RFID Based Security Access Control System with GSM Technology

Page 1

American Journal of Engineering Research (AJER) 2016 American Journal of Engineering Research (AJER) e-ISSN: 2320-0847 p-ISSN : 2320-0936 Volume-5, Issue-7, pp-236-242 www.ajer.org Research Paper

Open Access

RFID Based Security Access Control System with GSM Technology Peter Adole1*, Joseph M. Môm2 and Gabriel A. Igwue3 1,2,3

Department of Electrical and Electronics Engineering, Federal University of Agriculture, Makurdi, Benue State, Nigeria

ABSTRACT: The security challenges being encountered in many places today require electronic means of controlling access to secured premises in addition to the available security personnel. Various technologies were used in different forms to solve these challenges. The Radio Frequency Identification (RFID) Based Access Control Security system with GSM technology presented in this work helps to prevent unauthorized access to controlled environments (secured premises). This is achieved mainly through the use of a Radio Frequency Identification System with operating frequency of 125 KHz, Microcontroller programmed to send control signals, DC motor, relay, buzzer, Liquid Crystal Display (LCD) and GSM/GPRS Modem.Once the RFID tag which contains the user’s unique information is scan by the RFID reader and confirmed match with the information stored in the microcontroller, the microcontroller is instructed to turn ON the DC motor through L293D driver, display “USER NUMBER and CARD NUMBER” on the LCD and activates the GSM/GPRS modem to send SMS alert “AUTHORIZED, valid RFID card shown, User is allowed to enter, user number” to security personnel. Else, the DC Motor remained OFF, LCD displays “READ RFID CARD NOT VALID”, buzzer turns ON for about 5seconds and GSM/GPRS modem activated to send “ UNAUTHORIZED, invalid RFID card is used to access the security system” to the security personnel. The electronic circuit was implemented, the codes for microcontroller were written in assembly language, debugged and compiled using the KEIL Micro vision 4 integrated development environment. The resultant Hex files were programmed into the memories of the microcontrollers with the aid of a universal programmer. Hardware simulation was carried out using the Proteus Virtual System Modelling (VSM) version 8.0.An importation implication of this paper is that the system is cheaper to maintain and more efficient in comparison with a manually operated type or key lock system. The RFID based access control system can be useful in providing security for homes, organizations, and automobile terminals to increase the level of security. Keywords: Access control, Authorized, RFID, GSM, Microcontroller, Unauthorized

I. INTRODUCTION Security systems play an important role to prevent unknown user entry into a secured place, which may include physical and intellectual property, without being authorized. The security system is basically divided into two types; the use of normal door lock key and the use of electronic automatic identification system. In general, locks are very simple devices that are employed to address a straightforward problem. Basically, lock can be easily hacked by unwanted people thereby allowing unauthorized people into secured premises. There are several automatic identification technologies including barcode, magnetic stripe and Radio Frequency Identification (RFID) applied in security system. Radio-Frequency Identification (RFID) is an emerging technology and one of the most rapidly growing segments of today’s automatic identification data collection industry. RFID technology, offers superior performance over other automatic identification systems. Because it is not an optical technology like bar coding, no inherent line of sight is required between the reader and the tagged RFID object [1]. The system described in this work uses an RFID tag which contains integrated circuit that is used for storing, processing unique information, modulating and demodulating the radio frequency signal being transmitted and a Global System for Mobile Communication (GSM) technology to communicate to security personnel via Short Message Service (SMS) in order to enhance the securityof a conditioned environment[1][2][3][4].

www.ajer.org

Page 236


American Journal Of Engineering Research (AJER)

2016

Radio-frequency identification (RFID) based access control and security system grants access to only authorized persons to secured premises. RFID technology involves the use of a wireless non-contact system that uses radio frequency electromagnetic fields to transfer data from a tag attached to an object. Some tags are passive (require no battery or their own power source) while others are active (use their own local power source) [5]. The system that has been designed in this work is implemented around a microcontroller and it can help to avoid human involvement in checking and keeping of record at the access point of a secured environment. This system ensures accurate access control and record keeping [3].

