Progressing Printing
Transcript of Progressing Printing
-
7/31/2019 Progressing Printing
1/31
UNIVERSITY OF DAR ES SALAAM COLLEGE OF INFORMATION AND COMMUNICATION
TECHNOLOGY (CoICT) DEPARTMENT OF ELECTRONICS AND TELECOMMUNICATIONS ENGINEERING (ETE)
TE 498: FINAL PROJECT I
TITLE: DESIGN AND IMPLEMENTATION OF RFID DOORLOCK SYSTEM
A Project Report in Partial Fulfillment for the Award of
Bachelor of Science in Telecommunication Engineering
Name:THOM, Libion
Reg #:2008-04-02078
Supervisor: Ms Khadija, Mkocha
Submission Date:
-
7/31/2019 Progressing Printing
2/31
CERTIFICATION
Statement of Authorship and Originality
I declare that this report and the work described in it are my own work, with any contributions
from others expressly acknowledged and/or cited. I declare that the work in this report was
carried out in accordance with the Regulations of the University of Dar es Salaam and has notbeen presented to any other University for examination either in Tanzania or overseas. Any
views expressed in the report are those of the author and in no way represent those of the
University of Dar es Salaam.
SIGNED: .............................................................
DATE: .
This report may proceed for submission for assessment for the award of B.Sc. in
Telecommunications Engineering at the University of Dar es Salaam.
Review Committee Signature: ............................................... Date: ..........................................
Supervisor Signature: ................................................... Date: .....................................................
i
-
7/31/2019 Progressing Printing
3/31
ABSTRACT
RFID , Radio Frequency Identification is an inexpensive technology that can be
implemented for several applications such as security, asset tracking, people tracking, inventorydetection, access control applications.
The main objective of this report is to design and implement a digital door lock security
system which can deploy in secured zone where only authentic person can be entered. I
implemented a security system containing door locking system using passive type of RFID
which can activate, authenticate, and validate the user and unlock the door in real time for secure
access.
In terms of system design and development, this study consists of a combination of both
hardware (circuit design) and software (program design). Unlike mechanical locks, which usekeys that are prone to duplication with encrypted serial keys that cannot be duplicated. This
feature ensures the reliability of RFID door locks , providing a secure access control. T he tags
ability to withstand environmental conditions such as intense heat, humidity, corrosive
chemicals, mechanical vibration and shock also increases the reliability of the system, RFID-
based door locks adopt contactless technology that utilizes smartcards embedded
The advantage of using passive RFID is considered much as it functions without a
battery and passive tags are lighter and are less expensive than the active tags. A centralized
system manages the controlling, transaction and operation task. The door locking system
functions in real time as the door open quickly when user put their tag in contact or in betweenthe specified range of distance accessible by the reader. The system also creates a log containing
check-in and check-out of each user along with basic information of user.
An RFID reader does not require the line of sight to see the RFID tag. The tag can be read
inside a case, carton, box or other container and the same tag can be used to access all the locks
connected to the same system.
The RFID keycards do not have to be inserted into the lock and they are not susceptible to
demagnetizing, like their magnetic strip counterpart, and are available to be made into fobs and
wristbands. With this technology, owners have the option to have total security control from onecentral location, utilizing RF-online communication 16 capabilities. The keycards can be
canceled or extended with the guest stay all remotely without having the guest to return to the
front desk to make the changes.
ii
-
7/31/2019 Progressing Printing
4/31
AKNOWLEDGEMENT
This report couldnt be c ompleted without the support, help and encouragement of many
people that have been by my side. I feel obligated to acknowledge all who provided their support
during all my project period and resources for report writing.
First of all I would like to thank the Almighty God for giving me strength, commitment, willand ability to do my project in all period allocated.
I like to give my sincere thanks to project supervisor Ms Khadija Mkocha for her guidance,
comments, challenges and valuable suggestions and inspirations during the entire project period.
I express my deep gratitude to all ETE department staff members for their advice,
encouragement, valuable analysis and assistance they gave me during all my project period
towards the completion of study as well as my report.
