Security system solutions for strategic facilities are critical to prevent the intrusion of unauthorized persons, however there are many types of automatic access control systems which are expensive and complicated to use. This paper focuses on the development of a simple security system that combines Radio Frequency Identification and password to provide a low cost and formidable access control for entrances. The system is built on ATMEGA8 Microcontroller that directs the RFID reader to scan and authenticate users’ identification tag and further request for password through a keypad before activating a motor to grant access. The Microcontroller which also controls a liquid crystal display was programmed using Microbasic language; the data of identification tags and password were stored in its database. The RFID reader was able to scan tags within 25cm range in two seconds, and open a prototype door within 3 seconds of entering the correct password. The motor closes the door after a preset 5 seconds delay. The system was implemented for 12 users, the components used are cheap and available; the system is formidable and reliable.
TABLE OF CONTENTS
TITLE PAGE
APPROVAL PAGE
DEDICATION
ACKNOWELDGEMENT
ABSTRACT
TABLE OF CONTENT
CHAPTER ONE
- INTRODUCTION
- PROBLEM STATEMENT
- AIM OF THE PROJECT
- OBJECTIVE OF THE PROJECT
- SIGNIFICANCE OF THE PROJECT
- PURPOSE OF THE PROJECT
- LIMITATION OF THE PROJECT
- APPLICATION OF THE PROJECT
- PROJECT ORGANISATION
CHAPTER TWO
LITERATURE REVIEW
2.0 LITERATURE REVIEW
2.1 REVIEW OF THE STUDY
2.2 OVERVIEW OF RFID
2.3 REVIEW OF RELATED
CHAPTER THREE
3.0 METHODOLOGY
3.1 INTRODUCTION
3.2 BLOCK DIAGRAM OF THE SYSTEM
3.3 SYSTEM HARDWARE DESCRIPTION
3.4 CIRCUIT DESCRIPTION
CHAPTER FOUR
4.0 RESULT AND DISCUSSION
CHAPTER FIVE
- CONCLUSIONS
- RECOMMENDATION
- REFERENCES
CHAPTER ONE
1.0 INTRODUCTION
1.1 BACKGROUND OF THE PROJECT
Security systems are very important in the protection of lives, premises and valuable resources. There are many advanced methods of providing security that have been developed and are in use in the last few decades, one important area is the security system required for strategic applications such as military bases, research centers, laboratories and other critical facilities. Such advanced security systems are complex and expensive making them implementable in high end applications only. However, with recent progress in technology and the growing need for increased security in civilian and other applications, many low cost solutions for security system have emerged with a range of degrees of sophistication, complexity and cost (Gill, Yang, Yao, and Lu, 2009).
Different access control automation techniques are available to reduce the system complexity and lower costs, these systems do not incorporate complex and expensive components. A home gateway is implemented to facilitate the interoperability between heterogeneous networks and provide a consistent interface, regardless of the accessing device (Udaya, Murty and Kurmar, 2013).
There is a wide range of Automatic Identification (Auto-ID) systems for access control in use, these includes magnetic stripes, Optical Character Recognition (OCR), barcodes, biometrics, smart cards and Radio Frequency Identification (RFID). However, each of these technologies has their advantages and drawbacks. The OCR systems allow the use of manual and auto-identification simultaneously but the very high cost of the readers prevented its widespread use (Finkenzeller, 2003)
The use of barcodes is a cost-effective way for managing inventory, they have some disadvantages such as limited information-storing capacity; a strict line of sight requirement between the scanner and the barcode, which effectively prevents multiple barcodes to be processed simultaneously; limited data redundancy and error correction; and a lack of inbuilt data-security standards. The use of biometrics, such as fingerprinting, retina scans, iris scans, and voice recognition are strong identification solutions in automatic access control but these technologies are expensive and privacy invasive (Sweeney and Patrick, 2005).
Smart card and its derivatives such as memory card or microprocessor card solutions use standard credit-card sized plastic cards with an integral data storage system designed to make financial transactions secure and fast, but a with high cost of maintaining the reader (Goodrum, McLaren and Durfee, 2006). RFID tries to overcome the disadvantages of previous systems by improving the speed and accuracy of data collection and dissemination as well as reducing the overall cost. RFID systems rely on Radio Frequency to transmit a tag-specific unique serial number to a reader or interrogator (Amit and Berghel, 2011).
A RFID system is composed of three basic units, a transponder unit or tag with a unique identifier that facilitates auto-identification of any object to which the tag is attached, a reader unit or interrogator that manages the radio frequency communication with the tag and a middleware or reader interface layer, which is essentially a software that acts as an interface between the basic RFID hardware components, and the software application (Shoewu and Badejo, 2006).
There currently is not a definite industry standard for frequency, but the most common applications around the world use frequencies of 125 KHz and 13.56 MHz. There are three classes of the RFID tags; Active tags, Passive tags and Semi-Passive (Battery –Assisted Passive) tags. The Active tag has its own battery that is used to broadcast signals over great distances; it is usually bigger in size and capable of carrying more information. The Passive tag has no inbuilt power source, the signal from the RFID reader creates an electromagnetic field that powers the tag, and it is cheaper than the active tag. The Semi-Passive tag or Battery Assisted Passive tag (BAP) is equipped with an onboard battery that drives the chip’s circuitry but power for communication of the signal is derived from the reader’s electromagnetic field as in the case of passive tags (Gyanendra and Pawan, 2010).
The password identification system requires the user to enter a password (a set of numeric or alphanumeric characters) on a keypad which then grants access to the user if it matches the required characters residing on a database (Kyuhee and Mokdong, 2006).
The RFID system has its vulnerabilities such as card skimming and tag killing, other security issues are card spoofing, tag cloning and malwares (Amit and Berghel, 2011). This gave rise to the need for a simple and affordable system that will utilize the advantages of the RFID and also overcome its drawbacks; leading to the use of password identification in addition to the RFID for access control, this is the aim of this study.
1.2 PROBLEM STATEMENT
The need for having a constant home protection has always been there. But in the recent times, considering a dramatic rise in petty crimes like robbery and theft, the need has been more strongly felt to have a fool proof protection of the belongings and the family members. Home security has come a long way in the last few decades. It was in the hands of a guard who manually provided surveillance during nights in the earlier days, but it was not fool proof as it was only normal for him to have momentary lapse of concentration. This device brought solution to this need. It ensures adequate protection against intruders.
1.3 AIM OF THE PROJECT
The main aim of this project is to create a comfort in the minds of house owners when they out from their premises without much fear of intruder.
1.4 OBJECTIVE OF THE PROJECT
The main objective of the proposed system is to construct a secure access control system to control the entry of various items through a door or a passage using RFID and biometric technology.
1.5 SIGNIFICANCE OF THE PROJECT
This device functions as an electronics watch dog. This device functions as a major security device used in residential, commercial, industrial, and military properties for protection against burglary (theft) or property damage, as well as personal protection against intruders.
1.6 PURPOSE OF THE PROJECT
This project proposes the development of security system for form houses and residential houses.
1.7 APPLICATION OF THE PROJECT
This device can be used are as follows:
- Home Security Systems.
- Prisons Security.
- Vehicle Security.
- Broadband alarm monitoring.
- Glass Break.
