You are on page 1of 17

RFID BASED SECURITY

ACCESS CONTROL

By- Prabhanshu Chandra (151220016)


Rohit Yadav (151220021)
Band Range Data speed Remarks
120-150 kHz (LF) Low Animal
identification,
10 cm
factory da t a
collectionW
13.56 MHz (HF) 1m Low to Moderate Sma rt cards
433 MHZ (UHF) 1-100 m Moderate Defence
applications,
with active tags
868-870 MHz 1-2 m Moderate to EAN, various
High standards
2450 MHz-5800 1-2 m High Bluetooth
MHz standards
3.1 Ghz-10 GHz to 200 M High requires semi-
(microwave) active or active
tags
Barcode RFID

1.Barcode readers require a direct line of 1.Do not require a direct line of sight .
sight to the printed barcode. 2.RFID tags can be read a t much
2.The range to read a barcode is much greater distances up to 300 feet. 3.RFID
less, typically no more t h a n fifteen feet. tags are typically more expensive
3.Not more expensive . 4.RFID tags, can be read/write
4.Barcodes have no read/write capability information can be added
information can not added in barcode.
A basic RFID system consists of three components:
An a nt e nna or coil
A transceiver (with decoder)
A transponder (RF tag) electronically programmed
with unique information
Internal Structure of Tag
Access control
Manufacturing
Libraries
Identification
Security access control
Airport baggage
MATERIALS USED IN
PROJECT
RF TAGS

LCD DISPLAY

RF RECEIVER

ARDUINO UNO
BOARD
RFID RC-522
• MF RC522 is a highly integrated read and write card chip applied
to the 13.56MHz contactless communication. Launched by the
NXP Company, it is a low-voltage, low-cost, and small-sized non-
contact card chip, a best choice for intelligent instrument and
portable handheld devices.

• The MF RC522 uses advanced modulation and demodulation


concept which fully presented in all types of 13.56MHz passive
contactless communication methods and protocols
RFID TAGS
• RFID tags contain at least three
parts: There are two type of RFID tag:
1. An integrated circuit that stores 1. Active RFID Tag –
and processes information and  Their own power source.

that modulates and demodulates  Reader can be much farther away

radio-frequency (RF) signals; and still get thesignal.


2. A means of collecting DC power  Limited life s p an s .

from the incident reader signal;


3. and an antenna for receiving and 2. Passive RFID Tag –
transmitting the signal.  Do not require power source.
 Smaller in size.
• The tag information is stored in a  Unlimited life span.
non-volatile memory. The RFID tag
includes either fixed or
programmable logic for processing
the transmission and sensor data,
respectively.
ARDUINO BOARD
• Arduino is an open source electronics prototyping platform based
on flexible, easy-to-use hardware and software (called sketch). It is
intended for artists, designers, hobbyists and anyone interested in
creating interactive objects or environments.

• Arduino UNO is a board based on ATmega328 microcontroller. It


consists of 14 digital input/output pins, six analogue inputs, a USB
connection for programming the on-board microcontroller, power
jack, an ICSP header and a reset button.

• It is operated with a 16MHz crystal oscillator and contains


everything needed to support the microcontroller.
CIRCUIT SCHEMATIC
 RFID technology does not require line-of-sight
reading.
 RFID tags can hold more dat a t h a n bar codes.

 RFID tag d a t a can be changed or added to as a tag


passes through specific operations
 RFID tags are more effective in h a r s h environments

 A large number of RFID tags can be read almost


instantaneously
RFIDs are easy to conceal or incorporate in other
items. For example, in 2009 researchers a t Bristol
University successfully glued RFID micro-
transponders to live ant s in order to study their
behavior.
Hitachi holds the record for the smallest RFID chip,
a t 0.05mm × 0.05mm. This is 1/64th the size of the
previous record holder.Manufacture is enabled by
using the silicon-on-insulator (SOI) process. These
dust-sized chips can store 38-digit numbers using 128-
bit (ROM).
Limitations
• Global standardization
• Temperature Exposure
• As the card details are stored in the microcontroller, only a limited
number of card details can be stored.
• This can be increased by implementing a memory unit like EEPROM.
• Corporate Espionage:
– Identify Valuable Items to Steal
– Monitor Changes in Inventory
• Personal Privacy:
– Leaking of personal information (prescriptions, brand of underwear,
etc.).
– Location privacy: Tracking the physical.
• Skimming: Read your tag, make my own.
• Swapping: Replace real tags with decoys.
• The security can be increased by integrating other security measures like
facial detection, finger print scanner etc.

You might also like