Security System Using RFID: A Project Report
Security System Using RFID: A Project Report
Security System Using RFID: A Project Report
A P R O J E C T R E P O RT
Su b m i t t e d b y
of
BACHELOR OF ENGINEERING
in
ELECTRONICS AND COMMUNICATION ENGINEERING
BONAFIDE CERTIFICATE
Certified that this project report “SECURITY SYSTEM USING RFID” is the
bonafide work of “ANISH ANTONY, JISU JOHN ISAC, KRISHNA PRABHA R,
KUNAL BHARDWAJ” who carried out the project work under my supervision.
SIGNATURE SIGNATURE
1. INTRODUCTION
2. OBJECTIVE
3. SYSTEM ANALYSIS
4. SYSTEM SPECIFICATION
4.1Hardware requirements
5. SYSTEM DESCRIPTION
6. BLOCK DIAGRAM
7. MERITS
8. CONCLUSION
9. REFERENCES
ABSTRACT
The major problem faced by organizations in security breach is related with doors
without proper security system on them for their protection. Our project is going to solve
these problems by using RFID technology. For wireless data transmission between tag and
sensor nodes, the project uses ZigBee modules.
Radio Frequency Identification (RFID) is an automatic identification method, relying
on storing and remotely retrieving data using devices called RFID tags or transponders. So
the RFID is a wireless identification. Normally the RFID system comprises of two main
parts: RFID Reader and RFID Tag.
RFID Reader is an integrated or passive network which is used to interrogate
information from RFID tag (contains antennas to enable them to receive and respond to
radiofrequency queries from an RFID transceiver). The RFID Reader may consist of antenna,
filters, modulator, demodulator, coupler and a micro processor.
We try to enhance the security up to a very effective level so that there are minimum
possibilities in the security breach. For this purpose we are introducing a multilevel security
system which consists of finger print impression, camera and GSM module along with RFID
system. The system also creates a log containing check-in and check-out of each user along
with basic information of user.
OBJECTIVE
The aim of the project is to design a system that have a small coverage area and can
be use for authentication or identification purposes. “Security System Using RFID” is a
system that uses RFID technology to maintain the security of the different rooms in same
structure which can be monitored on real-time bases using the Database server (PC). This
system prevents unauthorized entry in rooms. For this purpose we are introducing a
multilevel security system which consists of finger print impression, camera and GSM
module along with RFID system. This ensures the reliability of the system and makes it
difficult to breach.
SYSTEM ANALYSIS
EXISTING SYSTEM
In the existing system, Information is sent to and read from RFID tags by a reader
using radio waves. In passive systems, which are the most common, an RFID reader
transmits an energy field that “wakes up” the tag and provides the power for the tag to
respond to the reader. Data collected from tags is then passed through communication
interfaces (cable or wireless) to host computer systems in the same manner that data scanned
from bar code labels is captured and passed to computer systems for interpretation, storage,
and action. The drawback in this system is the lack of security option available for the user.
One can easily use others RFID tag to gain access in the desired place without their prior
knowledge. This breach cannot be easily accounted as there is no record other then the RFID
tag used which can mislead to undesirable situation.
PROPOSED SYSTEM
This system is of new kind in which finger print recognition system along with GSM
and camera is newly added. In this system RFID along with ZigBee, microcontroller,
biometric system, GSM, amplifier circuit, power supply, camera and database server (PC) is
used. Different circuits work together to form an unreachable system so that the security can
be enhanced to the maximum level possible. When RFID tag is sensed by the RFID receiver
and finger print impression is given, the camera is activated which clicks the image of the
user trying to access the system. This information is stored in the database along with time
and date when the system was accessed and the GSM technology used in the system make
sure that the concerned authority is notified about the activation of the system along with
result.
SYSTEM SPECIFICATION
HARDWARE REQUIREMENTS
Data Transmission
RFID Zigbee Transceiver X-BEE
GSM Modem -
SOFTWARE REQUIREMENTS
Mikro basic
SOFTWARE DESCRIPTION
MIKRO BASIC
MikroBasic is a powerful, feature rich development tool for PIC microcontrollers. It is
designed to provide the customer with the easiest possible solution for developing
applications for embedded systems, without compromising performance or control.
