Arduino RFID Module (RC522) & Buzzer Access SystemMahmudul Hasan
I just received my RC522 RFID reader and made this simple Arduino access control system that uses the reader, a buzzer for the alarm and a relay shield for the security system. The relay can be used to open a door lock and if you need a louder alarm then you can replace the small buzzer with a high power siren.
This is the first project i did on embedded system as part with micro controller.
This projects creates an RFID based access control system using 8052 micro controller,RFID sensor and an 24c512 memory. When a user enters the controller reads the card and stores each entry in the memory 24c512.
Arduino RFID Module (RC522) & Buzzer Access SystemMahmudul Hasan
I just received my RC522 RFID reader and made this simple Arduino access control system that uses the reader, a buzzer for the alarm and a relay shield for the security system. The relay can be used to open a door lock and if you need a louder alarm then you can replace the small buzzer with a high power siren.
This is the first project i did on embedded system as part with micro controller.
This projects creates an RFID based access control system using 8052 micro controller,RFID sensor and an 24c512 memory. When a user enters the controller reads the card and stores each entry in the memory 24c512.
The objective of this project is to design a “RFID based access control system”. The sole aim of this project is to avoid the entry of any unwanted/burglar person to some restricted area along with the study of RFID and its use in this type of application.
RFID based smart shopping cart and billing systemlaharipothula
To make the shopping easy by automated billing at the shopping mall/ super maeket. This module mainly cocnsists of Arduino, RFID tags & reader and zigbee module.
Radio frequency identication (RFID) is a rapidly growing technology that
has the potential to make great economic impacts on many industries. While
RFID is a relatively old technology, more recent advancements in chip man-
ufacturing technology are making RFID practical for new applications and
settings. These advancements have the potential to revolutionize supply-
chain management, inventory control, and logistics
This ppt explains how to record the attendance of students using RFID tags, student is provided with his/her authorized tag to swipe over the reader to record their attendance.
Edgefxkits.com has a wide range of electronic projects ideas that are primarily helpful for ECE, EEE and EIE students and the ideas can be applied for real life purposes as well.
http://www.edgefxkits.com/
Visit our page to get more ideas on popular electronic projects developed by professionals.
Edgefx provides free verified electronic projects kits around the world with abstracts, circuit diagrams, and free electronic software. We provide guidance manual for Do It Yourself Kits (DIY) with the modules at best price along with free shipping.
In this project “RFID based Car Parking System” we have shown the concept of an automatic car parking system. As in the modern world everything is going automatic we have built a system which will automatically sense the entry and exit of cars through the gate and then display the number of cars in the parking lot.
Check-ins and check-outs will be handled in a fast manner without having to stop the cars so that traffic jam problem will be avoided during these processes. Since there won't be any waiting during check-ins and check-outs the formation of emission gas as a result of such waiting will be avoided. Therefore, by this project we develop a parking system for an organization to have automated parking system for making best use of space, decreasing the man power and providing authentication for the vehicles from avoiding the theft.
Even we can set a maximum capacity of cars .We have developed a microcontroller which is used to sense the movement of cars and depending upon whether there is a capacity of cars to enter, it either opens the gate or not. It is also possible to open a gate when any car enters in the parking lot or close the door when a car exits from the parking lot with help of RFID.
There are two sets of sensors: one on the first gate (entry gate) and one on the second gate (exit gate). When a car arrives at the door the microcontroller receives the signal from the entry sensors and then checks whether there is a capacity of cars to be accommodated. Simultaneously it will also display the number of cars present in the parking lot on a LCD screen and also opens the gate. When a car moves out of the parking area the microcontroller reduces the count displayed accordingly and also closes the gate .The sensing of entry and exit of cars is done with the help of Infrared transmitters and receivers. Before the door the Infrared transmitter is mounted on one side and the receiver is placed directly in front of the transmitter across the door. When a car arrives the Infrared beam is blocked by the car and the receiver is devoid of Infrared rays and its output changes. This change in output is sensed by the microcontroller and accordingly it increments the count and opens the door if there is some capacity. The procedure for the exit of the cars is similar as the entry.
The objective of this project is to design a “RFID based access control system”. The sole aim of this project is to avoid the entry of any unwanted/burglar person to some restricted area along with the study of RFID and its use in this type of application.
RFID based smart shopping cart and billing systemlaharipothula
To make the shopping easy by automated billing at the shopping mall/ super maeket. This module mainly cocnsists of Arduino, RFID tags & reader and zigbee module.
Radio frequency identication (RFID) is a rapidly growing technology that
has the potential to make great economic impacts on many industries. While
RFID is a relatively old technology, more recent advancements in chip man-
ufacturing technology are making RFID practical for new applications and
settings. These advancements have the potential to revolutionize supply-
chain management, inventory control, and logistics
This ppt explains how to record the attendance of students using RFID tags, student is provided with his/her authorized tag to swipe over the reader to record their attendance.
Edgefxkits.com has a wide range of electronic projects ideas that are primarily helpful for ECE, EEE and EIE students and the ideas can be applied for real life purposes as well.
http://www.edgefxkits.com/
Visit our page to get more ideas on popular electronic projects developed by professionals.
Edgefx provides free verified electronic projects kits around the world with abstracts, circuit diagrams, and free electronic software. We provide guidance manual for Do It Yourself Kits (DIY) with the modules at best price along with free shipping.
In this project “RFID based Car Parking System” we have shown the concept of an automatic car parking system. As in the modern world everything is going automatic we have built a system which will automatically sense the entry and exit of cars through the gate and then display the number of cars in the parking lot.
Check-ins and check-outs will be handled in a fast manner without having to stop the cars so that traffic jam problem will be avoided during these processes. Since there won't be any waiting during check-ins and check-outs the formation of emission gas as a result of such waiting will be avoided. Therefore, by this project we develop a parking system for an organization to have automated parking system for making best use of space, decreasing the man power and providing authentication for the vehicles from avoiding the theft.
Even we can set a maximum capacity of cars .We have developed a microcontroller which is used to sense the movement of cars and depending upon whether there is a capacity of cars to enter, it either opens the gate or not. It is also possible to open a gate when any car enters in the parking lot or close the door when a car exits from the parking lot with help of RFID.
There are two sets of sensors: one on the first gate (entry gate) and one on the second gate (exit gate). When a car arrives at the door the microcontroller receives the signal from the entry sensors and then checks whether there is a capacity of cars to be accommodated. Simultaneously it will also display the number of cars present in the parking lot on a LCD screen and also opens the gate. When a car moves out of the parking area the microcontroller reduces the count displayed accordingly and also closes the gate .The sensing of entry and exit of cars is done with the help of Infrared transmitters and receivers. Before the door the Infrared transmitter is mounted on one side and the receiver is placed directly in front of the transmitter across the door. When a car arrives the Infrared beam is blocked by the car and the receiver is devoid of Infrared rays and its output changes. This change in output is sensed by the microcontroller and accordingly it increments the count and opens the door if there is some capacity. The procedure for the exit of the cars is similar as the entry.
Access Control: Principles and PracticeNabeel Yoosuf
Slides prepared based on the paper Access Control: Principles and Practice by Ravi S. Sandhu and Pierangela Samarati, IEEE Communications Magazine, 1994
I propose a smart digital door lock system for home automation. A digital door lock system is equipment that uses the digital information such as a secret code, semi-conductors, smart card, and finger prints as the method for authentication instead of the legacy key system.
Security+ Guide to Network Security Fundamentals, 3rd Edition, by Mark Ciampa
Knowledge and skills required for Network Administrators and Information Technology professionals to be aware of security vulnerabilities, to implement security measures, to analyze an existing network environment in consideration of known security threats or risks, to defend against attacks or viruses, and to ensure data privacy and integrity. Terminology and procedures for implementation and configuration of security, including access control, authorization, encryption, packet filters, firewalls, and Virtual Private Networks (VPNs).
CNIT 120: Network Security
http://samsclass.info/120/120_S09.shtml#lecture
Policy: http://samsclass.info/policy_use.htm
Many thanks to Sam Bowne for allowing to publish these presentations.
Karjan Basumatary Has Presented this PPT & has been awarded as a best award in class participation at International School of Information Management, University of Mysore,
contact-karjan05@gmail.com
Monitoring and Centering a Remote Discrete Using Rfid through Sim Moduleinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Rotork RI Wireless is a revolutionary concept for wireless valve monitoring and diagnostics in the process industry. The field proven solution transmits real-time position indication to the control room and enables predictive maintenance for actuated valves, delivering capital and operating expenditure reduction, increased safety and increased productivity.
What is RFID ?
Components of RFID
RFID Tags & Readers
How does RFID work ?
Block Diagram
Applications of RFID
Security issues
Next-Generation RFID
Advantages
This Project focuses onto implement RF TX and RF RX based Banking Security System. This system is implemented using an embedded microcontroller. The embedded microcontroller used here is PIC 16F887
In today’s connected world, cyber security is a topic that nobody can afford to ignore. In recent years the number and frequency of attacks on industrial devices and other critical infrastructure has risen dramatically. Recent news stories about hackers shutting down critical infrastructure have left many companies wondering if they are vulnerable to similar attacks. In this webinar we will discuss the most common security threats and unique challenges in securing industrial networks. We will introduce the current standards and share some useful resources and best practices for addressing industrial cyber security.
Key Takeaways:
1. Gain perspective regarding common security threats facing industrial networks.
2. Learn about the relevant standards governing industrial cyber security.
3. Increase understanding of some best practices for securing industrial networks.
Design of Banking Security System Using Mems And Rfid Technologytheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Rfid based access control system using microcontrollerrajkanakaraj007
RFID Security Access Control System using 8051 Microcontroller is an RFID Technology based security system.
Using this system, authorization of personnel is carried out with an RFID card and only those with access can enter a secured area.
The security of any organisation is a priority for the authorities. The security concern is for the physical property and also for the intellectual property.
For this reason automatic identification and access control system has become necessary to overcome the security threats faced by many organisations.
This project deals with an interesting manner of security access control with the help of RFID Technology, where only people with valid cards are allowed to access the door or any secure area.
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleIJERA Editor
This is a very useful application of RFID (Radio-frequency identification) and is very commonly used in institutes, offices, homes and so on. An RFID system consists of a reader device and a transponder. A transponder or tag has a unique serial number which is identified by the reader. Here RFID has been interfaced with ARM Processor to provide secured access. The relevant messages are also displayed on a 16x2 LCD.RFID automated access for door controls to buildings, departments, rooms, secured closets (wiring, PBX, etc.) and cabinets is very cost effective and secure to use. Many people do not realize how easy it is to implement card access systems such as card access door or doors using RFID readers and RFID Cards or Key fobs for Secured Access Control Management. You can even use smart readers for computer rooms and securing individual computers. RFID tags are categorized as either active or passive. Active tags are powered by an internal battery and are typically read/write,i.e tag data can be rewritten or modified. Passive tags operate without a separate external power source and obtain operating power generated from the reader.
Radio-frequency identification (RFID) is the wireless use of electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects. The tags contain electronically stored information. Some tags are powered by electromagnetic induction from magnetic fields produced near the reader. Some types collect energy from the interrogating radio waves and act as a passive transponder. Other types have a local power source such as a battery and may operate at hundreds of meters from the reader. Unlike a barcode, the tag does not necessarily need to be within line of sight of the reader and may be embedded in the tracked object. RFID is one method for Automatic Identification and Data Capture (AIDC).[1]
RFID tags are used in many industries. For example, an RFID tag attached to an automobile during production can be used to track its progress through the assembly line; RFID-tagged pharmaceuticals can be tracked through warehouses; and implanting RFID microchips in livestock and pets allows positive identification of animals.
Since RFID tags can be attached to cash, clothing, and possessions, or implanted in animals and people, the possibility of reading personally-linked information without consent has raised serious privacy concerns.[2]
In 2014, the world RFID market is worth $8.89 billion, up from $7.77 billion in 2013 and $6.96 billion in 2012. This includes tags, readers, and software/services for RFID cards, labels, fobs, and all other form factors. The market value is expected to rise to $27.31 billion by 2024.[3]
Similar to Rfid security access control system (20)
SCADA for remote industrial plant project is used to process the real time data acquisition under supervisory control for large scale remote industries.
TV Remote Jammer | 555 Timer Projects | Final Year Engineering ProjectsEdgefxkits & Solutions
This project is a simple but effective TV remote jammer that distracts the ir receiver in tv by using 555 timer. Rays are emitted by standard 38KHz Tv remote.
This predefined speed control of BLDC motor runs a motor at user desired speed by using EEPROM for storing speed. It is an effective speed control method.
How to select the diy electrical projects kit by engineering studentsEdgefxkits & Solutions
The DIY Electrical Projects kit is an interesting assortment of all the nuts,bolts and accessories required to assemble the electrical equipments. This kit helps the students to gain the practical experience of real life electrical assignments on the job.
This article discusses about how to build a robot vehicle with arduino, AVR, robot body, DC motor, 8051 microcontroller, metal detector and motor driver IC.
This article tells about what is an Opto electronic oscillator, working of the oscillator, multi-loop Opto-electronic oscillator, and its applications.
Engineering students should give more importance to mini projects which is designed by students to learn its practical applications using Do It Yourself Kit.
This is used to track the exact location of a vehicle using GPS tracking systems and give information about the position to concerned person through GSM via SMS.
Project is used to control traffic signal system automatically with IR sensors. Signal timing changes automatically on sensing the traffic density at junctions.
This article discusses what is an electronic speed control, ESC circuit, components used in electronic speed control, features, types and its applications
Prepaid energy meter using GSM is used to record consumed units and send an alert to user via GSM. It is used to reduce power theft in commercial areas.
This project is used to control electrical appliances or loads through a personal computer (PC) like theatre lighting can be centrally controlled from a PC.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
2. http://www.edgefxkits.com/
Introduction
Automatic identification and access control system has
become necessary to overcome the security threats faced by
many organizations. By installing the system at the entrance
will only allow the authorized persons to enter the
organization. The system can also be installed at various points
inside the organization to track the person’s movement and to
restrict their access to sensitive areas in the organization.
RFID Security Access Control
System
4. http://www.edgefxkits.com/
Hardware Components
• 8051 series Microcontroller
• RFID reader
• RFID tags
• Relay
• Relay driver IC
• Transformer
• Diodes
• Voltage Regulator
• Resistors
• Capacitor
• LED
• Lamp
RFID Security Access Control
System
6. http://www.edgefxkits.com/
Microcontroller
Microcontroller (MC) may be called computer
on chip since it has basic features of
microprocessor with internal ROM, RAM,
Parallel and serial ports within single chip.
This is widely used in washing machines, vcd
player, microwave oven, robotics or in
industries.
Microcontroller can be classified on the basis of
their bits processed like 8bit MC, 16bit MC.
RFID Security Access Control
System
7. http://www.edgefxkits.com/
RFID Readers and Tags
RFID systems can be classified by the type of tag and reader.
A Passive Reader Active Tag (PRAT) system has a passive reader which
only receives radio signals from active tags.
An Active Reader Passive Tag (ARPT) system has an active reader,
which transmits interrogator signals and also receives authentication
replies from passive tags.
An Active Reader Active Tag (ARAT) system uses active tags awoken
with an interrogator signal from the active reader.
RFID Security Access Control
System
8. http://www.edgefxkits.com/
Relay
Relays are used where it is necessary to control a circuit by a
separate low-power signal.
Solid-state relays control power circuits with no moving parts,
instead using a semiconductor device to perform switching.
Magnetic latching relays require one pulse of coil power to move
their contacts in one direction, and another, redirected pulse to
move them back.
RFID Security Access Control
System
9. http://www.edgefxkits.com/
Transformer
s The principle parts of a transformer and their functions are:
RFID Security Access Control
System
• The core, which makes a path for the magnetic flux.
• The primary coil, which receives energy from the ac source.
• The secondary coil, which receives energy from the primary winding
and delivers it to the load.
10. http://www.edgefxkits.com/
Diodes
The 1N4148 is a standard small signal silicon diode
used in signal processing.
The 1N4148 is generally available in a DO-35 glass
package and is very useful at high
Frequencies with a reverse recovery time of no more
than 4ns.
This permits rectification and detection of radio
frequency signals very effectively, as long as their
amplitude is above the forward conduction threshold
of silicon (around 0.7V) or the diode is biased.
RFID Security Access Control
System
11. http://www.edgefxkits.com/
Voltage Regulators
A voltage regulator is an electronic circuit
which maintains the output voltage
(almost) constant in spite of changes
within some specified limits in the load
current, input voltage, temperature, etc.
An IC based voltage regulator can be
classified in different ways. A common
type of classification is 3 terminal voltage
regulator and 5 or multi terminal voltage
regulator.
RFID Security Access Control
System
12. http://www.edgefxkits.com/
Resistor
s Resistors are components used to resist the flow of electric current and
have a stated value of RESISTANCE.
Resistors can be either fixed or variable in value
Fixed resistors come in a variety of different shapes, sizes and forms
Axial lead resistors have the value of resistance printed on them or as a
colour code
RFID Security Access Control
System
13. http://www.edgefxkits.com/
RFID Security Access Control
System
Capacitor
A basic capacitor has two parallel plates separated by an insulating
material
A capacitor stores an electrical charge between the two plates.
14. http://www.edgefxkits.com/
RFID Security Access Control
System
LED
Applications of LED :
Devices, medical applications, clothing, toys
• Remote Controls (TVs, VCRs)
• Lighting
• Indicators and signs
• Optoisolators and Optocouplers.
15. http://www.edgefxkits.com/
RFID Security Access Control
System
RFID Technology
RFID system consists of three components namely transponder (tag),
interrogator (reader) and computer containing the database.
The system offers diverse frequency band ranging from low
frequencies to microwave frequencies.
• Low Frequency: 125-134 KHz
• High Frequency: 13.56 MHz
• Ultra High Frequency: 902-928 MHz
• Microwave Frequency: 2.4 GHz
16. http://www.edgefxkits.com/
RFID Security Access Control
System
Working Principle
The aim of this project is to design an RFID based security access
control system using 8051 microcontroller, in which only authorised
personnel are allowed access to a secure area.
When the circuit is powered ON, the microcontroller will initially
display a message as “Swipe the Card” on the LCD display.
When the RFID Card or Tag is swiped against the RFID reader, it will
detect the ID card and sends the unique card no. to the
microcontroller via serial terminal.
17. http://www.edgefxkits.com/
RFID Security Access Control
System
Working Principle
With the help of suitable programming, we need to compare the received card
number with the numbers that are already stored in the microcontroller.
If the received number is matched with the already stored number, then the
microcontroller will display the name of the card holder or the identification
number on the LCD and activates the motor driver IC.
As a result, the door is opened for a predefined duration after which the door is
automatically closed.
If there is no match for the received numbers with the stored numbers, then the
microcontroller will not open the door and displays a message as “Access
Denied” on the LCD display.
18. http://www.edgefxkits.com/
RFID Security Access Control
System
Operation Of RFID
The security and access control system is comprised of two phases:
• Registration phase
• Recognition phase
In the registration phase, Some images of the user are captured
while issuing an RFID tag.
The recognition phase comes when the user wants to enter the
hostel.
19. http://www.edgefxkits.com/
RFID Security Access Control
System
Operation of
RFID The entrance and exit modules use RFID recognition for identification.
While mess module use RFID with a password to grant permission.
These modules communicate with computer system through a main
controller.
The data exchange between the main controller and computer system
is through serial port.
While parallel port data and control lines are used for handshaking
purposes.
20. http://www.edgefxkits.com/
RFID Security Access Control
System
Operation Of RFID
After detecting and receiving RFID tag data through a serial interrupt
routine, microcontroller searches the NV-RAM for this number.
If no match is found, the microcontroller makes an emergency call to
the security van through GSM modem.
At the same time, it turns on the alarm signal.
On the other hand, if a match is found, the microcontroller checks the
entrance status of the user by scanning NV-RAM.
21. http://www.edgefxkits.com/
RFID Security Access Control
System
Security Access
Rfid cards have been advertised as suitable for personal
identification tasks, because they are engineered to be tamper
resistant.
The chip usually implements some cryptographic algorithm.
There are several methods for recovering some of the algorithm's
internal state.
Differential power analysis involves measuring the precise time
and electrical current required for certain encryption or decryption
operations.
22. http://www.edgefxkits.com/
RFID Security Access Control
System
This can deduce the on-chip private key used by public key algorithms
such as RSA.
Some implementations of symmetric ciphers can be vulnerable to
timing or power attacks as well.
Rfid cards can be physically disassembled by using acid, abrasives, or
some other technique to obtain unrestricted access to the on-board
microprocessor.
Although such techniques obviously involve a fairly high risk of
permanent damage to the chip, they permit much more detailed
information to be extracted.
Security Access
23. http://www.edgefxkits.com/
RFID Security Access Control
System
Functions
• Entrance Monitoring Controller
• Exit Monitoring Controller
• Mess Monitoring Controller
• Computer System and Web Server
25. http://www.edgefxkits.com/
RFID Security Access Control
System
Limitations
Even though RFID Technology is secure, the security can be increased
by integrating other security measures like facial detection, finger
print scanner etc.
As the card details are stored in the microcontroller, only a limited
number of card details can be stored.
This can be increased by implementing a memory unit like EEPROM.
26. http://www.edgefxkits.com/
RFID Security Access Control
System
Applications
RFID based Security Access System is designed in this project. As the system
uses RFID Technology based identification, it can be used to access secured
areas like research centres, defence sites etc.
It is a low power system and also the RFID Cards or Tags used are of passive
type.
27. http://www.edgefxkits.com/
RFID Security Access Control
System
Conclusion
Design of a RFID security and access control system for use in
radio frequency identification with biometrics technology to
differentiate between valid and invalid users. The system
accomplishes the security and access control task by
processing information from sub-controllers.