Sei sulla pagina 1di 12

RFID

BASED DEVICE CONTROL AND AUTHENTICATION


RFID BASED TOLL TAXRFID BASED BANKING

RFID BASED DEVICE


CONTROL AND
AUTHENTICATION

Submitted By:

RFID
BASED DEVICE CONTROL AND AUTHENTICATION
RFID BASED TOLL TAXRFID BASED BANKING

INTRODUCTION
The main objective of this project is to provide security in an
organization by allowing only the authorized personnel to access
the secure area. The security of any organization is a priority for
the

authorities.

The

concern

is

for

the physical property and also for the intellectual property. For t
his reason only the authorized person with a valid RFID tag is
allowed into the secured premises. This

tag contains an

integrated circuit that is used for storing and processing


information and modulating, demodulating the radio frequency
signal that is being transmitted. Thus, once the person shows the
RFID tag to the card reader it scans the data present in the tag
and compares it with the data present in the system. When the
data matches with that in the microcontroller, the load will be
turned ON which is driven by a relay and it displays a message

RFID
BASED DEVICE CONTROL AND AUTHENTICATION
RFID BASED TOLL TAXRFID BASED BANKING
AUTHORIZED else states UNAUTHORIZED and doesnt
allow access. This project can be further enhanced by interfacing
it with GSM technology. Any attempt for unauthorized access
can be intimated to the security personnel through an SMS.
AS Low-cost computing devices become more pervasive,
counterfeiting may become a more serious security threat. For
example, the security of access control or payment systems will
rely on the authenticity of low-cost devices. Yet in many
settings, low-cost pervasive devices lack the resources to
implement standard cryptographic authentication protocols.
Low-cost Radio Frequency Identication (RFID) tags exemplify
such resource-constrained devices. Viewing them as possible
beneciaries of our work, we use RFID tags as a basis for our
discussions of the issues surrounding low-cost authentication.
Low-cost RFID tags in the form of Electronic Product Codes
(EPC) are poised to become the most pervasive device in history
. Already, there are billions of RFID tags on the market, used for
applications

like

supply-chain

management,

inventory

monitoring, access control, and payment systems. Proposed as a


replacement for the Universal Product Code (UPC) (the barcode

RFID
BASED DEVICE CONTROL AND AUTHENTICATION
RFID BASED TOLL TAXRFID BASED BANKING
found on most consumer items), EPC tags are likely one day to
be axed to everyday consumer products.
Todays generation of basic EPC tags lack the computational
resources for strong cryptographic authentication. These tags
may only devote hundreds of gates to security operations.
Typically, EPC tags will passively harvest power from radio
signals emitted by tag readers. This means they have no internal
clock, nor can perform any operations independent of a reader.
In principle, standard cryptographic algorithms asymmetric or
symmetric can support authentication protocols. But
implementing an asymmetric cryptosystem like RSA in EPC
tags is entirely infeasible. RSA implementations require tens of
thousands of gate equivalents. Even the storage for RSA keys
would dwarf the memory available on most EPC tags. Standard
symmetric encryption algorithms, like DES or AES, are also too
costly for EPC tags. While current EPC tags may have at most
2,000 gate equivalents available for security (and generally
much less), common DES implementations require tens of
thousands of gates.

Although recent light-weight AES

RFID
BASED DEVICE CONTROL AND AUTHENTICATION
RFID BASED TOLL TAXRFID BASED BANKING
implementations require approximately 5,000 gates [11], this is
still too expensive for todays EPC tags.
It is easy to brush aside consideration of these resource
constraints. One might assume that Moores Law will eventually
enable RFID tags and similar devices to implement standard
cryptographic primitives like AES. But there is a countervailing
force: Many in the RFID industry believe that pricing pressure
and the spread of RFID tags into ever more cost-competitive
domains will mean little eective change in tag resources for
some time to come, and thus a pressing need for new lightweight
primitives.

HARDWARE USED
1.

89S52 Microcontroller

2.

Voltage regulator 7805.

3.

Diode IN4007

4.

RFID Module.

RFID
BASED DEVICE CONTROL AND AUTHENTICATION
RFID BASED TOLL TAXRFID BASED BANKING
5.

Some other components.

SOFTWARE USED
Keil u-Vision 3.0
Keil

Software

is

used

provide

you

with

software

development tools for 8051 based microcontrollers. With


the Keil tools, you can generate embedded applications
for

virtually

every

8051

derivative.

The

supported

microcontrollers are listed in the -vision.

AN INTRODUCTION TO 8051
MICROCONTROLLER:

When we have to learn about a new computer we have to familiarize


about the machine capability we are using, and we can do it by studying
the internal hardware design (devices architecture), and also to know
about the size, number and the size of the registers.

A microcontroller is a single chip that contains the processor (the


CPU), non-volatile memory for the program (ROM or flash), volatile
memory for input and output (RAM), a clock and an I/O control unit.

RFID
BASED DEVICE CONTROL AND AUTHENTICATION
RFID BASED TOLL TAXRFID BASED BANKING
Also called a "computer on a chip," billions of microcontroller units
(MCUs) are embedded each year in a myriad of products from toys to
appliances to automobiles. For example, a single vehicle can use 70 or
more microcontrollers. The following picture describes a general block
diagram of microcontroller.

INTRODUCTION TO RFID

Radio-frequency identification (RFID) is an automatic identification


method, relying on storing and remotely retrieving data using devices
called RFID tags or transponders. The technology requires some extent
of cooperation of an RFID reader and an RFID tag.
An RFID tag is an object that can be applied to or incorporated into a
product, animal, or person for the purpose of identification and tracking
using radio waves. Some tags can be read from several meters away and
beyond the line of sight of the reader.
An RFID tag is an object that can be applied to or incorporated into a
product, animal, or person for the purpose of identification and tracking
using radio waves. Some tags can be read from several meters away and
beyond the line of sight of the reader.

RFID
BASED DEVICE CONTROL AND AUTHENTICATION
RFID BASED TOLL TAXRFID BASED BANKING

What is RFID?
A basic RFID system consists of three components:
a) An antenna or coil
b) A transceiver (with decoder)
c) A transponder (RF tag)

Electronically programmed with unique information. There are many


different types of RFID systems out in the market. They are categorized
according to their frequency ranges. Some of the most commonly used
RFID kits are as follows:

1) Low-frequency (30 KHz to 500 KHz)


2) Mid-Frequency (900KHz to 1500MHz)
3) High Frequency (2.4GHz to 2.5GHz)

These frequency ranges mostly tell the RF ranges of the tags from low
frequency tag ranging from 3m to 5m, mid-frequency ranging from 5m

RFID
BASED DEVICE CONTROL AND AUTHENTICATION
RFID BASED TOLL TAXRFID BASED BANKING
to 17m and high frequency ranging from 5ft to 90ft. The cost of the
system is based according to their ranges with low-frequency system
ranging from a few hundred dollars to a high-frequency system ranging
somewhere near 5000 dollars.

Typical Applications for RFID


Automatic Vehicle identification
Inventory Management
Work-in-Process
Container/ Yard Management
Document/ Jewelry tracking

RFID
BASED
DEVICE
AND AUTHENTICATION
RFID
BASED
TOLL CONTROL
TAXRFID BASED
BANKING

BLOCK DIAGRAM OF PROJECT

RFID TAG

RFID READER

AT89S52 MICRO CONTROLLER RELAY

LCD
DISPLAY

Potrebbero piacerti anche