Sie sind auf Seite 1von 7

American Journal of Engineering Research (AJER)

2016
American Journal of Engineering Research (AJER)
e-ISSN: 2320-0847 p-ISSN : 2320-0936
Volume-5, Issue-7, pp-236-242
www.ajer.org
Research Paper

Open Access

RFID Based Security Access Control System with GSM


Technology
Peter Adole1*, Joseph M. Mm2 and Gabriel A. Igwue3
1,2,3

Department of Electrical and Electronics Engineering, Federal University of Agriculture,


Makurdi, Benue State, Nigeria

ABSTRACT: The security challenges being encountered in many places today require electronic means of
controlling access to secured premises in addition to the available security personnel. Various technologies
were used in different forms to solve these challenges. The Radio Frequency Identification (RFID) Based Access
Control Security system with GSM technology presented in this work helps to prevent unauthorized access to
controlled environments (secured premises). This is achieved mainly through the use of a Radio Frequency
Identification System with operating frequency of 125 KHz, Microcontroller programmed to send control
signals, DC motor, relay, buzzer, Liquid Crystal Display (LCD) and GSM/GPRS Modem.Once the RFID tag
which contains the users unique information is scan by the RFID reader and confirmed match with the
information stored in the microcontroller, the microcontroller is instructed to turn ON the DC motor through
L293D driver, display USER NUMBER and CARD NUMBER on the LCD and activates the GSM/GPRS
modem to send SMS alert AUTHORIZED, valid RFID card shown, User is allowed to enter, user number to
security personnel. Else, the DC Motor remained OFF, LCD displays READ RFID CARD NOT VALID,
buzzer turns ON for about 5seconds and GSM/GPRS modem activated to send UNAUTHORIZED, invalid
RFID card is used to access the security system to the security personnel. The electronic circuit was
implemented, the codes for microcontroller were written in assembly language, debugged and compiled using
the KEIL Micro vision 4 integrated development environment. The resultant Hex files were programmed into the
memories of the microcontrollers with the aid of a universal programmer. Hardware simulation was carried out
using the Proteus Virtual System Modelling (VSM) version 8.0.An importation implication of this paper is that
the system is cheaper to maintain and more efficient in comparison with a manually operated type or key lock
system. The RFID based access control system can be useful in providing security for homes, organizations, and
automobile terminals to increase the level of security.
Keywords: Access control, Authorized, RFID, GSM, Microcontroller, Unauthorized

I. INTRODUCTION
Security systems play an important role to prevent unknown user entry into a secured place, which may
include physical and intellectual property, without being authorized. The security system is basically divided
into two types; the use of normal door lock key and the use of electronic automatic identification system. In
general, locks are very simple devices that are employed to address a straightforward problem. Basically, lock
can be easily hacked by unwanted people thereby allowing unauthorized people into secured premises.
There are several automatic identification technologies including barcode, magnetic stripe and Radio
Frequency Identification (RFID) applied in security system. Radio-Frequency Identification (RFID) is an
emerging technology and one of the most rapidly growing segments of todays automatic identification data
collection industry. RFID technology, offers superior performance over other automatic identification systems.
Because it is not an optical technology like bar coding, no inherent line of sight is required between the reader
and the tagged RFID object [1].
The system described in this work uses an RFID tag which contains integrated circuit that is used for
storing, processing unique information, modulating and demodulating the radio frequency signal being
transmitted and a Global System for Mobile Communication (GSM) technology to communicate to security
personnel via Short Message Service (SMS) in order to enhance the securityof a conditioned
environment[1][2][3][4].

www.ajer.org

Page 236

American Journal Of Engineering Research (AJER)

2016

Radio-frequency identification (RFID) based access control and security system grants access to only
authorized persons to secured premises. RFID technology involves the use of a wireless non-contact system that
uses radio frequency electromagnetic fields to transfer data from a tag attached to an object. Some tags are
passive (require no battery or their own power source) while others are active (use their own local power source)
[5].
The system that has been designed in this work is implemented around a microcontroller and it can
help to avoid human involvement in checking and keeping of record at the access point of a secured
environment. This system ensures accurate access control and record keeping [3].

II. RELATED WORK


Several researchers have done considerable amount of work relating to RFID based security Access
Control System.
An Automatic Gate opening system for vehicles with RFID and campus access control system RFID
based were proposed in [5][6]. The systems grant access to authorized persons with valid tags and deny the
unauthorized persons with invalid tags but the systemslack ability to intimates security personnel through SMS.
In [7], a system with comparative analysis of RFID and wireless Home/Office Automation was
proposed. Herethree technologies; RFID, Wireless Sensor Network (WSN) and GSM were used. In this system
RFID monitor access, sensor to monitor the temperature, lighting and gas leakage and GSM send SMS to the
owner of the house when safety of the home is not guaranteed. The system emphasized more of safety than
security of the home or office.
An embedded security system using RFID and GSM was presented in [8]. This system uses RFID and
GSM technologies to provide security for distribution of petroleum products. The system was made up of
control unit and tanker unit that are far from each other but can easily communicate with each other. The tanker
unit monitors the fuel level continuously and displayed it on LCD at the front for drivers convenience. The
second is RFID assembly which will read the authentication code of the petrol pump. The amount of fuel poured
at a particular petrol pump and petrol pump ID will be sent to central office through GSM techniques. The
pitfall here remained that the system does not operates as a stand-alone system but require a network provider
for reception of signals and it is not a preventive security measure.
In [9], an RFID based kindergarten Intelligence security system was proposed. It automates the
children security supervision and provides integration with current security management system for
kindergarten where RFID tags are embedded in children uniforms. However the system could not intimate
security personnel when there is threat.
An Access Control by RFID and face recognition based on neural network was design and
implemented. This system recognizes the face of the person holding the RFID card and denies access if they do
not match. A Radial Basis Function Neural Network (RBFNN) was adopted to learn the face of authorized card
holders. Also lack the ability to alert the security personnel through SMS in case of an unauthorized holder [10].
In [11], a paper on security system against asset theft by using Radio Frequency Identification
Technology was presented. The aim was to invent a security system against motorcycle theft by using FRID
technology (Ultra high frequency range; 905 925MHz). In case of incorrect information from the tag, the
system alarms the security guards for further investigation. It can signal to activate an additional circuit to shut
the motorcycle engine off and turn the Closed Circuit Television (CCTV) on for recording as the theft occurs.
The system would have been better with SMS to the guards to avoid commotions.
The present study aims at the design and implementation of a security access control system that uses a
wireless and automatic identification system knows as Radio frequency Identification (RFID) system,
Microcontroller as a control unit, GSM/GPRS modem that can send SMS when signalled by the controller, a
relay to close and open the system, the Buzzer that form the alarm system and LCD that displays the result of
the controller processing.

III.

MATERIAL AND METHOD

3.1 Block Diagram


The block diagram of an RFID based security access control system with GSM technology is shown in
fig.1.When the reader is powered and the tag (transponder) is brought within the reading range of the reader,
the reader then scans the data present in the tag with the help of its antenna (scanning antenna) and compares it
with the data present in the microcontroller. When the data matches with that in the Microcontroller, the DC
motor will be turned ON which is operated by a driver being driven from the output of the microcontroller. The
microcontroller is programmed to displaymessages on the LCD if the tag with valid or invalid information is
brought close to the reader. In both cases, the GSM/GPRS modem is activated to send SMS alert to the security
personnel. The GSM/GPRS modem is RS-232 logic level compatible, it requires a line converter called MAX
232 in between it and the microcontroller to convert Transistor-Transistor Logic (TTL) into RS-232 logic and

www.ajer.org

Page 237

American Journal Of Engineering Research (AJER)

2016

vice versa. The presence of any unauthorized user also activates the buzzer and a relay with its driver to close
and open the sub circuits operating at different voltages. Also a crystal (12MHz) to give the required clocked
pulses to the microcontroller.
RFID
READER

RFID TAG

LCD

MICROCONTROLLER

CRYSTAL

BUZZER

(AT89S51)

MOTOR
DRIVER

DC
MOTOR

BUZZER
DRIVER

GSM
MODEM

MAX 232
RELAY
DRIVER

RELAY

Fig 1: Block diagram of an RFID based security access control system with GSM technology.
The block diagram was developed into the schematic diagram shown in Fig. 2. This circuit diagram was used to
simulate the hardware components of the system in Proteus Virtual System Modeling Environment version 8.0.

