Secrecy, security, privacy and confidentiality play a vital role in almost every aspect of our daily life. Lots of work has been done by different researchers in the field of security trying to improve and upgrade the current security systems. Different areas of research are being explored by
RFID based Authentication and Registration system
Secrecy, security, privacy and confidentiality play a vital role in almost every aspect of our daily life. Lots of work has been done by different researchers in the field of security trying to improve and upgrade the current security systems. Different areas of research are being explored by the researchers for security systems including biometrics and non-biometrics technologies. Biometrics are very secure systems, but there are some situations and conditions where it is hard to implement biometrics systems. Non-Biometric security devices play a crucial role in verifying a person's identity by enforcing access control methods through their passwords, computerized ID cards, radio frequency identification (RFID) etc. The proposed system ensures the entry of authorized person to the system by verifying the identity of the person through an RFID card. RFID is a modern technology containing a chip which holds an electronic product code (EPC) number that points to additional data details and contents of the package. RFID readers identify the EPC numbers from a specific distance without any involvement of any sort of physical contact. The proposed system uses an RFID reader to get the secret and unique tag of the individual from the person’s RFID, the RFID reader output the tag of the RFID as a unique ID and the system then matches the ID with the local database of students registered. Upon successful match the student is allowed to enter the institute else access is denied in the other case.
The task of the proposed system is to provide security and confidentiality for a deserving system. There are many and many security systems trying to provide security and privacy but many of them fails also to do the job they are hired to do. Some of them fail because of spoofing attacks, some of them fail due to low accuracy, and some of them fail due to their too easy way of breaching. The proposed system trying to eliminate the errors and mistakes uses RFID tags to provide the above mentioned characteristics for an organization or institution. An RFID reader is used to get the electronic code hidden inside the RFID card, and then this code is compared with the local database of students or employees depending upon the scenario and access is denied or granted on base of whether result declares it authentic or not.
the proposed framework and the modules inside it and the steps involved are explained in detail. The whole framework is divided into three main steps, ( I ) RFID tag reading ( II ) ID extraction from the tag ( III ) matching with database ( IV ) decision after successful match or failure. RFID reader device is placed in a static place of the institution or organization. First of all, individuals of institute are registered in the database which is explained in section 3.2. After registration, the problem is entry of them, at entry point an RFID is placed, student’s swipes RFID cards on the respective reader and after passing it through matching function, the system authenticates the individual and let him pass through the door or authentication fails in reverse case as explained in below sections. Tools, hardware, programming languages, front end, back end, database, setup and devices used are elaborated in later sections.
In the first priority, every newbie has to register himself in the database for the proper running of the software. In the registration process, every individual is assigned for a new RFID card which is newly issued. Along with the unique tag of the RFID card, some other information about the individual is also stored like his name, father name, CNIC, image and some other information depending upon the environment where the software is used. These information helps to get the individual record as he swipes card, all of his related data is retrieved.The GUI for entrance of all the data is set up in python tkinter library.
For successful retrieval of the person he/she must be registered in the database. For the retrieval process student must have his card with. Card is swiped on the RFID reader, id is extracted from the tag and then process further is explained below:
‘select * from rfid_table where rf_id = id’
A sample record retrieved is shown in figure 4
This whole project has been implemented on Raspberry pi using RFIDRC 522 sensor, requirement for the project are:
The main idea and benefits of this project is to ensure proper entry, secure system by using RFID sensors and Raspberry pi. This system is too much easy, cheap and very efficient. The hardware used in the proposed project has the following characteristics.
Characteristics of Software are:
There are a lot many problems faced by students, employees in their organizations and offices as there are some techniques which can spoof them. So the RFID is the best option in such cases.
| Item Name | Type | No. of Units | Per Unit Cost (in Rs) | Total (in Rs) |
|---|---|---|---|---|
| Raspberry pi B+ | Equipment | 1 | 10000 | 10000 |
| RFID Reader | Equipment | 1 | 1500 | 1500 |
| Keyboard and mouse | Equipment | 1 | 3500 | 3500 |
| RFID tags | Equipment | 200 | 50 | 10000 |
| LCD screen | Equipment | 1 | 15000 | 15000 |
| HDMI | Equipment | 1 | 500 | 500 |
| VGA | Equipment | 1 | 300 | 300 |
| Memory card | Equipment | 1 | 2500 | 2500 |
| Jumper wires (male to male) | Equipment | 1 | 100 | 100 |
| Jumper wires(male to female) | Equipment | 1 | 100 | 100 |
| Jumper Wires (female to female) | Equipment | 1 | 100 | 100 |
| RPI Charger | Equipment | 1 | 500 | 500 |
| Charger Cable | Equipment | 1 | 300 | 300 |
| RPI cooling Fan | Equipment | 1 | 400 | 400 |
| RPI heat sink | Equipment | 1 | 200 | 200 |
| RPI casing | Equipment | 1 | 500 | 500 |
| Total in (Rs) | 45500 |
The concept of autonomous farming has been around for almost a century now, first proposed...
Any society?s progress in social welfare can be measured by looking at how well their disa...
As the world is growing rapidly and every nation is busy in the enhancement of its technol...
Solar Photovoltaic (PV) energy systems are leading the market when talking about renewable...
This government takes the safety of pedestrians and cyclists very seriously. The Min...