Friday, May 1, 2020

Security Process Using RFID-Free-Samples-Myassignmenthelp.com

Question: Using an internet search, explore an Internet of Things project currently underway or already in place. Provide a detailed account of the issues it responds to and outline its key features. Answer: Introduction With the increase in demand from industries for a better approach on control systems, this paper elaborates the way to make the control systems smarter and thus decrease the risk of going into the areas where these conventional access controls are installed (Kang et al., 2016). EKTM4C123GXL board is used for these purposes. The data from the Biometric sensors and RFID reader is transferred to microcontroller chip. If the data matches then the door opens. The signal is also send to the systems via same network of WiFi. Solution with features To secure the locks of the door, the security system of using biometric and RFID reader is used. The smart card of the client is read by the RFID reader and the fingerprint is taken by the biometric sensor (Carper, 2014). The features of the biometric sensor are- High-Accuracy and High-Speed Fingerprint Identification by the implementation of the SmackFinger 3.0 Algorithm The images are downloaded from the biometric device Databases and Fingerprint Templates by Simple UART protocol (Default 9600 baud) are also read 1:N Identification and 1:1 Verification of 360 Fingerprint Recognition is done by this sensor The data collected from the Biometric sensor is then transferred to the WiFi module 1for matching. If the data gets matched then further it is transferred to the WiFi module 2 which trips the relay and the door is opened (Liu Gu, 2016). The features of WiFI module 2 are- Power Management Subsystems and Wi-Fi Network Processor are present Host Interference Subsystems having Power Management Advanced Low-Power Modes Wi-Fi Processor Subsystem Diagram of security process Fig: Security process using RFID technology and Biometric Sensor Working Process of System The RFID reader or a reader known as wiegand reader reads the smart card of the individual. A signal of 125 KHz is transmitted through. The card does not have any power source. The reader gives some voltage in the card and then a 16 bit card number is transmitted to the reader. The card number is then transmitted to the microcontroller through two data pins by the reader. The protocol used for this process is known as Wiegand protocol (Mei Yin et al., 2016). There is a 26 bit format for the Wiegand protocol. The first 13 bit of the chip is even parity bit. After the even parity, the chip is followed by facility code of 8bits. More security is provided in the facility code. The facility code is used where there is a same card number of the employee for two different companies (Park, Hildreth Hazzard, 2017). After the 8 bit facility code, the card number of 16 bit is present and these are the odd parity bits. The biometric scanner that is used in this process is the fingerprint scanner. The work of the biometric job is to take a picture of the finger and to check whether the finger print matches the previously stored finger print database. Only the specific characteristics that are unique to all fingerprints are taken as the encrypted biometric key. The image of the fingerprint is not saved (D'ambrosio, 2016). Only the series of binary code is saved for further verification. There is no chance of converting the algorithm to an image which decreases the level of duplicity (Sowjanya Nagaraju, 2016). A serial data is transferred to the by the fingerprint scanner to the microcontroller. The transfer of data takes place through UART (Universal Asynchronous Receiver Transmitter). The GPIO reads the data from Wiegand reader as input pins and a code is written according to the Wiegand protocol (Mei Yin et al., 2016). The code received is then matched with predefined numbers stored in the flash R OM, and then a signal high is send to the module 1 if the number becomes valid. The high value is then transferred to WiFi module 2 and a relay is tripped and the door opens. Advantages of using security with RFID Easy to use RFID technology as security Data tracking is much easier in biometric sensor and RFID technology Data are secured This method of security is very much flexible Disadvantages of using security with RFID If somehow the fingerprint does not match with the predefined data, the door will not open in spite the person is valid. There is a chance of WiFi connection failure. If the RFID tag gets lost, it will create a chance for robbery. External Flash memory will have to be used if there are more number of people. Conclusion Outlining the smart access control is a profitable way by which the problem faced by the industries can be overcome. Energy efficient can be obtained by selecting a proper microcontroller. Products that are based on IoT are famous in the innovation of the technical area. More and more improved versions of the IoTs are yet to come in the future world. References Carper, T. A. (2014).U.S. Patent No. 8,799,167. Washington, DC: U.S. Patent and Trademark Office. D'ambrosio, G. J., Ganel, O., Moody, N., Moreno, G. (2016).U.S. Patent No. 9,324,051. Washington, DC: U.S. Patent and Trademark Office. Kang, Y. S., Park, I. H., Rhee, J., Lee, Y. H. (2016). MongoDB-based repository design for IoT-generated RFID/sensor big data.IEEE Sensors Journal,16(2), 485-497. Liu, C., Gu, Y. (2016, July). Research on indoor fire location scheme of RFID based on WiFi. InNicograph International (NicoInt), 2016(pp. 116-119). IEEE. Mei Yin, D. B., Kamal, M. I., Azmanuddin, N. S., Ali, S. H. S., Othman, A. T., Chik, R. Z. W. (2016, January). Electronic door access control using MyAccess two-factor authentication scheme featuring near-field communication and eigenface-based face recognition using principal component analysis. InProceedings of the 10th International Conference on Ubiquitous Information Management and Communication(p. 1). ACM. Mei Yin, D. B., Kamal, M. I., Azmanuddin, N. S., Ali, S. H. S., Othman, A. T., Chik, R. Z. W. (2016, January). Electronic door access control using MyAccess two-factor authentication scheme featuring near-field communication and eigenface-based face recognition using principal component analysis. InProceedings of the 10th International Conference on Ubiquitous Information Management and Communication(p. 1). ACM. Park, R., Hildreth, D., Hazzard, T. (2017).U.S. Patent No. 9,545,029. Washington, DC: U.S. Patent and Trademark Office. Sowjanya, G., Nagaraju, S. (2016, August). Design and implementation of door access control and security system based on IOT. InInventive Computation Technologies (ICICT), International Conference on(Vol. 2, pp. 1-4). IEEE.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.