Comm 11

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 47

COLLEGE OF ENGINERING AND TECHNOLOGY

DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING

COMMUNICTAION ENGINEERING

PROJECT TITIL: - Radio Frequency Identification Based Anti-Theft and


tracking system

PREPAIRED BY: ID NO
1. ASHENAFI MOLA 099/06
2. ROMAN HASSEN 491/06
3. SURAFEL MENKIR 566/06
4. HAMDIYA JEMAL 289/06

ADVISOR: -
ii
ACKNOWLEDGMENT
First of all we would like to thank Almighty God for giving strength to finalize this term paper. It is our
pleasure to thank our advisor Mr. Melkamu for being there in guiding and appreciating our work. We also
really appreciate the help of our friends and class mates in finding documents related to this work.

iii
ABSTRACT
This Radio Frequency Identification (RFID) based project tried to answer the problem of security
that highly valuable objects are facing these days. As we all know if stolen these objects could be sold
for really large sum of money in the black market. Considering the high educational and cultural
values these objects have, making sure that they are safe and available to the large public interested
instead of being kept by some individuals has to be a priority. In order to make sure that these objects
remain safe, we have developed a mechanism that involves the use of RFID technology and other
related systems. The project provides a two level security system. The first level comes up with a design
that will have basically two mechanisms that will be used to alert responsible personnel’s when the
security of such objects is being compromised. The first one is a simple sound and light alarm that
will alert the security personnel’s and the second one is GSM (Global System for Mobile) based system
that will send a text message also to the security personnel’s. In addition the system also controls the
doors and windows of the museums by using servo motors which will be activated whenever the alarm
goes off. The second level of security that this project provides is a GPS (Global Positioning System)
based tracking system that will help to track the objects if the criminals happen to successfully
escape the first level of security. The project team has followed the simulation based approach for the
system development. This paper is prepared assuming the actual implementation of the system. If all the
required resources are available for us either from our school or even if we can get them by ourselves, we
are planning on making an experimental project where we will assemble the entire system in the laboratory.

iv
Contents And figures
ABSTRACT .............................................................................................................................................. iv
Abbreviations ........................................................................................................................................ vii
Chapter One............................................................................................................................................ 1
Introduction ............................................................................................................................................ 1
1.1 Background ................................................................................................................................... 2
1.2 Objectives of the Study ................................................................................................................. 3
1.2.1 General Objective ................................................................................................................... 3
1.2.2 Specific Objectives.................................................................................................................. 3
1.3 Statement of the Problem ............................................................................................................. 3
1.4 Scope and Limitations ................................................................................................................... 4
1.5 Methodology................................................................................................................................. 4
Figure 1.1: System development methodology ................................................................................... 6
1.5.1 Process Model ........................................................................................................................ 6
1.5.2 Project Development Tools .................................................................................................... 7
1.6 Significance of the Project ............................................................................................................. 7
Chapter Two ........................................................................................................................................... 8
2. Literature Review................................................................................................................................ 8
Chapter 3 .............................................................................................................................................. 10
System Design and Description ............................................................................................................. 10
3.1 System Design ............................................................................................................................. 10
Figure 3.1: General block diagram of the system .............................................................................. 11
3.2 System Description ..................................................................................................................... 11
Figure 3.2: Displacement detection algorithm .................................................................................. 12
Figure 3.3: System structure ............................................................................................................. 13
Control Diagram ................................................................................................................................... 13
Figure 3.4: Control diagram of the system ........................................................................................ 14
3.3 Hardware Description ................................................................................................................. 14
3.3.1 Microcontroller .................................................................................................................... 14
Figure 3.5: Arduino Uno .................................................................................................................... 14
Figure 3.6: ATmega328 microcontroller ............................................................................................ 17
Figure 3.7: ATmega328 microcontroller pins and their mapping to the Arduino Uno board Pins ..... 18
3.3.2 RFID Tags and Readers ......................................................................................................... 19

v
Figure 3.8: IT36 Low Pro_le Durable Asset Tag .................................................................................. 20
Figure 3.9: IF61 Enterprise RFID Reader ............................................................................................ 21
3.3.3 GSM Module ........................................................................................................................ 22
Figure 3.10: F1003 GSM modem ....................................................................................................... 23
3.3.4 GPS Tracker .......................................................................................................................... 23
3.3.5 Power Supply ....................................................................................................................... 24
Figure 3.11; power supply circuit ...................................................................................................... 24
Figure 3.12: Series regulator ............................................................................................................. 25
Figure 3.13: Simple series regulator .................................................................................................. 25
Figure 3.14: Op-amp series regulator ................................................................................................ 26
3.3.6 Serial to USB Connector ....................................................................................................... 26
Figure 3.16: RS-232 pin specification................................................................................................. 28
3.3.7 Servo Motor ......................................................................................................................... 28
Chapter Four ......................................................................................................................................... 31
4.1 Hardware Implementation .......................................................................................................... 31
Figure 4.1: Hardware implementation of the system. ....................................................................... 31
4.2 Programming and Implementation ............................................................................................. 31
4.2.1 Arduino Development Environment.......................................... Error! Bookmark not defined.
Figure 4.2: The Arduino IDE ............................................................................................................... 32
4.2.2 Proteus Professional 8........................................................................................................... 32
Figure 4.3: Starting window of Proteus Professional 8 ...................................................................... 33
Figure 4.5: Window for selecting devices .......................................................................................... 34
Figure 4.6: Simulation circuit diagram............................................................................................... 35
4.3 Testing and Results .......................................................................... Error! Bookmark not defined.
4.3.1 Testing ....................................................................................... Error! Bookmark not defined.
4.3.2 Results ....................................................................................... Error! Bookmark not defined.
Chapter Five.......................................................................................................................................... 36
Conclusion and Future Works ............................................................................................................... 36
5.1 Summary of Findings ................................................................................................................... 36
5.2 Conclusion ................................................................................................................................... 36
5.3 Future Works .............................................................................................................................. 36
Appendix A ........................................................................................................................................... 38

vi
Abbreviations
2-D-------------------2 Dimensional
3-D-------------------3 Dimensional
AC-------------------- Alternating Current
ADC------------------ Analog to Digital Converter
DC--------------------Direct Current
DTMF---------------- Dual Tone Multi-Frequency
EEPROM------------ Electrically Erasable Programmable Read Only Memory
EMW------------------Electromagnetic Wave
GPS-------------------Global Positioning System
GSM------------------Global System (or Standard) for Mobile
HW--------------------Hardware
IC----------------------Integrated Circuit
IDE-------------------- Integrated Development Environment
I/O---------------------Input/Output
LCD-------------------liquid Crystal Display
LED------------------- Light-Emitting Diode
MCU & _C---------- Microcontroller
PC --------------------Personal Computer
PWM----------------- Pulse Width Modulation
RF--------------------Radio Frequency
RFID----------------- Radio Frequency Identication
RISC----------------- Reduced Instruction Set Computing
SIM-------------------Subscriber Identity Module
SMS----------------- Short Message (or Messaging) Service
SRAM --------------Static Random Access Memory
UHF -----------------Ultra High Frequency
USB------------------Universal Serial Bus
VB--------------------Visual Basic
VIN--------------------Input Voltage

vii
Physical Constants
Speed of Light c = 2.99792458 *108ms-s (exact)

viii
Chapter One

Introduction
Semi-automation is the use of control systems and information technologies in corporation with the
available man power to reduce the need for human work in the production and service providing areas.
The complete manual system expected human operators to accomplish the required work entirely on their
own. And this approach has shown to be inefficient many times in history. On the other hand,
semi-automated systems greatly decrease the complete dependency for human sensory and mental
requirements. In addition, the implementation of such systems plays an increasingly important role in
the world economy and in our daily experience.[2] Although there are a range of areas on which
semi-automated systems can be applied, in this particular project we focused on its application for securing
objects. Security is one of the main issues that the world we are living in is highly concerned about
these days. Although deferent studies have come up with many solutions in order to make sure that the
human need for security is fulfilled, one of the major advancements in security in the past 60 years has been
the development of RFID systems. The effective use of systems involving RFID technology combined
with other technologies available will not only eliminate the problems With the highly insecure manual
system, but it will also decrease the probability of valuable objects being lost for long at greater levels. In
times where automated systems are being chosen over manual systems in everyday aspects of life,
this project has come up with a mechanism in which objects of high value can be protected using a
system that can be implemented with very low cost and time. Making sure that these objects remain safe
and in places where they should be is not something that is of low priority[1].

