Вы находитесь на странице: 1из 18

Abstract

As years passed by, there have been rise in the number of applications based on

Radio Frequency Identification (RFID) systems and have been successfully used in

different areas like transportation, health-care, agriculture, and hospitality industry to

name a few. In this paper, an attempt is made to solve the occurring problem in most

universities when it comes to lecture attendance. Attendance plays a vital role in

evaluating a student. The traditional method of taking attendance manually is time

consuming and often leads to error.

The used of RFID to student attendance monitoring as improved in this study is

capable of eliminating wasted time during manual checking of attendance and an

opportunity for the professors to allocate the appropriate attendance scores and for

other purposes that can benefit both the students and the professors.

Table of contents

Title Page ----------------------------------------------------------------------------------------- i


Approval Sheet -------------------------------------------------------------------------------- ii

Abstract ----------------------------------------------------------------------------------------- iii

Table of Contents -------------------------------------------------------------------------------- iv

Chapter 1

Introduction ------------------------------------------------------------------------------- 1

Background of the study -------------------------------------------------------------- 2

Introduction -------------------------------------------------------------------------------- 2

Significance of the study -------------------------------------------------------------- 3

Objectives -------------------------------------------------------------------------------- 2

Theoretical Framework -------------------------------------------------------------- 2

Scope and Limitations -------------------------------------------------------------- 2

Definition of Terms ----------------------------------------------------------------------- 1

Related Literature

RFID Technology -------------------------------------------------------------- 2

Implementation -------------------------------------------------------------- 2

Privacy ----------------------------------------------------------------------- 2

Security ----------------------------------------------------------------------- 2
Related Studies

RFID Technology -------------------------------------------------------------- 2

Implementation -------------------------------------------------------------- 2

Privacy ----------------------------------------------------------------------- 2

Security ----------------------------------------------------------------------- 2

Chapter 2

Research Design

Definition of Developmental Research ----------------------------------- 2

Subject of the Study ----------------------------------------------------- 2

CHAPTER 1

Background of the Study

Advancement of technology is not new these days. Every single day there is a

new product that will come out in the world and electronics is a part of it. The rise of

these technologies from traditional method to availability of almost all information on the

Internet, caused students to be less motivated to come to the lecture rooms compared

before. Laziness of the students, being uninterested to school works, dull extra-

curricular activities and many more reasons lead students to escape lectures. A solution

to this problem, professors and administrators come up with ways to have a productive
participation from students, and to have an interactive relationship between students

and professors. Some simple ways are roll calls, surprise quizzes, extra credit in class,

etc. But these strategies are however time consuming and stressful because the lecture

time is consumed on taking students’ attendance and in some cases not accurate. The

attendances are recorded manually by the professors.

The Laguna State Polytechnic University- Main Campus is currently using the

manual checking of students’ attendance. Normally, the attendance paper need much

time to sign by all students especially for class with a lot of student. Students also forget

to sign that attendance and they were assuming absent that class. The problem also will

happen when lecturer forget to bring the attendance paper to class. Students need to

write their name on a piece of paper and sometimes student will take change to cheat in

process getting the attendance.

There come up an idea in need for a more efficient and effective method of

solving this problem. A technology that can solve this problem is the RFID technology.

RFID is a technology that collects data and ensures more accurate and timely data

entered. RFID technology is widely used nowadays to build a smart system that can be

used for effective identification, monitoring and security of data. In fact, the study of

Arulogun et al. (2013) affirms that RFID is not a new technology and consequently

constitutes system integration because of its low cost and feature advances in various

computing fields that open up other application assimilation.

By careful considerations of the above problems, the researcher conducted this

study to fully utilize the use of RFID to efficiently and effectively manage and monitor
the attendance and logging of the students. And the system has the capability of

providing printed and electronic reports of students’ attendance for specific purposes.

Introduction

The researchers want to develop a RFID based Attendance Monitoring system

uses emerging technology that eliminates the problem faced in manual attendance

entry and will prove to be more reliable and accurate.

The project consists of Radio Frequency Identification technology that uses radio

waves to transfer data from an RFID tag, through a reader for the purpose of uniquely

identifying a person. An RFID system consists of a tag and a reader. The RFID reader

consists of an antenna and transceiver. The reader is usually on and continuously

senses its range of operation. Whenever a tag enters its field of operation, the RFID

reader transmits electromagnetic waves using antenna to communicate with the tag’s

antenna. The tag’s antenna receives data from the reader, activates tag and reflects

back the incident electromagnetic waves with RFID tag information. The transceiver in

the reader receives data and passes them on to the controllers.

