0% found this document useful (0 votes)
26 views31 pages

GRP 3

The document outlines a study on the implementation of an RFID-based door lock system using Arduino at Cielito Zamora Senior High School. It aims to assess the issues with the current manual door lock system, evaluate the proposed RFID solution's functionality, usability, reliability, and performance, and hypothesizes that the new system will enhance security and efficiency. The study also highlights the significance of the project for students, teachers, parents, and future researchers, while providing a detailed methodology for the system's development and testing.

Uploaded by

reymondgalpo0417
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views31 pages

GRP 3

The document outlines a study on the implementation of an RFID-based door lock system using Arduino at Cielito Zamora Senior High School. It aims to assess the issues with the current manual door lock system, evaluate the proposed RFID solution's functionality, usability, reliability, and performance, and hypothesizes that the new system will enhance security and efficiency. The study also highlights the significance of the project for students, teachers, parents, and future researchers, while providing a detailed methodology for the system's development and testing.

Uploaded by

reymondgalpo0417
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 31

CIELITO ZAMORA SENIOR HIGH SCHOOL 1

CHAPTER 1:
INTRODUCTION

BACKGROUND OF THE STUDY

Radio Frequency Identification (RFID) is a technology that uses electromagnetic


fields to automatically identify and track tags attached to objects. The system consists of
two main components: a Reader and a card reader. The reader emits radio waves and
receives signals from RFID tags, which respond with their unique identification
information stored on them. RFID is widely used in applications like inventory
management, access control, and secure authentication.

In an RFID-based door lock system, the technology is used to unlock doors


upon successful identification of an authorized RFID tag (typically an RFID card or key
fob). This type of system offers a modern, secure, and efficient method for controlling
access to restricted areas, as it eliminates the need for traditional keys and can track
access to the door.

Arduino is an open-source electronics platform based on simple software and


hardware. It is widely used in creating customization projects, including RFID systems
for access control. By using an Arduino micro-controller, an RFID reader can be
connected to a door lock mechanism, allowing for automated control of access through
RFID tags.

Radio Frequency Identification (RFID) technology is a revolutionary system that


utilizes electromagnetic fields to automatically identify and track objects through tags
that are attached to these objects. RFID tags store unique identification data that can be
wireless read by an RFID reader, enabling quick and accurate identification. This
technology has gained significant attention across various industries for its ability to
streamline processes such as inventory management, access control, asset tracking,
and authentication (Jiang, 2020).

Arduino, an open-source electronics platform, plays a significant role in the


development of such RFID-based systems. Arduino's simple programming environment
and easy-to-use hardware components make it an ideal choice for implementing RFID
solutions, including access control systems. By integrating an RFID reader with an
Arduino micro controller, developers can create customized and cost-effective systems
that not only control access through RFID tags but can also include additional features
such as logging access events, controlling door locks, or even integrating with other
security systems. Arduino’s flexibility allows for the design and prototyping of innovative
systems without requiring extensive technical expertise or high budgets, which is
particularly beneficial for DIY projects and small-scale installations (Brown & Green,
2021).

March 2025
CIELITO ZAMORA SENIOR HIGH SCHOOL 2

STATEMENT OF THE PROBLEM

This study aims to assess the issues associated with the manual door lock
system at Cielito Zamora Senior High School and evaluate the proposed door lock and
door reader system. Specifically, it seeks to:

1. What were the problems encountered with the manual door lock in Cielito
Zamora Senior High School?

2. How is the proposed door lock and door reader evaluated by the technical
respondents in terms of these criteria (Zimmerman, 1989)?

a. Functionality

b. Usability

c. Reliability

d. Performance

3. How is the proposed door lock and door reader evaluated by the non-
technical respondents in terms of these criteria (Zimmerman, 1989)?

HYPOTHESIS

The RFID-based Arduino door lock system is expected to offer enhanced


security, efficiency, and convenience compared to traditional locks by using unique
RFID tags for access. It is hypothesized to reduce unauthorized access and improve
user experience by eliminating physical keys. Additionally, the Arduino system is
anticipated to be more cost-effective and customizable than commercial alternatives,
while the inclusion of an LCD display and buzzer will provide clear feedback to users.
This system is believed to be highly reliable and suitable for environments with
moderate security needs such as Cielito Zamora SHS in Computer Laboratory.

SIGNIFICANCE OF THE STUDY

The following will benefit through our study of RFID Arduino door lock and door
reader. To students, teachers, parents and future researchers for them to be
aware to avoid losing important equipment. This study will be beneficial to the
following:

March 2025
CIELITO ZAMORA SENIOR HIGH SCHOOL 3

 Students – they can benefit from the study because they are provide with a faster
and more exciting in the interface of open and close door.

 Teachers – This study will help teachers to know the what are the impossible will
happen to their important things.

 Parents – the result of this study helps them establishing a device that they can
use to open and close door that can use in their home.

 Future Researchers – this serve as the reference to their studies and will help
them to improve their related project in the future that is related.

