RFID BASED ACCESS CONTROL AND PROXIMITY SECURITY SYSTEM
PROJECT PRESENTERS
Group Members:
Faiz Ur Rehman Toor (BEE-FA11-099)
Hafiz Abdul Hannan (BEE-FA11-058)
Muhammad Hammad Malik (BEE-FA11-055)
Supervisor:
Engineer Muhammad Ishfaq
Co-Supervisor:
Engineer Qamar Raza
CONTENTS
Abstract
Introduction
Objectives
Applications
Working Principal
Block Diagram
Components
Equipment's
Overview About RF
Gantt Chart
ABSTRACT
The present system is designed for the growingneeds of security in the educational institutes andother organizations threatened off and on by thecriminal organization.
In the background of terrorist attack on educationaland other governments or non governmentorganizations, we sought to evolve such a securitysystem as could ensure not only fool proof securityat educational institutes and many otherorganizations of Pakistan but also easier to apply.
INTRODUCTION
Our system uses the radio frequency as a procedureto track the activity of the people entering orleaving the institutions. It ensures maximal checkon the movement of the suspected. It is a relativelya new technology which is flawless as it is notreplicable.
Each vehicle or person, in entry, would be given aRF tag to record information during the time thevehicle remains in the territory of the institution.The system comprising a computer and RFIDreader-writer and tags, would maintain all data anddetect all unauthorized entries by giving signalthrough buzzer.
OBJECTIVES
The objective of this project is to develop a RFID baseaccess control and proximity security system that is ableto:
1. Enhance security to limited access to restricted areasin the university/organization.
2. Allow access only to authorized people, employees toenter the premises of the department.
3. Uniquely identify the authorized student/employeedata and store students/employee ID and name.
APPLICATION
1. The same system could also be used for studentand employee attendance on the campus.Instead of the student/employee identity card,each student/employee would be issued asimilar RFID tag which would be automaticallydetected by the RFID reader and it wouldsubsequently save the administration as wellas faculty of maintaining and keeping therecord.
2. Vehicle identification when ever passing fromany toll plaza.
WORKING PRINCIPAL
WORKING(TAG)
Gen 2 RFID tags are comprised of an antenna and a chip (moreaccurately called an integrated circuit, or IC). The ICs for Gen 2tags contain four types of memory:
Reserved memory(32bit).
EPC memory(96bit).
TID memory(unique ID).
User memory(4K or 8K bytes).
BLOCK DIAGRAM
COMPONENTS
Hardware
1. A Reader.
2. Passive RFID Tag.
3. Host Computer.
Software
1. C Programming Language.
Or C++
EQUIPMENT
Reader
1. Transmitter.
2. Receiver.
3. Microprocessor.
4. Memory.
5. Controller.
6. Communication Interface.
7. Power.
Passive RFID Tag
1. Microchip.
2. Antenna.
Host Computer
1. Software.
RFID RANGES
We Works on Active Radio Frequency.
WE HAVE DECIDED TO WORK ON FOLLOWING SCHEDULE.
Gantt Chart