Professional Documents
Culture Documents
1
DECLARATION OF ORIGINALITY FORM
Verified by:
Supervisor’s name :
Supervisor’s signature:
Date :
2
APPROVAL PROJECT REPORT
The project proposal report titled "DOORLOCK SMART SYSTEM (RFID)" has been
submitted, reviewed and verified as a fulfills the conditions and requirements of the Project
Checked by :
Supervisor’s name :
Supervisor’s signature :
Date :
Verified by :
Project Coordinator name :
Signature of Coordinator :
Date :
3
ACKNOWLEDGEMENTS
From all the efforts that have been performed for this project, finally got our complete the full
report as well as on electronic engineering projects. In preparing this report, too many
challenges and trials our task ahead, but it would not have been possible without the kind
support and help of many individuals and organizations. I would like to thanks a million of
people who helped a lot from the beginning to the end, till the report finally successfully
completed perfectly and successfully. Gratitude of thanks to our supervisor Ts Jumriani
Nongkang for their guidance and constant supervision as well as for providing necessary
information regarding the project and also for their support in completing the project.
4
ABSTRACT
5
TABLE OF CONTENT
TITLE PAGE
Declaration 2
Approval 3
Acknowledgement 4
Abstract 5
Table of content 6-7
List of figures 8
List of tables 8
List of symbols 8
List of abbreviations 8
CHAPTER
1 INTRODUCTION
1.1 Introduction
1.2 Project Background
1.3 Problem Statements
1.4 Project Objective
1.5 Project Scope
1.6 Project Significance
2 LITERATURE REVIEW
2.1 Introduction
2.2 Literature Review Topic 1
2.2.1 Subtopic Literature Review Topic 1
2.3 Literature Review Topic 2
2.3.1 Subtopic Literature Review Topic 2
6
3 METHODOLOGY
3.1 Introduction
3.2 Project Design and Overview
3.2.1 Block Diagram of the Project
3.2.2 Flowchart of the Project
3.2.3 Project Description
3.3 Project Hardware
3.3.1 Schematic Circuit
3.3.2 Description of Main Component
3.3.2.1 Component 1
3.3.2.2 Component 2
3.3.2.3 Component 3
3.3.3 Circuit Operation
3.4 Project Software
3.4.1 Flowchart of the System
3.4.2 Description of the Flowchart
3.5 Prototype Development
3.5.1 Mechanical Design/Product Layout
3.6 Summary
4 EXPECTED RESULT
REFERENCES
APPENDICES
Appendix 1: Gantt Chart/Milestone
Appendix 2: Datasheet
Appendix 3: Program Coding
7
LIST OF FIGURES
BIL FIGURE TITLE PAGE
.
1. FIGURE 1 BARCODE 9
2. FIGURE 2 RFID BASED DOOR LOCK SYSTEM 10
3. FIGURE 3 SYSTEM BLOCK DIAGRAM 17
4. FIGURE 4 FLOWCHART OF THE PROJECT 18
5. FIGURE 5 HARDWARE COMPONENT 19-20
6. FIGURE 6 SCHEMATIC CIRCUIT 20
7. FIGURE 7 PROTEUS SCHEMATIC 23
8. FIGURE 8 FLOWCHART OF THE SYSTEM 24
LIST OF TABLE
BIL TABLE TITLE PAGE
.
1. TABLE 1 FUNCTION AND OPERATIONCOMPONENT 14-15
2.
3.
LIST OF SYMBOL
BIL SYMBOL TITLE PAGE
.
1.
2.
3.
LIST OF ABBREVIATIONS
BIL ABBREVIATION TITLE PAGE
. S
1.
2.
3.
CHAPTER 1
8
1.0 INTRODUCTION
A digital door locking system is also implemented and governed by RFID reader which
authenticate and validate the user and open the door automatically. It also keeps the record of
check-in and check-out of the user. RFID, Radio Frequency Identification is an expensive
technology, can be implemented for several applications such as security, asset tracking,
inventory detection, access control applications.
