intelligent and consequently diminish the danger of going into the regions where these
regular get to controls are introduced (Hinz, Finkenzeller and Seysen, 2016). EKTM4C123GXL
board is utilized for these reasons. The information from the Biometric sensors and RFID peruser
is exchanged to microcontroller chip. On the off chance that the information coordinates then the
entryway opens. The flag is likewise send to the frameworks by means of same system of WiFi
module 1 and WiFi module 2.
Solution with features
To secure the locks of the entryway, the security arrangement of utilizing biometric and RFID
peruser is utilized. The brilliant card of the customer is perused by the RFID peruser and the
unique mark is taken by the biometric sensor (Carper, 2014). The elements of the biometric
sensor are-
• High-Accuracy and High-Speed Fingerprint Identification by the execution of the
SmackFinger 3.0 Algorithm
• The pictures are downloaded from the biometric gadget
• Databases and Fingerprint Templates by Simple UART convention (Default 9600
baud) are additionally perused
• 1:N Identification and 1:1 Verification of 360° Fingerprint Recognition is finished by
this sensor
Introduction
Alongside the expanding request from the enterprises for a superior access on control
frameworks, this paper reveals insight into the best approach to make the control frameworks
more intelligent and consequently diminish the danger of going into the regions where these
regular get to controls are introduced (Hinz, Finkenzeller and Seysen, 2016). EKTM4C123GXL
board is utilized for these reasons. The information from the Biometric sensors and RFID peruser
is exchanged to microcontroller chip. On the off chance that the information coordinates then the
entryway opens. The flag is likewise send to the frameworks by means of same system of WiFi
module 1 and WiFi module 2.
Solution with features
To secure the locks of the entryway, the security arrangement of utilizing biometric and RFID
peruser is utilized. The brilliant card of the customer is perused by the RFID peruser and the
unique mark is taken by the biometric sensor (Carper, 2014). The elements of the biometric
sensor are-
• High-Accuracy and High-Speed Fingerprint Identification by the execution of the
SmackFinger 3.0 Algorithm
• The pictures are downloaded from the biometric gadget
• Databases and Fingerprint Templates by Simple UART convention (Default 9600
baud) are additionally perused
• 1:N Identification and 1:1 Verification of 360° Fingerprint Recognition is finished by
this sensor

2SMART SECURITY SOLUTIONS DEPENDED ON IoT
The information gathered from the Biometric sensor is then exchanged to the WiFi module 1for
coordinating. On the off chance that the information gets coordinated at that point advance it is
exchanged to the WiFi module 2 which trips the hand-off and the entryway is opened (Liu and
Gu, 2016). The components of WiFI module 2 are-
• Power Management Subsystems and Wi-Fi Network Processor are available
• Host Interference
• Subsystems having Power Management
• Advanced Low-Power Modes
• Wi-Fi Processor Subsystem
The information gathered from the Biometric sensor is then exchanged to the WiFi module 1for
coordinating. On the off chance that the information gets coordinated at that point advance it is
exchanged to the WiFi module 2 which trips the hand-off and the entryway is opened (Liu and
Gu, 2016). The components of WiFI module 2 are-
• Power Management Subsystems and Wi-Fi Network Processor are available
• Host Interference
• Subsystems having Power Management
• Advanced Low-Power Modes
• Wi-Fi Processor Subsystem

