1 BACKGROUND OF STUDY
Access Control is a term that describes the limiting of access to a restricted area, substance or information. This restriction which may be physical or logical, with respect to what is being restricted. Physical access control presents itself in the form of gates, turnstile and locks. Modern methods of physical access control employs identification techniques that determines who should access where or what, these include: biometric recognition, swipe cards and motion sensors. However, despite the modern approaches to access control, there are still reservations as regards the identification procedures that should be employed to effect the intended control of access. Most notably is the motion detectors; this employs motion sensors that could be microwave or infrared, to sense the motion of any object and send electrical signals to actuators that opens or closes a door. This means of access control has not proven to be effective, because it is not restrictive in its operation. Meanwhile, there are other means as afore mentioned that can be used in physical access control. Swipe cards and biometric recognition are somewhat effective in their ways of application in access control, as they provide a means of restriction, identity recognition
which opens and closes the door and perhaps entry and exit registers. In the acquisition and implementation of these techniques, the primary concern of property owners or managers will be effectiveness and comfort the system provides to its users and mangers. In terms of effectiveness, one can say that swipe cards and biometric recognition techniques as used in access control, should be outstanding, though concerns linger in the area of its offer of comfort. For instance, a member of staff with registered swipe card or body part hurrys to an access way, only to begin the process of scan interrogation before eventually finding his way through. The precious time wasted on interrogation can be avoided if the scans were done distances before he gets to the access way, and besides the stress of fondling pockets for cards and swiping are not needed. The snag with the afore mentioned modern system is that they require a proper line of sight to operate effectively. This makes it compulsory for access seekers to approach the interrogation device and let themselves be scrutinized before gaining clearance. The big question now is: cant there be a system that does not require a proper line of sight for interrogation to take place? Simply put, cant the comfort of distance interrogation and access control effectiveness be put together?
The objective of this design project is to develop an access control system which is efficient as well as comfortable. A system that provides the solution to the discomfort the line of sight presents to other well known techniques of access control, using a radio frequency identification scan. With this scan, the interrogator gets the registered information needed within predefined approaching distance, to grant or deny access.
This work would not go beyond the demonstration of the possibility that radio frequency identification can actually grant or deny access, without needing a defined line of sight. RFID systems can be in various forms with respect to operational performance, coupled with the fact that the read range varies with design parameters such as frequency, RF power level; readers receiving sensitivity, size of antenna, data rate, communication protocol, current consumptions of the silicon device, etc. Due to the undergraduate nature of our study, passive tags are made the subject of interrogation while the design frequency is limited to the low frequency of 125kHz, considering that 125kHz falls within the unregulated band of frequencies managed by the Nigerian Communication Commission.
previous attempts in developing this sort of system. Chapter three describes the actual method and design proceeding taken to achieve the stated objective. Chapter four describes the implementation of the design and inference of results, while chapter five provides the conclusion to the report.
passive RFID system). Under Sir R. Watson-Watt, the British developed the first active identify friend or foe (IFF) system, where they put a transmitter on each British plane so that when it received signals from radar stations on the ground, it began broadcasting a signal back that identified the aircraft as friendly. RFID works on this same basic concept. A signal is sent to a transponder, which wakes up and either reflects back a signal (passive system) or broadcasts a signal (active system).
The 1960s were the prelude to the RFID explosion of the 1970s with R.F. Harringtons studies on the electromagnetic theory related to RFID in his papers including Theory of Loaded Scatterers in 1964. This inspired RFIDrelated inventions such as Robert Richardsons Remotely activated radio frequency powered devices, and J. H. Vogelmans Passive data transmission techniques utilizing radar echoes.Advances in radar and RF communications systems continued through time, as scientists and in the United States, Europe and Japan did research and presented papers explaining how radio frequency energy could be used to identify objects remotely, companies began commercializing anti-theft systems that used radio waves to determine whether an item had been paid for or not. Over time, companies commercialized the low frequency (125 kHz) systems and then moved up the radio spectrum to high frequency (13.56 MHz), which was unregulated and unused in most parts of the world. High frequency offered greater range and faster data transfer rates. In the early 1990s, IBM engineers developed and patented an ultra-high frequency (UHF) RFID system. UHF offered longer read range (up to 20 feet under good conditions) and faster data transfer. UHF RFID got a boost in 1999, when the Uniform Code Council, EAN International, Procter & Gamble and Gillette put up funding to establish the Auto-ID Center at the Massachusetts Institute of Technology. Two professors at MIT, Prof. David
Brock and Prof. Sanjay Sarma, had been doing some research into the possibility of putting low-cost RFID tags on all products made with the idea of keeping track of them on a supply chain. Between 1999 and 2003, the Auto-ID Center gained the support of more than 100 large end-user companies, plus the U.S. Department of Defense and many key RFID vendors. RFID technology has passed through many phases over the last few decades.
technology working on the physical basis of alternating electromagnetic fields. RFID systems consist of three main components, as shown in the RFID schematic above: an antenna, a transceiver and a transponder (passive tag).
The antenna enables communication between the tag and the transceiver, which is also called reader. The tags are usually built using CMOS circuitry while other technologies can be used such as surface acoustic wave (SAW) devices or tuned resonators. These tags are usually powered by a battery or by rectification of the radio signal sent by the reader. According to Karma Ashan et al (2010), they are also capable of sending data to the reader by changing the loading of the tag antenna in a coded manner or by generating, modulating, and transmitting a radio signal. RFID systems can be read-only (data is transferred only in one direction, from the tag to the reader) or readwrite (two-way communication). A typical RFID system can use the principle of modulated backscatter. In this type of RFID system, to transfer data from the tag to the reader, the reader sends an un-modulated signal to the tag which reads its internal memory of stored data and changes the loading on the tag antenna in a coded manner corresponding to the stored data. The signal reflected from the tag is thus modulated with this coded information. The modulated signal is received by the reader, demodulated using a homodyne receiver, and decoded and output as digital information that contains the data stored in the tag. To send data from the reader to the tag, the reader amplitude modulates its transmitted radio signal. This modulated signal is received by the tag and detected with a diode.