1
1.1 Background
The idea of semi-automated security system which uses RFID technology has been implemented in many
projects all over the world. The systems we have been able to review so far used a large amount of money
compared to the amount we will be spending for the implementation of this project. The last but not the
least important distinguishing feature of this project is the fact that there is no human involvement in the
entire alarming and tracking initiation process. The system will do both tasks by itself and the only human
involvement required is in catching the criminals once the system alarm is activated and tracking the
location of the objects. In general, What makes our project different from all these projects is the fact that
it includes a tracking system that is integrated with the main system, a database to help identify the objects
missing and the tracking devices to be activated, and two alarming mechanisms that will be used in
alarming the security personnel. Other distinguishing areas include the two layer security system it includes
and the cost required to implement the system. As we all know in countries like Ethiopia, using a lot more
advanced security systems that require technologies that are very latest and are very expensive is almost
unimaginable. The infrastructures and resources available doesn't allow for such systems to be
implemented. Due to these reasons, the security mechanisms that have been implemented in areas of our
interest so far in our country has been manual and very weak. In order to come up with a better and more
reliable security system, we proposed this system we developed in this project. This system uses the most
available resource that can be extracted and used easily; the Radio Frequency. The implementation of this
system is not only reliable but it is also highly cost effective considering the amount of money a museum
or other related place in our country can budget for security purpose. The systems application can be
expanded and implemented to other areas with very little medications as well. Some of the other
implementation areas include library management systems, identification based access control systems,
breach detector systems, examination hall management systems, attendance management systems, car
parking management systems, and container identification and tracking systems. Although the system
can be applied in all sorts of areas, our project focused on the security of objects of high value in
museums and other related places.

2
1.2 Objectives of the Study
1.2.1 General Objective
 The main objective of this project is to design, model and if possible implement a System that will
heighten the security of high valued objects in museums and other related places and at the same
time reducing the complete dependency on the highly inefficient manual system.

1.2.2 Specific Objectives


 To provide easy and modern object management system in museums: This computerized object
monitoring and management system is going to provide a very modern and well organized object
management system that is much better than what is currently being implemented in the above
places.
 To aid technology transfer: This is also one of our objectives. In developed countries, everything
is automated. Bringing new technologies and implementing them with low costs in our society
will help fasten our country’s development process.
 Develop a system and tag identification algorithm that can interact with the RFID tags at the
desired distance.
 Develop optimized property management program that will give the required services and can be
managed by users with basic knowledge of computers.
 Integrate RFID module with the system.
 If experimental project is done, develop and test the prototype.
 Build a low cost Anti-Theft and Tracking System.

1.3 Statement of the Problem


We all wanted our senior project to mean something more than a grade matter for us. We wanted to solve
a real time problem which exists in our environment. We have been paying attention to every problem
around us in order for us to take advantage of our senior project opportunities to do something valuable.
Ever since we were kids, we grew up hearing about a number of arts being stolen from museums, churches
and mosques in deferent parts of our country. The security problems these objects of high value placed
in museums and other rela ted places are facing have even increased in recent times. In our country
Ethiopia, since the security system is completely manual and very inefficient, the security of these objects
is being compromised highly. Evidences show that the amount of high valued objects that are being stolen
is increasing each year. And only really small number of these is recovered. All this clearly showed us there
is a need for better security mechanisms in order to secure these objects. RFID being one of the modern
technologies available for securing objects made us think of implementing it for this particular problem.
The highly efficient identification mechanism of the RFID technology combined with the GSM and GPS
technologies could be used for increasing the security level of these objects. And as engineering students
we wanted to come up with a design that will be a solution for this particular problem using the
above mentioned technology. As a result we designed this project which intends to give a solution that can
be implemented and effectively used in developing countries like ours. The system we developed uses a
reliable and modern technology which is at the same time very cheap to implement, in order to heighten
the security of the objects of our interest. It also will modernize the way in which material management not
in museums and other related places has been approached. It will also solve the problems that will arise
from dependency on the efficiency of the manual system. In addition, the same system can be
applied to deferent areas with little modification to provide high level security for deferent objects.

3
1.4 Scope and Limitations
The RFID Based Anti-Theft and Tracking system has much functionality. Below we have listed the scope
in which the system we have designed can be applied.
 Alarming the security personnel’s: Whenever there is an object or objects whose security
is being compromised the system will alarm the security personals by using two alarming
mechanisms; sound alarm and SMS text indicating the specific object that is being stolen.
 Manages the objects by using a centralized database: For this system we integrated a
database that will store all the necessary information about the objects being secured and associate
each object with a specific identification number that is stored on the RFID tag.
 Track the objects if the criminals manage to escape the first level of security: If the criminals
manage to escape the security personnel’s, the system will provide another level of security
by providing a tracking capability and showing the location of the objects that are missing.
One of the setbacks of this part of the system is, if the criminals are highly skilled and professionals
(although the probability of this being the case in our country is very low), they can cover the
object with a conductor sheet and make tracking impossible. This is because of the fact
that EMWs cannot penetrate a conductor. Although this might make the tracking part of the
system unnecessary, we know that almost all systems in the world have their own drawbacks.
Therefore we wanted to develop the system with this particular limitation in mind.

This RFID based system can be applied to many different areas other than the one we are
discussing here with very little modifications. Some of the areas are listed below.
 Library management systems
 Identification based access control systems
 Breach detector systems
 Examination hall management systems
 Attendance management systems
 Car parking management systems
 Container identification and tracking systems and so many others.
Although there are a number functionalities our project provides as discussed above, it also has its own
limitations. Below we have tried to discuss the major limitations that the system could face.
 The system cannot provide detecting as well as tracking service if the object is covered with a
conductor sheet because the signals that the system uses, i.e. EMWs cannot travel through a
conductor surface.
 The system cannot provide tracking service if the tracker is removed from the object.
 The system doesn't work if there is no power.
 The system doesn't work if it is bombarded with a signal that has higher frequency than the
system's frequency of operation.

1.5 Methodology
The methodology we have followed during the development of this project which starts from the project
title selection up to the complete project submission is presented in the following section diagrammatically.
As the system contains both hardware and software designs, these designs are developed separately. Both
the software and hardware designs are developed separately and will be integrated at last. The design
methodology is explained in figure 1.1 with a general flow chart. As it can be seen in the flowchart from

4
figure 1.1 the project starts by discussing several possible topics with the supervisor. After a topic has been
selected, additional discussions were done in order to understand the concept and objectives of the project.
Then, literature review was done and the background of the project was studied in detail by referring to
various sources such as journals, articles, reference books, lecture notes and data sheets. Once the software
and hardware designs are completed individually they will be integrated. Then the system will be ready for
experimental testing. In the redesign and troubleshooting part, any problem faced defects or inadequacies
and improvements required will be fed back to the previous stages. Redesign and troubleshooting processes
will be carried out in case the output obtained is not as expected. This process will keep repeating until a
result that meets the objectives of the project is found. Finally, the project would be realized and ready for
presentation to panel for verification.

