<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Simple  Autonomous  Security  System  Based  On  Arduino  UNO  Platform and Fingerprint Scanner Module: A Study Case </article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Volodymyr Rusyn</string-name>
          <email>rusyn_v@ukr.net</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sergey Subbotin</string-name>
          <email>subbotin@zntu.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Aceng Sambas</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>National university “Zaporizhzhia polytechnic”</institution>
          ,
          <addr-line>Zhukovsky str., 64, Zaporizhzhia, 69063</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Universitas Muhammadiyah Tasikmalaya</institution>
          ,
          <addr-line>Jl. Tamansari No. KM 2,5, Mulyasari, Kec. Tamansari, Tasikmalaya, Jawa Barat, 46196</addr-line>
          ,
          <country country="ID">Indonesia</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Yuriy Fedkovych Chernivtsi National University</institution>
          ,
          <addr-line>Kotsybynsky str., 2, Chernivtsi, 58012</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>   In this paper, we presented a simple autonomous security system. This security system based on the Arduino Uno and fingerprint scanner module. The Arduino was connected to a computer through the USB port and programmed using a language similar to C++. Programming code (sketch) was uploaded into Arduino using program software ArduinoIDE. Connection scheme and experimental results are presented and can be used for education.</p>
      </abstract>
      <kwd-group>
        <kwd> 1  Fingerprint scanner</kwd>
        <kwd>security system</kwd>
        <kwd>Arduino</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction </title>
      <p>In the modern world, biometric information protection is one of the most effective methods for its
preservation. Thanks to the process of authenticating a person, that is, comparing his characteristics
with the characteristics previously entered into the system, it is possible to determine with maximum
accuracy whether a given person has access to the requested information or still does not. Nowadays,
everyone cares about how to protect their data as efficiently as possible. In an effort to secure personal
information, mankind has been developing more and more security systems for many years.
Biometric protection turned out to be one of the most effective such systems.</p>
      <p>
        Biometric security technologies are becoming more and more everyday attributes of the ordinary
person's life. In recent years, they have become extremely widespread in the production of mobile
technology: fingerprint scanners, face geometry scanners, and voice recognizers are built into
smartphones [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4 ref5 ref6 ref7">1-7</xref>
        ]. All this makes the life of an ordinary user much more convenient, quieter and
safer. Precisely the same devices are now very often equipped with personal computers, smart homes
and many other computerized equipment.
      </p>
      <p>Biometric systems are also quite popular among enterprises, where the entrance to the territory or
access to information is open to a large, but limited number of people. At the checkpoints of such
enterprises, specialized equipment is usually installed that allows you to identify “your” person
through the iris of the eye, the geometry of the hand, face or through the drawing of papillary lines on
the pads of the fingers, and sometimes all together.</p>
      <p>The introduction of biometrics opens up a sea of different possibilities in banking, making life
much easier not only for the bank, but also for its customers. By introducing biometric technologies,
bank managers want to reduce the number of data thefts, cases of fraud and greatly simplify the
procedure for a client's work with an ATM.</p>
      <p>In this paper, we proposed a simple autonomous security system that based on the Arduino Uno
and fingerprint scanner module that can be used for education.</p>
    </sec>
    <sec id="sec-2">
      <title>2. ARDUINO board </title>
      <p>
        The Arduino can be compared to a computer motherboard, which also has a processor under the
cooler. The motherboard with the processor performs the same functions as the Arduino Uno. Other
devices are connected to it: the display, disk drives, hard drives, and all other peripherals. You can
also connect many different devices [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>The uniqueness of the Arduino is that now even an inexperienced radio amateur will be able to
create various complex digital devices, without going into theory. Previously, for example, this
required programmers, deep knowledge of digital electronics, programming. Arduino was created so
that almost any user could create their own interesting and useful device.</p>
      <p>Fig. 1 shows Arduino Uno that we used for our project.</p>
      <p>Arduino Uno controller built on ATmega328. The platform has 16 MHz crystal oscillator,
6 analog inputs, 14 digital inputs / outputs (6 of which can be used as PWM outputs), a USB
connector, an ICSP connector, a power connector and a reset button. For work, we must connect the
platform to the computer via a USB cable, or apply power using battery or AC/DC adapter.</p>
      <p>The Arduino Uno board has 3 ways to connect power on board: via USB, via an external power
connector and via the Vin connector, brought out to one of the combs on the side. The platform has a
built-in stabilizer on board, which allows not only to automatically select the power source, but also to
equalize the current to stable 5 Volts, which the controller needs to work.</p>
      <p>External power can be supplied either directly from the USB port of the computer, or from any
AC / DC power supply via the power connector or USB.</p>
      <p>The board has several pins that allow powering connected sensors, sensors and actuators from it.
