vulnerability scanning for enhanced safety of … · 2017-05-05 · vulnerability scanning for...

8
VULNERABILITY SCANNING FOR ENHANCED SAFETY OF WOMEN & AWARNESS OF VALUABLE 1 Neha Singh, 2 Kirti Patil, 3 Charmi Soni, 4 Priyanka Nagargoje Student, Electronics & Communication department, Laxmi institute of Technology, Sarigam-Valsad. Gujarat Corresponding Author Detail: Neha Singh Student, ECE department, Laxmi institute of Technology, Sarigam-Valsad, Gujarat. Internal Guide Detail: Mrs. Siddhi Desai Assistant Professor, ECE department, Laxmi institute of Technology, Sarigam-Valsad. Gujarat. ABSTRACT This paper describes about vulnerability scanning for enhanced safety of women in which Many unfortunate incidents have been taking place in woman’s case. Problems may come from any direction such as women walking on the road after the work, going to super market or many other reasons for which they go alone. People at home are not sure of their return safely. Another factor is woman die without knowing the reason as they attend excursions and industrial trips conducted by the organizations. It happens due to attacks on woman but not suicides. Women are not as physically fit as men, in an emergency situation a helping hand would be assistance for them. For awareness of valuable main factor which can even be considered for women and in general for all that is fear for theft of valuable. KEYWORDS: IR Sensor, IR led, LM358, buzzer, active RFID tag (2 piece), active RFID receiver, 89s52 controller, LCD 16*2, Power supply. INTRODUCTION: This paper examines policy regarding the electronic Approaches and developments towards electronic device which detects two way mirrors and also RFID master slave device along with it which gives notification for forgotten the valuables. So different existing identity documents are mentioned and enforced during this project. According to the reports of WHO, NCRB Social government organization 35% Women over the world are facing problems in public places. Considering this as a major issue, we have taken up on along with awareness of losing valuable things, women security for trial room mishap. Since prediction of mishap is not possible hence to minimize the possibility of physical violence by keeping all the alert tools ready to safe escape from violent Situation. This will reduce risk and bring assistance when needed. We are proposing project in which we will develop device for checking safety in trial room by firstly testing mirror and secondly checking whether video is been recorded. Along with it we are also developing a master slave based RFID device which will alert if our valuable like mobile phone or wallet are forgotten or left behind. The Main objective of our project is to make safety trial rooms for women and to aware people for their valuables. vulnerability scanning for enhanced safety of women will help women to detect the mirror whether it is two way mirror or not. So safety issues related to women in trial rooms will be decrease .We are also trying to propose technique which detects . The clock frequency when video is been recorded so if video is being captured in trial room this device will be useful for detection of it and women will get alert. Awareness of valuable will help people if International Journal of Scientific Research in Engineering (IJSRE) Vol. 1 (3), March, 2017 IJSRE Vol. 1 (3), March, 2017 www.ijsre.in Page 5

Upload: others

Post on 14-Mar-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: VULNERABILITY SCANNING FOR ENHANCED SAFETY OF … · 2017-05-05 · VULNERABILITY SCANNING FOR ENHANCED SAFETY . OF WOMEN & AWARNESS OF VALUABLE. 1Neha Singh, 2Kirti Patil, 3Charmi

VULNERABILITY SCANNING FOR ENHANCED SAFETY

OF WOMEN & AWARNESS OF VALUABLE

1Neha Singh,

2Kirti Patil,

3Charmi Soni,

4Priyanka Nagargoje

Student, Electronics & Communication department, Laxmi institute of Technology,

Sarigam-Valsad. Gujarat

Corresponding Author Detail:

Neha Singh

Student, ECE department,

Laxmi institute of Technology,

Sarigam-Valsad, Gujarat.

Internal Guide Detail:

Mrs. Siddhi Desai

Assistant Professor, ECE department,

Laxmi institute of Technology,

Sarigam-Valsad. Gujarat.

ABSTRACT

This paper describes about vulnerability scanning for enhanced safety of women in which Many

unfortunate incidents have been taking place in woman’s case. Problems may come from any

direction such as women walking on the road after the work, going to super market or many other

reasons for which they go alone. People at home are not sure of their return safely. Another factor

is woman die without knowing the reason as they attend excursions and industrial trips conducted

by the organizations. It happens due to attacks on woman but not suicides. Women are not as

physically fit as men, in an emergency situation a helping hand would be assistance for them. For

awareness of valuable main factor which can even be considered for women and in general for all

that is fear for theft of valuable.

KEYWORDS: IR Sensor, IR led, LM358, buzzer, active RFID tag (2 piece), active RFID

receiver, 89s52 controller, LCD 16*2, Power supply.

INTRODUCTION:

This paper examines policy regarding the electronic Approaches and developments towards

electronic device which detects two way mirrors and also RFID master slave device along with it

which gives notification for forgotten the valuables. So different existing identity documents are

mentioned and enforced during this project.

According to the reports of WHO, NCRB Social government organization 35% Women over the

world are facing problems in public places. Considering this as a major issue, we have taken up

on along with awareness of losing valuable things, women security for trial room mishap. Since

prediction of mishap is not possible hence to minimize the possibility of physical violence by

keeping all the alert tools ready to safe escape from violent Situation. This will reduce risk and

bring assistance when needed. We are proposing project in which we will develop device for

checking safety in trial room by firstly testing mirror and secondly checking whether video is

been recorded. Along with it we are also developing a master slave based RFID device which will

alert if our valuable like mobile phone or wallet are forgotten or left behind.

The Main objective of our project is to make safety trial rooms for women and to aware people

for their valuables. vulnerability scanning for enhanced safety of women will help women to

detect the mirror whether it is two way mirror or not. So safety issues related to women in trial

rooms will be decrease .We are also trying to propose technique which detects . The clock

frequency when video is been recorded so if video is being captured in trial room this device will

be useful for detection of it and women will get alert. Awareness of valuable will help people if

International Journal of Scientific Research in Engineering (IJSRE) Vol. 1 (3), March, 2017

IJSRE Vol. 1 (3), March, 2017 www.ijsre.in Page 5

Page 2: VULNERABILITY SCANNING FOR ENHANCED SAFETY OF … · 2017-05-05 · VULNERABILITY SCANNING FOR ENHANCED SAFETY . OF WOMEN & AWARNESS OF VALUABLE. 1Neha Singh, 2Kirti Patil, 3Charmi

something is forgotten by them. So in several distance of meters they will get notification that

they forgot the valuable. Through our device women will not be victim of such unsafe trial rooms

and will help common people in such that if they forget things than anyone can do misuse of their

valuables.

Vulnerability scanning for enhanced safety of women’s purpose is detection of two way mirror

for women safety issues in trial rooms, shops, etc for these we are using Infrared sensor. An

infrared sensor circuit is one of the basic and popular sensor module in an electronic device. This

sensor is analogous to human’s visionary senses, which can be used to detect obstacles and it is

one of the common applications in real time so the basic concept of IR sensor is to transmit IR

signal in a direction and a signal is received at IR receiver. Then IR radiation bounces back from

the mirror. So the object is mirror therefore IR LED transmits signal on mirror and signal is

reflected back from the mirror. The reflected signal is received by IR receiver. This IR sensor is

module which decode the signal. After decoding signal if mirror is two way mirror the signal will

reflect back and LED will blink. So once transmitter and receiver is complete both should be

placed at certain angle so that mirror detection happens in proper way. This angle is nothing but

direction of angle which is +/- 45 degree. So we are implementing IR transmitter using

LM358low power dual operational amplifier integrated circuit transmits continuous IR rays to be

received by an IR receiver module. An IR output terminal of the receiver varies depending upon

its receiving of IR rays. Since this variation cannot be analyzed as such, therefore this output can

be fed to a comparator circuit. Here an operational amplifier of LM358 is used as comparator

circuit. Implementation of IR receiver will be done by using LED and LCD 16*2 as an indicator.

