The Design of Intelligent Campus Security & Attendance System Based On RFID, GSM and Zig-Bee
The Design of Intelligent Campus Security & Attendance System Based On RFID, GSM and Zig-Bee
The Design of Intelligent Campus Security & Attendance System Based On RFID, GSM and Zig-Bee
1
2
Dept. of ECE, Sree Vahini Institute of Science & Tech., Tiruvuru, Krishna Dist, Andhra Pradesh.
H.O.D of ECE Dept, Sree Kavitha College of Engg, Karepally, Khammam Dist, Andhra Pradesh.
3
4
ABSRACT: In this paper an intelligent campus security tracking system (iCST) has been designed and
implemented base on the RFID and ZigBee network. iCST reads the RFID tags data through FRID&ZigBee
node, and then sends it to PC node by a custom wireless protocol on the ZigBee. PC node gives corresponding
warning or hints by the result of matching masterslave RFID tag information. When the warning occurs, its user
can logon the web system to get the real-time tracking for valuables (with embedded slave RFID); where the
thief arrives any one access control node, it would be blocked. User can also manage his own valuables such as
lending and recovery operation through the Web manager center. In this system we are using GSM(Global
System For Mobile).These GSM is used sending a SMS as for absentees students with parents mobile nos. The
data base is already stored in the PC. Student is regularly absent with in four day or six days free voice call to
call the parents mobile nos by using GSM technology. Accompanied by deployment of large-scale sensor
networks, iCST has a good application prospect from the aspect of experimental effect.
www.iosrjen.org
16 | P a g e
The Design of Intelligent Campus Security & Attendance System Based on RFID, GSM and Zig-Bee
Where the checksum section provides 4 check methods, besides and, or, xor operation, it allows use of
stomized method, where 00 means null. The sequence number is mainly used to prevent the additional overhead
of retransmission. In the transmitter, the following steps are taken when sending data.
1. Get the data from the upper layer packed, add source address, destination address, sequence number, date
length, checksum to it, then send it to the serial output module of the microprocessor.
ISSN: 2250-3021
www.iosrjen.org
17 | P a g e
The Design of Intelligent Campus Security & Attendance System Based on RFID, GSM and Zig-Bee
2. The serial output module adds FLAG to the data packet, if FLAG has been in the data, add ESC in front of it.
After transmission, start the timer. Go to step 3.
3. Return true if receive ACK. If timeout happens, and timeout time is less than the maximum time, go to step 2;
else, return false and inform the upper layer that transmission fails.
When the receiver receives data, perform the following
steps:
1. Check the data packet according to the check operation said above, if check results are the same as those in
the data packet, go to step 2; else, drop the packet.
2. See the destination node number of the data packet, if itsthe same with its ID, go to step 3; else, drop the
packet.
3. Return the corresponding ACK of the data packet, determine whether its request for new packets or
retransmitted data packets according to the sequence number of data packet, then send it to the upper layer for
computing and handling.
C. PC node centre and multi-service platform
The tag information obtained by RFID & Zig-Bee node is transmitted through Zig-Bee network, and
sent to PC node at last. In this system, PC node gets the data of the Zig-Bee network through serial ports, parses
out the tag information through customized Zig-Bee protocol. PC node gives the matched results by querying
the registered tag information in the database, and returns the corresponding results through the wireless
module. When the incoming tag information doesnt match, PC node will give warning message, pass the
warning and control message to entrance guard and inform the corresponding owner.
In the multi-service platform, users can view the location of their valuables through multi-service
platform interface. When valuables are lost, users can find the course of corresponding valuables through web,
so as for tracking and getting it back.
Multi-service platform only gives prompts warning case in this system, but in real life it can achieve
anti-theft and monitoring work through functions reservation and system interface.
Specific functions design is shown in Figure.3
www.iosrjen.org
18 | P a g e
The Design of Intelligent Campus Security & Attendance System Based on RFID, GSM and Zig-Bee
After applying for services, user can get a RFID (Master) tag as a sign of the owner and multiple RFID (slave)
tags as signs of valuables. Insert RFID (slave) tag in valuables, and this system can achieve the capability of
anti-theft and track lost valuables within the scope of monitoring.
Below is the campus sensor network layout in simulation environment. Set the PC-nodes in the dormitory,
classroom building (there exists entrance guard at the location of PC nodes, when master RFID and slave RFID
dont match, a warning will be sent.).In real life, RFID & Zig-Bee nodes should be set on the campus as evenly
as possible.
