phonelogo+234 8146561114 or +2347015391124

DESIGN AND CONSTRUCTION OF A SECURITY ACCESS CONTROL USING RADIO FREQUENCY IDENTIFICATION

USER'S INSTRUCTIONS: The project work you are about to view is on "security access control using radio frequency identification". Please, sit back and study the below research material carefully. This project topic "security access control using radio frequency identification" have complete 5(five) Chapters. The complete Project Material/writeup include: Abstract + Introduction + etc + Literature Review + methodology + etc + Conclusion + Recommendation + References/Bibliography.Our aim of providing this"security access control using radio frequency identification".project research material is to reduce the stress of moving from one school library to another all in the name of searching for"security access control using radio frequency identification".research materials. We are not encouraging any form of plagiarism. This service is legal because, all institutions permit their students to read previous projects, books, articles or papers while developing their own works.


TITLE PAGE

SECURITY ACCESS CONTROL USING RADIO FREQUENCY IDENTIFICATION

BY

---
EE/H2013/01430
DEPARTMENT OF ----
SCHOOL OF ---
INSTITUTE OF ---

DECEMBER,2018



APPROVAL PAGE

This is to certify that the research work, "security access control using radio frequency identification" by ---, Reg. No. EE/H2007/01430 submitted in partial fulfillment of the requirement award of a Higher National Diploma on --- has been approved.

By
---                                                     . ---
Supervisor                                                  Head of Department.
Signature……………….                           Signature……………….        

……………………………….
---
External Invigilator



DEDICATION
This project is dedicated to Almighty God for his protection, kindness, strength over my life throughout the period and also to my --- for his financial support and moral care towards me.Also to my mentor --- for her academic advice she often gives to me. May Almighty God shield them from the peril of this world and bless their entire endeavour Amen.



ACKNOWLEDGEMENT

The successful completion of this project work could not have been a reality without the encouragement of my --- and other people. My immensely appreciation goes to my humble and able supervisor mr. --- for his kindness in supervising this project.
My warmest gratitude goes to my parents for their moral, spiritual and financial support throughout my study in this institution.
My appreciation goes to some of my lecturers among whom are Mr. ---, and Dr. ---. I also recognize the support of some of the staff of --- among whom are: The General Manager, Deputy General manager, the internal Auditor Mr. --- and the ---. Finally, my appreciation goes to my elder sister ---, my lovely friends mercy ---, ---, --- and many others who were quite helpful.


PROJECT DESCRIPTION: This work "security access control using radio frequency identification" research material is a complete and well researched project material strictly for academic purposes, which has been approved by different Lecturers from different higher institutions. We made Preliminary pages, Abstract and Chapter one of "security access control using radio frequency identification" visible for everyone, then the complete material on"security access control using radio frequency identification" is to be ordered for. Happy viewing!!!


ABSTRACT

Traditional lock systems using mechanical lock and key mechanism are being replaced by new advanced techniques of locking system. These techniques are an integration of mechanical and electronic devices and highly intelligent. One of the prominent features of these innovative lock systems is their simplicity and high efficiency.
Here we develop an electronic security and access control system using microcontroller, which provides control to the actuating the load. It is a simple embedded system with input from the keyboard and the output being actuated accordingly.
This system demonstrates an RFID based door lock system wherein once the correct RFID card is inserted, the door is opened and the concerned person is allowed access to the secured area. Again if another person arrives it will ask to enter RFID card. If the RFID card is wrong then door would remain closed, denying the access to the person.

TABLE OF CONTENTS

 TITLE PAGE

APPROVAL PAGE
DEDICATION
ACKNOWELDGEMENT
ABSTRACT
TABLE OF CONTENT

CHAPTER ONE

    • INTRODUCTION
    • BACKGROUND OF THE PROJECT
    • PROBLEM STATEMENT
    • AIM OF THE PROJECT
    • OBJECTIVE OF THE PROJECT
    • PURPOSE OF THE PROJECT
    • SIGNIFICANCE OF THE PROJECT
    • STATEMENT OF THE PROBLEMS
    • APPLICATION OF THE PROJECT
    • PROJECT ORGANISATION
CHAPTER TWO 2.0      LITERATURE REVIEW
2.1      OVERVIEW OF RADIO-FREQUENCY IDENTIFICATION
2.2     REVIEW OF FREQUENCIES IN ACCESS CONTROL
2.3     HISTORICAL BACKGROUND OF RADIO-FREQUENCY IDENTIFICATION
2.4    DESIGN OF RADIO-FREQUENCY IDENTIFICATION 2.5    REVIEW OF RELATED STUDIES

CHAPTER THREE

3.0      CONSTRUCTION METHODOLOGY

3.1      SYSTEM BLOCK DIAGRAM

3.2      FUNCTIONS OF THE SYSTEM BLOCK

3.3      SYSTEM OPERATION

3.4      CIRCUIT DIAGRAM OF SYSTEM
3.5      SYSTEM CIRCUIT DESCRIPTION AND OPERATION
3.6      PROGRAM EXPLANATION
3.7      PROGRAM CODE
3.8      SOFTWARE DEVELOPMENT
3.9      POWER SUPPLY UNIT
3.10   MICROCONTROLLER UNIT
CHAPTER FOUR
RESULT ANALYSIS
4.0      CONSTRUCTION PROCEDURE AND TESTING
4.1      CASING AND PACKAGING
4.2      ASSEMBLING OF SECTIONS
4.3      TESTING AND RESULT OF SYSTEM
4.4      DESIGN CALCULATION
4.5      PRACTICAL LIMITATIONS
CHAPTER FIVE     
5.1      CONCLUSION
5.2      RECOMMENDATION
5.3      REFERENCES

CHAPTER ONE
1.0                                                        INTRODUCTION
1.1                                           BACKGROUND OF THE STUDY
The security situation in many parts of the world today leaves much to be desired. In Nigeria particularly, the prevalence of armed robbers and other groups that constitute nuisance to the society has led to the loss of lives and properties worth millions of dollars. Many of the attacks that led to the loss have occurred in the homes or in guarded compounds and the attacks took place in spite of the existence of seemingly impregnable security gates that were designed to ward off intruders. The needs for electronically controlled gates that have superior security features to those operated manually thus exist and have been on the increase in recent times.
This device consists of a card reader, Electromagnetic lock or door strike. Power supply system and a push button. To use this system, the authorized card/pin user when approach the reader will just have to use the cardkey or pin number. Once the correct data is present to the reader system, through an interface the locking / door holding devices will be de-energized and the door can be push open. From inside of building to exit the building the person will just have to press a door lock release switch and the system will release the lock. A power back-up unit will be incorporated into most access control system, this will act as standby power in the event there is a power outage. For certain safety requirement a break glass is incorporated into the system for emergency release of the door.
This device is better than the password based access controlled in the sense that passwords belonging to one individual can be learned by another without the owner’s permission. This device uses Radio frequency identification. Radio frequency identification (RFID) has been used in conjunction with microcontrollers to control gates. This system is only required to close and open gates and has a very limited security feature. In the work done by Adewuyi et al. surveillance cameras are used to capture and recapture the face of the driver as well as vehicle plate numbers. These data are stored in a databank for future comparison with visitors who will only be able to gain entry into a compound through gates if the data match. The system has the disadvantage that users must have been properly documented to enable them pass through the gate.
By installing the system at the entrance will only allow the authorized persons to enter the organization. The system can also be installed at various points inside the organization to track the person’s movement and to restrict their access to sensitive areas in the organization. In such a way, suspicious persons can be caught which will surely improve the security level in the organization.
Radio frequency identification (RFID) is a wireless technology that can be used to develop the access control system. The literature has revealed the use of this technology to automate various processes ranging from industrial sector to home control [1]. Bo Yan [2] has reported the use of RFID technology to automate sight spot ticket management system. The system hardware consists of RFID electronic tickets, RFID readers, computer terminals, optical networks, computer servers and site controllers. Electronic ticket contains the S-DES encrypted form of data including scenic region number, scenic spot number, ticket type, ticket date, site number, serial number and check bit. The RFID reader at the site reads the data inside the e-ticket and transmits it to the computer terminal and servers though the network. The data is decrypted at the terminal and its authenticity is verified. The site controller then allows the right tourist to enter the spot. This system identification and authentication process is carried out at three sub-levels namely the sale sub- system, the Automatic identification and access control system has become necessary to overcome the security threats faced by many organizations in Pakistan these days. By installing the system at the entrance will only allow the authorized persons to enter the organization. The system can also be installed at various points inside the organization to track the person’s movement and to restrict their access to sensitive areas in the organization. In such a way, suspicious persons can be caught which will surely improve the security level in the organization.
Radio frequency identification (RFID) is a wireless technology that can be used to develop the access control system. The literature has revealed the use of this technology to automate various processes ranging from industrial sector to home control [1]. Bo Yan [2] has reported the use of RFID technology to automate sight spot ticket management system. The system hardware consists of RFID electronic tickets, RFID readers, computer terminals, optical networks, computer servers and site controllers. Electronic ticket contains the S-DES encrypted form of data including scenic region number, scenic spot number, ticket type, ticket date, site number, serial number and check bit. The RFID reader at the site reads the data inside the e-ticket and transmits it to the computer terminal and servers though the network. The data is decrypted at the terminal and its authenticity is verified. The site controller then allows the right tourist to enter the spot. This system identification and authentication process is carried out at three sub-levels namely the sale sub- system, the monitoring     and     mess     monitoring.     These   modules communicate to the computer system through main controller. After the information from these modules is processed by the computer, the control commands are issued to the modules for granting or denying access to the user.

1.2                                                  PROBLEM STATEMENT
The need for having a constant home protection has always been there. But in the recent times, considering a dramatic rise in petty crimes like robbery and theft, the need has been more strongly felt to have a fool proof protection of the belongings and the family members. Home security has come a long way in the last few decades. It was in the hands of a guard who manually provided surveillance during nights in the earlier days, but it was not fool proof as it was only normal for him to have momentary lapse of concentration. This device brought solution to this need. It ensures adequate protection against intruders. The system combines RFID technology and to accomplish the required task. When the RFID reader installed at the entrance of room detects a number, the system captures the user image and scans the database for a match. If both the card and captured image belong to a registered user, access is granted; otherwise the system turns on the alarm and makes an emergency.

1.3                                             OBJECTIVE OF THE PROJECT
The main objective of this project is to develop an embedded system, which is used to verify and authenticate the authorized person entering a restricted room or area. This verification is done via RFID card. This device can read RFID cards.

1.4                                              PURPOSE OF THE PROJECT
Main purpose of the Access Control is to begin with – protect physical, IP and human assets. This requires restricting unauthorized people from reaching pre-defined areas. This security can be achieved by using RFID card, when the user approaches the entrance door where the access controlled door is been used.

   1.5                                         BENEFITS OF THE PROJECT

  • Control Access based on User, Zone and Time
  • Palm Vein and Multispectral Biometric Fingerprint Access Control
  • Secure Sensitive Areas with Advanced Access Control Features
  • IP based Architecture to Enhance Reliability and Scalability
  • Centralized Monitoring and Control of Multiple Devices and Locations
  • Get Real-time Notification on Exceptions

   1.6                                    SIGNIFICANCE OF THE PROJECT

  • This project provides security
  • Power consumption is less
  • Used commonly available components
  • Project is simple and easy

1.7                                         APPLICATIONS OF THE PROJECT

This simple circuit can be used at residential places to ensure better safety.

  • It can be used at organizations to ensure authorized access to highly secured places.
  • With a slight modification this Project can be used to control the switching of loads through RFID card.
1.8                                                 SCOPE OF THE PROJECT

The main component in the circuit is the controller, RFID transmitter/receiver finger print reader.
Main concept behind Radio Frequency Identification (RFID) based Security system is to allow the access only to an authorized persons. RFID card has to be shown in front of the RFID reader, then the access is allowed or denied to the respective person/RFID card.

1.9                                          LIMITATIONS OF THE PROJECT
It is a low range circuit, i.e. it is not possible to operate the circuit remotely.
  • If there is no power supply and the battery is not charged, it is not possible to open the door.

1.10                                               DEFINITION OF TERMS
Secure Area: A designated area in which access into and out of is controlled and can be monitored.
Secure Door: A door in which access through is controlled and can be monitored.
Shielding: Providing electrical isolation for a circuit, component, or wire by enclosing or isolating the circuit, component, or wire with a metal enclosure, plate, or foil that blocks any interfering electrical field.
Short Circuit: An unintentional connection that provides a low resistance path between two points in a circuit or between a point in a circuit and ground. A Short Circuit can drastically affect the operation of a circuit. If excessive current flow results from the Short Circuit, a device may be damaged or ruined.
Signature Verification: A biometric identification method using a person's signature characteristics (writing speed, pen pressure, shape of loops, etc.) to identify that person.
Spike: A voltage peak of high amplitude and short duration.
Smart Card: An identification card or access control card with a built-in integrated circuit chip. This gives the card microprocessor memory and intelligence to use for storing data. Also Known As - Chip-In-Card.
Suppression: The addition of a device to an electrical circuit that minimizes or prevents transients from affecting the proper operation of that circuit.
Switch: A device used to either connect or interrupt an electronic circuit.
The work is organized as follows: chapter one discuses the introductory part of the work,   chapter two presents the literature review of the study,  chapter three describes the methods applied,  chapter four discusses the results of the work, chapter five summarizes the research outcomes and the recommendations.


CHAPTER TWO: The chapter one of this work has been displayed above. The complete chapter two of "security access control using radio frequency identification" is also available. Order full work to download. Chapter two of "security access control using radio frequency identification" consists of the literature review. In this chapter all the related work on "security access control using radio frequency identification" was reviewed.

CHAPTER THREE: The complete chapter three of "security access control using radio frequency identification" is available. Order full work to download. Chapter three of "security access control using radio frequency identification" consists of the methodology. In this chapter all the method used in carrying out this work was discussed.

CHAPTER FOUR: The complete chapter four of "security access control using radio frequency identification" is available. Order full work to download. Chapter four of "security access control using radio frequency identification" consists of all the test conducted during the work and the result gotten after the whole work

CHAPTER FIVE: The complete chapter five of design and construction of a "security access control using radio frequency identification" is available. Order full work to download. Chapter five of "security access control using radio frequency identification" consist of conclusion, recommendation and references.

 

CLICK HERE FOR MORE RELATED TOPICS/MATERIAL


To "DOWNLOAD" the complete material on this particular topic above click "HERE"

Do you want our Bank Accounts? please click HERE

To view other related topics click HERE

To "SUMMIT" new topic(s), develop a new topic OR you did not see your topic on our site but want to confirm the availiability of your topic click HERE

Do you want us to research your new topic? if yes, click "HERE"

Do you have any question concerning our post/services? click HERE for answers to your questions


For more information contact us through any of the following means:

Mobile No phonelogo:+2348146561114 or +2347015391124 [Mr. Innocent]

Email address emailus:engr4project@gmail.com

Watsapp No whatsapp.html :+2348146561114


COUNTRIES THAT FOUND OUR SERVICES USEFUL

Australia, Botswana, Canada, Europe, Ghana, Ireland, India, Kenya, Liberia, Malaysia, Namibia, New Zealand, Nigeria, Pakistan, Philippines, Singapore, Sierra Leone, South Africa, Uganda, United States, United Kindom, Zambia, Zimbabwe, etc
Support: +234 8146561114 or +2347015391124

Watsapp Nowhatsapp.html
:+2348146561114


E
mail Address emailus:engr4project@gmail.com


FOLLOW / VISIT US VIA:

tweeter instagram.html pinterestusfacebook logo

Order Full Material(s)
Download Full Material(s)
Bank Accounts

Contact us

Hire a writer

Order/learn construction


View other related topics

Vrequently asked questions(FAQ)
View more related topics and download more material
Format = microsoft word

Chapters = 1-5 chapters


Price: N3,000.
»Accountancy (AC) project
» Agric engineering project topics
» Business admin and management project
» Banking and finance project
» Civil engineering project
» Co-operative economics and management project
» Computer science project
» Community Health Project
» Electrical/electronic/telecom/ power project
» Estate management project
» Education
» Human Kinetics & Health Education Project
» Industrial safety and environmental (ISET) project
» Mass communication project
» Mechanical engineering (ME) project
» Medical And Health Science Project
» Office technology and management (O.T.M) project
» Public administration (PA) project
» Public Health Education Project Topics
» Paramedic Project Topics
» Industrial Physics/Physics Electronics Project
» Science laboratory technology (microbiology option) project
» Agricultural science and engineering seminar
» Building engineering seminar topics/materials
» Civil engineering seminar topics
» Computer science seminar topics
» Environmental seminar topics
» Electrical/electronic/telecom/ power seminar
» Mechanical engineering seminar
» Physics / industrial physics/physics electronics seminar topics/materials