Design of a Novel Solar-Powered 3-in-1 Access Control Using Auto-Mechanical System

JETI Admin2



Abstract

Security of lives, properties, institutions, and systems has been key in many facets of human life.  The need to keep restricted premises, valuables, and programmable environments confidential, so that no other unauthorized person or program could have access to them has never been so crucial.  These days, security systems are calibrated to meet varying security needs ranging from the most easily accessed to highly restricted space. The present study focuses on the design of a solar-powered space door access system based on biometric information. The access control power is supported by photovoltaic solar collector plate energy. This provides constant security service with varying degrees of security usage.  It could be used for high-level security-demanding premises such as military armories, bank vaults, etc. In addition, it is relevant in medium security demanding networks and organizations. The design adopts a 3-in-1 method of personal access authentication through password, smart card, and fingerprint. This method is most efficient and reliable with an established efficiency of 0.88 (88%) due to the probability combination of the authentication modules. The system prohibits unauthorized personal access. Restriction and accessibility could be improved or turned down upon necessity. The system is innovative and demonstrates a high degree of reliability, functionality, and fool-proof authentication.

References

[1] Mohamed A., Auer D., Hofer D., Kung J. (2022) A systematic literature review for authentication and access control: definition, strategies, and models. International Journal of Web Information system 18(2) 18(2) DOI:10.1108/IJWIS-04-2022-0077 [2] Kaur G., Singh, A., Singh, A. (2022). A comprehensive access control system amid the global pandemic. International Conference on Emerging Trends in Engineering and Medical Science (ICETEMS) DOI:10.1109/ ICETEMS 56252.2022.10093551 [3] Renukaswathi M., Narayana K. D. L., Raviteja (2024) To implement a secure access control system using biometric authentication methods. 10(2):137-142 DOI:10.46501/IJMTST1001019 [4] Muslimin S., Wijanarko Y., Kesume S. I., Maulidda R., (2020) Biometric fingerprint implementation for presence checking and room access control system. 4th Forum in Research, Science and Technology(FIRST-T1-T2-2020). DOI:10.2991/ahe.k.210205.083 [5] Nibras S., Marfy A. S., Islam M. N., Fingerprint-base biometric authentication access control and performance DOI:10.13140/RG.2.2.27671.70565 [6] Fingerprint biometric-based access control and classroom attendance management system (2015) Annual IEEE India Conference. pp 1-6 doi:10.1109/INDICON.2015.7443699.. [7] Sprokkereef, A. and HERT, P.D. (2007) Ethical practice in the use of biometric identifiers within the EU. B Academic Publishers—Printed in Great Britain. Law, Science and Policy, Vol. 3, pp. 177–201 1475-5335/07 $10 [8] Samuel, B.O., Abass O. A. (2013) An Overview of Biometric Identifiers with Emphasis on the Concept and Applications of Finger Vein Recognition. International Journal of Computer Science and Mobile Computing. IJCSMC, Vol. 2, Issue. 8, pg.257 – 261 [9] Juan R. Bauer Mengelberg, J.R.B., Montecillo C.P.,(2005) Teaching System Access Control. Issues in Informing Science and Information Technology [10] Tibor Vi. (2019) Enhanced centralized access control system. IEEE International Conference on Modern Electrical and Energy Systems (MEES) [11] Kulthe, S., Chandran, V., (2011) Access control execution system (ACES) Computer Science. PhUSE Paper SD06

PDF

Other Articles for IEC 2024 (Special Issue)