Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
68 views6 pages

Paper 2019

The document describes a locker security system that uses both a keypad and RFID for authentication. It allows only authorized users to unlock a locker by reading their RFID tag ID number and validating a entered password. The system is designed to be low cost and error-free.

Uploaded by

Vignesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
68 views6 pages

Paper 2019

The document describes a locker security system that uses both a keypad and RFID for authentication. It allows only authorized users to unlock a locker by reading their RFID tag ID number and validating a entered password. The system is designed to be low cost and error-free.

Uploaded by

Vignesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/334576905

Locker security system using keypad and RFID

Conference Paper · July 2019


DOI: 10.1109/ICCSRE.2019.8807588

CITATIONS READS

15 11,951

2 authors, including:

Salma Mohammed
Omar Al-Mukhtar University
9 PUBLICATIONS 21 CITATIONS

SEE PROFILE

All content following this page was uploaded by Salma Mohammed on 23 June 2020.

The user has requested enhancement of the downloaded file.


Locker Security System Using Keypad and RFID
Salma Mohammed Abdul Hakim Alkeelani
Computer Science Department Computer Science Department
University of Omar Al-mukhtar University of Omar Al-mukhtar
Albyada,Libya Albyada,Libya
Email:[email protected] Email: [email protected]

Abstract— the main purpose of this paper is to design and


implement a system based on a Password and a Radio- II. RELATED WORKES
Frequency Identification RFID. This system is basically a In this section, some related works are discussed
password and an RFID based access-control system which below. In [3] was developed a Password Protected
permits only an authentic person to unlock. For doing this,
Lock System using Microcontroller. The door is
the system will activate and authenticate the user. We have
applied a security system via a passive type of RFID and a opened when the entered password is correct, and
PASSWORD based on Atmega16 microcontroller. The permit a concerned person to access secured place.
RFID reader reads the ID number form RFID tag. Then The door would close after the number of time. On the
enter the password from a Keypad, if the ID number of the other hand, another person enters an incorrect
tag and the password are correct, then the will unlock. The password, the door would not open, rejecting access to
aim of constructing this system is to put in place a the person. In [4] was designed and implemented a
formidable locker security system with low cost and free of digital security system that using a passive type of
errors.
RFID which be able to activate and authenticate the
Keywords— RFID Reader, Atmega16, Keypad, LCD,
Buzzer, UART protocol, Security System
user and open the door for secure access in actual time.
In [5] was implemented a bank locker security system
based on RFID and GSM technology. The purpose of
I. INTRODUCTION this paper was to read the ID number by RFID reader
tag. If the id number if correct send an SMS to a
The security system plays a significant role to keep out mobile number of a legalized person. In [6] was
unknown user to access protected physical and logical developed a Locker Opening and Closing System
places with no permission. The basic types of security Using RFID. The main concept of this paper was read
systems are normal door lock key plus the electronic ID number using the RFID tag. If the ID number of
automatic of the identification system. Normal Locks RFID equal to storage number in a microcontroller.
are generally simple devices that are used to process After that, the system requires a user for fingerprint
the problem directly. Furthermore, unwanted people verification. GSM Mode sent a message to a user
can hack the locks and access to protected places phone number consist on “password number”. If the
[1].Consequently, have to construct locks difficult to password is a valid the door will open.
access. In this case, a useful solution is an automatic
password based door locks which have been All of the research that illustrated above, assisted us to
commonly utilized in offices and houses. The security obtain the idea of our project which constructed high
system applies several types of identification protected lock used on offices, homes, banks, etc.
technologies which are a barcode, magnetic stripe, and
III. BLOCK DIAGRAM
Radio Frequency Identification (RFID). One of the
most quickly rising segments of automatic The following fig.1 shows a block diagram of the
identification data compilation manufacturing and Locker Security System:
emerging technology is a Radio Frequency
Identification (RFID) in these days. The systems of
automatic identification that offers better performance.
For this reason, RFID is not the same as barcoding
which is an optical technique. Between the reader and
tagged RFID object is not needed an inherent line of
sight [1].The technology of RFID uses radio waves to
identify an animate or an inanimate [2].The purpose of
this paper is to resolve the problem for people who
always not remember to bring their house or office
room key before left. In addition, substitute normal
door key to a reliable door security system. In this
paper was designed and implemented a locker security
system using a passive type of RFID and PASSWORD Fig.1 Block Diagram Representation of the Locker Security
based on Atmega16 microcontroller. System