For Awareness of valuable things let’s take an example of students as we carry some valuable

things like Identity card, mobile, laptops, assignment books etc. so if we go out from the home

and forgot to carry identity card then this device will be used as master slave. Master device will

be with us and slave means tags stick to our valuable things. Under 10-20 meter range we will get

notification that we forgot identity card. Now for this device we are using RFID which can track

movement of objects through a network of radio enabled scanning device over a distance of

several meter. It consist of transponder and for programming and coding we are using 89S52

Microcontroller to upload new codes to it without use of external hardware programs The tag is

active in the sense it is powered by battery and gives long range of operation as compared to

passive tags. There is a jumper for ON/OFF of the tag. When the jumper is moved to ON position

the tag is connected to battery. When it is powered ON it transmits 16 bit unique code ID on 433

MHZ frequency every 6 seconds. The transmission time for the signal is 100ms after which it

goes to sleep thus saving battery. After 6 second it wakes up again automatically and transmits its

unique 16 bit code. This keeps going on as long as the tag is powered ON. The battery life is

around 2 months with continuous on position. Antenna in built on the PCB itself making the unit

compact and hand held. There can be up to 64 active tags operating in same premises. For output

we had taken LCD16*2 and buzzer as an indicator.

LITERATURE SURVEY

a) K Abdul Rahman - ‎‎,7002Reichardt, Adelson and Bergen, Chubb & Sperling, 1988; Cavanagh &

Mather, Ledgeway& Smith, Eagleman ;Wade &Verstraten, Sandia. Research and investigation on

definition of infrared sensors.In this system, They introduced us about Sensor or transducers

which define as a device that receives energy from one system and transmit it to another, like

physical variable into signal variable. Broadly defined, the sensor is a device which capable of

being actuated by energizing input from one or more transmission media and in turn generating a

related signals to one or more transmission systems. It provides a usable output in response to

specified input measured, which may be physical or mechanical quantity, property, or conditions.

The energy transmitted by these systems may be electrical, mechanical or acoustical. The nature

International Journal of Scientific Research in Engineering (IJSRE) Vol. 1 (3), March, 2017

IJSRE Vol. 1 (3), March, 2017 www.ijsre.in Page 6

Page 3: VULNERABILITY SCANNING FOR ENHANCED SAFETY OF … · 2017-05-05 · VULNERABILITY SCANNING FOR ENHANCED SAFETY . OF WOMEN & AWARNESS OF VALUABLE. 1Neha Singh, 2Kirti Patil, 3Charmi

of electrical output from the transducers depends on the basic principle involved in the design.

The output may be analog, digital or frequency modulated.

b) Aysegul SARAC, Nabil ABSI, Stéphanedauzere-peres Impact of RFID technologies. In this,

They cleared that RFID technologies may improve the potential benefits of supply chain

management through reduction of inventory losses, increase of the efficiency and speed of

processes and improvement of information accuracy. Various RFID systems can be obtained by

combining different tags, readers, frequencies and levels of tagging, etc. The cost and potential

profit of each system change in a wide range. In this paper, a state-of-the-art on RFID technology

deployments in supply chains is given in order to analyze the impact on the supply chain

performance.

c) Bernhard Riedl ,Gernot Goluch , Stefan Pochlinger , Edgar Weippl . ACM Portal, IEEE Xplore,

Springer Link , Goggle’s scholar search .In Their researchwork, they focuses mainly on the

PRIME program and SBA trainings as well as concepts of software security and development life

cycle topics. Additionally he is still involved and working on topics and research regarding

security analysis and testing as well as advanced malware protection.

d) Wireless ID tags will soon be everywhere. We need a manifesto! By simsongarfinkel, In this,

