vulnerability scanning for enhanced safety of … · 2017-05-05 · vulnerability scanning for...
Post on 14-Mar-2020
10 Views
Preview:
TRANSCRIPT
VULNERABILITY SCANNING FOR ENHANCED SAFETY
OF WOMEN & AWARNESS OF VALUABLE
1Neha Singh,
2Kirti Patil,
3Charmi Soni,
4Priyanka Nagargoje
Student, Electronics & Communication department, Laxmi institute of Technology,
Sarigam-Valsad. Gujarat
Corresponding Author Detail:
Neha Singh
Student, ECE department,
Laxmi institute of Technology,
Sarigam-Valsad, Gujarat.
Internal Guide Detail:
Mrs. Siddhi Desai
Assistant Professor, ECE department,
Laxmi institute of Technology,
Sarigam-Valsad. Gujarat.
ABSTRACT
This paper describes about vulnerability scanning for enhanced safety of women in which Many
unfortunate incidents have been taking place in woman’s case. Problems may come from any
direction such as women walking on the road after the work, going to super market or many other
reasons for which they go alone. People at home are not sure of their return safely. Another factor
is woman die without knowing the reason as they attend excursions and industrial trips conducted
by the organizations. It happens due to attacks on woman but not suicides. Women are not as
physically fit as men, in an emergency situation a helping hand would be assistance for them. For
awareness of valuable main factor which can even be considered for women and in general for all
that is fear for theft of valuable.
KEYWORDS: IR Sensor, IR led, LM358, buzzer, active RFID tag (2 piece), active RFID
receiver, 89s52 controller, LCD 16*2, Power supply.
INTRODUCTION:
This paper examines policy regarding the electronic Approaches and developments towards
electronic device which detects two way mirrors and also RFID master slave device along with it
which gives notification for forgotten the valuables. So different existing identity documents are
mentioned and enforced during this project.
According to the reports of WHO, NCRB Social government organization 35% Women over the
world are facing problems in public places. Considering this as a major issue, we have taken up
on along with awareness of losing valuable things, women security for trial room mishap. Since
prediction of mishap is not possible hence to minimize the possibility of physical violence by
keeping all the alert tools ready to safe escape from violent Situation. This will reduce risk and
bring assistance when needed. We are proposing project in which we will develop device for
checking safety in trial room by firstly testing mirror and secondly checking whether video is
been recorded. Along with it we are also developing a master slave based RFID device which will
alert if our valuable like mobile phone or wallet are forgotten or left behind.
The Main objective of our project is to make safety trial rooms for women and to aware people
for their valuables. vulnerability scanning for enhanced safety of women will help women to
detect the mirror whether it is two way mirror or not. So safety issues related to women in trial
rooms will be decrease .We are also trying to propose technique which detects . The clock
frequency when video is been recorded so if video is being captured in trial room this device will
be useful for detection of it and women will get alert. Awareness of valuable will help people if
International Journal of Scientific Research in Engineering (IJSRE) Vol. 1 (3), March, 2017
IJSRE Vol. 1 (3), March, 2017 www.ijsre.in Page 5
something is forgotten by them. So in several distance of meters they will get notification that
they forgot the valuable. Through our device women will not be victim of such unsafe trial rooms
and will help common people in such that if they forget things than anyone can do misuse of their
valuables.
Vulnerability scanning for enhanced safety of women’s purpose is detection of two way mirror
for women safety issues in trial rooms, shops, etc for these we are using Infrared sensor. An
infrared sensor circuit is one of the basic and popular sensor module in an electronic device. This
sensor is analogous to human’s visionary senses, which can be used to detect obstacles and it is
one of the common applications in real time so the basic concept of IR sensor is to transmit IR
signal in a direction and a signal is received at IR receiver. Then IR radiation bounces back from
the mirror. So the object is mirror therefore IR LED transmits signal on mirror and signal is
reflected back from the mirror. The reflected signal is received by IR receiver. This IR sensor is
module which decode the signal. After decoding signal if mirror is two way mirror the signal will
reflect back and LED will blink. So once transmitter and receiver is complete both should be
placed at certain angle so that mirror detection happens in proper way. This angle is nothing but
direction of angle which is +/- 45 degree. So we are implementing IR transmitter using
LM358low power dual operational amplifier integrated circuit transmits continuous IR rays to be
received by an IR receiver module. An IR output terminal of the receiver varies depending upon
its receiving of IR rays. Since this variation cannot be analyzed as such, therefore this output can
be fed to a comparator circuit. Here an operational amplifier of LM358 is used as comparator
circuit. Implementation of IR receiver will be done by using LED and LCD 16*2 as an indicator.
