SlideShare a Scribd company logo
1 of 1
Download to read offline
TEMPLATE DESIGN © 2008
www.PosterPresentations.com
Using NFC, RFID Arduino, and iBeacons to Automate The
Development of Indoor Monitoring Framework Applications
Developed: Abdulaziz Almas Supervised: Esther Palomar Coordinated: Emmett Cooper
Birmingham City University
Near Field Communication (NFC ACR122U Reader)
Near field communication (NFC) and iBeacons have shown a
prominent niche in mobile industry and more. In particular, these
technologies are now paving the way for a number of indoor
location monitoring applications improving navigation or risk
mitigation as well as reinventing the mobile advertising, and app
development industry. NFC was recommended for its moderate
cost. Some studies show that its benefits outweigh its drawbacks.
The technology highlights security due to its short communication
transmission range so will soon dominate the way consumers
secure coupons and deliver payments. Moreover, NFC was
variously implanted in many attendancesystems for schools,
universities and in multiple businesses for a variety of reasons as
in (Figure 1). It brought mobile integration, secure access control
with moderate low cost for some countries. It could be said that
NFC is one of the best choices for novice users due to its simple
usage.
The project also explores the application of Estimote Stickers:
Small wireless Bluetooth sensors that can be attached to any
location or object. Stickers and smartphone communicate
throughApple iBeacons that are used to build a new generation
of mobile apps that connect the real world to the user smart
device as illustrated in (Figure 2).
RFID Arduino
Another exploration of the project was RFID (Radio-Frequency
Identification) Ardionu technology. The findings of this technology
might cost less than NFC. It could be the future of adapting
monitoring applications. However, further research and testing is
need to confirm the statement. This paper describes the
development process and evaluation of an automatic indoor
location application and attendancesystem. The description is
based on the implementation of NFC, iBeacons and RFID
Arduino. This project report is especially useful to provide location
and attendanceinformation avoiding the obligation for users to
manually select information in order to make attendancerecord
or indoor location a user as attempted in (Figure 3).
Figure 3
METHODS
The research describes the application that supports an
automatic card swipe on a well-known technology such as NFC
(Near Field Communication). It presents iBeacons and RFID
Arduino as alternatives technologies that could automate the
systems through sensors and wearables. Previous papers
highlighted the security side of NFC. Varication of the secure
read/write data operation was proven in (Ok et al. 2010). Dhar
and Dasgupta (2014) showed the prevention provided against
hacking due to the short communication range. It increases
security by reading/writing data within 4 or less cm using passive
tags. However, cost is still a major disadvantage. Due to these
reasons, NFC was chosen in the project development process.
The project is implemented in a real scenario and the paper also
shows the prototypes evaluation.
This project main contributions are threefold objectives:
•DevelopingAutomatic Attendance (Back-End)
•Migrating Development to Website (Front-End)
•Developing and Migrating Indoor Location
Agile methodology took over the development methodology
especially in testing phase due to rapid prototyping
RESULTS
The project explored multiple technologies to achieve its aim and
objectives. The findings of the development process delivered
most of the proposed objectives. The attendancemonitoring
system was automated programmatically as in (Figure 1). A
website was developed and integrated attendancerecords as in
(Figure 4). Due to lack of NFC unique identifier feature, indoor
location application was not automated with ACR122U. For that
reason, an NFC manual application version was developed.
It was recently discovered, that some technologies were suitable
more than others.A premature commitment was made to develop
an indoor location monitoring map prototype of iBeacons as in
(Figure 5).
]]
In Future, iBeacons are recommended for SDK and community
support in automating attendanceand indoor location. The
technology has been adapted as shown in (Figure 2). The
technology development and implantation is suited for
companies. A security analysis research should be conducted
before development stage.
RFID Arduino might be the alternative of NFC due to its low cost
and open programming functionalities in its IDE. The prototype is
shown in (Figure 3).
CONCLUSION
SOURCES
CONTACT INFO
NFC technology shaped the words into pictures. It could be said
the project would not have brought its aim and objectives without
its literature review. The findings of the project research assisted
delivering the threefold objectives. Although the interesting
challenge was not fully complete, the result is getting closer to it.
The limitation of the NFC ACR122U reader led to exploring other
technologies. The scalability of iBeacons shown its ability to be a
replacement of NFC in indoor monitoring. The technology is
promising and can fulfill the tasks of attendance and indoor
location use case. iBeacons are cross platform which they helped
making a demo.
However, the price could be an issue for others. For that case
RFID Arduino was approachedto be the backup.Although the
costs of development using Arduino are not high, more time is
needed for non-electronic background developers. The
technology required understandingof processing language for it
to be used. Some technologies were supported more than others.
The NFC tools and supported technologies were one of the main
reasons for its success. The Agile methodology aided the
process of testing and saving time, but not money. The evolution
of the product has shown how qualitative the project was in its
back-end and front-end. It highlighted the security analysis of
NFC technology which was experimented. The project strongest
element is the learning outcome. Learning Python, regex and
becoming familiar to stack overflow is a huge learning
experience. Finally, computer scientist could be labeled after
developing the project independently.
Gmail: abdulazizalmass@gmail.com Uni: abdulaziz.almas@mail.bcu.ac.uk
Figure 2
Figure 1
iBeacons
Figure 4
Figure 5
Dhar, S. and Dasgupta,A., 2014. NFC Technology: Current and
Future Trends in India. 2014 International Conference on
Contemporary Computing and Informatics (IC31). pp.639-640
OK, k. et al., 2010 a. Current Benefits and Future Directions of
NFC Services. International Conference on Education and
Management Technology (ICEMT 2010). pp.334-337
Opperman, C. and Hancke, G., 2011. Using NFC-enabled
Phones for Remote DataAcquisition and Digital Control. The
Falls Resort and Conference Center, Livingstone, Zambia, 13 -
15 September 2011.
Sakpere, W. et al, 2013.A Near Field Communication Framework
Navigation. An NFC-Based Framework for Indoor Navigation.
pp.459-460
Franssila, H., 2010. User experiences and acceptance
scenarios of NFC applications in security service filed work.
Second International Workshop on Near Field
Communication.pp.39-43

