0% found this document useful (0 votes)
27 views8 pages

1 Online

This document describes a proposed smart locker system using RFID technology and IoT. The system uses RFID cards assigned to each user with a unique hexadecimal code to authenticate users. When a user's RFID card is scanned, it sends the user information to a central server over WiFi. This allows for continuous monitoring of login/logout data and detection of unauthorized access. The system aims to provide secure, simple and cost-effective locker access while addressing issues with traditional lock and key systems like key misplacement. It contributes an active/sleep mode for power saving and minimal user interface for simplicity compared to prior two-factor authentication locker systems.

Uploaded by

pachecogu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views8 pages

1 Online

This document describes a proposed smart locker system using RFID technology and IoT. The system uses RFID cards assigned to each user with a unique hexadecimal code to authenticate users. When a user's RFID card is scanned, it sends the user information to a central server over WiFi. This allows for continuous monitoring of login/logout data and detection of unauthorized access. The system aims to provide secure, simple and cost-effective locker access while addressing issues with traditional lock and key systems like key misplacement. It contributes an active/sleep mode for power saving and minimal user interface for simplicity compared to prior two-factor authentication locker systems.

Uploaded by

pachecogu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

RESEARCH ARTICLE | FEBRUARY 27 2023

An IoT based centralized smart locker using RFID


technology
C. Bharatiraja  ; Prithvi Krishna Chittoor; Yash Vardhan Bhargava

AIP Conference Proceedings 2427, 020098 (2023)


https://doi.org/10.1063/5.0101139

CrossMark

 
View Export
Online Citation

Articles You May Be Interested In

Downloaded from http://pubs.aip.org/aip/acp/article-pdf/doi/10.1063/5.0101139/16649245/020098_1_online.pdf


Poor fluorinated graphene sheets carboxymethylcellulose polymer composite mode locker for erbium
doped fiber laser
Appl. Phys. Lett. (February 2015)

Polarization insensitive all-fiber mode-lockers functioned by carbon nanotubes deposited onto tapered
fibers
Appl. Phys. Lett. (January 2007)

Attendance system using RFID tag


AIP Conference Proceedings (May 2022)
An IoT based Centralized Smart Locker using RFID
Technology

C.Bharatirajaa), Prithvi Krishna Chittoor, Yash Vardhan Bhargava

Downloaded from http://pubs.aip.org/aip/acp/article-pdf/doi/10.1063/5.0101139/16649245/020098_1_online.pdf


Department of Electrical and Electronics Engineering, SRM Institute of Science and Technology, Kattankulathur,
603203, TamilNadu, India

a)
Corresponding Author: bharatiraja@gmail.com

Abstract. As mankind leads into a new age of modernization, security issues and measures have become exceedingly
important. Considering an educational institute or workplace, keeping one’s belongings safely with a minimal interface is
the need of the hour. The traditional lock and key method of keeping personal items safe is clumsy and inconvenient. The
recent developments in technology have provided innovative solutions to this problem. Gone are the days of the
troublesome key and lock. Radio Frequency Identification (RFID), along with Internet-of-Things (IoT), is a secure, user-
friendly and efficient method to safeguard things. This combination comes with advantages such as high security,
simplicity, cost-effectiveness and ‘misplace-proof’ methodology. This paper proposes a Smart RFID-IoT based Locker
system. The locker works on RFID authentication technology, which is unique to every identity card of the user. It is also
enabled with Wi-Fi connectivity to facilitate continual status monitoring, user login-logoff data storage, and unauthorized
access surveillance.

Keywords: RFID, IoT, Wi-Fi, Smart Security, Compact Locking, Smart Locker.

INTRODUCTION
Security and protection of personal belongings and valuables have always been a concern. Various locking
and securing systems have evolved in due course of time. Lock and key turned out to be one of the most common
and trustworthy methods of security. However simple, it suffered from disadvantages such as key misplacement and
forgery, which render the arrangement useless. Radio Frequency Identification (RFID) is a technology that uses low-
power radio waves to encode data or identification digitally. It does so in the form of a unique Hexa-Decimal code
[1]. RFID is widely used for the purpose of identification as it ‘tags’ an object uniquely [2]. The security level
offered by RFID mechanisms can be appreciated because there are billions of permutations for a single RFID code
generated, making it nearly impossible to crack, forge, or copy the code [3]. RFID integrated with the Internet of
Things (IoT) makes a secure user data storage system and creates limitless opportunities for advancements and
improvements. IoT can be defined as a methodology that enables Machine-to-Machine (M2M) communication [4].
It is a versatile medium that allows various electronic things to communicate; this has made it a megatrend [5]. A
combination of RFID and IoT technologies yield a solution to security issues that is effective, efficient, user-friendly
and smart. This paper proposes a smart and economically feasible locker, which comprises an RFID reader module
and uses a ‘Read-Authenticate’ algorithm to verify the authorized user. It uses the unique Hexa-Decimal RFID code
assigned to the authorized occupant of the locker for its identification. It is enabled with Wi-Fi technology that

3rd International Conference on Computational and Experimental Methods in Mechanical Engineering (11-13 February-2021)
AIP Conf. Proc. 2427, 020098-1–020098-7; https://doi.org/10.1063/5.0101139
Published by AIP Publishing. 978-0-7354-4312-9/$30.00

020098-1
allows the locker to pass on the data to a centralized server for continual surveillance, thus forming an eco-system. A
generalized block diagram of the proposed system is illustrated in Fig.1.
Locker

RFID
Reader

Solenoid Lock IoT Board

WiFi

Central Server Unit

User

Database Server

FIGURE 1. Proposed Smart Locker System, where a user has a unique RFID card, can access the locker system,
which sends user information to the centralized server for storage.

Downloaded from http://pubs.aip.org/aip/acp/article-pdf/doi/10.1063/5.0101139/16649245/020098_1_online.pdf


Recent Developments on RFID-IoT Security Systems

As advances are made in RFID and IoT technologies, several attempts were made to implement these in
security systems. Salma et al. [6], in their study, proposed an RFID and password-based locking system. To fully
unlock or access the locker, one must correctly verify both the RFID as well as the password. Thus, making it a two-
level security system. Firstly, the RFID is verified, and then the password is verified. A microcontroller was used for
the purpose, along with an RFID module. Researchers in [7, 8] devised systems that also used a combination of
RFID and Global System for Mobiles (GSM) for authentication. In the system discussed in [7], the RFID code will
be read by the module, and subsequently, the occupant will receive a Short Message Service (SMS), notifying that
access has been requested. While in [8], the proposed system used RFID identification accompanied by biometric
identification. After these steps, a password will be sent to the registered occupant via SMS. Entering that correct
password will unlock the system. Authors in [3] proposed a similar system for the security and locking of shared
bicycles parked on common premises. The design comprised of an RFID based authentication mechanism and
sensors, such as, position sensors and attitude sensors. Each bicycle is assigned a unique RFID, which, when
verified, will result in unlocking. Moreover, after every access attempt, the credentials will be passed to a central
server which saves them in a database. Other attempts were made by authors in [9], where RFID authentication was
employed to access a door. However secure, all the systems discussed above use at least a two-level verification
process. Thus, making them less user-friendly due to the elaborate and complex operation. In [6], there is no
provision for continuous monitoring, and the use of password makes the system complex. While the systems in [7,
8], incorporated monitoring facilities using SMS, the accessing process is very intricate and prone to human errors
due to emphasis on passwords.

