International Journal of Electrical, Electronics and Computer Systems (IJEECS)
________________________________________________________________________________________________
________________________________________________________________________________________________
ISSN (Online): 2347-2820, Volume -5, Issue-2, 2017 26
Electronic Key Management System An alternative to ancient time key management facilities
1S. S. Pansare, 2Gauravraj Sah, 3Sudarshan Bidve, 4Subodhkant Khaire Dept. of Electronics & Telecommunication, MESCOE, PUNE, Maharashtra, India
2,3,4
B.E. Students - EnTC, MESCOE, PUNE, Maharashtra, India
1[email protected], 2[email protected], 3[email protected], 4[email protected]
Abstract — In schools, colleges and various working places keys are to be taken for opening certain doors cabins and various other cupboards. So the students and staffs have to make an entry in the register that they are being given that specific key. A separate individual is needed to be appointed to make an entry of the person who took away the key, and also while returning the key the person has to sign on the register. This whole process can be simplified using electronic key management system. This is a RFID based electronic key management system, which holds the key securely and provides it to authorized personnel only.
It is controlled through a master computer which contains software which keeps records of authorization of the personnel. We can set or assign a personnel’s id number or the RFID code in the software such that the personnel can use this RFID card to withdraw or deposit the keys.
Keyword — RFID card and module, Fingerprint sensor, Keys, ARDUINO UNO, GPRS, Security.
I.
INTRODUCTION
The Electronic Key Management system is used for communication security key management, accounting and distribution. Specifically it generates and distributes electronic key material whose keys are loaded using standard fill devices. Additionally this system performs account registration, privilege management, ordering, distribution and accounting to direct the management and distribution of physical communication security material for the services.
Fig: 1. Electronic Key Management
II.
OBJECTIVES
There are a lot of objectives of this system, as it requires low power, low maintenance, no external storage and thus it’s not bulky, easy to handle and operate and has low cost investment. Some of the major objectives are as follows:
Handling of Keys becomes easy.
Reduces human efforts in maintaining the records.
Security of the classified laboratories and industries increases.
Maintains an accurate record of issuing and depositing of the key.
Only authorized personnel can have the access to the keys.
Time factor for issuing and returning of the key reduces to a great extent.
III.
ADVANTAGES
Main and specific advantage includes:
1. Small, compact and easy to use.
2. Functions based on Arduino UNO, which can be easily programmed for any changes.
3. New functions can be easily uploaded by writing 3- 4 lines of code.
4. It works at the input of very little voltage of 5-6 V, which at the time of power failure can be given through battery supply.
International Journal of Electrical, Electronics and Computer Systems (IJEECS)
________________________________________________________________________________________________
________________________________________________________________________________________________
ISSN (Online): 2347-2820, Volume -5, Issue-2, 2017 27
IV.
BLOCK DIAGRAM & DESCRIPTION
Fig: 2. Block diagram of EMK System.
The system is completely based on the RFID. The basic components of the system are RFID TAG (Identity Card- 125 KHZ), RFID module (EM-18, 125 KHZ), Biometric Sensor (751), Microcontroller (ARDUINO UNO MEGA), LCD (16x2), 1.44‖ TFT LCD, Solenoid Locks, GPRS and the master computer that will handle all the process and record it in an excel sheet.
The programming is using basic C language in ARDUINO software. And the output is seen on the serial window.
Fig: 3. Descriptive Block diagram of EMK System.
V.
PROJECT DESIGN
WORKING DESCRIPTION:
As shown in the fig. 2 & 3, the EKM system has two types of input data which is mandatory to be entered to access any of the keys, those are:
1. The RFID Identity Card, and 2. The Biometrics.
First, a database is created with the unique Identity card number and the personnel name and is then uploaded on the micro controller board.
Thus for accessing a key, a user has to first scan his / her fingerprint in the scanner and then after it gets accessed, he / she has to show their Identity Card in front of the RFID module. The RFID module detects the unique code which is transmitted through the Identity Card. It then matches that code with the predefined data base and if the match is found, the locks get opened and the LEDs
respected to the allotted Key glows so as to easily identify the key. Thus, the key can be issued. As soon as the key is taken out from the system, the computer notes down the date and time of access of keys.
For returning, the same process is followed. The user has to scan his / her fingerprint and after gaining the access, the identity card has to be shown. As the card is detected and the user’s identity is matched to the predefined database, the lock and the corresponding LED glow. As soon as the key is placed in the system, it detects and then notes the date and time of returning of the keys. All the data is stored in the cloud storage which can be accessed by the master computer.
