DESIGN AND IMPLEMENTATION OF TWO-WAY AUTHENTICATION SYSTEM USING RAPSBERRY PI

  • Type: Project
  • Department: Computer Engineering
  • Project ID: CPE0057
  • Access Fee: ₦5,000 ($14)
  • Pages: 43 Pages
  • Format: Microsoft Word
  • Views: 402
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

TABLE OF CONTENTS

DECLARATION..........................................................................................................ii

ACKNOWLEDGEMENTS............................................................................................. iii

APPROVAL...............................................................................................................iv

TABLE OF CONTENTS ...............................................................................................v

ABBREVIATIONS..................................................................................................... vii

ABSTRACT............................................................................................................. viii

CHAPTER ONE ................................................................................................... 1

INTRODUCTION................................................................................................ 1

1.1. Introduction .................................................................................................1

1.2. Background..................................................................................................1

1.3. Problem statement .......................................................................................2

1.4. Objectives of the study .................................................................................3

1.4.1. Main Objective .......................................................................................3

1.4.2. Specific Objective ...................................................................................3

1.5. Research questions.......................................................................................3

1.6. Significant of the study .................................................................................3

1.7. Scope of the Project......................................................................................4

1.7.1. Context scope ........................................................................................4

1.7.2. Geographical scope.................................................................................4

1.7.3. Time scope ............................................................................................4

CHAPTER TWO .................................................................................................. 5

LITERATURE REVIEW ....................................................................................... 5

2.0 Introduction .................................................................................................5

2.1 Literature Review..........................................................................................6

2.2 Radio Frequency Identification.....................................................................11

2.3 Related work done......................................................................................14

vi

CHAPTER THREE ............................................................................................. 15

METHODOLOGY............................................................................................... 15

3.0 Introduction ...............................................................................................15

3.1 Components used.......................................................................................19

3.1.1 RFID Reader ........................................................................................19

3.1.2 RFID tag ..............................................................................................19

3.1.3 Liquid crystal display.............................................................................20

3.1.4 Raspberry Pi-3 Model B.........................................................................21

3.1.5 Servo motor .........................................................................................22

3.1.6 Proximity sensor...................................................................................22

3.2 Design of the System..................................................................................23

3.3 Working of the system ................................................................................26

CHAPTER FOUR............................................................................................... 27

DISCUSSION AND RESULT OF THE SYSTEM................................................... 27

4.0 Results of the system..................................................................................27

CHAPTER FIVE ................................................................................................ 30

CONCLUSIONS AND RECOMMENDATIONS..................................................... 30

5.0 Conclusions ................................................................................................30

5.1 Recommendations ......................................................................................30

Chapter Six.............................................................................................................32

REFERENCES ..........................................................................................................32

APPENDICES...........................................................................................................34

ABSTRACT In recent years, there have been rise in the number of applications based on Radio Frequency Identification (RFID) systems and have been successfully applied to different areas such as transportation, health, education, hospitality industry and many others. RFID technology facilitates automatic wireless identification using electronic passive and active tags with suitable readers. In this project, I dealt with solving the problem of theft in our inhabitants by locking the gate and the door using RFID technology. The application of RFID as two-way authentication was designed to help people to access their gate and the door of a certain compound being identified before entering the compound to reduce on the theft in our environment and to know who enters the compound. The system will use a Raspberry Pi technology to allow it perform these tasks of identification well. In this system, once the person reaches the gate of the compound, the person has to identify him/herself by putting the tag card in front of the tag reader, this one, once identified will process the data to the Raspberry Pi and it’s to the Raspberry Pi to check the given data on the tag to confirm the person’s entrance and therefore the gate opens by the servo motors rotating a certain angel, then after this has happened, the gate can be opened and the person may access the gate and enter the compound, once the car has passed, the proximity sensors detects the presence of the car and after a specific amount of second, it closes the gate by reactivating the servo motors again. Similarly at the door point, when the person reaches the door he or she has entered the password and the keypad sends the code to the raspberry pi and it’s the one to confirm the code whether it’s to be accepted or to be ejected, and once it is allowed, the signal is sent to the servo motors controlling the door and therefore the door opens and the person may access the door and enters the house, once inside can go out by using the push button then the servo motor opens the door automatically and the person may access the door and exit the house, this is the same when you enter the house and wishes to lock the door again, all that you have to do is press the push button, and it closes automatically by activating the servo motors.

DESIGN AND IMPLEMENTATION OF TWO-WAY AUTHENTICATION SYSTEM USING RAPSBERRY PI
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Computer Engineering
  • Project ID: CPE0057
  • Access Fee: ₦5,000 ($14)
  • Pages: 43 Pages
  • Format: Microsoft Word
  • Views: 402
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Computer Engineering
    Project ID CPE0057
    Fee ₦5,000 ($14)
    No of Pages 43 Pages
    Format Microsoft Word

    Related Works

    TABLE OF CONTENTS DECLARATION..........................................................................................................ii ACKNOWLEDGEMENTS............................................................................................. iii... Continue Reading
    DESIGN AND IMPLEMENTATION OF AN ELECTRONIC VOTING SYSTEM WITH FINGERPRINT AUTHENTICATION CHAPTER ONE BACKGROUND OF STUDY 1.0       Background of the Study Voting theory formally began in the 18th century and ever since, many proposal has been made towards using electronic technologies to improve elections (Sobia, Ummer, Ayesha, Usman, and... Continue Reading
    DESIGN AND IMPLEMENTATION OF A TWO FACTOR AUTHENTICATION LOGIN SYSTEM USING ONE TIME PASSWORD (OTP) WITH SMS ABSTRACT The paper examined the design and implementation of a two-factor authentication login system using OTP with SMS. The quest for the application of tighter security measures to web, desktop and mobile applications developed has been... Continue Reading
    ABSTRACT Focusing on methods that are used to implement strong user authentication for online-consumer identities, this article aims to distill a comprehensive view of strong user authentication by examining its concepts, implementation approaches, and challenges/additional concerns at the architectural level. It discusses effective solution... Continue Reading
    ABSTRACT Focusing on methods that are used to implement strong user authentication for online-consumer identities, this article aims to distill a comprehensive view of strong user authentication by examining its concepts, implementation approaches, and challenges/additional concerns at the architectural level. It discusses effective solution... Continue Reading
    CHAPTER ONE INTRODUCTION 1.1       Background of the Study A biometric system is essentially a pattern recognition system that operates by acquiring biometric data from an individual, extracting a feature vector from the acquired data, comparing this feature vector from the... Continue Reading
    ABSTRACT Most ATMs employ one means of authentication (single factor authentication) by using the PIN. These kinds of ATMs are vulnerable to ATM frauds like Card Skimming: where a device placed at the slot for the ATM Card copies all the information stored in ATM cards including the PINs and then copies of the original cards will be made,... Continue Reading
    - Elections are the bedrock of democracy and voting is one of the electoral processes that ensure the sustenance of democracy, political growth and democratic stability of any society. We have designed an Enhanced Electronic Voting System (EnEVoS) with a Hybrid Authentication Technique, which will reduce electoral malpractices and manipulation of... Continue Reading
    - Elections are the bedrock of democracy and voting is one of the electoral processes that ensure the sustenance of democracy, political growth and democratic stability of any society. We have designed an Enhanced Electronic Voting System (EnEVoS) with a Hybrid Authentication Technique, which will reduce electoral malpractices and manipulation of... Continue Reading
    - Elections are the bedrock of democracy and voting is one of the electoral processes that ensure the sustenance of democracy, political growth and democratic stability of any society. We have designed an Enhanced Electronic Voting System (EnEVoS) with a Hybrid Authentication Technique, which will reduce electoral malpractices and manipulation of... Continue Reading
    Call Us
    whatsappWhatsApp Us