Smart Parking System Using RFID and GSM Technology: Department of Computer Engineering Aligarh Muslim University

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

,03$&7

Smart Parking System using RFID and GSM


Technology
Love Kumar1, Muneeb Hasan Khan2, M. Sarosh Umar3
Department of Computer Engineering
Aligarh Muslim University
Aligarh, India
E-mail: 1. lovemittal03@gmail.com 2. muneebhkhan@zhcet.ac.in 3. saroshumar@zhcet.ac.in

Abstract— The growing urbanization accompanied by increasing number of vehicles, it is becoming tougher to
increasingly congested urban spaces and huge growth in the identify a vehicle’s authorized user and thus it is difficult to
number of urban vehicles, has resulted in the need for secure
parking spaces. In this paper, a solution is provided for manage the parking [7].
preventing theft of vehicle from parking using RFID and GSM Main purpose of this study is to utilize this wireless
technology. There is a huge amount of reduction in transaction technology with a smart application to solve the security
cost with radio frequency identification technology in
problem of vehicles in the organization. The main components
automation. This solution includes components like GSM kit,
RFID readers, RFID tags, barrier gates, computers, Software of this system are RFID interrogators, RFID labels, GSM kit
and LED lights. This system is used for controlling GSM kit, to inform authenticated member through SMS, barrier to
operating barriers and glowing LEDs in different cases. This control check-ins and check-outs, LED lights with alarm to
system is independent and can work in any kind of organization.
This system can prevent theft of the vehicle in an organization.
make security personnel alert and software to control this
Members of the organization can feel secure for their vehicles. system.
Check-ins and check-outs will be controlled by the software on The check-in and check-out of any vehicle is controlled with
the basis of smart card and RFID vehicle Tag. Authorized the use of RFID readers and RFID tags [8]. In this way a
member will be informed in case of any theft activity through
SMS and alarm will ring for security alert. secure, automated, identification and control system has been
developed.
Keywords- Smart Parking, RFID, Smart Card, GSM, SMS
I. HOW RFID TECHNOLOGY WORKS
INTRODUCTION RFID system consist of three components in two
Incident of vehicle stealing is becoming commonplace these combinations: a transceiver (transmitter/receiver) and antenna
days and therefore there is a need for secure systems for are usually combined as an RFID reader. A transponder
preventing vehicle theft. If members of any organization do (transmitter/responder) and antenna are combined to make an
not feel safe for their parked vehicles then it may become a RFID tag [9]. An RFID tag is read when the reader emits a
distraction for them and affect their work. In this paper we radio signal that activates the transponder, which sends data
propose a secure smart parking system using GSM and RFID back to the transceiver.
technology. Some work has been done in the area of smart A typical RFID system constitutes three main components
parking using RFID technology [1]. Using RFID is as mentioned below.
economical in terms of time and cost. It is beneficial for the • An antenna or coil
members of the organization as it provides peace of mind • A transceiver (with decoder)
thereby increasing the efficiency of the organization and • A transponder (RF tag) which is electronically programmed
provides benefits to both members as well as organization [2]. to contain unique information.
It has several useful applications like inventory tracking, There are two types of transponders, which correlate to the
manufacturing, distribution, privacy and security [3, 4, 5]. two major types of RFID tags. Active transponder contains a
RFID technology plays an important role in inventory tracking battery that periodically transmits signals. Passive
system [6]. Security of the vehicles is a big issue for any transponders do not have any energy source of their own,
organization. relying on the energy given off by the reader for the power to
In India vehicles are usually parked in a manual parking respond. Passive tag is thus cheaper.
system. It has its own set of problems especially when the There are a lot of uses of this technology around us.
number of vehicles in the parking space is too large. With the You may find that you are already carrying and using a RFID

