Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 8

RFID-based Elevator Access Control System

Akansha Yadav, Anushka Sahu, Mayank Jain, Aniket Masram


Information Technology,
Yeshwantrao Chavan College of Engineering
akayadav87@gmail.com
anushkasahu234@gmail.com
mayankjainpv@gmail.com
aniketmasram11@gmail.com
Abstract— This work focuses on building the Elevator tags, but they are unable to alert security professionals through
Access Control System for use in department inside the SMS.
college premises. The objective of the system is to prohibit A kindergarten intelligence security system based on RFID
the entry of unauthorized users into the lift by making use was suggested in [16]. It automates child security surveillance
of RFID technology and NodeMCU. RFID is the and integrates with the kindergarten's current security
communication technology that is widely referred to as management system, which uses RFID tags that are sewn into
electronic tags. Radio signals can be used to identify a the students' uniforms. However, the technology is unable to
particular target and the related data can be read and alert security professionals when a threat exists. an RFID
written without the need for direct communication. The access control.
aim of these system is to increase security in the A study describing a security system employing radio
department, by prohibiting the access of unauthorised frequency identification technology to prevent asset theft was
users and the data of the entered users is recorded in the published in [17]. The purpose was to develop a FRID-based
database along with their access time for future use. It is security system to prevent motorbike theft (Ultra high
noted that the system response time per person is 1.20 frequency range; 905 – 925MHz). The technology alerts the
sec/per which comes out to be faster than other available security guards for additional inquiry if the tag contains
access control systems. inaccurate information. It can serve as a signal to trigger a
second circuit that will switch down the motorcycle's engine
Keywords— RFID, NodeMCU, Security and turn on Closed Circuit Television (CCTV) to film the
theft as it happens. To prevent disturbances, the system would
I. Introduction have worked better with SMS to the guards.
Lifts are present in all public and private workplaces, malls,
residential buildings, hospitals, educational institutions, and so The purpose of this work is to develop an access control
on. They can be easily available to everyone, from the system, which allows you to restrict and regulate access to
building's tenants or occupants to regular visitors to complete various areas while keeping information about all attempts to
strangers who enter the premises. Out of all the enter the premises for further use of this information. It is
aforementioned individual identities the last one is likely to worth noting that the installation of access control systems
pose a security risk as it is unknown. Elevator access makes it possible to prohibit entry inside the lift and record
management is essential to solve this problem on a basic level. the information of the people accessing the lift along with the
RFID is an extremely popular solution for access control time they entered the lift.
systems. Electromagnetic fields are used by Radio Frequency
Identification (RFID) to automatically identify and track II. LITERATURE REVIEW
numerous things. The majority of RFID systems comprises of
access control server, a reader with an antenna, and a F. Lourenco and C. Almeida [1], have developed an RFID-
microchip with an antenna (tag). An RFID system cross- based monitoring and access control system consisting of a
references the data stored on the tag with its own database. server, RFID terminal, camera, and an alert device. When the
The access is then provided if the data matches with the data transponder is detected, the terminal captures an image and
stored in database. An RFID access control system, as transmits the data which includes UID and photo to the server
previously stated, typically comprises of a tag, a reader with through a TCP/IP connection. Then the server searches the
an antenna, and an access control server. A radio frequency database for this query and sends the results back to the
energy field is continually emitted by the card reader. As a terminal to allow or prohibit access. The system also monitors
result, when the card enters the field, the power from the RF whether a person tries to enter when the door is open without
field energises a copper wire aerial inside the card. The wire completion of the authentication process and turns on the alert
connects to the smart card chip included within the card. device using web services. The performance of the system is
The aerial powers the chip that contains the ID number as well tested by integrating RFID with antennas covering a range of
as any additional data on the card, such as a unique customer 10 cm and satisfactory results are obtained.
or facility code. The reader is then given the ID number.
Finally, the reader transmits the card number to the access X. L. Meng, et. al [2], have developed an RFID-based
