Professional Documents
Culture Documents
SESSION (2015-2019)
PROGRAM
SUBMITTED BY:
SUPERVISED BY:
The project mainly aims in designing an advanced vehicle parking slot booking
system for parking any vehicle in the parking area. Security is the bigger concern for an
individual or a firm.
A parking lot (car park), also known as a car lot, is a cleared area that is intended
for parking vehicles. Usually, the term refers to a dedicated area that has been provided with a
of transportation, parking lots are a feature of every city and suburban area. Shopping malls,
Modern parking lots utilize a variety of technologies to help motorists find unoccupied parking
spaces, retrieve their vehicles, and improve their experience. This includes adaptive
Monica Place shopping mall in California has cameras on each stall that can help count the lot
parking slot booking system with user friendly access. Automation is the most frequently
spelled term in the field of electronics. The hunger for automation brought many
revolutions in the existing technologies. One among the technologies which had greater
can be read with the help of a RF reader. We make use of both these devices to construct an
advanced slot booking system for vehicle parking system. The concerned person of the
4
vehicle should initially book a s l o t u s i n g G S M m o b i l e , w h e n t h e a l l o t t e d s l o t
p a r k i n g g a t e f o r m s t h e o u t p u t m o d u l e a n d i s i n t e r f a c e d t o t h e s a m e onboard
computer. This onboard computer consists of number of input and output ports. The onboard
computer is commonly termed as micro controller. The input and output ports of
thec o n t r o l l e r a r e i n t e r f a c e d w i t h d i f f e r e n t i n p u t a n d o u t p u t m o d u l e s d e p e n
for all the modules involved in the project .The device also consists of LCD which displays the
5
TABLE OF CONTENTS
CHAPTER 1....................................................................................................................................8
INTRODUCTION...........................................................................................................................8
CHAPTER 2..................................................................................................................................11
HARWARE COMPONENTS.......................................................................................................11
2.4.3. IR Sensor.....................................................................................................................14
CHAPTER 3..................................................................................................................................22
4.4. Applications........................................................................................................................30
6
4.5. GSM module.......................................................................................................................30
CHAPTER 4..................................................................................................................................37
4.6.1. Tags..............................................................................................................................41
4.6.2. Readers........................................................................................................................42
7
4.12. Some Approaches to RFID Protection.............................................................................47
CHAPTER 5..................................................................................................................................49
REFRENCES.................................................................................................................................50
8
CHAPTER 1
INTRODUCTION
1.1. 1.1. In the case of today’s transport professionals, visitor management, safety and security initiatives
are becoming an increasing priority. State and neighborhood businesses are looking for mobility,
efficiency and safety operations and opportunities for people to use. Today’s transportation facilities
have many problems.
It has been a consistent assignment to appear for parking areas in the parking lot. There has been
a large trouble in metropolitan cities due to lack of parking and so on. Therefore,
a laptop can assist us locate the nearest parking lot nearby. This
will assist us keep time, gasoline and money. Most are hand-managed and few are effective. All
work is carried out by using parking staff. Drivers provide cash at once to employees.
Many human beings these days are now not blissful with the administration of the
parking system and the flexibility to locate an empty residence for parking vehicles. The demand
for parking is too an awful lot to purchase automatically in theaters, branch shops and offices.
The hassle that is continuously occurring in the parking lot is being
wasted searching for accessible parking lots. Users will hold the vicinity round the parking
lot till an empty parking lot is determined. That is, human beings are typically “surrounded” in
search of a actual parking lot, then a tourist stumble might also additionally appear. Parking is on
9
the upward thrust in cities and cities round the world. Therefore, the demand for a reservation-
based parking gadget is anticipated to be developed in the close to future to scare
or limit this trouble with auto parks, as lengthy as the parking house is reserved for SMS use, in
addition to having get right of entry to to the network. The important purpose is toward layout a
car parks system with the ATMega328 microcontroller that can be route on implanted system.
In huge cities, particularly giant cities, parking troubles the use of GSM and RFID science are
one of the key motives for the accumulation of metropolitan visitors. The reservation-based
parking machine is believed to be a notable way to enhance the kingdom of the parking lots.
10
This automated parking safety machine has been developed with the assist of microcontroller
and RFID technology. Already the dreams are to use regular RFID tags
and hold a special variety, and the facts related with the tag is extracted from sure databases.
Although RF tags can have a excellent role in our undertaking to acquire safety,
security, productiveness and restore capability, their present day use is now not the
most frequent alternative for many reasons. If a individual makes use of RFID science it is
an computerized gadget to shield parking plenty with a large key plan. RF tags can play a
key position in reaching safety, security, productiveness and convenience. The significance of
the RFID machine is that it receives verification from the Office of Road Transport (RTO).
The purchaser will need an authentication to be in a position to go to the fingerprint module with
the mannequin (PMA) to enhance the effectivity of the use of the algorithm. The
face awareness gadget is a view that will be used after the finger recording system. Eventually,
this system permits the character to get admission to it by using urgent the vehicle and for
emergencies, a key entry slot will be positioned to get right of entry to the key in that device. In
emergency mode, the digital digital camera takes a photograph of the driver and sends it to the
owner’s telephone as a Multimedia Messaging Service (MMS) and the proprietor will furnish the
authentication password. The Dialogue Mobile for Global System (GSM) module is saved on
its very own to manage the purpose [8]. The gadget used a clear contactless card to avert the
entry of undesirable people. The contactless mild card shops records and reads
the documents saved on the card when you enter the RFID reader field. The reader is
aware the statistics and has the same opinion with the records saved in it. If this reader
has facts about the card, it will enable the card patron to enter the field. If the reader does no
longer locate the information on the label in his memory, he will no longer be given them.
11
CHAPTER 2
HARWARE COMPONENTS
12
credit scores. after you wish to park your automobile, the RFID tag could be a descendant of the
RFID reader. to evidence registered users with the parking entrance and entrance fully closed.
