##plugins.themes.bootstrap3.article.main##

Ubiquitous as mobile technologies are, and the various advancements the technologies have experienced, makes the field pertinent for integration into security systems of buildings. As a security enhancement technique for building access, this project was proposed as a way of paving a way for integration of one time password (OTP) technology using microcontroller to security systems. In addition, the proposed project will be a supplement to the challenges of other security authentication methods centered on Bluetooth, radio frequency identification (RFID), biometrics and voice recognition techniques. In other to reduce complexity in design, a microcontroller was introduced to hub the coordination of the system. The two way verification system which can be coupled with aforementioned security systems, boast of its ability to store numeric identity of each authorized user to a building in the electrical erasable programmable read only memory (EEPROM) of the microcontroller. The system prompt a user wanting to gain access to the building through the door to input designated numeric identity (password) stored in data base. Once the inputted designated numeric identity entered matches an identity in the data base, then for the second verification process, a randomly generated OTP which has a programmed validity of three minutes is sent to the user phone via a GSM (global system for mobile communication) module. If either the password or OTP entered doesn’t match, then access is denied and the user will only be relegated to two limited successful chances with time duration as programmed for retrial before the system reset for the next user. Once there is failure at any stage of verification outside prescribed attempted limit, an alarm is sounded with implication that a burglar is attempting entry. Electric power to the project was driven from an ac mains which was then rectified to power all the dc dependent components used. The low construction cost, user friendliness, flexibility, insured security when compared to other security systems, makes the inovation unique.

Downloads

Download data is not yet available.

References

  1. U. V. Sorochi, G. B. Dubukumah, and I. K. Ayosubomi, ?Microcontroller based speech to text translation system?, European Journal of Engineering Research and Science, vol. 4, no. 12, pp. 149-154, 2019. https://doi.org/10.24018/ejers.2019.4.12.1697
     Google Scholar
  2. G. B. Dubukumah, U. V. Sorochi and A. Salisu ?Fire monitoring, prevention and control system for market shops? Communications on Applied Electronics, vol. 7, no. 31, pp. 26-31, 2019. http://www.caeaccess.org/archives/volume7/number31/861-2019652841
     Google Scholar
  3. C. Linda, and F. Samuel, ?An inside look at RFID
     Google Scholar
  4. Technology?, Journal of Technology Management and
     Google Scholar
  5. Innovation, vol. 2, no. 1, pp. 128-141, 2007.
     Google Scholar
  6. D. Peter, P. Prapassara, and S. Bala (2011). The challenges and issues facing the deployment of RFID technology. Available: https://www.intechopen.com/books/deploying-rfid-challenges-solutions-and-open-issues/the-challenges-and-issues-facing-the-deployment-of-rfid-technology
     Google Scholar
  7. A. Manish, ?Secure electronic lock based on Bluetooth OTP system?, Elins International Journal of Science Engineering and Management, vol. 2, no. 1, pp. 1-3, 2017.
     Google Scholar
  8. B. Patil, V. Mahajan, S. Suryawanshi, M. Pawar, and U. Patole, ?Automatic door lock system using pin on andriod phone?, International Research Journal of Engineering and Technology, vol. 5 no. 11, pp. 1007-1011, 2018.
     Google Scholar
  9. L. Akpan, and A. Osigwe, ?Microcontroller electronic gate?, unpublished undergraduate dissertation, Dept. Electrical Engineering, Federal Polytechnic Nekede, Nigeria, 2012.
     Google Scholar
  10. Quartz ceramic oscillators. (n.d). Retreived from https://www.allaboutcircuits.com/technical-articles/choosing-the-right-oscillator-for-your-microcontroller/
     Google Scholar
  11. What is OTP. (n.d). Retrieved from https://www.cm.com/blog/what-is-otp-one-time-password/
     Google Scholar
  12. D. Ramkrishna, C. Aditi, N. Santosh, and D. Saurabh, ?An approach to implement secure user authentication scheme using secret values extraction from private information and unique biometric images of user directed by randomize numeric and image based OTP?, International journal of applied Engineering Research, vol. 12, no. 19, pp. 8595-8601, 2017.
     Google Scholar
  13. K. Kaushik, B. Ayinala,, and S. Choi, ?Infrared OTP Optical Wireless Communication for Smart Door Locks Using Smart Phones?, presented at 12th International Conference on Mobile Ad-hoc and Sensor Network, China, Google Scholar, 2016.
     Google Scholar
  14. P. Golden, and V. Tennant, ?Evaluation of a Global System for Mobile Communication (GSM) Library System?, International Journal of Multimedia and Ubiquitous Engineering, vol. 3 no. 1, pp. 4-6, 2008.
     Google Scholar
  15. M. Kaur, N. Mohan, P. Sandihu, M. Sandihu, ?GSM Technology Principle, Advantage, Limitation and its Applications?, International Journal of Computer Electrical Engineering, vol. 3, no. 1, pp. 153-154. 2011.
     Google Scholar
  16. Combinational lock. (n.d). Retrieved from https://en.wikipedia.org/wiki/Combination_lock
     Google Scholar
  17. Sliding automatic door. (n.d). Retrieved from https://en.wikipedia.org/wiki/Automatic_door#History
     Google Scholar
  18. Stray capacitance. (n.d). Retrieved from https://blog.adafruit.com/2012/01/24/choosing-the-right-crystal-and-caps-for-your-design/
     Google Scholar
  19. What is stray capacitance? (n.d). Retrieved from http://www.learningaboutelectronics.com/Articles/What-is-stray-capacitance
     Google Scholar