RFID ( Radio Frequency Identification ), one of the promising technologies, that has
been widely applied into the access control and security systems. RFID is a leading automatic
identification technology. RFID is a technology that helps to identify the animate or
inanimate through radio waves. A properly selected security system can overcome these
problems and can be integrated with other system to provide a more rounded overall security
solution. Other than that, RFID also is a technology for automated identification of objects
and people. It is generic term that is used to describe a system that transmits the identify ( in
the form of a unique serial number) of an object or person wirelessly, using radio waves.
Figure 1: Barcode
Barcodes originally were scanned by special optical scanners called barcode scanner. A
barcode reader or barcode scanner is an electronic device for reading printed barcodes. Like a
flatbed scanner, it consists of a light source, a lens and a light sensor translating optical
impulses into electrical ones. Additionally, nearly all barcode readers contain decoder
circuitry analyzing the barcode’s image data provided by the sensor and sending the
barcode’s content to the scanner’s output port.
9
By installing the system at the entrance will only allow the authorized personnel to
enter the organization. The system is not restricted to main entrance installation, but can be
installed at various entrance within the organization to track personnel movement thereby
restricting their access to areas where they are not authorized.
Figure 1 show two different ways access control system can be accomplished. Use of
keys which is old method and by use of RFID technology. The aim is granting access to
authorized personnel and denying access to unauthorized personnel by using RFID
technology instead of keys as shown in figure 1. Access control keypads are devices which
may be used in addition to or in place of card readers. The keypad requires that a person
desiring to gain entry. This system is also known as barcode system.
Security systems play an important role to prevent unauthorized personnel entry into a
secured environment, which may include physical and intellectual property. Various door
10
locks such as mechanical locks or electrical locks were designed to attain basic security
requirements. Basically, these locks can be easily hacked by unwanted people thereby
allowing unauthorized personnel into secured premises.
According to Orji EZ (2018) Security systems play an important role to prevent unauthorized
personnel entry into a secured environment, which may include physical and intellectual
property. Various door locks such as mechanical locks or electrical locks were designed to
attain basic security requirements. Basically, these locks can be easily hacked by unwanted
people thereby allowing unauthorized personnel into secured premises. Then, according to
Gyanendra (2010) , We implemented a security system containing door locking system
containing door locking system using passive type of RFID which can activate, authenticate,
and validate the user and unlock the door in real time for secure access.
Next, according to K. Varsha (2015) , A security system was designed and developed
for safety of the belongings of the lecturers in IPT. It includes the basic information,
schematic, circuit diagram, technical details of the systems used like RFID (Radio Frequency
Identification) and Barcode system and design/test data of the developed security system.
Other than that, according Refgiufi.P , The benefits obtained is that with the Door
Lock Unlock system using RFID can help and make it easier for officers to open and close
the door without having to find a suitable key first. Future work may provide access permits
that must be granted by property owners for further security measures.
Unlike manual keys, electronic keys move the key automatically after getting input
from the identifier, one of the identifying tools that can be used is RFID (Radio-Frequency
recognizable proof), RFID technology is able to change management applications,
assessment, inventory control, and premise information . Automatic identification and control
of expositions are key to improving efficiency. Using RFID technology can achieve
11
automatic identification, but how to integrate RFID with the system is an inexplicable part.
To prepare for RFID changes, we need to expand our ideas to include new compositions
control systems integrated with RFID technology. (Hameed, Saquib, Hassan, & Junejo, 2015)
Therefore, the project have the capability of achieving the following objectives:-
i) The ability to keep the registered users updated about the visitor at the cabinet.
ii) The ability to record the entry information was stored in the database with the date.
iii) The ability to detect the entry of various person trough a cabinet or a passage using
. RFID technology.
Scope of this project is focuses at Electrical Engineering Department specially at the cabinet
key. The application of this project are specialize to this main cabinet key where the user
commonly difficult to detect. The system stores all the necessary information about the user.
A new user is first registered with the system and the corresponding information is burn in
RFID tag. This RFID tag will be accessible through the system. When a registered user
comes to the entry point, and put the tag into reader, the system checks whether it is
registered user or imposter.