SCOPE AND DELIMITATIONS OF THE STUDY

This project involves designing a secure door lock system using an Arduino
micro-controller, incorporating password protection via a keypad and RFID access
control. The system will include a servo motor or electronic lock to manage the door's
security, with feedback provided through an LCD display and buzzer. The focus will be
on functionality testing for RFID and password authentication in a standalone, small-
scale system.

However, the project excludes advanced features such as biometric


authentication, networked control, and encryption. It will also not address physical
integration of the locking mechanism into the door, power backup solutions, or large-
scale deployment. The system will support a limited number of RFID tags and
passwords, with testing conducted in a controlled environment.

REVIEW OF RELATED LITERATURE AND STUDIES

Recent studies have focused on the development and testing of Arduino-based


access control systems, often incorporating RFID and password protection. For

March 2025
CIELITO ZAMORA SENIOR HIGH SCHOOL 4

instance, Ganesan et al. (2020) presented an RFID-based door lock system using
Arduino, demonstrating the feasibility of using low-cost hardware and open-source
software to create a secure, functional access control system.

Their system utilized an RFID reader for user identification and a servo motor to
control the locking mechanism, highlighting the ease of implementation and the ability to
integrate additional components, such as a keypad for added security.

Similarly, Sanchez et al. (2021) developed an Arduino-based lock system with


both password and RFID authentication, targeting small businesses and home security.
Their study showed how the hybrid approach improves security by requiring multiple
forms of verification before granting access.

The findings indicated that the system was effective in preventing unauthorized
entry while offering a straightforward user interface for both the RFID and keypad
components.

Bui et al. (2022) conducted research on security vulnerabilities in RFID and


password-based systems, emphasizing the importance of system reliability and ease of
use. Their study analyzed how attacks on RFID systems, such as tag cloning, could be
mitigated by combining RFID with additional layers of security, such as passwords or
even biometric features.

The authors concluded that although these systems are not entirely foolproof,
they offer a reasonable level of security for small-scale, standalone applications.

A similar project by Patil et al. (2019) focused on an Arduino-controlled electronic


lock system incorporating both RFID and password authentication. Their system was
designed to be simple, cost-effective, and easily customizable for various security
needs. The system was rigorously tested for reliability and accuracy, ensuring that only
authorized users could access the secured area.

The study concluded that such systems are practical solutions for everyday
access control applications, especially in home and office environments.

Additionally, a recent study by Kordov and Bilyal (2024) presented an access


control system constructed with an Arduino Uno microcontroller and RFID technology
for user identification. The system incorporated a web-based interface for user
registration, access restriction, and monitoring by recording data logs into a database.
This approach highlights the integration of web technologies with Arduino-based
systems to enhance functionality and user management.

According to Nguyen et al. (2019), hybrid systems integrating both RFID and
password-based authentication offer a balanced approach between usability and

March 2025
CIELITO ZAMORA SENIOR HIGH SCHOOL 5

security, making them suitable for environments where both convenience and protection
are necessary.

Despite these challenges, password-based systems remain an effective solution


for securing small-scale, low-risk areas. To mitigate the risks associated with password
security, hybrid systems that combine RFID technology with passwords have been
proposed, as they provide an additional layer of protection (Nguyen et al., 2019). This
combination has been shown to offer an ideal trade-off between user convenience and
system security.

Bui et al. (2022) discussed security vulnerabilities in RFID systems, particularly


the threat of tag cloning. Their study emphasized that while RFID systems alone offer
reasonable security, additional layers, such as passwords or biometric features, can
mitigate these risks and enhance system reliability. Such multi-layered security
approaches are becoming increasingly common in new access control designs,
reflecting a growing trend toward integrating various forms of authentication to
safeguard sensitive areas.

THEORETICAL FRAMEWORK

The RFID Theory explains how RFID technology uses electromagnetic fields to
communicate between RFID tags and readers, allowing for automatic identification and
access control. This method enhances security by offering faster and more reliable
access than traditional systems.

The Access Control Theory focuses on the regulation of entry to restricted


areas, with RFID-based systems typically utilizing Role-Based Access Control (RBAC),
where access is granted based on predefined roles, ensuring that only authorized
individuals can enter specific areas.

The Automation and Microcontroller Integration Theory highlights the role of


microcontrollers, such as Arduino, in automating processes. In RFID access control
systems, Arduino processes the RFID data, controls the lock mechanism, and
automates security tasks, offering a customization and cost-effective solution.

Lastly, the System Integration and Security Theory underscores the


importance of integrating various subsystems (RFID reader, micro controller, lock) to
create a seamless and secure system. It also emphasizes the need for strong security
measures, such as encryption, to prevent unauthorized access.

Together, these theories provide a comprehensive understanding of how RFID


technology, integrated with Arduino and access control strategies, can be used to
develop a secure and efficient access control system.

March 2025
CIELITO ZAMORA SENIOR HIGH SCHOOL 6

RFID Arduino Door Lock System include the type of RFID tags used,
authentication method (RFID-only, password-only), Arduino code/software logic, RFID
reader power, environmental conditions, distance between the reader and tag, and
password complexity.

