RFID Based Security for Exam Paper Leakage using Electromagnetic Lock System

Similar documents
International Journal of Advance Engineering and Research Development BANK LOCKER OPENING SYSTEM USING RFID

Design and implementation of fingerprint based bank locker system using ARM7 and GSM

Smart Vehicle with Theft Prevention using GSM and GPS

GENERATION OF SECURE ONE TIME PASSWORD FOR ATM SECURITY AND THEFT PROTECTION

AUTOMATED GARBAGE COLLECTION USING GPS AND GSM. Shobana G 1, Sureshkumar R 2

INNOVATIVE AUTOMOBILE SECURITY SYSTEM USING VARIOUS SECURITY MODULES

II. LITERATURE REVIEW

ANTI THEFT CONTROL SYSTEM OF CAR USING ARM7 Gunaganti Ganesh* 1

VEHICLE THEFT DETECTION BY GSM D.Gurunath 1, Dr. Sreeja Mole S S 2, Rekha 3 1

Voice Response System for Parents of Hostel Students

International Journal of Advance Engineering and Research Development REAL TIME VEHICLE TRACKING SYSTEM USING GSM MODEM AND GPS MODULE

EMBEDDED MAJOR PROJECTS LIST

ABSTRACT I. INTRODUCTION

In this lesson we are going to review some of the most used scanning devices.

e-ration System Using RFID and GSM Technolgy

Types of Peripheral Devices

ANTI-THEFT VEHICLE SECURITY SYSTEM USING FINGERPRINT SCANNER AS WELL AS MANUAL

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Analysis of Water Observation Using Ardiuno Based on GSM and Wireless Detector Technology

Human Tracking System using Beagle Board -xm

BIOMETRIC BASED VOTING MACHINE

Door Automation Security System Using OTP

Development of Intelligent Vehicle Network for safety Applications

DEVELOPMENT OF FPGA AND GSM BASED ADVANCED DIGITAL LOCKER SYSTEM

BIOMETRIC PRINTER SECURITY SYSTEM

ASDF India Proceedings of the Intl. Conf. on Innovative trends in Electronics Communication and Applications

Innovative M-Tech projects list IEEE papers

HYBRID SECURITY AUTHENTICATION SYSTEM USING FINGER-VEIN G. Sumalatha* 1, K. Sudhakar Reddy 2

ARM Based Bank Lockers Safety System Using Digital Key Password With Door Access Facility.

REDACTION BASED ATM MONITORING SYSTEM USING MSP 430

Smart Anti-Theft System For Vehicle Security And Tracking

Chapter 2. Literature Survey. 2.1 Remote access technologies

DESIGN OF CALORIMETER BASED ON ARM AND ZIGBEE

Smart Door Lock Opening In Cars Using Face Recognition

Three Level Authentication for Student Attendance Management System

Embedded Technology for Remote Data Logging, Monitoring and Controlling Using GSM/GPRS

Implementation of ATM security using IOT

Authentication Technologies

Bank Locker Security System based On RFID and GSM Technology

International Journal of Engineering Research & Management Technology

IMPLEMENTATION OF SMART DISPLAY SYSTEM

International Journal of Informative & Futuristic Research ISSN:

Realization of RFID Monitoring Access System

Case study of Wireless Technologies in Industrial Applications

SMS Based Household Appliance Monitoring and Controlling System Ms.Shraddha G.Rajkuwar*1, Ms.Rupali G.Bhople*2, Ms.Pooja V.

OMNICOMM ON-BOARD TERMINALS

International Journal of Emerging Technology & Research

A Survey on Various Location Tracking Systems

IGNITION BASED ON FINGERPRINT RECOGNITION

VEHICLE THEFT ALERT & ENGINE LOCK SYSTEM USING ARM7

Design a RFID Technology based Door Security System using GSM Module

Embedded Systems. Software Development & Education Center. (Design & Development with Various µc)

Online Examination System using Embedded Device

INPUT AND OUTPUT DEVICES ANSWER KEY

IoT Based Smart Energy Meter Monitoring and Theft Detection for Home Management System

IOT BASED MOBILE CHARGING WITH SOLAR ENERGY BY COIN INSERTION

Controlling and Monitoring Of Industrial Parameters by Using GSM

EMBEDDED DATA ACQUISITION SYSTEM USING M2M COMMUNICATION

Secured Data Transfer using ZigBee

Sniffer. J.DEEPTHI Associate Professor & HOD, Department of CSE,

[Mule, 4(2), February, 2017] ISSN: IMPACT FACTOR

Verify code : checksum which is equals to the sum of the whole package data except the verify code. device for saving the image taken by the camera.