Significance of the study

Time is an important part of learning. Mostly professors allot their time for

teaching just to check the attendance of the students as part of the curriculum. It is

indeed necessary but it consumes the time allotted for teaching. This study presents

another easy and hassle free way of monitoring the attendance of the students.
Students will gain the sufficient knowledge they rightfully deserve. Teachers will get to

maximize their time for passing knowledge to students.

The primary purpose of an RFID system in this application area is to detect the

presence and absence of the student data to be transmitted wirelessly by mobile

device, called a tag, which is read by an RFID reader and processed according to the

programmed instructions on the personal computer (PC).

This will also help the teachers to maximize their time in teaching their lessons.

And not to waste their in checking the attendance in their class.

Objectives

Generally, this aimed to develop and design an attendance monitoring device

that helps the faculties in monitoring the attendance without a difficulty.

The department will have a peaceful mind because they will have a device that

will be helpful for the most beneficiaries.

1. To analyze a specific uses and benefits of RFID based Attendance Monitoring

system.

2. To evaluate and to test the project if it is efficient and helpful in the society.

3. Efficiently manage and monitor student attendance

4. Provide database generated printed reports and electronic files of attendance;

and,
5. Implement the system in Laguna State Polytechnic University – Main Campus.

Theoretical Framework

Hash Lock Scheme: This is the scheme suggested by MIT, and considers lowest

price. Each individual is considered to have the Hash function, and the procedures are

as follows. First, the RF reader transmits key K to each RFID tag, respectively, and the

RFID tag calculates the Meta ID. (Meta ID = Hash (K)) The tag transmits the request

message for ID access, and the Meta ID is transmitted as a response to that request.

The reader verifies the message, considering relevancy between the pre-allocated key

and the Meta ID, and transmits the response to the RFID tag if the verification process

is cleared. In this scheme, the authentication process is performed through just the

consent given to the transmitted data and the transmission of the ID from the reader.

The MIT scheme is restricted to the applicable scheme with competitive pricing

through the low-cost and fixed Meta ID, but the tag can be attacked when the Meta ID is

opened. Slight differences may exist, depending on the operating system and the

requirements, though the Meta ID should not be fixed.

Randomized Hash Lock Scheme: This is the scheme suggested by MIT, and is

an expanded Lock type. This scheme assumes that the RFID tag has safe Hash

functions and a random generator, which is different from the existing scheme. Each tag

generates a random number, and generates a safe Hash value by using generated

random numbers as input values. (r and ID. C=H(ID||r)). The tag transmits C and r to

the RF reader.
The reader transmits the received data to the backward database. The database

stores received r and corresponding ID, respectively, through the Hash function. The

database verifies the C and the ID through relevancy.

This scheme is difficult to track since the output information of the RFID tag is

changed in every access. However, this scheme provides tracking information on the

location of the RFID tag. Especially, if it is related with the secret information of the tag,

it cannot be satisfied with forward security. Additionally, the Hash function may be

applied to the competitive price tag, but is actually impossible in case of the pseudo-

random number generator.

Scope and Limitations

Limitation is only to monitor the attendance of students per subject and their time

of arrival. Active RFID tags are powered by a battery that will last between 3 – 5 years,

but when the battery fails, the active tag will need to be replaced. As the active tag

market matures, replaceable batteries will be a cost saving option. Active RFID systems

typically operate in the ultra-high frequency (UHF) band and offer a range of up

to 100 m. In general, active tags are used on large objects, such as rail cars, big

reusable containers, and other assets that need to be tracked over long distances.

. The scope area of the study is the second year students of BS in Electronics

Engineering in Laguna State Polytechnic University, Sta.Cruz Main Campus.


Definition of Terms

Radio-Frequency Identification - (RFID) is the use of radio waves to read and capture

information stored on a tag attached to an object. A tag can be read from up to several

feet away and does not need to be within direct line-of-sight of the reader to be tracked.

ID tags - it contains electronically stored information. The ID tag, is composed of an

antenna, integrated circuit, a reader that gathers information from the id tag, and a

database system that is used to store the information gained through interrogating the id

tag.

Passive tag - is an RFID tag that does not contain a battery; the power is supplied by

the reader. When radio waves from the reader are encountered by a passive rfid tag,

the coiled antenna within the tag forms a magnetic field. The tag draws power from it,

energizing the circuits in the tag.

Active tag - Active tags in addition to the circuit and antenna have a battery that powers

the circuit and allows the tag to broadcast information that will be picked up by a reader.

Privacy - The quality or state of being apart from company or observation.

Freedom from unauthorized intrusion.

Implementation - Implementation is the realization of an application, or execution of

a plan, idea, model, design, specification, standard, algorithm, or policy.

Security - Security means safety, as well as the measures taken to be safe or

protected. 

Student - denoting someone who is studying in order to enter a particular profession.


Monitoring - observe and check the progress or quality of (something) over a period of

time; keep under systematic review.

System - a set of connected things or parts forming a complex whole, in particular. A set

of principles or procedures according to which something is done; an organized scheme

or method.

Attendance - the action or state of going regularly to or being present at a place or

event. The number of people present at a particular event, function, or meeting.

Attendance Monitoring System - It tracks students' attendance and progress. They can

request students' progress reports or transcripts. Attendance Monitoring System for

Employee. It keeps records in order and is frequently updated.

REVIEW OF RELATED LITERATURE AND STUDIES

Related Literature

RFID Technology Development

RFID (radio frequency identification) is a technology that incorporates the use of

electromagnetic or electrostatic coupling in the radio frequency (RF) portion of the

electromagnetic spectrum to uniquely identify an object, animal, or person.

Implementation

Implementation is the realization of an application, or execution of a plan, idea,

model, design, specification, standard, algorithm, or policy.

(https://en.wikipedia.org/wiki/Implementation)
The act of implementing, or putting into effect; fulfillment.

(http://www.dictionary.com/browse/implementation)

Privacy

The quality or state of being apart from company or observation. Freedom

from unauthorized intrusion. (http://www.merriam-webster.com/dictionary/privacy)

Security

Security means safety, as well as the measures taken to be safe or

protected. (https://www.vocabulary.com/dictionary/security)

Related Studies

RFID Technology Development

RFID (Radio-Frequency Identification) is a developing technology that uses

several basic components in order to satisfy the needs of the implementing

organizations. Radio frequency identification (RFID) is not a new technology. It has

been around since the early 1900’s and was utilized during the World War II

(Domdouzis, Kumar et al. 2007). Russian physicist Leon Theremin is commonly

attributed as having created the first RFID device in 1946 (Scanlon, 2003).

RFID is a combination of radar and radio broadcast technology. Radar was

developed in the U.S in the 1920s (Scanlon, 2003). Scholars noted the relationship

between electricity and magnetism, which is a foundation of radio broadcasting, at the

beginning of the nineteenth century (Romagnosi, 2009). Harry Stockman wrote a


seminal paper in 1948, identifying the vast amount of research and development still

needed before “reflected-power communications” could be used in applications.

Interest in implementing RFID in libraries is on the rise (Dorman, 2003). RFID

technology has been used to raise efficiency in transport, business and theft-monitoring

systems.

Radio frequency identification is a technology that uses a few simple

components. The ID tag, is composed of an antenna, integrated circuit, a reader that

gathers information from the id tag, and a database system that is used to store the

information gained through interrogating the id tag (Roberts 2006).

Passive and active RFID has since found many applications, tracking livestock,

pets, vehicles, pharmaceuticals and employees (Taylor, Rooney 2016). Active tags in

addition to the circuit and antenna have a battery that powers the circuit and allows the

tag to broadcast information that will be picked up by a reader (Roberts 2006). Passive

tags collect and store power from the reader through the use of a capacitor located

within the circuit. The circuit then utilizes the energy collected to transmit tag information

to the reader (Weinstein 2005). Low cost passive tags are the predominantly used form

of identification tag.

Implementation

Organizations have implemented RFID to make improvements in their materials

management, distribution, and transportation processes. It has been trialed in schools in

many countries including England and the Philippines. As with the use of CCTV in
schools, a key objective of tracking school children with RFID is presumed to be

safeguarding children from harm.

Schools in the Philippines use RFID tags embedded in school passes for

borrowing books from the library, purchasing items from the canteen and to monitor

attendance and track pupils around campus (Taylor, Rooney 2016).

RFID was also used in automated toll booth payment services. Instead of

manually paying for a toll, the commuters can now drive straight through the toll booth

without conducting a financial transaction. This is facilitated by RFID through the use of

tags that are located inside vehicles and receivers located in toll booth, so when the

vehicles drive through the toll booth the toll payment is automatically deducted from the

person’s account.

Livestock tracking is another important implementation of RFID. RFID chips have

for years been implanted in animals to track livestock, locate missing pets and study

wildlife behavior (Ibid).

Privacy

Due to the invasive nature of RFID tags many privacy issues and concerns exist.

The main privacy concerns with RFID are tracking of the personal information of the

user and their habits.

The same with tracking of livestock or vehicles, the tracking of people through

the use of RFID technologies is a real threat to the privacy of individuals. RFID tags are
now designed to be small, enough to be embedded under the skin of humans, or

slipped into their clothing without the individual realizing. Glasser et. al stated that “RFID

chips intended to track humans come in two main forms: sub-dermal implants which are

injected and external tags which are worn or carried.”

The use of RFID in identification cards is not a fresh idea. Many governments

around the world have begun implementing RFID technologies into drivers’ licenses,

passports and even citizenship cards. Glasser et. al discuss this as a major privacy

concern, “since drivers’ licenses are nearly always carried by individual, there exists a

threat that anyone could be tracked anonymously.” With governments adopting RFID in

official documentation, most of the citizens are powerless to protect their own personal

details and privacy from being transmitted.

Due to advancement in technology, RFID can also be carried out through the

goods that people have purchased. Peslak stated that, “the privacy concerns of

electronic commerce include collection of information without user’s knowledge, sales of

collected personal information, and receipt of unsolicited information, as in spamming.

One solution for this privacy issue could be adopted by implementing

decommissioning protocols into the RFID tags. Many methods have been proposed,

one of this involves “a deactivation or kill switch for RFID tags once items enter the retail

field”. Another option is the inclusion of an “on-off switch that could allow benefits if the

consumer wishes but could but eliminated for those who do not want to use the

benefits”.
However, there are some organizations that believe RFID tags present no more

of a threat to privacy than cellphones, toll tags, credit cards, ATM machines, and access

control badges.

Security

Radio frequency identification security as defined by Ranasinghe, Engels, and

Cole is composed of the following components; confidentiality or message content

security, integrity of message content, authentication of sender and recipient non-

repudiation by the sender, and availability (Ranasinghe, Engels et al. 2004). However,

this study will discuss security based upon the following criteria – vulnerabilities,

protocols, and cryptography.

Radio frequency identification has security concerns that must be addressed

pertaining to vulnerabilities and making sure that confidential data remains secure. In

the article The Evolution of RFID Security, Melanie Rieback, Bruno Crispo, and Andrew

Tanenbaum list the following as vulnerabilities to RFID system: replay-attack, man-in-

the-middle attack, denial-of service attack, and spoofing (Rieback, Crispo et al. 2006).

Additional vulnerabilities include tag to-reader eavesdropping, reader-to-tag

eavesdropping, rouge scanning, and counterfeiting (Juels 2006).

Security concerns for RFID are similar in nature to those posed for computer

networks. Similar to the TCP/IP networking model used for computer networks, the

RFID communication model consists of the following layers for both the RFID reader

and RFID tag; Application Layer, Data Link Layer, and the Physical Layer (Knospe and

Pohl 2004). The RFID model just like the TCP/IP model uses protocols to negotiate the
transfer of data from the identification tag to the reader. Even though a single round

protocol such as the Weise, Sarma, Rivest, and Engels uses a lock calculation, it is still

susceptible to a replay attack (Piramuthu 2007) and is also vulnerable to a man-in-the-

middle attack.

However, the model purposed in the paper Security and Privacy Analysis of

RFID Authentication Protocol for Ubiquitous Computing, utilizing a modified security

protocol, is not vulnerable to a man-in-the-middle attack (Kim and Choi 2007). The RFID

communication model utilizes protocols to facilitate the transfer of information between

component devices. In order to resolve the vulnerability posed by unauthorized access,

Martin Feldhofer developed the Simple Authentication and Security Layer protocol

(Feldhofer 2004).

Cryptography is used to increase security and reduce the vulnerabilities that

RFID tags experience. However, with the low cost of passive RFID tags being utilized,

it is difficult to develop an algorithm that can fit the storage capacity (Robshaw 2006).

Leonid Bolotnyy and Gabriel Robins, in their paper Physically Unclonable Function-

Based Security and Privacy in RFID Systems, they discussed the use of a PUF based

tag protocol instead of a cryptographic algorithm (Bolotnyy and Robins 2007).

Chapter 2

METHODOLOGY
Research Design

Definition of developmental research

The developmental method of research was used on this study to determine the

acceptability of RFID (Radio-Frequency Identification) based Attendance Monitoring

System in terms of implementation, privacy and security as criteria being considered in

the research project.

Subject of the Study

As shown in figure 1 the RFID (Radio-Frequency Identification) based

Attendance Monitoring System is composed of the following sections:

Figure 1

In RFID (Radio-Frequency Identification) systems, an item is tagged with a tiny

silicon chip plus an antenna collectively called a tag. The tag can be mobile or

stationary and be scanned by stationary or mobile readers respectively, using radio


waves. The tag can be encoded with a unique identifier, allowing tagged items to be

individually identified by the reader. In each scanning case, a reader must scan the tag

for the data it contains and then send that information to a database, which interprets

the data stored on the tag. The tag, reader, and database are the key components of an

RFID system offer many advantages to this design application because electronic tags

can be embedded into student conventional means of identification (student ID card);

the electronic tag can be read during motion; no batteries are needed; no line of sight

required for wireless communication between the tag and the reader. Tags are almost

indestructible, can be read even if covered with dirt or submerged and tags have

unalterable permanent serial code that prevents tampering.

Вам также может понравиться