control system, which determines whether the cardholder is embedded security authentication system with a face
permitted to enter or not. recognition structure. The system comprises two phases
namely registration and recognition. In the registration phase,
Background and Related Work
A significant amount of study has been done on RFID-based 10 pictures of the user's face with different emotions are
security access control systems by a number of researchers. In collected and characteristics information is obtained with an
[13][14], an RFID-based campus access control system and an extraction algorithm. This information along with a UID is
automatic gate-opening system for automobiles were written on the RFID tag. In the recognition phase, a camera
suggested. The systems allow authorised users with valid tags tracks the face, and an extraction algorithm returns the
access and refuse access to unauthorised users with invalid characteristic information of the face in the picture. Then this
information is matched with the information already stored on required modifications to the system in areas like identifying
the tag for authentication. The entire processing is done on an the criminals who are blacklisted in a particular area. Another
embedded ARM11 processor, S3C6410 instead of a computer one is in the banking to provide security, based on facial
terminal/server which has resulted in a faster response time, recognition, and can also keep track of account holders record
about 57ms with authentication accuracy of up to 86.5%. A that who is accessing them. In this way, they can enhance the
comparison of system performance was carried out with the proposed system efficiently by making some modifications
existing database systems and is found to have far better according to requirements.
response time with the same authentication accuracy.
Tejas Kanada et. a proposed an IoT-based Automated
D. L. Wu, et. [3] has described an access control system Elevator System that uses QR (Quick Response code) [6]
based on RFID in conjunction with face recognition based on which has a web application to reduce manual work. By using
a neural network. The system recognizes the face of the this technology people can access the lifts through their
person holding an RFID card and denies access if a person is mobile devices and by simply entering the floor number in it
found to be unauthorized. they can reach their location. For implementing this they have
RBFNN (Radial basis function neural network) has been used used several technologies such as Firebase cloud to manage
for learning the face of authorized persons. PCA which stands the web application database and the three most important
for Principal component analysis has been used for extracting devices NodeMCU, Motor, and IR sensor.
the features from the image and linear discriminant analysis in
short LDA for refining these features. The network is trained Sushil S. Chavhan et.al, [18] proposed RFID based Library
with a localized generalization error model (L-GEM) for Management System that would enable quick transaction flow
enhancing its generalization capabilities. Experimental results and simplify the handling of book issuance and return from
the library. Additionally, it is employed to determine fines
have shown that the proposed system can improve the security
depending on how long books have been missing from the
of RFID access control.
library database.
Dilip Mathuria et al. [4] implemented a biometric-based
elevator controller using a field programmable gate array III. METHODOLOGY
(FPGA), a kind of Programmable Logic Device (PLD) IC.
The programmer can use PLDs in a variety of ways. Figure 3 below represents the stages that are used for
Additionally, it enables the programmer to connect numerous determining the flow of progress. It was divided into two
digital logic circuits of varying complexity levels and sizes. different stages. In the first stage research related to
Programmable logic elements and customizable linkages for hardware components was done, where the hardware
joining logic blocks make up an FPGA. They are typically components have been identified and integrated. In the
used to do certain simple combinational operations as well as second stage research and information were collected
simple logic operations. In the proposed article, the authors related to the project software. All the coding relevant
work was done in this stage. After that, integration and
used FPGA to create a biometric-based elevator controller that
simulation of hardware and software was carried out.
was more dependable and cost-effective. Platform with FPGA
Lastly, Testing and Analysis was done where the project
for SoCs by employing hardware acceleration for the was tested and all the data of the project was recorded.
computationally expensive picture pre-processing activities
and image buffer management, the use of the hardware-
software co-design technique results in speed performance. In
the future, errors may be decreased and the system can be
made more dependable by improving the quality of the vein
fingerprint picture.

