Professional Documents
Culture Documents
RFID Based Security Access Control System With GSM Technology
RFID Based Security Access Control System With GSM Technology
ABSTRACT: The security challenges being encountered in many places today require electronic means of
controlling access to secured premises in addition to the available security personnel. Various technologies
were used in different forms to solve these challenges. The Radio Frequency Identification (RFID) Based Access
Control Security system with GSM technology presented in this work helps to prevent unauthorized access to
controlled environments (secured premises). This is achieved mainly through the use of a Radio Frequency
Identification System with operating frequency of 125 KHz, Microcontroller programmed to send control
signals, DC motor, relay, buzzer, Liquid Crystal Display (LCD) and GSM/GPRS Modem.Once the RFID tag
which contains the user’s unique information is scan by the RFID reader and confirmed match with the
information stored in the microcontroller, the microcontroller is instructed to turn ON the DC motor through
L293D driver, display “USER NUMBER and CARD NUMBER” on the LCD and activates the GSM/GPRS
modem to send SMS alert “AUTHORIZED, valid RFID card shown, User is allowed to enter, user number” to
security personnel. Else, the DC Motor remained OFF, LCD displays “READ RFID CARD NOT VALID”,
buzzer turns ON for about 5seconds and GSM/GPRS modem activated to send “ UNAUTHORIZED, invalid
RFID card is used to access the security system” to the security personnel. The electronic circuit was
implemented, the codes for microcontroller were written in assembly language, debugged and compiled using
the KEIL Micro vision 4 integrated development environment. The resultant Hex files were programmed into the
memories of the microcontrollers with the aid of a universal programmer. Hardware simulation was carried out
using the Proteus Virtual System Modelling (VSM) version 8.0.An importation implication of this paper is that
the system is cheaper to maintain and more efficient in comparison with a manually operated type or key lock
system. The RFID based access control system can be useful in providing security for homes, organizations, and
automobile terminals to increase the level of security.
Keywords: Access control, Authorized, RFID, GSM, Microcontroller, Unauthorized
I. INTRODUCTION
Security systems play an important role to prevent unknown user entry into a secured place, which may
include physical and intellectual property, without being authorized. The security system is basically divided
into two types; the use of normal door lock key and the use of electronic automatic identification system. In
general, locks are very simple devices that are employed to address a straightforward problem. Basically, lock
can be easily hacked by unwanted people thereby allowing unauthorized people into secured premises.
There are several automatic identification technologies including barcode, magnetic stripe and Radio
Frequency Identification (RFID) applied in security system. Radio-Frequency Identification (RFID) is an
emerging technology and one of the most rapidly growing segments of today’s automatic identification data
collection industry. RFID technology, offers superior performance over other automatic identification systems.
Because it is not an optical technology like bar coding, no inherent line of sight is required between the reader
and the tagged RFID object [1].
The system described in this work uses an RFID tag which contains integrated circuit that is used for
storing, processing unique information, modulating and demodulating the radio frequency signal being
transmitted and a Global System for Mobile Communication (GSM) technology to communicate to security
personnel via Short Message Service (SMS) in order to enhance the securityof a conditioned
environment[1][2][3][4].
(AT89S51)
MOTOR
DC
DRIVER
MOTOR
GSM
MAX 232
MODEM
RELAY RELAY
DRIVER
Fig 1: Block diagram of an RFID based security access control system with GSM technology.
The block diagram was developed into the schematic diagram shown in Fig. 2. This circuit diagram was used to
simulate the hardware components of the system in Proteus Virtual System Modeling Environment version 8.0.