They proposed the idea of using RFID technology for positioning. Preliminary results on RFID

communication speed and tag database access time were shown. For the communication speed,

the experiment showed that 18 milliseconds were needed to complete a reading transaction. With

the result, it was computed that the communication speed is 7.11Kbps as opposed to 64Kbps in

the specification. It can be concluded that it is feasible to retrieve bits for ID of a tag at high

velocities provided that operational tags in harsh conditions are installed. We also argued that a

database for information corresponding to tags on roads is necessary. The performance study on

the tag database showed that the access time is insignificant compared to a reading transaction.

e) Mary Barnish on domestic violence, September 2004. This was prepared to accompany the

HMIP thematic inspection of probation supervision of domestic violence perpetrators. Alongside

the inspection report it aims to contribute to the development of effective probation and wider

criminal justice practice in reducing domestic violence by enhancing knowledge, understanding

and awareness of the experiences of victims/survivors, the behaviour of perpetrators, the extent of

the harm done by domestic violence, and the effectiveness of interventions to reduce it. In line

with the inspection remit, the review focuses on domestic violence

f) Pedro M. Reyes, Alfred P. Sloan Foundation Industry Studies, 2007. This paper concludes that

RFID has been flying below the business innovation and best practice radar. RFID as a new

direction for supply chain management theory and practice. RFID not a new technology, but new

spark for improving supply chain performance.

g) Y. ZareMehrjerdi , International Journal of Industrial Engineering & Production Research

June 2014, Volume 25, Number 2. The purpose of this article is to review some of the most

prominent applications of RFID in industries and to provide a comprehensive review of the

work done from 1985 through 2012 and the research trend on that. The effectiveness of RFID

and the challenges facing with are also discussed. Some applications of radio frequency

identification in supply chain are briefly discussed. Articles are classified by the year of

publications and each case is discussed very briefly.

h) Sliney, David H.; Wangeman, Robert T.; Franks, James K.; Wolbarsht, Myron L. For this

project, an active infrared motion detector is constructed. Originally, both IR and an ultrasonic

detector is want to build, but the problem is the ultrasonic detector would require too much

time for a three week project. However, building an IR motion detector would probably be a

International Journal of Scientific Research in Engineering (IJSRE) Vol. 1 (3), March, 2017

IJSRE Vol. 1 (3), March, 2017 www.ijsre.in Page 7

Page 4: VULNERABILITY SCANNING FOR ENHANCED SAFETY OF … · 2017-05-05 · VULNERABILITY SCANNING FOR ENHANCED SAFETY . OF WOMEN & AWARNESS OF VALUABLE. 1Neha Singh, 2Kirti Patil, 3Charmi

trivial exercise. So, to expand on the concept by building an ambient light ignoring motion

detector.

DESIGN AND IMPLEMENTATION

In this, there are main parts of the circuits.

1. Transmission Circuits (Infrared LEDs)

2. Receiver Circuit (Sensors)

3. Active RFID receiver

4. LM358

5. 89s52 microcontroller

6. RFID tags

Figure-1 Block Diagram

International Journal of Scientific Research in Engineering (IJSRE) Vol. 1 (3), March, 2017

IJSRE Vol. 1 (3), March, 2017 www.ijsre.in Page 8

Page 5: VULNERABILITY SCANNING FOR ENHANCED SAFETY OF … · 2017-05-05 · VULNERABILITY SCANNING FOR ENHANCED SAFETY . OF WOMEN & AWARNESS OF VALUABLE. 1Neha Singh, 2Kirti Patil, 3Charmi

Figure-2 Serial Interrupt Flowchart

This above diagram shows how a LM358 timer IC is configured to function as a basic mono

stable multi vibrator. A mono stable multi vibrator is a timing circuit that changes state once

triggered, but returns to its original state after a certain time delay. It got its name from the fact

that only one of its output states is stable. IR Transmission circuit is used to generate the

modulated 36 kHz IR signal. The IR transmitter will emit modulated 38 kHz IR signal and at the

receiver we use TSOP1738 (Infrared Sensor).