The Last but not the least, I like to express my profound thanks to all my class mates and friends
who directly or indirectly helped me for the successful completion of my project report.
iii
-
7/31/2019 Progressing Printing
5/31
CONTENTS
CERTIFICATION 2
ABSTRACT 3
AKNOWLEDGEMENT 4
CONTENTS 5
LIST OF ABBREVIATIONS ACRONYMS 7
LIST OF FIGURES 8
CHAPTER ONE 9
1.1 INTRODUCTION 9
1.2 THE BACKGROUND HISTORY OF RFID 10
1.3 PROBLEM STATEMENT 11
1.4 OBJECTIVES 12
1.4.1 Main objective 12
1.4.2 Specific objective 12
2.0 LITERATURE REVIEW 13
2.1 WHAT IS RFID SYSTEM 13
2.2 TYPE OF RFID 14
2.3 TYPES OF COLLISION IN RFID 14
2.3.1 Tag Tag Collision 14 2.3.2 Reader Reader Collision 14
2.3.3 Reader Tag Collision 14
2.4 COLLISION AVOIDANCE 15
2.5 Student attendance system using RFID 16
CHAPTER THREE 18
3.0 METHODOLOGY 18
3.1 PROJECT OVERVIEW 18
3.2 THE SYSTEM REQUIREMENT AND ANALYSIS 18 SYSTEM SPECIFICATION 18
3.3 SYSTEM DESIGN 19
3.3.1 RFID TAG 19
3.3.2 PASSIVE TAG 19
3.3.3 RF SIGNAL INTENSITY DETECTOR 20
-
7/31/2019 Progressing Printing
6/31
3.3.4 BACKSCATTER MODULATION 20
3.3.5 WIEGAND RFID TAG READER 21
3.3.6 LCD DISPLAY 22
3.3.7 MICROCONTROLLER (PIC16F876A) 22
3.3.8 Software requirement: 23
3.3.8 RELAY 24
3.3.9 Magnetic lock (DOOR LOCK) 24
3.3.10 TRANSISTOR 25
3.3.11 LED as output for PIC microcontroller 25
3.5 PERSONAL COMPUTER 27
3.6 MECHANISM OF READING AND WRITING TAG 29
4.0 CONCLUSION 30
REFERENCE 31
-
7/31/2019 Progressing Printing
7/31
LIST OF ABBREVIATIONS ACRONYMS
RFID Radio frequency identification
PIC Programmable integrated chip
LCD Light cellulose diaphragm
IC Integrated circuit RF Radio frequency
CMOS Complementary metal oxide semiconductor
SPDT Single pole double throw
DPDT Double pole double throw
LED Light emitting diode
LPS Linear power supply
PC Personal computer
PCB Printed circuit board
TWA Tree walking algorithm
-
7/31/2019 Progressing Printing
8/31
LIST OF FIGURES
FIGURE 1: Overall system of attendance using RFID . 17
FIGURE 2: RFID door lock system block diagram . 19
FIGURE 3: Data module 20
FIGURE 4: Backscattering module 21 FIGURE 5: Tag reader 22
FIGURE 6: LCD display 22
FIGURE 7: PIC pin diagram 23
FIGURE 8: PIC programming device 23
FIGURE 9: Transistor.. 25
FIGURE 10: LED 26
FIGURE 11: Power backup system. 26
FIGURE 12: A block diagram to connect a PC t o PIC 27
FIGURE 13: Algorithm 28
-
7/31/2019 Progressing Printing
9/31
CHAPTER ONE
1.1 INTRODUCTION
As technology expands rapidly, there are different methods used for authentication indifferent systems. Electronics lock offers varieties means of authentication which are numerical
words, passwords and pass-phrases, and RFID.
Radio frequency identification (RFID) is the use of an object (typically referred to as an
RFID tag) applied in modern electronic locks or incorporated into a product, animal, or person
for the purpose of identification and tracking using radio waves. Some tags can be read from
several meters away and beyond the line of sight of the reader.
Radio Frequency Identification (RFID) technology uses radio waves to identify objects
by retrieving data embedded within RFID tags. It is a contactless technology that uses radio
waves to retrieve labels tagged to a product, animal or person. A unique serial number that
identifies a product, person or object is stored on a microchip which is encased together with an
antenna to form a tag or transponder.
An RFID system is comprised of two sub-systems which are the tag and the reader, both
of which have their own antennas. The tag is the device that contains the identification data. It
identifies the item it is attached to. The reader retrieves data from the tag. It is also called an
interrogator that reads or reads/writes from/to the tag. The antenna attached to the reader emits electromagnetic waves and receives responses from the tag.
