+ All Categories
Home > Documents > security access system using rfid

security access system using rfid

Date post: 03-Jun-2018
Category:
Upload: arnav-banerji
View: 222 times
Download: 0 times
Share this document with a friend

of 20

Transcript
  • 8/12/2019 security access system using rfid

    1/20

    RFID BASED SECURITY ACCESS SYSTEM

    Prepared by:-

    Arnav Banerji 11/FET/EC/1011

    Vinayak Sharma 11/FET/EC/1093

    Faculty of Engineering & Technology

    Manav Rachna International University, Faridabad

    Co-ordinated by:-

    Ms. Savita

    (Assistant ProfessorECE department)

  • 8/12/2019 security access system using rfid

    2/20

    AIM

    The main aim of the project is to make a

    simple security access system using Radio

    Frequency Identification (RFID) and its

    concept is to allow the access only toauthorized persons.

  • 8/12/2019 security access system using rfid

    3/20

  • 8/12/2019 security access system using rfid

    4/20

    INTRODUCTION (I)

    What is RFID?

    RFID is used to automatically identifypeople, objects, and animals using short range

    radio technology to communicate digitalinformation between a stationary location(reader) and a movable object (tag).

    RFID are just like bar codes, only difference isthat it adds to much more benefits as comparedto bar codes.

  • 8/12/2019 security access system using rfid

    5/20

    STEPS

    The RFID card is kept or swiped in front of the RFID reader Then that person is asked to type his 6 digit password

    through keypad interface

    If the password is typed correctly, the access is allowed to the

    respective person and the door latch opens. If that person swiped the wrong card or didnt type the

    password correctly, the buzzer will turn on signifying that the

    access is denied and that particular person wontget access to

    the door and the door latch will remain closed.

  • 8/12/2019 security access system using rfid

    6/20

    WHY RFID ARE BETTER THAN USING

    BAR CODES?

    Bar codes are line-of-sight technology, whichmeans people usually have to orient the barcode towards a scanner for it to be read.Radio frequency identification, by contrast,doesntrequire line of sight.

    RFID tags can be read as long as they arewithin range of a reader.

    Bar codes have other shortcomings as well. Ifa label is ripped, soiled or falls off, there is noway to scan the item.

  • 8/12/2019 security access system using rfid

    7/20

    RFID READER

    An RFID reader is a devicethat is used to interrogatean RFID tag. The reader hasan antenna that emits radiowaves; the tag responds by

    sending back its data.

    The reader has two basiccomponents

    A scanning antenna

    A transceiver with adecoder to interpret thedata

  • 8/12/2019 security access system using rfid

    8/20

    RFID TAG

    A Tag is a transponder whichreceives a radio signal and inresponse to it sends out aradio signal.

    Tag contains an antenna, anda small chip that stores a smallamount of data

    Tag can be programmed atmanufacture or on installation

    Tag is powered by the highpower electromagnetic fieldgenerated by the antennas.

    The field allows thechip/antenna to reflect back anextremely weak signal

    containing the data.

  • 8/12/2019 security access system using rfid

    9/20

    HOW IT IS USED?

    In the beginning, the user isprompted to scan his tagor ID. It can be doneeither by holding it near

    the reader for a while oreven swiped in front ofthe reader. Then afterrecognizing, the readerdetects the card byflashing an LED light for asecond with a beepsound.

  • 8/12/2019 security access system using rfid

    10/20

    FREQUENCY BAND OF RFID

    LF band: 125 and 135 kHz HF band 13.56 MHz

    These frequency bands can be used freelyworldwide. The low frequencies here optimizetransmission distance by minimizing free-spacelosses.

    UHF band: 915 MHz MW band: 2.4 GHz

    These frequency specifications are for the USonly, Europe and Japan have different frequencyspecifications for UHF/MW.

  • 8/12/2019 security access system using rfid

    11/20

    PASSIVE TAGS AND ACTIVE TAGS

    Tag Attributes Passive tags Active tags

    Tag Power Energy transferred

    from RF to reader

    Internal to tag.

