0% found this document useful (0 votes)
18 views7 pages

Design and Construction of An Automatic Security System of A Door Using RFID Technology

The document presents the design and construction of an automatic security system for doors using RFID technology, aimed at enhancing access control and reducing costs. It outlines the components involved, including RFID tags, readers, microcontrollers, and DC gear motors, and discusses the system's working principle and experimental setup. The proposed system is intended to provide a reliable and low-cost solution for secure access control in various applications.

Uploaded by

gillegocr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views7 pages

Design and Construction of An Automatic Security System of A Door Using RFID Technology

The document presents the design and construction of an automatic security system for doors using RFID technology, aimed at enhancing access control and reducing costs. It outlines the components involved, including RFID tags, readers, microcontrollers, and DC gear motors, and discusses the system's working principle and experimental setup. The proposed system is intended to provide a reliable and low-cost solution for secure access control in various applications.

Uploaded by

gillegocr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

International Journal of Scientific & Engineering Research Volume 9, Issue 9, September-2018 1067

ISSN 2229-5518

Design and Construction of an Automatic


Security System of a Door Using RFID
Technology
Syed Mamun R Rasid, Fazlur Rashid, Md. Ali Ahsan Sabri, Md. Rakibul Islam

Abstract— Access control is the process of verifying a user's claimed identity and giving or denying the access. The aim of the proposed system is to
construct a secure access control system to control the entry of various items through a door or a passage using RFID technology. Radio Frequency
Identification (RFID) systems will become pervasive in our daily lives due to their low cost and easy to use characteristics. At the very simplest level,
Radio Frequency Identification (RFID) technologies allow the transmission of a unique serial number wirelessly, using radio waves. The two key parts of
the system that are needed to do this are the RFID 'tag' and the 'Reader'. The proposed system is an automatic identification and authentication system
which can be deployed at the doors of the building to authenticate authorized people. The proposed system aims to develop a very low cost authentica-
tion system based on the low cost components than those which are already available in the market. This approach not only reduces the cost but also
enhances the reliability and ease of maintenance of the authentication system. The flexibility of the proposed access control system makes itself suitable
for various applications.

Index Terms— RFID reader, RFID tag, Microcontroller, Security System, and Automation.

——————————  ——————————

IJSER
1 INTRODUCTION

T he significant problems in the present society are robbery,


crime and theft that increasing [1][2]. This raises the access
control system issue. Any system that controls the en-
gy. RFID is a technology that helps to identify the animate or
inanimate through radio waves [5]. A properly selected securi-
ty system can overcome these problems and can be integrated
trance and exit to those who have been authorized may be with other systems to provide a more rounded overall security
called an access control system. solution [6].
The most common method of security which all of us are Numerous technology have been used regarding recurity
familiar with is the traditional lock and key arrangement [3]. It system by the lot of researchers. The use of RFID have been
is fine for small applications but has a number of pitfalls, es- already used in several applications. For example, In August
pecially in application where there is a large number of user or 2004, V.NagaLakshmi et al. from department of computer sci-
common door. There are several options to replace the tradi- ence from different institute in India proposed a security
tional method as a security system of a door. Firstly, the mag- mechanism for library management system using low cost
netic access card may be thought of as an electronic "key". RFID tags [7]. The information contained on microchips in the
Each access card is uniquely encoded. But it is costly as com- tags affixed to library materials was read using radio frequen-
pared with the economic condition in Bangladesh. Secondly, cy technology, regardless of item orientation or alignment. A
Access control keypads are devices which may be used in ad- voice recognition security system [8] is studied by the
dition to or in place of card readers. The keypad requires that Xiaowen Lu andShihjia Lee in 2006. The function of this
a person desiring to gain access enter a correct numeric code. speech recognition security system was to have a system that
Where access control keypads are used in place of card read- would only unlock upon recognizing a voice password spoken
ers, only a correct code is required to gain entry. This system is by the administrator or password holder. Md. Helmi Al
also known as barcode system. But, RFID (Radio Frequency Syukran Bin Abdul Malik from Universiti Teknologi Malaysia
Identification), one of the promising technologies, that has proposed an automatic door lock system in 2008 [9]. This pro-
been widely applied into the access control and security sys- ject was concentrated at the short messaging system (SMS) in
tems [4]. RFID is a leading automatic identification technolo- order to open the door. The SMS signal coming from the mo-
————————————————
bile hand phone need to be identified in order to connect with
the microcontroller. In December 2010, Muhammad Naveed et
• Syed Mamun R Rasid is an Assistant Professor in the department of Me-
chanical Engineering in Rajshahi University of Engineering & Technology, al. from Department of Electrical Engineering, University of
Bangladesh, PH- +8801728924028. E-mail: [email protected]. Engineering and Technology, Peshawar, Pakistan, proposed
• Fazlur Rashid is a Lecturer in the department of Mechanical Engineering Reliable and Low Cost RFID Based Authentication System for
in Rajshahi University of Engineering & Technology, Bangladesh, PH-
+8801755711258. E-mail: [email protected].
Large Scale Deployment [10]. The two main tasks of their
• Md. Ali Ahsan Sabri and Md. Rakibul Islam graduated from the depart- reader circuit, besides the PC interfacing and database log-
ment of Mechanical Engineering in Rajshahi University of Engineering & ging, was to create a large amplitude carrier signal which
Technology, Bangladesh. would power up the RFID tags present in proximity of the
reader and to receive and interpret the modulated response. In
IJSER © 2018
http://www.ijser.org
International Journal of Scientific & Engineering Research Volume 9, Issue 9, September-2018 1068
ISSN 2229-5518

