100% found this document useful (1 vote)
35 views27 pages

Technical

The document describes a proposed smart bank locker security system that uses various technologies including RFID, GSM, fingerprint scanning, and IR sensors. The system is designed to securely authenticate users to access their bank lockers. It analyzes existing security systems that use odor identification, pattern analysis, NFC, motion sensors, PIR/IR sensors, heat sensors, RFID, GSM, face recognition and fingerprint/iris scans. The proposed system combines GSM and RFID technologies for authentication. It aims to provide secure, inexpensive access using microcontrollers to integrate the hardware and software components.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
35 views27 pages

Technical

The document describes a proposed smart bank locker security system that uses various technologies including RFID, GSM, fingerprint scanning, and IR sensors. The system is designed to securely authenticate users to access their bank lockers. It analyzes existing security systems that use odor identification, pattern analysis, NFC, motion sensors, PIR/IR sensors, heat sensors, RFID, GSM, face recognition and fingerprint/iris scans. The proposed system combines GSM and RFID technologies for authentication. It aims to provide secure, inexpensive access using microcontrollers to integrate the hardware and software components.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 27

A

Technical Seminar Report


On
SMART BANK LOCKER SYSTEM
Submitted in partial fulfilment of the requirement for the award of
Bachelor of technology
In
Electronics and Communication Engineering
BY
NAGA JYOTHI SAVIREDDY (21251A0456)

DEPARTMENT OF ELECTRONICS AND COMMUNICATION


ENGINEERING

G. NARAYANAMMA INSTITUTE OF TECHNOLOGY &SCIENCE


(for women)
(Autonomous)
Accredited by NAAC & NBA
Batch:2021-2025
CONTENTS

S.No Topic Page No


Abstract i
List of Figures ii
List of Abbrevations iii
1 Introduction 1
2 Literature Survey 3
2.1 Security using odor identification 3
2.2 Security using pattern analyzer 4
2.3 Security using Near field 4
communication 5
2.4 Security using motion sensor 6
2.5 Security using PIR and IR sensor 6
2.6 Security using heat
sensor,RFID,GSM 7
2.6 Security using Face recognition 7
2.7 Security using Fingerprint scan,IRIS
scan
3 Proposed system
3.1 GSM and RFID technology 9
3.2 Experimental methodology 11

4 Block Diagram
4.1 Circuit description 13
4.2 Circuit diagram 14
5 Software and Hardware are used 16
5.1 Software program and testing 16
5.2 Hardware assembling and testing 16
6 Results 17
7 Conclusion 19
8 Advantages and Diadvantages 20
9 Reference 21
ABSTRACT

In today’s high-speed world, security plays significant role. People are now more
concern of their belongings like valuable documents, jewelry, and many more material.
The safest place to keep all such valuable is bank. With the advancement in technology
there are many system designed to keep bank lockers safe.
The main objective of this paper is to use diverse technologies to create a bank
locker security system. A door- locking system utilizing RFID and GSM technology,
combined with fingerprint scanning and IR sensor activation, will be used to enable
secure access to bank lockers. This technology may unlock the door while simultaneously
activating, validating, and approving the user. As a result, it appears that the specified
system is very secure. It is possible to accomplish that by integrating hardware and
software. The ARM LPC 2148 microcontroller can be used to implement the hardware
component. The goal is to develop a system that is inexpensive, uses little power, is
simple to use, and is compact in size.

