Вы находитесь на странице: 1из 22

RFID Reader Basics The RFID reader continuously transmits a 125 kHz carrier signal using its antenna.

The passive RFID tag, embedded in an id card for example, powers on from the carrier signal. Once powered on, the tag transmits, back to the reader, an FSK encoded signal containing the data stored on the card. The FSK signal is a 125 kHz carrier, with 12.5 kHz as the mark frequency, and a 15.625 kHz as the space frequency. The encoded signal is picked up by the reader's antenna, filtered, and processed on the embedded microcontroller to extract the tag's unique identity. At this point the identity can be matched against the records stored on the reader. Top Level Design From the functional description we can extract the basic tasks that a reader must perform: Continuously transmit a 125 kHz sinusoidal signal using the antenna Receive and filter the signal returning from the tag Extract the digital data from the processed signal Authenticate the tag using stored records

Schematic Diagram Let's start peeling off the layers of abstraction. Following is our schematic implementation of the proposed top level design. Notice that every block on the schematic corresponds to a block in the top level design.

Clock Generator The clock generator serves a single purpose. It generates a low level 125 kHz square wave for use by the transmitting circuit within the antenna module. Note that the Microcontroller does not need a clock source as it is using the internal clock of the chip. Antenna Module The antenna module takes a 125 kHz square wave input, buffers it, using three shunted inverting gates, and converts it into a 125 kHz sinusoidal wave using the RLC circuit immediately following the buffers. The resulting wave is amplified, using a push pull amplifier, forming the carrier signal, and fed into an antenna that transmits the carrier continuously toward any RFID tag position above it.

The same antenna is used to capture the FSK encoded waveform returning from the tag. This resulting waveform, or simply the 125 kHz carrier, if no tag is present, is available as an output from the antena module. Note that this is the only stage requiring a 12V supply Filtering Module The filtering module's main purpose is to filter out the carrier signal and any noise that was picked up by the antenna. To get rid of any high frequency interference and the 125 kHz carrier, which contains no data, we apply an envelope detector. The resulting waveform is a sinusoidal waveform of varrying frequency (ie. varrying period, if you prefer), with the variation representing our data. From the previous stage we still have some low frequency and traces of high frequency interference in our signal. To get rid of both we pass the signal through two active bandpass filters, one at our mark frequency of 12.5 kHz, and one at our space frequency of 15.625 kHz. At this point we have a fairly clean signal at either the mark or the space frequency and minimal noise. The signal is still sinusoidal. Refer to the Microchip RFID Guide for some illustrations of this process. Microcontroller We use a PIC 16F88 chip as the microcontroller. The chip does not need an external clock source as it is using one of the internal oscillator to generate its clock. The resistors are used to set the reference level for an internal comparator used to process the output of the filtering stage. The comparator is formed by the reference voltage at RA2 and the output of the filtering module at RA1. The microcontroller processes the signal coming from the filtering module to extract the bits and decode them into usable data as per HID H10301 format, which is being used by the DuoProx II id cards. The hardware here is not very interesting. Most of the work is done in software on the chip. Read more about the chip and its function here.

1. ABSTRACT Access control is the process of verifying a user's claimed identity and giving or denying the access.. The proposed project is a secure access control system to control the entry of various items through a door or a passage using RFID technology. At the very simplest level, Radio Frequency Identification (RFID) technologies allow the transmission of a unique serial number wirelessly, using radio waves. The two key parts of the system that are needed to do this are the RFID 'tag' and the 'reader'; attaching an RFID tag to a physical object allows the object to be 'seen' and monitored by existing computer networks. It has got a number of advantages over the current bar-coding system The main applications of RFID technology includes, automated libraries, vehicle toll collection, asset location and tracking etc., which are currently too high to justify widespread deployment across supply chains due to concerns over the potential for infringing the privacy of consumers who purchase RFID-tagged products. The cost criteria associated with implementation of the RFID system is expected to be overcome by near future itself. The flexibility of our proposed access control system makes itself suitable for various applications. 2. INTRODUCTION Any system that controls the entrance and exit to those who have been authorized may be called an access control system. The most common methods of access control which all of us are familiar with is the traditional lock and key arrangement. It is fine for small applications but has a number of pitfalls, especially in application where there is a large number of a user or common door. A properly selected access control system can overcome these problems and can be integrated with other systems to provide a more rounded overall security solution. Microcontroller based access control using RFID is a combination of electrical, electronics, and mechanical technology. The history of RFID (Radio Frequency Identification) can be tracked as far back as the 1920s with the birth of radar systems (the word radar is an acronym for radio detection and ranging). The development of the technology, a combination of radar and radio broadcast technology, is messy and convoluted but there is consensus that it developed from the work carried out during WW2 to identify enemy aircraft, known as 'Identification: Friend or Foe' (IFF) systems. In our project we will like to use 89c51 or 89c52 microcontroller. The purpose of using this microcontroller is because its cheaper and further upgrading is possible without changing the processing of the chip. 3. BLOCK DIAGRAM 1. ABSTRACT Access control is the process of verifying a user's claimed identity and giving or denying the access.. The proposed project is a secure access control system to control the entry of various items through a door or a passage using RFID technology. At the very simplest level, Radio Frequency Identification (RFID) technologies allow the transmission of a unique serial number wirelessly, using radio waves. The two key parts of the system that are needed to do this are the RFID 'tag' and the 'reader'; attaching an RFID tag to a physical object allows the object to be 'seen' and monitored by existing computer networks. It has got a number of advantages over the current bar-coding system

