International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 9- Sep 2013 An Online Examination System Using Wireless Security Application 1 Madhu Babu Anumolu, 2N.Bharadwaj 1 2 M.Tech, Dept of ECE, CMR College of Engineering and Technology, Hyderabad, AP-India, Assoc Prof, Dept of ECE, CMR College of Engineering and Technology, Hyderabad, AP-India, Abstract— This paper is implemented for online examination security system. Here we are using finger print module for identification of each student and a web cam for taking the image of each student, all the finger prints and images will be stored in the data base using zigbee wireless protocol. This paper operation is done in two modes Enrolment mode and Verification mode. If any finger print (or) image mismatch occur while verification of each student when entering into the examination hall then the buzzer will be blown. Keywords— ARM7, ARM9, Finger print module, PC, Web cam, Zigbee I.INTRODUCTION To provide security for online examination this system has been designed and implemented. In this system we are using finger print module, Zigbee protocol, LCD. This paper is build around ARM7 & ARM9. By this implementation we can achieve full level security system for online examination. As we see now a days in so many examination centres, most of the students appearing as fake persons for writing exams. Even though the examination branch of related university taking enough precautions to prevent situations like this, they are not completely eliminating. Fingerprint identification is the oldest method that has been successfully used in various applications. A Fingerprint, as the name suggests is the print or the impression made by our finger because of the patterns formed on the skin of our palms and fingers. It is fully formed at about seven months of fetus development and finger ridge configurations do not change throughout the life of an individual. Each of our ten fingerprints is different from one another and from those of every other person. Even identical twins have unique finger-prints. That makes them ideal for personal identification. With age, these marks get prominent but the pattern and the structures present in those fine lines do not undergo any change. For their permanence and unique nature, they have been used for not only in identification but also in the field of security as criminal and forensic investigation for a long time. Every fingerprint consist ridges and furrows where the ridges are thick lines while the furrows are space between two ridges. An example of this fingerprint based security system for the national security like examination security of a nation to prevent an unauthorized person to enter into the examination hall because an unauthorized person may enter by easily manipulating the security guard or any other manual security system. For entering, a person can scan their finger on the fingerprint sensor module at the important entry ISSN: 2231-5381 place of the examination hall in perfect manner. If their fingerprint matched with the fingerprints of the database which has made for examination authorized person, then the person can enter otherwise they will be denied. II. RELATED WORK A. ARM9 (Mini2440 | S3C2440 ARM9 Board): The Friendly ARM Mini2440 is a single board computer based on a Samsung S3C2440 ARM9 microprocessor. The S3C2440A is developed with ARM920T core, 0.13um CMOS standard cells and a memory complier. Its low power, simple, elegant and fully static design is particularly suitable for costand power-sensitive applications. It adopts a new bus architecture known as Advanced Micro controller Bus Architecture (AMBA). Figure1: Friendly ARM B.ARM7 (LPC2148): The ARM7TDMI-S is a general purpose 32-bit microprocessor, which offers high performance and very low power consumption. The ARM architecture is based on Reduced Instruction Set Computer (RISC) principles, and the instruction set and related decode mechanism are much simpler than those of micro programmed Complex Instruction Set Computers. This simplicity results in a high instruction throughput and impressive real-time interrupt response from a small and cost-effective processor core. Pipeline techniques are employed so that all parts of the processing and memory systems can operate continuously. http://www.ijettjournal.org Page 3885 International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 9- Sep 2013 Typically, while one instruction is being executed, its successor is being decoded, and a third instruction is being fetched from memory. mesh network form to transmit data over longer distances, passing data through intermediate devices to reach more distant ones and also device can be tasked with running network. It is targeted at applications that require a low data rate, long battery life and secure networking. It has a defined rate of 250kbit/s, best suited for single signal transmission from a sensor or input device. III. SYSTEM IMPLEMENTATION Figure2: ARM7 (LPC2148) board C .Finger Print Module: Fingerprint identification is the oldest method that has been successfully used in various applications. Each of our ten fingerprints is different from one another and from those of every other person. Even identical twins have unique finger-prints. That makes them ideal for personal identification. A fingerprint is made of a series of ridges and furrows on the surface of the finger. The uniqueness of a fingerprint is determined by the pattern of ridges and furrows as well as the minutiae points. Minutiae