Journal of Advanced Research in Dynamical and Control Systems
Vol. 9. Sp– 16 / 2017
AUTOMATIC SAFE DEPOSIT BOX SECURITY SYSTEM USING ARDUINO UNO Yohannes Yahya1 , TW Wisjhnuadji2, Arunkumar N3 1, 2
Lecturer of bInformation Technology Faculty of Universitas Budi Luhur Jl. Ciledug Raya, Petukangan Utara, Jakarta Selatan-Indonesia
3
Assistant Professor, Department of EEE, Sastra University, Tanjore, India
Email ID:
[email protected] [email protected] [email protected]
ABSTRACT Safe-deposit box is a medium that can be used to store one or more valuable objects. Safes have a function to protect valuables from theft or robbery. At the beginning of the discovery of safes, used only in the form of a safety lock. However, as the development of the times found some features that can be used on safes to secure objects in the safe. Eg fingerprint detector, or better known by the name of fingerprint, password and buzzer. Fingerprint is a feature where this feature using the authenticity of a person's fingerprint, in this case the owner safes. Password is a password that can be input via a keypad. Of course, this password is only known to the owner of a safe and can be changed periodically. While the buzzer is a marker of when the safe was forced open by thieves or robbers.Safes used in this final project is controlled by mikrontroler named Arduino Uno. The program used is the basic program of the Arduino Uno. Keywords: Arduino Uno, Fingerprint, Buzzer, Password
1. INTRODUCTION Safe-deposit box is a storage medium that is normally used to store precious objects belonging to a person or group. Safes can be placed anywhere: at home, at work, at school and elsewhere. In particular, a safe functioned to protect valuables from theft or robbery. Safes must have a sophisticated security system to prevent theft. One method used for securing the safe by using the keypad to enter a password, fingerprint and buzzer. Both of these can be combined in such a way so as to protect the valuables contained in safes.
JARDCS
Special Issue On Intellectual Computation Systems
806
Journal of Advanced Research in Dynamical and Control Systems
Vol. 9. Sp– 16 / 2017
Keypad and fingerprint is the access into the safe deposit box where only the owner or user can activate it. The owner can choose a password that he wants to get into the safe access without being noticed by others. While the fingerprint has its own characteristics. Only the owner who has the authenticity of the original fingerprint on the fingerprint. That makes it difficult for others who want to open the safe. Other than that, in the safe can also be placed buzzer that serves as a marker if the safe was forced open by someone else. This further strengthens the security system safe, the owner of the precious objects will feel safe and comfortable leaving their valuable things.
2. METHODS Method development system of automatic of Safe Deposit box are as follows: a. Literatures What is meant by a literature study / reference is the development of literature by studying various books relating to this thesis. b. Design What is meant by the design of the study is to conduct research by designing tools, tool or practice test tool discussed in this thesis. c. Discussion This method is the author did for reference materials that are theory and techniques and how the tool works on the whole, discussions were made to the supervisor and fellow students who have insight into the current material.
3. BASIC THEORY 3.1. Uno Arduino Arduino Uno is a microcontroller board based on the ATmega328. This board has 14 digital input / output pins (of which 6 pin can be used as PWM outputs), 6 analog inputs, 16MHz crystal oscillator, a USB connection, power jack reset button as shown in Table 1. Pin-pin contains everything needed to support the microcontroller, simply connect to your computer with a USB cable such as figure 2.2 or voltage source can be obtained from the AC-DC adapter or battery to use it.Below is a table Arduino Uno description: Table 1: Arduino Uno
JARDCS
Special Issue On Intellectual Computation Systems
807
Journal of Advanced Research in Dynamical and Control Systems
Vol. 9. Sp– 16 / 2017
Mikrokontroler
Atmega328
OperasiVoltage
5V
Input Voltage
7-12V
Input Voltage
6-20V (limits)
I/O
14pin(6pinPWM)
Arus
50mA
FlashMemory
32KB
Bootloader
SRAM 2KB
EEPROM
1KB
Kecepatan
16Mhz
3.2. Fingerprint Fingerprint is a feature that is used to detect a person's fingerprint. Fingerprint is a method that has now developed a machine with the help of software to populate the data the presence of a community, group or institution that uses it. The strength and weakness of a fingerprint is: a. The Strength of fingerprint Fingerprint has a price relatively cheaper when compared to other biometric systems. In addition, each person has a different fingerprint patterns making it difficult for others to break into systems using this fingerprint. b. Weakness of fingerprint Fingerprint can not recognize fingers wet. For users who frequently sweaty hands, will be little difficulty in using this sensor. Generally, by cleaning the finger, is sufficient to overcome this problem. When a wet finger scanned, then the water spots will disturb the pattern of the fingerprint can not be recognized by the fingerprint pattern. JARDCS
Special Issue On Intellectual Computation Systems
808
Journal of Advanced Research in Dynamical and Control Systems
Vol. 9. Sp– 16 / 2017
Figure 1: Fingerprint
3.3. Keypad Keypad interface includes a tool that is often and quite easy to use. Keypad is one means of input that is widely used in machine interface applications. The main function keypad is actually to save the use of input ports, for example in the 4x4 keypad can be used as an input as many as 16 keys and only use 8 ports. In this security system in a safe deposit box discount function keypad as insert to enter a password to open the safe door.
