ABSTRACT
Traditional lock systems using mechanical lock and key mechanism are being replaced by new advanced techniques of locking system. These techniques are an integration of mechanical and electronic devices and highly intelligent. One of the prominent features of these innovative lock systems is their simplicity and high efficiency. Such an automatic lock system consists of electronic control assembly which controls the output load through a password. This output load can be a motor or a lamp or any other mechanical/electrical load.
Here we develop a password based security system using microcontroller, which provides control to the actuating the load. It is a simple embedded system with input from the keyboard and the output being actuated accordingly. This system demonstrates a password based door lock system wherein once the correct code or password is entered, the door is opened and the concerned person is allowed access to the secured area. Again if another person arrives it will ask to enter the password. If the password is wrong then door would remain closed, denying the access to the person.
TABLE OF CONTENTS
COVER PAGE
TITLE PAGE
APPROVAL PAGE
DEDICATION
ACKNOWELDGEMENT
ABSTRACT
SYMBOL/ABBREVIATION AND THEIR MEANING
CHAPTER ONE
INTRODUCTION
1.1 BACKGROUND OF THE PROJECT
- PROBLEM STATEMENT
- OBJECTIVE OF THE PROJECT
- SIGNIFICANCE OF THE PROJECT
- APPLICATION OF THE PROJECT
- SCOPE OF THE PROJECT
- LIMITATION OF THE PROJECT
- PURPOSE OF THE PROJECT
- PROJECT ORGANISATION
CHAPTER TWO
LITERATURE REVIEW
- REVIEW OF THE STUDY
- MECHANISM OF SECURITY ACCESS SYSTEM
- TYPES OF SECURITY ACCESS CONTROL
- REVIEW OF RELATED WORK
- MICROCONTROLLER UNIT
- DESCRITION OF AN AT9C52 MICROPROCESSOR
- ADVANTAGES OF USING 89s52 MICROCONTROLLER
- DISADVANTAGE OF USING 89C52
CHAPTER THREE
CONSTRUCTION METHODOLOGY
- BLOCK DIAGRAM OF THE SYSTEM
- BASICS OF THE SYSTEM
- CIRCUIT DIAGRAM OF SYSTEM
- PASSWORD BASED DOOR LOCKING SYSTEM PROJECT REQUIRED COMPONENTS
- PASSWORD BASED DOOR LOCKING SYSTEM PROJECT REQUIRED COMPONENTS
- PROGRAM CODE
- POWER SUPPLY UNIT
CHAPTER FOUR
TESTING AND RESULTS
- CONSTRUCTION PROCEDURE
- CASING AND PACKAGING
- ASSEMBLING OF SECTIONS
- PACKAGING
- MOUNTING PROCEDURE
- TESTING
CHAPTER FIVE
- CONCLUSION
- RECOMMENDATION
- REFERENCES
GLOSSARY OF SYMBOLS / ABBREVIATIONS
I Current
V Voltage
R Resistance
F Frequency
C Capacitance
W Power
IC Integrated circuit
LED Light Emitting Diode
AC Alternating current DC Direct current
CPU Central Processing Unit Ohms
NPN Negative – Positive – Negative
PNP Positive – Negative – Positive
1/0Input/output Vcc +5v = 1
GND Ground (0v)
EA Enable
ALE Address Latch enable
PSEN Program Latch enable
LCD – light cathode display
CHAPTER ONE
- INTRODUCTION
1.1 BACKGROUND OF THE STUDY
The security situation in many parts of the world today leaves much to be desired. In Nigeria particularly, the prevalence of armed robbers and other groups that constitute nuisance to the society has led to the loss of lives and properties worth millions of dollars according to R v Clouden (2018). Many of the attacks that led to the loss have occurred in the homes or in guarded compounds and the attacks took place in spite of the existence of seemingly impregnable security gates that were designed to ward off intruders. The needs for electronically controlled gates that have superior security features to those operated manually thus exist and have been on the increase in recent times.
Many attempts have been made to design such gates with various types of security features. In the work by Pete Harrison a microprocessor was used to monitor two gates which sense the approach of a vehicle. The gates automatically open, wait for a specified time and then close. It is clear that the features of these gates do not provide adequate security since any vehicle can gain entry into the compound. A system that provides efficient gate access and an estate control to perform the job of the gate security guard is discussed in the work (Pete Harrison, 2019). The fact that passwords belonging to one individual can be learned by another without the owner’s permission is a major drawback of the system: the rogue can use the stolen password to gain entry into the system. These data are stored in a databank for future comparison with visitors who will only be able to gain entry into a compound through gates if the data match. The system has the disadvantage that users must have been properly documented to enable them pass through the gate (Paolo Magrassi, 2017).
The main aim of this work is to build an access control system that allows only authorized persons to access a restricted area. The system that has been designed in this work uses microcontrollers and keypad as major components. A microcontroller is programmed to decode a given sequence of keys that is entered on a keypad; the microcontroller sends a command that activates a driver circuitry to operate the gate automatically. Some advantages of the system include:
(i) It does not need close contact to control the gate; the control can be done from inside the car at a distance.
(ii) It operates as a stand-alone system and does not require a network provider for reception of signals.
(iii) The use of a keypad to generate the code necessary for the opening and closing of the gate enhances the security of the system since it requires very many trials by an intruder to succeed in breaking into the system.
(iv)The features of the system that are controlled by the firmware resident in the memory of the microcontrollers can be easily improved for future upgrade.
