Figure 1 - uploaded by Gyanendra Kumar Verma
Content may be subject to copyright.
A typical RFID system 

A typical RFID system 

Source publication
Article
Full-text available
RFID, Radio Frequency Identification is an inexpensivetechnology, can be implemented for several applications such assecurity, asset tracking, people tracking, inventory detection,access control applications. The main objective of this paper is todesign and implement a digital security system which can deployin secured zone where only authentic per...

Similar publications

Article
Full-text available
This paper deals with the difficulties of detecting UHF passive RFID tags in a RAIN RFID system implemented in a Retail environment. The aim of this study is to evolve from the notion of characterizing a tag to the approach of evaluating a tagged item in a system, in order to better understand the behavior of each item coming to life on the interne...
Conference Paper
Full-text available
Radio Frequency Identification (RFID) is an emerging technology, with applications already mastered and spread: animal identification, access control, control of logistics flows, information from environmental sensors, etc. However, lack of security and some environmental issues can significantly deteriorate the performance of such systems. Therefo...
Conference Paper
Full-text available
Radio frequency identification (RFID) is becoming more significant in many aspects of modern life. The application of RFID technology in various domain has contributed to the development of innovative systems such as vehicle and animal tracking system, employee access control and supply chain automation systems, used in large-scale organisations. H...
Conference Paper
Full-text available
Monitoring students of Universiti Tun Hussein Onn Malaysia (UTHM) movement around the campus is difficult especially for lecturer hall and laboratory access control. By using RFID technology, it is easy to track the student thus enhances the security and safety in selected zone. The application of active RFID in a student monitoring system is to im...

Citations

... At Level 2 maturity, the in real-time, enabling better resource management, theft prevention, and optimization of logistical processes on construction sites [29]. Another potential application is real-time access control to specific parts of the building or facility, which can be administered by the administrator [40]. ...
Preprint
Full-text available
Building Information Modelling (BIM) integration with the Internet of Things (IoT) is progressing. The high level of BIM maturity involves using sensor data to manage processes or objects. The article presents the process of creating a telemetry connection between the BIM model and a Radio-Frequency Identification (RFID) sensor in the context of gaining access to various parts of a building. The concept of a digital twin and its relationship with IoT sensor systems are described in the paper. Furthermore, the process of creating connection using an experimental set based on a microcontroller board for RFID reader support is described. Programming of the set was carried out using multiple programming languages with the utilization of artificial intelligence. The article presents a unique process of connecting an RFID reader with BIM using a simple model that can be replicated in other contexts. The article highlights the limitations and possibilities for further development of such a connection.
... This technology can enhance response time by using controller processes and real-time images [7]. The proposed paper introduces a security system that employs passive RFID technology and incorporates an actuator-based door lock system [8]. The www.ijarsct.co.in ...
Article
The RFID Door Access Control System ensures the security and dependability of numerous secure medical and scientific facilities, official premises, and locker rooms that house confidential files, granting access only to restricted individuals. The system combines various access methods and fortified security measures, ensuring convenient user access while remaining in-penetrable to unauthorized individuals. This research paper aimed to design a prototype of 3-layer authentication security system based on a solenoid door lock, 4x4 Keypad, RFID cards, Relay Module, 16x2 LCD, ESP32 micro-controller, RC-522 Reader module, and Blynk application. The project focuses on designing and implementing a robust system that integrates RFID technology with smart locks to grant authorized personnel access to numerous sections within the office premises.
... RFID technology offers a wide range of applications within the realm of IoT. Notably, it finds utility in several domains such as inventory management, asset tracking, and access control, among others [4]. RFID tags have the potential to be employed in the realm of inventory management for the purpose of monitoring the movement of items within a warehouse or retail establishment [5]. ...
Conference Paper
In the present era of information and communications technology, the Internet of Things (IoT) is a ground- breaking advancement that has great potential for the creation of wireless communication solutions. In this work, we investigate the integration of the LoRa and Wi-Fi technologies to make communication between a transmitter, receiver, RC522 RFID reader, Raspberry Pi Pico microprocessor, and LoRa transceivers as smooth as possible. The primary goal is to collect and transmit data from a GPS module and RFID tags to a centralized data center. This will allow for the development of potentially useful applications in many different industries, including warehousing, data security, and electric bicycles. The RC522 reader is used throughout the operating process to get data from RFID tags whenever they are brought into close contact. While this is happening, accurate geographical coordinates are being recorded by a GPS module that is connected to the Pi Pico. The LoRa protocol, which is well-known for its extended range capabilities while simultaneously optimizing battery life, is used to communicate the consolidated data. Immediately after being received, the data is processed and then saved inside the Firebase cloud architecture. This harnesses the capabilities offered by Wi-Fi technology. This all-encompassing system has a tremendous amount of potential as a flexible instrument that might be used in a variety of business sectors. It has the promise of increased productivity, accuracy, and security in a wide variety of applications.
... Te end-user gets messages on the phone via the IFTT server regarding the abnormal condition of any device in their home for security reasons. Verma and Tripathi [16] implemented a digital security system that consists of a door lock system using RFID passively. To manage and transact operations, a centralized system was deployed. ...
Article
Full-text available
The Internet of Things (IoT) is a platform that manages daily life tasks to establish an interaction between things and humans. One of its applications, the smart office that uses the Internet to monitor electrical appliances and sensor data using an automation system, is presented in this study. Some of the limitations of the existing office automation system are an unfriendly user interface, lack of IoT technology, high cost, or restricted range of wireless transmission. Therefore, this paper presents the design and fabrication of an IoT-based office automation system with a user-friendly smartphone interface. Also, real-time data monitoring is conducted for the predictive maintenance of sensor nodes. This model uses an Arduino Mega 2560 Rev3 microcontroller connected to different appliances and sensors. The data collected from different sensors and appliances are sent to the cloud and accessible to the user on their smartphone despite their location. A sensor fault prediction model based on a machine learning algorithm is proposed in this paper, where the k-nearest neighbors model achieved better performance with 99.63% accuracy, 99.59% F1-score, and 99.67% recall. The performance of both models, i.e., k-nearest neighbors and naive Bayes, was evaluated using different performance metrics such as precision, recall, F1-score, and accuracy. It is a reliable, continuous, and stable automation system that provides safety and convenience to smart office employees and improves their work efficiency while saving resources.
... Moreover, after every access attempt, the credentials will be passed to a central server which saves them in a database. Other attempts were made by authors in [9], where RFID authentication was employed to access a door. However secure, all the systems discussed above use at least a two-level verification process. ...
Conference Paper
Full-text available
As mankind leads into a new age of modernization, security issues and measures have become exceedingly important. Considering an educational institute or workplace, keeping one's belongings safely with a minimal interface is the need of the hour. The traditional lock and key method of keeping personal items safe is clumsy and inconvenient. The recent developments in technology have provided innovative solutions to this problem. Gone are the days of the troublesome key and lock. Radio Frequency Identification (RFID), along with Internet-of-Things (IoT), is a secure, user-friendly and efficient method to safeguard things. This combination comes with advantages such as high security, simplicity, cost-effectiveness and ‘misplace-proof’ methodology. This paper proposes a Smart RFID-IoT based Locker system. The locker works on RFID authentication technology, which is unique to every identity card of the user. It is also enabled with Wi-Fi connectivity to facilitate continual status monitoring, user login-logoff data storage, and unauthorized access surveillance.