1. AT
2. AT+CMGS
3.AT+CMGR
4.AT+CMGD
5.AT+CSQ
13
For the connection between the ATmega microcontroller and the GSM, the microcontroller receiver pin (Rx)
is connected to the GSM module transmitter pin (Tx) and the microcontroller pin transmitter (Tx) is
connected to the pin pin. GSM module receiver (Rx).
Radio Frequency Identification (RFID) is a computer-assisted identification approach. This allows you to
remotely retrieve events stored on RFID tags. RFID tagging is a machine that can link or access products,
animals, or men or women to discover and control the radio wave use. Some tags can be viewed a few
meters from the reader’s field of view. its usage of contactless wi-fi computers that use electromagnetic
fields of radio frequency to alternate documents on labels associated with objects. Some labels do not
require batteries and use the electromagnetic fields they use to power them. Others use environmental
forces to supply and irradiate radio waves (radio frequency electromagnetic radiation). Labels are made up of
by electronic means stored matches that be scanned a insufficient meters away. Unlike barcodes, labels do
not choose to be within the reader’s line of sight and cover the objects they track. The use of RFID is widely
used to manipulate inventories in retail environments, but this science quickly created gas benefit payments
and changed economic savings cards. RFID devices have three simple modules.
2.4.3. IR Sensor
IR devices operate with the assistance of a particular sharpening sensor to pick out the chosen wavelength of
the InfraRed (IR) spectrum. Once you use associate degree junction rectifier with a similar wavelength
because the device you're searching for, it seems to be at the depth of the sunshine obtained. Commonly all
objects within the spectrum emit some structure of heatradiation. This kinds of radiation ar unseen to human
eyes, may be noticed by associate degree infrared device. The electrode is actually associate degree IR
junction rectifier and also the indicator is associate degree honest IR photodiod touched by a sleek below
Red of same wave. discharged with the assistance of below Red junction rectifier. once a sleek IR cataracts on
the photodiode, these regulators and production voltages ar changed as a proportion of the magnitude of the
received sleek IR
14
. .IR sensing element Drawing and dealing Principle
The infrared sensing element is one amongll|one among stone in every of} the foremost vital and
well-liked sensing element modules in a digital device. This sensing element is comparable to
the human visual senses, will be wont to observe boundaries and is one in every of the common
targets in real time. once Associate in Nursing object closes to the sensing element, the
swishness of the LED falls on high of the thing and becomes smooth. sensor. This result's
achieved with an outsized increase in intensity and that we already perceive that the utilization of
the edge will be detected.
IR sensors square measure categorized into many classes supported their meant use. These
square measure a number of the foremost common functions of varied device sorts.
The rhythm device is employed to stay the speed of 2 motors in correct. The temperature device
is employed to stay track of the industry's temperature. The inaudible device is employed to find
distance and also the PIR device is utilized for electronic door openers.
Radiation Thermometers
Radio sensors square measure employed in radiation thermometers to live hotness and therefore
the sensible purpose, these heat meter devise a number of these characteristics.
15
o apart from an on the spot relationship with the article of measure
oFaster response
Flame Monitors
This type of device is employed to discover flames given off by fires and monitor their
combustion. the sunshine discharged by the flames may be found in a very type of ultraviolet
radiation and IR wavelengths. a number of the detectors employed in hearth monitors embody
PbS, PbSe, two-color detectors, and pyro electrical detectors.
Moisture Analyzers
Humidity analyzers use moisture-absorbing wavelengths at intervals the Infra Red area.
Substances unit exposed with the sleek wavelengths of those wavelengths (1.1 µm, 1.4 µm, 1.9
µm, and 2.7 µm) and jointly the mention wavelengths. the sunshine mirrored from the objects
depends on the condition gratified and is noticed with the assistance of condition analyzers (the
relationship between the mirrored smoothness and jointly the mirrored smoothness at these
reference wavelengths). In GaAs PIN photodiodes, Pbs photoconductor detectors unit utilised in
circuits to analysis condition.
Gas Analyzers
IR sensors area unit utilised in gas analyzers that use gas absorption characteristics inside the IR
region. two kinds of ways live} accustomed live the density of gas, like scatterers and scatterers.
Dispersive
The discharged light-weight is split spectroscopically and its absorption properties area unit
accustomed study the components of the gas and additionally the amount of sample.
16
Non dispersive
It is a unremarkably used technique and uses fascinating properties that distribute the produced
light-weight. Non-scattering varieties use distinct optical strip filtering filters, rather like the
eyeglasses aimed at eye safety to filter fascinating nonparticulate radiation radiation.
An IR imaging scheme is one in all the key uses of IR influences that has the advantage of a
things that's not specifically noticeable. it's used for warm air imaging, sight devices then on.
On behalf of sample, soil ,water, rock, undergrowth, the air, and social tissues release IR
radiation. Infrared warm pointers live these IR radiations and guide the consultation temperature
scatterings of the thing/field at extends the figure. The warm picture is occasionally made out of
Sb sensors (indium antimonite), mercury doped germanium Gd Hg, (mercury-cadmium telluride)
Hg Cd Te sensors.
The electronic identifier is chilled to small hotness plan liquid engineered part or N. Then,
cooling the marker ensures that the sharp energy (photons) recorded by the locaters comes from
unmatched low and not from the shut temperature of the things at extends vague scanner through
IR to cutting edge devices.
So normally this will be} commonly all agitating the IR contraption circuit with work and
applications.
17
2.4.4. Junction rectifier (LIGHT EMITTING DIODE)
The light emitting diode (LED) could be a swish semiconductor supply. LEDs square measure
used as a lamp indicator in several devices, and square measure getting used additional and
additional clearly. Introduced as a practical electronic side in 1962, the first LEDs emitted low-
intensity red lightweight, however fashionable versions reach all wavelengths that square
measure visible, ultraviolet, and infrared, with terribly high brightness. they're ready to
recombine electrons with holes within the device, cathartic photon-like force. electro
luminescence is the name of the impact and therefore the tint of the sleek is set by the electrical
opening of the semiconductors. associate degree junction rectifier tends to possess atiny low
location (less than one mm2), and integrated optical aspects square measure wont to structure
and aid within the reflection of its radiation sample. LEDs have several benefits over red
lightweight sources, reduced energy consumption, longer life, long sturdiness ... smaller size,
quicker shift and larger sturdiness and responsibility. Powerful LEDs for space lighting square
measure valuable and need additional correct and hotter recommendation than compact
fluorescent lamps with comparable output.