1.2 PROBLEM STATEMENT
The need for having a constant home protection has always been there. But in the recent times, considering a dramatic rise in petty crimes like robbery and theft, the need has been more strongly felt to have a fool proof protection of the belongings and the family members. Home security has come a long way in the last few decades. It was in the hands of a guard who manually provided surveillance during nights in the earlier days, but it was not fool proof as it was only normal for him to have momentary lapse of concentration. This device brought solution to this need. It ensures adequate protection against intruders.
1.2 AIM AND OBJECTIVE OF THE PROJECT
The main aim of this project is to develop an embedded system, which is used to verify and authenticate the authorized and person enter the room. This code is entered from a handheld unit. The security of the system is enhanced since the code is not easy to break and is only known to the operator. The specific objectives of this project are to:
- Build this device that provides adequate security in our homes, offices, safes etc. (ie to reduce the risk of thieves, intruders or unauthorised personnel’s having access to our properties or privacy).
- Reduce the works of security personnel’s who stands to guard our homes or offices to only allow authorized persons access to our offices.
- Replace the traditional lock system which is using mechanical lock and key mechanism with embedded system.
- Produce a security activated system that will be simple in its operation, cost effective, durable and easily maintainable.
- To ensures maximum and adequate security in our home and offices.
- To creates an awareness alarm whenever someone wants to illegally try the wrong code on the security device
1.3 SIGNIFICANCE OF THE PROJECT
This device functions as an electronics watch dog. This device functions as a major security device used in residential, commercial, industrial, and military properties for protection against burglary (theft) or property damage, as well as personal protection against intruders.
This research work will throw more light on the best techniques for protecting our home or properties. This study will also be designed to be of immense benefit to all the users of security devices.
It will also serve as a guide to whoever that wants to purchase security devices.
Finally, it will also serve as a useful piece of information for both producers and users of security devices.
1.4 APPLICATIONS OF THE PROJECT
i. This simple circuit can be used at residential places to ensure better safety.
ii. It can be used at organizations to ensure authorized access to highly secured places.
iii. With a slight modification this Project can be used to control the switching of loads through password.
1.5 SCOPE OF THE PROJECT
The main component in the circuit is the controller. In this project 4×3 keypad is used to enter the password. The password which is entered is compared with the predefined password.
If the entered password is correct then the system opens the door by rotating door motor and displays the status of door on LCD. If the password is wrong then door is remain closed and displays “pwd is wrong” on LCD.
1.6 LIMITATIONS OF THE PROJECT
As we all know that no human effort to achieve a set of goals goes without difficulties, certain constraints were encountered in the course of carrying out this project and they are as follows:-
- Difficulty in information collection: I found it too difficult in laying hands of useful information regarding this work and this course me to visit different libraries and internet for solution.
- Difficulty in parts gathering: I found it too difficult when gathering electronics parts used for the prototype.
Financial Constraint: Insufficient fund tends to impede the efficiency of the researcher in sourcing for the relevant materials, literature or information and in the process of data collection (internet).
1.7 PURPOSE OF THE STUDY
The purpose of the system is to provide a user friendly security system for organizations and homes. This system is password based and allows only authorized person to access it with a password. It also has the provision of changing the password.
1.8 PROJECT ORGANISATION
The work is organized as follows: chapter one discuses the introductory part of the work, chapter two presents the literature review of the study, chapter three describes the methods applied, chapter four discusses the results of the work, chapter five summarizes the research outcomes and the recommendations.
Design And Implementation Of Microcontroller Based Password Activated Security System. (n.d.). UniTopics. https://www.unitopics.com/project/material/design-and-implementation-of-microcontroller-based-password-activated-security-system/
“Design And Implementation Of Microcontroller Based Password Activated Security System.” UniTopics, https://www.unitopics.com/project/material/design-and-implementation-of-microcontroller-based-password-activated-security-system/. Accessed 22 November 2024.
“Design And Implementation Of Microcontroller Based Password Activated Security System.” UniTopics, Accessed November 22, 2024. https://www.unitopics.com/project/material/design-and-implementation-of-microcontroller-based-password-activated-security-system/
Here’s a typical structure for Design And Implementation Of Microcontroller Based Password Activated Security System research projects:
- The title page of Design And Implementation Of Microcontroller Based Password Activated Security System should include the project title, your name, institution, and date.
- The abstract of Design And Implementation Of Microcontroller Based Password Activated Security System should be a summary of around 150-250 words and should highlight the main objectives, methods, results, and conclusions.
- The introduction of Design And Implementation Of Microcontroller Based Password Activated Security System should provide the background information, outline the research problem, and state the objectives and significance of the study.
- Review existing research related to Design And Implementation Of Microcontroller Based Password Activated Security System, identifying gaps the study aims to fill.
- The methodology section of Design And Implementation Of Microcontroller Based Password Activated Security System should describe the research design, data collection methods, and analytical techniques used.
- Present the findings of the Design And Implementation Of Microcontroller Based Password Activated Security System research study using tables, charts, and graphs to illustrate key points.
- Interpret Design And Implementation Of Microcontroller Based Password Activated Security System results, discussing their implications, limitations, and potential areas for future research.
- Summarize the main findings of the Design And Implementation Of Microcontroller Based Password Activated Security System study and restate its significance.
- List all the sources you cited in Design And Implementation Of Microcontroller Based Password Activated Security System project, following a specific citation style (e.g., APA, MLA, Chicago).