Rfid Important

Embed Size (px)

Citation preview

  • 7/29/2019 Rfid Important

    1/21

    1. ABSTRACT

    Access control is the process of verifying a user's claimed identity and giving or

    denying the access.. The proposed project is a secure access control system tocontrol the entry of various items through a door or a passage using RFID

    technology.

    At the very simplest level, Radio Frequency Identification (RFID) technologies

    allow the transmission of a unique serial number wirelessly, using radio waves.

    The two key parts of the system that are needed to do this are the RFID 'tag' and

    the 'reader'; attaching an RFID tag to a physical object allows the object to be

    'seen' and monitored by existing computer networks. It has got a number of

    advantages over the current bar-coding system

    The main applications of RFID technology includes, automated libraries,

    vehicle toll collection, asset location and tracking etc., which are currently too

    high to justify widespread deployment across supply chains due to concerns

    over the potential for infringing the privacy of consumers who purchase RFID-

    tagged products.

    The cost criteria associated with implementation of the RFID system is

    expected to be overcome by near future itself. The flexibility of our proposed

    access control system makes itself suitable for various applications.

    2. INTRODUCTION

    Any system that controls the entrance and exit to those who have been

    authorized may be called an access control system. The most common methods

    of access control which all of us are familiar with is the traditional lock and key

    arrangement. It is fine for small applications but has a number of pitfalls,

  • 7/29/2019 Rfid Important

    2/21

    especially in application where there is a large number of a user or common

    door.

    A properly selected access control system can overcome these problems and canbe integrated with other systems to provide a more rounded overall security

    solution. Microcontroller based access control using RFID is a combination of

    electrical, electronics, and mechanical technology.

    The history of RFID (Radio Frequency Identification) can be tracked as far back

    as the 1920s with the birth of radar systems (the word radar is an acronym for

    radio detection and ranging). The development of the technology, a

    combination of radar and radio broadcast technology, is messy and convoluted

    but there is consensus that it developed from the work carried out during WW2

    to identify enemy aircraft, known as 'Identification: Friend or Foe' (IFF)

    systems.

    In our project we will like to use 89c51 or 89c52 microcontroller. The purpose

    of using this microcontroller is because its cheaper and further upgrading is

    possible without changing the processing of the chip.

    3. BLOCK DIAGRAM

    1. ABSTRACT

    Access control is the process of verifying a user's claimed identity and giving or

    denying the access.. The proposed project is a secure access control system to

    control the entry of various items through a door or a passage using RFID

    technology.

    At the very simplest level, Radio Frequency Identification (RFID) technologies

    allow the transmission of a unique serial number wirelessly, using radio waves.

    The two key parts of the system that are needed to do this are the RFID 'tag' and

  • 7/29/2019 Rfid Important

    3/21

    the 'reader'; attaching an RFID tag to a physical object allows the object to be

    'seen' and monitored by existing computer networks. It has got a number of

    advantages over the current bar-coding system

    The main applications of RFID technology includes, automated libraries,

    vehicle toll collection, asset location and tracking etc., which are currently too

    high to justify widespread deployment across supply chains due to concerns

    over the potential for infringing the privacy of consumers who purchase RFID-

    tagged products.

    The cost criteria associated with implementation of the RFID system is

    expected to be overcome by near future itself. The flexibility of our proposed

    access control system makes itself suitable for various applications.

    2. INTRODUCTION

    Any system that controls the entrance and exit to those who have been

    authorized may be called an access control system. The most common methods

    of access control which all of us are familiar with is the traditional lock and key

    arrangement. It is fine for small applications but has a number of pitfalls,

    especially in application where there is a large number of a user or common

    door.

    A properly selected access control system can overcome these problems and can

    be integrated with other systems to provide a more rounded overall security

    solution. Microcontroller based access control using RFID is a combination of

    electrical, electronics, and mechanical technology.

    In our project we will like to use 89c51 or 89c52 microcontroller. The purpose

    of using this microcontroller is because its cheaper and further upgrading is

    possible without changing the processing of the chip.

  • 7/29/2019 Rfid Important

    4/21

    3. BLOCK DIAGRAM

    3.1 RFID TAG

    There are two main components present in the RFID tag. Firstly, a small silicon

    chip or integrated circuit which contains a unique identification number (ID).

    Secondly, an antenna that can send and receive radio waves. These two

    components can be tiny: the antenna consists of a flat, metallic conductive coil

    rather than a protruding FM-style aerial, and the chip is potentially less than half

    a millimetre. These two components are usually attached to a flat plastic tag that

    can be fixed to a physical item. These tags can be quite small, thin and,

    increasingly, easily embedded within packaging, plastic cards, tickets, clothing

    labels, pallets and books. There are two main types of tags: passive and active.

    Passive tags are currently the most widely deployed as they are the cheapest to

    produce.

    3.2RFID READER

    The reader is a handheld or fixed unit that can interrogate nearby RFID tags and

    obtain their ID numbers using radio frequency (RF) communication (i.e. the

  • 7/29/2019 Rfid Important

    5/21

    process does not require contact). When a passive tag is within range of a

    reader, the tags antenna absorbs the energy being emitted from the reader,

    directs the energy to fire up the integrated circuit on the tag, which then uses

    the energy to beam back the ID number and any other associated information.

    There are two main classes of RFID readers: read-only, an example being those

    that operate with the purely passive EPC Class 1 tags, and read/write, which can

    write new information back to a tag that has been equipped with a read/write

    memory. The readers are becoming increasingly sophisticated, acting as

    gateways into the network-centric communication systems of modern

    enterprises by supporting communication protocols such as TCP/IP and network

    technologies such as DHCP, UDP/IP and Ethernet (for wirelessly sending data

    back to the enterprise). Many models of reader are handheld devices and

    resemble the pricing guns or barcode scanners used in supermarkets, but readers

    can also be fixed in place (e.g. in doorways or at vehicle toll gateways) and

    even hidden, e.g. embedded into ceilings or walls.

    There are also readers that can be incorporated into handheld devices such as

    PDAs and mobile phones and, in addition, class 5 tags are also known as

    'reader' tagsdevices that can read other RFID tags and exchange data with

    them.

    3.3 MICROCONTROLLER

    We would like to use 89c52 or 89c51 microcontroller, since it contain

    reasonable amount of ROM and RAM. There is no need of adding further

    memory for our system. Also it has provision for adding extra memory for

    further expansion.

    The microcontroller is the main controlling element which controls the

    operation of this security access control system. Microcontroller is a device

  • 7/29/2019 Rfid Important

    6/21

    which includes a microprocessor, memory and IO lines on a single chip

    fabricated using VLSI technology. The assembly language programs written in

    the microcontroller receives input data, manipulates it, and provides necessary

    control signals to the hardware. The microcontroller we are using is AT 89C51.

    The main features of AT89C51 are

    1. 4 KB of in system reprogrammable memory.

    2. 128 B of internal RAM.

    3. 32 bit programmable I/O RAM.

    4. Two16-bit timer/counter.

    3.4 RELAY AND LATCH

    For control of the access we would like to use a relay of 5v. The latches we

    have to use are of two types. They are

    (i) Electric door strike

    (ii) Magnetic latch type

    3.5 LCD DISPLAY

    For displaying of messages we would like to use a LCD display. We would like

    to display messages like ACCESS GRANTED and ACCESS DENIED.

    4. ALGORITHM

    STEP1: Start.

    STEP2: Receive input data from the RFID reader.

    STEP3: Store the received data in a temporary location.

  • 7/29/2019 Rfid Important

    7/21

    STEP4: Compare the received data with PSW of the microcontroller.

    STEP5: If a match found then go to STEP8.

    STEP6: Send input to the display to show message ACCESS DENIED.

    STEP7: Go to STEP10.

    STEP8: Send input to the display to show message

    ACCESS GRANTED.

    STEP9: Send input to the relay to switch latches.

    STEP10: Stop.

    5. WORKING

    The RFID reader continuously produces radio frequency signals, when a tag

    comes near to it the tag get activated and it sends some data to the reader. The

    interface between the RFID tags and the RFID reader is RF interface.

    According to the data received from the reader provides an output to the

    microcontroller. This output is received by the microcontroller through one of

    its input ports. This will be compared with the data stored in the Program Status

    Word (PSW). According to the result of this comparison, microcontroller

    controls the relay for the controlling of the access. Also the required message is

    displayed.

    6. RFID IN DETAIL

    The radio frequency part of RFID is the communication medium between tags

    and readers. With passive RFID tags, radio frequency is also used to deliver

    power to the tag, as they do not have on-board power systems. RFID systems

  • 7/29/2019 Rfid Important

    8/21

    are designed to be asymmetric: readers are expensive and power hungry, whilst

    tags are cheap and require comparatively low levels of energy.

    6.1 TYPES OF RFID TAGS

    RFID cards are also known as "proximity" or "proxy" cards and come in three

    general varieties: passive, semi-passive (also known as semi-active), or active.

    6.1.1 PASSIVE TAG SYSTEMS

    They do not have an on-board power source so they have to scavenge power

    from the reader in order to run the digital logic on the chip and issue a response

    to the reader. They can therefore only operate in the presence of a reader. The

    communication range is limited by the need for the reader to generate very

    strong signals to power the tag, which therefore limits the reader-to-tag range.

    In addition, the small amount of energy that the tag is able to harvest in order to

    power its response to the reader, means that the tag-to-reader range is also

    limited (to around four or five metres in UHF). However, as passive tags do not

    require a continuous power source they have a much longer lifecycle, and

    because of their minimal on-board circuitry they are much cheaper to produce.

    This means that passive RFID tags are more suitable for tagging individual

    product items for applications such as supermarket checkouts and smart cards.

    The lack of an onboard power supply means that the device can be quite small:

    commercially available products exist that can be embedded in a sticker, or

    under the skin. As of 2006, the smallest such devices measured 0.15 mm 0.15

    mm, and are thinner than a sheet of paper (7.5 micrometers).

    The RFID tags which are available today at a price of about 5 cents each. The

    addition of the antenna creates a tag that varies from the size of a postage stamp

    to the size of a post card

  • 7/29/2019 Rfid Important

    9/21

    6.1.2 SEMI-PASSIVE TAG SYSTEMS

    They require the tag to use battery power for the digital logic on the chip, but

    still use harvested power for communication. Semi-passive tags are far morereliable and have greater read ranges than purely passive tags, but they also

    have shorter lives (due to their reliance on battery power), are more fragile,

    and are significantly more expensive.

    6.1.3 ACTIVE TAG SYSTEMS

    They have an active radio frequency (RF) transmitter (i.e. they are capable ofpeer-to-peer communication) and the tags use batteries to power the logic chip

    and to communicate with the reader (i.e. they do not use harvested power).

    Many active tags have practical ranges of hundreds of meters, and a battery life

    of up to 10 years. Active tags can be read while moving at up to 100 miles an

    hour (e.g. in automatic toll-road payment systems) and the readers are capable

    of reading up to a thousand tags per second. Active tags can also be equipped

    with built-in sensors e.g. for monitoring temperature control and reporting

    unacceptable fluctuations on refrigerated products whilst in transit, although this

    does increase the cost even more to over 55 (around $100 or 80) per tag.

    They also have a much larger memory than passive tags and, due to their higher

    processing capabilities, are also more secure.

    6.2 RFID SYSTEM WORKING

    The purpose of an RFID system is to enable data to be transmitted by a mobile

    device, called a tag, which is read by an RFID reader and processed according

    to the needs of a particular application. The data transmitted by the tag may

    provide identification or location information, or specifics about the product

    tagged, such as price, color, date of purchase, etc. The use of RFID in tracking

    and access applications first appeared in 1932, to identify aircraft as friendly or

  • 7/29/2019 Rfid Important

    10/21

    unfriendly ("identify friend or foe" (IFF)). RFID quickly gained attention

    because of its ability to track moving objects. As the technology is refined,

    more pervasive and possibly invasive uses for RFID tags are in the works.