18
FIGURE 2.8:LED
2.4.5GSM MODULE
19
Features
• Output power class 4 (2W) on GSM 850/900 MHz and class 1 (1W) on GSM 1800/1900
MHz.
• Power consumption: Idle mode: <1.8 mA, speech mode: 200 mA (average)
• Very small size (22x22x3 mm), lightweight (3.2 g) and easy to integrate
• Full RS232 with CMOS level flow control (RX, TX, CTS, RTS, CTS, DTR, DSR, DCD,
RI).
• Embedded TCP / IP stacks UDP / IP stacks, embedded FTP and SMTP clients
20
FIGURE 2.10. GSM MODULE
ATMega328 is an Arduino UNO based ATMEL microcontroller. This will make us understand our little
challenge except the use of a complete extent Arduino board. To operate this microcontroller through
Arduino IDE one essential sixteen Mhz crystals, a 5 V supply and a serial connection.
21
2.4.7. 10K resistance
A resistance may be a standoffish two-terminal electrical part that sets the ohmic deterrent by
way of a part of the circuits. The resistors doing to scale down this stream and at consistent time
act to cut back the voltage stages inside the circuits. Resistors locale unit utilized in cutting edge
circuits to confine stylish stream, to move signal levels, to dodge dynamic parts, to finish traces
of transmission between absolutely different vocations. high-voltage resistors will disperse a
couple of watts of power as a glow, by way of a portion of motor controls, as an effect
appointment system, or as a store for generator testing. joined regulators have securities that
change barely with high temperature, interval, or working energy. Adjustable resistors may be
used as a gadget to control circuit parts (e.g., controlled volume or light reducing) or to find heat,
light, suddenness, force, or engineered development.
Resistors district unit typical components in electrical associations and electronic circuits and
area unit unpreventable in gear. As an alternate part sensible insurances may be made out of the
various blends and constructions. Resistors in like manner are set up among facilitated circuits.
The electrical attribute of the resistance is directly through its hindrance: business resistors locale
unit regularly producing plant made in extra than nine sizes. The apparent worth of the resistance
can fall among a making strength.
Securities locale unit assessed in ohms. concealed "gatherings" district unit wont to insist each
band. There district unit 3 gatherings and conflictingly four. quarter band is strength (Gold or
Silver) if the band isn't, the opposition is 2 hundredth. the fundamental 3 gatherings locale unit
toned:
22
Black = 0 Brown = 1 Red = 2 Orange = 3 Yellow = 4
Green = 5 Blue = 6 Violet = 7 Gray = 8 White = 9
The fourth band (if any) is colored:
To utilize the adding machine, pick the shadow of each band starting from the drop menus. Snap "show
esteem" to incite the outcome. To figure, pick a drop-down shading band again and proceed
One and 2 shading groups square measure NUMBERS BLACK = zero, BROWN = 1, and so forth (see tones
above). Model: BROWN, BLACK would be ten and BLACK would be BROWN one .The other band that is third
is the multiplier factor of the essential a couple of groups (X); Black = one, earthy colored = 10, red = 100,
orange = 10K, yellow = 100K, green = 1M, blue = 10M.
Model: Brown, Black, Blue = 10M Ohm. NOTE: Black band isn't any more extended utilized higher than nine
ohms, Brown is that the first band for each of the ten and 100 resistors - a thousand, 10,000 and afterward
on. Model: Brown, Black, Red = thousand Ohms not Black, Brown, orange This number cruncher can show
1,000 Ohms.
The fourth bunch is that the TOLERANCE group. There square measure 2 possible groups here: If there could
be no Silver (10%) and Gold (5%) band, the obstruction includes a resilience of 2 hundredth. Model: 1,000
ohm electrical gadget with a resilience of 2 hundredth would be esteem 900 ohms or 1100 ohms and might
be inside TOLERANCE. NOTE: Silver is that the most regular of the present awards, as to such an extent as we
as a whole know. ANNOTATION: About Japanese controllers have exposed a dark band (20%) or a white band
(2%). In any case, they're uncommon and this number cruncher doesn't share esteems.
23
FIGURE 10K RESISTOR
24
CHAPTER 3
MICROCONTROLLER (ATmega328)
25
4.1. Key parameters for ATmega328
Parameter price
Pin Count:32
CPU:8-bit AVR
# of bit Channels:16
Ext Interrupts:24
USB Speed:No
USB Interface:No
SPI:2
TWI (I2C):1
UART:1
Graphic LCD:No
Video Decoder:No
Camera Interface:No
ADC channels:8
26
Analog Comparators:1
Temp. Sensor:Yes
Crypto Engine:No
SRAM (Kbytes):2
EEPROM (Bytes):1024
DRAM Memory:No
NAND Interface:No
picoPower:No
FPU:No
MPU / MMU:no / no
Timers:3
PWM Channels:6
27
32kHz RTC:Yes
Calibrated RC Oscillator:Yes
Watchdog:Yes
CAN:0
LIN:0
Ethernet:0
Debug Interface:debugWIRE
I2S:No
RTC:Counter
28
About I/O pins:
ATmega32 is prevailing in managing analog inputs. A port A DIGITAL I / O line or
all personapins will be used as one channel for get admission to to the ADmega32 ADC, and
a combine of AREF, AVCC and GND pin pairs (see
ATmega32 information sheet). confederate diploma ADC channel. No pin will function and
serve two performs (for example: Port A pins cannot attributeas a digital I / O pin whereas the
indoors ADC is activated) at regular time. it is the accountability of programmers to urge to all-
time low of the circuit and software war. Programmers ar cautioned to
be internal the priority tables on the files sheet and interior the internal configuration.
