Development of a Microcontroller-Controlled Security Door System.



Similar documents
Access Control Using Smartcard And Passcode

Development of a Computer-Controlled Security Gate System.

Development of Low Cost Private Office Access Control System(OACS)

Development of a GSM based Control System for Electrical Appliances

Intelligent Home Automation and Security System

DESIGN OF SMS ENABLED CAR SECURITY SYSTEM

Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader

Understanding Mechatronics Engineering Using a School Project

An Introduction to MPLAB Integrated Development Environment

Development of Hybrid Radio Frequency Identification and Biometric Security Attendance System

Protected Cash Withdrawal in Atm Using Mobile Phone

MICROCONTROLLER BASED SMART HOME WITH SECURITY USING GSM TECHNOLOGY

Home Security System Using Gsm Modem

Automated Biometric Voice-Based Access Control in Automatic Teller Machine (ATM)

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy

Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

Programming PIC Microcontrollers in PicBasic Pro Lesson 1 Cornerstone Electronics Technology and Robotics II

Biometrics in Physical Access Control Issues, Status and Trends White Paper

EMBEDDED GSM MONITOR AND CONTROL USING ANDROID APPLICATION

International Journal of Engineering Research & Management Technology

Design and Development of SMS Based Wireless Home Appliance Control and Security System

Design and Development of SMS Based Wireless Home Appliance Control and Security System

Microcontroller Based Anti-theft Security System Using GSM Networks with Text Message as Feedback

Design of Wireless Home automation and security system using PIC Microcontroller

DEVELOPMENT OF HOME SECURITY SYSTEM USING GSM MODULE

DEVELOPMENT OF ANTI-THEFT DOOR SYSTEM FOR SECURITY ROOM

A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION

Automated Profile Vehicle Using GSM Modem, GPS and Media Processor DM642

TX GSM SMS Auto-dial Alarm System. Installation and User Manual

Accident Notification System by using Two Modems GSM and GPS

Sensors Collecting Manufacturing Process Data

Research Article. ISSN (Print) *Corresponding author Nathan David

NATIONAL SUN YAT-SEN UNIVERSITY

ANDROID LEVERED DATA MONITORING ROBOT

Design and Implementation of an Accidental Fall Detection System for Elderly

ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY

Wireless Security Camera

Computer Organization and Components

Automated Security System using ZigBee

solutions Biometrics integration

Application of Tracking Technology to Access-control System

FACTORY AUTOMATION INTELLIGENT CLAMP MONITORING FOR MACHINE TOOL SPINDLES WITH INDUCTIVE POSITIONING SYSTEMS

Implementation of Knock Based Security System

ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

Fingerprint Based Biometric Attendance System

Invisible EYE for Security System

Smart Home Security System Based on Microcontroller Using Internet and Android Smartphone

Original Research Articles

Advanced Car Security System Using GSM

Review of RFID & GSM Based Automatic Ration Distribution System

Wireless Home Security Alarm System AM 500

A DESIGN OF DSPIC BASED SIGNAL MONITORING AND PROCESSING SYSTEM

Intelligent GSM Auto-Dial Alarm System

GTR-128/GTR-129 Motorcycle/ Vehicle Tracker Quick Start Guide

E-TRACKING SYSETEM FOR MUNICIPAL SOLID WASTE MANAGEMENT USING RFID TECHNOLOGY

WITURA CORPORATION SDN BHD

Construction and Application of a Computer Based Interface Card

BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEM EURO ALARM WIRELESS BURGLAR ALARM SYSTEM OASIS

FINGERPRINT BASED STUDENT ATTENDANCE SYSTEM WITH SMS ALERT TO PARENTS

Shunt lock function 3066

Digital Systems Based on Principles and Applications of Electrical Engineering/Rizzoni (McGraw Hill

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 3, May 2013

HAI Access Control. The HAI Access Control Card Reader can be used for:

Understanding Emergency Power Off (EPO)

This method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.