For Awareness of valuable things let’s take an example of students as we carry some valuable
things like Identity card, mobile, laptops, assignment books etc. so if we go out from the home
and forgot to carry identity card then this device will be used as master slave. Master device will
be with us and slave means tags stick to our valuable things. Under 10-20 meter range we will get
notification that we forgot identity card. Now for this device we are using RFID which can track
movement of objects through a network of radio enabled scanning device over a distance of
several meter. It consist of transponder and for programming and coding we are using 89S52
Microcontroller to upload new codes to it without use of external hardware programs The tag is
active in the sense it is powered by battery and gives long range of operation as compared to
passive tags. There is a jumper for ON/OFF of the tag. When the jumper is moved to ON position
the tag is connected to battery. When it is powered ON it transmits 16 bit unique code ID on 433
MHZ frequency every 6 seconds. The transmission time for the signal is 100ms after which it
goes to sleep thus saving battery. After 6 second it wakes up again automatically and transmits its
unique 16 bit code. This keeps going on as long as the tag is powered ON. The battery life is
around 2 months with continuous on position. Antenna in built on the PCB itself making the unit
compact and hand held. There can be up to 64 active tags operating in same premises. For output
we had taken LCD16*2 and buzzer as an indicator.
LITERATURE SURVEY
a) K Abdul Rahman - ,7002Reichardt, Adelson and Bergen, Chubb & Sperling, 1988; Cavanagh &
Mather, Ledgeway& Smith, Eagleman ;Wade &Verstraten, Sandia. Research and investigation on
definition of infrared sensors.In this system, They introduced us about Sensor or transducers
which define as a device that receives energy from one system and transmit it to another, like
physical variable into signal variable. Broadly defined, the sensor is a device which capable of
being actuated by energizing input from one or more transmission media and in turn generating a
related signals to one or more transmission systems. It provides a usable output in response to
specified input measured, which may be physical or mechanical quantity, property, or conditions.
The energy transmitted by these systems may be electrical, mechanical or acoustical. The nature
International Journal of Scientific Research in Engineering (IJSRE) Vol. 1 (3), March, 2017
IJSRE Vol. 1 (3), March, 2017 www.ijsre.in Page 6
of electrical output from the transducers depends on the basic principle involved in the design.
The output may be analog, digital or frequency modulated.
b) Aysegul SARAC, Nabil ABSI, Stéphanedauzere-peres Impact of RFID technologies. In this,
They cleared that RFID technologies may improve the potential benefits of supply chain
management through reduction of inventory losses, increase of the efficiency and speed of
processes and improvement of information accuracy. Various RFID systems can be obtained by
combining different tags, readers, frequencies and levels of tagging, etc. The cost and potential
profit of each system change in a wide range. In this paper, a state-of-the-art on RFID technology
deployments in supply chains is given in order to analyze the impact on the supply chain
performance.
c) Bernhard Riedl ,Gernot Goluch , Stefan Pochlinger , Edgar Weippl . ACM Portal, IEEE Xplore,
Springer Link , Goggle’s scholar search .In Their researchwork, they focuses mainly on the
PRIME program and SBA trainings as well as concepts of software security and development life
cycle topics. Additionally he is still involved and working on topics and research regarding
security analysis and testing as well as advanced malware protection.
d) Wireless ID tags will soon be everywhere. We need a manifesto! By simsongarfinkel, In this,
They proposed the idea of using RFID technology for positioning. Preliminary results on RFID
communication speed and tag database access time were shown. For the communication speed,
the experiment showed that 18 milliseconds were needed to complete a reading transaction. With
the result, it was computed that the communication speed is 7.11Kbps as opposed to 64Kbps in
the specification. It can be concluded that it is feasible to retrieve bits for ID of a tag at high
velocities provided that operational tags in harsh conditions are installed. We also argued that a
database for information corresponding to tags on roads is necessary. The performance study on
the tag database showed that the access time is insignificant compared to a reading transaction.
e) Mary Barnish on domestic violence, September 2004. This was prepared to accompany the
HMIP thematic inspection of probation supervision of domestic violence perpetrators. Alongside
the inspection report it aims to contribute to the development of effective probation and wider
criminal justice practice in reducing domestic violence by enhancing knowledge, understanding
and awareness of the experiences of victims/survivors, the behaviour of perpetrators, the extent of
the harm done by domestic violence, and the effectiveness of interventions to reduce it. In line
with the inspection remit, the review focuses on domestic violence
f) Pedro M. Reyes, Alfred P. Sloan Foundation Industry Studies, 2007. This paper concludes that
RFID has been flying below the business innovation and best practice radar. RFID as a new
direction for supply chain management theory and practice. RFID not a new technology, but new
spark for improving supply chain performance.