- Property Theft Alarm
1.7 LIMITATION OF THE PROJECT
- The given alarm system determines the presence of the intruder only, and does not determine how many persons are in there
- The alarm activates only when the person cuts through the line of the PIR sensor
1.8 SIGNIFICANCE OF THE PROJECT
- The given system is handy and portable, and thus can be easily carried from one place to
- The circuitry is not that complicated and thus can be easily
- The given system sets off a powerful buzzer, and it is effective as any other alarm system available in the
1.9 PROJECT MOTIVATION
Since innovation is so cutting-edge, one of a kind access control frameworks have turned out essential to win security dangers to different associations. Access control framework confines access to a property, a structure, or a space to approved people. In the field of data and protection security, door access control frameworks are assuming major indispensable jobs to shield associations. This is where everything is related with the framework, where anyone can get hold of information from wherever around the world. In this manner, hacking of one’s data is a noteworthy issue. On account of these perils, it is basic to have a type of individual recognizable proof (ID) to get to one’s own specific data. Security get to framework is exceptionally helpful to use at home, office and business structures. Every one of these years, different frameworks are acquainted with track the individual’s development. Among standard individual ID systems, secret key and ID card strategies are the most watched techniques. Be that as it may, it isn’t hard to hack password now and recognizable ID cards may get lost, henceforth making these strategies very sketchy. With the upgrade in the innovation, Framework Security is getting to be thought of significant worry in different associations and consequently advanced locks have turned into a significant piece of these security frameworks. There are numerous sorts of security frameworks that are accessible for security of our place. The main objective of this project was to ensure a proper security to building against theft or intruder.
1.10 PROJECT WORK ORGANISATION
The various stages involved in the development of this project have been properly put into five chapters to enhance comprehensive and concise reading. In this project thesis, the project is organized sequentially as follows:
Chapter one of this work is on the introduction to this study. In this chapter, the background, significance, objective limitation and problem of this study were discussed.
Chapter two is on literature review of the study. In this chapter, all the literature pertaining to this work was reviewed.
Chapter three is on design methodology. In this chapter all the method involved during the design and construction were discussed.
Chapter four is on testing analysis. All testing that result accurate functionality was analyzed.
Chapter five is on conclusion, recommendation and references.
Design And Construction Of A Smart Access Door Control System Using RFID And Password. (n.d.). UniTopics. https://www.unitopics.com/project/material/design-and-construction-of-a-smart-access-door-control-system-using-rfid-and-password/
“Design And Construction Of A Smart Access Door Control System Using RFID And Password.” UniTopics, https://www.unitopics.com/project/material/design-and-construction-of-a-smart-access-door-control-system-using-rfid-and-password/. Accessed 22 November 2024.
“Design And Construction Of A Smart Access Door Control System Using RFID And Password.” UniTopics, Accessed November 22, 2024. https://www.unitopics.com/project/material/design-and-construction-of-a-smart-access-door-control-system-using-rfid-and-password/
Here’s a typical structure for Design And Construction Of A Smart Access Door Control System Using RFID And Password research projects:
- The title page of Design And Construction Of A Smart Access Door Control System Using RFID And Password should include the project title, your name, institution, and date.
- The abstract of Design And Construction Of A Smart Access Door Control System Using RFID And Password should be a summary of around 150-250 words and should highlight the main objectives, methods, results, and conclusions.
- The introduction of Design And Construction Of A Smart Access Door Control System Using RFID And Password should provide the background information, outline the research problem, and state the objectives and significance of the study.
- Review existing research related to Design And Construction Of A Smart Access Door Control System Using RFID And Password, identifying gaps the study aims to fill.
- The methodology section of Design And Construction Of A Smart Access Door Control System Using RFID And Password should describe the research design, data collection methods, and analytical techniques used.
- Present the findings of the Design And Construction Of A Smart Access Door Control System Using RFID And Password research study using tables, charts, and graphs to illustrate key points.
- Interpret Design And Construction Of A Smart Access Door Control System Using RFID And Password results, discussing their implications, limitations, and potential areas for future research.
- Summarize the main findings of the Design And Construction Of A Smart Access Door Control System Using RFID And Password study and restate its significance.
- List all the sources you cited in Design And Construction Of A Smart Access Door Control System Using RFID And Password project, following a specific citation style (e.g., APA, MLA, Chicago).