RFID security access project using Arduino Uno
Posted on May 30, 2017 9690
Hardware and software configuration
The version of the software to write and run the program, is the Arduino version 1.0.5. The program is a variant of the well known C++ that is distributed free of charge through Official website www.arduino.com. In case you are new to Arduino Uno board, there is a very informative tutorial to reed here.
First you take a usb cable, which transmits its data serially and feeds Arduino with current, you set through the program on the tools -> serial port menu the corresponding port that you connected Arduino to the computer, as you also set the transmission speed of Data rate (baud rate) you choose to be at 19200bps. To move the program to Arduino's memory, write the code on the editor, press the "Verify" button to check for any spelling mistakes that you may have in the code, and the final pass to Arduino is done by pressing the upload button.
Connection program configuration
The source code is written in the software, and by switching over to the Arduino jumper, you achieve either the memory loading or the execution of the program. The displaying is done through the Serial Monitor, which is the main screen of your program, where through it the entire execution process is visible.
The Circuit diagram shows the actual circuit which was drawed with the help of Fritzing, (the program is distributed free of charge). In the drawing you can see the heart of the system which is the Arduino Uno board. There is the usb port that provides the power to your system as well as the DC power port. There are also the input and output ports, where the connections between the other components with Arduino are achieved. There is also the RFID reader for reading your cards, the 16x2 LCD screen that shows you the messages (you have reported at the software) in every analog case. There is also the servomotor that receives a signal from your microcontroller by allowing access to opening the door somehow, the Buzzer that gives you the appropriate sound when you allow access and when not and the two LEDs together with their resistors also light up depending on whether you allow access or not.
Automatically read the EM4102 card
The card consists of a UART frame that is the card ID. This frame determines how your card will be read to pass and identify the data by entering it on the computer. This frame becomes apparent at the following table.
|1 Byte||1 Byte||1 Byte||1 Byte||N Byte||1 Byte|
Passing the card from the Rfid machine is propagated by electromagnetic waves and the card ID with the circuit is the above frame. So every time you pass the card above the circuit, the data is sent in the frame above. Having this data you incorporate it into the code so that it can communicate with the computer. Finally, by passing the card, you decode the above frame that the card transfers you to, and match it to machine language through the code. So you get the 5 blocks of Byte Data in the hexadecimal system and you are shown the unique card code of each user.
The insertion of the code in the system bridges the communication between the computer system (through the software, where Arduino version 1.0.5 is used in this dissertation), and the hardware that consists of its development board Arduino Uno and its peripherals. All types of variables used in the program are supported by the above version. The language in which the security system was programmed is the Wiring language, a variant of C, C++.
The program uses some libraries - functions that are needed to initialize the code that as output will have the correct tone function in the buzzer and also the correct operation of the screen of the servomotor and the RFID reader. The tone function of the buzzer is shown in the Pitches.h file, which includes all the initializations for the notes supported by the wiring language. This header file is integrated into the main program and runs inside it.
There are already nine users stated in the code, 7 active and 2 inactive (James, Robert, Michael, William, David, Richard, Charles and Joseph). Change names, add/remove, activate/deactivate users at your needs.
Some expansion Ideas
A future development of the system could be to create an appropriate software on the computer that will communicate with the microcontroller and keep an entry record of people who have requested access to a memory card or a hard disk. Also, the input file (database) can keep statistics and give you full control over the people who have accessed the system (Time, Day, Month).
Also, with the addition of another RFID reader, output control can also be achieved to know the time and date of entry and exit of the authorized persons. This way you fully cover the entry and exit of those who have access to your system.
A near-field communication (NFC), which is a novel technology of connectivity, is spreading and evolving rapidly with the main purpose of solving several problems, both modern and future. Its function is based on contact or approach, at a distance of 4 or 5 centimeters of the device that contains the NFC chip. This technology combines older wireless technologies such as Bluetooth and RFID, which are harmonized to provide services to users in access control, electronic transactions, exchange and collection of information, legality, payments, money transfers, Certifications, etc.