5
Figure 1.1: System development methodology

1.5.1 Process Model


There are different types of process models used in developing different systems. From those available
models we choose the modified Waterfall model which is more applicable to in our system. The Modified
Waterfall model takes the fundamental validation and evolution of specifications, development
specifications, software design, implementation, testing and so on. Referring to figure ??, the waterfall
model is a sequential design process, often used in software development processes, in which progress is
seen as owing steadily downwards (like a waterfall) through the phases of conception, initiation, analysis,
design, construction, testing and maintenance. The waterfall model proceeds from one phase to the next in
a sequential manner. For example, one first completes requirements specification. When requirements are
completed, one proceeds to design. The software in question is designed and a blueprint is drawn for
implementers (coders) to follow. This design should be a plan for implementing the requirements given.
When the design is complete, an implementation of that design is made by coders. Towards the later stages

6
of this implementation phase, separate software components produced are combined to introduce new
functionality and reduced risk through the removal of errors.

1.5.2 Project Development Tools


Hardware: For the successful completion of this project we will need the following tools.
 Personal Computer
 Microcontroller
 GPS module
 GSM module
 RFID tags
 RFID reader
 Speaker
 Circuit board
 Serial to USB cable
 Connector cables
 Cellphone
 Voltage regulators
 Diodes and resistors
 Servo motor
Software: For the software part of the project we are going to be using the following tools.
 Proteus
 MySQL
 Eclipse

1.6 Significance of the Project


This project has much significance that makes it preferable for countries like ours. Some of them are
discussed below. The system has one of the highly deciding factor when it comes to security; reliability.
Reliability is one such factor that every electrical system should have in order to render its services without
malfunctioning over a long period of time. We have designed our kit using microcontroller which is itself
very reliable and also operates very efficiently under normal conditions. In addition, the system could be
implemented using very low cost compared to other similar systems. This makes it very realistic for
implementing it in our country. Also the relative simplicity of the project reduces the need for highly skilled
personnel’s for managing it.

7
Chapter Two

2. Literature Review
Throughout the development of our project we were able to review some projects, journals, articles and
books which are related to the title of our project. We believe that all the reviewed materials have been a
good asset for the overall design and development of the project we have chosen. In this section some of
the related projects we have reviewed are discussed.
Vehicle Theft Alarm And Tracking The Location Using RFID & GPS: In this paper C. Ram Kumar,
B. Vijayalakshmi, Dr C. Ramesh and Dr S. Chenthur Pandian aimed to design a new fashion auto-guard
system which is a smart measurement generalized in the automobile security area. In this technique, both
security and tracking of the vehicle is done. The System consists of a microcontroller circuit board, keypad,
alarm system and a display board. The password is given using a keypad and displayed on the display board
in a decrypted form. If the given password does not match with the original password, then the alarm sound
will be heard and message (location of the vehicle) will be sent to the authorized person with the help of
GSM module. Thus if unauthorized person uses the system, then the GPS will track the region of particular
latitude and longitude and the GSM module will send a text message to the authorized person's mobile.
ATMEGA 162V microcontroller is used to control all of the inputs and outputs for the system. The
microcontroller essentially acts as the brain of the design; it reads all of the input data and processes it for
further actions to be taken. If a wrong entry of password is detected, this will imply that the car is being
tried to be accessed by an unauthorized person. The RFID tag on the car will be activated by the signal that
will be generated from the RFID reader. Once the information stored in the tag is accessed by the reader, it
will then be transferred to the microcontroller, where it will be used in identifying the particular car of the
owner. The GSM modem used is a specialized type of modem which accepts a SIM card and can operate
over a subscription to a mobile operator, just like a mobile phone. It uses a process called circuit switching.
This method of communication allows a path to be established between two devices. In addition, the GPS
system will be used in tracking and identifying the exact location of the missing car.
Strength
Low power consumption.
 Reliability.
 Provides many levels of security.
 Certainty in the fact that a missing car will be found unless skilled professionals are the ones who
is doing the crime, in which case time will be another factor.
Weakness
 It needs the password to be entered every time the car needs to be accessed even by the owner.
 It doesn’t consider the fact that even the right user can be mistaken when trying to enter the
password.
RFID-Based Anti-theft Auto Security System with an Immobilizer: In this Second paper we reviewed
Geeth Jayendra, Sisil Kumarawadu and Lasantha Meegahapola aimed at making sure a hijacked vehicle
will not be able to move and at the same time securing the passengers on it. The intelligent immobilising
system basically consists of transmitting unit, receiving unit, and intelligent vehicle interfacing unit. The
data receiver is embedded to the intelligent vehicle control system whereas the transmitter unit is kept with
the vehicle owner. This enables an active communication path between the vehicle and the owner (or

8
driver), as long as the two ends are within the operating range of 200m. Unlike the other security systems,
which are embedded with the vehicle key, in this system there is relatively high probability of misleading
the hijackers also enabling the vehicle owner to immobilize the vehicle within a safe distance. At one single
press of the disabling button, the transmitter transmits a unique tag, which is captured and recovered by the
receiving system at the vehicle. The tag is identified by the receiver microcontroller using its special data
recovery algorithm. Then, suitable disabling signals will be generated to bring down the vehicles speed to
zero in a step by step manner. One of the key design features is that, when vehicle is immobilized using
this system, the vehicle can be restarted only by the transmitting unit's enabling button.
Strength
 Secures the car and keeps the safety of passengers.
 Gives misleading information to hijackers since the activation button is not located on the key.
 Immobilizes the car in a step by step manner.
 Good data identification and processing system.
 Gives the same efficiency in different climatic conditions.
 Gives great signal reception under different distortion conditions.
Weakness
 Small operation range, i.e. the distance between the vehicle control system and the transmitter unit
is small.
 Since the entire immobilizing system is located in the car, if skilled, the hijackers can easily
eliminate the system and be able to take the vehicle.

9
Chapter 3

System Design and Description


3.1 System Design
When beginning this project the general design and development of the project basically had two
possibilities that depended on the approach we were going to follow. The two approaches are the simulation
based and the experimental approaches. The determining factor in choosing the approach to be followed
was the accessibility of required materials in order to implement the entire system. As a result, the system
design methodology to be used for the system development will depend on the approach selected. If we are
able to find all the required materials, the project will be experimental. Hence, there will be both hardware
and software designs needed. The design of the software and hardware parts of the system will be made
separately. When the two systems are completely finished, the integration of the systems will be conducted.
On the other hand, if we are unable to find any of the required materials, we will be forced to do a simulation
based system. Having said that, below we have discussed steps that will be followed during the
implementation of the system in both the available approaches.
The system design in the case where we will be following the experimental approach will include the
following processes.
1. Gather information and references that will help us develop the conceptual framework that the
system will use. Also gather information about materials equipment that are required for the
project implementation. This will be the basis for the development of a working system.
2. Detailed study of required definitions and specifications of the components needed and the
compatibility of the chosen hardware to the software to be made.
3. In this step, we will develop algorithms, flowcharts and codes for the software part of the design
and block diagrams, schematic diagrams and wiring diagrams will be made for the hardware part
of the system.
4. At this stage we will test and debug the software, checking if the database is correct and also the
hardware, checking whether it is working properly or not.
5. Integrate the software and hardware parts checking them simultaneously and making sure all the
desired communications are taking place.
6. Finally we will do testing of the complete system and compare the results obtained with what we
have been expecting during the development of the system.
If we select the approach for development of the system to be simulation based, the system design steps we
will be following will include the following processes.
1. Gather information and references that will help us develop the conceptual framework that the system
will use. This will be the basis for the development of a working system.
2. Detailed study of the required soft wares that are going to help us in developing the simulation for the
system.
3. Develop algorithm, flowchart and codes for the software part of the design and start developing the
schematic and wiring diagrams of the system on the simulation software.

10
4. At this stage we will test and debug the software checking if the database is correct and also the simulation
checking whether it is working properly or not.
5. Try to integrate the simulation system with the software part of the design if possible.
6. If step 5 happens to be successful, finally we will do testing of the complete system and compare the
results obtained with what we have been expecting during the development of the system.
A general block diagram of the system (assuming experimental based approach) is given below. The three
main blocks have many components inside. The development of each of those components is discussed in
the next section.

Figure 3.1: General block diagram of the system

3.2 System Description


On the objects to be secured block of the system as shown in figure 3.1 we will basically have two main
components. These are the RFID tags and the GPS tracking devices attached to the objects. The RFID tags
are the components that are going to be used for identifying the object whose security is being compromised.
Whereas the GPS tracking device attached to the object will be used in tracking the object if the criminals
happen to successfully leave the area. When we come to the security system side of the block diagram, it
will contain the RF reader, microcontroller, PC, sound and light alarm system and GSM Module. The RF
reader is the one that is going to be used in detecting the information that has been transmitted from the
tags. There are basically two types of tags we could use; active and passive tags. But for the implementation
of this project we decided to use the active tag since it has its own power source attached with it and has
very efficient power consumption. Whenever any of the objects being secured are moved, the active tags
will start transmitting the unique identification number that is stored on them. This is detected by using the
simple principle relating distance speed and time. We know that the signal being detected by the reader is
an EMW which travels at a speed which is approximately equal to 3*108m/s, i.e. the speed of light.

11
Figure 3.2: Displacement detection algorithm

Therefore if we set up the reader and the tag at a distance that is known and fixed, then we can easily
calculate the time it will take the RF signal to reach the reader form the tag.
Time = distance/speed (3.1)
The algorithm by which the system will determine if the object has been misplaced or not is given in figure
3.2.
Therefore whenever the reader gets the tag identification the microcontroller will compare the time it took
the reader to get the tag identification with the already calculated distance.
If the time is greater/lower than the constant time that is already calculated, then we can clearly see that the
object is being moved, which then we can use to let the microcontroller know that an object's security is
being compromised and the microcontroller will take the next appropriate decision. Once this unique
information from the tag has been received by the RF reader and detected that the object is moving, it will

12
then be transferred to the PC through the microcontroller for identifying which object is associated with
it.The PC will do this by comparing the unique identification number with the once stored on the database.
The database for this purpose is developed using MySQL. We used MySQL because it is available for free
and easy to set up. Once the object is identified, the PC will notify the microcontroller which object is being
in danger. The information stored in the database that is being transferred to the microcontroller doesn’t
necessarily need to be the name of the object whose security is being compromised. It could also include
other additional information such as the position of the object in the museum and the gates and windows
near that specific object. The microcontroller will then send appropriate signals to activate the sound and
light alarm and shut the gates and windows. In addition it also send a custom text message, which is already
developed, to the security personnels using the GSM module, telling which object is being stolen an d other
additional information obtained from the database so that they can focus on that specific area instead of
looking around the entire museum trying to find where that specific object is being placed. This part of the
system shows the minimum dependence of the system on the efficiency of the manual system, which is one
of the objective as well as advantage of the system. Finally If the criminals manage to escape all the above
security measures, the microcontroller will send a text message to the GPS+GSM tracker attached to the
object being stolen. Once that text is received by the tracking device it will send back location information
as well as other information that could be necessary depending on the code we sent in the text message.
Finally the location information obtained could be used in any map software (such as Google Map) in order
to determine the exact location of the object. The general structure of the system including the elements
discussed above is given below.

Figure 3.3: System structure

Control Diagram
The controlling system is mostly dependent on the microcontroller which is the core of the entire system.
Servo motor and door/window are the actuators of the system which accept command from the
microcontroller to lock and unlock the door/window automatically. A serial port interfacing is used to
connect the computer with the microcontroller.

13
Figure 3.4: Control diagram of the system
3.3 Hardware Description
In implementing the system using hardware’s we will be using different devices with their own
specifications and connection requirements. In this section of the paper we have discussed the main devices
that are required for the actual implementation of the system in great detail.

3.3.1 Microcontroller
A microcontroller (also MCU or C) is a computer-on-a-chip. Microcontrollers are frequently used in
automatically controlled products and devices, such as automobile engine control systems, remote controls,
once machines, appliances, power tools, and toys. The reduced size, cost, and power consumption compared
to a design using a separate microprocessor, memory, and input/output devices, microcontrollers make it
economical to electronically control many more processes.
3.3.1.1 Arduino Uno
Arduino is an open-source computer hardware and software company, project and user community that
designs and manufactures kits for building digital devices and interactive objects that can sense and control
the physical world. Arduino boards may be purchased preassembled, or as do-it-yourself kits; at the same
time, an Arduino from scratch.

Figure 3.5: Arduino Uno


The project is based on a family of microcontroller board designs manufactured primarily by Smart Projects
in Italy, and also by several other vendors, using various 8-bit Atmel AVR microcontrollers or 32-bit Atmel
ARM processors. These systems provide sets of digital and analog I/O pins that can be interfaced to various
extension boards and other circuits. The boards feature serial communications interfaces, including USB

14
on some models, for loading programs from personal computers. For programming the microcontrollers,
the Arduino platform provides an integrated development environment (IDE) based on the Processing
project, which includes support for C and C++ programming languages. The Arduino Uno is one of the
widely used Arduino boards available out there. It is a microcontroller board based on the ATmega328. It
has 14 digital input/output pins (of which 6 can be used as PWM outputs), 6 analog inputs, a 16 MHz
ceramic resonator, a USB connection, a power jack, an ICSP header, and a reset button. It contains
everything needed to support the microcontroller; we can simply connect it to a computer with a USB cable
or power it with a AC-to-DC adapter or battery to get started. The Arduino Uno has the following main
features. [4, 6, 7]

 An open source design. The advantage of it being open source is that it has a large community of
people using and troubleshooting it. This makes it easy to find someone to help you debug your
projects.
 An easy USB interface. The chip on the board plugs straight into your USB port and registers on
your computer as a virtual serial port. This allows you to interface with it as through it were a
serial device. The benefit of this setup is that serial communication is an extremely easy (and time-
tested) protocol, and USB makes connecting it to modern computers really convenient.
 Very convenient power management and built-in voltage regulation. You can connect an external
power source of up to 12v and it will regulate it to both 5v and 3.3v. It also can be powered directly
o_ of a USB port without any external power.
 An easy-to-find, and dirt cheap, microcontroller "brain." The ATmega328 chip retails for a very
small price. It has countless number of nice hardware features like timers, PWM pins, external
and internal interrupts, and multiple sleep modes.
 A 16 MHz clock. This makes it not the speediest microcontroller around, but fast enough for most
applications.
 32 KB of ash memory for storing your code.
 13 digital pins and 6 analog pins. These pins allow you to connect external hardware to your
Arduino. These pins are key for extending the computing capability of the Arduino into the real
world. Simply plug your devices and sensors into the sockets that correspond to each of these pins
and you are good to go.
 An ICSP connector for bypassing the USB port and interfacing the Arduino directly as a serial
device. This port is necessary to re-bootload your chip if it corrupts and can no longer talk to your
computer.
 An on-board LED attached to digital pin 13 for fast an easy debugging of code.
 And last, but not least, a button to reset the program on the chip.

