Access Control System
Access Control System
A Report on
Submitted for the fulfillment of the CIE (Event 4) for the Course
Submitted By
The project aims to develop an advanced access control system that combines RFID technology
with IoT capabilities to enhance security and provide real-time notifications to administrators. The
system utilizes RFID tags and readers for user authentication and access control. Each authorized
user is assigned a unique RFID tag, which is scanned by the RFID reader to verify their credentials
and grant access to secured areas.The integration of IoT technology enables the system to provide
real-time notifications to administrators. When an authorized RFID tag is detected, the event data
is transmitted to a cloud-based platform. The platform processes the information and sends
immediate notifications to administrators through mobile applications, emails, or SMS alerts. This
ensures administrators can stay updated on access events and promptly respond to any security
breaches or anomalies.
The project offers several advantages over traditional access control systems. By eliminating the
need for physical keys or passwords, the RFID technology enhances security and minimizes the
risk of unauthorized access. The real-time notifications provided by the IoT-based admin
notification feature enable administrators to monitor access events remotely and gain situational
awareness. This empowers them to take timely actions, track access activities across multiple
locations, and generate comprehensive reports and analytics for auditing purposes.The proposed
system has broad applicability in various environments such as office buildings, residential
complexes, educational institutions, and industrial facilities. It improves efficiency, reduces
administrative overhead, and enhances overall security. By leveraging the power of RFID and IoT
technologies, this project presents an innovative solution that addresses the evolving needs of
access control systems in the modern digital era.
i
CONTENTS
ABSTRACT i
CONTENTS ii
1.INTRODUCTION
2. LITERATURE SURVEY
3. REQUIREMENTS
3.1 Novelty 11
3.2 Methodology 11-12
3.3 Hardware Requirements 12-14
3.4 Software Requirements 14-15
3.5 Advantages 15
REFERENCES 18
ii
LIST OF FIGURES
3.3.5 D1 Mini 14
3.4.2 IFTTT 15
iii
CHAPTER 1: INTRODUCTION
The RFID-Based Access Control System with IoT-Based Admin Notification is an innovative
project that combines RFID technology and IoT capabilities to create an advanced access control
solution. With a focus on enhancing security and providing real-time notifications to
administrators, this project offers numerous benefits for various environments.Traditionally,
access control systems relied on physical keys, passwords, or swipe cards, which could be lost,
stolen, or easily duplicated. However, by incorporating RFID technology, this project provides a
more secure and efficient method for user authentication and access management. Each authorized
user is assigned a unique RFID tag that contains specific identification information. When the user
approaches an access point, such as a door or gate, the RFID reader scans the tag wirelessly and
verifies the user's credentials against a centralized database. If the authentication is successful,
access is granted to the individual.
What sets this project apart is its integration of IoT capabilities, enabling real-time notifications
to administrators. Whenever an authorized RFID tag is detected by the reader, the event data is
immediately transmitted to a cloud-based platform. This platform processes the information and
sends notifications to administrators through various channels, such as mobile applications,
emails, or SMS alerts. Administrators can stay updated on access events regardless of their
physical location, allowing for prompt responses to security breaches or anomalies.The IoT-based
admin notification feature offers several advantages. It enhances situational awareness by
providing administrators with a comprehensive overview of access activities in real-time. They
can monitor access events remotely, track multiple locations simultaneously, and gain insights
into patterns and trends. The system also generates detailed reports and analytics, facilitating data-
driven decision-making, and supporting auditing processes.
The project's applicability spans across a wide range of environments, including office buildings,
residential complexes, educational institutions, and industrial facilities. By replacing traditional
access control methods with RFID technology and incorporating IoT-based admin notifications,
the system improves security, reduces the risk of unauthorized access, and streamlines
administrative tasks. It also offers scalability and flexibility, allowing for easy integration with
existing infrastructure and future expansion.In conclusion, the RFID-Based Access Control
System with IoT-Based Admin Notification is a cutting-edge project that leverages RFID
technology and IoT capabilities to enhance access control systems. By providing secure user
authentication, real-time notifications, and remote monitoring, the project improves security,
efficiency, and administrative control. With its broad applicability and numerous benefits, this
solution addresses the evolving needs of access control in today's digital age.
