Assets and Keys Management System Using NFC Technology PDF
Document Details
Uploaded by Deleted User
Palestine Technical College
2018
Ezzaldeen Edwan, Asmaa Shaheen, Adnan Alloh
Tags
Related
- Chapter 2 - 06 - Understand Wireless Network-specific Attacks - 04_ocred_fax_ocred.pdf
- Computer By Com Sir डिजिटल वित्तीय उपकरण और अनुप्रयोग MCQ PDF
- IOT Unit-II Notes PDF
- Hoofdstuk 8 Mobile devices PDF
- Investigating Mobile Payment Usage in Saudi Arabia PDF
- Security Awareness, Module 5: Mobile Security PDF
Summary
This paper describes an automated assets and keys management system using NFC technology. The system allows employees to borrow keys from a key cabinet using their NFC tags, and the process is recorded electronically. The system uses an Android smartphone as the main controller, interfaced through the headphone jack, and it eliminates the need for paper records. The system also includes a web-based application for tracking key usage.
Full Transcript
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/328909641 Assets and Keys Management System Using NFC Technology Conference Paper · October 2018 DOI: 10.1109/ICPET.2018.00008 CITATIONS...
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/328909641 Assets and Keys Management System Using NFC Technology Conference Paper · October 2018 DOI: 10.1109/ICPET.2018.00008 CITATIONS READS 10 666 3 authors, including: Ezzaldeen Edwan Palestine Technical College 64 PUBLICATIONS 496 CITATIONS SEE PROFILE All content following this page was uploaded by Ezzaldeen Edwan on 22 February 2019. The user has requested enhancement of the downloaded file. Assets and Keys Management System Using NFC Technology Ezzaldeen Edwan, Asmaa Shaheen, Adnan Alloh Engineering Program Department Palestine Technical College - Deir El-Balah, Palestine. [email protected], [email protected], [email protected] This paper is organized as follows: section II reviews Abstract— With the increasing number of companies, universities and institutions it is necessary to preserve their assets important related work of asset management proposals. The contained inside their rooms and labs. Managing and protecting work methodology is presented in section III. Section IV, assets is an important issue and usually a dedicated person at the presents techniques used to analyze and realize this system institute carries out this work in a bureaucratic way. In this such as creating database, the user interfaces’ sketch of mobile work, we describe an innovative technological solution to the application, and the use cases. Section V discusses the result management problem of using traditional mechanical keys. of the implemented system. Section VI concludes our work Based on this need, the aim of this work is to design and and gives future directions to improve it. implement an automated assets and keys management system. In the proposed system, one can keep the keys in a key-cabinet, II. RELATED WORKS which can be locked or opened automatically. We rely on near field communication (NFC) technology, which exists in most of At the beginning of this section, we review the important the modern smart phones, to identify each key. Our main works and researches related to control applications through controller will be an Android based smart phone interfaced NFC-based smartphones. The use of NFC technology is not through its headphone jack to control the key-cabinet lock. The new, and one can find few publications covering this issue. smart phone contains all needed hardware and software Firstly, Shetty proposed and implemented an NFC-based components to achieve our goal. The employees can borrow the mobile asset management solution for medical equipment. keys easily using their NFC identification tags without using The solution provides a unique security feature that allows paper records. The opening of the key-cabinet door is controlled immediate detection of tampering with any equipment’s using a dedicated smart phone mounted near the key-cabinet. description. He reviews existing works and compares them to Moreover, employees will be able to borrow and return keys in any time and keep their track recorded in a mobile application. his solution and shows its efficiency. Coskun surveyed all the applications based on NFC technology in. The Coskun Keywords— NFC; Near Field Communication; Keys Management; paper covers all aspects of the NFC and emphasized on the Assets Management. academic and innovative issues providing a comprehensive, up-to-date review of the NFC technology, including academic I. INTRODUCTION studies as well as some valuable white papers of industry pioneers within the NFC ecosystem. The study provides a The most serious issue faced by most governmental and beneficial source to understand the status of NFC research. academic institutions is pirates and thefts. It is necessary to The Coskun concludes that the NFC has become an attractive identify the persons who use these keys in an easy way that research area for many researchers and practitioners due to its save time, efforts and keep an electronic record of all the exponential growth and its promising applications and related necessary information such as time, day, key, name… etc. services. without referring to paper documents. To overcome this In , Schuss and Rahkonen described the use of mobile problem at minimized costs, we employ a dedicated stationary phones as microcontrollers for control