... Penelitian oleh Gyanendra K. Verma dan Pawan Tripati (2010) dengan judul "A digital security system with door lock system using RFID technology", menghasilkan sebuah sistem keamanan dengan RFID yang berfungsi secara real-time dengan cara pengguna meletakkan sebuah kartu dalam kotak pembaca yang akan membuka pintu secara otomatis dan menyimpan informasi pengguna di sebuah server pusat [7]. Penelitian juga dilakukan oleh Aiswarya (2020) dengan judul "A Survey on Smart Door Lock Security Methodologies Implemented Using Various Wireless Access Technologies", menemukan hasil survei bahwa sistem keamanan pintu pintar harus dikembangkan dengan sistem yang sudah ada saat ini atau dengan sistem baru untuk mengatasi masalah yang ada [8]. ...
Article
Full-text available
Safety is an important aspect of life, especially for communities. The lack of security systems in an environment increases crime rates in areas run by people outside the environment. Therefore, the community service team created an environmental security system by creating a security system using RFID (Radio Frequency Identification) and demonstrated the advantages of this security system compared to traditional systems. The joint concept of community service and research activities uses the results of an interview with the head of his RW 015 Kelurahan Tegal Alur in West Jakarta to identify the desire of residents, especially environmental security members, to develop a security system in the RW area. It will come true. We hope to have a better and simpler security system its usefulness. The outcome of this activity will be implemented to residents of RW 015 Tegal Alur West Jakarta as an example of technology-based environmental facility.
... A real-life prototype was also created with minimum cost. Verma and Tripathi [28] made a digital security system which proposes a door lock system via RFID technology. A centralized system was implemented to manage and transact operations. ...
Article
Full-text available
Industry 5.0 benefits from advancements being made in the field of machine learning and the Internet of Things. Different sensors have been installed in a variety of IoT devices present in different industries such as transportation, healthcare, manufacturing, agriculture, etc. The sensors present in these devices should automatically predict errors due to the extensive use of sensors in urban living. To ensure the integrity, precision, security, dependability and fidelity of sensor nodes, it is, therefore, necessary to foresee faults before they occur. Additionally, as more data is being collected by these devices every day, cloud computing becomes more necessary for sustainable urban living. The proposed model emphasizes solution recommendations for faults that occurred in real-life smart devices to mitigate faults at an early stage, which is a key requirement in today’s smart offices. The proposed model monitors the real-time health of IoT devices through an ML algorithm to make devices more efficient and increase the quality of life. Through the use of K-Nearest Neighbor, Decision Tree, Gaussian Naive Bayes and Random Forest approach, the proposed fault prediction recommender model has been evaluated and Random Forest shows the highest accuracy compared to other classifiers. Several performance indicators such as recall, accuracy, F1 score and precision were utilized to examine the performance of the model. The results have demonstrated the effectiveness of ML techniques applied to sensors in predicting faults in smart offices with Random Forest being observed as the best technique with a maximum accuracy of 94.27%. In future, deep learning can also be applied to bigger datasets to provide more accurate results.
... There are so many developments shrewd entryway lock advancements accessible in the market to beat these issues, yet they are pricey and not appropriate to all clients. [7]. ...
... However, the final product is still designed with these ideas in mind. 7 In Chapter 3 shows the functional and nonfunctional decomposition of the product. ...
Thesis
Full-text available
Physical keys are the most natural way to lock or open a door, and everyone is familiar with it. Although the physical key is a well-proven and well-known technology, it is not without faults. For a lock, there can only be one unique key. Different keys are required for various locks. Carrying a large number of keys is also inconvenient. Smart locks are keyless door locks that let you unlock your door without having to use a real key. A smart lock is an electromagnetically lock that is meant to lock and unlock a door when it receives instructions from an authorized device and executes the authorization procedure using a cryptographic key. System at the entrance will only allow the authorized persons to enter the organization. The system can also be installed at various points inside the organization to track the person's movement and to restrict their access to sensitive areas in the organization. In such a way, suspicious persons can be caught which will surely improve the security level in the organization. Radiofrequency identification (RFID) is a wireless technology that can be used to develop an access control system. The literature has revealed the use of this technology to automate various processes ranging from the industrial sector to home control has reported the use of RFID.
... While the solenoid is turned on, the power-on locking type can lock a door. The door remains unlocked if the power is turned off [10]. ...
... If that code is correct the device will operate and therefore the door is going to be opened. [13] designed a digital door locking system that is implemented and governed by an RFID reader which authenticates and validates the user and then opens the door automatically. It also keeps the record of check-in and check-out of the user. ...
Article
Full-text available
Aims: The study was conducted to develop a basic security system that integrates Radio Frequency Identification (RFID), an electromagnetic lock, and a GSM Module to produce a lowcost and effective access control system. This work uses the possibility of improving access control door security by replacing a door key with a dependable electromagnetic door lock system for only authorized persons utilizing RFID and a mobile call intruder warning system. Methodology: The system is controlled by an ATMEGA328 microcontroller, which instructs the RFID reader to check and verify the users' unique identity tags before unlocking the electromagnetic lock to grant access or alert the administrators through the GSM module if an invalid tag is used. The microcontroller which also controls a liquid crystal display was programmed using Arduino C language; the data of identification tags were stored in its database. The RFIDbased access control with electromagnetic lock and intruder alert consists of three main parts-the INPUT (RFID), CONTROL (ATMega 328), and OUTPUT (Electromagnetic lock, LCD, Buzzer, and GSM Module). The RFID reader was able to scan tags and open a prototype door when a valid tag is used. The motor closes the door after a preset 5 seconds delay. Original Research Article Makanjuola et al.; JERR, 22(11): 7-17, 2022; Article no.JERR.88675 8 Conclusion: When compared to well-known techniques in the literature, the developed RFID Access control system outperforms them in terms of accuracy and cost-effectiveness. The door locking system works in real-time because when the user places the tag in contact with the reader, the door opens and the check-in information, together with the user's basic information, is recorded in the central server.