RFID Human Motion Alarm System


Published on

Published in: Business, News & Politics
1 Like
  • Be the first to comment

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

RFID Human Motion Alarm System

  1. 1. RFID Human Motion Alarm System Chris Hirsch & David Huskey
  2. 2. Introduction to RFID <ul><li>Automated identification method </li></ul><ul><li>Lightweight, portable </li></ul><ul><li>Tags can be read from several meters away, (sometimes) beyond line of site of reader </li></ul><ul><li>Passive RFID tags have no internal power supply </li></ul><ul><ul><li>Small electrical current induced in the antenna by the incoming RF signal provides just enough power for the tag to power up and transmit a response back. </li></ul></ul>
  3. 3. Objectives <ul><li>Incorporate RFID into room alarm systems </li></ul><ul><li>Sound an alarm when an unaccompanied unauthorized intruder is in the protected room </li></ul><ul><li>Transmit data via serial to a computer where it can be monitored by security </li></ul><ul><li>Design an alarm system that is user friendly </li></ul><ul><li>Design an alarm system that is robust enough to detect any intruder using any method of entry </li></ul>
  4. 4. Basic Abstract Design <ul><li>Inputs: </li></ul><ul><ul><li>RFID Reader </li></ul></ul><ul><ul><li>IR Motion Sensor </li></ul></ul><ul><ul><li>16 Button Keypad </li></ul></ul><ul><li>Outputs: </li></ul><ul><ul><li>Siren </li></ul></ul><ul><ul><li>LEDs </li></ul></ul><ul><ul><li>RS-232 Port </li></ul></ul>RFID Transponde r Controller Antenna RFID Reader Keypad Input Siren / LEDs PC Output IR Motion Sensor
  5. 5. PIC16F877A Microcontroller <ul><li>Runs program that monitors voltages from the inputs of the system (keypad, motion sensor, and RFID reader) in an infinite loop. </li></ul><ul><li>Controls all outputs of the system (Siren, LEDs, and PC display) by setting voltages on output pins. </li></ul>
  6. 6. Microcontroller Flow Chart Siren Deactivated Motion Detected Siren Activated 3. Siren State Keypad Deactivated Correct Keycode Keypad Activated Correct Keycode 1. Keypad State RFID Deactivated Tag Not Present Keypad Activated Tag Present 2. RFID State (when Keypad & RFID activated)
  7. 7. SkyeTek M9 RFID Reader <ul><li>Chosen over the Texas Instrument RFID Reader for its superior range </li></ul><ul><li>Receives commands from and transmits responses to the controller through an RS-232 port at 34.8 kbps </li></ul><ul><li>Operates at a frequency of 915 MHz and output power of 500 mW </li></ul>
  8. 8. Skyware Software
  9. 9. HyperTerminal Communication with RFID Reader
  10. 10. Grayhill Keypad <ul><li>16 buttons – 16 possible interconnections </li></ul><ul><li>4x4 matrix that can be probed at the 8 output pins </li></ul><ul><li>Extra buttons allow for adding additional features in the future </li></ul>
  11. 11. Microcontroller: Keypad Input <ul><li>Sets pins 1-4 to high sequentially and observes pins 5-8 for connections to determine if a key has been pressed. </li></ul><ul><li>Correct sequential Key-Code from the user activates / deactivates the alarm system </li></ul>
  12. 12. 6000 PIR Infrared Motion Detector <ul><li>Chosen for its long range and low cost </li></ul><ul><li>Requires +12 and –12 volts for power </li></ul><ul><li>Outputs a signal of 1.1 volt when motion is detected </li></ul>
  13. 13. Microcontroller: Motion Detector Input <ul><li>The controller monitors the voltage on the motion detector output. </li></ul><ul><li>Microcontroller uses the ADC function to monitor the AC voltage. </li></ul><ul><ul><li>Converts a continuous signal to a discreet digital number from 0 to 1024 (2^10) </li></ul></ul><ul><li>When voltage rises above 50mV or 10 on the ADC scale on this input (and the alarm is in active mode) the alarm is triggered. </li></ul>
  14. 14. Output Components <ul><li>Sonalert Siren </li></ul><ul><ul><li>Draws little current at 5 volts (~2 mA) </li></ul></ul><ul><ul><li>Controlled by the Microcontroller </li></ul></ul><ul><li>LEDs </li></ul><ul><ul><li>Red and green LEDs have a voltage drop of 2.1 volts and are connected to 560 ohm resistors in order to limit the current sourced by the PIC to approximately 5 mA </li></ul></ul><ul><li>RS-232 Port PC Output </li></ul><ul><ul><li>Connected to the microcontroller via the MAX-232 chip </li></ul></ul><ul><ul><li>38.4 kbps and only requires a wire for transmitting to the computer and a wire for ground </li></ul></ul>
  15. 15. Microcontroller: LED Output <ul><li>Red LED can be turned on and off by entering correct key-code. </li></ul><ul><li>Green LED is on when the controller considers no tags to be in the room. </li></ul><ul><li>When both LEDs are on, unauthorized personnel are to stay out of the room, because the alarm is in active mode. </li></ul>