Highly advanced IDE, broad set of hardware libraries, comprehensive documentation, and
plenty of ready to run example programs should be more than enough to get you started in
programming microcontrollers.
FEATURES
Write your BASIC source code using the built-in Code Editor (Code and Parameter
Assistants, Syntax Highlighting, Auto Correct, Code Templates, and more…)
Use the included mikroBasic libraries to dramatically speed up the development: data
acquisition, memory, displays, conversions, communications… Practically all P12,
P16, and P18 chips are supported.
Monitor your program structure, variables, and functions in the Code Explorer.
Inspect program flow and debug executable logic with the integrated Debugger.
Get detailed reports and graphs: RAM and ROM map, code statistics, assembly
listing, calling tree, and more…
We have provided plenty of examples for you to expand, develop, and use as building
bricks in your projects. Copy them entirely if you deem fit – that’s why we included
them with the compiler.
HARDWARE DESCRIPTION
RFID TAGS
Tags also sometimes are called “transponders”. RFID tags can come in many forms
and sizes. Some can be as small as a grain of rice. Data is stored in the IC and transmitted
through the antenna to a reader. The two commonly used RFID Transponders [2] are Active
(that do contain an internal battery power source that powers the tags chip) and passive (that
does not have an internal power source, but are externally powered typical from the reader)
RFID Transponders.
RFID READER
WORKING OF RFID
Information is sent to and read from RFID tags by a reader using radio waves. In
passive systems, which are the most common, an RFID reader transmits an energy field that
“wakes up” the tag and provides the power for the tag to respond to the reader. Data collected
from tags is then passed through communication interfaces (cable or wireless) to host
computer systems in the same manner that data scanned from bar code labels is captured and
passed to computer systems for interpretation, storage, and action.
FREQUENCIES OF RFID
RFID deployments tend to use unlicensed frequencies for their obvious cost benefits.
There are four commonly used frequencies:
• Low frequency (LF) 125/134.2 KHz.
• High frequency (HF) 13.56 MHz.
• Ultra high frequency (UHF) (including 869 and 915 MHz).
• Microwave (at 2450 MHz, a band familiar to ISPs).
A tag's read range performance is usually considered the primary gauge of its
suitability for a particular application. It is important to remember that not all applications
require maximum range. Tags in the LF-HF band have a range of 1 to 18 inches, while
passive UHF tags can reach up to 20 feet, and microwave tags can reach 1 to 6 feet. The
ranges greatly depend upon the surface on which the tag is mounted.
BLOCK DIAGRAM
GSM Mobile
0)
PC
In today’s world, the need for effective security is evident. Without effective security,
many everyday activities are compromised. Specific security concerns include:
Protecting computer systems, PDAs, mobile phones, Internet appliances and similar
devices from unauthorized access or use
Protecting motor vehicles and other valuable items from unauthorized access or use
preventing theft and fraud in financial transactions, in particular electronic
transactions, including credit card payments and payments via the Internet.
Restricting access to workplaces, warehouses and secures areas, such as military
installations, to authorized personnel.
Screening access to public transportation, in particular air travel.
Authenticating the identity of an individual in drivers’ licenses, health cards, ID
cards, and similar administrative documents.
A major factor in ensuring security is the unique identification of individuals, or the
authentication that a person is who he or she claims to be. This must be done reliably, rapidly,
non-intrusively and at reasonable cost. In the past, this has been done by methods such as
security tokens (passports, badges, etc.), secure knowledge (passwords PIN codes, signature,
etc.) or recognition by a guardian (doorkeeper). These traditional approaches are all limited
with respect to the above criteria. A promising approach for the future is biometrics.
Biometrics offers a convenient, reliable and low-cost means of identifying or authenticating
individuals, and can be implemented in unsupervised and remote situations. Biometrics seeks
to identify individuals uniquely by measuring certain physical and behavioural characteristics
and extracting a sample (also called a sampled template or live template) from these
measurements in a standard data format. This sample is compared with a template (also called
an enrolled template or signature), based on the same characteristics, that has been
established as the unique identity of that individual and stored in the security system. A close
match between sample and template confirms the identity of the individual.
Attention has been focused on a small number of physical characteristics that can identify
individuals uniquely, notably voice, gait, face, iris and retina patterns, palm prints and
fingerprints. (DNA is excluded from this list because DNA sampling is intrusive and slow.)
Work is proceeding to develop electronic recognition systems based on all of these. This
article focuses on fingerprints as the most advanced, mature and well-developed option.
Based on centuries of experience and extensive research, fingerprints are at present
considered to be the most reliable biometric for uniquely identifying an individual. In spite of
some recent legal challenges in the USA, they are still regarded as giving proof of identity
beyond reasonable doubt in almost all cases. The majority of the biometric-based security
systems in operation today are based on fingerprint recognition.
Thumb Impression
FINGERCHIP TECHNOLOGY
Finger Chip IC for fingerprint image capture combines detection and data conversion
circuitry in a single rectangular CMOS die. It captures the image of a fingerprint as the finger
is swept vertically over the sensor window. It requires no external heat, light or radio source.
FINGERCHIP SENSOR
The Finger Chip sensor comprises an array of 8 rows by 280 columns, giving 2240
temperature-sensitive pixels. An additional dummy column is used for calibration and frame
identification. The pixel pitch of 50 _m by 50 _m provides a resolution of 500 dpi over an
image zone of 0.4 mm by 14 mm. This is adequate to capture a frame of the central portion of
a fingerprint at an acceptable image resolution. This resolution also complies with the Image
Quality Specification (IQS) from the IAFIS (Integrated Automated Fingerprint Identification
System) of the U.S. Federal Bureau of Investigation (FBI). The pixel clock is programmable
at up to 2 MHz, giving an output of 1780 frames per second. This is more than adequate for a
typical sweeping velocity. An image of the entire fingerprint is re-constructed from
successive frames using software provided.
Biometric sensor
ZIGBEE
ZigBee is a low-cost, low-power, wireless mesh network standard. The low cost
allows the technology to be widely deployed in wireless control and monitoring applications.
Low power-usage allows longer life with smaller batteries. Mesh networking provides high
reliability and more extensive range. The technology is intended to be simpler and less
expensive than other WPANs such as Bluetooth. ZigBee chip vendors typically sell integrated
radios and microcontrollers with between 60 KB and 256 KB flash memory.
ZigBee operates in the industrial, scientific and medical (ISM) radio bands; 868 MHz
in Europe, 915 MHz in the USA and Australia, and 2.4 GHz in most jurisdictions worldwide.
Data transmission rates vary from 20 to 250 kilobits/second.
The ZigBee network layer natively supports both star and tree typical networks, and
generic mesh networks. Every network must have one coordinator device, tasked with its
creation, the control of its parameters and basic maintenance. Within star networks, the
coordinator must be the central node. Both trees and meshes allow the use of
ZigBee routers to extend communication at the network level.
ZIGBEE STACK
ZigBee builds upon the physical layer and medium access control defined in IEEE
standard 802.15.4 (2003 version) for low-rate WPAN's. The specification goes on to complete
the standard by adding four main components: network layer, application layer, ZigBee
device objects (ZDO's) and manufacturer-defined application objects which allow for
customization and favour total integration.
Besides adding two high-level network layers to the underlying structure, the most
significant improvement is the introduction of ZDO's. These are responsible for a number of
tasks, which include keeping of device roles, management of requests to join a network,
device discovery and security.
ZigBee is not intended to support power line networking but to interface with it at
least for smart metering and smart appliance purposes.
Because ZigBee nodes can go from sleep to active mode in 30msec or less, the
latency can be low and devices can be responsive, particularly compared to Bluetooth wake-
up delays, which are typically around three seconds. Because ZigBee nodes can sleep most of
the time, average power consumption can be low, resulting in long battery life.
Programmable code-protection
Low-power consumption.
Operating speed:
Peripheral features:
Parallel slave port (PSP)-8 bits wide with external RD, WR and CS controls.
