Design And Construction Of An RFID And Password Based Automatic Door Access Control System

Overview

ABSTRACT

Traditional lock systems using mechanical lock and key mechanism are being replaced by new advanced techniques of locking system. These techniques are an integration of mechanical and electronic devices and highly intelligent. One of the prominent features of these innovative lock systems is their simplicity and high efficiency.

Here we develop an electronic security and access control system using microcontroller, which provides control to the actuating the load. It is a simple embedded system with input from the keyboard and the output being actuated accordingly.

This system demonstrates an RFID and biometric based door lock system wherein once the correct RFID card and password is entered, the door is opened and the concerned person is allowed access to the secured area. Again if another person arrives it will ask to enter RFID card or password. If the RFID card or password is wrong then door would remain closed, denying the access to the person.

TABLE OF CONTENTS

TITLE PAGE

APPROVAL PAGE

DEDICATION

ACKNOWELDGEMENT

ABSTRACT

TABLE OF CONTENT

CHAPTER ONE

  • INTRODUCTION
  • BACKGROUND OF THE PROJECT
  • AIM OF THE PROJECT
  • OBJECTIVE OF THE PROJECT
  • PURPOSE OF THE PROJECT
  • SIGNIFICANCE OF THE PROJECT
  • STATEMENT OF THE PROBLEMS
  • APPLICATION OF THE PROJECT
  • PROJECT ORGANISATION

CHAPTER TWO

2.0     LITERATURE REVIEW
2.1     REVIEW OF BIOMETRICS AND RADIO-FREQUENCY IDENTIFICATION
2.2     REVIEW OF BIOMETRICS WITH RADIO FREQUENCIES IN ACCESS CONTROL
2.3     HISTORICAL BACKGROUND OF RADIO-FREQUENCY IDENTIFICATION
2.4   DESIGN OF RADIO-FREQUENCY IDENTIFICATION

CHAPTER THREE

3.0      CONSTRUCTION METHODOLOGY

3.1     SYSTEM BLOCK DIAGRAM

3.2     FUNCTIONS OF THE SYSTEM BLOCK

3.3     SYSTEM OPERATION

3.4      CIRCUIT DIAGRAM OF SYSTEM

3.5      SYSTEM CIRCUIT DESCRIPTION AND OPERATION

3.6      PROGRAM EXPLANATION

3.7      PROGRAM CODE

3.8      POWER SUPPLY UNIT

3.9      MICROCONTROLLER UNIT

CHAPTER FOUR

RESULT ANALYSIS

4.0      CONSTRUCTION PROCEDURE AND TESTING

4.1      CASING AND PACKAGING

4.2      ASSEMBLING OF SECTIONS

4.3      TESTING AND RESULT OF SYSTEM

4.4      DESIGN CALCULATION

4.5      PRACTICAL LIMITATIONS

CHAPTER FIVE

5.1      CONCLUSION

5.2      RECOMMENDATION

5.3      REFERENCES

CHAPTER ONE

1.1                                                        INTRODUCTION

The security situation in many parts of the world today leaves much to be desired. In Nigeria particularly, the prevalence of armed robbers and other groups that constitute nuisance to the society has led to the loss of lives and properties worth millions of dollars. Many of the attacks that led to the loss have occurred in the homes or in guarded compounds and the attacks took place in spite of the existence of seemingly impregnable security gates that were designed to ward off intruders. The needs for electronically controlled gates that have superior security features to those operated manually thus exist and have been on the increase in recent times.

This device consist of a card reader, password reader, Electromagnetic lock or door strike. Power supply system and a push button. To use this system, the authorized card/pin user when approach the reader will just have to use the cardkey or pin number. Once the correct data is present to the reader system, through an interface the locking / door holding devices will be de-energized and the door can be push open. From inside of building to exit the building the person will just have to press a door lock release switch and the system will release the lock. A power back-up unit will be incorporated into most access control system, this will act as standby power in the event there is a power outage. For certain safety requirement a break glass is incorporated into the system for emergency release of the door.

This device uses Radio frequency identification and password. Radio frequency identification (RFID) has been used in conjunction with microcontrollers to control gates. This system is only required to close and open gates and has a very limited security feature. In the work done by Adewuyi et al. [11, 12] surveillance cameras are used to capture and recapture the face of the driver as well as vehicle plate numbers. These data are stored in a databank for future comparison with visitors who will only be able to gain entry into a compound through gates if the data match. The system has the disadvantage that users must have been properly documented to enable them pass through the gate.

