DESIGN AND IMPLEMENTATION OF SECURITY DOOR SYSTEM USING RADIO FREQUENCY SIGNAL

ABSTRACT
The security condition in the world today has saddened the hearts of many. In recent time, there are frequent cases of armed robbery, kidnapping and breaking and entry into people's home and this has led to the loss of properties worth millions if not billions of Naira. Hence, the needs arose to design and implement a security door that could restrict the entry of an unauthorised door user. This design architecture utilises the microcontroller-based control and Radio Frequency Identification (RFID) technology, with the objective of programming the microcontroller to monitor the hardware in sliding door. The system consists of a microcontroller Atmega-32 which was programmed using “Bloodshed Dev C++ 5.9 compiler” to send signals to the multiplexers when the tag is closer to the RFID reader. The multiplexers consist of integrated circuit which prompts for a display of the identity of the card user in the Liquid Crystal Display (LCD). The LCD displays the status of the card. The result shows that, upon validation of the tag, the LCD displays a welcome note and access will be granted, otherwise no access, giving the user two more chances to scan the correct tag, before final denial of access and alarm to notify the public of an intruder.

CHAPTER ONE
INTRODUCTION
1.1         Background to the Study
The security condition today leaves a lot to be desired. The frequent cases of armed robbery, kidnapping and breaking and entry into people’s home have caused the loss of properties worth billions of Naira (Ralph, 2014). Some of these incidents occurred in homes or a protected compound, and the attacks happened despite the security doors that were made to stop intruders. Individuals are becoming more aware of the dangers associated with relying on keys or padlocks to provide security to unauthorised areas of the apartments (Markus, 2000). Criminals can forge keys or make master keys that could be used to gain access to unauthorised areas (rooms or offices) and people are currently looking for more effective methods to protect their homes and building, premises (Mohd, 2008). To eliminate the drawbacks of using the traditional keys and padlocks, the use of password in doors and gates mechanism evolved. Unfortunately, users cannot always remember the sort of password, partly due to fundamental human limitations; hence, most users attempt to write the password, which can be misplaced or seen by a third party. Other users tend to choose easy to remember passwords that could be easily guessed. These shortcomings necessitate the development of a better authentication method.


The Radio Frequency Identification (RFID) technology ensures no contact link between tag and reader or worried about dirty surroundings that may oppose other auto identification technologies like bar codes. Radio frequency identification systems are mostly categorised on the ground frequency ranges. The often used radio frequency identification kits include low frequency (30-500 kHz), medium frequency (900 kHz- 1500 MHz) and high frequency (2.4GHz -2.5GHz). Basically, a radio frequency identification unit is made-up of antenna (coil), then a transceiver and transponder (RFID tag) electronically programmed with unique information.
The RFID tag consists of a small radio frequency transmitter, which sends encoded messages to interrogate the radio frequency tag, and then the receiver who receives the radio signal gives output with its identification information. The two commonly used categories of tags are the passive and the active tags. Nevertheless, the passive tags are not heavy and less expensive when compared to the active tags. The tag's information is stored electronically and can be installed in consumer products and could still be implanted in animals for identification. Few numbers of tags can be read from distance, meters away and even beyond line of sight from the reader. Some tags don't use battery, but use the signal energy sent by the reader as the source of energy.

This study proposes the design and implementation of a two-factor authentication security system, which utilises the RFID tag and pin code for authentication. The proposed design when implemented could overcome the drawbacks of the single secret authentication approach for securing lives and properties. In addition, the system can provide better security than other systems due to the application of the radio frequency identification system design, which include a way of distinguishing the various tags that may be within the range of the RFID reader.

1.2         Statement of the Problem
In recent times, the safety of lives has become an important issue for most if not all the people especially in the cities, because some persons have tendencies to steal other people’s properties or can endanger the safety of lives in the homes or offices. So, to ensure the safety of lives and properties many persons use padlocks or alarm system. Individuals are becoming more aware of the dangers associated with relying on keys or padlocks to provide security to unauthorised areas of their apartments (Markus, 2000). Fraudsters/criminals can forge keys or make master keys that can be used to break into such rooms or offices (Mohd, 2008). To eliminate the drawbacks of using the traditional keys and padlocks, different security systems have been developed (Okundamiya, 2007; Gyanendra, 2010; Kuei-Mei, 2012). 
Smart power (2016) applied RFID control system to an Electro Magnetic Lock system to enhance its security performance, and the door access control system is another security system, which allows selective entry of people using the RFID access control card, digital keypad or remote control. The drawback of this design is that uninterrupted power is required for its efficiency.