3.3.1.2 ATmega328
Features:-

 High Performance, Low Power AVR 8-Bit Microcontroller


 Advanced RISC Architecture
 131 Powerful Instructions Most Single Clock Cycle Execution
 32 x 8 General Purpose Working Registers
 Fully Static Operation
 Up to 20 MIPS Throughput at 20 MHz
 On-chip 2-cycle Multiplier
 High Endurance Non-volatile Memory Segments

15
 4/8/16/32K Bytes of In-System Self-Programmable Flash progam memory (AT-
mega48PA/88PA/168PA/328P)
 256/512/512/1K Bytes EEPROM (ATmega48PA/88PA/168PA/328P)
 512/1K/1K/2K Bytes Internal SRAM (ATmega48PA/88PA/168PA/328P)
 Write/Erase Cycles: 10,000 Flash/100,000 EEPROM
 Data retention: 20 years at 85C/100 years at 25C(1)
 Optional Boot Code Section with Independent Lock Bits
 In-System Programming by On-chip Boot Program
 True Read-While-Write Operation
 Programming Lock for Software Security
 Peripheral Features
 Two 8-bit Timer/Counters with Separate Prescaler and Compare Mode
 One 16-bit Timer/Counter with Separate Prescaler, Compare Mode, and Capture Mode
 Real Time Counter with Separate Oscillator
 Six PWM Channels
 8-channel 10-bit ADC in TQFP and QFN/MLF package
 Temperature Measurement
 6-channel 10-bit ADC in PDIP Package
 Temperature Measurement
 Programmable Serial USART
 Master/Slave SPI Serial Interface
 Byte-oriented 2-wire Serial Interface (Philips I2C compatible)
 Programmable Watchdog Timer with Separate On-chip Oscillator
 On-chip Analog Comparator
 Interrupt and Wake-up on Pin Change
 Special Microcontroller Features
 Power-on Reset and Programmable Brown-out Detection
 Internal Calibrated Oscillator
 External and Internal Interrupt Sources
 Six Sleep Modes: Idle, ADC Noise Reduction, Power-save, Power-down, Standby and
Extended Standby
 I/O and Packages
 23 Programmable I/O Lines
 28-pin PDIP, 32-lead TQFP, 28-pad QFN/MLF and 32-pad QFN/MLF
 Operating Voltage
 1.8 - 5.5V for ATmega48PA/88PA/168PA/328P
 Temperature Range
 -40C to 85C
 Speed Grade
 0-20MHz@1.8-5.5V
 Low Power Consumption at 1 MHz, 1.8V, 25C for ATmega48PA/88PA/168PA/328P
 Active Mode: 0.2 mA
 Power-down Mode: 0.1 A
 Power-save Mode: 0.75 A (Including 32 kHz RTC)

16
Figure 3.6: ATmega328 microcontroller

3.3.1.3 ATmega328 Pin Mapping and Arduino Uno Pins Functionality


The Arduino Uno is a microcontroller board based on the ATmega328. It has 14 digital input/output pins
(of which 6 can be used as PWM outputs), 6 analog inputs, a 16 MHz ceramic resonator, a USB connection,
a power jack, an ICSP header, and a reset button. It contains everything needed to support the
microcontroller. Each pin on the Arduino Uno board is connected to the ATmega 328 microcontroller.
Below we have shown a figure showing the relation between the Arduino Uno board pins and the
ATmega328 pins. Figure 3.7: ATmega328 microcontroller pins and their mapping to the Arduino Uno
board pins

17
Figure 3.7: ATmega328 microcontroller pins and their mapping to the
Arduino Uno board Pins[5]
 VIN. The input voltage to the Arduino board when it's using an external power source (as opposed
to 5 volts from the USB connection or other regulated power source). You can supply voltage
through this pin, or, if supplying voltage via the power jack, access it through this pin.
 5V.This pin outputs a regulated 5V from the regulator on the board. The board can be supplied
with power either from the DC power jack (7 - 12V), the USB connector (5V), or the VIN pin of
the board (7-12V). Supplying voltage via the 5V or 3.3V pins bypasses the regulator, and can
damage your board. We don't advise it.
 3V3. A 3.3 volt supply generated by the on-board regulator. Maximum current draw is 50 mA.
 GND. Ground pins.
 IOREF. This pin on the Arduino board provides the voltage reference with which the
microcontroller operates. A properly configured shield can read the IOREF pin voltage and select
the appropriate power source or enable voltage translators on the outputs for working with the 5V
or 3.3V.
The pins whose function is explained above are known as power pins. In addition to these pins the Uno has
6 analog inputs, labeled A0 through A5, each of which provide 10 bits of resolution (i.e. 1024 different
values) and 14 digital I/O pins.
There are also additional pins with specialized functions:
 Serial: 0 (RX) and 1 (TX). Used to receive (RX) and transmit (TX) TTL serial data. These pins
are connected to the corresponding pins of the ATmega8U2 USB-to-TTL Serial chip.
 External Interrupts: 2 and 3. These pins can be configured to trigger an interrupt on a low value,
a rising or falling edge, or a change in value.
 PWM: 3, 5, 6, 9, 10, and 11. Provide 8-bit PWM output with the analog Write() function.

18
 SPI: 10 (SS), 11 (MOSI), 12 (MISO), 13 (SCK). These pins support SPI communication using the
SPI library.
 LED: 13. There is a built-in LED connected to digital pin 13. When the pin is HIGH value, the
LED is on, when the pin is LOW, it's o_.
 TWI: A4 or SDA pin and A5 or SCL pin. Support TWI communication using the Wire library.
 AREF. Reference voltage for the analog inputs. Used with analog Reference().
 Reset. Bring this line LOW to reset the microcontroller. Typically used to add a reset button to
shields which block the one on the board.

3.3.2 RFID Tags and Readers


3.3.2.1 RFID Tags
The tag is the basic building block of RFID. Each tag consists of an antenna and a small silicon chip that
contains a radio receiver, a radio modulator for sending a response back to the reader, control logic, some
amount of memory, and a power system. The power system can be completely powered by the incoming
RF signal, in which case the tag is known as a passive tag. Alternatively, the tags power system can have a
battery, in which case the tag is known as an active tag. The primary advantages of active tags are their
reading range and reliability. With the proper antenna on the reader and the tag, a 915MHz tag can be read
from a distance of 30 meters or more. The tags also tend to be more reliable because they do not need a
continuous radio signal to power their electronics. Passive tags, on the other hand, can be much smaller and
cheaper than active ones because they don’t have batteries. Another advantage is their longer shelf life:
Whereas an active tags batteries may last only a few years, a passive tag could in principle be read many
decades after the chip was manufactured. Between the active and the passive tags are the semi-passive tags.
These tags have a battery, like active tags, but still use the reader’s power to transmit a message back to the
RFID reader using a technique known as backscatter. These tags thus have the read reliability of an active
tag but the read range of a passive tag. They also have a longer shelf life than a tag that is fully active. In
addition to the source of energy they use to transmit the information stored on it, the RFID tags can be
classified based on the frequency range they operate in. Their operating frequency ranges from low
frequencies to ultrahigh frequencies. The operating frequency also determines the range at which the tags
could be read. RFID tags also come in many different shapes and sizes.RFID tags can be promiscuous, in
which case they will communicate with any reader. Alternatively, they can be secure, requiring that the
reader provide a password or other kind of authentication credential before the tags respond. The vast
majority of RFID tags that have been deployed are promiscuous. Not only are these tags cheaper, but the
systems also are much easier to manage. Systems that employ passwords or encryption codes require that
the codes be distributed in advance and properly controlled. This is an exceedingly difficult management
problem. The simplest RFID chips contain only a serial number. Which can be considered as burned into
the chip by the manufacturer, it is also common for the chips to be programmed in the field by the end user.
Some chips will accept only a single serial number, while other chips allow the serial number to be changed
after it is burned in. More sophisticated RFID chips can contain read-write memory that can be programmed
by a reader. Chips can also have additional high level functionalities such as sensors, self- destruct or kill
feature. The particular RFID tag we are planning on using is known as IT36 Low Profile Durable Asset
Tag. The IT36 is tuned for a wide frequency band to include both FCC and ETSI regions and is optimized
primarily for non- metal surfaces, such as reusable plastic containers and wooden and plastic pallets. It has
the following [4]

19
Features.
 It is non-metal.
 Operating frequency: UHF Global 860-960 MHz
 Length: 111.5mm.
 Width: 21.8mm.
 Direct application materials: Cardboard, plastic and wood.
 Attachment methods: Screws/rivets 25 mil foam tape.
 Typical read range: 11m.
 IC: Impinj Monza 4QT.
 EPC code max. Size: 128 bit.
 Unique serial number size: 48 bit.
 User memory: 512 bit.
 Min. operating temp.: 40oc.
 Max. Operating temp.:+82:2oc.
 Min. storage temp.: 40oc.
 Max. Storage temp.: +93:3oc.

Figure 3.8: IT36 Low Pro_le Durable Asset Tag

3.3.2.2 RFID Readers


The RFID reader sends a pulse of radio energy to the tag and listens for the tags response. The tag detects
this energy and sends back a response that contains the tags serial number and possibly other information
as well.In simple RFID systems, the readers pulse of energy functioned as an on -o_ switch; in more
sophisticated systems, the readers RF signal can contain commands to the tag, instructions to read or write
memory that the tag contains, and even passwords. Historically, RFID readers were designed to read only
a particular kind of tag, but so-called multimode readers that can read many different kinds of tags are
becoming increasingly popular.RFID readers are usually on, continually transmitting radio energy and
awaiting any tags that enter their field of operation. However, for some applications, this is unnecessary
and could be undesirable in battery-powered devices that need to conserve energy. Thus, it is possible to
configure an RFID reader so that it sends the radio pulse only in response to an external event. Like the tags

20
themselves, RFID readers come in many sizes. The largest readers might consist of a desktop personal
computer with a special card and multiple antennas connected to the card through shielded cable. Such a
reader would typically have a network connection as well so that it could report tags that it reads to other
computers. The smallest readers are the size of a postage stamp and are designed to be embedded in mobile
telephones.

Figure 3.9: IF61 Enterprise RFID Reader


The particular RF reader we are planning on using is the IF61 Enterprise RFID Reader. The IF61 Enterprise
Reader is the most powerful combination of reader and network appliance for running RFID applications,
delivering faster processing at the edge of the network and faster decision making at the point of activity.
Applications written in Java, JavaScript, VB.NET, or C#. NET can run on the IF61 enabling it to filter,
store and manipulate information from tags and send to a server in a required format. In addition, it can
monitor external sensors and control audible and visual indicators without the expense, and potential
additional point of failure, of a separate server. The reader has the following main features.
 Linux platform for Java, JavaScript, C# .NET and VB.NET applications.
 Intermec Basic Reader Interface (BRI) support.
 EPC LLRP support.
 Intermec Advanced RFID Extensions (ARX) Support.
 Additional memory options.

21
 Wi-Fi (802.11) fixed reader option or on handheld computer.
 Ethernet support.
 Internal power supply.
 4 antenna ports.
 Multi-regional options.

3.3.3 GSM Module


GSM module is a device used to establish communication between a computer and a GSM system. GSM
module consists of a GSM modem assembled together with power supply circuit and communication
interfaces (such as RS-232, USB, etc.) for computer. GSM modem is a class of wireless modem devices
that are designed for communication of a computer with the GSM network. It requires a SIM card just like
mobile phones to activate communication with the network. Also they have IMEI (International Mobile
Equipment Identity) number similar to mobile phones for their identification. A GSM modem can perform
the following operations:
1. . Receive, send or delete SMS messages in a SIM.
2. . Read, add, search phonebook entries of the SIM.
3. . Make, Receive, or reject a voice call.
The modem needs AT commands, for interacting with processor or controller, which are communicated
through serial communication. These commands are sent by the controller/processor. The modem sends
back a result after it receives a command. Different AT commands supported by the modem can be sent by
the processor/controller/computer to interact with the GSM cellular network. The particular GSM module
we are planning on using is known as F1003 GSM modem. It is based on 2G GSM network and adopts
industrial wireless GSM module. It supports SMS and CSD function. F1003 GSM modem is designed with
industrial standard and has been widely used on finance, water supply, environment protection, electric
power system, and post and weather fields. It has the following specifications.
 Wireless Specification
 EGSM900/GSM1800.
 Compliant to GSM phase 2/2+.
 Support DTMF.
 Support SMS and CSD function.
 Standard AT command interface.
 Hardware System
 Interface:
 RS232 serial port, rates: 110 230400bits/s.
 Indicator lights: Power, ACT, Online.
 Antenna interface: standard SMA female interface, 50 ohm SIM/UIM interface: standard user card
interface.
 Power interface: standard 3-PIN power jack.
 Power supply:
 Standard power supply: DC 12V/0.5A Power range: DC 5 35V.
 Wireless module:
 High-powered industrial GSM module.
 Size:
 Outline dimension: 91x58.5x22 mm.
 Weight: 630 g

22
 Others:
 Operation temperature:-25 +65oC Storage temperature: -40 +85oC Humidity: 95% (unfreezing).

Figure 3.10: F1003 GSM modem


3.3.4 GPS Tracker
Global Positioning System (GPS) is a worldwide radio-navigation system formed from the constellation of
24 satellites and their ground stations [8]. The GPS tracking system is a method of working out exactly
where something/someone is.A GPS tracking system uses the Global Navigation Satellite System (GNSS)
network. This network incorporates a range of satellites that use microwave signals that are transmitted to
GPS devices to give information on location, vehicle speed, time and direction. So, a GPS tracking system
can potentially give both real-time (active) and historic navigation (passive) data on any kind of
journey.GPS provides special satellite signals, which are processed by a receiver. These GPS receivers not
only track the exact location but can also compute velocity and time. The positions can even be computed
in three-dimensional views with the help of four GPS satellite signals. The Space Segment of the GPS
consists of 27 Earth-orbiting GPS satellites. There are 24 operational and 3 extra (in case one fails) satellites
that move round the Earth each 12 hours and send radio signals from space that are received by the GPS
receiver. The control of the Positioning System consists of different tracking stations that are located across
the globe. These monitoring stations help in tracking signals from the GPS satellites that are continuously
orbiting the earth. Space vehicles transmit microwave carrier signals. The users of Global Positioning
Systems have GPS receivers that convert these satellite signals so that one can estimate the actual position,
velocity and time. The operation of the system is based on a simple mathematical principle called
trilateration. Trilateration falls into two categories: 2-D Trilateration and 3-D Trilateration. In order to make
the simple mathematical calculation the GPS receiver must know two things. First it must know the location
of the place is to be traced by at least three satellites above the place. Second, it must know the distance
between the place and each of those Space Vehicles. Units that have multiple receivers that pick up signals
from several GPS satellites at a same time. These radio waves are electromagnetic energy that travels at the
speed of light.[6]
The particular GPS tracker we chose for our project has the following features and functions.