3SMART SECURITY SOLUTIONS DEPENDED ON IoT
Diagram of security process
Microcontroller
RFID ReaderBiometric Sensor
WiFi Module 1
PC
Diagram of security process
Microcontroller
RFID ReaderBiometric Sensor
WiFi Module 1
PC
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4SMART SECURITY SOLUTIONS DEPENDED ON IoT
Fig: Security process using RFID technology and Biometric Sensor
Working Process of System
The RFID peruser or a peruser known as wiegand peruser peruses the shrewd card of the
person. A flag of 125 KHz is transmitted through. The card does not have any power source. The
peruser gives some voltage in the card and after that a 16 bit card number is transmitted to the
peruser. The card number is then transmitted to the microcontroller through two information
sticks by the peruser. The convention utilized for this procedure is known as Wiegand
convention (Mei Yin et al., 2016). There is a 26 bit arrange for the Wiegand convention. The
initial 13 bit of the chip is even equality bit. After the even equality, the chip is trailed by office
code of 8bits. Greater security is given in the office code. The office code is utilized where there
is a same card number of the worker for two unique organizations (Park, Hildreth and Hazzard,
2017). After the 8 bit office code, the card number of 16 bit is available and these are the odd
equality bits.
The biometric scanner that is utilized as a part of this procedure is the unique mark scanner.
The work of the biometric work is to take a photo of the finger and to check whether the unique
mark coordinates the beforehand put away unique mark database. Just the particular qualities that
Electromagnetic
Locks that are
relay driven
WiFi Module 2
Fig: Security process using RFID technology and Biometric Sensor
Working Process of System
The RFID peruser or a peruser known as wiegand peruser peruses the shrewd card of the
person. A flag of 125 KHz is transmitted through. The card does not have any power source. The
peruser gives some voltage in the card and after that a 16 bit card number is transmitted to the
peruser. The card number is then transmitted to the microcontroller through two information
sticks by the peruser. The convention utilized for this procedure is known as Wiegand
convention (Mei Yin et al., 2016). There is a 26 bit arrange for the Wiegand convention. The
initial 13 bit of the chip is even equality bit. After the even equality, the chip is trailed by office
code of 8bits. Greater security is given in the office code. The office code is utilized where there
is a same card number of the worker for two unique organizations (Park, Hildreth and Hazzard,
2017). After the 8 bit office code, the card number of 16 bit is available and these are the odd
equality bits.
The biometric scanner that is utilized as a part of this procedure is the unique mark scanner.
The work of the biometric work is to take a photo of the finger and to check whether the unique
mark coordinates the beforehand put away unique mark database. Just the particular qualities that
Electromagnetic
Locks that are
relay driven
WiFi Module 2

5SMART SECURITY SOLUTIONS DEPENDED ON IoT
are one of a kind to all fingerprints are taken as the scrambled biometric key. The picture of the
unique mark is not spared (D'ambrosio, 2016). Just the arrangement of paired code is put
something aside for encourage check. There is no possibility of changing over the calculation to
a picture which diminishes the level of trickery (Sowjanya and Nagaraju, 2016). A serial
information is exchanged to the by the unique mark scanner to the microcontroller. The
exchange of information happens through UART (Universal Asynchronous Receiver
Transmitter). The GPIO peruses the information from Wiegand peruser as info pins and a code is
composed by the Wiegand convention (Mei Yin et al., 2016). The code got is then coordinated
with predefined numbers put away in the blaze ROM, and after that a flag high is send to the
module 1 if the number ends up noticeably substantial. The high esteem is then exchanged to
WiFi module 2 and a hand-off is stumbled and the entryway opens.
Advantages of using security with RFID
• Easy to utilize RFID innovation as security
• Data following is considerably less demanding in biometric sensor and RFID
innovation
• Data are secured
• This strategy for security is especially adaptable
Disadvantages of using security with RFID
• If some way or the other unique mark does not coordinate with the predefined
information, the entryway won't open in show disdain toward the individual is
legitimate.
• There is a shot of WiFi association disappointment.
are one of a kind to all fingerprints are taken as the scrambled biometric key. The picture of the
unique mark is not spared (D'ambrosio, 2016). Just the arrangement of paired code is put
something aside for encourage check. There is no possibility of changing over the calculation to
a picture which diminishes the level of trickery (Sowjanya and Nagaraju, 2016). A serial
information is exchanged to the by the unique mark scanner to the microcontroller. The
exchange of information happens through UART (Universal Asynchronous Receiver
Transmitter). The GPIO peruses the information from Wiegand peruser as info pins and a code is
composed by the Wiegand convention (Mei Yin et al., 2016). The code got is then coordinated
with predefined numbers put away in the blaze ROM, and after that a flag high is send to the
module 1 if the number ends up noticeably substantial. The high esteem is then exchanged to
WiFi module 2 and a hand-off is stumbled and the entryway opens.
Advantages of using security with RFID
• Easy to utilize RFID innovation as security
• Data following is considerably less demanding in biometric sensor and RFID
innovation
• Data are secured
• This strategy for security is especially adaptable
Disadvantages of using security with RFID
• If some way or the other unique mark does not coordinate with the predefined
information, the entryway won't open in show disdain toward the individual is
legitimate.
• There is a shot of WiFi association disappointment.