II. RELATED WORK Several researchers have done considerable amount of work relating to RFID based security Access Control System. An Automatic Gate opening system for vehicles with RFID and campus access control system RFID based were proposed in [5][6]. The systems grant access to authorized persons with valid tags and deny the unauthorized persons with invalid tags but the systemslack ability to intimates security personnel through SMS. In [7], a system with comparative analysis of RFID and wireless Home/Office Automation was proposed. Herethree technologies; RFID, Wireless Sensor Network (WSN) and GSM were used. In this system RFID monitor access, sensor to monitor the temperature, lighting and gas leakage and GSM send SMS to the owner of the house when safety of the home is not guaranteed. The system emphasized more of safety than security of the home or office. An embedded security system using RFID and GSM was presented in [8]. This system uses RFID and GSM technologies to provide security for distribution of petroleum products. The system was made up of control unit and tanker unit that are far from each other but can easily communicate with each other. The tanker unit monitors the fuel level continuously and displayed it on LCD at the front for driver’s convenience. The second is RFID assembly which will read the authentication code of the petrol pump. The amount of fuel poured at a particular petrol pump and petrol pump ID will be sent to central office through GSM techniques. The pitfall here remained that the system does not operates as a stand-alone system but require a network provider for reception of signals and it is not a preventive security measure. In [9], an RFID – based kindergarten Intelligence security system was proposed. It automates the children security supervision and provides integration with current security management system for kindergarten where RFID tags are embedded in children uniforms. However the system could not intimate security personnel when there is threat. An Access Control by RFID and face recognition based on neural network was design and implemented. This system recognizes the face of the person holding the RFID card and denies access if they do not match. A Radial Basis Function Neural Network (RBFNN) was adopted to learn the face of authorized card holders. Also lack the ability to alert the security personnel through SMS in case of an unauthorized holder [10]. In [11], a paper on security system against asset theft by using Radio Frequency Identification Technology was presented. The aim was to invent a security system against motorcycle theft by using FRID technology (Ultra high frequency range; 905 – 925MHz). In case of incorrect information from the tag, the system alarms the security guards for further investigation. It can signal to activate an additional circuit to shut the motorcycle engine off and turn the Closed Circuit Television (CCTV) on for recording as the theft occurs. The system would have been better with SMS to the guards to avoid commotions. The present study aims at the design and implementation of a security access control system that uses a wireless and automatic identification system knows as Radio frequency Identification (RFID) system, Microcontroller as a control unit, GSM/GPRS modem that can send SMS when signalled by the controller, a relay to close and open the system, the Buzzer that form the alarm system and LCD that displays the result of the controller processing.

III.

MATERIAL AND METHOD

3.1 Block Diagram The block diagram of an RFID based security access control system with GSM technology is shown in fig.1.When the reader is powered and the tag (transponder) is brought within the reading range of the reader, the reader then scans the data present in the tag with the help of its antenna (scanning antenna) and compares it with the data present in the microcontroller. When the data matches with that in the Microcontroller, the DC motor will be turned ON which is operated by a driver being driven from the output of the microcontroller. The microcontroller is programmed to displaymessages on the LCD if the tag with valid or invalid information is brought close to the reader. In both cases, the GSM/GPRS modem is activated to send SMS alert to the security personnel. The GSM/GPRS modem is RS-232 logic level compatible, it requires a line converter called MAX 232 in between it and the microcontroller to convert Transistor-Transistor Logic (TTL) into RS-232 logic and

www.ajer.org

Page 237


American Journal Of Engineering Research (AJER)

2016

vice versa. The presence of any unauthorized user also activates the buzzer and a relay with its driver to close and open the sub circuits operating at different voltages. Also a crystal (12MHz) to give the required clocked pulses to the microcontroller. RFID READER

RFID TAG

LCD

MICROCONTROLLER

CRYSTAL

BUZZER

(AT89S51)

MOTOR DRIVER

DC MOTOR

BUZZER DRIVER

GSM MODEM

MAX 232 RELAY DRIVER

RELAY

Fig 1: Block diagram of an RFID based security access control system with GSM technology. The block diagram was developed into the schematic diagram shown in Fig. 2. This circuit diagram was used to simulate the hardware components of the system in Proteus Virtual System Modeling Environment version 8.0.

U4

U5

7805

D2

D4

1N4007

1N4007

VO

3

+5V

1

VI

C6

VO

3

+12V

GND

1N4007

7812

VI

GND

1N4007

1

2

L 1 2 N STEP-DOWN TRANSFORMER

D3

2

J2

D1

C8

C7

1000u

100u

100u

LCD1 LM016L

CRYSTAL 18

C10

C1

P0.0/AD0 P0.1/AD1 P0.2/AD2 P0.3/AD3 P0.4/AD4 P0.5/AD5 P0.6/AD6 P0.7/AD7

XTAL2

100u 22PF 9

RST

BUZ2 R3

29 30 31

10k BUZZER

Q2 R1

1 2 3 4 5 6 7 8

R2

1K

1K

BC547

RL1

J1

P2.0/A8 P2.1/A9 P2.2/A10 P2.3/A11 P2.4/A12 P2.5/A13 P2.6/A14 P2.7/A15

PSEN ALE EA

P1.0 P1.1 P1.2 P1.3 P1.4 P1.5 P1.6 P1.7

P3.0/RXD P3.1/TXD P3.2/INT0 P3.3/INT1 P3.4/T0 P3.5/T1 P3.6/WR P3.7/RD

AT89S51 1 2 16

1N4007

Q1 OJ-SH-112DM

2 7 1

9 10 15 BC547

IN1 IN2 EN1

EN2 IN3 IN4

VSS

VS OUT1 OUT2

U2

Vcc

21 22 23 24 25 26 27 28

GND TX

RX

10 11 12 13 14 15 16 17

C2 1

11 12 10 9

1u

GND

GSM/GPRS MODEM

11 14

U3

3

C1+

C1-

T1IN R1OUT T2IN R2OUT

T1OUT R1IN T2OUT R2IN VS+ VS-

C2+

OUT3 GND OUT4

D0 D1 D2 D3 D4 D5 D6 D7

1k

3 6

+88.8

D5

DOOR LOCK

8

39 38 37 36 35 34 33 32

7 8 9 10 11 12 13 14

VSS VDD VEE

XTAL1

4 5 6

X1

1 2 3

U1 19

22PF

RS RW E

RV1 C9

4

Vcc 14 13 7 8

RXD TXD GND

2 6

C2-

C3 1u

5

RFID READER MAX232

C4

C5

1u

1u

L293D

DC MOTOR

Fig. 2: Schematic diagram of an RFID based security access control system with GSM technology 3.2 Software Development The AT89S51 microcontroller needs to be programmed first before it can be used in the electronic hardware. An assembly programming language is chosen to program the microcontroller. Correct and functional codes ensure the microcontroller works properly. The functionality of the code is verified using Keil micro vision 4, Proteus Virtual System Modelling (VSM) version 8.0 was used for the simulation and Flash Magic software was used for burning of the code into the microcontroller. After compiler operation, the hex code is generated and stored in the computer. The hex code of the program is burnt into the AT89S51 by using Flash magic software. The software design started with the flow chart shown in Fig.3

www.ajer.org

Page 238


American Journal Of Engineering Research (AJER)

2016

START

Initializing ports and devices

Individual RFID tag sends its code

RFID Reader decrypts the message

YES Matches the database? NO

Relay turns ON

Relay turns off Motor Driver ON

Motor driver off

Buzzer ON for 5 seconds

SMS sends

SMS sends

Access Granted

Access Denied

Fig.3: Flowchart of design of RFID Based Security Access Control System with GSM Technology.

IV. RESULT AND DISCUSSION The simulation test of this work was done using Proteus 8.0 to ensure effectiveness of the design; here the various components in the design were connected to each other in Proteus 8.0 environment beginning with the power supply unit as shown in the circuit diagram of the system. This is to ascertain the workability of each stage before the construction is transferred to the print circuit board (PCB). The RFID card was represented with an interactive single pole single throw (SPST) switch through which the microcontroller receives the signal. The program hex file was loaded and the following results were obtained when running the simulation. LCD1 LM016L

R4 10K

18

C10

X1 CRYSTAL

P0.0/AD0 P0.1/AD1 P0.2/AD2 P0.3/AD3 P0.4/AD4 P0.5/AD5 P0.6/AD6 P0.7/AD7

XTAL2

Q2

9

22pf

R3

29 30 31

10k

BC547

RST

P2.0/A8 P2.1/A9 P2.2/A10 P2.3/A11 P2.4/A12 P2.5/A13 P2.6/A14 P2.7/A15

PSEN ALE EA

RL1 1 2 3 4 5 6 7 8

R1 D5

R2

1K

1N4007

1K

Q1 OJ-SH-112DM

P1.0 P1.1 P1.2 P1.3 P1.4 P1.5 P1.6 P1.7

P3.0/RXD P3.1/TXD P3.2/INT0 P3.3/INT1 P3.4/T0 P3.5/T1 P3.6/WR P3.7/RD

AT89S51

B1

16

12V 2 7 1

9 10 15

IN1 IN2 EN1

EN2 IN3 IN4

VSS

8 VS OUT1 OUT2

21 22 23 24 25 26 27 28

Vcc GND TX

RX 10 11 12 13 14 15 16 17

C2 1

1u

OUT3 GND OUT4

GSM/GPRS MODEM

C1+

C1T1OUT R1IN T2OUT R2IN VS+ VS-

3 6

11 14

U3

3

T1IN R1OUT T2IN R2OUT

C2+

GND

D0 D1 D2 D3 D4 D5 D6 D7

1k

11 12 10 9

U2

0.00

BC547

39 38 37 36 35 34 33 32

1 2 3

XTAL1

100u

BUZZER

VSS VDD VEE

U1 19

22pf

C1

7 8 9 10 11 12 13 14

C9 BUZ2

RS RW E

RV1

SW-SPST

4 5 6

SW1

4

Vcc 14 13 7 8

RXD TXD GND

2 6

C2-

C3 1u

5

RFID READER MAX232

C4

C5

1u

1u

L293D

DC MOTOR

Fig.4:The result of the simulation when switched on

www.ajer.org

Page 239


American Journal Of Engineering Research (AJER)

2016

Fig.4 displays the name of the system on the liquid Crystal Display (LCD) when powered ON immediately. LCD1 LM016L

R4 10K

SW1

RV1

P0.0/AD0 P0.1/AD1 P0.2/AD2 P0.3/AD3 P0.4/AD4 P0.5/AD5 P0.6/AD6 P0.7/AD7

XTAL2

X1 CRYSTAL

BUZZER

Q2

9

22pf

R3

29 30 31

10k

BC547

RST

P2.0/A8 P2.1/A9 P2.2/A10 P2.3/A11 P2.4/A12 P2.5/A13 P2.6/A14 P2.7/A15

PSEN ALE EA

RL1 1 2 3 4 5 6 7 8

R1 R2

1K

D5 1N4007

1K

Q1 OJ-SH-112DM

P1.0 P1.1 P1.2 P1.3 P1.4 P1.5 P1.6 P1.7

P3.0/RXD P3.1/TXD P3.2/INT0 P3.3/INT1 P3.4/T0 P3.5/T1 P3.6/WR P3.7/RD

B1

16

12V

21 22 23 24 25 26 27 28

Vcc GND TX

RX 10 11 12 13 14 15 16 17

C2 1

IN1 IN2 EN1

9 10 15

EN2 IN3 IN4

VSS

11 12 10 9

U2

8 VS OUT1 OUT2

GSM/GPRS MODEM

1u

OUT3 GND OUT4

Vcc

C1T1OUT R1IN T2OUT R2IN

14 13 7 8

11 14

4

RXD TXD GND

2 6

VS+ VS-

3 6 C2+

GND

U3

3

C1+ T1IN R1OUT T2IN R2OUT

0.00

2 7 1

D0 D1 D2 D3 D4 D5 D6 D7

1k

AT89S51

BC547

RS RW E

39 38 37 36 35 34 33 32

1 2 3

XTAL1

18

C10

100u

VSS VDD VEE

U1 19

22pf

C1

4 5 6

C9 BUZ2

7 8 9 10 11 12 13 14

SW-SPST

C2-

C3

5

RFID READER MAX232

1u

C4

C5

1u

1u

L293D

DC MOTOR

Fig.5: Result of simulation initializing the GSM modem Fig.5 shows the process of preparing (initializing) the GSM modem to send SMS in text mode using the stored command; AT+CMGF=1 saved in the microcontroller. LCD1 LM016L

R4 10K

SW1

18

C10

X1 CRYSTAL

Q2

9

22pf

R3

29 30 31

10k

BC547

RST

PSEN ALE EA

1 2 3 4 5 6 7 8

R2

1K

D5 1N4007

1K

Q1 OJ-SH-112DM

P1.0 P1.1 P1.2 P1.3 P1.4 P1.5 P1.6 P1.7

16 2 7 1

IN1 IN2 EN1

9 10 15

EN2 IN3 IN4

VSS

C2 1

11 12 10 9

1u

Vcc

C1+

C1T1OUT R1IN T2OUT R2IN

14 13 7 8

4

RXD TXD GND

2 6

VS+ VS-

11 14

OUT3 GND OUT4

U3

3

T1IN R1OUT T2IN R2OUT

C2+

GND

GSM/GPRS MODEM

3 6

VS OUT1 OUT2

D0 D1 D2 D3 D4 D5 D6 D7

TX

RX

P3.0/RXD P3.1/TXD P3.2/INT0 P3.3/INT1 P3.4/T0 P3.5/T1 P3.6/WR P3.7/RD

U2

8

GND

0.00

12V

Vcc

10 11 12 13 14 15 16 17

AT89S51

B1

BC547

1k

21 22 23 24 25 26 27 28

P2.0/A8 P2.1/A9 P2.2/A10 P2.3/A11 P2.4/A12 P2.5/A13 P2.6/A14 P2.7/A15

RL1 R1

39 38 37 36 35 34 33 32

P0.0/AD0 P0.1/AD1 P0.2/AD2 P0.3/AD3 P0.4/AD4 P0.5/AD5 P0.6/AD6 P0.7/AD7

XTAL2

1 2 3

XTAL1

100u

BUZZER

VSS VDD VEE

U1 19

22pf

C1

7 8 9 10 11 12 13 14

C9 BUZ2

4 5 6

SW-SPST

RS RW E

RV1

C2-

C3

RFID READER

5

MAX232

1u

C4

C5

1u

1u

L293D

DC MOTOR

Fig.6: The result simulation showing that an SMS was sent to Security personnel Fig.6 displays the feedback message that the power on SMS was successfully sent to the security personnel whose numbers were programmed into the microcontroller.

LCD1 LM016L

R4 10K

18

C10

X1 CRYSTAL

XTAL1

P0.0/AD0 P0.1/AD1 P0.2/AD2 P0.3/AD3 P0.4/AD4 P0.5/AD5 P0.6/AD6 P0.7/AD7

XTAL2

100u

BUZZER

Q2

9

22pf

R3

29 30 31

10k

BC547

RST

P2.0/A8 P2.1/A9 P2.2/A10 P2.3/A11 P2.4/A12 P2.5/A13 P2.6/A14 P2.7/A15

PSEN ALE EA

RL1 1 2 3 4 5 6 7 8

R1 D5

R2

1K

1N4007

1K

Q1 OJ-SH-112DM

P1.0 P1.1 P1.2 P1.3 P1.4 P1.5 P1.6 P1.7

P3.0/RXD P3.1/TXD P3.2/INT0 P3.3/INT1 P3.4/T0 P3.5/T1 P3.6/WR P3.7/RD

AT89S51

B1

16

12V 2 7 1

9 10 15

IN1 IN2 EN1

EN2 IN3 IN4

VSS

8 VS OUT1 OUT2

U2

21 22 23 24 25 26 27 28

Vcc GND TX

RX 10 11 12 13 14 15 16 17

C2 1

1u

OUT3 GND OUT4

GSM/GPRS MODEM

C1-

T1IN R1OUT T2IN R2OUT

T1OUT R1IN T2OUT R2IN VS+ VS-

3 6

11 14

U3

3

C1+

C2+

GND

D0 D1 D2 D3 D4 D5 D6 D7

1k

11 12 10 9

+176

BC547

7 8 9 10 11 12 13 14

22pf

C1

1 2 3

BUZ2

39 38 37 36 35 34 33 32

VSS VDD VEE

U1 19

RS RW E

RV1

SW-SPST

C9

4 5 6

SW1

4

Vcc 14 13 7 8

RXD TXD GND

2 6

C2-

C3 1u

5

RFID READER MAX232

C4

C5

1u

1u

L293D

DC MOTOR

Fig.7: Result of simulation showing the use of valid card by closing the switch

www.ajer.org

Page 240


American Journal Of Engineering Research (AJER)

