Centralized Authentication Smart Locking System using RFID, Fingerprint, Password and GSM

  • Authors

    • M Sai Divya
    • M Nagabhushana Rao
  • GSM, Keyboard, Microcontroller, RFID, FINGERPRINT, locking of system
  • The primary aim of implemented project is design of the RFID based high security building locking system, fingerprint, GSM technology, and password. In the implemented system, only authorized person can be enter from the building door locking by scanning his card. The implemented building locking system works based on the RFID, Password, GSM and Fingerprint. The Door locking system can be activated for authorized and valid user by scanning his card and unauthorized user enters in the building a Gsm module sent a message to authority unauthorized user entering in the building.



  • References

    1. [1] Mary Lourde R and Dushyant Khosla, “Fingerprint Identification in Biometric Security Systemsâ€, InternationalJournal of Computer and Electrical Engineering, Vol. 2, No. 5, October, 2010.

      [2] Hugh Wimberly, Lorie M. Liebrock, “Using Fingerprint Authentication to Reduce SystemSecurity: An Empirical Studyâ€, 2011 IEEE Symposium on Security and Privacy.

      [3] Gangi.Raghu Ram, N.Rajesh Babu, “ Tracking objects using RFID and Wireless Sensor Networks†[ijesat] International Journal Of Engineering science & Advanced technology Volume-2, Issue-3

      [4] [Zhang Jinhai, Liu Xinjian, Chen Bo, “The design and implementation of ID Authentication System Based on Fingerprint Identificationâ€, 2011 Fourth International Conference on Intelligent Computation Technology and Automation.

      [5] Pramila D. Kamble, Dr.Bharti, W. Gawali, “Fingerprint Verification of ATM Security System by Using Biometric and Hybridizationâ€, International Journal of Scientific and Research Publications, Volume 2, Issue 11, November 2012.

      [6] V.Ramya1, B. Palaniappan, V.Sumathi, “Gsm Based Embedded System For Remote Laboratory Safety Monitoring And Alertingâ€, International Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.6, November 2012.

      [7] Art Conklin1, Glenn Dietrich2, Diane Walz3, “Password-Based Authentication: A System Perspectiveâ€, Proceedings of the 37th Hawaii International Conference on System Sciences – 2004.

      [8] D. Vinod kumar, Prof.M R K Murthy, “Fingerprint Based ATM Security by using ARM7â€, IOSR Journal of Electronics and Communication Engineering (IOSRJECE) ISSN: 2278-2834 Volume 2, Issue 5 (Sep-Oct 2012).

      [9] F. Yen, Y. Xie, F. Yu, R. P. Yu, and M. Abadi, ―Host Fingerprinting and Tracking on the Web: Privacy and Security Implicationsâ€, Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS), San Diego, California, USA, 5th February – 8th February 2012.

      [10] N. Nikiforakis, A. Kapravelos, W. Joosen, C. Kruegel, F. Piessens, G. Vigna, "Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting", Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013.

      [11] K. Mowery, D. Bogenreif, S. Yilek, and H. Shacham, ―Fingerprinting information in JavaScript implementations‖, Proceedings of W2SP 2011, H. Wang, Ed. IEEE Computer Society, May 2011.

      [12] T. Kohno, A. Broido, and K. Claffy, ―Remote physical devicefingerprinting‖, IEEE Transactions on Dependable and Secure Computing, vol. 2, no. 2, April-June 2005, pp. 93–108.

      [13] G. Nakibly, G. Shelef, S. Yudilevich, "Hardware Fingerprinting Using HTML5", Cornell University Library (CoRR), abs/1503.01408, Mar. 2015.

      [14] K. Mowery and H. Shacham-Pixel perfect Fingerprinting canvas in HTML5‖, Proceedings of W2SP 2012, M. Fredrikson, Ed. IEEE Computer Society, May 2012.

      [15] Y. Shu et al., "Gradient-based fingerprinting for indoor localization and tracking", IEEE Trans. Ind. Electron. 63, no. 4, pp. 2424-2433, Apr. 2016.

      [16] S.Sivaranjani,S.Sumathi,"Implementation of Fingerprint and Newborn Footprint Feature Extraction on Raspberry Pi", IEEE Sponsored 2nd International Conference on Innovations in Information Embedded and Communication Systems ICIIECS’ 15.

      [17] D. Maltoni, D. Maio, A. K. Jain, S. Prabhakar, Handbook of Fingerprint Recognition, USA, NY, New York:Springer-Verlag, 2003.

      [18] Q. Zhao, D. Zhang, L. Zhang, N. Luo, "Adaptive fingerprint pore modeling and extraction", Pattern Recognition., vol. 43, no. 8, pp. 2833-2844, Aug. 2010.

      [19] L. Zhang, L. Zhang, D. Zhang, H. Zhu, "Online finger-knuckle-print verification for personal authentication", Pattern Recognit., vol. 43, no. 7, pp. 2560-2571, Jul. 2010.

      [20] L. Zhang, L. Zhang, D. Zhang, "Finger-knuckle-print verification based on band-limited phase-only correlation", Proc. Int. Conf. Comput. Anal. Images Patterns, pp. 141-148, 2009-Sep.

      [21] [Kolla Bhanu Prakash (2015), "Mining issues in traditional indian web documents", Indian Journal of Science and Technology, 8(32).

      [22] Kolla Bhanu Prakash, Dorai Rangaswamy M.A. and Ananthan T.V. (2014), “Feature extraction studies in a heterogeneous web worldâ€, International Journal of Applied Engineering Research, Research India Publications,Vol.9,No. 22, pp- 16571-79.

      [23] Kolla Bhanu Prakash, Dorai Rangaswamy M.A. and Arun Raja Raman (2012), “ANN for Multi-lingual Regional Web Communicationâ€, Lecture Notes in Computer Science, Springer-Verlag Berlin Heidelberg, LNCS 7667, pp. 473-478.

      [24] Kolla Bhanu Prakash, Dorai Rangaswamy M.A. and Arun Raja Raman (2012), “Statistical Interpretation for Mining Hybrid Regional Web Documentsâ€, Communications in Computer and Information Science’, Springer-Verlag,Berlin-Heidelberg, CCIS 292, pp. 503- 512.

      [25] Kolla Bhanu Prakash and Dorai Rangaswamy M.A. (2016), “Content Extraction of Biological Datasets Using Soft Computing Techniquesâ€, Journal of Medical Imaging and Health Informatics, American Scientific Publishers, Vol. 6, 932- 936.

      [26] A Murali, K. Hari Kishore, “Efficient and High Speed Key Independent AES Based Authenticated Encryption Architecture using FPGAs “International Journal of Engineering and Technology(UAE), ISSN No: 2227-524X, Vol No: 7, Issue No: 1.5, Page No: 230-233, January 2018.

      [27] P Ramakrishna, K. Hari Kishore, “Design of Low Power 10GS/s 6-Bit DAC using CMOS Technology “International Journal of Engineering and Technology(UAE), ISSN No: 2227-524X, Vol No: 7, Issue No: 1.5, Page No: 226-229, January 2018.

      [28] G.S.Spandana,K Hari Kishore “A Contemporary Approach For Fault Diagnosis In Testable Reversible Circuits By Employing The CNT Gate Library†International Journal of Pure and Applied Mathematics, ISSN No: 1314-3395, Vol No: 115, Issue No: 7, Page No: 537-542, September 2017.

      [29] K Hari Kishore, CVRN Aswin Kumar, T Vijay Srinivas, GV Govardhan, Ch Naga Pavan Kumar, R Venkatesh “Design and Analysis of High Efficient UART on Spartran-6 and Virtex-7 Devicesâ€, International Journal of Applied Engineering Research, ISSN 0973-4562, Volume 10, Number 09 , pp. 23043-23052, June 2015.

      [30] K Bindu Bhargavi, K Hari Kishore “Low Power BIST on Memory Interface Logicâ€, International Journal of Applied Engineering Research, ISSN 0973-4562, Volume 10, Number 08 , pp. 21079-21090, May 2015.

      [31] Korraprolu Brahma Reddy, K Hari Kishore, “A Mixed Approach for Power Dissipation Reduction in Nanometer CMOS VLSI circuitsâ€, International Journal of Applied Engineering Research, ISSN 0973-4562 Volume 9, Number 18 , pp. 5141-5148, July 2014.

  • Downloads

  • How to Cite

    Sai Divya, M., & Nagabhushana Rao, M. (2018). Centralized Authentication Smart Locking System using RFID, Fingerprint, Password and GSM. International Journal of Engineering & Technology, 7(3.12), 516-520. https://doi.org/10.14419/ijet.v7i3.12.16170