These variables are adjusted or manipulate


d to observe their effects on the variables, which are the access granting success
rate, security breach rate, response time, system reliability, energy consumption, and
user interaction satisfaction.

CONCEPTUAL FRAMEWORK

Input Process Output


 Survey Questionnaire. (Respondents
- RFID tag/keycard
Acceptance)
- Password input  Statistical Data Analysis.

 Evaluation of Teacher
• Sensory Attributes
and Student in Terms of
(Functionality,
- Environmental conditions Functionality, Usability, Usability, Reliability,
Reliability, Performance Performance)

- Distance between RFID reader


and tag

Figure 1: Input represents the key elements that influence the RFID-based
access control system. These include the RFID Tag/Keycard, which stores unique
identification data; Password Input for added user authentication; Environmental
Conditions, such as lighting or physical barriers that can impact system performance;
and the Distance Between RFID Reader and Tag, which affects the system's
efficiency in reading the tag. These inputs are crucial in determining the system's
functionality and user experience.

Figure 2: Process illustrates the steps involved in analyzing the inputs and
assessing the RFID-based access control system. It includes the use of a Survey
Questionnaire to gather user feedback on the system's effectiveness and acceptance.

March 2025
CIELITO ZAMORA SENIOR HIGH SCHOOL 7

The collected data is then subjected to Statistical Data Analysis to identify trends and
evaluate how well the system performs in real-world scenarios, focusing on key aspects
such as functionality, usability, reliability, and performance. This process helps in
understanding user experiences and system performance.

Figure 3: Output represents the results and outcomes derived from the process
in the RFID-based access control system. The key outputs include Respondents
Acceptance, which measures how well users accept the system based on their
experiences. Another output is the Evaluation of Teacher and Student, assessing the
system’s effectiveness from both educator and student perspectives. Finally, the
Sensory Attributes—including Functionality, Usability, Reliability, and
Performance—are evaluated to determine how well the system performs in various
conditions and how it meets user expectations. These outputs provide valuable insights
into the system's success and areas for improvement.

DEFINITION OF TERMS

-Solenoid Lock: A type of electronic lock that uses a solenoid to control the
locking mechanism. It is controlled by the Arduino based on RFID authentication.

-Breadboard: A construction base for prototyping electronics. It allows for testing


and connecting various electronic components, like the RFID reader, to the Arduino
without soldering.

-Programming Language: Arduino projects use C++ programming language to


define the actions for each component (such as reading the RFID tag and
controlling the lock).

- Radio-frequency identification uses electromagnetic fields to automatically


identify and track tags attached to objects. An RFID system consists of a tiny
radio transponder called a tag, a radio receiver, and a transmitter.

-Microcontroller: A compact integrated circuit designed to govern a specific


operation in an embedded system. Arduino is the microcontroller used here to control
the locking mechanism.

-Authentication: The process of verifying the identity of a person or device. Here,


it involves checking the RFID tag against a list of authorized tags.

March 2025
CIELITO ZAMORA SENIOR HIGH SCHOOL 8

CHAPTER II
METHODOLOGY

RESEARCH DESIGN

This study follows a quantitative and descriptive research design. The primary
objective is to explore and quantify respondents' knowledge, opinions, and experiences
with RFID Arduino door locks and readers.The descriptive design is used to summarize
data and identify patterns or trends in the participants' responses.

POPULATION AND SAMPLING TECHNIQUES

A random sampling method will be employed to ensure that each individual in the
population has an equal chance of being selected. This will minimize bias and improve
the representatives of the sample. The exact number of participants will depend on the
resources available, but a target sample of 30 respondents will be aimed for to ensure
reliable data.

MATERIALS AND PROCEDURES

March 2025
CIELITO ZAMORA SENIOR HIGH SCHOOL 9

ARDUINO BOARD

The central controller for processing the RFID


data and controlling the lock mechanism.

mfrc522 rfid module/card reader


- To read the RFID tags/cards and get
their unique UID for verification.
- Used by authorized users to gain
access to the door lock system.

Serve motor
-to control the physical lock
mechanism, rotating it to
lock/unlock the door.

Solenoid Lock
An alternative to the servo
motor for locking/unlocking via
an electromagnetic field.

Relay Module
-To control the solenoid lock's
activation using Arduino’s
digital pins.

March 2025
CIELITO ZAMORA SENIOR HIGH SCHOOL 10

Lcd Display
-To show status messages like
"Access Granted" or "Access
Denied."

Wires and Jumper Cables


- For connecting all the
components.

Power Supply
- To power the Arduino and the
components (servo, relay, RFID
reader).

Breadboard
- For prototyping connections.

Procedure to Build the RFID Door Lock System:


1. Setting Up the Hardware:
a. Wiring the MFRC522 RFID Module:
 VCC pin → 5V on Arduino (or 3.3V depending on your module).
 GND pin → GND on Arduino.
 SDA pin → Pin 10 on Arduino.

March 2025
CIELITO ZAMORA SENIOR HIGH SCHOOL 11

 SCK pin → Pin 13 on Arduino.