The main applications of RFID technology includes, automated libraries, vehicle toll collection, asset location and tracking etc., which are currently too high to justify widespread deployment across supply chains due to concerns over the potential for infringing the privacy of consumers who purchase RFID-tagged products. The cost criteria associated with implementation of the RFID system is expected to be overcome by near future itself. The flexibility of our proposed access control system makes itself suitable for various applications. 2. INTRODUCTION Any system that controls the entrance and exit to those who have been authorized may be called an access control system. The most common methods of access control which all of us are familiar with is the traditional lock and key arrangement. It is fine for small applications but has a number of pitfalls, especially in application where there is a large number of a user or common door. A properly selected access control system can overcome these problems and can be integrated with other systems to provide a more rounded overall security solution. Microcontroller based access control using RFID is a combination of electrical, electronics, and mechanical technology. In our project we will like to use 89c51 or 89c52 microcontroller. The purpose of using this microcontroller is because its cheaper and further upgrading is possible without changing the processing of the chip. 3. BLOCK DIAGRAM

3.1 RFID TAG There are two main components present in the RFID tag. Firstly, a small silicon chip or integrated circuit which contains a unique identification number (ID). Secondly, an antenna that can send and receive radio waves. These two components can be tiny: the antenna consists of a flat, metallic conductive coil rather than a protruding FMstyle aerial, and the chip is potentially less than half a millimetre. These two components are usually attached to a flat plastic tag that can be fixed to a physical item. These tags can be quite small, thin and, increasingly, easily embedded within packaging, plastic cards, tickets, clothing labels, pallets and books. There are two main types of tags: passive and active. Passive tags are currently the most widely deployed as they are the cheapest to produce.

3.2 RFID READER The reader is a handheld or fixed unit that can interrogate nearby RFID tags and obtain their ID numbers using radio frequency (RF) communication (i.e. the process does not require contact). When a passive tag is within range of a reader, the tags antenna absorbs the energy being emitted from the reader, directs the energy to fire up the integrated circuit on the tag, which then uses the energy to beam back the ID number and any other associated information. There are two main classes of RFID readers: read-only, an example being those that operate with the purely passive EPC Class 1 tags, and read/write, which can write new information back to a tag that has been equipped with a read/write memory. The readers are becoming increasingly sophisticated, acting as gateways into the networkcentric communication systems of modern enterprises by supporting communication protocols such as TCP/IP and network technologies such as DHCP, UDP/IP and Ethernet (for wirelessly sending data back to the enterprise). Many models of reader are handheld devices and resemble the pricing guns or barcode scanners used in supermarkets, but readers can also be fixed in place (e.g. in doorways or at vehicle toll gateways) and even hidden, e.g. embedded into ceilings or walls. There are also readers that can be incorporated into handheld devices such as PDAs and mobile phones and, in addition, class 5 tags are also known as 'reader' tagsdevices that can read other RFID tags and exchange data with them. 3.3 MICROCONTROLLER We would like to use 89c52 or 89c51 microcontroller, since it contain reasonable amount of ROM and RAM. There is no need of adding further memory for our system. Also it has provision for adding extra memory for further expansion. The microcontroller is the main controlling element which controls the operation of this security access control system. Microcontroller is a device which includes a microprocessor, memory and IO lines on a single chip fabricated using VLSI technology. The assembly language programs written in the microcontroller receives input data, manipulates it, and provides necessary control signals to the hardware. The microcontroller we are using is AT 89C51. The main features of AT89C51 are 1. 4 KB of in system reprogrammable memory. 2. 128 B of internal RAM. 3. 32 bit programmable I/O RAM. 4. Two16-bit timer/counter. 3.4 RELAY AND LATCH For control of the access we would like to use a relay of 5v. The latches we have to use are of two types. They are (i) Electric door strike (ii) Magnetic latch type 3.5 LCD DISPLAY For displaying of messages we would like to use a LCD display. We would like to display messages like ACCESS GRANTED and ACCESS DENIED.

4. ALGORITHM STEP1: Start. STEP2: Receive input data from the RFID reader. STEP3: Store the received data in a temporary location. STEP4: Compare the received data with PSW of the microcontroller. STEP5: If a match found then go to STEP8. STEP6: Send input to the display to show message ACCESS DENIED. STEP7: Go to STEP10. STEP8: Send input to the display to show message ACCESS GRANTED. STEP9: Send input to the relay to switch latches. STEP10: Stop. 5. WORKING The RFID reader continuously produces radio frequency signals, when a tag comes near to it the tag get activated and it sends some data to the reader. The interface between the RFID tags and the RFID reader is RF interface. According to the data received from the reader provides an output to the microcontroller. This output is received by the microcontroller through one of its input ports. This will be compared with the data stored in the Program Status Word (PSW). According to the result of this comparison, microcontroller controls the relay for the controlling of the access. Also the required message is displayed. 6. RFID IN DETAIL The radio frequency part of RFID is the communication medium between tags and readers. With passive RFID tags, radio frequency is also used to deliver power to the tag, as they do not have on-board power systems. RFID systems are designed to be asymmetric: readers are expensive and power hungry, whilst tags are cheap and require comparatively low levels of energy. 6.1 TYPES OF RFID TAGS RFID cards are also known as "proximity" or "proxy" cards and come in three general varieties: passive, semipassive (also known as semi-active), or active. 6.1.1 PASSIVE TAG SYSTEMS They do not have an on-board power source so they have to scavenge power from the reader in order to run the digital logic on the chip and issue a response to the reader. They can therefore only operate in the presence of a reader. The communication range is limited by the need for the reader to generate very strong signals to power the tag, which therefore limits the reader-to-tag range. In addition, the small amount of energy that the tag is able to harvest in order to power its response to the reader, means that the tag-to-reader range is also limited (to around four or five metres in UHF). However, as passive tags do not require a continuous power source they have a much longer lifecycle, and because of their minimal on-board circuitry they are much cheaper to produce. This means that passive RFID tags are more suitable for tagging individual product items for applications such as supermarket checkouts and smart cards.

The lack of an onboard power supply means that the device can be quite small: commercially available products exist that can be embedded in a sticker, or under the skin. As of 2006, the smallest such devices measured 0.15 mm 0.15 mm, and are thinner than a sheet of paper (7.5 micrometers). The RFID tags which are available today at a price of about 5 cents each. The addition of the antenna creates a tag that varies from the size of a postage stamp to the size of a post card 6.1.2 SEMI-PASSIVE TAG SYSTEMS They require the tag to use battery power for the digital logic on the chip, but still use harvested power for communication. Semi-passive tags are far more reliable and have greater read ranges than purely passive tags, but they also have shorter lives (due to their reliance on battery power), are more fragile, and are significantly more expensive. 6.1.3 ACTIVE TAG SYSTEMS They have an active radio frequency (RF) transmitter (i.e. they are capable of peer-to-peer communication) and the tags use batteries to power the logic chip and to communicate with the reader (i.e. they do not use harvested power). Many active tags have practical ranges of hundreds of meters, and a battery life of up to 10 years. Active tags can be read while moving at up to 100 miles an hour (e.g. in automatic toll-road payment systems) and the readers are capable of reading up to a thousand tags per second. Active tags can also be equipped with built-in sensors e.g. for monitoring temperature control and reporting unacceptable fluctuations on refrigerated products whilst in transit, although this does increase the cost even more to over 55 (around $100 or 80) per tag. They also have a much larger memory than passive tags and, due to their higher processing capabilities, are also more secure. 6.2 RFID SYSTEM WORKING The purpose of an RFID system is to enable data to be transmitted by a mobile device, called a tag, which is read by an RFID reader and processed according to the needs of a particular application. The data transmitted by the tag may provide identification or location information, or specifics about the product tagged, such as price, color, date of purchase, etc. The use of RFID in tracking and access applications first appeared in 1932, to identify aircraft as friendly or unfriendly ("identify friend or foe" (IFF)). RFID quickly gained attention because of its ability to track moving objects. As the technology is refined, more pervasive and possibly invasive uses for RFID tags are in the works. In a typical RFID system, individual objects are equipped with a small, inexpensive tag. The tag contains a transponder with a digital memory chip that is given a unique electronic product code. The interrogator, an antenna packaged with a transceiver and decoder, emits a signal activating the RFID tag so it can read and write data to it. When an RFID tag passes through the electromagnetic zone, it detects the reader's activation signal. The reader decodes the data encoded in the tag's integrated circuit (silicon chip) and the data is passed to the host computer. The application software on the host processes the data, and may perform various filtering operations to reduce the numerous often redundant reads of the same tag to a smaller and more useful data set. 6.3. FREQUENCY RFID is fundamentally based on wireless communication, making use of radio waves, which form part of the electromagnetic spectrum (i.e. frequencies from 300 kHz to 3 GHz). It is not unlike two other wireless technologies,

WiFi and Bluetooth. The three technologies are all designed for very different uses and therefore have different functionalities but there is shared ground between the three, with some hybrids starting to appear. RFID systems can utilise both WiFi and Bluetooth and need not see them as competitors. These operating frequencies are generally considered to be organized into four main frequency bands and the table shows these different radio wave bands and the more common frequencies used for RFID systems (IEE, 2005). 6.4. MEMORY Tags come in a variety of forms with varying types of on-chip memory capability. Tags can be read-only (the unique ID code is permanently stored on the tag also known as WORM: Write Once Read Many), read/write (allowing a user to change the ID and add additional data to the tags memory), or they can be a combination, with a permanent tag ID and some storage space for the user's data. Passive tags typically have anywhere from 64 bits to 1 kilobyte of non-volatile memory. Active tags tend to have larger memories with a range of, typically, between 16 bytes and 128 kilobytes. 6.5. STANDARDS The number and use of standards within RFID and its associated industries is quite complex, involves a number of bodies and is in a process of development. Standards have been produced to cover four key areas of RFID application and use: air interface standards (for basic tag-to-reader data communication), data content and encoding (numbering schemes), conformance (testing of RFID systems) and interoperability between applications and RFID systems (RFID Journal, 2006). There are several standards bodies involved in the development and definition of RFID technologies including: International Organisation of Standardisation (ISO) EPCglobal Inc European Telecommunications Standards Institute (ETSI) Federal Communications Commission (FCC) 7. RFID Vs BARCODES It is important to understand the significant differences between RFID and bar code to appreciate the benefits RFID can provide. Bar code and RFID are both identification technologies that hold data that is accessed by some type of reader. In actuality, they complement each other very well and can be used effectively side by side in many applications. Bar code is an optical technology and RFID is a radio technology. The ways these technologies exchange data account for most of the differences between RFID and bar code and help determine where each identification technology is best put to use. As a radio technology, RFID requires no line-of-sight between the reader and the tag to exchange data. RFID tags therefore can be read through packaging, including cardboard containers and plastic wrap used to seal pallets. RFID is subject to interference however, particularly from metal, so potential sources of interference must be recognized and accounted for during system planning. Because no line-of-sight is required, tagged objects can be read regardless of their orientation through the use of optimized RFID systems. Items dont have to be placed label side up onto conveyors to be read, paving the way for

unattended handling. If workers are used to place items on conveyors, they will be more productive if they dont have to locate and align labels when handling objects. RFID readers can automatically recognize and differentiate all the RF tags in their reading field. This simultaneous processing capability provides additional flexibility for material handling, packaging and sortation operations because there is no need to maintain spacing between objects to ensure they will be read. The ability to read dozens or even hundreds of tags per second makes RFID ideal for high-speed sortation, receiving, cross docking and other applications. The data capacity of RFID tags enables them to carry all the same information as bar codes and more. Just like barcode, RFID tags are available with different memory sizes and encoding options. 8. ADVANTAGES AND DISADVANTAGES OF RFID 8.1 ADVANTAGES OF RFID SYSTEMS: RFID systems have proved to be much more beneficial and useful than the barcode system. There are many advantages for this technology. 8.1.1 CONVENIENT TO USE RFID tags do not require line of sight communication as that in the case of barcodes. The reader can identify the tag which comes anywhere in the range. RFID system supports dynamic data, i.e. The data in the tags chip can be updated. The details can be written into the chip as the product moves through the supply chain. 8.1.2 RAPID CHARGING/DISCHARGING The use of RFID reduces the amount of time required to perform circulation operations. The most significant time savings are attributable to the facts that information can be read from RFID tags much faster than from barcodes and that several items in a stack can be read at the same time. While initially unreliable, the anti-collision algorithm that allows an entire stack to be charged or discharged now appears to be working well. The other time savings realized by circulation staff are modest unless the RFID tags replace both the EM security strips or RF tags of older theft detection systems and the barcodes of the automated library systemi.e., the system is a comprehensive RFID system that combines RFID security and the tracking of materials throughout the library; or it is a hybrid system that uses EM for security and RFID for tracking, but handles both simultaneously with a single piece of equipment. [3M has developed readers that can do both concurrently except for videotapes and audiotapes. These have to be desensitized and sensitized in a separate operation]. In either case, there can be as much as a 50 percent increase in throughput. The time savings are less for charging than for discharging because the time required for charging usually is extended by social interaction with patrons. RFID security and the tracking of materials throughout the library; or it is a hybrid system that uses EM for security and RFID for tracking, but handles both simultaneously with a single piece of equipment. [3M has developed readers that can do both concurrently except for videotapes and audiotapes. These have to be desensitized and sensitized in a separate operation]. In either case, there can be as much as a 50 percent increase in throughput. The time savings are less for charging than for discharging because the time required for charging usually is extended by social interaction with patrons. 8.1.3 SIMPLIFIED PATRON SELF-CHARGING/DISCHARGING

For patrons using self-charging, there is a marked improvement because they do not have to carefully place materials within a designated template and they can charge several items at the same time. Patron self-discharging shifts that work from staff to patrons. Staff is relieved further when readers are installed in book drops. 8.1.4 HIGH RELIABILITY The readers are highly reliable. Several vendors of RFID library systems claim an almost 100 percent detection rate using RFID tags. Anecdotal evidence suggests that is the case whenever a reader is within 12 to 14 inches of the tags, but there appears to be no statistical data to support the claims. There are fewer false alarms than with older technologies once an RFID system is properly tuned. The libraries contacted that have experience with both EM and RFID security systems; report a 50 to 75 percent reduction. Some RFID systems have an interface between the exit sensors and the circulation system to identify the items moving out of the library. Were a patron to run out of the library and not be intercepted, the library would at least know what had been stolen. If the patron card also has an RFID tag, the library will also be able to determine who removed the items without properly charging them. However, the author has not been able to identify a library that has implemented this security feature. Other RFID systems encode the circulation status on the RFID tag. This is done by designating a bit as the "theft" bit and turning it off at time of charge and on at time of discharge. If the material that has not been properly charged is taken past the exit sensors, an immediate alarm is triggered. Another option is to use both the "theft" bit and the online interface to an automated library system, the first to signal an immediate alarm and the second to identify what has been taken. 8.1.5 HIGH-SPEED INVENTORYING A unique advantage of RFID systems is their ability to scan books on the shelves without tipping them out or removing them. A hand-held inventory reader can be moved rapidly across a shelf of books to read all of the unique identification information. Using wireless technology, it is possible not only to update the inventory, but also to identify items which are out of proper order. 8.1.6 AUTOMATED MATERIALS HANDLING Another application of RFID technology is automated materials handling. This includes conveyor and sorting systems that can move library materials and sort them by category into separate bins or onto separate carts. This significantly reduces the amount of staff time required to ready materials for re shelving. Given the high cost of the equipment, this application has not been widely used. There were approximately 40 systems in use in North America as of the first quarter of 2004. 8.1.7 LONG TAG LIFE Finally, RFID tags last longer than barcodes because nothing comes into contact with them. Most RFID vendors claim a minimum of 100,000 transactions before a tag may need to be replaced. 8.2 DISADVANTAGES OF RFID SYSTEMS: 8.2.1 HIGH COST The major disadvantage of RFID technology is its cost. While the readers and sensors used to read the information are comparable in cost to the components of a typical EM or RF theft detection system. 8.2.2 VULNERABILITY TO COMPROMISE

It is possible to compromise an RFID system by wrapping the protected material in two to three layers of ordinary household foil to block the radio signal. Clearly, bringing household foil into a library using RFID would represent premeditated theft, just as bringing a magnet into a library using EM technology would be. It is also possible to compromise an RFID system by placing two items against one another so that one tag overlays another. That may cancel out the signals. This requires knowledge of the technology and careful alignment. 8.2.3 REMOVAL OF EXPOSED TAGS 3M, which recommends EM for security and RFID for tracking, argues that EM strips are concealed in the spines (30 percent of customers) or the gutters (70 percent of customers) of books and are, therefore, difficult to find and remove; while RFID tags are typically affixed to the inside back cover and are exposed for removal. The author found no evidence of removal in the libraries he visited, nor did any of the library administrators contacted by telephone report a problem. That does not mean that there wont be problems when patrons become more familiar with the role of the tags. If a library wishes, it can insert the RFID tags in the spines of all except thin books; however, not all RFID tags are flexible enough. A library can also imprint the RFID tags with its logo and make them appear to be bookplates, or it can put a printed cover label over each tag. 8.2.4 EXIT SENSOR PROBLEMS While the short-range readers used for circulation charge and discharge and inventorying appear to read the tags 100 percent of the time, the performance of the exit sensors is more problematic. They must read tags at up to twice the distance of the other readers. The author knows of no library that has done a before and after inventory to determine the loss rate when RFID is used for security. Lacking data, one can only conjecture that the performance of exist sensors is better when the antennae on the tags are larger. 8.2.5 PERCEIVED INVASION OF PATRON PRIVACY There is a perception among some that RFID is a threat to patron privacy. That perception is based on two misconceptions: (1) that the tags contain patron information and (2) that they can be read after someone has taken the materials to home or office. The vast majority of the tags installed in library materials contain only the item ID, usually the same number that previously has been stored on a barcode. The link between borrower and the borrowed material is maintained in the circulation module of the automated library system, and is broken when the material is returned. When additional information is stored on the tag, it consists of information about the item, including holding location, call number, and rarely author/title. The RFID tags can only be read from a distance of two feet or less because the tags reflect a signal that comes from a reader or sensor. It is, therefore, not possible for someone to read tags from the street or an office building hallway. Perceptions, even when mistaken, may have real consequences. It is, therefore, important to educate library staff and patrons about the RFID technology used in libraries before implementing a program. The best way to do that is to emphasize that RFID technology is not one technology, but several. E-Z pass is RFID that is meant to be read from a distance. It would be impractical to affix tags of that size and cost to library materials. The same is true of the tags used on pallets in warehouses. Several states are considering legislation that would pose restrictions on the use of RFID by retailers and libraries. It is, therefore,

important to monitor legislative activity and to be prepared to inform legislators about the differences between retail and library applications. Library administrators should be sure to keep their boards informed. 9. RFID APPLICATIONS RFID has got its applications in extended fields of life. It is being introduced as the successor of bar-codes, which shall still remain in place a few years though. The various functions include tracking, tracing, anti-counterfeiting, safety, security, auto-rejection, transactions, proof of ownership, anti-tamper, anti-theft. Some of the most important applications are:i. Automatic toll collection system ii. Supply chain traceability iii. Library automation iv. Asset locating and tracking v. Baggage tracking 9.1 AUTOMATIC TOLL COLLECTION SYSTEM Small E-Z tags attached on the windscreen of vehicles can be used for applications such as, easy toll collection. It is also recommended by the traffic department to track over speeding vehicles and automatic imposition of fines, if any. 9.2 SUPPLY CHAIN TRACEABILITY When scientists are able to increase the range and lower the price of RFID tags, it will lead to a ubiquitous network of smart packages that track every phase of the supply chain. Store shelves will be full of smart-labelled products that can be tracked from purchase to trash can. The shelves themselves will communicate wirelessly with the network. The tags will be just one component of this large product-tracking network to collect data. 9.3 RFID LIBRARY AUTOMATION For many years, libraries have used a combination of technologies to reduce the likelihood of theft, improve stocktaking, and speed up issue and return procedures. An RFID reader does not need a direct line of sight, which means that books do not have to be tipped out or even pulled out completely as with barcode scanners, so inventory checking is faster and can be done more frequently. Also, RFID tags do not need to be read individually as barcodes do as RFID scanners can read stacks of books at a time, saving time, and potentially reducing health problems caused by RSI. Other benefits of RFID include simplified and faster issuing of books, self-return (the ATM approach to returning books), and rapid location checking of books. RFID systems allow a self-checkout process when books are borrowed: as the books pass a special RFID reader at the check-out desk the tag is scanned and the item is recorded as borrowed by the identified student or staff member. Apart from being faster, this system also frees up library and information staff from carrying out more mundane checkout tasks. 9.4 ASSET LOCATION TRACKING Places like hospitals around the world are starting to use RFID tags to track and manage assets, particularly expensive or critical items of equipment such as ventilators, electrocardiogram devices and infusion pumps. These systems, known as Real Time Location Systems or Enterprise Asset Visibility systems, tag physical items of equipment and make them visible to hospital managers via the hospitals WiFi

network. This means that hospital staff can always locate valuable or important equipment very quickly, which increases efficiency. 9.5 BAGGAGE TRACKING Nowadays, the theft in airports and seaports are increasing day by day. Smuggled goods are being sold out at the market. This can be stopped with the help of RFID baggage tracking system. RFID tags are attached to the baggage boxes. RFID readers are fixed on to the conveyor belts. When the baggage passes through the frequency range, their location and identity will be traced out. 10. CONCLUSION We feel that our project can replace the conventional systems of security access in the near future. Our project is suitable for applications where there are a large number of users. The main advantage of our project is that it is user friendly and it is easy to implement. Another highlight of our project is that it is flexible. We can change the type of control by changing the program inside the controller. So we feel that our project has a wide variety of applications in security access control systems. REFERENCES RFID Privacy Concerns By S.A Stoeter & Nikolas Senzi, IEEE transactions of Radio Frequency Communication, Vol 35, April 2006. RFID : Radio Frequency Identifiction, S. Shepard, McGraw Hill 2005. RFID handbook : fundamentals and applications in contactless smart cards and identification, K. Finkenzeller, Wiley & Sons 2004. http://en.wikipedia.org/wiki/RFID_tag http://www.alibaba.com/productsearch/Access_Control_System.html

RFID-Based Security System Bikramjeet Waraich

A radio-frequency identification (RFID) based access-control system allows only authorised persons to enter a particular area of an establishment. The authorised persons are provided with unique tags, using which they can access that area. The system is based on micro controller AT89C52 and comprises an RFID module, an LCD module for displaying the status and a relay for opening the door. Fig.1 shows a user trying to open the door by placing an RFID tag near the RFID reader. Radio-frequency identification You might be familiar with RFID systems as seen in access control, contactless payment systems, product tracking and inventory control, etc. Basically, an RFID system consists of three components: an antenna or coil, a transceiver (with decoder) and a transponder (RF tag) electronically programmed with unique information.

Fig.1: A user is trying to open the door by placing an RFID tag near the RFID reader Fig.2 shows a typical RFID system. In every RFID system, the transponder tags contain unique identifying information. This information can be as little as a single binary bit or a large array of bits representing such things as

an identity code, personal medical information or literally any type of information that can be stored in digital binary format.

Fig.2: A typical RFID system The RFID transceiver communicates with a passive tag. Passive tags have no power source of their own and instead derive power from the incident electromagnetic field. Commonly, at the heart of each tag is a microchip. When the tag enters the generated RF field, it is able to draw enough power from the field to access its internal memory and transmit its stored information. When the transponder tag draws power in this way, the resultant interaction of the RF fields causes the voltage at the transceiver antenna to drop in value. This effect is utilised by the tag to communicate its information to the reader. The tag is able to control the amount of power drawn from the field and by doing so it can modulate the voltage sensed at the transceiver according to the bit pattern it wishes to transmit. Antenna. Fig.3 shows the internal diagram of a typical RFID antenna. An RFID antenna consists of a coil with one or more windings and a matching network. It radiates the electromagnetic waves generated by the reader to activate the tag and read/ write data from it.

Fig.3: Internal diagram of a typical RFID antenna

Antennae are the conduits between the tag and the transceiver which control the systems data acquisition and communication. These are available in a variety of shapes and sizes. Often, the antenna is packaged with the transceiver and decoder to become a reader, which can be configured either as a hand held or a fixed-mount device. The reader emits radio waves in ranges of anywhere from 2.54 cm (one inch) to 30 metres or more, depending upon its power output and the radio frequency used. When an RFID tag passes through the electromagnetic zone, it detects the readers activation signal. The reader decodes the data encode din the tags integrated circuit (silicon chip) and the data is passed to the host computer for processing. Tags (transponders). Fig.4 shows the internal structure of a typical RFID tag. An RFID tag comprises a microchip containing identifying information and an antenna that transmits this data wirelessly to the reader. At its most basic, the chip will contain a serialised identifier, or licence plate number, that uniquely identifies that item, similar to the way many bar codes are used today.

Fig.4: internal structure of a typical RFID tag There are three types of tags: active, passive and semi-passive. Passive tags have no internal power source. These draw their power from the electromagnetic field generated by the RFID reader and then the microchip can send back information on the same wave. The reading range is limited when using passive tags. Active transponders have their own transmitters and power source, usually in the form of a small battery. These remain in a low-power idle state until they detect the presence of the RF field being sent by the reader. When the tag leaves the area of the reader, it again powers down to its idle state to conserve its battery. As a result, active tags can be detected at a greater range than passive tags. Semi-passive tags have their own power source that powers only the microchip. These have no transmitter. They rely on altering the RF field from the transceiver to transmit their data. There are three ways for data encoding into tags: 1. Read-only tags contain data, which is pre-written onto them by the tag manufacturer or distributor. 2. Write-once tags enable a user to write data to the tag one time in production mor distribution processes. 3. Full read-write tags allow new data to be written to the tag as needed and later other data can be rewritten over the original data.

RF transceiver. The RF transceiver is the source of the RF energy used to activate and power the passive RFID tags. It may be enclosed in the same cabinet as the reader or it may be a separate piece of equipment. When provided as a separate piece of equipment, the transceiver is commonly referred to as an RF module. The RF transceiver controls and modulates the radio frequencies that the antenna transmits and receives. The transceiver filters and amplifies the back-scatter signal from a passive RFID tag. Circuit description Fig.5 shows the circuit of the RFID based security system. The compact circuitry is built around Atmel AT89C52 microcontroller. The AT89C52 is a low-power, high performance CMOS 8-bit microcomputer with 8 kB of Flash programmable and erasable read only memory (PEROM). It has 256 bytes of RAM, 32 input/output (I/O) lines, three 16-bit timers/ counters, a six-vector two-level interrupt architecture, a full-duplex serial port, an on-chip oscillator and clock circuitry. The system clock also plays a significant role in operation of the microcontroller.

