REVIEW ON WOMEN SAFETY IN SYSTEM ACCESS CONTROL USING RFID TECHNIQUE

Size: px
Start display at page:

Download "REVIEW ON WOMEN SAFETY IN SYSTEM ACCESS CONTROL USING RFID TECHNIQUE"

Transcription

1 Volume 117 No , ISSN: (printed version); ISSN: (on-line version) url: REVIEW ON WOMEN SAFETY IN SYSTEM ACCESS CONTROL USING RFID TECHNIQUE Wellington Final Year B.E - Student, Sathyabama University, Chennai Vishnu Prasad Final Year B.E - Student, Sathyabama University, Chennai. Karthick.C, Assistant Professor, Dept of ECE, Sathyabama University, Chennai. ijpam.eu Abstract:- The ability to locate and track women s is a vital issue to both parents and working office Identification and tracking can be achieved, with today technologies in different ways. This project offers the following solutions for women safety: Radio Frequency Identification (RFID) based tracking for locating women s in predefined areas such as: Offices. GSM/GPRS based tracking for locating women s anywhere. Radio Frequency (RF) based tracking is for helping parents and guardians to keep an eye on the women are wherever they are. partner can separate between two sets of indistinguishable pants construct upon the data put away with respect to the RFID tag. Each combine will have its own particular serial number. With one go of the handheld RFID per user, the partner can locate a particular match, as well as they can tell what number of each combine are on the rack and which sets should be renewed. The partner can take in the majority of this data without scanning every individual thing. Keywords: RFID, women safety, GSM, GPS. INTRODUCTION RFID stands for Radio-Frequency Identification. It consists of a small chip and an antenna. A tag can be perused from up to a few feet away and does not should be inside direct observable pathway of the per user to be followed. A RFID framework is comprised of two sections: a tag or mark and a per user. RFID labels or marks are implanted with a transmitter and a beneficiary. The RFID segment on the labels has two sections: a microchip that stores and procedures data, and a receiving wire to get and transmit a flag. The tag contains the particular serial number for one particular protest. To peruse the data encoded on a tag, a two-way radio transmitter-beneficiary called an investigative specialist or per user emanates a flag to the label utilizing a receiving wire. The tag reacts with the data written in its memory bank. The investigator will then transmit the read results to a RFID PC program. There are two sorts of RFID labels: aloof and battery controlled. A latent RFID tag will utilize the investigator's radio wave vitality to hand-off its put away data back to the cross examiner. A player controlled RFID tag is installed with a little battery that powers the transfer of data. In a retail setting, RFID labels might be connected to pieces of attire. At the point when a stock partner utilizes a handheld RFID per user to check a rack of pants, the Fig 1: Representation of basic RFID system. SURVEYED DESIGNS Umar Farooq et.al proposes a RFID based security system is as well as access control system is used in Punjab university hostel premises. Combines RFID technology and biometrics to accomplish the required task. Entrance gate consist of entrance monitoring controller, exit monitoring controller and mess monitoring controller, exit gate and mess gate 163

2 respectively. Controllers are used to read RFID tag which is given to the user and search his tag number, hence the RFID reader installed at the entrance of hostel detects a number, the system captures the user image and scans the database for a match. significant degradation in tag sensitivity due to backscattered waves and incident wave. Fig 4: Model of a linear tag array. There are two ways of achieving polarization diversity they are using a circularly polarized tag and using a cross-polarized tag pair. Due to this method it shows improvement in close proximity performance for reading the data. Fig 2: Basic RFID system. Fig 5: Model of a circularly polarized tag. Circularly polarized tags have better performance as compared to cross-polarized tag. Lobna M. Eslim et.al proposed a method to localize mobile RFID tags using dynamic mobile RFID readers, heterogeneous, distributed in the surrounding area using IoT Fig 3: Block diagram showing modules Interconnection with the computer System. If both the card and caught picture have a place with an enrolled client, get to is conceded; generally the framework turns on the alarm and makes an emergency call to the security van through GSM modem. In this way, the suspicious persons can be caught. Qi Zhang et.al uses a passive ultra high frequency (UHF) are used with radio frequency identification (RFID) tags to be read the data when placed in close perimeter range. a linear tag array is used with a tag separation of 1 cm,there is a 164

3 Fig 8: Multi-Agent Supply Chain Information Integration Architecture. The pre-assembled segment provider industry cooperation is proposed to take care of the issue of deficient generation limit. Katina Michael et.al employs usability context analyses to draw out the emerging ethical concerns facing current human centric GPS applications. Fig 6: General framework of reader crowd sourcing scheme. They have introduced the idea of Time-Shifted Multilateration (TSM) to upgrade area estimation exactness of portable labels when adequate synchronous recognition data is not accessible. Fig 9: Ethics-based conceptual approach The outcome of the study is the classification of current state GPS applications into the contexts of control, convenience, and care; and a preliminary moral structure for considering the practicality of GPS area based administrations underscoring privacy, accuracy, property and accessibility. Fig 7: case scenario The results show that TSM can maintain the system performance under different dynamicity settings. Their approach is based on a crowd sourcing from distributed ad hoc RFID readers. Juan Du et.al in light of RFID application and multi-agent supply, a data following and supply component for preassembled production network is proposed. CONCLUSION An extensive survey is done on RFID and many methods can be used to design various form of RFID which results in accurate reading of information and better performance in power and image reading as well as in retrieving the information from the database. REFERENCES [1] P. Coussy, D. Gajski, M. Meredith and A. Takach, "An Introduction to High-Level Synthesis," Design & Test of Computers, IEEE, vol. 26, pp. 8-17, [2] Jun Zhang, Gui Yun Tian, UHF RFID Tag Antenna- Based Sensing for Corrosion Detection & Characterization Using Principal Component Analysis, IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, VOL. 64, NO. 10, OCTOBER 2016 [3] U. Farooq, M. ul Hasan, M. Amar, A. Hanif and M. Usman Asad, "RFID Based Security and Access Control System" IACSIT International Journal of Enginnering and Technology, vol. 6, pp , August [4] Challenges And Authentication in Wireless Sensor Networks" at IEEE EDS MADRAS Chapter sponsored International Conference on Emerging trends in VLSI, Embedded systems,nano Electronics and Telecommunication systems ICEVENT 2013,at S K P Engineering College. Thiruvannamalai, Tamilnadu on Jan 7th to Jan 9th 2013 and published in IEEE Xplore 165

4 number= [5] Analysis study of Seamless Integration and Intelligent Solution in any situation by the Future Advanced Mobile Universal Systems 4G -(FAMOUS 4G)"at IEEE EDS MADRAS Chapter sponsored International Conference on Emerging trends in VLSI, Embedded systems, Nano Electronics and Telecommunication systems ICEVENT 2013, S K P Engineering College, Thiruvannamalai, Tamilnadu on Jan 7th to Jan 9th 2013 and published in IEEE Xplore

5 167

6 168