applications such as smart phone that is supported with the NFC technology to maximum power point tracking which is usually carried out by provide access management for the keys accurately, safely and microcontroller. They presented a mobile application using a efficiently. In addition, we seek an interactive web simple interface to increase the energy gained from PV cells application, which features the tracking of keys with a web without the need for an additional microcontroller. browser. In the rest of this section, we review the important existing NFC is a short-range wireless communication technology that systems used to lock/unlock the doors. The first system of this enables two electronic devices to establish. The opportunities the key card door lock system, which a security system that provided by combining the technology of NFC with the allows users to access doors with an electronic keycard instead capabilities of modern smartphones are summarized in. of a traditional key. The main advantages are having high NFC tag is placed on each key and when the tapping with the reliability, good security, and high speed dependent on RFID smart phone to know the key which was taken and the person (Radio-frequency Identification) protocol. The main who took this key and are recorded the borrow process in the disadvantage of this system is that not work when the key card records for reference when needed. is lost and in general it has high costs. Fingerprint door lock systems are getting more and more popular. Advantages The system is divided into subtasks, e.g. identifying the such systems are having a high reliability for authorized employee, identifying the keys’, storing the information, people but a fingerprint scan door lock needs electricity to run, connect the mobile application to website and make a mobile and any power failure could hinder it totally useless. application as a microcontroller to locks/unlocks the door Another type of door lock systems is using a smartphone automatically. dependent on communication technologies e.g. Bluetooth and The actors who are using this system and the functions of the Wi-Fi. The main advantages of this system are having high system are shown in Figure 2. speed compared with other systems and reliability for opening door only for authorized people. However, the main disadvantages of the system are poor radiality and being not secure when the mobile is lost. The final similar system is a code based keyless door lock system, which got popularity in the last few years. The main advantage is no need to carry the key all the time. Forgetting the passcode is main disadvantage. The previous systems are needed at each door to distinguish employees, but our system needs just one set to incorporate all the keys of the organization, which minimizes the costs. III. METHODOLOGY This system allows employees to borrow the keys of laboratories and rooms using a mobile application based on NFC technology with storing all information about this process automatically in an electronic record eliminating the need for paper records. In an addition, the system identifies employees before any borrowing process who are eligible to borrow keys from the keys-cabinet. The mobile application is linked to the cloud to store keys track information for future use. The flowchart is shown in Figure 1: Figure 2: Flowchart scenario for the application A. Mobile application as a microcontroller A mobile application is a type of application software designed to run on a mobile device, such as a smartphone or a tablet. Mobile applications frequently serve to provide users with similar services to those accessed on PCs. As mobile use continues to grow worldwide, the “app vs. web” question will remain a very real consideration for organizations seeking to establish a mobile presence. In this project, we used the application to control the opening and closing of the door locker, which contains the keys of the various laboratories the smart phone is used as a microcontroller and is interfaced through the headphone jack without need for another microcontroller. B. NFC based identification of keys and an employees Each employee has a unique NFC identification tag and each key has as well has a unique NFC identification tag accessed by scanning the tag and storing the information in a mobile app. If the employee forgets an NFC tag or loses it, the Figure 1: Flowchart scenario for the application application allows another way for the employee who has the authority to borrow the key through the user name and password, but it is less secure than the first method. When the employee makes a mistake and takes the wrong key, he can interfaces of mobile designed by using wireframe to allow return it using the same mechanism. design easy by Android studio e.g. shown as in Figure 5. C. Interent of things By developing a mobile application connected to the internet via a website, we can track employees’ record and keys at any time and place thus it is an internet of things (IoT) system. The aim is to store the records at the cloud server for the following reasons: Avoid losses of data. Keep ubiquitous access to record files. Get unlimited storage. Allow sharing of record file with concerned staff. A sequence diagram borrow process is shown in Figure 3. Figure 3: Sequence diagram for borrow process The return process is the same as borrow process. Clearly, the admin can add, update