Naga Jyothi Savireddy


(21251A0456)

i
LIST OF FIGURES
S.No Fig No Name of the figure Page No
2 2.1 Odor detection steps 3

2 2.2 CCTV camera 4

2 2.3 Smartphone using NFC 5

2 2.4 Use of motion sensor 5

2 2.5 IR sensor 6

2 2.7 Face recognition 7

2 2.8 Fingerprint scan 8

3 3.1 Working of GSM network 10

3 3.2 Experimental setup 12

4 4.1 Block diagram of bank locker 13


13
system
4.1.1 Power supply
4 4.2 Circuit of bank locker system 14
based on GSM and RFID
technology
6 6.1 Scanner ouput 17
6 6.2 Password entry 17
6 6.3 GSM output 18

ii

LIST OF ABBREVATIONS
S.No Abbrevation Full form
1 GSM Global system for Mobile Communication
2 RFID Radio Frequency Identification
3 FDM Frequency division multiplexing
4 TDM Time division multiplexing
5 ARM Advanced risc architecture
6 LPC Low pin count

iii
1.INTRODUCTION
1.1 Introduction
It is said that a bank locker is the safest place to store valuable necessities. In light
of this, the security of these lockers has drawn considerable attention, particularly in
urban areas. As a result, most people either install multiple locks or use a digital solution
like alarm systems to address the safety danger. Alarm systems use a number of sensors
and come in a wide range of designs. The sensor system might not be reliable at all times.
However, it can recognize various environmental alterations, which are assessed and then
trigger an alarm based on a pre-defined value. Biometrics, including GSM, RFID, and
PIR sensors, exceed other technologies in terms of security and dependability. The great
performance of fingerprint scanning for identification is one of its advantages.
Therefore, we use fingerprint technology as an identity module. The goal is to
create a prototype to handle the serious problem of security for critical organizational
systems, including bank lockers with the appropriate authorization. An antenna or coil, a
transceiver (with a decoder), and a transponder (RF tag) with customized information are
the components of an RFID system. The market is filled with a wide variety of RFID
systems. These are divided into groups based on the frequency ranges.
Low-frequency (30-500 kHz), mid-frequency (900 kHz-1500MHz), and high-
frequency (2.4-2.5GHz) RFID kits are some of the models that are most frequently used.
An electrical device that monitors and detects infrared radiation in its environment is
called an infrared (IR) sensor. A GSM module is a specific kind of device that uses a SIM
card and requires a mobile operator subscription to function, much like a cell phone or
A GSM modem resembles a phone from the standpoint of a mobile operator.
Tags and readers are the two halves of the wireless system known as Radio Frequency
Identification (RFID). Tags can be passive or active, employing radio waves to transmit
their identity as well as additional information to adjacent readers. Readers can be mobile
so that they can be carried by hand, or they can be mounted on a post or overhead.
The LPC2141/42/44/46/48 microcontrollers combine a microcontroller with
embedded high speed flash memory with capacities ranging from 32 kB to 512 kB. They
are based on a 16-bit/32-bit ARM7TDMI-S CPU with real-time emulation and embedded
debug support.

1
32-bit code execution at the highest clock rate is made possible via a 128-bit wide
memory interface and a special accelerator architecture.The alternative 16-bit Thumb
mode cuts code by more than 30% with little performance hit for applications that require
small code sizes.
The LPC2141/42/44/46/48 are perfect for applications like access control and
point-of-sale where miniaturisation is essential due to their small size and low power
consumption. These devices are well suited for communication gateways and protocol
converters, soft modems, voice recognition, and low-end imaging because they have
serial communications interfaces that range from a USB 2.0 Full-speed device to multiple
UARTs, SPI, SSP, to I2C-bus and on-chip SRAM of 8 kB to 40 kB. They also have large
buffer sizes and powerful processors. The aforementioned microcontrollers are suitable
for industrial control and medical applications due to their various 32-bit timers, single or
dual 10-bit ADC(s), 10-bit DAC, PWM channels, 45 fast GPIO lines, and up to nine edge
or level sensitive external interrupt pins.

2
2. LITERATURE SURVEY

2.1 Security using odor identification and security questions


Identification of odor and security question is an extra level security system to verify the
identity of a person. In one of the paper based on bank locker security system this
technique is used along with RFID. Everyone in this world has its distinctive odor, which
helps the system to distinguish and identify persons. Every time a person hasto access his
locker, has to undergo through this test.Initially questions are set for security reasons. If
the holder answers the questions asked by the system, and if the answers are right then the
holder has to follow odor test.Whenever a person opens a bank locker account in a bank,
his or her odor pattern is stored in the data base of bank system.

