0% found this document useful (0 votes)
12 views4 pages

Iot Report

The document presents an RFID-based attendance system aimed at automating the monitoring of student attendance, addressing the inefficiencies of manual processes. It highlights the importance of security measures, such as encryption and biometric authentication, to protect sensitive data from unauthorized access and cyber attacks. The proposed system architecture includes hardware and software components that facilitate real-time attendance tracking and data storage.

Uploaded by

vijaya.yukthesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views4 pages

Iot Report

The document presents an RFID-based attendance system aimed at automating the monitoring of student attendance, addressing the inefficiencies of manual processes. It highlights the importance of security measures, such as encryption and biometric authentication, to protect sensitive data from unauthorized access and cyber attacks. The proposed system architecture includes hardware and software components that facilitate real-time attendance tracking and data storage.

Uploaded by

vijaya.yukthesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

RFID BASED ATTENDENCE SYSTEM

KONDA YUKTHESH REDDY KUNDRAPU JAYA DEEP SUJITH REDDI


Department of Computer Science Department of Computer Science Department of Computer Scienceand
and Engineering and Engineering Engineering
konda23100@iiitnr.edu.in Kundrapu23100@iiitnr.edu.in konda23100@iiitnr.edu.in
231000030 231000032 231000047
Kavita Jaiswal
LAVUDYA SAI CHARAN TEJ Dept of CSE Ruhul Amin
Department of Electronis and IIIT Naya Raipur Dept of CSE
comunication Chhattisgarh, India IIIT Naya Raipur
konda23100@iiitnr.edu.in kavita@iiitnr.edu.in Chhattisgarh, India
231010226 ruhul@iiitnr.edu.in

 Future research should focus on advancing security


Abstract— : The manual process of monitoring lecture measures through encryption and biometric
attendance in developing countries poses significant challenges
for educational institutions. The traditional approach of using authentication, exploring integration with cloud
sign-in sheets or manual data entry is time-consuming, error- services, enhancing user interface for improved
prone, and lacks real-time tracking capabilities.In recent usability, and scalability.
times, there has been a noticeable increase in the utilization of
Radio Frequency Identification (RFID) systems across various II. LITERATURE REVIEW
sectors, including transportation, healthcare,agriculture, and
the hospitality industry. The focus of this paper is to present a TECHNOLOGICAL ADVANCEMENTS IN ACCESS CONTROL SYSTEMS
solution that utilizes RFID technology to streamline the
HAVE BEEN EXTENSIVELY STUDIED IN PAST. RESEARCH BY LI ET AL.
processof monitoring student attendance. By implementing the
developed RFID-based system, the study aims to eliminate the (2018) INVESTIGATED THE INTEGRATION OF RFID TECHNOLOGY INTO
time-consuming manual collection of attendance data. ACCESS CONTROL SYSTEMS, HIGHLIGHTING ITS EFFECTIVENESS IN
ENHANCING SECURITY AND EFFICIENCY. SIMILARLY, THE WORK OF
AL-FUQAHA (2015) EXPLORED THE UTILIZATION OF BIOMETRIC
Keywords— RFID, AES, Security, Attacks, Privacy, AUTHENTICATION METHODS, SUCH AS FINGERPRINT AND FACIAL
Cloning, Tags RECOGNITION, TO IMPROVE ACCESS CONTROL ACCURACY AND
RELIABILITY.
I. INTRODUCTION
With the continuous advancement of technology, seamless RFID-based attendance systems face security issues, including
transactions such as tapping a credit card or using a biometric unauthorized access to sensitive data and the interception of RFID
scanner for building access have become more common. Asa signals. Encryption algorithms such as AES can be used to secure
result, Radio Frequency Identification (RFID) technology keeps data transmission [2]. Secure communication channels such as
gaining more recognition. However, end users always upload data to SSL or TLS can also be employed to protect against attack [3].
most Internet of Things (IOT) devices they have, and every 40
seconds, a cyber attack occurs [1]. However,the security of data Encryption is crucial for securing RFID-based attendance
transmission between RFID readers and tags is a significant concern. management systems. With the increasing popularity of RFID due
Encryption algorithms, such as the Advanced Encryption Standard to technological advancements, data privacy, and security concerns
have also arisen [3]. Researchers emphasize the importance of
(AES) block cipher in RFID-based attendance management systems
encryption in securing RFID-based systems to ensure the privacy
can significantly enhance their security, preventing unauthorized
and security of individuals’ data [4].
access andprotecting sensitive data from malicious attacks [1]. The
proposed approach will provide insights into the importance of
encryption in protecting sensitive data and ensuring the privacyand
security of individuals in attendance management systems. III. SYSTEM ARCHITECTURE
This paper is structured as follows: The architecture for the RFID-based attendance system
 RFID-based attendance systems explores comprises several interconnected components working
various aspects such as system architecture, together seamlessly to achieve automated attendance
hardware components, software algorithms, tracking. The architecture is designed to facilitate the
deployment scenarios and effectiveness.. detection of RFID cards, retrieval of associated information,
display on an LCD exchange. screen, and storage of data in
 The Arduino reads RFID cards, identifies users based an Excel sheet. Below is a detailed description of the system
on their unique IDs, logs their access in Excel, and architecture:
provides feedback through LEDs, a buzzer, and an
LCD display..
RFID Reader:
This component serves as the primary input device for the
 The findings suggest that RFID-based access control
systems offer a convenient and relatively secure system, responsible for detecting RFID cards and capturing
solution for managing access to physical spaces. their unique identifiers (UIDs). The RFID reader
However, it's essential to address any potential communicates with the microcontroller unit to relay the
vulnerabilities and continuously update and monitor detected UID information
the system to ensure its effectiveness and security.

