Home Project-material DESIGN AND IMPLEMENTATION OF SECURITY DOOR SYSTEM USING RADIO FREQUENCY SIGNAL

DESIGN AND IMPLEMENTATION OF SECURITY DOOR SYSTEM USING RADIO FREQUENCY SIGNAL

Dept: ELECTRICAL ENGINEERING File: Word(doc) Chapters: 1-5 Views:

Abstract

The security condition in the world today has saddened the hearts of many. In recent time, there are frequent cases of armed robbery, kidnapping and breaking and entry into people’s home and this has led to the loss of properties worth millions if not billions of Naira. Hence, the needs arose to design and implement a security door that could restrict the entry of an unauthorised door user. This design architecture utilises the microcontroller-based control and Radio Frequency Identification (RFID) technology, with the objective of programming the microcontroller to monitor the hardware in sliding door. The system consists of a microcontroller Atmega-32 which was programmed using “Bloodshed Dev C++ 5.9 compiler” to send signals to the multiplexers when the tag is closer to the RFID reader. The multiplexers consist of integrated circuit which prompts for a display of the identity of the card user in the Liquid Crystal Display (LCD). The LCD displays the status of the card. Th
INTRODUCTION

1.1 Background to the Study

The security condition today leaves a lot to be desired. The frequent cases of armed robbery,

kidnapping and breaking and entry into people’s home have caused the loss of properties

worth billions of Naira (Ralph, 2014). Some of these incidents occurred in homes or a

protected compound, and the attacks happened despite the security doors that were made to

stop intruders. Individuals are becoming more aware of the dangers associated with relying on

keys or padlocks to provide security to unauthorised areas of the apartments (Markus, 2000).

Criminals can forge keys or make master keys that could be used to gain access to

unauthorised areas (rooms or offices) and people are currently looking for more effective

methods to protect their homes and building, premises (Mohd, 2008). To eliminate the

drawbacks of using the traditional keys and padlocks, the use of password in doors and gates

mechanism evolved. Unfortunately, users cannot always remember the sort of password,

partly due to fundamental human limitations; hence, most users attempt to write the password,

which can be misplaced or seen by a third party. Other users tend to choose easy to remember

passwords that could be easily guessed. These shortcomings necessitate the development of a

better authentication method.

The Radio Frequency Identification (RFID) technology ensures no contact link between tag

and reader or worried about dirty surroundings that may oppose other auto identification

technologies like bar codes. Radio frequency identification systems are mostly categorised on

the ground frequency ranges. The often used radio frequency identification kits include low

frequency (30-500 kHz), medium frequency (900 kHz- 1500 MHz) and high frequency

(2.4GHz -2.5GHz). Basically, a radio frequency identification unit is made-up of antenna

(coil), then a transceiver and transponder (RFID tag) electronically programmed with unique

information.

2

The RFID tag consists of a small radio frequency transmitter, which sends encoded messages

to interrogate the radio frequency tag, and then the receiver who receives the radio signal

gives output with its identification information. The two commonly used categories of tags are

the passive and the active tags. Nevertheless, the passive tags are not heavy and less expensive

when compared to the active tags. The tag’s information is stored electronically and can be

installed in consumer products and could still be implanted in animals for identification. Few

numbers of tags can be read from distance, meters away and even beyond line of sight from

the reader. Some tags don’t use battery, but use the signal energy sent by the reader as the

source of energy.

This study proposes the design and implementation of a two-factor authentication security

system, which utilises the RFID tag and pin code for authentication. The proposed design

when implemented could overcome the drawbacks of the single secret authentication

approach for securing lives and properties. In addition, the system can provide better security

than other systems due to the application of the radio frequency identification system design,

which include a way of distinguishing the various tags that may be within the range of the

RFID reader.

1.2 Statement of the Problem

In recent times, the safety of lives has become an important issue for most if not all the people

especially in the cities, because some persons have tendencies to steal other people’s

properties or can endanger the safety of lives in the homes or offices. So, to ensure the safety

of lives and properties many persons use padlocks or alarm system. Individuals are becoming

more aware of the dangers associated with relying on keys or padlocks to provide security to

unauthorised areas of their apartments (Markus, 2000). Fraudsters/criminals can forge keys or

make master keys that can be used to break into such rooms or offices (Mohd, 2008). To

eliminate the drawbacks of using the traditional keys and padlocks, different security systems

have been developed (Okundamiya, 2007; Gyanendra, 2010; Kuei-Mei, 2012).

