You are on page 1of 9

SECURITY SYSTEM DESIGN OF RIGHTS ACCESS

GATE IN POLICE ACADEMY SEMARANG USING


RFID
PERANCANGAN SISTEM KEAMANAN HAK AKSES PINTU AKPOL SEMARANG
MENGGUNAKAN RFID
Puguh Gambiro*), Aris Triwiyatno, dan Budi Setiyono
Department of Electrical Engineering, Diponegoro
University Semarang
Puguh Gambiro*), Aris Triwiyatno, dan Budi Setiyono
Department of Electrical Engineering, Diponegoro
University Semarang
Street Prof Sudharto, SH, Kampus UNDIP Tembalang,
Semarang 50275, Indonesia
*)Email: profpgh@gmail.com
Abstract
Radio Frequency Identification is a method of identification
by means of the so-called RFID tags or transponders to store
and retrieve data remotely. Labels or RFID card is an object
that can be attached or included in a product, animal, or
even human beings with the purpose of identification using
radio waves . RFID labels contain information that is stored
electronically and can be up to several feet away. RFID
reader system does not require direct contact such as bar
code reader system ( barcode ) or smartcard. RFID tags
consist of a silicon microchip and an antenna. Some RFID
tags can approach the size of the small size of rice grains.
Labels are passive not require a power source, whereas
active labels require a power source to function. To monitor
all activities that happened, are programmed using Delphi
7.0. The results of the design of the information system
development based on RFID security gate can simplify the
process and can be applied in real life.

Street Prof Sudharto, SH, Kampus UNDIP Tembalang,


Semarang 50275, Indonesia
*)Email: profpgh@gmail.com
and a computer as a data processor. The workings of the
system is carrying an RFID reader emits a radio
frequency scanning and the data stored in the tag,
reaching full potential in reading the data, then sends that
information to a database that stores data attributes
contained in these tags [2]. RFID technology has been
developed and utilized in various fields. Some of that are
for detect animals on a farm, in a supermarket goods
detection, detection of vehicles on the highway, security
systems, etc, by utilizing RFID transponder as a tags [3].
II.

Metode

A. Hardware Design

Keyword : RFID, smartcard, tag, RFID Reader, Delphi

I.

Introduction

The development of Radio Frequency Identification


technology (RFID) is growing very rapidly these days.
Identification technology is widely used in a variety of
luxury residential gate, and five-star hotel in the
Formatting identification of an object. RFID has
advantages of the previous identification technologies,
such as barcodes. Among them is capable of reading a
data object with a certain size without direct contact
(contactless) and should not be read in parallel with the
object, in addition to storing the information on the RFID
tag in accordance with the storage capacity. RFID
technology is being used to help the problems associated
with an object such as a membership identification or
tracking employee for recording an object [1]. technology
generally consists of RFID tags, sensors called the reader,

Figure 1 Block Diagram of Hardware Design

From Figure 1 of each part can be explained as follows:


1. Block A consists of:
a. Host Computer is used as a regulator of the flow
of information from the items that are detected
within the scope of the RFID system.
b. SmartCard reader and editor is used as edit
existing information within the SmartCard
through ACR128U ACS - Dual Interface
Contactless Mifare Reader before passing it to
the database on the host computer.
c. Delphi is used as an application program
regulating the flow of information from the items

that are detected within the scope of the RFID


system, and processed for indicator lights turn on
each gate.
2. Block B consists of:
a. SwitchHub serves as a distributor of data from the
tags that have been read by the RFID reader via
LAN cable
b. RFID Reader (Fingerspot mifare RF-100) which
serves as a receiver and reader input the
information stored on the SmartCard / tag by
scanning with a distance <10cm which is then
sent through LAN cable.
c. SmartCard / Tag serves as the transponder
(transmitter and responder) that contains the data
by using a certain frequency.
d. Model Map of Semarang Police Academy serves
as a miniature area, which has been given as an
indicator LEDs on each gate access at the time of
the examination, which is scanned by RFID.
In Figure 2 can be explained that the 1k ohm resistor as a
barrier in this system, and connected to ground at the
RFID-reader. While the negative pole on the red and
green LED is connected to the resistor. Red LED on the
positive pole is connected normaly Close to the RFIDreader, while the negative pole on the green led is
connected normaly Open to the RFID-reader. COM cable
on RFID-reader is connected to VCC to take power in
order to run an RFID-reader. For image sequence design
of this system can be seen in figure 2 below

