Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Rakshit Najbile, Twinkle Rawalani, Vedant Panda, Pratyush Mishra, Dr. Prasanna Deshpande
DOI Link: https://doi.org/10.22214/ijraset.2023.49673
Certificate: View Certificate
People are more concerned about the safety of their valuables like jewelry, money, important documents, etc. which is why safe deposit boxes are the safest place to keep them. The advent of rapidly growing technologies enables users to operate high security systems with electronic identification options. In this work, a design of a multilayer security system is proposed. The safety concern parameters like user password, RF identification, and fingerprint recognition, use of one time password and a motion detection and alert system are in place. An email notification of the motion detection image near the safe may also be received by a user. Our system may be considered as a useful multi layered security anti-theft product.
I. INTRODUCTION
Digital revolution has significantly altered the life of mankind. Our lives are shaped and made easier by the constantly changing Landscape of modern technology and the innovation contained within it. Technology surely simplifies the details of our lives, it is equally crucial to uphold standards for safety and security.
The smart safe deposit boxes combine the best of both worlds' convenience and security, making them an interesting breakthrough for businesses, community centers, and multi-family housing situations in terms of convenience, security, safety, and effectiveness [1]. Smart lockers are becoming common all over the world [2].
The "modern and smart" security systems cost a fortune to set up, operate, and maintain due to the nature of software design, type of materials used, etc. However, they do cover other potential threats and function intelligently by incorporating other forms of alarms, particularly phone-based alarms for remote monitoring.
The evolution of safe deposit boxes starts with the invention of mechanical locks which are not highly secured due to forgery of keys. As technology improved, modern electronic locks emerged to prevent further unauthorized access and theft. One of the contemporary electronic locking systems that use a password as an authentication factor is the password-based locking system [2]. Next came the electronic lock system, which is an RFID-based system. The key components are RFID tags and readers, with the RFID value acting as an authentication factor [3].
Later, a cryptographic-based locking system was introduced that encrypted the original password to generate a new password. There are many other methods that work with the help of smart phones and networks, such as Wi-Fi , IOT and Near Field Communication (NFC) based lock systems [4].
Modern technology is now used to protect the locking system against OTPs. After that, further development of biometric locking systems such as face, fingerprint and voice has taken place [5]. Biometric systems have over time served as robust security mechanisms in various domains.
The earliest and most used biometric identification method is fingerprinting. Since over a century ago, law enforcement has used fingerprints to identify people. Personal authentication, such as gaining access to a computer, network, ATM, car, or home, is a much more widespread use of a fingerprint [6]. Electronic lock using fingerprint recognition system is a process of verifying the fingerprint image to open the electronic lock.
This project highlights the development of multiple layers of authentication where verification is completed by comparing the data of users by taking input from the user which will undergo the comparison process to compare with authorized data. Proposed system is implemented by utilizing two hardware which are authentication systems and an intruder System, where each hardware majorly contributes to make the system highly safe and secure.
II. METHODOLOGY
The Multilayer security System is designed using Arduino Nano Controller, RFID module(RC522), LCD module, Fingerprint sensor (R307), 3x4 Matrix Keyboard, Ultrasonic Sensor (HC-SR04), GSM module (SIM800-WB64) and Servo motor as shown in Figure 1.
A. Authentication System
System authentication is distributed in different layers which are covered below:
B. Intruder System
The system uses an ESP32-CAM camera module and an ultrasonic sensor for movement detection. The ESP32-CAM is a low-cost microcontroller that integrates Wi-Fi and Bluetooth connectivity, and has an onboard camera module that can capture images. As this system initializes it starts to detect for any Motion nearer the safe deposit system, it would be detected by using the ultrasonic sensor. In this system the threshold value has been set up to 50 cm and thus it continuously monitors the surroundings up to the safe deposit system. If some Motion is found nearer the safe deposit box and on incorrect password attempts the system will send an image to the designated email immediately shown in Figure 4.This allows the system owner to be alerted in real-time of any unauthorized access attempts and take appropriate action. The ESP32 MailClient library is used to send emails with the ESP32-CAM, which must be connected to the internet. With the help of this library, the ESP32 CAM can send and receive emails over SMTP, with or without attachments. For this project, sending an email with an attachment requires the use of SMTP. SMTP implies Simple Mail Transfer Protocol and it is an internet standard for e-mail transmission.