 MOSI pin → Pin 11 on Arduino.
 MISO pin → Pin 12 on Arduino.
 RST pin → Pin 9 on Arduino.

b. Wiring the Servo Motor (for Locking/Unlocking):


 Signal (PWM) pin → Pin 7 on Arduino (or your choice of pin).
 VCC pin → 5V on Arduino.
 GND pin → GND on Arduino.

c. Wiring the Solenoid Lock (if used):


 Relay Module:
o VCC pin → 5V on Arduino.
o GND pin → GND on Arduino.
o IN pin → Pin 8 (or any digital pin) on Arduino.
 Solenoid Lock:
o Positive Terminal → One terminal of the relay (NO or NC, depending on
the type of lock).
o Negative Terminal → GND.

LCD Display (Optional):


 VCC pin → 5V on Arduino.
 GND pin → GND on Arduino.
 SDA pin → A4 on Arduino (for Uno).
 SCL pin → A5 on Arduino (for Uno).

2. Programming the Arduino:


a. Install Libraries:

Before programming, you need to install the necessary libraries:

1. MFRC522 library: For RFID communication.


2. Servo library: For controlling the servo motor.
3. Wire library: For using the LCD display (if included).

You can install the libraries from the Arduino IDE by going to Sketch > Include Library
> Manage Libraries... and searching for the above libraries.

b. Write the Code:

Use the provided C++ code (from earlier) to write the program that:

1. Reads the RFID tag using the MFRC522 reader.


2. Compares the UID with the authorized tag.
3. Controls the servo motor to unlock/lock the door.

March 2025
CIELITO ZAMORA SENIOR HIGH SCHOOL 12

4. Provides feedback through LED's and a buzzer.

The main steps of the code:

 RFID Scanning: The RFID reader checks if a valid tag is present.


 Verification: The Arduino compares the scanned UID with a stored list of
authorized UIDs.
 Locking Mechanism: Based on the verification, the servo or solenoid is
triggered to unlock or lock the door.
 Feedback: LEDs and a buzzer provide immediate feedback to the user.

c. Example Code:

Refer to the earlier C++ code snippet for a basic RFID door lock system

3. Testing and Troubleshooting:


 Test RFID Recognition: Scan your authorized RFID card and ensure the
Arduino reads the UID correctly.
 Check Lock Mechanism: Confirm that the servo or solenoid lock operates
correctly based on the UID verification.
 Feedback System: Ensure that the LEDs and buzzer provide feedback
according to the access granted or denied status.

Troubleshooting Tips:

 If the system doesn't detect the RFID tag, make sure the connections to the
SDA, SCK, MOSI, and MISO pins are correct.
 If the lock does not trigger, check if the servo or relay connections are correct
and that the power supply is adequate.
 Ensure that the buzzer and LEDs are wired correctly to indicate success or
failure.

4. Optional Enhancements:
 Multiple Users: Use an array or EEPROM to store multiple RFID UIDs for
multiple users.
 Security: Add extra security with a keypad or fingerprint scanner as a second
layer of authentication.
 Time-based Access: Lock the door after a set time or automatically close after
use.

RFID Arduino Door Lock System Used to demonstrate the technology being
evaluated. Survey Questionnaire The primary tool for data collection, consisting of both
quantitative Likert scale and demographic questions.

March 2025
CIELITO ZAMORA SENIOR HIGH SCHOOL 13

The researcher will first distribute the survey questionnaire to a randomly


selected group of participants. Participants will then complete the questionnaire at their
convenience, with each respondent taking approximately 5-7 minutes to fill it out. Once
the surveys are completed, the researcher will collect the responses.
The data will be analyzed quantitatively using statistical techniques. To organize
the responses, the data will be entered into a spreadsheet and analyzed with tools like
Excel. Descriptive statistics, such as the mean, median, and mode, will be calculated to
summarize the numerical responses.
Additionally, frequency distributions will be used to identify patterns in the
categorical responses.

DATA GATHERING PROCEDURES

The data gathered from the survey will be analyzed using the Statistical measure
to determine if there is a significant relationship between categorical variables.

After collecting the survey responses, the data will be categorized based on
different groups, such as levels of familiarity or usage of RFID technology. The
Statistical measure test will be applied to assess whether there is a statistically
significant association between these categorical variables.

This test will help the researcher identify any patterns or correlations in the
responses, such as whether certain demographics are more likely to be familiar with or
supportive of RFID door locks. The results from the Statistical analysis will provide
valuable insights into the distribution of responses across different groups.

DATA ANALYSIS

In evaluating the RFID Arduino Door Lock and Reader System, a descriptive
analysis was employed, utilizing statistical measures such as mean, median, standard
deviation, and weighted mean to assess how both technical and non-technical users
described and evaluated the system's key features, including security, ease of use,
performance, and reliability.

The mean provided an overall average rating, while the median offered insight
into the central tendency of user feedback, helping to identify potential outliers. The
standard deviation indicated the variation in responses, highlighting any discrepancies
between technical and non-technical users. To account for the differing importance of
various features, the weighted mean was calculated by multiplying each rating by its

March 2025
CIELITO ZAMORA SENIOR HIGH SCHOOL 14

corresponding weight, which reflected the significance of different criteria such as


security and user-friendliness.

This approach allowed for a more accurate evaluation of the system’s


performance. These analytical techniques provided a comprehensive understanding of
the RFID system’s functionality and user satisfaction, serving as a guide for future
improvements, such as optimizing the user interface, enhancing the RFID scanning
speed, or increasing system security.

ETHICAL CONSIDERATIONS

When using RFID Arduino door lock systems, several ethical issues must be
addressed to ensure privacy, security, and fairness:

1. Privacy and Data Protection: Secure storage and encryption of data linked to
RFID tags are essential, and users must give informed consent about the data
being collected and how it will be used.

2. Informed Consent: Users should be fully aware of how the system works, what
data is tracked, and agree to it before using the system.

3. Access Control and Misuse Prevention: The system should be designed to


prevent unauthorized access and hacking, with proper security measures in
place.

4. Equity and Accessibility: The system must be usable by all individuals,


regardless of their abilities or background, and should be inclusive of people with
disabilities.

March 2025
CIELITO ZAMORA SENIOR HIGH SCHOOL 15

5. Surveillance and Ethical Use: RFID systems should be used only for their
intended purpose of access control, avoiding unnecessary surveillance or
tracking.

6. Data Retention and Deletion: Clear policies should be established regarding


how long data is stored, ensuring it’s deleted once no longer needed.

7. Transparency: Users must have access to information on how the system


operates, what data it collects, and the role of any third-party services involved.

CHAPTER 3

RESULTS

The Data analysis and conclusions from 30 completed questionnaires are

covered in this chapter.

This study sought to determine the difference between

the evaluation of the students and teachers evaluation of the RFID ARDUINO

DOOR LOCK AND DOOR READER.

1. Students and teachers Evaluation of the RFID ARDUINO DOOR LOCK


AND DOOR READER.

The students and teachers evaluation of the RFID ARDUINO DOOR LOCK

AND DOOR READER is shown in the table below.

30 respondents answered a series of the statements on a 4-point Like-rt scale.


The weighted mean and adjectival rating of the respondents who

participated in the study are shown in the subsequent tables.

March 2025
CIELITO ZAMORA SENIOR HIGH SCHOOL 16

Table 1 : Students and Teachers evaluation of the Functionality of the RFID


ARDUNO DOOR LOCK AND DOOR READER.

Functionality Weighted Adjectival Ranking


mean rating
1. The RFID Arduino door lock is able
to lock the door. 3.24 A 1
2. It is easy to use.
3.21 A 2
3. The reader quickly recognizes the
RFID tag and unlocks the door. 3.09 A 3
4. The RFID Arduino door lock
integrates well with other systems. 2.94 A 5
5. Instructions on the use of the RFID
Arduino door lock and reader system 3.24 A 1
are easy-to-follow.

Overall Mean: 3.14

Legends:
1.00 - 1.75 Disagree
1.76 - 2.50 Strongly Disagree
2.51 - 3.25 Agree
3.26 - 4.00 Strongly Agree

March 2025
CIELITO ZAMORA SENIOR HIGH SCHOOL 17

Table 1: illustrates students' and teachers' evaluations of the RFID

Arduino door lock and reader. The highest-rated aspects are its ability to

lock the door and ease of following instructions (3.24, A). Ease of use (3.21,

A) and RFID tag recognition (3.09, A) were also rated positively. System

integration scored the lowest (2.94, A), suggesting room for improvement.

The overall mean (3.14, A) illustrates a generally positive perception of its

Functionality

Table 2 : Students and Teachers evaluation of the Usability of the RFID


ARDUNO DOOR LOCK AND DOOR READER.

Usability W-Mean Adjectival Rating Ranking

1. The door lock and reader meet the 3.35 A 1


need for a good lock.

2. It provides sufficient security for door 3.29 A 2


access needs.

3. The card responds quickly when 2.97 A 4


tagged.

4. The door lock and reader are safe to 3.26 A 3


use.

5. It does not jam. 2.79 A 5

Overall Mean: 3.13

Legends:
1.00 - 1.75 Disagree
1.76 - 2.50 Strongly Disagree

March 2025
CIELITO ZAMORA SENIOR HIGH SCHOOL 18

2.51 - 3.25 Agree


3.26 - 4.00 Strongly Agree

Table 2 illustrates students' and teachers' evaluations of the usability

of the RFID Arduino door lock and reader. The highest-rated aspect is meeting the need

for a good lock (3.35, A), followed by security (3.29, A) and safety (3.26, A). The card's

response time (2.97, A) and jamming prevention (2.79, A) scored lower, suggesting

areas for improvement. Theoverall mean (3.13, A) illustrates a generally positive

perception of its usability.

Table 3 : Students and Teachers evaluation of the Reliability of the RFID


ARDUNO DOOR LOCK AND DOOR READER.

