Design a RFID based passive keyless entry for Automobile door lock application
#1

SUBMITTED BY
P.Ravi kiran

[attachment=12781]
ABSTRACT
An immobiliser or immobilizer is an electronic device fitted to an automobile which prevents the user entering into the car unless the correct key is present. The main use of this system is to protect the vehicle door. An Immobilizer is an electronic device fitted to an automobile which prevents the user entering into the car, unless the owner of the vehicle has the proper access to it. This prevents the car being stolen. Early models used a static code in the ignition key which was recognized by an RFID loop around the lock barrel and checked against the vehicle's Engine Control Unit (ECU) for a match. If the code is unrecognized, the ECU will not allow user to enter into the car. When the ECU determines that the coded key is valid then the ECU activates the door.
The main aim of this project is to Design a RFID based passive keyless entry for Automobile door lock application. The tag will be in the pocket of the owner when the tag comes into the EMF field which is surrounded around the Car. The UID present in the tag has to be read by the reader and compare the id present in the controller. If the id gets matched then the door will be opened or else not. The user will be having only one ID. In any case if some other tries to access the car by using other tag having different ID it will not work and the car door will not open. So here the security will be more.
Chapter 1.INTRODUCTION
1.1RFID

Radio Frequency (RF) technology has been around since WWII, when the Allied Forces first used it to identify friendly aircraft. We will discuss the use of RF in automatic identification systems. RFID (Radio Frequency Identification) uses radio frequency signals to identify “tagged” items, cases and pallets as they move through the supply chain. This data is then collected and transmitted to a host system using an RF Reader. Many things are hidden in the shrouds of time. The task of tracing history and genealogy is arduous and challenging, but, ultimately, rewarding. Our past can open doors to our future. RFID is used for hundreds, if not thousands, of applications such as preventing theft of automobiles, collecting tolls without stopping, managing traffic, gaining entrance to buildings, automating parking, controlling access of vehicles to gated communities, corporate campuses and airports, dispensing goods, providing ski lift access, tracking library books, buying hamburgers, and the growing opportunity to track a wealth of assets in supply chain management. The foremost goal of covering RFID is to learn complete technology, its application and study diverse projects in conjunction with the technology. In this project we will be discussing the application of the immobilization of the two wheeler using RFID.
Chapter 2.RFID TECHNOLOGY
2.1 Introduction

