Loading

RFID Based Security System
K.Srinivasa Ravi1, G.H.Varun2, T.Vamsi3, P.Pratyusha4

1Dr. K. Srinivasa Ravi, Professor, Department of ECM, KL University, Guntur (Andhra Pradesh), India.
2G. H. Varun, B.Tech Final Year Student, Department of Electronics and Computer Engineering, KL University, Guntur (Andhra Pradesh), India.
3T. Vamsi, B.Tech Final Year Student, Department of Electronics and Computer Engineering, KL University, Guntur (Andhra Pradesh), India.
4P. Pratyusha, B.Tech Final Year Student, Department of Electronics and Computer Engineering, KL University, Guntur (Andhra Pradesh), India.
Manuscript received on 15 April 2013 | Revised Manuscript received on 22 April 2013 | Manuscript Published on 30 April 2013 | PP: 132-134 | Volume-2 Issue-5, April 2013 | Retrieval Number: E0691042413/13©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Radio Frequency Identification (RFID) is one member in the family of Automatic Identification and Data Capture (AIDC) technologies and is a fast and reliable means of identifying any material object. The significant advantage of all types of RFID systems is the non-contact, non-line-of-sight nature of the technology. Tags can be read through a variety of substances such as snow, fog, ice, paint, crusted grime, and other visually and environmentally challenging conditions, where barcodes or other optically read technologies would be useless. This project can provide security for the industries, companies, etc. This security system gives information about the authorized and unauthorized persons. Primarily, the two main components involved in a Radio Frequency Identification system are the Transponder (tags that are attached to the object) and the Interrogator (RFID reader). In this project, when the card is brought near to the RFID module it reads the data in the card and displays on the LCD. The data in the card is compared with the data in the program memory and displays authorized or unauthorized message. The door opens for an authorized person, closes for an unauthorized person; it alerts the persons through a buzzer. The RFID module indicates a buzzer whenever it reads the data from the RFID card.
Keywords: Authentication, RFID Reader, RFID Tag, Security.

Scope of the Article: Image Security