The LM358 series consists of two independent, high gain, internally Frequency compensated

operational amplifiers which were designed specifically to operate from a single power supply

over a wide range of voltages. Operation from split power supplies is also possible and the low

power supply current drain is independent of the magnitude of the power supply voltage.

Application areas include transducer amplifiers, dc gain blocks and all the conventional op amp

circuits which now can be more easily implemented in single power supply systems. For example,

the LM358 series can be directly operated off of the standard +5V power supply voltage which is

used in digital systems and will easily provide the required interface electronics without requiring

the additional ±15Vpower supplies.

We are using TSOP1738 for receiver, so we need to generate the modulated IR of 38 kHz. You

can use any TSOP, but you need to generate IR of respective frequency as TSOP. So we are

using 555 timer in astable mode to oscillate the IR at 38KHz frequency. As we know oscillation

frequency of 555 timer is decided by resistor R1, R2 and capacitor C1. We have used 1k R1, 20K

International Journal of Scientific Research in Engineering (IJSRE) Vol. 1 (3), March, 2017

IJSRE Vol. 1 (3), March, 2017 www.ijsre.in Page 9

Page 6: VULNERABILITY SCANNING FOR ENHANCED SAFETY OF … · 2017-05-05 · VULNERABILITY SCANNING FOR ENHANCED SAFETY . OF WOMEN & AWARNESS OF VALUABLE. 1Neha Singh, 2Kirti Patil, 3Charmi

R2 and 1nF capacitor to generate the frequency of approx. 38 KHz. It can be calculated using this

formula: 1.44/((R1+2*R2)*C1).Output Pin 3 of the 555 Timer IC has been connected to IR LED

using 470 resistor and a push button switch. Whenever we press the button, circuit emits

modulated IR at 38 KHz. A 100uF capacitor is connected across the supply to provide the

constant supply to the circuit, without any ripple.

For IR Receiver circuit we need to connect a LED to the output of the TSOP1738, to test the

receiver. We have used BC557 transistor, to reverse the effect of TSOP, it means whenever the

output is HIGH ,the LED will be OFF and whenever it detects IR and output gets low, LED will

be ON. PNP transistor behaves opposite to the NPN transistor , it acts as open switch when a

voltage applied to its base and acts as closed switch when there is no voltage at its base. So

normally TSOP output remains HIGH and Transistor behaves as open switch and LED will be

OFF. As soon as TSOP detects Infrared, its output becomes low and transistor behaves as closed

switch and LED will be ON.

A 10k resistor is used for provide proper biasing to transistor and a 470ohm resistor is used at

LED for limiting the current. So whenever we press the Button at IR transmitter, it is detected by

TSOP1738 and LED will glow.

The AT89S52 is a low-power, high-performance CMOS 8-bit microcontroller with 8Kbytes of in-

system programmable Flash memory. The device is manufactured using Atmel’s high-density

nonvolatile memory technology and is compatible with the industry-standard 80C51 instruction

set and pin out. The on-chip Flash allows the program memory to be reprogrammed in-system or

by a conventional nonvolatile memory programmer.

By combining a versatile 8-bit CPU with in-system programmable Flash on a monolithic chip, the

Atmel AT89S52 is a powerful microcontroller which provides a highly-flexible and cost-effective

solution to many embedded control applications. The AT89S52 provides the following standard

features: 8K bytes of Flash, 256 bytes of RAM, 32 I/O lines, Watchdog timer, two data pointers,

three 16-bit timer/counters, a six-vector two-level interrupt architecture, a full duplex serial port,

on-chip oscillator, and clock circuitry. In addition, the AT89S52 is designed with static logic for

operation down to zero frequency and supports two software selectable power saving modes. The

Idle Mode stops the CPU while allowing the RAM, timer/counters, serial port, and interrupt

system to continue functioning. The Power-down mode saves the RAM contents but freezes the

oscillator, disabling all other chip functions until the next interrupt hardware reset. So after doing

this technique we will get notification under several distance of 20-25 meters.