978-1-7281-0827-8/19/$31.00 ©2019 IEEE


IEEE/ICCSRE2019, 22-24 July, 2019, Agadir, Morocco

IV. COMPONENTS E. DC Motor


A. Microcontroller Atmega16 DC motor converts electrical energy into
The ATmega16 is an 8-bit microcontroller mechanical energy.it uses for opening and closing the
developed by Atmel’s Mega AVR family with high door. The motor rotates with clockwise and
performance and low power CMOS .It is based on anticlockwise [11]. In this project use Ld293 driver for
AVR higher RISC. ATmega16 throughput is help to control the speed and the direction of the
concerning 1 MIPS for each MHz by single clock for motor.
every instruction permitting the system designed F. Light-Emitting Diode (LED)
versus processing speed optimize power Consumption. LED is a semiconductor instrument that when an
The AVR has universal purpose register plus rich electric current passes through it emits observable
instruction set, these registers are connected to the light[12].
ALU, and in one clock cycle permit two independent
registers to be accessed in one single instruction G. Buzzer
executed [7]. The buzzer is an audio signaling device consist of
integrated construction of the electronic transducers. A
buzzer or beeper is found on alarm, printer electronic
toys and others [13].
V. CIRCUIT DIAGRAM
1 2 3 A LCD1
LM016L

4 5 6 B

10K

VS SV DDVE E

RSRWE
330R

D
0

7
C1
7 8 9 C

123

45
6

7
8
9
1
0
1
1
1
2
1
3
1
4
22pF
X1
* 0 # D C2
CRYSTAL

22pF

U1
9 RESET PC0/SCL 22
PC1/SDA 23
13 XTAL1 PC2/TCK 24
12 XTAL2 PC3/TMS 25

Fig.2 Pin Diagram [7]


PC4/TDO 26
40 PA0/ADC0 PC5/TDI 27
39 PA1/ADC1 PC6/TOSC1 28
38 PA2/ADC2 PC7/TOSC2 29
37
PA3/ADC3 RFID READ ER
36 PA4/ADC4 PD0/RXD 14
35 PA5/ADC5 PD1/TXD 15 RXD
34 PA6/ADC6 PD2/INT0 16

B. Radio frequency identification (RFID)


33 PA7/ADC7 PD3/INT1 17 TXD
PD4/OC1B 18
1 PB0/T0/XCK PD5/OC1A 19 RTS
2 PB1/T1 PD6/ICP1 20
3 PB2/AIN0/INT2 PD7/OC2 21 CTS
U2 4 PB3/AIN1/OC0
16 8 5 PB4/SS

RFID is classification technology that utilizes radio


6 PB5/MOSI P1
2 IN1 VSS VS OUT1 3 7 PB6/MISO AREF 32
7 IN2 OUT2 6 8 PB7/SCK AVCC 30
1 EN1 1 DCD
ATMEGA16 6 DSR

radio-frequency electromagnetic fields to uniquely


2 RXD
9 EN2 7 RTS
10 IN3 OUT3 11 3 TXD
15 IN4 GND GND OUT4 14 8 CTS
4 DTR
L293D R2 R4 9 RI

identify persons or items carrying tags at what time 1K BUZ1

BUZZER
R3
330R

D2
330R

D1
COMPIM
ERROR

they come attached to a reader. RFID uses the number


LED-GREEN LED-RED
Q1
2N2222

of radio frequencies also many kinds of tag exist


through different communication techniques plus
power supply sources[8]. Fig.4 circuit diagram of Locker Security System
using Keypad and RFID.

Fig.4 shows the circuit diagram of the locker security


system based on Password and RFID. The compact
circuitry is constructed about Atmel
Atmega16.Atmega16 is an 8-bit microcontroller with
high performance and low power. The size of Ram is
1024 Bytes. It has three timers which two has 8-bit the
other has 16-bit.Also has four Ports (PORTA, PORTB,
Fig.3 Basic RFID system [14] PORTC, and PORTD).Ports contain 8-Bits I/O Full-
duplex a serial port. The bound rate is used in 9600.
C. Liquid Crystal Display (LCD) The PORTC Pins PC4-PC7 of the microcontroller are
LCD is an electronic presentation component .it connected to LCD D4-D7.Others Pins of PORTC PC0,
PC1 and PC3 are connected to register-select (RS),
uses in a wide of variety applications .16x2 LCD that Read/Write (RW) and Enable (E) of LCD. The LCD
means demonstrate alphabets in two lines every line16 displays data sent from the microcontroller in ASCII
character [10]. In our project, we use LCD to display Format. The PORTD Pins PD0 (RXD) and PD1
Illustrative messages to enter or change of the (TXD) are used to interface the RFID reader through
password and enter RFID tag .otherwise for shows the MAX232. The Keypad is used to enter a password
incorrect tries [9]. .The PORTA Pins PA0-PA7 of the microcontroller is
connected to Keypad. The PORTB pins PB1-PB3,
D. Keypad PB4, PB5, and PB6 are connected to DC-Motor, Red
LED, Buzzer and Green LED.
A keypad consists of digits, set of letters and other
symbols as set buttons organized in a block 4x4 array.
The Keypad is named a numeric keypad if it consists VI. SOFTWARE DESIGN
of the numbers. Many devices use numeric keypad
such as calculators, combination locks as well as The source code is written by C/C++ and designed
digital door locks [10].in this project we use keypad in using AVR GCC Compiler with ATMEL STUDIO
which is commonly used by most of the programs
order to enter and change password commands.
where their Project is related to AVR-based
IEEE/ICCSRE2019, 22-24 July, 2019, Agadir, Morocco

