Simcard Management Using Biometric System
Simcard Management Using Biometric System
INTRODUCTION
1.0 Introduction
This chapter covers the background of the study, the problem statement, the
research purpose, the research questions, the scope of the inquiry, the
significance of the study, and the project organization are all covered in this
chapter.
Sim cards play a crucial role in providing mobile services to the people in
Somalia. The mobile telecommunications industry has grown rapidly in
Somalia in recent years, with a significant increase in the number of mobile
phone users. The use of sim cards has become a crucial part of daily life,
facilitating communication, commerce, and the transfer of information.
However, the current process of sim card identification is not secure, and there
have been instances of sim cardfraud and illegal activities, and issue related
Sim card lose they face daily the Somali people in city and all the other regions
and they don’t get fast the renew of the sim card by asking in chargeassociated
with them.The process of sim card identification in Somalia involves
presenting identification documents, such as a national ID card or passport, to
the service provider. This information is then recorded in a database and linked
to the sim card. However, there have been instances of fraudulent individuals
using fake identification documents to obtain sim cards for illegal activities,
such as
1
money laundering, terrorism, and human trafficking. In addition, the lack of
proper regulation andenforcement mechanisms has made it difficult to track
and prevent such illegal activities.
To improve the security of sim card identification and prevent such illegal
activities, the use of biometric authentication systems has been proposed.
Biometric authentication systems use unique physical or behavioural
characteristics, such as fingerprints, facial recognition, and iris scans, to verify
an individual's identity. The use of biometric authentication systems provides
a secure andreliable method of identification, as it is difficult to forge or tamper
with biometric data.
2
1.2 Problem statement
The current process of sim card identification in Somalia is not secure, and
there is a need for a more reliable and secure system to prevent sim card fraud
and illegal activities. The current process of sim card identification involves
presenting identification documents, such as his/her number also basic
information needed, to the service provider. This information is then recorded
in a database and linked to the sim card. However, this process has several
limitations that make it vulnerable to fraud and illegal activities.
First, the use of identification documents for sim card identification is not a
secure method of verifying an individual's identity. There have been instances
of fraudulent individuals using fake identification documents to obtain sim
cards for illegal activities, such as money laundering, terrorism, and human
trafficking. This makes it difficult to track and prevent such activities.
Third, the current system does not provide a secure method of linking an
individual's identity to their sim card. This makes it easier for fraudulent
individuals to obtain sim cards using false identities and use them for illegal
activities. To address these limitations, the use of biometric authentication
systems, such as fingerprint recognition, has been proposed as a solution to this
problem. Biometric authentication systems useunique physical or behavioural
characteristics, such as fingerprints, facial recognition, and iris scans, to verify
3
an individual's identity. The use of biometric authentication systems provides
a secure and reliable method of identification, as it is difficult to forge or
tamper with biometric data.
4
i. To assess the technical requirements for implementing fingerprint
recognition technology for sim card identification in Somalia,
including the development of a database offingerprints, the installation
of biometric devices, and the training of personnel.
ii. To evaluate the effectiveness of using fingerprint recognition
technology for sim card identification in Somalia, including the
accuracy and reliability of the system, the speed and efficiency of the
authentication process.
iii. To Facilitate the renewing Sim cards in Somalia using techniques such
as fingerprint in an effectiveness way.
The scope of this Study is to stop challenges related the renewing Sim cards by using
fingerprint method. By implementing easy and safe way to renew Sim cards every time
and everywhere, andour main goal is to avoid asking citizens for in a charge to renew
their Sim cards when they loss, this system will be used to register any data that can need
to tomorrow for the citizens like his/heridentification by fingerprint
5
1.6 Significance of the project
6
1.7 REPORT ORGANIZATION
Chapter Two: This chapter also discusses the introduction of relevant literature of
Simcard Management Using Biometric with listing concepts and opinions from experts or
authors. This chapter deals with previous work or existing systems for based Simcard
Management Using Biometric Gab analysis will be displayed using tabulated form.
Chapter Three: Defines how the data collected, analyzed, how the interview has been
done and the finding of the analyzed data and also the chapter will discuss how the system
was analyzed using UML (use case diagram).
Chapter Four : is the last phase of the project and describes the implementation of this
project and testing it to produce complete functioning system.
7
CHAPTER TWO
LITERATURE REVIEW
2.0 Introduction
8
Literature
Review
2.3 Compare
2.1 Theoretical
Between 2.4 Chapter
2.0 Introduction & Conceptual 2.2 Case Study
Existing Summary
Framework
Systems
Identification technologies
Agent structure
9
2.1 Theoretical and Conceptual Development
previous work
Sim card security system is needed for convenience and safety. This system
invented to keep sim card safe from intruder. In this work, we present the
design and implementation of a GSM based wireless sim card security system,
which take a very less power. The system is a wireless sim cardnetwork which
contains a GSM modem and magnet with relay which are sim security nodes.
Thesystem can response rapidly as intruder detect and GSM module will do
alert sim card owner. This security system for alerting a Sim card owner
wherever he will. In this system a relay and magnetinstalled at entry point to
precedence produce a signal through a public telecom network and sends a
message or redirect a call that that tells about your sim card update or
predefined message whichis embedded in microcontroller. Suspected activities
are conveyed to remote user through SMS or Call using GSM technology.
(Castellano, 2005)
10
In this proposed work, RFID reader reads the ID number from passive tag and
sends to the microcontroller, if the id number is valid then only it gives the
access to the fingerprint scanner otherwise it stops the process, if the fingerprint
is matched then microcontroller sends the password to the authenticated 6-
person mobile number then the authenticated person enters the bothpasswords
in the keyboard which was already given by the user and received from the
microcontroller. if these two passwords are matched then the locker will be
opened otherwise the microcontroller sends the warning message to the
authenticated person mobile number and it willbe remained in locked position.
Security has been playing a key role in many of our places like offices,
institutions, libraries, laboratories etc. in order to keep our data confidentially
so that no other unauthorized person couldhave an access on them. Nowadays,
at every point of time, we need security systems for protectionof valuable data
and even money. This paper presents a fingerprint-based sim accessing system
which provides security which can be used for many banks, institutes and
various organizations etc..,. There are other methods of verifying authentication
through password, RFID but this method is most efficient and reliable. To
provide perfect security to the bank lockers and to make the workeasier, this
project is taking help of two different technologies viz. EMBEDDED
SYSTEMS and BIOMETRICS. Unauthorized access is prohibited by
designing a lock that stores the fingerprints of one or more authorized users.
Fingerprint is sensed by sensor and is validated for authentication. If the
fingerprint matches, the sim will be accessed automatically otherwise the
buzzer connectedto an audio amplifier will be activated so that the people near
the surroundings will get an alert.
(Aditya Shankar, 2015)
Fingerprint matching has been successfully used by law enforcement for more
than a century. Thetechnology is now finding lot of other applications such
as identity management and access
11
control. In this context, an automated fingerprint recognition system and
identification of key challenges are described along with the research
opportunities. The description is like a product design in this report
implementing RTOS. (Real time operating system) under the domain of
embedded system.
Security is the major issue faced by everyone when we are away from our
households. In the present scenario satisfactory solution for the above problem
is not yet discovered. Presented hereis an electronic locking system in which
Arduino plays the role of the processing unit. Arduino which is a
microcontroller board belongs to at mega family. It is an open-source simple
tool. It hasthe ability to sense, monitor, store and control applications.
12
Management
Management is essential for an organized life and necessary to run all types
of management. Good management is the backbone of successful
organizations. Managing life means getting things done to achieve life’s
objectives and managing an organization means getting things done with
and through other people to achieveits objectives.