g) Y. ZareMehrjerdi , International Journal of Industrial Engineering & Production Research
June 2014, Volume 25, Number 2. The purpose of this article is to review some of the most
prominent applications of RFID in industries and to provide a comprehensive review of the
work done from 1985 through 2012 and the research trend on that. The effectiveness of RFID
and the challenges facing with are also discussed. Some applications of radio frequency
identification in supply chain are briefly discussed. Articles are classified by the year of
publications and each case is discussed very briefly.
h) Sliney, David H.; Wangeman, Robert T.; Franks, James K.; Wolbarsht, Myron L. For this
project, an active infrared motion detector is constructed. Originally, both IR and an ultrasonic
detector is want to build, but the problem is the ultrasonic detector would require too much
time for a three week project. However, building an IR motion detector would probably be a
International Journal of Scientific Research in Engineering (IJSRE) Vol. 1 (3), March, 2017
IJSRE Vol. 1 (3), March, 2017 www.ijsre.in Page 7
trivial exercise. So, to expand on the concept by building an ambient light ignoring motion
detector.
DESIGN AND IMPLEMENTATION
In this, there are main parts of the circuits.
1. Transmission Circuits (Infrared LEDs)
2. Receiver Circuit (Sensors)
3. Active RFID receiver
4. LM358
5. 89s52 microcontroller
6. RFID tags
Figure-1 Block Diagram
International Journal of Scientific Research in Engineering (IJSRE) Vol. 1 (3), March, 2017
IJSRE Vol. 1 (3), March, 2017 www.ijsre.in Page 8
Figure-2 Serial Interrupt Flowchart
This above diagram shows how a LM358 timer IC is configured to function as a basic mono
stable multi vibrator. A mono stable multi vibrator is a timing circuit that changes state once
triggered, but returns to its original state after a certain time delay. It got its name from the fact
that only one of its output states is stable. IR Transmission circuit is used to generate the
modulated 36 kHz IR signal. The IR transmitter will emit modulated 38 kHz IR signal and at the
receiver we use TSOP1738 (Infrared Sensor).
The LM358 series consists of two independent, high gain, internally Frequency compensated
operational amplifiers which were designed specifically to operate from a single power supply
over a wide range of voltages. Operation from split power supplies is also possible and the low
power supply current drain is independent of the magnitude of the power supply voltage.
Application areas include transducer amplifiers, dc gain blocks and all the conventional op amp
circuits which now can be more easily implemented in single power supply systems. For example,
the LM358 series can be directly operated off of the standard +5V power supply voltage which is
used in digital systems and will easily provide the required interface electronics without requiring
the additional ±15Vpower supplies.
We are using TSOP1738 for receiver, so we need to generate the modulated IR of 38 kHz. You
can use any TSOP, but you need to generate IR of respective frequency as TSOP. So we are
using 555 timer in astable mode to oscillate the IR at 38KHz frequency. As we know oscillation
frequency of 555 timer is decided by resistor R1, R2 and capacitor C1. We have used 1k R1, 20K
International Journal of Scientific Research in Engineering (IJSRE) Vol. 1 (3), March, 2017
IJSRE Vol. 1 (3), March, 2017 www.ijsre.in Page 9
R2 and 1nF capacitor to generate the frequency of approx. 38 KHz. It can be calculated using this
formula: 1.44/((R1+2*R2)*C1).Output Pin 3 of the 555 Timer IC has been connected to IR LED
using 470 resistor and a push button switch. Whenever we press the button, circuit emits
modulated IR at 38 KHz. A 100uF capacitor is connected across the supply to provide the
constant supply to the circuit, without any ripple.
For IR Receiver circuit we need to connect a LED to the output of the TSOP1738, to test the
receiver. We have used BC557 transistor, to reverse the effect of TSOP, it means whenever the
output is HIGH ,the LED will be OFF and whenever it detects IR and output gets low, LED will
be ON. PNP transistor behaves opposite to the NPN transistor , it acts as open switch when a
voltage applied to its base and acts as closed switch when there is no voltage at its base. So
normally TSOP output remains HIGH and Transistor behaves as open switch and LED will be
OFF. As soon as TSOP detects Infrared, its output becomes low and transistor behaves as closed
switch and LED will be ON.
A 10k resistor is used for provide proper biasing to transistor and a 470ohm resistor is used at
LED for limiting the current. So whenever we press the Button at IR transmitter, it is detected by
TSOP1738 and LED will glow.
