Design and Implementation of Two-Way Authentication System Using Rapsberry Pi

TABLE OF CONTENTS

DECLARATION..........................................................................................................ii

ACKNOWLEDGEMENTS............................................................................................. iii

APPROVAL...............................................................................................................iv

TABLE OF CONTENTS ...............................................................................................v

ABBREVIATIONS..................................................................................................... vii

ABSTRACT............................................................................................................. viii

CHAPTER ONE ................................................................................................... 1

INTRODUCTION................................................................................................ 1

1.1. Introduction .................................................................................................1

1.2. Background..................................................................................................1

1.3. Problem statement .......................................................................................2

1.4. Objectives of the study .................................................................................3

1.4.1. Main Objective .......................................................................................3

1.4.2. Specific Objective ...................................................................................3

1.5. Research questions.......................................................................................3

1.6. Significant of the study .................................................................................3

1.7. Scope of the Project......................................................................................4

1.7.1. Context scope ........................................................................................4

1.7.2. Geographical scope.................................................................................4

1.7.3. Time scope ............................................................................................4

CHAPTER TWO .................................................................................................. 5

LITERATURE REVIEW ....................................................................................... 5

2.0 Introduction .................................................................................................5

2.1 Literature Review..........................................................................................6

2.2 Radio Frequency Identification.....................................................................11

2.3 Related work done......................................................................................14

vi

CHAPTER THREE ............................................................................................. 15

METHODOLOGY............................................................................................... 15

3.0 Introduction ...............................................................................................15

3.1 Components used.......................................................................................19

3.1.1 RFID Reader ........................................................................................19

3.1.2 RFID tag ..............................................................................................19

3.1.3 Liquid crystal display.............................................................................20

3.1.4 Raspberry Pi-3 Model B.........................................................................21

3.1.5 Servo motor .........................................................................................22

3.1.6 Proximity sensor...................................................................................22

3.2 Design of the System..................................................................................23

3.3 Working of the system ................................................................................26

CHAPTER FOUR............................................................................................... 27

DISCUSSION AND RESULT OF THE SYSTEM................................................... 27

4.0 Results of the system..................................................................................27

CHAPTER FIVE ................................................................................................ 30

CONCLUSIONS AND RECOMMENDATIONS..................................................... 30

5.0 Conclusions ................................................................................................30

5.1 Recommendations ......................................................................................30

Chapter Six.............................................................................................................32

REFERENCES ..........................................................................................................32

APPENDICES...........................................................................................................34

ABSTRACT In recent years, there have been rise in the number of applications based on Radio Frequency Identification (RFID) systems and have been successfully applied to different areas such as transportation, health, education, hospitality industry and many others. RFID technology facilitates automatic wireless identification using electronic passive and active tags with suitable readers. In this project, I dealt with solving the problem of theft in our inhabitants by locking the gate and the door using RFID technology. The application of RFID as two-way authentication was designed to help people to access their gate and the door of a certain compound being identified before entering the compound to reduce on the theft in our environment and to know who enters the compound. The system will use a Raspberry Pi technology to allow it perform these tasks of identification well. In this system, once the person reaches the gate of the compound, the person has to identify him/herself by putting the tag card in front of the tag reader, this one, once identified will process the data to the Raspberry Pi and it’s to the Raspberry Pi to check the given data on the tag to confirm the person’s entrance and therefore the gate opens by the servo motors rotating a certain angel, then after this has happened, the gate can be opened and the person may access the gate and enter the compound, once the car has passed, the proximity sensors detects the presence of the car and after a specific amount of second, it closes the gate by reactivating the servo motors again. Similarly at the door point, when the person reaches the door he or she has entered the password and the keypad sends the code to the raspberry pi and it’s the one to confirm the code whether it’s to be accepted or to be ejected, and once it is allowed, the signal is sent to the servo motors controlling the door and therefore the door opens and the person may access the door and enters the house, once inside can go out by using the push button then the servo motor opens the door automatically and the person may access the door and exit the house, this is the same when you enter the house and wishes to lock the door again, all that you have to do is press the push button, and it closes automatically by activating the servo motors.

Overall Rating

0

5 Star
(0)
4 Star
(0)
3 Star
(0)
2 Star
(0)
1 Star
(0)
APA

KWOCAN, A (2022). Design and Implementation of Two-Way Authentication System Using Rapsberry Pi. Afribary. Retrieved from https://tracking.afribary.com/works/design-and-implementation-of-two-way-authentication-system-using-rapsberry-pi

MLA 8th

KWOCAN, ACERONGA "Design and Implementation of Two-Way Authentication System Using Rapsberry Pi" Afribary. Afribary, 20 Aug. 2022, https://tracking.afribary.com/works/design-and-implementation-of-two-way-authentication-system-using-rapsberry-pi. Accessed 21 Nov. 2024.

MLA7

KWOCAN, ACERONGA . "Design and Implementation of Two-Way Authentication System Using Rapsberry Pi". Afribary, Afribary, 20 Aug. 2022. Web. 21 Nov. 2024. < https://tracking.afribary.com/works/design-and-implementation-of-two-way-authentication-system-using-rapsberry-pi >.

Chicago

KWOCAN, ACERONGA . "Design and Implementation of Two-Way Authentication System Using Rapsberry Pi" Afribary (2022). Accessed November 21, 2024. https://tracking.afribary.com/works/design-and-implementation-of-two-way-authentication-system-using-rapsberry-pi