The lecturer needs to scan the ID card. After completion of this process, the data
stored in the barcode of lecturer’s ID card is available at the one port of microcontroller. The
RFID reader mounted on the door reads the data of the tags possessed by the respective
lecturer and sends it to the microcontroller at the other port. The number of tags possessed by
the lecturer is also recorded.
12
The benefits of this project are the system create a log containing check-in and check-out of
each user along with the basic information of user. Besides that, with RFID, wireless
automatic identification takes a very specific form: the object, location or individual is
marked with a unique identifier code contained with an RFID tag, which is in some way
attached to or embedded in the target. Next, RFID technology to provide solution for secure
access of a space while keeping record of the user.
CHAPTER 2
2.1 Introduction
Research has shown the door locking system functions in real time as when the user put the
tag in contact with the reader, the door open and the check-in information is stored in central
server along with basic information of the user. The advancement in technology with time
has led to smart access to everyday object through Internet solving daily life problems and
bringing ease.
A lab security system integrating the Barcode and RFID is successfully developed and
tested. The major contribution of this work is managing to write a functional code for
Microcontroller to communicate with the RFID reader and also the barcode scanner. The
range of the RFID reader is approximately 1 inch. Keeping the RFID tag at maximum
distance may distort the data. The security system is fairly accurate as expected. There are
little to no false positives, although sometimes there are false negatives. If the card is held
around the maximum range, occasionally incorrect data is received. However, if the card is
within an inch of the coil, the data can be read with virtually no errors.
13
The RFID tag serves as a labeling tool for an object in which there is information about
the object. RFID reader is used as a filtering tool or reader of information contained in the
RFID tag, while the database is used as a repository of information about objects owned by
the RFID tag. Radio Frequency Identification (RFID) is a contactless technology that is
widely used in some industries for tasks such as access control systems, book tracking in
libraries, toll systems, supply chain management, and so on.
The integration of both RFID and Barcodes generates a project with wider boundaries
and effective solutions. The extensive work realized some noticeable advantages of RFID
over barcode. The RFID tags may not ever completely replace barcodes, partly due to their
higher cost and the advantage of multiple data sources on the same object.
TOPIC 1
In this topic, we already do the literature review regarding about the components that
involved in this project “Door Lock Smart System (RFID)”. It is related to the function and
operation of each of these components.
14
velocity and rotational or linear
acceleration. It speed and position.
consists of a suitable The motor controlled
motor. with an electrical
signal.
TOPIC 2
15
2.3 LITERATURE REVIEW
In this topic, we already do the literature review regarding about the components that
involved in this project “Door Lock Smart System (RFID)”. It is related to Barcode as a
represent data of the users.
2.3.1 BARCODE
Decodes any Barcode format and Simple Serial output at 9600 bps
Good read indicator through LED and Buzzer
Works at 5V supply and RS232 level output (Easy to connect to microcontrollers)
Hand held unit has switch which controls the reader red LED array when reading.
CHAPTER 3
16
3.0 METHODOLOGY
3.1 Introduction
In this proposed work, the RFID reader reads the data from tag and sends the card UID to
Arduino microcontroller for comparison, if the card is valid then Arduino microcontroller
display access granted else, access denied on the screen.
INTERNET
START 17
Is ID present?
18
In this study, we proposed a security system contains door locking system using passive type
of RFID. The system is implemented in three spaces using central database system. The
secure space located on same or different part of buildings as illustrate in figure1. The system
used hardware as well as software. The hardware components are RFID reader, tags, USB
connections and connecting cables etc. In addition we have used actuator (stepper motor for
this purpose).
19
BREADBOARD AND JUMPER WIRES PROXIMITY SENSOR CNY70
20
The main component of the proposed security system using RFID reader, Barcode and
Arduino UNO board. The brief description and some special features are described in the
following;
3.3.2.1 Component 1
It is a technology for automated identification of objects and people. It is a generic term that
is used to describe a system that transmits the identity (in the form of unique serial number)
of an object or person wirelessly, using radio waves. A basic RFID system consist of three
components: An antenna or coil, a transceiver (with decoder), and a transponder (RF tag)
electronically programmed with unique information. The antenna emits radio signals to
activate the tag and to read and write data to it.
