a high security prison management system implementation ... · pdf filea high security prison...
TRANSCRIPT
A High Security Prison Management System Implementation Using RFID
CARD
Anu PS, Department Of Computer Applications, Cochin University College of Engineering,
Pulincunnoo, Alappuza, India.
Shibu V, Department of Computer Applications, Cochin University College of Engineering,
Pulincunnoo, Alappuza, India.
Jabir K V T, Department Of Information Technology, Cochin University College of Engineering,
Pulincunnoo, Alappuza, India.
Preetha Mathew, Department of Computer Applications, Cochin University College of Engineering,
Pulincunnoo, Alappuza, India.
Abstract
Very recently certain allegations aroused regarding
the security system within the prisons. Prisoners are
reported to be indulging in various malpractices even
inside the jail boundary that require immediate
attention. The traditional methods for getting the
appropriate report usually take long time to process
which helps the prisoner to escape. It is observed
that applications which require high traceability can
very well use RFID (Radio Frequency Identification)
technology. This system is developed for high
security prison management using the RFID along
with the Global Positioning System (GPS) and
Global System for Mobile Communications (GSM).
1. Introduction Increasing reports of prison breaks highlights the
main challenges of managing the prisons [1]. Even
though there are rules in place, the officers are
complacent and were reluctant to do periodic security
checks. If an offender tries to break the security area,
the same could be alerted at that moment itself. The
security measures could be re-established with
immediate effect so as to restore the stability of the
system.
Manual disciplinary procedures are hard to rely
on. An automated process to get a notification on
when and where prison break occur and who did it
and follow up the details of the inmates involved
sounds to be a better option. The details can be
passed to all other remote police stations so that the
accused can be arrested within a short span of time
[2].
The proposed system uses radio frequency
electromagnetic fields to transfer information from an
RFID tag to RFID reader for identification purposes
[3]. The tag used to, do not require battery power and
in turn they derive power from electromagnetic field
generated from the reader. The system can thus be
advised to monitor a person getting out of a specific
region and the same be warned to an authority. This
warning varies from a simple warning to a repeated
alarm as the suspected moves from a critical to a
highly critical area.
2. THE DESIGN OF THE PROPOSED
SYSTEM. In this paper we propose a solution to trace the
prisoner getting outside a specific boundary. It allows
individuals or group of developers to keep track of
prisoners based on RFID (Radio Frequency
Identification) technology. The cost effectiveness and
efficiency make the system reasonable. The system is
incorporated with a GPS and GSM circuits the
advantage so that the current location of the prisoner
can be traced [4].
To provide a high security, an encoded login is
also included, so that only the intended officers will
use or explore the system. And the result is a highly
reliable efficient security system that could be used
within the central prisons. This system assigns a
unique ID to each and every inmate with in prison to
access the information about him/her.
Anu PS et al, Int.J.Computer Technology & Applications,Vol 6 (1),89-92
IJCTA | Jan-Feb 2015 Available [email protected]
89
ISSN:2229-6093
The system covers every legal procedures of a
culprit from the time of his arrest to citation, primary
or time to time investigation reports, bail, parole,
appeal, remand, release, personal, witness details etc.
The system is capable of reaching the remote
police stations and central prisons, so that various
data can be shared like criminal history, FIR details
of an accused etc. Whenever a prisoner breaks the
security system, a message could be send to any of
the stations, coming under the control of the system.
The system dramatically increases the efficiency
of security systems with in a prison. The key features
include
Monitor the location of prisoner and warn if
he gets outside a specific region.
Give immediate warning to nearest stations
when prisoner gets out of jail.
Maintain details of each prisoner like
interrogation and citation details, date of
custody and remand, parole or bail details,
visitors list etc., and manipulate the same
using his RFID.
This system integrates central prison department
and other police authorities. The central prison
officials can check the criminal background of a
person. The crime department can check the travel
history of a citizen at the time of prison break, if
needed. All data related to a person are stored under
the RFID of that person [5].
This system will make the end users to handle the
system easily and also will be reliable for future
enhancements. The whole system will be under the
control of the administrator. As it is an online facility
the information will be up to date from all around the
country.
The system will be developed using ASP.Net
using C# as front end and SQL Server2008 as back
end. The required hardware of the system includes
RFID card reader and an RFID tag, Arduino board,
GPS and GSM systems. Arduino is a single-board
micro controller, intended to make the application of
interactive objects or environments more accessible.
The hardware consists of an open-source hardware
board designed around an 8-bit Atmel AVR micro
controller, or a 32-bit Atmel ARM. Pre -
programmed into the on-board micro controller chip
is a boot loader that allows uploading programs into
the micro controller memory without needing a chip
(device) programmer. The proposed GPS/GSM based
system has the two parts, first is a mobile unit and
another is controlling station. The system processes,
interfaces, connections, data transmission and
reception of data among the mobile unit and control
stations are working successfully.
3. IMPLEMENTATION
In prisons, the proposed system, named "SECURA”
consists of the following modules
Admin (The jail authority)
User (Remote police stations)
RFID System
GPS with GSM system
The Admin Module
Admin registers police stations across state
there by ensure automated security system
function properly.
User or remote police stations when
reported a crime, the primary investigation
report, and witness details, detailed FIR
report of the same and personal details of
accused are uploaded.
Admin can see the details provided by user
and assign RFID to the accused.
Admin manage the interrogation history of
accused along with bail, appeal, release,
remand, parole, visitor and personal details
of each accused.
Notification processing by Admin.
Admin can send mails whenever a prison
break occurs.
User can view alert messages whenever
prison breaks occur.