August 2010, Gyanendra K Verma et al. from Indian Institute RFID module has some special features which are given in the
of Information Technology proposed a digital security system following:
with door lock system using RFID technology [11]. They pro- • Typical operating distance in Read/Write mode up to
posed a security system contains door locking system using 50 mm depending on the antenna size and tuning.
passive type of RFID tag. M. A. Meor Said et al. constructed a • FIFO buffer handles 64 byte send and receive.
RFID based Wireless Security Car in 2012 [1]. By applies the • Flexible interrupt modes.
RFID technology into the security car, it could avoid from be- • Hard reset with low power function.
ing invaded because this technology was very secure because • Power-down by software mode.
the car engine only could start after tagging the Passive RFID • Programmable timer.
tag on the RFID reader and without tagging, the car engine • Internal oscillator for connection to 27.12 MHz quartz
could not be start. This paper proposed Microcontroller based crystal.
access control using RFID is a combination of electrical, elec- • 2.5 V to 3.3 V power supply
tronics, and mechanical technology. The purpose of using mi- • CRC coprocessor
crocontroller is because it is cheaper and further upgrading is • Programmable I/O pins
possible without changing the processing of the chip.
The aim of our research is to design and construct the secu- 2.2 RFID tag
rity system of a door using RFID technology. Also, this re- A radio-frequency identification system uses tags, or labels
search aims to measure the performance of the proposed sys- attached to the objects to be identified. The RFID tag includes
tem and compare the cost of the constructed system with the a small RF transmitter and receiver. An RFID reader transmits
existing security system. an encoded radio signal to interrogate the tag. The tag receives
the message and responds with its identification information.
There are two main components present in the RFID tag. First-
2 MAJOR COMPONENTS USED IN THE ly, a small silicon chip or integrated circuit which contains a