Framework for Biometric Enabled Unified Core Banking

Summer Project Report. Fingerprint Based Attendance System

ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK

DESIGN OF SMART HOME SECURITY SURVEILLANCE SYSTEM USING GSM

GSM Based Electrical Control System for Smart Home Application

Users Manual of GSM Home Alarm System with Photo-taken

EXPERIMENT 2 TRAFFIC LIGHT CONTROL SYSTEM FOR AN INTERSECTION USING S7-300 PLC

ABOUT ZIGBEE CIRCUIT DIAGRAM FOR RESEARCH

Cell Phone Based Liquid Inventory Management Using Wireless System

Modern Multipupose Security And Power Management System

T-BOXN12R. First steps with T-BOXN12R. You can make it wireless. Date: Version 1.0

REMOTE CONTROL AND MONITORING OF AN INDUCTION MOTOR

Study Guide for the Electronics Technician Pre-Employment Examination

Development of Academic Attendence Monitoring System Using Fingerprint Identification

Tutorial for MPLAB Starter Kit for PIC18F

AUTOMATIC NIGHT LAMP WITH MORNING ALARM USING MICROPROCESSOR

Smart Queue Management System Using GSM Technology

Hotel System Management The Hotel Smartest Solution

Business/ Home GSM Alarm System

BUILDING SECURITY & ACCESS CONTROL

COPYRIGHT RESERVED TEAM MYSTERIOUS MANIACS HOME AUTOMATION via BLUETOOTH (Using ANDROID PLATFORM)

1. INTRODUCTION. Keywords SMS, GSM network, electrical device, encryption, control.

11A. CORPORATE INFRASTRUCTURE

Real-Time Application Surveillance Security System Based on LabVIEW

22 nd NISS Conference

GSM AUTO DIALER. Remote Monitoring & Control using your mobile phone.

Real Time Vehicle Theft Identity and Control System Based on ARM 9

Remote PLC system using GSM network with application to home security system

STEPPER MOTOR SPEED AND POSITION CONTROL

Business/Home GSM Alarm System. Installation and User Manual

User Manual Software for DSL Digital Speed Switch

HIGH SECURED VEHICLE WITH INTERIOR VENTILATION CONTROL AND PERIMETER MONITORING SYSTEM

Lecture 1. Introduction to Embedded Computer Systems

ANDROID BASED SECURITY AND HOME AUTOMATION SYSTEM

DESIGN AND IMPLEMENTATION OF LOW COST HOME SECURITY SYSTEM USING PIC MICROCONTROLLER ANDGSM NETWORK

Transcription:

Development of a Microcontroller-Controlled Security Door System. A.O. Oke 1, O.M. Olaniyi 2*, O.T. Arulogun 1, and O.M. Olaniyan 2 1 Department of Computer Sciences and Engineering, Ladoke Akintola University of Technology, Ogbomoso, Nigeria. 2 Department of Electronic and Electrical Engineering, College of Engineering, Bells University of Technology, Ota, Ogun-State, Nigeria. * E-mail: olaniyimikail@bellsuniversity.org engrolaniyi09@yahoo.com ABSTRACT Over the years, several security measures have been employed to combat the menace of insecurity of lives and property. This is done by preventing unauthorized entrance into buildings through entrance doors using conventional and electronic locks, discrete access code, and biometric methods such as the finger prints, thumb prints, the iris and facial recognition. In this paper, a prototyped door security system is designed to allow a privileged user to access a secure keyless door where valid smart card authentication guarantees an entry. The model consists of hardware module and software which provides a functionality to allow the door to be controlled through the authentication of smart card by the microcontroller unit. (Keywords: access control, security, card reader, smart card, computer control) INTRODUCTION Security over the years has been a source of concern to organizations and companies. This has caused quite a significant amount of capital being budgeted for improvements on security systems, simply because it has been discovered that the access control system mechanism is an important part of an organisation. One of the important security systems in building security is door access control. The door access control is a physical security that assures the security of a building by limiting access to the building to specific people and by keeping records of such entries [3]. Most doors are controlled manually especially by security personel employed by the organisation, through the use of handles and locks with key to operate the locks. Examples are banks, hotels, motels and so on; some are controlled by switches while others are controlled by the biometrics technique. The idea of this technique is to enable automatic verification of identity by computer assessment of one or more behavioral and/or physiological characteristics of a person. Recently, biometric methods used for personal authentication utilize such features as the face, the voice, the hand shape, the finger print, and the iris patterns of an individual [4, 5,7]. Each method has its own advantages and disadvantages based on their usability and security [6, 9]. In [1] two distinct technologies in Artificial Intelligence are outlined: Artificial Neural Networks and Facial Recognition were used to develop a security door system where authorization of facial appearance of privilege users in the database is the only guarantee for entrance. In the system, the personal computer processes the face recognized by the system digital camera and compares data with privileged users in the database. The control program either sends a control signal to open the electromechanical door upon facial existence or deny entry. Also in [3], an intelligent voice-based door access control system for building security was proposed. The proposed intelligent voice-based access control system is a performance biometric which offers an ability to provide positive verification of identity from an individual's voice characteristics to access secure locations (e.g. office, laboratory, home). In the system Perceptual Linear Prediction (PLP) coefficients features are extracted from the person voice data and then an Adaptive Network-based Fuzzy Inference Systems (ANFIS) is used to develop models of the authorized persons based on the feature extracted from the authorized person voices. The Pacific Journal of Science and Technology 398