More Related Content

What's hot

Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT IJECEIAES
 
Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...TELKOMNIKA JOURNAL
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsNirmal Misra
 
Building the Future of Monitoring with Artificial Intelligence
Building the Future of Monitoring with Artificial IntelligenceBuilding the Future of Monitoring with Artificial Intelligence
Building the Future of Monitoring with Artificial IntelligenceIncedo
 
Speech recognition: ready to take off?
Speech recognition: ready to take off?Speech recognition: ready to take off?
Speech recognition: ready to take off?Jeffrey Funk
 
Platform-based approach for IIoT trends
Platform-based approach for IIoT trendsPlatform-based approach for IIoT trends
Platform-based approach for IIoT trendsNinad Deshpande
 
Securing Mobile Cloud Using Fingerprint Authentication
Securing Mobile Cloud Using Fingerprint AuthenticationSecuring Mobile Cloud Using Fingerprint Authentication
Securing Mobile Cloud Using Fingerprint AuthenticationApurva Kini
 
AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
AuthentiThings: The Pitfalls and Promises of Authentication in the IoTAuthentiThings: The Pitfalls and Promises of Authentication in the IoT
AuthentiThings: The Pitfalls and Promises of Authentication in the IoTTransUnion
 
IoT protocols overview part 2- Tethered protocols
IoT protocols overview  part 2- Tethered protocolsIoT protocols overview  part 2- Tethered protocols
IoT protocols overview part 2- Tethered protocolsClint Smith
 
RFID tag - technology and scenarios
RFID tag - technology and scenariosRFID tag - technology and scenarios
RFID tag - technology and scenariosDavide Del Monte
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET Journal
 
Use biometrics for identity management of cloud users to enhanced the securit...
Use biometrics for identity management of cloud users to enhanced the securit...Use biometrics for identity management of cloud users to enhanced the securit...
Use biometrics for identity management of cloud users to enhanced the securit...Vineet Garg
 
Security and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) DevicesSecurity and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) DevicesSanjayKumarYadav58
 
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...Lillie Coney
 
RFID Based Security and Access Control System using ARDUINO
RFID Based Security and Access Control System using ARDUINORFID Based Security and Access Control System using ARDUINO
RFID Based Security and Access Control System using ARDUINOIJMTST Journal
 

What's hot (17)

Ganesh
GaneshGanesh
Ganesh
 
Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT
 
Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of Things
 
Building the Future of Monitoring with Artificial Intelligence
Building the Future of Monitoring with Artificial IntelligenceBuilding the Future of Monitoring with Artificial Intelligence
Building the Future of Monitoring with Artificial Intelligence
 
Speech recognition: ready to take off?
Speech recognition: ready to take off?Speech recognition: ready to take off?
Speech recognition: ready to take off?
 