1.2 : Motivation
The RFID-Based Access Control System with IoT-Based Admin Notification offers compelling
motivations for implementation. By replacing traditional access control methods with RFID
technology, it enhances security and reduces the risk of unauthorized entry. Real-time
notifications enable administrators to promptly respond to security breaches and monitor
activities remotely, enhancing situational awareness. The system's scalability and integration
capabilities ensure its adaptability to various environments, streamlining administration and
simplifying monitoring and reporting tasks. With valuable analytics and reports, it facilitates
data-driven decision-making and auditing. Furthermore, the solution is future-proof, capable of
integrating with emerging technologies. Overall, the motivations encompass enhanced security,
4
real-time notifications, remote monitoring, scalability, efficiency, and future adaptability,
aligning with the growing demand for robust access control systems.
1.4 : Objective
• Enhance Security: Implement a robust access control system that utilizes RFID
technology to ensure only authorized individuals can gain access, reducing the risk of
unauthorized entry.
• Remote Monitoring and Control: Provide administrators with the ability to remotely
monitor access events, track activities across multiple locations, and take prompt actions
as necessary.
• Scalability and Integration: Design the system to be scalable, allowing for easy
integration into existing infrastructure and accommodating future growth and expansion.
• Improve User Experience: Enhance the user experience by providing a seamless and
efficient access control process, eliminating the need for physical keys or remembering
passwords.
5
1.5 : Project Outcome
The outcome of the RFID-Based Access Control System with IoT-Based Admin Notification
project is a secure and efficient access control solution that integrates RFID technology with
IoT capabilities. The outcome includes enhanced security through RFID-based authentication,
real-time notifications to administrators, remote monitoring, and streamlined administration.
The project delivers improved situational awareness with comprehensive reports and analytics,
scalability to adapt to different environments, and future-proof capabilities for long-term
viability. Overall, the project's outcome is a robust access control system that ensures
heightened security, real-time monitoring, and streamlined administration, aligning with the
evolving needs of modern access control requirements.
1.6 : Applications
• Office Buildings: The RFID-based access control system with IoT-based admin
notification enhances security in office buildings by allowing authorized personnel
convenient access through RFID tags, while administrators receive real-time
notifications for immediate response to security breaches or anomalies.
• Educational Institutions: The system ensures the safety of students and staff in
educational institutions by regulating access to classrooms, libraries, and administrative
areas. Real-time notifications allow administrators to promptly respond to security
incidents, maintaining a secure campus.
• Industrial Facilities: The RFID-based access control system provides strict access control
in industrial facilities, protecting assets and ensuring worker safety. Administrators can
monitor real-time access events and respond quickly to security breaches or safety
concerns, ensuring a secure and efficient work environment.
6
CHAPTER 2: LITERATURE SURVEY
[1] “RFID based access control and registration system” - Osman Abd Allah, Suliman
Abdalla, Marwa Mekki, Alaa Awadallah
In paper [1], a user identification system is developed using an RFID technology for registering,
monitoring and control of an access pass for security purpose. The system is designed for use
in Sudan Atomic Energy Commission premises which helps the managers in monitoring and
registers the information to retrieve it in need.The proposed system consists of a control circuit
that control a gate entrance, and software which monitors, displays and record user information
and system status. The software is capable of reading and displaying the user card number, user
name, arrival time, and the number of times the card used and save all these data in a text file
in a GUI designed and configured using LabView software. The system makes a special pass
for VIP users to access the system at any time. The control circuit is attached with a GSM
modem module that can send an SMS message to a master control mobile phone in case of
intruders or unauthorized access.
In paper [2], Radio Frequency Identification (RFID) technology utilizes the electromagnetic
fields for data transfer in order to perform automatic detection and tracking of tags or tags of
objects. It can provide ways to design and implement relatively inexpensive systems
particularly for security aspects. In this paper, we have proposed a digital access control system
that can be employed to a protected area where none but people with authenticated credentials
can enter. In fact, we have implemented the system in the server room of an educational
Institute to test its efficiency as well as expenditure. The implemented system comprises of
digital door lock which is unlock able in real time to ensure secured access specifying
activation, authentication and validation of users prior to bringing the RFID card close to the
reader. The entire system is associated with a central client-server sub-system to ensure and
maintain the overall system integrity. Associated sub-system also generates a log report to
maintain check-in and check-out status of visitors in accordance with the primary credentials
of each.
[3] “Specifics of RFID Based Access Control Systems Used in Logistics Centers” – Filip
Lenko
In paper [3], The development of access control systems has progressed rapidly in recent years
and the market offers a wide range of different devices. The design of the access control
systems is specific to each object. It depends mainly on the operational requirements and the
7
value of the protected interest. Access control systems have their own specifics that must be
used during the designing a security system. Logistics centers are an ideal object for the
implementation of access control systems. Inconsistent selection of access devices can cause
inefficient system functionality, leading to downtime and losses. Based on experimental testing
and related works in the field of access control systems, the paper discusses the possibilities of
using access control systems in logistics centers and points out the specifics of RFID based
access control systems.
In paper [4], The Internet of things involves high risk in terms of security and privacy act because
of its usage through many public networks. ManyIoT applications using RFID from home to
warehouse. Smart Ration Card is one of the applications used in order to prevent corruption and
malpractices in the distributed ration system. RFID tag is used for providing unique
identification for ration card. Once the card is identified the authentication process is done by
Generating the OTP. After the authentication is done the database is updated to reduce human
efforts. This RFID card may be affected by security threat as there is no security module
integrated with RFID cards. In this paper various security threats are identified to provide
security of the RFID based system.
A RFID-based Kindergarten Intelligence Security System is proposed in this paper. The RF-
KISS helps to achieve better children security control, as well as to improve security of school
environment. To this purpose, it automates the children security supervision and provides
integration with current security management system for Kindergarten. In this system, RFID
tags are embedded in the children uniforms. In addition, the kindergartens are equipped with
intelligent terminal as well as RFID reader and antenna to support automatic data scanning and
storage location checking. Moreover, a middle layer software component is design to facilitate
the communication between teachers, portable terminals and parents terminals through wireless
LAN. Besides, it also supports additional powerful functions such as school yellow shuttle
inspecting, classroom management and playground monitoring. The design of the system makes
full use of the existing RFID and IoT technologies and has the feature of low cost and high
efficiency.
We proposed an embedded face recognition authentication system with a novel structure, which
consists of the RFID card used to store the face eigen information and the face recognition unit
based on S3C6410. The hardware was designed and described, and the recognition algorithm
was presented thoroughly. With the fabricated system, experiments were carried out for studying
the authentication performances including the accuracy and response time. The results exhibits
that when the maximum eigen vector number is taken as 30, the authentication accuracy can be
up to 86.5 %, and the response time for the recognition process is only about 57 ms. Comparisons
between the system based on the proposed novel authentication structure and the system based
on database reveals that the response time is greatly shortened with a similar authentication
accuracy.
8
[7] “RFID based security platform for internet of things in health care environment”- Jisha
S and M. Philip
The intelligent system includes different bio-medical sensors and the data collected using these
sensors will be small in size and frequent in transmission, so the encryption technique to be
followed should be of lightweight scheme. In modern world of cryptography the new protocols
are moving away from RSA to Elliptic Curve. The wide acceptance of ECC is due to its light-
weight computation nature. In order to implement the concept of IoT we can use many wireless
technologies among them the core technology used in IoT deployments in the health care
environment is Radio Frequency Identification. In RFID system, proper authentication has to be
performed between RFID tags and RFID reader. In this paper describes a authentication scheme
which performs authentication between RFID tag and RFID reader with help of a server which
contains some pre shared information about tag and reader.
[8] “RFID Based Security System Using Arduino Module”- Akash Khare, Jitendra Yadav ,
Dhanraj Shardhana
RFID (Radio Frequency Identification) is one of the consistent and speedy techniques for
perceive the material dissent. In the long-back the institutionalized distinguishing pieces of proof
are more perfect when stood out from RFID because of their cost yet now day by day's RFID
are viably open and are more beneficial to use. Research has revealed some exceptional
enhancements which make its programming significantly shorter and less requesting is an
immediate consequence of supplanting microcontroller with Arduino. Arduino makes the circuit
and programming a significant measure easier to get it. Research has made some drastic changes
which makes its programming a lot shorter and easier is because of replacing microcontroller
with Arduino. Arduino makes the circuit and programming a lot easier to understand. Paper is
based upon security access using RFID and Arduino module.
This paper is about the development of RFID-based vehicle monitoring system that provides a
database for all registered vehicles using 13.56 MHz RFID module; sends SMS notification to
the database using SIM900A GSM module; an integrated barrier gate using Tower Pro MG966R
Servo Motor; an integrated HC-SR04 ultrasonic sensor to detect those vehicles entering the
specified area and an integrated Arduino camera module that captures vehicle images. It also
addresses security constraints in terms of the functionality, usability, and reliability through
several tests. Flowchart, block diagram, and wiring diagram were used to document the
requirements, analysis and design of the system. In addition, the performance of the system was
done through the perception of respondents using questionnaire. Convenience sampling was
used for the selection of the respondents who are the registered vehicle owners. The results
showed that RFID-Based Vehicle Monitoring has satisfied its functional requirements by
providing its user-desired functions and specifications.
9
[10] “Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based
IoT Applications”- Fernández-Caramés TM, Fraga-Lamas P, Suárez-Albela M, Castedo
First, in order to establish the basics, a detailed review of the most common flaws found in
RFID-based IoT systems is provided, including the latest attacks described in the literature.
Second, a novel methodology that eases the detection and mitigation of such flaws is
presented. Third, the latest RFID security tools are analyzed and the methodology proposed is
applied through one of them (Proxmark 3) to validate it. Thus, the methodology is tested in
different scenarios where tags are commonly used for identification. In such systems it was
possible to clone transponders, extract information, and even emulate both tags and readers.
Therefore, it is shown that the methodology proposed is useful for auditing security and
reverse engineering RFID communications in IoT applications. It must be noted that, although
this paper is aimed at fostering RFID communications security in IoT applications, the
methodology can be applied to any RFID communications protocol.
The literature survey includes several papers on RFID-based access control and security
systems in various domains. The first paper focuses on an RFID-based access control and
registration system designed for a specific premises, providing monitoring, registration, and
control functionalities. The second paper presents a digital access control system implemented
in a server room, emphasizing activation, authentication, and validation of users through RFID
technology. The third paper discusses the specifics of RFID-based access control systems in
logistics centers and highlights the importance of selecting suitable devices for efficient
functionality. The fourth paper addresses security threats in RFID-based systems, particularly
in IoT applications, and identifies the need for integrated security modules. The fifth paper
proposes an RFID-based kindergarten security system, utilizing RFID tags embedded in
children's uniforms and integrating with existing security management systems.
The sixth paper introduces an embedded face recognition authentication system based on
RFID cards, demonstrating improved authentication accuracy and reduced response time. The
seventh paper explores an RFID-based security platform for healthcare environments,
emphasizing lightweight encryption techniques and authentication schemes. The eighth paper
presents an RFID-based security system using Arduino, simplifying circuit design and
programming. The ninth paper focuses on an RFID-based vehicle monitoring system that
incorporates various modules for vehicle registration, SMS notifications, barrier gate control,
and image capture. The tenth paper provides a comprehensive review of flaws in RFID-based
IoT systems and presents a methodology for detecting and mitigating such vulnerabilities,
highlighting its applicability in auditing security and reverse engineering RFID
communications. Overall, the literature survey covers a range of RFID-based security systems
in different contexts, emphasizing various aspects such as access control, authentication,
specific application requirements, and system vulnerabilities.
10
CHAPTER 3: REQUIREMENTS
In this chapter, the requirements related to the implementation of the project is specified.
Based on which the circuit has to be built considering all the specifications.
3.1:Novelty
3.2:METHODOLOGY
• Requirement Analysis: Gather and analyze the requirements of the access control system,
including security needs, access levels, and administrative functionalities.
• RFID Tag and Reader Integration: Select suitable RFID tags and readers for the system.
Integrate the RFID reader with the access control infrastructure to enable wireless
authentication and communication.
• Database Design: Design a centralized database to store user credentials, access privileges,
and event logs. Ensure efficient data retrieval and secure storage.
• Cloud Integration: Establish integration with a cloud-based platform to enable real-time
data processing, notifications, and remote access to access control information.
• User Authentication and Access Control Logic: Develop algorithms and protocols to
authenticate users based on RFID tag readings and validate their access privileges.
Implement access control logic to determine whether access should be granted or denied.
• IoT-Based Admin Notification: Set up communication channels between the RFID reader
and the cloud platform to transmit real-time event data. Develop notification protocols and
implement methods such as mobile applications, emails, or SMS alerts for administrators
11
to receive immediate notifications.
• System Testing and Validation: Conduct thorough testing to ensure the proper functioning
of the access control system, including user authentication, access control logic, and real-
time notifications. Validate the system's performance, security measures, and reliability.
• Deployment and Integration: Install the RFID-based access control system in the target
environment, integrating it with existing infrastructure and access points such as doors,
gates, or turnstiles.
• Training and Documentation: Provide training to system administrators on how to use and
manage the access control system effectively. Document system functionalities,
configurations, and troubleshooting guidelines.
• Maintenance and Upgrades: Establish a maintenance plan to regularly update and upgrade
the system as needed, ensuring its long-term performance and compatibility with emerging
technologies.
• RFID
RFID Reader: The RFID reader is a device that emits radio waves and captures the signals
transmitted by the RFID tag. The reader has an antenna that sends out electromagnetic
waves and receives the response from the tag. It can be handheld or fixed in a specific
location, such as near a doorway or access point.
12
When an RFID tag comes within range of an RFID reader, it receives power wirelessly
from the reader's radio waves. This power activates the tag, allowing it to transmit the
stored information back to the reader. The reader captures the information and can then
process it or transmit it to a centralized system for further analysis or action.
• LCD
LCD (Liquid Crystal Display) is a widely used display technology that utilizes liquid
crystals to control the transmission of light and create visual images. With its thin and flat
design, high resolution, and color accuracy, LCDs are commonly found in devices such as
smartphones, tablets, TVs, and computer monitors. They are energy-efficient and offer a
wide range of applications. Though LCDs have viewing angle limitations, their
contribution to the display industry and user interfaces in electronic devices is substantial.
• Arduino Uno
13
• D1 Mini
D1 Mini is a compact and powerful development board based on the ESP8266 Wi-Fi
module. It is part of the Wemos D1 series and is designed to facilitate IoT (Internet of
Things) projects. The D1 Mini board offers a small form factor, making it ideal for projects
with limited space. It features a microcontroller unit (MCU) with built-in Wi-Fi
capabilities, allowing for easy connectivity to the internet and cloud services. The D1 Mini
board is compatible with the Arduino IDE, enabling users to leverage the vast Arduino
ecosystem and libraries for programming and development. With its versatility, low cost,
and Wi-Fi connectivity, the D1 Mini is well-suited for a wide range of IoT applications,
including home automation, remote monitoring, and sensor networks.
3.4Software Requirements
• Arduino IDE
The Arduino IDE (Integrated Development Environment) is a software platform used for
programming Arduino boards. It provides a user-friendly interface and a set of tools that
simplify the process of writing, compiling, and uploading code to Arduino
microcontrollers. The IDE supports a simplified version of the C++ programming
language and offers a vast library of pre-existing code, making it accessible even to
beginners. With the Arduino IDE, users can easily develop projects by utilizing the
extensive range of Arduino boards, sensors, and actuators. It also allows for seamless
integration with various hardware components, enabling rapid prototyping and
development. The Arduino IDE's intuitive interface and wide community support have
made it a popular choice among hobbyists, students, and professionals for creating
interactive and innovative electronic projects.
14
• IFTTT
IFTTT (If This, Then That) is a web-based automation platform that allows users to create
simple conditional statements, known as applets, to connect and automate various online
services and smart devices. With IFTTT, users can define triggers (this) and actions (that) to
automate tasks between different services or devices. The platform supports a wide range of
popular applications, social media platforms, smart home devices, and IoT services. Users
can create applets that link different services, such as receiving email notifications for
specific events, posting on social media when certain conditions are met, or turning on smart
lights when motion is detected. IFTTT provides an intuitive and user-friendly interface,
making it accessible to users without extensive programming knowledge.
3.5: Advantages
• Real-Time Notifications: The system's integration with IoT enables real-time notifications
to administrators when an authorized RFID tag is detected, allowing for immediate
response to security breaches or anomalies.
• Remote Monitoring and Control: Administrators can remotely monitor access events and
control access from anywhere, providing flexibility and convenience in managing access
control across multiple locations.
