scholarly journals Security system with RFID control using E-KTP and internet of things

Author(s):  
Andi Ainun Najib ◽  
Rendy Munadi ◽  
Nyoman Bogi Aditya Karna

Crimes against property without using violence, in this case, are theft and burglary is the type of crime that is most common every year. However, home security needs a security system that is more efficient and practical. To overcome this, an internet of things (IoT) is needed. This research evaluated the performance prototype by reading distance from the radio frequency identification (RFID) reader using E-KTP and quality of service performance (i.e throughput and delay) from application android. This research design smart door lock using RFID sensor, passive infrared sensor (PIR), solenoid as door locks, buzzer, led, E-KTP as RFID tags and also android application to controlling and monitoring made with android studio is connected to NodeMCU V3 ESP8266 as storage data and connect with firebase realtime database instead of conventional keys. This research focuses on performance prototype and quality of service from features application is work well. Related to previous works, our evaluation shows that the performance prototype can read identity card (E-KTP) with a maximum distance is 4 cm, and performance quality of service for an application show that throughput and delay with a perfect index according to standardization telecommunications and internet protocol harmonization over network (TIPHON) depending on what features are being evaluated.

Author(s):  
Amber A. Smith-Ditizio ◽  
Alan D. Smith

One of the most compelling cases for RFID-embedded technologies in the healthcare field has been made by documenting increased efficiency in supply chain performance measurements, which generally consist of financial and non-financial indicators. The following chapter suggests that patient flows and safety are key measures of hospital operation efficiency. Process bottlenecks in hospitals can delay discharge times, and lead to higher costs and lower quality of service, which in turn affects the overall performance and business of the hospital. Hospitals have struggled to control costs, and RFID-embedded technologies should allow management to prioritize their technology spending and reduce total cost of suppliers and operational expenses.


2022 ◽  
Vol 1 (4) ◽  
pp. 841-846
Author(s):  
Rafif Muhammad Irdian ◽  
Rafi Fredy Septianto ◽  
Aksen Winarto

Along with the increasing crime rate of data theft that occurs, it takes a good room security system to maintain data security for a particular agency or organization. Something A good security system is a security system that can be monitored and controlled remotely using the internet or better known as IoT (Internet of Things). In this thesis will designed an IoT-based room security system using the Android application, this system works using several modules including RFID (Radio Frequency Identification) module, camera module and door lock solenoid. The RFID card in this RFID Module functions as an identification process for people who want to enter into the room. In addition, this RFID module also functions as a trigger for the camera to work to take pictures a picture of the person who wants to enter the room. The data obtained from the two modules later will be sent into the Android application. The admin of the room can carry out the verification process to allow or deny people who want to enter the room. The results of testing this system can be runs well when the internet speed of the access point is fast and stable, but less optimal when the internet speed of the access point is running slowly.


Author(s):  
Nizirwan Anwar ◽  
Arief Kusuma Among Praja ◽  
Habibullah Akbar ◽  
M. Fachruddin Arrozi Adhikara ◽  
Roesfiansjah Rasjidin ◽  
...  

2018 ◽  
Vol 27 (12) ◽  
pp. 1830007 ◽  
Author(s):  
S. P. Raja ◽  
T. Dhiliphan Rajkumar ◽  
Vivek Pandiya Raj

Internet of Things (IoT) can be defined as a thing or device, physical and virtual, connected and communicating together, and integrated to a network for a specific purpose. The IoT uses technologies and devices such as sensors, radio-frequency identification (RFID) and actuators to collect data. IoT is not only about collecting data generated from sensors, but also about analyzing it. IoT applications must, of necessity, keep out all attackers and intruders so as to thwart attacks. IoT must allow for information to be shared, with every assurance of confidentiality, and is about a connected environment where people and things interact to enhance the quality of life. IoT infrastructure must be an open source, without ownership, meaning that anyone can develop, deploy and use it. The objective of this paper is to discuss the various challenges, issues and applications confronting the Internet of Things.


Author(s):  
Amber A. Smith-Ditizio ◽  
Alan D. Smith

One of the most compelling cases for RFID-embedded technologies in the healthcare field has been made by documenting increased efficiency in supply chain performance measurements, which generally consist of financial and non-financial indicators. The chapter suggests that patient flows and safety are key measures of hospital operation efficiency. Process bottlenecks in hospitals can delay discharge times and lead to higher costs and lower quality of service, which in turn affects the overall performance and business of the hospital. Hospitals have struggled to control costs, and RFID-embedded technologies should allow management to prioritize their technology spending and reduce total cost of suppliers and operational expenses.


2021 ◽  
Vol 3 (2) ◽  
pp. 93
Author(s):  
Mohammad Adrian Faisal ◽  
Erwin Sitompul

A door, as a barrier to limit an access between two spaces, requires a security measure to ensure that only privileged people may pass. In this paper, a door security system using Radio Frequency Identification (RFID) and Passive Infrared (PIR) sensor is proposed. This security system utilizes an electric door lock and an e-KTP (Kartu Tanda Penduduk elektronik/ electronic Indonesian Identity Card) as the key. A sequence of numbers can be read from an e KTP by using an RFID reader. This sequence is unique, making an e-KTP suitable to be used as a key. Furthermore, the door security system is equipped with an alarm. A PIR is used to detect motion, and the alarm will sound if someone passes the door while the alarm is still in active state. The Arduino Mega microcontroller board is used to organize the whole system, consisting the aforementioned reader and sensor, along with two push-buttons, a buzzer, and a solenoid door lock. The system is realized into a prototype in the form of door miniature. A list of scenarios is played through to the system. Only authorized e-KTPs can be used to unlock the door and deactivate the alarm. The door security system successfully fulfils the objective to improve the security level of a door lock mechanism by utilizing an e-KTP as a unique RFID key and by featuring a PIR-integrated alarm.


Author(s):  
Jordan Frith

The phrase the Internet of things was originally coined in a 1999 presentation about attaching radio frequency identification (RFID) tags to individual objects. These tags would make the objects machine-readable, uniquely identifiable, and, most importantly, wirelessly communicative with infrastructure. This chapter evaluates RFID as a piece of mobile communicative infrastructure, and it examines two emerging forms: near-field communication (NFC) and Bluetooth low-energy beacons. The chapter shows how NFC and Bluetooth low-energy beacons may soon move some types of RFID to smartphones, in this way evolving the use of RFID in payment and transportation and enabling new practices of post-purchasing behaviors.


Sign in / Sign up

Export Citation Format

Share Document