U4 U5
7805 7812
1 3 1 3
D1 D3 VI VO +5V VI VO +12V
GND
GND
1N4007 1N4007
J2
1 L
2
2 C6 C8
N C7
1000u 100u
STEP-DOWN TRANSFORMER 100u
D2 D4 LCD1
1N4007 1N4007 LM016L
RV1
C9
VDD
VSS
VEE
RW
RS
D0
D1
D2
D3
D4
D5
D6
D7
U1
E
22PF 19 39
XTAL1 P0.0/AD0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
X1 P0.1/AD1
38
CRYSTAL 37 1k
C10 P0.2/AD2
C1 18
XTAL2 P0.3/AD3
36
100u 35
P0.4/AD4
34
P0.5/AD5
22PF 33
P0.6/AD6
9 32
RST P0.7/AD7
BUZ2 21 Vcc
P2.0/A8
22
P2.1/A9
R3 23 GND
P2.2/A10
10k 29 24
PSEN P2.3/A11
30 25 TX
BUZZER ALE P2.4/A12
31 26
Q2 EA P2.5/A13
27
P2.6/A14
28 RX
P2.7/A15
R1
1 10
P1.0 P3.0/RXD C2
2 11 GSM/GPRS MODEM
1K R2 P1.1 P3.1/TXD
3 12
P1.2 P3.2/INT0
1K 4 13
P1.3 P3.3/INT1 U3
BC547 5 14 1 1u 3
P1.4 P3.4/T0
6 15
P1.5 P3.5/T1
7 16 Vcc
P1.6 P3.6/WR C1+ C1-
8 17
RL1 P1.7 P3.7/RD
11 14
J1 T1IN T1OUT
AT89S51 12 13 RXD
R1OUT R1IN
1 10 7
T2IN T2OUT
2 9 8 TXD
U2 R2OUT R2IN
16 8
DOOR LOCK D5 2 GND
1N4007 VS+
2 3 6
Q1 IN1 VSS VS OUT1 VS-
7 6
IN2 OUT2
OJ-SH-112DM 1
EN1 C2+ C2-
RFID READER
C3
+88.8
9 4 5 MAX232
EN2
10
IN3 OUT3
11 C4 C5
15 14 1u 1u
IN4 GND GND OUT4
BC547 1u
L293D
DC MOTOR
Fig. 2: Schematic diagram of an RFID based security access control system with GSM technology
START
YES
Matches the
database?
NO Relay turns ON
Relay turns off
SMS sends
Access Granted
Access Denied
Fig.3: Flowchart of design of RFID Based Security Access Control System with GSM Technology.
IV. RESULT AND DISCUSSION
The simulation test of this work was done using Proteus 8.0 to ensure effectiveness of the design; here
the various components in the design were connected to each other in Proteus 8.0 environment beginning with
the power supply unit as shown in the circuit diagram of the system. This is to ascertain the workability of each
stage before the construction is transferred to the print circuit board (PCB). The RFID card was represented
with an interactive single pole single throw (SPST) switch through which the microcontroller receives the
signal. The program hex file was loaded and the following results were obtained when running the simulation.
LCD1
LM016L
R4
10K
SW1
SW-SPST
RV1
C9
U1
VDD
VSS
VEE
RW
RS
D0
D1
D2
D3
D4
D5
D6
D7
E
19 39
XTAL1 P0.0/AD0
BUZ2 22pf 38
P0.1/AD1
1
2
3
4
5
6
7
8
9
10
11
12
13
14
37
P0.2/AD2
18 36 1k
C10 XTAL2 P0.3/AD3
C1 X1
CRYSTAL P0.4/AD4
35
100u 34
BUZZER P0.5/AD5
33
Q2 P0.6/AD6
22pf 9 32
RST P0.7/AD7
21
P2.0/A8
22 Vcc
P2.1/A9
23
P2.2/A10
R3 29 24 GND
PSEN P2.3/A11
10k 30 25
ALE P2.4/A12
BC547 31 26 TX
EA P2.5/A13
27
P2.6/A14
28
RL1 P2.7/A15
RX
R1 1 10
P1.0 P3.0/RXD
2 11
P1.1 P3.1/TXD C2
3 12 GSM/GPRS MODEM
D5 1K R2 P1.2 P3.2/INT0
4 13
1N4007 P1.3 P3.3/INT1
1K 5 14
