Академический Документы
Профессиональный Документы
Культура Документы
As years passed by, there have been rise in the number of applications based on
Radio Frequency Identification (RFID) systems and have been successfully used in
name a few. In this paper, an attempt is made to solve the occurring problem in most
opportunity for the professors to allocate the appropriate attendance scores and for
other purposes that can benefit both the students and the professors.
Table of contents
Chapter 1
Introduction ------------------------------------------------------------------------------- 1
Introduction -------------------------------------------------------------------------------- 2
Objectives -------------------------------------------------------------------------------- 2
Related Literature
Implementation -------------------------------------------------------------- 2
Privacy ----------------------------------------------------------------------- 2
Security ----------------------------------------------------------------------- 2
Related Studies
Implementation -------------------------------------------------------------- 2
Privacy ----------------------------------------------------------------------- 2
Security ----------------------------------------------------------------------- 2
Chapter 2
Research Design
CHAPTER 1
Advancement of technology is not new these days. Every single day there is a
new product that will come out in the world and electronics is a part of it. The rise of
these technologies from traditional method to availability of almost all information on the
Internet, caused students to be less motivated to come to the lecture rooms compared
before. Laziness of the students, being uninterested to school works, dull extra-
curricular activities and many more reasons lead students to escape lectures. A solution
to this problem, professors and administrators come up with ways to have a productive
participation from students, and to have an interactive relationship between students
and professors. Some simple ways are roll calls, surprise quizzes, extra credit in class,
etc. But these strategies are however time consuming and stressful because the lecture
time is consumed on taking students’ attendance and in some cases not accurate. The
The Laguna State Polytechnic University- Main Campus is currently using the
manual checking of students’ attendance. Normally, the attendance paper need much
time to sign by all students especially for class with a lot of student. Students also forget
to sign that attendance and they were assuming absent that class. The problem also will
happen when lecturer forget to bring the attendance paper to class. Students need to
write their name on a piece of paper and sometimes student will take change to cheat in
There come up an idea in need for a more efficient and effective method of
solving this problem. A technology that can solve this problem is the RFID technology.
RFID is a technology that collects data and ensures more accurate and timely data
entered. RFID technology is widely used nowadays to build a smart system that can be
used for effective identification, monitoring and security of data. In fact, the study of
Arulogun et al. (2013) affirms that RFID is not a new technology and consequently
constitutes system integration because of its low cost and feature advances in various
study to fully utilize the use of RFID to efficiently and effectively manage and monitor
the attendance and logging of the students. And the system has the capability of
providing printed and electronic reports of students’ attendance for specific purposes.
Introduction
uses emerging technology that eliminates the problem faced in manual attendance
The project consists of Radio Frequency Identification technology that uses radio
waves to transfer data from an RFID tag, through a reader for the purpose of uniquely
identifying a person. An RFID system consists of a tag and a reader. The RFID reader
senses its range of operation. Whenever a tag enters its field of operation, the RFID
reader transmits electromagnetic waves using antenna to communicate with the tag’s
antenna. The tag’s antenna receives data from the reader, activates tag and reflects
back the incident electromagnetic waves with RFID tag information. The transceiver in
Time is an important part of learning. Mostly professors allot their time for
teaching just to check the attendance of the students as part of the curriculum. It is
indeed necessary but it consumes the time allotted for teaching. This study presents
another easy and hassle free way of monitoring the attendance of the students.
Students will gain the sufficient knowledge they rightfully deserve. Teachers will get to
The primary purpose of an RFID system in this application area is to detect the
device, called a tag, which is read by an RFID reader and processed according to the
This will also help the teachers to maximize their time in teaching their lessons.
Objectives
The department will have a peaceful mind because they will have a device that
system.
2. To evaluate and to test the project if it is efficient and helpful in the society.
and,
5. Implement the system in Laguna State Polytechnic University – Main Campus.
Theoretical Framework
Hash Lock Scheme: This is the scheme suggested by MIT, and considers lowest
price. Each individual is considered to have the Hash function, and the procedures are
as follows. First, the RF reader transmits key K to each RFID tag, respectively, and the
RFID tag calculates the Meta ID. (Meta ID = Hash (K)) The tag transmits the request
message for ID access, and the Meta ID is transmitted as a response to that request.
