EWiSECS: A Wireless Keypad Security ... - Semantic Scholar

3 downloads 3938 Views 1MB Size Report
building blocks in today's enterprise security design integrations. In most ... benefits of RF cloud, this work presents a low cost implementation prototype of ...
Vol 6. No. 5, December 2013 African Journal of Computing & ICT © 2013 Afr J Comp & ICT – All Rights Reserved - ISSN 2006-1781 www.ajocict.net

EWiSECS: A Wireless Keypad Security Communication Design for Enterprise Organizations Using Embedded Design Framework *C.M. Nwafor Research & Development Electronics Development Institute (FMST-NASENI) Awka, Nigeria [email protected], K.C. Okafor Research & Development Electronics Development Institute (FMST-NASENI) Awka, Nigeria [email protected], S.E. Mbonu Research & Development Electronics Development Institute (FMST-NASENI) Awka, Nigeria [email protected] I.M. Onwusuru Research & Development Electronics Development Institute (FMST-NASENI) Awka, Nigeria [email protected]

ABSTRACT Contemporarily, enterprise organizations needs a cost effective, more flexible, and highly secured means of access control generally. Essentially, Access Control Systems (ACS) as physical security approaches have kept on evolving, ranging from generic keypads, card readers, shadow access and now biometric access approaches. The use of wireless keypads was conceived as novel approach in ACS designs in this work. We present a research innovation called Embedded Wireless Security Communication System (EWiSECS) using Wireless keypad transceiver module. The system can be deployed either in rooms, halls, banking strong room, financial institution or any place where security is of paramount essence to restrict access. EWiSECS is achieved by the use of an AT89C52 microcontroller programmed to perform required tasks at given times. Also, it features a radio frequency transmitter and receiver, transistor/relays arrangement for switching, an alarm system, wireless keypad for password validation, and 16 x 2 liquid crystal displays for displaying information. Finally, we show a developed Embedded Design Framework (EDF) for EWiSECS. Our design is cost effective and very reliable for organizational models. Keywords: Access Control Systems, Wireless Keypads, Transceiver, Embedded, Framework, Security. African Journal of Computing & ICT Reference Format: C.M. Nwafor, K.C. Okafor, S.E. Mbonu & I.M. Onwusuru (2013). EWiSECS: A Wireless Keypad Security Communication Design for Enterprise Organizations Using Embedded Design Framework. Afr J. of Comp & ICTs. Vol 6, No. 5. Pp 27-34.

1. INTRODUCTION Automatic Access Control systems constitute new building blocks in today’s enterprise security design integrations. In most enterprise organizations, we observed that their present system of security is not very efficient as access doors can be easily be manipulated by the smart larceners that wittily get hold of the keys or the passwords.

In a bank for instance, the door sensors can be easily deceived to grant access to an incoming client. Essentially for organizations where security and human traffic control is of paramount importance, the need for a complete access control mechanism is indispensable in other to curb the menace of insecurity. Exploiting the benefits of RF cloud, this work presents a low cost implementation prototype of EWiSECS for enterprise organisation. 27

Vol 6. No. 5, December 2013 African Journal of Computing & ICT © 2013 Afr J Comp & ICT – All Rights Reserved - ISSN 2006-1781 www.ajocict.net

2. RELATED RESEARCH EFFORTS

3. EMBEDDED DESIGN FRAMEWORK (EDF)

According to Umar F. et al [1], various schemes have been proposed and implemented to successfully accomplish security tasks. S. Kadry & K. Smaili [2], developed a wireless attendance management system that performs iris recognition for employee identification and transfers the data to base station with the help of a PTR2000+ wireless module. P. Simao et al [3], developed a wireless time attendance system which is based on fingerprint identification and ZigBee wireless module. I1-Kyu-Hwang, et al [4], developed a novel system for access monitoring and control based on digital door lock that uses ZigBee sensor network. Aysha Qaiser, Whai-De Chen [5], [6] developed an automatic attendance management system based on RFID devices with GSM interface. S.Ramesh et al [7], developed a microcontroller based bank security system that continuously monitors the sensors of the biometric system (Iris Scanner and Vein Detector), the keypad for the authenticated codes (Unique Password and Registered Identification Number) and the output of wireless motion detector.

