You are on page 1of 20

RFID BASED SECURITY ACCESS SYSTEM

Prepared by:-
Arnav Banerji 11/FET/EC/1011
Vinayak Sharma 11/FET/EC/1093




Faculty of Engineering & Technology
Manav Rachna International University, Faridabad

Co-ordinated by:-
Ms. Savita
(Assistant Professor ECE department)

AIM
The main aim of the project is to make a
simple security access system using Radio
Frequency Identification (RFID) and its
concept is to allow the access only to
authorized persons.

MOTIVATION
It is argued that security and privacy can be ensured
using technical safeguards if the whole RFID system is
designed properly. The challenge is immense since
many constraints exist for providing security and
privacy in RFID systems: technically and economically
but also ethically and socially.
Not only security and privacy needs to be provided but
the solutions also need to be inexpensive, practical,
reliable, scalable, flexible, inter-organizational, and
lasting. This leads to innovative solutions with
advantageous characteristics.
INTRODUCTION (I)
What is RFID?
RFID is used to automatically identify
people, objects, and animals using short range
radio technology to communicate digital
information between a stationary location
(reader) and a movable object (tag).
RFID are just like bar codes, only difference is
that it adds to much more benefits as compared
to bar codes.



STEPS
The RFID card is kept or swiped in front of the RFID reader
Then that person is asked to type his 6 digit password
through keypad interface
If the password is typed correctly, the access is allowed to the
respective person and the door latch opens.
If that person swiped the wrong card or didnt type the
password correctly, the buzzer will turn on signifying that the
access is denied and that particular person wont get access to
the door and the door latch will remain closed.
WHY RFID ARE BETTER THAN USING
BAR CODES?
Bar codes are line-of-sight technology, which
means people usually have to orient the bar
code towards a scanner for it to be read.
Radio frequency identification, by contrast,
doesnt require line of sight.
RFID tags can be read as long as they are
within range of a reader.
Bar codes have other shortcomings as well. If
a label is ripped, soiled or falls off, there is no
way to scan the item.

RFID READER
An RFID reader is a device
that is used to interrogate
an RFID tag. The reader has
an antenna that emits radio
waves; the tag responds by
sending back its data.

The reader has two basic
components

A scanning antenna
A transceiver with a
decoder to interpret the
data

RFID TAG
A Tag is a transponder which
receives a radio signal and in
response to it sends out a
radio signal.
Tag contains an antenna, and
a small chip that stores a small
amount of data
Tag can be programmed at
manufacture or on installation
Tag is powered by the high
power electromagnetic field
generated by the antennas.
The field allows the
chip/antenna to reflect back an
extremely weak signal
containing the data.
HOW IT IS USED?
In the beginning, the user is
prompted to scan his tag
or ID. It can be done
either by holding it near
the reader for a while or
even swiped in front of
the reader. Then after
recognizing, the reader
detects the card by
flashing an LED light for a
second with a beep
sound.
FREQUENCY BAND OF RFID
LF band: 125 and 135 kHz
HF band 13.56 MHz
These frequency bands can be used freely
worldwide. The low frequencies here optimize
transmission distance by minimizing free-space
losses.
UHF band: 915 MHz
MW band: 2.4 GHz
These frequency specifications are for the US
only, Europe and Japan have different frequency
specifications for UHF/MW.

PASSIVE TAGS AND ACTIVE TAGS
Tag Attributes Passive tags Active tags
Tag Power Energy transferred
from RF to reader
Internal to tag.
Tag Battery Yes No
Availability of
Power
Only in the field of
Radar
Continuous
Required signal
strength to tag
Very High Very Low
Range Up to 3-5M Up to 100M
Multi Tag
Reading
Few hundred
within 300M of
reader
1000s of tags
recognized up to
100mph
Data Storage 128 bytes of R/W 128 bytes of R/W
with sophisticated
search and access
BLOCK DIAGRAM
HARDWARE REQUIREMENTS(I)
1) AT89C51 Microcontroller
2) RFID Reader and RFID card/tags
3) MAX232
4) Keypad Interface
5) PCB Board
6) Resistor





HARDWARE REQUIREMENTS(II)
7) Capacitor
8) Motor and Motor Driver
9) Light emitting diodes (LEDs)
10) 16X2 Alphanumeric LCD Display
11) Buzzer
12) Transistor BC548




SOFTWARE REQUIREMENTS
1) Keil uvision

2) ProgISP

APPLICATIONS(I)
The RFID tag can be affixed to an object and used to track and
manage inventory, assets, people, etc. For example, it can be
affixed to cars, computer equipment, books, mobile phones, etc.
RFID is being adopted for item-level retail uses. Aside from
efficiency and product availability gains, the system offers a
superior form of electronic article surveillance (EAS), and a
superior self checkout process for consumers.
An advanced automatic identification technology based on RFID
technology has significant value for inventory systems. The system
can provide accurate knowledge of the current inventory. In an
academic study performed at Wal-Mart, RFID reduced Out-of-
Stocks by 30 percent for products selling between 0.1 and 15 units
a day. The RFID can also help the company to ensure the security
of the inventory.

APPLICATIONS(II)
RFID tags are widely used in identification badges, replacing earlier magnetic
stripe cards. These badges need only be held within a certain distance of the
reader to authenticate the holder. Tags can also be placed on vehicles, which can
be read at a distance, to allow entrance to controlled areas without having to stop
the vehicle and present a card or enter an access code.
To prevent retailers diverting products, manufacturers are exploring the use of
RFID tags on promoted merchandise so that they can track exactly which product
has sold through the supply chain at fully discounted prices.
Logistics and transportation are major areas of implementation for RFID
technology. Yard management, shipping and freight and distribution centers use
RFID tracking technology. In the railroad industry, RFID tags mounted on
locomotives and rolling stock identify the owner, identification number and type of
equipment and its characteristics.
The first RFID passports ("E-passport") were issued by Malaysia in 1998. In addition
to information also contained on the visual data page of the passport, Malaysian e-
passports record the travel history (time, date, and place) of entries and exits from
the country.

FUTURE SCOPE
The value of the RFID market in 2012 will be $7.46 (USD) billion versus
$6.37 (USD) billion in 2011. The RFID world market is estimated to surpass
$20 billion (USD) by 2014.
Developments in RFID technology continue to yield larger memory
capacities, wider reading ranges, and faster processing. It is highly unlikely
that the technology will ultimately replace barcode even with the
inevitable reduction in raw materials coupled with economies of scale, the
integrated circuit in an RF tag will never be as cost-effective as a barcode
label. However, RFID will continue to grow in its established niches where
barcode or other optical technologies are not effective, such as in the
chemical container industry and live stock industry.
If some standards commonality is achieved allowing RFID equipment from
different manufacturers to be used interchangeably, the market will likely
to grow exponentially. Until then, the full scope and potential of RFID
technology has yet to emerge.

REFERENCES
http://www.engineersgarage.com/microcontroller/8051projects/rfid-
secured-access-system-at89c51-circuit

http://www.projectsof8051.com/rfid-based-security-system/


[IEEE] WEBSITE :-
https://www.ieee.org/about/technologies/emerging/rfid.pdf


http://en.wikipedia.org/wiki/Radio-frequency_identification


www.emory.edu/BUSINESS/et/rfid/future.html

MILESTONE
S.NO MONTH/DATE/WEEK WORK DONE TILL DATE
1. 17/3/2014-24/3/2014 FORMATION OF GROUP
2. 26/3/2014-31/3/2014 PROJECT WAS DECIDED
3. 1/4/2014-16/4/2014 WORKED ON THE SYNOPSIS
4. 2/4/2014-16/4/2014 COLLECTED INFORMATION
REGARDING SYNOPSIS
5. 16/4/2014-18/4/2014 COLLECTED INFORMATION
FOR PRESENTATION
6. 19/4/2014-24/4/2014 STARTED MAKING
PRESENTAION

You might also like