All of these findings are labeled:
 Vin – power input, used to receive power from an external source. Through the data output,
only power is supplied to the board, it is impossible to receive power from there for external
devices. It is recommended to apply a voltage in the range from 7 V to 20 V to the Vin input, in
order to avoid overheating and burning of the built-in stabilizer.
 5 V – a five-volt voltage source for powering external devices. When the board receives
power from any other source (USB, power connector or Vin), you can always get a stable voltage
of 5 Volts on this pin. It can be displayed on a breadboard or fed directly to the desired device.
 3V3 – source of 3.3 Volt voltage for powering external devices. Works on the same principle
as the 5 V pin. From this leg, you can also output the voltage to the breadboard, or apply it directly
to the required sensor / sensor.
 GND – pin for ground connection. Needed to create a closed circuit when connected to Vin,
5 V or 3V3 pins. In all cases, the GND leg must be output as a minus, otherwise the circuit will not
be closed and the power (both external and internal) will not be supplied.</p>
      <p>The Arduino Uno platform has an ATmega328 microcontroller on board, which has Flash, SRAM
and EEPROM memory:
 FLASH – 32 kB (0.5 kB is used for bootloader storage SRAM (RAM).
 2 kB EEPROM.</p>
      <p> 1 kB (available with EEPROM library).</p>
    </sec>
    <sec id="sec-3">
      <title>3. Program realization </title>
      <p>The Arduino integrated development environment is an environment in which an Arduino board
can be programmed.</p>
      <p>A written program or code is called SKETCH. In this work, the Arduino IDE is used as an
environment in which the Arduino Uno program is written, compiled and uploaded on the Arduino
board as depicted in Fig. 2.</p>
      <p>The  Arduino  can  be  connected  to  a  computer  through  the  USB  port  and  programmed  using  a 
language similar to C++. </p>
      <p>In the first stage, we must control the fingerprint sensor module with the Arduino. It is by using
the Adafruit library for this sensor.</p>
      <p>Having the fingerprint sensor module wired to the Arduino, we must follow the next steps to enroll
a new fingerprint. Make sure you have installed the Adafruit Fingerprint Sensor library previously
(Fig. 3).</p>
      <p>You will be asked to place the same finger twice on the scanner. If you get the “Prints matched!”
message, the fingerprint was successfully stored. If not, we repeat the process, until was succeed
(Fig. 4).</p>
      <p>Now, we should have several fingerprints saved on different IDs (Fig. 5).</p>
      <p>Figure 5: Interface that demonstrate that a sensor contains three templates </p>
      <p>Next stage: place the finger on the scan for identified . On the serial monitor, we can see the ID
user that matches the fingerprint. It also shows the confidence – the higher the confidence, the similar
the fingerprint is with the stored fingerprint (Fig. 6).</p>
      <p>The programming code:</p>
    </sec>
    <sec id="sec-4">
      <title>4. Experimental realization </title>
      <p>Fig. 7 shows fingerprint sensor module that made fingerprint recognition more accessible and easy
to add to different projects. This means that is super easy to make fingerprint collection, search,
registration and comparison. This module work with any microcontroller or system with TTL serial
and come with FLASH memory to store the fingerprints. This fingerprint sensor module can be added
to security systems, door locks, time attendance systems, and much more.</p>
      <p>Specifications of the fingerprint sensor module:
 Voltage supply: DC 3.6 to 6.0 V.
 Current supply: &lt; 120mA.
 Backlight color: green.
 Interface: UART.
 Bad rate: 9600.
 Safety level: five (from low to high: 1,2,3,4,5).
 False Accept Rate (FAR): &lt; 0.001 % (security level 3).
 False Reject Rate (FRR): &lt; 1.0 % (security level 3).</p>
      <p> Able to store 127 different fingerprints.</p>
      <p>The fingerprint sensor module used in this project came with really thin wires, so soldering
breadboard-friendly wires was needed. We recommend using different colors according to the pin
function.</p>
      <p>In our case:
 DNC – white wires.
