Centralized Authentication Smart Locking System using RFID, Fingerprint, Password and GSM
Keywords:GSM, Keyboard, Microcontroller, RFID, FINGERPRINT, locking of system
The primary aim of implemented project is design of the RFID based high security building locking system, fingerprint, GSM technology, and password. In the implemented system, only authorized person can be enter from the building door locking by scanning his card. The implemented building locking system works based on the RFID, Password, GSM and Fingerprint. The Door locking system can be activated for authorized and valid user by scanning his card and unauthorized user enters in the building a Gsm module sent a message to authority unauthorized user entering in the building.
 Mary Lourde R and Dushyant Khosla, â€œFingerprint Identification in Biometric Security Systemsâ€, InternationalJournal of Computer and Electrical Engineering, Vol. 2, No. 5, October, 2010.
 Hugh Wimberly, Lorie M. Liebrock, â€œUsing Fingerprint Authentication to Reduce SystemSecurity: An Empirical Studyâ€, 2011 IEEE Symposium on Security and Privacy.
 Gangi.Raghu Ram, N.Rajesh Babu, â€œ Tracking objects using RFID and Wireless Sensor Networksâ€ [ijesat] International Journal Of Engineering science & Advanced technology Volume-2, Issue-3
 [Zhang Jinhai, Liu Xinjian, Chen Bo, â€œThe design and implementation of ID Authentication System Based on Fingerprint Identificationâ€, 2011 Fourth International Conference on Intelligent Computation Technology and Automation.
 Pramila D. Kamble, Dr.Bharti, W. Gawali, â€œFingerprint Verification of ATM Security System by Using Biometric and Hybridizationâ€, International Journal of Scientific and Research Publications, Volume 2, Issue 11, November 2012.
 V.Ramya1, B. Palaniappan, V.Sumathi, â€œGsm Based Embedded System For Remote Laboratory Safety Monitoring And Alertingâ€, International Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.6, November 2012.
 Art Conklin1, Glenn Dietrich2, Diane Walz3, â€œPassword-Based Authentication: A System Perspectiveâ€, Proceedings of the 37th Hawaii International Conference on System Sciences â€“ 2004.
 D. Vinod kumar, Prof.M R K Murthy, â€œFingerprint Based ATM Security by using ARM7â€, IOSR Journal of Electronics and Communication Engineering (IOSRJECE) ISSN: 2278-2834 Volume 2, Issue 5 (Sep-Oct 2012).
 F. Yen, Y. Xie, F. Yu, R. P. Yu, and M. Abadi, â€•Host Fingerprinting and Tracking on the Web: Privacy and Security Implicationsâ€, Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS), San Diego, California, USA, 5th February â€“ 8th February 2012.
 N. Nikiforakis, A. Kapravelos, W. Joosen, C. Kruegel, F. Piessens, G. Vigna, "Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting", Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013.
 T. Kohno, A. Broido, and K. Claffy, â€•Remote physical devicefingerprintingâ€–, IEEE Transactions on Dependable and Secure Computing, vol. 2, no. 2, April-June 2005, pp. 93â€“108.
 G. Nakibly, G. Shelef, S. Yudilevich, "Hardware Fingerprinting Using HTML5", Cornell University Library (CoRR), abs/1503.01408, Mar. 2015.
 K. Mowery and H. Shacham-Pixel perfect Fingerprinting canvas in HTML5â€–, Proceedings of W2SP 2012, M. Fredrikson, Ed. IEEE Computer Society, May 2012.
 Y. Shu et al., "Gradient-based fingerprinting for indoor localization and tracking", IEEE Trans. Ind. Electron. 63, no. 4, pp. 2424-2433, Apr. 2016.
 S.Sivaranjani,S.Sumathi,"Implementation of Fingerprint and Newborn Footprint Feature Extraction on Raspberry Pi", IEEE Sponsored 2nd International Conference on Innovations in Information Embedded and Communication Systems ICIIECSâ€™ 15.
 D. Maltoni, D. Maio, A. K. Jain, S. Prabhakar, Handbook of Fingerprint Recognition, USA, NY, New York:Springer-Verlag, 2003.
 Q. Zhao, D. Zhang, L. Zhang, N. Luo, "Adaptive fingerprint pore modeling and extraction", Pattern Recognition., vol. 43, no. 8, pp. 2833-2844, Aug. 2010.
 L. Zhang, L. Zhang, D. Zhang, H. Zhu, "Online finger-knuckle-print verification for personal authentication", Pattern Recognit., vol. 43, no. 7, pp. 2560-2571, Jul. 2010.
 L. Zhang, L. Zhang, D. Zhang, "Finger-knuckle-print verification based on band-limited phase-only correlation", Proc. Int. Conf. Comput. Anal. Images Patterns, pp. 141-148, 2009-Sep.
 [Kolla Bhanu Prakash (2015), "Mining issues in traditional indian web documents", Indian Journal of Science and Technology, 8(32).
 Kolla Bhanu Prakash, Dorai Rangaswamy M.A. and Ananthan T.V. (2014), â€œFeature extraction studies in a heterogeneous web worldâ€, International Journal of Applied Engineering Research, Research India Publications,Vol.9,No. 22, pp- 16571-79.
 Kolla Bhanu Prakash, Dorai Rangaswamy M.A. and Arun Raja Raman (2012), â€œANN for Multi-lingual Regional Web Communicationâ€, Lecture Notes in Computer Science, Springer-Verlag Berlin Heidelberg, LNCS 7667, pp. 473-478.
 Kolla Bhanu Prakash, Dorai Rangaswamy M.A. and Arun Raja Raman (2012), â€œStatistical Interpretation for Mining Hybrid Regional Web Documentsâ€, Communications in Computer and Information Scienceâ€™, Springer-Verlag,Berlin-Heidelberg, CCIS 292, pp. 503- 512.
 Kolla Bhanu Prakash and Dorai Rangaswamy M.A. (2016), â€œContent Extraction of Biological Datasets Using Soft Computing Techniquesâ€, Journal of Medical Imaging and Health Informatics, American Scientific Publishers, Vol. 6, 932- 936.
 A Murali, K. Hari Kishore, â€œEfficient and High Speed Key Independent AES Based Authenticated Encryption Architecture using FPGAs â€œInternational Journal of Engineering and Technology(UAE), ISSN No: 2227-524X, Vol No: 7, Issue No: 1.5, Page No: 230-233, January 2018.
 P Ramakrishna, K. Hari Kishore, â€œDesign of Low Power 10GS/s 6-Bit DAC using CMOS Technology â€œInternational Journal of Engineering and Technology(UAE), ISSN No: 2227-524X, Vol No: 7, Issue No: 1.5, Page No: 226-229, January 2018.
 G.S.Spandana,K Hari Kishore â€œA Contemporary Approach For Fault Diagnosis In Testable Reversible Circuits By Employing The CNT Gate Libraryâ€ International Journal of Pure and Applied Mathematics, ISSN No: 1314-3395, Vol No: 115, Issue No: 7, Page No: 537-542, September 2017.
 K Hari Kishore, CVRN Aswin Kumar, T Vijay Srinivas, GV Govardhan, Ch Naga Pavan Kumar, R Venkatesh â€œDesign and Analysis of High Efficient UART on Spartran-6 and Virtex-7 Devicesâ€, International Journal of Applied Engineering Research, ISSN 0973-4562, Volume 10, Number 09 , pp. 23043-23052, June 2015.
 K Bindu Bhargavi, K Hari Kishore â€œLow Power BIST on Memory Interface Logicâ€, International Journal of Applied Engineering Research, ISSN 0973-4562, Volume 10, Number 08 , pp. 21079-21090, May 2015.
 Korraprolu Brahma Reddy, K Hari Kishore, â€œA Mixed Approach for Power Dissipation Reduction in Nanometer CMOS VLSI circuitsâ€, International Journal of Applied Engineering Research, ISSN 0973-4562 Volume 9, Number 18 , pp. 5141-5148, July 2014.
View Full Article:
How to Cite
LicenseAuthors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under aÂ Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (SeeÂ The Effect of Open Access).