scholarly journals PERANCANGAN SISTEM SMARTCARD SEBAGAI PENGAMAN PINTU MENGGUNAKAN RFID BERBASIS ARDUINO

CCIT Journal ◽  
2017 ◽  
Vol 10 (2) ◽  
pp. 239-254
Author(s):  
Ferry Sudarto ◽  
Gustasari Gustasari ◽  
Arwan Arwan

Along with the development of science and technology so rapidly trigger the emergence of new technologies, one of which is RFID. RFID (Radio Frequency Identification) is a process of identifying the object or objects using radio transmission frequency. RFID is a new technology, and will continue to evolve in line with advances in integrated circuit technology, it can be ascertained that the RFID tag can be applied in various fields. RFID systems offer increased efficiency in controlling inventory control in the identification of objects. RFID can be used to store and receive data remotely using a device that RFID TAG (transponder). Many applications can utilize RFID systems, for example for indoor security systems, highways, libraries, class attendance, even as the identity of the student / students. Therefore, in this researchRaharja College presenting a Smartcard System Design using RFID as a device interface and ARDUINO UNO as a controller to be used as a door security system. With the presence of this system is expected to be a useful new innovation in Raharja College and can improve the shortcomings of existing systems and can provide maximum service to the whole personal raharja.

2013 ◽  
pp. 1667-1681 ◽  
Author(s):  
Morshed U. Chowdhury ◽  
Biplob R. Ray

Remote technologies are changing our way of life. The radio frequency identification (RFID) system is a new technology which uses the open air to transmit information. This information transmission needs to be protected to provide user safety and privacy. Business will look for a system that has fraud resilience to prevent the misuse of information to take dishonest advantage. The business and the user need to be assured that the transmitted information has no content which is capable of undertaking malicious activities. Public awareness of RFID security will help users and organizations to understand the need for security protection. Publishing a security guideline from the regulating body and monitoring implementation of that guideline in RFID systems will ensure that businesses and users are protected. This chapter explains the importance of security in a RFID system and will outline the protective measures. It also points out the research direction of RFID systems.


Author(s):  
Morshed U. Chowdhury ◽  
Biplob R. Ray

Remote technologies are changing our way of life. The radio frequency identification (RFID) system is a new technology which uses the open air to transmit information. This information transmission needs to be protected to provide user safety and privacy. Business will look for a system that has fraud resilience to prevent the misuse of information to take dishonest advantage. The business and the user need to be assured that the transmitted information has no content which is capable of undertaking malicious activities. Public awareness of RFID security will help users and organizations to understand the need for security protection. Publishing a security guideline from the regulating body and monitoring implementation of that guideline in RFID systems will ensure that businesses and users are protected. This chapter explains the importance of security in a RFID system and will outline the protective measures. It also points out the research direction of RFID systems.


This study represents a device to identify the location of an Autism Spectrum Disorder(ASD) child using an Radio Frequency Identification (RFID). This is a wearable device, that is to be worn by the autism child, which allows the parent to track the child anytime, anywhere .The RFID technology is implied for the location tracking, The RFID Tag is affixed on the device, the reader which is supposed to sense the RFID tag is placed at the spots such as classroom etc. The reader when it senses the tag notifies the parent through a message. When an RFID tag passes through the electromagnetic zone, it detects the activation signal produced by the reader. The encoded data present in the integrated circuit of the tag is being encoded by the reader and the data is delivered to the host computer for processing. The location can be sent to parent in the form of a normal text message via GSM. Autism children deserve to acquire knowledge and explore the environment. To overcome the obstruction this device will be of immense help.


Author(s):  
V. Alarcon-Aquino ◽  
M. Dominguez-Jimenez ◽  
C. Ohms

RFID (Radio Frequency Identification) is a technology whose employment will certainly grow in the following years. It is therefore necessary to consider the security issues that come out from the implementation of that type of systems. In this paper we present an approach to solve the security problems in RFID systems by designing a naive security layer based on authentication and encryption algorithms. The authentication mechanism is the mutual authentication based on a three-way handshaking model, which authenticates both the reader and the tag in the communication protocol. The cipher algorithm based on a symmetric-key cryptosystem is RC4 implemented in a proposed modification to the existing WEP protocol to make it more secure in terms of message privacy. The proposed approach is implemented using VHDL in FPGAs communicated through RF transceivers. The results show that the security layer is simple enough to be implemented in a low-price RFID tag.


Micromachines ◽  
2021 ◽  
Vol 12 (4) ◽  
pp. 420
Author(s):  
Saikat Mondal ◽  
Deepak Kumar ◽  
Premjeet Chahal

Harmonic Radio Frequency Identification (RFID) systems have attracted significant interest over the last decade as it provides many benefits over the conventional RFID systems. Harmonic RFID is desired over conventional RFID systems due to reduced self-jamming, location accuracy from dual frequency, and higher phase noise immunity. In a harmonic RFID system, the tag receives instructions from the reader at an RF carrier frequency and replies back at the harmonic of the RF frequency. A nonlinear element consuming very low power at the tag is required to generate the harmonic carrier for the battery-less system. In this review article, a detailed contrast between conventional and harmonic RFID systems is presented. This is followed by different circuit design techniques to generate harmonics and integration techniques to form a fully operable passive harmonic RFID tag. Also, a wide range of applications, especially sensor integration with harmonic RFID’s, along with the future trends are presented.


