SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 656
Smart Security System Using R.F.I.D.
Ishan Rakte1, Abhishek Jagtap2, Jayaprakash Dharmavaram3, Ashutosh Kabra4, Prof. Kishori
Degaonkar5
1-4Student, Department of Electronics and Telecommunication Engineering, Vishwakarma Institute of Technology,
Pune, Maharashtra, India
5Professor, Department of Electronics and Telecommunication Engineering, Vishwakarma Institute of Technology,
Pune, Maharashtra, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Radio Frequency Identification (RFID) is a
renowned technology which came into existence in 1970's, it
was used initially to monitor railway carriages. Today, it is
used for various purposes all over the world. RFID for
security purposes solves many problems in today's world as
hacking is getting more and more popular. RFID cannot be
hacked as the RFID tag stores the particular information
and if a new tag has the same information, it will not be
scanned as it won't match the radio frequency of the
original tag. Thus, RFID is a very safe and secure mode of
locking system. But that does not mean that it does not have
any disadvantages.
Key Words: RFID, Security, Locking System, Arduino,
Communication.
1.INTRODUCTION
Crime rates in India are going up gradually with time, and
crime rates were especially high after the COVID-19
situation. It was because many people lost their jobs and
chose the criminal path. An extra measure of security is
needed for precautions. RFID is the perfect technology for
this, since it is been in use for more than 50 years and
shows that it is reliable and trusted technology.
In real life applications RFID can be used in various areas
for extra security measures like in main doors of
residential buildings, offices, hotels etc. It can also be used
for doors and entries reserved for special access to
selected individuals. It can further be used as an extra
measure for lockers as well.
RFID chip can be in various forms according to the user's
convenience like cards, tags, key chains. Furthermore, the
RFID chip can also be implanted
in our body, but the implantation method is very
controversial as of now. Thus, it provides ease of use as the
card can be kept in the wallets and the key chains can be
attached to the keys, so people will not forget or misplace
the RFID tag
But since we also forget or misplace our wallets and keys,
the RFID tag can also be misplaced in a similar way and
that is its biggest disadvantage. If a door is locked and the
only way to get in is through RFID and the tag is lost, in
this case there is no alternative and the door lock may
need to get the door opened through external measures.
So, as an alternative the RFID reader can also have
password with a keypad, so the if someone loses the RFID
tag, the person can also enter the password to access the
door/locker.
2. LITERATURE REVIEW
The door lock system traditionally uses of the conventional
key which is operating mechanically by inserting the
correct key and rotating it thus the door open.
Unfortunately, it's not ok to spot the unauthorized access.
It is less reliable and vulnerable the theft attacks [2].
Safeguarding homes has turn into one of the concerning
topics. Today homes are being farther hospitable
numerous threats mainly being burglarised. Hence home
security is required [3]. So, RFID can be used as an extra
measure to protect our homes from burglars and other
threats.
Fig.1- RFID Reader/Writer, RFID Card, RFID Keychain
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 657
Fig.2 - RFID Cards
K.Srinivasa Ravi et.al[5] abstracted Primarily, the 2 main
components involved during a frequency Identification
system are the Transponder (tags that are attached to the
object) and therefore the Interrogator (RFID reader).
When the RFID card or keychain is brought near to the
RFID module it reads the data in the card and displays on
the LCD. The data within the card is compared with the
info within the program memory and displays authorized
or unauthorized message. The door opens for a licensed
person, closes for an unauthorized person; it alerts the
persons through a buzzer. The RFID module indicates a
buzzer alongside a LED whenever it reads the info from
the RFID card.
RFID, frequency Identification is a cheap technology, are
often implemented for several applications like security,
asset tracking, people tracking, inventory detection, access
control applications [1].
RFID technologies are more proficient and more secure as
compare to other networks [4].
3. METHODOLOGY
Components-
1. Arduino R3 Uno
2. RC522 - RFID Reader/Writer 13.56MHz
3. RFID Tags
4. Servo Motor
5. 16*2 LCD Display
6. LED
7. Breadboard
8. Buzzer
Fig.3 - Flowchart
Fig.4 - Arduino connected to RFID Reader
In Fig (3) we can see the flowchart explaining the whole
process of the RFID authentication.
In Fig (4) we can see that the Arduino Uno is connected to
the RFID reader (RC552), and also a RFID tag is kept near
the scanner. If that tag is shown to the RFID reader, then
the scanner will read it and will allow access depending
