0% found this document useful (0 votes)
79 views6 pages

Research Paper

This document describes an RFID door lock system that uses passive RFID tags to activate, verify, and authorize users to open doors for secure access. The system includes an Arduino UNO microcontroller, RFID reader, RFID tags, relay module, and other components. When an authorized RFID tag is detected, the reader sends a signal to unlock the door.

Uploaded by

Vaibhav Aware
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
79 views6 pages

Research Paper

This document describes an RFID door lock system that uses passive RFID tags to activate, verify, and authorize users to open doors for secure access. The system includes an Arduino UNO microcontroller, RFID reader, RFID tags, relay module, and other components. When an authorized RFID tag is detected, the reader sends a signal to unlock the door.

Uploaded by

Vaibhav Aware
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

RFID Door Lock System

RFID Smart Card Door Lock

Authors: Rushikesh Shinde, Vaibhav Aware, Omkar Badakh, Prasad Jadhav, Akash Raval, Prof.V.S.Chavan

Department Of Electrical Engineering SANJIVANI K.B.P.POLYTECNIC, KOPARGOAN

Abstract— RFID, or Radio Frequency Identification, is a low-


A. Arduino UNO
cost technology that may be implemented in a variety of It's 8-bit AVR RISC based microcontroller. It contains 2 KB
purposes such as safety, asset tracking, people tracking, RAM with writing and reading capabilities, 32KB ISP flash
inventory detection, and access control. We tried to develop and
come up with a system for security which is digital and can be memory, 1KB EEPROM, 32 working registers, 23 input–
used in places that can only be accessed by authorized output lines, 6-channel 10-bit A/D converter, three counters
individuals. We installed a security system that included a door which come with compare modes, SPI interface and
locking system that used passive RFID to activate, verify, and programmable USART.
authorize the user and at the same time open the door for secure
access. B. RFID Reader
RFID Readers, which are commonly called Proximity
Keywords: RFID, Arduino, RFID tags, RFID readers, radio Coupling Devices (PCDs), are used to analyze data from
frequency. RFID tags. The reader in these passive tags energizes it by
producing a radio signal, which is then sent and read by the
I. INTRODUCTION reader. The reader converts the received data and sends it to
Electronic door locks are becoming more prevalent among the forwarding system via wired or wireless communication.
businesses as technology progresses. This type of door lock C. RFID Tags
offers a number of benefits over traditional lock and key An integrated proximity circuit card is also known as RFID
entry, including quick and convenient keyless entry. tag which can be either actively powered or powered
This is a contactless technique where digital data is encoded passively. RFID tags, also known as transponders, are made
inside the RFID tags gets recognized spontaneously by the up of an antenna, a microchip, and a battery (for active tag
electromagnetic field present inside the reader. The tag being only). The chip's size which is usually found by the antenna's
the key in this case. size. The tag’s frequency determines the size and shape of the
Many benefits of RFID include that tags that are lighter and antenna. Power source is available on board for Active tags,
cheaper as compared to others, with no requirement for a whereas passive tags are powered inductively by the radio
battery. Management of controlling, transaction, and signal generated by the RFID reader. In the absence of a
operation tasks are all done by a centralized system. This reader, this tag can record sensor readings and even execute
mechanism operates in real time, with the door opening calculations.
instantly as the user places this key onto to the reader.
Wireless data transmission takes place in Radio Frequency
Identification technology. Due to a lack of consistency
among manufacturing organizations in the past, this
technology has not been widely adopted in industry. This is a
technology that is comparably efficient and safe as opposed
to the other available networks. A tag contains a particular
identifier code.
II. SYSTEM ARCHITECTURE
The following components are used for building this project:

 Power Supply Unit


 4 Channel Relay
 RFID tags
 Arduino UNO Microcontroller
 Buzzer
 RFID Reader
Fig. 1. Flow Chart of Design System

III. METHODOLOGY
RFID system constitutes of namely two components, which
are tag and receiver. A high frequency electromagnetic field

1
RFID Door Lock System

produced by a control unit, a module of radio frequency, and


an antenna coil constitute to make up an RFID reader. The without permission after returning their original key. To
tag, on the other hand, is a passive component that consists prevent an unauthorized user from getting access to a facility
just of an electronic microchip and an antenna, so when it or a storage locker, key cards can also be cancelled.
comes into contact with the transceiver's electromagnetic C. Future Scope
field, voltage is generated via induction in the antenna coil,
which functions as power for the microchip. Unlike magnetic stripe locks, which can only be unlocked
A plastic covered smart chip is used by these RFID key cards with a key card, RFID locker locks can be accessed with both
that utilizes a particular frequency to transmit a signal to the a card and a mobile device. Bluetooth Low Energy (BLE)
reader. Generally, the reader is placed on the door, which technology can also be utilized to access the locks because
analyses the information recorded from the card and unlocks RFID uses wireless technology to trigger the lock
the door when it is within a specific distance of the reader. mechanism. As a result, if carrying a key card is
The door can be unlocked after this, which will autonomously inconvenient, you can register your smartphone as the key
lock when closed again. and use it to open RFID locker locks. Many businesses now
use RFID locker locks and RFID Mobile Access Locks to
safeguard the safety and security of their employees and the
company as a whole.
D. Flexibility

Multi-Locker and Multi-User functions are now standard on


most RFID locker locks. Multi-User effectively means that
multiple users can be registered under a single lock, such as
an office building's main entrance door. Multi-Locker, on the
other hand, means that a single user is allocated to multiple
lockers, such as a hotel's master card, which is kept under the
Fig. 2. Circuit Diagram manager's supervision.
V. FUTURE SCOPE
Electronic locks are far more convenient and efficient than
traditional mechanical locks. It can be unlocked easily by a
simple key, which makes it more convenient. A magnetic
card, a barcode, a fingerprint, or an alphanumeric code
entered from the computer can all be used as the detector
unlocking the electronic lock.
You can accomplish a variety of accounting tasks with their
assistance. Electronic locks, in addition to unlocking and
locking doors, can also be used to keep track of working
hours. When an employee uses an RFID tag to unlock a door,
the system receives a door open signal and records the time
the employee arrived and departed the company.

A. Attached RFID Tag Readers

Fig. 3. Working Circuit Diagram of Proposed Design You can accomplish a variety of accounting tasks with their
assistance. Electronic locks, in addition to unlocking and
IV. BENEFITS AND USES
locking doors, can also be used to keep track of working
A. Convenience hours. When an employee uses an RFID tag to unlock a door,
the system receives a door open signal and records the time
RFID locker locks are clear and simple to install because the the employee arrived and departed the company.
tag card is simple to use and carry along as compared to keys.
Key cards for such locks can be easily kept in your wallet. B. Collection of Toll
Physical contact with the lock is not required with RFID key There are active tags in cars and they also have serial
cards. numbers that are unique. This tag can be read so as to create
an account associated with it when it crosses a toll booth to
B. Security locate the serial number in the database and charged.
RFID key cards are significantly more difficult to copy than
C. Tagging people
regular keys, giving you peace of mind when it comes to
If people were to wear an RFID tag, most individuals would
unauthorized users. For example, if a former employee had
not want to be tracked. Certain people, on the other hand, are
an extra key made, they may get access to the building
eager to be followed. Participants in any convocation or

