CIPHER VERIFY - Centralized Interface For Personnel Handling and Entry Regi - 20240825 - 191226 - 0000

Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

CIPHER-VERIFY: Centralized Interface for Personnel Handling and Entry Registration with Fingerprint

Verification and Identification

Proponents: Arriesgado, Paolo,

ABSTRACT

Burglary poses a significant threat to property and personal safety, with traditional security measures
often proving inadequate in deterring or preventing such crimes. This study aims to assess the effectiveness of
CIPHER-VERIFY, a state-of-the-art security system designed to enhance safety by regulating access,
ensuring convenience, and providing comprehensive monitoring of entries and exits. The evaluation
includes the use of fingerprint sensor to capture the user’s physical features while implementing a security
system containing door locking system using RFID which can activate, authenticate and validate the user
and unlock the door in real time for secure access to provide real-time alerts through a GSM module. Once
the system detects that an unauthorized person is trying to access the door it will immediately send a SMS.
By integrating our prototype into homes, it would significantly elevate the standards of safety, privacy,
and security, creating a fortified environment that deters unauthorized access and ensures peace of mind
for residents. Its deployment would address the critical need for robust security measures in residential
areas, effectively solving the problem of vulnerability to intrusions and privacy breaches.

Keywords: Door Locking System, Fingerprint Identification, SMS sender, and RFID technology

INTRODUCTION

Keys are vulnerable and easily stolen and that has become the most common causes of burglary. Despite
the fact that keyed locks have been used since the beginning of history, there is a high risk that the keys are
lost, misplaced or are given in the wrong hands. (Chathuri P. & Budditha H, 2022). Thus, the invention of
biometrics is a method of recognizing individuals based on physiological or behavioral features. Usually,
fingerprints are considered the best and fastest method for biometric identification since they are secure to
use and unique for every person. (Md. Mijanur Rahman, 2020). According to Hasan, Yordan, et al. (2020)
Radio Frequency Identification is an identification method by using transponder to save and take the long
distance data. Label or RFID card is a thing can be installed to the product, animal or even human with
the intention of identification by using the radio frequency transmission, 125kHz, 13.65MHz or 800-
900MHz. RFID uses radio waves communication to identify the objects or people uniquely.

According to the Philippine National Police (PNP), in 2018, burglary rate for Philippines was 15.3 cases
per 100,000 population. Though Philippines burglary rate fluctuated substantially in recent years, it tended
to increase through 2003 - 2018.

Cipher-Verify is an innovative security system that combines fingerprint scanning and RFID technology
to enhance the safety and convenience of property access control. The purpose of this research is to assess
the usability and convenience of this technology for users and to establish whether it is a viable
replacement to standard locking system based on physical keys. It is specifically aiming to improve and
protect the safety, privacy, and security of the user's private property with the use of fingerprint scanning
and Radio Frequency Identification (RFID). This would focus on evaluating the usability and
performance of the system under different scenarios, such as multiple users, different lighting conditions
and varying environmental factors.

Cipher-Verify’s impact in real-world settings would be to provide enhanced security and user convenience
by allowing safe, keyless access to buildings or rooms, directly addressing common issues of lost keys and
unauthorized access with its advanced biometric and RFID technologies.

METHODS

MATERIALS
Components: Automated Door Locking System includes these basic components mentioned: Arduino
UNO microcontroller, AS608 Finger Print Sensor, RC522 RFID Module, Servo Motor, LCD (Liquid
Crystal Displays), Buzzer, Powerbank, 12V USB cable adapter and Breadboard.

1.

2.

3.

4.

5.
6.

7.

8.

9.
10.