XXX-X-XXXX-XXXX-X/XX/$XX.00 ©20XX IEEE


unit regarding the content to be displayed and updates the
screen accordingly.

IV. METHODOLOGY
Our IoT project entails the development of an RFID-based
attendance system comprising both hardware and software
components. The hardware includes an RFID reader to detect
the Card UID, an LCD display for presenting information,
and a microcontroller unit to process data.
The software component involves programming
the microcontroller to interact with the RFID
reader, LCD and data storage.

Fig-3: RFID Sensor

Microcontroller Unit:

Fig.1:Implementation details

Fig-2: Arduino Uno 3


Acting as the central processing unit, the microcontroller
manages the flow of data between various components. It
receives the UID information from the RFID reader and
initiates the process of retrieving associated data. The
microcontroller then interacts with both the LCD display Fig. 2: Circuit diagram
and the data storage module to present information and store
attendance data. Data Storage:
The data storage module[PLX-DAQ] is responsible for
LCD Display: securely storing attendance data in an Excel sheet Fig[3] or
similar database format. Upon detection of an RFID card
Fig[4], the microcontroller unit sends the relevant
attendance information to the data storage module for
storage and record-keeping.

Interaction and Communication:


When an RFID card is detected by the RFID reader, its UID
information is sent to the microcontroller unit. The
microcontroller unit processes the UID information and
retrieves the corresponding data from the data storage
module. Simultaneously, the microcontroller instructs the
LCD display to present the retrieved information, such as
the individual's name or ID. Once the information is
displayed, the microcontroller initiates the storage of
The LCD display component visually presents information attendance data in the Excel sheet through communication
retrieved from the RFID cards, such as the individual's with the data storage module. Throughout this process, the
name or ID. It receives instructions from the microcontroller components interact through predefined communication
protocols and interfaces to ensure seamless operation and
data exchange.

FLOWCHART OF ATTENDENCE
PROCEDURE:

V. RESULT AND DISCUSSIONS


The RFID Attendance Management System developed
and implemented in this project yielded promising results in FIG.2 LCD DISPLAY
automating attendance tracking and streamlining VI. LIMITATIONS:
administrative processes.
RFID technology, while offering numerous benefits
The system effectively captured and recorded attendance interms of efficiency and convenience, also presents
data in real-time, eliminating the need for manual data entry. certain limitations and security concerns:
The RFID technology ensured accurate identification and
tracking of students or employees, reducing errors and 1. Cloning and Spoofing: Attackers can clone
improving data integrity or spoofRFID tags by copying the unique
identifier (UID) of legitimate tags. This
enables unauthorized access to secure areas
The following figures shows the data transferring toexcel or systems, posing a significant security
sheet and displayed at LCD: threat.

2. Relay Attack: A relay attack is a type of


cyber attack that involves intercepting and
manipulating the communication between
two devices or systems aiming to deceive
them into believing they are in close
proximity to gain unauthorized control

3. Eavesdropping: RFID communication can


be intercepted by unauthorized parties,
allowing them to capture sensitive
information exchanged between tags and
readers. This information could include tag
IDs, transaction details, or other confidential
data, leading to privacy breaches or
unauthorized access
FIG.1 EXCEL SHEET
4. Data Tampering: RFID data stored on tags REFERENCES
or transmitted between tags and readers may [1] S. Lahiri, “RFID Sourcebook”, New Jersey: IBM Press, 2006.
be vulnerable to tampering or manipulation. [2] S. Shepard, “RFID Radio Frequency Identification”, s.l.:
Attackers canmodify data stored on tags or MacGraw-Hill, 2005.
intercept and alter data during transmission, [3] Radio-frequency identification. Wikipedia (online). Wikimedia
Foundation, Inc., 2009.
leading to unauthorized access or fraudulent [4] Sato DCS & Labeling Worldwide, “The RFID Guidebook
activities (Revision 8)”, 2004.
[5] HID Corporation, “Understanding Card Data Formats”,
VII. CONCLUSION AND FUTURE WORK Technology Basics White Paper, 2009.
The implementation of the RFID Attendance [6]Chitresh, S and Amit K (2010),” An efficient Automatic
Management System marks a significant step forward Attendance Using Fingerprint Verification Technique ”
in improving attendance tracking processes and ,International Journal on Computer Science and Engineering
administrative efficiency (IJCSE),Vol. 2 No. 2,pp 264-269
[7]Longe O.O.(2009),” Implementation of Student Attendance
System using RFID Technology” , B. Tech Project Report, Ladoke
The system demonstrated its ability to automate Akintola University of Technology, Ogbomoso, Nigeria
attendance monitoring, eliminate manual data entry, and [8] RFIDSensNet Lab (2005), A white paper on Automatic
provide accurate real-time attendance records Attendance System. Texas A & M University, Texas, USA
Exploring the integration ofcloud-based data [9]Liu C.M and Chen L.S (2009), "Applications of
RFID technology for improving production efficiency
storage solutions could facilitate remote in an Integrated-circuit packaging house,"International
access, backup, and synchronization of Journal of Production Research, vol 47, no. 8, pp. 2203-
attendance data. 2216,.
[10]L. Liu, Y. Liu, X. Zhang, and Y. Zhu, “An RFID-based
Adding biometric authentication capabilities to the attendance management system for smart school”, International
system couldfurther enhance security and user Conference on Computer, Information and Telecommunication
authentication. Systems (CITS), pp. 157-161, 2017, doi:
In conclusion, our RFID-based attendance system 10.1109/cits.2017.8329799.
project has demonstrated the potential of RFID
technology to revolutionize attendance tracking
processes

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy