Design and Construction of An Automatic Security System of A Door Using RFID Technology
Design and Construction of An Automatic Security System of A Door Using RFID Technology
ISSN 2229-5518
Abstract— Access control is the process of verifying a user's claimed identity and giving or denying the access. The aim of the proposed system is to
construct a secure access control system to control the entry of various items through a door or a passage using RFID technology. Radio Frequency
Identification (RFID) systems will become pervasive in our daily lives due to their low cost and easy to use characteristics. At the very simplest level,
Radio Frequency Identification (RFID) technologies allow the transmission of a unique serial number wirelessly, using radio waves. The two key parts of
the system that are needed to do this are the RFID 'tag' and the 'Reader'. The proposed system is an automatic identification and authentication system
which can be deployed at the doors of the building to authenticate authorized people. The proposed system aims to develop a very low cost authentica-
tion system based on the low cost components than those which are already available in the market. This approach not only reduces the cost but also
enhances the reliability and ease of maintenance of the authentication system. The flexibility of the proposed access control system makes itself suitable
for various applications.
Index Terms— RFID reader, RFID tag, Microcontroller, Security System, and Automation.
—————————— ——————————
IJSER
1 INTRODUCTION
August 2010, Gyanendra K Verma et al. from Indian Institute RFID module has some special features which are given in the
of Information Technology proposed a digital security system following:
with door lock system using RFID technology [11]. They pro- • Typical operating distance in Read/Write mode up to
posed a security system contains door locking system using 50 mm depending on the antenna size and tuning.
passive type of RFID tag. M. A. Meor Said et al. constructed a • FIFO buffer handles 64 byte send and receive.
RFID based Wireless Security Car in 2012 [1]. By applies the • Flexible interrupt modes.
RFID technology into the security car, it could avoid from be- • Hard reset with low power function.
ing invaded because this technology was very secure because • Power-down by software mode.
the car engine only could start after tagging the Passive RFID • Programmable timer.
tag on the RFID reader and without tagging, the car engine • Internal oscillator for connection to 27.12 MHz quartz
could not be start. This paper proposed Microcontroller based crystal.
access control using RFID is a combination of electrical, elec- • 2.5 V to 3.3 V power supply
tronics, and mechanical technology. The purpose of using mi- • CRC coprocessor
crocontroller is because it is cheaper and further upgrading is • Programmable I/O pins
possible without changing the processing of the chip.
The aim of our research is to design and construct the secu- 2.2 RFID tag
rity system of a door using RFID technology. Also, this re- A radio-frequency identification system uses tags, or labels
search aims to measure the performance of the proposed sys- attached to the objects to be identified. The RFID tag includes
tem and compare the cost of the constructed system with the a small RF transmitter and receiver. An RFID reader transmits
existing security system. an encoded radio signal to interrogate the tag. The tag receives
the message and responds with its identification information.
There are two main components present in the RFID tag. First-
2 MAJOR COMPONENTS USED IN THE ly, a small silicon chip or integrated circuit which contains a
IJSER
PROPOSED SYSTEM unique identification number (ID). Secondly, an antenna that
The major components of the proposed security system us- can send and receive radio waves. These two components can
ing RFID technology are RFID reader, RFID tag, microcontrol- be tiny: the antenna consists of a flat, metallic conductive coil
ler, DC gear motor, LCD display etc. The brief description and rather than a protruding FM-style aerial, and the chip is poten-
some special features are described in the following: tially less than half a millimeter. There are two main types of
tags: passive and active. Passive tags are currently the most
2.1 RFID Reader widely deployed as they are the cheapest to produce. Passive
An RFID reader is a device that is used to interrogate an tags is used in this project which is available in our country.
RFID tag. RFID readers communicate with tags through an RF
channel to obtain identifying information [1]. RF module acts
as both a transmitter and receiver of radio frequency signals.
The reader has an antenna that emits radio waves; the tag re-
sponds by sending back its signals. The reader is a handheld
or fixed unit that can interrogate nearby RFID tags and obtain
their ID numbers using radio frequency (RF) communication
(i.e. the process does not require contact). When a passive tag
is within range of a reader, the tag’s antenna absorbs the ener-
gy being emitted from the reader, directs the energy to ‘fire
up’ the integrated circuit on the tag, which then uses the ener- Fig. 2 RFID tag
gy to beam back the ID number and any other associated in- 2.3 Microcontroller
formation.