29
Atmega32 pin diagram
Analog comparator:
External Interrupt:
30
Memory:
Clock:
It can run at a frequency from 1 to 16 MHz. Frequency can be obtained from external Quartz
Crystal, Ceramic crystal or an R-C network. Internal calibrated RC oscillator can also be used.
More Features:
Up to 16 MIPS throughput at 16MHz. Most of the instruction executes in a single cycle. Two
cycle on-chip multiplication. 32 × 8 General Purpose Working Registers
Debug:
Programming:
31
BLOCK DIAGRAM OF Atmega328
Digital pins
Pins 0 – 7: PORT D [0:7]
Pins 8 – 13: PORT B [0:5]
Pins 14 – 19: PORT C [0:5] (Arduino analog pins 0 – 5)
digital pins 0 and 1 are RX and TX for serial communication
digital pin 13 connected to the base board LED
32
Digital Pin I/O Functions
pinMode(pin, mode)
Sets pin to INPUT or OUTPUT mode
Writes 1 bit in the DDRx register
digitalWrite(pin, value)
Sets pin value to LOW or HIGH (0 or 1)
Writes 1 bit in the PORTx register
int value = digitalRead(pin)
Reads back pin value (0 or 1)
Read 1 bit in the PINx register
33
We can turn it into a analog voltage using an integrating filter.
4.4. Applications
100
Today the ATmega328 is usually used in many initiatives and self reliant constructions the area a
guileless, low-powered, low-priced micro-controller is desirable. Maybe the
greatest prevalentimplementation of this chip is on the well-
known Arduino enchancment platform, mainly the Arduino Uno and Arduino Nano models.
Advantages OF ATMEGA328
2. Even though it's 5 V capable, newer parts can run to 1.8 V. This wide range is very rare.
3. Nice instruction set, very good instruction throughput compared to other processors
(HCS08, PIC12/16/18).
7. QTouch capability.
The GSM module may be a specialised electronic equipment that supports the SIM card and
works by subscribing to a mobile operator, a bit like a mobile. From the purpose of read of the
cellular operator, a GSM electronic equipment is sort of a mobile.
34
When a GSM digital tools is related to a laptop, it allows the computer to use the
GSM digitalgear to talk to the mobile network. even though these GSM
modems rectangular measure basically wont
to provide a cell community affiliation, numerous of them may additionally be wont
to ship and acquire SMS and MMS messages.
It will be a digital tools system with a GSM digital tools serial, USB or Bluetooth affiliation, or it
will be a cell that has GSM digital tools capabilities.
For the rationalization of this paper, the GSM digital gear length is employed as
a virtuallyprolonged duration for naming any digital tools that helps one or a lot of of the
GSM naturalmanner household protocols, as nicely as the two.5G sciences utilized to GPRS and
EDGE. 3G is as best as 3G WCDMA, UMTS, HSDPA and HSUPA bailiwick.
A GSM digital gear indicates AN interface that permits objectives like NowSMS to
be despatched and obtained via the digital tools interface. The telephone operator fees you for
causation and receiving this message as if you had been doing it on your cell at an equal time.
To operate these tasks, the GSM digital tools ought to information the “extended set of AT
commands” for causation / receiving SMS messages, as delineated in ETSI GSM 07.05 and
3GPP TS twenty seven.005 specifications.
35
not all cell telephones assist this digital gear interface.
Due to some compatibility troubles that will exist with cell phones, the employment of a
compromised GSM digital tools is usually greater than using a GSM mobile.
MMS digitalconversation is an extra issue. If you desire to set off incoming MMS messages on
the portal, the digital gear interface of most GSM telephones can entirely allow you to ship MMS
messages. this can be as a end result of the cell strategies the notifications of wellknown MMS
messages, apart from forwarding exploitation the digital gear interface.
It ought to even be stated that now not all telephones help the digital tools interface
to shipand acquire SMS messages. specially, most smartphones, at the facet of Blackberry,
iPhone, and Windows Mobile devices, do not assist this GSM digital tools interface
to ship and acquire SMS messages. additionally, Nokia telephones exploitation the Symbian-
based S60 (Series 60) interface entirely ship SMS messages via the digital tools interface
and now not obtain SMS with the help of the digital tools interface.
4.5.1. GSM digital tools Principle
4.5.1.1. FACTS OF GSM MODEM:
•SMS
• GPRS
36
Voice calls:
Voice calls are no longer any longer the native utilities to center of attention on. If inside the
future interfaces like electro-acoustic transducer and speaker rectangular measure geared up for a
few purpose, it need to be idea of.
SMS:
An SMS digital gear might also be a region at any place a digital gear will be wont to provide the
subsequent aspects:
• Transmission of pre-saved SMS, these SMS will be despatched surely in AN automation
system.
• SMS can also be utilized in locations anyplace tiny textual content content material should be
sent. The transmitter will be AN automation machine, for features like commerce machines,
serial machines, or positioning structures, at any place the browser continues to ship SMS
at positive times.
• SMS will be the title of GSM archives or the answer as soon as GPRS provides do not
appear to be on the market
GSM statistics calls:
statistics calls will be created thru this digital equipment. statistics calls may also be created
(as nicely as received) to a every day PSTN digital tools / phonephone
line. data calls rectangular measure specially created
to ship / acquire occasions between two units or between embedded devices.
The gain of data choice SMS is that each and every match is prevailing in causation /
receiving occasions thru its terminals.
Some elements to remain in idea inside the case of expertise calls:
• The registrar identify provider would not have it with the ordinary SIM purchased, however,
it ought to be
ask at the facet of the service service (say Airtel).
• after you prompt the data / fax carrier, you have received two separate numbers,
the records Name quantity and additionally the Fax dealer range.
• data calls rectangular measure put in exploitation Circuit Switched utilized math connections.
• the current transmission fee of documents is nine.6 kbps.
• digital tools helps additionally at fourteen.4 kbps. However, the company gives the
very niceprice of nine.6 kbps at some motive inside the GSM facts decision.
