International Journal of Innovative Research in Computer and Communication Engineering
ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines
| Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI) |
| TITLE | Design and Implementation of Three Level Security |
|---|---|
| ABSTRACT | The advancement of embedded systems and security technologies has created new possibilities in the field of access control and safety. Traditional mechanical locks and single-factor authentication systems often lack adequate protection, traceability, and resistance to unauthorized access. This paper presents a Three-Level Door Security System using RFID, Fingerprint Authentication, and GSM-Based OTP Verification, designed to provide robust and reliable access control. The system verifies users through RFID identification, biometric fingerprint matching, and one-time password validation sent via GSM communication. It ensures that access is granted only when all authentication levels are successfully verified, significantly enhancing security. The system is implemented using an Arduino microcontroller with integrated sensors, a GSM module, relay-based door control, and an LCD interface, operating in a standalone embedded environment. Performance evaluation shows fast authentication response, high verification accuracy, stable operation, and reliable GSM communication. The proposed system demonstrates an effective and cost-efficient approach to implementing secure, multi-factor access control for residential and institutional applications. |
| TITLE | |
| AUTHOR | GELLA UDAY KUMAR, KP JYOTHI BHUVAN, NITHISH GOWDA H, PUVI KRISHNA K, MALATESH S H Student, Dept. of Computer Science and Engineering, MS Engineering College, Bengaluru, Karnataka, India HOD, Dept. of Computer Science and Engineering, MS Engineering College, Bengaluru, Karnataka, India |
| VOLUME | 180 |
| DOI | DOI: 10.15680/IJIRCCE.2026.1401051 |
| pdf/51_Design and Implementation of Three Level Security.pdf | |
| KEYWORDS | |
| References | [1] Stallings, W., Cryptography and Network Security: Principles and Practice, 7th Edition, Pearson Education, New Jersey, 2017. [2] Arduino Documentation, Arduino Uno and Embedded C Programming, Available: https://www.arduino.cc [3] Want, R., “An Introduction to RFID Technology,” IEEE Pervasive Computing, vol. 5, no. 1, pp. 25–33, 2006. [4] Maltoni, D., Maio, D., Jain, A. K., and Prabhakar, S., Handbook of Fingerprint Recognition, 2nd Edition, Springer, New York, 2009. [5] SIMCom Wireless Solutions, SIM800 GSM/GPRS Module Hardware Design, Technical Documentation, 2015. [6] Dr. Malatesh S. H., S. Kattimani, P. Pallabavi, V. A. P., and D. M. G., “Intruder Detection and Protection System,” International Journal of Innovative Research in Technology (IJIRT), vol. 11, no. 12, p. 6287, May 2025, ISSN: 23496002. |