Professional Documents
Culture Documents
Comm 11
Comm 11
Comm 11
COMMUNICTAION ENGINEERING
PREPAIRED BY: ID NO
1. ASHENAFI MOLA 099/06
2. ROMAN HASSEN 491/06
3. SURAFEL MENKIR 566/06
4. HAMDIYA JEMAL 289/06
ADVISOR: -
ii
ACKNOWLEDGMENT
First of all we would like to thank Almighty God for giving strength to finalize this term paper. It is our
pleasure to thank our advisor Mr. Melkamu for being there in guiding and appreciating our work. We also
really appreciate the help of our friends and class mates in finding documents related to this work.
iii
ABSTRACT
This Radio Frequency Identification (RFID) based project tried to answer the problem of security
that highly valuable objects are facing these days. As we all know if stolen these objects could be sold
for really large sum of money in the black market. Considering the high educational and cultural
values these objects have, making sure that they are safe and available to the large public interested
instead of being kept by some individuals has to be a priority. In order to make sure that these objects
remain safe, we have developed a mechanism that involves the use of RFID technology and other
related systems. The project provides a two level security system. The first level comes up with a design
that will have basically two mechanisms that will be used to alert responsible personnel’s when the
security of such objects is being compromised. The first one is a simple sound and light alarm that
will alert the security personnel’s and the second one is GSM (Global System for Mobile) based system
that will send a text message also to the security personnel’s. In addition the system also controls the
doors and windows of the museums by using servo motors which will be activated whenever the alarm
goes off. The second level of security that this project provides is a GPS (Global Positioning System)
based tracking system that will help to track the objects if the criminals happen to successfully
escape the first level of security. The project team has followed the simulation based approach for the
system development. This paper is prepared assuming the actual implementation of the system. If all the
required resources are available for us either from our school or even if we can get them by ourselves, we
are planning on making an experimental project where we will assemble the entire system in the laboratory.
iv
Contents And figures
ABSTRACT .............................................................................................................................................. iv
Abbreviations ........................................................................................................................................ vii
Chapter One............................................................................................................................................ 1
Introduction ............................................................................................................................................ 1
1.1 Background ................................................................................................................................... 2
1.2 Objectives of the Study ................................................................................................................. 3
1.2.1 General Objective ................................................................................................................... 3
1.2.2 Specific Objectives.................................................................................................................. 3
1.3 Statement of the Problem ............................................................................................................. 3
1.4 Scope and Limitations ................................................................................................................... 4
1.5 Methodology................................................................................................................................. 4
Figure 1.1: System development methodology ................................................................................... 6
1.5.1 Process Model ........................................................................................................................ 6
1.5.2 Project Development Tools .................................................................................................... 7
1.6 Significance of the Project ............................................................................................................. 7
Chapter Two ........................................................................................................................................... 8
2. Literature Review................................................................................................................................ 8
Chapter 3 .............................................................................................................................................. 10
System Design and Description ............................................................................................................. 10
3.1 System Design ............................................................................................................................. 10
Figure 3.1: General block diagram of the system .............................................................................. 11
3.2 System Description ..................................................................................................................... 11
Figure 3.2: Displacement detection algorithm .................................................................................. 12
Figure 3.3: System structure ............................................................................................................. 13
Control Diagram ................................................................................................................................... 13
Figure 3.4: Control diagram of the system ........................................................................................ 14
3.3 Hardware Description ................................................................................................................. 14
3.3.1 Microcontroller .................................................................................................................... 14
Figure 3.5: Arduino Uno .................................................................................................................... 14
Figure 3.6: ATmega328 microcontroller ............................................................................................ 17
Figure 3.7: ATmega328 microcontroller pins and their mapping to the Arduino Uno board Pins ..... 18
3.3.2 RFID Tags and Readers ......................................................................................................... 19
v
Figure 3.8: IT36 Low Pro_le Durable Asset Tag .................................................................................. 20
Figure 3.9: IF61 Enterprise RFID Reader ............................................................................................ 21
3.3.3 GSM Module ........................................................................................................................ 22
Figure 3.10: F1003 GSM modem ....................................................................................................... 23
3.3.4 GPS Tracker .......................................................................................................................... 23
3.3.5 Power Supply ....................................................................................................................... 24
Figure 3.11; power supply circuit ...................................................................................................... 24
Figure 3.12: Series regulator ............................................................................................................. 25
Figure 3.13: Simple series regulator .................................................................................................. 25
Figure 3.14: Op-amp series regulator ................................................................................................ 26
3.3.6 Serial to USB Connector ....................................................................................................... 26
Figure 3.16: RS-232 pin specification................................................................................................. 28
3.3.7 Servo Motor ......................................................................................................................... 28
Chapter Four ......................................................................................................................................... 31
4.1 Hardware Implementation .......................................................................................................... 31
Figure 4.1: Hardware implementation of the system. ....................................................................... 31
4.2 Programming and Implementation ............................................................................................. 31
