SlideShare a Scribd company logo
RFID Based Access Control And Proximity Security System.
RFID BASED
ACCESS CONTROL
AND PROXIMITY
SECURITY SYSTEM
PROJECT PRESENTERS
Group Members:
Faiz Ur Rehman Toor (BEE-FA11-099)
Hafiz Abdul Hannan (BEE-FA11-058)
Muhammad Hammad Malik (BEE-FA11-055)
Supervisor:
Engineer Muhammad Ishfaq
Co-Supervisor:
Engineer Qamar Raza
CONTENTS
Abstract
Introduction
Objectives
Applications
Working Principal
Block Diagram
Components
Equipment's
Overview About RF
Gantt Chart
ABSTRACT
The present system is designed for the growing
needs of security in the educational institutes and
other organizations threatened off and on by the
criminal organization.
In the background of terrorist attack on educational
and other governments or non government
organizations, we sought to evolve such a security
system as could ensure not only fool proof security
at educational institutes and many other
organizations of Pakistan but also easier to apply.
INTRODUCTION
Our system uses the radio frequency as a procedure
to track the activity of the people entering or
leaving the institutions. It ensures maximal check
on the movement of the suspected. It is a relatively
a new technology which is flawless as it is not
replicable.
Each vehicle or person, in entry, would be given a
RF tag to record information during the time the
vehicle remains in the territory of the institution.
The system comprising a computer and RFID
reader-writer and tags, would maintain all data and
detect all unauthorized entries by giving signal
through buzzer.
OBJECTIVES
The objective of this project is to develop a RFID base
access control and proximity security system that is able
to:
1. Enhance security to limited access to restricted areas
in the university/organization.
2. Allow access only to authorized people, employees to
enter the premises of the department.
3. Uniquely identify the authorized student/employee
data and store students/employee ID and name.
APPLICATION
1. The same system could also be used for student
and employee attendance on the campus.
Instead of the student/employee identity card,
each student/employee would be issued a
similar RFID tag which would be automatically
detected by the RFID reader and it would
subsequently save the administration as well
as faculty of maintaining and keeping the
record.
2. Vehicle identification when ever passing from
any toll plaza.
WORKING PRINCIPAL
WORKING(TAG)
Gen 2 RFID tags are comprised of an antenna and a chip (more
accurately called an integrated circuit, or IC). The ICs for Gen 2
tags contain four types of memory:
Reserved memory(32bit).
EPC memory(96bit).
TID memory(unique ID).
User memory(4K or 8K bytes).
BLOCK DIAGRAM
COMPONENTS
Hardware
1. A Reader.
2. Passive RFID Tag.
3. Host Computer.
Software
1. C Programming Language.
Or C++
EQUIPMENT
Reader
1. Transmitter.
2. Receiver.
3. Microprocessor.
4. Memory.
5. Controller.
6. Communication
Interface.
7. Power.
Passive RFID Tag
1. Microchip.
2. Antenna.
Host Computer
1. Software.
RFID RANGES
We Work on Active Radio Frequency.
WE HAVE DECIDED TO WORK
ON FOLLOWING SCHEDULE.
Gantt Chart
RFID Based Access Control And Proximity Security System.

More Related Content

PPTX
RFID Based Access Control And Proximity Security System.
چوھدری فیض الرحمن طور
 
PPTX
Secure Element Solutions
Ugo Chirico
 
PPT
Access control basics-2
grantlerc
 
PDF
A survey on security measures implemented to detect burglary at the atm
eSAT Journals
 
PPT
Access control basics-3
grantlerc
 
PDF
Tbs Explanation
RafiSela
 
PPTX
What UICC Means for NFC & Security
ForgeRock
 
PPT
Trusted Computing in VANET
Dr.Irshad Ahmed Sumra
 
RFID Based Access Control And Proximity Security System.
چوھدری فیض الرحمن طور
 
Secure Element Solutions
Ugo Chirico
 
Access control basics-2
grantlerc
 
A survey on security measures implemented to detect burglary at the atm
eSAT Journals
 
Access control basics-3
grantlerc
 
Tbs Explanation
RafiSela
 
What UICC Means for NFC & Security
ForgeRock
 
Trusted Computing in VANET
Dr.Irshad Ahmed Sumra
 

What's hot (8)

DOCX
Sdfgh
mirzapur
 
PDF
Report of Advance car security system major project
Ami Goswami
 
PDF
NSA advisory about state sponsored cybersecurity threats
Ronald Bartels
 
PPTX
Shivani shukla_B38_KnowledgeManagement
shivanishuks
 
PDF
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET Journal
 
PPT
ATM Security by using Fingerprint Recognition And GSM
Alpesh Kurhade
 
PPT
Security technologies
Dhani Ahmad
 
PPTX
High dependability of the automated systems
Alan Tatourian
 
Sdfgh
mirzapur
 
Report of Advance car security system major project
Ami Goswami
 
NSA advisory about state sponsored cybersecurity threats
Ronald Bartels
 
Shivani shukla_B38_KnowledgeManagement
shivanishuks
 
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET Journal
 
ATM Security by using Fingerprint Recognition And GSM
Alpesh Kurhade
 
Security technologies
Dhani Ahmad
 
High dependability of the automated systems
Alan Tatourian
 
Ad

Viewers also liked (13)

