You are on page 1of 18

Chapter 1

INTRODUCTION

In today’s modern societies, accepting and meeting the needs of expanded

diversity in lifestyles and living conditions has become a quintessential necessity(Iru,

Ri, Iru, Frxqwulhv, & Zhoo, 2017). As technology evolved, everyone has been well

exposed in living alongside some state of the art control system especially in securing

the general dwelling, remote supervision and mobility. The management of

classrooms, halls, offices, and public spaces in any organization and the efficient use

of these resources when they are needed are challenging problems. With the rise of

IoT, the management of these resources can be automated(Atabekov, 2016).

Smart campus is an integral part of smart connected communities (S&CC) in

the global cyber-physical system (CPS). They evolve and interact with their

surroundings, optimize efficiency, comfort, safety and more by deeply coupled

embedded sensing and networked information processing. Smart campus begins by

building automation systems to integrate the facility’s core systems, such as HVAC

(heating, ventilating, and air conditioning), lighting, power meters, water meters,

pumps, etc(Wang et al., 2017). Smart homes and assistive technology are become

more and more important as the general population ages and as people live longer

there will be more need for this kinds of technologies. However with these new

complex systems the maintenance and security aspects become more prevalent

aspects which can be incorporated into autonomous and biometric systems(Matthew,

2011). Fingerprint identification is used to record the fingerprint of each employee for

its attendance and payroll purposes. The design will significantly improve the way of
monitoring the establishment and help the company to progress and to be updated in

the world of automation(Villarama, Paul, Gernale, Ocampo, & Villaverde, 2017).

Home automation is an emerging requirement by common man and

commercial users for the reasons of ease of use and security. In countries like India,

home automation is slowly paving its way. This paper demonstrates the architecture

of home automation using a widely accepted technology – NFC(Vagdevi & Nagaraj,

2017).

Monitoring of establishments is an undeniably global concern everywhere.

The elegance of technology solution to a problem (particularly in the area of Security)

lies in the fact that it can be applied to provide pre-emptive action rather than a

reactionary after the action. The conventional way of opening a room, wherein the

doors are unlocked using the key for each doorknob in the building done by the

authorized personnel. These keys are stored and being safeguarded by the security

and maintenance personnel. The switching of lights and air-conditioning units are

also manual and done by the authorized personnel. That is why Door Unlocking and

Light Switching with Database using Fingerprint for Monitoring is proposed which

helped to improve monitoring system in such establishment. The use of biometrics

which is one of the top choices which has brought significant changes with regards to

how people gain access to establishments. In this study, the usual mechanical door

lock that uses metal keys will be merged with a Fingerprint door unlocked with

fingerprint authentication using a fingerprint sensor for the user that will serve as the

key. The electricity supply can now also be control through remote control for easy

access.
This study is designed for monitoring purposes that helps the management for

decision-making. This technology utilizes fingerprint recognition to give an access to

those who have authorized fingerprints. It contains all the necessary electronics to

allow storing, deleting, and verifying fingerprints with just the touch of a button. It

also helps in reducing electricity consumption in a way that the only registered and

authorized person can access the room.

The main objective of the study is to design and developed a Door Unlocking

and Light Switching with Database using Fingerprint for Monitoring. Specifically, it

aimed to develop a device that has the following features: a) to record the fingerprint

data of the employee b) to operate door lock c) to activates lights d) to monitor

through database access and sends SMS notifications to administrators. The design

will significantly improve the way of monitoring the establishment and help the

company to progress and to be updated in the world of automation(Villarama et al.,

2017).

The study support an advanced way in monitoring all equipment inside the

establishment specifically a room where high value equipment stored and saving

energy by merging the manual door lock and switching lights with a fingerprint door

lock access.
Chapter 2

REVIEW OF RELATED LITERATURE

The presentation or review of some related articles, theories, researches and

findings are essential tools to establish the significance of conducting the research

study.

Related Literature

A. Security Devices

As civilizations developed, the distinction between passive and active security

was recognized, and responsibility for active security measures was vested through the

help of some security devices and technologies like the use of Arduino Uno

microcontroller, power relay, servo motor, GSM module and biometrics.