The microcontroller is the main controlling element which
controls the operation of this security access control system.
Microcontroller is a device which includes a microprocessor,
memory and IO lines on a single chip [12]. The microcontroller
reads the unique identification number inside the tag. The
assembly language programs written in the microcontroller
receives input signal, manipulates it, and provides necessary
control signals to actuator.
IJSER
tions. Some key features of the DC motor we used are men- tag responds by sending back its signals to the reader which is
tioned below. now acting as receiver. Then, RFID Reader converts radio
• Body Diameter: 12 mm waves returned from the RFID tag into a form that can be
• Body Length: 25 mm passed on to microcontrollers, which can make use of it. Mi-
• Gear Ratio: 29.5:1 crocontroller then verifies the tag information with the infor-
• Gearhead Type: Spur mation that was programmed in it. Finally, once the tag in-
• Typical N/L Current: 23 mA formation verified, the system generates a control signal
• Typical PowerConsumption: 925 mW through parallel port which controls the opening and closing
• Rated Voltage: 12 V of door by means of actuator (DC Gear motor). The time gap
• Rated Torque: 5 mNm between the opening and automatically closing the gate is four
• Min. Rated Speed: 470 rpm seconds.
IJSER
Fig. 8 Motor Driver Circuit Diagram
PCB
IJSER
Fig. 10 RC522 Printed Circuit Board
Fig.11 Connection between RFID PCB and motor driver Fig. 13 Complete setup of the propsed system
IJSER © 2018
http://www.ijser.org
International Journal of Scientific & Engineering Research Volume 9, Issue 9, September-2018 1072
ISSN 2229-5518
5.2 Experimental Results The Fig. 16 shows the opening of door for both two tags and
after four seconds of opening the door it has been automatical-
5.2.1 Opening and Closing Door ly closed. The time gap has been set in program as four se-
There are two types of RFID tags used in this project. One is conds so that the command of microcontroller for opening and
blue tag and the other one is white in color. Blue tags is named closing is operated between four seconds.
them as Blue and White correspondingly and this has been set The status of the proposed system door for different tag dis-
in the program in microcontroller. When the blue tag is held tance is examined which is shown in Table 1 and success rate
within 50mm of the RFID reader then the gate has been for the door opening under the designed reader range is
opened showing in the LCD display “Hello Blue, opening shown in Table 2.
gate” which is shown in Fig. 14 and 16. For the same action of
white tag, gate has been opened and LCD display has showed Table 1. The status of door with various tag distance
“Hello White, opening gate” which is shown in Fig. 15 and 17. Distance between RFID reader and tag Status of door
7cm Not opening
6cm Not opening
5cm Opening
4cm Opening
IJSER
Fig. 14 Diplay messeage for white tag
3 Yes
4 Yes
6. CONCLUSIONS
The design and construction of the propoed security system is
successfully implemented using RFID technology. One of the
objectives of this project was to compare the cost of the pro-
posed system with the existing access control system. RFID
based accesss control system which is constructed costs only
about 2000 Tk or about 30$ which is very much cheaper then
the existing security system which costs about 100-400$.
Therefore proposed security system achieved an impressive
Fig. 15 Display message for blue tag
range of 5cm using passive RFID tags while keeping the cost
of the complete system under 30$.
IJSER © 2018
http://www.ijser.org
International Journal of Scientific & Engineering Research Volume 9, Issue 9, September-2018 1073
ISSN 2229-5518
References
IJSER
[8] S. L. Xiaowen Lu, “Voice Recognition Security System,” 2006.
[9] M. H. A. B. A. MALIK, “Automatic Door Lock System,” 2008.
[10] M. Naveed, W. Habib, U. Masud, U. Ullah, and G. Ahmad, “Reliable
and low cost RFID based authentication system for large scale de-
ployment,” Int. J. Netw. Secur. 2012.
[11] G. K. Verma and P. Tripathi, “A Digital Security System with Door
Lock System Using RFID Technology,” Int. J. Comput. Appl. IJCA,
2010.
[12] N. Majgaonkar, R. Hodekar, and P. Bandagale, “Automatic Door
Locking System,” Int. J. Eng. Dev. Res., 2016.
IJSER © 2018
http://www.ijser.org