IJSER
PROPOSED SYSTEM unique identification number (ID). Secondly, an antenna that
The major components of the proposed security system us- can send and receive radio waves. These two components can
ing RFID technology are RFID reader, RFID tag, microcontrol- be tiny: the antenna consists of a flat, metallic conductive coil
ler, DC gear motor, LCD display etc. The brief description and rather than a protruding FM-style aerial, and the chip is poten-
some special features are described in the following: tially less than half a millimeter. There are two main types of
tags: passive and active. Passive tags are currently the most
2.1 RFID Reader widely deployed as they are the cheapest to produce. Passive
An RFID reader is a device that is used to interrogate an tags is used in this project which is available in our country.
RFID tag. RFID readers communicate with tags through an RF
channel to obtain identifying information [1]. RF module acts
as both a transmitter and receiver of radio frequency signals.
The reader has an antenna that emits radio waves; the tag re-
sponds by sending back its signals. The reader is a handheld
or fixed unit that can interrogate nearby RFID tags and obtain
their ID numbers using radio frequency (RF) communication
(i.e. the process does not require contact). When a passive tag
is within range of a reader, the tag’s antenna absorbs the ener-
gy being emitted from the reader, directs the energy to ‘fire
up’ the integrated circuit on the tag, which then uses the ener- Fig. 2 RFID tag
gy to beam back the ID number and any other associated in- 2.3 Microcontroller
formation.
The microcontroller is the main controlling element which
controls the operation of this security access control system.
Microcontroller is a device which includes a microprocessor,
memory and IO lines on a single chip [12]. The microcontroller
reads the unique identification number inside the tag. The
assembly language programs written in the microcontroller
receives input signal, manipulates it, and provides necessary
control signals to actuator.

Fig. 1 RFID Reader Module RC522


Fig. 3 ATmega48 microcontroller
IJSER © 2018
http://www.ijser.org
International Journal of Scientific & Engineering Research Volume 9, Issue 9, September-2018 1069
ISSN 2229-5518

ATmega48 microcontroller is used in this project, since it con-


tain reasonable amount of ROM and RAM. There is no need of
adding further memory for our system. Also it has provision
for adding extra memory for further expansion. The main fea-
tures of ATmega48 are mentioned below.
• 4 Kbytes of in system reprogrammable memory.
• 256 bytes EEPROM
• 512 Kbytes internal SRAM
• Two 8-bit timer/counters with separate prescaler and Fig. 5 LCD Display
compare mode
• 23 programmable I/O lines contrast. The main drawbacks of LCDs are additional re-
• Operating voltage: 2.7V - 5.5V quirement of light source, a limited temperature range of op-
• Speed grade: 0 - 10MHz @ 2.7V - 5.5V eration (between 0 and 60° C), low reliability, short operating
life, and poor visibility in low ambient lighting, slow speed
2.4 DC Gear Motor and the need for an ac drive.
In this project, DC gear motor is used as actuator in the
proposed security system. A door along with locking system is
driven by DC Gear motor. DC Gear motor acts as actuator, 3 WORKING PRINCIPLE OF THE PROPOSED SYSTEM
which is able to open and close the door in real-time. The The Schematic diagram of the working principle of the pro-
RFID reader detects tag in real-time and open door automati- posed system shown in Fig. 6. Firstly, RFID reader emits radio
cally and closes it again after a specific time interval. DC Gear waves to obtain identifying information from the tag. The
motors from Precision Microdrives not only offer the variable RFID reader retrieve the information contains by tag as it
speed and torque control required in each of these applica- come in the range of 50 millimeters from reader. Secondly, the

IJSER
tions. Some key features of the DC motor we used are men- tag responds by sending back its signals to the reader which is
tioned below. now acting as receiver. Then, RFID Reader converts radio
• Body Diameter: 12 mm waves returned from the RFID tag into a form that can be
• Body Length: 25 mm passed on to microcontrollers, which can make use of it. Mi-
• Gear Ratio: 29.5:1 crocontroller then verifies the tag information with the infor-
• Gearhead Type: Spur mation that was programmed in it. Finally, once the tag in-
• Typical N/L Current: 23 mA formation verified, the system generates a control signal
• Typical PowerConsumption: 925 mW through parallel port which controls the opening and closing
• Rated Voltage: 12 V of door by means of actuator (DC Gear motor). The time gap
• Rated Torque: 5 mNm between the opening and automatically closing the gate is four
• Min. Rated Speed: 470 rpm seconds.

