You are on page 1of 27

JABATAN KEJURUTERAAN ELEKTRIK

DIPLOMA KEJURUTERAAN ELEKTRONIK (KOMUNIKASI)

FINAL PROPOSAL REPORT


SESSION: JUNE 2020

TITLE: SMART DOOR LOCK SYSTEM (RFID)

NAME DG AINA AMMIRA BINTI AG MUHIDDIN

REGISTRATION NO. 07DEP18F2024

SUPERVISOR: Ts. JUMRIANI BINTI NONGKANG


PANEL: Ts. DHYA ALYSHA @ CLARA VALDEZ

1
DECLARATION OF ORIGINALITY FORM

This proposal project entitled …………………………………………………… is prepared


by ………………………………….. and submitted to the Department of Electrical,
Politeknik Kota Kinabalu to fulfil the requirements of the Diploma in Engineering Electronic
Communication Studies.

Name of student: Signature of Student

DG AINA AMMIRA BINTI AG MUHIDDIN ………………………

Verified by:

Supervisor’s name :

Supervisor’s signature:

Date :

2
APPROVAL PROJECT REPORT

The project proposal report titled "DOORLOCK SMART SYSTEM (RFID)" has been

submitted, reviewed and verified as a fulfills the conditions and requirements of the Project

Proposal Writing as stipulated

Checked by :
Supervisor’s name :
Supervisor’s signature :
Date :

Verified by :
Project Coordinator name :
Signature of Coordinator :
Date :

3
ACKNOWLEDGEMENTS

From all the efforts that have been performed for this project, finally got our complete the full
report as well as on electronic engineering projects. In preparing this report, too many
challenges and trials our task ahead, but it would not have been possible without the kind
support and help of many individuals and organizations. I would like to thanks a million of
people who helped a lot from the beginning to the end, till the report finally successfully
completed perfectly and successfully. Gratitude of thanks to our supervisor Ts Jumriani
Nongkang for their guidance and constant supervision as well as for providing necessary
information regarding the project and also for their support in completing the project.

In addition, I would like to express my gratitude towards my partner member, Billy


Benjy for his kind co-operation and encouragement which help me in completion of this
project. And not to be forgotten also to all lecturers as contribute guidance to us about this
study.

4
ABSTRACT

RFID Radio Frequency Identification is an inexpensive technology, can be implemented for


several application such as security, asset tracking, people tracking, inventory detection,
access control application. Access control is the process of verifying a user’s claimed identity
and giving or denying the access. The aim of the proposed system is to construct a secure
access control system to control the entry of various items through a door or passage using
RFID technology. At the very simplest level, Radio Frequency Identification (RFID)
technologies allow the transmission of a unique serial number wirelessly, using radio waves.
We implemented a security system containing door locking system using passive type of
RFID which can activate, authenticate, and validate the user and unlock the door in real time
for secure access. The advantage of using passive RFID is that it functions without a battery
and passive tags are lighter and are less expensive than the active tags. A centralized system
manages the controlling, transaction and operation task. The door locking system functions in
real time as the door open quickly when user put their tag in contact of reader. The system
also creates a log containing check-in and check-out of each user along with basic
information of user.

5
TABLE OF CONTENT

TITLE PAGE
Declaration 2
Approval 3
Acknowledgement 4
Abstract 5
Table of content 6-7
List of figures 8
List of tables 8
List of symbols 8
List of abbreviations 8

CHAPTER

1 INTRODUCTION
1.1 Introduction
1.2 Project Background
1.3 Problem Statements
1.4 Project Objective
1.5 Project Scope
1.6 Project Significance

2 LITERATURE REVIEW
2.1 Introduction
2.2 Literature Review Topic 1
2.2.1 Subtopic Literature Review Topic 1
2.3 Literature Review Topic 2
2.3.1 Subtopic Literature Review Topic 2