III. RESULTS AND CONCLUSION
The multi-layered anti-theft system was successfully implemented and tested in various scenarios to evaluate its performance. The following section provides a detailed analysis of the results and a discussion of the findings.
Password-based authentication remains one of the most commonly used security measures for digital systems and applications due to its simplicity and familiarity among users. We found that user education and awareness about password security best practices played a significant role in the effectiveness of password-based systems. Users who were educated about the importance of using unique and complex passwords and avoiding password reuse were more likely to choose strong passwords and maintain good password hygiene. In our study, we found that security questions were most effective when they were paired with a strong password policy that encouraged users to choose complex and unique passwords. This helped reduce the risk of brute-force attacks and guessing of security question answers, password authentication layer interface has shown in figure 4.
The performance of the RC522 RFID module-based authentication layer was effective in identifying and authenticating tags. The system was able to read tags accurately at distances of up to 10 cm, and the orientation of the tags did not significantly affect the performance of the system. The system has been tested against multiple RFID cards which gives significant performance, RFID Authentication layer interface has shown in figure 5.
The results of the study showed that the R307 fingerprint sensor-based authentication layer was effective in identifying and authenticating fingerprints. The system was able to enroll and recognize fingerprints accurately, with an average recognition time of less than 5-10 second; the fingerprint-based authentication component was tested by capturing and verifying a large number of fingerprints. The system achieved an good accuracy, which demonstrates its ability to accurately and reliably verify user identities using fingerprints. Fingerprint based authentication provides great stability and it is difficult to create fake identity based on biometric image which provides robustness to the system, Fingerprint Authentication layer interface has shown in figure 6.
The OTP-based security system using the SIM800-WB64 GSM module was effective in providing additional security. The system was able to generate and send OTPs accurately and quickly and send them to the user device via SMS. The user device was able to enter the OTP and send it back to the microcontroller for authentication, with an average authentication time of less than 5 seconds. The system was also able to detect and prevent phishing attacks, and replay attacks were ineffective due to the OTP's one-time use. The system was also able to operate reliably in different network environments, including areas with low signal strength. This Layer was tested by generating and verifying a large number of one-time passwords. The system achieved an good success rate, which indicates its ability to securely and efficiently verify user identities using OTPs, OTP Authentication layer interface has shown in figure 7(a) and figure 7(b).
The Intruder System which was effective in detecting intruders and sending alerts via email using ESP32 CAM and Ultrasonic sensor HC-SR04. The system was able to accurately detect unauthorized access by monitoring motion near the safe deposit boxes within the range of 50 cm and also detect incorrect password attempts which indication is sent by the controller to the ESP32 CAM . The system was able to send email alerts to the designated email address via an SMTP server, indicating the image of the user who is currently trying to access the system and it has been found that the system takes an average time of 5-10 sec to send the image.
Below table 1 we have tried to explain how effective our proposed solution is over existing solutions by comparing some parameters such as hardware Cost efficiency and Security layers.
Table 1. Comparative analysis:
Approach |
Cost efficiency |
Security Layers |
Our Approach |
|
Authentication system layers:
Intruder system layers:
|
“Bank Locker System” Internet of Things (IoT) [7] |
|
Authentication system layers:
Intruder system layers: 1. Alert notification (Sending message on authorized person mobile number) 2. Movement detection |
Six Tier Multipurpose Security Locker System Based on Arduino [8] |
|
Authentication system layers:
Intruder system layers:
|
Bank Locker Security with Fingerprint and Image Capture[9] |
|
Authentication system layers:
Intruder system layers:
|
The per hour power consumption of the whole system has been shown in the table 2. We have calculated the power consumption with the assumption of system is used 5 times in an hour.
