You are on page 1of 27

DESIGN AND SIMULATION OF LOOP-BASED BANK LOCKER SECURITY

SYSTEM BY USING MICROCONTROLLER AS WELL AS GSM MODULE

1
ACKNOWLEDGEMENT
For the hard work and dedication provided by my teammates to develop the project, also for
providing me knowledge regarding many aspects including the dedication, I have no words to
describe my regards.
I along with my teammates performed a project provided to us named “DESIGN AND
SIMULATION OF LOOP-BASED BANK LOCKER SECURITY SYSTEM BY USING
MICROCONTROLLER AS WELL AS GSM MODULE” which was under the course of the
engineering department. The project conducted was supervised by Mr. …. Who made a greater
impact on us by helping us with every minute problem.
Finally, to all the teachers who provided us knowledge, to the engineering department who
helped us find the source files, to our supervisor without whom this project could never have
been completed and could be counted as a successful one, we would like to give out gratitude.
And most especially, to our family members, they had been an idolized character a they build
up our confidence during the darker times, they encouraged us in every step that we get
success on what we have started, we would like to give our greatest regards. Very thanks.
Project mates

2
DECLARATION
The project file was designed as a completion of the course related to the engineering
department and was the project was performed on the name “DESIGN AND SIMULATION OF
LOOP-BASED BANK LOCKER SECURITY SYSTEM BY USING MICROCONTROLLER AS WELL AS
GSM MODULE”. with the help of our supervisor, we the team members completed the project.
The ideas and contents available in our project file are completely based on our ideas and were
not copied from any other source file. Only the information was gathered to perform the
project from the other sources. So while performing the project file, we did follow every term
and condition so as to make our project file a successful one.
With the completion of the project, the file was delivered to the engineering department,
which is responsible for the security system. If anyone is found to be copying the project file
contents, with the acceptance of the engineering department then they are forced to get any
legal action provided by the university.
Project mates

3
TABLE CONTENT
ACKNOWLEDGEMENT………………………………………………………………………………………………………………2
DECLARATION………………………………………………………………………………………………………………………….3
ABSTRACT……………………………………………………………………………………………………………………………….6
CHAPTER 1: INTRODUCTION…………………………………………………………………………………………………..7
1.1 OVERVIEW………………………………………………………………………………………………………………………..7
1.2 BACKGROUND…………………………………………………………………………………………………………………..7
1.3 PROBLEM STATEMENT……………………………………………………………………………………………………..7
1.4 OBJECTIVE………………………………………………………………………………………………………………………..8
1.5 SCOPE………………………………………………………………………………………………………………………………8
1.6 METHODOLOGY……………………………………………………………………………………………………………….9
CHAPTER 2: LITERATURE REVIEW…………………………………………………………………………………………..11
CHAPTER 3: COMPONENTS AND TERMINOLOGIES USED……………………………………………………….15
3.1 POWER SUPPLY SYSTEM………………………………………………………………………………………………….15
3.2 MICROCONTROLLER………………………………………………………………………………………………………..15
3.3 BUZZER…………………………………………………………………………………………………………………………..16
3.4 LED…………………………………………………………………………………………………………………………………16
3.5 SWITCHES………………………………………………………………………………………………………………………16
3.6 DIODE……………………………………………………………………………………………………………………………16
3.7 CAPACITOR…………………………………………………………………………………………………………………..17
3.8 PROTEUS8 SOFTWARE………………………………………………………………………………………………….17
3.9 RESISTOR………………………………………………………………………………………………………………………17
3.10 TRANSISTOR……………………………………………………………………………………………………………….17
3.11 TRIAC………………………………………………………………………………………………………………………….17
3.12 ARDUINO UNO……………………………………………………………………………………………………………18
CHAPTER 4: DESIGN SECTION…………………………………………………………………………………………….19

4
4.1 RFID……………………………………………………………………………………………………………………………….19
4.1.1 RFID READER………………………………………………………………………………………………………………19
4.1.2 RFID PASSIVE TAG………………………………………………………………………………………………………19
4.1.3 TAG STANDRD……………………………………………………………………………………………………………19
4.2 SIMULATION RESULTS AND ANALYSIS……………………………………………………….………………….21
CHAPTER 5: DISCUSSION………………………………………………………………………………………………….…23
CHAPTER 6: CONCLUSION……………………………………………………………………………………………….….24
6.1 ADVANTAGES…………………………………………………………………………………………………………..…..24
6.2 DISADVANTAGES……………………………………………………………………………………………..…………..24
6.3 FUTURE SCOPE………………………………………………………………………………………………………..…..24
CHAPTER 7: BIBLIOGRAPHY…………………………………………………………………………………………..….26