4.2.1 Arduino Development Environment.......................................... Error! Bookmark not defined.
Figure 4.2: The Arduino IDE ............................................................................................................... 32
4.2.2 Proteus Professional 8........................................................................................................... 32
Figure 4.3: Starting window of Proteus Professional 8 ...................................................................... 33
Figure 4.5: Window for selecting devices .......................................................................................... 34
Figure 4.6: Simulation circuit diagram............................................................................................... 35
4.3 Testing and Results .......................................................................... Error! Bookmark not defined.
4.3.1 Testing ....................................................................................... Error! Bookmark not defined.
4.3.2 Results ....................................................................................... Error! Bookmark not defined.
Chapter Five.......................................................................................................................................... 36
Conclusion and Future Works ............................................................................................................... 36
5.1 Summary of Findings ................................................................................................................... 36
5.2 Conclusion ................................................................................................................................... 36
5.3 Future Works .............................................................................................................................. 36
Appendix A ........................................................................................................................................... 38
vi
Abbreviations
2-D-------------------2 Dimensional
3-D-------------------3 Dimensional
AC-------------------- Alternating Current
ADC------------------ Analog to Digital Converter
DC--------------------Direct Current
DTMF---------------- Dual Tone Multi-Frequency
EEPROM------------ Electrically Erasable Programmable Read Only Memory
EMW------------------Electromagnetic Wave
GPS-------------------Global Positioning System
GSM------------------Global System (or Standard) for Mobile
HW--------------------Hardware
IC----------------------Integrated Circuit
IDE-------------------- Integrated Development Environment
I/O---------------------Input/Output
LCD-------------------liquid Crystal Display
LED------------------- Light-Emitting Diode
MCU & _C---------- Microcontroller
PC --------------------Personal Computer
PWM----------------- Pulse Width Modulation
RF--------------------Radio Frequency
RFID----------------- Radio Frequency Identication
RISC----------------- Reduced Instruction Set Computing
SIM-------------------Subscriber Identity Module
SMS----------------- Short Message (or Messaging) Service
SRAM --------------Static Random Access Memory
UHF -----------------Ultra High Frequency
USB------------------Universal Serial Bus
VB--------------------Visual Basic
VIN--------------------Input Voltage
vii
Physical Constants
Speed of Light c = 2.99792458 *108ms-s (exact)
viii
Chapter One
Introduction
Semi-automation is the use of control systems and information technologies in corporation with the
available man power to reduce the need for human work in the production and service providing areas.
The complete manual system expected human operators to accomplish the required work entirely on their
own. And this approach has shown to be inefficient many times in history. On the other hand,
semi-automated systems greatly decrease the complete dependency for human sensory and mental
requirements. In addition, the implementation of such systems plays an increasingly important role in
the world economy and in our daily experience.[2] Although there are a range of areas on which
semi-automated systems can be applied, in this particular project we focused on its application for securing
objects. Security is one of the main issues that the world we are living in is highly concerned about
these days. Although deferent studies have come up with many solutions in order to make sure that the
human need for security is fulfilled, one of the major advancements in security in the past 60 years has been
the development of RFID systems. The effective use of systems involving RFID technology combined
with other technologies available will not only eliminate the problems With the highly insecure manual
system, but it will also decrease the probability of valuable objects being lost for long at greater levels. In
times where automated systems are being chosen over manual systems in everyday aspects of life,
this project has come up with a mechanism in which objects of high value can be protected using a
system that can be implemented with very low cost and time. Making sure that these objects remain safe
and in places where they should be is not something that is of low priority[1].
1
1.1 Background
The idea of semi-automated security system which uses RFID technology has been implemented in many
projects all over the world. The systems we have been able to review so far used a large amount of money
compared to the amount we will be spending for the implementation of this project. The last but not the
least important distinguishing feature of this project is the fact that there is no human involvement in the
entire alarming and tracking initiation process. The system will do both tasks by itself and the only human
involvement required is in catching the criminals once the system alarm is activated and tracking the
location of the objects. In general, What makes our project different from all these projects is the fact that
it includes a tracking system that is integrated with the main system, a database to help identify the objects
missing and the tracking devices to be activated, and two alarming mechanisms that will be used in
alarming the security personnel. Other distinguishing areas include the two layer security system it includes
and the cost required to implement the system. As we all know in countries like Ethiopia, using a lot more
advanced security systems that require technologies that are very latest and are very expensive is almost
unimaginable. The infrastructures and resources available doesn't allow for such systems to be
implemented. Due to these reasons, the security mechanisms that have been implemented in areas of our
interest so far in our country has been manual and very weak. In order to come up with a better and more
reliable security system, we proposed this system we developed in this project. This system uses the most
available resource that can be extracted and used easily; the Radio Frequency. The implementation of this
system is not only reliable but it is also highly cost effective considering the amount of money a museum
or other related place in our country can budget for security purpose. The systems application can be
expanded and implemented to other areas with very little medications as well. Some of the other
implementation areas include library management systems, identification based access control systems,
breach detector systems, examination hall management systems, attendance management systems, car
parking management systems, and container identification and tracking systems. Although the system
can be applied in all sorts of areas, our project focused on the security of objects of high value in
museums and other related places.