• Technologies like HSCSD (Modified High Speed Circuit Data)
can extensively enhance datarates, however, in piping.
37
Full type Supported Quad Band Embedded GSM Module (GSM 850/900 1800/1900) with AT
command set and RS232 interface at CMOS level.
This GSM wi-fi data module is that the reply to any or all
vertical purposes inside the marketfor far off wi-fi applications,
for transportable laptop gadgets or for computer systems and for far
off information communications.
The GSM module gives the advantages as below
• terribly tiny dimension (22x22x3 mm), lightweight (3.2 g) and simple to integrate
• Low electricity consumption
• I + TTE approval and metal, GCF, FCC, PTCRB, IC
• Full RS232 with CMOS stage glide administration (RX, TX, CTS, RTS, CTS, DTR, DSR,
DCD, RI)
• Embedded communications protocol / scientific self-discipline stacks UDP / scientific self-
discipline stacks, embedded FTP and SMTP purchasers
• High overall performance at an occasional value
Tracking (people, animals, people), instrumentality chase, PDA, POS terminals, PCMCIA cards,
AMR
Pin to Pin upgrade policy to assist you save on investment High-level technical support to assist
integrate your answer
Product options
38
• E-GSM 900/1800 rate and GSM 1800/1900 GSM a pair of / 2+ part
• Output power category four (2W) on GSM 850/900 rate and sophistication one (1W) on GSM
1800/1900 rate
• Power consumption: Idle mode: <1.8 mA, speech mode: two hundred mA (average)
• Dimensions (mm): three x twenty x twenty and weight (g): three.2 (including shield)
Interfaces
• General purpose ten I / O port and two-way serial bus in CMOS a pair of.8 V
• External SIM
• Analog audio and digital voice interface for electro-acoustic transducer, speaker and handsfree
• 2.8 V in RS232 CMOS (one RS232 (2.8V) with flow management (RX, TX, CTS, RTS, CTS,
DTR, DSR, DCD, RI), 300-115,200 bps, 1200 - 57,600 bps)
Audio
• telecom and emergency calls (Half Rate (HR), Full Rate (FR), increased Full Rate (EFR))
• DTMF
SMS
• Mobile SMS Origin (MO), Mobile finish (MT) and Cell Transmission (CB - DRX)
39
GPRS, information and Fax
• prepacked information (GPRS category B, category 10) up to one hundred fifteen kbps
• assortment recommendation
Other features
• Alarm management
Interfaces
40
analog audio interface
RTC backup
SPI interface
Serial interface
Antenna pad
I2C
GPIO
PWM
ADC
41
CHAPTER 4
Depending on the facilities available, RFID tags are a unit of direct or passive activity. Active
tags use the battery to determine the circuit of the device and to communicate records of the
reader’s charm tags. However, these tags are a very expensive unit of activity and are hardly
used. according to various indicators, passive tags get electricity from the reader to strengthen
the circuit. These activity unit labels have tremendous value and are then used by most functions.
It has been shown that the analysis of these labels is based on the main points [6] - [8] in Table I.
within this work the RFID tag tag unit is used. The passive RFID tag transmits records to the
reader about the discipline of attractive force generated by the reader. the event focuses in
particular on regulating the induction of Faraday’s force of attraction. The tip from the
interrogation coil generates magnetic matter that binds to the coil of the device and is therefore
generated daily in the coil of the device. The coil of the device is being replaced with the help of
fixing the antenna load. This variant is certainly a modulated sign (the subject is known as load
modulation), which is obtained by shared induction among the coils with the help of the
42
interrogation coil. The pronunciation coil deciphers this sign and passes it to the laptop to get the
same methodology.
43
4.2. What is RFID?
RFID is degree descriptor for “radio frequency identification” and refers to the technological knowledge that
is captured with the help of radio waves with the help of a reader once digital records encoded in RFID tags
or sensible tags (as specified below). RFID is that a similar as barcode coding, where events from a tag or tag
ar retrieved through a machine that stores statistics inside the knowledge. RFID, however, has many
supersystems that use bar and management package. most importantly, the information on RFID tags is also
analyzed out of sight, with barcodes having to be aligned with the optical scanner. If you are thinking of
imposing degree RFID answer, take future step and create contact with the RFID specialists at yank Barcode
& RFID. RFID (Radio Frequency Identification) is that the science that involves the use of degree magnetism or
electricity coupling inside the rate (RF) a part of the spectrum for possession of degree object, animal, or
person. RFID is being used loads of and loads of in corporations to come to a decision on barcodes. The
benefit of RFID is that it not desires direct contact or line of sight scanning. degree RFID device has three
components: degree associatetenna and a transceiver (often mixed in an passing single reader) and a device
(tag). The antenna uses rate waves to transmit an indication to the device. once activated, the tag transmits
events to the antenna. it's accustomed apprize a programmable feedback driver that an occurrence ought to
occur. The move got to be as simple as uploading the portal entry or as sophisticated as linking it to the
knowledge to spice up the economic dealing. Low frequency RFID structures (30 rate and five hundred KHz)
have fast transmission stages (generally loads of however six meters). High-frequency RFID structures (from
850 megacycle to 950 megacycle and from 2.4 to 2.5 giga hertz give longer transmission stages (over ninety
ends). In over-all, the advanced the regularity, the higher the worth of the method.
RFID refers to a bunch of applied sciences called automatic identification and data capture
(AIDC). AIDC techniques unit mechanically conscious of objects, acquire records regarding
them, and directly enter those records into the structures of laptops, through slight or not at all
human interference.
RFID ways that use radio waves to appreciate this. At an easy level, RFID structures contains
three components: associate RFID tag or light-weight tag, associate RFID reader, associated
associate degree antenna. RFID tags have associate integrated circuit associated associate degree
antenna, that unit accustomed transmit records to the RFID reader (also referred to as a
44
questionnaire). The reader then makes the radio waves a loads of useful variety of data. the info
collected from the tags is transferred through a communication interface to variety ADPS, where
the events unit keep inside the data and may well be analyzed later.