Platform-based approach for IIoT trends
Platform-based approach for IIoT trendsPlatform-based approach for IIoT trends
Platform-based approach for IIoT trends
 
Securing Mobile Cloud Using Fingerprint Authentication
Securing Mobile Cloud Using Fingerprint AuthenticationSecuring Mobile Cloud Using Fingerprint Authentication
Securing Mobile Cloud Using Fingerprint Authentication
 
AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
AuthentiThings: The Pitfalls and Promises of Authentication in the IoTAuthentiThings: The Pitfalls and Promises of Authentication in the IoT
AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
 
IoT protocols overview part 2- Tethered protocols
IoT protocols overview  part 2- Tethered protocolsIoT protocols overview  part 2- Tethered protocols
IoT protocols overview part 2- Tethered protocols
 
Naveen_Toppo
Naveen_ToppoNaveen_Toppo
Naveen_Toppo
 
RFID tag - technology and scenarios
RFID tag - technology and scenariosRFID tag - technology and scenarios
RFID tag - technology and scenarios
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
 
Use biometrics for identity management of cloud users to enhanced the securit...
Use biometrics for identity management of cloud users to enhanced the securit...Use biometrics for identity management of cloud users to enhanced the securit...
Use biometrics for identity management of cloud users to enhanced the securit...
 
Security and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) DevicesSecurity and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) Devices
 
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
 
RFID Based Security and Access Control System using ARDUINO
RFID Based Security and Access Control System using ARDUINORFID Based Security and Access Control System using ARDUINO
RFID Based Security and Access Control System using ARDUINO
 

Similar to Automating Indoor Monitoring with NFC, iBeacons and RFID

IRJET- Automated Face Detection and Recognition for Detecting Impersonati...
IRJET-  	  Automated Face Detection and Recognition for Detecting Impersonati...IRJET-  	  Automated Face Detection and Recognition for Detecting Impersonati...
IRJET- Automated Face Detection and Recognition for Detecting Impersonati...IRJET Journal
 
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...IRJET Journal
 
IoT Based Smart Attendance System Using RFID and Google Sheet
IoT Based Smart Attendance System Using RFID and Google SheetIoT Based Smart Attendance System Using RFID and Google Sheet
IoT Based Smart Attendance System Using RFID and Google SheetIRJET Journal
 
IRJET- Smart Campus an Android and Web based Application using IoT and NFC Te...
IRJET- Smart Campus an Android and Web based Application using IoT and NFC Te...IRJET- Smart Campus an Android and Web based Application using IoT and NFC Te...
IRJET- Smart Campus an Android and Web based Application using IoT and NFC Te...IRJET Journal
 
NFiD: An NFC based system for Digital Business Cards
NFiD: An NFC based system for Digital Business CardsNFiD: An NFC based system for Digital Business Cards
NFiD: An NFC based system for Digital Business CardsIRJET Journal
 
KAFA: A novel interoperability open framework to utilize Indonesian electroni...
KAFA: A novel interoperability open framework to utilize Indonesian electroni...KAFA: A novel interoperability open framework to utilize Indonesian electroni...
KAFA: A novel interoperability open framework to utilize Indonesian electroni...TELKOMNIKA JOURNAL
 
Navigation for Indoor Location Based On QR Codes and Google Maps – A Survey
Navigation for Indoor Location Based On QR Codes and Google Maps – A SurveyNavigation for Indoor Location Based On QR Codes and Google Maps – A Survey
Navigation for Indoor Location Based On QR Codes and Google Maps – A SurveyAM Publications,India
 
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURES
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURESNEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURES
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURESIRJET Journal
 