Fig.2.1 Odor detection


steps
This technique of odor identification uses a device knows as electronic nose.
Electronic nose is based on the technology of e-sensing that uses sensing arrays and
pattern recognition methods to reproduce human sense of sensing smell. There are many
sensors in electronic nose like MOSFET, conducting polymers, quartz crystal
microbalance. In this system, bank locker account holder does his registration, at the time
of registration odor of holder is saved. Whenever locker account holder wants to access
locker, odor is tested through electronic nose which is interfaced to a microprocessor
where the odor is compared with the previous odor data base that was taken at the time
when bank locker holder did his registration.

3
2.2 Security using pattern analyzer
In this system various levels of security are implemented. One security level is on
machine side and other level is on door side. Here authentication of a person is done by
RFID tag and a camera. When a person has to access the locker he has to swipe his tag.
Along with RFID one more authentication level is there. Camera which is installed in
strong room captures pattern password using OPEN CV to compare and recognize user
pattern for authentication. The other level of security is implemented with the help of
sensors like vibration sensors and temperature sensors near door for security issues.

Fig.2.2 CCTV camera

2.3 Security using Near Field Communication (NFC


In this bank locker security system, NFC a near field communication technology along
with a fingerprint scanner is used. Now days all smart phone consist of NFC feature
inbuilt in them. NFC is a technology in which information is transferred wirelessly when
a device having NFC is brought near to other device. In this system NFC smart phone is
interfaced with a micro controller module .Locker holder has to first place his thumb on
fingerprint scanner in Smart phone, once this fingerprint is scanned and found correct, a
password is generated.

4
Fig.2.3 Smartphone using NFC
2.4 Security using motion sensor
One of the key player technologies in security system is motion sensor. The motion
sensor is a device used to detect motions or different movements in the area around it.
The main function of such sensors is to detect intruder when there is no one in
organization or home or any institute. Motion sensors stand guard by alerting the control
panel system by sending signals whenever the sensor get tripped by changes in motion.
There are various types of motion sensors like passive motion sensor and active motion
sensor. Active motion sensor emits various energy signals like sound signals, infrared
signal, and microwave signal. Also few sensors use vibrations, ultrasonic waves
to detect motions.

Fig.2.4 Use of Motion Sensor


5
2.5 Security using PIR and IR sensor
In this system two levels security protection is used. One security level uses PIR motion
detection sensor and other level uses IR proximity detection. Here Programmable system
on chip (PSoC) technology is used to interface these two detection algorithms. PIR is a
passive infrared motion sensor used to detect infrared light waves emitting from objects
around it. IR proximity sensor detects objects closer to the sensor. The main component
in IR sensor is IR LED which radiates infrared radiations that are reflected when an
object is in vicinity of sensor. However this system suffers a drawback as there are some
color, some objects that absorbs infrared waves and thus there is no reflection.

Fig.2.5 IR Sensor

2.6 Security using heat sensor, RFID, GSM


In this system along with RFID tag, heat sensor and GSM is used. Initially locker holder
has to swipe his RFID tag which consists of information about bank locker holder like
locker number and other details. Once the tag is recognized as valid tag, bank manager
will provide respective locker through conveyer setup. Apart from this if somebody tries
to open the locker through machine or any instrument, then that theft is detected by heat
sensor.As burglar will use some sort of instrument then temperature will be increase, and
this rise in temperature will be sensed and an alarm will trigger.
6
2.7 Security using Face recognition
This system uses face recognition technology to recognize a person, whether he is a bank
holder or thief. Every bank has camera system implemented. When a person enter strong
room of bank locker, camera present in bank locker captures image of the person. The
captured image of the person is given as input to one of the face recognition algorithm.
Among various facial features skin color is used here to recognize person. However this
system has drawbacks due to difference in facial expression, image orientation, also this
system has to maintain huge database.

Fig.2.7 Face Recognition

2.8 Security using Fingerprint scan, IRIS scans


In this system a three level security system is designed.One level uses RFID, second level
uses fingerprint scanner and third level uses IRIS identification. At initial stage user has
to swipe RFID tag, if the tag is valid then LCD display ask to place finger on fingerprint
scanner. If the fingerprint scan is accepted then user has to go throughthird security level
of IRIS scan. IRIS scan technology is one of the biometric technologies that use pattern
recognition technique to identify patterns of a person’sretina. Here the person has to bring
his eye in front of a camera. The capture eye pattern then will be compared to the eye
pattern stored in database. The match if found valid, person will be allowed to access hi
locker otherwise bank manager will stop whole procedure. However this fingerprint scan
and IRIS scan at initial stage will consumetime, as customer will have to follow all this
procedure.
7

Fig.2.8.Fingerprint scan
8

3. PROPOSED SYSTEM

Here we are implementing a locker security system by using RFID and GSM technology.
RFID is a wireless technology of identifying objects with the help of radio waves. Main
components of RFID are RFID tag, RFID reader, and antenna. RFID tag consists of
information of locker holder. This tag has two main components antenna ,Integrated
circuit. In order to transmit and receive information to controller RFID reader is used.
Thus RFID reader is middle man between tag and controlling unit of locker system and
hence it also consists of antenna, RS232 cable and related circuitry. Locker account
holder will have RFID tag which will contain information about bank locker holder like
his name, locker number and like information. Whenever user has to access locker, he has
to first swipe RFID tag
If the tag is valid then user has to enter password through keypad. If the entered
password is correct then locker will be opened. If the entered password is wrong then
buzzer will be on indicating in authenticate user is accessing the locker. All these
activities are informed to user with the help of message through GSM technology. GSM
is a second generation digital cellular mobile system used to send text messages, calling.
GSM is also integrated to microcontroller to send message of activities. Thus here a
simple and convenient two level security is used to protect bank locker security, first
using RFID tag and other through password. As only two technologies are used it is
available to users at affordable price. Also because of simple circuitry there is less
maintenance. Besides this there are some limitations like user has to remember password
also there might be time delay in delivery of message due to poor network.
3.1 GSM and RFID Technology
The GSM (Global System for Mobile Communications) technology, which is a
cellular communication network standard, is frequently utilized by mobile phones and
other handheld devices. The fundamental operations of GSM technology require the
following actions:
Establishing a Connection: When a cell phone is powered on, it sends a signal to the
nearby base station in order to establish a connection. The base station validates the
request and subsequently sends the data back to the mobile phone to verify the
connection.