Reliability W-Mean Adjectival Ranking


Rating

1. It locks consistently well. 3.18 A 1

2. It opens predictably well. 3.12 A 2

3. It performs reliably well over time and does 3.06 A 5


not easily malfunction.

4. The reader consistently works well. 3.15 A 2

March 2025
CIELITO ZAMORA SENIOR HIGH SCHOOL 19

5. Overall, the system works most reliably well. 3.12 A 4

Overall Mean: 3.12

Legends:
1.00 - 1.75 Disagree
1.76 - 2.50 Strongly Disagree
2.51 - 3.25 Agree
3.26 - 4.00 Strongly Agree

Table 3 illustrates students' and teachers' evaluations of the RFID

Arduino door lock's reliability. The highest-rated aspects are consistent locking (3.18,
A)

and reader performance (3.15, A), while long-term functionality (3.06, A) scored the

lowest. The overall mean (3.12, A) indicates generally reliable performance.

Table 4 : Students and Teachers evaluation of the Performance of the RFID


ARDUNO DOOR LOCK AND DOOR READER.

Performance W-Mean Adjectival Ranking


Rating
1. It does as guaranteed. 3.12 A 1
2. The Arduino door lock system provides 3.00 A 4
quick and secure access.
3. Its door lock system performs efficiently 3.06 A 3

March 2025
CIELITO ZAMORA SENIOR HIGH SCHOOL 20

and securely.
4. The reader smoothly locks and unlocks 3.09 A 2
the door.
5. The RFID reader scans the tag quickly 3.12 A 1
and accurately.
Overall Mean: 3.08
Legends:
1.00 - 1.75 Disagree
1.76 - 2.50 Strongly Disagree
2.51 - 3.25 Agree
3.26 - 4.00 Strongly Agree

Table 4 shows students' and teachers' evaluations of the

performance of the RFID Arduino door lock and reader. The highest- rated aspects

were the RFID reader’s accuracy (3.12, A) and overall performance (3.12, A). The

reader’s smooth operation (3.09, A) and system efficiency (3.06, A) were also

rated positively. The lowest score was for quick and secure access (3.00, B),

suggesting room for improvement. The overall mean (3.08, A) indicates effective

performance with minor areas for enhancement.

CHAPTER IV : DISCUSSION

SUMMARY OF FINDINGS

The testing and implementation of the RFID Arduino Door Lock and Door Reader
system at Cielito Zamora Senior High School demonstrated several important findings.

March 2025
CIELITO ZAMORA SENIOR HIGH SCHOOL 21

The RFID reader effectively recognized the RFID tags and cards within a short distance,
providing quick and reliable access control.

The system consistently read the tags in under a second, ensuring smooth
operation. When a valid RFID tag was presented, the solenoid lock activated as
expected, unlocking the door, and the relay module worked without issues to control the
lock mechanism. Unauthorized tags were rejected, and the system responded by
triggering a red LED light and buzzer, alerting to the denied access.

Additionally, the system’s response time was minimal, with no noticeable delay in
unlocking or locking the door. The system also proved scalable and customizable,
allowing for easy addition of new RFID tags and the potential for further system
integration, such as additional doors or security features.

Although the system performed well, further improvements, such as encryption to


protect against unauthorized tag duplication, could enhance security. Overall, the
system was reliable and efficient, with no malfunctions or communication errors
observed during the testing phase.

CONCLUSION

The RFID Arduino Door Lock and Reader system has proven to be a functional,
efficient, and cost-effective solution for access control. The system successfully meets
the intended objectives of providing secure entry to authorized individuals while
rejecting unauthorized access attempts.

Through the integration of the RFID reader, Arduino micro-controller, solenoid


lock, and relay module, the system operates smoothly with minimal delays, ensuring
both security and convenience for users. The reliable identification of RFID tags, along
with prompt lock activation and denial mechanisms, ensures that the system is both
user-friendly and secure.

In the context of Cielito Zamora Senior High School, this system could serve as a
practical security measure for controlling access to various areas, offering ease of use
and a high level of protection.

While the system performs well in its current state, there are opportunities for
future enhancements, such as adding more layers of security or expanding the
system’s capabilities to control multiple doors or integrate with other security measures.

Overall, the project highlights the potential of using affordable and accessible
technology, such as Arduino and RFID, in creating reliable access control systems that
could be applied in educational settings or other environments requiring secure,
automated access.

March 2025
CIELITO ZAMORA SENIOR HIGH SCHOOL 22

RECOMMENDATIONS

Creating recommendations for an RFID Arduino Door Lock and Door Reader
involves evaluating various aspects like security, efficiency, ease of implementation,
and cost-effectiveness. Here’s how you can structure your recommendations:

1. Security Considerations
 Use encrypted RFID tags (e.g., MIFARE DESFire) to prevent cloning.
 Implement multi-factor authentication (MFA), such as requiring both RFID and
a PIN.
 Regularly update the firmware to patch vulnerabilities.
 Add a logging system to track entry attempts.