Admin will have the facility for editing,
deleting and viewing details of accused.
Police department can block a criminal
from prison break by informing the related
authority using this system.
The system installs a RFID card reader on the
boundaries of the security region to enable the
administrator or a third party to track the security
break. This system is built based on embedded
system, used for tracking and positioning of any
inmate by using Global Positioning System (GPS)
Anu PS et al, Int.J.Computer Technology & Applications,Vol 6 (1),89-92
IJCTA | Jan-Feb 2015 Available [email protected]
90
ISSN:2229-6093
and Global system for mobile communication (GSM)
[6]. This design will continuously monitor a moving
person and report the status of the person on demand.
The remote monitoring system is incorporated with
mail sending possibility so that mails can be send to
any police stations to take immediate measures when
inmate break the prison. Based on the total design of
the system, the hardware and software are designed.
In this paper, the GSM network is a medium for
transmitting the remote signal. This includes two
parts that are the monitoring centre and the remote
monitoring station. The monitoring centres consist of
a computer and communication module of GSM. The
software-monitoring centre and the remote
monitoring station implemented by using C#.net. The
result of this demonstration shows that the system
can watch and control the remote communication
between the monitoring centre and the remote
monitoring station.
Whenever a crime occurs the initial step is the
primary investigation and evidence collection which
will be carried out by officials of the nearest station
of the crime. The accused is then presented on the
court. These steps are manipulated by the user
module of the proposed system. The collected FIR
details, witness details if any, other evidences,
personal details etc are documented by the user or the
remote police stations. Note that as the proposed
system is centralized this data could be accessed by
certain other intended users like central prisons.
The suspect who produced before court could be
punished or can be released if found innocent
.Further by the procedures is to be managed by the
staff of central prison if court asked the officials to
move the inmate to central prison. It means at certain
cases local police stations are asked by court to
continue the legal procedures demanded by the nature
of the crime. Our proposed system mainly
concentrates on the cases where accused is suggested
by the court to move to central prison. At this stage
the proposed system demands the inmates unique ID
which is a 12 digit code supplied through an RFID
tag. Then the details or data of each inmate is
processed by using this RFID.
The main highlight of the proposed system is a high
security login. To use the system one must login to it.
And this login is enhanced by a 6*6 matrix. The
matrix elements include the English alphabets and
numbers ranging from 0-9. For each login the matrix
will be refreshed, so that the matrix appears different
for different login. One rule to be followed in the
system is that the user must possess an even digit
length password. This password is then to be entered
in an encoded form for authentication. The encoding
is done in the following way:-
Enter the corresponding entry of the matrix given
by the row and column intersections of actual
password.
The first entry of encoded password corresponds
to the original password’s first and second
characters row and column intersection entry in
matrix.
The second entry of encoded password
corresponds to the original password’s third and
fourth characters row and column intersection
entry in matrix and so on.
The resulting password will be of odd length
which will be decoded using algorithm to
authenticate the user.
If given password and user name provided are
correct, only then the users are allowed to use the
system.
The inmates moved to the prison by the court will be
under various legal procedures like remand, punished
etc. All these are meant to be managed by officials of
the central prison. The legal procedures may vary
from time to time. For example the accused may be
initially remanded for certain period for further court
hearings or may be under punishment based on
nature of crime. After this stage he may apply for
bail, parole, appeal etc. as per the laws of
constitution. All these details are managed by the
system until the person is released. As soon as an
inmate is released the history would still persist in
system for future references.
4. RESULTS AND CONCLUSION “SECURA” the proposed system is used to track the
inmate who breaks the prison by using RFID
technology. When the prison break is identified, the
responsible people send email to the authenticated
officials, so that the scenario is managed with greater
efficiency. The high security login used by the
system prevents any kind of malfunctions. It is a very
cost effective system that could be recommended to
be used within prisons. The following screen shots of
the system gives an insight of the login for proposed
system.
Anu PS et al, Int.J.Computer Technology & Applications,Vol 6 (1),89-92
IJCTA | Jan-Feb 2015 Available [email protected]
91
ISSN:2229-6093
Fig1: The login page appears for the user
Fig 2: The notifications when a prison
break occurs
10. References [1] Nathan James “The Federal Prison Population Build up:
Overview, Policy Changes, Issues, and Options”
Congressional Research Service. 7-5700 www.crs.gov
R42937.
[2] Dallin H. OakS; Studying the Exclusionary Rule in
Search and Seizure , THE UNIVERSITY OF CHICAGO
LAW REVIEW Vol. 37, No.4, Summer 1970.
[3] Badri Nath, Franklin Reynolds, Roy Want, “RFID
Technology and Applications,” IEEE CS and IEEE
ComSoc, Vol. 5, No. 1, 2006, pp. 22-24.
[4] Lei Zhang and Zhi Wang, “Integration of RFID into
Wireless Sensor Networks: Architectures, Opportunities
and Challenging Problems,” Proceedings of the Fifth International Conference on Grid and Cooperative
Computing Workshops, Hunan, 2006, pp.463-469.
[5] Ron Weinstein, “RFID: A Technical Overview and Its Application to the Enterprise,” IT Professional, Vol. 7, No.
3, June 2005, pp. 27-33
[6] Elit Wireless Solutions (2007) GM862-GPS Hardware user guide. 1vv0300728 Rev. 8 - 20/09/07 World Academy
of Science Engineering and Technology 61 2010 99.
Anu PS et al, Int.J.Computer Technology & Applications,Vol 6 (1),89-92
IJCTA | Jan-Feb 2015 Available [email protected]
92
ISSN:2229-6093