Figure 2 Circuit Hardware Design

From the above series of images is known that on the


LED, has the same working principle as the relay. Relay
is a device that works on the electromagnetic contactor to
move some (switch) is arranged. Contactor is closed (On)
or open (off) because of the effects of magnetic induction
coils produced (inductor) when electrified. In contrast to
the switch where the movement of the contactor (On /
Off) is done manually without electrical current.
There are several types of relays based on the way it
works are:
1. Normaly On: Initial conditions terturup contactor
(On) and will be open (Off) when the relay is
activated by giving the appropriate current to the coil
(coil) relay. Another term for this condition is
normaly Close (NC).
2. Normaly Off: The initial condition contactor is open
(off) and will be closed when the relay is activated by
giving the appropriate current to the coil (coil) relay.

Another term for this condition is normaly Open


(NO).
3. Change-Over (CO) or Double-Throw (DT): This type
of relay has two sets of terminals with two
conditions, namely normaly Open (NO) and normaly
Close (NC).
Of the circuit connected to the RFID-reader to process the
input from the smartcard / tag, so that bias the data is
processed, using the Delphi program. Here is a picture of
the physical form Fingerspot RF-100:

Figure 3 Physical Form of Fingerspot RF-100

Fingerspot RF-100 is the best choice for machine


access control affordable. Elegant minimalist design
without keypad and LCD, easy to install and operate, but
it has a powerful ability. Card Reader integrates the best
guarantee safety without leaving ease. It is suitable for
companies, hotels, offices, villas, houses and apartments.
Fingerspot RF-100 has a maximum capacity of up to
30,000 RFID cards. Transaction data that can be
accommodated up to 50,000 records. This data can be
deleted if a full-time machine. This machine uses TCP / IP
connection in addition to RS232 / 485 to facilitate the
transmission of data to and from a computer. Not to forget
the USB port on this machine planted for easy retrieval of
data if the machine away from the computer. As the
access control gate RF-100 can be connected with electric
lock, gate sensor, release button, and alarm. Having
Wiegand-In and Wiegand-out to connect with other access
control engine. Access control software that is included
allows users to transfer data between machines and
computers, make settings related access control
(Timezone, Unlock Combination, Anti-Passback etc.) and
make use of transaction data report engine.
Following Features of Fingerspot RF-100:
Standalone, machine can be used without having
to connect a computer.
Realtime Monitoring, scanned data that can be
directly seen on the computer.
Multi Connection, Equipped with RS232
connection, RS485, TCP / IP, and Wiegand
provide many options in the exchange of data to
and from a computer as well as communication
with other access control.

Multi Identification, Fingerprint, Card, ID


Fingerprint, ID Password
USB Flash Disk, This feature is particularly
useful if the machine is installed away from the
computer. Data can be retrieved using the Flash
Disk and then transferred to a computer.
Web Server, with this feature the company could
see attendance data in the machine using a web
browser such as Internet Explorer, so that the
engine can be accessed from anywhere without
having to have the application installed.
Access Control Support, This machine can be
connected with electric lock, gate sensor, exit
button, alarm. Having wiegand wiegand-in andout to connect with other access control engine.
Setting Timezone (access time), Group, Holiday,
Unlock Combination, Anti Passback etc.
Powerful
Software,
included
software
specifically designed for access control, so the
user can see the data access engine and make
arrangements regarding access control.

Figure 5 is a view of the whole area AKPOL


mockups. The Model is a prototype of the design of a
security system permissions in the Police Academy. In
these models designed and specified 5 specific areas, for
given security detection using RFID. In the realization in
the field using an automatic gate that is in motion using a
DC motor, which diperumpamakan LED light red and
green.
Based on the regulations of the Police Academy,
there are specific areas, where there is an area that can
only be accessed by certain groups. The tight security
system, aiming to avoid an undesirable thing, and so the
user can only enter the area as may be necessary. Based
on the rules and regulations of the Police Academy,
known capabilities based on user permissions group.
Below is a table of user access rights as between the tag
ID and gates that can be accessed.
Table 1 Table Right Gate Access in Every Class

Red Led
VCC
Green Led

Figure 4 Installation Fingerspot RF-100 with Led Red / Green

Figure 4 above shows the green led is connected


normaly Open (NO) to the RFID reader, the red LED
connected normaly Close (NC) to the RFID reader. While
the resistor that serves as a relay is, connected to the
ground of the power supply. While COM is connected to
VCC on RFID.

Figure 5 Display Area Model Police Academy

From the table above we can see that each user


has the ability to access rights different. Governor is the
ID tag user can access all areas, commonly called the
superuser. Governors can access all areas, because the
Governor is the highest rank and has a need to regulate
and supervise in all areas of the Police Academy. The
cadets and Taruni can not enter the gate of the governor
complex area. Coaches and Lecturers can not enter the
main gate, because the main gate can only be entered by
certain groups, especially the top brass and the Police
Academy cadets. Civil servants, residents who live in the
general area of the Police Academy and guests can access
the rear entrance gate and exit gate.
B. Software Design
1) Database Design(Firebird and IB Expert)
In designing the database, the code on each tag is
initialized using Firebird database, where the process
starts from the initialization code displays the data, are
selected and checked whether the data is in the database
and then retrieve data from the database before being
displayed.
Using Firebird database design that is the way to
start opening the application first and then open the
Firebird IBExpert. IBExpert editing can be done with a
database for later in the link to the Delphi application.

Gates, listed the names of the gate / gate in the given


RFID to check. In the Group List, a list of users that have
tags / smartcards, in this case the user should the
Governor, Lecturer, Youth, Residents and Guests. As for
Access Rights, is a table for editing, permissions each
userID in tag / her smartcard. After pressing the RUN
button on the Delphi program, we can edit, add to or
reduce the list in accordance with the rules and
regulations that exist in the Police Academy.

Figure 6 Composition of the Domain and database


tables using IBExpert

While creating a database requires a database


table to facilitate data collection membership required.
And to create a table with the domain, then right click on
the domain than choose "new domain". Then it will create
a new domain in the domain database. From this database,
we connect to Firebird server, and continued input data
and processed using the Delphi program.
2) Display Design (Delphi)
Designing a program to connect a computer /
laptop using a LAN cable for serial communication, in
general the program in this design serves as a liaison
between the user with a card reader, and RFID command
to read the RFID tag which then displays it on the
computer / laptop.
In the design of the display using Delphi 7.0
consists of 3 sub-menu of the first is the "Gate, Group,
and Access Rights" is shown as Figure 7.

Figure 8 Display Card Processing in Delphi program

Figure 8 shows the card processing table, this


table is intended to edit the data on the tags / smartcards
to each user. Each ID tag has a different no.ID. We can
also add information on seriap user ID, and gives the
status of the Group.

Figure 9 Display Monitor control in a Delphi program

Figure 7 Display Tables Gates, Group and Permissions Dephi


program

From the picture above can terlihar tables, List of


Gates, and Group List Access Rights table. In Table List

From Figure 9, above note is a display of the


monitor control, which in this table befungsi cable to
connect the RFID-reader to each gate, as required at the
time of scanning. And in this table, there are also view the
status of the user, which can be known who that user is,
and be or not to access any of the gates in the area of the
Police Academy.
III.

Results and Analysis

A. Hardware Testing
1) Tests to determine the distance to Read RFID Tag
Reader
To determine the distance of the RFID reader needs
to read the measurements on the RFID tags are given
some variation distance. In measuring the distance the
read length required a measurement tool / ruler with units
of centimeters (cm). The steps that must be performed in
the read distance measurement is as follows:
Prepare the RFID reader, RFID tag and also a ruler.
Turn on the RFID reader devices that will be tested.
Place a ruler under the RFID reader.
Measure the distance read on the condition of the RFID
tag has not been put into a book with the tag orientation
parallel to the reader, with variation distance 1-10cm.
Record the measurement results.
Comparing the results of read distance measurements.
Analysis of test results

a
b

From the above table it can be concluded that, the


maximum reading distance of the RFID reader to the tag
with a variation of the distance, the tag can only be read
by a maximum distance of 5cm. If the tag exceeds 5cm,
the RFID reader can not read the tag that contains the ID,
so it can not provide input (input) to the program.
2) Sensitivity testing of Read Distance RFID Reader
with Hitch Variation
To determine the distance of the RFID reader needs
to read the measurements on the RFID tags are given
some variation distance. In measuring the distance the
read length required a measurement tool / ruler with units
of centimeters (cm).
Testing reading RFID reader with a read range of
variation of this obstacle, conducted to determine the
ability of an RFID reader in penetrating obstacles that
block RFID tag. The steps that must be performed in the
read distance measurement is as follows:
a) Prepare the RFID reader, RFID tag and also
prepare a ruler.
b) Turn on the RFID reader devices that will be
tested.
c) Place a ruler under the RFID reader.
d) Measure the distance RFID reader read the
conditions with variation of the normal hitch,
paper, mica plastic, and cardboard.
e) Record, compare and analyze the measurement
results.

Figure 10 (a) Reading of the variation of the distance 2cm, (b) a


distance of 5cm, (c) distance of 6cm, (d) a distance of 10cm
Table 2 Results of testing distance RFID reader to read tags with
distance variations

Read Distance in
Centimeter

Success Status while Reading


Tag

10

(a)

(b)

(c)

(d)

Figure 11 (a) Reading of the variation of the normal obstacles,


(b) hitch paper bond, (c) plastic hitch mica, (d)
obstruction of cardboard.

Table 3 Results of measurements with various obstacles

Obstacle

Average read
distance

Normal

5 cm

The percentage of
successful reads
data
100 %

Paper

4 cm

80 %

Plastic Mica

4 cm

100%

Cardboard

4 cm

0%

In Table 2 it can be seen that the results of testing


the readability of RFID reader with variations hitch there
is little difference of approximately 1 cm with normal
readings. This difference occurs because the read distance
of tags slightly hindered by the thickness of these
constraints. With a slightly different reading distance,
then the reader is able to penetrate barriers readings and
can be used in the implementation for scanning tags of
each user who wants to through the gate at the Police
Academy area.
B. Software Testing
1) Testing Access Tag on each gate
In this test, takes several stages to see the result of the
ability of this tool. The following phases:
a) Make sure the application has akrif Firebird, because
in reading the application server and the database
requires a version of the application that is used for
the database server is Firebird 1.5
b) Then open IBExpert Delphi database application
plugin, to enable the database. With this application,
you can edit, add and subtract a database that will be
used.
c) Then open Delphi 7.0 applications. With this
application, a program created to connect the
hardware to the software.

Figure 13 Display when opening a database application


IBExpert

From Figure 13 proves that IBExpert database


application is active, and we can use the charter
application. In applications IBExpert we can do the
editing, which adds to and enter into the database
later Delphi applications.

Figure 12 Firebird 1.5 Evidence that the application is


already active.

From the picture above, it is known that the


application to the database server is active and we
can run the next step.
Figure 14 display when editing a database

In this application, the database can be added and


subtracted, as needed. To add a database table to be used,
click Tables, right-click and select New Table. In this new
table we can determine, any database that will be used, as
appropriate. After all the applications and the database
server is opened and active, then the next step is to open
application programming, namely Delphi 7.0 applications.
In this thesis, using the Delphi application, which aims to
be easily understood. Delphi and with this we are also
able to connect, the ability to program the hardware that
we make.
Figure 14 This is the main view of the data we
opened the Delphi application. With the opening of this
Delphi application, the next step is to set up a database
that you created earlier in IBExpert, and adjusted in this
application.
Once the table is made in accordance with the
existing table in the database, then all icons in this Delphi
application, are grouped into one main application view
of this final program. Here's the result of a combination of
6 tables that have been created using the Delphi program.

Figure 16 Display Table Names Gates, Access Group and the


Delphi program

From Figure 16 above, we can scan in any


smartcard / tag, on the scanning results obtained ID, Tag
ID of each tag has a different. Then after the ID obtained
from each of the ID, the ability of the tag is determined, in
accordance with Name, Rank, Position and Type of owner
tag and the list is inserted into the table caption.

Figure 17 Display Table Card Processing


Figure 15 Display Delphi 7.0 applications

In figure 15 it can be seen from the table display


gates name, class and the ability to access a list of each
group. In this view, we can set permissions capabilities of
each class, which is then inserted into the tag / smartcard
for each user.
First first determine the various classes of the
user smartcard. The group was governor, Lecturer, Youth,
Population, Guest / Public / Guest. Once created List
class, we can define define access rights of each gologan,
by editing the menu Access table, when the program
starts.

Gambar 18 Tampilan dari Tabel Monitor Kendali

Figure 18 is a table to put the status of each tag.


From this table also, when connecting with any gate that
you want to access when scanning a tag, we can
determine the ability of the access rights of each user tag.

Suppose the results of scanning the tag, the ID is in the


know of Governors, then the table is in the know on the
access rights of the tags, and the same time the green LED
light will turn on for 5 seconds while the permissions
"allowed". This indicates that the users tag can pass
through the gate in the area. Then, the tag ID is recorded
as a general, to access, Governor Complex area. When the
ID tag was scanned, obtained status where the user ID tag
is recorded as a general class, does not have permissions
to enter the complex area governor, then the status display
ID, says "access denied". Meanwhile, if there is another
user tries out the list of databases that want to enter the
Police Academy area, with a tag that has not been
recorded, then the status will be displayed while accessing
is "not registered".
IV.

Conclusion

Based on the testing and analysis that has been done, it


can be concluded, that the use of RFID reader in test
sensitivity, the ability to read tags is strongly influenced
by the presence of obstacles, and distance during
scanning. From the test results, the presence of obstacles
cardboard, RFID can not read data from the tag.
Meanwhile, when testing without hindrance RFID can be
read with 0% error and the max distance of 5cm. Each tag
ID has access privileges based on class and the ability to
access at each gate with LED lights as an indicator, the
tag ID can be run correctly, in accordance with the
provisions of the Police Academy and made the
appropriate group. Users who recorded adahah Governor,
Lecturer, Civil Workers, Youth, Residents, and Guests.
Governor is a superuser, so it has access rights to each
gate in the area of the Police Academy. The tags are used
when checking: smartcard and wristband tag. Smartcards
have read farther distance than at the time checks
wristband tag. The RFID system can read the code that
connects to the database and can simultaneously display it
in a view of software. The RFID system is appropriate
when applied in the security system at the Military
agencies, like the Police Academy in Semarang.
For further development of the system, it can be given
suggestions for adding a signal amplifier for RFID reader,
in order to expand the tag reading distance when checking
in each gate.
REFERENCES
[1] Hidayat, Rahmad. 2010. Teknologi Wireless RFID
Untuk Perpustakaan Polnes : Suatu peluang. Jurnal
Informatika Mulawarman.
[2] Mardiyono. 2011. Perancangan Arsitektur Sistem
Deteksi Anti Percurian pada Perpustakaan Radio
Frequency Identification. Orbith, Teknik Elektro
Polines. Semarang.

[3] Saputra, Doni., Cahyadi, Dedy., Kridalaksana, Awang


Harsa. 2010. Sistem Otomasi Perpustakaan Dengan
Menggunakan Radio Frequency Identification
(RFID). Jurnal Informatika Mulawarman.
[4] Lentsch, Allen. 2005. Triple RFID Protection for
Cars.
[5] Wang, Shang-Wei., Chen,Wun-Hwa.2006. RFID
applications in hospitals: a case study on a
demonstration RFID project in a Taiwan hospital,
Master Thesis,National Taiwan University, Taiwan.
[6] Milella, Annalisa., Di Paola,Donato. 2005.RFID
Technology for Mobile Robot Surveillance, National
Research Council, Institute of Intelligent Systems for
Automation, Italy.
[7] Ahson, Syed A., and Ilyas, Mohammad. 2008.RFID
Handbook: Applications, Technology, Security, and
Privacy, Taylor & Group,France.
[8] Aiyub, Muhammad. 2011. Rancang Bangun Sistem
Monitoring dan Pengendalian Kinerja Pegawai
Berbasis Radio Frequensi Identification (RFID),
TugasAkhir, Universitas Syiah Kualadarussalam,
Aceh.
[9] Wiharta, Dewa, Made., Ardana, Putu., Nixon,
Frederik.
2008.
Kunci
pintu
otomatis
Menggunakanaplikasi RFID card, Tugas Akhir,
Teknik Elektro Universitas Udayana, Bali.
[10] Erwin.
2004. Radio Frequency Identification,
InstitutTeknologi Bandung.

Biography
Puguh Gambiro (L2F008147) was
born in Bekasi, on August 24, 1990
has been studying in kindergarten at
An
Nur
Narogong
Bekasi,
Elementary School at SDN Bojong
Rawa Lumbu 6 Bekasi, Junior High
School at Bani Saleh 2 Bekasi, and
Senior High School at Panglima
Sudirman 1 Bekasi. Currently studying S1 in the Faculty
of Engineering, Department of Electrical Engineering,

University of Diponegoro, generation 2008 and took


control concentration.
Knowing and Ratified
Supervisor Lecturer I
Dr. Aris Triwiyatno, S.T.,M.T.
NIP 197509081999031002
Supervisor Lecturer II

Budi Setiyono, S.T.,M.T.


NIP 197005212000121001

You might also like