Figure 2: Keypad
3.4. Solenoid The working principle of the solenoid based on the conductor carrying the current into the coil so that the coil will create a magnetic field. This magnetic field is created so that the situation is always repel the magnetic field
. Figure 3: Solenoid
3.5. LCD (Liquid Crystal Display) LCD Key pad shield developed for Arduino compatible board, to provide interface is userfriendly allowing users to go through the menu, make a selection etc. It consists of 1602 characters white blue LCD backlight[1]. Key consists of five buttons-select, top, right, JARDCS
Special Issue On Intellectual Computation Systems
809
Journal of Advanced Research in Dynamical and Control Systems
Vol. 9. Sp– 16 / 2017
bottom and left. To save a digital IO pin, interface keypad using only one channel ADC. The key value is read through the five stages of the voltage divider[Arunkumar. Net al]
Figure 4: Liquid Crystal Display
3.6. Buzzer Buzzer function that notifies you if unexpected events such as the theft of the safes that provide clear warnings to be anticipated[3]. The main equipment in this system is the arduino controller that acts as the controller then provides output in the form of sound via the component output is set.
Figure 5: Buzzer
3.7. Relay Relay has 3 types of poles, the COMMON, NC (Normally Close) and NO (Normally Open). COMMON is a reference pole, NC is a pole in the early kadaan connected to COMMON and NO which is a pole that was originally open and will be connected to COMMON when the relay coil by electrical currents.
Figure 6: Relay
3.8. Limit Switch Limit switches have two conditions, namely conditions Normally Close and Normally Open. Normally Close on the condition that the lever of the limit switch has not been pressed JARDCS
Special Issue On Intellectual Computation Systems
810
Journal of Advanced Research in Dynamical and Control Systems
Vol. 9. Sp– 16 / 2017
(normal), then the contact will be connected to the COMMON NC contact. Instead normally open, namely the condition lever limit switch has been pressed (normal), then the contact will be connected to the COMMON NO contact.
Figure 7: Limit Switch
3.9.IDE Arduino Arduino IDE is a cross-platform application written in Java, and is derived from the IDE (Integrated Development Environment) for the programming language Processing and Wiring project. It is designed to introduce programming to artists and other newcomers unfamiliar with software development. This includes a code editor with features like syntax highlighting, brace matching, and automatic indentation, and is also able to compile and upload the program to the board with a single click[4].
Figure 8: Software Arduino
4. DESIGN AND CONSTRUCTION In the manufacture of a tool, it needed a design. The design is used to simplify the process of making these tools. In the process of designing a tool, there are several things to be considered, for example the form of a series, the type of components to be used, the price JARDCS
Special Issue On Intellectual Computation Systems
811
Journal of Advanced Research in Dynamical and Control Systems
Vol. 9. Sp– 16 / 2017
factor components and component [Prabhakaran.p and S.Saravanan] availability in the market so that the cost of making the tool can be reduced without reducing the quality of the device is made. The first thing that needs to be done in designing an instrument is making a block diagram. The designing process is usually carried out by each circuit block which refers to the theoretical basis and adjusted as required specifications. Of each block and then made a circuit in accordance with their respective functions, in this case also conducted calculation and component selection. With good design, it is expected to be made a tool that works optimally and efficiently. In addition, the design of each block will simplify the measurement process and also to avoid trouble tracking in case of damage as well as system errors from these tools. 4.1
System Block Diagram The process of the designed system diagram box as shown below .
