scholarly journals Radio frequency identification (RFID) and database- based attendance management system

2021 ◽  
Vol 14 (1) ◽  
pp. 120-129
Author(s):  
U.S. Ahmad ◽  
A.A. Bisu ◽  
F.A. Umar ◽  
U. Balarabe

Effective record and management of students and staff attendance of academic and non academic activities/events are vital for the smooth functioning of the educational system. This is still a difficult task in most institutions, particularly in Nigeria with a large number of staff and students attending different academic and non-academic functions. This is even more difficult to manage when the traditional method of paper and pen is used to record attendance, prone to errors, and in most cases lack integrity due to manual handling of the record. Electronics and Information Communications Technologies (ICT) can be deployed to help mitigate these problems and improve reliability, ease, speed, efficiency, effectiveness, and integrity of recording and managing attendance. In this work, we used Radio Frequency Identification (RFID) and database management to provide an alternative solution that addresses issues of objects (humans and non-humans) authentication, authorization, and record management with high accuracy, reliability, and integrity using RFID-Arduino technology. The system works by reading staff’s and/or student’s details stored in a unique RF tag wirelessly through theRF reader and then matched and stored the record in the system’s database. Attendancemarking was achieved by matching the scanned ID with the database record. The system was successfully implemented and tested with 10 students and staff participants with the feature of exporting the records into excel format for statistical analysis and performance evaluation.

Author(s):  
Gyozo Gódor ◽  
Sándor Imre

Radio frequency identification technology is becoming ubiquitous, and as an unfortunate side effect, more and more authentication solutions come with more security issues. In former contributions, the authors introduced a solely hash-based secure authentication algorithm that is capable of providing protection against most of the well-known attacks and performs exceptionally well even in very large systems. The authors gave a theoretical analysis of Simple Lightweight Authentication Protocol (SLAP) protocol from security and performance point of view. This chapter gives a detailed examination of small computational capacity systems from the point of view of security. The authors define the model of attacker and the well-known attacks which can be achieved in these kinds of environments. Furthermore, the chapter gives a summary of the significant RFID authentication protocols which are found in literature. The authors present several lightweight authentication protocols and some novel elliptic curve cryptography based methods. Besides, the chapter illustrates the SLAP protocol’s performance characteristics with measurements carried out in a simulation environment and compares with the theoretical results. The authors show the effects of numerous attacks and the system’s different parameters on the authentication time. Finally, the chapter examines the performance and security characteristics of two other protocols chosen from the literature in order to compare to SLAP algorithm and give proper explanation for the differences between them.


2019 ◽  
Vol 2019 ◽  
pp. 1-15
Author(s):  
Hala Abu Dhailah ◽  
Eyad Taqieddin ◽  
Abdallah Alma'aitah

Several grouping proof protocols were presented to meet the security requirements of Radio Frequency Identification Systems. Nevertheless, these protocols were shown to be vulnerable to various attacks. In this work, we cryptanalyze one of the newest grouping proof protocols. Through this analysis, we show the weaknesses of the protocol and launch a full-disclosure attack to disclose all secrets in the protocol. We show that the probability of success of the protocol is one and that increasing the length of the strings adds little complexity to the attack. We follow this by proposing an enhanced version of the protocol with better overall security. We show its efficiency by providing a security and performance analysis and comparing it with some of the existing protocols in the literature.


2014 ◽  
Vol 9 (1) ◽  
pp. 68-76 ◽  
Author(s):  
Dionne A. Noordhof ◽  
Carl Foster ◽  
Marco J.M. Hoozemans ◽  
Jos J. de Koning

A meaningful association between changes (Δ) in push-off angle or effectiveness (e) and changes in skating velocity (v) has been found during 5000-m races, although no significant association was found between changes in knee (θ0) and trunk angle (θ1) and Δv. It might be that speed skating event, sex, and performance level influence these associations.Purpose:To study the effect of skating event, sex, and performance level on the association between Δe and Δv and between Δθ0 and Δθ1 and Δv.Methods:Video recordings were made from frontal (e) and sagittal views (θ0 and θ1) during 1500- and 5000-m men’s and women’s World Cup races. Radio-frequency identification tags provided data of v.Results:Skating event influenced the association between Δe and Δv, which resulted in a significant association between Δe and Δv for the 5000-m (β = –0.069, 95% confidence interval [–0.11, –0.030]) but not for the 1500-m (β = –0.011 [–0.032, 0.010]). The association between Δθ0 and Δθ1 and Δv was not significantly influenced by skating event. Sex and performance level did not substantially affect the association between Δe and Δv and between Δθ0 and Δθ1 and Δv.Conclusions:Skating event significantly influenced the association between Δe and Δv; a 1° change in e results in a 0.011-m/s decrease in v during the 1500-m and a 0.069-m/s decrease in v during the 5000-m. Thus, it seems especially important to maintain a small e during the 5000-m.


Sign in / Sign up

Export Citation Format

Share Document