23
 Provides real-time tracking._ Small in size.
 Has GSM module integrated with it.
 Gives out position information by receiving command from a single cellphone and GSM module
or multiple cellphones and GSM modules depending on the way it is programmed.
 Call the tracker, and it will send position information back via SMS message.
 Tracker can send back SMS message at regular interval of time with position information
depending on the code that was initially sent to it.
 Voice surveillance: Listen in on all sounds and conversations near the tracker with ease.
 Geo-Fence: Be instantly alerted if the tracker moves outside of a predefined area.
 Movement alert: Be instantly alerted if the tracker moves anywhere at all.
 SOS alert: If the tracking unit's SOS button is pressed the GPS tracking unit can instantly summon
emergency help for up to 5 authorizes phone numbers.
 Low battery alert: If the voltage of the tracker unit drops below a certain level, an Alert SMS
message will be sent.

3.3.5 Power Supply


The power supply section will be consisting of step down transformers of 230V primary to 9V and 12V
secondary voltages for the +5V and +12V power supplies respectively. The stepped down voltage is then
rectified by 4 1N4007 diodes. The high value of capacitor 1000 F charges at a slow rate as the time constant
is low, and once the capacitor charges there is no resistor for capacitor to discharge. This gives a constant
value of DC. IC 7805 is used for regulated supply of +5 volts and IC 7812 is used to provide a regulated
supply of +12 volts in order to prevent the circuit ahead from any fluctuations. The filter capacitors
connected after this IC filters the high frequency spikes. These capacitors are connected in parallel with
supply and common so that spikes filter to the common. These give stability to the power supply circuit.
As can be seen from figure 3.11 the rectified voltage from the 4 diodes is given to Pin 1 of the respective
regulators. Pin 2 of the regulators is connected to ground and pin 3 to Vcc.With adequate heat sinking the
regulator can deliver 1A output current. If internal power dissipation becomes too high for the heat sinking
provided, the thermal shutdown circuit takes over preventing the IC from overheating.

Figure 3.11; power supply circuit


3.3.5.1 Regulator
Almost all electronic circuits require a supply of DC voltage for their power. For most circuits it is either
desirable or essential that the voltage be constant under varying input (power line) voltage and varying load.
A very clear cut case that calls for a regulator chip is when you have one voltage source available in the
circuit, and you need a second, lower, voltage. The first voltage can be used as an input to the regulator

24
whose output is the second desired voltage. The most fundamental voltage regulator/control element is the
series voltage regulator.
Series regulator:- The series regulator is, in effect, a variable resistor between the input and output voltages.
Here the control element is in series with the load between input and output. The sample circuit that is been
implemented senses a change in the output voltage and here there will be also error detector which compares
the sampled voltage with a given reference voltage and causes the control element to compensate in order
to maintain a constant output voltage.

Figure 3.12: Series regulator


The simplest series regulator consists on an emitter-follower and a Zener diode regulator (that provides the
reference voltage), which is shown in figure 3.13.

Figure 3.13: Simple series regulator


The basic op-amp series regulator:-The reference voltage Vr is the input of the non-inverting amplifier and
R1/R2 voltage divider forms the negative feedback network. The ideal closed loop gain is :
A=1+R2/R1.Therefore the regulated voltage is a constant value determined by the zener voltage and the
resistor ratio: Vo=(1+R2/R1)*Vr.

25
Figure 3.14: Op-amp series regulator
The particular series voltage regulator we used is known as LM78XX. The LM78XX is a series of three
terminal regulators which is available with several fixed output voltages making them useful in a wide
range of applications. One of these is local on card regulation, eliminating the distribution problems
associated with single point regulation. The voltages available allow these regulators to be used in logic
systems, instrumentation, Hi-Fi, and other solid state electronic
. Features:
o Output current in excess of 1A.
o Internal thermal overload protection.
o No external components required.
o Output transistor safe area protection.
o Internal short circuit current limit.
o Available in the aluminum TO-3 package.
o LM7805C 5V
o LM7812C 12V
o LM7815C 15V

3.3.6 Serial to USB Connector


In computing, a serial port is a serial communication physical interface through which information transfers
in or out one bit at a time (in contrast to a parallel port). Throughout most of the history of personal
computers, data was transferred through serial ports to devices such as modems, terminals and various
peripherals. Pair of female Mini DIN-8 connectors used for RS-422 serial ports on a Macintosh LC
computer While such interfaces as Ethernet, FireWire, and USB all send data as a serial stream, the term
"serial port" usually identifies hardware more or less compliant to the RS-232 standard, intended to interface
with a modem or with a similar communication device. Modern computers without serial ports may require
serial-to-USB converters to allow compatibility with RS 232 serial devices. Serial ports are still used in
applications such as industrial automation systems, scientific instruments, shop till systems and some
industrial and consumer products. Server computers may use a serial port as a control console for
diagnostics. Network equipment (such as routers and switches) often use serial console for Configuration.

26
Serial ports are still used in these areas as they are simple, cheap and their console functions are highly
standardized and widespread.RS-232 (also called serial, COM port) is still common interface and most PC
are still equipped with serial interface (RS232C) connector. This PC serial port interface is single ended
(connects only two devices with each other), the data rate is less than 20 kbps.It's a voltage loop serial
interface with full-duplex communication represented by voltage levels with respect to system ground. A
common ground between the PCand the associated device is necessary. Hot-plug isn't supported, but
sometimes allowed.

Figure 3.15: Serial cable pins

27
Figure 3.16: RS-232 pin specification

3.3.7 Servo Motor


A servo motor is a simple electrical motor, controlled with the help of servomechanism. A Servo Motor
consists of three major parts: a motor, control board, and potentiometer (variable resistor) connected to the
output shaft. The motor utilizes a set of gears to rotate the potentiometer and the output shaft at the same
time. The potentiometer, which controls the angle of the servo motor, allows the control circuitry to monitor
the current angle of the servo motor. The motor, through a series of gears, turns the output shaft and the
potentiometer simultaneously. The potentiometer is fed into the servo control circuit and when the control
circuit detects that the position is correct, it stops the servo motor. If the control circuit detects that the angle
is not correct, it will turn the servo motor the correct direction until the angle is correct. Normally a servo
motor is used to control an angular motion of between 0 and 180 degrees. It is not mechanically capable
(unless modified) of turning any farther due to the mechanical stop build on to the main output gear. The
particular servo motor we suggest and is usually used for similar purpose as our project is known as
GYS500D5. It has the following features.
 Rated output: 0.05 KW.
 Rated current: 0.85 A.
 Rated speed: 3000 r/min.
 Rated Torque: 0.159 N.m.

28
 Degree of enclosure protection: Totally enclosed, self-cooled.
 Terminals (motor): Cable 0.3m (with connector).
 Terminals (encoder): Cable 0.3m (with connector)..
 Mounting method: By securing motor angel IMB5.
 Encoder: 18-bit serial encoder (absolute/incremental), 20-bit serial encoder (incremental).
 Temperature: -10 to +40oc
examples designed to get started in no time. In addition to this, there is also highly helpful online
forums composed of highly educated and skilled people. We used the IDE to edit and debug our code
before embedding it on to our microcontroller.
The code we used is given in appendix A.

29
30
Chapter Four
Implementation and Results
4.1 Hardware Implementation
The circuit diagram of the hardware implementation of the entire system that was described in the previous
sections is given below.

Figure 4.1: Hardware implementation of the system.


4.2 Programming and Implementation
Since the microcontroller we used is the integrated in the Arduino Uno board, we used the C programming
language which is used to develop sketches in Arduino Uno. Codes developed for the Arduino Uno are
known as sketches. The C programming language is perhaps the most popular programming language for
programming embedded systems. The C programming language remains a very popular language for
microcontroller developers due to the code efficiency and reduced overhead and development time. It offers
low level control and is considered more readable than assembly. Many free C compilers are available for
a wide variety of development platforms. The compilers are part of an IDEs with ICD support, breakpoints,
single-stepping and an assembly window. The performance of C compilers has improved considerably in
recent years, and they are claimed to be more or less as good as assembly, depending on who you ask. Most
tools now offer options for customizing the compiler optimization. Additionally, using C increases
portability, since C code can be compiled for different types of processors. C programming is less time
consuming, but has larger hex file size.
Advantages of using the C programming language:
 It is easier and less time consuming to write in C than in Assembly.
 C is easier to modify and update.
 You can use code that is available in function libraries.
 C code is portable to other microcontrollers with little or no modification.
For this particular project we used the Arduino's IDE itself as a compiler and editor because of the ease to
upload the sketches to the board.

31
4.2.1 Arduino Development Environment
The Arduino IDE is a full-featured C compiler for all the Arduino boards that are available out there. It is
the best software for developing and uploading sketches for the Arduino boards. It features intuitive IDE,
powerful compiler with advanced optimizations, lots of hardware and software libraries, and additional
tools that are highly helpful. Compiler comes with comprehensive Help file and lots of ready-to use

Figure 4.2: The Arduino IDE


4.2.2 Proteus Professional 8
To draw a complete circuit for microcontroller based systems Proteus Professional is one of the widely used
software out there these days. For our project since its core component is the microcontroller, we used
Proteus Professional 8 to develop the system circuit. The software is also used to simulate the programming
after the complete Arduino IDE design. It means the programming that has been designed will be attached
to the Proteus Software.
To create a new design, simply start ISIS Proteus Professional and select File => New Design from the
pulldown menus. Selecting template to act as the default for the new design.

32
Figure 4.3: Starting window of Proteus Professional 8
Next, to design a circuit we are going to choose from the available libraries by clicking the p button on the
left side of the normal window. Then by writing the key words on the available device names we can find
the specific device we are looking for and then drag it to the display window.

Figure 4.4: Pick from libraries

33
Figure 4.5: Window for selecting devices
Next, after designing of the whole circuit is completed, we load the hex _le by double clicking on the
microcontroller device and then run the simulation button by clicking the 'run' button on the bottom left
corner of the window. The code is the brain of the microcontroller that is used to control the operation of
automation system. If error occurred while running the pro gramming, the program cannot be transfer. Also
the program should be compiled first before uploading it to the microcontroller. The actual hardware
implementation of the system is described in the system description part of the previous chapter. But due
to the limitation of the simulation software we are using the rearranged structure of the system as shown in
figure 4.6.

34
Figure 4.6: Simulation circuit diagram
As shown in the above diagram we used the virtual terminal for inputting the tag identification number that
is normally stored in the tags. We would manually insert these numbers to the microcontroller while in the
actual system they would have been inserted to the microcontroller through the RF reader which is
connected to it.Once these numbers are inputted the microcontroller will compare it to a list of numbers
that are already stored on it. In the actual system the tag identification numbers will be stored on a database
containing other related information that could be used in identifying the location as well as kind of the
object whose security is being compromised. In both the simulation and the actual systems, if the tag
inputted or read happened to be one of the tags stored on the microcontroller or the database, then the
microcontroller will continue to the next phase of the system, which is alerting the security personnels for
possible security breaches. Once the tag has been identified, the actual system would have sent a text
message to the security personnels indicating the location and type of object that is being stolen. But in the
case of the simulation since there is no model for GSM module in Proteus Professional 8, we just showed
the text that would be sent on an LCD display. In addition to this the system will also activate the sound
and light alarms and the servo in order to close the doors and windows of the museums so that the criminals
will have hard time escaping. In the actual system the servo and alarms would be connected to transformers
and actuators to make the required power available and installation easier. At last in the actual system, if
the criminals manage to escape all the above levels of security, the GPS tracking will be activated by
sending the appropriate code as a text message to the GSM module integrated with the tracker. But due to
simulation software limitation we could not simulate the tracking part of the system.

35
Chapter Five

Conclusion and Future Works


5.1 Summary of Findings
 Due to the number of tags and readers that is going to be needed during the actual implementation
of the system, we have found out that signal collision is going to be an issue.
 When implementing the actual system high consideration should be given to the installation part.
Since the placement of the RFID tags and the readers are part of the security system proper care
should be given to this part of the implementation.
 Also the doors and windows that are controlled by the microcontroller should be designed by
considering the location of the objects as well as the tags and readers. For already built museums
the placement of the devices should be taken into consideration as stated above.
 We have also found out that there are certain devices such as the RFID tags and readers that need
proper permit from concerned organization before actually starting to use them.
 Finally we have also found out that the system is easily scalable and can be implemented to other
system with simple or no modification at all.

5.2 Conclusion
The project we have undertaken has helped us gain a better perspective on various aspects related to our
course of study as well as practical knowledge of electronic equipment’s and communication. We have
become familiar with software analysis, designing, implementation, testing and maintenance tasks related
to our project .This RFID based Anti-Theft and Tracking System will be a great asset in securing the objects
that are a defining character for our country. The system will also minimize the high dependence of security
systems on the manual system which has proven to be inefficient in previous cases. The security system
designed is found to be applicable and beneficial for many other organizations as we have tried to mention
in chapter one. We believe, our project will be applied to every museum in our country and in every other
place with a need of security as the electronic devices are more accessible and as the technological
development in our country is increasing.

5.3 Future Works


Seeing the advantages and efficiency of this system, below we have proposed other expansions as well as
detailed studies that we believe should be conducted in order to improve the applicability as well as
efficiency of the system.
 Detail study should be conducted in order to develop a collision avoidance algorithm in order to
make sure that the system is going to give its maximum efficiency.
 A device placement mechanism should also be studied in detail. Because having an optimum
mechanism will not only save cost but it will also improve the efficiency of the system.

36
 A better tracking devices with very small size and great portability should be used for future
implementation of the system.
 Finally, rather than developing systems for individual sectors, a more general system design could
be developed that could be applied to many different sectors that could benefit from the project.

37
Appendix A
Code for Simulation Circuit
# include hServo:hi
# include hString:hi
# include hLiquidCrystal:hi
# de_ne wait 1
# de_ne time 10
LiquidCrystal lcd(12, 11, 5, 4, 3, 2);
int x[7]= f1; 2; 3; 4; 5; 6; 7g;
int y[7]= f1; 0; 3; 4; 5; 0; 7g;
String name[7]= f"HERITAGES"; "LUCY "; "COINS"; "BERANA";
"ANTIQUES"g;
int led = 13;
int freq = 0;
Servo myservo;
int potpin = 0; nnanalog pin used to connect the potentiometer
int val;
void setup()
{
myservo.attach(9); nnattaches the servo on pin 9 to the servo object
pinMode(led, OUTPUT);
}
nnanalog pin used to connect the potentiometer void loop ()
{
Val = analog Read(pot pin); nnreads the value of the potentiometer (value between 0
and 1023)
Val = map (Val, 0, 1023, 0, 179);
for (int i=0; i<7; i++)
{

38
delay(3000);
if (y[i] != i+1) f
while(1) f
lcd.clear();
lcd.print("LOST DEVICE ID NO ");
lcd.print(i+1);
lcd.print(" n n");
lcd.print("DEVICE NAME: ");
lcd.print(name[i]);
nn scale it to use it with the servo (value between 0 and 180)
myservo.write(val);
nnsets the servo position according to the scaled value
delay(1000);
digitalWrite(led, HIGH); nnturn the LED on (HIGH is the voltage level)
delay(100); nnwait for a second
digitalWrite(led, LOW); nnturn the LED o_ by making the voltage LOW
delay(200); nnwaits for the servo to get there print the number of seconds since
reset:
for (freq = 170; freq < 1800; freq += 4) f
tone(8, freq, time); Beep pin, freq, time
delay(wait);
}
}
}
else {
lcd.print("CORRECT ID");
}
}
}

39

You might also like