In this work, we used an Embedded Design Framework starting from systematic literature review of the context, component review-design, implementation and analysis (with simulations and schematic captures), calculation and choice of component decision tree, assembling and packaging as well as the testing of the EWiSCS. The choice of programming language was determined by the AT89C52 architecture, hence we used Assembly language. After the initial considerations of EDF, this was followed by transferring of the design block by block into a bread board to ascertain the functionality of each block. This individual blocks were integrated to ascertain the general functionality or performance of the entire system, the design was finally mounted permanently on a vero board ready for PCB population design.

Basil Hamed, [8] presented an access control system that uses Bluetooth technology for Authorized Access Security System. The work leverage the use of ATMEL 89C55 microcontroller and visual basic program to build data logger which provides multiple accesses to a protected area such as an office, home, or bank. The data logger was added to the system to make records of users who accessed the system at any time. Bluetooth-enabled mobile phones design is also proposed providing wireless and automatic unlocking. By using the proposed system, a person with mobile phone can use it to get access to environments, such as buildings, labs, rooms, etc. These systems discussed above, though efficient, do not present a cost effective solution to the office automation problem. Some of these systems were implemented using fingerprint module, GSM module, and wireless module which are costly.

The proposed EWiSCS has the ability to receive password wirelessly from a wireless keypad and if correct automatically opens the door, else denials access and if the wrong password is inputted three times an alarm will be activated and the system automatically locks up. The EWiSCS is made of following blocks: the regulated power supply, wireless keypad unit, receiver unit, the control unit, the display section, the switching section, and the audio section as shown in the system block diagram in fig 1. We will now detail the block diagram next.

RF CLOUD

WIRELESS KEYPAD UNIT

DISPLAY DASHBOARD

RECEIVER UNIT ALARM SYSTEM

Again, the use of automatic slide doors (such as slide doors, swing doors, folding doors, revolving doors) has also been commercially produced. For its access control, the application of Card reader (smart) card, Key pad (password), Shadow Access, and Biometric Access is still evolving. This research focused on automatic slide door using wireless keypad because of its simplicity and cost effectiveness. In our proposed EWiSECS, an embedded microcontroller is programmed to accept password wirelessly and opens the door only when a valid password code is supplied and activate an alarm when a wrong password ID is supplied more than three times. For organizations, this design gives the users the opportunity to access the area only when a demand code ID is valid.

POWER SUPPLY SWITCH BOARD UNIT

Embedded CONTROLLER

MOTOR

EWiSECS

Fig 1: Block Diagram of EWiSECS With Wireless Keypad 28

Vol 6. No. 5, December 2013 African Journal of Computing & ICT © 2013 Afr J Comp & ICT – All Rights Reserved - ISSN 2006-1781 www.ajocict.net

(1) EWiSECS Wireless keypad: From fig 2, the wireless keypad unit is made up a mini power supply, keypad, RF transmitter and the controller. Fig 2 shows the schematic capture from Protus ISIS simulation package, were the supplied password IDs is sent to the microcontroller, which processes it and in turn sends it serially to the transmitter connected to its Tx. The transmitter module takes the serial input and transmits it wirelessly. The transmitted signals (password ID) are then received by the receiver module placed away from the source of transmission for necessary action. The RF receiver of EWiSCS receives the transmitted signals and relays them to the microcontroller for processing. The controller on receiving the password from the wireless keypad processes it and checks if it is the right password. If it is the right password the switching unit is activated which in turns activates the opening of the door, else access is denial when the wrong password is inputted.

(2) EWiSECS Display Module From fig.3, the module displays all the activities of the system, making it user friendly. The display unit was realized with a 2*16 Liquid crystal display (LCD). This feature enables the status of the door to be viewed on a screen. The LCD is connected to ports 3.3, 3.4 and 3.5 (pins 13, 14 and 15) of the controller respectively. Through these pins, the microcontroller is able to select register, read/write data to the LCD and enable information to be latched from the data bus. Port 2 consists of pin 21-28. The LCD’s data bus is connected to this port. Through this port the microcontroller is able to send information or instruction codes to the LCD and equally read the contents of the LCD’s internal registers.

In this research, we used port 0- port 3 of the AT 89C52 for both input/output controls. The output of the keypad is fed into the microcontroller through Port 1. The microcontroller then processes the data received and uses it to control the door based on the written flow or control algorithm stored in the ROM of the microcontroller.

Figure 3: LCD interfaced to the AT89C52

(3) EWiSECS Alarm System The alarm system is activated whenever an invalid password ID is supplied three times. Fig 4 shows the schematic capture realized with Protus ISIS.

Figure 2: Wireless Keypad Circuit

29

Vol 6. No. 5, December 2013 African Journal of Computing & ICT © 2013 Afr J Comp & ICT – All Rights Reserved - ISSN 2006-1781 www.ajocict.net

3. EWISECS FUNCTIONAL MECHANISM R? 1k

LS?

Q? BC337

SPEAKER

ALARM SYSTEM

Figure 4: Schematic Capture for the Alarm System (4) EWiSECS Switching Unit The switching circuit of this project was interfaced to the microcontroller through port 3.0 (pin 10), port 3.1 (pin 11), port 3.2 (pin 12) of this port. Based on appropriate signals, the microcontroller activates and deactivates the door through this pin. The switching unit digitally opens or closes a door depending on the signal received from the microcontroller. This unit is made up of three relays and a driver (see fig 5). This unit controls a 12V DC Relay and transistor (BC337), ULN2003 (driver) all connected to port 3 of the microcontroller. Through this port, the microcontroller sends out appropriate instructions needed to either activates or deactivates door. To activate the door, relay1, relay2 and relay3 must be energized by the microcontroller through the driver (ULN2003), on activation of these relays vcc is sent to the vcc terminal, while ground is sent to the ground terminal. Then to deactivate the door only relay1 is energized, while rests are de-energized, to change the terminal of the motor.

The design and construction of EWiSECS using wireless keypad was achieved using the AT89C52 microcontroller acting as the host controller as explained earlier. For its operation, the microcontroller carries out the system control through the program written to it in Assembly language. The circuit in fig 6 is capable of granting access only to the right user through the following viz:: • In its active state (i.e on activation), it demands the user to enter password, which is done using the wireless keypad. • Then on receiving the password ID wirelessly, processes it and if a valid password is entered, access will granted to the user, else if an invalid password ID is supplied, after three attempts, the system then activates an alarm which calls the attention of the security personel, while the system is deactivated. • This system also allows the change of password ID; only and only if the default password ID is inputted correctly. • The liquid crystal display (LCD) displays all the activities of the system, making it user friendly. 4. SYSTEM DESIGN AND IMPLEMENTATION This deals with the generality functions of the construction of Embedded Wireless Security Communication System. It also deals with the techniques used to produce a working circuit from an initial paper design. Fig 6 shows the schematic capture of EWiSECS. We fixed an external crystal oscillator 11 MHz to the controller which emits pulses at a fixed frequency. Since a cycle yields about 12 pulses of the crystal. Mathematically this implies thus: Fosc/12 = 1 Machine cycle ……………….(1) With the AT89C52, the number of instruction cycles per second execution is given by 11,059,000 /12 = 921,583 Hence, Feffective = 921.6khz But the UART or serial communication block further divide this frequency (921.6 KHz) by32 to generate its baud rate. Therefore, the effective frequency available to generate Baud rates is 921.6KHz/32 =28800Hz.The baud rate of AT89C52 are programmed into timers, TH1.

Figure 5: Switching Unit Schematics Capture For the microcontroller to function effectively there must be frequency stability which was achieved using a crystal oscillator with 11.059MHz.

Thus, TH1 value=28800Hz /baud …….….(2) To calculate the base transistor resistance, as well as the other component values, we used the RS data sheet to ascertain the optimal values while simulating the system as shown in fig 6.

30

Vol 6. No. 5, December 2013 African Journal of Computing & ICT © 2013 Afr J Comp & ICT – All Rights Reserved - ISSN 2006-1781 www.ajocict.net

Figure 6: EWiSECS Protus Schematics Capture 4.1. Prototype Implementation In this stage, the prototype design of the microcontroller based security door system using wireless keypad is presented. All the sub-circuits were combined together with the microcontroller to obtain the model of the design. The fig 6 above shows the connection of the various sub-circuits making up the entire system. The simulation schematic capture in fig 6 shows stage I, following the Embedded Design Framework discussed in section III previously. Fig 7a shows the chasis component veroboard layout, Fig 7b shows the Power On Self Test (POST) setup while fig 7c shows the prototype enclosure housing the system components. For the controller, we used Assembly language for the chip programming to generate the required hex files which drives the system.