Web Server
RFID
Reader

WiFi Module
Microcontroller
RFID Reader

Solenoid Lock Local Database

Proximity Sensor Local Cloud


Central Server
Sensing Computing Communicating Actuating Data Management

FIGURE 2. Elements of the Smart Locker Mechanism

020098-2
Contribution

The paper presents the following contributions:


Ɣ Active/Sleep mode for power saving during the storage operation. It keeps the system active only
during the time the user is trying to access the locker.
Ɣ Minimalistic User Interface for the simplicity of the user.
Ɣ Data logging of user credential. It stores users In/Out time, intrusion detection.
Ɣ Two stage authentication.
Ɣ Theft identification and alerting system.
The proposed system aims to ensure maximum security with minimal human intervention and allows tracking
and monitoring of access attempts using IoT technology.

Organization

Downloaded from http://pubs.aip.org/aip/acp/article-pdf/doi/10.1063/5.0101139/16649245/020098_1_online.pdf


The paper is divided into the following sections:
Ɣ Section 2 describes the elements of the system, hardware components and presents a detailed
description of the working of the system.
Ɣ Section 3 concerns with the tracking, communication process and elaborates the flow of control of the
system in a pictorial representation.
Ɣ Section 4 outlines the future scope and challenges to be tackled in the IoT based security field with
possible solutions. Few references has been added for the reader to benefit of reader for further
reference.
Ɣ Section 5 summarizes the key points of the designed system and concludes the paper with more
possibilities of implementations in the proposed system for future applications.

PROPOSED DESIGN AND METHODOLOGY


Elements of the Proposed System

The proposed system consists of five elements, i.e. sensing, computing, communicating, actuating and data
management elements, as illustrated in Fig. 2.
Ɣ Sensing elements are responsible for gathering data from the environment, such as the RFID reader and the
proximity sensor. These collect the data and processes it further to the computing elements.
Ɣ Computing elements are the brains of the system, these elements are responsible for the calculation and
performing logical operations.
Ɣ Communicating elements such as the Wi-Fi module and local cloud are responsible for establishing a
communication channel between the sensing elements and the computing-data management elements.
Ɣ Actuating elements are responsible for physical actions such as opening/closing the mechanical locking
system of the smart locker.
Ɣ Data management elements store the user credentials for administration and monitoring.

Hardware Components Description

Fig. 3 illustrates the typical layout of the proposed system. The significance and application of each
component are explained in the proceeding paragraphs.

Ɣ RFID Module has the function to read the unique RFID code from the RFID tag. After reading the code,
it has to pass the code onto the IoT board, where it is manipulated further for the authentication process.
In this case, the RC522 RFID module is used.
Ɣ IoT Board serves the purpose of authentication of the user. It does so by accepting the input code from
the RFID module and matching it with the one already registered. If the codes match, it signals the

020098-3
actuator, else denies access. Here, the ESP8266 IoT board is used for this purpose. The IoT board also
has the responsibility to report the authorization attempts to the server to facilitate tracking.
Ɣ Actuator here has the task to open the lock on receiving the appropriate signal from the IoT ard,
therefore allowing the user to access the locker. In this case, a relay is used.

Solenoid Lock/Unlock Solenoid Lock/Unlock


Microcontroller Microcontroller
RFID
RFID
Reader
Reader

IoT Board for IoT Board for


Data Solenoid Lock Data Transmision
Solenoid Lock Transmision (In Lock Mode)
(In Unlock Mode) 20x4 LCD
20x4 LCD Authorized Display Unauthorized
Display Card Card
Access Denied
Access Granted

Downloaded from http://pubs.aip.org/aip/acp/article-pdf/doi/10.1063/5.0101139/16649245/020098_1_online.pdf


User Data Storage
User Data Storage Database
Database

User Credentials User Credentials


Accepted Not Accepted

(a) (b)
FIGURE 3. (a) Hardware layout of the proposed smart locker system with authorized card entry being stored at the
server database and the locker giving access (b) Entry of the unauthorized card is not being accepted by the system
and the intruder ID is being stored for later use.