on if it is verified or not.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 658
Fig.5 – Circuit Diagram
In Fig (5) we can see the whole circuit diagram, where all
the components are connected to each other. All the
components are connected to the Arduino Uno Board.
Then the Arduino Uno board is connected to the
PC/Laptop to push the code from the Arduino IDE to the
board.
4. RESULT
The circuit is completely ready and working. Also, the
code is working properly.
Fig.5 – Final Circuit
Whenever the correct RFID tag is shown in front of the
RFID Scanner, the Scanner reads the tag and then the LED
glows with the display indicating that the person is
authenticated and can enter the premises. And if the RFID
is wrong the LED will glow with the buzzer also buzzing
and the LED display indicating that the person is not
welcomed in the premises.
This will therefore only allow the authenticated person to
enter the premises and the person with the wrong RFID
tag cannot enter.
5. FUTURE SCOPE
An extra layer on top of the existing RFID Scanner would
be better. If the circuit would be connected to cloud for
data analysis or data visualization then the project could
have more advantages and applications. It could be
connected to Blynk for controlling the circuit remotely.
And for data analysis and data visualization, Thingspeak
could be used. Also, instead of a servo motor for
unlocking of the door, a solenoid electromagnetic door
lock could have been used.
6. CONCLUSIONS
We all know how much the need of security is in today's
generation. RFID is a technology which is proven and
reliable. It is also convenient and more secured compared
to the traditional lock and key method. It is convenient as
RFID tags are can be made many forms like keychains,
cards and much more.
But this is not completely perfect as it does have some
limitations like the tags can be damaged more easily as
compared to metal keys. Also, the reliability can be
affected by liquid or moisture. The results vary on various
conditions.
There is nothing wrong with RFID tags and reader in its
own but methods like data analytics and data
visualization according to the RFID reads will have added
advantages and applications.
Also, if a record can be kept of the reads of the RFID tags
with unique identifications for various people, so the we
can have a record of the people who entered the
premises.
7. ACKNOWLEDGEMENT
We would like to give our gratitude towards our
Honourable Director Prof. (Dr.) R.M. Jalnekar for giving us
the opportunity to do this project under the Engineering
Design & Innovation – III (EDI) curriculum. We would like
to thank Prof (Dr) Shripad Bhatlavande [HOD, ENTC Dept.]
for providing us with the with the necessary resources and
support. We hereby express our gratitude and thanks to
our project Co-ordinator Prof (Dr.) S.V. Kurundkar and our
project guide Prof. Kishori Degaonkar for providing his
erudite guidance, vision support and constant
encouragement in order to complete our EDI - III
successfully. Kishori ma’am’s disciplined supervision from
the first day was the main reason because of which we
never got off track while working on this. Her constant
support proved really helpful for us. She taught us and
educated us about the format of the research paper and
the way we should work in the direction of doing the
research. We are very grateful to her for providing us
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 659
knowledge about some popular research journals and
conferences. Finally, we thank Vishwakarma Institute of
Technology who gave us this opportunity of working on a
project and doing the research. This institute already had
all the information regarding the projects which helped us
a lot. This institute has provided us the perfect education
using which we could overcome a lot of problems we faced
while working on our project.
8.REFERENCES
[1] Gyanendra K Verma (Indian Institute of
Information Technology, Allahabad-India), Pawan Tripathi
(Indian Institute of Information Technology, Allahabad-
India). "A Digital Security System with Door Lock System
Using RFID Technology". Research Gate, International
Journal of Computer Applications, August 2010.
[2] Electrical Engineering Department, Politeknik
Negeri Sriwijaya, Palembang 30139, Indonesia, Yordan
Hasan, Abdurrahman, Yudi Wijanarko, Selamat Muslimin,
Renny Maulidda. "The Automatic Door Lock to Enhance
Security in RFID System". Journal of Physics: Conference
Series, May 2020.
[3] Department of Information Technology, M. H.
Saboo Siddik College of Engineering, Mumbai, Shrinidhi
Gindi, Naiyer Shaikh, Kashif Beig, Abdeali Sabuwala.
"Smart Lock System Using RFID". International Research
Journal of Engineering and Technology (IRJET), July 2020.
[4] Shubham Soni, Rajni Soni, Akhilesh A.
Waoo."RFID-Based Digital Door Locking System". Indian
Journal of Microprocessors and Microcontroller (IJMM),
September 2021.
[5] K.Srinivasa Ravi, G.H.Varun, T.Vamsi, P.Pratyusha.
"RFID Based Security System". International Journal of
Innovative Technology and Exploring Engineering
(IJITEE), April 2013.

More Related Content

Similar to Smart Security System Using R.F.I.D.

IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital India
IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital IndiaIRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital India
IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital India
IRJET Journal
 
Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS ) Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS )
GICTTraining
 
Gvm project report g95
Gvm project report g95Gvm project report g95
Gvm project report g95
G0VIND G0URAV
 
RFID Based Security and Access Control System using ARDUINO
RFID Based Security and Access Control System using ARDUINORFID Based Security and Access Control System using ARDUINO
RFID Based Security and Access Control System using ARDUINO
IJMTST Journal
 
AUTOMATIC SMART SHOPPING TROLLY WITH BILLING
AUTOMATIC SMART SHOPPING TROLLY WITH BILLINGAUTOMATIC SMART SHOPPING TROLLY WITH BILLING
AUTOMATIC SMART SHOPPING TROLLY WITH BILLING
IRJET Journal
 
IRJET- Smart Cart Using Arduino and RFID
IRJET- Smart Cart Using Arduino and RFIDIRJET- Smart Cart Using Arduino and RFID
IRJET- Smart Cart Using Arduino and RFID
IRJET Journal
 
Survey on Security Issues of Internet of Things (IoT) Devices
Survey on Security Issues of Internet of Things (IoT) DevicesSurvey on Security Issues of Internet of Things (IoT) Devices
Survey on Security Issues of Internet of Things (IoT) Devices
IRJET Journal
 
IRJET - Home Security System using Arduino
IRJET -  	  Home Security System using ArduinoIRJET -  	  Home Security System using Arduino
IRJET - Home Security System using Arduino
IRJET Journal
 
IRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFIDIRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFID
IRJET Journal
 
IRJET- Students Smart Card using RFID
IRJET-  	  Students Smart Card using RFIDIRJET-  	  Students Smart Card using RFID
IRJET- Students Smart Card using RFID
IRJET Journal
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET Journal
 
RFID Based Smart Trolley for Supermarket Automation
RFID Based Smart Trolley for Supermarket AutomationRFID Based Smart Trolley for Supermarket Automation
RFID Based Smart Trolley for Supermarket Automation
IRJET Journal
 
IRJET- Tag's Reader Design
IRJET-  	  Tag's Reader DesignIRJET-  	  Tag's Reader Design
IRJET- Tag's Reader Design
IRJET Journal
 
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET Journal
 
MOBILE CHARGING SYSTEM USING COIN AND RFID
MOBILE CHARGING SYSTEM USING COIN AND RFIDMOBILE CHARGING SYSTEM USING COIN AND RFID
MOBILE CHARGING SYSTEM USING COIN AND RFID
IRJET Journal
 
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IRJET Journal
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
IRJET Journal
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
IRJET Journal
 
Frid smart lms
Frid smart lmsFrid smart lms
IRJET- IOT and RFID based shopping mall
IRJET- IOT and RFID based shopping mallIRJET- IOT and RFID based shopping mall
IRJET- IOT and RFID based shopping mall
IRJET Journal
 

Similar to Smart Security System Using R.F.I.D. (20)

IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital India
IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital IndiaIRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital India
IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital India
 
Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS ) Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS )
 
Gvm project report g95
Gvm project report g95Gvm project report g95
Gvm project report g95
 
RFID Based Security and Access Control System using ARDUINO
RFID Based Security and Access Control System using ARDUINORFID Based Security and Access Control System using ARDUINO
RFID Based Security and Access Control System using ARDUINO
 
AUTOMATIC SMART SHOPPING TROLLY WITH BILLING
AUTOMATIC SMART SHOPPING TROLLY WITH BILLINGAUTOMATIC SMART SHOPPING TROLLY WITH BILLING
AUTOMATIC SMART SHOPPING TROLLY WITH BILLING
 
IRJET- Smart Cart Using Arduino and RFID
IRJET- Smart Cart Using Arduino and RFIDIRJET- Smart Cart Using Arduino and RFID
IRJET- Smart Cart Using Arduino and RFID
 
Survey on Security Issues of Internet of Things (IoT) Devices
Survey on Security Issues of Internet of Things (IoT) DevicesSurvey on Security Issues of Internet of Things (IoT) Devices
Survey on Security Issues of Internet of Things (IoT) Devices
 
IRJET - Home Security System using Arduino
IRJET -  	  Home Security System using ArduinoIRJET -  	  Home Security System using Arduino
IRJET - Home Security System using Arduino
 
IRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFIDIRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFID
 
IRJET- Students Smart Card using RFID
IRJET-  	  Students Smart Card using RFIDIRJET-  	  Students Smart Card using RFID
IRJET- Students Smart Card using RFID
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
 
RFID Based Smart Trolley for Supermarket Automation
RFID Based Smart Trolley for Supermarket AutomationRFID Based Smart Trolley for Supermarket Automation
RFID Based Smart Trolley for Supermarket Automation
 
IRJET- Tag's Reader Design
IRJET-  	  Tag's Reader DesignIRJET-  	  Tag's Reader Design
IRJET- Tag's Reader Design
 
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
 
MOBILE CHARGING SYSTEM USING COIN AND RFID
MOBILE CHARGING SYSTEM USING COIN AND RFIDMOBILE CHARGING SYSTEM USING COIN AND RFID
MOBILE CHARGING SYSTEM USING COIN AND RFID
 
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
Frid smart lms
Frid smart lmsFrid smart lms
Frid smart lms
 
IRJET- IOT and RFID based shopping mall
IRJET- IOT and RFID based shopping mallIRJET- IOT and RFID based shopping mall
IRJET- IOT and RFID based shopping mall
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Basic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparelBasic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparel
top1002
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
ssuser7dcef0
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 

Recently uploaded (20)

ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Basic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparelBasic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparel
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 

Smart Security System Using R.F.I.D.

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 656 Smart Security System Using R.F.I.D. Ishan Rakte1, Abhishek Jagtap2, Jayaprakash Dharmavaram3, Ashutosh Kabra4, Prof. Kishori Degaonkar5 1-4Student, Department of Electronics and Telecommunication Engineering, Vishwakarma Institute of Technology, Pune, Maharashtra, India 5Professor, Department of Electronics and Telecommunication Engineering, Vishwakarma Institute of Technology, Pune, Maharashtra, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Radio Frequency Identification (RFID) is a renowned technology which came into existence in 1970's, it was used initially to monitor railway carriages. Today, it is used for various purposes all over the world. RFID for security purposes solves many problems in today's world as hacking is getting more and more popular. RFID cannot be hacked as the RFID tag stores the particular information and if a new tag has the same information, it will not be scanned as it won't match the radio frequency of the original tag. Thus, RFID is a very safe and secure mode of locking system. But that does not mean that it does not have any disadvantages. Key Words: RFID, Security, Locking System, Arduino, Communication. 1.INTRODUCTION Crime rates in India are going up gradually with time, and crime rates were especially high after the COVID-19 situation. It was because many people lost their jobs and chose the criminal path. An extra measure of security is needed for precautions. RFID is the perfect technology for this, since it is been in use for more than 50 years and shows that it is reliable and trusted technology. In real life applications RFID can be used in various areas for extra security measures like in main doors of residential buildings, offices, hotels etc. It can also be used for doors and entries reserved for special access to selected individuals. It can further be used as an extra measure for lockers as well. RFID chip can be in various forms according to the user's convenience like cards, tags, key chains. Furthermore, the RFID chip can also be implanted in our body, but the implantation method is very controversial as of now. Thus, it provides ease of use as the card can be kept in the wallets and the key chains can be attached to the keys, so people will not forget or misplace the RFID tag But since we also forget or misplace our wallets and keys, the RFID tag can also be misplaced in a similar way and that is its biggest disadvantage. If a door is locked and the only way to get in is through RFID and the tag is lost, in this case there is no alternative and the door lock may need to get the door opened through external measures. So, as an alternative the RFID reader can also have password with a keypad, so the if someone loses the RFID tag, the person can also enter the password to access the door/locker. 2. LITERATURE REVIEW The door lock system traditionally uses of the conventional key which is operating mechanically by inserting the correct key and rotating it thus the door open. Unfortunately, it's not ok to spot the unauthorized access. It is less reliable and vulnerable the theft attacks [2]. Safeguarding homes has turn into one of the concerning topics. Today homes are being farther hospitable numerous threats mainly being burglarised. Hence home security is required [3]. So, RFID can be used as an extra measure to protect our homes from burglars and other threats. Fig.1- RFID Reader/Writer, RFID Card, RFID Keychain
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 657 Fig.2 - RFID Cards K.Srinivasa Ravi et.al[5] abstracted Primarily, the 2 main components involved during a frequency Identification system are the Transponder (tags that are attached to the object) and therefore the Interrogator (RFID reader). When the RFID card or keychain is brought near to the RFID module it reads the data in the card and displays on the LCD. The data within the card is compared with the info within the program memory and displays authorized or unauthorized message. The door opens for a licensed person, closes for an unauthorized person; it alerts the persons through a buzzer. The RFID module indicates a buzzer alongside a LED whenever it reads the info from the RFID card. RFID, frequency Identification is a cheap technology, are often implemented for several applications like security, asset tracking, people tracking, inventory detection, access control applications [1]. RFID technologies are more proficient and more secure as compare to other networks [4]. 3. METHODOLOGY Components- 1. Arduino R3 Uno 2. RC522 - RFID Reader/Writer 13.56MHz 3. RFID Tags 4. Servo Motor 5. 16*2 LCD Display 6. LED 7. Breadboard 8. Buzzer Fig.3 - Flowchart Fig.4 - Arduino connected to RFID Reader In Fig (3) we can see the flowchart explaining the whole process of the RFID authentication. In Fig (4) we can see that the Arduino Uno is connected to the RFID reader (RC552), and also a RFID tag is kept near the scanner. If that tag is shown to the RFID reader, then the scanner will read it and will allow access depending on if it is verified or not.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 658 Fig.5 – Circuit Diagram In Fig (5) we can see the whole circuit diagram, where all the components are connected to each other. All the components are connected to the Arduino Uno Board. Then the Arduino Uno board is connected to the PC/Laptop to push the code from the Arduino IDE to the board. 4. RESULT The circuit is completely ready and working. Also, the code is working properly. Fig.5 – Final Circuit Whenever the correct RFID tag is shown in front of the RFID Scanner, the Scanner reads the tag and then the LED glows with the display indicating that the person is authenticated and can enter the premises. And if the RFID is wrong the LED will glow with the buzzer also buzzing and the LED display indicating that the person is not welcomed in the premises. This will therefore only allow the authenticated person to enter the premises and the person with the wrong RFID tag cannot enter. 5. FUTURE SCOPE An extra layer on top of the existing RFID Scanner would be better. If the circuit would be connected to cloud for data analysis or data visualization then the project could have more advantages and applications. It could be connected to Blynk for controlling the circuit remotely. And for data analysis and data visualization, Thingspeak could be used. Also, instead of a servo motor for unlocking of the door, a solenoid electromagnetic door lock could have been used. 6. CONCLUSIONS We all know how much the need of security is in today's generation. RFID is a technology which is proven and reliable. It is also convenient and more secured compared to the traditional lock and key method. It is convenient as RFID tags are can be made many forms like keychains, cards and much more. But this is not completely perfect as it does have some limitations like the tags can be damaged more easily as compared to metal keys. Also, the reliability can be affected by liquid or moisture. The results vary on various conditions. There is nothing wrong with RFID tags and reader in its own but methods like data analytics and data visualization according to the RFID reads will have added advantages and applications. Also, if a record can be kept of the reads of the RFID tags with unique identifications for various people, so the we can have a record of the people who entered the premises. 7. ACKNOWLEDGEMENT We would like to give our gratitude towards our Honourable Director Prof. (Dr.) R.M. Jalnekar for giving us the opportunity to do this project under the Engineering Design & Innovation – III (EDI) curriculum. We would like to thank Prof (Dr) Shripad Bhatlavande [HOD, ENTC Dept.] for providing us with the with the necessary resources and support. We hereby express our gratitude and thanks to our project Co-ordinator Prof (Dr.) S.V. Kurundkar and our project guide Prof. Kishori Degaonkar for providing his erudite guidance, vision support and constant encouragement in order to complete our EDI - III successfully. Kishori ma’am’s disciplined supervision from the first day was the main reason because of which we never got off track while working on this. Her constant support proved really helpful for us. She taught us and educated us about the format of the research paper and the way we should work in the direction of doing the research. We are very grateful to her for providing us
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 659 knowledge about some popular research journals and conferences. Finally, we thank Vishwakarma Institute of Technology who gave us this opportunity of working on a project and doing the research. This institute already had all the information regarding the projects which helped us a lot. This institute has provided us the perfect education using which we could overcome a lot of problems we faced while working on our project. 8.REFERENCES [1] Gyanendra K Verma (Indian Institute of Information Technology, Allahabad-India), Pawan Tripathi (Indian Institute of Information Technology, Allahabad- India). "A Digital Security System with Door Lock System Using RFID Technology". Research Gate, International Journal of Computer Applications, August 2010. [2] Electrical Engineering Department, Politeknik Negeri Sriwijaya, Palembang 30139, Indonesia, Yordan Hasan, Abdurrahman, Yudi Wijanarko, Selamat Muslimin, Renny Maulidda. "The Automatic Door Lock to Enhance Security in RFID System". Journal of Physics: Conference Series, May 2020. [3] Department of Information Technology, M. H. Saboo Siddik College of Engineering, Mumbai, Shrinidhi Gindi, Naiyer Shaikh, Kashif Beig, Abdeali Sabuwala. "Smart Lock System Using RFID". International Research Journal of Engineering and Technology (IRJET), July 2020. [4] Shubham Soni, Rajni Soni, Akhilesh A. Waoo."RFID-Based Digital Door Locking System". Indian Journal of Microprocessors and Microcontroller (IJMM), September 2021. [5] K.Srinivasa Ravi, G.H.Varun, T.Vamsi, P.Pratyusha. "RFID Based Security System". International Journal of Innovative Technology and Exploring Engineering (IJITEE), April 2013.