Design and Implementation of A Fingerprint Based Lock System For Shared Access
Design and Implementation of A Fingerprint Based Lock System For Shared Access
ABSTRACT:
This paper presents an enhanced methodology in implementing and designing a security
system for door locking purpose based on fingerprint, GSM technology, monitoring camera,
alarm system and password system. This security system will provide enough security by
limiting unauthorized people access and taking a record of those who pass through it. Sometimes
unauthorized people or burglars try to break the door for evil intentions at a time when no one is
available at a targeted place, so this paper introduces some security solutions for that problem
and they are the main contribution of our paper. We introduce an alarm system to alert the people
at the surroundings, GSM module that’s used to send an SMS message to the registered user’s
(responsible person) and a web camera that’s used to take a video for a person who tries to break
the lock, password keypad that’s used after fingerprint sensing to provide extra security.
Definitely the registered users are the only persons who can access the lock, and the door closes
after five seconds from the opening time. The method used to implement this experiment
involves the use of a fingerprint scanner R305 that’s interfaced with Arduino microcontroller-
ATMEGA328P to control the locking and unlocking process of a door. During all the opening
and closing processes, the16x2 Liquid Crystal Display (LCD) displays some commands which
can be used to instruct the users like, place your finger on the sensor, the door is opened, the door
is closed, the message is sent, please enter the password etc. If an unregistered user tries to
access the door using their fingerprints, automatically his/her access is denied. The proposed
door lock security system is can be used at homes, offices, banks, hospitals, and in other
governmental and private sectors. Our proposed system was tested in real-time and has shown
competitive results compared to other projects using RFI and password.
Keywords: IOT, Gas, Air pollution, with cloud resistance.
Volume 10, Issue 12, Dec 2020 ISSN 2457 – 0362 Page 34
signature recognition, Biometric method sends signals to alarm circuitry to warn
requires the physical presence of the person about an unauthorised use.
to be identified. This emphasizes its
preference over the traditional method of 2. LITERATURE SURVEY
identifying what you have such as, the use of One more disadvantage of traditional lock is
password, a smartcard etc. Also, it that when homeowners lose the key and
potentially prevents unauthorized admittance have no alternative key, in this case, they
to access control systems or fraudulent use should wait for long hours for a technician
of ATMs, Time Attendance Systems, to come, otherwise they should break the
cellular phones, smart cards, desktop PCs, door. Another challenge or disadvantage is
Workstations, vehicles and computer that when the key is locked away or maybe
networks. Biometric recognition systems misplaced inside the house, in this case even
offer greater security and convenience than authorized persons won’t have access to
traditional methods of personal recognition. his/her property or belongings. This will
Fingerprint recognition represents the oldest issue can be solved with the help of
method of biometric identification which is technician again and may cost the authorized
dated back to 2200 BC. The use of [4]. In addition to providing access to the
fingerprints as a personal code has a long target building, personal belongings and
tradition and was already used. This system important documents at homes or offices can
focuses on the use of fingerprints for door be accessed depending on the lock system;
opening and closing. The fingerprint personal belongings can be very valuable
recognition software enables fingerprints of things such as expensive pieces of jewelry,
valid users of the vehicle to be enrolled in a confidential documents, and money in cash,
database. Before any user can use the etc. To overcome all those challenges and
vehicle, his/her fingerprint image is matched drawbacks in the traditional locks, smart
against the fingerprints in the database while security systems are developed which
users with no match in the database are provide more security to the individuals,
prevented from using the vehicle. A however, these systems are easy to use, to
microcontroller stores the data equivalent of access, and can be reliable. Such of these
fingerprint of the master user. Comparison security systems, the use of smartcards,
between this enrolled fingerprint and the voice technology, passcode, and biometrics
fingerprint of the person who is about to use [5-8]. In this work, we develop a biometric
the vehicle is done by the micro- controller. security system based fingerprint.
