SlideShare une entreprise Scribd logo
1  sur  1
WIRELESS ACCESS CONTROL SYSTEM BASED ON
IEEE 802.15.4
ABSTRACT:
Access control systems are the main security mechanisms to control the access of
environments. This paper describes about the implementation and deployment of wireless
access control system for providing authorized access in a smart home environment. It makes
use of ZigBee and image processing technique to control the door lock. ZigBee enabled door
lock module has been designed and developed. The image transfer over ZigBee network has
been analyzed for different image size and the challenges involved in the face recognition
module are discussed.

Contenu connexe

Tendances

A novel architecture for lightweight block cipher, piccolo
A novel architecture for lightweight block cipher, piccoloA novel architecture for lightweight block cipher, piccolo
A novel architecture for lightweight block cipher, piccolo
eSAT Journals
 
A design for wireless access control system based on zig bee
A design for wireless access control system based on zig beeA design for wireless access control system based on zig bee
A design for wireless access control system based on zig bee
IMPULSE_TECHNOLOGY
 

Tendances (13)

S_IOT_Intro.pptx
S_IOT_Intro.pptxS_IOT_Intro.pptx
S_IOT_Intro.pptx
 
IoT/M2M Security
IoT/M2M SecurityIoT/M2M Security
IoT/M2M Security
 
Communication technologies
Communication technologiesCommunication technologies
Communication technologies
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
IoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesIoT Levels and Deployment Templates
IoT Levels and Deployment Templates
 
Ppt 3 - IOT logic design
Ppt   3 - IOT logic designPpt   3 - IOT logic design
Ppt 3 - IOT logic design
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
Iot Security
Iot SecurityIot Security
Iot Security
 
IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process
 
Introduction to IOT security
Introduction to IOT securityIntroduction to IOT security
Introduction to IOT security
 
IoT-SecurityECC-v4
IoT-SecurityECC-v4IoT-SecurityECC-v4
IoT-SecurityECC-v4
 
A novel architecture for lightweight block cipher, piccolo
A novel architecture for lightweight block cipher, piccoloA novel architecture for lightweight block cipher, piccolo
A novel architecture for lightweight block cipher, piccolo
 
A design for wireless access control system based on zig bee
A design for wireless access control system based on zig beeA design for wireless access control system based on zig bee
A design for wireless access control system based on zig bee
 

En vedette

Triple loop modulation (tlm) for high reliability and efficiency in a power f...
Triple loop modulation (tlm) for high reliability and efficiency in a power f...Triple loop modulation (tlm) for high reliability and efficiency in a power f...
Triple loop modulation (tlm) for high reliability and efficiency in a power f...
Ecwaytech
 
Voice operated home appliance control
Voice operated home appliance controlVoice operated home appliance control
Voice operated home appliance control
Ecwaytech
 
Ultrasonic sensor based automatic braking comfort
Ultrasonic sensor based automatic braking comfortUltrasonic sensor based automatic braking comfort
Ultrasonic sensor based automatic braking comfort
Ecwaytech
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...
Ecwaytech
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networks
Ecwaytech
 
On centralized and localized approximation algorithms for interference aware ...
On centralized and localized approximation algorithms for interference aware ...On centralized and localized approximation algorithms for interference aware ...
On centralized and localized approximation algorithms for interference aware ...
Ecwaytech
 
Voice operated remote for tv
Voice operated remote for tvVoice operated remote for tv
Voice operated remote for tv
Ecwaytech
 
Vehicle gas detection with automatic safety warning system using gsm
Vehicle gas detection with automatic safety warning system using gsmVehicle gas detection with automatic safety warning system using gsm
Vehicle gas detection with automatic safety warning system using gsm
Ecwaytech
 
Zigbee and atmega32 based wireless digital control and monitoring system for ...
Zigbee and atmega32 based wireless digital control and monitoring system for ...Zigbee and atmega32 based wireless digital control and monitoring system for ...
Zigbee and atmega32 based wireless digital control and monitoring system for ...
Ecwaytech
 
Zero no load power acdc adapter for electronic equipment with embed battery
Zero no load power acdc adapter for electronic equipment with embed batteryZero no load power acdc adapter for electronic equipment with embed battery
Zero no load power acdc adapter for electronic equipment with embed battery
Ecwaytech
 
Towards the implementation of iot for environmental condition monitoring in h...
Towards the implementation of iot for environmental condition monitoring in h...Towards the implementation of iot for environmental condition monitoring in h...
Towards the implementation of iot for environmental condition monitoring in h...
Ecwaytech
 
Vehicles tracking and braking system in traffic
Vehicles tracking and braking system in trafficVehicles tracking and braking system in traffic
Vehicles tracking and braking system in traffic
Ecwaytech
 
Wireless sensor network for multi storey building design and implementation
Wireless sensor network for multi storey building design and implementationWireless sensor network for multi storey building design and implementation
Wireless sensor network for multi storey building design and implementation
Ecwaytech
 