5
ABSTRACT
In the recent period, the situation of bank robbery has been a major problem that is very
essential to control. The locking system consisting in the bank decides the safety of people’s
property from any intruder and thieves. Regardless of the ancient locking system method, this
system provides greater reliability, greater efficiency as well as it is denoted as an unbreakable
method of locking system. In this system, the basic principle is based on a loop system, in the
case of any unusual activity or any unauthorized tries to open the locker, then the alarm is
activated which ultimately provides the bank and security person knowledge regarding the
unusual activity performance. Also, this system consists of a GPS system that allows sending the
SMS to the respective personnel in the case of any intrusion has occurred or any unauthorized
performance has occurred in the locker system. Since this system has the important
characteristic of compatibility and can be traveled easily such that this system could be
implemented in any place on the bank. For implementing this system, a Triac BT136, as well as,
BC547 transistor were used so that the performance of alarm was provided for the sound. For
the designing of the circuit as well as for the numerical calculations and for the simulation
process, Proteus software was used where the result was obtained. Also for the SMS service to
the respective personnel, a microcontroller, as well as, a GSM module was included which was
respectively connected to the bank manager’s mobile phone.

6
CHAPTER 1: INTRODUCTION
1.1 OVERVIEW
In recent years, the system of security has been the greatest threat to every device as well as
for houses as well as offices. Security has been a basic requirement in the case of cities and
crowded areas in the present time, almost every people are involved in some kind of work away
from their respective homes making the situation of home alone. This situation makes the
intruders get involved in various unnecessary activities such as breaking of the house or the
office area that causes the damage of property as well as we are forced to lose important
property items. This intrusion might also cause serious problems in life issues. So considering all
the subsequences, the proper security of the system was very essential. Various modes of
security systems are available in the market such as lock system by key as well as modern
techniques of security system are also available based on sensors and fingerprints. Considering
the surroundings and situation, the modern and advanced form of security system is considered
very essential. The installation of sensors or alarm systems is required. Various modes of sensor
systems are available. As with the utilization of sensor system in every condition might also not
be preferable as this system detects various activities and according to the changes, the alarm
was activated. So, using of the system for security, in the case of bank locker systems with the
use of microcontroller as well as GSM module was proposed.
1.2 BACKGROUND
In the case of an earlier stage of the security system, those techniques were considered to be
an ancient method. In the earlier period, people used to keep dogs as a means of security
system also, it was considered to be the greater option as most of the people did stay in the
homes. There was not a single day that the homes were left alone so there were almost no
chances of an intruder breaking the house. And with the modernization of cities and towns, the
concept of lock and key systems was introduced. Although this was considered to be an
advanced method, it never made the home secure as the breakage of the lock was considered
very easy and required almost no time for the breakage of the lock and without any alert
system as well it neither produced any bigger sound. This system made the houses very
vulnerable to intruders. As a result, the concept of advanced technique of sensor system, alarm
system, and fingerprint system was introduced which was a relatively highly secure system that
made the intruder very much difficult for any breakage and for the performance of the unusual
activities.
1.3 PROBLEM STATEMENT
The development of the sensor system including the GSM module as well as video surveillance
has replaced all other security system methods as this system was considered to be almost
unbreakable, it obtained every activity that happened in every moment as well as it provided
information to the owner regarding any unusual activity occurring In the property premises.

7
Along with its greater benefits, it did contain various disadvantages such as the system was
relatively difficult and not all people could have the benefit to utilize it, the system was
considered relatively higher in cost, in the case of any defect to the system, the maintenance
was relatively very difficult and only the technical person could solve the problem. The major
disadvantage of this system was, it was based on a sensor system, it activated the alarm system
by sensing any activity which is not installed in the program and the sense could be activated by
any device or in an unknown situation which could not be differentiated which might create
chaos in the owner and the system. This project was performed on the loop-based locker
system of the bank in the case of better security with the use of microcontroller as its basic
principle and also GSM module was used.
1.4 OBJECTIVES
This project was based on the security system of the locker of the bank based on loop and for
this purpose microcontroller as well as GSM module was used. Among these, there was various
work to be performed in the project, which is enlisted below:

 To protect the locker of the bank with the use of alarm signals as well as alert SMS.
 To provide the proper functioning of the system as well as the SMS system.
 A proper study of the GSM system as well as a microcontroller.

1.5 SCOPE
The theory related to this project was considered as one of the best techniques in the case of
security systems because of its reliability, perfection as well as highly secured method.
Compared to the older lock and key method, it is unbreakable. According to the older security
system method in the case of locker, the owner generally used a lock and the key was kept with
the owner. But this never made a system strong or unbreakable. The lock was so vulnerable
that it could easily be broken and no sound or alert sound was created, which made the
intruder easily take either money or the important documents contained in it. But in this
design, none of the unauthorized has access to the system. This system includes the sensor
system where the authorized person’s fingerprint or voice recognition allows the locker to get
open. Other than the owner tried to open it then, the program was set to the microcontroller in
the case of unauthorized activity, then an alarm is activated giving information regarding the
unusual activity, and at the same time by the use of the GSM module, a message was sent to
the system regarding the unauthorized work. This way it can be used to make a security system
an unbreakable one.