The reader verifies the message, considering relevancy between the pre-allocated key
and the Meta ID, and transmits the response to the RFID tag if the verification process
is cleared. In this scheme, the authentication process is performed through just the
consent given to the transmitted data and the transmission of the ID from the reader.
The MIT scheme is restricted to the applicable scheme with competitive pricing
through the low-cost and fixed Meta ID, but the tag can be attacked when the Meta ID is
opened. Slight differences may exist, depending on the operating system and the
Randomized Hash Lock Scheme: This is the scheme suggested by MIT, and is
an expanded Lock type. This scheme assumes that the RFID tag has safe Hash
functions and a random generator, which is different from the existing scheme. Each tag
generates a random number, and generates a safe Hash value by using generated
random numbers as input values. (r and ID. C=H(ID||r)). The tag transmits C and r to
the RF reader.
The reader transmits the received data to the backward database. The database
stores received r and corresponding ID, respectively, through the Hash function. The
This scheme is difficult to track since the output information of the RFID tag is
changed in every access. However, this scheme provides tracking information on the
location of the RFID tag. Especially, if it is related with the secret information of the tag,
it cannot be satisfied with forward security. Additionally, the Hash function may be
applied to the competitive price tag, but is actually impossible in case of the pseudo-
Limitation is only to monitor the attendance of students per subject and their time
of arrival. Active RFID tags are powered by a battery that will last between 3 – 5 years,
but when the battery fails, the active tag will need to be replaced. As the active tag
market matures, replaceable batteries will be a cost saving option. Active RFID systems
typically operate in the ultra-high frequency (UHF) band and offer a range of up
to 100 m. In general, active tags are used on large objects, such as rail cars, big
reusable containers, and other assets that need to be tracked over long distances.
. The scope area of the study is the second year students of BS in Electronics
information stored on a tag attached to an object. A tag can be read from up to several
feet away and does not need to be within direct line-of-sight of the reader to be tracked.
antenna, integrated circuit, a reader that gathers information from the id tag, and a
database system that is used to store the information gained through interrogating the id
tag.
Passive tag - is an RFID tag that does not contain a battery; the power is supplied by
the reader. When radio waves from the reader are encountered by a passive rfid tag,
the coiled antenna within the tag forms a magnetic field. The tag draws power from it,
Active tag - Active tags in addition to the circuit and antenna have a battery that powers
the circuit and allows the tag to broadcast information that will be picked up by a reader.
protected.
System - a set of connected things or parts forming a complex whole, in particular. A set
or method.
Related Literature
Implementation
(https://en.wikipedia.org/wiki/Implementation)
The act of implementing, or putting into effect; fulfillment.
(http://www.dictionary.com/browse/implementation)
Privacy
Security
protected. (https://www.vocabulary.com/dictionary/security)
Related Studies
been around since the early 1900’s and was utilized during the World War II
attributed as having created the first RFID device in 1946 (Scanlon, 2003).
developed in the U.S in the 1920s (Scanlon, 2003). Scholars noted the relationship
technology has been used to raise efficiency in transport, business and theft-monitoring
systems.
gathers information from the id tag, and a database system that is used to store the
Passive and active RFID has since found many applications, tracking livestock,
pets, vehicles, pharmaceuticals and employees (Taylor, Rooney 2016). Active tags in
addition to the circuit and antenna have a battery that powers the circuit and allows the
tag to broadcast information that will be picked up by a reader (Roberts 2006). Passive
tags collect and store power from the reader through the use of a capacitor located
within the circuit. The circuit then utilizes the energy collected to transmit tag information
to the reader (Weinstein 2005). Low cost passive tags are the predominantly used form
of identification tag.