‹,((( 
,03$&7
IMPACT-2017

tag, or even several. RFID has gained huge attention because user does not belong to the organization then barrier will not
of its ability to track moving objects. With the improvement open-up and security will be alerted. If user is member of the
and refinement in technology, more pervasive and invasive organization but not as the associated member then SMS will
uses of RFID tags are in the offing. be send to the authorized user’s mobile number for security
reason. If this access of the authorized user’s vehicle is in their
knowledge then member can ignore the message otherwise
II. PROPOSED SYSTEM
member can immediately contact the security in-charge to stop
A. RFID Reader: - reader is used to read the tag information their vehicle access. (Fig. 2).
at the time of check-in or check-out. Check-in point
B. Smart card with inbuilt RFID tag: - this represents
membership of the organization for the user.
It is of two types-
a) Permanent ID card
b) Visitor ID card
C. Vehicle Tag: - this is the vehicle tag in association with Read vehicle ID
user smart card.
D. Database :- it will contain all the personal information of
the user, the associated vehicle information as well as the
current information of movement of the vehicles in Is the vehicle N
organization. registered?
Initially admin will register the user and user will get a
smart card with unique RFID id then members will register
Y
their vehicle in the organization. Visitors can also register
• Do not
their vehicle at the time of entry itself.
Read member ID open
Registration Process
• For members of the organization the Gate
• Ask members of the organization to register their • Ring
vehicle. N security
Is the ID Present
• Attach RFID vehicle tag corresponding to RFID alarm
smart card on to the vehicle.
Y
• Register mobile number on which member wants the
updates.
• Give brief introduction about the system. ID is of the N
• For the visitors Organization?
• Ask visitor to register their vehicle.
• Attach RFID vehicle tag corresponding to RFID
smart card on to the vehicle. Y
Send a text
• Register mobile number on which visitor wants the message to
updates. the
• Give brief introduction about the system. ID same as that N registered
When the already registered vehicle comes in parking for associated with mobile
Vehicle number
check-in then system will check database. If the vehicle is
already registered and authorized person is carrying the
vehicle then barrier will open-up for the vehicle to park in.
(Fig 1). Y
When any registered vehicle wants to check-out then
Read Vehicle Information
system will check the details in database whether the vehicle
is already checked-out. If not then the system will check for
the authorized user who is checking out with the vehicle. If
Store check-in Information
DATABAS
E

• Open the Gate


• Close the Gate


Fig. 1 Check-in process of parking place
,03$&7
IMPACT-2017

III. IMPLEMENTATION
If the check-out vehicle is a visitor vehicle then Platform: - Windows 32bit
system will strictly check that the visitor id should be same as Language: - JAVA jdk1.7.0_07
the associated vehicle id and after successful check-out, Database: - My SQL, MS Access
security will collect the visitor smart card as well as the Smart card RFID tag: - Passive RFID card Tag (Fig. 3)
vehicle tag pasted on the vehicle. Vehicle RFID tag: - Passive RFID Tag (Fig. 4)
Check-out point RFID Reader: - Passive Tag reader (Rapid Radio) (Fig. 5)
Software version: - 1.06
Hardware Version:-1.00
Serial Number:-RRHFLB0100000223
Vehicle Type: - Two Wheeler (bicycles, motor bike).

Read vehicle ID

Did the vehicle N


check-in?

Y
• Do not Fig. 3 Smart Card
Read member ID open
the Gate
• Ring
N
Is the ID Present security
alarm
Y

ID is of the N Fig. 4 Vehicle RFID Tag


Organization? There are four modules in application
• Member registration module:- All the personal
information of the user will be stored in the database.
Y
Send a text • Vehicle registration module:- Vehicle RFID tag will be
message to allocated to user in association with member smart card.
the • Check-in module: - This module will work at the time of
ID same as that N check-in of the vehicle.
registered
associated with mobile • Check-out module: - This module will work at the time
Vehicle number of check-out of the vehicle.

Read Vehicle Information

Store check-out Information


DATABAS
E

• Open the Gate Fig. 5 RFID Reader


• Close the Gate

Fig. 2 Check-out process of parking place


,03$&7
IMPACT-2017

IV. RESULTS Vehicle check-in: - The Fig 8 and Fig 9 are snapshots at the
The application was developed with a user friendly GUI. time of vehicle check-in.
There are some issues which are listed below:-
• Employee is having other employee’s vehicle.
• Check-in and check-out is allowed only in case of
registered user and registered vehicle
• In case of theft there will be alarm to the security and
SMS facility to the authorized employee.
The interface provides the following facilities:-
• Member registration
• Vehicle registration
• Vehicle check-in
• Vehicle check-out
Member registration: - Fig 6 is snapshots at the time of
member registration.