8
1.6 METHODOLOGY
In this topic, generally, the steps regarding the flow of the project were described. During the
initial stage, the introduction part was conducted where the various subjects regarding the
project were discussed such as the background of the project was talked, the problems related
to the project was explained, and then the major objective of the design was classified followed
by the scope in coming future was discussed. After the introduction part, a literature review
was performed where the performance of earlier projects regarding the projects was described,
and also the various ideas were gained. Then the selection of components, as well as, a
description of these components along its diagram and the terminology part was clarified.
Following the components and terminologies description part, designing of the system was
performed where various related circuit diagram was drawn and the numerical values were
calculated. After the completion of the circuit, design simulation was performed under various
circumstances and results were obtained. As per the result obtained discussion was made
whether the obtained results did fall under the acceptable range or not. If it did fall under the
reliable range then the performed design was declared as a successful one. And the conclusion
regarding the project and the results were performed in summary. The figure shown below
represents the flow diagram of the methodology.

introduction

Literature review

Components and terminologies

Design

Simulation results and analysis

Discussion

Conclusion

9
Fig 1. Flow chart of the methodology

CHAPTER 2: LITERATURE REVIEW

10
With the increase in the growth of population as well as the rapid development of cities and
towns, most of the people are involved in outside work and that resulted in making the home
alone. So the security of the house, as well as, the locker of the system should be highly
advanced so that no one could be able to break it. As mostly in the case of banks, the locker
must be secured in greater amount as it defines the statement of the bank. In this system, an
electronic doors consisting of an access code as well as the method of biometric was designed
where the use of the print of the thumb, whereas the facial recognition and iris recognition,
was performed that was designed in the door so that only the authorized person has the access
to the doors. In this design, a keyless electronic door was designed which could only be opened
by the use of a valid smart card. Here the authentication of the card was provided and that was
performed with the help of the microcontroller unit. (ALICE OKE, OLANIYI OLAYEMI MIKAIL,
OLADIRAN TAYO ARULOGUN, OLATAYO OLANIYAN, JANUARY 2009)
Security is considered to be one of the basic and most essential things to make life a happy
land, where the thinking of safe feeling as well as protection is created. In this system, the
security system was based on the recognition of faces. In this condition, generally, the face
recognition technique was relatively divided into two methods such as technique based on
geometric as well as technique based on the template. In this system, double technologies
which are considered to be one of the most intelligent artificial technologies were used such as
facial recognition and artificial neural networks which were registered as a method for building
a keyless security system in the case of doors. In this system, only the authorized faces were
allowed for the entry else if any unauthorized faces recognized were rejected and for regular
unauthorized tries of entry caused the alarm to activate. Also, it consisted of CCTV which
helped in the processing as well as capturing of the images. These CCTV’s were interlinked with
a computer. (OLADIRAN TAYO ARULOGUN, ELIJAH OMIDIORA, OLANIYI OLAYEMI MILAIL, AA
IPADEOLA, JANUARY 2008)
In recent days, with the higher requirements and desires of human being people are more likely
to work rather than to remain at home. As a result, they could have more income. With the
chart present, it was observed that both the parents are actively working to gain more income
so as to fulfill their requirements. In such a case they are likely to keep their money and their
asset in the bank for greater safety as they could not place the money at home as the home
was generally left alone and the security system of the locker was never good enough. So with
this, the security system in the case of locker related to the bank was to be very good in order
to keep the asset safe. In this system, the key lock system was completely replaced by a keyless
system which consisted of sensors and created an alarm if any unusual activity with the locker
was performed. (MIN KYUNG LEE, ANIND DEY, SCOTT DAVIDOFF, 2006)
With the consideration of the recent environment, the security of homes is considered very
essential. As we can, with civilization, comes more urbanization of the favorable areas and rapid
growth of population has been seen in recent years. With the situation increasing, the security
regarding the homes and offices as well as banks were decreasing accordingly as a result, the