If the user doesn’t returns the key after a predefine interval of time, with the help of pre-defined commands and GPRS setting, a message is sent to the users registered mobile number, consisting of a reminder for returning the key which he / she has issued. This largely helps in increasing the security of the organizations, as if anyone unauthorized person issues the key, the message is sent to the registered mobile number and hence if that user has not issued any such key, he / she can inform the security immediately.
This can help to identify the intruder and can be caught by visualizing him / her in the camera placed just near to the EKM system.
SOFTWARE & PROGRAMMING:
The software for this project is written in Arduino indoctrination language. The Arduino UNO is programmed using Arduino IDE software.
Programming language in Arduino IDE is same as C programming. The code contains functions, keywords, datatypes, etc. The only difference is that some special functions are already defines and saved in the library. To use those functions a single line code is required in the program.
Fig: 4 – Project Design Flow
RFID Reader reads the ID card with RFID tag
System matches the Information with the stored
Database
Unlocks the lock and indicates the key using
LED User Removes the key
and the time of issue is recorded
• For returning the key, the same procedure has to be followed
The switch relocks after 5 seconds
International Journal of Electrical, Electronics and Computer Systems (IJEECS)
________________________________________________________________________________________________
________________________________________________________________________________________________
ISSN (Online): 2347-2820, Volume -5, Issue-2, 2017 28
Fig: 5 – KEY Matrix on the Master Computer VI.
APPLICATIONS
Although the use of electronic key management can be limited in comparison to the manual ways, there is a great amount of possibilities that can be developed due to this technology. There are a number of applications of Electronic Key Management System. Some of them are listed below:
High security areas like nuclear stations.
Research Laboratories.
Colleges and Schools.
Ordinance Factories.
Govt. and Private Sectors.
Can be used for TLD management system.
Police stations and prison cells.
Hospitals and pathologies.
Amusement parks.
Banks and other security lockers.
VII.
CONCLUSION
Time taken for the process of issuing and returning the key is reduced. There is no need for appointing an individual for maintaining the records in the register.
The security of the keys has been increased. The user can fetch the key by using two methods:
i. By Use of RFID Identity Card, or ii. By the use of Biometrics.
This system may be proved very helpful in very restricted areas where the entry for unauthorized personnel is restricted. Also the GPRS system may help in reminding the user for returning the key if he / she carry away the key with them, by sending messages to their registers mobile numbers.
FUTURE SCOPE
Electronic key management system can be installed in the various locations such as schools, colleges, various institutes also in industries and in the atomic research centers for security purposes and the task of finding the key becomes easier.
This system can be installed in various banking sectors which help user to easily access the vault key with the necessity of the authorized person.
There can be various modifications which can be made to increase the safety and security of the keys. The time duration for issuing and returning of the keys can be further reduced by decreasing the hardware used.
Further more security features like camera, Keypad access and security alarm can be added for preventing the misuse of the technology.
ACKNOWLEDGEMENT
We would like to articulate our deep gratitude to our project guide Prof. Sunil. S. Pansare for his guidance, advice and support during the course of our project.
We would also like to thank our HOD, Prof. P. B.
Chopade, all faculty members and staff of the Department of Electronics and Telecommunication, MES College of Engineering, Pune, for their generous help and guidance in various ways for this project.
REFRENCES
[1] Wikipedia: ―Radio Frequency Identification.‖
[2] www.alldatasheets.com
[3] Mary Lourde R and Dushyant Khosla,
―Fingerprint Identification in Biometric Security Systems‖, International Journal of Computer and Electrical Engineering, Vol. 2, No. 5, October, 2010.
[4] Want, Roy. ―An Introduction to RFID Technology.‖ Pervasive Computing, January/March 2006.
[5] K. S. Ravi, G. H. Varun, T. Vamsi, P. Pratyusha,
"RFID Based Security System", International Journal of Innovative and Exploring Engineering (IJITEE), vol. 2, no. 5, pp. 132-134, April 2013.
[6] Stephen a. Weis, Sanjay E.Sarma, Ronald.L.Rivest a paper on ―Security and Privacy aspects of low cost radio frequency identification Systems‖.
[7] Gynanendra K Verma, Pawan Tripathi, IIT Allahabad a paper on ―A Digital security system with door locks system using rfid technology‖.
[8] Mingyan Li, Radha Poovendran, Rainer Falk paper on ―multi-domain access control using asymmetric key based tag reader mutual authentication.
[9] M. Van Der Werf, X. Gui and W. L. Xu, "A mobile-based Home Automation System", 2nd international Conference on Mobile Technology, Applications and Systems, Nov 2005, Page(s):5pp.