    In a typical RFID system, individual objects are equipped with a small,

    inexpensive tag. The tag contains a transponder with a digital memory chip that

    is given a unique electronic product code. The interrogator, an antenna

    packaged with a transceiver and decoder, emits a signal activating the RFID tag

    so it can read and write data to it. When an RFID tag passes through the

    electromagnetic zone, it detects the reader's activation signal. The reader

    decodes the data encoded in the tag's integrated circuit (silicon chip) and the

    data is passed to the host computer. The application software on the host

    processes the data, and may perform various filtering operations to reduce the

    numerous often redundant reads of the same tag to a smaller and more useful

    data set.

    6.3. FREQUENCY

    RFID is fundamentally based on wireless communication, making use of radio

    waves, which form part of the electromagnetic spectrum (i.e. frequencies from

    300 kHz to 3 GHz). It is not unlike two other wireless technologies, WiFi and

    Bluetooth. The three technologies are all designed for very different uses and

    therefore have different functionalities but there is shared ground between the

    three, with some hybrids starting to appear. RFID systems can utilise both WiFi

    and Bluetooth and need not see them as competitors. These operating

    frequencies are generally considered to be organized into four main frequency

    bands and the table shows these different radio wave bands and the more

    common frequencies used for RFID systems (IEE, 2005).

    6.4. MEMORY

  • 7/29/2019 Rfid Important

    11/21

    Tags come in a variety of forms with varying types of on-chip memory

    capability. Tags can be read-only (the unique ID code is permanently stored on

    the tagalso known as WORM: Write Once Read Many), read/write (allowing

    a user to change the ID and add additional data to the tags memory), or they

    can be a combination, with a permanent tag ID and some storage space for the

    user's data.

    Passive tags typically have anywhere from 64 bits to 1 kilobyte of non-volatile

    memory. Active tags tend to have larger memories with a range of, typically,

    between 16 bytes and 128 kilobytes.

    6.5. STANDARDS

    The number and use of standards within RFID and its associated industries is

    quite complex, involves a number of bodies and is in a process of development.

    Standards have been produced to cover four key areas of RFID application and

    use: air interface standards (for basic tag-to-reader data communication), data

    content and encoding (numbering schemes), conformance (testing of RFID

    systems) and interoperability between applications and RFID systems (RFID

    Journal, 2006).

    There are several standards bodies involved in the development and definition

    of RFID technologies including:

    Standardisation (ISO)

    7. RFID Vs BARCODES

  • 7/29/2019 Rfid Important

    12/21

    It is important to understand the significant differences between RFID and bar

    code to appreciate the benefits RFID can provide. Bar code and RFID are both

    identification technologies that hold data that is accessed by some type of

    reader. In actuality, they complement each other very well and can be used

    effectively side by side in many applications. Bar code is an optical technology

    and RFID is a radio technology. The ways these technologies exchange data

    account for most of the differences between RFID and bar code and help

    determine where each identification technology is best put to use.

    As a radio technology, RFID requires no line-of-sight between the reader and

    the tag to exchange data. RFID tags therefore can be read through packaging,

    including cardboard containers and plastic wrap used to seal pallets. RFID is

    subject to interference however, particularly from metal, so potential sources of

    interference must be recognized and accounted for during system planning.

    Because no line-of-sight is required, tagged objects can be read regardless of

    their orientation through the use of optimized RFID systems. Items dont have

    to be placed label side up onto conveyors to be read, paving the way for

    unattended handling. If workers are used to place items on conveyors, they will

    be more productive if they dont have to locate and align labels when handling

    objects.

    RFID readers can automatically recognize and differentiate all the RF tags in

    their reading field. This simultaneous processing capability provides additional

    flexibility for material handling, packaging and sortation operations because

    there is no need to maintain spacing between objects to ensure they will be read.

    The ability to read dozens or even hundreds of tags per second makes RFID

    ideal for high-speed sortation, receiving, cross docking and other applications.

  • 7/29/2019 Rfid Important

    13/21

    The data capacity of RFID tags enables them to carry all the same information

    as bar codes and more. Just like barcode, RFID tags are available with different

    memory sizes and encoding options.