Fig. 4 DC gear motor

2.5 LCD Display


Definition of LCD come from the name “Liquid Crystal” it-
self. It is actually a combination of two states of matter – the
solid and the liquid. They have both the properties of solids
and liquids and maintain their respective states with respect to Fig. 6 Block diagram of the automatic security system of
another. Solids usually maintain their state unlike liquids who door
change their orientation and move everywhere in the particu-
lar liquid. The liquid-crystal display has the distinct advantage
of having low power consumption than the LED. It is typically
of the order of microwatts for the display in comparison to the
some order of milli watts for LEDs. Low power consumption
requirement has made it compatible with MOS integrated
logic circuit. Its other advantages are its low cost, and good
IJSER © 2018
http://www.ijser.org
International Journal of Scientific & Engineering Research Volume 9, Issue 9, September-2018 1070
ISSN 2229-5518

4 DESIGN OF THE PROPOSED SECURITY SYSTEM

4.1 RFID Circuit Diagram


Figure 7 shows the circuit diagram for RFID module circuit
board. The circuit contains power source connection to deliver
power to microcontroller chip. The circuit also contains RFID
reader port connection and pin combination for motor driver
circuit board. The circuit has LEDs, push button connection,
resistors, capacitors, LCD display board connection with mi-
crocontroller chip etc.

IJSER
Fig. 8 Motor Driver Circuit Diagram

Fig. 7 Circuit diagram for RFID module.

4.2 Motor Driver Circuit Diagram


The motor driver circuit diagram shown in Fig. 8 which has
power source connection, dc motor is connected directly to
motor driver circuit, the diagram also has capacitors, resistors,
pin combination for RFID circuit etc. Also, Fig. 9 shows the
combined circuit which contains all of the components of the
circuit combination.

Fig. 9 Combined circuit diagram of the proposed system


IJSER © 2018
http://www.ijser.org
International Journal of Scientific & Engineering Research Volume 9, Issue 9, September-2018 1071
ISSN 2229-5518

5 EXPERIMENT 5.1.3 Construction of Door


The construction of a prototype door has been done as re-
5.1 Experimental setup quired. The DC motor driver is connected to the door. The
mechanism is when the microcontroller receives the correct
5.1.1 Construction of RC522 PCB (Printed Circuit identification number from the tag it sends the programmed
Board) signal to actuator DC motor. Then the DC motor drives to
Fig. 10 shows the main board of RFID module RC522. The open door and closes automatically after a while. The proto-
display is placed on the board as shown in this figure. The type of a door is shown in Fig. 12.
blue wire from the display is connected with a regulator that
regulates the contrast of the LCD display. At the upper left
corner there are four pins to connect with the motor driver
PCB. The black pin-port at the upper side of the board is the
RFID reader port. Here the reader is placed according to the
pin combination.

PCB
IJSER
Fig. 10 RC522 Printed Circuit Board

5.1.2 Connection between RFID PCB and Motor Driver

The Fig. 11 shows the connection between the RFID main


board and the motor driver circuit board. In the picture at the
upper right corner the small black board is the motor driver
PCB. There are two connections between the both PCBs. The
two pin wire is the power connection and three-pin wire con-
necting the PCBs makes the data connection for microcontrol-
Fig. 12 Construction of Prototype door

5.1.4 Complete setup of the proposed system


The total arrangement of the proposed system is made by
connecting the two PCBs with the door by means of DC mo-
tor. The complete arrangement of the components of our pro-
posed system is shown in Fig. 13.

ler. The power source is the battery which is directly connect-


ed with motor driver circuit. The gear DC motor is connected
also with the motor driver PCB and it is to use as actuator. The
microcontroller placed on the RFID circuit sends the signal to
run the motor. After receiving signals from microcontroller the
motor driver runs to open or close the door.