  16. 16. Microcontroller: Siren Output <ul><li>Beeps (voltage high for 150 milliseconds) once when a tag is seen entering the room and twice when a tag is seen exiting. </li></ul><ul><li>Longer Beeping for a 10 second grace period when the PIC decides that there is an intruder. </li></ul><ul><li>Continuous noise from the siren if the alarm is not deactivated after the grace period. </li></ul>
  17. 17. Microcontroller: Computer Output <ul><li>Information is sent to the computer as ASCII characters through an RS-232 port connected to the PIC microcontroller through the Max-232 chip. </li></ul><ul><li>Microsoft HyperTerminal displays the text. </li></ul><ul><ul><li>Shows when the alarm is activated and deactivated. </li></ul></ul><ul><ul><li>Shows which ID tags enter and exit the protected room. </li></ul></ul>
  18. 18. Main PCB Components & Enclosure <ul><li>PIC Microcontroller </li></ul><ul><ul><li>The brain of the alarm system </li></ul></ul><ul><li>FOX 20MHz Oscillator </li></ul><ul><ul><li>Clock input for the PIC </li></ul></ul><ul><li>5V Voltage Regulator </li></ul><ul><ul><li>Steps voltage down from 12 volts to 5 volts </li></ul></ul><ul><li>Max-232 Chip & 0.1 microfarad Capacitors </li></ul><ul><ul><li>Converts TTL voltages to RS-232 voltages and vice-versa. </li></ul></ul>
  19. 19. Overall Schematic
  21. 21. Counter Code Implemented <ul><li>Each user could only exit and enter after ten iterations of the coded loop </li></ul><ul><li>User held tag parallel to reader at various distances </li></ul>
  22. 22. Null Code Implemented <ul><li>Each user could only exit and enter after the PIC had received a null response from the reader </li></ul><ul><li>User held tag parallel to reader at various distances </li></ul>
  23. 23. Both Codes Implemented <ul><li>User can only exit and enter after null code is received and after 3 iterations of the loop had passed </li></ul><ul><li>User held tag parallel to reader at various distances </li></ul>
  24. 24. Multiple User Test <ul><li>Test to make sure the system could handle multiple users at once </li></ul><ul><li>Tested in single file and side by side </li></ul><ul><li>User held tag parallel to reader at various distances </li></ul>
  25. 25. Wallet & Denim Test <ul><li>Through a wallet at under a foot </li></ul><ul><li>Through a denim pocket at under an inch </li></ul><ul><li>Due to the low power output of the reader as well as the orientation of the tag </li></ul>
  26. 26. Testing the Motion Detector
  27. 27. Testing the Motion Detector
  28. 28. Testing the Motion Detector 40˚ 50˚ 50˚ 40˚ Never Always 50% Detection Rate 50% Detection Rate Always Never
  29. 29. Successes <ul><li>Project is a success </li></ul><ul><ul><li>Alarm sounds when the system is in active mode and an unauthorized intruder is in the 40’ x 40’ room. </li></ul></ul><ul><ul><li>Information about current ID tags in the room and the state of the alarm system can be transmitted serially to a PC for observation. </li></ul></ul><ul><ul><li>The design is user friendly. Users are able to quickly identify the beeps and LEDs to know if their ID tag has been scanned. </li></ul></ul>
  30. 30. Challenges <ul><li>RFID Challenges </li></ul><ul><ul><li>Certain materials greatly reduce range of RFID tag detection rate </li></ul></ul><ul><ul><ul><li>In Wallet Range – <1ft for reliable detection rate </li></ul></ul></ul><ul><ul><ul><li>In Denim Pocket range - <1in for reliable detection rate </li></ul></ul></ul><ul><ul><li>Standing just out of range of the RFID antenna (>4ft) can sometimes cause erroneous, unwanted tag scans </li></ul></ul>
  31. 31. More Challenges <ul><li>More RFID Challenges </li></ul><ul><ul><li>The reader struggles to scan tags when there are large obstructions such as another person. </li></ul></ul><ul><ul><li>Two people walking in the room at once has a poorer success rate. </li></ul></ul><ul><li>Motion Detector Challenges </li></ul><ul><ul><li>Poor placement can result in undetected motion. </li></ul></ul>
  32. 32. Design Alternatives <ul><li>A computer program could be written to notify authorities when there is a security breach by sending an E-mail or SMS. </li></ul><ul><li>Extra buttons on keypad could be utilized to add more functionality such as the ability for the user to change the key-code. </li></ul><ul><li>More RFID tags could be added. </li></ul>
  33. 33. Thank You <ul><li>David Huskey & Chris Hirsch </li></ul>
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.