You are on page 1of 23

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/340675358

Design of an RFID Based Wrist Key

Article · April 2020

CITATIONS READS

0 56

7 authors, including:

Abdulaziz Mandeeli
Umm Al-Qura University
1 PUBLICATION   0 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Design of an RFID Based Wrist Key View project

All content following this page was uploaded by Abdulaziz Mandeeli on 16 April 2020.

The user has requested enhancement of the downloaded file.


Design of an RFID Based Wrist Key

Tawfiq Husein Yusof, Yazeed saeed al saleh, Omar Hassan Brnawi, Khalid Fahad
Mohammad Alsawat, Abdulaziz Mohammadshafea Mandeeli

Technical Report G2-05

Computer Engineering Department, Umm Al-Qura University

April 2020
TABLE OF CONTENT

Abstract…………………………………………………………… 3
1. Introduction………..……………………………………….……. 4
2. Problem Statement……….……………………………………… 4
2.1. Need Statement…….…………………………………………. 4
2.2. Objective………………………………………….…………... 4
2.3. Background and Technology Survey.………………………... 5
2.3.1. History of Lock...………………………………………. 5
2.3.2. Relevant Technologies………………………………… 5
2.4. Needs Identification…………………………………………. 6
2.4.1. Objective Tree………………………………………… 6
2.4.2. Ranked Needs…………………………………………. 7
3. Requirements Specification…………………………………….. 10
3.1. The Requirements ………………………………………….. 10
3.2. Constrain…………………………………………………..... 12
3.2.1. Economic……………………………………………… 12
3.2.2. Realism………………………………………………… 12
3.2.3. Performance…………………………………………… 12
3.2.4. Manufacturability…………….……………………… 12
3.2.5. Usability …………………………………………… 12
4. Concept Generation…………………………………………….. 11
4.1. RFID Frequency……………………………………………. 13
4.2. RFID Tags …………………………………………………. 14
4.3. Software System……………………………………………. 15
4.4. Material of Wrist Key………………………………………. 16
5. Functional Decomposition ……………………………………….. 17
5.1. Level 0……………………………………………………..… 17
5.2. Level 1……………………………………………………..… 18
6. System Behavior…………………………………………………. 19
7. References ……………………………………………………… 21

1
TABLE OF FIGURES

Figure (1) How the system works …………………………………. 3

Figure (2) Component of RFID ……………………………………. 4

Figure (3) Microchip ……………………………………………….. 5

Figure (4) Objective trees for Wrist Key……………………………. 6

Figure (5) Diagram for level 0…………….. …….………..……….. 17

Figure (6) Diagram for level 1………….….………..……..……….. 18

Figure (7) Flow Chart for Wrist Key system …….………..……….. 19

Figure (8) FSM for Wrist Key system …….………..……..……….. 20

TABLES

Table (1) Pairwise Comparisons Matrix - General…………………. 7

Table (2) Pairwise Comparisons – High Quality…………………... 7

Table (3) Pairwise Comparisons – Portable……………………….... 7

Table (4) Engineering Requirements with Justification……………. 11

Table (5) RFID Frequency………………………………………….. 13

Table (6) RFID Tags………………………………………………... 14

Table (7) Arduino vs RaspberryPi…………………………………… 15

Table (8) comparison of Material for Wrist Key.…………………… 16

Table (9) Wrist Key Module …………………………….………….. 17

Table (10) Electronic Lock Unit Module ………………….………….. 18

2
Abstract
In this report we are mention our search about relevant technology.
Mention our requirement specification . marketing and engineering
requirement. Concept generation. Functional Decomposition for all level.
System behavior.

3
1. Introduction
The purpose of the project is to find an easy solution to replacing home keys.

Creating a technology solution and raising the level of safety. We will use RFID

(Radio Frequency Identification) technology and combine it into a band with a

memory microchip.

2. Problem Statement
2.1. Need Statement
Imagine someone forgot their key, lost it, or someone stole the key. Another

person has several keys and takes time to find the one he wants. Our system

saves time and raises protection for homes. Using one band that replaces all

keys, all house locks are programmed in this band

2.2. Objective
Our goal is to make a band integrated with RFID technology with a memory

microchip in order to save the frequencies of all the door locks in the memory

microchip and when the band is brought close to the lock, the lock will read this

band and when the match it will open the door. Look at Figure (1).

Figure (1) How the system works

4
2.3. Background and Technology Survey

2.3.1. History of Lock


The locks were made of wood, the design was large and rough, and they
were used for the same purpose that they are now used. The first metal locks
appeared between 870 and 900 and they belong to the English craftsmen. They
used to manufacture simple locks made of iron. In 1975, (Thor Sorneir) he
became the first person to design an electronic protection card, which led to the
idea of programmatic locking later.