13
with a common structure or function. System is a set of principles or procedures according
to which something is done; an organized scheme or method (system, 2014).
Arduino Microcontroller
MySQL
14
2.2 Case study of the research
Somali tack has traditional system. It requires to have a good Design and
implementation and Simcard Management Using Biometric system Somali
immigration is located in the capital city of Somalia – Muqdisho.
❖ Vision
To work toward an equitable Somali tack by ensuring access to Design
and implementation and Simcard Management Using Biometric system
space and beauty full workers, and by educating beginning agents and
Somali tack of all ages.
❖ Mission
People cooperate to create and sustain needs communities by growing
Somali tack and we will promise to get any skills about Samoa Somali tack
in every country in the world
15
2.3.1 Identification technologies
When the user seeks for a service, i.e., in authentication mode, the user inputs
his assigned ID andpresents his fingerprint to the sensor. The system captures
the image, extracts (input) features from it, and attempts to match the input
features to the template features corresponding to the subject’sID in the system
database. If the calculated similarity score between the input and the template
is larger than the predetermined threshold, the system determines that the
subject is who he claims to be and offer the service; otherwise, would reject
the claim. IN identification mode, on the other
15 hand, the user who seeks for a service presents his fingerprint only without
his ID, and the system may either be able to determine the identity of the
subject or decide the person is not enrolled in the database. (Kaoru Uchida,
2015)
16
Figure 2.3 identification technologies
This is where the whole process of SIM card registration occurs in the
proposed system. Here a prospective subscriber of a mobile operator brings a
national identity card. This card has a numberof unique features which can be
used to in scanning or reading for verification in the national identity or
centralized database. For example, a Malawian national identity card has; ID
number, QR code, computer chip and holder fingerprints. ID number and
computer chip are on the front of the card while QR code and holder’s
fingerprint are on the rear.
17
Figure 2.13 Sample
ID,
Malawi
18
2.4 CHAPTER SUMMARY
This chapter discussed Theoretical and Conceptual Development Using Biometric system
and, Case study of the research, Compare Between exiting system Chapter Summary.
19
CHAPTER THREE
3.0 Introduction
The word software was first used by John Turkey in 1958. The theory of software was first
proposed by Alan Turing in 1935.
1. System software serves as a base for application software. System software includes device
drivers, operating systems (OSs), compilers, disk formatters, text editors and utilities
helping the computer to operate more efficiently
2. Programming software is a set of tools to aid the developers to write programs. The various
tools available are compilers, linkers, debuggers, interpreters and text editors.
3. Application software is intended to perform certain tasks. Examples of application software
include office suites, gaming applications, database systems and educational software.
(software, n.d.)
20
Planning: A basic management function involving formulation of one or more detailed
plans to achieve optimum balance of needs or demands with the available resources.
(definition/planning.html, n.d.)
This chapter will include the following sections: Introduction, Operational Framework,
Work Break down structure (WBS), System Requirement, Problem Analysis
Identification, Requirements Gathering Techniques, Process Modeling, Data Modeling,
Suitable solution Strategies of the proposed system, System Feasibility and Chapter
Summary.
The Operational Framework starts planning, proposal, chapter one introduction, chapter
two literature review, chapter three software planning & analyzing chapter four software
design, chapter five system implementation and finally chapter six conclusions &
enhancement
21
Initialization and planning
Phase one
Literature Review
Data gathering
Interview Observation
Phase Two
Analyzing
DESIGNING PROTOTYPE
NO
System
Acceptanc
Phase Three
e
YES
Report writing
22
3.2 Work Break down structure (WBS)
Work break down structure (WBS) is a vehicle for breaking an engineering project down
into subproject, tasks, subtasks, work packages, and so on. It is an important planning tool
which links objectives with resources and activities in a logical framework. It becomes an
important status monitor during the actual implementation as the completions of subtasks
are measured against the project plan. (Robert, 1984)
A) WBS product
Admin
Reports
Figure 3. 2 WBS
23
B) WBS process
24
a) User Interfaces: The keyboard, mouse, menus of a computer system. The user interface
allows the user to communicate with the operating system.
b) Software Interfaces: The languages and codes that the applications use to communicate
with each other and with the hardware.
c) Hardware Interfaces: The wires, plugs and sockets that hardware devices use to
communicate with each other, computer systems, or any other medium of
communication. A physical interface is the interconnection between two items of
hardware or machinery.