Implementation
many countries including England and the Philippines. As with the use of CCTV in
schools, a key objective of tracking school children with RFID is presumed to be
Schools in the Philippines use RFID tags embedded in school passes for
borrowing books from the library, purchasing items from the canteen and to monitor
RFID was also used in automated toll booth payment services. Instead of
manually paying for a toll, the commuters can now drive straight through the toll booth
without conducting a financial transaction. This is facilitated by RFID through the use of
tags that are located inside vehicles and receivers located in toll booth, so when the
vehicles drive through the toll booth the toll payment is automatically deducted from the
person’s account.
for years been implanted in animals to track livestock, locate missing pets and study
Privacy
Due to the invasive nature of RFID tags many privacy issues and concerns exist.
The main privacy concerns with RFID are tracking of the personal information of the
The same with tracking of livestock or vehicles, the tracking of people through
the use of RFID technologies is a real threat to the privacy of individuals. RFID tags are
now designed to be small, enough to be embedded under the skin of humans, or
slipped into their clothing without the individual realizing. Glasser et. al stated that “RFID
chips intended to track humans come in two main forms: sub-dermal implants which are
The use of RFID in identification cards is not a fresh idea. Many governments
around the world have begun implementing RFID technologies into drivers’ licenses,
passports and even citizenship cards. Glasser et. al discuss this as a major privacy
concern, “since drivers’ licenses are nearly always carried by individual, there exists a
threat that anyone could be tracked anonymously.” With governments adopting RFID in
official documentation, most of the citizens are powerless to protect their own personal
Due to advancement in technology, RFID can also be carried out through the
goods that people have purchased. Peslak stated that, “the privacy concerns of
decommissioning protocols into the RFID tags. Many methods have been proposed,
one of this involves “a deactivation or kill switch for RFID tags once items enter the retail
field”. Another option is the inclusion of an “on-off switch that could allow benefits if the
consumer wishes but could but eliminated for those who do not want to use the
benefits”.
However, there are some organizations that believe RFID tags present no more
of a threat to privacy than cellphones, toll tags, credit cards, ATM machines, and access
control badges.
Security
repudiation by the sender, and availability (Ranasinghe, Engels et al. 2004). However,
this study will discuss security based upon the following criteria – vulnerabilities,
pertaining to vulnerabilities and making sure that confidential data remains secure. In
the article The Evolution of RFID Security, Melanie Rieback, Bruno Crispo, and Andrew
the-middle attack, denial-of service attack, and spoofing (Rieback, Crispo et al. 2006).
Security concerns for RFID are similar in nature to those posed for computer
networks. Similar to the TCP/IP networking model used for computer networks, the
RFID communication model consists of the following layers for both the RFID reader
and RFID tag; Application Layer, Data Link Layer, and the Physical Layer (Knospe and
Pohl 2004). The RFID model just like the TCP/IP model uses protocols to negotiate the
transfer of data from the identification tag to the reader. Even though a single round
protocol such as the Weise, Sarma, Rivest, and Engels uses a lock calculation, it is still
middle attack.
However, the model purposed in the paper Security and Privacy Analysis of
protocol, is not vulnerable to a man-in-the-middle attack (Kim and Choi 2007). The RFID
Martin Feldhofer developed the Simple Authentication and Security Layer protocol
(Feldhofer 2004).
RFID tags experience. However, with the low cost of passive RFID tags being utilized,
it is difficult to develop an algorithm that can fit the storage capacity (Robshaw 2006).
Leonid Bolotnyy and Gabriel Robins, in their paper Physically Unclonable Function-
Based Security and Privacy in RFID Systems, they discussed the use of a PUF based
Chapter 2
METHODOLOGY
Research Design
The developmental method of research was used on this study to determine the
Figure 1
silicon chip plus an antenna collectively called a tag. The tag can be mobile or
individually identified by the reader. In each scanning case, a reader must scan the tag
for the data it contains and then send that information to a database, which interprets
the data stored on the tag. The tag, reader, and database are the key components of an
RFID system offer many advantages to this design application because electronic tags
the electronic tag can be read during motion; no batteries are needed; no line of sight
required for wireless communication between the tag and the reader. Tags are almost
indestructible, can be read even if covered with dirt or submerged and tags have