K. Tarun Reddy et.al, proposed an Intelligent Door Lock


System with Face Recognition [5] that can be used for both
trespasser detection and also provide security for the house
with the help of alert messages sent to the owner. In their
system, the camera captures the sequence of images once the
object is detected in the defined area of the home premises
then it sends an automatic alert to the owner to take the
necessary actions. This face recognition system is
implemented based on standard Haar Cascade and they detect
and recognize the human face by using the OpenCV library on
the Arduino platform. Their system can be utilized by making
embedded applications. It runs at 80 MHz on a 32-bit RISC CPU
based on the TensilicaXtensa L106 (or over clocked to 160
MHz). It features a boot ROM of 64 KB, instruction RAM of 64
KB, and data RAM of 96 KB , . External flash memory is
accessible through SPI.
The ESP8266 module is a low-cost standalone wireless
transceiver that may be utilised in IoT endpoint development.
The microcontroller must utilise a series of AT instructions to
connect with the ESP8266 module. The microcontroller talks
with the ESP8266-01 module via UART at the set Baud rate. As
seen in Fig. 5.

Figure 3: Project Methodology Flow Chart


Figure 4 below shows how the system will function
roughly. When the tag was detected by an antenna in the Fig. 5. Pin diagram of NodeMCU ESP8266
RFID controller, it will send a signal to the NodeMCU and the
data is processed. If the data is valid, NodeMCU will send the Smart Card
command to the h-bridge motor. Finally, the motor will send a The information of a cardholder, is electronically stored in the
signal to open the flap to allow the user to push the level RFID cards or tags, which will contain only small pieces of
button when the user is registered, else the entry will be information about user such as their name, and registration
prohibited and the output is displayed on the LCD screen number. Users will be validated through smart card. In this case,
saying "Sorry you are not allowed". The data of the user will RFID-enabled tags are usually attached to ID cards.
be stored in the database along with his/her access time.

Fig. 6. Smart Card

Figure 4: RFID Elevator Access Control System Architecture


RFID Reader
The system is made up of a NodeMCU, an RC522 RFID Module, RFID readers are used to read RFID tags' unique IDs. When
and RFID tags, h-bridge motor, LCD display. After each product an RFID tag gets into range, the RFID reader scans its unique
is purchased, the information is delivered to the webpage using ID and serially transmits it to the microcontroller or PC. RFID
the ESP8266 WiFi module. The major functional unit of this readers are equipped with a transmitter and an antenna.
system is explained below. RFID systems are classified as active or passive based on how
they are powered and their range:
NodeMCU
Espresso's ESP8266 is a Wi-Fi enabled system on chip (SoC) 1. RFID active system
module. It is mostly used to create IoT (Internet of Things)
RFID tags that are active have their own transmitter instrument panels. One way to utilize an LCD is with a
and power supply (Mostly battery operated). They generally NodeMCU microcontroller. By wiring an NodeMCU
have a read range of 60 feet to 300 feet and operate at 455 microcontroller to the pins of an LCD display it is possible to
MHz, 2.45 GHz, or 5.8 GHz (20 metres to 100 meters).
program the microcontroller to display a desired text string or
2. RFID passive system image on the screen.
Passive RFID tags lack a transmitter and merely
reflect energy (radio waves) from the RFID reader antenna.
They operate in the low frequency (125 KHz) and high
frequency (13 MHz) bands, with a restricted read range of up
to 1m.

Figure 9: LCD display (16x2)


Figure 7: RC522 RFID module
SOFTWARE TOOLS
L298N Dual H-Bridge Motor Drive
This dual bidirectional motor driver, is based on the very In order to implement the RFID based access control system
popular L298 Dual H-Bridge Motor Driver Integrated Circuit. we have exploited the following software: -
The circuit will allow you to easily and independently control
two motors of up to 2A each in both directions. It is ideal for Google Firebase
robotic applications and well suited for connection to a The Firebase Realtime Database is a cloud-hosted NoSQL
microcontroller requiring just a couple of control lines per database that lets you store and sync data between your users
motor. It can also be interfaced with simple manual switches, in real-time. Firebase is use for storing user’s data such as user
TTL logic gates, relays, etc. This board equipped with power name, registration number, access time, access permission.
LED indicators, on-board +5V regulator and protection
diodes. Algorithm Used
For checking whether the user accessing the lift is valid or
not we have used sequential search algorithm that has time
complexity of O(n).
Pseudo -code of sequential search: -
Valid_id_Search (a, n, id) // 'a' is the given array, 'n' is the
size of given array, 'id' is the employee id to be search
Step 1: set pos = -1
Step 2: set i = 1
Step 3: repeat step 4 while i <= n
Step 4: if a[i] == id
set pos = i
print "Name of employee and their employee id"
//In LCD display and send login data i.e. time, date
Figure 8: L298N Dual H-Bridge Motor Driver
and employee detail to firebase
go to step 6
[end of if]
16x2 LCD set i = i + 1
A liquid crystal display, or LCD, is a video display that utilizes [end of loop]
the light modulating properties of liquid crystals to display Step 5: if pos = -1
pictures or text on a screen. Since their invention in 1964, print " Sorry You are Not Allowed "
LCD screens have grown to be used in a very wide variety of [end of if]
applications, including computer monitors, televisions, and Step 6: exit
IV. RESULT

