American Journal of Engineering Research (AJER) 2016 American Journal of Engineering Research (AJER) e-ISSN: 2320-0847 p-ISSN : 2320-0936 Volume-5, Issue-7, pp-236-242 www.ajer.org Research Paper
Open Access
RFID Based Security Access Control System with GSM Technology Peter Adole1*, Joseph M. Môm2 and Gabriel A. Igwue3 1,2,3
Department of Electrical and Electronics Engineering, Federal University of Agriculture, Makurdi, Benue State, Nigeria
ABSTRACT: The security challenges being encountered in many places today require electronic means of controlling access to secured premises in addition to the available security personnel. Various technologies were used in different forms to solve these challenges. The Radio Frequency Identification (RFID) Based Access Control Security system with GSM technology presented in this work helps to prevent unauthorized access to controlled environments (secured premises). This is achieved mainly through the use of a Radio Frequency Identification System with operating frequency of 125 KHz, Microcontroller programmed to send control signals, DC motor, relay, buzzer, Liquid Crystal Display (LCD) and GSM/GPRS Modem.Once the RFID tag which contains the user’s unique information is scan by the RFID reader and confirmed match with the information stored in the microcontroller, the microcontroller is instructed to turn ON the DC motor through L293D driver, display “USER NUMBER and CARD NUMBER” on the LCD and activates the GSM/GPRS modem to send SMS alert “AUTHORIZED, valid RFID card shown, User is allowed to enter, user number” to security personnel. Else, the DC Motor remained OFF, LCD displays “READ RFID CARD NOT VALID”, buzzer turns ON for about 5seconds and GSM/GPRS modem activated to send “ UNAUTHORIZED, invalid RFID card is used to access the security system” to the security personnel. The electronic circuit was implemented, the codes for microcontroller were written in assembly language, debugged and compiled using the KEIL Micro vision 4 integrated development environment. The resultant Hex files were programmed into the memories of the microcontrollers with the aid of a universal programmer. Hardware simulation was carried out using the Proteus Virtual System Modelling (VSM) version 8.0.An importation implication of this paper is that the system is cheaper to maintain and more efficient in comparison with a manually operated type or key lock system. The RFID based access control system can be useful in providing security for homes, organizations, and automobile terminals to increase the level of security. Keywords: Access control, Authorized, RFID, GSM, Microcontroller, Unauthorized
I. INTRODUCTION Security systems play an important role to prevent unknown user entry into a secured place, which may include physical and intellectual property, without being authorized. The security system is basically divided into two types; the use of normal door lock key and the use of electronic automatic identification system. In general, locks are very simple devices that are employed to address a straightforward problem. Basically, lock can be easily hacked by unwanted people thereby allowing unauthorized people into secured premises. There are several automatic identification technologies including barcode, magnetic stripe and Radio Frequency Identification (RFID) applied in security system. Radio-Frequency Identification (RFID) is an emerging technology and one of the most rapidly growing segments of today’s automatic identification data collection industry. RFID technology, offers superior performance over other automatic identification systems. Because it is not an optical technology like bar coding, no inherent line of sight is required between the reader and the tagged RFID object [1]. The system described in this work uses an RFID tag which contains integrated circuit that is used for storing, processing unique information, modulating and demodulating the radio frequency signal being transmitted and a Global System for Mobile Communication (GSM) technology to communicate to security personnel via Short Message Service (SMS) in order to enhance the securityof a conditioned environment[1][2][3][4].
www.ajer.org
Page 236
American Journal Of Engineering Research (AJER)
2016
Radio-frequency identification (RFID) based access control and security system grants access to only authorized persons to secured premises. RFID technology involves the use of a wireless non-contact system that uses radio frequency electromagnetic fields to transfer data from a tag attached to an object. Some tags are passive (require no battery or their own power source) while others are active (use their own local power source) [5]. The system that has been designed in this work is implemented around a microcontroller and it can help to avoid human involvement in checking and keeping of record at the access point of a secured environment. This system ensures accurate access control and record keeping [3].
II. RELATED WORK Several researchers have done considerable amount of work relating to RFID based security Access Control System. An Automatic Gate opening system for vehicles with RFID and campus access control system RFID based were proposed in [5][6]. The systems grant access to authorized persons with valid tags and deny the unauthorized persons with invalid tags but the systemslack ability to intimates security personnel through SMS. In [7], a system with comparative analysis of RFID and wireless Home/Office Automation was proposed. Herethree technologies; RFID, Wireless Sensor Network (WSN) and GSM were used. In this system RFID monitor access, sensor to monitor the temperature, lighting and gas leakage and GSM send SMS to the owner of the house when safety of the home is not guaranteed. The system emphasized more of safety than security of the home or office. An embedded security system using RFID and GSM was presented in [8]. This system uses RFID and GSM technologies to provide security for distribution of petroleum products. The system was made up of control unit and tanker unit that are far from each other but can easily communicate with each other. The tanker unit monitors the fuel level continuously and displayed it on LCD at the front for driver’s convenience. The second is RFID assembly which will read the authentication code of the petrol pump. The amount of fuel poured at a particular petrol pump and petrol pump ID will be sent to central office through GSM techniques. The pitfall here remained that the system does not operates as a stand-alone system but require a network provider for reception of signals and it is not a preventive security measure. In [9], an RFID – based kindergarten Intelligence security system was proposed. It automates the children security supervision and provides integration with current security management system for kindergarten where RFID tags are embedded in children uniforms. However the system could not intimate security personnel when there is threat. An Access Control by RFID and face recognition based on neural network was design and implemented. This system recognizes the face of the person holding the RFID card and denies access if they do not match. A Radial Basis Function Neural Network (RBFNN) was adopted to learn the face of authorized card holders. Also lack the ability to alert the security personnel through SMS in case of an unauthorized holder [10]. In [11], a paper on security system against asset theft by using Radio Frequency Identification Technology was presented. The aim was to invent a security system against motorcycle theft by using FRID technology (Ultra high frequency range; 905 – 925MHz). In case of incorrect information from the tag, the system alarms the security guards for further investigation. It can signal to activate an additional circuit to shut the motorcycle engine off and turn the Closed Circuit Television (CCTV) on for recording as the theft occurs. The system would have been better with SMS to the guards to avoid commotions. The present study aims at the design and implementation of a security access control system that uses a wireless and automatic identification system knows as Radio frequency Identification (RFID) system, Microcontroller as a control unit, GSM/GPRS modem that can send SMS when signalled by the controller, a relay to close and open the system, the Buzzer that form the alarm system and LCD that displays the result of the controller processing.
III.
MATERIAL AND METHOD
3.1 Block Diagram The block diagram of an RFID based security access control system with GSM technology is shown in fig.1.When the reader is powered and the tag (transponder) is brought within the reading range of the reader, the reader then scans the data present in the tag with the help of its antenna (scanning antenna) and compares it with the data present in the microcontroller. When the data matches with that in the Microcontroller, the DC motor will be turned ON which is operated by a driver being driven from the output of the microcontroller. The microcontroller is programmed to displaymessages on the LCD if the tag with valid or invalid information is brought close to the reader. In both cases, the GSM/GPRS modem is activated to send SMS alert to the security personnel. The GSM/GPRS modem is RS-232 logic level compatible, it requires a line converter called MAX 232 in between it and the microcontroller to convert Transistor-Transistor Logic (TTL) into RS-232 logic and
www.ajer.org
Page 237
American Journal Of Engineering Research (AJER)
2016
vice versa. The presence of any unauthorized user also activates the buzzer and a relay with its driver to close and open the sub circuits operating at different voltages. Also a crystal (12MHz) to give the required clocked pulses to the microcontroller. RFID READER
RFID TAG
LCD
MICROCONTROLLER
CRYSTAL
BUZZER
(AT89S51)
MOTOR DRIVER
DC MOTOR
BUZZER DRIVER
GSM MODEM
MAX 232 RELAY DRIVER
RELAY
Fig 1: Block diagram of an RFID based security access control system with GSM technology. The block diagram was developed into the schematic diagram shown in Fig. 2. This circuit diagram was used to simulate the hardware components of the system in Proteus Virtual System Modeling Environment version 8.0.
U4
U5
7805
D2
D4
1N4007
1N4007
VO
3
+5V
1
VI
C6
VO
3
+12V
GND
1N4007
7812
VI
GND
1N4007
1
2
L 1 2 N STEP-DOWN TRANSFORMER
D3
2
J2
D1
C8
C7
1000u
100u
100u
LCD1 LM016L
CRYSTAL 18
C10
C1
P0.0/AD0 P0.1/AD1 P0.2/AD2 P0.3/AD3 P0.4/AD4 P0.5/AD5 P0.6/AD6 P0.7/AD7
XTAL2
100u 22PF 9
RST
BUZ2 R3
29 30 31
10k BUZZER
Q2 R1
1 2 3 4 5 6 7 8
R2
1K
1K
BC547
RL1
J1
P2.0/A8 P2.1/A9 P2.2/A10 P2.3/A11 P2.4/A12 P2.5/A13 P2.6/A14 P2.7/A15
PSEN ALE EA
P1.0 P1.1 P1.2 P1.3 P1.4 P1.5 P1.6 P1.7
P3.0/RXD P3.1/TXD P3.2/INT0 P3.3/INT1 P3.4/T0 P3.5/T1 P3.6/WR P3.7/RD
AT89S51 1 2 16
1N4007
Q1 OJ-SH-112DM
2 7 1
9 10 15 BC547
IN1 IN2 EN1
EN2 IN3 IN4
VSS
VS OUT1 OUT2
U2
Vcc
21 22 23 24 25 26 27 28
GND TX
RX
10 11 12 13 14 15 16 17
C2 1
11 12 10 9
1u
GND
GSM/GPRS MODEM
11 14
U3
3
C1+
C1-
T1IN R1OUT T2IN R2OUT
T1OUT R1IN T2OUT R2IN VS+ VS-
C2+
OUT3 GND OUT4
D0 D1 D2 D3 D4 D5 D6 D7
1k
3 6
+88.8
D5
DOOR LOCK
8
39 38 37 36 35 34 33 32
7 8 9 10 11 12 13 14
VSS VDD VEE
XTAL1
4 5 6
X1
1 2 3
U1 19
22PF
RS RW E
RV1 C9
4
Vcc 14 13 7 8
RXD TXD GND
2 6
C2-
C3 1u
5
RFID READER MAX232
C4
C5
1u
1u
L293D
DC MOTOR
Fig. 2: Schematic diagram of an RFID based security access control system with GSM technology 3.2 Software Development The AT89S51 microcontroller needs to be programmed first before it can be used in the electronic hardware. An assembly programming language is chosen to program the microcontroller. Correct and functional codes ensure the microcontroller works properly. The functionality of the code is verified using Keil micro vision 4, Proteus Virtual System Modelling (VSM) version 8.0 was used for the simulation and Flash Magic software was used for burning of the code into the microcontroller. After compiler operation, the hex code is generated and stored in the computer. The hex code of the program is burnt into the AT89S51 by using Flash magic software. The software design started with the flow chart shown in Fig.3
www.ajer.org
Page 238
American Journal Of Engineering Research (AJER)
2016
START
Initializing ports and devices
Individual RFID tag sends its code
RFID Reader decrypts the message
YES Matches the database? NO
Relay turns ON
Relay turns off Motor Driver ON
Motor driver off
Buzzer ON for 5 seconds
SMS sends
SMS sends
Access Granted
Access Denied
Fig.3: Flowchart of design of RFID Based Security Access Control System with GSM Technology.
IV. RESULT AND DISCUSSION The simulation test of this work was done using Proteus 8.0 to ensure effectiveness of the design; here the various components in the design were connected to each other in Proteus 8.0 environment beginning with the power supply unit as shown in the circuit diagram of the system. This is to ascertain the workability of each stage before the construction is transferred to the print circuit board (PCB). The RFID card was represented with an interactive single pole single throw (SPST) switch through which the microcontroller receives the signal. The program hex file was loaded and the following results were obtained when running the simulation. LCD1 LM016L
R4 10K
18
C10
X1 CRYSTAL
P0.0/AD0 P0.1/AD1 P0.2/AD2 P0.3/AD3 P0.4/AD4 P0.5/AD5 P0.6/AD6 P0.7/AD7
XTAL2
Q2
9
22pf
R3
29 30 31
10k
BC547
RST
P2.0/A8 P2.1/A9 P2.2/A10 P2.3/A11 P2.4/A12 P2.5/A13 P2.6/A14 P2.7/A15
PSEN ALE EA
RL1 1 2 3 4 5 6 7 8
R1 D5
R2
1K
1N4007
1K
Q1 OJ-SH-112DM
P1.0 P1.1 P1.2 P1.3 P1.4 P1.5 P1.6 P1.7
P3.0/RXD P3.1/TXD P3.2/INT0 P3.3/INT1 P3.4/T0 P3.5/T1 P3.6/WR P3.7/RD
AT89S51
B1
16
12V 2 7 1
9 10 15
IN1 IN2 EN1
EN2 IN3 IN4
VSS
8 VS OUT1 OUT2
21 22 23 24 25 26 27 28
Vcc GND TX
RX 10 11 12 13 14 15 16 17
C2 1
1u
OUT3 GND OUT4
GSM/GPRS MODEM
C1+
C1T1OUT R1IN T2OUT R2IN VS+ VS-
3 6
11 14
U3
3
T1IN R1OUT T2IN R2OUT
C2+
GND
D0 D1 D2 D3 D4 D5 D6 D7
1k
11 12 10 9
U2
0.00
BC547
39 38 37 36 35 34 33 32
1 2 3
XTAL1
100u
BUZZER
VSS VDD VEE
U1 19
22pf
C1
7 8 9 10 11 12 13 14
C9 BUZ2
RS RW E
RV1
SW-SPST
4 5 6
SW1
4
Vcc 14 13 7 8
RXD TXD GND
2 6
C2-
C3 1u
5
RFID READER MAX232
C4
C5
1u
1u
L293D
DC MOTOR
Fig.4:The result of the simulation when switched on
www.ajer.org
Page 239
American Journal Of Engineering Research (AJER)
2016
Fig.4 displays the name of the system on the liquid Crystal Display (LCD) when powered ON immediately. LCD1 LM016L
R4 10K
SW1
RV1
P0.0/AD0 P0.1/AD1 P0.2/AD2 P0.3/AD3 P0.4/AD4 P0.5/AD5 P0.6/AD6 P0.7/AD7
XTAL2
X1 CRYSTAL
BUZZER
Q2
9
22pf
R3
29 30 31
10k
BC547
RST
P2.0/A8 P2.1/A9 P2.2/A10 P2.3/A11 P2.4/A12 P2.5/A13 P2.6/A14 P2.7/A15
PSEN ALE EA
RL1 1 2 3 4 5 6 7 8
R1 R2
1K
D5 1N4007
1K
Q1 OJ-SH-112DM
P1.0 P1.1 P1.2 P1.3 P1.4 P1.5 P1.6 P1.7
P3.0/RXD P3.1/TXD P3.2/INT0 P3.3/INT1 P3.4/T0 P3.5/T1 P3.6/WR P3.7/RD
B1
16
12V
21 22 23 24 25 26 27 28
Vcc GND TX
RX 10 11 12 13 14 15 16 17
C2 1
IN1 IN2 EN1
9 10 15
EN2 IN3 IN4
VSS
11 12 10 9
U2
8 VS OUT1 OUT2
GSM/GPRS MODEM
1u
OUT3 GND OUT4
Vcc
C1T1OUT R1IN T2OUT R2IN
14 13 7 8
11 14
4
RXD TXD GND
2 6
VS+ VS-
3 6 C2+
GND
U3
3
C1+ T1IN R1OUT T2IN R2OUT
0.00
2 7 1
D0 D1 D2 D3 D4 D5 D6 D7
1k
AT89S51
BC547
RS RW E
39 38 37 36 35 34 33 32
1 2 3
XTAL1
18
C10
100u
VSS VDD VEE
U1 19
22pf
C1
4 5 6
C9 BUZ2
7 8 9 10 11 12 13 14
SW-SPST
C2-
C3
5
RFID READER MAX232
1u
C4
C5
1u
1u
L293D
DC MOTOR
Fig.5: Result of simulation initializing the GSM modem Fig.5 shows the process of preparing (initializing) the GSM modem to send SMS in text mode using the stored command; AT+CMGF=1 saved in the microcontroller. LCD1 LM016L
R4 10K
SW1
18
C10
X1 CRYSTAL
Q2
9
22pf
R3
29 30 31
10k
BC547
RST
PSEN ALE EA
1 2 3 4 5 6 7 8
R2
1K
D5 1N4007
1K
Q1 OJ-SH-112DM
P1.0 P1.1 P1.2 P1.3 P1.4 P1.5 P1.6 P1.7
16 2 7 1
IN1 IN2 EN1
9 10 15
EN2 IN3 IN4
VSS
C2 1
11 12 10 9
1u
Vcc
C1+
C1T1OUT R1IN T2OUT R2IN
14 13 7 8
4
RXD TXD GND
2 6
VS+ VS-
11 14
OUT3 GND OUT4
U3
3
T1IN R1OUT T2IN R2OUT
C2+
GND
GSM/GPRS MODEM
3 6
VS OUT1 OUT2
D0 D1 D2 D3 D4 D5 D6 D7
TX
RX
P3.0/RXD P3.1/TXD P3.2/INT0 P3.3/INT1 P3.4/T0 P3.5/T1 P3.6/WR P3.7/RD
U2
8
GND
0.00
12V
Vcc
10 11 12 13 14 15 16 17
AT89S51
B1
BC547
1k
21 22 23 24 25 26 27 28
P2.0/A8 P2.1/A9 P2.2/A10 P2.3/A11 P2.4/A12 P2.5/A13 P2.6/A14 P2.7/A15
RL1 R1
39 38 37 36 35 34 33 32
P0.0/AD0 P0.1/AD1 P0.2/AD2 P0.3/AD3 P0.4/AD4 P0.5/AD5 P0.6/AD6 P0.7/AD7
XTAL2
1 2 3
XTAL1
100u
BUZZER
VSS VDD VEE
U1 19
22pf
C1
7 8 9 10 11 12 13 14
C9 BUZ2
4 5 6
SW-SPST
RS RW E
RV1
C2-
C3
RFID READER
5
MAX232
1u
C4
C5
1u
1u
L293D
DC MOTOR
Fig.6: The result simulation showing that an SMS was sent to Security personnel Fig.6 displays the feedback message that the power on SMS was successfully sent to the security personnel whose numbers were programmed into the microcontroller.
LCD1 LM016L
R4 10K
18
C10
X1 CRYSTAL
XTAL1
P0.0/AD0 P0.1/AD1 P0.2/AD2 P0.3/AD3 P0.4/AD4 P0.5/AD5 P0.6/AD6 P0.7/AD7
XTAL2
100u
BUZZER
Q2
9
22pf
R3
29 30 31
10k
BC547
RST
P2.0/A8 P2.1/A9 P2.2/A10 P2.3/A11 P2.4/A12 P2.5/A13 P2.6/A14 P2.7/A15
PSEN ALE EA
RL1 1 2 3 4 5 6 7 8
R1 D5
R2
1K
1N4007
1K
Q1 OJ-SH-112DM
P1.0 P1.1 P1.2 P1.3 P1.4 P1.5 P1.6 P1.7
P3.0/RXD P3.1/TXD P3.2/INT0 P3.3/INT1 P3.4/T0 P3.5/T1 P3.6/WR P3.7/RD
AT89S51
B1
16
12V 2 7 1
9 10 15
IN1 IN2 EN1
EN2 IN3 IN4
VSS
8 VS OUT1 OUT2
U2
21 22 23 24 25 26 27 28
Vcc GND TX
RX 10 11 12 13 14 15 16 17
C2 1
1u
OUT3 GND OUT4
GSM/GPRS MODEM
C1-
T1IN R1OUT T2IN R2OUT
T1OUT R1IN T2OUT R2IN VS+ VS-
3 6
11 14
U3
3
C1+
C2+
GND
D0 D1 D2 D3 D4 D5 D6 D7
1k
11 12 10 9
+176
BC547
7 8 9 10 11 12 13 14
22pf
C1
1 2 3
BUZ2
39 38 37 36 35 34 33 32
VSS VDD VEE
U1 19
RS RW E
RV1
SW-SPST
C9
4 5 6
SW1
4
Vcc 14 13 7 8
RXD TXD GND
2 6
C2-
C3 1u
5
RFID READER MAX232
C4
C5
1u
1u
L293D
DC MOTOR
Fig.7: Result of simulation showing the use of valid card by closing the switch
www.ajer.org
Page 240
American Journal Of Engineering Research (AJER)
2016
Fig.7 shows the user number (in this case User 1) and the unique identification number of the valid RFID card used. The RFID card which cannot be located in the simulation software (Proteus) was represented with an interactive single pole single throw (SPST) switch. Also, the DC motor turns changing its former position to show that access has been granted. The single sided Printed circuit Board layout of the simulated circuit diagram was made using the same Proteus 8.0 virtual software, etched, drilled and components were soldered after tracks continuity test using Digital Multimeter (DMM) as shown in fig.8. The Printed Circuit Boards play a vital role here in determining the overall performance of electronic equipment. It ensures that the noise introduced as a result of component placement and track layout is held within limits. It also provides components years of assembly maintenance and performance reliability.
