0% found this document useful (0 votes)
19 views14 pages

Report Aishu123

Uploaded by

hemalatha tk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views14 pages

Report Aishu123

Uploaded by

hemalatha tk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

INTRODUCTION

The project that we will be working on is an RFID door lock that will be
available to the general public at an affordable price. The goal of this project is
to create a more convenient way to unlock your door than the traditional key. In
the key’s place is an RFID tag that will unlock the door by proximity. However,
the improvements of this RFID door lock must outweigh the complications of
implementation. The list of customer needs (in the Requirements and
Specifications section) was constructed with that fundamental goal in mind. The
design consists of two components. The first component is the actual door lock
that must be installed in the doorframe. This will be controlled by a magnetic
lock and will need to be powered. The second component is a relatively small
module that you can install anywhere near the door. This module is responsible
for the RFID sensing. Chapter 2 goes over the requirements and specifications
determined for the RFID door lock. The requirements are inspired by surveys of
various groups as well as personal interest. The specifications are designed in
order to meet these requirements. These are created before
OBJECTIVES

 Prevent unauthorized access by requiring an RFID tag or card to unlock


doors, replacing or complementing traditional lock-and-key systems.

 Allow authorized users quick and convenient access without needing


physical keys.

 Enable administrators to add, modify, or revoke access permissions as


needed, potentially integrating with a database for centralized control.

 Log access attempts and successful entries, providing a record of who


entered and when.

 Adapt to different settings (e.g., offices, residences, industrial spaces) and


expand as needed to include multiple doors or access points.

 Consume minimal power, often supporting battery-operated or low-


power designs.
BLOCK DIAGRAM
CIRCUIT DIAGRAM

COMPONENTS REQUIRED
 ARDUINO UNO

 RFID CARD

 RFID READER

 SOLENOID LOCK

 5V RELAY

 16*2 LCD WITH i2c INTERFACE

 12V ADAPTOR

 JUMPER WIRES

 ARDUINO RFID rc522


ARDUINO UNO :

pular and versatile microcontroller board used for building a wide range of
electronics projects. It's part of the Arduino family of microcontroller boards,
and it has gained a large following due to its ease of use and open-source nature.

RFID READER:

An RFID (Radio Frequency Identification) reader is a device that uses radio


waves to communicate with RFID tags. These tags are small objects containing
embedded microchips and antennas, which store data that can be transmitted to
the RFID reader. The reader's role is to detect the RFID tags within its range,
retrieve the stored information, and send it to a connected system for
processing.

RFID CARD :
An RFID (Radio Frequency Identification) card is a type of smart card that uses
radio waves to communicate with a reader device for identification or data
transfer. It contains an embedded RFID chip and an antenna that allows it to
interact with RFID readers, typically without needing direct physical contact or
a line of sight.

SOLENOID LOCK :

A solenoid lock is a type of locking mechanism that uses an electromagnet


(solenoid) to control the locking and unlocking of a door, gate, or another
secured entry point. Unlike traditional mechanical locks, which use physical
keys or combination dials, solenoid locks are electronically controlled.

5V RELAY :
A 5V relay is an electrically operated switch that allows you to control high
voltage or high current devices with a low voltage (in this case, 5V). It uses an
electromagnet to open or close contacts, enabling the relay to control a circuit
that is separate from the control circuit.

16*2 LCD WITH I2C INTERFACE :

A 16x2 LCD with I2C Interface is a liquid crystal display (LCD) that can
display text in 2 rows and 16 columns, often used in electronic projects to show
information such as sensor data, status messages, or other outputs from a
microcontroller. The I2C interface (Inter-Integrated Circuit) simplifies the
connection and control of the LCD by reducing the number of required pins for
communication.

ADVANTAGES:-
Improving Convenience :

The RFID door lock system adopts a simple card-touch-open design, making it
convenient and fast to operate Enhancing Security

Enhancing Security :

Compared to traditional mechanical locks, RFID technology provides higher


security. Each RFID key card orfob contains a unique identification code,
making it harder to copy or forge

DISADVATAGES:-

1.Security Vulnerabilities

Cloning Risks : RFID cards or tags can be cloned using relativel inexpensive
devices, compromising security.

Signal Interception : Unauthorized access can occur through signal


interception, especially with low-frequency RFID systems.

Relay Attacks : Criminals can extend the range of an RFID signal to trick the
system into granting access.

2. Power Dependency

Most RFID locks rely on electricity or batteries. A power failure or depleted


batteries can render the lock inoperable unless there's a backup system, such as
a physical key.
APPLICATION :-

 Residential Buildings :

Homeowners can replace traditional locks with RFID-enabled door systems


for more secure and convenient access. Families can use key fobs or cards
to enter the home.

 Offices :

Many businesses use RFID locks for securing their premises. Employees can
use RFID cards to access restricted areas, offices, or servers.

 Hotels :

Guests can use RFID key cards to unlock hotel room doors. This also
enhances guest experience as it reduces the risk of losing physical keys.

 Educational Institutions :

Schools and universities can implement RFID-based door locks in


dormitories, classrooms, and labs to manage access control effectively.

 Industrial and Government Buildings :

Sensitive areas in factories or government buildings may require higher


levels of security. RFID locks can control access based on personnel roles .
EXPECTED OUTCOMES :-

 Enhanced Security :
Access Control: The system will restrict access to authorized users only,
ensuring that only valid RFID tags can unlock the door.

 User-Friendly Experience :
Quick Unlocking: Users can unlock the door quickly by simply scanning
their RFID tags, providing convenience over traditional keys.

 Scalability :
Multiple User Management: The system can be easily scaled to
accommodate multiple RFID tags, allowing for the addition of new users
without significant redesign.

 Logging and Monitoring :


Access Logs: The system can maintain a log of all RFID scans, which can
be useful for monitoring who accessed the door and when.

 Integration with Other Systems :


Can be combined with alarms, surveillance cameras or ,building
management systems for enhanced security. Supports integration with
smartphone apps or biometric systems for multi-factor authentication.

 Cost-Effectiveness :
Reduces the costs associated with lost keys or f
uent rekeying of traditional locks. Long-term cost savings due to its
durability and minimal maintenance requirements.
WORKING :-

 Enrollment :

The first step is enrolling the RFID tags into the system. Each authorized person
is given an RFID tag, and their tag ID is stored in the database. Along with the
tag, access rights (like time restrictions or area restrictions) can be set.

 Access Request :

When an individual approaches the door, they hold their RFID tag near the
RFID reader.

 Data Transfer :

The reader sends the unique ID from the RFID tag to the control unit, which
checks the ID against the database.

 Verification :

If the ID is recognized as valid and the person is authorized to access the area,
the control unit sends a signal to the lock to release it.

 Lock Release :

The door is unlocked, and the individual can enter. If the ID is not recognized or
the person is not authorized, the lock remains engaged.
PROGRAMME CODE
CONCLUSION

The conclusion for an RFID-based door lock system can summarize the key
outcomes, benefits, and potential improvements of the project. Here's how a
conclusion might be structured:

The RFID-based door lock system effectively demonstrates the use of modern
RFID technology to enhance security and convenience. It leverages an RFID
reader and microcontroller to grant access only to authorized users carrying pre-
registered RFID tags.

Enhancing Security by incorporating encryption techniques or biometric


authentication as an additional layer. Integration with IoT platforms for
remote monitoring and control via smartphones. Expanding the system to
include multi- door control or logging access details for better traceability.

The RFID-based door lock system is a practical, efficient, and scalable solution
for access control, offering significant improvements over traditional locking
systems. With further advancements, this technology can become an integral
part of modern smart homes and security systems.

You might also like