The RFID Door Lock System will consist of passive RFID tags , an antenna , a RFID
reader module, a microcontroller, and an electronic door lock . Tags can be classified in two
main categories based on their respective power source, passive and active tags. Active tags have
their own power source. They use battery as the power source while passive tags do not require
batteries, and can be much smaller and have a virtually unlimited life span. The reader module
continuously scans for a tag. When a tag comes within reading distance of the antenna, it detects
an activation signal and wakes up. The information on the chip is then transmitted through theantenna back to the reader module. The reader module processes the information and then sends
it to the microcontroller. Once the microcontroller receives the data, it is compared to a list of
valid Identifications (IDs). If the ID is confirmed to be valid, the data associated with the ID is
logged into memory with the current timestamp, and the microcontroller sends a signal to unlock
the door. The system will also have a maintenance mode. In this mode, tag IDs can be added or
-
7/31/2019 Progressing Printing
10/31
removed from the system and the activity log, containing IDs and timestamps, can be transmitted
to an external computer.
I am planning to build an RFID Door Lock System. This project will use the ability
of an RFID tag to signal a door to unlock. When one of these tags gets close enough tocommunicate with the antenna, the reader will react and unlock the door if the tag contains the
correct information .The RFID door lock system has the following: RFID tags (miniaturized
chips); RFID readers, and a data collection, distribution , and management system that has
the ability to identify or scan information with increased speed and accuracy.
1.2 THE BACKGROUND HISTORY OF RFID
Its gen erally said that the history of RFID (Radio Frequency Identification) technology can be
traced back to World War II. The Germans, Japanese, Americans and British were all using
radar which had been discovered in 1935 by Scottish physicist Sir Robert Alexander Watson-
Watt to warn of approaching planes while they were still miles away. The problem was there
was no way to identify which planes belonged to the enemy and which were a countrys own
pilots returning from a mission.
The Germans discovered that if pilots rolled their planes as they returned to base, it would
change the radio signal reflected back. This crude method alerted the radar crew on the ground
that these were German planes and not allied aircraft (this is, essentially, the first passive RFID
system).
Since that time, the capabilities of Radio Frequency Identification have expanded exponentially.
RFID technology has now been developed to the point where it can provide many types of
businesses with precise information regarding the status of their valuable components and
products. Such information can be utilized in terms of supply chain management, asset
management, inventory control, as well as increasing safety and security. In addition, RFID
technology has matured to the point where such systems can be implemented in a scaleable and
cost- effective manner, therefore ensuring significant return on our clients investment.
RFID can be explained in many ways, but one of the best explanations was provided by RFIDJournal in Thomas Friedmans book The World is Flat:
RFID is a generic term for technologies that use radio waves to automatically identify people or
objects. There are several methods of identification, but the most common is to store a serial
number that identifies a person or object, and perhaps other information, on a microchip that is
attached to an antenna the chip and the antenna together are called an RFID transponder or an
-
7/31/2019 Progressing Printing
11/31
RFID tag. The antenna enables the chip to transmit the identification information to a reader. The
reader converts the radio waves reflected back from the RFID tag into digital information that
can then be passed on to computers that can make use of it.
1.3 PROBLEM STATEMENT
Security breaching at UDSM campus, hospitals, banks and homes occurs regularly.
This is caused by low level of security offered to the door locks used.
Carrying a bundle of keys for accessing different rooms at campus or home is
another major problem. When using the password door locks, each door has its own
password which can be used by any of the user thus increasing the difficultness of
knowing the user being granted the access. Also having the bulk list of passwords
and keys or tokens for each entrance is another problem concerning the otherauthenticating locking system. Or giving a single password at the entrance for a
certain users level to use it to access will decrease the level of security as the ID of
each user is not known.
Time wastage when searching for the right keys to be used and passwords for login
onto the system.
Maintenance frequency of the door locks is too high when using the mechanical
door locks as they are manually accessed. The magnetic cards or keys to be used for
login needs to be manually inserted into the locks for granting the access.
-
7/31/2019 Progressing Printing
12/31
1.4 OBJECTIVES 1.4.1 Main objective
The main objective of this project is to design and implement a simple and cheap door lock
system which uses RFID tags to grant access to a user and be able to learn new tags and save it
for the future use. The system can avoid multiple collisions and has power backup system. 1.4.2 Specific objective
Designing and implementing the system that opens the door when the authorized
RFID tag in brought within the range of the tag reader.