IRJET- A System for Indoor Navigation: GuideIt - Personal Assistant
IRJET-  	  A System for Indoor Navigation: GuideIt - Personal AssistantIRJET-  	  A System for Indoor Navigation: GuideIt - Personal Assistant
IRJET- A System for Indoor Navigation: GuideIt - Personal AssistantIRJET Journal
 
A Survey on Vehicle Tracking System using IoT
A Survey on Vehicle Tracking System using IoTA Survey on Vehicle Tracking System using IoT
A Survey on Vehicle Tracking System using IoTIRJET Journal
 
Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS ) Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS ) GICTTraining
 
356 358,tesma411,ijeast
356 358,tesma411,ijeast356 358,tesma411,ijeast
356 358,tesma411,ijeastaissmsblogs
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemDr. Amarjeet Singh
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemDr. Amarjeet Singh
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)GHADA SALEH
 
Railway Safety Protection with Android Mobile Application for 5G New Radio Ne...
Railway Safety Protection with Android Mobile Application for 5G New Radio Ne...Railway Safety Protection with Android Mobile Application for 5G New Radio Ne...
Railway Safety Protection with Android Mobile Application for 5G New Radio Ne...AIRCC Publishing Corporation
 
RAILWAY SAFETY PROTECTION WITH ANDROID MOBILE APPLICATION FOR 5G NEW RADIO NE...
RAILWAY SAFETY PROTECTION WITH ANDROID MOBILE APPLICATION FOR 5G NEW RADIO NE...RAILWAY SAFETY PROTECTION WITH ANDROID MOBILE APPLICATION FOR 5G NEW RADIO NE...
RAILWAY SAFETY PROTECTION WITH ANDROID MOBILE APPLICATION FOR 5G NEW RADIO NE...ijcsit
 
Near Field Communication : Tap and Know
Near Field Communication : Tap and KnowNear Field Communication : Tap and Know
Near Field Communication : Tap and KnowIRJET Journal
 
The Wireless Remote Control Car Based On Arm9
The Wireless Remote Control Car Based On Arm9The Wireless Remote Control Car Based On Arm9
The Wireless Remote Control Car Based On Arm9IOSR Journals
 
JohnDeere-TechnoChamp2010-AjinkyaDeshpande.pdf
JohnDeere-TechnoChamp2010-AjinkyaDeshpande.pdfJohnDeere-TechnoChamp2010-AjinkyaDeshpande.pdf
JohnDeere-TechnoChamp2010-AjinkyaDeshpande.pdfAjinkya Deshpande
 

Similar to Automating Indoor Monitoring with NFC, iBeacons and RFID (20)

IRJET- Automated Face Detection and Recognition for Detecting Impersonati...
IRJET-  	  Automated Face Detection and Recognition for Detecting Impersonati...IRJET-  	  Automated Face Detection and Recognition for Detecting Impersonati...
IRJET- Automated Face Detection and Recognition for Detecting Impersonati...
 
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
 
IoT Based Smart Attendance System Using RFID and Google Sheet
IoT Based Smart Attendance System Using RFID and Google SheetIoT Based Smart Attendance System Using RFID and Google Sheet
IoT Based Smart Attendance System Using RFID and Google Sheet
 
IRJET- Smart Campus an Android and Web based Application using IoT and NFC Te...
IRJET- Smart Campus an Android and Web based Application using IoT and NFC Te...IRJET- Smart Campus an Android and Web based Application using IoT and NFC Te...
IRJET- Smart Campus an Android and Web based Application using IoT and NFC Te...
 
NFiD: An NFC based system for Digital Business Cards
NFiD: An NFC based system for Digital Business CardsNFiD: An NFC based system for Digital Business Cards
NFiD: An NFC based system for Digital Business Cards
 
KAFA: A novel interoperability open framework to utilize Indonesian electroni...
KAFA: A novel interoperability open framework to utilize Indonesian electroni...KAFA: A novel interoperability open framework to utilize Indonesian electroni...
KAFA: A novel interoperability open framework to utilize Indonesian electroni...
 
Navigation for Indoor Location Based On QR Codes and Google Maps – A Survey
Navigation for Indoor Location Based On QR Codes and Google Maps – A SurveyNavigation for Indoor Location Based On QR Codes and Google Maps – A Survey
Navigation for Indoor Location Based On QR Codes and Google Maps – A Survey
 
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURES
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURESNEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURES
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURES
 
IRJET- A System for Indoor Navigation: GuideIt - Personal Assistant
IRJET-  	  A System for Indoor Navigation: GuideIt - Personal AssistantIRJET-  	  A System for Indoor Navigation: GuideIt - Personal Assistant
IRJET- A System for Indoor Navigation: GuideIt - Personal Assistant
 
A Survey on Vehicle Tracking System using IoT
A Survey on Vehicle Tracking System using IoTA Survey on Vehicle Tracking System using IoT
A Survey on Vehicle Tracking System using IoT
 
Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS ) Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS )
 
356 358,tesma411,ijeast
356 358,tesma411,ijeast356 358,tesma411,ijeast
356 358,tesma411,ijeast
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance System
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance System
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
Railway Safety Protection with Android Mobile Application for 5G New Radio Ne...
Railway Safety Protection with Android Mobile Application for 5G New Radio Ne...Railway Safety Protection with Android Mobile Application for 5G New Radio Ne...
Railway Safety Protection with Android Mobile Application for 5G New Radio Ne...
 
RAILWAY SAFETY PROTECTION WITH ANDROID MOBILE APPLICATION FOR 5G NEW RADIO NE...
RAILWAY SAFETY PROTECTION WITH ANDROID MOBILE APPLICATION FOR 5G NEW RADIO NE...RAILWAY SAFETY PROTECTION WITH ANDROID MOBILE APPLICATION FOR 5G NEW RADIO NE...
RAILWAY SAFETY PROTECTION WITH ANDROID MOBILE APPLICATION FOR 5G NEW RADIO NE...
 
Near Field Communication : Tap and Know
Near Field Communication : Tap and KnowNear Field Communication : Tap and Know
Near Field Communication : Tap and Know
 
The Wireless Remote Control Car Based On Arm9
The Wireless Remote Control Car Based On Arm9The Wireless Remote Control Car Based On Arm9
The Wireless Remote Control Car Based On Arm9
 
JohnDeere-TechnoChamp2010-AjinkyaDeshpande.pdf
JohnDeere-TechnoChamp2010-AjinkyaDeshpande.pdfJohnDeere-TechnoChamp2010-AjinkyaDeshpande.pdf
JohnDeere-TechnoChamp2010-AjinkyaDeshpande.pdf
 

More from Abdulaziz Almass

Associate Degree cerificate of 2nd honours
 Associate Degree cerificate of 2nd honours  Associate Degree cerificate of 2nd honours
Associate Degree cerificate of 2nd honours Abdulaziz Almass
 
Associate Degree Transcript
Associate Degree TranscriptAssociate Degree Transcript
Associate Degree TranscriptAbdulaziz Almass
 
AAAA Only CV 4internship edition.8.0
AAAA Only CV 4internship edition.8.0AAAA Only CV 4internship edition.8.0
AAAA Only CV 4internship edition.8.0Abdulaziz Almass
 
Behavior and GraduationCertificate
Behavior and GraduationCertificateBehavior and GraduationCertificate
Behavior and GraduationCertificateAbdulaziz Almass
 
CommonPurpose Oppurtunities
CommonPurpose OppurtunitiesCommonPurpose Oppurtunities
CommonPurpose OppurtunitiesAbdulaziz Almass
 
bsc computer science - programme spec _2
bsc computer science - programme spec _2bsc computer science - programme spec _2
bsc computer science - programme spec _2Abdulaziz Almass
 
how learning Chinese could be easy, RGU group work presentation
how  learning Chinese could be easy, RGU group work presentation how  learning Chinese could be easy, RGU group work presentation
how learning Chinese could be easy, RGU group work presentation Abdulaziz Almass
 
how the web changed the way we live, Computer Science project report, RGU uni
how the web changed the way we live, Computer Science project report, RGU unihow the web changed the way we live, Computer Science project report, RGU uni
how the web changed the way we live, Computer Science project report, RGU uniAbdulaziz Almass
 
how the web changed the way we live 10 www01
how the web changed the way we live 10 www01how the web changed the way we live 10 www01
how the web changed the way we live 10 www01Abdulaziz Almass
 