11
criminal activities regarding the thief were increasing considerably. These illegal activities
included breaking of the house, breaking of bank and the locker related to the bank, stealing of
cars as well as many other properties. So the requirement of a better security system was
considered a very essential aspect. As a result, many theories, as well as, projects were
performed including the concept of a GSM-based wireless security system which was
considered to be the best among them as it was easier in installation, consisting of lower cost.
In this system, a sensor node was included which was placed in the doors, also the file alarm
node, as well as, infrared security node was included. By the use of these systems, the file was
detected occurring in the specific area as well as the determination of intruder trying for
unusual activity was done along with the visual capture of the person. (YANBO ZHAO, ZHAOHUI
YE, 2008)
Along with the development of cities and towns and with the growth of population there was
also the process of development in the case of technology. Conveying a message to the other
person was not considered to be a difficult task with the development in the case of Global
System of Mobile Communication (GSM). Not only this system was used for communication
purposes but also it was used in various fields of security systems. In this system, the GSM was
considered to be the main factor for security. In the case of any intruder entering the home or
in case of breaking of the locker which consists of this system of protection, immediately an
alert sound in the form of alarm was activated as well as the owner received the message of the
activity happened in their respective property from which immediate action was taken so as to
stop the crime. (GUIFEN GU, GUILI PENG, 2010)
As we know, the crime regarding the safety of property has been increasing rapidly so viewing
the situation, a proper security system was very essential which could not only minimize the
intrusion activity but also it helped in finding the relative person which was considered very
essential. This system was basically related to the designing of computerized video visualization
which covered the larger range and was based on disrupted sensor networks. In this system,
the objects which are relatively moving were identified and also it helped in tracing the object
by the help of cameras that were installed over there. Sensor networking consisting of the
decentralized collaborative was regarded as a major component used in this system. Also, the
algorithm known as the image processing algorithm was applied to the system so as to indicate
the activities of movement as well for the identification process. (E. MONARI, S. VOTH, K.
KROSCHEL, 2008)
Along with the increment in development and along with the income sources among the
people, the rate of crime regarding stealing and along with the death threats has been
increasing and a proper management system for the property was considered as a first priority.
The older techniques of the security system were not considered effective so an advanced
system was developed which was based on the system of a pyroelectric infrared sensor (PIR).
This system was considered to be the advanced system regarding the security system as it
helped in detecting if any unknown person or an unauthorized person has entered the

12
protected room and has been involved in unusual activities. In the case of any improper
activities performed in the room area, this system immediately produced an alarm. The sensor
device was attached to the door and as soon as someone tries to open the door without any
authorization, then the system activates resulting in the activation of alarm that makes the
surrounding about the intruder in the house or the protected room. (MAHMOUD
MOGHAVVEMI, LU CHIN SENG, 2004)
As we are living in a modern world was time is valued everything and for saving time we use
various types of vehicles. The automobile is regarded as cheapest and fastest means of
traveling which has made a greater impact on the development of the world. It also increased
the living standard of the people. As with the increasing demand, the crime regarding this has
also been increased in greater amount. Vehicle sterling has become a common crime in every
corner of the world. So as to discard this activity, a system had been built that alert the owner
regarding the breaking of the window glass as well as it had the ability to be located if stolen. It
was considered an anti-thief security system. In this system, for the alarm CMOS chip was used
and for the tracing process, a GPS system was utilized. it was considered the best device as it
gave the exact location of the vehicle. The alarm was only activated when there occurred the
breakage of the window glass. It did have the functionality of the SMS system to the owner if
any unusual activity was performed. (LILI WAN, TIEJUN CHEN, 2008)
The method regarding the detection by visual was determined in an earlier time in which by the
help of moving objects the system was activated. In this system, the movement regarding the
outside world was observed. Only the objects which were moving were captured and were sent
to the surveillance center. Here wider range of capturing as well as various cameras were
connected to the system so was defined as a completely new feature. In this system, the
detection was considered as object-based as well as statistical multiple features were consisted
of video sequencing. (MEYER .M, HOTTER. M, OHMACHT. T, 1996)
With the advancement, the system which performed on network camera was obtained and was
considered as an intelligent unmanned anti-theft system. Here the cameras were fitted in and
out of the protected area. Now if any of the unrecognized people move to the protected area,
this activity was covered by a camera placed outside of the room. As soon as the intruder steps
into the room, the inside camera starts to cover his activity, and in the case of any unusual
activity or tries to steal than an alert was made immediately. With the help of the algorithm,
the performance was performed as well as the picking of any device from the room was also
denoted and activation of the alarm was done by the algorithm. This system was considered to
be one of the best of all as along with the person it did provide the information of materials
regarding the room. (JONG SUM KIM, DONG HAE YEOM, YOUNG HOON JOO AND JIN BAE PARK,
2010)

13
Among various systems for the security system, the proposed design in this project was
considered to be one of the finest technologies. In this system, a survey regarding the visual
surveillance according to the motion and behaviors of the object was performed. Basically, the
motion regarding the human and the vehicles were considered. This project mainly included
the various modes such as motion detection, modeling of the environment, categorization
regarding the moving objects, tracking, and identification of the human, gaining knowledge
regarding behaviors, and also the integration of the various data regarding multiple cameras.
And in the final result, the possibility of tracking regarding the two as well as three dimensional
was made possible along with the fusion regarding the motion analysis as well of the
biometrics. (WEIMING HU, TIENIU TAN, LIANG WANG, STEVE MAYBANK, SEPTEMBER 2004)

