Access control is the process of verifying a user's claimed identity and giving or denying the access. The proposed project is a secure access control system to control the entry of various items through a door or a passage using RFID technology. At the very simplest level, Radio Frequency Identification (RFID) technologies allow the transmission of a unique serial number wirelessly, using radio waves. The two key parts of the system that are needed to do this are the RFID 'tag' and the 'reader'; attaching an RFID tag to a physical object allows the object to be 'seen' and monitored by existing computer networks. It has got a number of advantages over the current bar-coding system The main applications of RFID technology includes, automated libraries, vehicle toll collection, asset location and tracking etc., which are currently too high to justify widespread deployment across supply chains due to concerns over the potential for infringing the privacy of consumers who purchase RFID-tagged products.
The cost criteria associated with implementation of the RFID system is expected to be overcome by near future itself. The flexibility of our proposed access control system makes itself suitable for various applications.
CHAPTER ONE
1.0 INTRODUCTION
Any system that controls the entrance and exit to those who have been authorized may be called an access control system. The most common methods of access control which all of us are familiar with is the traditional lock and key arrangement. It is fine for small applications but has a number of pitfalls, especially in application where there is a large number of a user or common door.
A properly selected access control system can overcome these problems and can be integrated with other systems to provide a more rounded overall security solution. Microcontroller based access control using RFID is a combination of electrical, electronics, and mechanical technology.
In our project we will like to use 89c51 or 89c52 microcontroller. The purpose of using this microcontroller is because its cheaper and further upgrading is possible without changing the processing of the chip.
1.1 OBJECTIVE OF THE PROJECT
The main objective of this project is to provide security in an organization by allowing only the authorized personnel to access the secure area. The security of any organization is a priority for the authorities.
1.2 SIGNIFICANCE OF THE PROJECT
The project Enhances safety and security.
The project is Portable.
The project is Reliable
The project is Reconfigurable and reusable.
1.3 APPLICATIONS OF THE PROJECT
This simple circuit can be used at residential places to ensure better safety.
- It can be used at organizations to ensure authorized access to highly secured places.
- With a slight modification this Project can be used to control the switching of loads through password.
1.4 SCOPE OF THE PPROJECT
Rfid cards have been advertised as suitable for personal identification tasks, because they are engineered to be tamper resistant. The chip usually implements some cryptographic algorithm. There are, however, several methods for recovering some of the algorithm's internal state. Differential power analysis involves measuring the precise time and electrical current required for certain encryption or decryption operations. This can deduce the on-chip private key used by public key algorithms such as RSA. Some implementations of symmetric ciphers can be vulnerable to timing or power attacks as well. RFID cards can be physically disassembled by using acid, abrasives, or some other technique to obtain unrestricted access to the on-board microprocessor. Although such techniques obviously involve a fairly high risk of permanent damage to the chip, they permit much more detailed information (e.g. photomicrographs of encryption hardware) to be extracted.
1.5 LIMITATION OF THE PROJECT
The major disadvantage of RFID technology is its cost. While the readers and sensors used to read the information are comparable in cost to the components of a typical EM or RF theft detection system.
Another problem of the project is that it can deny everybody access when there is no power supplied to the system.
1.6 FUTURE SCOPE OF THE PROJECT
- Health Services: The card can be used to store information such as administrative, medical, biological, and pharmaceutical records. The card simplifies the administrative process and enables doctors to have access to a more complete and comprehensive healthcare information.
- Education: The card has the function of identifying the student and also acts as an electronic purse and can be used purchase products from stores or tickets to public transportation.
- Transportation: Rechargeable contact-less cards allow ticket-less and cash-less travels. Parking and telecommunications can also be paid using the smart card. This will simplify the passenger boarding process.
- Welfare: Card can be used to identify the holder using a series of personal keys and fingerprint. The card holder then uses the card to access government databases and receive the welfare payment. The security will help eliminate fraud.
1.7 PROJECT WORK ORGANISATION
The various stages involved in the development of this project have been properly put into five chapters to enhance comprehensive and concise reading. In this project thesis, the project is organized sequentially as follows:
Chapter one of this work is on the introduction to a microcontroller based security access control system using rfid. In this chapter, the background, significance, objective limitation and problem of microcontroller based security access control system using rfid were discussed.
Chapter two is on literature review of a microcontroller based security access control system using rfid. In this chapter, all the literature pertaining to this work was reviewed.
Chapter three is on design methodology. In this chapter all the method involved during the design and construction were discussed.
Chapter four is on testing analysis. All testing that result accurate functionality was analyzed.
Chapter five is on conclusion, recommendation and references.
This material is a complete and well researched project material strictly for academic purposes, which has been approved by different Lecturers from different higher institutions. We make abstract and chapter one visible for everyone.
All Project Topics on this site have complete 5(five) Chapters . Each Project Material include: Abstract + Introduction + etc + Literature Review + methodology + etc + Conclusion + Recommendation + References/Bibliography.
To "DOWNLOAD" the complete material on this particular topic above click "HERE"
Do you want our Bank Accounts? please click HERE
To view other related topics click HERE
To "SUMMIT" new topic(s), develop a new topic OR you did not see your topic on our site but want to confirm the availiability of your topic click HERE
Do you want us to research for your new topic? if yes, click "HERE"
Do you have any question concerning our post/services? click HERE for answers to your questions
For more information contact us through Any of the following means:
Mobile No :+2348146561114 or +2347015391124
Email address :engr4project@gmail.com
Watsapp No :+2348146561114
IF YOU ARE SATISFIED WITH OUR SERVICES, PLEASE DO NOT FORGET TO INVITE YOUR FRIENDS AND COURSEMATES TO OUR PAGE.