    8. ADVANTAGES AND DISADVANTAGES OF RFID

    8.1 ADVANTAGES OF RFID SYSTEMS:

    RFID systems have proved to be much more beneficial and useful than the

    barcode system. There are many advantages for this technology.

    8.1.1 CONVENIENT TO USE

    RFID tags do not require line of sight communication as that in the case of

    barcodes. The reader can identify the tag which comes anywhere in the range.

    RFID system supports dynamic data, i.e. The data in the tags chip can be

    updated. The details can be written into the chip as the product moves through

    the supply chain.

    8.1.2 RAPID CHARGING/DISCHARGING

    The use of RFID reduces the amount of time required to perform circulation

    operations. The most significant time savings are attributable to the facts that

    information can be read from RFID tags much faster than from barcodes and

    that several items in a stack can be read at the same time. While initially

    unreliable, the anti-collision algorithm that allows an entire stack to be charged

    or discharged now appears to be working well. The other time savings realized

    by circulation staff are modest unless the RFID tags replace both the EM

    security strips

    or RF tags of older theft detection systems and the barcodes of the automatedlibrary systemi.e., the system is a comprehensive RFID system that combines

  • 7/29/2019 Rfid Important

    14/21

    RFID security and the tracking of materials throughout the library; or it is a

    hybrid system that uses EM for security and RFID for tracking, but handles both

    simultaneously with a single piece of equipment. [3M has developed readers

    that can do both concurrently except for videotapes and audiotapes. These have

    to be desensitized and sensitized in a separate operation]. In either case, there

    can be as much as a 50 percent increase in throughput. The time savings are less

    for charging than for discharging because the time required for charging usually

    is extended by social interaction with patrons. RFID security and the tracking of

    materials throughout the library; or it is a hybrid system that uses EM for

    security and RFID for tracking, but handles both simultaneously with a single

    piece of equipment. [3M has developed readers that can do both concurrently

    except for videotapes and audiotapes. These have to be desensitized and

    sensitized in a separate operation]. In either case, there can be as much as a 50

    percent increase in throughput. The time savings are less for charging than for

    discharging because the time required for charging usually is extended by social

    interaction with patrons.

    8.1.3 SIMPLIFIED PATRON SELF-CHARGING/DISCHARGING

    For patrons using self-charging, there is a marked improvement because they do

    not have to carefully place materials within a designated template and they can

    charge several items at the same time. Patron self-discharging shifts that work

    from staff to patrons. Staff is relieved further when readers are installed in bookdrops.

    8.1.4 HIGH RELIABILITY

    The readers are highly reliable. Several vendors of RFID library systems claim

    an almost 100 percent detection rate using RFID tags. Anecdotal evidence

    suggests that is the case whenever a reader is within 12 to 14 inches of the tags,

  • 7/29/2019 Rfid Important

    15/21

    but there appears to be no statistical data to support the claims. There are fewer

    false alarms than with older technologies once an RFID system is properly

    tuned. The libraries contacted that have experience with both EM and RFID

    security systems; report a 50 to 75 percent reduction. Some RFID systems have

    an interface between the exit sensors and the circulation system to identify the

    items moving out of the library. Were a patron to run out of the library and not

    be intercepted, the library would at least know what had been stolen. If the

    patron card also has an RFID tag, the library will also be able to determine who

    removed the items without properly charging them. However, the author has not

    been able to identify a library that has implemented this security feature. Other

    RFID systems encode the circulation status on the RFID tag. This is done by

    designating a bit as the "theft" bit and turning it off at time of charge and on at

    time of discharge. If the material that has not been properly charged is taken

    past the exit sensors, an immediate alarm is triggered. Another option is to use

    both the "theft" bit and the online interface to an automated library system, the

    first to signal an immediate alarm and the second to identify what has beentaken.

    8.1.5 HIGH-SPEED INVENTORYING

    A unique advantage of RFID systems is their ability to scan books on the

    shelves without tipping them out or removing them. A hand-held inventory

    reader can be moved rapidly across a shelf of books to read all of the uniqueidentification information. Using wireless technology, it is possible not only to

    update the inventory, but also to identify items which are out of proper order.

    8.1.6 AUTOMATED MATERIALS HANDLING

    Another application of RFID technology is automated materials handling. This

    includes conveyor and sorting systems that can move library materials and sort

  • 7/29/2019 Rfid Important

    16/21

    them by category into separate bins or onto separate carts. This significantly

    reduces the amount of staff time required to ready materials for re shelving.

    Given the high cost of the equipment, this application has not been widely used.

    There were approximately 40 systems in use in North America as of the first

    quarter of 2004.

    8.1.7 LONG TAG LIFE

    Finally, RFID tags last longer than barcodes because nothing comes into contact

    with them. Most RFID vendors claim a minimum of 100,000 transactions

    before a tag may need to be replaced.

    8.2 DISADVANTAGES OF RFID SYSTEMS:

    8.2.1 HIGH COST

    The major disadvantage of RFID technology is its cost. While the readers and

    sensors used to read the information are comparable in cost to the componentsof a typical EM or RF theft detection system.

    8.2.2 VULNERABILITY TO COMPROMISE

    It is possible to compromise an RFID system by wrapping the protected

    material in two to three layers of ordinary household foil to block the radio

    signal. Clearly, bringing household foil into a library using RFID wouldrepresent premeditated theft, just as bringing a magnet into a library using EM

    technology would be. It is also possible to compromise an RFID system by

    placing two items against one another so that one tag overlays another. That

    may cancel out the signals. This requires knowledge of the technology and

    careful alignment.

    8.2.3 REMOVAL OF EXPOSED TAGS

  • 7/29/2019 Rfid Important

    17/21

    3M, which recommends EM for security and RFID for tracking, argues that EM

    strips are concealed in the spines (30 percent of customers) or the gutters (70

    percent of customers) of books and are, therefore, difficult to find and remove;

    while RFID tags are typically affixed to the inside back cover and are exposed

    for removal. The author found no evidence of removal in the libraries he visited,

    nor did any of the library administrators contacted by telephone report a

    problem. That

    does not mean that there wont be problems when patrons become more familiar

    with the role of the tags. If a library wishes, it can insert the RFID tags in the

    spines of all except thin books; however, not all RFID tags are flexible enough.

    A library can also imprint the RFID tags with its logo and make them appear to

    be bookplates, or it can put a printed cover label over each tag.

    8.2.4 EXIT SENSOR PROBLEMS

    While the short-range readers used for circulation charge and discharge and

    inventorying appear to read the tags 100 percent of the time, the performance of

    the exit sensors is more problematic. They must read tags at up to twice the

    distance of the other readers. The author knows of no library that has done a

    before and after inventory to determine the loss rate when RFID is used for

    security. Lacking data, one can only conjecture that the performance of exist

    sensors is better when the antennae on the tags are larger.

    8.2.5 PERCEIVED INVASION OF PATRON PRIVACY

    There is a perception among some that RFID is a threat to patron privacy. That

    perception is based on two misconceptions: (1) that the tags contain patron

    information and (2) that they can be read after someone has taken the materials

    to home or office. The vast majority of the tags installed in library materials

    contain only the item ID, usually the same number that previously has been

  • 7/29/2019 Rfid Important

    18/21

    stored on a barcode. The link between borrower and the borrowed material is

    maintained in the circulation module of the automated library system, and is

    broken when the material is returned.

    When additional information is stored on the tag, it consists of information

    about the item, including holding location, call number, and rarely author/title.

    The RFID tags can only be read from a distance of two feet or less because the

    tags reflect a signal that comes from a reader or sensor. It is, therefore, not

    possible for someone to read tags from the street or an office building hallway.

    Perceptions, even when mistaken, may have real consequences. It is, therefore,

    important to educate library staff and patrons about the RFID technology used

    in libraries before implementing a program. The best way to do that is to

    emphasize that RFID technology is not one technology, but several. E-Z pass is

    RFID that is meant to be read from a distance. It would be impractical to affix

    tags of that size and cost to library materials. The same is true of the tags used

    on pallets in warehouses. Several states are considering legislation that would

    pose restrictions on the use of RFID by retailers and libraries. It is, therefore,

    important to monitor legislative activity and to be prepared to inform legislators

    about the differences between retail and library applications. Library

    administrators should be sure to keep their boards informed.

    9. RFID APPLICATIONS

    RFID has got its applications in extended fields of life. It is being introduced as

    the successor of bar-codes, which shall still remain in place a few years though.

    The various functions include tracking, tracing, anti-counterfeiting, safety,

    security, auto-rejection, transactions, proof of ownership, anti-tamper, anti-theft.

    Some of the most important applications are:-

    i. Automatic toll collection system

  • 7/29/2019 Rfid Important

    19/21

    ii. Supply chain traceability

    iii. Library automation

    iv. Asset locating and tracking

    v. Baggage tracking

    9.1 AUTOMATIC TOLL COLLECTION SYSTEM

    Small E-Z tags attached on the windscreen of vehicles can be used for

    applications such as, easy toll collection. It is also recommended by the traffic

    department to track over speeding vehicles and automatic imposition of fines, if

    any.

    9.2 SUPPLY CHAIN TRACEABILITY

    When scientists are able to increase the range and lower the price of RFID tags,

    it will lead to a ubiquitous network of smart packages that track every phase of

    the supply chain. Store shelves will be full of smart-labelled products that can

    be tracked from purchase to trash can. The shelves themselves will

    communicate wirelessly with the network. The tags will be just one component

    of this large product-tracking network to collect data.

    9.3 RFID LIBRARY AUTOMATION

    For many years, libraries have used a combination of technologies to reduce the

    likelihood of theft, improve stocktaking, and speed up issue and return

    procedures. An RFID reader does not need a direct line of sight, which means

    thatbooks do not have to be tipped out or even pulled out completely as with

    barcode scanners, so inventory checking is faster and can be done more

    frequently. Also, RFID tags do not need to be read individually as barcodes doas RFID scanners can read stacks of books at a time, saving time, and

  • 7/29/2019 Rfid Important

    20/21

    potentially reducing health problems caused by RSI. Other benefits of RFID

    include simplified and faster issuing of books, self-return (the ATM approach

    to returning books), and rapid location checking of books. RFID systems allow

    a self-checkout process when books are borrowed: as the books pass a special

    RFID reader at the check-out desk the tag is scanned and the item is recorded as

    borrowed by the identified student or staff member. Apart from being faster,

    this system also frees up library and information staff from carrying out more

    mundane checkout tasks.

    9.4 ASSET LOCATION TRACKING

    Places like hospitals around the world are starting to use RFID tags to track and

    manage assets, particularly expensive or critical items of equipment such as

    ventilators, electrocardiogram devices and infusion pumps. These systems,

    known as Real Time Location Systems or Enterprise Asset Visibility systems,

    tag physical items of equipment and make them visible to hospital managers

    via the hospitals WiFi

    network. This means that hospital staff can always locate valuable or important

    equipment very quickly, which increases efficiency.

    9.5 BAGGAGE TRACKING

    Nowadays, the theft in airports and seaports are increasing day by day.

    Smuggled goods are being sold out at the market. This can be stopped with the

    help of RFID baggage tracking system. RFID tags are attached to the baggage

    boxes. RFID readers are fixed on to the conveyor belts. When the baggage

    passes through the frequency range, their location and identity will be traced

    out.

    10.CONCLUSION

  • 7/29/2019 Rfid Important

    21/21

    We feel that our project can replace the conventional systems of security access

    in the near future. Our project is suitable for applications where there are a large

    number of users. The main advantage of our project is that it is user friendly and

    it is easy to implement. Another highlight of our project is that it is flexible. We

    can change the type of control by changing the program inside the controller. So

    we feel that our project has a wide variety of applications in security access

    control systems.

    Future scope

    A hex key pad can be interfaced to microcontroller board by which user can enterhis password then only the lock can be opened. This ensures even if some one

    has card then also without the password he cant get access.

    o Connection to PC and development of PC side software to read from

    microcontroller

    o Implementing the security systems with different levels by using different types

    of mifare cards.

    o Cryptanalysis of the link between the card and reader.

    o Study of other RFID techniques for better service and security.

    o Interfacing the system with a GSM so that data can be transmitted through

    messages.