NFC Based Bank Locker System

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume23 Number 1- May 2015
NFC Based Bank Locker System
M.P.Manjunath1, P.M.Ram Kumar2, Pradeep Kumar3, Nalajala Gopinath4, Ms. Haripriya M.E.,(Ph.d)5
Department of Electronics and Communication Engineering
Saveetha School Of Engineering, Saveetha University
AbstractIn today’s world, security in the banks has become
a question of safety among the people. Keeping
this in view, in this project, we have implemented
bank locker security system by utilizing NFC
devices. NFC is mostly used in credit and debit
cards for swiping purposes and also for
transferring files from one mobile to another. This
paper shows the working of NFC technology for
the security of bank lockers. This system uses a
bank locker fastened using advanced security
system interfaced with a module. The module has
ARM processor for manipulating all the
operations and it acts as an inter-link between the
NFC device and locker. A mobile device having
NFC along with the fingerprint scanner is used
which will generate an 8 digit passcode by
deploying random password generator. This 8
digit passcode is used to access the bank locker.
This provides high degree of security for the bank
lockers and also checks for the authentication.
Keywords: Near Field Communication,
Password Generator, and ARM.
Random
 NFC incorporates encryption of data which
prohibits the hacking process.
 It can be used in all the areas and consumes
less time.
 It ingests less power when compared to other
methods.
 NFC does not face interference when it is in
close contact with the other device.
 It is easily accessible and available for all the
users.
Currently, NFC is available in all the mobile phones
and it ensures privacy. It just needs a physical contact
between the devices. NFC is a technique of
transferring information wirelessly. It can also
generate currents inside the submissive devices. It
enables the sharing of data through touch. It can work
with both active and submissive components. All
these features put together, makes NFC a widely
accepted technology and it can be used in many
applications like trading (making payments), control
and security purposes, social networks, games, etc. In
the near future, it will enter into almost all the fields
and simplifies the manual effort or work.
2. INTRODUCTION
1.
RELATED WORKS
Initially, the keys were the best choice for the
security purposes. But it did not provide much
protection since keys can be stolen by other persons.
Later, the keypad and biometric scanner were used.
Even these techniques had some demerits like if we
forget the password, the access is prohibited.
Nowadays, the demand for security has been
increased tremendously. In particular, the need for
reliable methods of safety is a requisite. In order to
enhance the level of security, NFC technology can be
used. NFC can be used in devices which needs
constant supervision. NFC offers many merits. Some
of them are:
ISSN: 2231-5381
Near Field Communication (NFC) is a technology
which permits the smartphones and other similar
devices to establish wireless connection with each
other by bringing them closer to one another for
sharing the data. It allows two way communications
and has numerous applications. NFC operates within
a limited range, (10cm or less). The NFC enabled
device can work in 3 modes namely,
(1)
It acts like a target. For example, we can use
this during payment.
(2)
It acts like a card reader.
(3)
It connects all the vicinal devices.
The merit of NFC is that it has centralized and
common methods for reliable communication. All the
NFC based smart phones have distinct apps to make
http://www.ijettjournal.org
Page 15
International Journal of Engineering Trends and Technology (IJETT) – Volume23 Number 1- May 2015
the access easier. NFC operates at the frequency of
12.59 MHZ between the base station and the mobile
station. The important use of NFC is NFC tags. NFC
tags has microchips which can small amount of
information, particularly it has the capacity to store
the data in kilobytes for transfer to other device (data
like credit card pin number can be stored in these
tags). The data stored in the NFC tags can be erased
and it is rewritable. So the same NFC tags can be
utilized for many applications. These tags are
available in different shapes and sizes. The data
contained in the NFC tags can only be encoded by
the manufacturers. Therefore, the data is highly
secured. NFC has two different techniques for
transfer of data. They are Manchester coding and
Miller coding. Miller coding ensures more efficient
transfer of data than Manchester coding. The transfer
of data using NFC takes much less time and it is
more efficient.
Random password generator is a set of programs or
computer hardware which gets the input data from
the number generator and immediately creates a
password. The main aim is that the random password
which is generated should be protected from others
and not easily identifiable. In order to improve the
strength or the security of the password created by
the random password generator, programming
languages are employed. The programs are written
using Javalanguage in the random password
generator. In Java, there is a special class called
“SECURE RANDOM” to protect the password
created. The generated password is an 8 digit
hexadecimal character. The password comprises of a
series of symbols, numbers, alphabets and special
characters like the ordinary password format. The
strength of the password can be found by using
probability or information coding techniques. The
program for the password generation should be clear
and easily available for the users so that errors can be
corrected and security can be enhanced. The main
advantage of using Java is that the password
generated cannot be easily shared or transferred.
ARM (Advanced RISC Machine) is a computer
processor which has different types of instruction sets
for its effective operation. It is a 32 bit or 64 bit
processor depending on the type of application. It
possesses pipeline architecture, means all the
instructions are processed simultaneously. ARM
processor is derived from the concept of reduced
ISSN: 2231-5381
instruction set computing. It has multi core CPUs
which enables faster operation and good efficiency. It
is used in computers, mobiles, laptops, PDAs, etc. It
has 37 registers each of length 32 bit. The data types
in ARM processor can be 8 bit or 16 bit or 32 bit.
There are three modes of operation in ARM
processor. They are ARM core, JAZELLEs core and
THUMB core. When the processor is executing in
ARM core, all the instructions are 32 bit wide. When
the processor is executing in JAZELLE core, all the
instructions have the width of 8 bit. When the
processor is executing in THUMB core, all the
instructions are 16 bit wide. ARM processor offers
many advantages such astruncated cost, less power
consumption, minimal heat dissipation, etc. ARM
processors have provisions for debugging to carry out
various operations like halting, reset. In addition,
there are many different categories of processors
under ARM architecture namely ARMv1, ARMv2,
ARMv3, ARMv4, etc. The ARM processor contains
flag register and it can switch modes during
interrupts and externally driven events.
3. EXISTING SYSTEM
I. Locker systems accessed using keys and locks
The basic type of accessing a locker system makes
use of keys and locks. In this system, keys play a
significant role while users simply lock or may
unlock the door by using a key. Though the keys are
convenient to use, they still have some demerits.
Firstly, people could often unknowingly keep these
different types of keys at home or ignore to look at
these types of keys seeing that no-one is at
household. There is no substitute method to obtain
the access to keys until we get a new key. Secondly,
it is actually inconvenient to handle a bunch of keys.
For illustration, if a user owns several items of
property, he has got to carry several bunches
regarding keys about. Third, keys gets lost or maybe
stolen quickly. The person who possesses the keys
will have the ability to gain access as real keys.
II. Locker systems accessed using digital keypad
In the modern days, keys have been replaced by
using digital keypads. They provide simple access
and good security compared to keys.
It also
minimizes the conventional method of carrying larger
and heavier bunch of keys. But it suffers from a
http://www.ijettjournal.org
Page 16
International Journal of Engineering Trends and Technology (IJETT) – Volume23 Number 1- May 2015
disadvantage that when the user enters the passcode it
can be spy from a distance by other user.
III. Locker systems accessed using digital cards
Another approach to security is based on digital
cards. Digital cards are defined as the magnet like
cards which holds data that it written on it by using a
magnetic card reader. By swiping the cards the users
gain access to any control system. It is smaller and
lighter to carry and easy to use but at the same time it
can be accessed by any user if he has that digital card .
IV.
In order to gain access to the locker, NFC enabled
smartphone is placed over the interfacing device on
the locker. User is requested to scan his finger on the
smartphone. This request pops up when the device is
placed over the module using an application. When
the user is verified by the smartphone, it will generate
an 8-digit random passcode in the application. The
user will enter this passcode to access to the bank
locker.
Locker systems accessed using biometric
systems
Biometric systems include access using fingers and
iris scanner, etc. for authentication of the lockers. It
is unique and very simple to access. One of the
boonof biometric system is that it cannot be stolen or
duplicated. The implementation of fingerprint reader
or an iris scanner is too costly. Only by means of
powerful hacking systems these finger prints and iris
impressions can be duplicated.
4. PROPOSED SYSTEM
In order to conquer all these demerits, we are
employing NFC. In this paper, we propose a bank
locker system based on the concept of twosecure authentication, a
security process that
provides two means of identification: one of
which is typically something that is fingerprint
authentication in the smart phone (mobile phone),
and the other is typically a 8-digit arbitrary passcode
that will be generated after user’s finger is
authenticated. The proposed system utilizes near field
communication (NFC) smartphone (something that
the user has) which on interfacing with the locker
provides access to the locker. This method provides
advanced level of safety and security rather than a
digital passcode or fingerprint scanner or iris scanner.
Along with NFC smartphone, the proposed bank
locker system uses a secret code that is generated in
the smartphone via an application. This provides
more assured data interface and information hiding.