14
CHAPTER 3: COMPONENTS AND TERMINOLOGIES
3.1 POWER SUPPLY SYSTEM
This system is considered as the important factor in any system as it has the main functionality
of converting the mains AC into the required DC voltage, generally in a lower form. There
consists of various types of power supplies such as some of the power switches has the ability
to select the required voltage as it does consists of manual switch whereas, on other cases of
power supplies, the selection of the voltage was performed automatically.
3.2 MICROCONTROLLER
According to the requirement of the design, the selection of the microcontroller is regarded as
the best. Various components such as CPU, RAM, ROM, input ports as well as output ports are
present in the microcontroller. Considering the projects, the microcontroller was considered as
the main component but in the case of the microcontroller, the CPU was considered as the
brain. In the case of microcontroller has the main function as it receives all the data and
information and it has to decide what should be done as an action with the obtained data. The
pin diagram regarding the Atmega8 microcontroller is shown below:

Fig 2. Pin diagram of microcontroller

15
3.3 BUZZER
The buzzer is defined as an audio signal component that can either be a mechanical or electrical
type or piezoelectric in nature. There consists various types of buzzers as well as beepers and
that includes timers as well as alarm devices. These devices are basically used for safety
purposes for various sectors such as homes or any other any locker or any other devices.
3.4 LED
LED is considered a light-emitting diode. the main function of this device is to release the light
during the flow of current across the device. It is generally considered a semiconducting light
source. Here the basic principle of this system is the electrons that are present in the
semiconductor get combined with the electron holes present in the semiconductor resulting in
the formation of photons and releasing it. There consist various colors regarding the light
emission and that color is chosen by the energy of the electrons which is necessary for the
process of the crossing of the bandgap consisting in the semiconductor. By the use of various
semiconductors or by the use of phosphor which has the ability of light emission, the white
light is acquired in the semiconductor device.
3.5 SWITCHES
A switch is considered to be a component of an electrical system that has the ability to either
connect or disconnect the conducting path consisting of an electrical circuit. It also has the
ability to divert the current changing from one conductor to the other conductor. In the recent
period, the most popular as well as common switches are regarded as electromechanical
switches. In this system, it has one or various electrical contacts which are generally movable in
nature and are linked with the external circuits. The basic operation of this device is in the case
of contacts, when two contacts get connected to each other then the passage of the current is
possible but in the case of separation of the contacts, that allows the breakage of the path of
the current resulting in no current flow in the system.
3.6 DIODE
The diode is generally referred to as an electronic component consisting of the double terminal
which has the ability to conduction of current in only one path. In the case of resistance, it
consists of negligible resistance carrying in one direction whereas, in the case of other
direction, the resistance is considerably very greater. In the case of a thermionic diode, it is
generally regarded as a tube consisting of dual electrodes and is a vacuum in nature, the
electrodes are considered as a heated cathode as well as a plate, in this case, the flow is
considered to be only in single path considering the electron. In the recent period, the use of
semiconductor diode is considered to be much greater rather than the other diodes.

16
3.7 CAPACITOR
The capacitor is generally described as a component related to an electronic system that has
the ability to conserve energy in the form of electricity in an electric field. It consists of double
terminals. Capacitance is considered as a result of the effect of the capacitor. The main purpose
of the capacitor is considered to be the main component that was placed so as to increase the
value of capacitance in the circuit. In the case of dual electrical conductors which are generally
in proximity to the circuit, which is the place where the capacitor does exist.
3.8 PROTEUS8 SOFTWARE
Proteus8 software is generally described as the software used for the designing section of the
electronic system and is considered to be proprietary software. Mostly, this software is used to
design the schematics as well as electronic prints in the case for the manufacturing process of
the printing circuit boards and is basically used by engineers related to electronic designs.
3.9 RESISTOR
The resistor is generally defined as an electrical component consisting of double terminals that
has the functionality of the resistance of the electricity in a circuit. In the case of electronic
circuit design, this component is basically used for the reduction of the flow of the current and
also performs the activity of signal level adjustments so as to perform various functions such as
termination of the transmission line, dividing of the voltage, etc. In various filed such as motor
control as well as power distribution system, the use of the higher power resistor was used
which had the ability to release a greater amount of power in the form of heat. In the context
of the resistor consisting of a constant resistance value, the resistance was only changed in
negligible amounts by the effect of temperature or time as well as operating voltage.
3.10 TRANSISTOR
Transistors are commonly considered as a semiconductor which has the ability to either amplify
or could switch the signals in the form of electrical and power. It is considered the most
important component regarding the electronics field. In order to connect this component to the
circuit, it consists of three terminals. In the two terminals of the transistor, either the current or
the voltage is applied to it that has the ability to control the current obtained in the other
terminal. As the output acquired might be greater than that of the input power, as a result, this
transistor did have the ability to amplify the signal.
3.11 TRIAC
TRIAC is generally referred to as the electronic component consisting of three terminals that
have the ability to flow the current in both directions when this device is activated or placed in
the ON position. Generally, TRIODE stands for triode for alternating current. TRIAC is commonly
considered as the subset of the thyristors. By providing the positive or negative voltage with
17
reference to the gate, this TRIAC could be activated. This TRIAC could also be performed as
switches in the case of alternating current as it has the function of bidirectional nature.
3.12 ARDUINO UNO
Arduino UNO is considered to be the microcontroller board consisting of open-source and is
generally based on the microchip ATmega328P microcontroller. In this board, both the input
pins along the output pins are available so as to connect the board to the other circuits.
Generally, this board consists of 14 input and output port which is considered to be in digital
format. Among 14 of the pins, 6 of them were used for the output of the PWM. Six were
considered to input pins for analog. These pins were able to be programmed with the ARDUINO
IDE by the use of a USB cable. This system could be provided the supply externally by the use of
9 V batteries. It has the capability to accept voltage ranging from 7 V to 20V.