Microcontroller systems. Proteus ISIS 8. 6 Professional


used to draw schematics and simulate the circuits [15].
A. FlowChart
The flowchart obviously explains the working of
the system .

Fig.6 Check RFID

Fig.6 shows check RFID process. Initially, LCD will


display “enter RFID Tag”. One has to enter RFID Tag.
If the RFID is a correct the system will displays on
LCD "Enter 1 to open the door enter 2 to Change
Password”. On the other hand, If the RFID Tag was
entered incorrect LCD display "RFID tag not match”,
turn on Red LED and the buzzer is triggered for 3
seconds .after the alarm time (Buzzer) has ended time
the system displays a message on LCD system" a new
entry process".

Fig .5 Flowchart of System

Fig.5 clearly explains the working of this project.


Firstly, The LCD displays a message “Enter your RFID
tag”. Then the RFID number of a user is matched with
stored RFID number if it gets match then Display a
message on LCD “Enter 1 to log in, Enter 2 to change a
Password”. If a user enters 1 display on LCD a message
“enter your password”. Then the password of the user is
matched with a stored password if it gets a match then
locker will be open .If a user enters 2 display a message
on LCD “Change Password”.

Fig.7 Check Password

Fig.7 demonstrates the check password process. After


entering the RFID Tag correct the user chose value 1,
enter the password if it is correct, the Green LED and
buzzer turn on for 3 seconds, and also the system will
display a message on LCD “Correct password
Welcome”. The door opens for 30 seconds delay and
then closes. On the other hand, if the password entered
is incorrect, the Red LED and buzzer turn on for
IEEE/ICCSRE2019, 22-24 July, 2019, Agadir, Morocco

seconds, also The system will display a message on Password


LCD" Wrong input, please Try again". if password 4 “Correct Password is Check 3 second Green
correct” Password turn on
entered is wrong for 3 consecutive times, the Red LED 5 “Wrong input, please Check 3 second Red turn
and buzzer will turn on for 10 seconds, and The system Try again“ Password on
displays a message on LCD " Wait 1 minutes to try 6 “Wait 1 minutes to try Check 10 Red turn
again” password Seconds on
again". After that, the system allows a new entry 7 “Enter Old Password” Change - -
process which requires enter the RFID tag, and the Password
password another time. 8 “Enter Your New Change - -
Password” Password
9 “Your New Password Change - -
is saved” Password

B. Simulation
1) RFID Interface Using Virtual Terminal

Fig .8 Change Password

Fig.8 shows the change password process. After entering


the RFID Tag correct and the user chose value 2, the
system show message on LCD "'enter old password". Fig .9 RFID interfacing using Virtual Terminal
check password if it correct The system displays a
message on LCD "Enter a new password". when the user The fig.9 above shows the Proteus Simulation of RFID
enters a new password, the system will replace the old interfacing using Virtual Terminal. The PROTEUS
password by new password and show message on LCD. window using Virtual Terminal to view the Tag ID
“New password is saved". On the other hand, if the which serially sends.
password was entered a wrong, the Red LED and buzzer
will turn on for 3 seconds, and the system will display a
message on LCD "wrong input please try again". After 3
consecutive time wrong attempts to enter the password.
the red LED and buzzer will turn on for 10 seconds, and
the system will display a message on LCD "wait a minute
to try again". After that ,the system allows a new entry
process which requires enter the RFID tag, and the
password again.