2.3.2. Relevant Technologies


RFID Technology

RFID Technology (Radio Frequency Identification) there are many terms for
RFID like radio frequency identification system, wireless chip technology or
radio wave recognition system, but we can define RFID" Electronic and wireless
sensor technology based on the detection of electromagnetic signals. "(1)

Component of RFID
1. Tag : it is a small chip that can send and receive data wirelessly using
radio waves there are three types of chip:
a. Passive
b. Semi-passive
c. Active
2. Reader /interrogator: it is device to putting data in the band and lock.
3. Antenna: it is a channel for data communication between the tag and the
reader.
4. Computer /Database: it device to programed our system and signal.
At Figure (2) picture for component.

Figure (2) Component of RFID

5
Remote control
When the remote control button is pressed to open the car, inside the key
there is a control circuit with a memory that encrypts the eight-digit command,
and then it sends the encrypted code via radio waves and a receiver installed
on the car to receive the encoded waves and send them to the control unit that
in turn solves code and execute orders

In most cars inside the key memory there are 256 different style of code,
and everything that presses one of the remote control buttons sends a different
code, in order to prevent knowing the code knowing that the basic systems that
are installed by the manufacturer carry a different code for each car, as for the
cheap external devices Mostly, every 100 systems are different from each
other, meaning that there is a 1% chance that we will open the remote control
for another car equipped with the same system.

Microchip memory

Microchip memory or integrated circuit card "it is a plastic card that


contains a chip in which digital and alphabet information can be saved, and
it is compatible with computer devices, and we can read the data inside the
transfer and transfer it to accounting information on the nature of the
program and the electronic code saved in it"(2) Figure (3). There are many
type of this chip but we chose microchip with a memory.

Figure (3) Microchip

6
2.4. Needs Identification
2.4.1. Objective Tree

Wrist Key

High Quality Easy to Use Low Cost Portable

Shock
Small
Protection

Water Proof Lightweight

Outdoor Comfortable
Weather Design

Reduce Noise
Pollution

Figure (4) Objective trees for Wrist Key

Figure (3) showing us the criteria in objective tree for our project
which is the wrist key , we have four different main parts and seven
sub parts .

7
2.4.2. Ranked Needs

Easy to High Geometric


Low Cost Portable Weights
Use Quality Mean
Easy to
1 1/4 3 2 1.11 0.23
Use
High
4 1 3 2 2.21 0.42
Quality

Low Cost 1/3 1/3 1 2 0.69 0.14

Portable 1/2 1/2 1/2 1 0.59 0.21

Table (1) Pairwise Comparisons Matrix - General

In this schedule Table (1) we can see how we prefer the main parts
over each other using the AHP method

Reduce
Shock Water Outdoor Geometric
Noise Weights
Protection Proof Weather Mean
Pollution
Shock
1 3 2 1 1.56 0.3
Protection
Water
1/3 1 3 1 1 0.3
Proof
Outdoor
1/2 1/3 1 2 0.76 0.2
Weather
Reduce
Noise 1 1 1/2 1 0.84 0.2
Pollution

Table (2) Pairwise Comparisons – High Quality

In this schedule Table (2) we can see how we divide the main part
High Quality to subs and use the AHP method to rate its parts

8
Comfortable Geometric
Small Lightweight Weights
Design Mean

Small 1 3 3 2.08 0.60

Lightweight 1/3 1 1/3 0.48 0.13

Comfortable
1/3 3 1 1 0.27
Design

Table (3) Pairwise Comparisons – Portable

In this schedule Table (3) we can see how we divide the main part
Portable to subs and use the AHP method to rate its parts

9
3. Requirements Specification
3.1. Marketing Requirements
The marketing requirements for this project are as follows:

1. Device will use RFID Wrist Band Tags.

2. Device will be cheap.

3. Device can read the RFID tag from 0.5 m.

4. Device will save more than one frequency.

5. Device contains protection from environmental factors.

6. Device knowing if the band was outside or inside the place where the

lock at.

