1 Online
1 Online
CrossMark
View Export
Online Citation
Polarization insensitive all-fiber mode-lockers functioned by carbon nanotubes deposited onto tapered
fibers
Appl. Phys. Lett. (January 2007)
a)
Corresponding Author: bharatiraja@gmail.com
Abstract. As mankind leads into a new age of modernization, security issues and measures have become exceedingly
important. Considering an educational institute or workplace, keeping one’s belongings safely with a minimal interface is
the need of the hour. The traditional lock and key method of keeping personal items safe is clumsy and inconvenient. The
recent developments in technology have provided innovative solutions to this problem. Gone are the days of the
troublesome key and lock. Radio Frequency Identification (RFID), along with Internet-of-Things (IoT), is a secure, user-
friendly and efficient method to safeguard things. This combination comes with advantages such as high security,
simplicity, cost-effectiveness and ‘misplace-proof’ methodology. This paper proposes a Smart RFID-IoT based Locker
system. The locker works on RFID authentication technology, which is unique to every identity card of the user. It is also
enabled with Wi-Fi connectivity to facilitate continual status monitoring, user login-logoff data storage, and unauthorized
access surveillance.
Keywords: RFID, IoT, Wi-Fi, Smart Security, Compact Locking, Smart Locker.
INTRODUCTION
Security and protection of personal belongings and valuables have always been a concern. Various locking
and securing systems have evolved in due course of time. Lock and key turned out to be one of the most common
and trustworthy methods of security. However simple, it suffered from disadvantages such as key misplacement and
forgery, which render the arrangement useless. Radio Frequency Identification (RFID) is a technology that uses low-
power radio waves to encode data or identification digitally. It does so in the form of a unique Hexa-Decimal code
[1]. RFID is widely used for the purpose of identification as it ‘tags’ an object uniquely [2]. The security level
offered by RFID mechanisms can be appreciated because there are billions of permutations for a single RFID code
generated, making it nearly impossible to crack, forge, or copy the code [3]. RFID integrated with the Internet of
Things (IoT) makes a secure user data storage system and creates limitless opportunities for advancements and
improvements. IoT can be defined as a methodology that enables Machine-to-Machine (M2M) communication [4].
It is a versatile medium that allows various electronic things to communicate; this has made it a megatrend [5]. A
combination of RFID and IoT technologies yield a solution to security issues that is effective, efficient, user-friendly
and smart. This paper proposes a smart and economically feasible locker, which comprises an RFID reader module
and uses a ‘Read-Authenticate’ algorithm to verify the authorized user. It uses the unique Hexa-Decimal RFID code
assigned to the authorized occupant of the locker for its identification. It is enabled with Wi-Fi technology that
3rd International Conference on Computational and Experimental Methods in Mechanical Engineering (11-13 February-2021)
AIP Conf. Proc. 2427, 020098-1–020098-7; https://doi.org/10.1063/5.0101139
Published by AIP Publishing. 978-0-7354-4312-9/$30.00
020098-1
allows the locker to pass on the data to a centralized server for continual surveillance, thus forming an eco-system. A
generalized block diagram of the proposed system is illustrated in Fig.1.
Locker
RFID
Reader
WiFi
User
Database Server
FIGURE 1. Proposed Smart Locker System, where a user has a unique RFID card, can access the locker system,
which sends user information to the centralized server for storage.
As advances are made in RFID and IoT technologies, several attempts were made to implement these in
security systems. Salma et al. [6], in their study, proposed an RFID and password-based locking system. To fully
unlock or access the locker, one must correctly verify both the RFID as well as the password. Thus, making it a two-
level security system. Firstly, the RFID is verified, and then the password is verified. A microcontroller was used for
the purpose, along with an RFID module. Researchers in [7, 8] devised systems that also used a combination of
RFID and Global System for Mobiles (GSM) for authentication. In the system discussed in [7], the RFID code will
be read by the module, and subsequently, the occupant will receive a Short Message Service (SMS), notifying that
access has been requested. While in [8], the proposed system used RFID identification accompanied by biometric
identification. After these steps, a password will be sent to the registered occupant via SMS. Entering that correct
password will unlock the system. Authors in [3] proposed a similar system for the security and locking of shared
bicycles parked on common premises. The design comprised of an RFID based authentication mechanism and
sensors, such as, position sensors and attitude sensors. Each bicycle is assigned a unique RFID, which, when
verified, will result in unlocking. Moreover, after every access attempt, the credentials will be passed to a central
server which saves them in a database. Other attempts were made by authors in [9], where RFID authentication was
employed to access a door. However secure, all the systems discussed above use at least a two-level verification
process. Thus, making them less user-friendly due to the elaborate and complex operation. In [6], there is no
provision for continuous monitoring, and the use of password makes the system complex. While the systems in [7,
8], incorporated monitoring facilities using SMS, the accessing process is very intricate and prone to human errors
due to emphasis on passwords.
Web Server
RFID
Reader
WiFi Module
Microcontroller
RFID Reader
020098-2
Contribution
Organization
The proposed system consists of five elements, i.e. sensing, computing, communicating, actuating and data
management elements, as illustrated in Fig. 2.
Ɣ Sensing elements are responsible for gathering data from the environment, such as the RFID reader and the
proximity sensor. These collect the data and processes it further to the computing elements.
Ɣ Computing elements are the brains of the system, these elements are responsible for the calculation and
performing logical operations.
Ɣ Communicating elements such as the Wi-Fi module and local cloud are responsible for establishing a
communication channel between the sensing elements and the computing-data management elements.
Ɣ Actuating elements are responsible for physical actions such as opening/closing the mechanical locking
system of the smart locker.