3

Smart power (2016) applied RFID control system to an Electro Magnetic Lock system to

enhance its security performance, and the door access control system is another security

system, which allows selective entry of people using the RFID access control card, digital

keypad or remote control. The drawback of this design is that uninterrupted power is required

for its efficiency.

The need for a more effective method to protect homes and offices has motivated the use of

alarm system. Several types of alarm systems, which utilize different sensors, have been

discussed in the literature (Khaing, 2015). However, the sensor system is not effective at all

times. The reason is that it could sense any types of signals in the environment and the

difference could be analysed, thereby giving false signal in line with the pre-arranged value.

This can be confusing especially when it has to do with identifying a particular signal (Aruna,

2013).

This study proposes the design and implementation of a two-factor authentication security

system, which utilises the RFID tag and pin code for authentication. The proposed design

when implemented can overcome the drawbacks of the single secret authentication approach

for securing lives and properties. In addition, the system can provide better security than other

systems due to the application of the Radio Frequency Identification model design system,

which include method of selecting various tags that may be around the RFID reader by the use

of a microcontroller that could be programmed to enforce compliance.

1.3 Objectives of the Study

The overall aim of this study is to design and implement an RFID-based security system with

efficient control system facilities that can secure the entrance to a house.

The specific objectives of this study are to:

4

(a) design an RFID-based security system that uses two-factor authentication to

provide security control to restricted areas;

(b) construct a prototype of the designed RFID-based security to grant access only to

the authorised users based on the control list provided to the system; and

(c) implement and evaluate the performance of the developed prototype system.

1.4 Scope of the Study

The RFID-based security system described in this study is limited to the medium frequency

range. The system is designed to operate at 13.56MHz and can be powered from a 12V DC. In

addition, the door lock controlled by a motor that is driven by the Alf Vegards RISC processor

(AVR) Atmega 32 microcontrollers. The system with tag reading speed between 0.5 ~ 2.0

second and the storage capacity of 1 – 50 RFID tags information are considered in this study.

1.5 Research Methods

The methods proposed to achieve the set objectives in this study are as follows:

(a) design of a two-factor (RFID tag and pin code) authentication system based on

RFID technology to eliminate the access of unauthorised personnel into private

areas;

(b) construction of an automated door/access path using microcontroller design, this

involves the application of automated system that is incorporated into these

doors/gates for efficient and optimum performance. The microcontroller (which is

programmable) has series of instruction that could be fed into it, this helped it to

accomplish most intelligent task like the human brain. These include detection of

card, identification of password, displaying ?access granted, ?access denied and

the opening and the closing of the door using smart card. An electromagnetic relay

was designed to control the opening and closing of the door/gate which can be

moved to and fro by a synchronous motor (DC); and

5

(c) the microcontroller was programmed using C++ to enforce compliance of the

system and the performance of the developed system was determined

experimentally, by comparing the measured values with standard values.

1.6 Significance of the study

The recent frequent occurrence of arm robbery, kidnapping and breaking and entry into

people’s home has created tension in the lives of many people and because of these problems

many people sleep with one eye open, and when these people are away from home, their mind

are not at rest because of personal belongings at home that can be stolen by an intruder.

Therefore, a secure environment is very essential especially to people with busy lifestyle.

Instead of worrying about the security of their homes, people can now concentrate better on

more important things.

Similarly, keeping several keys for several locks in ones homes/offices can be cumbersome

and losing a key will give the person a hard time to enter the house. Other people finding the

key may also bring fear to the family since that person has the access to the house. The

security door lock does not only discourage would-be burglars in continuing their act, but it

also gives peace of mind to the homeowners and leaves a worry-free secure home.

1.7 Arrangement of the Thesis

Chapter 1 of this thesis discusses the background to the study, statement of the problem, the

objectives, overview of research methods and the significance of the study. Chapter 2 gives a

thorough review of relevant literature applied to the design of security door system and the

RFID technology and their applications. Chapter 3 describes the design methods, analysis and

the experimental set-up of the security door system. Chapter 4 discusses the construction,

testing and results while Chapter 5 gives the conclusion and recommendation of the study.

6

Appendix A gives the software programme written using C++. Appendix B contains the Bill

of Engineering Measurement and Evaluation


Browse by Departments