Multi-Factor Authenticated Secure Digital Locker Using GSM

Anshita Dhoot,
Department of Radio Engineering and Computer Technology, Moscow Institute of Physics and Technology, Moscow, Russian Federation
Kristi Shumka, M. Salman Saeed,
The Department of Intelligent Information Systems and Technologies, Moscow Institute of Physics and Technology, Moscow, Russian Federation
Prof. A.N. Nazarov,
Department of Radio Engineering and Computer Technology, Moscow Institute of Physics and Technology, Moscow, Russian Federation

DOI: 10.36724/2664-066X-2021-7-2-7-12

SYNCHROINFO JOURNAL. Volume 7, Number 2 (2021). P. 7-12.

Abstract

In this time and age, technology is on an ever-developing trend, bringing with it a plethora of new advancements to daily life and common activities, but with these advancements, a whole new set of issues and vulnerabilities become present. This paper aims to discuss and propose a solution to the vulnerability of physical security lockers, a facet of security that many organisations tend to neglect. It aims to provide an elevated level of security for companies who use physical lockers to secure sensitive information or important contents. More specifically, the paper discusses the plausibility and the advantage of utilising multi-factor authentication with dynamic passwords or OTP code for short and facial recognition to access physical lockers. The proposed system will require employees to have accounts in their respective locker by entering their respective ID and passing the facial recognition feature. The system will then provide the employee with an OTP code, allowing the company an extra layer of security from intruders or malicious individuals.

Keywords: physical locker security, sensitive information, multi-factor authentication, facial recognition, OTP.

References

1. Dey, S., Kundu, T., Mukherjee, S., & Sarkar, M. (2015). Web based Real Time Home Automation and Security System. Int. J. Elec & Electr. Eng & Telecoms, 4, 126–132.
2. Bangali, Jayashri, & Shaligram. (2013). Design and Im-plementation of Security Systems for Smart Home based on GSM technology. International Journal of Smart Home. https://doi.org/10.14257/ijsh.2013.7.6.19
3. Sharma, R. K., Mohammad, A., Kalita, H., & Kalita, D. (2014). Android interface based GSM home security system. International Conference on Issues and Challenges in Intelligent Computing Techniques, 196–201. https://doi.org/10.1109/ICICICT.2014.6781278
4. Wasi-ur-Rahman, Md., Tanvir-Rahman, M., Khan, T. H., & LutfulKabir, S. M. (2009). Design of an Intelligent SMS based Remote Metering System. Proceedings of the IEEE International Conference on Information and Automation, 1040–1043. https://doi.org/10.1109/ICINFA.2009.5205071
5. Maurya, K., Singh, M., & Jain, N. (2011). Real Time Vehicle Locking and Tracking System using GSM and GPS Technology-An Anti-theft System. International Journal of Technology And Engineering System, 2(3).
6. Mostakim, N., Sarkar, R. R., & Hossain, A. (2019). Smart Locker: IOT based Intelligent Locker with Password Protection and Face Detection Approach. International Journal of Wireless and Microwave Technologies, 9(3), 1–10. https://doi.org/10.5815/ijwmt.2019.03.01
7. Kumar, A., Sood, P., & Gupta, U. (2020). Internet of Things (IoT) for Bank Locker Security System. 6th International Conference on Signal Processing and Communication. https://doi.org/10.1109/ICSC48311.2020.9182713
8. Dhoot, A., Nazarov, A. N., & Koupaei, A. N. A. (2020). A Security Risk Model for Online Banking System. Systems of Signals Generating and Processing in the Field of on Board Communications, 1–4. https://doi.org/10.1109/IEEECONF48371.2020.9078655
9. Turner, D.-M., & Hazari, S. (2007). Bringing Secure Wireless Technology to the Bedside: A Case Study of Two Ca-nadian Healthcare Organizations. Web Mobile-Based Applications for Healthcare Management. https://doi.org/10.4018/978-1-59140-658-7.ch007
10. Tariq, F., Rashid, M., & Khan, M. N. (2015). Imple-mentation of Smart Homes and Industrial Automation System with Secure Communication over GSM. Universal Journal of Electrical and Electronic Engineering, 3(4), 125–131. https://doi.org/10.13189/ujeee.2015.030403