VII. RESULTS AND SIMULATION

A. Results
The Locker Security System using RFID and
Keypad was successfully implemented.

TABLE.1 Functions of Systems

N Message Function Buzzer LED Fig .10 Enter RFID tag ID using Virtual Terminal
1 “Enter your RFID tag” Initializati - -
on
2 “RFID not match” Check 3 second Red turn
The fig.10 above illustrates the Proteus Simulation of
RFID on RFID interfacing using Virtual Terminal to enter the
3 “"Enter value 1 to open Check - - Tag ID.
the door enter 2 to RFID. 2) LCD And KEYPAD Interfacing
Change Password”
4 “Enter your password’ Check - -
IEEE/ICCSRE2019, 22-24 July, 2019, Agadir, Morocco

[2] Y.Huang, “Secure Access Control Scheme of RFID System


Application” Fifth International Conference on Information
Assurance and Security ,Vol.1,pp- 525-528,2009.
[3] A.Ashraf, D.Rasaily , A.Dahal, “Password Protected Lock
System Designed using Microcontroller”,International Journal
of Engineering Trends and Technology (IJETT),Vol
32,no.4,pp-180-183,February, 2016.
[4] G.Verma,P.Tripathi,“ A Digital Security System with Door
Lock System Using RFID Technology”International Journal of
Computer Applications August,Vol.5,no.11pp-6-8, 2010.
[5] R.Ramani, S. Selvaraju, S.Valarmathy, P.Niranjan " Bank
Locker Security System based on RFID and GSM
Technology" International Journal of Computer
Applications.Vol57,no.18,pp-15-10, November 2012.
[6] R. Gangi,S. Gollapudi ”Loker Opening AND Closing System
Using RFID, Fingerprinter, Password AND GSM”
International Journal of Emerging Trends & Technology in
Computer Science (IJETTCS),Vol.2,pp-142-145,April,2013
[7] Datasheet ATmega16 .
[8] S.Rasid, F.Rashid, A.Sabri, R.Islam “ Design and Construction
of an Automatic Security System of a Door Using RFID
Technology” International Journal of Scientific & Engineering
Research (IJSER )Vol.9,pp-1067-1073,2018.
Fig .11 LCD and Keypad Interfacing [9] Datasheet LCD 16x2.
[10] .Datasheet Keypad 4x4.
VI. CONCLUSION [11] Datasheet L293D
[12] Datasheet Light-Emitting Diodes (LEDs).
In conclusion ,this paper has displayed useful methods [13] Datasheet Buzzer module.
for construct a security door lock system. The methods [14] U.Farooq,M.Hasan,M.Amar,A.Hanif and M.Asad, “RFID
were RFID and Keypad, The feature of using RFID Based Security and Access Control System” IACSIT
technology which is a most secure any other systems. International Journal of Engineering and Technology”,
The system has applied on Atmega16 microcontroller Vol.4,no.4,pp-309-314 ,August, 2014.
and simulated on Proteus ISIS 8.6 Professional. The [15] Narasimha. (2017). Title: Proteus PCB Design and Simulation
Software – Introduction. [online] Available at : //
purpose of the paper was to build a system only http://www.circuitstoday.com/proteus-software-introduction
authorized people enter to secure zone has achieved. [March 8, 2017]
This system provides a high level of security with low [16] P.Nehete, J.Chaudhari, S.Pachpande, K.Rane, “Literature
cost.The system can applied as an emerging product in Survey on Door Lock Security Systems”, International Journal
of Computer Applications, Vol .153 ,no .2 pp-13-18,
security sysems field for each applications commercial November ,2016.
and residential .We propose in future development of [17] P.Kamble, B.W. Gawali, “Fingerprint Verification of ATM
system:- Security System by Using Biometric and Hybridization”,
1. We can send SMS message to the user by International Journal of Scientific and Research
GSM modem ,in the case of the 3 times Publications,Vol.2, November 2012.
[18] I. Moreno ,"LED Intensity Distribution". International Optical
wrong attempts inputs . Design, Technical Digest,June,2006.
2. We can use RFID number for every user and [19] S.Singh,Basics of Light Emitting diodes, Characterizations and
connect the system by SQL server to build Applications. Nova Scientific ,2009.
database for store the information of the users [20] J.G. Webster, Wiley Encyclopedia of Electrical and
Electronics Engineering. John Wiley & Sons, 2015.
.
[21] M. Mazidi, S. Naimi and S. Naimi, AVR Microcontroller and
Embedded Systems. Pearson Education UK, 2015.
[22] S.Sharma, M.Kumar,S. Kumar " Bank Locker Security System
REFERENCES based On RFID and GSM Technolog" Journal of Emerging
[1] P.Adole1, J.M.Môm, and G. Igwue, “RFID Based Security Technologies and Innovative Research (JETIR) .Vol.3,pp-66-
Access Control System with GSM Technology”. American 70,2016.
Journal of Engineering Research (AJER). Vol.5, pp-236-242,
2016.

View publication stats

You might also like