Bank Vault Security System Based on Infrared Radiation and GSM Technology

  • Mithun DuttaEmail author
  • Md. Ashiqul Islam
  • Mehedi Hasan Mamun
  • Kangkhita Kaem Psyche
  • Mohammad Al Mamun
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 38)


Banking security systems are emerging as a matter of great importance nowadays. We are presenting here a smart security system, which has been designed to protect the bank vault from being theft or unauthorized access. This highly secured system is based on Infrared ray, GSM technology, different types of sensors (Motion sensor, Laser sensor, Sound sensor and Gas sensor), IP camera, microcontroller, keyboard, and LCD. GSM technology will be used here to send any type of warning message to the concerned phone number. According to our concept a biometric function, i.e., hand geometry, an iris scanner, a fingerprint scanner or heartbeat rate with a password/PIN can be used here which will be responsible for the fine security of the principle gate of the vault. It may also include Infrared radiation between the walls of bank vault room to provide increased security of the vault. The walls of the vault room is specially designed in two sections maintaining collateral gap where the Infrared radiation will pass from the Infrared radiation sources to prevent any accident like wall break robbery. The proposed security system of the bank vault has been implemented as well as tested several times and found more effective than the other existing security systems.


GSM Sensors Infrared radiation IP camera PIN Microcontroller 


  1. 1.
    Sridharan, S.: Authenticated secure bio-metric based access to the bank safety lockers. In: IEEE International Conference on Information Communication & Embedded System “ICICES 2014”, S.A. Engineering College, Chennai, Tamil Nadu, India, February 2014. ISBN 978-1-4799-3834-6/14/$31.00©2014 IEEEGoogle Scholar
  2. 2.
    Teja, P.S.R., Kushal, V., Srikar, A.S., Srinivasan, K.: Photosensitive security system for theft detection and control using GSM technology. In: Fifth International Conference on Security, Privacy and Applied Cryptography Engineering, MNIT, Rajasthan, India, pp. 122–125, October 2015Google Scholar
  3. 3.
    Javare, A., Dabhade, J., Ghayal, T., Shelar, A.: Access control and ıntrusion detection in door lock system using bluetooth technology. In: IEEE International Conference on Energy, Communication, Data Analytics and Soft Computing ICECDS 2017, pp. 2246–2251 (2017)Google Scholar
  4. 4.
    Tams, B., Mihăilescu, P., Munk, A.: Security considerations in minutiae-based fuzzy vaults. IEEE Trans. Inf. Forensics Secur. 10(5), 985–998 (2015). Scholar
  5. 5.
    Ray, R.K., Uddin, M.A., Islam, S.F.: GSM based bank vault security system. Int. J. Comput. Sci. Inf. Secur. (IJCSIS) 14(2), 35–38 (2016)Google Scholar
  6. 6.
    Verma, A.: A multi layer bank security system. In: 2013 International Conference on Green Computing, Communication and Conservation of Energy (ICGCE), pp. 914–917, December 2013Google Scholar
  7. 7.
    Ramani, R., Selvaraju, S., Valarmathy, S., Niranjan, P.: Bank locker security system based on RFID and GSM technology. Int. J. Comput. Appl. 57(18), 15–20 (2012). ISSN 0975-8887Google Scholar
  8. 8.
    Islam, S., Saiduzzaman, Md.: Design of a bank vault security system with password, thermal & physical interrupt alarm. Int. J. Sci. Eng. Res. 4(8), 70–73 (2013)Google Scholar
  9. 9.
    Bucko, J.: Security of smart banking applications in Slovakia. J. Theor. Appl. Electron. Commer. Res. 12(1), 42–52 (2017). ISSN 0718-1876CrossRefGoogle Scholar
  10. 10.
    Khera, N., Verma, A.: Development of an ıntelligent system for bank security. In: IEEE 2014 5th International Conference-Confluence the Next Generation Information Technology Summit, pp. 319–322 (2014)Google Scholar
  11. 11.
    Chopkar, T.A., Lahade, S.: Real time detection of moving object based on FPGA. IOSR J. Electron. Commun. Eng. (IOSR-JECE) 11(1), 37–41 (2016). e-ISSN 2278-2834, p- ISSN 2278-8735Google Scholar
  12. 12.
    Anatoliy, P.N., Kristina, V.A., Elena, A.K., Vagiz, D.G., Aleksandr, V.S.: Technologies of safety in the bank sphere from cyber attacks. In: 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), 29 January–1 February 2018 (2018)Google Scholar
  13. 13.
    Chernyi, S., Zhilenkov, A., Sokolov, S., Nyrkov, A.: Algorithmic approach of destabilizing factors of improving the technical systems efficiency. Vibroeng. Procedia 13, 261–265 (2017)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Mithun Dutta
    • 1
    Email author
  • Md. Ashiqul Islam
    • 2
  • Mehedi Hasan Mamun
    • 2
  • Kangkhita Kaem Psyche
    • 3
  • Mohammad Al Mamun
    • 1
  1. 1.Rangamati Science and Technology UniversityRangamatiBangladesh
  2. 2.Daffodil International UniversitySavar, DhakaBangladesh
  3. 3.Jahangirnagar UniversitySavar, DhakaBangladesh

Personalised recommendations