Design of an Arduino-Based Intelligent Access Control System with Priority Levels

Iorga Rusten-Andrei, Bizon Nicu, Dragusin Sebastian-Alexandru

Abstract


This paper presents the design and validation of an intelligent, low-cost access control system built on an Arduino Mega platform that enforces multi-factor authentication and priority-based policies for institutional environments. The solution integrates RFID (Radio Frequency Identification) tags, fingerprint verification, and PIN (Personal Identification Number) entry via a keypad, augmented with a PIR (Passive Infra-Red) sensor and audible/visual indicators for tamper feedback. A modular firmware architecture coordinates an authentication pipeline with configurable retry limits, lockout intervals, and role/priority rules that gate sensitive actions (e.g., password change, RFID enrollment) behind elevated privileges. Hardware interfacing is described for the RC522 RFID reader, optical fingerprint sensor, 4×4 keypad, relay/servo door actuator, and an I²C (Inter-Integrated Circuit) LCD (Liquid Crystal Display), alongside the finite-state control logic and the data structures governing user records and policy enforcement. Experimental evaluation encompasses per-factor latency, success and false-reject rates, and robustness under fault scenarios (power loss, sensor mismatch, replay attempts). Results indicate sub-second on-device decisions, reliable operation across more than 1,000 transactions, and measurable security gains from combining factors with priority checks, while maintaining the bill of materials within an educational/SME (Small and Medium-sized Enterprises) budget. The architecture thus constitutes a reproducible reference for secure, scalable access control in laboratories, classrooms, and administrative facilities.


Full Text:

PDF

References


S. A. Dragusin, N. Bizon, R. N. Bostinaru, F. M. Enescu, R. M. Teodorescu, and C. Savulescu, “Analysis of Vulnerabilities in Communication Channels Using An Integrated Approach Based on Machine Learning and Statistical Methods,” Proceedings of the 16th International Conference on Electronics, Computers and Artificial Intelligence, ECAI 2024, 2024, doi: 10.1109/ECAI61503.2024.10607483.

I. E. Kezron, “Cybersecurity Strategies for Resource Constrained SMEs and Health Providers,” Iconic Research And Engineering Journals, vol. 8, no. 5, pp. 1215–1224, 2024, Accessed: Nov. 13, 2025. [Online]. Available: https://www.irejournals.com/paper-details/1706570

A. Ahmed, S. Abdulkadir, J. Mohamed, S. A. Ali, M. Abdi, and S. A. Kahie, “Design and Implementation of an IoT based Smart Door Lock System,” 2023 2nd International Conference on Multidisciplinary Engineering and Applied Science, ICMEAS 2023, 2023, doi: 10.1109/ICMEAS58693.2023.10379324.

A. Veľas, M. Boroš, R. Kuffa, and F. Lenko, “Testing of Permeability of RFID Access Control System for the Needs of Security Management,” Applied Sciences 2024, Vol. 14, Page 4227, vol. 14, no. 10, p. 4227, May 2024, doi: 10.3390/APP14104227.

W. Ali, G. Dustgeer, M. Awais, and M. A. Shah, “IoT based smart home: Security challenges, security requirements and solutions,” ICAC 2017 - 2017 23rd IEEE International Conference on Automation and Computing: Addressing Global Challenges through Automation and Computing, Oct. 2017, doi: 10.23919/ICONAC.2017.8082057.

D. Levshun, A. Chechulin, and I. Kotenko, “Design of Secure Microcontroller-Based Systems: Application to Mobile Robots for Perimeter Monitoring,” Sensors 2021, Vol. 21, Page 8451, vol. 21, no. 24, p. 8451, Dec. 2021, doi: 10.3390/S21248451.

N. David and G. Ajah, “A Microcontroller Based Security System,” Scholars Journal of Engineering and Technology, vol. 2, no. SJET, pp. 868–873, 2014, Accessed: Nov. 13, 2025. [Online]. Available: www.saspublisher.com

Harishni L, Srisha M, and Dr Sandhya S, “Design and Simulation of an Arduino-Based Password-Protected Door Locking System,” Int J Eng Adv Technol, vol. 14, no. 2, pp. 25–31, Dec. 2024, doi: 10.35940/IJEAT.B4550.14021224.

Arduino Docs, “Arduino® Mega 2560 Rev3.” Accessed: Nov. 13, 2025. [Online]. Available: https://docs.arduino.cc/resources/datasheets/A000067-datasheet.pdf

SparkFun Electronics, “4x4 Matrix Membrane Keypad.” Accessed: Nov. 13, 2025. [Online]. Available: https://cdn.sparkfun.com/assets/f/f/a/5/0/DS-16038.pdf

NXP, “MFRC522 Standard performance MIFARE and NTAG frontend.” Accessed: Nov. 13, 2025. [Online]. Available: https://www.nxp.com/docs/en/data-sheet/MFRC522.pdf

HandsOn Tech, “HC-SR501 Passive Infrared (PIR) Motion Sensor.” Accessed: Nov. 13, 2025. [Online]. Available: https://www.handsontec.com/dataspecs/SR501%20Motion%20Sensor.pdf

Ja-bots.com, “Fingerprint Sensor Module with Arduino (FPM10A).” Accessed: Nov. 13, 2025. [Online]. Available: https://ja-bots.com/wp-content/uploads/2022/03/FPM10A-Guia-Arduino.pdf?srsltid=AfmBOoq4kY9Iirb1zUB2w-FjIIjnR7ibbOygSG0yiqd5DWIqSYkBYdjD

HandsOn Tech, “I2C Serial Interface 20x4 LCD Module.” Accessed: Nov. 13, 2025. [Online]. Available: https://www.handsontec.com/dataspecs/I2C_2004_LCD.pdf

D. K. Halim, T. C. Ming, N. M. Song, and D. Hartono, “Arduino-based IDE for embedded multi-processor system-on-chip,” Proceedings of 2019 5th International Conference on New Media Studies, CONMEDIA 2019, pp. 135–138, Oct. 2019, doi: 10.1109/CONMEDIA46929.2019.8981862.

S. A. Dragusin, N. Bizon, and R. N. Bostinaru, “A Brief Overview Of Current Encryption Techniques Used In Embedded Systems: Present And Future Technologies,” 15th International Conference on Electronics, Computers and Artificial Intelligence, ECAI 2023 - Proceedings, 2023, doi: 10.1109/ECAI58194.2023.10194034.

S. A. Dragusin, N. Bizon, and R. N. Bostinaru, “Comprehensive Analysis of Cyber-Attack Techniques and Vulnerabilities in Communication Channels of Embedded Systems,” Proceedings of the 16th International Conference on Electronics, Computers and Artificial Intelligence, ECAI 2024, 2024, doi: 10.1109/ECAI61503.2024.10607432.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2025 Journal of Electrical Engineering, Electronics, Control and Computer Science

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.