6
3 METHODOLOGY
3.1 Introduction
3.2 Project Design and Overview
3.2.1 Block Diagram of the Project
3.2.2 Flowchart of the Project
3.2.3 Project Description
3.3 Project Hardware
3.3.1 Schematic Circuit
3.3.2 Description of Main Component
3.3.2.1 Component 1
3.3.2.2 Component 2
3.3.2.3 Component 3
3.3.3 Circuit Operation
3.4 Project Software
3.4.1 Flowchart of the System
3.4.2 Description of the Flowchart
3.5 Prototype Development
3.5.1 Mechanical Design/Product Layout
3.6 Summary

4 EXPECTED RESULT

REFERENCES

APPENDICES
Appendix 1: Gantt Chart/Milestone
Appendix 2: Datasheet
Appendix 3: Program Coding

7
LIST OF FIGURES
BIL FIGURE TITLE PAGE
.
1. FIGURE 1 BARCODE 9
2. FIGURE 2 RFID BASED DOOR LOCK SYSTEM 10
3. FIGURE 3 SYSTEM BLOCK DIAGRAM 17
4. FIGURE 4 FLOWCHART OF THE PROJECT 18
5. FIGURE 5 HARDWARE COMPONENT 19-20
6. FIGURE 6 SCHEMATIC CIRCUIT 20
7. FIGURE 7 PROTEUS SCHEMATIC 23
8. FIGURE 8 FLOWCHART OF THE SYSTEM 24

LIST OF TABLE
BIL TABLE TITLE PAGE
.
1. TABLE 1 FUNCTION AND OPERATIONCOMPONENT 14-15
2.
3.

LIST OF SYMBOL
BIL SYMBOL TITLE PAGE
.
1.
2.
3.

LIST OF ABBREVIATIONS
BIL ABBREVIATION TITLE PAGE
. S
1.
2.
3.

CHAPTER 1

8
1.0 INTRODUCTION

A digital door locking system is also implemented and governed by RFID reader which
authenticate and validate the user and open the door automatically. It also keeps the record of
check-in and check-out of the user. RFID, Radio Frequency Identification is an expensive
technology, can be implemented for several applications such as security, asset tracking,
inventory detection, access control applications.

RFID ( Radio Frequency Identification ), one of the promising technologies, that has
been widely applied into the access control and security systems. RFID is a leading automatic
identification technology. RFID is a technology that helps to identify the animate or
inanimate through radio waves. A properly selected security system can overcome these
problems and can be integrated with other system to provide a more rounded overall security
solution. Other than that, RFID also is a technology for automated identification of objects
and people. It is generic term that is used to describe a system that transmits the identify ( in
the form of a unique serial number) of an object or person wirelessly, using radio waves.

Figure 1: Barcode

Barcodes originally were scanned by special optical scanners called barcode scanner. A
barcode reader or barcode scanner is an electronic device for reading printed barcodes. Like a
flatbed scanner, it consists of a light source, a lens and a light sensor translating optical
impulses into electrical ones. Additionally, nearly all barcode readers contain decoder
circuitry analyzing the barcode’s image data provided by the sensor and sending the
barcode’s content to the scanner’s output port.

9
By installing the system at the entrance will only allow the authorized personnel to
enter the organization. The system is not restricted to main entrance installation, but can be
installed at various entrance within the organization to track personnel movement thereby
restricting their access to areas where they are not authorized.

Figure 2: RFID Based Door Lock System

Figure 1 show two different ways access control system can be accomplished. Use of
keys which is old method and by use of RFID technology. The aim is granting access to
authorized personnel and denying access to unauthorized personnel by using RFID
technology instead of keys as shown in figure 1. Access control keypads are devices which
may be used in addition to or in place of card readers. The keypad requires that a person
desiring to gain entry. This system is also known as barcode system.

1.2 Project Background

Security systems play an important role to prevent unauthorized personnel entry into a
secured environment, which may include physical and intellectual property. Various door

10
locks such as mechanical locks or electrical locks were designed to attain basic security
requirements. Basically, these locks can be easily hacked by unwanted people thereby
allowing unauthorized personnel into secured premises.