One of the critical success factors in the development of high quality software product or
website is the deep understanding of the user’s real requirement as opposite to their
perceived requirements. This will make the product very easy to develop, maintain, and to
use the software properly by the end users.
User requirement is the process by which user desires, needs, and expectations are gathered
in order to establish what the users will actually use the software for, and recorded in a way
that will be meaningful both to the users and developments (Robert, 1984).
25
3.3.1.2 Hardware Requirement
1 Computer HB
2 Corei5 or Corei7
3 4GB or 8GB RAM
4 500 or 1 TB hard disk
A document that defines what a proposed system must be capable of doing to solve the
problems of a defined set of potential users of such a system. Therefore it is most unlikely
to be created using a conventional requirements-analysis method, since these introduce
solution bias, representations, and concepts that are rarely understood by (and are irrelevant
to) the users (user-requirements, 2017).
A customer cannot demand features not in the user requirement document (URD), while
the software developer cannot Design and Implementation of Account Holders Information
System for Microfinance Bank the product is complete and ready if it does not meet even
one item of the user requirement document (URD).
The current method in which the After observing the Design and Implementation of
Account Holders Information System for Microfinance Bank process in detail, I have
noticed the system had the following problems such as facilitates more functions that helps
everyone in our customers’
26
Somalia does not have Application Design and Implementation of Account Holders
Information System for Microfinance Bank. I made Application Design and
Implementation of Account Holders Information System for Microfinance Bank. that uses
in everyone
And also we create some of features to help users this App (hohner, 1984).
Admin Problem
➢ No direct role for the management.
➢ Lack of efficient and useful reports.
Procedural Problem
Technical Problem
Requirements gathering techniques are a process of collecting data from different sources.
Data or (datum in singular) is valuable pieces of information collected during the research.
Data can be divided in to two categories: primary data and secondary data. First, the
observation will be carefully evaluated and to ensure its validity and reliability by pilot test
(chimer, 1984).
There are various methodologies for gathering data as the following:
✓ Interviews
✓ Observations
27
3.5.1 Interview
An interview is a formal face-to-face meeting, especially, one arranged for the assessment
of the qualifications of an applicant, as for employment or admission. A conversation, as
one conducted by a reporter, in which facts or statements are elicited from another, the
interview is the primary technique for information gathering during the systems analysis
phases of a development project. It is a skill which must be mastered by every analyst. The
interviewing skills of the analyst determine what information is gathered, and the quality
and depth of that information. Interviewing, observation, and research are the primary tools
of the analyst.
The interview is a specific form of meeting or conference, and is usually limited to two
persons, the interviewer and the interviewee. In special situations there may be more than
one interviewer or more than one interviewee in attendance (martymodel, 2017).
The main advantage of interviews is that the researcher (interviewer) can adapt the
questions as necessary, clarify doubt and ensure that the responses are properly understood,
by repeating or rephrasing the questions. The researcher/interviewer can also pick up
nonverbal cues from the respondent. Any discomfort, stress and problems that the
respondent experiences can be detected through frowns, nervous taping and other body
language, unconsciously exhibited by any person.
28
3.5.1.2 Disadvantages of interview
The main disadvantages of face-to-face interviews are the geographically limitations they
may impose on the surveys and the vast resources needed if such surveys need to be done
nationally or internationally. The costs of training interviewers to minimize interviewer's
biases for example differences in questioning methods, interpretation of response are also
high. Another drawback is that respondents might feel uneasy about the anonymity of their
responses when they interact face to face interviews (somuiger, 1984).