The system that has been designed in this work uses microcontrollers, RFID module, and a keypad. The keyboard inputs the password.  These minutiae points reduce the total amount of data stored. Since the information is encoded the data can’t be used to reconstruct the actual fingerprint. A microcontroller is programmed to decode a given sequence of code that is entered on a keypad; the microcontroller commands a module to send out this code as signal at a given system.

(i) It operates as a stand-alone system and does not require a network provider for reception of signals.

(ii) The use of a keypad to generate the code necessary for the opening and closing of the gate enhances the security of the system since it requires very many trials by an intruder to succeed in breaking into the system.

(iii)The features of the system that are controlled by the firmware resident in the memory of the microcontrollers can be easily improved for future upgrade.

(iv) it has two different access controlled unit, that is, using RFID card and password

1.2                                             OBJECTIVE OF THE PROJECT

The main objective of this project is to develop an embedded system, which is used to verify and authenticate the authorized person entering a restricted room or area. This verification is done via RFID card or password reader. This device can read password as well as RFID cards.

1.3                                              PURPOSE OF THE PROJECT

Main purpose of the Access Control is to begin with – protect physical, IP and human assets. This requires restricting unauthorized people from reaching pre-defined areas. This security can be achieved by using RFID card and password when the user approaches the entrance door where the access controlled door is been used.

1.4                                              BENEFITS OF THE PROJECT

  • Control Access based on User, Zone and Time
  • Secure Sensitive Areas with Advanced Access Control Features
  • IP based Architecture to Enhance Reliability and Scalability
  • Centralized Monitoring and Control of Multiple Devices and Locations
  • Get Real-time Notification on Exceptions

1.5                                         SIGNIFICANCE OF THE PROJECT

  • This project provides security
  • Power consumption is less
  • Used commonly available components
  • Project is simple and easy
  • This device makes provision for alternative access for the user. For example if the user forgets the RFID card, then the password can be used to have access to the place he wants to enter.

1.6                                         APPLICATIONS OF THE PROJECT

·        This simple circuit can be used at residential places to ensure better safety.

  • It can be used at organizations to ensure authorized access to highly secured places.
  • With a slight modification this Project can be used to control the switching of loads through RFID card or password.
1.7                                                 SCOPE OF THE PROJECT

Main concept behind Radio Frequency Identification (RFID) and password based door access control system is to allow the access to a house only to an authorized persons. RFID card has to be shown in front of the RFID reader, then the access is allowed or denied to the respective person/RFID card or password.

1.8                                          LIMITATIONS OF THE PROJECT

·        It is a low range circuit, i.e. it is not possible to operate the circuit remotely.

  • If there is no power supply and the battery is not charged, it is not possible to open the door.
  • passwords belonging to one individual can be learned by another without the owner’s permission.

1.9                                                  DEFINITION OF TERMS

Secure Area: A designated area in which access into and out of is controlled and can be monitored.

Secure Door: A door in which access through is controlled and can be monitored.

Shielding: Providing electrical isolation for a circuit, component, or wire by enclosing or isolating the circuit, component, or wire with a metal enclosure, plate, or foil that blocks any interfering electrical field.

Short Circuit: An unintentional connection that provides a low resistance path between two points in a circuit or between a point in a circuit and ground. A Short Circuit can drastically affect the operation of a circuit. If excessive current flow results from the Short Circuit, a device may be damaged or ruined.

Spike: A voltage peak of high amplitude and short duration.

Smart Card: An identification card or access control card with a built-in integrated circuit chip. This gives the card microprocessor memory and intelligence to use for storing data. Also Known As – Chip-In-Card.

Suppression: The addition of a device to an electrical circuit that minimizes or prevents transients from affecting the proper operation of that circuit.

Switch: A device used to either connect or interrupt an electronic circuit.

1.10                                      PROJECT WORK ORGANISATION

The various stages involved in the development of this project have been properly put into five chapters to enhance comprehensive and concise reading. In this project thesis, the project is organized sequentially as follows:

Chapter one of this work is on the introduction to a RFID and password based automatic door access control system. In this chapter, the background, significance, objective limitation and problem of a RFID and password based automatic door access control system were discussed.

Chapter two is on literature review of a RFID and password based automatic door access control system. In this chapter, all the literature pertaining to this work was reviewed.

Chapter three is on design methodology. In this chapter all the method involved during the design and construction were discussed.

Chapter four is on testing analysis. All testing that result accurate functionality was analyzed.

Chapter five is on conclusion, recommendation and references.