Figure 7a: Chassis Components Vero board layout (Stage II) 31

Vol 6. No. 5, December 2013 African Journal of Computing & ICT © 2013 Afr J Comp & ICT – All Rights Reserved - ISSN 2006-1781 www.ajocict.net

Figure

7b: Chassis Components Vero board layout on POST (Stage III)

Figure 7c: EWiSECS Prototype Chassis Enclosure (Stage IV) 4.2 System Testing Tests are usually carried out in any work in order to ascertain the level of reliability. In this work, we carried out the tests starting from a virtual implementation of the device using the Proteus software. The written program was loaded into virtual microcontroller and then simulated. This was followed by hardware implementation. After construction, tests were carried out to ensure that the device is functioning in the expected

manner. The following order was followed in carrying out the tests: 1. Testing of components before implementing each unit of the design. The step-down transformer was tested to ensure proper functioning. The rectifier and filter capacitors were equally tester using an AVO meter. The AT89C52 microcontroller was equally tested using an AVO meter to ensure that the

32

Vol 6. No. 5, December 2013 African Journal of Computing & ICT © 2013 Afr J Comp & ICT – All Rights Reserved - ISSN 2006-1781 www.ajocict.net

2.

3.

Voltage between pin 40 (vcc) and PIN 20 (ground) was 5v. The written software was equally debugged to ascertain errors in the program. Test implementation: Each unit was given a preliminary implementation on a breadboard, to ascertain component positions and the various interconnections to be made. This allowed for the removal or adjustment of components or design until the desired result was obtained. Having obtained the desired result, the circuit was implemented on the Vero board. Short and open circuit tests: short and open circuit tests were carried out on all the sections of the project during and after implementation on the Vero board. This was done to prevent any unnoticed solder sputtering during soldering that may lead to unwanted short or open circuiting of terminals.

The LCD dashboard displays “ACCESS GRANTED” or “ACCESS DENIED” and then grant access or denies access respectively, depending on the information it has been fed with. Experimental results obtained after installing the prototype system in R&D II of Electronic Development Institute, Awka, have proven the validity of the system. Future work will attempt to use High speed processors as well as advanced integrations using biometric fuzzy encryption for access controls. REFERENCES [1] F. Umar (2010). Cost Effective Wireless Attendance and Access Control System,Proc. 2010, IEEE Conf. [2] S. Kadry and K. Smaili, “A Design and Implementation of a Wireless Iris Recognition Attendance Management System,” Information Technology and Control, vol. 36 (3), 2007, pp. 323-329.

5. DISCUSSIONS Security is a growing need in over 95% of enterprise organizations today. The absence of adequate security measure in these organizations can result in great damage regardless of the human security agents. Many solutions are available for all levels of access control—from highly restricted areas such as banks, or laboratories and to less restricted areas such as classrooms [1]. The ultimate purpose of developing a cost effective wireless keypad system is to enforce security features of the entire building structure, equipped with appropriate management control. In this paper, this work, facilitates user interaction and fulfills the requirements of supporting autonomous lock devices, easing key distribution compared to physical keys, having minimal requirements for the hardware, and supporting personalized encrypted keys. Our demonstrated prototype was used to evaluate the design, and the evaluation shows that the design works well, consumes minimal power from the hardware and is able to unlock a door. In this work, Embedded Wireless Security Communication System haven passed the necessary tests, is hereby presented. With this implemented system, access is only granted to only to an authorized user.

[3] P. Simao, J. Fonseca, and V. Santos, “Time Attendance System with Multistation and Wireless Communication,” Proc. IEEE International Symposium on Consumer Electronics, 2008, pp. 1-4.