Although, these proposed models provided a novel approach to door security systems, they are dependent on the control program written on computer system and provided access control using the parallel port. The PC s parallel port is affected by cross talk and significant reduction in performance in long distance parallel transmission. Besides, computer process control systems are generally affected by high initial costs and increased dependence on maintenance [2]. In other to overcome the problems of these PCbased door acesss security control systems, this paper presents prototyped low cost, low complexity door security system designed to allow a privileged user to access a secure keyless automated door where valid smart card authentication guarantees an entry. In the proposed system an automated door is controlled with a card reader and the card reader is controlled by a control program embedded in a microcontroller unit. Implementing the system with a microcontroller will be of great value, cheaper, portable and much benefit to organizations who consistently seek a better means of door access control for their firms. THE SYSTEM DESIGN The system consists of a hardware module and an application program for microcontroller unit developed in Mikrobasic programming language. The hardware module comprises three stages: The card reader, the door electromechanical relay interface, the microcontroller stage and the power supply unit. The control action is actually performed by the microcontroller. It processes the signals (requests) that are inputted from the card reader upon the insertion of the valid smart card at the entrance. The output section of the microcontroller is connected via relays for the desired operational actions. The stages involved in this design are shown in the Figure 1. The Card Reader: A card is a small piece of plastic that holds information in a magnetic strip or microprocessor used in activities such as getting cash from the Automated Teller Machines (ATM) or making phone calls (i.e. SIM) or opening and closing of a microcontrolled based door. Based on highly optimised construction, the card readers are very compact with a discreet and cost effective design. The readers are usually made with durable plastic to withstand harsh environments. The microcontrolled door card reader is usually equipped with a two waysupervised and secured communication, for the person to gain entrance through the door and for him to exit through same door when inside.the term used to describe this is card-in and card-out. The two-way communication between a card reader and the microcontroller is usually monitored. The Card In reader is located outside and used to enter into a building. If there are multiple doors in the room for one to gain entrance, the Card In database is incremented for all the doors in the room. Such a database list is technically known as a Muster list. The card out reader is located inside the building and used when exiting a building. In the case of multiple exit doors in a room, the card out database is incremented for all the doors in the room.the card acess system is configured to generate a list of people that have Carded In to enter the building. Upon entrance, user s name stays on the muster list until the user Carded Out when leaving the building. Figure 2 is a schematic diagram of the basic principle involved. In the proposed system,the card reader is a slot where the card will be inserted by the user. On insertion of the card into the card reader, the card reader decodes the information in the card by conducting current from one end of the card to another. The decoded signal is send to the microcontroller unit which works according to its program code specification. Microcontroller PIC16F84A: The system is designed around PIC16f84A microcontroller. The PIC16f84A is used because it is readily available and is relatively simple to understand. The PIC implements the software based control and commands the electromechanical interface circuit to open and/or close the door. The PORT (RB6, RB7) of the PIC was designed to send the output control signals to the door circuit through the relay switch of the electromechanical interface circuit and the PORT A (RA0 and RA1) is configured as analog input to receive voltage values that specify the state of denial and acceptance of entrance parameter form the card reader. These parameter controls produces voltage which is reduced to a maximum of 5V s. The Pacific Journal of Science and Technology 399