1. Arduino UNO - Arduino UNO is shown, it is a single-board based on the ATmega328P


microcontroller and has a variety of inputs and outputs to interface with external sensors, motors,
and other electronic devices. By using Arduino UNO, an automated door locking system can be
easily integrated with other hardware components, including sensors and motors, to create a complete
locking system that can be controlled by a microcontroller. Arduino UNO is programmed by using
Arduino IDE (an open-source Arduino software).
2. A fingerprint sensor is a device that is used to identify and authenticate individuals based on their
unique biometric features. In a door locking system, a fingerprint sensor is commonly used to provide
an additional layer of security. The fingerprint sensor is typically integrated into an electronic lock or
other access control system. When a person approaches the door, they place their fingerprint on the
sensor, which then scans and verifies the fingerprint against a database of authorized users. If the
fingerprint matches an authorized user, the lock will unlock, granting the person access to the door.
3. The purpose of a servo motor in a door locking system is to precisely control the movement of the
lock mechanism, allowing it to rotate to a specific angle to lock or unlock the door upon receiving the
appropriate signal.
4. An LCD (Liquid Crystal Display) is a type of display technology that is commonly used in door
locking systems to provide visual feedback to users. LCDs use liquid crystal materials to create images
and text on a display screen such as the status of the lock or any error messages. They can also be
used to provide menu options or other important information to users. LCDs are an important
component of door locking systems because they provide visual feedback to users, helping them to
navigate and interact with the system. They can also be customized to display a wide range of
information, making them a versatile and cost-effective choice for door locking systems.
5. A buzzer is a type of audio appliance that emits a continuous sound when power is applied. In door
locking systems, buzzers are commonly used to provide audible feedback to users. When a person
approaches a locked door, a buzzer can be used to signal that the door is locked and that the key or
access code is required to enter. Buzzers can also be used to provide error messages to users, such as if
the key or access code is entered incorrectly
6. Powerbanks are used to provide emergency power to the door locking system. They are typically
charged in advance and can provide power for a set amount of time, allowing the door to continue to
operate even if the main power source is disrupted.
7. The USB cable adapter is an important component of door locking systems because it provides an
easy and reliable method of transferring power and data between the door lock and other devices in
the system. It can also be used to provide emergency power to the door lock system, helping to ensure
that the system can continue to function even in the event of a power outage or other emergency.
8. The Breadboard serves as a convenient platform for prototyping and connecting electronic
components such as: buzzer, led, keypad and lcd display.
9. The RFID module in a door locking system serves to provide a convenient and secure method of
access control. It allows authorized individuals to unlock the door by presenting an RFID card or
tag, typically without the need for physical contact, enhancing security and ease of use compared to
traditional keys.

10. ESP32 camera module is a small, low-power device that can be used to capture and transmit
video images. It is equipped with a high-resolution camera sensor and a built-in image processor that
is capable of providing real-time video processing. The module can be used to capture and store
video clips on an SD card, or transmit video data over Wi-Fi or BLE (Bluetooth Low Energy) to a
nearby device.
Schematic Diagram

3D Model of CIPHER-VERIFY

Figures 2&3. Front and Back Model of CIPHER-VERIFY

Collection of Materials

In terms of gathering materials, almost all of the materials that the researchers used was purchased from
an online app since they are more affordable, wider selections, access to information and time-saving, but
before placing the orders they ensured that the shop is trusted, provides high quality materials and has a
lot of reviews. While the remaining items were purchased from a physical store, inspecting them first and
consulting with the employees to make sure they were compatible and high quality.
Programming
Figures 4-11. Cipher-Verify Arduino IDE Code
The Arduino IDE software has the required libraries installed for the fingerprint sensor (AS608), and
buzzer, and the necessary component is the adafruit lcd.h. Using jumper wires, the assembled parts are
linked to the Arduino UNO microcontroller following installation.

Using plywood for support and 2x2 wood for the door frame, the researchers built their own door.

In addition, the code is encrypted to verify whether the user's physical attributes were captured by the
fingerprint sensor. The RFID (Radio Frequency Identification) module functions by using radio waves to
communicate between the RFID reader and RFID tags/cards. When an authorized RFID tag/card is
brought near the RFID reader, it sends out a radio signal containing unique identification information.
The RFID reader then receives this signal, processes the information, and verifies whether the tag/card is
authorized to unlock the door. The buzzer will quickly sound to alert you to the presence of an
unauthorized individual attempting to access the closed area if it does not match the data saved. The servo
motor will rotate to unlock the door upon receiving the appropriate signal.

Furthermore, with the GSM module the robot will send a SMS alerting you that there is an attempt to
break in or when someone entered.