7. Device it easy and portable.

10
Requirements
Validation Rationale
Marketing Engineering

Easy to Maintenance. You can


It is usability and easer for customer to
4 program it to save more than
Maintenance the wrist key
one frequency.
It more functionality the interface device
provides a platform on which to store
The completed system
data in regard to current time the sponsor
1 involving the RFID reader unit
has specified that they want to know
must store tag
when, where, and what items have left or
entered the vehicle
Material we will use in our band It will be economic and performance this
2 soft silicon rubber. thickness material will give you high quality. more
9.2 cm. Weight 80 g. fashion and low cost.
The band run with RFID tech RFID (Radio frequency identification)
which is a system can read has three main parts:
signals form tags and other. 1-the card which have the information
The way RFID work is by and the receiver.
transmission the signals or 2-signal reader and receiver.
6,3
waves across the air to the lock 3-the System and its database.
which has the same signal to This ship has no power source it work
receive, and it has no power with the law of resonance circuit that can
source at all it can be powered use the power of the Electromagnetic
by the law of resonance circuit. that came from the receiver.
It more environmental the device has the
feature of ingress protection from dust
The band will work under -40o C and water by a standard IP-67. In water
5 to 85o C (3). Water resistant and
resistant. In water resistance, the band
dust resistant with IP-67(4)
can withstand water resistance at a depth
of 1m.
The similar product it existing but we
Similar technology in the think about modern and more safety and
7 market it is existing like remote
easy to portable it means our system is
control and smart tag
reliability and availability.
Using the silicon soft silicon The product more usability to clean and
rubber, it easy to wash and more performance because our choice
7
resistant to germs, and it stays
for good material
longer than other materials

The dimensions for the wrist Manufacturability should be like same of


7
key must be " 1× 10 " cm any band we think it easy to use

Table (4) Engineering Requirements with Justification

11
3.2. Constrains

3.2.1. Economic
The final system must not cost more than 500 S.R

3.1.1. Realism
The system existing but we develop it.

3.1.2. Performance
The system should detect the tag from 0.5 m
The system should resistant from water and dust.
The system should save more than one frequency.

3.1.3. Manufacturability
The band made from Soft Silicon Rubber.
The system look like band.
The dimensions for the wrist key must be " 1× 10 " cm

3.1.4. Usability
The band small and modern more fashion .

12
4. Concept Generation
4.1. RFID Frequency.

Low High Ultra High


Frequency Frequency Frequency

Range of Frequency 30-300 KHz 3-30 MHz 300MHz-3GHz

Range of Distance 10cm 10cm – 1m More than 1m

Data Transfer Rate Fast Slow Very slow

Interference Little Much To Much

Table (5) RFID Frequency


In Table 1 It is a comparison of three level of frequencies. We will use high
frequency (HF). As we constrain in our system should be detect from 1m. so
in this case we chose that frequency.

13
3.1. RFID Tags.

Semi-Passive
Active RFID Passive RFID
RFID
Tag users internal
source to power
Energy transfer
on, and energy
Tag Power Source Internal to tag from the reader
transferred from
via RF
the reader via RF
to backscatter.

Tag Battery Yes No Yes

Only within field of Only within field of


Availability of Tag Power Continuous
reader reader

Required Signal Strength


Very low Very high moderate
from Reader to Tag

Available Signal Strength


High Very low moderate
from Reader to Tag

Long range Short range (up to Moderate range


Communication Range
(100m or more) 10m) (up to 100 m)

Cost by Dollar 10-100 $ 1$ 5$

Table (6) RFID Tags


In table 2 It is a comparison of three types of RFID tags or chip. We choose
the passive RFID. As we mention in our constrain about cost and long time
with energy. Range also is important so the suitable chip is passive

14
3.2. Software system

Raspberry
Pi Arduino

Price 35$ 30$-60$


85,60mm x 53,98 mm
Size Different size

The operating system Linux Built-in

Open Arduino IDE,


Development environment
Embedded, QEMU, Eclipse… Eclipse, AVRStudio…
Python, C, C++, Python,
programming language
Basic… Java, Matlab…
Processor BCM2835 ATMEG8,ATMEG168

Depends on the type of


Speed Depends on the type of piece
piece

Model A Model B
Memory 2.5 KB
256 MB 512 MB

Available by
USB available
Segment type
Available by
Audio available
Segment type
Available by
video available
Segment type
Other extras, cameras, extra
available available
ports, drives ...
Table (7) Arduino vs RaspberryPi
In (1) compare the two devices and it turned out that the Arduino is the cheapest
price

In (2) compare the two devices in terms of size

In (3) Arduino has the ability to run on Windows, Mac OS and Linux, while
Raspberry
Pi only works on Linux.

In (4). is available for everyone to download and study to understand the


principle of the work of the piece and amend it

In (5) Arduino it use C++, Python, Java, MATLAB… and RaspberryPi it use
Python, C Basic

In (6) Arduino, which has an ATMEG168 processor that runs at 16Mhz with
Raspberry Pi with a BCM2835 processor at 700Mhz, and even the most

15
powerful Arduino Due, cannot compete with Raspberry Pi with a SAM3X8E
processor with a speed of 84Mhz. But despite this I must point out that
Raspberry Pi needs strong and fast processors because it deals with graphics
and with high-resolution screens.