Figure 9: Block Diagram
4.2. Diagram Block Details -Input a.Fingerprint Fingerprint is used as one of the facility's security safes. This fingerprint is used to scan the fingerprints of people who want to open the safe. Fingerprint is detected JARDCS
Special Issue On Intellectual Computation Systems
812
Journal of Advanced Research in Dynamical and Control Systems
Vol. 9. Sp– 16 / 2017
fingerprint authenticity yng owned by people who want to open the safe. Further, the fingerprint is matched with the fingerprints contained in the database. b.Keypad The keypad is used to enter a keyword or a password to open the safe. Password consists of 6-digit number that is random. Keypad matrix used is 4x4. -Process In the process of using an Arduino UNO ATmega328 microcontroller to perform the process in accordance with the commands that have been programmed. -Output a. LCD 2x16 As a medium for displaying the status of the process that is being done microcontroller and display the current condition of locked safes, open and when there is a thief. b. Buzzer Buzzer is used to provide information to the owners safe when the safe was forced open by thieves. Buzzer will continue to sound until an unspecified time. c. Solenoid Solenoid used to lock the safe door. Solenoid requires a voltage of 12 V from the regulator IC arduino. - Communication[Arunkumar, N]. a.Usb Downloader As a converter between the computer program and the microcontroller so that the tool can perform the task in accordance with the program. 4.3. Operation 1. In the face safes installed a keypad and fingerprint, while on the inside safes laid solenoid, buzzer, limit switches, and Arduino. 2. Keypad serves as a place to enter a password. 3. Fingerprint serves as a fingerprint detector. 4. Solenoid serves to lock the safe door. 5. Buzzer serves as a marker when the safe was forced open. JARDCS
Special Issue On Intellectual Computation Systems
813
Journal of Advanced Research in Dynamical and Control Systems
Vol. 9. Sp– 16 / 2017
6. Limit switch serves to push the door open safes moment. 7. Arduino serves as the central control and device controllers. 8. Untuk open the safe, the user must enter the password in the form of numbers as many as six digits. 9. Setelah it, the user pressed the fingerprints to a fingerprint sensor. 10. Apabila correct password and fingerprint does not match, it will appear on the LCD that shows the results, solenoids are off and the door remains locked safes. 11. Apabila wrong password and fingerprint appropriate, will appear in the LCD display which shows the results, solenoids are off and the door remains locked safes. 12. Apabila wrong password and fingerprint does not match, it will appear on the LCD that shows the results, solenoids are off and the door remains locked safes. 13. Apabila correct password and fingerprint appropriate, will appear in the LCD display which shows the results, the solenoid is switched on and the doors open safes. 14. Selanjutnya if forced open the safe door without entering a password and a fingerprint scan, then the buzzer will sound within an unspecified time. 4.4.Arduino Uno Circuit
JARDCS
Special Issue On Intellectual Computation Systems
814
Journal of Advanced Research in Dynamical and Control Systems
Vol. 9. Sp– 16 / 2017
Figure 10: Arduino Uno System
4.5 Keypad
Figure 11: Keypad
Keypad can receive more voltage than 20 volts but given to the keypad amounted 12volt, so it can be used with a single power supply with the provision that the keypad is given a current of 2A. Keypad is used in this device is a 4x4 keypad. However, I only use 4 columns and 3 rows of the keypad. This is because the place is not quite in arduino. The keypad is connected to pin 2, 3, 4, 6, 7, 8 and 9 on arduino.