Testing of CIPHER-VERIFY

To assess accuracy of the fingerprint identification system, multiple fingerprints were registered, the
researchers placed their finger in the scanner. Once it matched the registered fingerprint, a text was
displayed in the LCD saying it was successful. The buzzer then created a sound indicating that the door is
opened. Similarly, the accuracy of the RFID technology was evaluated by measuring the success rate of
tag/card detection. After 3-5 attempts the system detects that an unauthorized individual is attempting to
break-in. Simultaneously, the GSM module initiated the process of sending a message to the designated
phone number saying that a person has entered or attempted to break-in.
Results

Fingerprint

Person No. of Trials Successful or Unsuccessful

1. Paolo 10 Successful

1. Al-Khaliq 10 Successful

1. Ashley 10 Successful

1. Random Person 5 Unsuccessful

Table 1.
RFID

Person No. of Trials Successful or Unsuccessful

1. Paolo 10 Successful

1. Al-Khaliq 10 Successful

1. Ashley 10 Successful

1. Random Person 5 Unsuccessful

Table 2.

Discussion

The results shows the effectiveness of biometric and RFID technologies for access control. The results
show a 100% success rate for authorized individuals across both technologies, which is a strong indicator
of their reliability. This contrasts sharply with the performance of a “Random Person,” who failed all
attempts, underscoring the security strength against unauthorized access.

The implications of these results are significant. For businesses and organizations, switching to these
technologies can mean a substantial upgrade in security measures. Unlike traditional locks, which are
vulnerable to picking or key duplication, biometric and RFID systems provide a non-transferable means
of access that is unique to each individual. This not only enhances security but also simplifies the process
of access control, eliminating the need for physical keys that can be lost or stolen.

Moreover, the efficiency of these systems can lead to smoother operations. Since access can be granted or
revoked digitally, it’s easier to manage personnel changes without the need to change locks or reissue keys.
This can result in cost savings and less administrative burden.

Conclusion

In conclusion, the door lock system utilizing biometric and RFID technologies is a superior alternative to
traditional locks. This system offers enhanced security, as evidenced by the inability of unauthorized
individuals to gain access, while maintaining ease of access for authorized users. Its application is
particularly well-suited for environments where security is paramount, such as in corporate offices,
government buildings, research labs, and even residential complexes. The adoption of this advanced door
lock system can lead to a significant reduction in security breaches, providing peace of mind for both the
management and the occupants. Furthermore, its keyless nature eliminates the vulnerabilities associated
with physical keys, such as duplication or loss. The system’s scalability and ease of management make it an
impactful solution for modern security challenges, paving the way for a safer and more secure future.

VI. Recommendation

To further enhance the research and expand knowledge about door locking systems it is recommended to
incorporate end-to-end encryption for secure data transmission and employ anomaly detection algorithms
to promptly identify and alert on unusual access attempts into the existing system using CIPHER-
VERIFY.

VII. Bibliography

Verma, G. K., & Tripathi, P. (2010). A digital security system with door lock system using RFID
technology. International Journal of Computer Applications, 5(11), 6-8.

Gayathri, M., Selvakumari, P., & Brindha, R. (2014). Fingerprint and GSM based security system.
International journal of engineering sciences & research technology, 1(3), 4024-7.

Al-Nabhi, Hashem. (2020). Enhanced Security Methods of Door Locking Based Fingerprint.
International Journal of Innovative Technology and Exploring Engineering.
9.10.35940/ijitee.B7855.019320.

Md Mostafizur Rahman Komol, amit Kumer Podder, Md Nesar Ali, Shariar Mohammed Ansary. (2018).
RFID and Finger Print Based Dual Security System: A Robust Secured Control to Access Through Door
Lock Operation. American Journal of Embedded Systems and Applications. Vol. 6, No.1, 2018, pp.15-22.
doi: 10.11648/j.ajesa.20180601.13.

Abdulhakeem Ishola, Abdullahi Abubakar, Zayyanu Umar, Musa Abubakar, Alkali Tanko, and Musa
Ibrahim Kamba. (2023). “Automated Security Door System Using Fingerprint as Authentication for
Access”. International Journal of Multidisciplinary Research and Publications. (IJMRAP), Volume 5,
Issue 9, pp. 118-129.

Hasan, Y., Wijanarko, Y., Muslimin, S., & Maulidda, R. (2020, April). The automatic door lock to
enhance security in RFID system. In Journal of Physics: Conference Series (Vol. 1500, No. 1, p. 012132).
IOP Publishing.

You might also like