TABLE 1. Comparative study between various wireless communication technologies

Developed Number of
Technology Transfer Rate Range Encryption Ref.
Year Devices
Wi-Fi- RF Limited to IP [4, 5],
1997 0.001–7 Gbps 40–150 m WPA & WEP
Waves addresses [10-12]
[5],
LoRa- CSS 2009 0.3 – 50 Kbps 120 < 30 km AES- CMAC [13,
14]
[5],
Bluetooth-
1989 1 – 24 Mbps 250 7 – 12 m SAFER and block cipher [15,
FHSS
16]

Ɣ
Electromagnetic Lock can be unlocked by exciting it using an electric pulse. Therefore, the excitation
and thus the unlocking can be controlled. It receives the pulse only when the actuator receives the signal
from the IoT board after verification of the codes. The lock is shown in Fig. 3.
Ɣ RFID Card will act as the ‘key’ for this system. It consists of a unique Hexa-Decimal code, which is
necessary to unlock the system. It is this code that the user must verify to access the locker.
These components collectively form the Smart Locker system, working on an input supply of 5V and the
solenoid lock on 12V. As an added user-friendly interface, an LCD display is mounted on top of the locker, showing
the locker’s current state as Authorized, Unauthorized, Occupied or Vacant.

Working of the Proposed System

The proposed system uses the ‘Read-Authenticate’ algorithm to verify the user with the current occupant.
This is described in Fig. 4, where the process begins with the registration and ends with user authentication. Firstly,
the initial user is registered with the locker and is assigned a unique RFID code. Subsequently, when the locker is

020098-4
accessed a second time, the RFID code is passed to the IoT board, where the codes are matched. If the codes match,
the access is granted; else, the access is denied. This cycle continues as many times an attempt to access is made.

TRACKING AND COMMUNICATION


The proposed system uses Wi-Fi to communicate with a centralized server. The major components
involved are the IoT board, the server and the database. The IoT board is programmed to send the RFID codes that
are input to the module for every access attempt. When a new user is registered, the code is sent to the server, and
the user is marked. Henceforth for every attempt for access, valid or invalid, the code is passed to the server. For
communication between the server and IoT board, Wi-Fi technology is used due to its high performance,
comparatively higher data rate transfer and ubiquitous availability.
Fig. 5 describes the tracking methodology. If the user is unavailable for seven consecutive days, an alert is
sent to the administrator. This helps the administrator to identify the unattended locker and track its recent access
attempts. As the user will be already registered, the individual can be contacted or duly notified. The use of tracking
will prove very helpful in cases where the number of lockers is vast, such as a library, industry, corporate office, etc.
It also helps to keep track of the locker occupancy and user activity. Moreover, this will also display the false or

Downloaded from http://pubs.aip.org/aip/acp/article-pdf/doi/10.1063/5.0101139/16649245/020098_1_online.pdf


unwanted attempts made on a locker during a particular time, thereby ensuring double security. A brief comparative
study is presented in Table 1 comparing the features of the IoT communication channel with Wi-Fi-RF waves,
LoRa-CSS and Bluetooth-FHSS technology.

CHALLENGES AND FUTURE SCOPE


The challenges are categorized based on the hardware or software implementation. Hardware challenges
are more related to the design of the electrical actuation system and the interference blocking capability of the RFID
reader. It is possible that exposing the digital circuit to external Electromagnetic Interferences, will damage the
electrical components and create security issues to the operator. Considering the software based challenges, there is
hypothetically limitless challenges that can damage the system and expose the system to software attacks, mentioned
in brief in Table 2. Furthermore, the Table 2 also illustrates few of the challenges to be tackled during real-time
implementation of the system and provides possible solutions to over the challenges.

START START

INPUT RFID
USER REGISTRATION CODE

USER RFID DATA AND TIME


INPUT TRANSFER TO SERVER

YES USER NO
YES USER ID NO
= ACTIVITY
REGISTERED
CODE
ALERT!
YES TIME NO TO SERVER
DELAY > 7
DAYS
ACCESS GRANTED ACCESS DENIED

ALERT!
TO SERVER STOP

STOP

FIGURE 4. Flowchart of the access granting system FIGURE 5. Flowchart of the locker-server
communication system

020098-5
TABLE 2. Open research challenges and possible solutions

Future Scope Challenge Possible Solution Ref.


Avoiding bottle necks, improved
Signal Latency [17]
protocols
Signal Jamming Use of Frequency Hopping Techniques [18]
Authenticity, Confidentiality, Spoofing Use of Digital Signatures for
[19, 20]
Software Based attacks verification
Monitoring attacks Periodic tracing for abnormalities [21]
Data Encryption Use of encryption protocols [22, 23]
Using AI techniques to detect faults in
Blockchain-based security [22]
data transmission

Downloaded from http://pubs.aip.org/aip/acp/article-pdf/doi/10.1063/5.0101139/16649245/020098_1_online.pdf


Blocking external Electromagnetic
Hardware Based Use of appropriate shielding tactics [24]
Interferences

CONCLUSION
In this paper, a smart RFID based compact locking system. RFID enabled ‘Read-Authenticate’ algorithm
was used for user verification. The system provides impressive security in a user-friendly manner requiring
minimum human intervention. The proposed system was also able to track and monitor the locker activity over
definite intervals of time. It used Wi-Fi connectivity to communicate with a centralized server, where the locker
records were stored in a database allowing continuous tracking and surveillance. This initiative opens up many new
areas of interest, such as integrating such a locker with prevalent intelligence techniques like Computer Vision or
Speech Recognition, to make deposition and registration even more smooth, secure, and smarter.

REFERENCES

1. T. Anagnostopoulos, A. Zaslavsky, K. Kolomvatsos, A. Medvedev, P. Amirian, J. Morley, et al., "Challenges


and opportunities of waste management in IoT-enabled smart cities: a survey," IEEE Transactions on
Sustainable Computing, vol. 2, pp. 275-289, 2017.
2. K. Suresh, V. Jeoti, S. Soeung, M. Drieberg, M. Goh, and M. Z. Aslam, "A Comparative Survey on Silicon
Based and Surface Acoustic Wave (SAW)-Based RFID Tags: Potentials, Challenges, and Future Directions,"
IEEE Access, vol. 8, pp. 91624-91647, 2020.
3. Z. Xue, L. Lin, Y. Ma, W. Dong, Z. Dou, J. Zhao, et al., "A shared bicycle intelligent lock control and
management system based on multisensor," IEEE Internet of Things Journal, vol. 7, pp. 5426-5433, 2020.
4. T. J. Sheng, M. S. Islam, N. Misran, M. H. Baharuddin, H. Arshad, M. R. Islam, et al., "An internet of things
based smart waste management system using LoRa and tensorflow deep learning model," IEEE Access, vol. 8,
pp. 148793-148811, 2020.
5. M. S. Farooq, S. Riaz, A. Abid, K. Abid, and M. A. Naeem, "A Survey on the Role of IoT in Agriculture for
the Implementation of Smart Farming," IEEE Access, vol. 7, pp. 156237-156271, 2019.
6. S. Mohammed and A. H. Alkeelani, "Locker Security System Using Keypad and RFID," in 2019 International
Conference of Computer Science and Renewable Energies (ICCSRE), 2019, pp. 1-5.
7. R. Ramani, S. Selvaraju, S. Valarmathy, and P. Niranjan, "Bank locker security system based on RFID and
GSM technology," International journal of computer applications, vol. 57, 2012.
8. R. R. Gangi and S. S. Gollapudi, "LOCKER OPENING AND CLOSING SYSTEM USING RFID,
FINGERPRINT, PASSWORD AND GSM," International Journal of Emerging Trends & Technology in
Computer Science, vol. 2, pp. 142-145, 2013.
9. K. Verma and P. Tripathi, "A digital security system with door lock system using RFID technology,"
International Journal of Computer Applications, vol. 5, pp. 6-8, 2010.