1.3 Problem Statements

According to Orji EZ (2018) Security systems play an important role to prevent unauthorized
personnel entry into a secured environment, which may include physical and intellectual
property. Various door locks such as mechanical locks or electrical locks were designed to
attain basic security requirements. Basically, these locks can be easily hacked by unwanted
people thereby allowing unauthorized personnel into secured premises. Then, according to
Gyanendra (2010) , We implemented a security system containing door locking system
containing door locking system using passive type of RFID which can activate, authenticate,
and validate the user and unlock the door in real time for secure access.

Next, according to K. Varsha (2015) , A security system was designed and developed
for safety of the belongings of the lecturers in IPT. It includes the basic information,
schematic, circuit diagram, technical details of the systems used like RFID (Radio Frequency
Identification) and Barcode system and design/test data of the developed security system.

Other than that, according Refgiufi.P , The benefits obtained is that with the Door
Lock Unlock system using RFID can help and make it easier for officers to open and close
the door without having to find a suitable key first. Future work may provide access permits
that must be granted by property owners for further security measures.

Unlike manual keys, electronic keys move the key automatically after getting input
from the identifier, one of the identifying tools that can be used is RFID (Radio-Frequency
recognizable proof), RFID technology is able to change management applications,
assessment, inventory control, and premise information . Automatic identification and control
of expositions are key to improving efficiency. Using RFID technology can achieve

11
automatic identification, but how to integrate RFID with the system is an inexplicable part.
To prepare for RFID changes, we need to expand our ideas to include new compositions
control systems integrated with RFID technology. (Hameed, Saquib, Hassan, & Junejo, 2015)

1.4 Project Objectives

Therefore, the project have the capability of achieving the following objectives:-

i) The ability to keep the registered users updated about the visitor at the cabinet.

ii) The ability to record the entry information was stored in the database with the date.

iii) The ability to detect the entry of various person trough a cabinet or a passage using
. RFID technology.

1.5 Project Scope

Scope of this project is focuses at Electrical Engineering Department specially at the cabinet
key. The application of this project are specialize to this main cabinet key where the user
commonly difficult to detect. The system stores all the necessary information about the user.
A new user is first registered with the system and the corresponding information is burn in
RFID tag. This RFID tag will be accessible through the system. When a registered user
comes to the entry point, and put the tag into reader, the system checks whether it is
registered user or imposter.

The lecturer needs to scan the ID card. After completion of this process, the data
stored in the barcode of lecturer’s ID card is available at the one port of microcontroller. The
RFID reader mounted on the door reads the data of the tags possessed by the respective
lecturer and sends it to the microcontroller at the other port. The number of tags possessed by
the lecturer is also recorded.

1.6 Project Significance

12
The benefits of this project are the system create a log containing check-in and check-out of
each user along with the basic information of user. Besides that, with RFID, wireless
automatic identification takes a very specific form: the object, location or individual is
marked with a unique identifier code contained with an RFID tag, which is in some way
attached to or embedded in the target. Next, RFID technology to provide solution for secure
access of a space while keeping record of the user.

CHAPTER 2

2.0 LITERATURE REVIEW

2.1 Introduction

Research has shown the door locking system functions in real time as when the user put the
tag in contact with the reader, the door open and the check-in information is stored in central
server along with basic information of the user. The advancement in technology with time
has led to smart access to everyday object through Internet solving daily life problems and
bringing ease.

A lab security system integrating the Barcode and RFID is successfully developed and
tested. The major contribution of this work is managing to write a functional code for
Microcontroller to communicate with the RFID reader and also the barcode scanner. The
range of the RFID reader is approximately 1 inch. Keeping the RFID tag at maximum
distance may distort the data. The security system is fairly accurate as expected. There are
little to no false positives, although sometimes there are false negatives. If the card is held
around the maximum range, occasionally incorrect data is received. However, if the card is
within an inch of the coil, the data can be read with virtually no errors.

13
The RFID tag serves as a labeling tool for an object in which there is information about
the object. RFID reader is used as a filtering tool or reader of information contained in the
RFID tag, while the database is used as a repository of information about objects owned by
the RFID tag. Radio Frequency Identification (RFID) is a contactless technology that is
widely used in some industries for tasks such as access control systems, book tracking in
libraries, toll systems, supply chain management, and so on.

