SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 656
Smart Security System Using R.F.I.D.
Ishan Rakte1, Abhishek Jagtap2, Jayaprakash Dharmavaram3, Ashutosh Kabra4, Prof. Kishori
Degaonkar5
1-4Student, Department of Electronics and Telecommunication Engineering, Vishwakarma Institute of Technology,
Pune, Maharashtra, India
5Professor, Department of Electronics and Telecommunication Engineering, Vishwakarma Institute of Technology,
Pune, Maharashtra, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Radio Frequency Identification (RFID) is a
renowned technology which came into existence in 1970's, it
was used initially to monitor railway carriages. Today, it is
used for various purposes all over the world. RFID for
security purposes solves many problems in today's world as
hacking is getting more and more popular. RFID cannot be
hacked as the RFID tag stores the particular information
and if a new tag has the same information, it will not be
scanned as it won't match the radio frequency of the
original tag. Thus, RFID is a very safe and secure mode of
locking system. But that does not mean that it does not have
any disadvantages.
Key Words: RFID, Security, Locking System, Arduino,
Communication.
1.INTRODUCTION
Crime rates in India are going up gradually with time, and
crime rates were especially high after the COVID-19
situation. It was because many people lost their jobs and
chose the criminal path. An extra measure of security is
needed for precautions. RFID is the perfect technology for
this, since it is been in use for more than 50 years and
shows that it is reliable and trusted technology.
In real life applications RFID can be used in various areas
for extra security measures like in main doors of
residential buildings, offices, hotels etc. It can also be used
for doors and entries reserved for special access to
selected individuals. It can further be used as an extra
measure for lockers as well.
RFID chip can be in various forms according to the user's
convenience like cards, tags, key chains. Furthermore, the
RFID chip can also be implanted
in our body, but the implantation method is very
controversial as of now. Thus, it provides ease of use as the
card can be kept in the wallets and the key chains can be
attached to the keys, so people will not forget or misplace
the RFID tag
But since we also forget or misplace our wallets and keys,
the RFID tag can also be misplaced in a similar way and
that is its biggest disadvantage. If a door is locked and the
only way to get in is through RFID and the tag is lost, in
this case there is no alternative and the door lock may
need to get the door opened through external measures.
So, as an alternative the RFID reader can also have
password with a keypad, so the if someone loses the RFID
tag, the person can also enter the password to access the
door/locker.
2. LITERATURE REVIEW
The door lock system traditionally uses of the conventional
key which is operating mechanically by inserting the
correct key and rotating it thus the door open.
Unfortunately, it's not ok to spot the unauthorized access.
It is less reliable and vulnerable the theft attacks [2].
Safeguarding homes has turn into one of the concerning
topics. Today homes are being farther hospitable
numerous threats mainly being burglarised. Hence home
security is required [3]. So, RFID can be used as an extra
measure to protect our homes from burglars and other
threats.
Fig.1- RFID Reader/Writer, RFID Card, RFID Keychain
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 657
Fig.2 - RFID Cards
K.Srinivasa Ravi et.al[5] abstracted Primarily, the 2 main
components involved during a frequency Identification
system are the Transponder (tags that are attached to the
object) and therefore the Interrogator (RFID reader).
When the RFID card or keychain is brought near to the
RFID module it reads the data in the card and displays on
the LCD. The data within the card is compared with the
info within the program memory and displays authorized
or unauthorized message. The door opens for a licensed
person, closes for an unauthorized person; it alerts the
persons through a buzzer. The RFID module indicates a
buzzer alongside a LED whenever it reads the info from
the RFID card.
RFID, frequency Identification is a cheap technology, are
often implemented for several applications like security,
asset tracking, people tracking, inventory detection, access
control applications [1].
RFID technologies are more proficient and more secure as
compare to other networks [4].
3. METHODOLOGY
Components-
1. Arduino R3 Uno
2. RC522 - RFID Reader/Writer 13.56MHz
3. RFID Tags
4. Servo Motor
5. 16*2 LCD Display
6. LED
7. Breadboard
8. Buzzer
Fig.3 - Flowchart
Fig.4 - Arduino connected to RFID Reader
In Fig (3) we can see the flowchart explaining the whole
process of the RFID authentication.
In Fig (4) we can see that the Arduino Uno is connected to
the RFID reader (RC552), and also a RFID tag is kept near
the scanner. If that tag is shown to the RFID reader, then
the scanner will read it and will allow access depending
on if it is verified or not.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 658
Fig.5 – Circuit Diagram
In Fig (5) we can see the whole circuit diagram, where all
the components are connected to each other. All the
components are connected to the Arduino Uno Board.
Then the Arduino Uno board is connected to the
PC/Laptop to push the code from the Arduino IDE to the
board.
4. RESULT
The circuit is completely ready and working. Also, the
code is working properly.
Fig.5 – Final Circuit
Whenever the correct RFID tag is shown in front of the
RFID Scanner, the Scanner reads the tag and then the LED
glows with the display indicating that the person is
authenticated and can enter the premises. And if the RFID
is wrong the LED will glow with the buzzer also buzzing
and the LED display indicating that the person is not
welcomed in the premises.
This will therefore only allow the authenticated person to
enter the premises and the person with the wrong RFID
tag cannot enter.
5. FUTURE SCOPE
An extra layer on top of the existing RFID Scanner would
be better. If the circuit would be connected to cloud for
data analysis or data visualization then the project could
have more advantages and applications. It could be
connected to Blynk for controlling the circuit remotely.
And for data analysis and data visualization, Thingspeak
could be used. Also, instead of a servo motor for
unlocking of the door, a solenoid electromagnetic door
lock could have been used.
6. CONCLUSIONS
We all know how much the need of security is in today's
generation. RFID is a technology which is proven and
reliable. It is also convenient and more secured compared
to the traditional lock and key method. It is convenient as
RFID tags are can be made many forms like keychains,
cards and much more.
But this is not completely perfect as it does have some
limitations like the tags can be damaged more easily as
compared to metal keys. Also, the reliability can be
affected by liquid or moisture. The results vary on various
conditions.
There is nothing wrong with RFID tags and reader in its
own but methods like data analytics and data
visualization according to the RFID reads will have added
advantages and applications.
Also, if a record can be kept of the reads of the RFID tags
with unique identifications for various people, so the we
can have a record of the people who entered the
premises.
7. ACKNOWLEDGEMENT
We would like to give our gratitude towards our
Honourable Director Prof. (Dr.) R.M. Jalnekar for giving us
the opportunity to do this project under the Engineering
Design & Innovation – III (EDI) curriculum. We would like
to thank Prof (Dr) Shripad Bhatlavande [HOD, ENTC Dept.]
for providing us with the with the necessary resources and
support. We hereby express our gratitude and thanks to
our project Co-ordinator Prof (Dr.) S.V. Kurundkar and our
project guide Prof. Kishori Degaonkar for providing his
erudite guidance, vision support and constant
encouragement in order to complete our EDI - III
successfully. Kishori ma’am’s disciplined supervision from
the first day was the main reason because of which we
never got off track while working on this. Her constant
support proved really helpful for us. She taught us and
educated us about the format of the research paper and
the way we should work in the direction of doing the
research. We are very grateful to her for providing us
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 659
knowledge about some popular research journals and
conferences. Finally, we thank Vishwakarma Institute of
Technology who gave us this opportunity of working on a
project and doing the research. This institute already had
all the information regarding the projects which helped us
a lot. This institute has provided us the perfect education
using which we could overcome a lot of problems we faced
while working on our project.
8.REFERENCES
[1] Gyanendra K Verma (Indian Institute of
Information Technology, Allahabad-India), Pawan Tripathi
(Indian Institute of Information Technology, Allahabad-
India). "A Digital Security System with Door Lock System
Using RFID Technology". Research Gate, International
Journal of Computer Applications, August 2010.
[2] Electrical Engineering Department, Politeknik
Negeri Sriwijaya, Palembang 30139, Indonesia, Yordan
Hasan, Abdurrahman, Yudi Wijanarko, Selamat Muslimin,
Renny Maulidda. "The Automatic Door Lock to Enhance
Security in RFID System". Journal of Physics: Conference
Series, May 2020.
[3] Department of Information Technology, M. H.
Saboo Siddik College of Engineering, Mumbai, Shrinidhi
Gindi, Naiyer Shaikh, Kashif Beig, Abdeali Sabuwala.
"Smart Lock System Using RFID". International Research
Journal of Engineering and Technology (IRJET), July 2020.
[4] Shubham Soni, Rajni Soni, Akhilesh A.
Waoo."RFID-Based Digital Door Locking System". Indian
Journal of Microprocessors and Microcontroller (IJMM),
September 2021.
[5] K.Srinivasa Ravi, G.H.Varun, T.Vamsi, P.Pratyusha.
"RFID Based Security System". International Journal of
Innovative Technology and Exploring Engineering
(IJITEE), April 2013.

More Related Content

Similar to Smart Security System Using R.F.I.D.

IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital India
IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital IndiaIRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital India
IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital IndiaIRJET Journal
 
Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS ) Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS ) GICTTraining
 
Gvm project report g95
Gvm project report g95Gvm project report g95
Gvm project report g95G0VIND G0URAV
 
RFID Based Security and Access Control System using ARDUINO
RFID Based Security and Access Control System using ARDUINORFID Based Security and Access Control System using ARDUINO
RFID Based Security and Access Control System using ARDUINOIJMTST Journal
 
AUTOMATIC SMART SHOPPING TROLLY WITH BILLING
AUTOMATIC SMART SHOPPING TROLLY WITH BILLINGAUTOMATIC SMART SHOPPING TROLLY WITH BILLING
AUTOMATIC SMART SHOPPING TROLLY WITH BILLINGIRJET Journal
 
IRJET- Smart Cart Using Arduino and RFID
IRJET- Smart Cart Using Arduino and RFIDIRJET- Smart Cart Using Arduino and RFID
IRJET- Smart Cart Using Arduino and RFIDIRJET Journal
 
Survey on Security Issues of Internet of Things (IoT) Devices
Survey on Security Issues of Internet of Things (IoT) DevicesSurvey on Security Issues of Internet of Things (IoT) Devices
Survey on Security Issues of Internet of Things (IoT) DevicesIRJET Journal
 
IRJET - Home Security System using Arduino
IRJET -  	  Home Security System using ArduinoIRJET -  	  Home Security System using Arduino
IRJET - Home Security System using ArduinoIRJET Journal
 
IRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFIDIRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFIDIRJET Journal
 
IRJET- Students Smart Card using RFID
IRJET-  	  Students Smart Card using RFIDIRJET-  	  Students Smart Card using RFID
IRJET- Students Smart Card using RFIDIRJET Journal
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET Journal
 
RFID Based Smart Trolley for Supermarket Automation
RFID Based Smart Trolley for Supermarket AutomationRFID Based Smart Trolley for Supermarket Automation
RFID Based Smart Trolley for Supermarket AutomationIRJET Journal
 
IRJET- Tag's Reader Design
IRJET-  	  Tag's Reader DesignIRJET-  	  Tag's Reader Design
IRJET- Tag's Reader DesignIRJET Journal
 
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET Journal
 
MOBILE CHARGING SYSTEM USING COIN AND RFID
MOBILE CHARGING SYSTEM USING COIN AND RFIDMOBILE CHARGING SYSTEM USING COIN AND RFID
MOBILE CHARGING SYSTEM USING COIN AND RFIDIRJET Journal
 
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...IRJET Journal
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoTIRJET Journal
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoTIRJET Journal
 
IRJET- IOT and RFID based shopping mall
IRJET- IOT and RFID based shopping mallIRJET- IOT and RFID based shopping mall
IRJET- IOT and RFID based shopping mallIRJET Journal
 

Similar to Smart Security System Using R.F.I.D. (20)

IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital India
IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital IndiaIRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital India
IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital India
 
Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS ) Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS )
 
Gvm project report g95
Gvm project report g95Gvm project report g95
Gvm project report g95
 
RFID Based Security and Access Control System using ARDUINO
RFID Based Security and Access Control System using ARDUINORFID Based Security and Access Control System using ARDUINO
RFID Based Security and Access Control System using ARDUINO
 
AUTOMATIC SMART SHOPPING TROLLY WITH BILLING
AUTOMATIC SMART SHOPPING TROLLY WITH BILLINGAUTOMATIC SMART SHOPPING TROLLY WITH BILLING
AUTOMATIC SMART SHOPPING TROLLY WITH BILLING
 
IRJET- Smart Cart Using Arduino and RFID
IRJET- Smart Cart Using Arduino and RFIDIRJET- Smart Cart Using Arduino and RFID
IRJET- Smart Cart Using Arduino and RFID
 
Survey on Security Issues of Internet of Things (IoT) Devices
Survey on Security Issues of Internet of Things (IoT) DevicesSurvey on Security Issues of Internet of Things (IoT) Devices
Survey on Security Issues of Internet of Things (IoT) Devices
 
IRJET - Home Security System using Arduino
IRJET -  	  Home Security System using ArduinoIRJET -  	  Home Security System using Arduino
IRJET - Home Security System using Arduino
 
IRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFIDIRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFID
 
IRJET- Students Smart Card using RFID
IRJET-  	  Students Smart Card using RFIDIRJET-  	  Students Smart Card using RFID
IRJET- Students Smart Card using RFID
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
 
RFID Based Smart Trolley for Supermarket Automation
RFID Based Smart Trolley for Supermarket AutomationRFID Based Smart Trolley for Supermarket Automation
RFID Based Smart Trolley for Supermarket Automation
 
IRJET- Tag's Reader Design
IRJET-  	  Tag's Reader DesignIRJET-  	  Tag's Reader Design
IRJET- Tag's Reader Design
 
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
 
MOBILE CHARGING SYSTEM USING COIN AND RFID
MOBILE CHARGING SYSTEM USING COIN AND RFIDMOBILE CHARGING SYSTEM USING COIN AND RFID
MOBILE CHARGING SYSTEM USING COIN AND RFID
 
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
Frid smart lms
Frid smart lmsFrid smart lms
Frid smart lms
 
IRJET- IOT and RFID based shopping mall
IRJET- IOT and RFID based shopping mallIRJET- IOT and RFID based shopping mall
IRJET- IOT and RFID based shopping mall
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spaintimesproduction05
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLManishPatel169454
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 

Recently uploaded (20)

Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 

Smart Security System Using R.F.I.D.

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 656 Smart Security System Using R.F.I.D. Ishan Rakte1, Abhishek Jagtap2, Jayaprakash Dharmavaram3, Ashutosh Kabra4, Prof. Kishori Degaonkar5 1-4Student, Department of Electronics and Telecommunication Engineering, Vishwakarma Institute of Technology, Pune, Maharashtra, India 5Professor, Department of Electronics and Telecommunication Engineering, Vishwakarma Institute of Technology, Pune, Maharashtra, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Radio Frequency Identification (RFID) is a renowned technology which came into existence in 1970's, it was used initially to monitor railway carriages. Today, it is used for various purposes all over the world. RFID for security purposes solves many problems in today's world as hacking is getting more and more popular. RFID cannot be hacked as the RFID tag stores the particular information and if a new tag has the same information, it will not be scanned as it won't match the radio frequency of the original tag. Thus, RFID is a very safe and secure mode of locking system. But that does not mean that it does not have any disadvantages. Key Words: RFID, Security, Locking System, Arduino, Communication. 1.INTRODUCTION Crime rates in India are going up gradually with time, and crime rates were especially high after the COVID-19 situation. It was because many people lost their jobs and chose the criminal path. An extra measure of security is needed for precautions. RFID is the perfect technology for this, since it is been in use for more than 50 years and shows that it is reliable and trusted technology. In real life applications RFID can be used in various areas for extra security measures like in main doors of residential buildings, offices, hotels etc. It can also be used for doors and entries reserved for special access to selected individuals. It can further be used as an extra measure for lockers as well. RFID chip can be in various forms according to the user's convenience like cards, tags, key chains. Furthermore, the RFID chip can also be implanted in our body, but the implantation method is very controversial as of now. Thus, it provides ease of use as the card can be kept in the wallets and the key chains can be attached to the keys, so people will not forget or misplace the RFID tag But since we also forget or misplace our wallets and keys, the RFID tag can also be misplaced in a similar way and that is its biggest disadvantage. If a door is locked and the only way to get in is through RFID and the tag is lost, in this case there is no alternative and the door lock may need to get the door opened through external measures. So, as an alternative the RFID reader can also have password with a keypad, so the if someone loses the RFID tag, the person can also enter the password to access the door/locker. 2. LITERATURE REVIEW The door lock system traditionally uses of the conventional key which is operating mechanically by inserting the correct key and rotating it thus the door open. Unfortunately, it's not ok to spot the unauthorized access. It is less reliable and vulnerable the theft attacks [2]. Safeguarding homes has turn into one of the concerning topics. Today homes are being farther hospitable numerous threats mainly being burglarised. Hence home security is required [3]. So, RFID can be used as an extra measure to protect our homes from burglars and other threats. Fig.1- RFID Reader/Writer, RFID Card, RFID Keychain
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 657 Fig.2 - RFID Cards K.Srinivasa Ravi et.al[5] abstracted Primarily, the 2 main components involved during a frequency Identification system are the Transponder (tags that are attached to the object) and therefore the Interrogator (RFID reader). When the RFID card or keychain is brought near to the RFID module it reads the data in the card and displays on the LCD. The data within the card is compared with the info within the program memory and displays authorized or unauthorized message. The door opens for a licensed person, closes for an unauthorized person; it alerts the persons through a buzzer. The RFID module indicates a buzzer alongside a LED whenever it reads the info from the RFID card. RFID, frequency Identification is a cheap technology, are often implemented for several applications like security, asset tracking, people tracking, inventory detection, access control applications [1]. RFID technologies are more proficient and more secure as compare to other networks [4]. 3. METHODOLOGY Components- 1. Arduino R3 Uno 2. RC522 - RFID Reader/Writer 13.56MHz 3. RFID Tags 4. Servo Motor 5. 16*2 LCD Display 6. LED 7. Breadboard 8. Buzzer Fig.3 - Flowchart Fig.4 - Arduino connected to RFID Reader In Fig (3) we can see the flowchart explaining the whole process of the RFID authentication. In Fig (4) we can see that the Arduino Uno is connected to the RFID reader (RC552), and also a RFID tag is kept near the scanner. If that tag is shown to the RFID reader, then the scanner will read it and will allow access depending on if it is verified or not.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 658 Fig.5 – Circuit Diagram In Fig (5) we can see the whole circuit diagram, where all the components are connected to each other. All the components are connected to the Arduino Uno Board. Then the Arduino Uno board is connected to the PC/Laptop to push the code from the Arduino IDE to the board. 4. RESULT The circuit is completely ready and working. Also, the code is working properly. Fig.5 – Final Circuit Whenever the correct RFID tag is shown in front of the RFID Scanner, the Scanner reads the tag and then the LED glows with the display indicating that the person is authenticated and can enter the premises. And if the RFID is wrong the LED will glow with the buzzer also buzzing and the LED display indicating that the person is not welcomed in the premises. This will therefore only allow the authenticated person to enter the premises and the person with the wrong RFID tag cannot enter. 5. FUTURE SCOPE An extra layer on top of the existing RFID Scanner would be better. If the circuit would be connected to cloud for data analysis or data visualization then the project could have more advantages and applications. It could be connected to Blynk for controlling the circuit remotely. And for data analysis and data visualization, Thingspeak could be used. Also, instead of a servo motor for unlocking of the door, a solenoid electromagnetic door lock could have been used. 6. CONCLUSIONS We all know how much the need of security is in today's generation. RFID is a technology which is proven and reliable. It is also convenient and more secured compared to the traditional lock and key method. It is convenient as RFID tags are can be made many forms like keychains, cards and much more. But this is not completely perfect as it does have some limitations like the tags can be damaged more easily as compared to metal keys. Also, the reliability can be affected by liquid or moisture. The results vary on various conditions. There is nothing wrong with RFID tags and reader in its own but methods like data analytics and data visualization according to the RFID reads will have added advantages and applications. Also, if a record can be kept of the reads of the RFID tags with unique identifications for various people, so the we can have a record of the people who entered the premises. 7. ACKNOWLEDGEMENT We would like to give our gratitude towards our Honourable Director Prof. (Dr.) R.M. Jalnekar for giving us the opportunity to do this project under the Engineering Design & Innovation – III (EDI) curriculum. We would like to thank Prof (Dr) Shripad Bhatlavande [HOD, ENTC Dept.] for providing us with the with the necessary resources and support. We hereby express our gratitude and thanks to our project Co-ordinator Prof (Dr.) S.V. Kurundkar and our project guide Prof. Kishori Degaonkar for providing his erudite guidance, vision support and constant encouragement in order to complete our EDI - III successfully. Kishori ma’am’s disciplined supervision from the first day was the main reason because of which we never got off track while working on this. Her constant support proved really helpful for us. She taught us and educated us about the format of the research paper and the way we should work in the direction of doing the research. We are very grateful to her for providing us
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 659 knowledge about some popular research journals and conferences. Finally, we thank Vishwakarma Institute of Technology who gave us this opportunity of working on a project and doing the research. This institute already had all the information regarding the projects which helped us a lot. This institute has provided us the perfect education using which we could overcome a lot of problems we faced while working on our project. 8.REFERENCES [1] Gyanendra K Verma (Indian Institute of Information Technology, Allahabad-India), Pawan Tripathi (Indian Institute of Information Technology, Allahabad- India). "A Digital Security System with Door Lock System Using RFID Technology". Research Gate, International Journal of Computer Applications, August 2010. [2] Electrical Engineering Department, Politeknik Negeri Sriwijaya, Palembang 30139, Indonesia, Yordan Hasan, Abdurrahman, Yudi Wijanarko, Selamat Muslimin, Renny Maulidda. "The Automatic Door Lock to Enhance Security in RFID System". Journal of Physics: Conference Series, May 2020. [3] Department of Information Technology, M. H. Saboo Siddik College of Engineering, Mumbai, Shrinidhi Gindi, Naiyer Shaikh, Kashif Beig, Abdeali Sabuwala. "Smart Lock System Using RFID". International Research Journal of Engineering and Technology (IRJET), July 2020. [4] Shubham Soni, Rajni Soni, Akhilesh A. Waoo."RFID-Based Digital Door Locking System". Indian Journal of Microprocessors and Microcontroller (IJMM), September 2021. [5] K.Srinivasa Ravi, G.H.Varun, T.Vamsi, P.Pratyusha. "RFID Based Security System". International Journal of Innovative Technology and Exploring Engineering (IJITEE), April 2013.