9
Authentication: After establishing a connection, the mobile device asks the network for
authentication. The network sends a challenge to the mobile device in order to encrypt a
secret code stored on the SIM (Subscriber Identity Module) card.
The code is encrypted on the mobile device and sent back to the network for verification.
If the code is accurate, the network verifies the mobile phone and assigns it a temporary
identity number, or TMSI.
Call setup: The mobile phone can now make and receive calls using the assigned TMSI.
Every time a call is made, the mobile phone sends a request to the network to connect to
the recipient's phone number.
The calling process: The call is routed to the nearest base station by the network after
finding the recipient's phone number. The base station sends a signal to the recipient's
phone to establish a connection.
Termination of a call: When the call is over, the mobile device signals the network to cut
off the connection.
GSM technology uses frequency division multiplexing (FDM) and time division
multiplexing (TDM) to send and receive signals. TDM produces time slots from the
available bandwidth and assigns a unique user to each one. When utilizing FDM to
segment the available frequency spectrum into various channels, each channel is assigned
to a different user. In the same frequency spectrum, many users can cohabit without
interfering with one another because to this.
GSM technology also makes use of a number of security measures to protect network and
mobile phone communication. These include encryption, authentication, and
authorization methods to guarantee that only authorized users can access the network and
communicate safely.
Fig.3.1 Working of GSM Network
RFID: Radio waves are used in RFID (Radio Frequency Identification) technology, a sort
of wireless communication technology, to identify and track persons or items.
10
The three steps that make up the basic operation of RFID technology are tag activation,
data transmission, and data receiving.
Tag activation: When an RFID reader sends a radio signal to an RFID tag, the antenna on
the tag activates. The tag's antenna then signals to the reader that it is prepared to
communicate by sending a signal back.
Data transmission: When the tag becomes operational, it communicates information to the
reader via radio waves. The tag has the capability to carry out data, including data
pertaining to its specific ID, setting, and status.
Active, semi-active, and passive RFID tags are all accessible. Since passive RFID tags
remain battery-less, they must rely on the scanner's power to transmit data. Active RFID
tags have a unique power supply and can transmit data over farther distances. Semi-
passive RFID tags have their own power supply for some activities but rely on the reader
for communication.
Data reception: The data sent by the tag is ingested and analyzed by the RFID reader. The
reader can then utilise this information for a variety of purposes, including managing
assets, monitoring access control, and keeping track of inventory.
Asset tracking, supply chain management, access control, and inventory management are
a few uses for RFID technology. Additionally, it can be combined with other
technologies, including sensors and GPS, to provide real- time tracking and object or
person observation.
Generally speaking, RFID technology provides a useful and efficient way to identify and
follow people or things without direct physical touch or line of sight. Due to its ability to
function in difficult circumstances and provide real-time data, it is a useful tool in
many industries.

3.2 Experimental methodology


The proposed Bank locker security system implementation starts from RFID
authentication, continuing with the password matching and fingerprint authorization.
Initially, the user is provided with an RFID Tag at the time of acquiring the bank locker.
The Tag is a unique authorization key and thus cannot be replaced. Each Tag consists of a
serial number that is pre-programmed.

11

Fig.3.2 Experimental setup


Further, if the Tag matches the serial number in the program when scanned, the next
process is executed. Otherwise, the owner of the locker is notified via the GSM module
using SMS validation.
Once the RFID authentication is completed, the second step is the keypad password
matching. The user enters the password that was initially set. The same password is also
programmed and once it is verified the next process begins. Again, if this step fails then
the user is notified with a message stating invalid authorization.
Finally, the last step involves fingerprint scanning. Once this biometric authentication is
completed the DC motor is activated and thus the user can access the bank locker.
It is important to note that all the three processes needs to be successfully completed in
order to access the secured locker. Even if a single authorization process does not take
place, then the user or the owner is notified with the message invalid operation.
12

4.BLOCK DIAGRAM

Fig.4.1 Block diagram of Bank Locker System

The block diagram of Bank locker system based on RFID and GSM technology is shown
in the figure3. It comprises the power supply section, keyboard, RFID Reader, AT89C51
microcontroller, MAX232driver, relay driver and GSM modem, LCD. The GSM board
has a valid SIM card with sufficient recharge amount to make outgoing calls. The circuit
is powered by regulated +5v dc.

4.1 Circuit Description


The power supply section is the important for any electronics circuits. To derive the
power supply, the 230V, 50Hz AC mains is stepped down by transformer X1 to deliver a
secondary output of 12V, 500 mA. The transformer output is rectified by a full-wave
rectifier comprising diodes D1 through D4, filtered by capacitor C1 and regulated by ICs
7812 (IC2) and 7805 (IC3).