Q1 P1.4 P3.4/T0 U3
6 15 1 1u 3
P1.5 P3.5/T1
7 16
P1.6 P3.6/WR
OJ-SH-112DM 8 17 Vcc
P1.7 P3.7/RD C1+ C1-
AT89S51 11 14
T1IN T1OUT
12 13 RXD
R1OUT R1IN
10 7
T2IN T2OUT
BC547 B1 U2
9
R2OUT R2IN
8 TXD
12V 16 8
2 GND
VS+
2 3 6
IN1 VSS VS OUT1 VS-
7 6
IN2 OUT2
1
EN1 C2+ C2-
RFID READER
C3
0.00
9 4 5 MAX232
EN2
10
IN3 OUT3
11 C4 C5
15 14 1u 1u
IN4 GND GND OUT4
1u
L293D
DC MOTOR
LCD1
LM016L
R4
10K
SW1
SW-SPST
RV1
C9
U1
VDD
VSS
VEE
RW
RS
D0
D1
D2
D3
D4
D5
D6
D7
E
19 39
XTAL1 P0.0/AD0
BUZ2 22pf 38
P0.1/AD1
1
2
3
4
5
6
7
8
9
10
11
12
13
14
37
P0.2/AD2
18 36 1k
C10 XTAL2 P0.3/AD3
C1 X1
CRYSTAL P0.4/AD4
35
100u 34
BUZZER P0.5/AD5
33
Q2 P0.6/AD6
22pf 9 32
RST P0.7/AD7
21
P2.0/A8
22 Vcc
P2.1/A9
23
P2.2/A10
R3 29 24 GND
PSEN P2.3/A11
10k 30 25
ALE P2.4/A12
BC547 31 26 TX
EA P2.5/A13
27
P2.6/A14
28
RL1 P2.7/A15
RX
R1 1 10
P1.0 P3.0/RXD
2 11
P1.1 P3.1/TXD C2
3 12 GSM/GPRS MODEM
D5 1K R2 P1.2 P3.2/INT0
4 13
1N4007 P1.3 P3.3/INT1
1K 5 14
Q1 P1.4 P3.4/T0 U3
6 15 1 1u 3
P1.5 P3.5/T1
7 16
P1.6 P3.6/WR
OJ-SH-112DM 8 17 Vcc
P1.7 P3.7/RD C1+ C1-
AT89S51 11 14
T1IN T1OUT
12 13 RXD
R1OUT R1IN
10 7
T2IN T2OUT
BC547 B1 U2
9
R2OUT R2IN
8 TXD
12V 16 8
2 GND
VS+
2 3 6
IN1 VSS VS OUT1 VS-
7 6
IN2 OUT2
1
EN1 C2+ C2-
RFID READER
C3
0.00
9 4 5 MAX232
EN2
10
IN3 OUT3
11 C4 C5
15 14 1u 1u
IN4 GND GND OUT4
1u
L293D
DC MOTOR
Fig.5 shows the process of preparing (initializing) the GSM modem to send SMS in text mode using the stored
command; AT+CMGF=1 saved in the microcontroller.
LCD1
LM016L
R4
10K
SW1
SW-SPST
RV1
C9
U1
VDD
VSS
VEE
RW
RS
D0
D1
D2
D3
D4
D5
D6
D7
E
19 39
XTAL1 P0.0/AD0
BUZ2 22pf 38
P0.1/AD1
1
2
3
4
5
6
7
8
9
10
11
12
13
14
37
P0.2/AD2
18 36 1k
C10 XTAL2 P0.3/AD3
C1 X1
CRYSTAL P0.4/AD4
35
100u 34
BUZZER P0.5/AD5
33
Q2 P0.6/AD6
22pf 9 32
RST P0.7/AD7
21
P2.0/A8
22 Vcc
P2.1/A9
23
P2.2/A10
R3 29 24 GND
PSEN P2.3/A11
10k 30 25
ALE P2.4/A12
BC547 31 26 TX
EA P2.5/A13
27
P2.6/A14
28
RL1 P2.7/A15
RX
R1 1 10
P1.0 P3.0/RXD
2 11
P1.1 P3.1/TXD C2
3 12 GSM/GPRS MODEM
D5 1K R2 P1.2 P3.2/INT0
4 13
1N4007 P1.3 P3.3/INT1
1K 5 14
Q1 P1.4 P3.4/T0 U3
6 15 1 1u 3
P1.5 P3.5/T1
7 16
P1.6 P3.6/WR
OJ-SH-112DM 8 17 Vcc
P1.7 P3.7/RD C1+ C1-
AT89S51 11 14
T1IN T1OUT
12 13 RXD
R1OUT R1IN
10 7
T2IN T2OUT
BC547 B1 U2
9
R2OUT R2IN
8 TXD
12V 16 8
2 GND
VS+
2 3 6
IN1 VSS VS OUT1 VS-
7 6
IN2 OUT2
1
EN1 C2+ C2-
RFID READER
C3
0.00
9 4 5 MAX232
EN2
10
IN3 OUT3
11 C4 C5
15 14 1u 1u
IN4 GND GND OUT4
1u
L293D
DC MOTOR
Fig.6: The result simulation showing that an SMS was sent to Security personnel
Fig.6 displays the feedback message that the power on SMS was successfully sent to the security personnel
whose numbers were programmed into the microcontroller.
