Adil Khan 9 months ago
AdiKhanOfficial #FYP Ideas

RFID based Authentication and Registration system

Secrecy, security, privacy and confidentiality play a vital role in almost every aspect of our daily life. Lots of work has been done by different researchers in the field of security trying to improve and upgrade the current security systems.  Different areas of research are being explored by

Project Title

RFID based Authentication and Registration system

Project Area of Specialization

Internet of Things

Project Summary

Secrecy, security, privacy and confidentiality play a vital role in almost every aspect of our daily life. Lots of work has been done by different researchers in the field of security trying to improve and upgrade the current security systems.  Different areas of research are being explored by the researchers for security systems including biometrics and non-biometrics technologies. Biometrics are very secure systems, but there are some situations and conditions where it is hard to implement biometrics systems. Non-Biometric security devices play a crucial role in verifying a person's identity by enforcing access control methods through their passwords, computerized ID cards, radio frequency identification (RFID) etc. The proposed system ensures the entry of authorized person to the system by verifying the identity of the person through an RFID card. RFID is a modern technology containing a chip which holds an electronic product code (EPC) number that points to additional data details and contents of the package. RFID readers identify the EPC numbers from a specific distance without any involvement of any sort of physical contact. The proposed system uses an RFID reader to get the secret and unique tag of the individual from the person’s RFID, the RFID reader output the tag of the RFID as a unique ID and the system then matches the ID with the local database of students registered. Upon successful match the student is allowed to enter the institute else access is denied in the other case.

Project Objectives

The task of the proposed system is to provide security and confidentiality for a deserving system. There are many and many security systems trying to provide security and privacy but many of them fails also to do the job they are hired to do. Some of them fail because of spoofing attacks, some of them fail due to low accuracy, and some of them fail due to their too easy way of breaching. The proposed system trying to eliminate the errors and mistakes uses RFID tags to provide the above mentioned characteristics for an organization or institution. An RFID reader is used to get the electronic code hidden inside the RFID card, and then this code is compared with the local database of students or employees depending upon the scenario and access is denied or granted on base of whether result declares it authentic or not.

Project Implementation Method

the proposed framework and the modules inside it and the steps involved are explained in detail. The whole framework is divided into three main steps, ( I ) RFID tag reading ( II ) ID extraction from the tag ( III ) matching with database ( IV )  decision after successful match or failure. RFID reader device is placed in a static place of the institution or organization. First of all, individuals of institute are registered in the database which is explained in section 3.2. After registration, the problem is entry of them, at entry point an RFID is placed, student’s swipes RFID cards on the respective reader and after passing it through matching function, the system authenticates the individual and let him pass through the door or authentication fails in reverse case as explained in below sections. Tools, hardware, programming languages, front end, back end, database, setup and devices used are elaborated in later sections.

Registration:

In the first priority, every newbie has to register himself in the database for the proper running of the software. In the registration process, every individual is assigned for a new RFID card which is newly issued. Along with the unique tag of the RFID card, some other information about the individual is also stored like his name, father name, CNIC, image and some other information depending upon the environment where the software is used. These information helps to get the individual record as he swipes card, all of his related data is retrieved.The GUI for entrance of all the data is set up in python tkinter library.

Retrieval:

For successful retrieval of the person he/she must be registered in the database. For the retrieval process student must have his card with. Card is swiped on the RFID reader, id is extracted from the tag and then process further is explained below:

  1. Id received from Read.py function is passed to ‘searching_in_database’ function, Read.py is explained in later section.
  2. Connection is established, as explained in the registration process with MySql database.
  3. Query is executed to select the persona having the ID which is passed to searching_in_database function.

‘select * from rfid_table where rf_id = id’

  1. If the person exists in the database, then query retrieves all of his record and is displayed in the GUI along with the image.

A sample record retrieved is shown in figure 4

Hardware:

This whole project has been implemented on Raspberry pi using RFIDRC 522 sensor, requirement for the project are:

  1. Raspberry pi
  2. RC 522 sensor
  3. LCD display
  4. 5 v power
  5. RFID cards

Benefits of the Project

The main idea and benefits of this project is to ensure proper entry, secure system by using RFID sensors and Raspberry pi. This system is too much easy, cheap and very efficient. The hardware used in the proposed project has the following characteristics.

  1. Cheap hardware is used.
  2. Hardware is easily available.
  3. Changes according to user requirements is easily implement able.
  4. This hardware is very handy and can be used in several mobile places.

Characteristics of Software are:

  1. Software is quite easy.
  2. It is very simple to use.
  3. Software processing time is very less.

There are a lot many problems faced by students, employees in their organizations and offices as there are some techniques which can spoof them. So the RFID is the best option in such cases.

Technical Details of Final Deliverable

  • The final implementation on raspberry pi B+ or later and RFID sensor, RFID tags are required
  • The proposed system can be implemented in school, colleges universities and offices in ordr to avoid unauthorized access.
  • This project is implemented on small device i.e raspberry pi and on sensor i.e RFID sensor which can be moved easliy from one place to another.
  • The devices which is used in this project has energy  energy comsumption than other devices which consume a lot of energy
  • Easliy managable for the administration and easliy for the users.
  • Prevent from unauthorized access to school colleges and university or the place where it is implemented.

Final Deliverable of the Project

HW/SW integrated system

Type of Industry

IT

Technologies

Internet of Things (IoT)

Sustainable Development Goals

Industry, Innovation and Infrastructure

Required Resources

Item Name Type No. of Units Per Unit Cost (in Rs) Total (in Rs)
Raspberry pi B+ Equipment11000010000
RFID Reader Equipment115001500
Keyboard and mouse Equipment135003500
RFID tags Equipment2005010000
LCD screen Equipment11500015000
HDMI Equipment1500500
VGA Equipment1300300
Memory card Equipment125002500
Jumper wires (male to male) Equipment1100100
Jumper wires(male to female) Equipment1100100
Jumper Wires (female to female) Equipment1100100
RPI Charger Equipment1500500
Charger Cable Equipment1300300
RPI cooling Fan Equipment1400400
RPI heat sink Equipment1200200
RPI casing Equipment1500500
Total in (Rs) 45500
If you need this project, please contact me on contact@adikhanofficial.com
Design and Fabrication of Miniature Autonomous Farming Tractor

The concept of autonomous farming has been around for almost a century now, first proposed...

1675638330.png
Adil Khan
9 months ago
Assistive Device for Converting Urdu Sign Language into Speech

Any society?s progress in social welfare can be measured by looking at how well their disa...

1675638330.png
Adil Khan
9 months ago
Intelligent Vehicle

As the world is growing rapidly and every nation is busy in the enhancement of its technol...

1675638330.png
Adil Khan
9 months ago
Designing of Commercially used Hardware for testing of photo-voltaic M...

Solar Photovoltaic (PV) energy systems are leading the market when talking about renewable...

1675638330.png
Adil Khan
9 months ago
electric bike

This government takes the safety of pedestrians and cyclists very seriously.  The Min...

1675638330.png
Adil Khan
9 months ago