security access system using rfid
TRANSCRIPT
-
8/12/2019 security access system using rfid
1/20
RFID BASED SECURITY ACCESS SYSTEM
Prepared by:-
Arnav Banerji 11/FET/EC/1011
Vinayak Sharma 11/FET/EC/1093
Faculty of Engineering & Technology
Manav Rachna International University, Faridabad
Co-ordinated by:-
Ms. Savita
(Assistant ProfessorECE department)
-
8/12/2019 security access system using rfid
2/20
AIM
The main aim of the project is to make a
simple security access system using Radio
Frequency Identification (RFID) and its
concept is to allow the access only toauthorized persons.
-
8/12/2019 security access system using rfid
3/20
-
8/12/2019 security access system using rfid
4/20
INTRODUCTION (I)
What is RFID?
RFID is used to automatically identifypeople, objects, and animals using short range
radio technology to communicate digitalinformation between a stationary location(reader) and a movable object (tag).
RFID are just like bar codes, only difference isthat it adds to much more benefits as comparedto bar codes.
-
8/12/2019 security access system using rfid
5/20
STEPS
The RFID card is kept or swiped in front of the RFID reader Then that person is asked to type his 6 digit password
through keypad interface
If the password is typed correctly, the access is allowed to the
respective person and the door latch opens. If that person swiped the wrong card or didnt type the
password correctly, the buzzer will turn on signifying that the
access is denied and that particular person wontget access to
the door and the door latch will remain closed.
-
8/12/2019 security access system using rfid
6/20
WHY RFID ARE BETTER THAN USING
BAR CODES?
Bar codes are line-of-sight technology, whichmeans people usually have to orient the barcode towards a scanner for it to be read.Radio frequency identification, by contrast,doesntrequire line of sight.
RFID tags can be read as long as they arewithin range of a reader.
Bar codes have other shortcomings as well. Ifa label is ripped, soiled or falls off, there is noway to scan the item.
-
8/12/2019 security access system using rfid
7/20
RFID READER
An RFID reader is a devicethat is used to interrogatean RFID tag. The reader hasan antenna that emits radiowaves; the tag responds by
sending back its data.
The reader has two basiccomponents
A scanning antenna
A transceiver with adecoder to interpret thedata
-
8/12/2019 security access system using rfid
8/20
RFID TAG
A Tag is a transponder whichreceives a radio signal and inresponse to it sends out aradio signal.
Tag contains an antenna, anda small chip that stores a smallamount of data
Tag can be programmed atmanufacture or on installation
Tag is powered by the highpower electromagnetic fieldgenerated by the antennas.
The field allows thechip/antenna to reflect back anextremely weak signal
containing the data.
-
8/12/2019 security access system using rfid
9/20
HOW IT IS USED?
In the beginning, the user isprompted to scan his tagor ID. It can be doneeither by holding it near
the reader for a while oreven swiped in front ofthe reader. Then afterrecognizing, the readerdetects the card byflashing an LED light for asecond with a beepsound.
-
8/12/2019 security access system using rfid
10/20
FREQUENCY BAND OF RFID
LF band: 125 and 135 kHz HF band 13.56 MHz
These frequency bands can be used freelyworldwide. The low frequencies here optimizetransmission distance by minimizing free-spacelosses.
UHF band: 915 MHz MW band: 2.4 GHz
These frequency specifications are for the USonly, Europe and Japan have different frequencyspecifications for UHF/MW.
-
8/12/2019 security access system using rfid
11/20
PASSIVE TAGS AND ACTIVE TAGS
Tag Attributes Passive tags Active tags
Tag Power Energy transferred
from RF to reader
Internal to tag.
