RFID Based Security and Access Control System
RFID Based Security and Access Control System
net/publication/275685766
CITATIONS READS
50 29,996
5 authors, including:
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
An Extended State Convergence Architecture for Multilateral Teleoperation Systems View project
All content following this page was uploaded by Umar Farooq on 07 October 2016.
communicate to the computer system through main controller. transponder coil. The transponder coil then varies this current
After the information from these modules is processed by the by changing the load on its antenna. This variation is actually
computer, the control commands are issued to the modules for the modulated signal (scheme is known as load modulation)
granting or denying access to the user. which is received by the interrogator coil through mutual
induction between the coils. The interrogator coil decodes
TABLE I: COMPARISON OF ACTIVE & PASSIVE RFID TAGS
this signal and passes to the computer for further processing.
Attribute Active Tags Passive Tags
310
IACSIT International Journal of Engineering and Technology, Vol. 6, No. 4, August 2014
Experimental results have shown that proposed system can non-volatility of ROM. The DS1230 Nonvolatile SRAM is
improve the security of RFID access control. 262,144-bit, fully static, nonvolatile SRAM organized as
32,768 words by 8 bits. Each NV SRAM has a self-contained
lithium energy source and control circuitry which constantly
IV. SYSTEM COMPONENTS monitors VCC for an out-of-tolerance condition. When such a
condition occurs, the lithium energy source is automatically
A. RFID Tag switched on and write protection is unconditionally enabled
IPC80 passive RFID tag operating at a frequency of to prevent data corruption.
125KHz is issued to the user. The tag transmits information to
G. Door Locks
the reader in ASK format [11].
Solenoid operated door locks are used in entrance, exit and
B. RFID Reader mess gates of hostels. A relay is used to energize the solenoid
IP10 proximity card reader with operating frequency of to open the gate.
125KHz and reading distance up to 4 inches is used. The
H. Alarms
reader can be easily installed on metal doors, provides the tag
information serially in RS232 format and is suitable for Two alarms are installed; one at the entrance and other at
indoor as well as outdoor operations [11]. Three such readers the exit gate. These alarms are turned on if an illegal person
are installed for hostel security: hostel entrance gate, hostel tries to enter the hostel premises.
exit gate and mess entrance gate.
C. Camera V. SYSTEM OPERATION
Logitech C500 webcam is used to capture images. The The security and access control system is comprised of two
camera has 1.3 mega pixel sensors and can capture video up phases: registration phase and recognition phase. In the
to 1280x1024 pixels. Two such cameras are installed for registration phase, ten images of the hostel user are captured
hostel security: one at the entrance and other at the exit. No while issuing an RFID tag. These images are used to train a
camera is used for entering in the mess hall to reduce the feed forward neural network with back propagation training
overall complexity. algorithm and the converged weights are stored
D. GSM Modem corresponding to a particular user. The recognition phase
Nokia 12i GSM modem is used to make emergency call to comes when the user wants to enter the hostel. At this point,
the security van. Nokia 12i offers advance GSM connectivity after getting RFID user number, image of the user is captured
and supports EDGE/GPRS and HSCSD with automated GSM and passed to the neural network for recognition. If a match is
connection establishment it is equipped to provide reliable found, access is granted to the user. The user authenticity is
remote connections and offers application level watchdogs, checked at three places: hostel entrance, hostel exit and mess
inbuilt self check mechanisms and a reliable Virtual Machine entrance. The entrance and exit modules use RFID and face
(VM) for JAVATM. Nokia 12i also supports reliable inbuilt recognition for identification while mess module use RFID
internet protocols: TCP/IP for reliable data transfer, UDP/IP with a password to grant permission. These modules
for audio and video streaming and HTTP for accessing web communicate with computer system through a main controller.
pages. The module can also be connected to an external GPS The main controller transmits the modules information to the
device that supports National Marine Electronics Association computer system. The computer system after processing these
(NMEA) standard. The inbuilt NMEA parser can parse the interrupts issues commands to the modules through main
location data from the output that it receives from the GPS controller. The data exchange between the main controller
device. External microcontroller can use AT commands to and computer system is through serial port while parallel port
communicate with Nokia 12i and simple remote I/O data and control lines are used for handshaking purposes. The
applications can easily be controlled via text messages. block diagram of the system is shown in Fig. 2.
311
IACSIT International Journal of and Technology, Vol. 6, No. 4, August 2014
capture and process the user image. The computer system and sends a request to the computer system to capture the user
performs two functions. First, it verifies the user against the image. At the same time, it makes an emergency call through
received RFID number using face recognition algorithm and GSM modem interfaced to entrance controller and turns on
then checks whether the user is a defaulter or not. After alarm signal. On the other hand, if a „yes‟ signal is received,
processing, the computer system generates one of the three the exit controller sends a request to computer system to
messages: „access granted‟ corresponding to registered and capture and process user image. The computer system uses
clear user, „access denied‟ corresponding to a non-registered face recognition algorithm to verify the user. If a match is
user and „user is a defaulter‟ corresponding to a registered and found, computer system asks the exit controller to grant
defaulter user. In case of non-registered user, heavy fine is permission to the user to leave the hostel. After the user has
included in user hostel dues on an account of using the RFID left the hostel, exit controller sends a request to the entrance
tag of other user. The entrance controller receives the controller through main controller to update the user entrance
message from computer system and displays it on 16×4 LCD. status. In case of non-registered user, heavy fine is included in
The details on LCD can be read with the help of scroll keys. If hostel dues of the user for using the card of other person. The
the message „access granted‟ is received by the controller, it exit monitoring controller thus enables the system to allow the
opens the entrance gate by switching the relay. At the same
valid person to leave the hostel. The flow chart describing the
time, entrance status of the user is updated in the non volatile
operation of exit monitoring controller is shown in Fig. 6.
RAM. The entrance monitoring module thus ensures the entry
of registered and clear users in the hostel and also helps in
catching suspicious persons that are not authorized to enter.
The flow chart describing the operation of entrance
monitoring module is shown in Fig. 4.
312
IACSIT International Journal of Engineering and Technology, Vol. 6, No. 4, August 2014
VI. CONCLUSIONS
Fig. 7. Block diagram of mess monitoring controller.
In this paper, design of a security and access control system
D. Computer System and Web Server for use in Punjab University hostels is presented. The system
The information provided by the system modules is uses radio frequency identification with biometrics
maintained in a database inside the computer system. The technology to differentiate between valid and invalid users.
database keeps record of user history including check-in time The system accomplishes the security and access control task
and date, check-out time and date, electricity, gas and mess by processing information from sub-controllers. These
charges, fine (penalty) details, RFID card lost details and controllers include entrance monitoring controller, exit
user‟s visitor record. In addition to this, database also keeps monitoring controller and mess monitoring controller
record of illegal persons trying to enter the hostel premises. A installed at entrance gate, exit gate and mess gate respectively.
screen short of a user form in database is shown in Fig. 9. The These controllers read RFID tag issued to the user and search
313
IACSIT International Journal of Engineering and Technology, Vol. 6, No. 4, August 2014
this tag number in non-volatile RAM. On a successful match, Umar Farooq received his B.Sc. and M.Sc. both in
electrical engineering from University of Engineering
the controllers request the computer terminal to capture the & Technology Lahore in 2004 and 2010 respectively.
user image. The computer system uses neural network trained He is currently with the Department of Electrical
face recognition module to verify the user authenticity and Engineering, University of The Punjab Lahore. His
responds to the controllers by sending them „access granted‟ research interests include the application of intelligent
techniques to problems in control engineering,
or „access denied‟ message. The controllers grant the access robotics and power electronics.
to the user or make emergency call accordingly. This system
is made centralized with the help of a web server. The web
Mahmood ul Hasan received his B.Sc. in electrical
server takes information from computer terminals in hostels engineering from University of Engineering &
and keeps track of a particular user. Although the developed Technology Lahore in 2006. He is the recipient of
system is useful in reducing security threats to the hostels, prestigious silver and bronze medal awards in his pre
engineering and secondary school studies respectively.
there is a room for improvement in the response time of the He is with Department of Electrical Engineering
system. The response time can be improved by using Mirpur University of Science and Technology Azad
dedicated processors instead of computer systems capable of Kashmir and is working towards M.Sc. degree in
processing the images in real time. electrical engineering from University of Engineering
& Technology Lahore. His research interests include electronic
Author‟s formalintelligent control and robotics.
instrumentation,
REFERENCES photo
[1] D. L. Wu, Wing W. Y. NG, D. S. Yeung, and H. L. Ding, “A brief Muhammad Amar received his B.Sc. in electrical
survey on current RFID applications,” in Proc. International engineering from University of The Punjab Lahore in
Conference on Machine Learning and Cybernatics, Baoding, July 2010 and M.Sc. in Electrical Engineering from
12-15, 2009, pp. 2330-2334. University of Engineering & Technology Lahore in
[2] B. Yan and D. Y. Lee, “Design of spot ticket management system 2012. He is currently working towards Ph.D. degree in
based on RFID,” in Proc. International Conference on Networks electrical engineering from Monash University,
Security, Wireless Communications and Trusted Computing, 2009, pp. Australia. His research interests include the
496-499. application of intelligent techniques to problems in
[3] G. Ostojic, S. Stankovski, and M. Lazarevic, “Implementation of RFID control engineering, robotics and machine vision.
technology in parking lot access control system,” in Proc. Annual
RFID Eurasia Conference, 2007, pp. 1-5.
[4] N. Ahmad, S. Butler, and U. Ramachandran, “GuardianAngel: An Athar Hanif holds B.Sc. and M.Sc. degrees in
RFID based indoor guidance and monitoring system,” 2010, pp. electrical engineering from University of Engineering
546-551. & Technology Taxila and University of Engineering &
Technology Lahore respectively. He is currently
[5] K. S. Huang and S. M. Tang, “RFID applications strategy and
working towards the Ph.D. degree in control
deployment in bike renting system,” in Proc. ICACT 2008, pp.
engineering from Muhammad Ali Jinnah University
660-663.
Islamabad. He is with Department of Electrical
[6] S. Lahiri, RFID sourcebook, IBM Press, Westford, Massachusetts, Engineering, The University of Lahore where he is
2006. working as Assistant Professor. His research interests
[7] F. Lourenco and C. Almeida, “RFID based monitoring and access include the robust nonlinear control of hybrid vehicles and power converters.
control system,” in Proc. INFORUM, 2009. Author‟s formal
[8] R. Weinstein, “RFID: A technical overview and its application to the photo Muhammad Usman Asad received his B.Sc. in
enterprise,” IT Professional, vol. 7, no. 3, May-June 2005, pp. 27-33. Electrical Engineering from University of The Punjab
[9] X. L. Meng, Z. W. Song, and X. Y. Li, “RFID-Based security Lahore in 2010. During his stay at electrical
authentication system based on a novel face-recognition structure,” in engineering Department University of The Punjab
Proc. WASE International Conference on Information Engineering, Lahore, he served as President of Society of
2010, pp. 97-100. Engineering Excellence (2009) and contributed in the
[10] D. L. Wu, Wing W. Y. NG, Patrick P. K. Chan, H. L. Ding, B. Z. Jing, research activities of the society. He is the recipient of
and D. S. Yeung, “Access control by RFID and face recognition based Gold Medal award for his paper on Ball Scoring Robot
on neural network,” in Proc. International Conference on Machine in 24th IEEEP International Multi-topic Symposium,
Learning and Cybernatics, July 11-14, 2010, pp. 675-680. 2009 and Silver Medal award for his paper on Neural Controller for Robot
[11] M. A. Mazidi, J. C. Mazidi, and R. D. Mckinaly, The 8051 Navigation in 26th IEEEP International Multi-topic Symposium, 2011. He is
Author‟s formal
Microcontroller and Embedded Systems, Pearson Education, 2006. photo
currently working towards M.Sc. degree in electrical engineering from G.C.
University Lahore. He is with Department of Electrical Engineering, The
University of Lahore where he is a Lecturer. His research interests include
intelligent control of Robotics and Power systems.
314