18
CHAPTER 4: DESIGN OF THE SYSTEM
4.1 RFID
The denotation for the RFID is considered radio frequency identification. This system mainly
relates to the identification of the system. This system, it consisted of two terms RFID tags and
RFID readers. This system was mainly operated through the communication between the REID
tags along with the RFID readers. According to the operational frequency, the reader range was
considered.
4.1.1 RFID READER
RFID reader was regarded as the most important component in the RFID system. It consists of
RFID antennas, which allowed the tag data to be read by this reader considering the certain
frequency. The radio signals were either produced or accepted by the reader as it was
considered an electronic apparatus. In the case of an antenna, It was basically composed of the
reader which was attached to it. The main purpose of that reader was to convert the signal
consisting of tag ratio considering the capacity of the tags. In the case of RFID readers, it
accepted the RF transmission which was released from an RFID device and was processed
through the host system. The RFID reader consisted of CR10E which had the specifications as
follows. It consisted of a frequency of 125kHz along with a range of reading from 5cm to 10cm.
the communication system was made through USB. In the case of operating temperature, it
consisted of the range of -10 C to 70 C. it consisted of the DC power of 5V. and it consisted of a
buzzer along with LED.
4.1.2 RFID PASSIVE TAG
In the case of the passive RFID tag, the battery was not included. Generally, for the storage of
the identification of every object which was considered to be unique in nature, a microchip was
included. Those identifications were placed in the memory of the RFID in the format of a serial
number. According to the use of the RFID tag on various surroundings, the dimension of the
RFID was dependent upon. A magnetic field was created during the case of the availability of
radio waves, which were contained in the reader, to the chip of an antenna. In this case, power
was gained by the tag which was present in the field, and the information which was stored in
the chip was returned back. Now on the range capacity of the tag, among the range of 3
meters, it could receive hundreds of numbers of tags but with the range increasing more than 3
meters, the ratio of the collection was decreased and was in the range of about 20 tags.
4.1.3 TAG STANDARD
The communication between the reader and tag was very essential to operate the RFID system.
In this case, the technique of near and far-fields was used for the communication of the reader
and tag through its antennas. The gain of energy was very essential by the tag then only the
possibility of response to the reader was done and also communication was possible. In the

19
case of the near field method, the magnetic field which was available on the surface of the
reader antenna was provided by the inductive coupling regarding the tag. In the case of the far-
field method, here the reflection which was backscattered was coupled along the electric field.
In the case of near field, generally lower frequency and higher frequency were considered
whereas, in the case of the far-field, it used a larger read range i.e. ultra-high frequency along
with a microwave.
The proposed design was basically developed for the protection of the locker of the bank by the
application of a microcontroller along with a GSM module. The basic principle related to this
design was if any unknown person having no authorization of opening of the locker tried to
open the locker, then the system activated the alarm once the door was opened and continued
to buzzer still if the door was closed. Also, the SMS was sent to the authorized personnel about
the illegal activity performed on the bank.

Fig 2. Proposed system block diagram


The figure above figure 2 presented the block diagram related to the system. In this system,
12V of DC supply was given to the system by the power supply unit. These consisted of a simple
loop wire that provided the signal of sensing, this signal was provided to the circuit of triggering
by the loop wire. As the triggering circuit gained the signal, the switching circuit was provided
by pulse and also the pulse was sent to the microcontroller. Now, that switching circuit allowed
the buzzer to be activated which produced the sound along with the activation of LED that
provided the signal of light. Now the microcontroller that received the pulse transmitted the
signal to the GSM module and the SMS was sent to the authorized person.

