Open Access   Article Go Back

Smart Door Locking System using RFID Reader in IoT Environment

Anuradha T1

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-5 , Page no. 801-805, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i5.801805

Online published on May 31, 2019

Copyright © Anuradha T . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Anuradha T, “Smart Door Locking System using RFID Reader in IoT Environment,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.801-805, 2019.

MLA Style Citation: Anuradha T "Smart Door Locking System using RFID Reader in IoT Environment." International Journal of Computer Sciences and Engineering 7.5 (2019): 801-805.

APA Style Citation: Anuradha T, (2019). Smart Door Locking System using RFID Reader in IoT Environment. International Journal of Computer Sciences and Engineering, 7(5), 801-805.

BibTex Style Citation:
@article{T_2019,
author = {Anuradha T},
title = {Smart Door Locking System using RFID Reader in IoT Environment},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {7},
Issue = {5},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {801-805},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4316},
doi = {https://doi.org/10.26438/ijcse/v7i5.801805}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i5.801805}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4316
TI - Smart Door Locking System using RFID Reader in IoT Environment
T2 - International Journal of Computer Sciences and Engineering
AU - Anuradha T
PY - 2019
DA - 2019/05/31
PB - IJCSE, Indore, INDIA
SP - 801-805
IS - 5
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
483 319 downloads 154 downloads
  
  
           

Abstract

RFID tagging is an ID system that uses small radio frequency identification devices for identification and tracking purpose. An RFID tagging system includes the tag itself, a read/write device, and a host application for data collection, processing, and transmission .In simple words an RFID uses electromagnetic fields to transfer data over short distances. RFID is useful to identify people, to make transactions.

Key-Words / Index Term

Arduino Uno, RFID Reader, two RFID tags, Arduino Uno cable, Jumper wires, CD driver,Battery,IoT(Internet of things technology)

References

[1]. D. L. Wu, Wing W. Y. NG, D. S. Yeung, and H. L. Ding, “A brief survey on current RFID applications,” in Proc. International Conference on Machine Learning and Cybernatics, Baoding, July 12-15, 2009, pp. 2330-2334.
[2]. B. Yan and D. Y. Lee, “Design of spot ticket management system based on RFID,” in Proc. International Conference on Networks Security, Wireless Communications and Trusted Computing, 2009, pp. 496-499.
[3]. G. Ostojic, S. Stankovski, and M. Lazarevic, “Implementation of RFID technology in parking lot access control system,” in Proc. Annual RFID Eurasia Conference, 2007, pp. 1-5.
[4]. N. Ahmad, S. Butler, and U. Ramachandran, “GuardianAngel: An RFID based indoor guidance and monitoring system,” 2010, pp. 546-551.
[5]. K. S. Huang and S. M. Tang, “RFID applications strategy and deployment in bike renting system,” in Proc. ICACT 2008, pp. 660-663.
[6]. S. Lahiri, RFID sourcebook, IBM Press, Westford, Massachusetts, 2006
[7]. F. Lourenco and C. Almeida, “RFID based monitoring and access control system,” in Proc. INFORUM, 2009.
[8]. R. Weinstein, “RFID: A technical overview and its application to the enterprise,” IT Professional, vol. 7, no. 3, May-June 2005, pp. 27-33.
[9]. X. L. Meng, Z. W. Song, and X. Y. Li, “RFID-Based security authentication system based on a novel face-recognition structure,” in Proc. WASE International Conference on Information Engineering, 2010, pp. 97-100.
[10]. D. L. Wu, Wing W. Y. NG, Patrick P. K. Chan, H. L. Ding, B. Z. Jing, and D. S. Yeung, “Access control by RFID and face recognition based on neural network,” in Proc. International Conference on Machine Learning and Cybernatics, July 11-14, 2010, pp. 675-680.
[11]. M. A. Mazidi, J. C. Mazidi, and R. D. Mckinaly, The 8051 Microcontroller and Embedded Systems, Pearson Education, 2006.