A High Security Prison Management System Implementation ... · PDF fileA High Security Prison...

4
A High Security Prison Management System Implementation Using RFID CARD Anu PS, Department Of Computer Applications, Cochin University College of Engineering, Pulincunnoo, Alappuza, India. Shibu V, Department of Computer Applications, Cochin University College of Engineering, Pulincunnoo, Alappuza, India. Jabir K V T, Department Of Information Technology, Cochin University College of Engineering, Pulincunnoo, Alappuza, India. Preetha Mathew, Department of Computer Applications, Cochin University College of Engineering, Pulincunnoo, Alappuza, India. Abstract Very recently certain allegations aroused regarding the security system within the prisons. Prisoners are reported to be indulging in various malpractices even inside the jail boundary that require immediate attention. The traditional methods for getting the appropriate report usually take long time to process which helps the prisoner to escape. It is observed that applications which require high traceability can very well use RFID (Radio Frequency Identification) technology. This system is developed for high security prison management using the RFID along with the Global Positioning System (GPS) and Global System for Mobile Communications (GSM). 1. Introduction Increasing reports of prison breaks highlights the main challenges of managing the prisons [1]. Even though there are rules in place, the officers are complacent and were reluctant to do periodic security checks. If an offender tries to break the security area, the same could be alerted at that moment itself. The security measures could be re-established with immediate effect so as to restore the stability of the system. Manual disciplinary procedures are hard to rely on. An automated process to get a notification on when and where prison break occur and who did it and follow up the details of the inmates involved sounds to be a better option. The details can be passed to all other remote police stations so that the accused can be arrested within a short span of time [2]. The proposed system uses radio frequency electromagnetic fields to transfer information from an RFID tag to RFID reader for identification purposes [3]. The tag used to, do not require battery power and in turn they derive power from electromagnetic field generated from the reader. The system can thus be advised to monitor a person getting out of a specific region and the same be warned to an authority. This warning varies from a simple warning to a repeated alarm as the suspected moves from a critical to a highly critical area. 2. THE DESIGN OF THE PROPOSED SYSTEM. In this paper we propose a solution to trace the prisoner getting outside a specific boundary. It allows individuals or group of developers to keep track of prisoners based on RFID (Radio Frequency Identification) technology. The cost effectiveness and efficiency make the system reasonable. The system is incorporated with a GPS and GSM circuits the advantage so that the current location of the prisoner can be traced [4]. To provide a high security, an encoded login is also included, so that only the intended officers will use or explore the system. And the result is a highly reliable efficient security system that could be used within the central prisons. This system assigns a unique ID to each and every inmate with in prison to access the information about him/her. Anu PS et al, Int.J.Computer Technology & Applications,Vol 6 (1),89-92 IJCTA | Jan-Feb 2015 Available [email protected] 89 ISSN:2229-6093

Transcript of A High Security Prison Management System Implementation ... · PDF fileA High Security Prison...

Page 1: A High Security Prison Management System Implementation ... · PDF fileA High Security Prison Management System Implementation Using RFID CARD . Anu PS, Department Of Computer Applications,

A High Security Prison Management System Implementation Using RFID

CARD

Anu PS, Department Of Computer Applications, Cochin University College of Engineering,

Pulincunnoo, Alappuza, India.

Shibu V, Department of Computer Applications, Cochin University College of Engineering,

Pulincunnoo, Alappuza, India.

Jabir K V T, Department Of Information Technology, Cochin University College of Engineering,

Pulincunnoo, Alappuza, India.

Preetha Mathew, Department of Computer Applications, Cochin University College of Engineering,

Pulincunnoo, Alappuza, India.

Abstract

Very recently certain allegations aroused regarding

the security system within the prisons. Prisoners are

reported to be indulging in various malpractices even

inside the jail boundary that require immediate

attention. The traditional methods for getting the

appropriate report usually take long time to process

which helps the prisoner to escape. It is observed

that applications which require high traceability can

very well use RFID (Radio Frequency Identification)

technology. This system is developed for high

security prison management using the RFID along

with the Global Positioning System (GPS) and

Global System for Mobile Communications (GSM).

1. Introduction Increasing reports of prison breaks highlights the

main challenges of managing the prisons [1]. Even

though there are rules in place, the officers are

complacent and were reluctant to do periodic security

checks. If an offender tries to break the security area,

the same could be alerted at that moment itself. The

security measures could be re-established with

immediate effect so as to restore the stability of the

system.

Manual disciplinary procedures are hard to rely

on. An automated process to get a notification on

when and where prison break occur and who did it

and follow up the details of the inmates involved

sounds to be a better option. The details can be

passed to all other remote police stations so that the

accused can be arrested within a short span of time

[2].