A radio frequency identification tag (RFID tag) is in addition a digital tag that exchanges radio
wave archives with an related RFID reader.
Most RFID tags encompass at least two fundamental elements. The first is a secondary antenna
that receives frequency (RF) waves. It is the 2nd built-in circuit (IC) used for processing and
storage, which is equal to modulating and demodulating radio waves received/sent via an
antenna. In addition, the RFID tag is recognized as the related RFID chip.
Although RFID tags have associated bar code functions, they are very advanced. Taking
the confederate diploma as an example, the correlation contrast of the archives from
the confederate diploma RFID tag does no longer require line of sight and can be carried out
internal a range of meters. One tag can serve one reader at a time.
In the context of RFID technology, the extent of "tags" consists of tags and cards. The structure
of the label relies upon upon on the physique or object related to the label. The
RFID shape can attribute at very excessive frequency (UHF), excessive frequency (HF) or low
frequency (LF). Therefore, the tag can be modified in addition to the frequency phrase used.
These tags are normally linked to nearly any object. Common wishes consist of clothing,
suitcases, containers, enchancment materials, laundry, and bottles. They are even associated to
animals, humans, and vehicles. Some RFID tag units are designed for rugged backyard
applications.
These units are designed to face up to grass and reasonable incandescent light, vibration, shock,
rain, dust, oil and a huge range harsh conditions. They are generally very passive about numbers,
do now no longer in contemporary instances prefer batteries, and can additionally additionally
feature 24/7, barring for the hazard of energy outages. Industrial label devices are normally
linked to trucks, product containers and moderate rail motors for product management, fleet
management, auto tracking, automobile identification and device tracking, etc.
45
4.5. RFID Tags and sensible Labels
Smart tags ar definitely one of a kind from RFID tags as a end result of they create
up every RFID and barcode technology. They embody AN adhesive tag embedded with RFID
tag inlay and will even have a barcode or absolutely exclusive written data. right tags
are regularly encoded and written exploitation laptop computer machine label printers,
programming RFID tags consumes past normal time and wishes superb instrumentation.
4.6.1. Tags
46
battery-assisted passive (BAP) consists of a small battery interior the instrumentation and is
activated as soon as the RFID reader is gift. The passive tag may additionally be a
smaller volume costly and smaller as a effects of it is no battery; instead, the tag makes use
of radio strength transmitted exploitation the reader. However, accordingly as for the passive tag
to perform, it ought to be mild with accomplice inflated validity stage instead than one
thousand cases for sign transmission. This distinguishes them from radiation interference and
advertising. Both labels could also be read-only, a diffusion of factory-assigned series used as a
key terribly} very information, or they'll even be scan / written, correct statistics of the article
could also be written to the label by the machine user. . Once labels in programmable space
unitas ar written, they'll be multiple reads; “Empty” tags will even be written with a digital
product code through the user.
RFID tags have a minimum of two parts: associate computer design for loading and method
information, for modulating and demodulating the rate (RF) signal, accumulating DC power
from the event reader signal, and diverse specialised functions; and signal receiving and causing
antenna. Label data is detain a awfully non-volatile memory. RFID tags have good resolutions
that square measure continuous or programmable for method transmission and sensor data,
severally.
An RFID reader transmits associate encoded radio radiation for tag labeling. The RFID tag
responds with identification and fully completely different information once receiving the
message. this can even be a special serial selection on the label, or it will even be product-related
records, sort of a stock selection, batch or batch selection, date of manufacture, or fully
completely different information. Since the tags square measure serial numbers, the RFID
machine organize can distinguish and analyze many of the tags which will be embedded inside
the RFID reader modification.
4.6.2. Readers
RFID structures is assessed pattern tags and reader varieties. The Active Reader Tag (PRAT)
convenience contains a passive reader that alone receives radio indicators from live tags (battery-
powered, transmission-only). The reception of the body part convenience reader is varied,
47
starting from 0-200 quantity (1-2000 ft), permitting flexibility in objectives like and security and
management.
An Active Reader Passive Label (ARPT) device has degree energy reader that transmits kind
indicators and additionally receives passive tag authentication responses.
An Active Reader Active Label (ARAT) device uses energy tags that ar aroused from lie with
the live reader interrogation image. One version of this convenience additionally aims to use a
battery-assisted passive label (BAP). It behaves kind of a passive tag. However, the label come
back notification signal contains a occasional battery.
Fixed readers ar organized to make a particular survey sector in order that they will be
controlled. This leaves a markedly delineate place of study for once labels enter and leave the
form field. Mobile readers will be established by hand or in carts or vehicles.
Gaining within the give chain will increase potency, reduces errors and improves quality. In chaotic
producing, shipping, and distribution environments, quantity information on the recognition of character
objects give insights into action measures. With the visibility provided via RFID, you’ll air your as a result of
hearing Six written symbol Master Belt Black in no time
It is suggested to trace the extent of objects in a very wide section of sectors, however, the
likelihood of retail use of RFID has one among the simplest ceilings in most random sentences.
As noted higher than, it's marvelous to follow objects through the grant chain; but, it's assumed
that the management of objects through the provision chain reaches the sales issue. If the stock
convenience that shares events all told commerce business units is correctly designed, you'll have
a treasure treasure of active information. Recent Earnings: Store workers will use a hand-held
RFID reader to extra service on a couple of minutes.
48
4.7.3. Race temporal order
Seasonal marathons and races unit variety of the foremost common for RFID use. However,
many races do not understand in any implies that they are mistreatment the use of RFID
technology over time, that's that the potential of RFID to be the right consumer experience. If
you choose to need a additional in-depth check abreast of the temporal property of RFID
athletics, verify our home guide and verify the foremost recent interview with TimeWire for a
wonderful race organization.
Condition you’ve achieved a colossal deal earlier, you’ll acknowledge that crucial to remain up
with the flood of tourists to sites that unit constantly moving at a gradual pace, significantly at
seminars and seminars. With academic degree RFID participant resolution, deduct any traces of
registration from the entries.
In construction and varied connected industries, substances tend to possess the best risk costs. In
massive workplaces, finding a substance can actually be problematic. RFID decisions like Jovix
take the betting work out of the equation.
Some areas wish the expected level of security and access. From doors to parking masses, RFID
access management tags solely forbid access to pre-approved ones
Active computing, like server boards, laptops, tablets, and totally different peripherals ar a
fashionable investment for any business, to not mention that information carry on these items is
harmful to the wrong hands. Active IT tags modify your IT team to quickly track the amount of
inventories and guarantee everything is in place.
49
4.7.8. RTLS (Real Time Location System)
In some applications you would like to trace things of assets, staff or customers in real time.
whether or not or not you’re chase the efficiency of employee movements, the efficiency of a
store’s set up, or things of valuable resources, RFID systems offer visibility anywhere.
50
4.9 security goals
With these protection needs in mind, mirror onconsideration on the protection homes of labels
that unit read-only in passive producing unit programming. every tag choices a special image,
like Associate in Nursing EPC. though not larger “promiscuous” than optical barcodes,
processed manage of RF tags is feasible. This primary started simply violates the reason behind
privacy, as a results of it's come-at-able to music tag proprietors and examine tag content
material if the tag is acceptable introduced among the form reader house. Neither tags nor
readers unit authenticated; therefore there's not any organize of have religion either. To tackle
these shortcomings, let’s calculate that we have Associate in Nursing inclination to want the
coverage of dillydallying single sequential figures on the issue of sale. Labels saved through
shoppers would still embrace product code data, but not distinctive identification numbers. sadly,
observation is still viable through linking “constellations” of certain kinds of labels to the
identities of the holders. as Associate in Nursing example, RFID-labels , Rolex watches, Gucci
shoes and a special fondness for Cohiba cigarettes will denounce your obscurity. Moreover, this
format cannot however furnish a dependable mechanism. Providing the named protection
objectives needs the establishment of get entry to manage and authentication. Public key
cryptography affords an answer. every tag will embrace a public key and a private key for a
novel reader (type). throughout the question, tags and readers will certify with each totally
wholly totally different the usage of protocols that unit properly understood with these keys.. To
avoid following, holders will ought to notice and disable any tags they'll have. publicly on the
market tag departures got to be random or just changeable on the way to evade lengthy linkage
among labels and owners. The content of private tags ought to be protected through access
management and, if the polling channels do not appear to be secure, encrypted. every labels and
readers got to trust each other. It ought to be difficult to falsify either side. in addition to
providing a mechanism to control access, mutual authentication between the tag collectively the}
reader conjointly provides confidence. Session hijacking and playback attacks are also a priority.
creating errors or interrupting power mustn't open protocols or windows to hijack tries. every the
label and so the reader ought to be proof against copy or mid-range assaults.
51
4.10. Low value RFID issues
With these protection needs in mind, mirror onconsideration on the protection homes of labels
that unit read-only in passive producing unit programming. every tag choices a special image,
like Associate in Nursing EPC. though not larger “promiscuous” than optical barcodes,
processed manage of Radio Frequency labels is feasible. This primary started simply violates the
reason behind privacy, as a results of it's come-at-able to music tag proprietors and examine tag
content material if the tag is acceptable introduced among the form reader house. Neither tags
nor readers unit authenticated; therefore there's not any organize of have religion either. To
tackle these shortcomings, let’s calculate that we have Associate in Nursing inclination to want
the coverage of dillydallying single sequential statistics by the issue of sale. Labels saved
through shoppers would static embrace invention code data, but not distinctive identification
numbers. sadly, observation is still viable through linking “constellations” of certain kinds of
labels to the identities of the holders. as Associate in Nursing example, RFID-tagged Gucci
shoes, Rolex watches, and a special fondness for Cohiba cigarettes will denounce your obscurity.
Moreover, this format cannot however furnish a dependable mechanism. Providing the named
protection objectives needs the establishment of get entry to manage and authentication. Public
key cryptography affords an answer. every tag will embrace a public key and a private key for a
novel reader (type). throughout the question, tags and readers will certify with each totally
wholly totally different the usage of protocols that unit properly understood with these keys. to
forestall listening among the shape field, tags can cipher their content material the use of a
random receiver to forestall following. sadly, the acceptance of sturdy public key cryptography
goes past the assets of less costly (US $ zero.05-0.10) labels, though the alternatives unit larger
pricey to label [13]. bilateral message authentication desires every label to half one vital through
a reader or to share a vital between a gaggle of tags. acceptive alone one key per tag desires
subtle key management. If keys unit to be shared, the tags got to be proof against the bodily
assaults delineated in [18]; otherwise, endangering one label places Associate in Nursing
complete batch at risk. Implementing ladder-proof reminiscence on a reasonable label with many
logical ports could also be a discouraging task, specifically due to the matter of securing
52
reminiscence on clever collaborating in cards with implausibly large resources. acceptive robust
bilateral encryption is also a venture among the quick term.
RFID technological power is utilized in several industries to perform such duties as:
• Inventory management
• quality chase
• Personnel chase
• ID badging
Although RFID science has been used as soon as you mirror that hostilities II, the demand for
RFID tools is growing speedily, in part to permit RFID merchandise to be derived to
suppliers geared up by the U.S. Department of Defense (WalD Mart) and Wal-Mart.
Whether or now not RFID compliance is needed, features that currently use barcode
technological electricity ar captivating candidates for upgrading to a device that produces use of
RFID or some combination of each. RFID affords quite a few edges over
barcodes, extensively thinking about the precise indeniable reality that qualification RFID tag
will include large information involving qualification object than a barcode. to boot, RFID tags
ar no longer problem to the harm that barcode tags will cause, like croaky and marking.
53
4.12. Some methods to RFID protection
Accepting the fugitive boundaries of low tag resources, we will have a seem to be at
a effortless RFID protection theme specially based totally often absolutely proceeding a one-
sided hash perform. In follow, a hardware-optimized challenge place hash characteristic would
serve, assumptive that it is carried out with way fewer property than interchangeable secret
writing. all via this vogue, every and each hash-enabled label consists of a factor of
the memory hold on for a "meta-ID" and works unsecured or secured. tho' unsecured,
the entire usual overall performance of the tag and so
the reminiscence question willpower neighborhood unit reachable to anyone. To lock a tag, the
man or girl of affairs calculates the hash charge of a random key and directs that one to the tag as
a lock value, that is lock = hash (key). In turn, the tag shops the lock fee inside the meta-
ID reminiscence place and enters the secured state. whereas secured, a tag responds to any or all
queries with the dependent meta-ID fee and limits all in
reality certainly sincerely wonderful utility. To undo a tag, the proprietor sends the simply well
worth of the real key to the tag. The tag breaks this price and compares it to the lock saved to
a limit area the meta-ID. If the values match, the tag
can release itself. every label perpetually responds to
thereforeme tremendously question so typically reveals it. Tags unit set with a bodily destruct
mechanism and may additionally moreover on my personal be unsecured as quickly as speakme
with partner authorized reader. inner the suit of a loss of electrical electricity or interruption of
transmission, the tags can return to the default lock state. A positive channel is equipped for
administration preferences like key management, disabling tags, or writing tags, requiring bodily
contact between a manipulate machine and a tag. Requiring bodily contact
for integral basic overall performance helps defend con to wi-fi sabotage or denial
of carrier attacks. The hash-based lockup mechanism satisfies most of our privateness problems.
Access manage for tag content material fabric material is administration via myself by means
of methodology of key house owners. can|they will|they'll} take a seem at and disable tags that
guys and woman will carry. Labels normally reply to queries. prolongedassociations is avoided,
54
as blocked tags on my personal reply to the perfect meta-ID. One seemat is that ancient meta-ID
values is accustomed song associations over time. This received to refresh the periodic meta-ID
values with the aid of methodology of unlocking and re-locking the tags.
even although authenticating readers and furnish a certain channel meets trend of
our positive needs, this plan sacrifices a number safety residences to stay costs; in unique tag
authentication. Label macintosh general overall performance would allow tags
to disclosethemselves, then again is preceding the elegant much less luxurious tag resources.
Lack of authentication well-known tags in mid-range attacks, the location confederate aggressor
will question meta-ID tags, in boost these values to an straightforward operator, and future
unhitch the codes thru the operator key responses. more than a few keyless entry structureshave
the equal vulnerability of late. In any case, attackers World Health Organization do now not get
admission to companion approved reader cannot get appropriate of entry to the tag content
material cloth material grounds of bodily channels.
55
CHAPTER 5
The objectives of this project ar achieved. the matter of trying to find on the market parking areas
consumes absolutely eliminated by booking openings beforehand via the SMS system and
conjointly the RFID system. this system permits users to waste time in search parking lots and
improve the use of parking lots. Designed as a system to produce an entire answer to issues
associated with transport, like accident alert, Vehicle police investigation.
• It is extended with the latest RFID technology for toll controller, traffic signal regulator, traffic
desecration, car parks organization, vehicle theft then distinct zone attentive changes.
• At the exit of a paid car park, parking cards can be checked in front of the vehicle trapped in the
system. This prevents a parking lot from leaving the facility with another parking card.
• If you lose your parking ticket, the operator can easily track the time of entry of the vehicle to
determine the amount to be paid.
• For seasonal parker members who use transponder cards, RFID ensures that the registered
vehicle is used only by the member system.
56
REFRENCES
1) Rushikesh Shinde “Parking Space Searching & Reserving With Mobile Using Bluetooth
Technology” Proceedings of the NCNTE2012, Third Biennial National Conference on
Nascent Technologies.
2) Pala Z., Inanc N., “Smart Parking Applications Using RFID Technology”, 1st Annual
Eurasia RFID Conference, September 2007, Turkey
3) www.wikipedia.org
4) “RFID based Parking Management System ”Rutuja Patil, Student Member, IEEE, Shruti
Shetty, Student Member, IEEE and Sreedevi Sanjeev Nair, Asst. Professor, Dept. of
EXTC FCRIT, Vashi
5) Zeydin Pala, “Smart Parking Applications using RFID Technology”, Yuzuncu Yil
University, Electrical and Electronics Engineering Dept
6) http://www.engineersgarage.com
7) Shihong Qin, Xiangling Yao.,” An intelligent parking system based on GSM module”,
School of Electrical and Information Engineering, Wuhan Institute of Technology,
Wuhan 430073 P.R. China.
8) Xiaolong Li, Uma Kanth Ranga.,” Design and Implementation of a Digital Parking Lot
Management System”, the Technology Interface Journal/Fall 2009.
9) D. L. Wu, Wing W. Y. NG, D. S. Yeung, and H. L. Ding, “A brief survey on current
RFID applications,” in Proc. International Conference on Machine Learning and
Cybernatics, Baoding, July 12-15, 2009, pp. 2330-2334.
10) B. Yan and D. Y. Lee, “Design of spot ticket management system based on RFID,” in
Proc. International Conference on Networks Security, Wireless Communications and
Trusted Computing, 2009, pp. 496-499.
11) G. Ostojic, S. Stankovski, and M. Lazarevic, “Implementation of RFID technology in
parking lot access control system,” in Proc. Annual RFID Eurasia Conference, 2007, pp.
1-5. [4] N. Ahmad, S. Butler, and U. Ramachandran, “GuardianAngel: An RFID based
indoor guidance and monitoring system,” 2010, pp. 546-551.
57
12) K. S. Huang and S. M. Tang, “RFID applications strategy and deployment in bike renting
system,” in Proc. ICACT 2008, pp. 660-663.
13) S. Lahiri, RFID sourcebook, IBM Press, Westford, Massachusetts, 2006.
14) F. Lourenco and C. Almeida, “RFID based monitoring and access control system,” in
Proc. INFORUM, 2009.
58