The proposed study will need a microcontroller that easily fit the needs of a

device. This microcontroller is the Arduino Uno, a physical computing platform and a

development environment for writing software on the board(Rozilan, 2012).

In a study done by Theng, servo motors are best known famous for their high

dynamic response and precision accuracy in traditional motion control applications,

such as machine tools and robotics.

SMS notification is convenient in our society today; specially in monitoring

and warning. Global System for Mobile Communication (GSM) modem as a wireless

modem that works with GSM wireless network and the modem is connected to a

server so it could send SMS as an alert or warning to farmer. Alcantara et al. (2013)

supported this concept when they said that GSM is a wireless communication not

only between people alone but people to devices also.


Biometric systems have reached a sufficiently advanced stage wherein they

can now be deployed in systems without hampering portability. With the recent

development of various cloud based computing and storage systems, data can be

securely stored and retrieved whenever required. Primarily, fingerprints and iris

images are considered to be the most reliable for use in biometric systems(Esmita

Gupta ME Student, 2014).

B. Existing Security Authentication Systems

In the study of Lay et al, (2011) entitled “Biometric Locker System” wherein

fingerprint recognition technique was used to open and close the lock of a storage

locker system. The system first captured the fingerprint of the locker renter and

matched the fingerprint to reopen the locker door. This was done to reduce troubles

about keys and to ensure the security of the renter.

Similarly the study conducted by Gangi et al, (2013) entitled “Locker Opening

and Closing System Using RFID, Fingerprint, Password and GSM,” had designed and

implemented a locker security system based on the integration of radio frequency

identification (RFID), fingerprint, password and global system for mobile (GSM)

technologies that can activate, authenticate, and validate the user to unlock the door

for secure access. In this system, the RFID reader reads the ID number first and

determines if it is valid. If the id number is valid, that is the time that the system gives

access to the fingerprint scanner. Then it will scan the fingerprint, and if matched, the

microcontroller sends the password to the authenticated person mobile number. The

person then has to enter the passwords to the system.

C. Database Management and Access Control


The database is composed of gathering data or information that is used for

managing and accessing, it is one of the essential elements in any organization.

Creating a database is an important task. The data that have been obtained by the

design will be transmitted into the database. This data are then used for the

management and payroll of each employee. In accessing a Database, there are

policies that are needed to be followed. This policy becomes more complex for large

databases. Security breaches are one of the results of having a complex access control

policies. The policies must not be vague and must be applied correctly to avoid

security breaches. The database security community developed different models of

access control policies. These developed models maintain the system secures, gives a

protection in accessing the information on the database and preserving the quality of

the data. Role-based access control (RBAC) is the most flexible access model for a

database system. The RBAC gave permission to a certain user to perform operations

that are assigned to a specific role. The application of RBAC allows the data to be

used only by the users, which is needed for that information due to their nature of

work(Villarama et al., 2017).


Chapter 3

FINGERPRINT ACCESS CONTROL: AN IOT-BASED MONITORING SYSTEM

Abstract
In this study, Door Unlocking and Light Switching with Database using
Fingerprint for Monitoring was developed and implemented. These systems can be
used for security of an environment so that only the authorized persons are allowed to
pass or also for attendance measuring purposes. Biometric authentication is the best
among security systems because it’s unique and personal. These technologies can be
used for monitoring of an environment of various organizations so that only the
authorized persons are allowed to pass to ensure the security of belongings, switching
automation of devices and also for attendance monitoring purposes.

Keywords: Biometrics, Fingerprint, Short Message System (SMS), Global System


for Mobile (GSM)

Introduction

In today’s modern societies, accepting and meeting the needs of expanded

diversity in lifestyles and living conditions has become a quintessential necessity(Iru

et al., 2017). As technology evolved, everyone has been well exposed in living

alongside some state of the art control system especially in securing the general

dwelling, remote supervision and mobility. The management of classrooms, halls,

offices, and public spaces in any organization and the efficient use of these resources

when they are needed are challenging problems. With the rise of IoT, the

management of these resources can be automated(Atabekov, 2016).

Smart campus is an integral part of smart connected communities (S&CC) in

the global cyber-physical system (CPS). They evolve and interact with their

surroundings, optimize efficiency, comfort, safety and more by deeply coupled

embedded sensing and networked information processing. Smart campus begins by

building automation systems to integrate the facility’s core systems, such as HVAC

(heating, ventilating, and air conditioning), lighting, power meters, water meters,
pumps, etc(Wang et al., 2017). Smart homes and assistive technology are become

more and more important as the general population ages and as people live longer

there will be more need for this kinds of technologies. However with these new

complex systems the maintenance and security aspects become more prevalent

aspects which can be incorporated into autonomous and biometric systems(Matthew,

2011). Fingerprint identification is used to record the fingerprint of each employee for

its attendance and payroll purposes. The design will significantly improve the way of

monitoring the establishment and help the company to progress and to be updated in

the world of automation(Villarama et al., 2017).

Home automation is an emerging requirement by common man and

commercial users for the reasons of ease of use and security. In countries like India,

home automation is slowly paving its way. This paper demonstrates the architecture

of home automation using a widely accepted technology – NFC(Vagdevi & Nagaraj,

2017).

Monitoring of establishments is an undeniably global concern everywhere.

The elegance of technology solution to a problem (particularly in the area of Security)

lies in the fact that it can be applied to provide pre-emptive action rather than a

reactionary after the action. The conventional way of opening a room, wherein the

doors are unlocked using the key for each doorknob in the building done by the

authorized personnel. These keys are stored and being safeguarded by the security

and maintenance personnel. The switching of lights and air-conditioning units are

also manual and done by the authorized personnel. That is why Door Unlocking and

Light Switching with Database using Fingerprint for Monitoring is proposed which
helped to improve monitoring system in such establishment. The use of biometrics

which is one of the top choices which has brought significant changes with regards to

how people gain access to establishments. In this study, the usual mechanical door

lock that uses metal keys will be merged with a Fingerprint door unlocked with

fingerprint authentication using a fingerprint sensor for the user that will serve as the

key. The electricity supply can now also be control through remote control for easy

access.

This study is designed for monitoring purposes that helps the management for

decision-making. This technology utilizes fingerprint recognition to give an access to

those who have authorized fingerprints. It contains all the necessary electronics to

allow storing, deleting, and verifying fingerprints with just the touch of a button. It

also helps in reducing electricity consumption in a way that the only registered and

authorized person can access the room.

The main objective of the study is to design and developed a Door Unlocking

and Light Switching with Database using Fingerprint for Monitoring. Specifically, it

aimed to develop a device that has the following features: a) to record the fingerprint

data of the employee b) to operate door lock c) to activates lights d) to monitor

through database access and sends SMS notifications to administrators. The design

will significantly improve the way of monitoring the establishment and help the

company to progress and to be updated in the world of automation(Villarama et al.,

2017).

The study support an advanced way in monitoring all equipment inside the

establishment specifically a room where high value equipment stored and saving
energy by merging the manual door lock and switching lights with a fingerprint door

lock access.

Methodology

The main objective of the study is to design and developed a Door Unlocking

and Light Switching with Database using Fingerprint for Monitoring to ensure the

security of belongings of various organizations and save energy consumption that

implements this technology. Generally, the research focused on the automation of

security monitoring system. In the process of implementing the system, various steps

including knowledge gathering, circuit designing and coding were done. In this

monitoring system initially all the users need to enroll themselves in the system.

Hardware development

The block diagram of the system is shown in figure 1. The fingerprint will be

captured through the use of fingerprint sensor which served as the input to the

Arduino Microcontroller. If the captured fingerprint is a registered user, the servo

motor unlocked the door, the relay turned on the lights and GSM module will send

SMS notification to the database administrator containing the name of the user who

entered or used the room.

Bypass button will served as an exit button and a remote to turn on/off the
lights.

