Development Of A Microcontroller-Controlled Security Door .

3y ago
24 Views
3 Downloads
338.80 KB
6 Pages
Last View : 13d ago
Last Download : 3m ago
Upload by : Fiona Harless
Transcription

Development of a Microcontroller-Controlled Security Door System.A.O. Oke1, O.M. Olaniyi2*, O.T. Arulogun1, and O.M. Olaniyan21Department of Computer Sciences and Engineering, Ladoke Akintola University of Technology,Ogbomoso, Nigeria.2Department of Electronic and Electrical Engineering, College of Engineering,Bells University of Technology, Ota, Ogun-State, Nigeria.*E-mail: oo.comABSTRACTOver the years, several security measures havebeen employed to combat the menace ofinsecurity of lives and property. This is done bypreventing unauthorized entrance into buildingsthrough entrance doors using conventional andelectronic locks, discrete access code, andbiometric methods such as the finger prints,thumb prints, the iris and facial recognition. In thispaper, a prototyped door security system isdesigned to allow a privileged user to access asecure keyless door where valid smart cardauthentication guarantees an entry. The modelconsists of hardware module and software whichprovides a functionality to allow the door to becontrolled through the authentication of smartcard by the microcontroller unit.(Keywords: access control, security, card reader,smart card, computer control)INTRODUCTIONSecurity over the years has been a source ofconcern to organizations and companies. Thishas caused quite a significant amount of capitalbeing budgeted for improvements on securitysystems, simply because it has been discoveredthat the access control system mechanism is animportant part of an organisation. One of theimportant security systems in building security isdoor access control. The door access control is aphysical security that assures the security of abuilding by limiting access to the building tospecific people and by keeping records of suchentries [3].Most doors are controlled manually especially bysecurity personel employed by the organisation,through the use of handles and locks with key tooperate the locks. Examples are banks, hotels,The Pacific Journal of Science and otels and so on; some are controlled byswitches while others are controlled by thebiometrics technique. The idea of this techniqueis to enable automatic verification of identity bycomputer assessment of one or more behavioraland/or physiological characteristics of a person.Recently, biometric methods used for personalauthentication utilize such features as the face,the voice, the hand shape, the finger print, andthe iris patterns of an individual [4, 5 ,7]. Eachmethodhasitsownadvantagesanddisadvantages based on their usability andsecurity [6, 9].In [1] two distinct technologies in ArtificialIntelligence are outlined: Artificial NeuralNetworks and Facial Recognition were used todevelop a security door system whereauthorization of facial appearance of privilegeusers in the database is the only guarantee forentrance. In the system, the personal computerprocesses the face recognized by the systemdigital camera and compares data with privilegedusers in the database. The control program eithersends a control signal to open theelectromechanical door upon facial existence ordeny entry.Also in [3], an intelligent voice-based door accesscontrol system for building security was proposed.The proposed intelligent voice-based accesscontrol system is a performance biometric whichoffers an ability to provide positive verification ofidentity from an individual's voice characteristicsto access secure locations (e.g. office, laboratory,home). In the system Perceptual LinearPrediction (PLP) coefficients features areextracted from the person voice data and then anAdaptiveNetwork-basedFuzzyInferenceSystems (ANFIS) is used to develop models ofthe authorized persons based on the featureextracted from the authorized person voices.–398–Volume 10. Number 2. November 2009 (Fall)

