Professional Documents
Culture Documents
ICIIECS’15
Abstract—Radio Frequency Identification (RFID) technology In fact, the levels of security provided by RFID technologies
utilizes the electromagnetic fields for data transfer in order to are reasonably efficient [2]. Enhancement in the usage of this
perform automatic detection and tracking of tags or tags of emerging technology is being traced in the fields of business,
objects. It can provide ways to design and implement relatively industry and logistics support in particular due to its capability
inexpensive systems particularly for security aspects. In this to detect, track, classify and manage the flow of information
paper, we have proposed a digital access control system that can
systematically [3]. An ideal RFID system comprises of RFID
be employed to a protected area where none but people with
authenticated credentials can enter. In fact, we have implemented
tag, RFID reader, application software at back-end for
the system in the server room of an educational Institute to test management, computing hardware for operation handling and
its efficiency as well as expenditure. The implemented system middle-ware to cover up any incompatibility among the
comprises of digital door lock which is unlock able in real time to components regarding the data formats [4].
ensure secured access specifying activation, authentication and
validation of users prior to bringing the RFID card close to the In our proposed system, a magnetic door lock is
reader. The entire system is associated with a central client- administered via RFID reader that initiates the authentication
server sub-system to ensure and maintain the overall system as well as validation of the user or controls the access in short.
integrity. Associated sub-system also generates a log report to The systems also maintain evidences regarding the access and
maintain check-in and check-out status of visitors in accordance exit records of each user in the form of a log report against
with the primary credentials of each. This system will certainly every access. The administrator of the central sub-system can
provide an idea about the design and installation of a relatively terminate the validity of any user at anytime to avoid
inexpensive security system which is suitable in the perspective of unexpected situations. In fact, a double layer of security has
a developing country like Bangladesh.
been applied. First, the user needs to get permission from the
Index Terms—Authentication, Credentials, RFID Card, Secured system administrator to access and then comes the combined
Access. process of authentication and validation. The events of access
and log report generation take place at real time. The system is
I. INTRODUCTION more convenient to install and implement as access security
solution of a particular arena due to its cost effectiveness with
RFID in congregation with biometric technologies has respect to the satisfactory level of protection provided.
gained immense popularity for security issues. Identification Another advantage is that the system consumes considerably
of individuals is always prioritized in secured places like bus less space for installation and maintenance purposes.
and train stations, national and international airports,
commercial complexes, movie theaters and so on [1]. The prime objective of this paper is to describe how to
Undoubtedly, associated expense is an important factor to be design, develop, implement and install a comparatively
considered while promoting security solutions for such inexpensive security solution with considerable scale of
locations. In that sense, RFID is a relatively inexpensive security assurance. The remaining of the paper has been
technology which is capable of transmitting data without the arranged in the sequence: System Architecture in Section II,
usage of any guided media. Section III explains Working Mechanism of the System,
Authorized licensed use limited to: COMSATS INSTITUTE OF INFORMATION TECHNOLOGY. Downloaded on June 23,2021 at 17:37:57 UTC from IEEE Xplore. Restrictions apply.
IEEE Sponsored 2nd International Conference on Innovations in Information Embedded and Communication Systems
ICIIECS’15
Observations and Discussion are in Section IV, Section V with The system has been implemented with passive RFID
conclusion followed by Acknowledgement. tags. Detection of RFID tag from a particular RFID card is
being done by the reader module when the card is taken in a
II. SYSTEM ARCHITECTURE range of 200 millimeters. After RFID tag detection, obtained
information is passed to the central sub-system via serial port.
In the proposed security system, we have controlled a The central database remains acquainted with the registered
magnetic door lock after processing of the information user via certain credentials. Cross checking of the transmitted
obtained from RFID cards. The entire system can be splitted information is performed locally as well as centrally to ensure
into hardware as well as software components. The hardware proper authentication and validation of visitors. Matching of
components include RFID cards, micro-controller information initiates the event to unlock the magnetic door
(PIC16F877A), LCD (16 2), keypad (4 4), MAX 232 module, lock. Meanwhile, a log (along with a time stamp) is generated
L293D (motor controller), buzzer, connection cables etc. The in accordance with the details of the user. Log records are
schematic block diagram of Figure 1 provides an outline of the preserved by the central server. It is possible to generate
major components involved. In fact, the system completes the weekly or monthly reports for a particular user or even for
entire operation in a number of steps: multiple users with their time and frequency of access. RFID
reader module communicates with the system via USB port
Step-1: Information contained within the RFID tag is while the generated output is transmitted through parallel port
retrieved by RFID module when the card is brought that manipulates the unlocking of magnetic lock. The technical
in the readable range. identifications of the RFID reader module (RFID Reader ID-
Step-2: The visitor has to type the password assigned
20, Model: SEN-00013 [5]) are:
earlier by central sub-system against a particular
RFID card upon receipt of RFID tag information
(Authentication). 5V supply
Step-3: The central sub-system also checks the 125 kHz read frequency
database to ensure whether the credentials are correct EM4001 64-bit RFID tag compatible
or not (Validation). 9600bps TTL and RS232 output
Step-4: For valid credentials, micro-controller takes Magnetic stripe emulation output
the responsibility to unlock the magnetic door lock. Read range of 200mm
Step-5: At the same time, a log is generated having
the record of time and date with credentials against
the RFID card.
Authorized licensed use limited to: COMSATS INSTITUTE OF INFORMATION TECHNOLOGY. Downloaded on June 23,2021 at 17:37:57 UTC from IEEE Xplore. Restrictions apply.
IEEE Sponsored 2nd International Conference on Innovations in Information Embedded and Communication Systems
ICIIECS’15
III. SYSTEM WORKING MECHANISM components. An LCD display has been used to inform the user
visually about the next state to be initiated by the system. A
beep sound from buzzer ensures that RFID reader has read the
information stored in the RFID card prior to bringing the card
in readability range. LCD also assists a user for providing
accurate password that is eventually subjected to transmission
to the system. In case of matching of transmitted information
along with the particular valid user credentials, the process of
unlocking gets instantiated via a stepper motor. L293D has
been used as motor controller.
Authorized licensed use limited to: COMSATS INSTITUTE OF INFORMATION TECHNOLOGY. Downloaded on June 23,2021 at 17:37:57 UTC from IEEE Xplore. Restrictions apply.
IEEE Sponsored 2nd International Conference on Innovations in Information Embedded and Communication Systems
ICIIECS’15
ACKNOWLEDGMENT
The authors are extremely grateful to Authority of
Military Institute of Science and Technology (MIST) for
providing them the opportunity to design, develop and install
such a system in the server room of the Institute. The authors
would like to acknowledge also the endless assistance
provided by Department of Computer Science and
Engineering (CSE), Military Institute of Science and
Technology, Dhaka, Bangladesh in form of laboratory and
logistics support plus constant coordination throughout the
Fig. 5. Summary of processed requests at an instance
system development.
Authorized licensed use limited to: COMSATS INSTITUTE OF INFORMATION TECHNOLOGY. Downloaded on June 23,2021 at 17:37:57 UTC from IEEE Xplore. Restrictions apply.
IEEE Sponsored 2nd International Conference on Innovations in Information Embedded and Communication Systems
ICIIECS’15
REFERENCES
[1] K. S. Ravi, G. H. Varun, T. Vamsi and P. Pratyusha, RFID Based Production Economics, vol. 112, no. 2, pp. 507-509, Elsevier,
Security System, International Journal of Innovative and 2008.
Exploring Engineering (IJITEE), vol. 2, no. 5, pp. 132-134, April [4] E. W. T. Ngai, K. K. L. Moon, F. J. Riggins and Y. Y. Candace,
2013. RFID research: An academic literature review (1995–2005) and
[2] G. K. Verma and P. Tripathi, A Digital Security System with future research directions, International Journal of Production
Door Lock System using RFID Technology, International Journal Economics, vol. 112, no. 2, pp. 510-520, Elsevier, 2008.
of Computer Applications (IJCA), vol. 5, no. 11, pp. 6-8, August [5] RFID Reader ID-20, Last accessed on July 11, 2014, at
2010. 05:10:00PM. [Online]. Available: https://www.techshopbd.com/
[3] E. Ngai and F. Riggins, RFID: Technology, applications, and product-categories/retired/1003/rfid-reader-id-20-125-khz-
impact on business operations, International Journal of retired-techshop-bangladesh
Authorized licensed use limited to: COMSATS INSTITUTE OF INFORMATION TECHNOLOGY. Downloaded on June 23,2021 at 17:37:57 UTC from IEEE Xplore. Restrictions apply.