13
Capacitor C2 bypasses the ripples present in the regulated supply. LED1 acts as the
power indicator and R1 limits the current through LED1.The power supply section is
shown in the figure

Fig.4.1Power Supply

4.2 Circuit Diagram


Fig.4.2 circuit of the Bank locker system based on RFID and GSM technology

14
The compact circuitry is built around Atmel AT89C52 microcontroller. The AT89C52 is
a low-power; high performance CMOS 8-bit microcomputer with 8 kB of Flash
programmable and erasable read only memory (PEROM). It has 256 bytes of RAM, 32
input/output (I/O) lines, three 16-bit timers/ counters, a six-vector two level interrupt
architecture, a full-duplex serial port, an on chip oscillator and clock circuitry. The system
clock also plays a significant role in operation of the microcontroller. An 11.0592MHz
quartz crystal connected to pins 18 and 19 provides basic clock to the microcontroller.
Power-on reset is provided by the combination of electrolytic capacitor C3 and resistor
R1. Port pins P2.0 through P2.7 of the microcontroller are connected to data port pins D0
through D7 of the LCD, respectively. Port pins P3.7 and P3.6 of the microcontroller are
connected to register-select (RS) and enable (E) pins of the LCD, respectively. Read/write
R/W pin of the LCD is grounded to enable for write operation. All the data is sent to the
LCD in ASCII format for display. Only the commands are sent in hex form. Register-
select (RS) signal is used to distinguish between data (RS=1) and command (RS=0).
Preset RV1 is used to control the contrast of the LCD. Resistor 10k limits the current
through the backlight of the LCD. Port pins P3.0 (RXD) and P3.1 (TXD) of the
microcontroller are used to interface with the RFID reader through Max232(1) and GSM
Modem are used to interface through Max232(2). When an allowed person having the tag
enters the RF field generated by the RFID reader, RF signal is generated by the RFID
reader to transmit energy to the tag and retrieve data from the tag. Then the RFID reader
communicates through RXD and TXD pins of the microcontroller for further processing.
Thus on identifying the authorized person, the authorized person enters the password
through keyboard and send to the microcontroller. If the password is correct then the
microcontroller send the SMS to the account holder person, account holder again send the
password through SMS to the microcontroller. The microcontroller verifies the password
and received password through GSM mobile. If this password is correct, the
microcontroller provides high signal to port pin P3.2, transistor Q2 drives into saturation,
and relay RL1 energizes to open the bank locker. Simultaneously, the LCD shows “access
granted” message and send to and port pin P1.7 drives piezo buzzer PZ1 via transistor T1
for aural indication. If the password is not valid, the LCD shows “access denied” and the
bank locker doesn’t open.

15

5.SOFTWARE AND HARDWARE ARE USED

5.1 Software Program Testing


The software program is written in c or assembly language and compiled using keil
software. After compiler operation the hex code is generated and stored in the computer.
The hex code of the program is burnt into the AT89C51 by using Top win Universal
programmer.

5.2 Hardware Assembling and Testing


First step, we need to make single side PCB layout of the Bank locker system based on
RFID and GSM technology for testing the circuit, proceed as follow
1.After assembling all the components on the PCB ,connect TX and RX pins of the GSM
modem to pins 13 and 14 of MAX 232 and RFID Reader, respectively and insert a valid
SIM in the card holder of the GSM modem.
2. Connect ground pins of the GSM modem and RFID to the ground rail of the circuit .
3.This projects are implemented and tested successfully by us.
4. This system is very useful for bank locker, office, homes to keep the money safely.

16

6.RESULTS AND DISCUSSION

The code written in keil software in C language is an integration of all the


components, i.e., RFID, GSM, Fingerprint, keypad, and IR sensor. This integrated code is
dumped into the ARM processor LPC 2148. Once this process is completed, we can
observe the step-by-step output. The RFID Tag is scanned against the sensor and if the
users Tag serial number matches with the serial numbers available in the data base then it
is known that the user is authorized.
Fig.6.1 RFID Scanner Output

Password entering is the second step in the authentication process. After the RFID
scanning is successfully completed the system asks the user to enter the password set in
the beginning.