Fig. 8 Vehicle Check-in


Vehicle check-out: - The Fig 9 is snapshots at the time of
vehicle check-out.

Fig. 6 Member registration


Vehicle registration: - The Fig 7 is snapshots at the time of
vehicle registration.
Fig. 9 Vehicle Check-out
V. DISCUSSION
Below are listed the possibilities or situations that would occur
in real life implementation of this smart parking system:
• Authorised user check- in:- This is the routine case
when the authorised user is doing check in and check out of
his vehicle.
• Other members check-in:-This is the case when an
employee is carrying some other employee’s vehicle.
• Vehicle not registered:-In this case the employee or any
other member is tring to get a vehicle in, which is not
registered with the organization.
• Not a member of organization:-In this case the person
trying to get the vehicle in or out is not an employee of the
organization.
• Provide vehicle ID first:- In this case RFID reader
reads the employee ID first or user provides his ID first while
the limitation of this application is that it will read the vehicle
Fig. 7 Vehicle registration ID first.


,03$&7
IMPACT-2017

• Already fetched Vehicle ID:- This case means the RFID The graph also implies 100% accuracy as no
reader reads the vehicle ID again instead of reading the unauthorised person could check-in provided that the RFID
employee ID. reader is placed at an optimum distance.
• MISS:-This case takes place when the reader misses to
read the vehicle ID and employee ID because of distance
limitation.
The application was tested for varying distances of the RFID
reader from the vehicle. The distances chosen were 30cm, 70
cm and 1 m and for each distance the application was tested
60 times. The following graphs were obtained which show the
number of various cases under which check-in was successful
or unsuccessful.
Fig. 13 Comparison of the result
VI. CONCLUSION
This system is very secure for parking; members do not need
to worry about their vehicles and they can focus on their work.
In case of any mishap, members will be updated through
messages. When RFID reader is placed at an optimum
distance the results are 100% accurate; however as the
distance of RFID reader increases from the vehicle the
accuracy of the system decreases because of the limited range
of the RFID tags used. We could use RFID tags with greater
read range to increase the accuracy of the system. This system
Fig. 10 (at a distance of 30cm) also reduces the man-power and attention required as
whenever anything goes wrong the alarm will ring and
security will be alerted before any theft attempt succeeds.

REFERENCES
[1] Z. Pala and N. Inanc, “Smart Parking Applications Using RFID
Technology,” Proc. of 1st Annual RFID Eurasia, pp. 1 – 3, September
2007.
[2] Higgins, N., L., Cairney, T., 2006., RFID opportunities and risks.
Journal of Corporate Accounting & Finance, Vol, 17 (5):51-57.
[3] Zhang, L., 2005. An Improved Approach to Security and Privacy of
RFID application System. Wireless Communications, Networking and
Mobile.
[4] M. S. Umar, J. A. Ansari, and M. Q. Rafiq, “Retail store based on
RFID,” in Proc. Int. Conf. Commun. Syst. Netw. Technol., 2013, pp.
Fig. 11 (at a distance of 70cm) 17–21.
[5] Arun N. Nambiar “RFID Technology: A Review of its Applications”,
Proceedings of the World Congress on Engineering and Computer
Science 2009 Vol II, October 20-22, WCECS 2009.
[6] Goodrum, P.,McLaren, M., Durfee, A.,2006. The application of active
radio frequency identification technology for tool tracking on
construction job sites. Automation in Construction, 15 (3): 292-302.
[7] Prof. Yatin Jog, Anuja Sajeev, Shreyas Vidwans and Chandradeep
Mallick,”Understanding Smart and Automated Parking Technology”
International Journal of u- and e- Service, Science and Technology,
2015.
[8] RFID Takes a Swing at Ticket Fraud, RFID Journal, December 2005,
http://www.rfidjournal.com/article/article view/2060/1/1/A.
[9] Susy d’Hont, “The cutting edge of RFID Technology and Applications
for manufacturing and Distribution”, Texas Instrument TIRIS, 2002.
Fig. 12 (at a distance of 1M)



You might also like