Voice Recognition Based Smart Home Control System

USER MANUAL. TL400B Fingerprint Lock with Voice Guide Feature. Version: 1.1 Date: Jul. 2017

AUTHORIZATION DATA TRANSMISSION BASED ON WIRELESS TECHNOLOGY

Near Field Communication For Pursuit And Safety Of A Vehicle

M Sathish Kumar* et al ISSN: [IJESAT] [International Journal of Engineering Science & Advanced Technology] Volume-5, Issue-6,

Chaithra S 1, Sowmya B J 2 1 PG Student, Digital Electronics, Department of ECE, SJB Institute of Technology, Bengaluru, India

Assistive Technology for Intellectually Disabled and Physically Challenged People

Under Pipe, Traveling Robot to Detect Gas Line Leakage and Address Navigation to Cloud over IoT

Implementation of Aadhaar Based EVM

3 PHASE FAULT ANALYSIS WITH AUTO RESET FOR TEMPORARY FAULT AND TRIP FOR PREMANENT

Portable Roadside Sensors for Vehicle Counting, Classification, And Speed Measurement

SMART AND SAFETY HELMET FOR A RIDER

An Ethernet Based Control and Monitoring System Using ARM Processor

GUIDELINES ON FEATURES AND TECHNICAL SPECIFICATIONS FOR MOBILE CELLULAR DEVICES IMPORTED INTO AND DISTRIBUTED IN KENYA

VEHICLE SECURITY AND TRACKING SYSTEM WITH CLASH DRIVING ALERT

A REVIEW ON RESEARCH ON AUTHENTICATING MACHINES BY USING HUMAN BIOMERTRIC

GSM MODULE BASED SMART NOTICE BOARD

International Journal of Engineering Research ISSN: & Management Technology

JOURNAL OF INTERNATIONAL ACADEMIC RESEARCH FOR MULTIDISCIPLINARY Impact Factor 1.393, ISSN: , Volume 2, Issue 6, July 2014

B.TECH/M.TECH MINOR/MAJOR PROJECT

LOCKER SECURITY SYSTEM USING RFID AND GSM TECHNOLOGY

GPS tracker Voyager 2N

SMART VEHICLE CONTROLLED SYSTEM

IMPLEMENTATION OF A GUI REMOTE SYSTEM FOR HOME AUTOMATION Awuhe T. Samuel 1, Tingir T. James 2, Kpochi P. Kpochi 3

Face Detection and Recognition for Bank Transaction

A Paper on IOT Based Digital Notice Board using Arduino ATMega 328

Home Automation Using Mobile Communication

IOT BASED HOME AUTOMATION

Innovative M-Tech projects list

International Journal of Modern Trends in Engineering and Research e-issn No.: , Date: April, 2016

International Journal Of Advanced Research In Engineering Technology & Sciences

IOT BASED ENERGY METER WITH TAMPERING DETECTION AND POWER SAVING

CTIS 487: Lecture Notes 1

ZIGBEE BASED WSN AND SERVICE ROBOT INTO AN INTELLIGENT

Smart Dust : Dispersed, Un-tethered Geospatial Monitoring. Dr. Raja R. Kadiyala Chief Technology Officer CH2M HILL - Oakland, CA

Unit title: Mobile Technology: Device Connectivity (SCQF level 5) Outcome 1

BHD-8000 Access Control Keypad and Card Reader. Wiring Diagram

Embedded Systems, Android & Robotics INTERNSHIP CONTENT

Transcription:

Volume 117 No. 20 2017, 845-852 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu RFID Based Security for Exam Paper Leakage using Electromagnetic Lock System Paparao Nalajala 1, Ponna Madhuri 2, M Bhavana 3, Bhavana Godavarthi 4, G Prabhakar Reddy 5 1,3,4 Department of Electronics and Communication Engineering, Institute of Aeronautical Engineering, Dundigal, Hyderabad, India. E-Mail: nprece@gmail.com 2 Department of Electronics and Communication Engineering, St Peters college of Engineering, Hyderabad, India. 5 Department of Computer Science Engineering, Hyderabad Institute of Technology and Management, Hyderabad, India Abstract:The examination is mainly the heart of the education system. The main purpose of the examination is to select the capable candidates for different positions. Each and every year we hear news about postponed/cancelled exam due to paper leakages. So we have come up with a compact and portable solution and decided to design and implement an examination paper leakage protection system which is a highly secured system based on ARM processor. Along with GSM modem, RFID module, keypad, and electromagnetic lock are used in this system. First the question paper comes to the college from university in an electronic sealed box which is called Electronic Control Box. The Electronic Control Box is an embedded system that was designed using ARM processor, which has inbuilt RTC to monitor the Electronic Control Box. If anyone tries to open that box before and after the RFID swipe time duration, the system communicates to the university authorities by sending an SMS (Short Message Service) through GSM that "some malfunctioning has taken place with the Electronic Control Box".In case if the password doesn t match, the user who has access will get the message in his phone. The buzzer will be ON once if the invalid password is entered. So we can easily identify that the exam papers have been leaked. Keywords:Examination papers, ARM processor (LPC2148), RFID, GSM, Keypad, Electromagnetic lock. Introduction Education is basically the motivating force of the society. An examination is the assessment planned to measure the skill, knowledge, physical fitness or aptitude and also classification in so many subjects. An exam may be on paper, on the computer, orally, in exam centers, which are conducted to test, calculate or examine the set of skills. Also the main purpose of the examination is to select the capable candidates for different positions [1] [2]. For the students main issues are question paper leakage, who suffer from the postponed or cancellation of the examination. Each and every year we hear news about postponed/cancelled exam due to paper leakages in the newspaper or on television. Sometimes the university itself doesn t know how there is leakage of any information content related to question papers. Hence, some student gets good rank in minimum time and with less effort and those students who really deserve the rank will not score even after hard work and maximum efforts. This aspect will create negative effect on students and demoralize the growth of society. So we have come up with a compact and portable solution and decided to design and implement an examination paper leakage protection system based on ARM processor [6]. Along with the ARM processor (LPC2148), GSM modem, RFID module, keypad, LCD and electromagnetic lock are used in this system [3]. First the question paper comes to the college from university in an electronic sealed box which is called Electronic Control Box. The Electronic Control Box is an embedded system that was designed using ARM processor, which has inbuilt RTC to monitor the Electronic Control Box. If anyone tries to open that box before and after the RFID [1] [4] swipe time duration, the system communicates to the university authorities by sending an SMS (Short Message Service) through GSM (Global System for Mobile communication) that "some malfunctioning has taken place with the Electronic Control Box". 845

Figure.1. System Block Diagram The university authorities send a unique password to the chief authority of the college before 10 minutes of the exam. The chief authority has been given a valid RFID card along with a dummy RFID card from the university. The authorized person swipes the card [5]. The system acknowledges for the password if the card is valid. Chief examiner needs to type the password which is provided by the university using the keyboard. If password is correct, the electromagnetic lock rotates and unlocks the Electronic Control Box. This system has two transceivers. The transceiver 1 is an embedded system related to the Electronic Control Box. The transceiver 2 is the mobile phone with the university authorities. The present module work deals with the hardware and software part Problem Definition In this system we are using first level security which is an RFID [6] [9]card with a particular or unique number which is provided by university to every college. GSM is used for any unauthorized user tampering. If any unauthorized users try to open the box, then immediately a message will go to the university authorities through the GSM. The Keypad is the second level security in this system for date, time and password matching. Related Research Today the system which is in wide use involves the practice followed from many years. This involvesthe sealed boxes containing the question papers which will be distributed to the examination centers. This system involves many disadvantages which may lead to leakage of question papers at various instances while the box is moved from printing location to examination centers. This happens due to easy tampering of sealed boxes and more human interference. The other method which is in use today involves the mailing of the question papers from the university to respective colleges prior to examination. The colleges take the printouts of the question paper and then the examination procedure follows. Even this particular method also involves many disadvantages. The sever breakdown may occur, website may be hacked, and more than 100 colleges should take printoutswhich involves the threats like power failure, system failure and leakage of the paper. The idea for the proposed system which involves the electronic protection is derived from modern day equipments like automated teller machine (ATM), Electronic lockers and other security enhanced electronic systems. This system involves the integration of certain electronic peripherals that works on the technologies based on RFID, GSM, I2C, and UART [7] [8]. System Implementation RFID Reader module 846

Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically stored information. Passive tags collect energy from a nearby RFID reader's interrogating radio waves. Active tags have a local power source (such as a battery) and may operate hundreds of meters from the RFID reader. Unlike a barcode, the tag need not be within the line of sight of the reader, so it may be embedded in the tracked object. RFID [9] is one method for Automatic Identification and Data Capture (AIDC). GSM module Figure.2. RFID Reader GSM is a standard developed by the European Telecommunications Standards Institute (ETSI) to describe the protocols for second-generation digital cellular networks. 2G networks developed as a replacement for first generation analog cellular networks, and the GSM standard originally described as a digital, circuit-switched network optimized for full duplex voice telephony. This expanded over time to include data communications, first by circuit-switched transport, then by packet data transport via GPRS (General Packet Radio Services) and EDGE (Enhanced Data rates for GSM Evolution, or EGPRS). Subsequently, the 3GPP developed third-generation (3G) UMTS standards, followed by fourth-generation (4G) LTE Advanced standards, which do not form part of the ETSI GSM standard. GSM is a trademark owned by the GSM Association. It may also refer to the (initially) most common voice codec used, Full Rate. Electromagnetic lock Figure.2.1. GSM Module An electromagnetic lock is a locking device that consists of an electromagnet and an armature plate. There are two main types of electric locking devices. Locking devices can be either "fail safe" or "fail secure". A failsecure locking device remains locked when power is lost. Fail-safe locking devices are unlocked when de-energized. Typical single door electromagnetic locks are offered in both 600 lbs.(272 kg) and 1200 lbs. (544 kg) dynamic holding force capacities. The strength of today's magnetic locks compares well with that of conventional door locks and they cost less than conventional light bulbs to operate. 847