20
4.2 SIMULATION ANALYSIS AND RESULTS
In this design, some of the important components that were used for the performance and
design of the circuits were Arduino Uno, GSM SIM900 module, transistor along the Triac. In this
system, the power supply of 12V was provided to the system which was DC supply, and that
power supply unit was based on various components such as transformer, diode along with a
capacitor. Also, a loop wire was connected to the transistor. Here the loop wire was placed in
the door opening so that it could sense the door activity. One of the terminals of the loop wire
was placed on the base of the NPN transistor whereas the other terminal of the loop was
grounded. The circuit diagram related to the system is shown in figure 3 below.
Fig 3. Circuit diagram of the proposed system
In this system, in the case of opening of the door of the locker, the loop wire which was
adjusted in the door gets cut and due to this action, the transistor base where the one terminal
of the loop wire was connected got positive voltage and the transistor remained in ON position.
Now during the ON state of the transistor, the positive voltage which was acquired during cut
off of the loop wire was provided to the Triac BT136 gate and as a result, that gate obtained the
ON state. During the same period of time of triggering of the gate, the microcontroller which
was placed in the system also acquired the signal which was transmitted by the transistor, and
furthermore, that signal was provided to the GSM module by the microcontroller. As the GSM
module received the signal provided by the microcontroller, it allowed an SMS to be sent to the
mobile number which was associated with the system. Now in the case of Triac, that Triac was
associated along with the buzzer and the LED, as a result, the buzzer was activated and
produced an alert sound which did ring continuously even if the locker door was closed
immediately. At a similar period, the LED associated with the Triac was also activated and was
allowed to glow. Here, in the case of Triac, once the Triac was activated, it did not turn OFF
even by removing the triggering pulse i.e. by closing the door of the locker. As by the principle
of Triac, it will never be turned OFF in the case of DC supply by the case of natural or either by
self-communication. So according to this design, if any thief did open the door, then the alarm
was activated along with the glow of LED, and at a similar period, the SMS was sent to the
authorized personnel of the bank.
In this system, the resistor of Ω was applied so as to control the current of the LED. And for the
case of Triac along with the transistor, K and K of resistors were used which were considered as
the pull-up and pull-down resistors. Also for the case of limitation of the current in the circuit
two resistors consisting of values Ω and Ω were used.
Fig. 4 simulation circuit before the opening of the locker door
Fig. 5 simulation circuit after the opening of the locker door

21
The figure shown above figure 4 represented the simulation circuit of the locker before opening
the door and figure 5 represented the simulation circuit of the locker after opening the door
respectively. Here the simulation of the system was performed on Proteus8 software. We could
observe from figure 4 that there was no activation of the alarm and also the LED was in OFF
position as the one terminal of the loop wire was connected to the base of the transistor. But in
figure 5 where the door is opened, we could observe that the loop wire which was connected
to the base of the transistor was cut off or could be said was made disconnected which resulted
in the activation of the alarm along with the activation of LED as well as microcontroller and
GSM module was activated resulting in the forward of the SMS to the bank manager.

22
CHAPTER 5: DISCUSSION
As security system regarding the locker has been considered as one of the most essential aspect
not only in the case of the bank but also in the house and offices as the activities of thief is
increasing gradually and the method of locking system as per older tradition has not been in
much help. Since in the ancient period the locking system was considered to be of key and lock
system which was very vulnerable and was very easy to break as n there occurred no any alert
sound nor from the breakage of the lock was the sound produced. So the systematic system
was created where the use of sensors as well as alarm and SMS module was invented to discard
all the flaws that were present in the earlier locking system. This system was basically based on
the principle of loop wherewith any unusual activity was found to be happening or anyone
trying to break the locking system consisting in the bank then an alarm was activated which
produced the sound and alerted the security personnel as well all the person in the bank so
that the action was performed accordingly. Along with the alarm, the SMS was also sent to
respective bank personnel so that immediate action was taken by the authorized personnel. In
this system, the microcontroller along with the GSM module was also included so as to perform
the activity of sending messages and alarm activation. For the performance of designing and
simulation, proteus software was used.

23
CHAPTER 6: CONCLUSION
In this design, the locker system related to the bank based on the loop was performed. And the
performance was done by using a microcontroller as well as a GSM module which is specifically
used for sending the SMS to the respective bank manager. The main purpose of this design was
to maintain a higher level of security in the locking system of the banks in case of any condition
of thieves occurred. In this system with the opening of the door, an alarm sound was produced
that alerted the bank staff, as well as, a SMS was also sent to the bank manager so that
respective action was taken. Here, for the performance of the project, proteus software was
utilized and a microcontroller along with a GSM module was introduced.
6.1 ADVANTAGES
The project was based on the design and simulation regarding the loop-based bank locker
security system which used a microcontroller as well as a GSM module. Some of the listed
advantages of this design are as follows:

 With the advancement of technology and the use of a microcontroller and the SMS
system, the reliability of the system was increased.
 Since it consists of a simpler circuit it could be utilized by a normal person also the
installation cost was considered lower.
 It is portable in nature and it consisted of lighter weight which made it easier to be used
in any area as the transportation was easier.
 With the system of GSM, even the owner, not available physically nearer to the device
received SMS in the case of any intrusion activity has occurred as a result they could
take immediate action.