LCD1
LM016L
R4
10K
SW1
SW-SPST
RV1
C9
U1
VDD
VSS
VEE
RW
RS
D0
D1
D2
D3
D4
D5
D6
D7
E
19 39
XTAL1 P0.0/AD0
BUZ2 22pf 38
P0.1/AD1
1
2
3
4
5
6
7
8
9
10
11
12
13
14
37
P0.2/AD2
18 36 1k
C10 XTAL2 P0.3/AD3
C1 X1
CRYSTAL P0.4/AD4
35
100u 34
BUZZER P0.5/AD5
33
Q2 P0.6/AD6
22pf 9 32
RST P0.7/AD7
21
P2.0/A8
22 Vcc
P2.1/A9
23
P2.2/A10
R3 29 24 GND
PSEN P2.3/A11
10k 30 25
ALE P2.4/A12
BC547 31 26 TX
EA P2.5/A13
27
P2.6/A14
28
RL1 P2.7/A15
RX
R1 1 10
P1.0 P3.0/RXD
2 11
P1.1 P3.1/TXD C2
3 12 GSM/GPRS MODEM
D5 1K R2 P1.2 P3.2/INT0
4 13
1N4007 P1.3 P3.3/INT1
1K 5 14
Q1 P1.4 P3.4/T0 U3
6 15 1 1u 3
P1.5 P3.5/T1
7 16
P1.6 P3.6/WR
OJ-SH-112DM 8 17 Vcc
P1.7 P3.7/RD C1+ C1-
AT89S51 11 14
T1IN T1OUT
12 13 RXD
R1OUT R1IN
10 7
T2IN T2OUT
BC547 B1 U2
9
R2OUT R2IN
8 TXD
12V 16 8
2 GND
VS+
2 3 6
IN1 VSS VS OUT1 VS-
7 6
IN2 OUT2
1
EN1 C2+ C2-
RFID READER
C3
+176
9 4 5 MAX232
EN2
10
IN3 OUT3
11 C4 C5
15 14 1u 1u
IN4 GND GND OUT4
1u
L293D
DC MOTOR
Fig.7: Result of simulation showing the use of valid card by closing the switch
Fig.8: RFID Based security access control system with GSM technology on a single sided PCB
The output of the motor driver L293D was disconnected and connected to the input terminal of the
oscilloscope in Electronic Laboratory of University of Agriculture, Makurdi and straight-line waveform as
shown in fig.9 was obtain showing the presence of direct current signal.
Fig.9: The resultant waveform from the test of constructed work with an oscilloscope
V. CONCLUSION
The knowledge and application of new techniques in electronics and telecommunication has made our
life more secured and comfortable. RFID based security system is one of such applications. RFID security
access control system with GSM technology presented in this work is based on microcontroller; hence the
hardware requirement is greatly reduced. An RFID based security access control system with GSM technology
has been implemented and function as desired. The system can be installed at the entrance of a secured
environment to prevent an unauthorized individual access.
ACKNOWLEDGEMENT
The authors would like to thank the anonymous reviewers for their careful reading of this paper and for
their helpful comments to improve the paper
REFERENCES
[1] Ramalatha, M., Ramkumar, A. K., Selvaraj, S. and Suriyakanth, S. (2014) RFID Based Personal Medical Data card for Toll
Automation. Elysium Journal Engineering Research and Management. Volume1, ISSN:2347-4408, pp 51-52
[2] Karithik, K. (2014) advanced College Surveillance. International Journal of Scientific and Research publications. Volume 4
(Issue 6), ISSN 2256 -3153, pp 2.