U4

U5

7805

D2

D4

1N4007

1N4007

VO

+5V

VI

C6

VO

+12V

GND

1N4007

7812

VI

GND

1N4007

L
1
2
N
STEP-DOWN TRANSFORMER

D3

J2

D1

C8

C7

1000u

100u

100u

LCD1
LM016L

CRYSTAL
18

C10

C1

P0.0/AD0
P0.1/AD1
P0.2/AD2
P0.3/AD3
P0.4/AD4
P0.5/AD5
P0.6/AD6
P0.7/AD7

XTAL2

100u
22PF
9

RST

BUZ2
R3

29
30
31

10k
BUZZER

Q2
R1

1
2
3
4
5
6
7
8

R2

1K

1K

BC547

RL1

J1

P2.0/A8
P2.1/A9
P2.2/A10
P2.3/A11
P2.4/A12
P2.5/A13
P2.6/A14
P2.7/A15

PSEN
ALE
EA

P1.0
P1.1
P1.2
P1.3
P1.4
P1.5
P1.6
P1.7

P3.0/RXD
P3.1/TXD
P3.2/INT0
P3.3/INT1
P3.4/T0
P3.5/T1
P3.6/WR
P3.7/RD

AT89S51
1
2
16

1N4007

Q1
OJ-SH-112DM

2
7
1

9
10
15
BC547

IN1
IN2
EN1

EN2
IN3
IN4

VSS

VS OUT1
OUT2

U2

Vcc

21
22
23
24
25
26
27
28

GND
TX

RX

10
11
12
13
14
15
16
17

C2
1

11
12
10
9

1u

GND

GSM/GPRS MODEM

11
14

U3

C1+

C1-

T1IN
R1OUT
T2IN
R2OUT

T1OUT
R1IN
T2OUT
R2IN
VS+
VS-

C2+

OUT3
GND OUT4

D0
D1
D2
D3
D4
D5
D6
D7

1k

3
6

+88.8

D5

DOOR LOCK

39
38
37
36
35
34
33
32

7
8
9
10
11
12
13
14

VSS
VDD
VEE

XTAL1

4
5
6

X1

1
2
3

U1
19

22PF

RS
RW
E

RV1
C9

Vcc
14
13
7
8

RXD
TXD
GND

2
6

C2-

C3
1u

RFID READER
MAX232

C4

C5

1u

1u

L293D

DC MOTOR

Fig. 2: Schematic diagram of an RFID based security access control system with GSM technology
3.2 Software Development
The AT89S51 microcontroller needs to be programmed first before it can be used in the electronic
hardware. An assembly programming language is chosen to program the microcontroller. Correct and functional
codes ensure the microcontroller works properly. The functionality of the code is verified using Keil micro
vision 4, Proteus Virtual System Modelling (VSM) version 8.0 was used for the simulation and Flash Magic
software was used for burning of the code into the microcontroller. After compiler operation, the hex code is
generated and stored in the computer. The hex code of the program is burnt into the AT89S51 by using Flash
magic software. The software design started with the flow chart shown in Fig.3

www.ajer.org

Page 238

American Journal Of Engineering Research (AJER)

2016

START

Initializing ports and devices

Individual RFID tag sends its


code

RFID Reader decrypts the


message

YES
Matches the
database?
NO

Relay turns ON

Relay turns off


Motor Driver ON

Motor driver off

Buzzer ON for 5 seconds

SMS sends

SMS sends

Access Granted

Access Denied

Fig.3: Flowchart of design of RFID Based Security Access Control System with GSM Technology.

IV. RESULT AND DISCUSSION


The simulation test of this work was done using Proteus 8.0 to ensure effectiveness of the design; here
the various components in the design were connected to each other in Proteus 8.0 environment beginning with
the power supply unit as shown in the circuit diagram of the system. This is to ascertain the workability of each
stage before the construction is transferred to the print circuit board (PCB). The RFID card was represented
with an interactive single pole single throw (SPST) switch through which the microcontroller receives the
signal. The program hex file was loaded and the following results were obtained when running the simulation.
LCD1
LM016L

