International Journal of Engineering Trends and Technology (IJETT) – Volume23 Number 1- May 2015 NFC Based Bank Locker System M.P.Manjunath1, P.M.Ram Kumar2, Pradeep Kumar3, Nalajala Gopinath4, Ms. Haripriya M.E.,(Ph.d)5 Department of Electronics and Communication Engineering Saveetha School Of Engineering, Saveetha University AbstractIn today’s world, security in the banks has become a question of safety among the people. Keeping this in view, in this project, we have implemented bank locker security system by utilizing NFC devices. NFC is mostly used in credit and debit cards for swiping purposes and also for transferring files from one mobile to another. This paper shows the working of NFC technology for the security of bank lockers. This system uses a bank locker fastened using advanced security system interfaced with a module. The module has ARM processor for manipulating all the operations and it acts as an inter-link between the NFC device and locker. A mobile device having NFC along with the fingerprint scanner is used which will generate an 8 digit passcode by deploying random password generator. This 8 digit passcode is used to access the bank locker. This provides high degree of security for the bank lockers and also checks for the authentication. Keywords: Near Field Communication, Password Generator, and ARM. Random NFC incorporates encryption of data which prohibits the hacking process. It can be used in all the areas and consumes less time. It ingests less power when compared to other methods. NFC does not face interference when it is in close contact with the other device. It is easily accessible and available for all the users. Currently, NFC is available in all the mobile phones and it ensures privacy. It just needs a physical contact between the devices. NFC is a technique of transferring information wirelessly. It can also generate currents inside the submissive devices. It enables the sharing of data through touch. It can work with both active and submissive components. All these features put together, makes NFC a widely accepted technology and it can be used in many applications like trading (making payments), control and security purposes, social networks, games, etc. In the near future, it will enter into almost all the fields and simplifies the manual effort or work. 2. INTRODUCTION 1. RELATED WORKS Initially, the keys were the best choice for the security purposes. But it did not provide much protection since keys can be stolen by other persons. Later, the keypad and biometric scanner were used. Even these techniques had some demerits like if we forget the password, the access is prohibited. Nowadays, the demand for security has been increased tremendously. In particular, the need for reliable methods of safety is a requisite. In order to enhance the level of security, NFC technology can be used. NFC can be used in devices which needs constant supervision. NFC offers many merits. Some of them are: ISSN: 2231-5381 Near Field Communication (NFC) is a technology which permits the smartphones and other similar devices to establish wireless connection with each other by bringing them closer to one another for sharing the data. It allows two way communications and has numerous applications. NFC operates within a limited range, (10cm or less). The NFC enabled device can work in 3 modes namely, (1) It acts like a target. For example, we can use this during payment. (2) It acts like a card reader. (3) It connects all the vicinal devices. The merit of NFC is that it has centralized and common methods for reliable communication. All the NFC based smart phones have distinct apps to make http://www.ijettjournal.org Page 15 International Journal of Engineering Trends and Technology (IJETT) – Volume23 Number 1- May 2015 the access easier. NFC operates at the frequency of 12.59 MHZ between the base station and the mobile station. The important use of NFC is NFC tags. NFC tags has microchips which can small amount of information, particularly it has the capacity to store the data in kilobytes for transfer to other device (data like credit card pin number can be stored in these tags). The data stored in the NFC tags can be erased and it is rewritable. So the same NFC tags can be utilized for many applications. These tags are available in different shapes and sizes. The data contained in the NFC tags can only be encoded by the manufacturers. Therefore, the data is highly secured. NFC has two different techniques for transfer of data. They are Manchester coding and Miller coding. Miller coding ensures more efficient transfer of data than Manchester coding. The transfer of data using NFC takes much less time and it is more efficient. Random password generator is a set of programs or computer hardware which gets the input data from the number generator and immediately creates a password. The main aim is that the random password which is generated should be protected from others and not easily identifiable. In order to improve the strength or the security of the