The AT89S52 is a low-power, high-performance CMOS 8-bit microcontroller with 8Kbytes of in-
system programmable Flash memory. The device is manufactured using Atmel’s high-density
nonvolatile memory technology and is compatible with the industry-standard 80C51 instruction
set and pin out. The on-chip Flash allows the program memory to be reprogrammed in-system or
by a conventional nonvolatile memory programmer.
By combining a versatile 8-bit CPU with in-system programmable Flash on a monolithic chip, the
Atmel AT89S52 is a powerful microcontroller which provides a highly-flexible and cost-effective
solution to many embedded control applications. The AT89S52 provides the following standard
features: 8K bytes of Flash, 256 bytes of RAM, 32 I/O lines, Watchdog timer, two data pointers,
three 16-bit timer/counters, a six-vector two-level interrupt architecture, a full duplex serial port,
on-chip oscillator, and clock circuitry. In addition, the AT89S52 is designed with static logic for
operation down to zero frequency and supports two software selectable power saving modes. The
Idle Mode stops the CPU while allowing the RAM, timer/counters, serial port, and interrupt
system to continue functioning. The Power-down mode saves the RAM contents but freezes the
oscillator, disabling all other chip functions until the next interrupt hardware reset. So after doing
this technique we will get notification under several distance of 20-25 meters.
An RFID reader, also known as an interrogator, is a device that provides the connection between
the tag data and the enterprise system software that needs the information. The reader
communicates with tags that are within its field of operation, performing any number of tasks
including simple continuous inventorying, filtering (searching for tags that meet certain criteria),
writing (or encoding) to selected tags, etc. The reader uses an attached antenna to capture data
from tags. It then passes the data to a computer for processing. Just like RFID tags, there are
many different sizes and types of RFID readers. Readers can be affixed in a stationary position in
a store or factory, or integrated into a mobile device such as a portable, handheld scanner. In this
way our device will give notification under 20-25 meter.
International Journal of Scientific Research in Engineering (IJSRE) Vol. 1 (3), March, 2017
IJSRE Vol. 1 (3), March, 2017 www.ijsre.in Page 10
Figure-3 Vulnerability scanning for enhanced safety of women and awareness
of valuable. Final display on LCD 16*2
CONCLUSION
This review discussed introduction about vulnerability scanning for enhanced safety of women
and awareness of valuable. Our efforts to understand electronic approach for this device leave us
optimistic, but concerned. This paper suggest that the IR detection of two way mirror with RFID
notification has to be further studied and innovated to reach all level of community, so that the
women will remain safe in malls if they use trial rooms, washrooms etc and steal of valuable will
be decrease which will make more involvement in purchasing the innovated. Vulnerability
scanning for enhanced safety of women and awareness of valuable is for safety and security.
REFERENCES:
1. Sliney, David H.; Wange man, Robert T.; Franks, James K.; Wolbarsht , Myron L. (1976).
2. Lynch, David K.; Livingston, William Charles (2001)
International Journal of Scientific Research in Engineering (IJSRE) Vol. 1 (3), March, 2017
IJSRE Vol. 1 (3), March, 2017 www.ijsre.in Page 11
3. Gerald F. Marshall Handbook of Optical and Laser Scanning, Marcel Dekker, Inc., 2004, 4.Emil
Bloch, "Transparent mirror", published 1903-02-17, assigned to Emil Bloch
4. Gannsle, Daniel J (December 2008), "How to Protect Yourself from High-Tech RFID Identity
Theft", How To Do Just About Everything
5. The New York Times, retrieved 2009-03-14 (on how deliberately corrupted RFID tags could
introduce viruses into computer systems).
6. Bharadwaj, V., Raman, R., Reddy, R. & Reddy, S., (2001), Empowering mobile healthcare
providers via a patient benefits authorization service, WET ICE 2001. Proceedings. Tenth IEEE
International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises,
IEEE.
7. Bohn, J., (2008), Prototypical implementation of location-aware services based on a middleware
architecture for super-distributed RFID tag infrastructures, Personal Ubiquitous Computing,
ACM, 12 (2):155-166. Connecting for health].
8. RFID http://www.connectingforhealth.nhs.uk/ [access: 18th August, 2010]. DHS
(Department of Homeland Security) , (2006), Enhanced Security Controls needed for US-Visit’s
System using RFID Technology, U.S. Department of Homeland Security.
International Journal of Scientific Research in Engineering (IJSRE) Vol. 1 (3), March, 2017
IJSRE Vol. 1 (3), March, 2017 www.ijsre.in Page 12
top related