2
RFID Door Lock System

convention, for example, may wear RFID-enabled badges to


indicate their availability for discussion or to submit personal huge, reading it consumes a substantial amount of time and
information. Other categories of individuals are seen to energy.
benefit from monitoring or should be watched out for safety
reasons. Parolees should be watched, as should Alzheimer's B. Time-division multiple access (TDMA)
sufferers, and even babies can benefit from this technology. TDMA is a protocol in which each and every tag is assigned
RFID-enabled baby bracelets are available at some hospitals. a slot where it can receive signals. The tag gets inactive in
other slots. This is a protocol which is very energy efficient,
D. Investigation of motor vehicle accidents however it has a very long latency when there are a lot of
RFID tags can be used as eyewitnesses in road accidents, and tags.
the concept operates as given ahead. An RFID device is
received by each registered vehicle which is connected to the C. Random access protocol
automobile with a pre-programmed unique code that is stored In this case, one amongst all the packets is chosen in the
in databases with the vehicle identification number. Cops queue at random to send, and finally this packet is counted as
may use handheld RFID scanners to capture coded acquired only when the destination tag of the packet is active
information as soon as they arrive at the accident site, and functioning. Tags are active and functioning with a
allowing databases to be explored for particulars such as the chance of p. The method consumes very little energy, but the
vehicle's owner, make, and model. The timing of the fleeing chances of the packet reaching the target tag are small.
motorist can also be identified in hit-and-run accidents. It is
also feasible to get vehicle locations at their first points of D. Pseudorandom protocol
collision. A generator of pseudorandom numbers is utilized by the tags
and specify their active/inactive slots on the basis of different
E. Mobile Commerce seeds that are known. This is done to avoid total schedule
RFID tags and wireless LAN, which is WLAN are required overlap. If the reader knows the seed, they can figure out the
by mobile (m)-commerce applications as they need a dual- tag scheduling.
mode communication architecture. In any given showroom,
products such as camcorders which are digital and E. Research issue of energy efficiency
Televisions that come with inbuilt RFID tags, mobile
computers with PDA-size might be utilized by customers to Under low traffic loads and uniform destination distribution,
browse webpages, assess and compare the performance and the TDMA which is grouped-tag beats the protocol which is
features available, compare price, and make an order over known as dictionary and another protocol called
WLAN. Surveillance security can be increased by adding pseudorandom. Unless the target distribution becomes
RFID tags to these devices. As ecommerce applications grow substantially clustered, in which case the best technique to be
in popularity, RFID technology will become more widely deployed is directory protocol, the pseudorandom protocol
used. outperforms the directory protocol in the case of of energy
savings and time. As a result, building a more energy-
F. Baggage Handling efficient approach remains a research issue worth exploring
Baggage handling and package delivery is a difficult activity further.
that necessitates a big number of people, which is a costly VII. CONCLUSION
resource. Humans do a variety of tasks, including receiving In this study, we used passive RFID to construct a digital
packages, sorting, assembling, and distributing them. The security system that includes a door lock mechanism. When
error rate can be significant due to human participation. the user places the tag in contact with the scanner, the door
While using an RFID tagging technology lowers human locking system activates in real time. One of the most
participation, it also automates the process to a degree, pressing issues of business owners in the modern period is the
allowing for faster package delivery. RFID solutions for safety and security of customers, staff, and the overall firm.
luggage and packaging companies, particularly the airline All business owners deal with lost keys, thievery, and
industry, are more efficient and reduce total system forgotten pins on a daily basis. RFID locker locks are a
complexity. fantastic answer to these issues.
VI. RFID RESEARCH ISSUES REFERENCES
A. Directory protocol [1] Orji EZ, Nduanya UI,”Automatic Access Control System using
In this protocol, k packets are gathered by the reader, which Arduino And RFID”, Journal of Scientific and Engineering Research,
2018, 5(4) :333-340 ISSN:2394-2630
then broadcasts a directory, and then finally transmits the k
[2] Xiao, Y., Yu, S., Wu, K., Ni, Q., Janecek., C., Nordstad, J,” Radio
packets. Monitoring of directory is done by tags determine frequency identification: technologies, applications, and research
whether packets are scheduled, and the regular intervals when issues” Wiley Journal of Wireless Communications and Mobile
they wake up to finally permit the reader to begin a directory Computing, Vol 7, May 2007.
transmission. This is a much more equitable approach as [3] T. Phillips, T. Karygiannis, R. Kuhn, "Security Standards for the RFID
Market
compared to grouped-tag where the distribution of destination [4] Goodrum, P., McLaren, M., Durfee, A.,” The application of active
is significantly clustered. However, if the directory is too radio frequency identification technology for tool tracking on
construction job sites.” Automation in Construction, 15 (3), 2006, pp
292-302.
[5] Gynanendra K Verma, Pawan Tripathi, IIIT Allahabad a paper on “A

3
RFID Door Lock System

digital security system with door lock system using rfid technology”.

4
RFID Door Lock System

[6] V. Subramanian, P. C. Chang, D. Huang, J. B. Lee, S. E. Molesa, D. R.


Redinger, and S. K.Volkman, "All-printed RFID Tags: Materials, [8] M. R. Rieback, B. Crispo, and A. S. Tanenbaum, "The Evolution of
Devices, and Circuit Implications", VLSI Design, 2006 RFID Security"; PervasiveComputing, IEEE Volume 5, Issue 1, Jan.-
[7] S. Shepard, “RFID Radio Frequency Identification”, USA, ISBN: 0-07- Mar. 2006.
144299-5, 2005. [9] P. F. Baude, D. A. Ender, T. W. Kelley, M. A. Haase, D. V. Muyres,
and S. D. Theiss, "Organic Semiconductor RFID Transponders",
Electron Devices Meeting, 2003.

5
RFID Door Lock System

[10]

You might also like