    Tag Battery Yes No

    Availability of

    Power

    Only in the field of

    Radar

    Continuous

    Required signal

    strength to tag

    Very High Very Low

    Range Up to 3-5M Up to 100M

    Multi Tag

    Reading

    Few hundred

    within 300M of

    reader

    1000s of tags

    recognized up to

    100mph

    Data Storage 128 bytes of R/W 128 bytes of R/W

    with sophisticated

    search and access

  • 8/12/2019 security access system using rfid

    12/20

    BLOCK DIAGRAM

  • 8/12/2019 security access system using rfid

    13/20

    HARDWARE REQUIREMENTS(I)

    1) AT89C51 Microcontroller

    2) RFID Reader and RFID card/tags

    3) MAX2324) Keypad Interface

    5) PCB Board

    6) Resistor

  • 8/12/2019 security access system using rfid

    14/20

    HARDWARE REQUIREMENTS(II)

    7) Capacitor

    8) Motor and Motor Driver

    9) Light emitting diodes (LEDs)10) 16X2 Alphanumeric LCD Display

    11) Buzzer

    12) Transistor BC548

  • 8/12/2019 security access system using rfid

    15/20

    SOFTWARE REQUIREMENTS

    1) Keil uvision

    2) ProgISP

  • 8/12/2019 security access system using rfid

    16/20

    APPLICATIONS(I)

    The RFID tag can be affixed to an object and used to track andmanage inventory, assets, people, etc. For example, it can beaffixed to cars, computer equipment, books, mobile phones, etc.

    RFID is being adopted for item-level retail uses. Aside fromefficiency and product availability gains, the system offers a

    superior form of electronic article surveillance (EAS), and asuperior self checkout process for consumers.

    An advanced automatic identification technology based on RFIDtechnology has significant value for inventory systems. The systemcan provide accurate knowledge of the current inventory. In anacademic study performed at Wal-Mart, RFID reduced Out-of-

    Stocks by 30 percent for products selling between 0.1 and 15 unitsa day. The RFID can also help the company to ensure the securityof the inventory.

  • 8/12/2019 security access system using rfid

    17/20

    APPLICATIONS(II)

    RFID tags are widely used in identification badges, replacing earlier magneticstripe cards. These badges need only be held within a certain distance of thereader to authenticate the holder. Tags can also be placed on vehicles, which canbe read at a distance, to allow entrance to controlled areas without having to stopthe vehicle and present a card or enter an access code.

    To prevent retailers diverting products, manufacturers are exploring the use ofRFID tags on promoted merchandise so that they can track exactly which producthas sold through the supply chain at fully discounted prices.

    Logistics and transportation are major areas of implementation for RFIDtechnology. Yard management, shipping and freight and distribution centers useRFID tracking technology. In the railroad industry, RFID tags mounted onlocomotives and rolling stock identify the owner, identification number and type ofequipment and its characteristics.

    The first RFID passports ("E-passport") were issued by Malaysia in 1998. In additionto information also contained on the visual data page of the passport, Malaysian e-passports record the travel history (time, date, and place) of entries and exits fromthe country.

  • 8/12/2019 security access system using rfid

    18/20

    FUTURE SCOPE

    The value of the RFID market in 2012 will be $7.46 (USD) billion versus$6.37 (USD) billion in 2011. The RFID world market is estimated to surpass$20 billion (USD) by 2014.

    Developments in RFID technology continue to yield larger memorycapacities, wider reading ranges, and faster processing. It is highly unlikelythat the technology will ultimately replace barcode even with the

    inevitable reduction in raw materials coupled with economies of scale, theintegrated circuit in an RF tag will never be as cost-effective as a barcodelabel. However, RFID will continue to grow in its established niches wherebarcode or other optical technologies are not effective, such as in thechemical container industry and live stock industry.

    If some standards commonality is achieved allowing RFID equipment from

    different manufacturers to be used interchangeably, the market will likelyto grow exponentially. Until then, the full scope and potential of RFIDtechnology has yet to emerge.

  • 8/12/2019 security access system using rfid

    19/20

    REFERENCES

    http://www.engineersgarage.com/microcontroller/8051projects/rfid-secured-access-system-at89c51-circuit

    http://www.projectsof8051.com/rfid-based-security-system/

    [IEEE] WEBSITE :-https://www.ieee.org/about/technologies/emerging/rfid.pdf

    http://en.wikipedia.org/wiki/Radio-frequency_identification

    www.emory.edu/BUSINESS/et/rfid/future.html

  • 8/12/2019 security access system using rfid

    20/20

    MILESTONE

    S.NO MONTH/DATE/WEEK WORK DONE TILL DATE

    1. 17/3/2014-24/3/2014 FORMATION OF GROUP

    2. 26/3/2014-31/3/2014 PROJECT WAS DECIDED

    3. 1/4/2014-16/4/2014 WORKED ON THE SYNOPSIS

    4. 2/4/2014-16/4/2014 COLLECTED INFORMATION

    REGARDING SYNOPSIS

    5. 16/4/2014-18/4/2014 COLLECTED INFORMATION

    FOR PRESENTATION

    6. 19/4/2014-24/4/2014 STARTED MAKING

    PRESENTAION


Recommended