The system does not only automatically open and close the door for the authorized user but it
also can be like a punch-card system where it has the capability to link the system to the database for
a record. The system consists of passive reader and door lock controller. It is an easy system to be
handled and installed. So with this technology, the user does not need to touch the passive tag to the
receiver or reader for the authorization to check in. The system will have a power backup system for covering up the power shortage when the
power is off. Developing the codes for the algorithm of the system Microcontroller programming to control the system using C programming
-
7/31/2019 Progressing Printing
13/31
CHAPTER TWO
2.0 LITERATURE REVIEWThe literature is a valuable resources and an important storehouse of knowledge and
thinking about a topic area. This chapter will discuss more about all of the information related to
the project. It is structured in subtopics of RFID, short message services, children monitoring
system and other related applications. The literature review in this paper is based on Internet,
journal, books, articles, and from newspapers.
2.1 WHAT IS RFID SYSTEM
Radio Frequency Identification (RFID) is an emerging technology consisting of three key pieces:
RFID tags (miniaturized chips); RFID readers; and a data collection, distribution, and management
system that has the ability to identify or scan information with increased speed and accuracy. Comparedto the bar code system, RFID promises long-term gains in supply chain management, transportation,
defense and health care, to mention a few. RFID is increasingly used in commercial supply chain
applications through pallet level tagging.
RFID technology will make organizations more effective by enabling real-time visibility of
information regarding items in and out of the supply chain. Having more accurate and immediate
information about the location of items, the history of items, and the number of items in their
process will enable organizations to be more responsive to their customers and consumer needs
through more efficient, customer-driven operations. RFID enables manufacturers, distributors, and retailers to identify the exact location of their
goods at any point in time. And better product visibility will enable the entire supply chain to be
more focused on the end customer, producing and shipping goods based on demand and
replenishing store shelves with products customers want to buy. Moreover, RFID technology can
be effectively used to significantly reduce theft, loss, and time wasted trying to locate and
account for valuable equipment.
RFID, like the Internet, requires smart privacy and security policies that address questions
that arise as a result of the growth and interconnectedness of information and communications
networks. Disclosure, transparency and choice are important considerations for consumers as
RFID migrates to item level tagging over the next few years. Policies that are informed by
industry best practices and consumer concerns will foster the potential of ICT and facilitate
acceptance of emerging technologies such as RFID.
-
7/31/2019 Progressing Printing
14/31
The RFID system consists of readers/interrogators and tags transponders. RFID operates in
different frequency bands (e.g., 125 kHz, 13.56 MHz, 868/915 MHz, 2.45 GHz, and 5.8 GHz).
RFID has several important advantages over the traditional barcode.
1) It does not require line-of-sight (LoS) access to be read.
2) Multiple presenting tags can be read simultaneously.
3) Tags can be used in a rugged environment.
4) Tags can carry much more data.
5) Tags can be rewritable; they can modify their data as required.
6) Tags can be coupled with sensors to supply environmental information.
2.2 TYPE OF RFID There are three types of RFID, active, passive, and semi passive RFID tag. Active RFID and
passive RFID are fundamentally different technologies. Active RFID tags have an internal power
source (battery).The battery that can be used as a partial or complete source of power for the tag's
circuitry and antenna, and may have longer range and larger memories than passive tags, as well
as the ability to store additional information sent by the transceiver. Some active tags contain
replaceable batteries for years of use (JR Tuttle, 1997).
2.3 TYPES OF COLLISION IN RFID 2.3.1 Tag Tag Collision
Tag-tag collision occurs when multiple tags respond to the same reader simultaneously. Due tomultiple signals arriving at the same time, the reader may not be able to detect any tag. This
problem prevents the reader from detecting all tags in its interrogation zone. A popular solution
to this problem is the tree walking algorithm (TWA) , which is generally used in UHF readers.
2.3.2 Reader Reader Collision A reader-reader collision occurs when a tag hears multiple readers at the same time. In this
situation, the tag might be unable to respond to any reader at all.
2.3.3 Reader Tag Collision Reader-tag collision occurs when the signal from a neighboring reader interferes with tag
responses being received at another reader.
-
7/31/2019 Progressing Printing
15/31
2.4 COLLISION AVOIDANCE
There can be tag collision or reader collision, when two tags talk back to an interrogator
simultaneously, or when two readers use the same frequency. Most interrogators currently have
built-in systems for avoiding collision. Tags are asked to respond in sequence, based on
predetermined algorithms. I'll explain how this works in a very simplified way.
Each transponder has a unique serial number. For instance, the reader might ask all tags with
a serial number starting with one to respond. Several tags might respond simultaneously, so the
interrogator would then signal all tags with a serial number that begins with one, two to respond.
If more than one tag responds, the device might then ask for tags that start with one, two, and
three. In this way, the algorithm can ensure that all tags are read without interference.
Readers also have systems for ensuring they do not interfere with one another. One is called
"listen before talk." Interrogators can use a portion of the radio spectrum, which is divided into
channels. In Europe, for example, readers operate from 865 to 868 MHz, which is divided into
10 channels. With "listen before talk" enabled, each reader listens for any signals on a channel
before utilizing that channel to communicate with tags. If there is a signal, it chooses another
channel. Another option is to use frequency hopping, in which readers randomly jump between
channels. If one channel is being used, the device can then jump to another channel and
broadcast a signal to the tags.
There are many related work and projects done so far concerning the applications of RFID in thefield. Some of the related works of the RFID technology is:
Military hardware and even clothing make use of RFID tags to help track each item
through the supply chain
Student attendance using RFID system
BARCODES systems
RFID Watches Over School Kids in Japan Comparative Study On RFID, Hotspot And Car Plate Scanning Method: ForIntelligent Parking Management System
Ee495m Mobile Communication RFID Data Transmission
Car tracking system using RFID
-
7/31/2019 Progressing Printing
16/31
RFID passports (E-passport)
Identification of patient and hospital staffs using RFID
Tracking sports memorabilia to verify authenticity using RFID
Airport baggage tracking logistics using RFID
2.5 Student attendance system using RFID
The RFID system is used to record student attendance automatically. This project used
student ID card as RFID tag and it has a RFID reader. This RFID system is being integrated with
software. This method is more effective to prevent problems in process getting attendance
manually.
The RFID reader will use to detect the student ID card code. The code will use to
compare with Access database and the information in database will be display and store by using
interface on Visual Basic 6.
This system consists of two modules which are RFID module and Visual Basic 6 module. Both
modules will be combined together in order for this system fully functioning. This project is
developed by using Radio Frequency Identification (RFID) system and student card to get
student attendance. Before this lecturer needs to use the paper to get the student attendance.
There were a lot of problems when using the paper as student attendance such as cheating.
This project can help lecturer to reduce the problem like that by design automatic attendance
using RFID and student card. The project system was running by get the code of card student to
compare with the database in Access . Graphical User Interface (GUI) was developed usingVisual Basic 6.0 to make the database easier to access.
Firstly, lecturer needs to fill forms in an interface like lecturer name, subject and code
subject. This part is important because we need the information in this part to use in the next
interface. In the next interface, lecturer needs to choose port and speed to make connection with
RFID reader. After the reader was ready, process to get attendant will started. Students need to
swap their card on the reader and the code from the card will use to compare with database in
Access. When the code is match with database, the student information like name and ID number
will show on interface and that information will trigger into a list. This list will use as a studentattendance. In that list, all information like student name and ID number will attached including
the lecturer name and subject. If the code were not match with database, it means that student
was in the wrong class or not registers yet in that subject. When this happen, lecturer can register
that student by using registering form and the information of that student will be update into
database. This project will help lecturer taking the student attendance more easily and
-
7/31/2019 Progressing Printing
17/31
automatically. As the conclusion, RFID technology can be used in student attendance
application.
It is possible to configure an RFID reader so that it sends the radio pulse only in response
to an external event. For example, most electronic toll collection systems have the reader
constantly powered up so that every passing car will be recorded. On the other hand, RFIDscanners used in veterinarians offices are frequently equipped with triggers and power up the
only when the trigger is pulled.
OVERALL SYSTEM OF ATTENDANCE USING RFID
-
7/31/2019 Progressing Printing
18/31
CHAPTER THREE
3.0 METHODOLOGY
3.1 PROJECT OVERVIEW
Literature review on different systems which employs the RFID technology as well as on
development of code for the control system
Hardware design and Circuitry development
This includes the designing of the circuit overview including the power back circuit
system. Checking the hardware features to be used for concisely good operation of the
system so that the approach to solve the objectives is achieved. Preparing the wiegand tag
reader and the tag for circuiting.