Tag Battery Yes No
Availability of
Power
Only in the field of
Radar
Continuous
Required signal
strength to tag
Very High Very Low
Range Up to 3-5M Up to 100M
Multi Tag
Reading
Few hundred
within 300M of
reader
1000s of tags
recognized up to
100mph
Data Storage 128 bytes of R/W 128 bytes of R/W
with sophisticated
search and access
-
8/12/2019 security access system using rfid
12/20
BLOCK DIAGRAM
-
8/12/2019 security access system using rfid
13/20
HARDWARE REQUIREMENTS(I)
1) AT89C51 Microcontroller
2) RFID Reader and RFID card/tags
3) MAX2324) Keypad Interface
5) PCB Board
6) Resistor
-
8/12/2019 security access system using rfid
14/20
HARDWARE REQUIREMENTS(II)
7) Capacitor
8) Motor and Motor Driver
9) Light emitting diodes (LEDs)10) 16X2 Alphanumeric LCD Display
11) Buzzer
12) Transistor BC548
-
8/12/2019 security access system using rfid
15/20
SOFTWARE REQUIREMENTS
1) Keil uvision
2) ProgISP
-
8/12/2019 security access system using rfid
16/20
APPLICATIONS(I)
The RFID tag can be affixed to an object and used to track andmanage inventory, assets, people, etc. For example, it can beaffixed to cars, computer equipment, books, mobile phones, etc.
RFID is being adopted for item-level retail uses. Aside fromefficiency and product availability gains, the system offers a
superior form of electronic article surveillance (EAS), and asuperior self checkout process for consumers.
An advanced automatic identification technology based on RFIDtechnology has significant value for inventory systems. The systemcan provide accurate knowledge of the current inventory. In anacademic study performed at Wal-Mart, RFID reduced Out-of-
Stocks by 30 percent for products selling between 0.1 and 15 unitsa day. The RFID can also help the company to ensure the securityof the inventory.
-
8/12/2019 security access system using rfid
17/20
APPLICATIONS(II)
RFID tags are widely used in identification badges, replacing earlier magneticstripe cards. These badges need only be held within a certain distance of thereader to authenticate the holder. Tags can also be placed on vehicles, which canbe read at a distance, to allow entrance to controlled areas without having to stopthe vehicle and present a card or enter an access code.
To prevent retailers diverting products, manufacturers are exploring the use ofRFID tags on promoted merchandise so that they can track exactly which producthas sold through the supply chain at fully discounted prices.
Logistics and transportation are major areas of implementation for RFIDtechnology. Yard management, shipping and freight and distribution centers useRFID tracking technology. In the railroad industry, RFID tags mounted onlocomotives and rolling stock identify the owner, identification number and type ofequipment and its characteristics.
The first RFID passports ("E-passport") were issued by Malaysia in 1998. In additionto information also contained on the visual data page of the passport, Malaysian e-passports record the travel history (time, date, and place) of entries and exits fromthe country.
-
8/12/2019 security access system using rfid
18/20
FUTURE SCOPE
The value of the RFID market in 2012 will be $7.46 (USD) billion versus$6.37 (USD) billion in 2011. The RFID world market is estimated to surpass$20 billion (USD) by 2014.
Developments in RFID technology continue to yield larger memorycapacities, wider reading ranges, and faster processing. It is highly unlikelythat the technology will ultimately replace barcode even with the
inevitable reduction in raw materials coupled with economies of scale, theintegrated circuit in an RF tag will never be as cost-effective as a barcodelabel. However, RFID will continue to grow in its established niches wherebarcode or other optical technologies are not effective, such as in thechemical container industry and live stock industry.
If some standards commonality is achieved allowing RFID equipment from
different manufacturers to be used interchangeably, the market will likelyto grow exponentially. Until then, the full scope and potential of RFIDtechnology has yet to emerge.
-
8/12/2019 security access system using rfid
19/20
REFERENCES
http://www.engineersgarage.com/microcontroller/8051projects/rfid-secured-access-system-at89c51-circuit
http://www.projectsof8051.com/rfid-based-security-system/
[IEEE] WEBSITE :-https://www.ieee.org/about/technologies/emerging/rfid.pdf
http://en.wikipedia.org/wiki/Radio-frequency_identification
www.emory.edu/BUSINESS/et/rfid/future.html
-
8/12/2019 security access system using rfid
20/20
MILESTONE
S.NO MONTH/DATE/WEEK WORK DONE TILL DATE
1. 17/3/2014-24/3/2014 FORMATION OF GROUP
2. 26/3/2014-31/3/2014 PROJECT WAS DECIDED
3. 1/4/2014-16/4/2014 WORKED ON THE SYNOPSIS
4. 2/4/2014-16/4/2014 COLLECTED INFORMATION
REGARDING SYNOPSIS
5. 16/4/2014-18/4/2014 COLLECTED INFORMATION
FOR PRESENTATION
6. 19/4/2014-24/4/2014 STARTED MAKING
PRESENTAION