Rfid Based Attendance System: Arun Chanchlani Himanshu Chauhan Ayush Bansal
Rfid Based Attendance System: Arun Chanchlani Himanshu Chauhan Ayush Bansal
SYSTEM
Arun Chanchlani
Himanshu Chauhan
Ayush Bansal
College of Engineering
University of Petroleum & Energy Studies
Dehradun
2014-15
1|Page
RFID BASED ATTENDANCE SYSTEM
A project report submitted in partial fulfilment of the requirements for the Degree of
Bachelor of Technology
(Electronics Engineering)
By
Approved
………………………………..
College of Engineering
University of Petroleum & Energy Studies
Dehradun
2014-15
(If work done externally then bring a certificate from the external
supervisor else this will be signed by the local supervisor).
CERTIFICATE
2|Page
This is to certify that the work contained in this report titled “RFID Based
Attendance System” has been carried out by Arun Chanchlani, Ayush Bansal,
Himanshu Chauhan under my/our supervision and has not been submitted elsewhere
for a degree.
………………………..
………………………..
……………………….
……………………….
……………………….
Date Date
Acknowledgement
3|Page
We take this opportunity as a privilege to thank all individuals without whose support
and guidance we could not have completed our project in this stipulated period of
time.
First and foremost we would like to express our deepest gratitude to our Project
mentor Prof. Vivek Kaundal, Department of Electronics and Instrumentation
Engineering, for his invaluable support, guidance, motivation and encouragement
throughout the period this work was carried out.
We would also like to thank all the Professors and members of the Department of
Electronics and Instrumentation Engineering for their generous help in various
ways for the completion of the project. We also extend our thanks to our fellow
students for their friendly co-operation.
CONTENTS
4|Page
LIST OF TABLES 6
LIST OF FIGURES 6
ABSTRACT 7
1 INTRODUCTION 8
1.1 Aim of the project 9
1.2 Scope of the project 9
2. LITERATURE REVIEW 10
2.1 What is RFID? …………………………………………………………..10
2.2 Technical characteristics of RFID…………………………………………….10
2.3 Architecture & operation of a RFID system…………………………………..11
2.3.1 RFID Tag ……………………………………11
2.3.2 RFID Reader …………………………………….12
2.4 Components Specifications ……………………………………………13
2.4.1 ATmega 16 ………………………………………………..13
2.4.2 Power Supply ……………………………………………………14
2.4.2.1 7805 Voltage Regulator IC ………………………………..14
2.4.2.2 Other Components………………………………………...15
2.4.3 RFID Reader..................................................................................…....15
2.4.4 RFID Tag…….…………………………………………………………17
2.4.5 Seven Segment Display….……………………………………………..18
2.4.6 AVR USB Programmer...………………………………………………19
2.5 Communication……..…………………………………………………………20
3. Development Methodology……………………………………………………...21
3.1 The System Overview ………………………………………………………...21
3.2 Flowchart of System………..………………………………………………….22
3.3 Hardware Implementation….………………………………………………….23
3.4 Software Analysis………..…………………………………………………….24
3.4.1 Simulation……….………………………………………………………24
3.4.2 Data Retrieving Using Terminal Software….…………………………..24
3.4.3 AVR Studios 4………….……………………………………………….24
4. Conclusion 25
References 25
APPENDIX 1 26
List of Table
5|Page
(i) RFID Reader specifications …………………………………………….
16
List of Figures
(i) ATmega 16
(a) IC …………………………………………………….. 13
(b) Pin configuration ……………………………………….. 13
Abstract
6|Page
Radio Frequency Identification (RFID) is a flexible, wireless, automatic identification
technology that transmits about an object or person, using radio waves. It is fast and
reliable means of identifying just about any material object. Primarily the two main
components involved in a RFID system are the Transponder (tags that are attached to
the object) and the Interrogator (RFID reader). Communication between the RFID
reader and tags occurs wirelessly and generally doesn’t require a line of sight between
the devices.
In this project, the RFID module reader typically contains a module (transmitter and
receiver), a control unit and a coupling element (antenna). This module is interfaced
with the micro controller (ATmega 16). When the tag is brought near to the RFID
reader, it reads the data in the tag and displays on the LCD. The detection of valid tag
is indicated by using a seven segment display (common anode).
7|Page
Chapter 1: Introduction
The two major problems faced by organizations are time consuming manual
attendance and wastage of electrical power. Although our university is using the
suitable technology which is free from these type of problems. Our project is on the
same existing RFID technology that our university already supports which is RFID.
Radio Frequency Identification (RFID) is an automatic identification method, relying
on storing and remotely retrieving data using devices called RFID tags or
transponders. So the RFID is a wireless identification. Normally the RFID system
comprises of two main parts are RFID Reader and RFID Tag.
There is a wide research and development in this area trying to take maximum
advantage of this technology, and in coming years many new applications and
research areas will continue to appear. This sudden interest in RFID also brings about
some concerns, mainly the security and privacy of those who work with or use tags in
their everyday life.
In a developing country like ours, lot of latest technology that has been developed
such as RFID, wireless, Bluetooth, robot and so on. Therefore, these technologies can
be adopted to improve our daily routines so take our life more comfortable and easy.
All universities should try adopting these technologies to improve their quality of
student and management. Besides not being left behind in latest development, it will
produce more quality and discipline graduates and they know to use advanced
technology in the future. Attendance taking in universities should be done in more
advanced method with using the latest technology. The attendance system was
developed to help lecturers to manage student attendance in more effective method.
8|Page
1.1 Aim of the project
The aim of this project is:
To systematically analyze the operating mechanism and characteristics
of RFID.
To investigate the existing RFID products that is suitable for the
company requirements.
9|Page
Chapter 2: Literature Review
The background research on the organization and comparative studies of existing
systems has been done to more understand the system requirements before the system
was developed. The review of literature was comprised of every fundamental which
were:
Auto-ID technologies include optical character readers, bar codes and some biometric
technologies, such as retinal scans. These technologies are mainly used to reduce time
and labor needed for manually data entry and to enhance data accuracy. Some auto-ID
technologies, like bar code systems, often require a person to manually scan a label or
tag to capture the data. While bar code tags and bar code systems are much less
expensive than RFID at present, RFID provides many benefits than barcode system,
which is listed below.
Data read and write – RFID reader can read the data to the database without
contact,
and process multiple tags once, and write the logistic processing state into the tag
for
the logistic processing in the next stage.
Anti-pollution – RFID possesses strong anti-pollution nature for water, oil or drugs.
And in the dark or polluted environment, RFID also can read data.
Repetitive use – Because RFID is electric data which can be written repetitively, so
10 | P a g e
the tag can be used repetitively.
Big memory capacity of data – The data capacity will be extended with the
development of the memory scale, and the quality of the material carried by the
goods
is larger, the requirement of the capacity for the volume label also increase, and
RFID
will not be restrained .
System safety – The system stores the data from the central computer to the work
piece which will largely enhance the safety of the system .
2.3.1 RFID tags contain tiny semiconductor chips and miniaturized antennas inside
some form of packaging. They can be uniquely identified by the reader/host pair and,
when applied or fastened to an object or a person, that object or person can be tracked
and identified wirelessly.
Types of RFID tags :
i. Active RFID tags include on-board power source (miniature batteries) that are used
to power the tag, and can transmit signals autonomously.
ii. Passive RFID tags don’t include an on-board power source and have power beamed
to them by the reader.
iii. Battery Assisted Passive (BAP) or Semi-passive RFID tags require an external
11 | P a g e
source to wake up but have significant higher forward link capability providing
greater range.
Smart Tags
i. Read only tags: Information is programmed onto chip during manufacturing, no
overwriting, and information constant, least expensive.
ii. Write Once Read Many (WORM) tags: Information added only once along with
unique identifier but can be read many times.
iii. Read-Write tags: Open to data manipulation by user’s system without restrictions.
It contains a unique identifier but carry an updateable memory for that to be added. It
is expensive also.
2.3.2 RFID Readers are composed of an antenna and an electronic module. The
antenna is used for communicating with RFID tags wirelessly. The reader is also
called the coupler. The coupler can send information in two directions:
12 | P a g e
It can read information from a tag and send it to the PC or microcontroller and send it
to an RFID tag.
13 | P a g e
2.4.2 Power Supply
Figure (ii)
14 | P a g e
2.4.2.2 For the suitable power supply design the following
components are required:
(i) LED’s
(ii) Diodes (1N4007)
(iii) Capacitors (1000µF/35V)
(iv) Resistors (360 ohm)
(v) DC socket pin
(vi) DC adapter (230V ac to 12V DC)
(vii) Push Button switch
(viii) Connecting Wires
(ix) PCB board
(x) DB-9 (Male & Female connector)
(xi) Soldering wire
(xii) Soldering Iron
15 | P a g e
Specifications:
Table (i)
Parameter Value
Input voltage 5 V DC regulated
Output Data speed 9600 BPS
8 bit data/no parity/ 1 stop bit
Output Data Level 5 V TTL level
Detection Range 7 cm. (2 inches) contact less
Valid Tag in Range Indicated by buzzer and LED
Figure (iii)
16 | P a g e
Each transponder tag contains a unique identifier (one of 240, or 1,099,511,627,776
possible combinations) that is read by the RFID Card Reader and transmitted to the
host via a simple serial interface. It means no two tags are same. Each tag has
different value. This value is read by reader.
Figure (iv)
17 | P a g e
A seven segment display is the most basic electronic display device that can display di
gits from 09. They find wide application in devices that display numeric
information like: digital microwave ovens, electronic meters etc.
Every LED is assigned a name from 'a' to 'h' and is identified by its name. Seven
LEDs 'a' to 'g' are used to display the numerals while eighth LED 'h' is used
to display the dot/decimal.
A seven segment is generally available in ten pin packaging.
The seven segment come in two configurations, namely, Common cathode (CC)
and Common anode (CA). In CC configuration, the negative terminals of all
LEDs are connected to the common pins. The common is connected to
ground and a particular LED glows when its corresponding pin is given high.
In CA arrangement, the common pin is given a high logic and the
LED pins are given low to display a number.
18 | P a g e
Figure (vi)
Features
a) Small Size.
b) 6Pin ISP Connector.
c) Indicator LED (Red) for Power.
d) Indicator LED (green) for writing status.
e) Free open source software like Win AVR, AVR Dude compatible.
f) Does not require any power to program the target microcontroller.
g) Clear indication on the PCB indicating position of different pin configuration.
h) Works under many platforms like Linux, Mac OS X and Windows.
j) Low Cost.
k) Programming up to 5Kbyte per second.
2.5 Communication
19 | P a g e
When the RFID Card Reader is active and a valid RFID transponder tag is placed
within range of the activated reader, the unique ID will be transmitted as a 12-byte
printable ASCII string serially to the host in the following format:
Start Unique Unique Unique Unique Unique Unique Unique Unique Unique Uniq Stop Byte
Byte ID ID ID ID ID ID ID ID ID ue ID (0x0D)
(0x0A) Digit 1 Digit 2 Digit 3 Digit 4 Digit 5 Digit 6 Digit 7 Digit 8 Digit 9 Digit
10
The start byte and stop byte are used to easily identify that a correct string has been
received from the reader (they correspond to a line feed and carriage return characters,
respectively). The middle ten bytes are the actual tag's unique ID.
For example, for a tag with a valid ID of 0F0184F07A, the following ASCII data
would be sent 0F0184F07A. Same data in HEX bytes can be interpreted as: 0x0A,
0x30, 0x46, 0x30, 0x31, 0x38, 0x34, 0x46, 0x30, 0x37, 0x41, 0x0D
All communication is 8 data bits, no parity, 1 stop bit, and least significant bit first
(8N1). The baud rate is configured for 9600 bps, a standard communications speed
supported by most any microprocessor or PC, and cannot be changed. The RFID Card
Reader initiates all communication. This allows easy access to the serial data stream
from any programming language that can open a COM port.
20 | P a g e
3.1 The System Overview
Figure (vii)
21 | P a g e
The above diagram shows the basic implementation of the system, if the card is
brought near the RFID reader and if the valid card is detected then status of detection
is displayed on the seven segment display and the attendance is displayed on the
LCD. Also the buzzer sounds when the card is detected.
CARD
Detected
NO ?
YES
YES
Figure (ix)
23 | P a g e
3.4 Software Analysis
3.4.1 Simulation
Start Unique Unique Unique Unique Unique Unique Unique Unique Unique Uniq Stop Byte
Byte ID ID ID ID ID ID ID ID ID ue ID (0x0D)
(0x0A) Digit 1 Digit 2 Digit 3 Digit 4 Digit 5 Digit 6 Digit 7 Digit 8 Digit 9 Digit
10
The 12 byte ASCII string of the tag can be retrieved using terminal software.