• Improved Situational Awareness: The project offers comprehensive reports and analytics,
enhancing administrators' situational awareness by providing insights into access patterns,
trends, and potential security risks.
• Efficiency and Streamlined Administration: The automated access control process reduces
administrative overhead, streamlines operations, and eliminates the need for manual key
management or password resets.
• Scalability and Integration: The system is scalable and easily integrated into existing
infrastructure, accommodating future growth and expansion while ensuring compatibility
with emerging technologies.
15
CHAPTER 4: RESULTS AND CONCLUSION
After implementing the system in Proteus design suite, we get the following as the output. The
screenshots of the result is added in the figures below.
4.1 : Result
16
Fig 4.1.3: Implemented Circuit
4.2 Conclusion
In conclusion, the RFID-Based Access Control System with IoT-Based Admin Notification
project offers a comprehensive and innovative solution for access control. By integrating RFID
technology with IoT capabilities, the project enhances security, provides real-time notifications,
and enables efficient administration. The system's ability to remotely monitor access events,
generate comprehensive reports, and support data-driven decision-making enhances situational
awareness and facilitates proactive security measures. With its scalability, cost-effectiveness,
and future-proof design, the project ensures long-term viability and adaptability to evolving
security requirements. Overall, the project's implementation delivers a robust access control
system that improves security, streamlines administration, and aligns with the demands of
modern access control systems in various environments.
17
REFERENCES:
[1] O. A. Allah, S. Abdalla, M. Mekki and A. Awadallah, "RFID based Access Control and
Registration System," 2018 International Conference on Computer, Control, Electrical,
and Electronics Engineering (ICCCEEE), Khartoum, Sudan, 2018, pp. 1-4, doi:
10.1109/ICCCEEE.2018.8515794.
[2] M. Kishwar Shafin et al., "Development of an RFID based access control system in the
context of Bangladesh," 2015 International Conference on Innovations in Information,
Embedded and Communication Systems (ICIIECS), Coimbatore, India, 2015, pp. 1-5,
doi: 10.1109/ICIIECS.2015.7193024.
[3] Filip Lenko, Specifics of RFID Based Access Control Systems Used in Logistics
Centers,Transportation Research Procedia,Volume 55,2021,Pages 1613-1619,ISSN
2352-1465, https://doi.org/10.1016/j.trpro.2021.07.151.
[4] Dr. Gayathri Rajakumaran, Shola Usharani “RFID Security in IoT” Paper ID:
SR22713162252
[5] Z. Fang, L. Wei, W. Chen and Y. He, "A RFID-Based Kindergarten Intelligence Security
System," 2012 IEEE Ninth International Conference on e-Business Engineering,
Hangzhou, China, 2012, pp. 321-326, doi: 10.1109/ICEBE.2012.59.
[6] X. -L. Meng, Z. -W. Song and X. -Y. Li, "RFID-Based Security Authentication System
Based on a Novel Face-Recognition Structure," 2010 WASE International Conference
on Information Engineering, Beidai, China, 2010, pp. 97-100, doi:
10.1109/ICIE.2010.31.
[7] Jisha S and M. Philip, "Rfid based security platform for internet of things in health care
environment," 2016 Online International Conference on Green Engineering and
Technologies (IC-GET), Coimbatore, India, 2016, pp. 1-3, doi:
10.1109/GET.2016.7916693.
[8] Akash Khare1 , Jitendra Yadav , Dhanraj Shardhana “RFID Based Security System Using
Arduino Module” International Journal of Research in Engineering, Science and
Management Volume-3, Issue-5, May-2020
[9] E. B. Panganiban and J. C. Dela Cruz, "RFID-based vehicle monitoring
system," 2017IEEE 9th International Conference on Humanoid, Nanotechnology,
Information Technology, Communication and Control, Environment and Management
(HNICEM), Manila, Philippines, 2017, pp. 1-6, doi: 10.1109/HNICEM.2017.8269489.
[10] Fernández-Caramés, Tiago M., Paula Fraga-Lamas, Manuel Suárez-Albela, and
Luis Castedo. 2017. "Reverse Engineering and Security Evaluation of Commercial Tags
for RFID-Based IoT Applications" Sensors 17, no. 1: 28.
https://doi.org/10.3390/s17010028.
18