6SMART SECURITY SOLUTIONS DEPENDED ON IoT
• If the RFID tag gets lost, it will make a shot for burglary.
• External Flash memory should be utilized if there are more number of individuals.
Conclusion
Plotting the keen get to control is a productive route by which the issue confronted by the
enterprises can be overcome. Vitality proficient can be gotten by choosing a legitimate
microcontroller. Items that depend on IoT are popular in the development of the specialized
range. An ever increasing number of enhanced adaptations of the IoTs are yet to come later on
world.
• If the RFID tag gets lost, it will make a shot for burglary.
• External Flash memory should be utilized if there are more number of individuals.
Conclusion
Plotting the keen get to control is a productive route by which the issue confronted by the
enterprises can be overcome. Vitality proficient can be gotten by choosing a legitimate
microcontroller. Items that depend on IoT are popular in the development of the specialized
range. An ever increasing number of enhanced adaptations of the IoTs are yet to come later on
world.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7SMART SECURITY SOLUTIONS DEPENDED ON IoT
References
Carper, T. A. (2014). U.S. Patent No. 8,799,167. Washington, DC: U.S. Patent and Trademark
Office.
D'ambrosio, G. J., Ganel, O., Moody, N., & Moreno, G. (2016). U.S. Patent No. 9,324,051.
Washington, DC: U.S. Patent and Trademark Office.
Kang, Y. S., Park, I. H., Rhee, J., & Lee, Y. H. (2016). MongoDB-based repository design for
IoT-generated RFID/sensor big data. IEEE Sensors Journal, 16(2), 485-497.
Liu, C., & Gu, Y. (2016, July). Research on indoor fire location scheme of RFID based on WiFi.
In Nicograph International (NicoInt), 2016 (pp. 116-119). IEEE.
Mei Yin, D. B., Kamal, M. I., Azmanuddin, N. S., Ali, S. H. S., Othman, A. T., & Chik, R. Z. W.
(2016, January). Electronic door access control using MyAccess two-factor
authentication scheme featuring near-field communication and eigenface-based face
recognition using principal component analysis. In Proceedings of the 10th International
Conference on Ubiquitous Information Management and Communication (p. 1). ACM.
Mei Yin, D. B., Kamal, M. I., Azmanuddin, N. S., Ali, S. H. S., Othman, A. T., & Chik, R. Z. W.
(2016, January). Electronic door access control using MyAccess two-factor
authentication scheme featuring near-field communication and eigenface-based face
recognition using principal component analysis. In Proceedings of the 10th International
Conference on Ubiquitous Information Management and Communication (p. 1). ACM.
Park, R., Hildreth, D., & Hazzard, T. (2017). U.S. Patent No. 9,545,029. Washington, DC: U.S.
Patent and Trademark Office.
References
Carper, T. A. (2014). U.S. Patent No. 8,799,167. Washington, DC: U.S. Patent and Trademark
Office.
D'ambrosio, G. J., Ganel, O., Moody, N., & Moreno, G. (2016). U.S. Patent No. 9,324,051.
Washington, DC: U.S. Patent and Trademark Office.
Kang, Y. S., Park, I. H., Rhee, J., & Lee, Y. H. (2016). MongoDB-based repository design for
IoT-generated RFID/sensor big data. IEEE Sensors Journal, 16(2), 485-497.
Liu, C., & Gu, Y. (2016, July). Research on indoor fire location scheme of RFID based on WiFi.
In Nicograph International (NicoInt), 2016 (pp. 116-119). IEEE.
Mei Yin, D. B., Kamal, M. I., Azmanuddin, N. S., Ali, S. H. S., Othman, A. T., & Chik, R. Z. W.
(2016, January). Electronic door access control using MyAccess two-factor
authentication scheme featuring near-field communication and eigenface-based face
recognition using principal component analysis. In Proceedings of the 10th International
Conference on Ubiquitous Information Management and Communication (p. 1). ACM.
Mei Yin, D. B., Kamal, M. I., Azmanuddin, N. S., Ali, S. H. S., Othman, A. T., & Chik, R. Z. W.
(2016, January). Electronic door access control using MyAccess two-factor
authentication scheme featuring near-field communication and eigenface-based face
recognition using principal component analysis. In Proceedings of the 10th International
Conference on Ubiquitous Information Management and Communication (p. 1). ACM.
Park, R., Hildreth, D., & Hazzard, T. (2017). U.S. Patent No. 9,545,029. Washington, DC: U.S.
Patent and Trademark Office.

8SMART SECURITY SOLUTIONS DEPENDED ON IoT
Sowjanya, G., & Nagaraju, S. (2016, August). Design and implementation of door access control
and security system based on IOT. In Inventive Computation Technologies (ICICT),
International Conference on (Vol. 2, pp. 1-4). IEEE.
Sowjanya, G., & Nagaraju, S. (2016, August). Design and implementation of door access control
and security system based on IOT. In Inventive Computation Technologies (ICICT),
International Conference on (Vol. 2, pp. 1-4). IEEE.
1 out of 9

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.