2016

Fig.7 shows the user number (in this case User 1) and the unique identification number of the valid RFID card used. The RFID card which cannot be located in the simulation software (Proteus) was represented with an interactive single pole single throw (SPST) switch. Also, the DC motor turns changing its former position to show that access has been granted. The single sided Printed circuit Board layout of the simulated circuit diagram was made using the same Proteus 8.0 virtual software, etched, drilled and components were soldered after tracks continuity test using Digital Multimeter (DMM) as shown in fig.8. The Printed Circuit Boards play a vital role here in determining the overall performance of electronic equipment. It ensures that the noise introduced as a result of component placement and track layout is held within limits. It also provides components years of assembly maintenance and performance reliability.

Fig.8: RFID Based security access control system with GSM technology on a single sided PCB The output of the motor driver L293D was disconnected and connected to the input terminal of the oscilloscope in Electronic Laboratory of University of Agriculture, Makurdi and straight-line waveform as shown in fig.9 was obtain showing the presence of direct current signal.

Fig.9: The resultant waveform from the test of constructed work with an oscilloscope

V. CONCLUSION The knowledge and application of new techniques in electronics and telecommunication has made our life more secured and comfortable. RFID based security system is one of such applications. RFID security access control system with GSM technology presented in this work is based on microcontroller; hence the hardware requirement is greatly reduced. An RFID based security access control system with GSM technology has been implemented and function as desired. The system can be installed at the entrance of a secured environment to prevent an unauthorized individual access.

ACKNOWLEDGEMENT The authors would like to thank the anonymous reviewers for their careful reading of this paper and for their helpful comments to improve the paper

REFERENCES [1] [2]

Ramalatha, M., Ramkumar, A. K., Selvaraj, S. and Suriyakanth, S. (2014) RFID Based Personal Medical Data card for Toll Automation. Elysium Journal Engineering Research and Management. Volume1, ISSN:2347-4408, pp 51-52 Karithik, K. (2014) advanced College Surveillance. International Journal of Scientific and Research publications. Volume 4 (Issue 6), ISSN 2256 -3153, pp 2.

www.ajer.org

Page 241


American Journal Of Engineering Research (AJER) [3]

[4] [5] [6] [7] [8] [9] [10] [11]

2016

Sivasankaram, V. Muruganand,S., Azha, P. (2013) advanced Embedded System assisted GSM and RFID Based Smart School Management System. International journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering. Vol.2 (Issue 7), ISSN (online), pp 2278-8875. Xiaolong, L. (2009) Design and Implementation of a Digital parking lot Management System. Technology interface Journal Harri, N. (2011) The Study of Business Opportunities and Value add of NFC application in Security Access Control Solution. Master thesis, Department of Business administration, Kemi-Tornio, pp 17-19. Fang, Z., Dagu, H., Zheng, D. and Viping, H. (2008) Design and Implementation of an automatic Clearance Control System based on RFID. IEEE 7th world congress intelligent control and automation (WCICA). Pp 6621 -6626 Santhosh, S. and Sanihosh K. K. (2013) Campus Access Control System RFID Based. International Journal of Electronics and Computer Science Engineering. Volume 1, Number 3, ISSN: 2277-1956, pp 1439 1445. Kulkarni, A. M. and Tawaresachin, S. (2013) Embedded Security System using RFID and GSM. International Journal of Computer Technology and Electronics Engineering (IJCTEE).Volume 2 (Issue 1), ISSN: 2249-6343, pp164-168 Zhiyuan, F. (2012) A RFID – based Kindergarten Intelligence Security System. IEEE Ninth International conference eBusiness Engineering (ICEBE). Volume 3, pp 321-326 Meng, X. L et al (2010) RFID-Based Security Authentication System based on a novel Face Recognition. Structure in proc. WASE international Conference on Information Engineering, pp 97-100. Jinaporn, N., Wisadsud, S., Nakonrat, P. and Suriya, A. (2008) Security System against Asset Theft by using RFID Technology. IEEE 5th international conference Electrical/Electronic, Computer Telecommunication and information (ECTICON).Volume 2, pp 761 -764.

www.ajer.org

Page 242


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.