km/s, and f is the frequency of the radiation. Generally, introductions to basic electromagnetism begin with Maxwells equations. Maxwells equations which are usually in integral or differential form, provides the foundations upon which all of
electromagnetic theory is based. These equations help to describe the coupled nature of the electric and magnetic field, and also relate them to
their two sources: the electric current density J and the electric charge density . According to Jin Au Kong, (2000), the derivations of Maxwells
( )
( ( ( (
) ) ) )
( )
( )
) (
( )
Equations (2.1) - (2.4) are linear, but not independent. By taking the divergence of equation (2.1), we can derive the continuity of charge law: ( ) ( ) ( )
This law simply states that the decrease in charge density at a single point is equivalent to the divergence of current from an infinitesimal volume around that point. From this point on, the field dependencies on space and time will be assumed and left out of the notation. The constitutive equations characterize the media that electromagnetic waves travel through, by relating the electric field and magnetic field intensities to the electric and magnetic flux densities. In their most general form, they are: ( ( ) )
In general, most transmission media can be modelled as isotropic media, when the cross coupling does not exist and the permittivity tensor and the permeability tensor are replaced by scalar values:
( (
-
) )
and
where
By substituting equation (2.11) into equation (2.10), and doing some rearrangement, we arrive at the Helmholtz wave equation: ( )
From this equation, we can solve for the electric field and consequently, the magnetic field. If we choose our coordinate system such that the electromagnetic wave propagates in the z-direction and the electric field points in the x-direction, the simplest solution takes the form: ( ) ( ) ( )
where k is the spatial frequency of the electromagnetic wave or wave number and wavelength ( The angular frequency is related to the Hertzian frequency of by: ( ) ) is the temporal or angular frequency. K is related to the by:
Substitute equation (2.15) into (2.14), yields the dispersion relation for free space: ( )
The dispersion relation provides insight as to how the electromagnetic wave will propagate through a particular medium. By planting the solution for the electric field of equation (2.15) into equation (2.11), we find a solution for the magnetic field: (
-
The Poynting vector, calculated as the cross product of the electric and magnetic fields, defines the direction of energy flow for an electromagnetic wave, with its magnitude equal to the power density through a surface normal to its direction. For the electric and magnitude fields in equation (2.15) and (2.19), ( the
-
Poynting
vector (
is: )
2.3.2
RFID ANTENNA
For RFID applications, passive RFID tags utilize an induced antenna coil
voltage for operation. This induced AC voltage is rectified to provide a voltage source for the device. As the DC voltage reaches a certain level, the device starts operating. By providing an energizing RF signal, a reader can communicate with a remotely located device that has no external power source such as a battery. Since the energizing and communication between the reader and tag is accomplished through antenna coils, it is important that the device must be equipped with a proper antenna circuit for successful RFID applications. Antennas convert electromagnetic waves into electrical currents and vice versa and their behaviour can usually be mathematically predicted. Ronald J Marhefka et al(2002), defines a radio antenna as a structure associated with the region of transition between a guided wave and a freespace wave or vice-versa. With respect to RFID, antenna is the communication link between the transmitter and receiver via free space. Antenna does not only provide means of transmitting data from reader to tag, but power as well. The topic of antenna is very vast and detailed; this section aims to review the main parameters that characterize the antenna. According to Michael Redemske(2005), one key parameter that defines an antenna is its radiation pattern. In understanding antennas, we
employ a simple antenna like the isotropic emitter, with a point source emitting perfectly spherical electromagnetic waves. This is an ideal antenna that is ideal, though non-existent in reality, but provides a useful comparison bases for real antennas. If we define the total radiated power by an isotropic emitter as PEIRP, where EIRP stands for the effective isotropic radiated power. We can now calculate the power density at a given distance r as: ( )
Since the radiated power density is equivalent in all directions for a particular distance r, this antenna has a spherical radiation pattern, but in reality spherical radiation pattern is not achievable. In the case of a dipole antenna, the radiation pattern takes on a torus-like shape. Klaus Finkenzella(2003). Two other useful quantities of antenna are: directivity and gain. Gain of an antenna is the ratio between the radiated power density of the antenna of interest in a particular direction and some reference antenna of known gain that possesses the same transmission power. Directivity is the ratio between the maximum power density of a particular antenna over its average directional power density which is usually greater than unity, with values corresponding to stronger directional antennas. In practice, directivity is an ideal value which defines how strongly an antenna focuses its radiation
power in one particular direction. While gain is an actual quantity that pertains not just the radiation pattern, but also losses that are caused by impedance mismatch and heat dissipation in the antenna. An antennas efficiency factor is the ratio of the antennas gain to its directivity, which is always less than unity. Another antenna parameter is its input impedance. This is the impedance of the circuit seen by the antenna. If the impedance of the antenna and the corresponding circuit are not matched i.e the real components are equal and the imaginary components are opposite in direction (sign), power can be reflected or dissipated, thus lowering the antennas effective gain and efficiency. This is a very important parameter to tag antennas, where maximum power transfer is needed to achieve the greatest possible read distance. Therefore, with design parameters like gain and directivity, EIRP (effective isotropic radiated power), ERP (equivalent radiated power), input impedance, radiation resistance, effective aperture, scatter aperture and effective length result in different types of antennas: I. Dipole Antenna - One example is the extended half-wave dipole ( /2), consisting of a straight piece of copper wire, which is interrupted half way along. This is where it is supplied. The 2-wire folded dipole is another example. II. Yagi-Uda Antenna - is a directional antenna consisting of directors and a reflector. It is only used for readers, due to its size.
III.
Patch or Micro-strip Antenna - is used in the latest generations of GPS receivers and mobile telephones, but also in RFID systems.
IV.
Slot Antenna - consists of a metal surface, with a slot of length /2 cut out. Advantages are its size, its design simplicity and robustness.
V.
These are called ISM frequency ranges (Industrial-Scientific-Medical). The most important frequency ranges are 0-135kHz, and the ISM frequencies around 6.78MHz, 13.56MHz, 27.125MHz, 40.68MHz, 433.92MHz, 869.0MHz, 915MHz (not in Europe), 2.45GHz, 5.8GHz and 24.125GHz.
combination of active and passive tags characteristics. So, mainly two types of tags (active and passive) are being used by industry and most of the RFID system CAENRFID (2008). The essential characteristics of RFID tags are their function to the RFID system. This is based on their range, frequency, memory, security, type of data and other characteristics. These characteristics are core for RFID performance and differ in
usefulness/support to the RFID system operations, Karma Ashan (2009). While considering these characteristics, figure 2.2 compares the active
2.3.4.2
Tag Frequencies
The range of the RFID tags depends on their frequency. This frequency determines the resistance to interference and other performance attributes E. Ziesel (2006). The use/selection of RFID tag depends on the application;
different frequencies are used on different RFID tags, A. Narayanan (2005). EPCglobal and International Standards Organization (ISO) are the major organizations working to develop international standards for RFID technologies in the UHF band. These two organizations are still evolving and are not fully compatible with each other. In order to avoid the use of different radio frequencies standards, most of the international communities are obligated to comply with the International Telecommunication Union (ITU) standards. The following are the commonly used frequencies: * Microwave works on 2.45 GHz, it has good reader rate even faster than UHF tags. Although at this frequency the reading rate results are not the same on wet surfaces and near metals, the frequency produce better results in applications such as vehicle tracking (in and out with barriers), with approximately 1 meter of tags read range CAENRFID (2008). * Ultra High Frequency works within a range of 860-930 MHz, it can identify large numbers of tags at one time with quick multiple read rate at a given time. So, it has a considerable good reading speed. It has the same limitation as Microwave when is applied on wet surface and near metal. However, it is faster than high frequency data transfer with a reading range of 3 meters, CAENRFID (2008). * High Frequency works on 13.56MHz and has less than one meter reading range but is inexpensive and useful for access control, items
identifications on sales points etc as it can implanted inside thin things such as paper L. Srivastava (2005). * Low Frequency works on 125 kHz, it has approximately half a meter reading range and mostly used for short reading range applications such as shops, manufacturing factories, inventory control through in and out counts, access control through showing a card to the reader. These low frequency tags are mostly not affected when applied on wet and near metal surfaces T. Frank et al (2006).
which also known as network readers, L. Sandip (2005). Readers are electronic devices which can be used as standalone or be integrated with other devices and the following components/hardware into it E Ziesel (2006). :power for running reader, communication interface, microprocessor, channels, controller, receiver, transmitter and memory. Readers use near and far fields method to communicate to the tag through its antennas. If a tag wants to respond to the reader then the tag will need to receive energy and communicate with a reader. For example, passive tags use either one of the two following methods CAENRFID (2008). * Near Fields: Near field uses method similar to transformer, and employs inductive coupling of the tag to the magnetic field circulating around the reader antenna (see figure 2.6).
* Far Field: Far field uses method similar to radar, backscatter reflection by coupling with the electric field. The distinction between the RFID systems with far fields to the near near fields use LF
control system. He recognised the problem of identity collision in access control systems employing RFID technology. This inspired his work that developed a simple algorithm for the detection of direction of movements surrounding a door. The solution algorithm obtained interesting results, though presented in Matlab simulation. This project differs from the one stated above, as it tries not to simulate, but actually design the reader or interrogator that will utilize RFID and demonstrate the ease of RFID technology in improving access control. Considering that the work of Kornbrekke et al provides anonymity with the use of infrared transmitters and sensors, which makes access control somewhat limited.
This chapter aims to define the design goals as well as analyse the fundamental blocks and part sections required for the development of a radio frequency identification system to be implemented for improving access control as discussed in previous chapters. Discussions here are on the architecture design of the RFID reader. Also in view are the functional designs at a lower abstraction level of the different functional blocks of the reader coupled with the algorithm flowchart of the microcontroller.
not constantly available, e.g. during flight on an airplane. Obviously, it should not be possible to forge these records in any way.
RF Choke
Tag Antenna
Envelope Detector
Figure 3.1
This design which comprise mainly of two parts outside the RFID tag to be obtained is with the motive of achieving the expected read range offered by the 125kHz un-regulated frequency. Notably seen in the depiction above is the freely hanging capacitor that is situated just outside the design. This capacitor, though out of any particular functional block, plays a role of differentiating the transmitted signal from received signal, so as to eliminate confusion as regards signal reception.
design purpose. Although each individual part of the circuit will be described in detail later, the general idea for circuit operation is as such: The microcontroller provides a timer-driven 125 KHz square wave for the carrier frequency that is sent through the RF choke, which is essentially a passive low-pass filter with steep drop-off to knock out the upper harmonics and leave only a sine wave. Since the reader antenna coil is a series resonant L-C circuit, maximum resonance is achieved at minimum impedance, so it is very important that adequate current amplification is done as to not overdrive the microcontroller. The sine wave is then amplified to maximize current. On the receiving end, the signal is first put through the envelope detection block where it is first half-wave rectified, and is then fed through a half-wave R-C filter to help knock out most of the 125 KHz carrier and detect the envelope signal. This signal is then band-pass filtered using a series of Twin-T active band-pass filters, and low-pass filtered with an active Butterworth filter to further decrease gain in frequencies outside of the 10-20 KHz area and increase gain of the envelope signals such that it saturates the op-amps of the filters. At a final stage the signal is put through the pulse-shaping circuit which comprise of the comparator and resistive divider to produce a nice square wave at logic levels, which are fed to some D-flip flops and a decade counter to extract data from the modulating square waves. The signal is then finally passed on to the microcontroller and processed.
The following are the individual blocks and reasons behind their selection: i. Microcontroller: Performs digital signal processing, communicates with the host computer and provides the timer driven 125kHz square wave for the carrier frequency using an attached 4MHz crystal oscillator. ii. RF Choke: Simply a passive low-pass filter whose task is to knock off the upper harmonics of the square wave from the microcontroller and output a clean 125kHz signal. iii. Carrier Signal Amplifier: In an effort to match impedance with the RFID tag antenna coil and ensure the maximum transfer of power through the antenna coil through magnetic coupling, it is important to amplify the power of the signal while reducing the impedance of the circuit. Hence this component block was attached to the signal before the antenna coil. iv. Reader Antenna Coil: It is a fundamental principle that when an electric current flows through a conductor, it generates a magnetic field in a direction normal to the direction of the current flowing in the conductor. Because the medium of communication between the reader circuit and tag coil is by magnetic coupling, it was paramount to generate a magnetic field through an antenna at the end of the signal.
Hence this component block of antenna coil need be attached to the tip end of the circuits transmitting section. v. Envelope detection: Since the receive antenna coil is also the transmit antenna coil, a circuit to detect the modulated signal from the tag is attached to receive the backscattering signal and filter some of the 125kHz carrier signal still attached to it. vi. Filter and Amplifier: To uncover the information on the received signal, there is need to filter the signal and then pass it on through a signal amplifier to boost its strength before signal processing. vii. Pulse shaping: This component block is required to make the received, filtered and amplified signal digital. This means that we need to make the signal ready for processing by the microcontroller. This is done be pulse shaping the signal into a square wave of digital levels using comparators and digital logic combinations. viii. Serial Interface: As part of the design goal is to make the reader capable of administration, a serial interface is designed to connect the microcontroller and the processed signal to a host computer that will be man managed.
A microcontroller is used to handle the digital signal processing aspects of this project. Considering the fact that the intention is to limit the number of component items, the idea is then to eliminate the conventional signal generator used to provide signal of a preset frequency. Research uncovered a powerful and dynamic microcontroller with features that fit well with the design needs and dynamic enough to provide the carrier signal from the output of a 4MHz crystal oscillator. The ATmega32 is a low-power CMOS 8-bit microcontroller based on the AVR enhanced Reduced Instruction Set Computer(RISC) architecture. By executing powerful instructions in a single clock cycle, the ATmega32 achieves throughputs approaching one Million Instruction Per Second(MIPS) per MHz allowing the system designer to optimize power consumption versus processing speed. The AVR core combines a rich instruction set with 32 general purpose working registers. All the 32 registers are directly connected to the Arithmetic Logic Unit (ALU), allowing two independent registers to be accessed in one single instruction executed in one clock cycle. The resulting architecture is more code efficient while achieving throughputs up to 10X faster than conventional Complex Instruction Set Computer(CISC) microcontrollers. The ATmega32 provides the following other features: 32Kbytes of In-System Programmable Flash Program memory with ReadWhile-Write capabilities
32 general purpose I/O lines 32 general purpose working registers JTAG interface for Boundary-scan On-chip Debugging support and programming Three flexible timer/counters with compare modes, internal and external interrupts Serial programmable USART. The Idle mode stops the CPU while allowing the Universal Synchronous Asynchronous Receive and Transmit(USART), two-wire interface, A/D Converter, SRAM, timer/counters, SPI port, and interrupt system to continue functioning. The Power-down mode saves the register contents but freezes the Oscillator, disabling all other chip functions until the next external interrupt or hardware reset.. By combining an 8-bit RISC CPU with In-System Self-Programmable Flash on a monolithic chip, the Atmel ATmega32 is a powerful microcontroller that provides a highly-flexible and cost-effective solution to many embedded control applications like this RFID reader design project, needed to demonstrate the improvement of access control with RFID technology.
3.3.2 RF Choke
This is designed to be a low-pass filter that knocks off the upper harmonics of the incoming 125kHz square wave signal, thereby turning the square wave signal into a 125kHz sine wave signal. This component block is designed similar to the conventional L-C low-pass filter. The design consideration for the choke was guided by the fact that the microcontroller provides a 125kHz signal with an amplitude of 5V. In other not to over work the microcontroller, a suitable R1 needs to be selected whose impedance is right enough to pass the current. Also to be considered is the fact that the value of the current needs to be high enough to drive the antenna. Hence due to its availability and little impedance size, an 82 resistor is expected to give us appreciable impedance. As depicted in the schematic, a 125kHz square wave is generated from a signal generator and passed on to the RF Choke. For the L-C low-pass filter with the output coming off the capacitor C2, the transfer function for low-pass filters, which is given in equation (3.1)
Figure 3.2
But at resonance frequency of 125kHz That is Solving mathematically, equation 3.1 becomes:
2 c c
(-
Using an available and common inductor of 1mH as L, C1 can be obtained from equation 3.2 as follows:
Then with C1 = 1.62nF, R = 82 and L as 1mH, the value of C2 can be obtained from equation 3.4 by proper substitution and evaluation as follows:
(c
( Then Therefore; (( ) )
The expectation is that this capacitance will provide the needed gain for the filtering process.
Figure 3.3
In RFID applications, the antenna coil is an element of resonant circuit and the read range of the device is greatly affected by the performance of the resonant circuit. The resonance frequency (fo) of the circuit is determined by:
where fo is the resonant frequency (in Hertz), L is inductance (in Henry) and C is capacitance (in Farads). The resonant circuit can be formed either series or parallel. The series resonant circuit has minimum impedance at the resonance frequency. As a result, maximum current is available in the circuit. This series resonant circuit is typically used for the reader antenna. On the other hand, the parallel resonant circuit has maximum impedance at the resonance frequency, because it offers minimum current and maximum voltage at the resonance frequency. This parallel resonant circuit is used for the tag antenna. The first consideration as adapted from H. Hardy (1976) for the antenna design is that the data rate for FSK(Frequency Shift Keying) signal is 12.5kHz, then a bandwidth of 25kHz is needed for a full data recovery. The quality factor Q is then obtained from the relation:
Also we can now obtain the inductance of our antenna from the relation:
With Q=5, r=82 and our resonance frequency remains the same, we obtain L:
Which is approximately 0.5mH. To obtain the value of the coupling capacitor, we substitute the value of L and the resonant frequency into equation (3.4), Firstly, we realise that
Then C Then the value of the coupling capacitor to be in series with the inductor to make up the series resonant antenna is about 3.2nF. Since the C2 is grounded, the carrier signal (125 kHz) is filtered out to ground after passing the antenna coil. The circuit provides minimum impedance at the resonance frequency which results in maximizing the antenna current, and therefore, the magnetic field strength is maximized. In order to determine the coil parameters, we by optimisation with respect to the expected read range of our reader circuit obtain the gain of our antenna using equation (3.9) below as adapted from R. Gagliardi(1988):
Where =wavelength, Pt=power of transmitter, Gt=gain of transmitter, Gr=gain of tag and Pth is the tag response threshold. Knowing that the expected read range is about 0.1524m, is also known to be 2.4km, Pth is 0.16X10-6, Gr is 0.12dB, and Pt is 0.3mW, we can then compute the value for Gt: Firstly, we make Gt the subject of the formulae of equation (3.9) to obtain:
( )
equation 3.10
2.83206X10-9dB.
Then the gain of the transmitter to be approximately equal to 2.83X10-9dB. With this gain we can now employ the expression relating antenna gain and antenna width which is given as:
Where d is the width or diameter of antenna with regards to its nature: rectangular loop or circular loop. Using the obtained gain, the antenna diameter can now be obtained as follows: From equation 3.11, we make d the subject of the formulae which is: Therefore
-
= 0.0360m
this is about 3.6cm. With this width and with a proportionate length, coupled with the value for inductance already obtained, we can now estimate our required number of coil turns for the antenna design using the expression shown in equation (3.12) below as adapted from F. Grover,(1946).
(( ( )
) )
Where L is the inductance (in milli-Henry), x and y are the width and length of the coil (in cm), h is the height of the coil (in cm), b is the width across the conducting part of the coil (in cm) and N is the number of turns. In this design case, the estimations are: y=13.8 cm, h=1 cm and b=0.3cm. With these estimates and the width x = 3.6cm, the numbers of turns are then calculated from equation (3.12). Firstly, we make N (number of turns of loop antenna) the subject of the formulae from equation (3.12). From which we obtain:
( )
Therefore,
That is approximately 90 turns. Although these are estimates, fine tuning is expected during implementation.
discharge path for the voltage charged in the C2. As is the norm for filtering AC signals in this manner there is some 125 KHz ripple, but choosing good values we could make the enveloping frequencies stand out from the ripple. For this we chose R=390k and C= 2.2nF, with respect to proven RC filter design from Microchip. Once signal leaves this stage, it passes through the capacitor C3 to knock out the DC offset and into the next set of filters. Once signal leaves the envelope detector, it is passed through a capacitor to knock out the DC offset, before getting to the next stage of signal processing.
frequency enveloping the carrier frequency. To switch between a "1" and a "0", the tag switches the modulating frequency. The two frequencies used by obtained cards are 12.5 KHz (125 KHz/10) and 15.625 KHz (125 KHz/8), which correspond to 1 and 0 respectively. Armed with this, it is expedient to design efficient filters to pass only a band of frequency carrying the data needed in the modulated signal. This act of band passage should also be accommodating of attenuation gain.
Using the Matlab Filter Design Tool, it is possible to fuse in expected specifications and parameters as regards the functionality of the filter. The figure shown in figure 3.6 is the filter builder dialog box that helps to design the filter needed. With the band pass parameters, the plot of magnitude against frequency showing gain paths is illustrated in figure 3.7.
5.1033
-10
1.8625
-20
-1.3783
Magnitude (dB)
-30
-4.6191
-40
-7.8599
-50
-11.1007
-60
-14.3415
-70
-17.5823
10
20
30 Frequency (kHz)
40
50
60
Having a response as depicted above, it is also possible to utilize the filter coefficients obtained from the Matlab Filter Design Tool to compute the transfer function from which the active and passive parameters of the filter could be obtained. But considering the large number of filter coefficients presented, it will be wise to search for an already designed filter with responses that resembles the above response. An almost perfect fit is the design presented on Discovercircuits.com by Jonathan Westhues. The bode plot of this design and circuit schematic are as shown below. This picked filter design comprise of a pair of active Twin-T filters and an active Butterworth filter with the TL084 Operational Amplifier as the gain element. As can be seen from the Bode Plot, the first filter mostly isolate before the pass band (10-20 KHz), with roughly unity gain for all frequencies outside the pass band. The second filter further accentuates gain in the pass-band while
Phase (radians)
slightly reducing the magnitude of frequencies outside the pass band. After this, the signal goes through a massive Butterworth Low-Pass filter to drastically increase gain of lower frequencies already in the pass band and virtually eliminate the higher frequencies, including the 125 KHz carrier signal.