Figure 12: Warning message displayed on detecting invalid


Figure 10: Project Prototype tag

In Figure 10 we can see all the components are connected in In Figure 12 we can see that when the RFID reader detects a
their respective ports and the LCD display also works different RFID tag that seems to be invalid then a warning
remarkably. All the components can be seen in this photo and message is displayed on the LCD display saying "Sorry you
also, we can recognize them easily. are not allowed" and the flap will not get open. Thus, when an
unregistered user is detected, the LCD display will show a
warning message.

Figure 13: Web page module

In figure 13 we can see web page module that is visible to


Figure 11: Welcome Message displayed on detecting valid tag admin only and is helpful for generating report of the users
who have access lift at a particular date and time.
In Figure 11 we can see that the RFID reader detects the valid
RFID tag then the user name and employee ID gets displayed
on LCD screen. This is a sign of valid entry by the user. So
whenever a registered user tag is detected the LCD display
will show user name, employee id and a flap will get open so
that the user can push the level button to enter the lift.
QR Code 1.40

Fingerprint 2.67

Iris 3.53

Face 5.05
Figure 14: report generated after selecting date and clicking
on view button

Figure 14 shows the web page module that will display the Table 1: Response Time of Authentication Technology
data about the users who have accessed the lift along with
their name, employee ID and access time. This report is
generated when the admin will select a particular date and
click on view option.

Accuracy and timing are the most important variables in


access control and personnel management. Every day,
hundreds of users should be able to use the authentication
system reliably and rapidly. Additionally, it's important to cut
waiting times during access control. Through testing and
observation, it was shown that reading mistakes and
processing times for RFID and QR code recognition were less
than those for biometric recognition.