Fig.11 Connection between RFID PCB and motor driver Fig. 13 Complete setup of the propsed system

IJSER © 2018
http://www.ijser.org
International Journal of Scientific & Engineering Research Volume 9, Issue 9, September-2018 1072
ISSN 2229-5518

5.2 Experimental Results The Fig. 16 shows the opening of door for both two tags and
after four seconds of opening the door it has been automatical-
5.2.1 Opening and Closing Door ly closed. The time gap has been set in program as four se-
There are two types of RFID tags used in this project. One is conds so that the command of microcontroller for opening and
blue tag and the other one is white in color. Blue tags is named closing is operated between four seconds.
them as Blue and White correspondingly and this has been set The status of the proposed system door for different tag dis-
in the program in microcontroller. When the blue tag is held tance is examined which is shown in Table 1 and success rate
within 50mm of the RFID reader then the gate has been for the door opening under the designed reader range is
opened showing in the LCD display “Hello Blue, opening shown in Table 2.
gate” which is shown in Fig. 14 and 16. For the same action of
white tag, gate has been opened and LCD display has showed Table 1. The status of door with various tag distance
“Hello White, opening gate” which is shown in Fig. 15 and 17. Distance between RFID reader and tag Status of door
7cm Not opening
6cm Not opening
5cm Opening
4cm Opening

Table 2. Success rate of door opening

Trial Response from door after showing tag


within range(5cm)
1 Yes
2 Yes

IJSER
Fig. 14 Diplay messeage for white tag
3 Yes
4 Yes

6. CONCLUSIONS
The design and construction of the propoed security system is
successfully implemented using RFID technology. One of the
objectives of this project was to compare the cost of the pro-
posed system with the existing access control system. RFID
based accesss control system which is constructed costs only
about 2000 Tk or about 30$ which is very much cheaper then
the existing security system which costs about 100-400$.
Therefore proposed security system achieved an impressive
Fig. 15 Display message for blue tag
range of 5cm using passive RFID tags while keeping the cost
of the complete system under 30$.

Fig. 16 Door opening on showing RFID tags

IJSER © 2018
http://www.ijser.org
International Journal of Scientific & Engineering Research Volume 9, Issue 9, September-2018 1073
ISSN 2229-5518

References

[1] W. N. W. A. K. M. A. Meor Said, M.A.Othman, M.M.Ismail,


H.A.Sulaiman, M.H.Misran, “Wireless Security Car Using RFID Sys
temtle,” Int. J. Eng. Innov. Technol., vol. 2, no. 1, pp. 302–305, 2012.
[2] X. G. X. Gao, Z. X. Z. Xiang, H. W. H. Wang, J. S. J. Shen, J. H. J.
Huang, and S. S. S. Song, “An approach to security and privacy of
RFID system for supply chain,” IEEE Int. Conf. E-Commerce Technolo-
gy, Dyn. E-bus., 2004.
[3] N. A. Haddad, “Critical review, assessment and investigation of
ancient technology evolution of door locking mechanisms in S.E.
Mediterranean,” Mediterranean Archaeology and Archaeometry. 2016.
[4] Z. Pala and N. Inanc, “Smart parking applications using RFID tech-
nology,” RFID Eurasia, 2007 1st Annu. 2007.
[5] Y.-C. Huang, “Secure Access Control Scheme of RFID System Appli-
cation,” in Fifth International Conference on Information Assurance and
Security, 2009.
[6] S. Li, J. K. Visich, B. M. Khumawala, and C. Zhang, “Radio frequency
identification technology: Applications, technical challenges and
strategies,” Sens. Rev., 2006.
[7] D. L. B. V.NagaLakshmi , I.Rameshbabu, “A Security Mechanism for
library management system using low cost RFID tags,” Syst. Cybern.
INFORMATICS, vol. 5, no. 1, pp. 92–96.

IJSER
[8] S. L. Xiaowen Lu, “Voice Recognition Security System,” 2006.
[9] M. H. A. B. A. MALIK, “Automatic Door Lock System,” 2008.
[10] M. Naveed, W. Habib, U. Masud, U. Ullah, and G. Ahmad, “Reliable
and low cost RFID based authentication system for large scale de-
ployment,” Int. J. Netw. Secur. 2012.
[11] G. K. Verma and P. Tripathi, “A Digital Security System with Door
Lock System Using RFID Technology,” Int. J. Comput. Appl. IJCA,
2010.
[12] N. Majgaonkar, R. Hodekar, and P. Bandagale, “Automatic Door
Locking System,” Int. J. Eng. Dev. Res., 2016.

IJSER © 2018
http://www.ijser.org

You might also like