The need for a more effective method to protect homes and offices has motivated the use of alarm system. Several types of alarm systems, which utilize different sensors, have been discussed in the literature (Khaing, 2015). However, the sensor system is not effective at all times. The reason is that it could sense any types of signals in the environment and the difference could be analysed, thereby giving false signal in line with the pre-arranged value. This can be confusing especially when it has to do with identifying a particular signal (Aruna, 2013).

This study proposes the design and implementation of a two-factor authentication security system, which utilises the RFID tag and pin code for authentication. The proposed design when implemented can overcome the drawbacks of the single secret authentication approach for securing lives and properties. In addition, the system can provide better security than other systems due to the application of the Radio Frequency Identification model design system, which include method of selecting various tags that may be around the RFID reader by the use of a microcontroller that could be programmed to enforce compliance.

1.3         Objectives of the Study
The overall aim of this study is to design and implement an RFID-based security system with efficient control system facilities that can secure the entrance to a house.

The specific objectives of this study are to:

(a)                design an RFID-based security system that uses two-factor authentication to provide security control to restricted areas;
(b)               construct a prototype of the designed RFID-based security to grant access only to the authorised users based on the control list provided to the system; and
(c)                implement and evaluate the performance of the developed prototype system.

1.4         Scope of the Study
The RFID-based security system described in this study is limited to the medium frequency range. The system is designed to operate at 13.56MHz and can be powered from a 12V DC. In addition, the door lock controlled by a motor that is driven by the Alf Vegards RISC processor (AVR) Atmega 32 microcontrollers. The system with tag reading speed between 0.5 ~ 2.0 second and the storage capacity of 1 - 50 RFID tags information are considered in this study.

1.5         Research Methods
The methods proposed to achieve the set objectives in this study are as follows:

(a)                design of a two-factor (RFID tag and pin code) authentication system based on RFID technology to eliminate the access of unauthorised personnel into private areas;
(b)               construction of an automated door/access path using microcontroller design, this involves the application of automated system that is incorporated into these doors/gates for efficient and optimum performance. The microcontroller (which is programmable) has series of instruction that could be fed into it, this helped it to accomplish most intelligent task like the human brain. These include detection of card, identification of password, displaying ―access granted, ―access denied and the opening and the closing of the door using smart card. An electromagnetic relay was designed to control the opening and closing of the door/gate which can be moved to and fro by a synchronous motor (DC); and (c) the microcontroller was programmed using C++ to enforce compliance of the system and the performance of the developed system was determined experimentally, by comparing the measured values with standard values.

1.6         Significance of the study
The recent frequent occurrence of arm robbery, kidnapping and breaking and entry into people’s home has created tension in the lives of many people and because of these problems many people sleep with one eye open, and when these people are away from home, their mind are not at rest because of personal belongings at home that can be stolen by an intruder. Therefore, a secure environment is very essential especially to people with busy lifestyle. Instead of worrying about the security of their homes, people can now concentrate better on more important things.

Similarly, keeping several keys for several locks in ones homes/offices can be cumbersome and losing a key will give the person a hard time to enter the house. Other people finding the key may also bring fear to the family since that person has the access to the house. The security door lock does not only discourage would-be burglars in continuing their act, but it also gives peace of mind to the homeowners and leaves a worry-free secure home.

1.7         Arrangement of the Thesis
Chapter 1 of this thesis discusses the background to the study, statement of the problem, the objectives, overview of research methods and the significance of the study. Chapter 2 gives a thorough review of relevant literature applied to the design of security door system and the RFID technology and their applications. Chapter 3 describes the design methods, analysis and the experimental set-up of the security door system. Chapter 4 discusses the construction, testing and results while Chapter 5 gives the conclusion and recommendation of the study. 
Appendix A gives the software programme written using C++. Appendix B contains the Bill of Engineering Measurement and Evaluation.

For more Electrical Electronics Projects click here
================================================================
Item Type: Project Material  |  Size: 72 pages  |  Chapters: 1-5
Format: MS Word   Delivery: Within 30Mins.
================================================================

Share:

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.

Search for your topic here

See full list of Project Topics under your Department Here!

Featured Post

HOW TO WRITE A RESEARCH HYPOTHESIS

A hypothesis is a description of a pattern in nature or an explanation about some real-world phenomenon that can be tested through observ...

Popular Posts