More from Abdulaziz Almass (20)

iCloud Booking app
iCloud Booking appiCloud Booking app
iCloud Booking app
 
CV 4 Job Hunting
CV 4 Job HuntingCV 4 Job Hunting
CV 4 Job Hunting
 
Associate Degree cerificate of 2nd honours
 Associate Degree cerificate of 2nd honours  Associate Degree cerificate of 2nd honours
Associate Degree cerificate of 2nd honours
 
Associate Degree Transcript
Associate Degree TranscriptAssociate Degree Transcript
Associate Degree Transcript
 
First Class Certificate
First Class CertificateFirst Class Certificate
First Class Certificate
 
BCU Certificate
BCU CertificateBCU Certificate
BCU Certificate
 
AAAA Only CV 4internship edition.8.0
AAAA Only CV 4internship edition.8.0AAAA Only CV 4internship edition.8.0
AAAA Only CV 4internship edition.8.0
 
Apple
AppleApple
Apple
 
INTERN letter
INTERN letterINTERN letter
INTERN letter
 
INTERN letter
INTERN letterINTERN letter
INTERN letter
 
Behavior and GraduationCertificate
Behavior and GraduationCertificateBehavior and GraduationCertificate
Behavior and GraduationCertificate
 
ACBSP
ACBSPACBSP
ACBSP
 
CommonPurpose Oppurtunities
CommonPurpose OppurtunitiesCommonPurpose Oppurtunities
CommonPurpose Oppurtunities
 
Common P Certificate
Common P CertificateCommon P Certificate
Common P Certificate
 
bsc computer science - programme spec _2
bsc computer science - programme spec _2bsc computer science - programme spec _2
bsc computer science - programme spec _2
 
finalTraineeReport
finalTraineeReportfinalTraineeReport
finalTraineeReport
 
ITSS course spec
ITSS course specITSS course spec
ITSS course spec
 
how learning Chinese could be easy, RGU group work presentation
how  learning Chinese could be easy, RGU group work presentation how  learning Chinese could be easy, RGU group work presentation
how learning Chinese could be easy, RGU group work presentation
 
how the web changed the way we live, Computer Science project report, RGU uni
how the web changed the way we live, Computer Science project report, RGU unihow the web changed the way we live, Computer Science project report, RGU uni
how the web changed the way we live, Computer Science project report, RGU uni
 
how the web changed the way we live 10 www01
how the web changed the way we live 10 www01how the web changed the way we live 10 www01
how the web changed the way we live 10 www01
 

