0% found this document useful (0 votes)
4 views6 pages

Detailed Research Proposal

The Three Layer Authentication System project aims to enhance security by integrating passcode, RFID, and fingerprint scanning for access control in sensitive areas. It operates in sequential layers, providing a robust solution against unauthorized access while ensuring a seamless user experience. The system is designed for scalability and flexibility, making it suitable for various high-security environments such as banks, offices, and smart homes.

Uploaded by

Rohan Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views6 pages

Detailed Research Proposal

The Three Layer Authentication System project aims to enhance security by integrating passcode, RFID, and fingerprint scanning for access control in sensitive areas. It operates in sequential layers, providing a robust solution against unauthorized access while ensuring a seamless user experience. The system is designed for scalability and flexibility, making it suitable for various high-security environments such as banks, offices, and smart homes.

Uploaded by

Rohan Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

DETAILED RESEARCH PROPOSAL

Title of the project: Three Layer Authentication System

Objective:

In today’s world, safeguarding sensitive areas from unauthorized access has become more
important than ever. The Three-Layer Authentication System addresses this issue by offering a
robust solution that combines three different authentication mechanisms passcode, RFID, and
fingerprint scanning to ensure maximum protection. This system provides multiple layers of
security, making it significantly harder for unauthorized individuals to gain access, thereby
preventing breaches. The aim of this project is to enhance both convenience and security in
places where high-level authentication is necessary, such as in smart homes, offices, banks, and
other restricted areas. It provides a seamless and reliable user experience, ensuring that only
authorized personnel can pass through the secured areas. The system is designed to cater to both
new users, who must enroll, and returning users, who can easily authenticate and access the
system, with minimal risk of errors or false entries.

Actual plan of work:

In response to the rising demand for stronger security systems, the Three-Layer Security System
combines three separate authentication methods to create a highly secure environment. The
system operates in sequential layers: the first requires users to input a passcode, the second
involves scanning an RFID card, and the third completes authentication using fingerprint
recognition. Each layer adds an additional level of protection, making the system resistant to
hacking, cloning, or brute-force attacks.

The project will focus on integrating each of these authentication methods into a unified system,
using an ESP32 microcontroller to handle communication between components. The passcode
entry is handled by a keypad, RFID cards are scanned via an RFID module, and fingerprints are
authenticated with a fingerprint sensor. A 20x4 LCD screen will guide users through the process,
displaying instructions and responses from the system.

By implementing this Three-Layer Security System, high-security areas can reduce the chances
of unauthorized access and improve overall safety. The project is scalable and flexible, allowing
it to be adapted to different environments, including corporate offices, homes, laboratories, and
secure storage facilities.

Fig1: Block Diagram of Three-Layer Authentication System

In order to address the security challenges, the methodology adapted here


is detailed in Fig 1 illustrates the block diagram of the Three Layer
Authentication System, which provides a multi-layer security approach
for controlling access to a secured area.

The system allows authorized users to gain access to the lock through a
series of authentication steps using different security layers. These layers
include a hex keypad, RFID reader, and fingerprint sensor. In addition,
the system provides additional feedback and control mechanisms such as a
buzzer for audible alerts, OLED display for visual instructions, and the
GSM module for remote alerts.

Fig 2 shows the circuit diagram for the hardware system being developed
for our 3 Layer Authentication System. Figure 2 illustrates the detailed
pin connections of the different components used in our system, including
the keypad, RFID module, fingerprint sensor, GSM module, OLED display,
and solenoid lock. It also shows how these components are integrated with
the ESP microcontroller to control access via the multiple layers of
authentication, which include a passcode, RFID, and fingerprint
authentication.
Fig 2: Circuit Diagram of Three-Layer Authentication System

Table 1: List of components required in the project development

S. No. Sensors/modules/components
1. ESP 32

2. LCD (20x4)

3. Hex Key Pad

4. Finger Print Sensor

5. RFID Module

6. Voice module with speaker

7. Relay 12V/1A

8. Solenoid Lock

9. Buzzer 12V/1A

10. GSM Module

11. Active and passive components

The working methodology is as follows:

The proposed three-layer Authentication system operates on the


principle of multi-factor authentication. The process is as follows:

1. Password Authentication: The user enters their password on the


keypad. The keypad captures the input and sends it to the ESP32 for
verification.

2. RFID Authentication: If the password is correct, the system


prompts the user to scan their RFID card. The RFID reader captures the
card data and sends it to the ESP32 for verification.
3. Fingerprint Authentication: If the RFID card is valid, the system
prompts the user to scan their fingerprint. The fingerprint sensor
captures the fingerprint data and sends it to the ESP32 for
authentication.

4. OTP Verification: Upon successful fingerprint authentication, the


ESP32 generates an OTP and sends it to the user via email or SMS. The
user must enter this OTP to complete the authentication process.

5. Relay Activation: If the OTP is correct, the relay activates the door
lock mechanism, granting access. The buzzer sounds to provide
auditory confirmation, and the OLED display shows a success message.

6. Access Logging: The ESP32 logs the access data locally and
transmits it to Google Sheets over Wi-Fi. This allows for easy access and
analysis of access records from any location with internet access.

7. Unauthorized Access Notifications: If an unauthorized access


attempt is detected (e.g., multiple incorrect password entries), the
system sends an email or SMS notification to the administrator, alerting
them of the potential security breach.

Conclusion:

The Three Layer Authentication System project is an advanced security


solution that integrates multiple layers of authentication for enhanced safety.
It includes a passcode keypad, RFID reader, and fingerprint sensor to ensure
multi-factor authentication. The system operates in two modes: enrollment
mode (for new users) and access mode (for existing users). In the enrollment
phase, users register their passcode, RFID tag, and fingerprint. For access,
users must pass through each authentication layer sequentially, ensuring
high security. The system provides feedback via a 20x4 LCD display, with a
buzzer signaling successful or failed entries. A relay module controls a
solenoid lock, making the system ideal for applications requiring robust
access control. It demonstrates the effective integration of hardware and
software, utilizing an ESP32 microcontroller for real-time operations.

Issue:

The basic problems addressed by the three-layer security system include:

 Reducing the risk of security breaches by implementing a layered


approach that minimizes vulnerabilities in any single method.
 Ensuring only authenticated users can access secure areas or systems,
thus improving overall safety and access control.

Commercial Utility:

This system offers enhanced security for sensitive applications by requiring


multiple verification methods before granting access. It can be utilized in
commercial spaces like offices, labs, or data centers where safeguarding
confidential assets is crucial. It ensures that only authorized individuals can
access restricted areas or secure systems. Its modular design allows for
flexibility, making it suitable for high-security environments such as banks,
government facilities, or even smart homes looking to implement advanced
access control.

You might also like