PDF
Organized Retail Crime
Tyco Retail Solutions
 
PDF
Shrink Visibility
Tyco Retail Solutions
 
PPT
Optimum Presentation 2010
hyargan
 
PDF
Traffic Intelligence - The Science Of Shopper Conversion
Tyco Retail Solutions
 
PPTX
T&T Energy Services
bmehmet
 
PDF
EAS Intelligence Solution
Tyco Retail Solutions
 
PDF
Hosameldin mostafa cv2010 (2)
ريم حسام الدين
 
PDF
Retail Security in India
Profusion India Consulting
 
PDF
Tyco Retail Solutions
Tyco Retail Solutions
 
PDF
4 enerji-sektoru
Aras Dagli
 
PPT
RFID Technology
davidtowers
 
PDF
Impact Investing Evaluation Report
The Rockefeller Foundation
 
Organized Retail Crime
Tyco Retail Solutions
 
Shrink Visibility
Tyco Retail Solutions
 
Optimum Presentation 2010
hyargan
 
Traffic Intelligence - The Science Of Shopper Conversion
Tyco Retail Solutions
 
T&T Energy Services
bmehmet
 
EAS Intelligence Solution
Tyco Retail Solutions
 
Hosameldin mostafa cv2010 (2)
ريم حسام الدين
 
Retail Security in India
Profusion India Consulting
 
Tyco Retail Solutions
Tyco Retail Solutions
 
4 enerji-sektoru
Aras Dagli
 
RFID Technology
davidtowers
 
Impact Investing Evaluation Report
The Rockefeller Foundation
 
Ad

Similar to RFID Based Access Control And Proximity Security System. (20)

PDF
Radio_Frequency_Identification_RFID_Based_Car_Park.pdf
Manju Badiger
 
PDF
IRJET- RFID Based Security Guard System using GSM
IRJET Journal
 
PDF
IRJET- RFID Based Security Guard System using GSM
IRJET Journal
 
PDF
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
inventionjournals
 
PPT
RFID PPT
Anjani Kotarya
 
PDF
IRJET - RFID Based GYM Monitoring System
IRJET Journal
 
PDF
Intelligent students tracking system in campus based on rfid and zigbee
IAEME Publication
 
PDF
Intelligent students tracking system in campus based on rfid and zigbee
IAEME Publication
 
PDF
Review of the Introduction and Use of RFID
Editor IJCATR
 
PDF
Review of the Introduction and Use of RFID
Editor IJCATR
 
PDF
Review of the Introduction and Use of RFID
Editor IJCATR
 
PDF
Review of the Introduction and Use of RFID
Editor IJCATR
 
PDF
rfid access control.rfid access controrfid access controll
영화 다시보기 ..
 
PDF
Radio Frequency Identification (RFID) Security issues and possible solutions
Ahmad Sharifi
 
PDF
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
IRJET Journal
 
PDF
Segregation of IT and OT Networks across organization
NaveedQuadri3
 
PPTX
Internet of Things and its Enabling Technologies - RFID
Swetha Kogatam
 
DOC
Classroom locking-system (1)
Julyn Mae Pagmanoja
 
PDF
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
Alexander Decker
 
PDF
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
Alexander Decker
 
Radio_Frequency_Identification_RFID_Based_Car_Park.pdf
Manju Badiger
 
IRJET- RFID Based Security Guard System using GSM
IRJET Journal
 
IRJET- RFID Based Security Guard System using GSM
IRJET Journal
 
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
inventionjournals
 
RFID PPT
Anjani Kotarya
 
IRJET - RFID Based GYM Monitoring System
IRJET Journal
 
Intelligent students tracking system in campus based on rfid and zigbee
IAEME Publication
 
Intelligent students tracking system in campus based on rfid and zigbee
IAEME Publication
 
Review of the Introduction and Use of RFID
Editor IJCATR
 
Review of the Introduction and Use of RFID
Editor IJCATR
 
Review of the Introduction and Use of RFID
Editor IJCATR
 
Review of the Introduction and Use of RFID
Editor IJCATR
 
rfid access control.rfid access controrfid access controll
영화 다시보기 ..
 
Radio Frequency Identification (RFID) Security issues and possible solutions
Ahmad Sharifi
 
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
IRJET Journal
 
Segregation of IT and OT Networks across organization
NaveedQuadri3
 
Internet of Things and its Enabling Technologies - RFID
Swetha Kogatam
 
Classroom locking-system (1)
Julyn Mae Pagmanoja
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
Alexander Decker
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
Alexander Decker
 

Recently uploaded (20)

PPTX
Civil Engineering Practices_BY Sh.JP Mishra 23.09.pptx
bineetmishra1990
 
PDF
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
PDF
Zero carbon Building Design Guidelines V4
BassemOsman1
 
PDF
Chad Ayach - A Versatile Aerospace Professional
Chad Ayach
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PPTX
easa module 3 funtamental electronics.pptx
tryanothert7
 
PDF
Packaging Tips for Stainless Steel Tubes and Pipes
heavymetalsandtubes
 
PDF
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
PPTX
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
DOCX
SAR - EEEfdfdsdasdsdasdasdasdasdasdasdasda.docx
Kanimozhi676285
 
PDF
Top 10 read articles In Managing Information Technology.pdf
IJMIT JOURNAL
 
PDF
Principles of Food Science and Nutritions
Dr. Yogesh Kumar Kosariya
 
PDF
Software Testing Tools - names and explanation
shruti533256
 
PPTX
Color Model in Textile ( RGB, CMYK).pptx
auladhossain191
 
PPTX
MSME 4.0 Template idea hackathon pdf to understand
alaudeenaarish
 
PPTX
IoT_Smart_Agriculture_Presentations.pptx
poojakumari696707
 
PDF
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
PPTX
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
PPTX
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
PDF
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
Civil Engineering Practices_BY Sh.JP Mishra 23.09.pptx
bineetmishra1990
 
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
Zero carbon Building Design Guidelines V4
BassemOsman1
 
Chad Ayach - A Versatile Aerospace Professional
Chad Ayach
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
easa module 3 funtamental electronics.pptx
tryanothert7
 
Packaging Tips for Stainless Steel Tubes and Pipes
heavymetalsandtubes
 
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
SAR - EEEfdfdsdasdsdasdasdasdasdasdasdasda.docx
Kanimozhi676285
 
Top 10 read articles In Managing Information Technology.pdf
IJMIT JOURNAL
 
Principles of Food Science and Nutritions
Dr. Yogesh Kumar Kosariya
 
Software Testing Tools - names and explanation
shruti533256
 
Color Model in Textile ( RGB, CMYK).pptx
auladhossain191
 
MSME 4.0 Template idea hackathon pdf to understand
alaudeenaarish
 
IoT_Smart_Agriculture_Presentations.pptx
poojakumari696707
 
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 

RFID Based Access Control And Proximity Security System.

  • 2. RFID BASED ACCESS CONTROL AND PROXIMITY SECURITY SYSTEM
  • 3. PROJECT PRESENTERS Group Members: Faiz Ur Rehman Toor (BEE-FA11-099) Hafiz Abdul Hannan (BEE-FA11-058) Muhammad Hammad Malik (BEE-FA11-055) Supervisor: Engineer Muhammad Ishfaq Co-Supervisor: Engineer Qamar Raza
  • 5. ABSTRACT The present system is designed for the growing needs of security in the educational institutes and other organizations threatened off and on by the criminal organization. In the background of terrorist attack on educational and other governments or non government organizations, we sought to evolve such a security system as could ensure not only fool proof security at educational institutes and many other organizations of Pakistan but also easier to apply.
  • 6. INTRODUCTION Our system uses the radio frequency as a procedure to track the activity of the people entering or leaving the institutions. It ensures maximal check on the movement of the suspected. It is a relatively a new technology which is flawless as it is not replicable. Each vehicle or person, in entry, would be given a RF tag to record information during the time the vehicle remains in the territory of the institution. The system comprising a computer and RFID reader-writer and tags, would maintain all data and detect all unauthorized entries by giving signal through buzzer.
  • 7. OBJECTIVES The objective of this project is to develop a RFID base access control and proximity security system that is able to: 1. Enhance security to limited access to restricted areas in the university/organization. 2. Allow access only to authorized people, employees to enter the premises of the department. 3. Uniquely identify the authorized student/employee data and store students/employee ID and name.
  • 8. APPLICATION 1. The same system could also be used for student and employee attendance on the campus. Instead of the student/employee identity card, each student/employee would be issued a similar RFID tag which would be automatically detected by the RFID reader and it would subsequently save the administration as well as faculty of maintaining and keeping the record. 2. Vehicle identification when ever passing from any toll plaza.
  • 10. WORKING(TAG) Gen 2 RFID tags are comprised of an antenna and a chip (more accurately called an integrated circuit, or IC). The ICs for Gen 2 tags contain four types of memory: Reserved memory(32bit). EPC memory(96bit). TID memory(unique ID). User memory(4K or 8K bytes).
  • 12. COMPONENTS Hardware 1. A Reader. 2. Passive RFID Tag. 3. Host Computer. Software 1. C Programming Language. Or C++
  • 13. EQUIPMENT Reader 1. Transmitter. 2. Receiver. 3. Microprocessor. 4. Memory. 5. Controller. 6. Communication Interface. 7. Power. Passive RFID Tag 1. Microchip. 2. Antenna. Host Computer 1. Software.
  • 14. RFID RANGES We Work on Active Radio Frequency.
  • 15. WE HAVE DECIDED TO WORK ON FOLLOWING SCHEDULE. Gantt Chart