 VCC – red wire.
 TX – blue wire.
 RX – green wire.
 GND – black wire.</p>
      <p>The connection scheme is quite simple and it’s rather difficult to make a mistake (Fig. 9).</p>
      <p>Fig. 10 shows connection scheme for experimental demonstration of the simple autonomous
security system.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusions </title>
      <p>The simple autonomous security system that can be used for individual or different commercial
security as example personal data, based on the fingerprint scanner module and Arduino Uno.</p>
      <p>The Arduino was connected to a computer through the USB port and programmed using a
language similar to C++. Programming code (sketch) was uploaded into Arduino using program
software ArduinoIDE. Connection scheme and experimental results are also presented.</p>
    </sec>
    <sec id="sec-6">
      <title>6. References </title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Elmir</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Ghazaoui</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Boukenni</surname>
          </string-name>
          ,
          <article-title>Multimodal Biometrics System's Resistance to noise (Fingerprint and Voice)</article-title>
          .
          <source>CEUR Workshop Proceedings</source>
          <volume>942</volume>
          (
          <year>2012</year>
          )
          <fpage>25</fpage>
          -
          <lpage>28</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>S.</given-names>
            <surname>Xia</surname>
          </string-name>
          , Y. Liu, G. Yuan,
          <string-name>
            <given-names>M.</given-names>
            <surname>Zhu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>Indoor fingerprint positioning based on Wi-Fi: an overview</article-title>
          ,
          <source>ISPRS Int. J. Geo-Inf</source>
          .
          <volume>6</volume>
          (
          <year>2017</year>
          )
          <fpage>135</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>H.</given-names>
            <surname>Suining</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. H. Gary</given-names>
            <surname>Chan</surname>
          </string-name>
          ,
          <article-title>Wi-Fi Fingerprint-Based Indoor Positioning: Recent Advances and Comparisons</article-title>
          , IEEE Commun.
          <source>Surv Tut</source>
          ,
          <volume>18</volume>
          (
          <year>2016</year>
          )
          <fpage>466</fpage>
          -
          <lpage>490</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>G.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Busch</surname>
          </string-name>
          and
          <string-name>
            <given-names>B.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <article-title>"A novel approach used for measuring fingerprint orientation of arch fingerprint," 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)</article-title>
          ,
          <year>Opatija</year>
          ,
          <year>2014</year>
          , pp.
          <fpage>1309</fpage>
          -
          <lpage>1314</lpage>
          . doi:
          <volume>10</volume>
          .1109/MIPRO.
          <year>2014</year>
          .6859770
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>S. P.</given-names>
            <surname>Sandip</surname>
          </string-name>
          and
          <string-name>
            <given-names>P. H.</given-names>
            <surname>Zope</surname>
          </string-name>
          ,
          <article-title>"Selective review of fingerprint enhancement, classification and matching techniques,"</article-title>
          <source>2015 IEEE Bombay Section Symposium (IBSS)</source>
          , Mumbai,
          <year>2015</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . doi:
          <volume>10</volume>
          .1109/IBSS.
          <year>2015</year>
          .7456656
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>G.</given-names>
            <surname>Caso</surname>
          </string-name>
          , L. De Nardis,
          <article-title>On the Applicability of Multi-wall Multi-floor Propagation Models to WiFi Fingerprinting Indoor Positioning, Future Access Enablers for Ubiquitous and Intelligent Infrastructures: Lecture Notes of the Institute for Computer Sciences, Social Informatics</article-title>
          and Telecommunications Engineering, Springer,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Tomas</given-names>
            <surname>Trainys</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Algimantas</given-names>
            <surname>Venčkauskas</surname>
          </string-name>
          .
          <source>Encryption Keys Generation Based on BioCryptography Finger Vein Method. CEUR Workshop Proceedings</source>
          <volume>2145</volume>
          (
          <year>2018</year>
          )
          <fpage>106</fpage>
          -
          <lpage>111</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Rusyn</surname>
            <given-names>V</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Subbotin</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sambas</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <article-title>Analysis and Experimental Realization of the Logistic Map Using Arduino Pro Mini</article-title>
          .
          <source>CEUR Workshop Proceedings</source>
          <volume>2608</volume>
          (
          <year>2020</year>
          )
          <fpage>300</fpage>
          -
          <lpage>310</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>