Teenage pregnancy in Sierra Leone
Teenage pregnancy in Sierra LeoneTeenage pregnancy in Sierra Leone
Teenage pregnancy in Sierra Leone
Khadi Mansaray
 
Zigbee device access control and reliable data transmission in zigbee based h...
Zigbee device access control and reliable data transmission in zigbee based h...Zigbee device access control and reliable data transmission in zigbee based h...
Zigbee device access control and reliable data transmission in zigbee based h...
Ecwaytech
 
Vampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networksVampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networks
Ecwaytech
 
Topology abstraction service for ip vp ns
Topology abstraction service for ip vp nsTopology abstraction service for ip vp ns
Topology abstraction service for ip vp ns
Ecwaytech
 
Towards the implementation of io t for environmental condition monitoring in ...
Towards the implementation of io t for environmental condition monitoring in ...Towards the implementation of io t for environmental condition monitoring in ...
Towards the implementation of io t for environmental condition monitoring in ...
Ecwaytech
 

En vedette (18)

Triple loop modulation (tlm) for high reliability and efficiency in a power f...
Triple loop modulation (tlm) for high reliability and efficiency in a power f...Triple loop modulation (tlm) for high reliability and efficiency in a power f...
Triple loop modulation (tlm) for high reliability and efficiency in a power f...
 
Voice operated home appliance control
Voice operated home appliance controlVoice operated home appliance control
Voice operated home appliance control
 
Ultrasonic sensor based automatic braking comfort
Ultrasonic sensor based automatic braking comfortUltrasonic sensor based automatic braking comfort
Ultrasonic sensor based automatic braking comfort
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networks
 
On centralized and localized approximation algorithms for interference aware ...
On centralized and localized approximation algorithms for interference aware ...On centralized and localized approximation algorithms for interference aware ...
On centralized and localized approximation algorithms for interference aware ...
 
Voice operated remote for tv
Voice operated remote for tvVoice operated remote for tv
Voice operated remote for tv
 
Vehicle gas detection with automatic safety warning system using gsm
Vehicle gas detection with automatic safety warning system using gsmVehicle gas detection with automatic safety warning system using gsm
Vehicle gas detection with automatic safety warning system using gsm
 
Zigbee and atmega32 based wireless digital control and monitoring system for ...
Zigbee and atmega32 based wireless digital control and monitoring system for ...Zigbee and atmega32 based wireless digital control and monitoring system for ...
Zigbee and atmega32 based wireless digital control and monitoring system for ...
 
Zero no load power acdc adapter for electronic equipment with embed battery
Zero no load power acdc adapter for electronic equipment with embed batteryZero no load power acdc adapter for electronic equipment with embed battery
Zero no load power acdc adapter for electronic equipment with embed battery
 
Towards the implementation of iot for environmental condition monitoring in h...
Towards the implementation of iot for environmental condition monitoring in h...Towards the implementation of iot for environmental condition monitoring in h...
Towards the implementation of iot for environmental condition monitoring in h...
 
Vehicles tracking and braking system in traffic
Vehicles tracking and braking system in trafficVehicles tracking and braking system in traffic
Vehicles tracking and braking system in traffic
 
Wireless sensor network for multi storey building design and implementation
Wireless sensor network for multi storey building design and implementationWireless sensor network for multi storey building design and implementation
Wireless sensor network for multi storey building design and implementation
 
Teenage pregnancy in Sierra Leone
Teenage pregnancy in Sierra LeoneTeenage pregnancy in Sierra Leone
Teenage pregnancy in Sierra Leone
 
Zigbee device access control and reliable data transmission in zigbee based h...
Zigbee device access control and reliable data transmission in zigbee based h...Zigbee device access control and reliable data transmission in zigbee based h...
Zigbee device access control and reliable data transmission in zigbee based h...
 
Vampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networksVampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networks
 
Topology abstraction service for ip vp ns
Topology abstraction service for ip vp nsTopology abstraction service for ip vp ns
Topology abstraction service for ip vp ns
 
Towards the implementation of io t for environmental condition monitoring in ...
Towards the implementation of io t for environmental condition monitoring in ...Towards the implementation of io t for environmental condition monitoring in ...
Towards the implementation of io t for environmental condition monitoring in ...
 

Wireless access control system based on ieee 802.15.4

  • 1. WIRELESS ACCESS CONTROL SYSTEM BASED ON IEEE 802.15.4 ABSTRACT: Access control systems are the main security mechanisms to control the access of environments. This paper describes about the implementation and deployment of wireless access control system for providing authorized access in a smart home environment. It makes use of ZigBee and image processing technique to control the door lock. ZigBee enabled door lock module has been designed and developed. The image transfer over ZigBee network has been analyzed for different image size and the challenges involved in the face recognition module are discussed.