Fig ure
Schematic,
Courtesy
Of
Jonathan
Westhues
3.3.7
to the information to be embedded in the carrier signal. For this design, it has been possible to filter out the unnecessary aspects of our signals while attenuating the band of frequency carrying the required signal. The first component part of the circuit is required to pulse shape the signal into digital pulses as can be understood by the micro-controller. In this design, an opamp as a comparator with a high voltage gain as shown in figure 3.10, is used. Here, with reference input set to the inverting input of the op-amp, a sinusoidal signal applied to the non-inverting input will cause the output to switch between its two output states. If the input sinusoidal signal goes a fraction of a millivolt above the reference level, it will be amplified by a very high voltage gain so that the output rises to its positive output saturation level and remains there while the input stays above Vref. When the input just
falls below the reference level, the output is driven to its lower saturation level and stays there while the input remains below Vref. The design expectations clearly are that the input signal are linear, while the output signal is digital. Concerning the range of values of resistance used as R3 and R4, it is easier to use the voltage divider relationship for Vdd and the reference voltage given as:
ref DD
equation 3.14
With VDD as 5V as illustrated in the schematic above, Vref as 0.05V(very small to enable comparison), and choosing R3 for a small impedance of 100, R4 can be computed: from equation 3.13, making R4 subject of the formulae to obtain: (
Now,
- )
ref
(3.14), Then
This is seen as approximately 10k. Technically, from the output of the comparator it is possible to read and interpret data from the card using a timer interrupt. However, implementing this would cripple the functionality of the system. That is, in order to accurately measure the frequency of the incoming data stream, sampling need be done at 125kHz, which means that a separate crystal of 16 MHz is
required to output a clock rate of 128 clock cycles to compute everything before the next sampling interrupt fired. This would be extremely difficult to implement. An easier design was published by Microchip, which makes use of flip-flops and decade (Johnson) counter. This circuit can be seen in figure 3.11
Figure 3.11 Digital Combination used for data creation after Comparator
The comparator output serves as the clock for the first D flip-flop, which also takes logic 1 as its D value. On the rising edge of the comparator clock, Q is immediately set to 1. However, simultaneously goes low and clears the
flip-flop. This creates an extremely short pulse which serves as a reset for the decade counter and clock for the second flip-flop. The decade counter is a counter which takes a 125 KHz clock. With every rising edge of this clock, the counter outputs the next pin to logic 1; so typical output would look like (if one were looking at output pins 0-9 of the counter) 1000000000
0100000000 00100000000 etc. However, this counter is being reset with every rising edge of the comparator output. Thus, since its already been determined that 125 KHz/10 = 12.5 KHz is to be the frequency that represents logic 1, all that should be done is to check for the output on pin9 to confirm that frequency. If the system is operating at either one of the other possible frequencies, the counter will be reset before pin9 can go active. The pin9 output serves as input to the second flip-flop and also to the clock inhibitor, which keeps the 9th pin high until the counter is reset. Because of this set-up, the Q output of the second flip-flop will remain logical 1 so long as modulating frequency is 12.5 KHz and will drop down to 0 if its anything else.. The 100k resistor on the first flip-flop serves to lengthen the time it takes for the signal to get to CLEAR. Since all transistors have some
amount of natural capacitance, this forms an RC circuit of sorts with a set RC time constant for the signal to rise or fall.
a communication
channel or computer bus. This is in contrast to parallel communication, where several bits are sent as a whole, on a link with several parallel channels where the cost of cable and synchronization difficulties makes parallel communication impractical.
Serial communication is a popular means of transmitting data between a computer and a peripheral device such as a programmable instrument or even another computer. Serial communication uses a transmitter to send data, one bit at a time, over a single communication line to a receiver. You can use this method when data transfer rates are low or you must transfer data over long distances. Serial communication is popular because most computers have one or more serial ports, so no extra hardware is needed other than a cable to connect the instrument to the computer or two computers together. Serial communication requires that you specify the baud rate of the transmission, which is a measure of how fast data are moving between instruments that use serial communication. The popular registered standard cable RS-232 uses only two voltage states, called MARK and SPACE. In such a two-state coding scheme, the baud rate is identical to the maximum number of bits of information, including control bits that are transmitted per second. Devices that use serial cables for their communication are split into two categories. These are DCE(Digital Communication Equipment) and DTE(Digital Termination Equipment). DCE are devices such as a modem, plotter, and so on, while a DTE is a computer or terminal. RS-232 serial ports come in two sizes, the D-Type 25-pin connector and the D-Type 9-pin
connector. Both of these connectors are male on the back of the PC. Table 3.1 shows the pin connections for the 9-pin and 25-pin D-Type connectors.
Table 3.1 Function Data Signal TxD RxD Handshake RTS CTS DSR DCD STR Common Other Com RI 3 2 7 8 6 1 4 5 9 PIN DTE Output Input Output Input Input Input Output -Output DCE Input Output Input Output Output Output Input -Input
In this design, the baud rate is 9600bps with respect to the functional capacity of our transmitting microcontroller.
following are the expected flow of program for the interrupts after initialisation:
Mode select
Configuration Mode
Read Mode
Is it Add or Update?
Add
Update
Read ID
Compare ID
No
Grant Access
Deny Access
b. Configuration Mode: This mode can also be referred to as the remote operation mode. In this mode, the administrator has a choice of remotely adding a code to a specific code bank position or remotely adding any number of codes (bound between 1 and 20 inclusive). When adding a code to a specific code bank position, the External Interrupt2 is activated and the card responses are read. Just like in normal mode, the microcontroller finds the start code, reduces the sequence, and Manchester decodes the sequence. This is done until five consecutive identical codes are read and then stored into the specified position in the code bank. When adding a specific quantity of codes, the status of the
code bank is first searched to find an unused position. Then remote add can be done by position mode and the code is added at the first unused position. This is done until either the specified quantity of codes are stored or until the code bank is full. After either of these modes finishes executing, the reader goes back to its normal mode, but now with the new stored codes in the code bank. The end of the main loop serves as a scheduler that checks the timers for certain tasks and executes the task. It executes the function to check the receiveready flag, turns off the LED's after 3 seconds, and executes the counter that keeps track of time and date.
Is character 8bit
LM7812C
OUT GND
TR1
+
VG1
C1 500n
N1
N2
C2 470u U1 1N4004
The aim of this design is to obtain 120V/220V AC power supply from a utility outlet, and convert to a steady 12V DC power supply after transformer action. With reference to conventional designs, a step-down transformer with turns ratio of 7 is employed, coupled with the diode rectifier array of
Load
1N4004 diodes and a 7812 voltage regulator IC. Since it is a full-wave rectifier, the ripple can be calculated as follows, given these constant values: Vdc = 0.636c, Vr (rms) = 0.308Vm And that
Where r represents the ripple magnitude, and Vm represents the peak magnitude. Then for full wave rectification, r = 48% Since Vdc is 12V, then Vm = 18.87V, while Vr = 5.81V. To obtain C1, we use: Obtained from the IC datasheet: Idc (max) is 1.5A, and then C1 can be obtained as
4.1 Implementation
In order to minimize cost of component parts and space, the implementation of the design for improving access control using RFID is done on two vero boards; one of which will serve to contain the entire component necessary for transmitting the signal that would be read by the RFID tag, while the other board will serve to contain the entire component needed for the reception of the modulated signal from the tag, as well as digital signal processing of the received signal.