Software design (Code development). This is done through the C programming language
which is one of the languages which are compatible with the PIC microcontroller Linking the system to the computer for record keeping and display of personal
information of the user.
Integrating the system and testing
3.2 THE SYSTEM REQUIREMENT AND ANALYSIS
SYSTEM SPECIFICATION
A tag used is a passive tag RFID operates in several frequency bands. The exact frequency is controlled by the RadioRegulatory body in each country. The generic frequencies for RFID are:
125 - 134 kHz 13.56 MHz UHF (400 960 MHz) 2.45 GHz 5.8 GHz
In practice, inductive RFID systems usually use antenna sizes from a few cm to a meter
or so, and frequencies of 125/134 KHz ( LF ) or 13.56 MHz ( HF ). Thus the wavelength
(respectively about 2000 or 20 meters) is much longer than the antenna. Radiative
systems use antennas comparable in size to the wavelength. The very common 900 MHz
range has wavelengths around 33 cm. Reader antennas vary in size from around 10 to
-
7/31/2019 Progressing Printing
19/31
>30 cm and tags are typically 10-18 cm long. These systems use radiative coupling, and
are not limited by reader antenna size but by signal propagation issues.
High frequency RFID systems (850 MHz to 950 MHz and 2.4 GHz to 2.5 GHz) offer
transmission ranges of more than 90 feet, although wavelengths in the 2.4 GHz range are
absorbed by water, which includes the human body, and therefore has limitations. Power supply of 12V is required with a backup rechargeable battery of 12V
Anti collision modified system
A PC connected with a PIC for record keeping and GUI provision
3.3 SYSTEM DESIGN
The RFID door lock system is described by the following block diagram
RFID DOOR LOCK SYSTEM BLOCK DIAGRAM
3.3.1 RFID TAG
RFID tags consist of an integrated circuit (IC) attached to an antenna typically a small coil of
wires plus some protective packaging (like a plastic card) as determined by the application
requirements. Tags also sometimes are called transponders, and sometimes they are called inlays,
although technically an inlay is a tag mounted on a substrate that is ready to be converted into a
smart label. RFID tags can come in many forms and sizes. A tag used in this system is a passivetag.
3.3.2 PASSIVE TAG
In an RFID system the transponder which contains the data to be transmitted is called an RF
tag. Passive RF tags obtain operating power generated from the RF reader. They are smaller and
lighter than active tags but have a shorter communication range and require a high powered
-
7/31/2019 Progressing Printing
20/31
reader. Passive tags are generally read-only and as such, once it is programmed with data, that
data cannot be modified. Passive RFID tags do not contain an internal power supply. Passive
tags cannot generate and transmit a signal to a terminal for recognition and storage.
Passive tags use the radio frequency from the reader to transmit their signal. Passive tags will
generally have their data permanently burned into the tag when it is made, although some can berewritten.
3.3.3 RF SIGNAL INTENSITY DETECTORIntensity-Detecting Tags: It is easier to integrate an RF-signal intensity detector into a tag than
an accelerometer, because only RF technology is used in the former, while both RF and
microelectromechanical-system (MEMS) technologies are used in the latter. However, this
approach would still increase cost, and require a new generation of RF tags.
Intensity-Detecting Readers : It is simpler, cheaper, and more feasible to modify readers
rather than tags. However, there are a couple of problems.
Since the transmitter needs to keep emitting power continuously for the passive tags to
respond, and the receiver generally includes an automatic-gain-control (AGC) loop, the accurate
measurement of the RF signal at the reader is very difficult.
It is also difficult to identify the desired tag response (for measuring received-signal intensity)
because multiple tags can respond simultaneously (i.e., the tag collision problem). Thus,
appropriate signal-processing algorithms and protocols are required to disambiguate the desired
tag response from the multiple returns.
DATA MODULATION SYSTEM
3.3.4 BACKSCATTER MODULATION
This term refers to the communication method used by a passive RFID tag to send data to the
reader using the same readers carrier signal. The incoming R F carrier signal to the tag is
transmitted back to the reader with tags data.
-
7/31/2019 Progressing Printing
21/31
BACK SCATTERING MODULE
3.3.5 WIEGAND RFID TAG READER - RFID tag reader with specification reader to card and binary reader to controller interface - Standard 26-bit binary card data format
Operate with 5V supply
A reader (now more typically referred to as an RFID interrogator) is basically a radio
frequency (RF) transmitter and receiver, controlled by a microprocessor or digital signal
processor. The reader, using an attached antenna, captures data from tags, then passes the data toa computer for processing. As with tags, readers come in a wide range of sizes and offer different
features. Readers can be affixed in a stationary position (for example, beside a conveyor belt in a
factory or dock doors in a warehouse), portable (integrated into a mobile computer that also
might be used for scanning bar codes), or even embedded in electronic equipment.
-
7/31/2019 Progressing Printing
22/31
TAG READER
3.3.6 LCD DISPLAY
Interface LCD (2x 16 Characters) with PIC16F876A
To use the LCD display, users have to solder 16 pin header pin to the LCD display. LCD used in
this project is RT1602C, for other type of LCD.
LCD DISPLAY
3.3.7 MICROCONTROLLER (PIC16F876A)
This powerful (200 nanosecond instruction execution) yet easy-to-program (only 35 single
word instructions) CMOS FLASH-based 8-bit microcontroller packs Microchip's powerful PIC
architecture into an 40- or 44-pin package and is upwards compatible with the PIC16C5X,
The requirement and specifications: 8-bit microcontroller with 22 I/O Operate with 5V supply
-
7/31/2019 Progressing Printing
23/31
-
7/31/2019 Progressing Printing
24/31
3.3.8 RELAY
A relay is a simple electromechanical switch made up of an electromagnet and a set of
contacts. Current flow through the coil of the relay creates a magnetic field which attracts a lever
and changes the switch contacts. The coil current can be ON or OFF so relay have two switch
positions and they are double throw (changeover) switches. Relays allow one circuit to switch asecond circuit which can be completely separate from the first. For example a low voltage
battery circuit can use a relay to switch a 230V AC mains circuit. There is no electrical
connection inside the relay between the two circuits; the link is magnetic and mechanical. The
coil of a relay passes a relatively large current, typically 30mA for a 12V relay, but it can be as
much as 100Ma for relays designed to operate from lower voltages. Most ICs (chips) cannot
provide this current and a transistor is usually used to amplify the small IC current to the larger
value required for the relay coil. Relays are usually Single Pole Double Throw (SPDT) or
Double Pole Double Throw (DPDT) but they can have many more sets of switch contacts, forexample relays with 4 sets of changeover contacts are readily available.
RELAY
3.3.9 Magnetic lock (DOOR LOCK)
A magnetic lock is a simple locking device that consists of an electromagnet and armature plate.
By attaching the electromagnet to the door frame and the armature plate to the door, a current
passing through the electromagnet attracts the armature plate holding the door shut. Unlike an
electric strike a magnetic lock has no interconnecting parts and is therefore not suitable for high
security applications because it is possible to bypass the lock by disrupting the power supply.Nevertheless, the strength of today's magnetic locks compare well with conventional door locks
and cost less than conventional light bulbs to operate.
-
7/31/2019 Progressing Printing
25/31
MAGNETIC DOOR LOCK
3.3.10 TRANSISTOR
The transistor used to amplify the current for the relay is an NPN transistor, 2N2222A.
TRANSISTOR
3.3.11 LED as output for PIC microcontroller One I/O pin is designated for a LED as output of PIC microcontroller. The connection for a LEDto I/O pin is shown in Figure below. The function of R2 is to protect the LED from over currentthat will burn the LED. When the output is in logic 1, the LED will ON, while when the output isin logic 0, the LED will OFF.
-
7/31/2019 Progressing Printing
26/31
LED
3.4 POWER BACKUP SYSTEM
This is a power system which supplies power to the system depending on how the situation is.
When the power is on the normal routine supplies and charges the battery to full charge. When
the system runs out of power the battery start to supply power to the system to encounter the
deficiency.
POWER BACKUP SYSTEM
A battery system uses energy that is stored in batteries. Batteries are charged by a number of
methods. In most backup systems, the grid charges the batteries and keeps them charged and will
recharge them once the grid comes back online. One can use a generator to charge batteries, or
use the sun, wind or falling water. One can even generate electricity by human power.