Figure 1. Block diagram of the proposed system

Software Development

Figure 2 shows the flowchart of the design project presenting the step by step

process on how it works. Enrollment or registration comprises of fingerprint capture,

character file generation, template file generation, template number generation and

storing the template file in device flash memory and then uploads the registered

user’s character file to MCU which then sends it to database server through SIM900

GSM module. We need to match the new fingerprint with the stored fingerprint

templates present in FLASH. Once the users have enrolled themselves then they can

access the room when needed. Then system returns with the users registered name,

stores the date and time of entry in centralized database server for monitoring. The

fingerprint of the user will captured and stored with assigned code and name through

the use of a fingerprint sensor. If the captured fingerprint is a registered user, the relay
turned on the lights and the servo motor unlocked the door. Bypass button was also

included that served as an exit button and a remote to turn on/off the lights.

Figure 2. Flow chart of the proposed system

Results and Discussion

This section focuses on the testing of the objectives: to record the fingerprint

data of the employee into the database, to transmit the data through GSM module and

to monitor and use the information in the database for management.

A. Recording of fingerprint data of the employee into the microcontroller

Figure 3 shows the fingerprint registration process. The purpose of this test is

to register the fingerprints of the employee to the microcontroller of the system. Once

the employee is registered, the device can now control its door access and send to the

database.

The Employee ID and fingerprint Number determines the order of the

employee in the system.


Figure 3. Fingerprint Registration

B. Transmission of data through GSM technology

The purpose of this test is to transmit the fingerprint data of the employee to

the GSM module. The receiver module is connected to the PC in which the program

of the design project is installed. The ID determines the order of the employee in the

system.

C. MySQL Database Server

Figure 4 is the program of a Fingerprint Access Control: An IoT-Based

Monitoring System. The software was designed and developed using VBscripts and

MySQL database. FrontlineSMS is a free open source software used to distribute and

collect information via text messages (SMS). Once this data reaches the database

server, that values are received by a VB script. This is provided using a GET request,

which will pass the value to the variables present in the VB script. VB script will

have four variables, employee_ID, room_ID, date and time. The information will be

forwarded to the administrator or any recipient set to the frontlinesms software for
monitoring. Furthermore, this data were stored in the database and reports can be

generated for whatever purposes that the management set too.

Figure 4. Frontlinesms software, database and receive message

Conclusion

Based on the results of the testing, the monitoring system was implemented on

the classroom. The system was able to capture and store fingerprints using Arduino

Uno microcontroller of an employee. The servo motor was able to operate the door

lock of the room were the device being implemented. It activate lights using the

power relay through remote control when the captured fingerprint matched with the

employee and the GSM module transmitted wirelessly. The information was link to

the database and used it for monitoring. SMS notification was receive by the

administrator/s when an authorized user entered the premises to monitor the

classrooms and its electricity usage.


The overall result of the research conducted showed that the developed system

improved monitoring through database that store access to such premises and SMS

notification.

Therefore, the research conducted affirms that the development of the system

may soon help to monitor room usage especially its peripherals inside and for

decision-making of the management to improved saving of energy consumption to

promote cost cutting especially in government offices.


Chapter IV

CONCLUSION

Based on the results of the testing, the monitoring system was implemented on

the classroom. The system was able to capture and store fingerprints using Arduino

Uno microcontroller of an employee. The servo motor was able to operate the door

lock of the room were the device being implemented. It activate lights using the

power relay through remote control when the captured fingerprint matched with the

employee and the GSM module transmitted wirelessly. The information was link to

the database and used it for monitoring. SMS notification was receive by the

administrator/s when an authorized user entered the premises to monitor the

classrooms and its electricity usage.

The overall result of the research conducted showed that the developed system

improved monitoring through database that store access to such premises and SMS

notification.

Therefore, the research conducted affirms that the development of the system

may soon help to monitor room usage especially its peripherals inside and for

decision-making of the management to improved saving of energy consumption to

promote cost cutting especially in government offices.


Chapter V

RECOMMENDATIONS

Based on findings, the researcher has recommendations for further

improvement and enhancement of the systems performance, application and

efficiency, which are as follows:

1. Battery should be added in the circuitry of the system as an alternative source of

current in case of sudden electric failure.

2. For the future researchers, consider the use of microcontroller capable of sending

SMS to more than one recipient not only direct to database.

You might also like