DC POWER SECTION (AC TO DC) DC CARD READER THE MICROCONTROLLER DOOR ELECRTOMECHA NICAL SYSTEM The Card Reader RA 0 PIC16f84A RB6 RB7 Electromechanical Interface RA1 Door System Figure 1: The Functional Block Diagram of the System. NAME ON THE MUSTER LIST) MUSTER LIST JOY BEN...... CARD OUT (DELETE NAMES FROM THE MUSTER LIST ) Figure 2: Muster List Card Access Configuration. For example, if the card reader accepts valid card upon the decoding from the PIC, 5V is produced and 0V for an invalid card. The voltage is read through the PORT A of the PIC as analog input and is interpreted to mean high or low depending on the input. PORT A status is read, the status (1 or 0) determine if the electromechanical interface circuit is triggered or not (1 = YES, 0 = NO) [7, 11]. Electromechanical Door Interface Circuit: In the model, a simple 12v DC motor and Rack and Pinion motion transmission systems were used to provide translatory motion for the door to open and close upon the command of the The Pacific Journal of Science and Technology 400

microcontroller unit to the relay circuitry as shown in Figure 3. if PortA.2 = 1 then PortB.4 = 1 portb.5 = 1 delay_ms(2000) PortB.5 = 0 Delay_ms(5000) portb.6 = 1 delay_ms(5000) PortB.6 = 0 PortB.4 = 0 End if Goto Eloop End. on red light(busy) open door close door repeat Figure 3: The Interface Circuit. The relay circuit is responsible for performing the switching action that energizes the motion transmission systems to perform door translatory motion operations [8, 12]. The relay circuit transforms the electrical signal from the PIC into mechanical movement that performs a switching mechanism to allow the door to open or close. THE SYSTEM CONTROL PROGRAM The system control program can be accomplished using program written in either low level or high level language such as C, Java, mikrobasic. A compiler for a high level language helps to reduce production time. Although inline assembly is possible, the programming was done in the Mikrobasic language. The source code has been commented to facilitate any occasional future improvement and maintenance. The code written followed all the three steps of microcontroller program development that is, Compilation, Burning and Evaluation before it was transformed to the microcontroller through the programmer.a fraction code fragment for the system is given below : Program Autodoor Dim i as byte Main: TRISB = 0 TRISA = 0 PORTA =0 PORTB = 0 Eloop: PortB.2 = 1 on green light(ready) Delay_ms(1000) portb.2 = 0 THE SYSTEM OPERATION After the system is turned on, the door indicator s light emitting diode(led) come ON after some few seconds, indicating that the door is in the ready state. The colour for the ready state is yellow. The yellow LED continually blink to show that the card slot is ready to accept the card. The yellow colour also indicates that there is no card inserted into the card slot, hence a card can be inserted as shown in Figure 4. When a valid card is inserted into the card slot (the reader), the LED light changes from its yellow colour to the red colour. The red colour signifies the busy state of the door.the card reader only functions when the LED is in the ready state. The PIC16F84A decodes the name on the card and compares it with specific name on its memory.the privilege user gain entrance to a restricted application area by triggering the interface circuit. The interface circuit thererefore triggers the direct motor driven electromechanical door to slide from the left to the right, opening the door for five seconds. The door however closes after some few seconds. The number of seconds it takes the door to slide back is a function of how the microcontroller is programmed.the timing can be changed if need be by modification of the program code in the microcontroller. This is the competitive advantage of designing this proposed door access control system around PIC16f84A microcontroller unit. However, an intruder is denied an entry upon the insertion of an invalid card.the overall system design and system operation diagram are shown in Figure 5 below. The Pacific Journal of Science and Technology 401