An RFID is a device that is used to interrogate an RFID tag. RFID communicate with
tags through an RF channel to obtain identifying information. RF module acts as both a
transmitter and receiver of radio frequency signals. The reader has antenna that emits radio
wave; the tags responds by sending back its signals. The reader is a handheld or fixed unit
that can interrogate nearby RFID tags and obtain their ID numbers using radio frequency
(RF) communications. When a passive tag is within range of a reader, the tag’s antenna
absorbs the energy being emitted from the reader, directs the energy to ‘fire up’ the integrated
circuit on the tag, which then uses the energy to beam back the ID number and any other
associated information.
3.3.2..2 Component 2
2. BARCODE
21
circuitry analyzing the barcode’s the barcode’s image data provided by the sensor and
sending the barcode’s content to the scanner’s output port.
3.3.2.3 Component 3
The circuit contains power source connection to deliver power to microcontroller chip. The
circuit also contains RFID reader port connection and pin combination for motor driver
circuit board. The circuit has resistors, capacitors, LCD display board connection with
microcontroller chip etc.
22
PROTEUS – Proteus ISIS is the best simulation software in the world for various designs
with electronics and microcontroller. It is mainly popular because of availability of almost all
microcontrollers in it. So it is a handy tool to test programs and embedded designs for
electronics hobbyist and expert. You can simulate your programming microcontroller in
Proteus 8Simulation Software.
23
3.4.1 FLOWCHART OF THE SYSTEM
ENTRY POINT
READ BARCODE ID
IS THE USER
REGISTERED
READ USER
INFORMATION
DATABASE
24
3.4.2 DESCRIPTION OF FLOWCHART
The system stores all the necessary information about the user. A new user is first registered
with the system and the corresponding information is burn in RFID tag. This RFID tag will
be accessible through the system. When a registered user comes to the entry point, and put
the tag into reader, the system checks whether it is registered user or imposter. If the user is
registered one then the tab information is matched with the user information stored in system.
The door is open to entry of the user after successful authentication and close automatically
after a specified time interval. The check-in information is also stored in the database with
date and time. A log is also generated by the system according to check-in information. User
check-in process is depicted. The flowchart is shown in figure 4.
3.6 SUMMARY
The RFID and Barcode based cost effective security system is designed and developed using
commercially graded components suiting the basic requirements of the system. An automatic
access control system using Arduino and RFID has been prototyped and functioned as
desired. The system can be installed at the entrance of a secured environment to prevent an
unauthorized individual access to the environment.
CHAPTER 4
25
REFERENCES
[1] Gyanendra. K ( 2010, August 11 ) , A Digital Security System with Door Lock System
Using RFID Technology.
[2] Ibshar . I ( 2017 ) , Smart Door Lock System with Automation and Security
[3] Jae-Young Pyun (February 2009) , Smart digital door lock for the home automation.
[4] J Pathol Inform (13 August 2011) A review of radio frequency identification technology
for the anatomic pathology or biorepository laboratory: Much promise, some progress, and
more work needed.
[6] Md. Mostafizur Rahman Komol (April 2018) RFID and Finger Print Based Dual Security
System: A Robust Secured Control to Access Through Door Lock Operation
[7] M. Sai Divya (3/12/2018) Centralized Authentication Smart Locking System using
RFID,Fingerprint, Password and GSM
[8] Orji EZ ( 2018 ) , Automatic Access Control System using Arduino and RFID
[9] Ralph Ting and Mackenzie Keane (2014) RFID Door Lock
[10] Refgiufi . P , Pemanfaatan Sensor RFID sebagai Smart Door Lock Berbasis Arduino
[11] Syed Mamun . R ( 2018, September ) , Design and Contruction of an Automatic Security
System of a Door Using RFID Technology
26
APPENDICES
27