An Rfid-Based Access Control System Using Electromagnetic Door Lock and an Intruder Alert System

Makanjuola, Philip Olawatimileyin and Shokenu, Emmanuel Segun and Araromi, Haonat Olajumoke and Idowu, Peter Olalekan and Babatunde, Joshua Dada (2022) An Rfid-Based Access Control System Using Electromagnetic Door Lock and an Intruder Alert System. Journal of Engineering Research and Reports, 22 (11). pp. 7-17. ISSN 2582-2926

[thumbnail of sciencedomain,+Shokenu22112022JERR88675.pdf] Text
sciencedomain,+Shokenu22112022JERR88675.pdf - Published Version

Download (486kB)

Abstract

Aims: The study was conducted to develop a basic security system that integrates Radio Frequency Identification (RFID), an electromagnetic lock, and a GSM Module to produce a lowcost and effective access control system. This work uses the possibility of improving access control door security by replacing a door key with a dependable electromagnetic door lock system for only authorized persons utilizing RFID and a mobile call intruder warning system.

Methodology: The system is controlled by an ATMEGA328 microcontroller, which instructs the RFID reader to check and verify the users' unique identity tags before unlocking the electromagnetic lock to grant access or alert the administrators through the GSM module if an invalid tag is used. The microcontroller which also controls a liquid crystal display was programmed using Arduino C language; the data of identification tags were stored in its database. The RFIDbased access control with electromagnetic lock and intruder alert consists of three main parts – the INPUT (RFID), CONTROL (ATMega 328), and OUTPUT (Electromagnetic lock, LCD, Buzzer, and GSM Module). The RFID reader was able to scan tags and open a prototype door when a valid tag is used. The motor closes the door after a preset 5 seconds delay.

Conclusion: When compared to well-known techniques in the literature, the developed RFID Access control system outperforms them in terms of accuracy and cost-effectiveness. The door locking system works in real-time because when the user places the tag in contact with the reader, the door opens and the check-in information, together with the user's basic information, is recorded in the central server.

Item Type: Article
Subjects: Open Article Repository > Engineering
Depositing User: Unnamed user with email support@openarticledepository.com
Date Deposited: 15 Mar 2023 10:40
Last Modified: 26 Jul 2024 06:31
URI: http://journal.251news.co.in/id/eprint/827

Actions (login required)

View Item
View Item