Fig.6.2 Password Entry


17
The third step in authentication is fingerprint scanning. After the password is successfully
verified the system asks the user to place their registered fingerprint to the sensor

Fig.6.3 GSM Output

GSM Module is used to send a notification to the owner when the locker is being
accessed in an unauthenticated manner. If any of the above steps fail then the notification
is sent via the SMS to the user’s registered phone number.
18

7.CONCLUSION

Thus, by implementing this Smart Bank locker security system project


using RFID, Fingerprint, password and GSM technology safety of every important
material stored at bank locker can be guaranteed. Using this smart technology only an
authorized person can open the lock and collect his belongings. This is a real time
application which tells that there is a need to bring in a revolution in the bank locker
security system by making the procedure a little easy and more systematic for the bank
officials. This is a low-cost equipment, low in power consumption, compact in size, wide
operating range, highly secured and reliable stand-alone unique system. The model
proposed in this paper combines various sensors together that otherwise has not been
implemented previously. It can be further enhanced by using an IoT based system and
other biometric sensors. In addition to this the future scope of this project is to develop
smart bank Locker security system based on “Digital Signature”, “IRIS and Retina”
Scanning for visual identification of the person.

In this report , we have first reviewed the recently proposed locker key for
banking though they are secured there are some disadvantages .It may provide wrong
person access the account. So in our project we are implementing sensors vibration,
temperature sensor on the door side for security purpose. Two level of authentication
password is needed to provide high security. RFID tag is provided for authentication of
user id. The camera is installed to capture the face of user and the face recognition is done
to recognize the user face. If the thief accesses the bank locker an immediate door lock is
applied and message is intimated to bank manager. This system is secure and less cost it
will be a best banking system. Timer is on for accessing the bank locker it’s locked
automatically while the user exceeds the time as well as message notification also
intimated to the manager

19

8.ADVANTAGES AND DISADVANTAGES

ADVANTAGES
 Provide high security.
 No question arise to hack or crack system.
 No need to remember username.
 Easy to use
 Fully automatic System.
 Dual layer security with fingerprint and password

DISADVANTAGES

 As network signals are not available ,then locker maynot be opened


 Only one biometric fingerprint authentication is used
 It is time consuming at initial stage
 It requires huge datasets
20

9.REFERENCES

[1] H. S. Detroja, P. J. Vasoya, D. D. Kotadiya and C. B. Bambhroliya, “GSM Based


Bank Locker Security System using RFID, Password and Fingerprint Technology”,
International Journal for Innovative Research in Science and Technology, Vol. 2, Issue
11, (2016), pp. 110-115.
[2] S. Mohammed and A. H. Alkeelani, “Locker Security System Using Keypad and
RFID”, The 2nd international conference of Computer Science and Renewable Energies,
(2019), doi: 10.1109/ICCSRE.2019.8807588.
[3] S. Sridharan, "Authenticated secure bio-metric based access to the bank safety
lockers," International Conference on Information Communication and Embedded
Systems (ICICES2014), 2014, pp. 1-7, doi: 10.1109/ICICES.2014.7034063.
[4] A. Faraz Hussain et al., "Zigbee and GSM Based Security System for Business
Places," 2021 International Conference on Advance Computing and Innovative
Technologies in Engineering (ICACITE), 2021, pp. 264-267,
doi:10.1109/ICACITE51222.2021.9404577.
[5] A.Chikara, P.Choudekar, D.Asija, “Smart Bank Locker Using Fingerprint Scanning
and Image Processing”, 6th International Conference on Advanced Computing &
Communication Systems (ICACCS), 2020, doi:10.1109/ICACCS48705.2020.9074482
[6] A.Kumar, P.Sood, U.Gupta, “Internet of Things (IoT) for Bank Locker Security
System”, 6th International Conference on Signal Processing and Communication (ICSC),
2020, doi:10.1109/ICSC48311.2020.9182713

21

You might also like