Whatever you read about packaging, supply chains, or identification, you will come across an article or advertisement for Radio Frequency Identification (RFID). Why does it seem that this technology is being touted as the best thing since sliced bread? And is it just another piece of hype meant to confuse and make us invest money in another piece of technology?
RFID is evolving as a major technology enabler for identifying and tracking goods and assets around the world. It can help hospitals locate expensive equipment more quickly to improve patient care, pharmaceutical companies to reduce counterfeiting, and logistics providers to improve the management of moveable assets. It also promises to enable new efficiencies in the supply chain by tracking goods from the point of manufacture through to the retail point of sale.
2.2 Brief History
Radio frequency identification has been around for decades. Learn how it evolved from its roots in World War II radar systems to today's hottest supply chain technology. It’s generally said that the roots of radio frequency identification technology can be traced back to World War II. The Germans, Japanese, Americans and British were all using radar—which had been discovered in 1935 by Scottish physicist Sir Robert Alexander Watson-Watt—to warn of approaching planes while they were still miles away. The problem was there was no way to identify which planes belonged to the enemy and which were a country’s own pilots returning from a mission.
The Germans discovered that if pilots rolled their planes as they returned to base, it would change the radio signal reflected back. This crude method alerted the radar crew on the ground that these were German planes and not Allied aircraft.
Under Watson-Watt, who headed a secret project, the British developed the first active identify friend or foe (IFF) system. They put a transmitter on each British plane. When it received signals from radar stations on the ground, it began broadcasting a signal back that identified the aircraft as friendly. RFID works on this same basic concept. A signal is sent to a transponder, which wakes up and either reflects back a signal (passive system) or broadcasts a signal.
In 1979 the RFID was used for animal tracking and identification. In 1994 RFID tags are used for identification of rail cars in United States. In recent years the surge has occurred in RFID technology research, manufacturing , and usage due to the advance in semiconductor manufacturing , which has reduced the cost of RFID, making their use economically feasible
2.3 Basic RFID system
• RFID Device (transponder, tag, smart label, Card, etc.) – contains data about the tagged Item
• Antenna – transmits the RF signals between the reader and the RFID device
• Reader – receives RF transmissions from an RFID device and transmits to a host System for processing
Radio Frequency Identification is a means of capturing data about an object without using a human to read the data. The physical concept behind RFID is it simply involves applying the basic laws of electro-magnetism.
Before RFID can be understood completely, it is essential to understand how Radio Frequency communication occurs. RF (Radio Frequency) communication occurs by the transference of data over electromagnetic waves. By generating a specific electromagnetic wave at the source, its effect can be noticed at the receiver far from the source, which then identifies it and thus the information. In an RFID system, the RFID tag which contains the tagged data of the object generates a signal containing the respective information which is read by the RFID reader, which then may pass this information to a processor for processing the obtained information for that particular application.
A generic RFID system is composed of two different devices a transponder and a reader. The transponder, or tag, is an electronic device with data storage and the ability to reply to an electro-magnetic stimulus generated by a reader. The reader is an electronic device able to generate an electro-magnetic field, following a defined protocol that is able to transmit and receive information to and from the transponder.
2.4 RFID Tags/Transponders
Tags are the heart of an RFID system, because they store the information that describes the object being tracked. Specific object information is stored in the memory of tags and is accessed via the radio signal of RFID readers. Data is transferred between a tag and a reader via low-power radio waves, which are tuned to the same frequency. To obtain information from a tag, a transceiver must send a signal to the RFID tag, causing the tag to transmit its information to the transceiver. The transceiver then reads the signal, converts it to a digital format, and transmits it to a designated application.
Tags may be active or passive and read-only, write-once, or read-write. Below is a description of each:
• Active tags have a battery, which runs the microchip's circuitry and enables the tags to send a stronger signal to the reader, and have a read range of approximately 100 feet.
• Passive tags have no battery. Instead, they draw power from a reader, which sends electromagnetic waves that induce a current in the tag's antenna and powers the microchip's circuits. The chip then modulates the waves the tag sends back to the reader. Passive tags have a read range of approximately 30 feet.
• Read-only tags contain data, such as a serialized tracking numbers, which are pre-written onto them by the tag manufacturer or distributor. Read-only tags are generally the least expensive, because they cannot have any additional information included as they move throughout the supply chain. Any updates to that information have to be maintained in the application software that tracks the stock unit's movement and activity.
• Write-once tags enable a user to write data to the tag one time during production or distribution. This information can be a serial number or other data, such as a lot or batch number.
• Full read-write tags allow new data to be written to the tag as needed and written over the original data.
Reply
#2
[attachment=14055]
Passive Keyless Entry System (PKE)
PKE systems allow drivers to enter their vehicles without any explicit action to unlock them
Ideal for vehicles for all kinds, specially family types
Consists of a vehicle and a customer identification device which serve as communication peers
LF uplink- vehicle to CID
RF link- CID to vehicle
Communication process
Components of PKE system
Vehicle
Loop antenna
Low Frequency (LF) transmitter
Radio Frequency (RF) receiver
Microcontroller
Contd…
Customer Identification Device (CID)
3 Orthogonal antennas
Low power Microcontroller unit
RF transmitter
Efficient battery usage
Operates on lithium battery
Remains in low power consuming sleep mode when not communicating with vehicle
Wakes up only when a valid base-station command with a predefined header is detected from the vehicle
Operates in an emergency back up mode in low battery conditions
Working
When the owner pulls a door handle, the vehicle transmits challenge in the form of LF interrogation signals .
CID in the range of 1-2 m wakes up from its sleep mode, it decodes the information
If the information is valid, then CID encrypts it
Cipher data is sent back to the vehicle in the form of RF signals
The vehicle also encrypts its own challenge using the same encryption key
It compares the cipher data with its with own calculated response.
If both matches, the user is allowed to access the vehicle.
ZigBee
Radio-frequency (RF) applications that require a low data rate, long battery life, and secure networking and operates at a bandwidth of 2.4 GHz.
Based on the IEEE 802.15.4-2003 standard
Can activate from sleep in 30 ms or less
Keyless Ignition System
Once inside the car, the engine can be started by simply pressing the start button.
Immobilizer prevents the engine from running unless the correct CID is present.
If CID is not present, then fuel does not get injected into the engine.
Security Threats
Dictionary Attack :
Thief builds an electronic dictionary
Valid entry (challenge, response) pair
keep pulling a door handle
Two-thief attack or Relay attack :
two thieves attempt to bridge the gap
thieves carry receiver and amplifier
May communicate at different frequencies
Solutions to two thief attack
Detecting the repeaters
Measure the loop time delay
a threshold value is already estimated
Corrupting the signals
Unidirectional LF link
Bidirectional RF link
Ensures that the thieves’ devices are always on
Continuous transmission of interrogating signals by the vehicle
Two kinds of distortion
one interrogating signal may overlap with another
no signal is transmitted
feedback signal may overlap with the interrogating signal
feedback signal is corrupted
Advantages:
High bit-rate communication via RF
Elimination of hardware needed for fast and smooth operation
Magnitude of feedback loop channel is measured
In time domain, the signals x(t) and y(t) are related as:
Causes a nonlinear distortion for the different frequency components of the transmitted pulse.
Applications
Automatic car lock
By walking over 1.5 to 2 meters away from car, doors will automatically lock and ARM the security system.
Low battery alarm
Unclosed door alarm
Contd…
PKE systems can be implemented in garage and houses
Reply
#3
hey, can u mail me the details (report) of this project tomorrow?...
thanks...

my email ad: leyn_sy25[at]yahoo.com
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: existing systems of password based door lock as a project report, passive keyless entry student project reports, all view of chasis design automobile ppt, split screen application for data entry of shipments, major project application of automatic door lock, ppt on passive solar building design, keyless approach to image encryption,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  DESIGN AND CONSTRUCTION OF A TWO – WAY WIRED INTERCOM seminar class 8 19,241 08-07-2018, 06:37 PM
Last Post: Guest
  DESIGN AND IMPLEMENTATION OF GOLAY ENCODER AND DECODER computer science crazy 2 23,323 26-08-2016, 03:46 PM
Last Post: anasek
  DESIGN AND IMPLEMENTATION OF ASYNCHRONOUS FIFO FOR EMBEDDED APPLICATIONS computer science crazy 1 22,629 14-04-2015, 05:38 PM
Last Post: Guest
  Password based door locking system vinaysingri 4 7,922 10-11-2014, 11:25 PM
Last Post: jaseela123d
  RFID BASED PREPAID ENERGY METER seminar class 3 3,430 06-03-2014, 11:58 PM
Last Post: computer topic
  rfid projects ideas for final year engineering students project topics 1 2,688 22-02-2014, 09:49 PM
Last Post: Guest
  DESIGN AND IMPLEMENTATION OF RADIX-4 BOOTH MULTIPLIER USING VHDL project computer science technology 8 24,781 12-11-2013, 05:36 AM
Last Post: Guest
  Design and Analysis of GPS/SINS Integrated System for Vehicle Navigation seminar class 1 1,162 12-08-2013, 07:49 PM
Last Post: Guest
  Electronic code lock using 8051 Microcontroller seminar class 6 6,097 29-07-2013, 11:11 AM
Last Post: computer topic
  RFID BASED AUTOMATIC CAR PARKING SYSTEM seminar class 3 8,008 05-07-2013, 12:38 PM
Last Post: Guest

Forum Jump: