• Nu S-Au Găsit Rezultate

View of Rfid based Access Control System Using Arduino

N/A
N/A
Protected

Academic year: 2022

Share "View of Rfid based Access Control System Using Arduino"

Copied!
9
0
0

Text complet

(1)

Rfid based Access Control System Using Arduino

1

Dr. K.S.Dhanalakshmi ,

2

Atla Praghna ,

3

Elluru Thanusha Reddy ,

4

S.K.Prabhavathy

1Assistant Professor,Electronicand Communication Engineering,Kalasalingam Academy of Research And Education

234UG Student, Electronic and Communication Engineering ,Kalasalingam Academy of Research And Education

1[email protected],2[email protected],3[email protected],4[email protected]

Abstract :

In the present scenario , security plays a vital role everywhere. To accomplish this, an RFID-based access control system based on Arduino was developed where RFID stands for Radio Frequency Identification Technology. The device accomplishes the necessary task by combining RFID technology and Arduino. RFID is a communication technology that is widely referred to as electronic tags.

Radio signals can be used to identify a particular target, and the related data can be read and written without the need for direct communication. As life has become more intellectual in recent years, radio frequency recognition technology has advanced quickly, and is now commonly used in identity documents, defence, and production control . In this system,when the RFID reader recognizes an RFID tag, it compares the recognized tag’s UID with stored UID database to see if they match.Access is allowed if the captured user UID matches one of the previously stored UIDs; orelsedoesnot access. This system is secure , fair and reliable.

Keywords: Arduino UNO, RFID Module, UID/tags, Database, Buzzer, Keypad

1. INTRODUCTION

Security and managing people at certain locations is the main issue now a days. Physical security is not the best option . We agree that security is more than just about technology; it is also about how people live their lives and assisting them in making the most of their time. The primary goal of implementing an access control system is to ensure that physical access to your buildings or sites is limited. It is the method of electronically limiting entry to improve security. It will keep track of who enters which areas and when. People's minds can be freed from security with the right access control scheme, allowing them to reach their full potential. It’s often a simple task ,but it performs the vital task of safely controlling entry in day-to-day life. This is what we call Security for Life, and it's all about giving people more independence in their daily lives. The access control system ,as well as the data it produces, will improve not only security but also efficiency, success, innovation, and even happiness.

2.LITERATURE REVIEW

This is to prevent illegal access and present an automated attendance management system using Eclipse Oxygen.3a software for maintaining the proper record in the database and digital signature system is interfaced with personal computers to increase the security.[1]

This paper examines the current state of RFID-based access control systems and proposes a design scheme for an intelligent RFID-based access control system.[2]

This paper presents about the device which will detect the attendees tags and checks a person has passed through the system in one of two directions: in or out. This project is also an easy-to-use framework.[3]

This automatic billing system is an IoT integration that is done because it is a low-power, low-cost system that is easy to build. Due to the plat form of the RFID tag and detector, it has a very high accuracy.[4]

This paper discusses the goal of developing a framework that is more advanced than just RFID detection and punching approved entry attendance. The latest plan is to incorporate a feature known as "VOICE GREETINGS” and audio files are saved in SD card each with different names and quotes, with its own tag ID.[5]

This paper addresses the automation of checkpoints and toll plazas for smarter traffic management, which helps people by saving time and reducing fuel consumption. Radio waves are used by RFID to classify and monitor objects. Endpoints are

(2)

RFID tags attached to objects that uniquely mark them.[6]

This paper discusses about the system which is made based on an incident at one of Bengaluru's ATMs, which called into question about the security and safety measures used at ATM machines. Safe ATM door locking system with RFID is a system for making ATM doors more secure and providing better protection to users.[7]

This paper presents about the system which is an easy and reliable way to keep track of student attendance on a wide scale. The proposed attendance tracking framework utilizes the Internet of Things (IoT) principle to log and retrieve data from a server/cloud and make it accessible to the user at any time and from any place.[8]

In this system ,the machine's operation demonstrated precision when it came to identifying RFID accounts, distinguishing between plastic and non-plastic bottles, storing or modifying account points, and dispensing items. The system could be powered by either commercial or solar energy.[9]

This paper discusses about the system which is used in a field with tall and wide tree/plant canopies. RFID solution for identifying orchard and vineyard sprayer movement was proposed, which could identify sprayer position and direction of travel even when the guiding device failed due to unreliable satellite signals.[10]

The proposed system, a student monitoring and attendance management system based on RFID technology, would improve the manual attendance process, particularly in a business or school setting. This system uses an automated system to keep track of student attendance. We can use this method to monitor a specific student to see if he or she is skipping classes.[11]

This paper presents about implementation of a low-cost signal scanner for obtaining signals from the air and determining RSSI parameters. It focuses on the use of low-cost RF scanners to acquire RFID signals and measure the Received Signal Strength Indication (RSSI) values without emitting signals into the air.[12]

3.PURPOSE

The designing and implementation of RFID based Access Control System using Arduino is based on the following objectives a. To reduce the security risk of unauthorized access

b. .It will follow the flow of identification, authentication and authorization.

c. It is easy inventory management and reliable

d. It is more safe, easy to use and make work less and it is suitable for different sectors.