password created by the random password generator, programming languages are employed. The programs are written using Javalanguage in the random password generator. In Java, there is a special class called “SECURE RANDOM” to protect the password created. The generated password is an 8 digit hexadecimal character. The password comprises of a series of symbols, numbers, alphabets and special characters like the ordinary password format. The strength of the password can be found by using probability or information coding techniques. The program for the password generation should be clear and easily available for the users so that errors can be corrected and security can be enhanced. The main advantage of using Java is that the password generated cannot be easily shared or transferred. ARM (Advanced RISC Machine) is a computer processor which has different types of instruction sets for its effective operation. It is a 32 bit or 64 bit processor depending on the type of application. It possesses pipeline architecture, means all the instructions are processed simultaneously. ARM processor is derived from the concept of reduced ISSN: 2231-5381 instruction set computing. It has multi core CPUs which enables faster operation and good efficiency. It is used in computers, mobiles, laptops, PDAs, etc. It has 37 registers each of length 32 bit. The data types in ARM processor can be 8 bit or 16 bit or 32 bit. There are three modes of operation in ARM processor. They are ARM core, JAZELLEs core and THUMB core. When the processor is executing in ARM core, all the instructions are 32 bit wide. When the processor is executing in JAZELLE core, all the instructions have the width of 8 bit. When the processor is executing in THUMB core, all the instructions are 16 bit wide. ARM processor offers many advantages such astruncated cost, less power consumption, minimal heat dissipation, etc. ARM processors have provisions for debugging to carry out various operations like halting, reset. In addition, there are many different categories of processors under ARM architecture namely ARMv1, ARMv2, ARMv3, ARMv4, etc. The ARM processor contains flag register and it can switch modes during interrupts and externally driven events. 3. EXISTING SYSTEM I. Locker systems accessed using keys and locks The basic type of accessing a locker system makes use of keys and locks. In this system, keys play a significant role while users simply lock or may unlock the door by using a key. Though the keys are convenient to use, they still have some demerits. Firstly, people could often unknowingly keep these different types of keys at home or ignore to look at these types of keys seeing that no-one is at household. There is no substitute method to obtain the access to keys until we get a new key. Secondly, it is actually inconvenient to handle a bunch of keys. For illustration, if a user owns several items of property, he has got to carry several bunches regarding keys about. Third, keys gets lost or maybe stolen quickly. The person who possesses the keys will have the ability to gain access as real keys. II. Locker systems accessed using digital keypad In the modern days, keys have been replaced by using digital keypads. They provide simple access and good security compared to keys. It also minimizes the conventional method of carrying larger and heavier bunch of keys. But it suffers from a http://www.ijettjournal.org Page 16 International Journal of Engineering Trends and Technology (IJETT) – Volume23 Number 1- May 2015 disadvantage that when the user enters the passcode it can be spy from a distance by other user. III. Locker systems accessed using digital cards Another approach to security is based on digital cards. Digital cards are defined as the magnet like cards which holds data that it written on it by using a magnetic card reader. By swiping the cards the users gain access to any control system. It is smaller and lighter to carry and easy to use but at the same time it can be accessed by any user if he has that digital card . IV. In order to gain access to the locker, NFC enabled smartphone is placed over the interfacing device on the locker. User is requested to scan his finger on the smartphone. This request pops up when the device is placed over the module using an application. When the user is verified by the smartphone, it will generate an 8-digit random passcode in the application. The user will enter this passcode to access to the bank locker. Locker systems accessed using biometric systems Biometric systems include access using fingers and iris scanner, etc. for authentication of the lockers. It is unique and very simple to access. One of the boonof biometric system is that it cannot be stolen or duplicated. The implementation of fingerprint reader or an iris scanner is too costly. Only by means of powerful hacking systems these finger prints and iris impressions can be duplicated. 