Ɣ Data management elements store the user credentials for administration and monitoring.
Fig. 3 illustrates the typical layout of the proposed system. The significance and application of each
component are explained in the proceeding paragraphs.
Ɣ RFID Module has the function to read the unique RFID code from the RFID tag. After reading the code,
it has to pass the code onto the IoT board, where it is manipulated further for the authentication process.
In this case, the RC522 RFID module is used.
Ɣ IoT Board serves the purpose of authentication of the user. It does so by accepting the input code from
the RFID module and matching it with the one already registered. If the codes match, it signals the
020098-3
actuator, else denies access. Here, the ESP8266 IoT board is used for this purpose. The IoT board also
has the responsibility to report the authorization attempts to the server to facilitate tracking.
Ɣ Actuator here has the task to open the lock on receiving the appropriate signal from the IoT ard,
therefore allowing the user to access the locker. In this case, a relay is used.
(a) (b)
FIGURE 3. (a) Hardware layout of the proposed smart locker system with authorized card entry being stored at the
server database and the locker giving access (b) Entry of the unauthorized card is not being accepted by the system
and the intruder ID is being stored for later use.
Developed Number of
Technology Transfer Rate Range Encryption Ref.
Year Devices
Wi-Fi- RF Limited to IP [4, 5],
1997 0.001–7 Gbps 40–150 m WPA & WEP
Waves addresses [10-12]
[5],
LoRa- CSS 2009 0.3 – 50 Kbps 120 < 30 km AES- CMAC [13,
14]
[5],
Bluetooth-
1989 1 – 24 Mbps 250 7 – 12 m SAFER and block cipher [15,
FHSS
16]
Ɣ
Electromagnetic Lock can be unlocked by exciting it using an electric pulse. Therefore, the excitation
and thus the unlocking can be controlled. It receives the pulse only when the actuator receives the signal
from the IoT board after verification of the codes. The lock is shown in Fig. 3.
Ɣ RFID Card will act as the ‘key’ for this system. It consists of a unique Hexa-Decimal code, which is
necessary to unlock the system. It is this code that the user must verify to access the locker.
These components collectively form the Smart Locker system, working on an input supply of 5V and the
solenoid lock on 12V. As an added user-friendly interface, an LCD display is mounted on top of the locker, showing
the locker’s current state as Authorized, Unauthorized, Occupied or Vacant.
The proposed system uses the ‘Read-Authenticate’ algorithm to verify the user with the current occupant.
This is described in Fig. 4, where the process begins with the registration and ends with user authentication. Firstly,
the initial user is registered with the locker and is assigned a unique RFID code. Subsequently, when the locker is
020098-4
accessed a second time, the RFID code is passed to the IoT board, where the codes are matched. If the codes match,
the access is granted; else, the access is denied. This cycle continues as many times an attempt to access is made.
START START
INPUT RFID
USER REGISTRATION CODE
YES USER NO
YES USER ID NO
= ACTIVITY
REGISTERED
CODE
ALERT!
YES TIME NO TO SERVER
DELAY > 7
DAYS
ACCESS GRANTED ACCESS DENIED
ALERT!
TO SERVER STOP
STOP
FIGURE 4. Flowchart of the access granting system FIGURE 5. Flowchart of the locker-server
communication system
020098-5
TABLE 2. Open research challenges and possible solutions
CONCLUSION
In this paper, a smart RFID based compact locking system. RFID enabled ‘Read-Authenticate’ algorithm
was used for user verification. The system provides impressive security in a user-friendly manner requiring
minimum human intervention. The proposed system was also able to track and monitor the locker activity over
definite intervals of time. It used Wi-Fi connectivity to communicate with a centralized server, where the locker
records were stored in a database allowing continuous tracking and surveillance. This initiative opens up many new
areas of interest, such as integrating such a locker with prevalent intelligence techniques like Computer Vision or
Speech Recognition, to make deposition and registration even more smooth, secure, and smarter.
REFERENCES
020098-6
10. D. Suh, H. Ko, and S. J. I. T. o. V. T. Pack, "Efficiency analysis of WiFi offloading techniques," vol. 65, pp.
3813-3817, 2015.
11. S. Ahmad and D. H. J. I. A. Kim, "Quantum GIS based descriptive and predictive data analysis for effective
planning of waste management," vol. 8, pp. 46193-46205, 2020.
12. R. Krishnamoorthy, K. Krishnan, and C. Bharatiraja, "Deployment of IoT for smart home application and
embedded real-time control system," Materials Today: Proceedings, 2021.
13. L. Leonardi, F. Battaglia, and L. L. J. I. I. o. T. J. Bello, "Rt-lora: A medium access strategy to support real-
time flows over lora-based networks for industrial iot applications," vol. 6, pp. 10812-10823, 2019.
14. D. Croce, M. Gucciardo, S. Mangione, G. Santaromita, and I. J. I. T. o. W. C. Tinnirello, "LoRa technology
demystified: From link behavior to cell-level performance," vol. 19, pp. 822-834, 2019.
15. N. R. Kumar, C. Bhuvana, and S. Anushya, "Comparison of ZigBee and Bluetooth wireless technologies-
survey," in 2017 International Conference on Information Communication and Embedded Systems (ICICES),
2017, pp. 1-4.
16. P.-A. Laharotte, R. Billot, E. Come, L. Oukhellou, A. Nantes, and N.-E. J. I. T. o. I. T. S. El Faouzi,
"Spatiotemporal analysis of bluetooth data: Application to a large urban network," vol. 16, pp. 1439-1448,
020098-7