 

Chapter Two: Literature Review

2.0 INTRODUCTION:

This chapter provides the background and context of the research problems, reviews the existing literature on the Design And Construction Of An RFID And Password Based Automatic Door Access Control System, and acknowledges the contributions of scholars who have previously conducted similar research [REV64720] …

Document Information

    • Format: DOC/PDF
    • Title: Design And Construction Of An RFID And Password Based Automatic Door Access Control System:

YOU MAY LOVE THESE (Recommended)

  • To start a project on Real Time School Bus Tracking System Using (RFID), follow these guidelines: In present time due to increase in number of kidnapping and road accident cases, parent always worry about their children. This paper proposes a SMS based solution to aid parent to track their children location in real time. The proposed system takes the advantage of the location services provide…

    35 Pages 1 - 5 Chapters 4,739 Words DOC/PDF Format Instant Download UPN64232

  • Techniques for writing the “Effect Of Poverty And Access To Health Care” Project

    To develop a project on Effect Of Poverty And Access To Health Care, follow these approaches: People in poor countries tend to have less access to health services than those in better-off countries, and within countries, the poor have less access to health services. This article documents disparities in access to health services in low- and middle-income countries (LMICs), using a framewo…

    47 Pages 1 - 5 Chapters 12,451 Words DOC/PDF Format Instant Download UPN75317

  • To undertake a project on Design And Implementation Of A Two Factor Authentication Login System Using One Time Password (OTP) With SMS, follow these effective ways: The paper examined the design and implementation of a two-factor authentication login system using OTP with SMS. The quest for the application of tighter security measures to web, desktop and mobile applications developed has been a major concern to a lot of people. Faced with the challenges of p…

    70 Pages 1 - 5 Chapters 7,536 Words DOC/PDF Format Instant Download UPN66849

  • To write a project on Design And Implementation Of A Smart Door Lock System Using Finger Print, follow these structure: Authentication plays a very critical role in security-related applications like e-commerce. There are a number of methods and techniques for accomplishing this key process. In this regard, biometrics is gaining increasing attention these days. Security systems, having realized the value of biomet…

    42 Pages 1 - 5 Chapters 5,726 Words DOC/PDF Format Instant Download UPN64799

  • Guide for writing the “Design And Construction Of Automatic Smart Waste Bin” Project

    To carry out a project on Design And Construction Of Automatic Smart Waste Bin, follow these effective methods: The main objective of the project is to design a smart dustbin which will help in keeping our environment clean and also eco friendly. Nowadays technologies are getting smarter day-by-day so, as to clean the environment we are designing a smart dustbin by using Arduino. This smart dustbin managem…

    45 Pages 1 - 5 Chapters 6,761 Words DOC/PDF Format Instant Download UPN85748

  • INTRODUCTION As the growing population of human race widens the gulf between energy supply and energy demand, the imbalance in energy availability sent researchers into excavating for a way of settling this age long squabble. A lasting solution is vested on alternative use of the renewable energy source, a project that is yet to be widely applied. Hence, the continuation of the unsettled yearns for sufficient power. Consequently, the p […]

    51 Pages 1 - 5 Chapters 5,437 Words DOC/PDF Format Instant Download UPN63942

  • To start a project on Design And Construction Of Automatic Fence Light Controller, follow these guidelines: The very fundamental reasons behind this project assignment is to expose student to the very important aspect of private and independent research work not only theories but also subsequent translation of the theoretical research work into a particular function system. The project construction of …

    25 Pages 1 - 5 Chapters 2,587 Words DOC/PDF Format Instant Download UPN63990

  • To develop a project on Design And Construction Of Automatic Change-Over For Three Phases, follow these approaches: The main aim of any electric power supply in the world is to provide uninterrupted power supply at all times to all its consumers. Although in developing countries, the electric power generated to meet the demands of the growing consumers of electricity is insufficient hence instability and outag…

    50 Pages 1 - 5 Chapters 6,521 Words DOC/PDF Format Instant Download UPN64102

  • To undertake a project on Design And Construction Of An Automatic Water Pump Controller With Water Timed Flushing Mechanism, follow these effective ways: This project presents the concept of a control system into an automatic water pump controller. One of the motivations for this project is the need to bring a solution to the problem of water shortage in various places eliminating the major culprit, waste of water during pumping, dispensing into o…

    65 Pages 1 - 5 Chapters 7,929 Words DOC/PDF Format Instant Download UPN66459

  • Steps for writing the “Design And Construction Of An Automatic Water Dispenser” Project

    To write a project on Design And Construction Of An Automatic Water Dispenser, follow these structure: A water dispenser is a system or a machine which is designed and capable of responding to an instruction or request made by the user in other to dispense a particular liquid. This paper developed an automatic liquid dispenser that eliminates manual operation of the dispenser’s pumps. This is achi…

    47 Pages 1 - 5 Chapters 7,542 Words DOC/PDF Format Instant Download UPN65201

Live Chat