Top Banner
RFID based Security systems Submitted to: Presented by: Mr. Mandeep Walia Arpit Goswami (Asst. Professor ) roll no-SG6508
40

RFID Based Security Systems

Nov 18, 2014

Download

Documents

ARPIT GOSWAMI

A VERY GOOD COLLEGE PRESENTATION
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: RFID Based Security Systems

RFID based Security systems

Submitted to: Presented by:Mr. Mandeep Walia Arpit Goswami(Asst. Professor ) roll no-SG6508

Page 2: RFID Based Security Systems

Circuit Diagram

Power Supply and RFID reader

2

Page 3: RFID Based Security Systems

Introduction

RFID stands for Radio Frequency identification.

Radio Frequency means radio waves are used as

carrier for transmission of data over wireless medium.

3

Page 4: RFID Based Security Systems

•The system is based on Radio Frequency Identification (RFID) technology and consists of a passive RFID tag.

•The passive micro transponder tag collects power from the 125 KHz magnetic field generated by the base station, gathers information about the Tag ID and sends this information to the base station.

•The base station receives, decodes and checks the information available in its database.

4

Page 5: RFID Based Security Systems

• Base Station is built by using the Popular 8051 family Microcontroller.

• It gets the tag ID and if the tag ID is stored in its memory then the microcontroller will allow the person inside.

•RFID Reader Module, are also called as interrogators.

•They convert radio waves returned from the RFID tag into a form that can be passed on to Controllers, which can make use of it.

5

Page 6: RFID Based Security Systems

•RFID tags and readers have to be tuned to the same frequency in order to communicate.

•RFID systems use many different frequencies but the most commonly used Reader frequency is 125khz.

6

Page 7: RFID Based Security Systems

Radio Frequency Identification (RFID) is a system

that facilitates the tracking of objects, primarily for inventory tracking, via a three

part technology comprised of a reader, a transceiver with decoder and a transponder (RF tag). The reader emits a radio signal that activates the tag and reads and writes data to it.

7

RFID’s other uses

Page 8: RFID Based Security Systems

As products are shipped, received or stored, the information (encoded on a bar code like tag) can be read and received by the reader, which is attached to a computer.

RFID has been integrated into the EPC global

network and uses the EPC (Electronic Product Code).

8

Page 9: RFID Based Security Systems

The EPC is a unique number that identifies a specific

item in the supply chain. The EPC is stored on a RFID

tag , which combines a silicon chip and a reader.

Once the EPC is retrieved from the tag, it can be associated with dynamic data such as the

origin of an item or the date of its production.

9

Page 10: RFID Based Security Systems

RFID system with EPC network

10

Page 11: RFID Based Security Systems

The development of RFID was spurred by the need to enhance tracking and access applications in the 1980’s in manufacturing and other hostile environments. This non contact means of gathering and tracking information proved to be resilient. RFID is now an established part of specific business processes in a variety of markets.

11

History

Page 12: RFID Based Security Systems

Passive tags can be low frequency (LF) or high frequency (HF).

LF tags operate at 125 KHz, are relatively expensive, and have a low read range (less than 0.5 meters).

RFID readers or receivers are composed of a radio frequency module, a control unit and an antenna to interrogate electronic tags via radio frequency (RF) communication.

12

Page 13: RFID Based Security Systems

Many also include an interface that communicates with an application (such as the library’s circulation system).

Readers can be hand-held or mounted in strategic locations so as to ensure they are able to read the tags as the tags pass through an “interrogation zone.”

The interrogation zone is the area within which a reader can read the tag.

13

Page 14: RFID Based Security Systems

The size of the interrogation zone varies depending on the type of tag and the power of the reader.

Passive tags, with shorter read ranges, tend to operate within a smaller interrogation zone

14

Page 15: RFID Based Security Systems

RFID Reader

It consists of a RFID reader IC which is used to read tag.

A coil is used to generate magnetic field which powers up RFID tag.

It uses one of its pin to transmit data serially to microcontroller.

15

Page 16: RFID Based Security Systems

The microcontroller then cross examines it with ID’s present in its database .

If it is a valid ID then microcontroller allows access to a person.

If it is not a valid ID then microcontroller sounds alarm .

16

Page 17: RFID Based Security Systems

RFID Reader Circuit

17

Page 18: RFID Based Security Systems

Power Supply

18

Page 19: RFID Based Security Systems

Power Supply Power Supply is derived from 230V ac supply.

It is stepped down to 12V using step down transformer.

By the use of 4 IN4007 diodes the ac voltage is rectified to DC voltage.

Using a 7805 regulator IC 5V is regenerated which is used as a power source for 8051µc and rfid reader.

19

Page 20: RFID Based Security Systems

20

Page 21: RFID Based Security Systems

Block diagram of RFID system

21

Page 22: RFID Based Security Systems

Circuit of RFID base station

22

Page 23: RFID Based Security Systems

12 byte RFID tag ID

23

Page 24: RFID Based Security Systems

RFID tag(internal view)

24

Page 25: RFID Based Security Systems

RFID tag’s power supply (passive tag)

25

Page 26: RFID Based Security Systems

Circular RFID tag

26

Page 27: RFID Based Security Systems

RFID Antenna

The antenna in an RFID tag is a conductive element that permits the tag to exchange data with the reader.

Passive RFID tags make use of a coiled antenna that can create a magnetic field using the energy provided by the reader's carrier signal.

27

Page 28: RFID Based Security Systems

Passive RFID Tag (or Passive Tag)

A passive tag is an RFID tag that does not contain a battery; the power is supplied by the reader. When radio waves from the reader are encountered by a passive rfid tag, the coiled antenna within the tag forms a magnetic field. The tag draws power from it, energizing the circuits in the tag. The tag then sends the information encoded in the tag's memory.

28

Page 29: RFID Based Security Systems

Advantages of a passive tag

o The tag functions without a battery; these tags have a useful life of twenty years or more.

The tag is typically much less expensive to manufacture

The tag is much smaller (some tags are the size of a grain of rice). These tags have almost unlimited applications in consumer goods and other areas.

29

Page 30: RFID Based Security Systems

Disadvantages of a passive RFID tag

The tag can be read only at very short distances, typically a few feet at most. This greatly limits the device for certain applications.

It may not be possible to include sensors that can use electricity for power.

The tag remains readable for a very long time, even after the product to which the tag is attached has been sold and is no longer being tracked.

30

Page 31: RFID Based Security Systems

RFID Reader IC

IM283 is a fully-integrated 125 kHz RFID reader circuit. It is specially designed for being a space and cost efficient kernel IC of an RFID reading and writing base station.

IM283 is accessible by a standard micro - controller as an intelligent front - end peripheral device.

31

Page 32: RFID Based Security Systems

Features of IM283

Low-voltage circuit. Read and Write

capabilities Supports most 125kHz

tags on the market. Supported frequency

range: 100 to 150 kHz Operating temperature

range: -40 to +125°C

32

Page 33: RFID Based Security Systems

RFID reader collision

Reader collision occurs in RFID systems when the coverage area of one RFID reader overlaps with that of another reader.

This causes two different problems:• Signal interference The RF fields of two or more readers may

overlap and interfere. This can be solved by having the readers programmed to read at fractionally different times.

33

Page 34: RFID Based Security Systems

contd.• Multiple reads of the same tag

The problem here is that the same tag is read one time by each of the overlapping readers. The only solution is to program the RFID system to make sure that a given tag (with its unique ID number) is read only once in a session.

34

Page 35: RFID Based Security Systems

Tag collision

Tag collision in RFID systems happens when multiple tags are energized by the RFID tag reader simultaneously, and reflect their respective signals back to the reader at the same time.

This problem is often seen whenever a large volume of tags must be read together in the same RF field. The reader is unable to differentiate these signals; tag collision confuses the reader.

35

Page 36: RFID Based Security Systems

Solution to tag collision

Different systems have been invented to isolate individual tags; the system used may vary by vendor.

For example, when the reader recognizes that tag collision has taken place, it sends a special signal (a "gap pulse").

Upon receiving this signal, each tag consults a random number counter to determine the interval to wait before sending its data. Since each tag gets a unique number interval, the tags send their data at different times.

36

Page 37: RFID Based Security Systems

Disadvantages of RFID

Dead areas and orientation problems - RFID works similar to the way a cell phone or wireless network does. Just like these technologies, there may be certain areas that have weaker signals or interference. In addition, poor read rates are sometimes a problem when the tag is rotated into an orientation that does not align well with the reader. These issues can usually be minimized by properly implementing multiple readers and using tags with multiple axis antennas.

37

Page 38: RFID Based Security Systems

Security concerns - Because RFID is not a line of sight technology like bar coding, new security problems could develop. For example, a competitor could set up a high gain directional antenna to scan tags in trucks going to a warehouse. From the data received, this competitor could determine flow rates of various products. Additionally, when RFID is used for high security operations such as payment methods, fraud is always a possibility.

38

Page 39: RFID Based Security Systems

Ghost tags - In rare cases, if multiple tags are read at the same time the reader will sometimes read a tag that does not exist. Therefore, some type of read verification, such as a CRC, should be implemented in either the tag, the reader or the data read from the tag.

Proximity issues - Tags cannot be read well when placed on metal or liquid objects or when these objects are between the reader and the tag. Nearly any object that is between the reader and the tag reduces the distance the tag can be read from.

39

Page 40: RFID Based Security Systems

High cost - Because this technology is new, the components and tags are expensive compared to barcodes. In addition, software and support personnel that are needed to install and operate the RFID reading systems (in a warehouse for example) may be more costly to employ.

Vulnerable to damage - Water, static discharge or high power magnetic surges (such as from a close lightning strike) may damage the tags.

40