6.2 DISADVANTAGES
Along with many advantageous features, this design did consist of disadvantages which are
listed below:

 This device consists of various components such as a GSM module as well as a


microcontroller which made the system much costlier.

6.3 FUTURE SCOPE


The project regarding the loop-based security system for the locker of the bank was performed
where microcontroller and GSM module was regarded as a basic component. Various
operations were performed and the results were discussed. From the result obtained, it was
seen that there were many areas for its application along with its further improvement. In this

24
system, the video surveillance or CCTV could be added so that identification of the intruder
could be found easily and in faster time period. Also, the SMS system could be made available
in the case of police security so that immediate action could be taken.

25
CHAPTER 7: BIBLIOGRAPHY
ALICE OKE, OLANIYI OLAYEMI MIKAIL, OLADIRAN TAYO ARULOGUN, OLATAYO OLANIYAN. (JANUARY
2009). DEVELOPMENT OF A MICROCONTROLLER-CONTROLLED SECURITY DOOR SYSTEM.

E. MONARI, S. VOTH, K. KROSCHEL. (2008). AN OBJECT-AND TASK-ORIENTED ARCHITECTURE FOR


AUTOMATED VIDEO SURVEILLANCE IN DISTRIBUTED SENSOR NETWORKS. 2008 IEEE FIFTH
INTERNATIONAL CONFERENCE ON ADVANCED VIDEO AND SIGNAL BASED SURVEILLANCE.

GUIFEN GU, GUILI PENG. (2010). THE SURVEY OF GSM WIRELESS COMMUNICATION SYSTEM. 2010
INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATION.

Haritaoglu, I., Harwood, D., & Davis, L. (2000). W/sup 4/: real-time surveillance of people and their
activities. IEEE Transactions on Pattern Analysis and Machine Intelligence.

Hwang, I.-k., Lee, D.-s., & Baek, J.-w. (2009). Home network configuring scheme for all-electric
appliances using ZigBee-based integrated remote controller. : IEEE Transactions on Consumer Electronics
( Volume: 55, Issue: 3, August 2009).

JONG SUM KIM, DONG HAE YEOM, YOUNG HOON JOO, AND JIN BAE PARK. (2010). INTELLIGENT
UNMANNED ANTI-THEFT SYSTEM USING NETWORK CAMERA. INTERNATIONAL JOURNAL OF CONTROL,
AUTOMATION, AND SYSTEM.

Lee, H.-b., Park, L.-j., Park, S.-w., Chung, T.-y., & Moon, J.-h. (2010). Interactive remote control of legacy
home appliances through a virtually wired sensor network. IEEE Transactions on Consumer Electronics
( Volume: 56, Issue: 4, November 2010).

LILI WAN, TIEJUN CHEN. (2008). AUTOMOBILE ANTI-THEFT SYSTEM DESIGN BASED ON GSM.
INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL.

M. Valera, S. V. (2005). Intelligent distributed surveillance systems: a review.

MAHMOUD MOGHAVVEMI, LU CHIN SENG. (2004). PYROELECTRIC INFRARED SENSOR FOR INTRUDER
DETECTION. 2004 IEEE REGION 10 CONFERENCE TENCON 2004 .

MEYER .M, HOTTER. M, OHMACHT. T. (1996). A NEW SYSTEM FOR VIDEO-BASED DETECTION OF
MOVING OBJECTS AND ITS INTEGRATION INTO DIGITAL NETWORKS. 1996 30TH ANNUAL
INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY.

Meyer, M., Hotter, M., & Ohmacht, T. (1998). New options in video surveillance applications using
multiple views of a scene. Proceedings IEEE 32nd Annual 1998 International Carnahan Conference on
Security Technology (Cat. No.98CH36209).

MIN KYUNG LEE, ANIND DEY, SCOTT DAVIDOFF. (2006). SOCIAL-AWARENESS REQUIREMENTS FOR A
SMART HOME. IN: PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON INTELLIGENT
ENVIRONMENT.

26
Oren, M., Papageorgiou, C., Sinha, P., Osuna, E., & Poggio, T. (1997). Pedestrian detection using wavelet
templates. Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern
Recognition.

r. stern, j. h. (2000). speech recognition in mobile enviroNments.

WEIMING HU, TIENIU TAN, LIANG WANG, STEVE MAYBANK. (SEPTEMBER 2004). A SURVEY ON VISUAL
SURVEILLANCE OF OBJECT MOTION AND BEHAVIOURS. IEEE Transactions on Systems Man and
Cybernetics-Part C (Applications and Reviews) 34(3):334 - 352.

YANBO ZHAO, ZHAOHUI YE. (2008). A LOW-COST GSM/GPRS-BASED WIRELESS HOME SECURITY SYSTEM.
IEEE TRANSACTION ON CONSUMER ELECTRONICS.

27

You might also like