6. RELAY DRIVER CIRCUIT Relay is a switch that is controlled electronically[1]. This means that the relay should receive the voltage to be able to perform its function. In this device, the relay role is to control the current into the solenoid. Relay is required to adjust the position of key safes contained in the solenoid. Scheme relay driver circuit can be seen in the image below
. Figure 12: Relay Drivers
JARDCS
Special Issue On Intellectual Computation Systems
815
Journal of Advanced Research in Dynamical and Control Systems
Vol. 9. Sp– 16 / 2017
7. Buzzer Buzzer is used to provide information to users, when detected thief. In this device used is 5volt buzzer.
Figure 13: Buzzer
The buzzer will sound if dihubungakan positive to positive and negative voltage source dihubungakan to ground. 8.
LCD Circuit
LCD (Liquid Crystal Display) is formed by a special type of liquid is placed between two plates of glass. there is a background field (backplane), which is a glass plate, the back, the inside of which is covered by a transparent electrode layer[1].
Figure 14: LCD
9. Solenoid Solenoid is equipment used to convert electrical signals or electric current into mechanical motion[1]. Solenoid coil and the core is made of iron that can be driven which serves as an actuator to unlock automatically on safes.
JARDCS
Special Issue On Intellectual Computation Systems
816
Journal of Advanced Research in Dynamical and Control Systems
Vol. 9. Sp– 16 / 2017
Figure 15: Solenoid
10. Flowchart In the process sequence illustrates the security system in a safe, to use a flowchart to clarify the process flow. Below will be described a few flowchart for each process.
Figure 16: Main Flowchart
5. TESTING AND RESULT 5.1. Table of System Test
JARDCS
Special Issue On Intellectual Computation Systems
817
Journal of Advanced Research in Dynamical and Control Systems
Vol. 9. Sp– 16 / 2017
5.2. System Unit Photo
Figure 17: System Unit
6. CONCLUSIONS AND FUTURE WORKS -Conclusions 1. As a central controller and controller, Arduino able to control the security system in a safe well, where by using arduino language as a software, the system can work automatically and can work as desired. 2. It can be proved that the fingerprint and password can be used to secure a safe through well designed system. 3. The security system in this safe password periodically require replacement for the level of security safes maintained properly. JARDCS
Special Issue On Intellectual Computation Systems
818
Journal of Advanced Research in Dynamical and Control Systems
Vol. 9. Sp– 16 / 2017
4. The level of responsiveness to the fingerprint system is dependent upon the accuracy of the fingerprint in the fingerprint reading. Fingerprint is also affected by moisture finger of the user. 5. From the overall system testing tool works well and can be run in accordance with a program that has been created. -Future Works 1. Because these systems rely on password, fingerprint and buzzer, to increase the security of these systems need to add more features. 2. This system requires the management of the user better.
REFERENCES 1. Arifianto, Deni, “Kamus Komponen Elektronika”, Kawan Pustaka, 2011.Malvino, Albert Paul, “ElektronikaKomputer Digital”, edisikedua, Erlangga, 1989. 2. Arduino Board Uno,(http://arduino.cc/en/Main/arduinoBoardUno/,diaksespadatanggal 14 Mei 2014) 3. Elkablog. 2007. Buzzer. (http://elektronika.blogspot.com, diakses 17 Mei 2014) 4. Minarni. 2004. Klasifikasi Sidik Jari Dengan Pemrosesan Awal Transformasi. (http://geocities.com/transmisieeundip/minarni/pdf, diakses pada tanggal 7 Mei 2014) 5. Prabhakaran.p and S.Saravanan,” Parameter Estimation And Classification Using Gaussianmixture Model”, International Journal of Innovations in Scientific and Engineering Research (IJISER),vol2,no.4,pp73-76,2017. 6. Arunkumar, N., Venkataraman, V., Thivyashree, Lavanya ‘A moving window approximate entropy based neural network for detecting the onset of epileptic seizures’ (2013) International Journal of Applied Engineering Research, 8 (15), pp. 1841-1847. 7. Arunkumar, N., Ramkumar, K., Hema, S., Nithya, A., Prakash, P., Kirthika, V. Fuzzy Lyapunov exponent based onset detection of the epileptic seizures (2013) 2013 IEEE Conference on Information and Communication Technologies, ICT 2013, art. no. 6558185, pp. 701-706.
JARDCS
Special Issue On Intellectual Computation Systems
819