scholarly journals DESIGN AND BUILD AUTOMATIC GOODS LOCKER WITH RADIO FREQUENCY IDENTIFICATION (RFID) SECURITY

Author(s):  
Atmiasri ◽  
Hendrikardus Gensa

Locker is one of the facilities that many people use to store, and locker very useful for human right now, eiter in Gym,Mall,School and other public places. In general lockers are used to store valuables so that visitors can carry out activities more freely and also to preven theft in that place. Microcontroller based Radio Frequency Identification (RFID) security locker is a locker that uses RFID security to replace the card or key that has been used in lockers that still use a manual system. Safety in the form of RFID can make it easier for locker users with a microcontroller based to control all system inputs and outputs.

Author(s):  
Yasir Amer Abbas ◽  
Saad Albawi ◽  
Abdullah Thaier Abd ◽  
Ahmed K. Jameil

Background: Radio frequency identification (RFID) technology can be applied in identification, security and tracking system platforms due to its flexible and low-cost implementation. The sensing ability of this technology can also be used to monitor real-life environmental changes and physical phenomena. RFID is designed to work in open wireless communication. Therefore, this system can be attacked by different malware. Enhancing RFID with new security and privacy features is important at present. Objective: The current work is a systematic mapping study on RFID security. The types, contributions, facets and activities of research on RFID security were plotted. Method: The systematic mapping for a specific search area. For this purpose, we must identify the number of RQs. These RQs help researchers obtain comprehensive related studies. Researchers are responsible for determining the number and type of RQs, which must be selected depending on the research field. In addition, the RQs must be selected carefully because they determine the research direction and help rapidly obtain the required information and studies. Result: We gathered 2133 relevant studies and retained 92 primary papers after four filtering processes. We classified them into three facets. Results provide researchers and readers an overview of existing relevant studies and help them identify the properties in the focus area. Conclusion: The systematic mapping study used to report the design, execution, tool, application and results of a Radio frequency identification (RFID). We systematically choosing and deeply analyzed a all conceptance related (RFID) techniques and implementation methods which provide an complete about the (RFID) state and enviroment of studies . Firstly we collect 2133 From the initially searchbased on manual and automatic searches. We reduction to 92 papers depend on the inclusion and exclusion criteria for this review.


Sensors ◽  
2018 ◽  
Vol 18 (9) ◽  
pp. 2902 ◽  
Author(s):  
Pagán Alexander ◽  
Rania Baashirah ◽  
Abdelshakour Abuzneid

Radio frequency identification (RFID) is a technology that has grown in popularity and in the applications of use. However, there are major issues regarding security and privacy with respect to RFID technology which have caught the interest of many researchers. There are significant challenges which must be overcome to resolve RFID security and privacy issues. One reason is the constraints attached to the provision of security and privacy in RFID systems. Along with meeting the security and privacy needs of RFID technology, solutions must be inexpensive, practical, reliable, scalable, flexible, inter-organizational, and long-lasting. To make RFID identifiers effective and efficient they must identify the item(s) while resisting attacks aimed at obtaining the tag’s information and compromising the system or making it possible to bypass the protection RFID tags are supposed to provide. Different authentication methods have been proposed, researched, and evaluated in the literature. In this work, we proposed our methodology in evaluating RFID authentication, and a few of the most promising authentication methods are reviewed, compared, and ranked in order to arrive at a possible best choice of protocol to use.


2017 ◽  
Vol 23 (6) ◽  
pp. 5329-5332
Author(s):  
Muhammad Mursyidan Mah Dahwi ◽  
Waidah Ismail ◽  
Radhi Rafiee Afandi ◽  
Azlan Husin ◽  
Rosline Hassan ◽  
...  

Author(s):  
Sarah Das

Abstract: Garbage bins or dust bins are those that are put in public places in cities and are currently overflowing due to an increase in waste every day. It harms people's health by spreading deadly infections. To avoid this, smart bins will be designed with sensors such as an infrared sensor, a weight sensor, a photoelectric sensor, and radio frequency identification (RFID) card reader. If someone throws trash into the smart bins, a photoelectric sensor will identify the clear representation objects, and a weight sensor will be positioned beneath the smart bin to calculate the percentage of garbage present it will forward the information to the authorities in charge of that specific location. As a result, the relevant authorities can get messages until the bin is squished, and each bin is assigned a unique ID, which will appear on the screen of the respected officer, allowing them to take fast action. If a person is within two meters radius of the bin that contains an RFID CARD READER, the RFID reader will read all of that person's information and send a message to him about what they placed into the bin, as well as an appreciation message for using the bin. Keywords: Arduino NANO, GSM Module, Smart Dustbin, IoT, Arduino Uno.


Sign in / Sign up

Export Citation Format

Share Document