2
1.2 Objectives of the Study
1.2.1 General Objective
The main objective of this project is to design, model and if possible implement a System that will
heighten the security of high valued objects in museums and other related places and at the same
time reducing the complete dependency on the highly inefficient manual system.
3
1.4 Scope and Limitations
The RFID Based Anti-Theft and Tracking system has much functionality. Below we have listed the scope
in which the system we have designed can be applied.
Alarming the security personnel’s: Whenever there is an object or objects whose security
is being compromised the system will alarm the security personals by using two alarming
mechanisms; sound alarm and SMS text indicating the specific object that is being stolen.
Manages the objects by using a centralized database: For this system we integrated a
database that will store all the necessary information about the objects being secured and associate
each object with a specific identification number that is stored on the RFID tag.
Track the objects if the criminals manage to escape the first level of security: If the criminals
manage to escape the security personnel’s, the system will provide another level of security
by providing a tracking capability and showing the location of the objects that are missing.
One of the setbacks of this part of the system is, if the criminals are highly skilled and professionals
(although the probability of this being the case in our country is very low), they can cover the
object with a conductor sheet and make tracking impossible. This is because of the fact
that EMWs cannot penetrate a conductor. Although this might make the tracking part of the
system unnecessary, we know that almost all systems in the world have their own drawbacks.
Therefore we wanted to develop the system with this particular limitation in mind.
This RFID based system can be applied to many different areas other than the one we are
discussing here with very little modifications. Some of the areas are listed below.
Library management systems
Identification based access control systems
Breach detector systems
Examination hall management systems
Attendance management systems
Car parking management systems
Container identification and tracking systems and so many others.
Although there are a number functionalities our project provides as discussed above, it also has its own
limitations. Below we have tried to discuss the major limitations that the system could face.
The system cannot provide detecting as well as tracking service if the object is covered with a
conductor sheet because the signals that the system uses, i.e. EMWs cannot travel through a
conductor surface.
The system cannot provide tracking service if the tracker is removed from the object.
The system doesn't work if there is no power.
The system doesn't work if it is bombarded with a signal that has higher frequency than the
system's frequency of operation.
1.5 Methodology
The methodology we have followed during the development of this project which starts from the project
title selection up to the complete project submission is presented in the following section diagrammatically.
As the system contains both hardware and software designs, these designs are developed separately. Both
the software and hardware designs are developed separately and will be integrated at last. The design
methodology is explained in figure 1.1 with a general flow chart. As it can be seen in the flowchart from
4
figure 1.1 the project starts by discussing several possible topics with the supervisor. After a topic has been
selected, additional discussions were done in order to understand the concept and objectives of the project.
Then, literature review was done and the background of the project was studied in detail by referring to
various sources such as journals, articles, reference books, lecture notes and data sheets. Once the software
and hardware designs are completed individually they will be integrated. Then the system will be ready for
experimental testing. In the redesign and troubleshooting part, any problem faced defects or inadequacies
and improvements required will be fed back to the previous stages. Redesign and troubleshooting processes
will be carried out in case the output obtained is not as expected. This process will keep repeating until a
result that meets the objectives of the project is found. Finally, the project would be realized and ready for
presentation to panel for verification.
5
Figure 1.1: System development methodology
6
of this implementation phase, separate software components produced are combined to introduce new
functionality and reduced risk through the removal of errors.
7
Chapter Two
2. Literature Review
Throughout the development of our project we were able to review some projects, journals, articles and
books which are related to the title of our project. We believe that all the reviewed materials have been a
good asset for the overall design and development of the project we have chosen. In this section some of
the related projects we have reviewed are discussed.
Vehicle Theft Alarm And Tracking The Location Using RFID & GPS: In this paper C. Ram Kumar,
B. Vijayalakshmi, Dr C. Ramesh and Dr S. Chenthur Pandian aimed to design a new fashion auto-guard
system which is a smart measurement generalized in the automobile security area. In this technique, both
security and tracking of the vehicle is done. The System consists of a microcontroller circuit board, keypad,
alarm system and a display board. The password is given using a keypad and displayed on the display board
in a decrypted form. If the given password does not match with the original password, then the alarm sound
will be heard and message (location of the vehicle) will be sent to the authorized person with the help of
GSM module. Thus if unauthorized person uses the system, then the GPS will track the region of particular
latitude and longitude and the GSM module will send a text message to the authorized person's mobile.