3.5.2 Observation
a) Observer bias may occur. (Observer may only notice what interests him or her).
b) With participant’s observation, a skilled facilitator is needed to help participants present a
critical evaluation.
29
3.6 Process Modeling
Data Flow Diagrams show information transfers and process steps of a system. The general
concept is an approach of a depicting how occurs input in a system, further processes and
what runs out. The aim of DFD is in accomplishing of understanding between developers
and users. Data flow diagrams are maintained with other methods of structured systems
analysis.
A data flow diagram (DFD) illustrates how data is processed by a system in terms of inputs
and outputs. As its name indicates its focus is on the flow of information, where data comes
from, where it goes and how it gets stored.
30
Data Flow Diagrams notations:
The Data Flow Diagrams solution from the Software Development area of Concept Draw
Solution Park provides three vector stencils libraries for drawing DFD using the Concept
Draw PRO diagramming and vector drawing software.
The design elements library Data flow diagram (DFD) contains 15 data flow diagram
symbols for drawing both context-level data flow diagram and Level 1 DFD.
The design elements library DFD, Ganesa’s notation contains 12 data flow diagram
symbols of Ganesa’s DFD notation.
The design elements library DFD, Yourdon and Coad notation contains 22 data flow
diagram symbols of Yourdon/ DeMarco DFD notation (conceptdraw, 2017)
Process
Data Storage
External Entity
Data Flow
31
Figure 3. 4 UCD
3.6.2 Unified Modeling Language (UML)
UML stands for Unified Modeling Language; UML is a way of visualizing a software
program using a collection of diagrams. The notation has evolved from the work of Grady
Booch, James Rumbaugh, Ivar Jacobson, and the Rational Software Corporation to be used
for object-oriented design, but it has since been extended to cover a wider variety of
software engineering projects. Today, UML is accepted by the Object Management Group
(OMG) as the standard for modeling software development (draw, 2017)
The key to making a UML diagram is connecting shapes that represent an object or class
with other shapes to illustrate relationships and the flow of information and data. To learn
more about creating UML diagrams (draw, 2017).
The current UML standards call for 13 different types of diagrams: class, activity, object,
use case, sequence, package, state, component, communication, composite structure,
interaction overview, timing, and deployment.
These diagrams are organized into two distinct groups: structural diagrams and behavioral
or interaction diagrams (draw, 2017).
32
3.6.2.1 Use Case Diagram (UCD)
A use case is a methodology used in system analysis to identify, clarify, and organize
system requirements. The use case is made up of a set of possible sequences of interactions
between systems and users in a particular environment and related to a particular goal. It
consists of a group of elements (for example, classes and interfaces) that can be used
together in a way that will have an effect larger than the sum of the separate elements
combined (techtarget, 2017).
A use case diagram shows you some of the use cases in your system, some of the actors in
your system, and the relationships between them. A use case is a high – level piece of
functionality that the system will provide. An actor is anyone or anything that interacts
with the system being built.
Use case diagram is done in an early phase of a software development project. The use case
diagram describes the use case (functions of the system), Actors (users) and the relationship
between the actors and the use case is connective
Here are the Symbols of UCD:-
Figure 3. 5 UCD
33
Log in
divice
Address
Customer
User
Admin
branches
Reports
34
3.7 Data Modeling
Data modeling is the analysis of data objects and their relationships to other data objects.
Data modeling is often the first step in database design and object-oriented
programming as the designers first create a conceptual model of how data items relate to
each other. Data modeling involves a progression from conceptual model to logical model
to physical schema(webo, 2017).