R4
10K

18

C10

X1
CRYSTAL

P0.0/AD0
P0.1/AD1
P0.2/AD2
P0.3/AD3
P0.4/AD4
P0.5/AD5
P0.6/AD6
P0.7/AD7

XTAL2

Q2

22pf

R3

29
30
31

10k

BC547

RST

P2.0/A8
P2.1/A9
P2.2/A10
P2.3/A11
P2.4/A12
P2.5/A13
P2.6/A14
P2.7/A15

PSEN
ALE
EA

RL1
1
2
3
4
5
6
7
8

R1
D5

R2

1K

1N4007

1K

Q1
OJ-SH-112DM

P1.0
P1.1
P1.2
P1.3
P1.4
P1.5
P1.6
P1.7

P3.0/RXD
P3.1/TXD
P3.2/INT0
P3.3/INT1
P3.4/T0
P3.5/T1
P3.6/WR
P3.7/RD

AT89S51

B1

16

12V
2
7
1

9
10
15

IN1
IN2
EN1

EN2
IN3
IN4

VSS

8
VS OUT1
OUT2

21
22
23
24
25
26
27
28

Vcc
GND
TX

RX
10
11
12
13
14
15
16
17

C2
1

1u

OUT3
GND OUT4

GSM/GPRS MODEM

C1+

C1T1OUT
R1IN
T2OUT
R2IN
VS+
VS-

3
6

11
14

U3

T1IN
R1OUT
T2IN
R2OUT

C2+

GND

D0
D1
D2
D3
D4
D5
D6
D7

1k

11
12
10
9

U2

0.00

BC547

39
38
37
36
35
34
33
32

1
2
3

XTAL1

100u

BUZZER

VSS
VDD
VEE

U1
19

22pf

C1

7
8
9
10
11
12
13
14

C9
BUZ2

RS
RW
E

RV1

SW-SPST

4
5
6

SW1

Vcc
14
13
7
8

RXD
TXD
GND

2
6

C2-

C3
1u

RFID READER
MAX232

C4

C5

1u

1u

L293D

DC MOTOR

Fig.4:The result of the simulation when switched on

www.ajer.org

Page 239

American Journal Of Engineering Research (AJER)

2016

Fig.4 displays the name of the system on the liquid Crystal Display (LCD) when powered ON immediately.
LCD1
LM016L

R4
10K

SW1

RV1

P0.0/AD0
P0.1/AD1
P0.2/AD2
P0.3/AD3
P0.4/AD4
P0.5/AD5
P0.6/AD6
P0.7/AD7

XTAL2

X1
CRYSTAL

BUZZER

Q2

22pf

R3

29
30
31

10k

BC547

RST

P2.0/A8
P2.1/A9
P2.2/A10
P2.3/A11
P2.4/A12
P2.5/A13
P2.6/A14
P2.7/A15

PSEN
ALE
EA

RL1
1
2
3
4
5
6
7
8

R1
R2

1K

D5
1N4007

1K

Q1
OJ-SH-112DM

P1.0
P1.1
P1.2
P1.3
P1.4
P1.5
P1.6
P1.7

P3.0/RXD
P3.1/TXD
P3.2/INT0
P3.3/INT1
P3.4/T0
P3.5/T1
P3.6/WR
P3.7/RD

B1

16

12V

21
22
23
24
25
26
27
28

Vcc
GND
TX

RX
10
11
12
13
14
15
16
17

C2
1

IN1
IN2
EN1

9
10
15

EN2
IN3
IN4

VSS

11
12
10
9

U2

8
VS OUT1
OUT2

GSM/GPRS MODEM

1u

OUT3
GND OUT4

Vcc

C1T1OUT
R1IN
T2OUT
R2IN

14
13
7
8

11
14

RXD
TXD
GND

2
6

VS+
VS-

3
6
C2+

GND

U3

C1+
T1IN
R1OUT
T2IN
R2OUT

0.00

2
7
1

D0
D1
D2
D3
D4
D5
D6
D7

1k

AT89S51

BC547

RS
RW
E

39
38
37
36
35
34
33
32

1
2
3

XTAL1

18

C10

100u

VSS
VDD
VEE

U1
19

22pf

C1

4
5
6

C9
BUZ2

7
8
9
10
11
12
13
14

SW-SPST

C2-

C3

RFID READER
MAX232

1u

C4

C5

1u

1u

L293D

DC MOTOR

Fig.5: Result of simulation initializing the GSM modem


Fig.5 shows the process of preparing (initializing) the GSM modem to send SMS in text mode using the stored
command; AT+CMGF=1 saved in the microcontroller.
LCD1
LM016L

R4
10K

SW1

18

C10

X1
CRYSTAL

Q2

22pf

R3

29
30
31

10k

BC547

RST

PSEN
ALE
EA

1
2
3
4
5
6
7
8

R2

1K

D5
1N4007

1K

Q1
OJ-SH-112DM

P1.0
P1.1
P1.2
P1.3
P1.4
P1.5
P1.6
P1.7

16
2
7
1

IN1
IN2
EN1

9
10
15

EN2
IN3
IN4

VSS

C2
1

11
12
10
9

1u

Vcc

C1+

C1T1OUT
R1IN
T2OUT
R2IN

14
13
7
8

RXD
TXD
GND

2
6

VS+
VS-

11
14

OUT3
GND OUT4

U3

T1IN
R1OUT
T2IN
R2OUT

C2+

GND

GSM/GPRS MODEM

3
6

VS OUT1
OUT2

D0
D1
D2
D3
D4
D5
D6
D7

TX

RX

P3.0/RXD
P3.1/TXD
P3.2/INT0
P3.3/INT1
P3.4/T0
P3.5/T1
P3.6/WR
P3.7/RD

U2

GND

0.00

12V

Vcc

10
11
12
13
14
15
16
17

AT89S51

B1

BC547

1k

21
22
23
24
25
26
27
28

P2.0/A8
P2.1/A9
P2.2/A10
P2.3/A11
P2.4/A12
P2.5/A13
P2.6/A14
P2.7/A15

RL1
R1

39
38
37
36
35
34
33
32

P0.0/AD0
P0.1/AD1
P0.2/AD2
P0.3/AD3
P0.4/AD4
P0.5/AD5
P0.6/AD6
P0.7/AD7

XTAL2

1
2
3

XTAL1

100u

BUZZER

VSS
VDD
VEE

U1
19

22pf

C1

7
8
9
10
11
12
13
14

C9
BUZ2

4
5
6

SW-SPST

RS
RW
E

RV1

C2-

C3

RFID READER

MAX232

1u

C4

C5

1u

1u

L293D

DC MOTOR

Fig.6: The result simulation showing that an SMS was sent to Security personnel
Fig.6 displays the feedback message that the power on SMS was successfully sent to the security personnel
whose numbers were programmed into the microcontroller.

LCD1
LM016L

R4
10K

18

C10

X1
CRYSTAL

XTAL1

P0.0/AD0
P0.1/AD1
P0.2/AD2
P0.3/AD3
P0.4/AD4
P0.5/AD5
P0.6/AD6
P0.7/AD7

XTAL2

100u

BUZZER

Q2

22pf

R3

29
30
31

10k

BC547

RST

P2.0/A8
P2.1/A9
P2.2/A10
P2.3/A11
P2.4/A12
P2.5/A13
P2.6/A14
P2.7/A15

PSEN
ALE
EA

RL1
1
2
3
4
5
6
7
8

R1
D5

R2

1K

1N4007

1K

Q1
OJ-SH-112DM

P1.0
P1.1
P1.2
P1.3
P1.4
P1.5
P1.6
P1.7

P3.0/RXD
P3.1/TXD
P3.2/INT0
P3.3/INT1
P3.4/T0
P3.5/T1
P3.6/WR
P3.7/RD

AT89S51

B1

16

12V
2
7
1

9
10
15

IN1
IN2
EN1

EN2
IN3
IN4

VSS

8
VS OUT1
OUT2

U2

21
22
23
24
25
26
27
28

Vcc
GND
TX

RX
10
11
12
13
14
15
16
17

C2
1

1u

OUT3
GND OUT4

GSM/GPRS MODEM

C1-

T1IN
R1OUT
T2IN
R2OUT

T1OUT
R1IN
T2OUT
R2IN
VS+
VS-

3
6

11
14

U3

C1+

C2+

GND

D0
D1
D2
D3
D4
D5
D6
D7

1k

11
12
10
9

+176

BC547

7
8
9
10
11
12
13
14

22pf

C1

1
2
3

BUZ2

39
38
37
36
35
34
33
32

VSS
VDD
VEE

U1
19

RS
RW
E

RV1

SW-SPST

C9

4
5
6

SW1

Vcc
14
13
7
8

RXD
TXD
GND

2
6

C2-

C3
1u

RFID READER
MAX232

C4

C5

1u

1u

L293D

DC MOTOR

Fig.7: Result of simulation showing the use of valid card by closing the switch

www.ajer.org

Page 240

American Journal Of Engineering Research (AJER)

2016

Fig.7 shows the user number (in this case User 1) and the unique identification number of the valid
RFID card used. The RFID card which cannot be located in the simulation software (Proteus) was represented
with an interactive single pole single throw (SPST) switch. Also, the DC motor turns changing its former
position to show that access has been granted.
The single sided Printed circuit Board layout of the simulated circuit diagram was made using the same
Proteus 8.0 virtual software, etched, drilled and components were soldered after tracks continuity test using
Digital Multimeter (DMM) as shown in fig.8. The Printed Circuit Boards play a vital role here in determining
the overall performance of electronic equipment. It ensures that the noise introduced as a result of component
placement and track layout is held within limits. It also provides components years of assembly maintenance
and performance reliability.

Fig.8: RFID Based security access control system with GSM technology on a single sided PCB
The output of the motor driver L293D was disconnected and connected to the input terminal of the
oscilloscope in Electronic Laboratory of University of Agriculture, Makurdi and straight-line waveform as
shown in fig.9 was obtain showing the presence of direct current signal.

Fig.9: The resultant waveform from the test of constructed work with an oscilloscope

V. CONCLUSION
The knowledge and application of new techniques in electronics and telecommunication has made our
life more secured and comfortable. RFID based security system is one of such applications. RFID security
access control system with GSM technology presented in this work is based on microcontroller; hence the
hardware requirement is greatly reduced. An RFID based security access control system with GSM technology
has been implemented and function as desired. The system can be installed at the entrance of a secured
environment to prevent an unauthorized individual access.

ACKNOWLEDGEMENT
The authors would like to thank the anonymous reviewers for their careful reading of this paper and for
their helpful comments to improve the paper

REFERENCES
[1]
[2]

Ramalatha, M., Ramkumar, A. K., Selvaraj, S. and Suriyakanth, S. (2014) RFID Based Personal Medical Data card for Toll
Automation. Elysium Journal Engineering Research and Management. Volume1, ISSN:2347-4408, pp 51-52
Karithik, K. (2014) advanced College Surveillance. International Journal of Scientific and Research publications. Volume 4
(Issue 6), ISSN 2256 -3153, pp 2.

www.ajer.org

Page 241

American Journal Of Engineering Research (AJER)


[3]

[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]

2016

Sivasankaram, V. Muruganand,S., Azha, P. (2013) advanced Embedded System assisted GSM and RFID Based Smart School
Management System. International journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering.
Vol.2 (Issue 7), ISSN (online), pp 2278-8875.
Xiaolong, L. (2009) Design and Implementation of a Digital parking lot Management System. Technology interface Journal
Harri, N. (2011) The Study of Business Opportunities and Value add of NFC application in Security Access Control Solution.
Master thesis, Department of Business administration, Kemi-Tornio, pp 17-19.
Fang, Z., Dagu, H., Zheng, D. and Viping, H. (2008) Design and Implementation of an automatic Clearance Control System
based on RFID. IEEE 7th world congress intelligent control and automation (WCICA). Pp 6621 -6626
Santhosh, S. and Sanihosh K. K. (2013) Campus Access Control System RFID Based. International Journal of Electronics and
Computer Science Engineering. Volume 1, Number 3, ISSN: 2277-1956, pp 1439 1445.
Kulkarni, A. M. and Tawaresachin, S. (2013) Embedded Security System using RFID and GSM. International Journal of
Computer Technology and Electronics Engineering (IJCTEE).Volume 2 (Issue 1), ISSN: 2249-6343, pp164-168
Zhiyuan, F. (2012) A RFID based Kindergarten Intelligence Security System. IEEE Ninth International conference eBusiness Engineering (ICEBE). Volume 3, pp 321-326
Meng, X. L et al (2010) RFID-Based Security Authentication System based on a novel Face Recognition. Structure in proc.
WASE international Conference on Information Engineering, pp 97-100.
Jinaporn, N., Wisadsud, S., Nakonrat, P. and Suriya, A. (2008) Security System against Asset Theft by using RFID Technology.
IEEE 5th international conference Electrical/Electronic, Computer Telecommunication and information (ECTICON).Volume 2,
pp 761 -764.

www.ajer.org

Page 242

Das könnte Ihnen auch gefallen