You are on page 1of 8

A Project report on

Automobile Security System (RFID)


BACHELOR OF TECHNOLOGY IN ELECTRONICS AND COMMUNICATION ENGINEERING Submitted By T. Vamshi Krishna Reddy B. Suresh Kumar B. David Roshan 08J11A04C7 08J11A0480 08J11A0479

Under the Guidance of << Guide Name >> << Designation >>

Department of ELECTRONICS AND COMMUNICATION ENGINEERING, HITECH COLLEGE OF ENGINEERING AND TECHNOLOGY (Affiliated to Jawaharlal Nehru Technological University)

HITECH COLLEGE OF ENGINEERING AND TECHNOLOGY Department of ELECTRONICS AND COMMUNICATION ENGINEERING

CERTIFICATE:
This is to certify that the project report titled Automobile Security System (RFID) is being submitted by T. Vamshi Krishna Reddy 08J11A04C7 B. Suresh Kumar 08J11A0480 B. David Roshan 08J11A0479 in B.Tech IV II semester ELECTRONICS AND COMMUNICATION ENGINEERING is a record bonafide work carried out by them. The results embodied in this report have not been submitted to any other University for the award of any degree.

<< Internal Guide >>

Mr. Maheswar reddy, Head of the Department


ELECTRONICS AND COMMUNICATION ENGINEERING

<< External >>

ACKNOWLEDGEMENT
I would like to express my gratitude to all the people behind the screen who helped me to transform an idea into a real application.

I would like to express my heart-felt gratitude to my parents without whom I would not have been privileged to achieve and fulfill my dreams. I am grateful to our principal, Mr. MAHESWAR REDDY who most ably run the institution and has had the major hand in enabling me to do my project.

I profoundly thank Mr. MAHESWAR REDDY, Head of the Department of Electronics and Communication Engineering who has been an excellent guide and also a great source of inspiration to my work.

I would like to thank my internal guide <<INTER NAL GUIDE>> for his technical guidance, constant encouragement and support in carrying out my project at college.

The satisfaction and euphoria that accompany the successful completion of the task would be great but incomplete without the mention of the people who made it possible with their constant guidance and encouragement crowns all the efforts with success. In this context, I would like thank all the other staff members, both teaching and non-teaching, who have extended their timely help and eased my task.

T. Vamshi Krishna Reddy B. Suresh Kumar B. David Roshan

08J11A04C7 08J11A0480 08J11A0479

CONTENTS Abstract List of Figures List of Tables List of Screens Symbols & Abbreviations 1. Introduction 1.1 Motivation 1.2 Problem definition 1.3 Objective of Project 1.4 Limitations of Project 1.5 Organization of Documentation 2. LITERATURE SURVEY 2.1 Introduction 2.2 Existing System 2.3 Disadvantages of Existing system 2.4 Proposed System 2.5 Conclusion 3. ANALYSIS 3.1 Introduction 3.2 Software Requirement Specification 3.2.1 User requirement 3.2.2 Software requirement 3.2.3 Hardware requirement 3.3 Content diagram of Project 3.4 Algorithms ad Flowcharts 3.5 Conclusion 4. DESIGN 4.1 Introduction 4.2 DFD / ER / UML diagram (any other project diagrams) 4.3 Module design and organization

4.4 Conclusion 5. IMPLEMENTATION & RESULTS 5.1 Introduction 5.2 Explanation of Key functions 5.3 Method of Implementation 5.2.1 Forms 5.2.2 Output Screens 5.2.3 Result Analysis 5.4 Conclusion 6. TESTING & VALIDATION 6.1 Introduction 6.2 Design of test cases and scenarios 6.3 Validation 6.4 Conclusion 7. CONCLUSION : 8. REFERENCES :

Abstract
We generally know many bike thefts going in our daily life. In many secured places also there is a sought of insecurity which can overcome by a simple kit, which doesnt allow others to ride your bike. Here mainly project is about a security lock to your motor bike. It doesnt allow other person to start your bike with the use of RFID technology and its detection.

Introduction

The Bike Security System works on the principle of RFID. Radio-frequency identification is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. The technology requires some extent of cooperation of an RFID reader and an RFID tag. It allows only authorized persons to access a particular area or field where it is applied. In this security system an authorized person (who has tag) is allowed to ON or ride the bike, by using a microcontroller we control the switching of solenoid switch in motorbike.
Procedure& working:

The working of Bike Security System is can be clearly observed by the below block diagram in fig 2.1.

Fig 2.1 Block Diagram of Bike Security System

You might be familiar with RFID systems as seen in access control, contactless payment systems, product tracking and inventory control etc. Classically, an RFID system consists of three components an antenna or coil, a transceiver (with decoder) and transponder (RF tag) electronically programmed with unique information. In every RFID system, the transponder tags contain unique identifying information. This information can be as little as a single binary bit or a large array of bits representing such things as an identity code, personal medical information or literally any type of information that can be stored in digital binary format. The RFID transceiver communicates with a passive tag. Passive tags have no power source of their own and instead derive power from the incident electromagnetic field. Commonly, at the heart of each tag is a microchip. When the tag enters the generated RF field, it is able to draw enough power from the field to access its internal memory and transmit its stored information. When the transponder tag draws power in this way, the resultant interaction of the RF fields causes the voltage at the transceiver antenna to drop in value. This effect is utilized by the tag to communicate its information to the reader. The tag is able to control the amount of power drawn from the field by doing so it can modulate the voltage sensed at the transceiver according to the bit pattern it wishes to transmit.

Advantages of RFID

1. No "line of sight" requirements: Bar code reads can sometimes be limited or problematic due to the need to have a direct "line of sight" between a scanner and a bar code. RFID tags can be read through materials without line of sight. 2. More automated reading: RFID tags can be read automatically when a tagged product comes past or near a reader, reducing the labor required to scan product and allowing more proactive, real-time tracking. 3. Improved read rates: RFID tags ultimately offer the promise of higher read rates than bar codes, especially in high-speed operations such as carton serration. 4. Greater data capacity: RFID tags can be easily encoded with item details such as lot and batch, weight, etc. 5. "Write" capabilities: Because RFID tags can be rewritten with new data as supply chain activities are completed, tagged products carry updated information as they move throughout the supply chain.
Common Problems with RFID Some common problems with RFID are reader collision and tag collision. Reader collision occurs when the signals from two or more readers overlap. The tag is unable to respond to simultaneous queries. Systems must be carefully set up to avoid this problem. Tag collision occurs when many tags are present in a small area; but since the read time is very fast, it is easier for vendors to develop systems that ensure that tags respond one at a time. See Problems with RFID for more details.

You might also like