6. CONCLUSIONS / FUTURE WORKS This paper describes a low cost solution to wireless keypad security communication system for efficient access controls. The design is based on the integration of AT89C52 microcontroller and commercially available wireless keypad. In this regard, a Embedded Wireless Security Communication System has been successfully designed and developed. From our tests, the keypad was able to transmit information to the control unit wirelessly, the controller accepts the information transferred and processes it.

[7] S.Ramesh, Soundarya Hariharan and Shruti Arora, “Monitoring And Controlling Of Bank Security System (based on microcontroller), International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 10, October 2012

[4] Kyu-Hwang, Jin-Wook Baek, “Wireless Access Monitoring and Control System based on Digital Door Lock,” IEEE Transactions on Consumer Electronics, vol. 53 (4), Nov. 2007, pp. 1724-1730. [5] Aysha Qaiser and Shoab A. Khan, “Automation of Time and Attendance using RFID Systems,” Proc. International Conference on Emerging Technologies, 2006, pp. 60-63. [6] Whai-De Chen and Hsuan-Pu Chang, “Using RFID Technology to Develop an Attendance System and Avoid Traffic Congestion Around Kindergartens,” Proc. IEEE International Conference on Ubi-Media Computing, 2008, pp. 568-572.

[8] Basil Hamed, “Efficient Authorized Access Security System Control Using ATMEL 89C55 & Mobile Bluetooth, International Journal of Computer Theory and Engineering, Vol. 4, No. 1, February 2012 33

Vol 6. No. 5, December 2013 African Journal of Computing & ICT © 2013 Afr J Comp & ICT – All Rights Reserved - ISSN 2006-1781 www.ajocict.net

Author’s Brief Onwusuru Ijeoma M (nee Uka) is a scientific officer with Electronics Development Institute, (ELDI), Awka, under National Agency for Science and Engineering Infrastructure (NASENI), Nigeria. She has many years of experience in research and development in the areas of technology education, mobile communication systems, inverter system developement and solar application systems. She is offering her Ph.D in Industrial Technical Education with specialization in Electrical Electronics Technology. She has her B.Sc and M.ed in the same field from University of Nigeria Nsukka. She can be reached with the phone number +2348036377039 or e-mail [email protected]. Engr. Okafor Kennedy C. is a Systems Architect and R&D Consultant. He holds B.Eng in Electrical Electronics Engineering, (ESUT), M.Eng in Digital Electronics and Computer Engineering, (UNN) while currently pursuing his PhD in Electronics Engineering at University of Nigeria Nsukka. He works with Electronic Development Institute, Awka under National Agency for Science and Engineering Infrastructure, Nigeria as a Senior R&D Engineer. He has several papers in impact factor journals and have various vendor certifications including Cisco Certified Network Associate, A+, and Server+. He is a member of NSE, IEEE, NCS, and IAENG. His areas of interest include Network Design & Cloud Management, Middleware Technologies, VLSI, Enterprise-Wide Systems, Database Technologies, Application Development, Security, WSN Technologies, and Project Management. He can be reach via Email: [email protected], +2348034180668. Nwafor Chukwubuikem Michael is an Electronic Engineer. He works with Electronic Development Institute, Awka under National Agency for Science and Engineering Infrastructure, Nigeria as an R&D Engineer. He had his B.Eng in Electrical/Electronics and computer Engineering, (UNIZIK), while pursing his M.Eng in Computer and Control Engineering, (UNIZIK). He has 10 publications in reputable international Journals. His areas of interest include Electronic Design & software development, security, and Project Management. He can be reached via E-mail: [email protected]

Engr. Mbonu, Ekene Samuel is a Senior Research Engineer at Electronics Development Institute, Awka, National Agency for Science and Engineering Infrastructure, Nigeria. He obtained Bachelor of Engineering in Electrical/Electronics and Computer Engineering from Nnamdi Azikiwe University, Awka in 2005. In 2012, he was awarded Masters of Engineering in Computer Engineering from the same institution. He is currently pursuing PhD in Control Engineering. His membership of professional bodies includes COREN, NSE, IEEE, ISA and IAENG. His research interest and publications include but not limited to embedded systems, mechatronics systems, flexible automation and fault tolerant systems, self diagnostic systems and intelligent systems, electronic monitoring and reporting systems. He can be contacted through +2348068633798. Emails:[email protected]; [email protected]. 34