ABSTRACT
The security condition in the
world today has saddened the hearts of many. In recent time, there are frequent
cases of armed robbery, kidnapping and breaking and entry into people's home
and this has led to the loss of properties worth millions if not billions of
Naira. Hence, the needs arose to design and implement a security door that
could restrict the entry of an unauthorised door user. This design architecture
utilises the microcontroller-based control and Radio Frequency Identification
(RFID) technology, with the objective of programming the microcontroller to
monitor the hardware in sliding door. The system consists of a microcontroller
Atmega-32 which was programmed using “Bloodshed Dev C++ 5.9 compiler” to send
signals to the multiplexers when the tag is closer to the RFID reader. The
multiplexers consist of integrated circuit which prompts for a display of the
identity of the card user in the Liquid Crystal Display (LCD). The LCD displays
the status of the card. The result shows that, upon validation of the tag, the
LCD displays a welcome note and access will be granted, otherwise no access,
giving the user two more chances to scan the correct tag, before final denial
of access and alarm to notify the public of an intruder.
CHAPTER ONE
INTRODUCTION
1.1 Background
to the Study
The security condition today
leaves a lot to be desired. The frequent cases of armed robbery, kidnapping and
breaking and entry into people’s home have caused the loss of properties worth
billions of Naira (Ralph, 2014). Some of these incidents occurred in homes or a
protected compound, and the attacks happened despite the security doors that
were made to stop intruders. Individuals are becoming more aware of the dangers
associated with relying on keys or padlocks to provide security to unauthorised
areas of the apartments (Markus, 2000). Criminals can forge keys or make master
keys that could be used to gain access to unauthorised areas (rooms or offices)
and people are currently looking for more effective methods to protect their homes
and building, premises (Mohd, 2008). To eliminate the drawbacks of using the
traditional keys and padlocks, the use of password in doors and gates mechanism
evolved. Unfortunately, users cannot always remember the sort of password,
partly due to fundamental human limitations; hence, most users attempt to write
the password, which can be misplaced or seen by a third party. Other users tend
to choose easy to remember passwords that could be easily guessed. These
shortcomings necessitate the development of a better authentication method.
The Radio Frequency Identification (RFID) technology ensures
no contact link between tag and reader or worried about dirty surroundings that
may oppose other auto identification technologies like bar codes. Radio frequency
identification systems are mostly categorised on the ground frequency ranges.
The often used radio frequency identification kits include low frequency
(30-500 kHz), medium frequency (900 kHz- 1500 MHz) and high frequency (2.4GHz
-2.5GHz). Basically, a radio frequency identification unit is made-up of
antenna (coil), then a transceiver and transponder (RFID tag) electronically
programmed with unique information.
The RFID tag consists of a
small radio frequency transmitter, which sends encoded messages to interrogate
the radio frequency tag, and then the receiver who receives the radio signal
gives output with its identification information. The two commonly used
categories of tags are the passive and the active tags. Nevertheless, the
passive tags are not heavy and less expensive when compared to the active tags.
The tag's information is stored electronically and can be installed in consumer
products and could still be implanted in animals for identification. Few
numbers of tags can be read from distance, meters away and even beyond line of
sight from the reader. Some tags don't use battery, but use the signal energy
sent by the reader as the source of energy.
This study proposes the design
and implementation of a two-factor authentication security system, which
utilises the RFID tag and pin code for authentication. The proposed design when
implemented could overcome the drawbacks of the single secret authentication
approach for securing lives and properties. In addition, the system can provide
better security than other systems due to the application of the radio
frequency identification system design, which include a way of distinguishing
the various tags that may be within the range of the RFID reader.
1.2 Statement
of the Problem
In recent times, the safety of
lives has become an important issue for most if not all the people especially
in the cities, because some persons have tendencies to steal other people’s
properties or can endanger the safety of lives in the homes or offices. So, to
ensure the safety of lives and properties many persons use padlocks or alarm
system. Individuals are becoming more aware of the dangers associated with
relying on keys or padlocks to provide security to unauthorised areas of their
apartments (Markus, 2000). Fraudsters/criminals can forge keys or make master
keys that can be used to break into such rooms or offices (Mohd, 2008). To
eliminate the drawbacks of using the traditional keys and padlocks, different
security systems have been developed (Okundamiya, 2007; Gyanendra,
2010; Kuei-Mei, 2012).
Smart power (2016) applied RFID
control system to an Electro Magnetic Lock system to enhance its security
performance, and the door access control system is another security system, which
allows selective entry of people using the RFID access control card, digital
keypad or remote control. The drawback of this design is that uninterrupted
power is required for its efficiency.
The need for a more effective
method to protect homes and offices has motivated the use of alarm system.
Several types of alarm systems, which utilize different sensors, have been
discussed in the literature (Khaing, 2015). However, the sensor system is not
effective at all times. The reason is that it could sense any types of signals
in the environment and the difference could be analysed, thereby giving false
signal in line with the pre-arranged value. This can be confusing especially
when it has to do with identifying a particular signal (Aruna, 2013).
This study proposes the design
and implementation of a two-factor authentication security system, which
utilises the RFID tag and pin code for authentication. The proposed design when
implemented can overcome the drawbacks of the single secret authentication
approach for securing lives and properties. In addition, the system can provide
better security than other systems due to the application of the Radio
Frequency Identification model design system, which include method of selecting
various tags that may be around the RFID reader by the use of a microcontroller
that could be programmed to enforce compliance.
1.3 Objectives
of the Study
The
overall aim of this study is to design and implement an RFID-based security
system with efficient control system facilities that can secure the entrance to
a house.
The
specific objectives of this study are to:
(a)
design an RFID-based security system
that uses two-factor authentication to provide security control to restricted
areas;
(b)
construct a prototype of the
designed RFID-based security to grant access only to the authorised users based
on the control list provided to the system; and
(c)
implement and evaluate the
performance of the developed prototype system.
1.4 Scope
of the Study
The RFID-based security system
described in this study is limited to the medium frequency range. The system is
designed to operate at 13.56MHz and can be powered from a 12V DC. In addition,
the door lock controlled by a motor that is driven by the Alf Vegards RISC
processor (AVR) Atmega 32 microcontrollers. The system with tag reading speed
between 0.5 ~ 2.0 second and the storage capacity of 1 - 50 RFID tags
information are considered in this study.
1.5 Research
Methods
The
methods proposed to achieve the set objectives in this study are as follows:
(a)
design of a two-factor (RFID tag and
pin code) authentication system based on RFID technology to eliminate the
access of unauthorised personnel into private areas;
(b)
construction of an automated
door/access path using microcontroller design, this involves the application of
automated system that is incorporated into these doors/gates for efficient and
optimum performance. The microcontroller (which is programmable) has series of
instruction that could be fed into it, this helped it to accomplish most
intelligent task like the human brain. These include detection of card,
identification of password, displaying ―access granted, ―access denied and the
opening and the closing of the door using smart card. An electromagnetic relay
was designed to control the opening and closing of the door/gate which can be moved
to and fro by a synchronous motor (DC); and (c) the microcontroller was programmed
using C++ to enforce compliance of the system and the performance of the
developed system was determined experimentally, by comparing the measured
values with standard values.
1.6 Significance
of the study
The recent frequent occurrence
of arm robbery, kidnapping and breaking and entry into people’s home has
created tension in the lives of many people and because of these problems many
people sleep with one eye open, and when these people are away from home, their
mind are not at rest because of personal belongings at home that can be stolen
by an intruder. Therefore, a secure environment is very essential especially to
people with busy lifestyle. Instead of worrying about the security of their
homes, people can now concentrate better on more important things.
Similarly, keeping several keys
for several locks in ones homes/offices can be cumbersome and losing a key will
give the person a hard time to enter the house. Other people finding the key
may also bring fear to the family since that person has the access to the
house. The security door lock does not only discourage would-be burglars in
continuing their act, but it also gives peace of mind to the homeowners and
leaves a worry-free secure home.
1.7 Arrangement
of the Thesis
Chapter 1 of this thesis discusses the background to the
study, statement of the problem, the objectives, overview of research methods
and the significance of the study. Chapter 2 gives a thorough review of
relevant literature applied to the design of security door system and the RFID
technology and their applications. Chapter 3 describes the design methods,
analysis and the experimental set-up of the security door system. Chapter 4
discusses the construction, testing and results while Chapter 5 gives the
conclusion and recommendation of the study.
Appendix
A gives the software programme written using C++. Appendix B contains the Bill of
Engineering Measurement and Evaluation.
================================================================
Item Type: Postgraduate Material | Attribute: 72 pages | Chapters: 1-5
Format: MS Word | Price: N3,000 | Delivery: Within 30Mins.
================================================================
No comments:
Post a Comment