2. Hardware Recommendations
RFID Module:
 RC522 – Affordable and commonly used in Arduino projects.
 PN532 – Supports NFC, good for mobile integration.

Microcontroller:
 Arduino Uno – Good for basic projects.
 ESP8266/ESP32 – Ideal for Io T and WiFi-enabled smart locks.

Lock Mechanism:
 Solenoid lock – Budget-friendly but power-intensive.
 Servo lock – Low power, but less secure.
 Magnetic lock – Highly secure but requires constant power.

3. Software Recommendations
 Use EEPROM to store authorized RFID tags.
 Implement a cloud-based or mobile-controlled access system for remote
control.
 Integrate with a database for dynamic access control.
 Use interrupts instead of delay() for better performance.

4. Power and Backup


 Consider a rechargeable battery backup in case of power failure.
 Use low-power components for better efficiency.

5. Cost and Implementation Considerations


 Compare cost vs. security features for the best value.
 Test with multiple RFID tags

March 2025
CIELITO ZAMORA SENIOR HIGH SCHOOL 23

References

[1] Aidan, Controlling a solenoid with an Arduino, 08 June (2016). https://core-


electronics.com.au/turo-rials/solenoid-control-with arduino.htm/

[2] Krishna, P.: How to set up a keypad on Arduino, Circuit Basics (2013).

[3] http://www.circuitbasics.com/how-to-set-up-a-keypad-on-an-arduino/

[4] http://www.rfidjournal.com/article/articleview/1741/1/1/

[5] Rui, S.: Security Access using MFRC522 RFID Reader with Arduino,
RANDOM NERD (2012).

[6] https://randomnerdtutorials.com/security-access-using-mfrc522-rfid-reader-
with-arduino/

[7] Alan, G.: Margolis, Introduction to Arduino, a piece of cake, Arduino


Cookbook, O'reilly, CA, USA, (2011).

[8] Paul, S.: and Simon, M.: PRACTICAL ELECTRONICS FOR INVERTORS,
(2008).

[9] Brian, W.: Arduino Programming Notebook, First edition (2007).

[10] http://arduino.cc/tutorial

[11] Finkenzeller, K.: RFID Handbook “Fundemantals and applications in


Contactless Smart Cards and Identification”, Wiley & Sons LTD ISBN 0-470-84402-7
(2003).

[12]https://www.google.com/url?
sa=t&source=web&rct=j&opi=89978449&url=https://www.researchgate.net/publication/
354508883_RFID-Based_Digital_Door_Locking_System&ved=2ahUKEwj67L2xnJ-
LAxV2k1YBHWejNZEQFnoECB4QAQ&usg=AOvVaw0Xme9FFs9cFzW5RdeRypiT

[13]https://www.google.com/url?
sa=t&source=web&rct=j&opi=89978449&url=https://www.researchgate.net/publication/
343575758_Automated_door_access_based_on_RFID_using_Arduino&ved=2ahUKEwj
fxsrTnJ-
LAxVer1YBHR33HSYQFnoECB8QAQ&usg=AOvVaw38FUOoZcefvdDqK35zg2C4

March 2025
CIELITO ZAMORA SENIOR HIGH SCHOOL 24

[14]https://www.academia.edu/download/
59570334/175_Electronic_Door_Lock_Using_RFID_and_Password_Based_on_Arduino201906
07-73403-hj2pou.pdf

[15]https://ieeexplore.ieee.org/abstract/document/7917989/

[16] Brown, C., & Green, M. (2021). Arduino projects for security systems.
McGraw-Hill.

[17] Lee, S., Kim, H., & Park, T. (2022). RFID applications in security and access
control. International Journal of Security Studies, 10(2), 45-59.

[18] Sandhu, R., Coyne, E. J., Feinstein, H. L., & Youman, C. E. (1996). Role-
based access control models. IEEE Computer, 29(2), 38-47.

[19] Want, R. (2006). An introduction to RFID technology. IEEE Pervasive


Computing, 5(1), 25-33.

[20] Stojanovic, J., & Milinkovic, D. (2018). Integration of RFID and Arduino in
access control systems. Journal of Automation, 14(2), 23-35.

Appendix A

Letter of Consent

February 07, 2025

Dear Respondents:

We, the undersigned researchers from Cielito Zamora Senior High School -
Technical Vocational Livelihood, are conducting a study on the Functionality, Usability,
Reliability, Performance of the RFID Arduino Door Lock and Reader System. This

March 2025
CIELITO ZAMORA SENIOR HIGH SCHOOL 25

survey aims to gather feedback from students and teachers regarding their experiences
with the system to assess its effectiveness and identify areas for improvement.

Your participation is voluntary, and all responses will be kept confidential. The
information collected will be used solely for academic purposes. The survey will take
approximately 3-5 minutes to completed.

Rest assured that data obtained will be kept confidential.