The integration of both RFID and Barcodes generates a project with wider boundaries
and effective solutions. The extensive work realized some noticeable advantages of RFID
over barcode. The RFID tags may not ever completely replace barcodes, partly due to their
higher cost and the advantage of multiple data sources on the same object.

TOPIC 1

2.2 LITERATUE REVIEW

In this topic, we already do the literature review regarding about the components that
involved in this project “Door Lock Smart System (RFID)”. It is related to the function and
operation of each of these components.

2.2.1 FUNCTION AND OPERATION OF COMPONENT

COMPONENT FUNCTION OPERATION


1. MFRC522 RFID  The wireless non-  Consists of two main
contact use of radio components, a
frequency waves to transponder/tag to
transfer data. Tagging attached an object to
item with RFID tags be identified, and a
allows users to Transceiver also
automatically and known as
uniquely identify. interrogator/Reader

2. SERVO MOTOR  A rotary actuator or  Closed-loop


linear actuator that mechanism that
allows for precise incorporates
control of angular or positional feedback in
linear position, order to control the

14
velocity and rotational or linear
acceleration. It speed and position.
consists of a suitable The motor controlled
motor. with an electrical
signal.

3. LCD DISPLAY  LCD are available to  LCD works on the


display arbitrary principle of blocking
images or fixed light. While
images with low constructing the
information content, LCD’s, a reflected
which can be mirror is arranged at
displayed or hidden, the back an electrode
such as preset words, plane is made of
digits and seven- indium-tin-oxide
segment display. which is kept on top
and a polarized glass
with a polarizing film
is also added on the
bottom of the device.

5. BREADBOARD AND  Which is normally  Slide the stripped end


used to interconnect of your jumper wire
JUMP WIRES
the components of a through the hole, and
breadboard or other screw the post back
prototype or test down until the wire is
circuit, internally or firmly connected.
with other equipment Typically, only need
or components, to connect a power
without soldering. and ground wire from
posts to the
breadboard.

6. PROXIMITY SENSOR  A proximity sensor is  A non-contact sensor


a sensor able to detect that detect the
CNY70
the presence of presence of an object
nearby objects when the target enters
without any physical the sensor’s field.
contacts.

Table 1: Function And Operation Component

TOPIC 2

15
2.3 LITERATURE REVIEW

In this topic, we already do the literature review regarding about the components that
involved in this project “Door Lock Smart System (RFID)”. It is related to Barcode as a
represent data of the users.

2.3.1 BARCODE

A barcode is an optical machine-readable representation of data relating to the object to


which it is attached. Originally, barcodes systematically represent data by varying the widths
and spacing of parallel lines, and may be referred to as linear or one-dimensional (1D).
Barcodes originally were scanned by special optical scanners called barcode scanner. A
barcode reader (or barcode scanner) is an electronic device for reading printed barcodes. Like
a flatbed scanner, it consists of a light source, a lens and a light sensor translating optical
impulses into electrical ones. Additionally, nearly all barcode readers contain decoder
circuitry analysing the barcode's image data provided by the sensor and sending the barcode's
content to the scanner's output port. In the current context the barcode present on the ID card
of the student refers to the USN (University Seat Number). There are different types of
barcode scanners depending on applications like pen type barcode scanners, laser scanners,
CCD (Charged Coupled Device) scanners etc. The type of barcode scanner used to design
this system is a combination of hand held unit (LED array source and CCD capture) which
takes raw data of the barcode and outputs serial data at 9600 bps with RS232 output suitable
for an interface with the microcontroller.

Features of the Barcode scanner:

 Decodes any Barcode format and Simple Serial output at 9600 bps
 Good read indicator through LED and Buzzer
 Works at 5V supply and RS232 level output (Easy to connect to microcontrollers)
 Hand held unit has switch which controls the reader red LED array when reading.