4. PROPOSED SYSTEM In order to conquer all these demerits, we are employing NFC. In this paper, we propose a bank locker system based on the concept of twosecure authentication, a security process that provides two means of identification: one of which is typically something that is fingerprint authentication in the smart phone (mobile phone), and the other is typically a 8-digit arbitrary passcode that will be generated after user’s finger is authenticated. The proposed system utilizes near field communication (NFC) smartphone (something that the user has) which on interfacing with the locker provides access to the locker. This method provides advanced level of safety and security rather than a digital passcode or fingerprint scanner or iris scanner. Along with NFC smartphone, the proposed bank locker system uses a secret code that is generated in the smartphone via an application. This provides more assured data interface and information hiding. Information hiding is defined as the process by which information is confidentially communicatedfrom one device to the other device by preventing the human interference. ISSN: 2231-5381 Fig1: Block Diagram of Locker System This block diagram explains the working of the bank locker security system by using NFC devices. The flow of accessing to the bank locker is discussed below. http://www.ijettjournal.org Page 17 International Journal of Engineering Trends and Technology (IJETT) – Volume23 Number 1- May 2015 using the random password generator. Both the hardware and software module will be interfaced as a whole and the working of the system can be envisaged practically. Thus, by using the newly generated password, the bank locker will be successfully and more securely accessed by the user by using NFC technology. It will also ensure advanced level of safety and protection and improve the access control techniques of the bank locker. START REQUEST FOR USER FINGER PRINT No ACCES TO CODE 6. CONCLUSION Finally, the NFC based bank locker system has been designed. This system provides high reliability and enhanced security for the bank lockers. If this system is practically put into use, it will work efficiently and gives more protection. It will also relieve the tension of all the people about the safety in the bank lockers. NFC technology can be used in many other applications. NFC can also be used to control home appliances. As a future work, we will expand this project to even control home appliances, which in turn, will improve the lifetime of the home appliances (high efficiency)since the human intervention is minimal and also provides good safety and security. Yes PROVIDES 8-DIGIT PASSCODE USER ENTERS THE CODE No ACCESS TO THE LOCKER 7. REFERENCES Yes LOCKER OPENS ON USER AUTHENTICATION STOP Fig 2: Flow Chart of Two Step Authentication 5. EXPECTED RESULTS The hardware module which has ARM processor will be interlinked between the NFC enabled smart phone and the bank locker. The NFC enabled smart phone along with a fingerprint scanner is used. The 8 digitpasscode will be automatically generated by ISSN: 2231-5381 [1] Peng-Loon Teh, Huo-Chong Ling, Soon-Nyean Cheong, “NFC Smartphone Based Access Control System Using Information Hiding,” IEEE Conference on Open Systems (ICOS), December 2013. [2]HasooEun,“Conditional Privacy Preserving Security Protocol for NFC Applications,” IEEE Transactions on Consumer Electronics, Vol. 59, No. 1, February 2013. [3] Muhammad QasimSaeed, Colin D.Walter, “Offline NFC Tag Authentication,” The 7th International Conference for Internet Technology and Secured Transactions (ICITST-2012). [4] Esko Strömmer, Marko Jurvansuu, Tuomo Tuikka, Arto Ylisaukko-oja, Harri Rapakko, Jarmo Vesterinen, ”NFC-enabled Wireless Charging,” 4th International Workshop on Near Field Communication,2014. [5] Jukka Riekki, Ivan Sanchez, Mikko Pyykkönen,”NFC-Based User Interfaces,” 4th International Workshop on Near Field Communication,2014. http://www.ijettjournal.org Page 18 International Journal of Engineering Trends and Technology (IJETT) – Volume23 Number 1- May 2015 [6] Charl A. Opperman,Gerhard P. Hancke,” Using NFC-enabled Phones for Remote Data Acquisition and Digital Control,” IEEE Africon 2011 - The Falls Resort and Conference Centre, Livingstone, Zambia, 13 - 15 September 2011. [7] B. Beny,A. Vilmos,K. Kovacs, L. Kutor,”The Design of NFC Based Applications,” International Conference on Intelligent Engineering Systems ,29 June - 1 July, 2007. [8] AA Hussein, and AA Mohammad, "Near Field Communication (NFC)," International Journal of Computer Science and Network Security,vol. 12(2),pp. 93-100,Feb. 2012. [9] J.Christian, J.Scharinger, and Gerald, "NFC Devices: Security and Privacy," in Proc. of the 2008 Third International Conference on Availability,Reliability and Security,pp. 642647,2008. [10] D.Bhattacharyya, R.Ranjan, F.Alisherov, and M.Choi, "Biometric Authentication: A Review," International Journal of Science and Technology,pp. 13-16,Sept. 2009. [11] S Malhotra, “Banking Locker System With Odor Identification & Security Question Using Rfid&Gsm Technology”, 30 September, 2014 ISSN: 2231-5381 http://www.ijettjournal.org Page 19