Table 2. Installed modules power consumption:
Components |
Power consumption in A/h |
Arduino Nano |
25.5mA/s *60 sec*60min =91.8 A/h |
GSM module |
1mA/s *60 sec*60min =3.6 A/h |
RFID module |
20mA/s *60 sec*60min =72 A/h |
Fingerprint Sensor |
75mA/s *10 sec*5 times =3.75 A/h |
ESP32 camera |
20mA/s *60 sec*59 min +310mA*9 sec (Let’s assume image capture for 2 times which takes approximately 9 Sec ) =73.59 A/h |
LCD screen |
20mA/s *60 sec 60 min =72 A/h |
Keypad |
30 mA/s *60 sec*2 min =3.6 A/h |
Ultrasonic sensor |
15 mA/s *60 sec*60 min =54 A/h |
Servo motor |
2 A/s *5 Sec(5 sec on)*5 times = 50 A/h |
Total |
= 424A/h |
It is worth noting that the proposed system collectively provides more robustness in terms of security provided by the existing system by combining multiple layer Authentication System and Intruder System as well as the time consumption by the each layer to process is very less and the system accuracy which we get because of the dedicated module is really a great.
[1] Crystalynne D. Cortez, Jaswinder S. Badwal, Jocelyn R. Hipolito, Ditche Jane C. Astillero, Melvie S. Dela Cruz, and Jaira C. Inalao, “Development of Microcontroller-Based Biometric Locker System with Short Message Service”, Lecture Notes on Software Engineering, Vol. 4, No. 2, May 2016. [2] Rahman, Md M. and Ali, Mohammed S. and Akther, M. Shoaib, “Password protected electronic lock system for smart home security”, International Journal of Engineering Research and Technology,Vol 7,No. 4, pp. 541-544,2018. [3] R.Ramani, S. Selvaraju, S.Valarmathy, P.Niranjan, “Bank Locker Security System based on RFID and GSM Technology”, International Journal of Computer Applications, November 2012. [4] Vinay N. S. , Pruthviraj A. S., Karan S. S., Manu N. R., S. R. T., “Smart Locking and Unlocking System for ATM Trunk.” , International Journal of Research in Engineering, Science and Management Volume-1, Issue-12, December-2018. [5] S. Asha , C. Chellappan , “Biometrics: An Overview of the Technology, Issues and Applications”, International Journal of Computer Applications Volume 39– No.10, February 2012. [6] Aditya Sanskar, P.K.R Sastry, A.L Vishnu Ram, A.Vamsidhar , “Fingerprint Based Door Locking System”,International Journal Of Engineering And Computer Science, March 2015. [7] Prof Garande, Prachi Bharne, Mansi Shah, Tejal Joshi, and Siddhant Chaudhary, “Bank Locker System” Internet of Things (IoT),\" International Journal of Advanced Research in Science, Communication and Technology, vol. 2, no. 4, pp. 513-515, Apr. 2022. [8] A. Z. M. Tahmidul Kabir, Nirmol Deb Nath, Utshaw Rafin Akther, Fukrul Hasan, and Tawsif Ibne Alam, “Six Tier Multipurpose Security Locker System Based on Arduino,” 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT),pp. 1-5, 2019. [9] V. Hindumathi, M. Sushmitha, M.Yoshitha, R. Venkata Harika, A. Sri Vaishnavi, “Bank Locker Security with Fingerprint and Image Capture”, Journal of Electronic Design Engineering Volume 5 Issue 2,pp. 19-24, 2019.
Copyright © 2023 Rakshit Najbile, Twinkle Rawalani, Vedant Panda, Pratyush Mishra, Dr. Prasanna Deshpande. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET49673
Publish Date : 2023-03-20
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here