020098-6
10. D. Suh, H. Ko, and S. J. I. T. o. V. T. Pack, "Efficiency analysis of WiFi offloading techniques," vol. 65, pp.
3813-3817, 2015.
11. S. Ahmad and D. H. J. I. A. Kim, "Quantum GIS based descriptive and predictive data analysis for effective
planning of waste management," vol. 8, pp. 46193-46205, 2020.
12. R. Krishnamoorthy, K. Krishnan, and C. Bharatiraja, "Deployment of IoT for smart home application and
embedded real-time control system," Materials Today: Proceedings, 2021.
13. L. Leonardi, F. Battaglia, and L. L. J. I. I. o. T. J. Bello, "Rt-lora: A medium access strategy to support real-
time flows over lora-based networks for industrial iot applications," vol. 6, pp. 10812-10823, 2019.
14. D. Croce, M. Gucciardo, S. Mangione, G. Santaromita, and I. J. I. T. o. W. C. Tinnirello, "LoRa technology
demystified: From link behavior to cell-level performance," vol. 19, pp. 822-834, 2019.
15. N. R. Kumar, C. Bhuvana, and S. Anushya, "Comparison of ZigBee and Bluetooth wireless technologies-
survey," in 2017 International Conference on Information Communication and Embedded Systems (ICICES),
2017, pp. 1-4.
16. P.-A. Laharotte, R. Billot, E. Come, L. Oukhellou, A. Nantes, and N.-E. J. I. T. o. I. T. S. El Faouzi,
"Spatiotemporal analysis of bluetooth data: Application to a large urban network," vol. 16, pp. 1439-1448,

Downloaded from http://pubs.aip.org/aip/acp/article-pdf/doi/10.1063/5.0101139/16649245/020098_1_online.pdf


2014.
17. A. K. Sultania, C. Blondia, and J. Famaey, "Optimizing the Energy-Latency Trade-Off in NB-IoT with PSM
and eDRX," IEEE Internet of Things Journal, 2021.
18. H. Xu, Y. Cheng, and P. Wang, "Jamming Detection in Broadband Frequency Hopping Systems Based on
Multi-Segment Signals Spectrum Clustering," IEEE Access, vol. 9, pp. 29980-29992, 2021.
19. Y. Chen, W. Trappe, and R. P. Martin, "Detecting and localizing wireless spoofing attacks," in 2007 4th
Annual IEEE Communications Society Conference on sensor, mesh and ad hoc communications and networks,
2007, pp. 193-202.
20. G. H. Talakala and J. Bapat, "Detecting Spoofing Attacks in Zigbee using Device Fingerprinting," in 2021
IEEE 18th Annual Consumer Communications & Networking Conference (CCNC), 2021, pp. 1-2.
21. B. Zhu, X. Hou, S. Liu, W. Ma, M. Dong, H. Wen, et al., "IoT Equipment Monitoring System Based on C5. 0
Decision Tree and Time-series Analysis," IEEE Access, 2021.
22. A. Manzoor, A. Braeken, S. S. Kanhere, M. Ylianttila, and M. Liyanage, "Proxy re-encryption enabled secure
and anonymous iot data sharing platform based on blockchain," Journal of Network and Computer
Applications, vol. 176, p. 102917, 2021.
23. H.-Y. Lin and Y.-M. Hung, "An Improved Proxy Re-Encryption Scheme for IoT-Based Data Outsourcing
Services in Clouds," Sensors, vol. 21, p. 67, 2021.
24. S. Geetha, K. Satheesh Kumar, C. R. Rao, M. Vijayan, and D. Trivedi, "EMI shielding: Methods and
materials—A review," Journal of applied polymer science, vol. 112, pp. 2073-2086, 2009.

020098-7

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy