You are on page 1of 16

BETE THIRD YEAR GROUP 1

PROJECT

PRESENTED
BY

NAME REGISTRATION NUMBER


ENGUARU EMMANUEL 15/U/ 7746 /ETD/PD
NKUGWA BRIAN 15/U/265/ETD/GV
OCATRE JIMMY 16/U/12480/ETD/PD

SUPERVISOR:
DR EXCELLENCE FAVOR
2
TITLE
Design and construction of a wireless ID
entry system for quick and secure access to
Base Transciever Stations (BTS) using RFID
technology
ABSTRACT 3
 ABSTRACT
 The primary aim of this project is to offer easy and
secure access to telecommunication sites in times of
emergency
 Currently this is not possible because the current
system requires the technician to first call the NOC
(network Operating center) in order to be granted
access to the site
 The project has a door locking system that uses a
passive type of RFID which can activate,
authenticate, and validate the user and unlock the
door in real time for secure access.
 The RFID reader responds when the card is placed
near it. The reader scans for the unique identifier on
the card and then the data is compared with the
registered user data.
ABSTRACT 4
 If the data matches, the person is asked to enter the
password corresponding to the unique identifier on
that particular card.
 If the password is correct, it sends the match signal to
the Arduino microcontroller which then drives the
servomotor to open the site lock and opens it for the
authorized technician.
 The system also creates a log containing check-in and
check-out of each user along with basic Information
of user.
BACKGROUND 5

 Telecommunication sites require frequent


maintenance and sometimes because the mast has
stopped responding or run out of power.
 Initially, Telecommunications sites in Uganda used
mechanical keys which were distributed to
technicians and required technicians to spend time
collecting keys and returning them to the Network
Operating Centre (NOC) and also required the
operator to manage those keys.
 Because these keys were often copied which
provided no security for the site, the Access Control
System (ACSYS) was introduced and it is the current
security system used in Uganda to offer controlled and
secure access to the BTS sites.
BACKGROUND 6

 However, this system requires the technician to first


contact the NOC on arrival to the site in order to get
the secret code for unlocking the door.
 This system of first calling the NOC before accessing
the site does not offer easy access to the site in case
of any emergency and consumes time and introduces
extra cost in terms of airtime
 Therefore, we have designed this project to replace
the current system by using the RFID technology to
offer easy access to the site without first calling the
NOC to get the access code
PROBLEM STATEMENT 7

 There is a problem of lack of a quick secure access to


BTS sites by the technicians especially in case of an
emergency
OBJECTIVES 8

 General objectives:
 To design and construct a wireless ID entry system that will
provide easy and secure access to BTS sites
 Specific objectives:
 To register and store the technician’s tag into the system
 To ensure that the door only opens when a valid tag is scanned
and doesn’t open id an invalid tag is scanned
 To generate a log according to the check in and check out time.3
9
JUSTIFICATION 10

 It offers quick and secure access to BTS sites without first


calling NOC.
 In case the technician loses his card, he informs the
NOC so that they can delete the lost tag from the
system, give him a new card and update the system
hence its secure.
SIGNIFICANCE OF THE 11

PROJECT
 The system offers controlled and secured BTS site
access rights
 The log tell the operator when the card was used
(date/time) and when the lock was opened and
closed thus informing the operator about time spent on
site.
 Cards cannot be copied, so no access is possible
outside the access rights .
 If someone tries to access without having rights, he or
she is denied entry.
 Access can be granted to specific sites and specific
assets on those sites
SCOPE AND LIMITATION OF 12
THE PROJECT
 Our project is intended to offer easy access to
Telecommunication sites in case of any network
emergency
 Only the authorized technicians with valid RFID
cards and passwords can be allowed to access
the site.
 The project keeps record of the technician who
accesses the site and the time spent on site
 However, the NOC cannot know immediately
whether the site has been accessed
 It doesn’t consider the possibility of a technician
giving his card and password to unauthorized
person. Such a person will be able to access the
site without the notice of the NOC.
METHODOLOGY 13

The necessary data for system design shall be obtained in


the various ways listed below,
 Secondary data
GANTT CHART SHOWING THE
PROPOSED SCHEDULE 14
20-Oct-17 19-Nov-17 19-Dec-17 18-Jan-18 17-Feb-18 19-Mar-18 18-Apr-18 18-May-18 17-Jun-18

Initiate project 20 - 24-Oct-17

Research on the tittle 31 Oct - 5-Nov-17

Develop the project proposal 8-Nov - 6-Dec-17

Proposal presentation and approval 8-Dec-17 10-Dec-17

Research on the project requirements 20-Dec-17 31-Jan-18

Progamming the arduino board 1-Feb-18 15-Mar-18

Development of the model 1-Mar-18 31-Mar-18

15-Apr-18
Testing the model 1-Apr-18

1-May-18
Final implementation 17-Apr-18

10-May-18
Project presentation 2-May-18
PROPOSED BUDGET 15
ITEM QUATITY UNIT PRICE AMOUNT
Arduino board. 1 60,000 60,000
Bread board. 1 15,000 15,000
Servo motor. 1 20,000 20,000
Piezo buzzer. 1 1,000 1,000
Keypad. 1 6,000 6,000
Electronic lock. 1 55,000 55,000
Mifare RFID-R522 1 35,000 35,000
module.
Jumper wires. 10 500 5,000
Resistors. 2 500 1,000
LEDs 2 500 1,000
TOTAL 199,000
REFERENCES 16

1. R. Weinstein, "RFID: a technical overview and its


application to the enterprise," IT Professional, vol. 7, pp.
27 -33, May-June 2005.
2. Mark Geddes, Arduino project handbook.
3. http://www.sunrom.com/p/mifare-rfid-readerwriter-
1356mhz-rc522
4. http://www.innovex.org/store/category/1466605269-
communication-devices
5. https://www.adafruit.com/product/1512

You might also like