24 | P a g e
IDE gives you a seamless and easy-to-use environment to write, build, and debug
your C/C++ and assembler code.
The source code of the system has been feed to microcontroller using this software.
Chapter 4 Conclusion
Figure (x)
References
[1] http://www.rfidjournal.com/article/view/1339/
[2] http://www.aimglobal.org/technologies/RFID/what_is_rfid.asp
[3] T. Frank, H. Brad, M. Anand, B. Hersh, C. Anita, K. John, “RFID Security”,
(2006) ISBN: 1-59749-047-4.
[4] H. Stoehman, Communication by Means of Reflected Power, Proceedings of the
IRE, PP: 1196-1204, October 1948.
[5] P. R. Foste, R. A. Burberry; Antenna problems in RFID systems, IEE Colloquium
On RFID Technology, 1999.
[6] S. Garfinkel and B. Rosenberg, editors. RFID Applications, Security,and Privacy.
Addison-Wesley, 2005.
[7] T. Endo, Y. Sunahara, S. Satoh, and T. Katagi, Resonant frequency and radiation
Efficiency of meander line antennas, Electronics and Communications in Japan, Part
2 (Electronics), vol. 83, pp.52-58, 2000.
26 | P a g e
Appendix 1
Source code
#include<avr/io.h>
#include<util/delay.h>
#include<avr/interrupt.h>
#include"lcd.h"
static char
db1[]={0x0A,0x30,0x38,0x30,0x30,0x43,0x44,0x43,0x37,0x36,0x31,0x3D};
static char
db2[]={0x0A,0x30,0x38,0x30,0x30,0x43,0x44,0x43,0x31,0x45,0x44,0x0D};
static char
db3[]={0x0A,0x30,0x38,0x30,0x30,0x43,0x44,0x45,0x36,0x42,0x38,0x0D};
static char
db4[]={0x0A,0x30,0x38,0x30,0x30,0x43,0x45,0x30,0x44,0x30,0x31,0x0D};
27 | P a g e
char strcmp(const char *str1, const char *str2);
void main()
{
char data;
InitLCD(0);
LCDClear();
USARTInit(77);
LCDClear();
LCDWriteString("Please Show");
LCDWriteStringXY(0,1,"Card");
PORTD=0b00000000;
sei();
while(1)
{
}
}
for(i=0;i<11;i++)
28 | P a g e
data[i]=*(str++);
switch(num)
{
case 1:
{
if(strcmp(data,db1))
return 1;
else return 0;
break;
}
case 2:
{
if(strcmp(data,db2))
return 1;
else return 0;
break;
}
case 3:
{
if(strcmp(data,db3))
return 1;
else return 0;
break;
}
case 4:
{
if(strcmp(data,db4))
29 | P a g e
return 1;
else return 0;
break;
}
}
ISR(USART_RXC_vect)
{
char data,j;
data=USARTReadChar();
USARTWriteChar(data);
LCDGotoXY(0,1);
30 | P a g e
LCDData(data);
if((data==0x0A)&&(packet_start==0))
{
packet_start=1;
i=0;
if(packet_start==1)
{
id[i++]=data;
//LCDData(id[i-1]);
PORTD=0b11111001;
delay(2);
PORTD=0b11111111;
if(i>=11)
{
packet_start=0;
for(j=1;j<5;j++)
{
if(verify(id,j))
{
LCDClear();
LCDWriteString("Thank You No.");
LCDWriteInt(j,1);
delay(2);
LCDClear();
LCDWriteString("Your Attendence");
switch(j)
{
31 | P a g e
case 1:
{
a1++;
LCDWriteIntXY(0,1,a1,3);
break;
}
case 2:
{
a2++;
LCDWriteIntXY(0,1,a2,3);
break;
}
case 3:
{
a3++;
LCDWriteIntXY(0,1,a3,3);
break;
}
case 4:
{
a4++;
LCDWriteIntXY(0,1,a4,3);
break;
}
}
delay(2);
LCDClear();
LCDWriteString("Please Show");
LCDWriteStringXY(0,1,"Card");
}
}
}
32 | P a g e
}
else
{
PORTD=0b11000000;
delay(2);
PORTD=0b11111111;
}
ISR(USART_TXC_vect)
{
cli();
}
33 | P a g e
34 | P a g e