4.HARDWARE COMPONENTS

 Arduino Uno

 MFRC522 RFID

 Buzzer

 LED

 Keypad

A. ARDUINO UNO

Arduino was developed at the Ivrea Interaction Design Institute to provide a simple forum for people without a background in programming or electronics to create new stuff. One of the most common and commonly used Arduino processor boards is the Uno. Shields come in a range of shapes and sizes (plug in boards adding functionality).When you

(3)

can't connect the board to the PC's USB port, you can power it from the 2.1 mm barrel jack with a separate power supply, or from the USB connector (usually up to 500 ma for all electronics including shield).Arduino is a free and open-source platform that uses basic hardware and programming tools. Arduino boards can accept inputs such as push buttons, passwords, and other types of information and transform them to outputs such as motor activation, LED switching, and online publishing. The board receives and sends a series of instructions to the microcontroller.

Figure 1: ARDUINO UNO BOARD B. MFRC522 RFID

RFID (radio-frequency identification) is widely used in access control.It is used to transmit data in order to recognize individuals or objects without having to makephysical contact.RFID uses radio signals to recognize the object instead of contacting with the device and it is used to detect wide range of objects.

RFID functions in two ways:

1. Active: it is self-powered and has a long range.

2.passive: it has a shorter range and is operated by a reader.

The features of RC522 are 13.56MHz RFID module , Operating voltage is of 2.5V-3.3V, Communicates with SPI,I2C protocol, UART and Current Consumption is of 13-26 mA. It contains 8 pins.

Figure 2: MFRC522 RFID MODULE C. BUZZER

Buzzers are electronic transducers with a DC power supply that are commonly used in sound devices such as computers, printers, copiers, alarms, electronic toys, automotive electronic equipment, telephones, clocks, and other electronic items.5V active buzzer This section dedicated sensor expansion module and the board, when used together, can complete a simple circuit design, allowing "plug and play."The buzzer here is used to generate sounds that signify various device

(4)

circumstances, such as alarming.

Figure 3: BUZZER D. LED

The Light Emitting Diode (LED) is a device that transforms electric current into optical energy and is used as a indicator for different system situations.

Figure 4: LIGHT EMITTING DIODES E. KEYPAD

In most ventures, the 4*4 matrix keypad is used as input. It has a total of 16 keys, all of which have the same input values.

The 4*4 Matrix Keypad Module is a non-encoded matrix keypad with 16 parallel keys. The pins on the outside attach the keys of each row and column.

Figure 5: KEYPAD

(5)

5. SOFTWARE

 Arduino IDE

The software Arduino IDE is freely accessible software. It is utilized for preparing the code and uploading code into the module. This arduino software helps in code compilation which is very easy for com

6.METHODOLOGY

DESIGN

In this project ,we designed the RFID based Access Control System consists of both hardware and software part.

The design of the project isshown below.

Figure 6.1: DESIGN OF THE PROJECT CONTROL UNIT

In the control unit , the main module is arduino. In this project , arduinouno was used because it is reliable and easily accessible. It receives the information from the rfid scanner when the tag is scanned and it checks and confirms with the information stored in the database. It shows the confirmed information in both software and hardware . In software, it shows in serial monitor and in hardware it shows by glowing the led and buzzer.

RFID SCANNER

RFID Scanner plays a major role in the project . It scans the tags which will have the unique identifier (UID) for every tag . The tag’s unique identifier will be displayed in the serial monitor of Arduino software.

INDICATION

The indication circuit consists of

 LED

 Buzzer

It shows in serial monitor also which helps the user to identify whether their card is authorized or not. It shows the indication with led and buzzer in hardware which helps to identify the unauthorized person’s entry.

(6)

KEYPAD

In this project , keypad is used to enter the pincode when the correct RFID tag is identified. For every particular RFID tag the different pincode will be given .After entering the pincode through keypad only it will be accessed.

Figure 6.2: FLOWCHART OF THE PROJECT

7. WORKING

The working of this project is very simple and doesn’t even take much time .It starts with the scanning of the RFID tags .If the RFID tag is authorized. The user has to enter a pincode set for that particular tag and if the RFID tag is not authorized then the red LED glows and buzzer makes a long beep . The user has about seven seconds to enter a pincode if he/she doesn’t then a long beep with red LED will be the output. If the user enters the correct pincode then green LED glows and the buzzer gives out a short beep that indicates the person have been accessed. The system can only grant access if the correct tag is scanned and when the correct pincode is entered; if the incorrect tag is scanned, the system will refuse access.

Figure 7: BLOCK DIAGRAM

(7)

S.no People RFID Authorised Enter Password Accessed

Yes No Right Wrong Yes No

1 Person 1   

2 Person 2   

3 Person 3  - -

8. RESULT

The Access Control System using Arduino and RFID is framed and arranged. The result of the project is

(8)

9. CONCLUSION

The main aim of the project is to identify the unauthorized persons without direct contact & the process is easier and can be easily adapted . It improves the security with updated technology . This prototype helps in accomplishing the security and access control task. This will result in a smart card system that meets today's and future needs. To make new features in this system more information is needed. This system is helpful for protecting people and giving them a security for their lives. This plays a main role in day-to-day life . The modifications can be done in this system. This system is a good prototype and useful.

REFERENCES

[1] KhushBakht , AmadUd Din, AimanShehzadi , MaryumAftab -Design of an Efficient Authentication and Access Control System using RFID , International Conference on energy Conservation and Efficiency (ICECE),2019.

[2] Xiaoxu Wang , Yuesheng Wang – An office intelligent access control system based on RFID, IEEE,2018.

[3] Mohammed A.H.Ali ,Nortasha A. Yusoff - Development of Tele-Monitoring Attendance System Using RFID,IEEE International Conference on Automatic Control and Intelligent Systems(I2CACIS),2018.

[4] Nishitha.R , Sandeep Seetharam , Raksha.V, UmmeKulsum - IoT Based Automatic Billing System by RFID, 4th International Conference on Recent Trends on Electronics ,Communication and Technology (RTEICT),2019.

[5] Yashi Mishra, Gaganpreet Kaur Marwah , SekharVerma -Arduino Based Smart RFID Security and Attendance System with Audio Acknowledgement, International Journal of Engineering Research and Technology (IJERT),2015,Vol.4.

[6] K. Balamurugan, Dr.S.Elangovan, Dr.R.Mahalakshmi, R.Pavithra - Automatic Check-Post and Fast Track Toll System Using RFID , IEEE International Conference on Advances in Electrical Technology for Green Energy (ICAETGT),2017.

[7] Sandeep Singh Rawat , ShaikSaidulu ,RasmiRanjan- Secure ATM Door Locking System Using RFID, Springer ,2016.

[8] B. Nandhakumar , K. Naveen Kumar , M. Vijay , A.Sriram -RFID based Attendance System using IoT, International Journal of Modern Science and Technology (IJMST),2020

[9] Wisdom Gen P. Dumpayan, Matthew Lawrence M. De Mesa, Nathalie Danielle F. Yucor, Eden T.Gabion ,

(9)

Jacueline D. Reynoso, Gabriel RodneiM.Geslani - Drop-and-Tap’ Reverse Vending Machine with Stored Value System Using RFID Scanner Technology , IEEE ,2017.

[10] ChanyuanZhai ,Andrew Landers , Bo Zhang –An RFID- based solution for monitoring sprayer movement in an orchard/vineyard , Springer , 2017.

[11] RumanaAnjum, VijayaKamble- Student Tracking and Attendance Monitoring System Using RFID, International Journal of Scientific Research in Computer Science ,Engineering and Information Technology (IJSRCSEIT),2017 ,Vol.2.

[12] Wenqing Zhang , Yongjian Liao , Shijie Zhou ,Jiaqing Luo , Hongrong Cheng - A Lightweight Detection of the RFID Unauthorized Reading Using RF Scanner

Referințe

DOCUMENTE SIMILARE

while the device is operating, a coffee control, cost- effective, and Zigbee protocol based mostly wireless detector network that delivers an intelligent police

RFID tag is used to detect the book type .This process will be easy to maintain a large library in a easy manner..

So to overcome the limitations of the previously developedmethods, face recognition based automatic attendance marking system is developed using deep learning

In this paper, we have proposed a Cloud-AHP based trust assessment system for a cloud environment, where trustworthiness of cloud service providers is assessed based

This project works for the easy fault identification system in the underground cable transmission line from the base station to the distribution side using ARDUINO and IoT..

Abstract-Traditional soil harvesting takes a long time to decompose, which makes it disease-prone and costly. Hydroponics is the practise of growing plants without

As a means of control for thermotolerant coliforms, a treatment system was designed based on a man-made wetland (artificial), subsurface flow type with vertical orientation,

The World is facing a huge problem nowadays of disposal, segregation and recycling of solid waste, and inappropriate management of these wastes are hazardous and