PIN DETAIL FOR MICROCONTROLLER
Analog features:
Programmable input multiplexing from device inputs and internal voltage reference
Watching Timer (WDT) with its own on-chip RC oscillator for reliable operation
CMOS Technology:
PC in general cannot directly communicate with peripherals that are available. The reason
behind this is the difference in their working logic. PC generally works in positive logic. The
microcontroller that actually acts as the peripheral here works in negative logic. It becomes
important to change the logic between them when they communicate with each other.
RS232 is very important for standard serial interfacing with PC where change of logic is
achieved.
PC communicates with peripherals through serial com1 or com2, which communicates the
data in terms of pulse form as follows.
GSM MODULE
POWER SUPPLY
ANTENNA
PC
RFID security system is based on GSM network technology for transmission of SMS from
sender to receiver. SMS sending and receiving is used for ubiquitous access of information
and allowing breach control at secured area. The system provide a sub-systems which gives
us a control subsystem that enables the user to control area security remotely whereas the
security alert subsystem provides the remote security monitoring. The main aspect of the
security alert is to achieve detection on intrusion in the system and allow an automatic
generation of SMS thus alerting the user against security risk.
PC: This unit contains the software components such as the server and security System
through which the area security can be controlled and monitored.
GSM Modem: It is a hardware component that allows the capability to send and receive
SMS to and from the system. The communication with the system takes place via RS232
serial port. Cell phone can be attached at the place of GSM hardware but it limits the
hardware functionality such as sending or receiving of SMS.
Mobile Device: Cellular phone containing SIM card has a specific number through which
communication takes place. The device communicates with the GSM Modem via radio
frequency. Mobile user transmits SMS using GSM technology.
GSM Modem: GSM modem is a plug and play device and is attached to the PC which then
communicates with the PC via RS232 port. GSM modem is a bridge responsible for enabling/
disabling of SMS capability.
Cell Phone: Mobile device communicates with the GSM Modem via radio waves. The mode
of communication is wireless and mechanism works on the GSM technology. Cell phone has
a SIM card and a GSM subscription. This cell phone number is configured on the system.
User transmits instructions via SMS and the system takes action against those instructions.
GSM hardware tests are run in order to check the hardware support. The system will call
GSM modem and it will get activated.
After activation the Modem will check for hardware support. If the hardware is missing or
some other hardware problem there will be error, resulting in communication failure and the
application will be terminated.
If hardware responds then the serial port will be opened for communication and GSM
hardware will allow transmission of SMS.The system will then connect and after connection
establishment the system will be able to detect intrusion and will alert user about the breach
and similarly the system will update status of appliances by receiving SMS from the pre-
defined cell number.
BLOCK DIAGRAM
Load Filter
Power supply unit consists of following units
v) Output filter
STEPDOWN TRANSFORMER
Using step down uses it to step down the main supply voltage transformer. It consists of
primary and secondary coils. The output from the Secondary coil is also AC waveforms we
have to convert AC voltage into DC voltage by using Rectifier Unit.
RECTIFIER UNIT
We have to convert AC voltage into DC voltage by using rectifier. Bridge Rectifier is used
to convert into DC voltage. This output voltage of the rectifier is in rippled forms we have to
remove the ripples from DC voltage.
INPUT FILTER
Capacitor acts as filter. The principle of the capacitor is charging and discharging. It
charges in positive half cycle of the AC voltage and it will Discharge in negative half cycles,
it allows only AC voltage and doesn’t allow the DC voltage. This filter is fixed before the
regulator.
REGULATOR UNIT
Regulator regulates the output voltage constant depends upon the regulator.it classifieds as
follows
i) Positive regulator
OUTPUT FILTER
Capacitor acts as filter. The principle of the capacitor is charging and Discharging.it
charges in positive half cycle of the AC voltage and it will Discharge in negative half cycles,
it allows only AC voltage and doesn’t allow the DC voltage.This fiter is fixed after the
regulator.
MERITS
RFID is one of the best technology used for barcode system , tags and transfer
information.
RFID adorns the management with a new idea and usher for a bright future.
In the near future the RFID tag system will be replaced with NFC(near field
communication) because of its high sensitivity
Due to its customizable feature and continuing improvement the library communities
are beginning to get involved in its development
REFERENCES
www.microchip.com
www.dallas.com
www.gsmfavorites.com
http://www.shepherdcentre.com.au/
www.myprojects.com