Fig.5: Circuit of the RFID-based security system

An 11.0592MHz quartz crystal connected to pins 18 and 19 provides basic clock to the microcontroller. Power-on reset is provided by the combination of electrolytic capacitor C4 and resistor R1. Switch S1 is used for manual reset. Port pins P2.0 through P2.7 of the microcontroller are connected to data port pins D0 through D7 of the LCD, respectively. Port pins P3.7 and P3.6 of the microcontroller are connected to register-select (RS) and enable (E) pins of the LCD, respectively. Read/write pin of the LCD is grounded to enable for write operation. All the data is sent to the LCD in ASCII format for display. Only the commands are sent in hex form. Registerselect (RS) signal is used to distinguish between data (RS=1) and command (RS=0). Preset VR1 is used to control the contrast of the LCD. Resistor R6 limits the current through the backlight of the LCD. Port pins P3.0 (RXD) and P3.1 (TXD) of the microcontroller are used to interface with the RFID reader. When an authorised person having the tag enters the RF field generated by the RFID reader, RF signal is generated by the RFID reader to transmit energy to the tag and retrieve data from the tag. Then the RFID reader communicates through RXD and TXD pins of the microcontroller for further processing. Thus on identifying the authorised person, port pin P3.2 goes high, transistor T2 drives into saturation, and relay RL1 energises to open the door for the person. Simultaneously, the LCD shows access granted message and port pin P1.7 drives piezobuzzer PZ1 via transistor T1 for aural indication. If the person is unauthorised, the LCD shows access denied and the door doesnt open. LED2 and LED3show presence of the tag in the RFID readers electromagnetic field. To derive the power supply, the 230V, 50Hz AC mains is stepped down by transformer X1 to deliver a secondary output of 15V, 500 mA. The transformer output is rectified by a full-wave rectifier comprising diodes D1 through

D4, filtered by capacitor C1 and regulated by ICs 7812 (IC2) and 7805 (IC3). Capacitor C2 bypasses the ripples present in the regulated supply. LED1 acts as the power indicator and R2 limits the current through LED1. An actual-size, single-side PCB for RFID-based security system is shown in Fig. 6 (View as PDF) and its component layout in Fig.7 (View as PDF) . Assemble the circuit on a PCB as it minimises time and assembly errors. Carefully assemble the components and double-check for any overlooked error.

Software The software for this project is given at the end of this article. It is written in C language and compiled using Keil Vision4 compiler. The finally obtained .hex code is burnt into the microcontroller using a suitable programmer. The program is easy to understand. EFY note. The complete kit of this project is available with Kits'n'Spares. The source code of this project is available on the link given below. www.efymag.com/admin/issuepdf/RFID-Based-Security-System.zip

this is code for reading rfid using 8051 microcontroller

//Program to interface RFID with 8051 microcontroller (AT89C51) #include<reg51.h> unsigned int data_out,command=0x80,temp; sfr lcd_data_pin=0xA0; //P2 port sbit rs=P1^0; //Register select sbit rw=P1^1; //Read/Write sbit en=P1^2; //Enable pin unsigned char card_id[12]; void delay(unsigned int count) //Function to provide delay { int i,j; for(i=0;i<count;i++) for(j=0;j<1275;j++); } void lcd_command(unsigned char comm) //Lcd command funtion {

lcd_data_pin=comm; en=1; rs=0; rw=0; delay(1); en=0; } void lcd_data(unsigned char disp) //Lcd data function { lcd_data_pin=disp; en=1; rs=1; rw=0; delay(1); en=0; } lcd_string(unsigned char *disp) //Function to send string { int x; for(x=0;disp[x]!=0;x++) { lcd_data(disp[x]); } } void lcd_ini() //Function to initialize the LCD { lcd_command(0x38); delay(5); lcd_command(0x0F); delay(5); lcd_command(0x80); delay(5); } void recieve() //Function to recieve data serialy from RS232 { unsigned char k; for(k=0;k<12;k++) { while(RI==0); card_id[k]=SBUF; RI=0;

} } void main() { int l; TMOD=0x20; //Enable Timer 1 TH1=0XFD; SCON=0x50; TR1=1; // Triggering Timer 1 lcd_ini(); lcd_command(0x81); //Place cursor to second position of first line lcd_string("UNIQUE CARD ID:"); delay(200); while(1) { recieve(); lcd_command(0xC1); //Place cursor to second position of second line for(l=0;l<12;l++) { lcd_data(card_id[l]); } } }

Вам также может понравиться