Process Description 1. The Card Reader awaits the insertion of smart card by a privilege User 2. The smart card is decoded by the Reader using the PIC program memory 3. The PIC16f84A command the interface circuit to trigger the door 4.Interface circuit receives the signal and Normalize it 6. Normalized signal is forwarded to the electromechanically Interface Circuit 7. The DC Motor on the door makes use of the Normalized signal to either OPEN or SHUT the Door Connects the Card reader to Port A of the PIC RA 0 RB 7 Connects to the Port B of PIC Smart Card The Card Reader 6 5 4 RA 1 RB 6 PICI6F84A 3 2 Interface Circuit Electomechanical 7 Door M DC Motor Access Granted Decoded Name in The PIC Memory Privilege User Decoding section Software OR Application Section Electromechanical Section The Card reader accepts valid smart card from a privilege user The PIC compares the the information on the card with the coded instruction in the memory The Interface circuit responds to the control signal from PIC to allow or deny entry. Figure 4: The Overall System Design and System Operation Diagram. Figure 6:The Proposed Model. The Pacific Journal of Science and Technology 402

CONCLUSION This paper has successfully presented a functional, low cost and low complexity microcontroller based door access control system. The proposed security door system adopted a valid smart card to authenticate and/or deny entry to a room or building. A real-life equivalent of the prototype can be developed with minimal development costs and with relatively low operational costs for environment where high degrees of security are required like banks, military research areas, and big private investment companies. Embedded Systems (CHES2003), LNCS Volume 2779:137-151. 10. Hageman, S. 2008. PIC Development on a Shoestring. (Retrieved on May 24th,2009). http://www.sonic.net/~shageman. 11. Microchip Technology, Inc. 2009. PIC16F84A Data Sheet. (Retrieved May 30, 2009). http://ww1.microchip.com/downloads/en/devicedoc/ 39582b.pdf 12. Adoghe, A.U. and I.A. Odigwe Adoghe. 2008. Remote Monitor and Controller System for Power Generators. Pacific Journal of Science and Technology. 9(2):344-350. REFERENCES 1. Omidiora, O., M. Olaniyi, and A.A. Ipadeola. 2008. Development of Security System Using Facial Recognition. Pacific Journal of Science and Technology. 9(2):377-386. 2. Arulogun, O.T., E.O. Omidiora, and A.O. Owoseni. 2006. Development of a PC Based Household Electricity Management System. International Journal of Electrical and Telecommunication Systems Research. 1(1):12-18. SUGGESTED CITATION Oke, A.O., O.M. Olaniyi, O.T. Arulogun, and O.M. Olaniyan. 2009. Development of a Microcontroller-Controlled Security Door System. Pacific Journal of Science and Technology. 10(2):398-403. Pacific Journal of Science and Technology 3. Winda, W.O. and Mohammed, S. 2007. Intelligent Voice-Based Door Access Control System Using Adaptive-Network-Based Fuzzy Inference Systems for Building Security. Journal of Computer Science. 3(5): 274-280. 4. Kung, S.Y., M.W. Mak, and S.H. Lin. 2004. Biometric Authentication: Machine Learning Approach. Prentice Hall: Englewood, NJ. 5. Osadciw, L., P. Varshney, and K. Veeramachaneni. 2002. Improving Personal Identification Accuracy Using Multi sensor Fusion for Building Access Control Application. In: Proceedings the Fifth International Conference for Information Fusion. 1176-1183. 6. Zhang, D.D. 2000. Automated Biometrics: Technologies and Systems. Kluwer Academic, Prentice Hall: Englewood, NJ. 7. ADSL. 2009. All Data Sheet Library. (Retrieved March 21, 2009). http://www.alldatasheet.com. 8. Wikipedia. 2009. Relay. (Retrieved on March 21, 2009). http://www.en.wikipedia.org. 9. Fournier, J., H. Li, S.W. Moore, R.D. Mullins, and G.S. Taylor. 2003. Security Evaluation of Asynchronous Circuits. In: Proceedings of Workshop on Cryptographic Hardware and The Pacific Journal of Science and Technology 403