SlideShare a Scribd company logo
1 of 1
WIRELESS ACCESS CONTROL SYSTEM BASED ON
IEEE 802.15.4
ABSTRACT:
Access control systems are the main security mechanisms to control the access of
environments. This paper describes about the implementation and deployment of wireless
access control system for providing authorized access in a smart home environment. It makes
use of ZigBee and image processing technique to control the door lock. ZigBee enabled door
lock module has been designed and developed. The image transfer over ZigBee network has
been analyzed for different image size and the challenges involved in the face recognition
module are discussed.

More Related Content

What's hot

S_IOT_Intro.pptx
S_IOT_Intro.pptxS_IOT_Intro.pptx
S_IOT_Intro.pptxrutika12345
 
Communication technologies
Communication technologiesCommunication technologies
Communication technologiesFabMinds
 
IoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesIoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesPrakash Honnur
 
Ppt 3 - IOT logic design
Ppt   3 - IOT logic designPpt   3 - IOT logic design
Ppt 3 - IOT logic designudhayakumarc1
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT SecurityCAS
 
IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process EC-Council
 
Introduction to IOT security
Introduction to IOT securityIntroduction to IOT security
Introduction to IOT securityPriyab Satoshi
 
A novel architecture for lightweight block cipher, piccolo
A novel architecture for lightweight block cipher, piccoloA novel architecture for lightweight block cipher, piccolo
A novel architecture for lightweight block cipher, piccoloeSAT Journals
 
A design for wireless access control system based on zig bee
A design for wireless access control system based on zig beeA design for wireless access control system based on zig bee
A design for wireless access control system based on zig beeIMPULSE_TECHNOLOGY
 

What's hot (13)

S_IOT_Intro.pptx
S_IOT_Intro.pptxS_IOT_Intro.pptx
S_IOT_Intro.pptx
 
IoT/M2M Security
IoT/M2M SecurityIoT/M2M Security
IoT/M2M Security
 
Communication technologies
Communication technologiesCommunication technologies
Communication technologies
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
IoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesIoT Levels and Deployment Templates
IoT Levels and Deployment Templates
 
Ppt 3 - IOT logic design
Ppt   3 - IOT logic designPpt   3 - IOT logic design
Ppt 3 - IOT logic design
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
Iot Security
Iot SecurityIot Security
Iot Security
 
IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process
 
Introduction to IOT security
Introduction to IOT securityIntroduction to IOT security
Introduction to IOT security
 
IoT-SecurityECC-v4
IoT-SecurityECC-v4IoT-SecurityECC-v4
IoT-SecurityECC-v4
 
A novel architecture for lightweight block cipher, piccolo
A novel architecture for lightweight block cipher, piccoloA novel architecture for lightweight block cipher, piccolo
A novel architecture for lightweight block cipher, piccolo
 
A design for wireless access control system based on zig bee
A design for wireless access control system based on zig beeA design for wireless access control system based on zig bee
A design for wireless access control system based on zig bee
 

Viewers also liked

Triple loop modulation (tlm) for high reliability and efficiency in a power f...
Triple loop modulation (tlm) for high reliability and efficiency in a power f...Triple loop modulation (tlm) for high reliability and efficiency in a power f...
Triple loop modulation (tlm) for high reliability and efficiency in a power f...Ecwaytech
 
Voice operated home appliance control
Voice operated home appliance controlVoice operated home appliance control
Voice operated home appliance controlEcwaytech
 
Ultrasonic sensor based automatic braking comfort
Ultrasonic sensor based automatic braking comfortUltrasonic sensor based automatic braking comfort
Ultrasonic sensor based automatic braking comfortEcwaytech
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Ecwaytech
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksEcwaytech
 
On centralized and localized approximation algorithms for interference aware ...
On centralized and localized approximation algorithms for interference aware ...On centralized and localized approximation algorithms for interference aware ...
On centralized and localized approximation algorithms for interference aware ...Ecwaytech
 
Voice operated remote for tv
Voice operated remote for tvVoice operated remote for tv
Voice operated remote for tvEcwaytech
 
Vehicle gas detection with automatic safety warning system using gsm
Vehicle gas detection with automatic safety warning system using gsmVehicle gas detection with automatic safety warning system using gsm
Vehicle gas detection with automatic safety warning system using gsmEcwaytech
 
Zigbee and atmega32 based wireless digital control and monitoring system for ...
Zigbee and atmega32 based wireless digital control and monitoring system for ...Zigbee and atmega32 based wireless digital control and monitoring system for ...
Zigbee and atmega32 based wireless digital control and monitoring system for ...Ecwaytech
 
Zero no load power acdc adapter for electronic equipment with embed battery
Zero no load power acdc adapter for electronic equipment with embed batteryZero no load power acdc adapter for electronic equipment with embed battery
Zero no load power acdc adapter for electronic equipment with embed batteryEcwaytech
 
Towards the implementation of iot for environmental condition monitoring in h...
Towards the implementation of iot for environmental condition monitoring in h...Towards the implementation of iot for environmental condition monitoring in h...
Towards the implementation of iot for environmental condition monitoring in h...Ecwaytech
 
Vehicles tracking and braking system in traffic
Vehicles tracking and braking system in trafficVehicles tracking and braking system in traffic
Vehicles tracking and braking system in trafficEcwaytech
 
Wireless sensor network for multi storey building design and implementation
Wireless sensor network for multi storey building design and implementationWireless sensor network for multi storey building design and implementation
Wireless sensor network for multi storey building design and implementationEcwaytech
 
Teenage pregnancy in Sierra Leone
Teenage pregnancy in Sierra LeoneTeenage pregnancy in Sierra Leone
Teenage pregnancy in Sierra LeoneKhadi Mansaray
 
Zigbee device access control and reliable data transmission in zigbee based h...
Zigbee device access control and reliable data transmission in zigbee based h...Zigbee device access control and reliable data transmission in zigbee based h...
Zigbee device access control and reliable data transmission in zigbee based h...Ecwaytech
 
Vampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networksVampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networksEcwaytech
 
Topology abstraction service for ip vp ns
Topology abstraction service for ip vp nsTopology abstraction service for ip vp ns
Topology abstraction service for ip vp nsEcwaytech
 
Towards the implementation of io t for environmental condition monitoring in ...
Towards the implementation of io t for environmental condition monitoring in ...Towards the implementation of io t for environmental condition monitoring in ...
Towards the implementation of io t for environmental condition monitoring in ...Ecwaytech
 

Viewers also liked (18)

Triple loop modulation (tlm) for high reliability and efficiency in a power f...
Triple loop modulation (tlm) for high reliability and efficiency in a power f...Triple loop modulation (tlm) for high reliability and efficiency in a power f...
Triple loop modulation (tlm) for high reliability and efficiency in a power f...
 
Voice operated home appliance control
Voice operated home appliance controlVoice operated home appliance control
Voice operated home appliance control
 
Ultrasonic sensor based automatic braking comfort
Ultrasonic sensor based automatic braking comfortUltrasonic sensor based automatic braking comfort
Ultrasonic sensor based automatic braking comfort
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networks
 
On centralized and localized approximation algorithms for interference aware ...
On centralized and localized approximation algorithms for interference aware ...On centralized and localized approximation algorithms for interference aware ...
On centralized and localized approximation algorithms for interference aware ...
 
Voice operated remote for tv
Voice operated remote for tvVoice operated remote for tv
Voice operated remote for tv
 
Vehicle gas detection with automatic safety warning system using gsm
Vehicle gas detection with automatic safety warning system using gsmVehicle gas detection with automatic safety warning system using gsm
Vehicle gas detection with automatic safety warning system using gsm
 
Zigbee and atmega32 based wireless digital control and monitoring system for ...
Zigbee and atmega32 based wireless digital control and monitoring system for ...Zigbee and atmega32 based wireless digital control and monitoring system for ...
Zigbee and atmega32 based wireless digital control and monitoring system for ...
 
Zero no load power acdc adapter for electronic equipment with embed battery
Zero no load power acdc adapter for electronic equipment with embed batteryZero no load power acdc adapter for electronic equipment with embed battery
Zero no load power acdc adapter for electronic equipment with embed battery
 
Towards the implementation of iot for environmental condition monitoring in h...
Towards the implementation of iot for environmental condition monitoring in h...Towards the implementation of iot for environmental condition monitoring in h...
Towards the implementation of iot for environmental condition monitoring in h...
 
Vehicles tracking and braking system in traffic
Vehicles tracking and braking system in trafficVehicles tracking and braking system in traffic
Vehicles tracking and braking system in traffic
 
Wireless sensor network for multi storey building design and implementation
Wireless sensor network for multi storey building design and implementationWireless sensor network for multi storey building design and implementation
Wireless sensor network for multi storey building design and implementation
 
Teenage pregnancy in Sierra Leone
Teenage pregnancy in Sierra LeoneTeenage pregnancy in Sierra Leone
Teenage pregnancy in Sierra Leone
 
Zigbee device access control and reliable data transmission in zigbee based h...
Zigbee device access control and reliable data transmission in zigbee based h...Zigbee device access control and reliable data transmission in zigbee based h...
Zigbee device access control and reliable data transmission in zigbee based h...
 
Vampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networksVampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networks
 
Topology abstraction service for ip vp ns
Topology abstraction service for ip vp nsTopology abstraction service for ip vp ns
Topology abstraction service for ip vp ns
 
Towards the implementation of io t for environmental condition monitoring in ...
Towards the implementation of io t for environmental condition monitoring in ...Towards the implementation of io t for environmental condition monitoring in ...
Towards the implementation of io t for environmental condition monitoring in ...
 

Wireless Access Control System using ZigBee and Image Recognition

  • 1. WIRELESS ACCESS CONTROL SYSTEM BASED ON IEEE 802.15.4 ABSTRACT: Access control systems are the main security mechanisms to control the access of environments. This paper describes about the implementation and deployment of wireless access control system for providing authorized access in a smart home environment. It makes use of ZigBee and image processing technique to control the door lock. ZigBee enabled door lock module has been designed and developed. The image transfer over ZigBee network has been analyzed for different image size and the challenges involved in the face recognition module are discussed.