2019 ◽  
Vol 9 (24) ◽  
pp. 5520
Author(s):  
Seongil Lee ◽  
Kyohyun Song ◽  
Sangmin Kim

We designed a haptic authentication system with a personal identification (ID) tag equipped with an embedded acceleration sensor and a radio frequency identification (RFID) tag that can be used in automated security systems. In the suggested system, users generate a passcode by haptic manipulation of an ID tag instead of typing in passwords using a keypad. An ID tag may be an ideal personalized gadget for ID authentication in many circumstances. The core of the proposed haptic authentication system is the activity-recognizable process that can be manipulated by the probabilistic model we developed and generate a much more secure passcode for authentication. With the system learning a total of 250 trials by 50 users for each haptic gesture, the average successful classification rate for the four-digit haptic passcode authentication was 88.9% using the probabilistic model we developed. Some haptic gestures, such as vertical upward flipping of the ID tag, showed lower accuracy than others due to the difficulty in haptic manipulation of the ID tag. From a copying attack experiment to examine the reliability of our haptic passcode scheme, it was proved that the haptic gestures with enough digits, apparently at least 6, were difficult enough to resist being copied by attackers. The same authentication scheme can also be applied for other personal devices that can be manipulated by hands for making haptic gestures, such as a mobile phone.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Ran Sun ◽  
Budi Rahmadya ◽  
Fangyuan Kong ◽  
Shigeki Takeda

AbstractThis paper proposes a visual management scheme of medical things with a color-change radio frequency identification (RFID) tag. The color-change RFID tag employs a specific RFID tag integrated circuit (IC) and a laminated pH-indicating paper. The IC has energy harvesting and switched ground functions, which enable it to generate electricity to the laminated pH-indicating paper. This phenomenon causes electrolysis of NaCl solution absorbed in the laminated pH-indicating paper. Electrolysis generates alkaline matter to change the color of the pH-indicating paper. This paper gives a new and sensitive structure of the laminated pH-indicating paper. The proposed advanced color-change RFID tag with new laminated pH-indicating paper succeeds in changing its color noticeably at a 1 m distance using an RFID reader radiating 1 W radio waves. The color change was observed 3–5 s after starting radio wave irradiation. The results of this experiment also confirm that the changed color can be held for over 24 h. Furthermore, two demonstrations of the visual management system of medical things (patient clothes and sanitizers) are presented.


Author(s):  
Stephanie Etter ◽  
Patricia G. Phillips ◽  
Ashli M. Molinero ◽  
Susan J. Nestor ◽  
Keith LeDonne

Radio frequency identification (RFID) is a generic term that is used to describe a system that transmits the identity of an object or person wirelessly using radio waves (RFID Journal, 2005). It falls under the broad category of automatic identification technologies. RFID tags, in the simplest of terms, are “intelligent chips that can be embedded in or attached to a product to transmit descriptive data” (Gelinas, Sutton, & Fedorowicz, 2004, p. 6). According to the online RFID Journal (2005), there are several methods of identifying objects using RFID, including the most common of storing a serial number that identifies a product on a microchip that is attached to an RFID tag. RFID is not a new technology, but it has only recently been in the spotlight as more businesses are receiving press for putting the technology to work in their supply chains. RFID tag technology is sometimes associated with the term electronic product code (EPC). An EPC uniquely identifies objects in a supply chain. According to EPCGlobal, “EPC is divided into numbers that identify the manufacturer and product type. The EPC uses an extra set of digits, a serial number, to identify unique items.” The EPC number is placed on a tag composed of a silicon chip and an antenna, which is then attached to an item. Using RFID, a tag communicates its numberto a reader (EPCGlobal, 2005). In broad terms, RFID tags are placed into one of two categories: active or passive. According to the Association for Automatic Identification and Mobility (AIM, 2005), active RFID tags are powered by an internal battery and are typically designated as read-write tags. When a tag has read-write capabilities, the tag data can be modified. Passive tags, according to AIM, operate without a power source and obtain operating power from the tag reader. Passive tags are typically read-only tags, having only read-only memory. Active tags generally have a longer read range than passive tags.


Author(s):  
Stephanie Etter ◽  
Patricia G. Phillips ◽  
Ashli M. Molinero

Radio frequency identification (RFID) is a generic term that is used to describe a system that transmits the identity of an object or person wirelessly using radio waves (RFID Journal, 2005). It falls under the broad category of automatic identification technologies. RFID tags, in the simplest of terms, are “intelligent chips that can be embedded in or attached to a product to transmit descriptive data” (Gelinas, Sutton, & Fedorowicz, 2004, p. 6). According to the online RFID Journal (2005), there are several methods of identifying objects using RFID, including the most common of storing a serial number that identifies a product on a microchip that is attached to an RFID tag. RFID is not a new technology, but it has only recently been in the spotlight as more businesses are receiving press for putting the technology to work in their supply chains.


2019 ◽  
Vol 9 (3) ◽  
pp. 21-29
Author(s):  
Md. Mostafizur Rahman

The purpose of the study is to evaluate the effectiveness of Radio Frequency Identification (RFID) technology in library management system and services in Bangladesh. This study followed survey and interview methods of data collection through a structured questionnaire. The population of study was all nine libraries in Bangladesh where RFID technology has been installed. The study reveals that all nine libraries are using RFID technology, namely, anti-theft detection Electronic Article Surveillance (EAS) gate, staff-work station and RFID tag. In addition to these, some of them are using kiosk, converter, level printer, book drop station, digital library assistance (DLA) and RFID smart card for entrance. The significance numbers of library users employ the RFID system and services and it is increasing gradually, but some of the RFID machines like level printer, book drop station and DLA are under-utilized because of lack of trained staff, patron’s doubt on new technology and less demand on using them in house-keeping library operation.


Sign in / Sign up

Export Citation Format

Share Document