Automating Indoor Monitoring with NFC, iBeacons and RFID

  • 1. TEMPLATE DESIGN © 2008 www.PosterPresentations.com Using NFC, RFID Arduino, and iBeacons to Automate The Development of Indoor Monitoring Framework Applications Developed: Abdulaziz Almas Supervised: Esther Palomar Coordinated: Emmett Cooper Birmingham City University Near Field Communication (NFC ACR122U Reader) Near field communication (NFC) and iBeacons have shown a prominent niche in mobile industry and more. In particular, these technologies are now paving the way for a number of indoor location monitoring applications improving navigation or risk mitigation as well as reinventing the mobile advertising, and app development industry. NFC was recommended for its moderate cost. Some studies show that its benefits outweigh its drawbacks. The technology highlights security due to its short communication transmission range so will soon dominate the way consumers secure coupons and deliver payments. Moreover, NFC was variously implanted in many attendancesystems for schools, universities and in multiple businesses for a variety of reasons as in (Figure 1). It brought mobile integration, secure access control with moderate low cost for some countries. It could be said that NFC is one of the best choices for novice users due to its simple usage. The project also explores the application of Estimote Stickers: Small wireless Bluetooth sensors that can be attached to any location or object. Stickers and smartphone communicate throughApple iBeacons that are used to build a new generation of mobile apps that connect the real world to the user smart device as illustrated in (Figure 2). RFID Arduino Another exploration of the project was RFID (Radio-Frequency Identification) Ardionu technology. The findings of this technology might cost less than NFC. It could be the future of adapting monitoring applications. However, further research and testing is need to confirm the statement. This paper describes the development process and evaluation of an automatic indoor location application and attendancesystem. The description is based on the implementation of NFC, iBeacons and RFID Arduino. This project report is especially useful to provide location and attendanceinformation avoiding the obligation for users to manually select information in order to make attendancerecord or indoor location a user as attempted in (Figure 3). Figure 3 METHODS The research describes the application that supports an automatic card swipe on a well-known technology such as NFC (Near Field Communication). It presents iBeacons and RFID Arduino as alternatives technologies that could automate the systems through sensors and wearables. Previous papers highlighted the security side of NFC. Varication of the secure read/write data operation was proven in (Ok et al. 2010). Dhar and Dasgupta (2014) showed the prevention provided against hacking due to the short communication range. It increases security by reading/writing data within 4 or less cm using passive tags. However, cost is still a major disadvantage. Due to these reasons, NFC was chosen in the project development process. The project is implemented in a real scenario and the paper also shows the prototypes evaluation. This project main contributions are threefold objectives: •DevelopingAutomatic Attendance (Back-End) •Migrating Development to Website (Front-End) •Developing and Migrating Indoor Location Agile methodology took over the development methodology especially in testing phase due to rapid prototyping RESULTS The project explored multiple technologies to achieve its aim and objectives. The findings of the development process delivered most of the proposed objectives. The attendancemonitoring system was automated programmatically as in (Figure 1). A website was developed and integrated attendancerecords as in (Figure 4). Due to lack of NFC unique identifier feature, indoor location application was not automated with ACR122U. For that reason, an NFC manual application version was developed. It was recently discovered, that some technologies were suitable more than others.A premature commitment was made to develop an indoor location monitoring map prototype of iBeacons as in (Figure 5). ]] In Future, iBeacons are recommended for SDK and community support in automating attendanceand indoor location. The technology has been adapted as shown in (Figure 2). The technology development and implantation is suited for companies. A security analysis research should be conducted before development stage. RFID Arduino might be the alternative of NFC due to its low cost and open programming functionalities in its IDE. The prototype is shown in (Figure 3). CONCLUSION SOURCES CONTACT INFO NFC technology shaped the words into pictures. It could be said the project would not have brought its aim and objectives without its literature review. The findings of the project research assisted delivering the threefold objectives. Although the interesting challenge was not fully complete, the result is getting closer to it. The limitation of the NFC ACR122U reader led to exploring other technologies. The scalability of iBeacons shown its ability to be a replacement of NFC in indoor monitoring. The technology is promising and can fulfill the tasks of attendance and indoor location use case. iBeacons are cross platform which they helped making a demo. However, the price could be an issue for others. For that case RFID Arduino was approachedto be the backup.Although the costs of development using Arduino are not high, more time is needed for non-electronic background developers. The technology required understandingof processing language for it to be used. Some technologies were supported more than others. The NFC tools and supported technologies were one of the main reasons for its success. The Agile methodology aided the process of testing and saving time, but not money. The evolution of the product has shown how qualitative the project was in its back-end and front-end. It highlighted the security analysis of NFC technology which was experimented. The project strongest element is the learning outcome. Learning Python, regex and becoming familiar to stack overflow is a huge learning experience. Finally, computer scientist could be labeled after developing the project independently. Gmail: abdulazizalmass@gmail.com Uni: abdulaziz.almas@mail.bcu.ac.uk Figure 2 Figure 1 iBeacons Figure 4 Figure 5 Dhar, S. and Dasgupta,A., 2014. NFC Technology: Current and Future Trends in India. 2014 International Conference on Contemporary Computing and Informatics (IC31). pp.639-640 OK, k. et al., 2010 a. Current Benefits and Future Directions of NFC Services. International Conference on Education and Management Technology (ICEMT 2010). pp.334-337 Opperman, C. and Hancke, G., 2011. Using NFC-enabled Phones for Remote DataAcquisition and Digital Control. The Falls Resort and Conference Center, Livingstone, Zambia, 13 - 15 September 2011. Sakpere, W. et al, 2013.A Near Field Communication Framework Navigation. An NFC-Based Framework for Indoor Navigation. pp.459-460 Franssila, H., 2010. User experiences and acceptance scenarios of NFC applications in security service filed work. Second International Workshop on Near Field Communication.pp.39-43