CHAPTER 3

16
3.0 METHODOLOGY

3.1 Introduction

In this proposed work, the RFID reader reads the data from tag and sends the card UID to
Arduino microcontroller for comparison, if the card is valid then Arduino microcontroller
display access granted else, access denied on the screen.

3.2 Project Design and Overview

3.2.1 Block Diagram of Project

INTERNET

RFID BARCODE RFID ACCESS


ARDUINO
READER CONTROL
MICROCONTR
LER
OLLER

Figure 3: System Block Diagram

3.2.2 Flowchart of the Project

START 17
Is ID present?

Barcode on identification card is scanned


using Barcode Scanner

Barcode data is sent to microcontroller and


stored in memory

Data stored in RFID tags is read with RFID


Reader and is sent to the microcontroller

The number of tags is recorded

Figure 4: Flowchart of the project.

3.2.3 Project Description

18
In this study, we proposed a security system contains door locking system using passive type
of RFID. The system is implemented in three spaces using central database system. The
secure space located on same or different part of buildings as illustrate in figure1. The system
used hardware as well as software. The hardware components are RFID reader, tags, USB
connections and connecting cables etc. In addition we have used actuator (stepper motor for
this purpose).

3.3 Project Hardware

MFRC522 RFID READER SERVO MOTOR

LCD DISPLAY ARDUINO UNO BOARD

19
BREADBOARD AND JUMPER WIRES PROXIMITY SENSOR CNY70

Figure 5: PROJECT HARDWARE

3.3.1 Schematic Circuit

Figure 6: Schematic Circuit

3.3.2 Description of Main Component

20
The main component of the proposed security system using RFID reader, Barcode and
Arduino UNO board. The brief description and some special features are described in the
following;

3.3.2.1 Component 1

1. RADIO FREQUENCY IDENTIFICATION (RFID) READER

It is a technology for automated identification of objects and people. It is a generic term that
is used to describe a system that transmits the identity (in the form of unique serial number)
of an object or person wirelessly, using radio waves. A basic RFID system consist of three
components: An antenna or coil, a transceiver (with decoder), and a transponder (RF tag)
electronically programmed with unique information. The antenna emits radio signals to
activate the tag and to read and write data to it.

An RFID is a device that is used to interrogate an RFID tag. RFID communicate with
tags through an RF channel to obtain identifying information. RF module acts as both a
transmitter and receiver of radio frequency signals. The reader has antenna that emits radio
wave; the tags responds by sending back its signals. The reader is a handheld or fixed unit
that can interrogate nearby RFID tags and obtain their ID numbers using radio frequency
(RF) communications. When a passive tag is within range of a reader, the tag’s antenna
absorbs the energy being emitted from the reader, directs the energy to ‘fire up’ the integrated
circuit on the tag, which then uses the energy to beam back the ID number and any other
associated information.

3.3.2..2 Component 2

2. BARCODE

A barcode is an optical machine-readable representation of data relating to the object to


which it is attached. Originally, barcodes systematically represent data by varying the widths
and spacing of parallel lines, and may be referred to as linear or one-dimensional (ID).
Barcodes originally were scanned by special optical scanners called barcode scanner. A
barcode reader (or barcode scanner) is an electronic device for reading printed barcode. Like
a flatbed scanner, it consists of a light source, a lens and a light sensor translating optical
impulses into electrical ones. Additionally, nearly all barcode readers contain decoder

21
circuitry analyzing the barcode’s the barcode’s image data provided by the sensor and
sending the barcode’s content to the scanner’s output port.

3.3.2.3 Component 3

3. ARDUINO UNO BOARD

It is an open source electronics prototyping platform based on bendable, easy-to-employ


hardware and software. It is proposed for artists, designer, hobbyists & anyone interested in
generating various design for objects or environmental purpose. Arduino UNO is a board
based on ATmega328 microcontroller. It consist of 14 digital input/output pins, six analogue
inputs, a USB link for programming the on-board microcontroller, power jack, an ICSP
header & a reset button. It is work due to 16MHz crystal oscillator & contains everything
needed to support the microcontroller. It is easier to use as the user simply needs to connect it
to a computer with a USB cable or power it with an AC-to-DC. The Arduino UNO board can
be toyed without been concerned about doing something wrong with the board, worst case
scenario the chip can be replaced with a new and cheap one and start over again.

3.3.3 Circuit Operation

The circuit contains power source connection to deliver power to microcontroller chip. The
circuit also contains RFID reader port connection and pin combination for motor driver
circuit board. The circuit has resistors, capacitors, LCD display board connection with
microcontroller chip etc.

3.4 Project Software

MPLAB X IDE – MPLAB X Integrated Development Environment (IDE) is an expandable,


highly configurable software program that incorporates powerful tools to help you discover,
configure, develop, debug and qualify embedded designs for most of microchip’s
microcontroller, microprocessors and digital signal controller. MPLAB X IDE works
seamlessly with the MPLAB development ecosystem of software and tools, many of which
are completely free.

22
PROTEUS – Proteus ISIS is the best simulation software in the world for various designs
with electronics and microcontroller. It is mainly popular because of availability of almost all
microcontrollers in it. So it is a handy tool to test programs and embedded designs for
electronics hobbyist and expert. You can simulate your programming microcontroller in
Proteus 8Simulation Software.

Figure 7: Proteus Schematics

23
3.4.1 FLOWCHART OF THE SYSTEM

ENTRY POINT

READ BARCODE ID

IS THE USER
REGISTERED

READ USER
INFORMATION
DATABASE

 Store check in info


 Open the door
 Close the door

Figure 8: Flowchart of the System

24
3.4.2 DESCRIPTION OF FLOWCHART

The system stores all the necessary information about the user. A new user is first registered
with the system and the corresponding information is burn in RFID tag. This RFID tag will
be accessible through the system. When a registered user comes to the entry point, and put
the tag into reader, the system checks whether it is registered user or imposter. If the user is
registered one then the tab information is matched with the user information stored in system.
The door is open to entry of the user after successful authentication and close automatically
after a specified time interval. The check-in information is also stored in the database with
date and time. A log is also generated by the system according to check-in information. User
check-in process is depicted. The flowchart is shown in figure 4.

3.5 PROTOTYPE DEVELOPMENT

3.5.1 MACHANICAL DESIGN/PRODUCT LAYOUT

3.6 SUMMARY

The RFID and Barcode based cost effective security system is designed and developed using
commercially graded components suiting the basic requirements of the system. An automatic
access control system using Arduino and RFID has been prototyped and functioned as
desired. The system can be installed at the entrance of a secured environment to prevent an
unauthorized individual access to the environment.

CHAPTER 4

4.0 EXPECTED RESULT

25
REFERENCES

[1] Gyanendra. K ( 2010, August 11 ) , A Digital Security System with Door Lock System
Using RFID Technology.

[2] Ibshar . I ( 2017 ) , Smart Door Lock System with Automation and Security

[3] Jae-Young Pyun (February 2009) , Smart digital door lock for the home automation.

[4] J Pathol Inform (13 August 2011) A review of radio frequency identification technology
for the anatomic pathology or biorepository laboratory: Much promise, some progress, and
more work needed.

[5] K . Varsha ( 2015 ) , Barcode and RFID based Security System.

[6] Md. Mostafizur Rahman Komol (April 2018) RFID and Finger Print Based Dual Security
System: A Robust Secured Control to Access Through Door Lock Operation

[7] M. Sai Divya (3/12/2018) Centralized Authentication Smart Locking System using
RFID,Fingerprint, Password and GSM

[8] Orji EZ ( 2018 ) , Automatic Access Control System using Arduino and RFID

[9] Ralph Ting and Mackenzie Keane (2014) RFID Door Lock

[10] Refgiufi . P , Pemanfaatan Sensor RFID sebagai Smart Door Lock Berbasis Arduino

[11] Syed Mamun . R ( 2018, September ) , Design and Contruction of an Automatic Security
System of a Door Using RFID Technology

26
APPENDICES

APPENDIX 1: GANTT CHART

27

You might also like