Working Operation Figure.2.2. Electromagnetic Lock a. The kit is first switched ON by giving the power supply. b. The LCD gives a welcome message. The kit should be reset for proper functioning. c. A card is to be shown at the RFID reader which reads the information encoded in the card. d. The prompt asks to enter a mobile number to which the OTP has to be sent. e. The prompt asks to show the card. If the card is valid, then it sends an OTP the given mobile number. Otherwise a message is sent to the number that an unauthorized action has been taken place. f. The OTP needs to be entered by using the keypad. g. If the OTP entered is correct, the lock gets opened. Otherwise, a message is sent to the authorities about the unauthorized access. Figure.3. Working Condition of Electronic magnetic lock 848

Flow Chart Hard Ware Result Figure.3 Systems Design Flow Chart Figure.4. System Hard ware description The diagram for the Exam paper leakage protection system is shown in fig.1. Vibration sensor is connected to the port pin of Microcontroller. GSM Module is connected to the port pin of transmitter pin of microcontroller and receiver pin is connected to RFID reader module. Matrix key board connected to complete eight bit port. When did it gets vibrations before time then it will be connected to ground i. e. active low. And into controller programming we read the data from inbuilt. Mobile number and sent it to SMS sending i.e. at command format. 849

Figure.4.1 Device Initialize with GSM Module Figure.4.2. Authorized person access then OTP Sent to Mobile Figure4.3. If entered wrong password it gives unauthorised Access Applications i. This project can be extended to protect the answer sheets to send it to the university authorities. ii. It can also be used in various other applications where protection of documents or any valuables is needed. iii. Used in banks for security purposes. Conclusion The Design and its implementation of ARM processor based electronics protection for the exam paper leakage system were effectively carried out with the advantages of minimum peripheral interfaces, low power consumption, low cost, high portability. The response of the system is successfully tested in all the conditions of the system that is mentioned in the system functionality. The compact and cost effective solution for the examination paper leakage system was achieved with ARM processor controller. This project can be extended to protect the answer sheets to send it to the university authorities. It can also be used in various other applications where protection of documents or any valuables is needed. The embedded system can be programmed to close the Electronic Control Box after the completion of the exam References 1. Y.tejuswi, RFID based access card for public enrollment and distribution: a research survey IEEE Journal on selected areas in communication. ISSN-2278-7798, volume2, Issue9, september2013 2. C. Chandra Mouli, V. Ramnath, D. Sailaja, and K. NagabhushanRaju, Embedded System Based Exhaust Fan Control, Lab Experiments -A Journal of Laboratory Experiments, Vol. 11, No. 3, September 2011, pp. 200-201. 3. Paparao Nalajala, Bhavana Godavarthi, Provide Safety in School Children s Vehicle in Urban Environments using Navigation system,international Journal of Applied Engineering Research, ISSN 0973-4562 Volume 12, Number 13 (2017) pp. 3850-3856. 4. C. Nagaraja, C. Chandra Mouli, S. Athavulla, and T. Bheemalingaiah, A Microcontroller Based Programmable Power Supply, Lab Experiments - A Journal of Laboratory Experiments, Vol. 10, No. 4, December 2010, pp. 249-253. 850

5. Pravada P. Wankhade1 and Prof. S. O. Dahad2, "Real Time Vehicle Locking and Tracking System using GSM and GPS Technology-An Anti-theft System", International Journal of Technology And Engineering System(IJTES):Jan March 2011- Vol. 2. No. 3. 6. BhavanaGodavarthi, Paparao Nalajala, Wireless Sensors Based Data Acquisition System using Smart Mobile Application, Internet of things, International Journal of Advanced Trends in Computer Science and Engineering Vol. 5 No.1, pp. 25-29 Jan 2016 7. B Godavarthi, P Nalajala, V Ganapuram, Design and implementation of vehicle navigation system in urban environments using internet of things (IoT),IOP Conference Series: Materials Science and Engineering, Vol. 225 (1), 012262, Sep- 2017. 8. Paparao N, G Bhavana, RTOS Based Image Recognition & Location Finder Using GPS, GSM and OpenCV, International Advanced Research Journal in Science, Engineering and Technology, Vol.2, No. 12, pp. 85-88,Dec 2015 9. BhavanaGodavarthi, Mohammad khadir, Paparao Nalajala, Biomedical sensor based remote monitoring system field of medical and health care,journal of Adavanced research in dynamical and control systems, Vol.9, Issue.4, Pp-210-219. 851

852