The basic building blocks of ERD are Entity, Attributes, Relationship and lines entity is an
object that exists and is distinguishable from other object in other words Entity types or
Entity set is a collection of similar entities; an entity may belong to more than one entity
type. A relationship is an association of entities where the association includes one entity
from other particular types is meaningful association before entity types. Attributes are
35
properties of entity types in other words; entities are described in a data base by a set of
attributes (Peter Pin-Shan Chen, 1976)
The ERD is used to represent database schema, here are some symbols used to represent
ERD Symbols:
Line
Attribute
Entity Relationship
Figure 3. 7 ERD
36
3.7.1.2 TYPES OF RELATIONSHIP
Relationship is an association among one or more entities. This relationship can be broadly
classified into one-to-one relation, one-to-many relation, many-to-many relation.
• One to many Relationship Type: Abbreviated 1:M, the relationship that associate one
entity to more than one entity is called one to many relationship: - Example is country
having states for one country there can be more than one states hence is an example
one to many relationships.
• One to one Relationship Type: Abbreviated 1:1, one to one relationship is a special
case of one to many relationships. True one to one relationship is rare. The relationship
between the president and Country is an example is one to one relationship.
• Many to Many Relationship Type: Abbreviated M: M, the relationship between
EMPLOYEE entity and PROJECT entity is an example of many to many relationships.
Many employees will be working in many projects hence the relationship between
employee and project is many to many relationships.
• Many to One Relationship Type: Abbreviated M: 1, the relationship between
EMPLOYEE and DEPARTMENT is an example of many to one relationship, there
may be EMPLOYEE working in one DEPARTMENT. Hence relationship between
EMPLOYEE and DEPARTMENT is many to one relationship (Aplim, 2010).
One-to-one
One-to-many
37
Many-to-many
Many-to-one
1 * 1
Simcard
Management Using *
Biometric system address
38
As we are reaching the development phase, this section would contemplate on other ways
project’s objectives can be achieved. As you may know, the system will be developed in
PHP. Programming language and it is the most used or popular.
A feasibility study for an information system project is an in-depth look at the project in
order to determine whether or not an organization should proceed with its implementation.
Feasibility studies provide project managers with an overview of the primary issues related
to the project, as well as insights about the outcomes of the project, before the company
invests too much time and money (reference, 2017).
A feasibility study could be used to test a new working system, which could be used
because the Feasibility study is an analysis of possible alternative solutions to a problem
and a recommendation on the best alternative. It can decide whether a process be carried
out by a new system more efficiently than the existing one.
39
This can be counted in terms of volumes of data, trends, frequency of updating, etc. in
order to estimate whether the new system will perform sufficiently or not. Technological
feasibility is carried out to determine whether the company has the capability, in terms of
software, hardware, personal and expertise, to handle the completion of the project.
Total $660.00
Table 3. 5 Items
Operational feasibility is the ability to utilize, support and perform the necessary tasks of a
system or program. It includes everyone who creates, operates or uses the system. To be
operationally feasible, the system must fulfill a need required by the business. The
following table will show the training cost of the user of the system.
40
41
Table 3. 6 Operational Feasibility
Total $1000.00
Economic analysis is the most frequently used evaluating the effectiveness of proposed
system, more commonly known as benefit analysis.
The benefit analysis is to determine benefits and saving which are expected from candidate
system and compare them with cost. If the benefits are more than the cost, the decision is
made to design and implement the system. The cost and benefits may be direct or indirect
and tangible or intangible.
42
3.9.4 Schedule Feasibility
Typically, this means estimating how long the system will take to develop, and if it can be
completed in a given time period using some methods like payback period. Schedule
feasibility is a measure of how reasonable the project timetable is.
This involves questions such as how much time is available to build the new system, when
it can be built, whether it interferes with normal business operation, number of resources
required, dependencies, can the system be developed in time etc. The project duration
schedule is explained in the following.
This chapter presented the following sections: Introduction, Operational Framework, Work
Break down structure (WBS), System Requirement, Problem Analysis Identification,
Requirements Gathering Techniques, Process Modeling, Data Modeling, Suitable solution
Strategies of the proposed system, System Feasibility and Chapter Summary.
43