If both the fingerprints are identical control Biometrics involves the science which can
circuitry of the microcontroller sends statistically analyze the biological
appropriate signals to the motor relays characteristics. A biometric system is
operating the door of the vehicle. If the defined as a technology that can recognize
fingerprints are not identical microcontroller and verify the identity of a person using a
Volume 10, Issue 12, Dec 2020 ISSN 2457 – 0362 Page 35
measurable physical or behavioural recognition method an unfailing method of
characteristic of the person. There are some human identification.
conditions to choose characteristics such as
performance, universality, collectability, 3. RELATED STUDY
uniqueness, acceptability, circumvention and Door access control is accomplished by
permanence. Some other characteristics can locks indoors [2]. Recent advancements in
be used by biometrics such as fingerprint, every phase of modern living and the world
eye features, facial features, etc. [9]. Our around us progressively digitized, it
work developed a biometric-based becomes very difficult for protecting one’s
fingerprint which involves other confidential information. Old-fashioned
technologies like GSM, cam web, and passwords and keys are originally
password keypad system. At present, there considered to be sufficient to provide secure
are six major biometric technologies data transactions or for any other purpose.
available in today’s market. They are However, in the current scenario, they
Fingerprint recognition, Hand geometry became weak because of sophisticated
recognition, Iris and Retina recognition, hacker attacks and unauthorized users across
Voice recognition, Signature recognition, the internet. With more and more electronic
and Facial recognition. Of these recognition gadgets such as tablets, multiple sensors,
technologies, facial recognition, fingerprint smart phones, and cloud-based services, etc
recognition, and iris recognition are the most interconnected to the internet, and with
dominantly used for numerous applications. simultaneous sending and receiving of data,
In this work, fingerprint recognition there arises a need to keep the data
technology is considered. Fingerprint unavailable to hackers and unauthorized
recognition technology is a technique that’s individuals. To prevent this, passwords can
used to detect and recognize different human be used. However, the problem is that the
fingerprints based on different patterns of user may use the same password for multiple
fingers, which is found to be unique among devices. Besides, these passwords are
each person. It is very common and maybe sometimes shareable and persons with
the best way of obtaining details of any strong technical knowledge can use a variety
person and identifying a person can be done of methods to crack these passwords. During
most easily and conveniently [5]-[6]. Study the time of civilization changes in different
of fingerprints for recognition and falling and rising manner, equipment, and
identification the individuals is scientifically tools used for security intentions developed
called Dactylography. The main advantage by locksmiths [3]. In the period of medieval,
of the fingerprint recognition method is that there are many traditional methods were
each person has a unique fingerprint pattern used to implement security tools. As days
that remains the same and never changes pass and time move on, that equipment and
throughout life, making the fingerprint tools turned to be disused, as people could
Volume 10, Issue 12, Dec 2020 ISSN 2457 – 0362 Page 36
breach the perimeters of security set by the automatic operations are carried out. All
security equipment and supplement. . As a hardware components are of vital
result, continually, people seek for more importance for the system to provide enough
dependable and reliable measures of security, and all these tools work together
security. The blow winds of civilizations and under one controller.
industrialization movement all over the Tx-out and Rx-in of the sensor are
world have strengthened the deep intentions connected to the pin 2 and pin 3 of the
of individuals in manufacturing more Arduino Uno respectively. The electronic
advanced and sophisticated security systems lock is connected with one of the output
which could be able to battle the obstacles ports of the Uno. Making a network with the
and challenges of securing worthy relay allows switching between the 5V and
possessions. Sometimes during the day, the 12V electrical components. Now we
most of the homeowners leave their homes have attached the Arduino Uno to the laptop
for different purposes, some of them go to for registering fingerprints. We require the
their work offices, some of them go to connection with the computer for assigning
schools, sport fields, farms, etc. thus, their the ID to the prints. This can be done
homes will be easy to attack by burglars, through Smartphone with Arduino
because of homes’ traditional locks which application as well. We save the ID into the
can be opened by the burglars in case if they sensor and upload the code to the Uno. We
have the same key or duplicate key to open disconnect the Uno with the computer and
the door, making their belongings such as turn on the power adaptor. Once it gains
jewelry, bank cards, money and other power, the system boots up the fingerprint
valuable things easy to steal, this is one of IDs saved inside and waits for a print to be
this disadvantages of using the traditional matched. If no match is found, the keypad
locks which has no security and no one can and the switch remain active. Once a match
rely on. is found, the buzzer will buzz once and the
lock will open. If no match is found, the
4. PROPOSED SYSTEM system will not take any action at all. The
The block diagram of the scanner can perform over 100 scans per
implemented system involving all hardware second, so when someone places a finger, it
components that are used to accomplish the will respond instantly if the prints match.