The average processing time for QR codes was 1.4 seconds


per man, compared to 1.2 seconds for RFID cards. Graph 1: Comparative analysis of different access control
Additionally, it has been shown that changing the location of systems
the QR code in relation to the QR scanner's light results in
variations in processing times. The downsides of biometrics
include substantially greater mistake rates and longer V. CONCLUSION AND FUTURE SCOPE
detection times. They do, however, have several benefits, one
of which is that ID cards are not required to be carried. Due to This work is about designing a Radio Frequency Identification
the necessity for a certain stance for proper detection, (RFID) based Elevator Access Control System consisting of
biometric recognitions have often been found to take longer; RFID application NodeMCU, h-bridge motor and LCD
the processing time took two to four times longer than those display. When the valid RFID tag was detected by an antenna
employing RFID or QR codes, as indicated in Table 1. in the RFID reader, it will send a signal to the NodeMCU and
Additional time was required to establish the proper location the data is processed. If the data is valid, NodeMCU will send
in the vein and fingerprint situations to prevent false positives. the command to the h-bridge motor. Finally, the motor will
For the camera to identify the iris or face with iris and face send a signal to open the flap to allow the user to push the
recognition, the worker had to adjust the camera height or level button also, the name and employee ID of the user will
bend his/her worker's, lengthening the process. be displayed on LCD screen, else the entry will be prohibited
and the output will be displayed on the LCD screen "Sorry
you are not allowed". The data of the user will be stored in the
database along with his/her access time for further
Technology Response time per person investigation. Using this system, it can increase the security in
(sec/man) the residential buildings, hospitals, educational institutions,
and so on. During peak time, this system can limit the
undesirable traffic flow by only allow the authorized staff and
RFID 1.20 patient to use the elevator. It is noted that the system response
time per person is 1.20 sec/per which comes out to be faster
than other available access control systems.
FUTURE SCOPE [8] Shi D, Xu B. Intelligent elevator control and safety monitoring
For recommendation, some further improvements can be system[J]. Iop Conference, 2018
made to this project to increase its features and functionality. [9] H.Chabanne, U.Pascal and F.Jean, “RFID and the Internet of
Things” USA : John Wiley & Sons Ltd, 84-96 ; 2019.
This project can be enhanced by using remote monitoring
[10] Ting R. & Keane M. 2017. RFID Door Lock.
systems that can transmit an alert signal through the dial-up [11] Shepard S. 2015. RFID: radio frequency identification.
system to the security guard's mobile phone to warn of McGraw Hill Professional.
attempted denied access. Also, the admin will be able to see [12] OmkarPawar, PrathameshLonkar, Randhir Singh,
how many times a user enters the elevator each day. All the VivekSalunke., “Door Lock System using Facial Recognition”,
information can be found in a database that can be used for International Journal for Research in Applied Science &
further monitoring. Engineering Technology (IJRASET), Volume 7 Issue III, Mar
2019.
REFERENCES [13] Harri, N. (2011) The Study of Business Opportunities and
Value add of NFC application in Security Access Control
[1] F. Lourenco and C. Almeida, “RFID based monitoring and
Solution. Master thesis, Department of Business
access control system,” in Proc. INFORUM, 2019.
administration, Kemi-Tornio, pp 17-19.
[2] X. L. Meng, Z. W. Song, and X. Y. Li, “RFID-Based
[14] Fang, Z., Dagu, H., Zheng, D. and Viping, H. (2008) Design
security authentication system based on a novel face-
and Implementation of an automatic Clearance Control System
recognition structure,” in Proc. WASE International
based on RFID. IEEE 7th world congress intelligent control
Conference on Information Engineering, 2017
and automation (WCICA). Pp 6621 -6626
[3] D. L. Wu, Wing W. Y. NG, Patrick P. K. Chan, H. L. Ding, B.
[15] Santhosh, S. and Sanihosh K. K. (2013) Campus Access
Z. Jing, and D. S. Yeung, “Access control by RFID and face
Control System RFID Based. International Journal of
recognition based on neural network,” in Proc. International
Electronics and Computer Science Engineering. Volume 1,
Conference on Machine Learning and Cybernetics, July 11-14,
Number 3, ISSN: 2277-1956, pp 1439 1445. [8] Kulkarni, A.
2018
M. and Tawaresachin, S. (2013) Embedded Security System
[4] Dilip Mathuria, Aditya Gaur, Ashish Gupta “FPGA
using RFID and GSM. International Journal of Computer
Implementation of Biometric based Elevator Controller” ijetsr
Technology and Electronics Engineering (IJCTEE).Volume 2
2394 – 3386 Volume 5, Issue 3 March 2018
(Issue 1), ISSN: 2249-6343, pp164-168
[5] K. Tarun Reddy, K. Murali, M. Samba Murthy, G. Pavan, Dr.
[16] Zhiyuan, F. (2012) A RFID – based Kindergarten Intelligence
K. Venkata Subba Reddy “Intelligent Door Lock System with
Security System. IEEE Ninth International conference
Face Recognition” IJRASET ISSN: 2321-9653; IC Value:
eBusiness Engineering (ICEBE). Volume 3, pp 321-326
45.98; SJ Impact Factor: 7.429 Volume 8 Issue V May 2020
[17] Jinaporn, N., Wisadsud, S., Nakonrat, P. and Suriya, A. (2008)
[6] Tejas Kanada, Austin Varghese, Apurva Mahajan, Pallavi
Security System against Asset Theft by using RFID
Tekade, Harini Rao “IoT based Automated Elevator System -
Technology. IEEE 5th international conference
using QR Code Functionality” International Journal for
Electrical/Electronic, Computer Telecommunication and
Research in Applied Science & Engineering Technology
information (ECTICON).Volume 2, pp 761 -764.
(IJRASET) ISSN: 2321-9653; IC Value: 45.98; SJ Impact
[18] Prof. Sushil S. Chavhan, Prof. Ganesh K.Yenurkar, Prof.
Factor: 7.429 Volume 9 Issue VI Jun 2021
Rajesh K. Nasare RFID based Transaction and Searching of
[7] Rangani D G, Tahilramani N V. “Automation based elevator
Library Books
control system” International Conference on Applied &
Theoretical Computing & Communication Technology. 2018

You might also like