Sincerely,
The Researchers

Reymond Galpo Kathlainne Ortega Kian Rayver Cedullo

Ericson Chua Ronaldo Dionio Cyrex Villafranca

John Melvin Jacinto John Carlo Timan Kent Louie


Sosmena

APPENDIX B

CHECKLIST IN VALIDATING THE SURVEY QUESTIONNAIRE

February 7, 2025
Sir/Ma’am:

Greetings of peace!
We, ICT-Programming students of Cielito Zamora SHS, are conducting a study entitled
RFID ARDUINO DOOR LOCK AND DOOR READER. In relation to this, kindly validate the
survey questionnaire to be used in this study.

Your help would sincerely be appreciated! Thank you.

Reymond Galpo
Lead Researcher

March 2025
CIELITO ZAMORA SENIOR HIGH SCHOOL 26

Kian Rayver Cedullo Kent Louie Sosmena


Kathlainne Ortega John Melvin Jacinto
Ronaldo Dionio, Jr. Cyrex Villafranca
Ericson Chua John Carlo Timan

Evaluator’s Name ____________________ Date ________

Position ____________________

Instructions: Do put a check mark (✓) to rate and show how valid each item is using this scale:

4 E Excellent 3 V Very good 2 G Good 1 P Poor

4 3 2 1
1. The items are clearly and precisely stated.
2. The statements are specific.
3. The questionnaire is readable and easy to understand.
4. The statements are straightforward.
5. The items are easily understood.

4 3 2 1
6. The questionnaire is suitable for use.
7. The number of items is adequate for evaluating the system
or product developed/construct or phenomenon investigated.
8. The directions in the questionnaire are clearly provided.
9. The questionnaire covers the scope of the study.
10. Each item ensures objectivity.

4 3 2 1
11. The survey includes the relevant variables of the study.
12. The items demonstrate mechanical and technical
correctness.
13. Respondents will find answering the questionnaire easy and
comfortable.

*Martin, R.Y. (2013). Effectiveness of literature-based pedagogy in enhancing the attitude of


students towards literature courses.

March 2025
CIELITO ZAMORA SENIOR HIGH SCHOOL 27

Appendix C

Research Instrument

Name (optional): __________________________

Profile: Students: Teacher:

Instruction: Please evaluate the prototype using the given scale and placing a check mark (√) on
the appropriate column corresponding to your response.

Numerical Rating Categorical Verbal Response

March 2025
CIELITO ZAMORA SENIOR HIGH SCHOOL 28

4 [3.50-4.00] Strongly agree (SA)

3 [2.50-3.45] Agree (A)

2 [1.50-2.45] Strongly disagree (SD)

1 [1.00-1.45] Disagree (D)

March 2025
CIELITO ZAMORA SENIOR HIGH SCHOOL 29

APPENDIX C

QUESTIONNAIRE

February 7, 2025

Dear Respondent:

We, ICT-Programming students of Cielito Zamora SHS, are conducting a study entitled
RFID ARDUINO DOOR LOCK AND DOOR READER. Your participation and cooperation in
taking part in this survey will be greatly appreciated. Kindly provide honest and accurate
responses, as these will greatly contribute to the success of our research.

Rest assured that all your answers will remain strictly confidential. You may, however,
choose to withdraw from the study anytime without penalty. Should you participate still, your
identity will remain anonymous to protect your privacy.

Thank you for your valuable time and effort!

Reymond A. Galpo
Lead Researcher

Name (Optional) _____________________________________


Occupation ☐ Teacher ☐ Student
Sex ☐ Male ☐ Female

Instructions: Below are statements regarding the effectiveness of promotional campaign


strategies and your assessment of these strategies as a respondent. Please carefully read
each statement and place a check mark (✓) on the number that corresponds to your chosen
answer.

4 SA Strongly agree 2 D Disagree


3 A Agree 1 SD Strongly disagree

Functionality (serves its purpose) 4 3 2 1


1. The RFID Arduino door lock is able to lock the door.
2. It is easy to use.
3. The reader quickly recognizes the RFID tag and unlocks the
door.
4. The RFID Arduino door lock integrates well with other
systems.
5. Instructions on the use of the RFID Arduino door lock and
reader system are easy-to-follow.

March 2025
CIELITO ZAMORA SENIOR HIGH SCHOOL 30

Usability (degree to which something is fit for use) 4 3 2 1


1. The door lock and reader meet the need for a good lock.
2. It provides sufficient security for door access needs.
3. The card responds quickly when tagged.
4. The door lock and reader are safe to use.
5. It does not jam.

Reliability (able to perform consistently) 4 3 2 1


1. It locks consistently well.
2. It opens predictably well.
3. It performs reliably well over time and does not easily
malfunction.
4. The reader consistently works well.
5. Overall, the system works most reliably well.

Performance (degree to which it can accomplish tasks) 4 3 2 1


1. It does as guaranteed.
2. The Arduino door lock system provides quick and secure
access.
3. Its door lock system performs efficiently and securely.
4. The reader smoothly locks and unlocks the door.
5. The RFID reader scans the tag quickly and accurately.

Areas for Improvement

How can the proposed door lock and reader further be improved?

______________________________________________________

___________________________________________________________

March 2025
CIELITO ZAMORA SENIOR HIGH SCHOOL 31

March 2025

You might also like