In (7) the speed depends on the type of piece

In (8) Arduino have just one memory 2.5 KB and

Raspberry Pi have two type Model A 256 MB Model B 512 MB

Because of the cheap price and the ability to modify the Arduino we chose to
use it

3.3. Material of Wrist Key

Silicon bracelet Steel bracelet Leather bracelet

Cost 5$ 20$ 15$

Sweat and rust resistance Yes No No

Moisture resistance Yes Yes NO

Weight light heavy light

Uncomfortable
Comfortable and Comfortable and
Design and easy to
easy to control easy to control
control
There is different
colors Specific colors Specific colors
colors

Table (8) Comparison of Material for Wrist Key

in the Table 4 it's a comparison of three types of band . we choose the silicon

band as we mention in our constrain about cost and comfortable

design also we have different colors

16
4. Functional Decomposition

4.1. Level 0

Figure (5) Diagram for Level 0

Module Wrist Key.

Inputs Input frequency from 3 -30 MHz.

Outputs Output frequency from 3 -30 MHz.


If the wrist key approaches the reader to the wrist
Functionality
resend the frequency with codes to reader.
Table (9) Wrist Key Module

In level 0, when the Wrist key approaches the reader, the reader sends
frequencies between 3-30 MHz. We use the mentioned frequencies,
which are high frequencies due to the distance mentioned in the
restrictions. The battery is stimulated by our use of the passive chip on
the Wrist key. The Wrist key transmits frequencies between 3-30 MHz
carrying specific values for the reader

17
4.2. Level 1

Figure (6) Diagram for Level 1

Module Electronic lock unit

Inputs Input frequency from 3 -30 MHz.

Outputs Open / Close


Opening or locking according to specific instructions
Functionality
from the reader
Table (10) Electronic Lock Unit Module

In level 1, the electronic lock unit consists of an electronic reader and


lock. The reader receives frequencies from the bracelet with data. The
reader analyzes the data and then specific orders are sent based on the
match and the lack thereof. Upon matching, orders to unlock the
electronic lock are sent. Mismatch means not to open the electronic lock.

18
5. System Behavior

start

No Detect the
Yes
frequency

Same No
frequency

Yes

Open

Wait 30 sec

Close

End

Figure (7) Flow Chart for Wrist Key system


In figure 1 it about our system wrist key how it detect the frequency. In
beginning detect if the Wrist have a frequency. Second step it is the same
frequency. Third open or wait for 30 sec. Finally close our system.

19
0

1
A 0

0 0
D B

1
1 C

Figure (8) FSM for Wrist Key system

In figure 2 When a frequency is detected it goes to B state which is (key


detection) if it's not the same signal it goes to A which is (close) but if it is the
same signal it go to state C (lock state) that read the code or signal if it's the
suit the lock or not if not it goes to A if yes it will go to state D which is (open)
when the door is shut it will go to A but if it's still open it will be in the same state

20
References
[1] E.Esmaeel and A.Sulaiman " Definition by RFID technology in the field of
libraries and information" Saudi Digital Library, copyright 2017.

[2]"Smart Card" ,Wikipedia , last modified 12 February 2020 . Available at


>https://ar.wikipedia.org/wiki/%D8%A8%D8%B7%D8%A7%D9%82%D8%A9_%D8%B
0%D9%83%D9%8A%D8%A9<.

[3] Band specifications, last modified 16 July 2017 . Available at


> https://www.rfidinc.com/hf-13-56-mhz-rfid-air-coil-tags< .

[4] Use standers IP-67 last modified 25 January 2020 . Available at


>https://ar.wikipedia.org/wiki/%D8%B9%D9%84%D8%A7%D9%85%D8%A9_%D8%A7%D9%
84%D8%AD%D9%85%D8%A7%D9%8A%D8%A9_%D8%A7%D9%84%D8%B9%D8%A7%D9%84
%D9%85%D9%8A%D8%A9

[5] A. Amjed, F. Azam, W. H. Butt, M. W. Anwar and M. Rashid, “Event-driven


Process Chain (EPC) for Modeling and Verification of Business Requirements
- A Systematic Literature Review”, IEEE Access, Vol. 6, No. 1, Pages 9027-
9048, March 2018.

[6] M. Rashid, M. W. Anwar, A. M. Khan, “Towards the Tools Selection in Model


Based System Engineering for Embedded Systems - A Systematic Literature
Review”, Journal of Systems and Software, Volume 106, Pages 150-163, May
2015.

[7] M. Rashid, M. Imran, A. R. Jafri, Turki Al-Somani, Flexible Architectures for


Cryptographic Algorithms - A Systematic Literature Review, Journal of Circuits,
Systems and Computers (JCSC), Vol. 28, No. 3, March 2019.

[8] M. Imran and M. Rashid, “Architectural Review of Polynomial Bases Finite


Field Multipliers Over GF(2m)”, In Proc. of IEEE International Conference on
Communication, Computing and Digital Systems, pp. 331-336, March 2017.

21

View publication stats

You might also like