Batteries deliver to you the exact amount of power you require at that moment. The running time
of the system is directly related to your loads. For instance, if you know the outage will be
longer-term, you can only operate the most essential loads; whereas if you know the outage will
-
7/31/2019 Progressing Printing
27/31
only be brief you can use up much more power knowing the batteries will be charged up by the
grid when it comes back online soon
3.5 PERSONAL COMPUTER
This is for users interface. Checking the details of the user who have been granted the accessand storing the record of the procedure. The personal details of a user can be inserted and edited
through this PC.
CONNECTING A PC WITH A PIC
The block shows how to link the PIC microcontroller using the USB or serial cable. A PC has
a database to store the records of the users to prompt the granting process. A specific user is felt
in with his personal records in the database so that when he prompts to have access to the
entrance, his records are known. The records are stored using the ID of the user in the TAG. No
two users can have the same records as each user has its own ID on the TAG.
-
7/31/2019 Progressing Printing
28/31
ALGORITHMS
ALGORITHM FLOW CHART
STEPS: Preparing the PIC microcontroller Preparing the printed circuit board Mounting the device in a printed circuit board and Door lock connection Wiring the tag reader Loading the code configuration in the microcontroller Management system preparation, TESTING and execution LCD Display mounting to the PCB
-
7/31/2019 Progressing Printing
29/31
3.6 MECHANISM OF READING AND WRITING TAG
How it works: The interrogator sends a command to initiate communication with tags in the fields. This
command signal is also used for energizing the passive device.
Once a tag has received sufficient energy and command it responds back with its ID foracknowledgement.
The interrogator now knows which tag is in the field. It send a command to the
identifying tag for what to do next (processing or sleep). If the tag receives the processing and read commands, it transmits a specified block and
waits for the next command. If the tag receives the processing and reading commands together with the block of data,
it writes a block of data into a specified block of memory and transmit a written block for
verification. After processing the interrogator sends the end command to send the tag into sleep mode. If the device receives the end command after processing, it sends an acknowledgement
(8-bit preamble) and stays in the sleep mode. During the sleep mode, the device is looking for the next tag for processing as long as it
remains in the power up.
-
7/31/2019 Progressing Printing
30/31
CHAPTER FOUR
4.0 CONCLUSION
Strong security properties are achievable within simple security protocol designs that are
suitable for implementation in RFID systems. In this project I described a simple door lock usingRFID technology equipped with a power backup system.
The RFID door lock system designed in this project allows it to be applied even in places of people
with low income as it has a power backup system to be used when the power is off. Instead of having a
generator or solar power backup which is expensive to afford, a simple source of power that has
rechargeable battery is installed in a system.
On future extension the system can manage even to send a text to a specified user who needs grants at
the entrance. When a tag ID is within the proximity range, the PIC16F876A will trigger and send the textto the user's number. This will increase the level of security as when the user tag is lost, and someone use
it the user will be notified.
DEVICES
1N4001 diode Diffused Junction
High Current Capability and Low Forward Voltage Drop
Surge Overload Rating to 30A Peak Low Reverse Leakage Current
-
7/31/2019 Progressing Printing
31/31
REFERENCE [1] EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for
Communications at 860 MHz - 960 MHz Version 1.0.9," EPC Global, Tech. Rep., January 2005.
[2 ] J. Waldrop, D. W. Engels, and S. E. Sarma, Colorwave: An Anticollision Algorithm for the
Reader Collision Problem," in IEEE International Conference on Communications, vol. 2, 2002,
pp. 1206{1210}.
[3] http://eet.etec.wwu.edu/vanmere/project/docs/Project%20Proposal.pdf
[4]http://www.google.com.my/#hl=en&source=hp&q=RFID+door+lock+system&aq=f&aqi=g1&aq
[5] http://www.robotshop.com/cytron-rfid-door-lock-kit-2.html
[6] William Stallings, Data and Computer Communication, Pearson Prentice Hall Publication,
International [7] E Turban, D Leidner, E Mcleam, and J Wetherbe.
[8] Information Technology for Management. Wiley, New York, USA, 2006.
[9] P Bruce, RFID: misunderstood or untrustworthy? Network Security , 2005, pp.17-18.[10] C.C. Chaoa, J.M. Yangb, and W.Y. Jenc, Determining technology trends and f orecasts of
RFID by a historical review and bibliometric analysis from 1991 to 2005, Technovation, 27,
2007, pp.268 279.
[11] X. Li, Buddy finding in the mobile environment Technovation, Vol.25 No.9, 2005, pp
1017 1023.