This document describes an RFID-based access control and proximity security system. The system was designed to enhance security for educational institutes and organizations in Pakistan threatened by criminal organizations. It uses RFID technology to track people and vehicles entering and leaving an area, ensuring maximum monitoring of suspicious activity. Each person or vehicle would be given an RFID tag containing identification information. The system, including an RFID reader, tags, and computer, would maintain all data and detect unauthorized entries.
RFID-Based Access Control and Proximity Security System
1.
2. RFID BASED
ACCESS CONTROL
AND PROXIMITY
SECURITY SYSTEM
Group Members:
Hafiz Abdul Hannan
(BEE-FA11-058)
Muhammad Hammad Malik
(BEE-FA11-055)
Faiz Ur Rehman Toor
(BEE-FA11-099)
Supervisor:
Engr M Ishfaq Ahmad
3. ABSTRACT
The present system is designed for the growing needs of
security in the educational institutes and other
organizations threatened off and on by the criminal
organization.
In the background of terrorist attack on educational and
other governments or non government organizations,
we sought to evolve such a security system as could
ensure not only fool proof security at educational
institutes and many other organizations of Pakistan but
also easier to apply.
4. INTRODUCTION
Our system uses the radio frequency as a procedure
to track the activity of the people entering or
leaving the institutions. It ensures maximal check
on the movement of the suspected. It is a relatively
a new technology which is flawless as it is not
replicable.
Each vehicle or person, in entry, would be given a
RF tag to record information during the time the
vehicle remains in the territory of the institution.
The system comprising a computer and RFID
reader-writer and tags, would maintain all data and
detect all unauthorized entries by giving signal
through buzzer.
5. OBJECTIVES
The objective of this project is to develop a RFID base
access control and proximity security system that is able
to:
1. Enhance security to limited access to restricted areas
in the university/organization.
2. Allow access only to authorized people, employees to
enter the premises of the department.
3. Uniquely identify the authorized student/employee
data and store students/employee ID and name.
6. APPLICATION
1. The same system could also be used for student
and employee attendance on the campus.
Instead of the student/employee identity card,
each student/employee would be issued a
similar RFID tag which would be automatically
detected by the RFID reader and it would
subsequently save the administration as well
as faculty of maintaining and keeping the
record.
2. Vehicle identification when ever passing from
any toll plaza.
10. EQUIPMENT
Reader
1. Transmitter.
2. Receiver.
3. Microprocessor.
4. Memory.
5. Controller.
6. Communication
Interface.
7. Power.
Passive RFID Tag
1. Microchip.
2. Antenna.
Host Computer
1. Software.
11. WORKING(TAG)
Gen 2 RFID tags are comprised of an antenna and a chip (more
accurately called an integrated circuit, or IC). The ICs for Gen 2
tags contain four types of memory:
Reserved memory(32bit).
EPC memory(96bit).
TID memory(unique ID).
User memory(4K or 8K bytes).