security task. Arduino Uno microcontroller This system can store up to 126 fingerprint
board acts as a master and it is the body of IDs. So, it can control the access of 126
our project, while other hardware different people. Review of the whole
components act as slaves. The system system
behaves according to the written program • 126 different fingerprints can be enrolled
and performs all mentioned security actions into the system to open door/doors.
without human intervention, and all other
Volume 10, Issue 12, Dec 2020 ISSN 2457 – 0362 Page 37
• On placing a registered finger, the lock please focus on the lock to find out its
unlocks for 5 seconds with no noise or buzz. situation. Our experiment is carried out with
• A 4-digit password can be entered through the help of several hardware components
the keypad. such as transformer, rectifier, LCD (16Χ2
• Each key pressed results in a beeping lines), GSM Technology, keypad, piezo
sound. A successful code opens the door buzzer-12VAC, MEMS Sensor, optical
with a single buzz. fingerprint scanner-R305, solenoid door lock
• An incorrect input will not open the door; (NC-0837L). All these components are
the system will buzz shortly twice. interfaced and connected to the Arduino
• 3 failed attempts on the keypad will make Uno R3 microcontroller according to their
the system buzz continuously for 3 seconds functionality. It can be concluded that this
notifying an intrusion attempt. security system can be improved by adding
• On pressing the switch from inside, the face recognition along with fingerprints in
lock unlocks for 5 seconds with a single the more sensitive places which require
buzz. higher security.
Volume 10, Issue 12, Dec 2020 ISSN 2457 – 0362 Page 38
enable seamless integration with the users performance," 2016 IEEE Symposium on
and provides tighter security. In our country, Technologies for Homeland Security (HST),
private and government organizations are Waltham, MA, 2016, pp. 1-7.
very much concerned about security. Many 5. S. Palka and H. Wechsler, "Fingerprint
companies are interested in using this type Readers: Vulnerabilities to Front- and Back-
of locking mechanism but the system which end Attacks," 2007 First IEEE International
is available have very high installation cost. Conference on Biometrics: Theory,
Due to this excessive cost, many small firms Applications, and Systems, Crystal City,
cannot afford such systems. Keeping the VA, 2007, pp. 1-5.
installation cost in mind we planned to 6. T. Ogane and I. Echizen, "Biometric
develop a system that should be affordable Jammer: Preventing surreptitious fingerprint
to both large and small firms. This design photography without inconveniencing
can be improved by more intensive users," 2017 IEEE International Joint
development and additional features such as Conference on Biometrics (IJCB), Denver,
more locks can be added to the system. Thus CO, 2017, pp. 253-260.
we do not need to spend so much for just 7. K. L. Krishna, J. Madhuri and K.
one lock if this can be used to control Anuradha, "A ZigBee based energy efficient
several doorways. A system to save prints environmental monitoring alerting and
without the use of a computer could have controlling system," 2016 International
been made, but it will require more parts Conference on Information Communication
than the ones we used. and Embedded Systems (ICICES), Chennai,
REFERENCES 2016, pp. 1-7.
1. Winda WO, Mohammed S (2007) 8. C. Lin and A. Kumar, "Matching
Intelligent Voice-Based Door Access Contactless and Contact-Based
Control System Using Adaptive-Network- Conventional Fingerprint Images for
Based Fuzzy Inference Systems for Building Biometrics Identification," in IEEE
Security. J Comp Sci 3: 274-80. Transactions on Image Processing, vol. 27,
2. Omijeh BO, Ajabuego GO (2013) Design no. 4, April 2018, pp. 2008-2021.
Analysis of a Security Lock System Using
Pass-Code and Smart-Card. IOSR J Elect
Comm Eng 4: 64-72.
3. W.Dongdong, "Introduction of capacitive
fingerprint sensor packaging technology,"
2017 18th International Conference on
Electronic Packaging Technology (ICEPT),
Harbin, 2017, pp. 130-134.
4. R. Lazarick and P. Wolfhope, "Evaluation
of 'non-traditional' fingerprint sensor
Volume 10, Issue 12, Dec 2020 ISSN 2457 – 0362 Page 39