Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
20 views9 pages

Synopsis Project

Uploaded by

jsushwanth2006
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views9 pages

Synopsis Project

Uploaded by

jsushwanth2006
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

RN SHETTY TRUST®

RNS INSTITUTE OF TECHNOLOGY


Autonomous Institution Affiliated to VTU, recognized by GOK, Approved by
AICTE

(NAAC ‘A+ Grade’ Accredited, NBA Accredited (UG - CSE, ECE, ISE, EIE and
EEE) Channasandra, Dr. Vishnuvardhan Road, Bengaluru - 560 098 Ph:
(080)28611880,28611881 URL: www.rnsit.ac.in

Mini Project -
SYNOPSIS 2023-24

MiniProject Project Guide


Group No.: Will be
allocated after
synopsis submission

Accepted:

To Review: Reviewer Initials


Rejected: & Signature

Title : Enhancing Security with RFID Smart Lock


Domain of Mini Project Work:
Home Automation

Group details:

Sl.No. USN Name Sec Email ID/Contact


No.

1
1 1RN23CS252 VIVEK SD CSE-C viveksd23cs@rnsi
t.ac.in
2 1RN23CS030 ANURAG CSE-C anuragsahu23cs@
SAHU rnsit.ac.in
Team lead Name/contact no:

“Enhancing Security with RFID Smart Lock”


Introduction:

In the world of rapidly evolving technology one such need could be seen in the urge to enhance
security which could be solved with the RFID Smart Locking System. It permanently removes the risk
of key duplication. Only authorized users will be granted access. The user is also able to manage
audit trials,which displays every entry and exit recorded through the system. Unlike the metal keys,
if the RFID card is lost or misplaced the user can always unauthorize the card and there is no scope
of worrying about security considering the missing card. The RFID utilizes the principle of
electromagnetism. It uses radio waves to communicate between the locking system and the RFID
cards. The user is able to view trials in any place at any time at any device provided, it has access to
wifi connection. The RFID systems are user friendly and can be broadly used for security purposes in
various sectors such as houses, offices, industrial departments, commercial places etc. The project
started with research and discussion, followed by procurement of components. Circutary
connections and coding were done simultaneously, testing each component and in the end
everything was optimized and integrated. The report further elaborates the underlying principles
behind the working and functionality of the locking mechanism, enhanced security , ease of access
management and tracking audit trials for each entry and exit

Literature Review: refer to 4-5 IEEE /Springer/ACM…. Journals

2
Motivation: Write what is the main advantage of this project
It can be used in various fields such as residential security, commercial and office buildings,
hospitality industries, education institutes, industrial and manufacturing facilities. database can be
accessed by the owner on any of their electronic devices, provided it has wifi access. So making the
user know about the entries. In commercial offices they can be used to access into the company and
they can record the entries of the employees. Access permissions can be easily managed and
updated by the companies. In schools they can be used to secure the classrooms, laboratories,
administration office and even libraries. For the purpose of attendance that helps to track down the
students and staff movement. In hotels and resorts this can be implemented on the room doors to
check in process and enhance the guest security.

Problem Definition: State problems in existing techniques and hence the need for the
present work
Key Management: Traditional locks rely on physical keys, which can be lost, stolen, or
duplicated without authorization, leading to security vulnerabilities.
Security Risks: Traditional locks are susceptible to picking, bumping, and other forms of
physical manipulation, making them less secure compared to modern electronic locks
with advanced encryption and authentication features.
Limited Access Control: With traditional locks, it's challenging to control and monitor
access effectively. Once a key is distributed, it's challenging to track who has access and
when, increasing the risk of unauthorized entry.
Inconvenience: Misplacing keys or forgetting to bring them can result in lockouts,
causing inconvenience and potentially requiring costly locksmith services to
regain access.

Objectives:
1. Convenience: RFID technology allows for keyless entry, eliminating the
need for physical keys.
2. Enhanced Security: Unlike traditional locks, which can be picked or
easily duplicated, RFID smart locks offer advanced encryption and
authentication mechanisms, making them more resistant to unauthorized
access.
3. Custom Access Control: With RFID smart locks, access permissions can be
easily managed and customized.

3
4. Custom Access Control: With RFID smart locks, access permissions can be easily
managed and customized. Administrators can grant or revoke access remotely,
track entry logs, and set access schedules, providing greater control and securit
5. Scalability: RFID smart locks are scalable and can be easily expanded to
accommodate additional doors or users, making them suitable for both residential and
commercial applications.
Overall, RFID smart locks offer improved convenience, security, and flexibility compared to
traditional locks, making them a popular choice for modern security solutions.

Methodology: Steps in the plan to implement


Hardware Selection: Choose an appropriate locking mechanism, such as a solenoid or motorized
deadbolt, that can be controlled electronically. Select an RFID reader module capable of reading
RFID cards or fobs.

Microcontroller: Choose a microcontroller board, such as Arduino or Raspberry Pi, to act as the
brain of the smart lock. Ensure it has enough processing power and sufficient I/O pins to interface
with the RFID reader, locking mechanism, and any additional components.

RFID Tags: Determine the type of RFID tags to be used for access control. These could be passive
RFID cards or key fobs, each with a unique identifier.

Software Development: Develop the firmware/software to control the smart lock. This involves
writing code to interface with the RFID reader, manage access permissions, and control the locking
mechanism. Implement security features such as encryption and authentication to prevent
unauthorized access.

Power Supply: Decide on the power source for the smart lock, whether it's battery-powered or
connected to mains power. Ensure the power supply is reliable and provides enough voltage and
current for the system to operate efficiently.

Mechanical Design: Design or select a suitable enclosure for the smart lock components. Ensure the
enclosure provides adequate protection against weather and tampering while allowing easy access
for maintenance.

Integration and Testing: Assemble the components, integrate them into the enclosure, and
thoroughly test the smart lock system. Test for functionality, reliability, and security, making any
necessary adjustments or improvements.

User Interface: Consider adding a user interface, such as an LCD screen or LED indicators, to provide
feedback to users during operation. This can enhance user experience and make the smart lock more
intuitive to use.

Documentation and Compliance: Document the design, construction, and operation of the RFID
smart lock. Ensure compliance with relevant safety and regulatory standards, especially if the smart
lock is intended for commercial or public use.

4
Block Diagram:

5
Software/Hardware Details:
Hardware –
1. ESP8266
2. RFID RC522
3. RFID Cards
4. Solenoid Lock

6
5. 5V Relay Unit
6. Breadboard
7. Jumper Wires
8. 12V Battery
9. Micro USB Cable

Software - 1. Arduino IDE

Software/Hardware Specifications:
ESP8266: The principle behind the ESP8266 is its ability to connect to wifi networks and facilitate
communication with other devices in the circuit. The wifi module also enables it to establish wireless
data transfer. The processor is designed with RISC(Reduced Instruction Set Computer for low energy
consumption. It is commonly used in IoT(internet of things) applications for its low cost and ease of
use. The programming for the ESP8266 can be done through Arduino IDE.

RFID card reader: It works on the principle of electromagnetic fields. The reader module generates
radio waves and passes it to the antenna of the reader which emits radio waves in the form of
electromagnetic fields which operate in the high frequency of 13.56 MHz. The chip of the card
captures the fields and also bounces back the waves while it is in-range of the reader. Antenna
receives the waves sent and further process is monitored by the control unit. Working Rfid cards
readers are used to transmit and receive radio waves in the form of electromagnetic waves to and
from the rfid cards. The reader monitors the process of reading the cards which further results in
access or denial of authorized cards. It generally consists of 8 pins out of which 2(are used for VCC
and Gnd) and the other 6 are used to control the communication to external devices. An rfid card
reader works based on 3 components: Antenna: The antenna emits radio waves and receives signals
bounced back from RFID cards within its range.

The read module: controls the generation of electromagnetic waves to the antenna and processes
the data received from RFID cards Rfid control unit: The rfid card reader is also able to communicate
with electronic devices which facilitates the transfer of data received from cards, enabling the
access/ denial.

RFID Cards: Every chip of the card is assigned a particular frequency at the time of manufacture
which in most cases cannot be changed. The chip receives the power supply in the form of
electromagnetic waves from the rfid reader while it is in range. The coil connected to the chip serves
as an antenna which receives and bounces the wave back to the reader.

Solenoid lock: Solenoid lock works on the principle of Electromagnetism. A solenoid is a highly coiled
cylindrically shaped coil. In this when electricity is supplied through the lock, the current flows
through the solenoid and creates a magnetic field, which attracts the ferrous substance of the lock
towards itself performing the unlock function. With the disconnection of power supply the magnetic
field is disrupted and the spring connected to the lock is released which locks the lock.

7
5V relay: It is mainly chosen as it is compatible with many microcontrollers voltage levels . Many of
the microcontrollers operate at 5V voltage. Mainly it acts as a switch that allows the current to flow
through the circuit. It receives the signal from the microcontroller (like whether the RFID tag is
authorized or unauthorized),like if it is authorized, the relay closes the circuit else it stays as it is (in
open state).

12V battery: The solenoid lock requires a 12v power supply inorder to function. Thus the battery
fulfils the requirement.

Bread Board and Jumper Wires These components provide a link for communication between the
external devices.

Micro USB Cable The micro USB Cable is required to transfer the code from the IDE to the
microcontroller.

Expected Outcomes:

Project Schedule Time line:


Date Task Remarks

2/5/24 Problem identification

5/5/24 Discussion

6/5/24 Research work on different aspects of the


project
8/5/24 Designing

10/5/24 Synopsis completion

References:

8
1. Author: Espress if IoT Team Documentation name: ESP8266 Technical Reference Version
1.7 Copyright©2020 Date accessed: March, 2024 URL:
https://www.espressif.com/sites/default/files/documentation/esp8266-technical_refer ence_en.pdf
Referred : (2.GPIO, P6) 2. Author: Viral science Documentation name: ESP8266 Blynk RFID Door
Lock Access Control System Date accessed: March, 2024 URL:
https://www.viralsciencecreativity.com/post/esp8266-blynk-rfid-door-lock-access-co ntrol-system

You might also like