14

RFID Based Access Control And Proximity Security System

  • Upload
    -

  • View
    31

  • Download
    1

Embed Size (px)

Citation preview

Page 1: RFID Based Access Control And Proximity Security System
Page 2: RFID Based Access Control And Proximity Security System

RFID BASED ACCESS CONTROL AND PROXIMITY

SECURITY SYSTEM

Group Members:

Hafiz Abdul Hannan

(BEE-FA11-058)

Muhammad Hammad Malik

(BEE-FA11-055)

Faiz Ur Rehman Toor

(BEE-FA11-099)

Supervisor:

Engr M Ishfaq Ahmad

Page 3: RFID Based Access Control And Proximity Security System

ABSTRACT

The present system is designed for the growing needs ofsecurity in the educational institutes and otherorganizations threatened off and on by the criminalorganization.

In the background of terrorist attack on educational andother governments or non government organizations,we sought to evolve such a security system as couldensure not only fool proof security at educationalinstitutes and many other organizations of Pakistan butalso easier to apply.

Page 4: RFID Based Access Control And Proximity Security System

INTRODUCTION

Our system uses the radio frequency as a procedureto track the activity of the people entering orleaving the institutions. It ensures maximal checkon the movement of the suspected. It is a relativelya new technology which is flawless as it is notreplicable.

Each vehicle or person, in entry, would be given aRF tag to record information during the time thevehicle remains in the territory of the institution.The system comprising a computer and RFIDreader-writer and tags, would maintain all data anddetect all unauthorized entries by giving signalthrough buzzer.

Page 5: RFID Based Access Control And Proximity Security System

OBJECTIVES

The objective of this project is to develop a RFID baseaccess control and proximity security system that is ableto:

1. Enhance security to limited access to restricted areasin the university/organization.

2. Allow access only to authorized people, employees toenter the premises of the department.

3. Uniquely identify the authorized student/employeedata and store students/employee ID and name.

Page 6: RFID Based Access Control And Proximity Security System

APPLICATION

1. The same system could also be used for studentand employee attendance on the campus.Instead of the student/employee identity card,each student/employee would be issued asimilar RFID tag which would be automaticallydetected by the RFID reader and it wouldsubsequently save the administration as wellas faculty of maintaining and keeping therecord.

2. Vehicle identification when ever passing fromany toll plaza.

Page 7: RFID Based Access Control And Proximity Security System

WORKING PRINCIPAL

Page 8: RFID Based Access Control And Proximity Security System

BLOCK DIAGRAM

Page 9: RFID Based Access Control And Proximity Security System

COMPONENTS

Hardware

1. A Reader.

2. Passive RFID Tag.

3. Host Computer.

Software

1. C Programming Language.

Or C++

Page 10: RFID Based Access Control And Proximity Security System

EQUIPMENT

Reader

1. Transmitter.

2. Receiver.

3. Microprocessor.

4. Memory.

5. Controller.

6. Communication Interface.

7. Power.

Passive RFID Tag

1. Microchip.

2. Antenna.

Host Computer

1. Software.

Page 11: RFID Based Access Control And Proximity Security System

WORKING(TAG)

Gen 2 RFID tags are comprised of an antenna and a chip (moreaccurately called an integrated circuit, or IC). The ICs for Gen 2tags contain four types of memory:

Reserved memory(32bit).

EPC memory(96bit).

TID memory(unique ID).

User memory(4K or 8K bytes).

Page 12: RFID Based Access Control And Proximity Security System

RFID RANGES

Page 13: RFID Based Access Control And Proximity Security System

WE HAVE DECIDED TO WORK ON FOLLOWING SCHEDULE.

Gantt Chart

Page 14: RFID Based Access Control And Proximity Security System