ATMEGA 162V microcontroller is used to control all of the inputs and outputs for the system. The
microcontroller essentially acts as the brain of the design; it reads all of the input data and processes it for
further actions to be taken. If a wrong entry of password is detected, this will imply that the car is being
tried to be accessed by an unauthorized person. The RFID tag on the car will be activated by the signal that
will be generated from the RFID reader. Once the information stored in the tag is accessed by the reader, it
will then be transferred to the microcontroller, where it will be used in identifying the particular car of the
owner. The GSM modem used is a specialized type of modem which accepts a SIM card and can operate
over a subscription to a mobile operator, just like a mobile phone. It uses a process called circuit switching.
This method of communication allows a path to be established between two devices. In addition, the GPS
system will be used in tracking and identifying the exact location of the missing car.
Strength
Low power consumption.
Reliability.
Provides many levels of security.
Certainty in the fact that a missing car will be found unless skilled professionals are the ones who
is doing the crime, in which case time will be another factor.
Weakness
It needs the password to be entered every time the car needs to be accessed even by the owner.
It doesn’t consider the fact that even the right user can be mistaken when trying to enter the
password.
RFID-Based Anti-theft Auto Security System with an Immobilizer: In this Second paper we reviewed
Geeth Jayendra, Sisil Kumarawadu and Lasantha Meegahapola aimed at making sure a hijacked vehicle
will not be able to move and at the same time securing the passengers on it. The intelligent immobilising
system basically consists of transmitting unit, receiving unit, and intelligent vehicle interfacing unit. The
data receiver is embedded to the intelligent vehicle control system whereas the transmitter unit is kept with
the vehicle owner. This enables an active communication path between the vehicle and the owner (or
8
driver), as long as the two ends are within the operating range of 200m. Unlike the other security systems,
which are embedded with the vehicle key, in this system there is relatively high probability of misleading
the hijackers also enabling the vehicle owner to immobilize the vehicle within a safe distance. At one single
press of the disabling button, the transmitter transmits a unique tag, which is captured and recovered by the
receiving system at the vehicle. The tag is identified by the receiver microcontroller using its special data
recovery algorithm. Then, suitable disabling signals will be generated to bring down the vehicles speed to
zero in a step by step manner. One of the key design features is that, when vehicle is immobilized using
this system, the vehicle can be restarted only by the transmitting unit's enabling button.
Strength
Secures the car and keeps the safety of passengers.
Gives misleading information to hijackers since the activation button is not located on the key.
Immobilizes the car in a step by step manner.
Good data identification and processing system.
Gives the same efficiency in different climatic conditions.
Gives great signal reception under different distortion conditions.
Weakness
Small operation range, i.e. the distance between the vehicle control system and the transmitter unit
is small.
Since the entire immobilizing system is located in the car, if skilled, the hijackers can easily
eliminate the system and be able to take the vehicle.
9
Chapter 3
10
4. At this stage we will test and debug the software checking if the database is correct and also the simulation
checking whether it is working properly or not.
5. Try to integrate the simulation system with the software part of the design if possible.
6. If step 5 happens to be successful, finally we will do testing of the complete system and compare the
results obtained with what we have been expecting during the development of the system.
A general block diagram of the system (assuming experimental based approach) is given below. The three
main blocks have many components inside. The development of each of those components is discussed in
the next section.
11
Figure 3.2: Displacement detection algorithm
Therefore if we set up the reader and the tag at a distance that is known and fixed, then we can easily
calculate the time it will take the RF signal to reach the reader form the tag.
Time = distance/speed (3.1)
The algorithm by which the system will determine if the object has been misplaced or not is given in figure
3.2.
Therefore whenever the reader gets the tag identification the microcontroller will compare the time it took
the reader to get the tag identification with the already calculated distance.
If the time is greater/lower than the constant time that is already calculated, then we can clearly see that the
object is being moved, which then we can use to let the microcontroller know that an object's security is
being compromised and the microcontroller will take the next appropriate decision. Once this unique
information from the tag has been received by the RF reader and detected that the object is moving, it will
12
then be transferred to the PC through the microcontroller for identifying which object is associated with
it.The PC will do this by comparing the unique identification number with the once stored on the database.
The database for this purpose is developed using MySQL. We used MySQL because it is available for free
and easy to set up. Once the object is identified, the PC will notify the microcontroller which object is being
in danger. The information stored in the database that is being transferred to the microcontroller doesn’t
necessarily need to be the name of the object whose security is being compromised. It could also include
other additional information such as the position of the object in the museum and the gates and windows
near that specific object. The microcontroller will then send appropriate signals to activate the sound and
light alarm and shut the gates and windows. In addition it also send a custom text message, which is already
developed, to the security personnels using the GSM module, telling which object is being stolen an d other
additional information obtained from the database so that they can focus on that specific area instead of
looking around the entire museum trying to find where that specific object is being placed. This part of the
system shows the minimum dependence of the system on the efficiency of the manual system, which is one
of the objective as well as advantage of the system. Finally If the criminals manage to escape all the above
security measures, the microcontroller will send a text message to the GPS+GSM tracker attached to the
object being stolen. Once that text is received by the tracking device it will send back location information
as well as other information that could be necessary depending on the code we sent in the text message.
Finally the location information obtained could be used in any map software (such as Google Map) in order
to determine the exact location of the object. The general structure of the system including the elements
discussed above is given below.
Control Diagram
The controlling system is mostly dependent on the microcontroller which is the core of the entire system.
Servo motor and door/window are the actuators of the system which accept command from the
microcontroller to lock and unlock the door/window automatically. A serial port interfacing is used to
connect the computer with the microcontroller.
13
Figure 3.4: Control diagram of the system
3.3 Hardware Description
In implementing the system using hardware’s we will be using different devices with their own
specifications and connection requirements. In this section of the paper we have discussed the main devices
that are required for the actual implementation of the system in great detail.
3.3.1 Microcontroller
A microcontroller (also MCU or C) is a computer-on-a-chip. Microcontrollers are frequently used in
automatically controlled products and devices, such as automobile engine control systems, remote controls,
once machines, appliances, power tools, and toys. The reduced size, cost, and power consumption compared
to a design using a separate microprocessor, memory, and input/output devices, microcontrollers make it
economical to electronically control many more processes.
3.3.1.1 Arduino Uno
Arduino is an open-source computer hardware and software company, project and user community that
designs and manufactures kits for building digital devices and interactive objects that can sense and control
the physical world. Arduino boards may be purchased preassembled, or as do-it-yourself kits; at the same
time, an Arduino from scratch.
14
on some models, for loading programs from personal computers. For programming the microcontrollers,
the Arduino platform provides an integrated development environment (IDE) based on the Processing
project, which includes support for C and C++ programming languages. The Arduino Uno is one of the
widely used Arduino boards available out there. It is a microcontroller board based on the ATmega328. It
has 14 digital input/output pins (of which 6 can be used as PWM outputs), 6 analog inputs, a 16 MHz
ceramic resonator, a USB connection, a power jack, an ICSP header, and a reset button. It contains
everything needed to support the microcontroller; we can simply connect it to a computer with a USB cable
or power it with a AC-to-DC adapter or battery to get started. The Arduino Uno has the following main
features. [4, 6, 7]
An open source design. The advantage of it being open source is that it has a large community of
people using and troubleshooting it. This makes it easy to find someone to help you debug your
projects.
An easy USB interface. The chip on the board plugs straight into your USB port and registers on
your computer as a virtual serial port. This allows you to interface with it as through it were a
serial device. The benefit of this setup is that serial communication is an extremely easy (and time-
tested) protocol, and USB makes connecting it to modern computers really convenient.
Very convenient power management and built-in voltage regulation. You can connect an external
power source of up to 12v and it will regulate it to both 5v and 3.3v. It also can be powered directly
o_ of a USB port without any external power.
An easy-to-find, and dirt cheap, microcontroller "brain." The ATmega328 chip retails for a very
small price. It has countless number of nice hardware features like timers, PWM pins, external
and internal interrupts, and multiple sleep modes.
A 16 MHz clock. This makes it not the speediest microcontroller around, but fast enough for most
applications.
32 KB of ash memory for storing your code.
13 digital pins and 6 analog pins. These pins allow you to connect external hardware to your
Arduino. These pins are key for extending the computing capability of the Arduino into the real
world. Simply plug your devices and sensors into the sockets that correspond to each of these pins
and you are good to go.
An ICSP connector for bypassing the USB port and interfacing the Arduino directly as a serial
device. This port is necessary to re-bootload your chip if it corrupts and can no longer talk to your
computer.
An on-board LED attached to digital pin 13 for fast an easy debugging of code.
And last, but not least, a button to reset the program on the chip.