Although, these proposed models provided anovel approach to door security systems, they aredependent on the control program written oncomputer system and provided access controlusing the parallel port. The PC‟s parallel port isaffected by cross talk and significant reduction inperformanceinlongdistanceparalleltransmission. Besides, computer process controlsystems are generally affected by high initialcosts and increased dependence on maintenance[2].In other to overcome the problems of these PCbased door acesss security control systems, thispaper presents prototyped low cost, lowcomplexity door security system designed toallow a privileged user to access a secure keylessautomated door where valid smart cardauthentication guarantees an entry. In theproposed system an automated door is controlledwith a card reader and the card reader iscontrolled by a control program embedded in amicrocontroller unit. Implementing the systemwith a microcontroller will be of great value,cheaper, portable and much benefit toorganizations who consistently seek a bettermeans of door access control for their firms.THE SYSTEM DESIGNThe system consists of a hardware module andan application program for microcontroller unitdeveloped in Mikrobasic programming language.The hardware module comprises three stages:The card reader, the door electromechanical relayinterface, the microcontroller stage and the powersupply unit.The control action is actually performed by themicrocontroller. It processes the signals(requests) that are inputted from the card readerupon the insertion of the valid smart card at theentrance.Theoutputsectionofthemicrocontroller is connected via relays for thedesired operational actions. The stages involvedin this design are shown in the Figure 1.The Card Reader: A card is a small piece ofplastic that holds information in a magnetic stripor microprocessor used in activities such asgetting cash from the Automated Teller Machines(ATM) or making phone calls (i.e. SIM) or openingand closing of a microcontrolled based door.Based on highly optimised construction, the cardreaders are very compact with a discreet and costThe Pacific Journal of Science and ffective design. The readers are usually madewith durable plastic to withstand harshenvironments. The microcontrolled door cardreader is usually equipped with a two waysupervised and secured communication, for theperson to gain entrance through the door and forhim to exit through same door when inside.Theterm used to describe this is card-in and card-out.The two-way communication between a cardreader and the microcontroller is usuallymonitored. The Card In reader is located outsideand used to enter into a building. If there aremultiple doors in the room for one to gainentrance, the Card In database is incremented forall the doors in the room. Such a database list istechnically known as a Muster list. The card outreader is located inside the building and usedwhen exiting a building. In the case of multipleexit doors in a room, the card out database isincremented for all the doors in the room.Thecard acess system is configured to generate a listof people that have „Carded In‟ to enter thebuilding.Upon entrance, user‟s name stays on the musterlist until the user „Carded Out‟ when leaving thebuilding. Figure 2 is a schematic diagram of thebasic principle involved. In the proposedsystem,the card reader is a slot where the cardwill be inserted by the user. On insertion of thecard into the card reader, the card readerdecodes the information in the card by conductingcurrent from one end of the card to another.The decoded signal is send to the microcontrollerunit which works according to its program codespecification.Microcontroller PIC16F84A: The system isdesigned around PIC16f84A microcontroller. ThePIC16f84A is used because it is readily availableand is relatively simple to understand. The PICimplements the software based control andcommands the electromechanical interface circuitto open and/or close the door. The PORT (RB6,RB7) of the PIC was designed to send the outputcontrol signals to the door circuit through the relayswitch of the electromechanical interface circuitand the PORT A (RA0 and RA1) is configured asanalog input to receive voltage values that specifythe state of denial and acceptance of entranceparameter form the card reader. These parametercontrols produces voltage which is reduced to amaximum of 5V s.–399–Volume 10. Number 2. November 2009 (Fall)

POWER SECTION(AC TO DC)DCDCTHEMICROCONTROLLERCARD READERPIC16f84AThe Card ReaderDOORELECRTOMECHANICAL SYSTEMElectromechanicalInterfaceRB6RB7RA 0RA1Door SystemFigure 1: The Functional Block Diagram of the System.NAME ON THEMUSTER LIST)MUSTER LISTJOYBEN.CARD OUT(DELETE NAMESFROM THEMUSTER LIST )Figure 2: Muster List Card Access Configuration.For example, if the card reader accepts valid cardupon the decoding from the PIC, 5V is producedand 0V for an invalid card. The voltage is readthrough the PORT A of the PIC as analog inputand is interpreted to mean high or low dependingon the input. PORT A status is read, the status (1or 0) determine if the electromechanical interfaceThe Pacific Journal of Science and ircuit is triggered or not (1 YES, 0 NO) [7,11].Electromechanical Door Interface Circuit: Inthe model, a simple 12v DC motor and Rack andPinion motion transmission systems were used toprovide translatory motion for the door to openand close upon the command of the–400–Volume 10. Number 2. November 2009 (Fall)