ISSN: 2250-3021
www.iosrjen.org
19 | P a g e
The Design of Intelligent Campus Security & Attendance System Based on RFID, GSM and Zig-Bee
2. Record the position changes of RFID (slave) the tags, track the slave tags, and show warning at PC nodes.
Then query the database, look for the owner of items and send confirming information to the owner through the
system.
3. The owner logins WEB to search for items. He can see the real-time location of his valuables according to the
hints. After confirmation, the valuables will be stopped at the entrance guard. As for false information, the
owner can cancel this warning.
C. GSM Technology
One of the most important conclusions from the early tests of the new GSM technology was that the
new standard should employ Time Division Multiple Access (TDMA) technology. The digital nature of GSM
allows the transmission of data (both synchronous and asynchronous) to or from ISDN terminals, although the
most basic service support by GSM is telephony. A unique feature of GSM is the Short Message Service (SMS),
which has achieved wide popularity as what some have called the unexpected killer application of GSM.
SMS is a bi-directional service for sending short alphanumeric message in a store-and-forward process. SMS
can be used both point-to-point as well as in cell-broadcast mode. These GSM is used sending a SMS as for
absentees students with parents mobile nos. The data base is already stored in the PC. Student is regularly
absent with in four day or six days free voice call to call the parents mobile nos by using GSM technology.
ISSN: 2250-3021
www.iosrjen.org
20 | P a g e
The Design of Intelligent Campus Security & Attendance System Based on RFID, GSM and Zig-Bee
Users click on the red dot Figure .6, enter the chart of tracking items. Users can choose to confirm or
cancel this warning in the tracking figure.
Its worth noting that, if the user does not confirm this early warning, system will check the identity of the
suspect at the entrance guard to ensure campus safety, as is shown in Figure.7.
www.iosrjen.org
21 | P a g e
The Design of Intelligent Campus Security & Attendance System Based on RFID, GSM and Zig-Bee
V. CONCLUSION
This system studies campus safety and security. By identifying the tags information of master and slave
RFID, it not only achieves tracking valuables real time and giving early warning, but also supports users to view
the state of their valuables, and lend their valuables to others. As people's awareness of property safety
improves, the system can also provide personnel tracking feature to support services related to geographical
location. With the further popularization of sensor networks, the system can achieve large-scale logistics
management and tracking, and has good market prospects and value in use.
ACKNOWLEDGMENT
We thank Intelligent Campus Security Tracking System Based on RFID and ZigBee project for
providing fund support and thank the electronic circuits innovation base of Beijing University of Posts and
Telecommunications for providing venues support.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
Zhu Yuan-jiao, Zhou Ke-qin, Design and Realizing of the Digital Campus Security System, Software Engineering, 2009. WCSE '09.
WRI World Congress on IEEE 2009.
Xi Li, Tiyan Shen, Jinjie Zhang, Changmin Shi, A Spatial Technology Approach to Campus Security, Networking, Sensing and
Control, 2008. ICNSC 2008. IEEE International Conference on IEEE 2008.
Qian C,Ngan H,Liu Y. Cardinality Estimation for Large-scale RFID Systems[C] .Preceedings of IEEE Intl Conf.on Perv.Comp.and
Comm(PerCom). 2008, :30-39.
REN Xiao-Kui, LIANG Chao-Zhong, Analysis and Improvement of Anti-Collision Algorithm for RFID System, Computer Systems
& Applications, 2010(2) (in Chinese).
Floerkemeier C. , Sarma S. , An Overview of RFID System Interfaces and Reader Protocols, RFID, 2008 IEEE International
Conference.
Zhang Ye, Based on RFID technology jewelry and tracking management system Review, E-Business Journal,2010(9) (in Chinese).
Kuan J.H. , Chang J. , Ho J. , A development of information protection system using system engineering and RFID technolog,
System Science and Engineering (ICSSE), 2010 International Conference on IEEE 2010.
ZhuYuYu, WangZengSheng, personnel orientation study Based on the RFID, Science & Technology Information, 2010(22) (in
Chinese).
Chung-Hsin Liu, Jian-Yun Lo, The Study for the ZigBee with RFID Positioning System, Multimedia and Information Technology
(MMIT), 2010 Second International Conference on 2010.
Yu Li-e, Deng Xu-dong, The Research about the Application of RFID and 3G Technology in Cargo Transportation Security,
Logistics Sci-Tech, 2007(10) (in Chinese).
Elshayeb, S.A., Bin Hasnan, K., Chua Yik Yen, RFID technology and ZigBee networking in improving supply chain traceability
Instrumentation, Communications, Information Technology, and Biomedical Engineering (ICICI-BME), 2009 IEEE International
Conference.
ISSN: 2250-3021
www.iosrjen.org
22 | P a g e