3.3.1.2 ATmega328
Features:-
15
4/8/16/32K Bytes of In-System Self-Programmable Flash progam memory (AT-
mega48PA/88PA/168PA/328P)
256/512/512/1K Bytes EEPROM (ATmega48PA/88PA/168PA/328P)
512/1K/1K/2K Bytes Internal SRAM (ATmega48PA/88PA/168PA/328P)
Write/Erase Cycles: 10,000 Flash/100,000 EEPROM
Data retention: 20 years at 85C/100 years at 25C(1)
Optional Boot Code Section with Independent Lock Bits
In-System Programming by On-chip Boot Program
True Read-While-Write Operation
Programming Lock for Software Security
Peripheral Features
Two 8-bit Timer/Counters with Separate Prescaler and Compare Mode
One 16-bit Timer/Counter with Separate Prescaler, Compare Mode, and Capture Mode
Real Time Counter with Separate Oscillator
Six PWM Channels
8-channel 10-bit ADC in TQFP and QFN/MLF package
Temperature Measurement
6-channel 10-bit ADC in PDIP Package
Temperature Measurement
Programmable Serial USART
Master/Slave SPI Serial Interface
Byte-oriented 2-wire Serial Interface (Philips I2C compatible)
Programmable Watchdog Timer with Separate On-chip Oscillator
On-chip Analog Comparator
Interrupt and Wake-up on Pin Change
Special Microcontroller Features
Power-on Reset and Programmable Brown-out Detection
Internal Calibrated Oscillator
External and Internal Interrupt Sources
Six Sleep Modes: Idle, ADC Noise Reduction, Power-save, Power-down, Standby and
Extended Standby
I/O and Packages
23 Programmable I/O Lines
28-pin PDIP, 32-lead TQFP, 28-pad QFN/MLF and 32-pad QFN/MLF
Operating Voltage
1.8 - 5.5V for ATmega48PA/88PA/168PA/328P
Temperature Range
-40C to 85C
Speed Grade
0-20MHz@1.8-5.5V
Low Power Consumption at 1 MHz, 1.8V, 25C for ATmega48PA/88PA/168PA/328P
Active Mode: 0.2 mA
Power-down Mode: 0.1 A
Power-save Mode: 0.75 A (Including 32 kHz RTC)
16
Figure 3.6: ATmega328 microcontroller
17
Figure 3.7: ATmega328 microcontroller pins and their mapping to the
Arduino Uno board Pins[5]
VIN. The input voltage to the Arduino board when it's using an external power source (as opposed
to 5 volts from the USB connection or other regulated power source). You can supply voltage
through this pin, or, if supplying voltage via the power jack, access it through this pin.
5V.This pin outputs a regulated 5V from the regulator on the board. The board can be supplied
with power either from the DC power jack (7 - 12V), the USB connector (5V), or the VIN pin of
the board (7-12V). Supplying voltage via the 5V or 3.3V pins bypasses the regulator, and can
damage your board. We don't advise it.
3V3. A 3.3 volt supply generated by the on-board regulator. Maximum current draw is 50 mA.
GND. Ground pins.
IOREF. This pin on the Arduino board provides the voltage reference with which the
microcontroller operates. A properly configured shield can read the IOREF pin voltage and select
the appropriate power source or enable voltage translators on the outputs for working with the 5V
or 3.3V.
The pins whose function is explained above are known as power pins. In addition to these pins the Uno has
6 analog inputs, labeled A0 through A5, each of which provide 10 bits of resolution (i.e. 1024 different
values) and 14 digital I/O pins.
There are also additional pins with specialized functions:
Serial: 0 (RX) and 1 (TX). Used to receive (RX) and transmit (TX) TTL serial data. These pins
are connected to the corresponding pins of the ATmega8U2 USB-to-TTL Serial chip.
External Interrupts: 2 and 3. These pins can be configured to trigger an interrupt on a low value,
a rising or falling edge, or a change in value.
PWM: 3, 5, 6, 9, 10, and 11. Provide 8-bit PWM output with the analog Write() function.
18
SPI: 10 (SS), 11 (MOSI), 12 (MISO), 13 (SCK). These pins support SPI communication using the
SPI library.
LED: 13. There is a built-in LED connected to digital pin 13. When the pin is HIGH value, the
LED is on, when the pin is LOW, it's o_.
TWI: A4 or SDA pin and A5 or SCL pin. Support TWI communication using the Wire library.
AREF. Reference voltage for the analog inputs. Used with analog Reference().
Reset. Bring this line LOW to reset the microcontroller. Typically used to add a reset button to
shields which block the one on the board.
19
Features.
It is non-metal.
Operating frequency: UHF Global 860-960 MHz
Length: 111.5mm.
Width: 21.8mm.
Direct application materials: Cardboard, plastic and wood.
Attachment methods: Screws/rivets 25 mil foam tape.
Typical read range: 11m.
IC: Impinj Monza 4QT.
EPC code max. Size: 128 bit.
Unique serial number size: 48 bit.
User memory: 512 bit.
Min. operating temp.: 40oc.
Max. Operating temp.:+82:2oc.
Min. storage temp.: 40oc.
Max. Storage temp.: +93:3oc.
20
themselves, RFID readers come in many sizes. The largest readers might consist of a desktop personal
computer with a special card and multiple antennas connected to the card through shielded cable. Such a
reader would typically have a network connection as well so that it could report tags that it reads to other
computers. The smallest readers are the size of a postage stamp and are designed to be embedded in mobile
telephones.
21
Wi-Fi (802.11) fixed reader option or on handheld computer.
Ethernet support.
Internal power supply.
4 antenna ports.
Multi-regional options.
22
Others:
Operation temperature:-25 +65oC Storage temperature: -40 +85oC Humidity: 95% (unfreezing).
23
Provides real-time tracking._ Small in size.
Has GSM module integrated with it.
Gives out position information by receiving command from a single cellphone and GSM module
or multiple cellphones and GSM modules depending on the way it is programmed.
Call the tracker, and it will send position information back via SMS message.
Tracker can send back SMS message at regular interval of time with position information
depending on the code that was initially sent to it.
Voice surveillance: Listen in on all sounds and conversations near the tracker with ease.
Geo-Fence: Be instantly alerted if the tracker moves outside of a predefined area.
Movement alert: Be instantly alerted if the tracker moves anywhere at all.
SOS alert: If the tracking unit's SOS button is pressed the GPS tracking unit can instantly summon
emergency help for up to 5 authorizes phone numbers.
Low battery alert: If the voltage of the tracker unit drops below a certain level, an Alert SMS
message will be sent.
24
whose output is the second desired voltage. The most fundamental voltage regulator/control element is the
series voltage regulator.
Series regulator:- The series regulator is, in effect, a variable resistor between the input and output voltages.
Here the control element is in series with the load between input and output. The sample circuit that is been
implemented senses a change in the output voltage and here there will be also error detector which compares
the sampled voltage with a given reference voltage and causes the control element to compensate in order
to maintain a constant output voltage.
25
Figure 3.14: Op-amp series regulator
The particular series voltage regulator we used is known as LM78XX. The LM78XX is a series of three
terminal regulators which is available with several fixed output voltages making them useful in a wide
range of applications. One of these is local on card regulation, eliminating the distribution problems
associated with single point regulation. The voltages available allow these regulators to be used in logic
systems, instrumentation, Hi-Fi, and other solid state electronic
. Features:
o Output current in excess of 1A.
o Internal thermal overload protection.
o No external components required.
o Output transistor safe area protection.
o Internal short circuit current limit.
o Available in the aluminum TO-3 package.
o LM7805C 5V
o LM7812C 12V
o LM7815C 15V
26
Serial ports are still used in these areas as they are simple, cheap and their console functions are highly
standardized and widespread.RS-232 (also called serial, COM port) is still common interface and most PC
are still equipped with serial interface (RS232C) connector. This PC serial port interface is single ended
(connects only two devices with each other), the data rate is less than 20 kbps.It's a voltage loop serial
interface with full-duplex communication represented by voltage levels with respect to system ground. A
common ground between the PCand the associated device is necessary. Hot-plug isn't supported, but
sometimes allowed.
27
Figure 3.16: RS-232 pin specification
28
Degree of enclosure protection: Totally enclosed, self-cooled.
Terminals (motor): Cable 0.3m (with connector).
Terminals (encoder): Cable 0.3m (with connector)..
Mounting method: By securing motor angel IMB5.
Encoder: 18-bit serial encoder (absolute/incremental), 20-bit serial encoder (incremental).
Temperature: -10 to +40oc
examples designed to get started in no time. In addition to this, there is also highly helpful online
forums composed of highly educated and skilled people. We used the IDE to edit and debug our code
before embedding it on to our microcontroller.
The code we used is given in appendix A.
29
30
Chapter Four
Implementation and Results
4.1 Hardware Implementation
The circuit diagram of the hardware implementation of the entire system that was described in the previous
sections is given below.
31
4.2.1 Arduino Development Environment
The Arduino IDE is a full-featured C compiler for all the Arduino boards that are available out there. It is
the best software for developing and uploading sketches for the Arduino boards. It features intuitive IDE,
powerful compiler with advanced optimizations, lots of hardware and software libraries, and additional
tools that are highly helpful. Compiler comes with comprehensive Help file and lots of ready-to use
32
Figure 4.3: Starting window of Proteus Professional 8
Next, to design a circuit we are going to choose from the available libraries by clicking the p button on the
left side of the normal window. Then by writing the key words on the available device names we can find
the specific device we are looking for and then drag it to the display window.
33
Figure 4.5: Window for selecting devices
Next, after designing of the whole circuit is completed, we load the hex _le by double clicking on the
microcontroller device and then run the simulation button by clicking the 'run' button on the bottom left
corner of the window. The code is the brain of the microcontroller that is used to control the operation of
automation system. If error occurred while running the pro gramming, the program cannot be transfer. Also
the program should be compiled first before uploading it to the microcontroller. The actual hardware
implementation of the system is described in the system description part of the previous chapter. But due
to the limitation of the simulation software we are using the rearranged structure of the system as shown in
figure 4.6.
34
Figure 4.6: Simulation circuit diagram
As shown in the above diagram we used the virtual terminal for inputting the tag identification number that
is normally stored in the tags. We would manually insert these numbers to the microcontroller while in the
actual system they would have been inserted to the microcontroller through the RF reader which is
connected to it.Once these numbers are inputted the microcontroller will compare it to a list of numbers
that are already stored on it. In the actual system the tag identification numbers will be stored on a database
containing other related information that could be used in identifying the location as well as kind of the
object whose security is being compromised. In both the simulation and the actual systems, if the tag
inputted or read happened to be one of the tags stored on the microcontroller or the database, then the
microcontroller will continue to the next phase of the system, which is alerting the security personnels for
possible security breaches. Once the tag has been identified, the actual system would have sent a text
message to the security personnels indicating the location and type of object that is being stolen. But in the
case of the simulation since there is no model for GSM module in Proteus Professional 8, we just showed
the text that would be sent on an LCD display. In addition to this the system will also activate the sound
and light alarms and the servo in order to close the doors and windows of the museums so that the criminals
will have hard time escaping. In the actual system the servo and alarms would be connected to transformers
and actuators to make the required power available and installation easier. At last in the actual system, if
the criminals manage to escape all the above levels of security, the GPS tracking will be activated by
sending the appropriate code as a text message to the GSM module integrated with the tracker. But due to
simulation software limitation we could not simulate the tracking part of the system.
35
Chapter Five
5.2 Conclusion
The project we have undertaken has helped us gain a better perspective on various aspects related to our
course of study as well as practical knowledge of electronic equipment’s and communication. We have
become familiar with software analysis, designing, implementation, testing and maintenance tasks related
to our project .This RFID based Anti-Theft and Tracking System will be a great asset in securing the objects
that are a defining character for our country. The system will also minimize the high dependence of security
systems on the manual system which has proven to be inefficient in previous cases. The security system
designed is found to be applicable and beneficial for many other organizations as we have tried to mention
in chapter one. We believe, our project will be applied to every museum in our country and in every other
place with a need of security as the electronic devices are more accessible and as the technological
development in our country is increasing.
36
A better tracking devices with very small size and great portability should be used for future
implementation of the system.
Finally, rather than developing systems for individual sectors, a more general system design could
be developed that could be applied to many different sectors that could benefit from the project.
37
Appendix A
Code for Simulation Circuit
# include hServo:hi
# include hString:hi
# include hLiquidCrystal:hi
# de_ne wait 1
# de_ne time 10
LiquidCrystal lcd(12, 11, 5, 4, 3, 2);
int x[7]= f1; 2; 3; 4; 5; 6; 7g;
int y[7]= f1; 0; 3; 4; 5; 0; 7g;
String name[7]= f"HERITAGES"; "LUCY "; "COINS"; "BERANA";
"ANTIQUES"g;
int led = 13;
int freq = 0;
Servo myservo;
int potpin = 0; nnanalog pin used to connect the potentiometer
int val;
void setup()
{
myservo.attach(9); nnattaches the servo on pin 9 to the servo object
pinMode(led, OUTPUT);
}
nnanalog pin used to connect the potentiometer void loop ()
{
Val = analog Read(pot pin); nnreads the value of the potentiometer (value between 0
and 1023)
Val = map (Val, 0, 1023, 0, 179);
for (int i=0; i<7; i++)
{
38
delay(3000);
if (y[i] != i+1) f
while(1) f
lcd.clear();
lcd.print("LOST DEVICE ID NO ");
lcd.print(i+1);
lcd.print(" n n");
lcd.print("DEVICE NAME: ");
lcd.print(name[i]);
nn scale it to use it with the servo (value between 0 and 180)
myservo.write(val);
nnsets the servo position according to the scaled value
delay(1000);
digitalWrite(led, HIGH); nnturn the LED on (HIGH is the voltage level)
delay(100); nnwait for a second
digitalWrite(led, LOW); nnturn the LED o_ by making the voltage LOW
delay(200); nnwaits for the servo to get there print the number of seconds since
reset:
for (freq = 170; freq < 1800; freq += 4) f
tone(8, freq, time); Beep pin, freq, time
delay(wait);
}
}
}
else {
lcd.print("CORRECT ID");
}
}
}
39