board is the circuitry to facilitate serial communication with the host computer. The procedure is as follows: i. Assemble all component parts that make up the various circuitry mentioned above. These components will include: * 7 x 3.5 inch copper lined vero board * The Atmega32 microprocessor * The 4MHz crystal oscillator * Rated capacitors and resistors(2x10,470, 100, 22k, 12k, 6.2nF, 1.8nF, 82, 330, 1M, 2x22pF, 4x10f) * Specified Level Converter( MAX232CPE ) * Specified Transistors(Two 2N3906, One 2N3904) * Telecommunication cables * LEDs (Two Red, One Green) * Two Diodes (1N4148) ii. Assemble all tools, which will include general multi-meter, soldering iron and rolls lead, de-solderer , filing tool, clippers, pliers, pocket cutter, e.t.c iii. iv. Begin static testing of components for functional preparedness With appropriate static test results, the components are arranged on the vero board according to the layout of the design; with reference to chapter three of the entire transmit stage and serial interface design.
v.
The Atmega32 microprocessor is placed first, taking cognizance of the pin layout and direction. The microprocessor has forty pins, so it should be positioned in such a way that pins 1-20 are in phase with the crystal oscillator, while pins 21-40 are in phase with the amplifier circuit.
vi.
After proper placement of components, careful soldering can now be done on the board. Due to space management, some parts of the board is bridged, while other parts are adequately cut-through to avoid irregular and unwanted bridging of the different circuits on the board.
vii.
Precautionary demands for the proper implementation of electronic circuits, involves the use of power regulatory circuit. These components will include a small signal diode, filter capacitors and the 7805 IC regulator as the circuit voltage is 5V
* Rated capacitors and resistors(11x1.0nF, 22uF, 390k, 82k, 1.82k, 47.5k, 2.67k, 82.5k, 15.5k, 100, 2x10k, 12k) * TL084CN IC * 2x74HC74 IC * CP4017 IC (Decade counter) ii. Assemble all tools, which will include general multi-meter, soldering iron and rolls lead, de-solderer , filing tool, clippers, pliers, pocket cutter, e.t.c iii. iv. Begin static testing of components for functional preparedness With appropriate static test results, the components are arranged on the vero board according to the layout of the design; with reference to chapter three of the entire signal reception stage design. v. The TL084CN and 74HC74 ICs are placed first, taking cognizance of the fact that the TL084CN IC has 14 pins where pins 4 and 11 are Vcc and GND, while the remaining 12 pins are allocated to the three filter sections and the voltage comparator, with reference to the design in chapter three. The 74HC74 IC contains the double D-flip-flop that carries out the digital logic operation. vi. It is also noted that the decade counter IC is placed only after the TL084CN and 74HC74 ICs, which is in accordance with the design layout of the reception stage. vii. Before soldering, precautionary measures are taken for the proper implementation of electronic circuits. This involves the use of power
regulatory circuit. From the circuit design of this section, it is noticed that two voltage levels are required (5V and 12V). Thus, the components will include the 7805 and 7812 IC regulators as well as filter capacitors. viii. The board after careful soldering is shown below
* Four 1N4004 diodes * A 7812 IC voltage regulator ii. iii. Carry out static tests on all components. Before soldering the IC is to be properly tested to find out the IN and OUT pins. iv. With good results from static tests, careful and neat soldering can proceed.
vi.
After 90 turns of windings, the width of the conducting part is measured to make sure it hasnt exceeded the 0.3cm mark.
vii.
It was realised that 89 turns gave exactly the 0.3cm width of the conducting part of the coil.
viii.
The two end tails of the coil are properly tagged as send and receive.
ix.
Now, the send tail is soldered to antenna position at the transmitting board, while the receive tail is soldered to the antenna position on the receiving board.
v. vi.
Now select the source and the save project and compile On the new dialog box, make sure there are no errors on the error checklist.
vii.
After compiling, two files are created; Flash program(.hex) and EEPROM(.eep)
viii.
Now connect the AVR cable tool to an available communication port on the computer where code vision is operated.
ix.
Open the cable AVR tool and select auto-detect device type. This detects the type of chip and automatically populates the chip specific values
x. xi.
On the AVR tool dialog box, select write to chip (hex file) Finally click on program chip
With the chip programmed, it is now ready to function as a microcontroller of the entire circuit.
4.2
Testing
As required in every design implementation, testing is important to
ascertain successful implementation procedures and design results. In this design, various forms of tests were carried out to determine the nature of output at different points of the circuit. These tests include oscilloscope reading for waveforms, power supply tests, signal reception test and access control activity test. For input and output waveforms, the test results are shown below.
Figure 4.4 Envelope Frequencies After Filtering and Reduction to Logic Levels
Figure 4.5 Modulated Carrier Signal When an RFID Tag Is Placed Near the Antenna
The tests for power supply and access control activity are done by LEDs attached to the points on the circuits where there actions are warranted. A red coloured LED is used to signal power supply to the microcontroller, as shown in the figure below. Also, during implementation an array of LEDs were used to indicate access control activity with reference to microcontroller activity. The final implemented module is as shown below
4.3
Item No
3 4 5 6 7
1.8k Resistor 1.8nF Capacitor 10 Resistor 100 Resistor 100k Resistor 10k Resistor
1 1 2 2 1
50 50 50 50 50
50 50 100 100 50
8 9 10 11
R19, R21, R24 R20, R3 R17 R9 C10, C11, C6, C7, 1nF Capacitor 12k Resistor 15.5k Resistor 1M Resistor
7 2 1 1
50 50 50 60
350 100 50 60
12 13 14 15 16 17 18 19
C8, C9 D1, D2, D3, D4 D5 D6 C5 C4 R12 R2, R25 T1, T2, T4 1N4148 Diode 1N4936 Diode 1N4004 Diode 1uF Capacitor 2.2nF Capacitor 300k Resistor 22k Resistor 2N3906
6 4 1 4 1 1 1 2
Transistor 3.2nF Capacitor 3.3k Resistor 390k Resistor CP4017 IC 47.5k Resistor
3 1 1 1 1 1
250 50 50 50 1200 50
750 50 50 50 1200 50
26 27 28 29
R5 C2 R13 R1 XTAL
1 1 1 1
50 50 50 50
50 50 50 50
30 TFMR 31 32 33 34 35 36 D Flip-Flop Op-Amp Voltage Regulator Voltage Regulator LEDs Down level
2500
2500
1 1 1 2 2 10
MAX232CPE 37 38 Converter Vero Board Roll of Soldering 39 lead 0.5mm Copper 40 41 42 43 cables RS232 Cable Serial -USB Cable PVC Control Box Length of Comm. 44 45 Cables Microcontroller ATMEGA33 300 2500 300 2500 24 x 15cm 1 300 800 1500 1400 300 800 1500 1400 1 300 300 1 3 1000 150 1000 450
Total Cost
19,060
of persons in and out of a facility, while eliminating the need for a line of sight for the effective reading of the tag carrier. With adequate comprehension of the limitations as regards this project, an access control module has been designed in different parts with the ATmega32 microcontroller as the main component for digital signal processing. Based on design requirements, the access control module is made up of four main parts; the microcontroller, the transmit section, the antenna and the receive section. The microcontroller which is as powerful as required has been programmed to be able to generate the right signal and also been able to carry out digital signal processing for the actualisation of access control. The transmit section has been designed to transmit an amplified current to not exceed the 0.5mW of unrestricted band frequency. The antenna coil has also been designed in specification to meet the transmission and reception requirements of the reader module. Furthermore, the receiving section which is primarily made up of different ICs has been designed to adequately demodulate and extract information from the modulated signal from the tag. Testing has accompanied the implementation of the design. Though during implementation, testing helped to unravel some intricacies that had come from the design. Nonetheless it can be said that an access control module that would be the brain child of an access control system has been
completely developed to enhance or improve access control using RFID(Radio Frequency Identification).
5.2
Problems Encountered
The development of a module that will facilitate the improvement of
access control using RFID isnt devoid of difficulties. As can be expected, there were a lot of ethical considerations to be made as regards what to do and how best or how safe and cheap it would be. It was also cumbersome studying the NCC(Nigerian Communication Commission) guidelines on frequency bands and power transmission so as to act in accordance to the tenets of the law of the land where this design might find practical use and influence. Other problems encountered are itemised below. i. Purchasing of a 125kHz RFID Passive Tag, as none could be found on the shores of Nigeria. ii. iii. Power supply considerations. Microcontroller programming, as this required a basic training in C programming. iv. Developing an administrative interface for administration of access control.
5.3
Recommendation
This project of developing an access control system using radio
areas which includes: industrial, domestic, military, health and education. Practically, RFID can become a relief to so many already existing technological boundaries and barriers that have shortened comfort associated service delivery. After careful design and implementation of the design, there has been areas that have been found out, that if improve upon, will drive the appreciation of RFID to the next level of global importance where it truly belongs. These areas that have been found out include: i. Regulation: It has been realised that if regulations on the unrestricted band of frequencies remain unregulated for as long as the RFID technology grows, it will one day result in the overcrowding and superimposition of signals as a result of the aggregation of small power frequency signals. This is a recommendation to the regulatory authorities. ii. Microcontroller: This design employed the services of the ATmega32 by AVR, due to its cost and availability. It is recommended that future works on RFID implementation should employ microcontrollers with higher memory capacities than the ATmega32. iii. Frequency: At higher frequencies, the quality factor will increase, in turn increasing the read range of the reader antenna. Higher frequencies will also mean a less response time between the tag and the reader.
iv.
Sliding door: This device which has been designed can be used to drive an automatic sliding door or turnstiles. Due to its cost and time needed to implement the design for an automatic sliding door, it wasnt incorporated to demonstrate the use of RFID to improve access control.
v.
Multi-tag Interference: In the event of multiple tag reading by the reader antenna, it is usually difficult for this design to respond accurately. So it is recommended that anti-collision instructions should be written for the microcontroller to prevent multi-tag interference.
REFERENCES
Ashan K., Shah H., Kingstra P., {2009} Content Based Knowledge Management in Healthcare; an EA Approach AMCIS Proceedings. CAENRFID {2008} Introduction to RFID Technology: The art of identification Application Notes. Frank T., Brad H., Anandi M., Hersh B., Anita C., John K., {2006} RFID Security Cambridge University Press, 4th Edition.
Finkenzella K. and Waddington R. {2003} RFID Handbook John Weily & Sons Inc. New York. Garfinkel B. R., {2005} RFID Applications, Security and Privacy John Weily & Sons, USA. Grover F. W. {1946} Inductance Calculations, Working Formulas and Tables Dover Publications Inc. New York. Hardy J. K. {1975} High Frequency Circuit Design Reston Publishing Inc. Reston, Virginia. Harrington R. F. {1964} Theory of Loaded Scatters Proceedings, IEEE Vol. 111, No. 4. Pp.617-623. Henry K. {1963} Radio Engineering Handbook McGraw Hill Inc. New York. Kraus J. D. and Marhefka J. R., {2002} Antenna for all applications 3rd Edition McGraw Hill Inc. New York. Landt J. {2001} Shrouds of time-The History of RFID AIM Inc. Pittsburg, PA. Meiller Y., Bureau S.,{2009} Logistics Projects: How t access the right system AMCIS Proceedings. MicroID {2004} 125KHz RFID System Design Guide Application Notes. Narayanan A., Singh S., Somasekharan M., {2005} Implementing RFID in Library: Methodologies, Advantages and Disadvantages Pearson Prentice Hall, New Jersey. Redemske R., Fletcher R. and Marti U., {2005} Study of UHF RFID signal propagation through complex media IEEE Symposium on Antenna & Propagation & USNC/URSI, National Radio Science Meeting-Poster Session 2005. Roy W. {2006} An Introduction to RFID Technology McGraw-Hill Inc. New York. Srivastava L. {2005} RFID: Technology, Applications and Policy Implication ITU Presentation Kenya. Zeisel E., Sabella R., {2006} RFID+ Cram Exam U.S.A, Application Notes.