microcontroller unit to the relay circuitry as shownin Figure 3.Figure 3: The Interface Circuit.The relay circuit is responsible for performing theswitching action that energizes the motiontransmission systems to perform door translatorymotion operations [8, 12]. The relay circuittransforms the electrical signal from the PIC intomechanical movement that performs a switchingmechanism to allow the door to open or close.THE SYSTEM CONTROL PROGRAMThe system control program can be accomplishedusing program written in either low level or highlevel language such as C, Java, mikrobasic. Acompiler for a high level language helps to reduceproduction time. Although inline assembly ispossible, the programming was done in theMikrobasic language. The source code has beencommented to facilitate any occasional futureimprovement and maintenance. The code writtenfollowed all the three steps of microcontrollerprogram development that is, Compilation,Burning and Evaluation before it was transformedto the microcontroller through the programmer.Afraction code fragment for the system is givenbelow :Program AutodoorDim i as byteMain:TRISB 0TRISA 0PORTA 0PORTB 0Eloop:PortB.2 1on green light(ready)Delay ms(1000)portB.2 0The Pacific Journal of Science and f PortA.2 1 thenPortB.4 1portB.5 1delay ms(2000)PortB.5 0Delay ms(5000)portB.6 1delay ms(5000)PortB.6 0PortB.4 0End ifGoto EloopEnd.on red light(busy)open doorclose doorrepeatTHE SYSTEM OPERATIONAfter the system is turned on, the door indicator‟slight emitting diode(LED) come ON after somefew seconds, indicating that the door is in theready state. The colour for the ready state isyellow. The yellow LED continually blink to showthat the card slot is ready to accept the card. Theyellow colour also indicates that there is no cardinserted into the card slot, hence a card can beinserted as shown in Figure 4.When a valid card is inserted into the card slot(the reader), the LED light changes from itsyellow colour to the red colour. The red coloursignifies the busy state of the door.The cardreader only functions when the LED is in theready state. The PIC16F84A decodes the nameon the card and compares it with specific nameon its memory.The privilege user gain entrance toa restricted application area by triggering theinterface circuit.The interface circuit thererefore triggers the directmotor driven electromechanical door to slidefrom the left to the right, opening the door for fiveseconds. The door however closes after somefew seconds. The number of seconds it takes thedoor to slide back is a function of how themicrocontroller is programmed.The timing can bechanged if need be by modification of theprogram code in the microcontroller. This is thecompetitive advantage of designing this proposeddoor access control system around PIC16f84Amicrocontroller unit.However, an intruder is denied an entry upon theinsertion of an invalid card.The overall systemdesign and system operation diagram are shownin Figure 5 below.–401–Volume 10. Number 2. November 2009 (Fall)

Process Description1. The Card Reader awaits the insertion of smart card by a privilege User2. The smart card is decoded by the Reader using the PIC program memory3. The PIC16f84A command the interface circuit to trigger the door4.Interface circuit receives the signal and ‘Normalize’ it6. ‘Normalized’ signal is forwarded to the electromechanically InterfaceCircuit7. The DC Motor on the door makes use of the ‘Normalized signal to eitherOPEN or SHUT the DoorConnects to the Port Bof PICConnects the Cardreader to Port A ofthe PICRB 7RA 054Smart Card6The Card ReaderAccessGranted2RB 6Interface CircuitRA 1PICI6F84A3Electomechanical7DoorMDC MotorDecoded Name in The PICMemoryPrivilege UserDecoding sectionThe Card reader accepts validsmart card from a privilege userSoftware OR Application SectionThe PIC compares the theinformation on the card with thecoded instruction in the memoryElectromechanical SectionThe Interface circuit responds tothe control signal from PIC toallow or deny entry.Figure 4: The Overall System Design and System Operation Diagram.Figure 6:The Proposed Model.The Pacific Journal of Science and ��402–Volume 10. Number 2. November 2009 (Fall)

CONCLUSIONThis paper has successfully presented afunctional, low cost and low complexitymicrocontroller based door access controlsystem. The proposed security door systemadopted a valid smart card to authenticate and/ordeny entry to a room or building. A real-lifeequivalent of the prototype can be developed withminimal development costs and with relatively lowoperational costs for environment where highdegrees of security are required like banks,military research areas, and big privateinvestment companies.REFERENCES1.Omidiora, O., M. Olaniyi, and A.A. Ipadeola. 2008.“Development of Security System Using FacialRecognition”. Pacific Journal of Science andTechnology. 9(2):377-386.2.Arulogun, O.T., E.O. Omidiora, and A.O. Owoseni.2006. “Development of a PC Based HouseholdElectricity Management System”. InternationalJournal of Electrical and TelecommunicationSystems Research. 1(1):12-18.3.Winda, W.O. and Mohammed, S. 2007. “IntelligentVoice-Based Door Access Control System UsingAdaptive-Network-Based Fuzzy Inference Systemsfor Building Security”. Journal of ComputerScience. 3(5): 274-280.4.Kung, S.Y., M.W. Mak, and S.H. Lin. 2004.Biometric Authentication: Machine LearningApproach. Prentice Hall: Englewood, NJ.5.Osadciw, L., P. Varshney, and K.Veeramachaneni. 2002. “Improving PersonalIdentification Accuracy Using Multi sensor Fusionfor Building Access Control Application”. In:Proceedings the Fifth International Conference forInformation Fusion. 1176- 1183.6.Zhang, D.D. 2000. Automated Biometrics:Technologies and Systems. Kluwer Academic,Prentice Hall: Englewood, NJ.7.ADSL. 2009. “All Data Sheet Library”. (RetrievedMarch 21, 2009). http://www.alldatasheet.com.8.Wikipedia. 2009. “Relay”. (Retrieved on March 21,2009). http://www.en.wikipedia.org.9.Fournier, J., H. Li, S.W. Moore, R.D. Mullins, andG.S. Taylor. 2003. “Security Evaluation ofAsynchronous Circuits”. In: Proceedings ofWorkshop on Cryptographic Hardware andThe Pacific Journal of Science and mbedded Systems (CHES2003), LNCS Volume2779:137 - 151.10. Hageman, S. 2008. “PIC Development on aShoestring”. (Retrieved on May 24th ,2009).http://www.sonic.net/ shageman.11. Microchip Technology, Inc. 2009. “PIC16F84AData Sheet”. (Retrieved May 30, doc/39582b.pdf12. Adoghe, A.U. and I.A. Odigwe Adoghe. 2008.“Remote Monitor and Controller System for PowerGenerators”. Pacific Journal of Science andTechnology. 9(2):344-350.SUGGESTED CITATIONOke, A.O., O.M. Olaniyi, O.T. Arulogun, and -Controlled Security Door System”.Pacific Journal of Science and Technology.10(2):398-403.Pacific Journal of Science and Technology–403–Volume 10. Number 2. November 2009 (Fall)

digital camera and compares data with privileged users in the database. The control program either . supervised and secured communication, for the person to gain entrance through the door and for . Microcontroller PIC16F84A: The system is designed around PIC16f84A microcontroller. The

Related Documents:

Microcontroller Based Home Automation System Page ix 2.7 MICROCONTROLLER FEATURES' 19 2.8 Microcontroller clock 20 2.9 THE MICROCONTROLLER SYSTEM 20 3.1 SMART HOME CONTROL SYSTEM 23 4.1 AC AND HEATER CONTROL 27 4.2 Temperature meter, day light sensor & water level sensor 28 4.3 REMOTE CONTROL CIRCUIT 29 5.1 Software Development 31 5.2 FINAL .

microcontroller, this project focus only on the PIC16F877A Microcontroller where it's pins as shown in Fig. 6. Fig. 6 Pin diagram of PIC16F877A microcontroller . 3 Automatic street light control Circuit Design . The inputs in the streets lighting system are LDR and photoelectric sensors, after dusk the light sensor .

Ultra-Low Power Microcontroller OVERVIEW The AX8052F100 is a single chip ultra lowpower microcontroller primarily for use in radio applications. The AX8052F100 contains a high speed microcontroller compatible to the industry standard 8052 instruction set. It contains 64 kBytes of FLASH and 8.25 kBytes of internal SRAM. The AX8052F100 features 3 16 bit general purpose timers with capability .

A microcontroller is an integrated chip that is often part of an embedded system. The microcontroller includes a CPU, RAM, ROM, I/O ports, and timers like a standard computer, but . microcontroller programming .Doing t

Abstract—This paper describes new microcontroller platform based on 32-bit ARM Cortex M microcontroller. This platform was developed at our faculty to replaceolder board with Freescale HCS08 microcontroller for use in lessons of microcontroller programming. Main comp

PIC Microcontroller: PIC microcontrollers is a kind of programmable microcontroller which produced by microchip, it can be programmed by many programming language.[3] Fig ( 11 ): PIC Microcontroller Chip H-Bridge (

Pic-Microcontroller Based Fully-Automatic International organization of Scientific Research 14 P a g e Figure 1: System Block Diagram 2.1 PIC16F877A Microcontroller A microcontroller is a microcomputer on a single

AVR vs PIC The two most common microcontroller-brands for hobbyists are probably AVR from Atmel and PIC from Microchip. AVR is the type of microcontroller used on the Arduino. I have used AVR a lot and I think it’s a really good choice of