Information hiding is defined as the process by which
information is confidentially communicatedfrom one
device to the other device by preventing the human
interference.
ISSN: 2231-5381
Fig1: Block Diagram of Locker System
This block diagram explains the working of the bank
locker security system by using NFC devices.
The flow of accessing to the bank locker is discussed
below.
http://www.ijettjournal.org
Page 17
International Journal of Engineering Trends and Technology (IJETT) – Volume23 Number 1- May 2015
using the random password generator. Both the
hardware and software module will be interfaced as a
whole and the working of the system can be
envisaged practically. Thus, by using the newly
generated password, the bank locker will be
successfully and more securely accessed by the user
by using NFC technology. It will also ensure
advanced level of safety and protection and improve
the access control techniques of the bank locker.
START
REQUEST FOR USER
FINGER PRINT
No
ACCES TO
CODE
6. CONCLUSION
Finally, the NFC based bank locker system has been
designed. This system provides high reliability and
enhanced security for the bank lockers. If this system
is practically put into use, it will work efficiently and
gives more protection. It will also relieve the tension
of all the people about the safety in the bank lockers.
NFC technology can be used in many other
applications. NFC can also be used to control home
appliances. As a future work, we will expand this
project to even control home appliances, which in
turn, will improve the lifetime of the home appliances
(high efficiency)since the human intervention is
minimal and also provides good safety and security.
Yes
PROVIDES 8-DIGIT
PASSCODE
USER ENTERS THE CODE
No
ACCESS
TO THE
LOCKER
7. REFERENCES
Yes
LOCKER OPENS ON USER
AUTHENTICATION
STOP
Fig 2: Flow Chart of Two Step Authentication
5.
EXPECTED RESULTS
The hardware module which has ARM processor will
be interlinked between the NFC enabled smart phone
and the bank locker. The NFC enabled smart phone
along with a fingerprint scanner is used. The 8
digitpasscode will be automatically generated by
ISSN: 2231-5381
[1] Peng-Loon Teh, Huo-Chong Ling, Soon-Nyean
Cheong, “NFC Smartphone Based Access Control
System Using Information Hiding,” IEEE Conference
on Open Systems (ICOS), December 2013.
[2]HasooEun,“Conditional
Privacy
Preserving
Security Protocol for NFC Applications,” IEEE
Transactions on Consumer Electronics, Vol. 59, No.
1, February 2013.
[3] Muhammad QasimSaeed, Colin D.Walter, “Offline NFC Tag Authentication,” The 7th International
Conference for Internet Technology and Secured
Transactions (ICITST-2012).
[4]
Esko Strömmer, Marko Jurvansuu, Tuomo
Tuikka, Arto Ylisaukko-oja,
Harri Rapakko, Jarmo Vesterinen, ”NFC-enabled
Wireless Charging,” 4th International Workshop on
Near Field Communication,2014.
[5] Jukka Riekki, Ivan Sanchez, Mikko
Pyykkönen,”NFC-Based User Interfaces,” 4th
International
Workshop
on
Near
Field
Communication,2014.
http://www.ijettjournal.org
Page 18
International Journal of Engineering Trends and Technology (IJETT) – Volume23 Number 1- May 2015
[6] Charl A. Opperman,Gerhard P. Hancke,” Using
NFC-enabled Phones for Remote Data Acquisition
and Digital Control,” IEEE Africon 2011 - The Falls
Resort and Conference Centre, Livingstone, Zambia,
13 - 15 September 2011.
[7] B. Beny,A. Vilmos,K. Kovacs, L. Kutor,”The
Design of NFC Based Applications,” International
Conference on Intelligent Engineering Systems ,29
June - 1 July, 2007.
[8] AA Hussein, and AA Mohammad, "Near
Field Communication (NFC)," International Journal
of Computer Science and Network Security,vol.
12(2),pp. 93-100,Feb. 2012.
[9] J.Christian, J.Scharinger, and Gerald, "NFC
Devices: Security and Privacy," in Proc. of the
2008
Third
International
Conference
on
Availability,Reliability and Security,pp. 642647,2008.
[10] D.Bhattacharyya, R.Ranjan, F.Alisherov, and
M.Choi, "Biometric Authentication: A Review,"
International Journal of Science and Technology,pp.
13-16,Sept. 2009.
[11] S Malhotra, “Banking Locker System With Odor
Identification & Security Question Using Rfid&Gsm
Technology”, 30 September, 2014
ISSN: 2231-5381
http://www.ijettjournal.org
Page 19
Download