points are local ridge characteristics that occur when a ridge splits apart or a ridge ends. Figure4: Block diagram of entrance section Figure5: Block diagram of PC section A. Hardware Architecture Figure3: fingerprint conversion into digital D. Zigbee protocol: In this project we are using Zigbee Technology for the purpose of wireless communication between fingerprint sensor module and the PC. This technology was developed for a wireless personal area networks (PAN), aimed to control low data rate and low power consumption. In this technology we can use application of both WI-FI and Bluetooth. It relies upon IEEE 802.15.4, which has excellent performance in low SNR environments. It is a specification for a suite of high level communication protocols. Using small, low-power digital radios based on an IEEE 802 standard for personal. Its devices are often used in ISSN: 2231-5381 A fingerprint scanner, LCD display, Zigbee device and a Personal Computer will be used as hardware in this project. Where the finger print scanner scan a finger of a person and sends its image to the Zigbee device through a USB connection while the Personal Computer(PC) houses the database and runs some relevant application to compare and matching the database fingerprints to the scanned fingerprint. LCD display will be displaying accurate all database details information about the relevant person with the help of a connection to the PC. After matching the database is updated automatically. This paper operation is done in two modes Enrolment mode and Verification mode. In enrolment mode each student should place finger on the surface of the finger print module and each student image also will be captured using web cam, all the finger prints and images will be sent into the data base using zigbee protocol, where all the finger prints and images are stored along with their details like: Name, Registration id, etc. http://www.ijettjournal.org Page 3886 International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 9- Sep 2013 Second mode is verification, in this mode when student entering the examination hall this system ask the student to place the finger on the finger print module and also web captures the image and send to data base. If the images and finger prints matches with the data base then the stepper motor will rotate anti clock wise direction then door will be open after some delay, the stepper motor will rotate clock wise direction then door will be closed through ULN2003, if any finger print(or)image mismatches then the buzzer will blown. B. Software Architecture: In this system we are using software architecture as Database and Application Program. Database: The database consists of tables that stores records implemented in Microsoft SQL Server database. However, this can be migrated to any other relational database of choice. SQL Server is fast and easy, it can store a very large record and requires little configuration. C. Application Program: The application program is developed with Microsoft C# programming language using Microsoft Visual Studio framework and it provides a user interface for the security system. The advantages of Microsoft C# programming language are its robustness, easy to program, has an excellent database connectivity, runs on the two most common operating system platforms (Windows and Unix) and it has a larger user community that provides online support. IV. RESULTS A. For Authorized Person No. of Person Successful Identification Unsuccessful Identification 30 29 01 Accuracy 96.7% B.For Unauthorized Person No. of Unsuccessful Person Successful Identification As Defined 05 05 00 Accuracy Identification 100% V. CONCLUSION AND FUTURE WORK This paper is implemented successfully with basic requirements needed for security of online examination. The proposed approach uses the technique which combines a unique biometrics and the concept of wireless communication. Fingerprint provides a solution for protecting the privacy of the user; since the user’s true biometric feature is never changed in the whole life. Fingerprint is used for the better security and accuracy. This common wireless security system can be extended in future by using several different types of required database that will be very hard to break by the attackers and thus it can provide better security. REFERENCES [1] (2009) The Zigbee Alliance website [Online]. Available: http://www.zigbee.org/ [2] chae, M.J., Yoo, H.S., Kim, J.R., and cho, M.Y., “Bridge condition Monitoring System using Wireless Network”. Figure6: Mini 2440 [3] Cirronet, ZMN2405/HP ZigbeeTM Module Developer’s Kit user manual, Rev A 2007. This system has been verified to observe the 30 authorized and 05 unauthorized people for entry into the examination hall. In case of authorized, 30 identification have been identified successfully and only one identification didn’t recognize due to their wrong manner of giving fingerprint and in case of unauthorized person all person have been successfully denied. Accuracy in both situations is shown below (Table. 1&2). ISSN: 2231-5381 [4] D.maltoni, D.manio, A.K Join & S.prabhakar, Hand Book of finger print recognition, sprinager 2003. [5] Prabhakar .S., Wang.J., Join, A.K., Pankanti.S., and Bolle, R.minutiae verification & classification for finger print matching. [6] Abutaleb and Kamal (1999). Abutaleb A.S. and Kamal M, “A genetic algorithm for the estimation of ridges in finger prints” IEEE truncation on image processing, vol.8, no.8, P.1134,1999. http://www.ijettjournal.org Page 3887