Fig.8: RFID Based security access control system with GSM technology on a single sided PCB The output of the motor driver L293D was disconnected and connected to the input terminal of the oscilloscope in Electronic Laboratory of University of Agriculture, Makurdi and straight-line waveform as shown in fig.9 was obtain showing the presence of direct current signal.
Fig.9: The resultant waveform from the test of constructed work with an oscilloscope
V. CONCLUSION The knowledge and application of new techniques in electronics and telecommunication has made our life more secured and comfortable. RFID based security system is one of such applications. RFID security access control system with GSM technology presented in this work is based on microcontroller; hence the hardware requirement is greatly reduced. An RFID based security access control system with GSM technology has been implemented and function as desired. The system can be installed at the entrance of a secured environment to prevent an unauthorized individual access.
ACKNOWLEDGEMENT The authors would like to thank the anonymous reviewers for their careful reading of this paper and for their helpful comments to improve the paper
REFERENCES [1] [2]
Ramalatha, M., Ramkumar, A. K., Selvaraj, S. and Suriyakanth, S. (2014) RFID Based Personal Medical Data card for Toll Automation. Elysium Journal Engineering Research and Management. Volume1, ISSN:2347-4408, pp 51-52 Karithik, K. (2014) advanced College Surveillance. International Journal of Scientific and Research publications. Volume 4 (Issue 6), ISSN 2256 -3153, pp 2.
www.ajer.org
Page 241
American Journal Of Engineering Research (AJER) [3]
[4] [5] [6] [7] [8] [9] [10] [11]
2016
Sivasankaram, V. Muruganand,S., Azha, P. (2013) advanced Embedded System assisted GSM and RFID Based Smart School Management System. International journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering. Vol.2 (Issue 7), ISSN (online), pp 2278-8875. Xiaolong, L. (2009) Design and Implementation of a Digital parking lot Management System. Technology interface Journal Harri, N. (2011) The Study of Business Opportunities and Value add of NFC application in Security Access Control Solution. Master thesis, Department of Business administration, Kemi-Tornio, pp 17-19. Fang, Z., Dagu, H., Zheng, D. and Viping, H. (2008) Design and Implementation of an automatic Clearance Control System based on RFID. IEEE 7th world congress intelligent control and automation (WCICA). Pp 6621 -6626 Santhosh, S. and Sanihosh K. K. (2013) Campus Access Control System RFID Based. International Journal of Electronics and Computer Science Engineering. Volume 1, Number 3, ISSN: 2277-1956, pp 1439 1445. Kulkarni, A. M. and Tawaresachin, S. (2013) Embedded Security System using RFID and GSM. International Journal of Computer Technology and Electronics Engineering (IJCTEE).Volume 2 (Issue 1), ISSN: 2249-6343, pp164-168 Zhiyuan, F. (2012) A RFID – based Kindergarten Intelligence Security System. IEEE Ninth International conference eBusiness Engineering (ICEBE). Volume 3, pp 321-326 Meng, X. L et al (2010) RFID-Based Security Authentication System based on a novel Face Recognition. Structure in proc. WASE international Conference on Information Engineering, pp 97-100. Jinaporn, N., Wisadsud, S., Nakonrat, P. and Suriya, A. (2008) Security System against Asset Theft by using RFID Technology. IEEE 5th international conference Electrical/Electronic, Computer Telecommunication and information (ECTICON).Volume 2, pp 761 -764.
www.ajer.org
Page 242