An RFID reader, also known as an interrogator, is a device that provides the connection between

the tag data and the enterprise system software that needs the information. The reader

communicates with tags that are within its field of operation, performing any number of tasks

including simple continuous inventorying, filtering (searching for tags that meet certain criteria),

writing (or encoding) to selected tags, etc. The reader uses an attached antenna to capture data

from tags. It then passes the data to a computer for processing. Just like RFID tags, there are

many different sizes and types of RFID readers. Readers can be affixed in a stationary position in

a store or factory, or integrated into a mobile device such as a portable, handheld scanner. In this

way our device will give notification under 20-25 meter.

International Journal of Scientific Research in Engineering (IJSRE) Vol. 1 (3), March, 2017

IJSRE Vol. 1 (3), March, 2017 www.ijsre.in Page 10

Page 7: VULNERABILITY SCANNING FOR ENHANCED SAFETY OF … · 2017-05-05 · VULNERABILITY SCANNING FOR ENHANCED SAFETY . OF WOMEN & AWARNESS OF VALUABLE. 1Neha Singh, 2Kirti Patil, 3Charmi

Figure-3 Vulnerability scanning for enhanced safety of women and awareness

of valuable. Final display on LCD 16*2

CONCLUSION

This review discussed introduction about vulnerability scanning for enhanced safety of women

and awareness of valuable. Our efforts to understand electronic approach for this device leave us

optimistic, but concerned. This paper suggest that the IR detection of two way mirror with RFID

notification has to be further studied and innovated to reach all level of community, so that the

women will remain safe in malls if they use trial rooms, washrooms etc and steal of valuable will

be decrease which will make more involvement in purchasing the innovated. Vulnerability

scanning for enhanced safety of women and awareness of valuable is for safety and security.

REFERENCES:

1. Sliney, David H.; Wange man, Robert T.; Franks, James K.; Wolbarsht , Myron L. (1976).

2. Lynch, David K.; Livingston, William Charles (2001)

International Journal of Scientific Research in Engineering (IJSRE) Vol. 1 (3), March, 2017

IJSRE Vol. 1 (3), March, 2017 www.ijsre.in Page 11

Page 8: VULNERABILITY SCANNING FOR ENHANCED SAFETY OF … · 2017-05-05 · VULNERABILITY SCANNING FOR ENHANCED SAFETY . OF WOMEN & AWARNESS OF VALUABLE. 1Neha Singh, 2Kirti Patil, 3Charmi

3. Gerald F. Marshall Handbook of Optical and Laser Scanning, Marcel Dekker, Inc., 2004, 4.Emil

Bloch, "Transparent mirror", published 1903-02-17, assigned to Emil Bloch

4. Gannsle, Daniel J (December 2008), "How to Protect Yourself from High-Tech RFID Identity

Theft", How To Do Just About Everything

5. The New York Times, retrieved 2009-03-14 (on how deliberately corrupted RFID tags could

introduce viruses into computer systems).

6. Bharadwaj, V., Raman, R., Reddy, R. & Reddy, S., (2001), Empowering mobile healthcare

providers via a patient benefits authorization service, WET ICE 2001. Proceedings. Tenth IEEE

International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises,

IEEE.

7. Bohn, J., (2008), Prototypical implementation of location-aware services based on a middleware

architecture for super-distributed RFID tag infrastructures, Personal Ubiquitous Computing,

ACM, 12 (2):155-166. Connecting for health].

8. RFID http://www.connectingforhealth.nhs.uk/ [access: 18th August, 2010]. DHS

(Department of Homeland Security) , (2006), Enhanced Security Controls needed for US-Visit’s

System using RFID Technology, U.S. Department of Homeland Security.

International Journal of Scientific Research in Engineering (IJSRE) Vol. 1 (3), March, 2017

IJSRE Vol. 1 (3), March, 2017 www.ijsre.in Page 12