The proposed system uses radio frequency

electromagnetic fields to transfer information from an

RFID tag to RFID reader for identification purposes

[3]. The tag used to, do not require battery power and

in turn they derive power from electromagnetic field

generated from the reader. The system can thus be

advised to monitor a person getting out of a specific

region and the same be warned to an authority. This

warning varies from a simple warning to a repeated

alarm as the suspected moves from a critical to a

highly critical area.

2. THE DESIGN OF THE PROPOSED

SYSTEM. In this paper we propose a solution to trace the

prisoner getting outside a specific boundary. It allows

individuals or group of developers to keep track of

prisoners based on RFID (Radio Frequency

Identification) technology. The cost effectiveness and

efficiency make the system reasonable. The system is

incorporated with a GPS and GSM circuits the

advantage so that the current location of the prisoner

can be traced [4].

To provide a high security, an encoded login is

also included, so that only the intended officers will

use or explore the system. And the result is a highly

reliable efficient security system that could be used

within the central prisons. This system assigns a

unique ID to each and every inmate with in prison to

access the information about him/her.

Anu PS et al, Int.J.Computer Technology & Applications,Vol 6 (1),89-92

IJCTA | Jan-Feb 2015 Available [email protected]

89

ISSN:2229-6093

Page 2: A High Security Prison Management System Implementation ... · PDF fileA High Security Prison Management System Implementation Using RFID CARD . Anu PS, Department Of Computer Applications,

The system covers every legal procedures of a

culprit from the time of his arrest to citation, primary

or time to time investigation reports, bail, parole,

appeal, remand, release, personal, witness details etc.

The system is capable of reaching the remote

police stations and central prisons, so that various

data can be shared like criminal history, FIR details

of an accused etc. Whenever a prisoner breaks the

security system, a message could be send to any of

the stations, coming under the control of the system.

The system dramatically increases the efficiency

of security systems with in a prison. The key features

include

Monitor the location of prisoner and warn if

he gets outside a specific region.

Give immediate warning to nearest stations

when prisoner gets out of jail.

Maintain details of each prisoner like

interrogation and citation details, date of

custody and remand, parole or bail details,

visitors list etc., and manipulate the same

using his RFID.

This system integrates central prison department

and other police authorities. The central prison

officials can check the criminal background of a

person. The crime department can check the travel

history of a citizen at the time of prison break, if

needed. All data related to a person are stored under

the RFID of that person [5].

This system will make the end users to handle the

system easily and also will be reliable for future

enhancements. The whole system will be under the

control of the administrator. As it is an online facility

the information will be up to date from all around the

country.

The system will be developed using ASP.Net

using C# as front end and SQL Server2008 as back

end. The required hardware of the system includes

RFID card reader and an RFID tag, Arduino board,

GPS and GSM systems. Arduino is a single-board

micro controller, intended to make the application of

interactive objects or environments more accessible.

The hardware consists of an open-source hardware

board designed around an 8-bit Atmel AVR micro

controller, or a 32-bit Atmel ARM. Pre -

programmed into the on-board micro controller chip

is a boot loader that allows uploading programs into

the micro controller memory without needing a chip

(device) programmer. The proposed GPS/GSM based

system has the two parts, first is a mobile unit and

another is controlling station. The system processes,

interfaces, connections, data transmission and

reception of data among the mobile unit and control

stations are working successfully.

3. IMPLEMENTATION

In prisons, the proposed system, named "SECURA”

consists of the following modules

Admin (The jail authority)

User (Remote police stations)

RFID System

GPS with GSM system

The Admin Module

Admin registers police stations across state

there by ensure automated security system

function properly.

User or remote police stations when

reported a crime, the primary investigation

report, and witness details, detailed FIR

report of the same and personal details of

accused are uploaded.

Admin can see the details provided by user

and assign RFID to the accused.

Admin manage the interrogation history of

accused along with bail, appeal, release,

remand, parole, visitor and personal details

of each accused.

Notification processing by Admin.

Admin can send mails whenever a prison

break occurs.

User can view alert messages whenever

prison breaks occur.

Admin will have the facility for editing,

deleting and viewing details of accused.

Police department can block a criminal

from prison break by informing the related

authority using this system.

The system installs a RFID card reader on the

boundaries of the security region to enable the

administrator or a third party to track the security

break. This system is built based on embedded

system, used for tracking and positioning of any

inmate by using Global Positioning System (GPS)

Anu PS et al, Int.J.Computer Technology & Applications,Vol 6 (1),89-92

IJCTA | Jan-Feb 2015 Available [email protected]

90

ISSN:2229-6093

Page 3: A High Security Prison Management System Implementation ... · PDF fileA High Security Prison Management System Implementation Using RFID CARD . Anu PS, Department Of Computer Applications,

and Global system for mobile communication (GSM)

[6]. This design will continuously monitor a moving

person and report the status of the person on demand.

The remote monitoring system is incorporated with

mail sending possibility so that mails can be send to

any police stations to take immediate measures when

inmate break the prison. Based on the total design of

the system, the hardware and software are designed.

In this paper, the GSM network is a medium for

transmitting the remote signal. This includes two

parts that are the monitoring centre and the remote

monitoring station. The monitoring centres consist of

a computer and communication module of GSM. The

software-monitoring centre and the remote

monitoring station implemented by using C#.net. The

result of this demonstration shows that the system

can watch and control the remote communication

between the monitoring centre and the remote

monitoring station.

Whenever a crime occurs the initial step is the

primary investigation and evidence collection which

will be carried out by officials of the nearest station

of the crime. The accused is then presented on the

court. These steps are manipulated by the user

module of the proposed system. The collected FIR

details, witness details if any, other evidences,

personal details etc are documented by the user or the

remote police stations. Note that as the proposed

system is centralized this data could be accessed by

certain other intended users like central prisons.

The suspect who produced before court could be

punished or can be released if found innocent

.Further by the procedures is to be managed by the

staff of central prison if court asked the officials to

move the inmate to central prison. It means at certain

cases local police stations are asked by court to

continue the legal procedures demanded by the nature

of the crime. Our proposed system mainly

concentrates on the cases where accused is suggested

by the court to move to central prison. At this stage

the proposed system demands the inmates unique ID

which is a 12 digit code supplied through an RFID

tag. Then the details or data of each inmate is

processed by using this RFID.

The main highlight of the proposed system is a high

security login. To use the system one must login to it.

And this login is enhanced by a 6*6 matrix. The

matrix elements include the English alphabets and

numbers ranging from 0-9. For each login the matrix

will be refreshed, so that the matrix appears different

for different login. One rule to be followed in the

system is that the user must possess an even digit

length password. This password is then to be entered

in an encoded form for authentication. The encoding

is done in the following way:-

Enter the corresponding entry of the matrix given

by the row and column intersections of actual

password.

The first entry of encoded password corresponds

to the original password’s first and second

characters row and column intersection entry in

matrix.

The second entry of encoded password

corresponds to the original password’s third and

fourth characters row and column intersection

entry in matrix and so on.

The resulting password will be of odd length

which will be decoded using algorithm to

authenticate the user.

If given password and user name provided are

correct, only then the users are allowed to use the

system.

The inmates moved to the prison by the court will be

under various legal procedures like remand, punished

etc. All these are meant to be managed by officials of

the central prison. The legal procedures may vary

from time to time. For example the accused may be

initially remanded for certain period for further court

hearings or may be under punishment based on

nature of crime. After this stage he may apply for

bail, parole, appeal etc. as per the laws of

constitution. All these details are managed by the

system until the person is released. As soon as an

inmate is released the history would still persist in

system for future references.

4. RESULTS AND CONCLUSION “SECURA” the proposed system is used to track the

inmate who breaks the prison by using RFID

technology. When the prison break is identified, the

responsible people send email to the authenticated

officials, so that the scenario is managed with greater

efficiency. The high security login used by the

system prevents any kind of malfunctions. It is a very

cost effective system that could be recommended to

be used within prisons. The following screen shots of

the system gives an insight of the login for proposed

system.

Anu PS et al, Int.J.Computer Technology & Applications,Vol 6 (1),89-92

IJCTA | Jan-Feb 2015 Available [email protected]

91

ISSN:2229-6093

Page 4: A High Security Prison Management System Implementation ... · PDF fileA High Security Prison Management System Implementation Using RFID CARD . Anu PS, Department Of Computer Applications,

Fig1: The login page appears for the user

Fig 2: The notifications when a prison

break occurs

10. References [1] Nathan James “The Federal Prison Population Build up:

Overview, Policy Changes, Issues, and Options”

Congressional Research Service. 7-5700 www.crs.gov

R42937.

[2] Dallin H. OakS; Studying the Exclusionary Rule in

Search and Seizure , THE UNIVERSITY OF CHICAGO

LAW REVIEW Vol. 37, No.4, Summer 1970.

[3] Badri Nath, Franklin Reynolds, Roy Want, “RFID

Technology and Applications,” IEEE CS and IEEE

ComSoc, Vol. 5, No. 1, 2006, pp. 22-24.

[4] Lei Zhang and Zhi Wang, “Integration of RFID into

Wireless Sensor Networks: Architectures, Opportunities

and Challenging Problems,” Proceedings of the Fifth International Conference on Grid and Cooperative

Computing Workshops, Hunan, 2006, pp.463-469.

[5] Ron Weinstein, “RFID: A Technical Overview and Its Application to the Enterprise,” IT Professional, Vol. 7, No.

3, June 2005, pp. 27-33

[6] Elit Wireless Solutions (2007) GM862-GPS Hardware user guide. 1vv0300728 Rev. 8 - 20/09/07 World Academy

of Science Engineering and Technology 61 2010 99.

Anu PS et al, Int.J.Computer Technology & Applications,Vol 6 (1),89-92

IJCTA | Jan-Feb 2015 Available [email protected]

92

ISSN:2229-6093