and delete any information about employees and keys as shown in Figure 4. Figure 5: User interface wireframe This system allows employees to borrow and return keys. The implementation details are described in the next section. V. IMPLEMENTION AND RESULT When an employee at an institution needs a key of a room to give a lecture, the application should be previously opened and he takes the appropriate key that contains the NFC tag and the system records his attendance through the borrow interface. When the key is returned through the return interface, the systems knows the employee who took and the time of return and records the return data. Figure 4: Sequence diagram for admin process A. Link between android application and database The Android platform provides several ways to store user and IV. SYSTEM ANALYSIS app data. SQLite is one way of storing user data. SQLite is a The waterfall model is a classical model of software very light weight database which comes with Android OS. engineering. This model is one of the oldest models and is SQLite is an opensource SQL database that stores data to a widely used in government projects and in many major text file on a device and SQLite is a relational database companies. It includes requirements gathering, planning, management system (RDBMS). Like other RDBMSs, data is analysis & design, implementation and deployment. The accessed in a SQLite database by using Structured Query Language (SQL). The main package is 'android.database.sqlite' that contains the classes to manage your own databases, In order to create a database one just need to call this method openOrCreateDatabase with his database name and mode as a parameter. It returns an instance of SQLite database which one must receive in his own object. B. Connection between system elements To link the project elements together communication techniques is needed. Therefore, the employee should have an NFC identification tag to allow him to borrow and he should have eligible to access the key locker. On the other hand, the application must be connected to the Internet so that the process of lending and recording the necessary information in the electronic records available on the website is done successfully. The structure of the system and elements how implantation as shown in the Figure 6. Figure 8: Main UIs of the mobile application D. Hardware components We lock/unlock the door of keys board after identifying the authorized employees by NFC tags. A smart phone acts as a microcontroller interfaced via a headphone jack using a simple DTMF (Dual Tone Multi Frequency) circuit as shown in Figure 9. Figure 6: Structure of the system and its elements C. Graphical user interface (GUI) Figure 9: DTMF decoder circuit combined with H-bridge circuit This circuit identifies the dial tone from the telephone line or mobile device and decodes the key pressed on the remote telephone. For the detection of DTMF signal, we use the MT8870DE, which is a touch-tone decoder IC. It decodes the input DTMF to 5 digital outputs. The M-8870 DTMF decoder IC uses a digital counting technique to determine the frequencies of the limited tones and to verify that they correspond to standard DTMF frequencies. We combine this circuit with electrical center lock motor to open and close the door automatically using headphone jack in the mobile. The Figure 7: Main UIs results of the mobile application center lock motor is mounted on the door of the key-cabinet is shown in Figure 10. consumes time and efforts. To the best of our knowledge, this is the first proposal for using NFC tags for key management application. Certainly, much improvement can be done after getting feedback from the users. REFERENCES S. Burkard, Near field communication in smartphones, 2012. N. Shetty, and H. Ragab-Hassen, "NFC-based asset management for medical equipment." pp. 246-251. V. Coskun, B. Ozdenizci, and K. Ok, “The Survey on Near Field Communication,” Sensors, vol. 15, no. 6, Figure 10: An electric center lock motor pp. 13348. C. Schuss, and T. Rahkonen, "Use of mobile phones A prototype of the hardware circuit is shown in Figure 11. as microcontrollers for control applications such as maximum power point tracking (MPPT)." pp. 792- 795. "Electroinc locks/Unlocks door system," 23-08, 2018; https://www.eagleslocksmith.com/advantages- and-disadvantages-of-a-keyless-door-lock/. "Electrical locks/Unlocks door system," 24-08, 2018; http://bestforthehome.com/disadvantage-of- fingerprint-door-lock-that-you-need-to-know/. "Mobile application vs web application," 01/08/2018; https://www.techopedia.com/definition/2953/mobile- application-mobile-app. N. M. A. Munassar, and A. Govardhan, “A comparison between five models of software engineering,” International Journal of Computer Science Issues (IJCSI), vol. 7, no. 5, pp. 94. V. Jain, M. S. Gaur, V. Laxmi et al., "Detection of SQLite Database Vulnerabilities in Android Apps." pp. 521-531. S. Chakraborty, S. Sen, S. Priya et al., “Mobile based Figure 11: A prototype implementation of the circuit appliance control using DTMF decoder,” Kiit University, 2015. VI. CONCLUSION In this paper, we proposed and implemented an NFC-based key management system for labs and rooms at universities. The system helps administrators to easily record the borrow information and to secure laboratories and keys from theft and misuse. Consequently, it can replace the paper records, which View publication stats