SlideShare a Scribd company logo
1 of 6
Download to read offline
43 International Journal for Modern Trends in Science and Technology
Volume: 2 | Issue: 10 | October 2016 | ISSN: 2455-3778IJMTST
A Novel RFID Readers Employee
Management System
Avula Surendra1
| K. Madanna2
1PG Scholar, Department of ECE, Geethanjali College of Engineering & Technology, Kurnool, AP, India.
2Associate Professor, Department of ECE, Geethanjali College of Engineering & Technology, Kurnool,
AP, India.
Radio Frequency Identification (RFID) is a new generation of Auto Identification and Data collection
technology which helps to automate business processes and allows identification of large number of tagged
objects using radio waves. RFID based Employee Management System (EMS) would allow complete
hands-free access control, monitoring the whereabouts of employee and record the attendance of the
employee as well. The access tag can be read up to 5 (~16 feet) meters from the RFID reader, which usually
eliminates the need to handle the tag or to walk very close to the reader. This freedom is particularly
important to handicapped workers, staff carrying packages. The proposed system is based on UHF RFID
readers, supported with antennas at gate and transaction sections, and employee identification cards
containing RFID transponders which are able to electronically store information that can be read / written
even without the physical contact with the help of radio medium. This paper presents the experiments
conducted to set up RFID based EMS.
KEYWORDS: API, GUI, RFID, Readers, Tags/Transponders, UHF
Copyright © 2016 International Journal for Modern Trends in Science and Technology
All rights reserved.
I. INTRODUCTION
The objective of the paper is to discuss the issues
of Radio frequency identification (RFID), what are
the concepts of employee management system,
cloud based employee management system and
give proposed cloud based RFID authentication
protocol. RFID is a technology, which has gained
increased attention of researchers and
practitioner’s. This enables acquisition of data
about an object without need of direct line of sight
from transponders and readers [4]. To make RFID
system more secure, authentication is one
solution. It also maintains the security and privacy
of system. Tag identification without
authentication raise a security problem. Attackers
sometime may tap, change and resend messages
from the tag as if it has the tagged object. An
Employee management system using RFID
becomes efficient on cloud system because it has
several advantages like (1) Verifier is enabled to
authenticate the tagged objects using any reader
over internet. (2) Pay on demand resource
distribution is effective for small and medium scale
organizations. (3) Cloud is more robust due to
resource sufficiency. However, this cloud-based
RFID is in sufficient in two aspects. (1) Most
current works focused on functionalities without
giving importance to security and privacy. (2)No
study shows that classical RFID schemes meet the
security and privacy requirements of cloud based
systems. This system can be effectively used for
calculating the attendance, salary of a particular
employee for particular month and for track
keeping of him/her. Classical RFID schemes when
moved to cloud, they are having the problems of
insecure database, privacy of tags and a reader
gets revealed which is not acceptable. Because
cloud is publically available to any one and the
clients cannot fully trust on the cloud service
providers. So to recover from these drawbacks,
cloud-based RFID authentication protocol should
get developed. It also secures the database using
hashing technique like SHA1 and maintains the
ABSTRACT
44 International Journal for Modern Trends in Science and Technology
A Novel RFID Readers Employee Management System
privacy of tags, readers [3]. Successful
implementation of this system brings the
advantages like deployment cost saving,
pervasiveness of authentication. Tag verification
complexity reduces to O(1). It preserves the privacy
of tag and reader holders. It makes the database
more secure.
II. RELATED WORK
2.1 Traditional RFID
There is an extensive work on RFID
authentication schemes which are, backend server
based and server-less [1] [2]. The back end server
based RFID is shown in Figure 1. It is composed of
tags, readers and backend server. Readers identify
and verify the tags by querying to backend server.
However, the drawback is limited mobility of
readers.
Figure 1: the backend-server-based RFID architecture.
The server-less RFID scheme is shown in Figure
2. It is composed of tags, readers and CA
(Certification Agency).
Figure 2: Server-less RFID architecture
There are two phases in server less scheme:
initialization and authentication [5]. The mobile
reader accesses the CA (Certification Agency) and
downloads the AL (Access List) through the secure
connection in an initialization phase. The mobile
reader is generally a portable device such as
notebook computer or smart phones. It might be
stolen. Then AL is stored in it. It may wrongly be
used to imitate the tags. Credentials of tag
authentication are derived with the help of tags key
and RID. It makes AL exclusively usable for the
reader. But as a result, it is not possible for tag to
create a valid request without the RID. In the
authentication phase, the reader challenges a tag
with RID, waiting for tags response with H (RID,
Kt). The reader then searches its AL and finds the
matched value to verify the Kt. It then identifies the
TID. Sever-less RFID architecture provides readers
with the scalability. However, there are drawbacks
in server-less authentication protocol. (1) All they
transmit RID in plaintext. (2) Searching through AL
has complexity of O (N), where N denotes the
number of tags. (3) Computational processes of
searching and verifying are executed all by single
personnel portable device, which reduces the
performance significantly.
2.2 Requirements of cloud based RFID
Cloud based RFID has many advantages, but has
the challenges of security and privacy. Existing
authentication protocols are inapplicable to cloud
based employee management system because of
lacking two primary capabilities. Firstly, instead of
providing protection to front end communication,
protection of backend communication is important
in Cloud based authentication schemes. Also in
cloud based schemes, mobile readers often
accesses the public cloud using open wireless
connections. There are two solutions for this issue.
(1) Establish VPN connections among readers and
cloud in a network layer. (2) In application layer
design an RFID authentication protocol protecting
backend security [1]. Secondly, these schemes are
required to prevent the privacy of tags/readers
from untrustworthy cloud. Therefore, readers/tags
should provide the confidentiality about data
storage, which is against the cloud.
III. PROPOSED SOLUTION
3.1 VPN Agency
Existing cloud based RFID system has four
participants. They are tag owner, verifier, VPN
agency and cloud provider [1] [6]. The VPN agency
has VPN routing between readers and the cloud.
Cloud service of RFID authentication is given by
cloud provider to the verifier and tag owner. VPN
routing makes communication between the reader
45 International Journal for Modern Trends in Science and Technology
Volume: 2 | Issue: 10 | October 2016 | ISSN: 2455-3778IJMTST
and cloud as secure as in privet intranet. Attackers
are able to intercept, block and resend the TCP/IP
packets in the network layer. On the other hand,
network-layer-anonymity of readers accessing the
cloud is achieved.
3.2 Encrypted Hash Table
Figure 3: Proposed Cloud-based RFID authentication
scheme
An EHT is proposed to prevent client’s data
confidentiality and access anonymity from
revealing to the cloud provider. It is illustrated in
Figure 4. The index which is a hash digest H
(RID||TID||SID) uniquely denotes the session
with SID from the reader with RID to tag with TID.
The record indexed by H (RID||TID||SID) is E
(RID||TID||SID||Data). It is a cipher text
according to the reader defined encryption
algorithm with a reader managed key. The RID field
is used to check the integrity of the cipher text after
decryption by reader. Mutual authentication is
done using TID between reader and the tag. The
SID field is the identifier which is a term in a reader
defined sequence. The data field stores any
application data such as location of tag and access
time.
3.3 Proposed Cloud-based RFID authentication
Protocol
The proposed cloud based RFID authentication
protocol is illustrated in Figure 4 [1]. For simplicity,
replace RID by R, replace TID by T and SID by S.
Encrypted function E (RID||TID||SID||Data) in
EHT is now simplified to E (R||T||S). Other
notations listed in this section are as shown in
Table 1. S+1 is the next incremental term after Sth
term in the sequence defined by reader. 1st step is
for the reader to obtain T and S. The tag generates
H (T||R||S) as an authentication request and
sends generated authentication request to the
reader. H (R||T||S) acts as an index to the cipher
text E (R||T||S).
Figure 4: Proposed cloud based RFID authentication
Protocol.
The reader does the following operation. (1) It
reads the cipher text from the cloud EHT and
decrypts it in the useful form (2) It then verifies R
for integrity and obtains T and S. Authentication of
the tag take place in 2nd step. The reader
challenges the tag by generating a random number
Nr. The tag calculates hash based on challenge Nr
received from reader. The tag uses H (R||T||Nr) to
generate random nonce Nt and sends Nt as its
challenge to the reader. Synchronization of S
between the encrypted hash table (EHT) and the
tag take place in 3rd step. The reader checks the
integrity after reading the next record indexed by H
(R||T||(S+1)) from the EHT. Tag has been
desynchronized if the valid record is present in
EHT. The reader continues the same action until it
finds the last valid record, assuming its SID is M.
In 4th step the cloud EHT gets updated. In EHT,
cipher text E (R||T||M’) having index H
(R||T||M’) is added by reader, where M’=M+1. A
message of H (R||T||M’) + H (E (R||T||M’)) is
send back to the reader from the cloud to confirm
that the updating is successful. 5th step is to send
a comprehensive response to be verified by the tag.
In response to tag’s random challenge Nt, reader
calculates H (R||T||Nt). For simple encryption,
response is XORed with M’. Encrypted M’ is sent to
tag with index H (R||T||M’) and get verified by a
tag. 6th step does authentication of the reader and
also it repairs the desynchronization. To obtain M’,
tag calculates H (R||T||Nt). Calculated value gets
XORed with the received value H(R||T||Nt) M’. It
then calculates and verifies H(R||T||M’). If
46 International Journal for Modern Trends in Science and Technology
A Novel RFID Readers Employee Management System
success, it means the M’ is not modified. By
updating S=M’ on the tag, synchronization is
achieved.
IV. IMPLEMENTATION
4.1 Mathematical Model
In the proposed cloud based RFID authentication
scheme readers anonymously access the cloud
through wireless or wired connections. An
encrypted hash table stores the client’s secrets in
encrypted form so that secrets should not be easily
revealed to the cloud [3]. The first RFID
authentication protocol is proposed which
preserves the privacy of readers and tags.
Defining System:
Consider an organization with N employees S = {}
Identifying input:
Let, S = {Db, U, T, A, R, Cp} Where,
Db = System database with two tables:
- Employee
- RFID track
U is set of users such that,u1, u2, u3… un ϵ U
T is set of users track such that, t1, t2, t3 ….tn ϵ T
A is set of user’s attendance such that, a1, a2, a3
…an ϵ A
R is set of user’s RFID tag such that, r1, r2...rn ϵ R
Venn diagram of the System:
Figure5: Set diagram of employee management system
Functionalities:
The functions of the system are as follows:
(1) U = new Employee (u_id, u_name, u_add, RFID’)
Where,
RFID’ = SHA1 (RFID tag)
SHA1 algorithm:
Input: Max 264-1 bit uses 512 bit block size
Output: 160 bit digests
Steps:
Padding message with single one followed by zeros
until the final block has 448 bits and appends the
size of original message as an unsigned integer of
64 bit.
Initialize the 5 hash blocks (h0, h1, h2, h3, h4) to
the specific constants defined in SHA1 standard
Hash (for each 512 bit block)
Allocate an 80 words array for the message
schedule
First 16 words are obtained by splitting message
into 32 bit block.
Rests of the words are generated by following
algorithm:
Word [i-3] XOR Word [i-14] XOR Word [i-16] then
left rotate it by 1 bit.
Loop 80 times doing the following:
Calculate SHA function() and constant K(these are
based on current round number).
e = d
d = c
c = b(rotated left 30)
b = a
a = a(rotated left 5) + SHA function() + e + k +
Word[i]
Add a, b, c, d and e to the hash output.
Output the concatenation (h0, h1, h2, h3, h4)
which is the message digest.
(2) t = new Track Info (RFID’, location, date, time)
Keep track of particular employee at different time.
(3) a = get Attendence Info (RFID’, Date)
Calculate employee attendance for particular
period.
4.2 Block Diagram of the System
Block diagram of employee management system
using cloud based RFID authentication is
illustrated in Figure 6. System contains the
following parts:
(i) RFID Reader:
It is used to read the tags using radio channels and
passes to the verifier for the authentication.
(ii) Webcam:
Webcam is used to take the snapshot when reader
tries to read the tag.
Figure 6: Employee management system using Cloud based
RFID authentication
47 International Journal for Modern Trends in Science and Technology
Volume: 2 | Issue: 10 | October 2016 | ISSN: 2455-3778IJMTST
iii. Cloud Service provider:
Cloud service providers are those who provide
private/public cloud. Different terminals can be
connected to the cloud through the internet
network. Deploying employee database, tracking
database, admin web service module on the public
cloud enable users to access database and web
service from anywhere/anytime using Internet.
iv. Admin:
Admin may be the individual machine which has
administrative functionality. Admin is connected to
cloud service provider via internet connectivity.
Admin’s web service is deployed on the public
cloud which client can access.
v. Client:
Client may be the individual machine or a thin
client. Client is connected to cloud service provider
using internet connectivity.
V. IMPLEMENTATION
In this system of employee management, a new
cloud based RFID authentication protocol is
developed which provides security and
confidentiality. It helps for calculating attendance,
salary of an employee and also keeps a track of
him/her. It provides other advantages like
deployment cost savings, pervasiveness of service
and scalability. Also, Comparison of the tag
verification complexity in traditional sever based
model, server-less model and cloud-based RFID
model is shown in Figure 7. Both server-based and
server less RFID authentication protocols depends
on search through the database or AL to find
matching TID. It makes computational complexity
to verify tags as O (n), where n is number of tags. It
means these two protocols are not well scalable. In
proposed protocol index H(R|T|S) is generated by
tag, it is then send to reader. Reader then read the
matched record from EHT instead of searching
through all TID’s. Hence, complexity of proposed
scheme is only O (1). That means, itis better
scalable than most of the other protocols.
Figure 7: Comparison in the complexity of protocols
Figure 8: Scalability v/s tag verification complexity graph
VI. CONCLUSION
RFID Based Employee Management System is
systematically characterizes the reliability of RFID
systems and its dependence on various practical
factors. The results will provide important
guidelines for real world deployment of RFID-based
tracking applications as well as simple yet effective
solutions to guarantee reliability. Reading items
and objects in motion can be done accurately using
RFID. A system developed with a log in windows
enables security and the overall cost of
implementing the system may seem high but after
a year of running the system, very high benefits will
be realized. The whole system is very convenient
and saves much on time.
REFERENCES
[1] D. Lakshmi and M. Kumar, “A Pilot Project for Postal
Parcel Tracking Using UHF RFID Tags”, Proceedings
of Annual Seminar on C-DAC Noida Technologies
(ASCNT), pp 28-33, February, 2008.
[2] Charles A. Walton, "Portable Radio Frequency
Emitting Identifier", U.S. Patent 4,384,288 issue
date May 17, 1983.
[3] C. Englund and H. Wallin, “RFID in Wireless Sensor
Network”, Tech. Report, Department of Signals and
Systems, Chalmers University of Technology,
Sweden, pp.1-69,2004.
[4] Lalit Kumar and ChandanMaity, “ Design and
Development of Low Cost UHF Reader”, Proceedings
of Annual Seminar on CDAC Noida Technologies
(ASCNT), C-DAC, Noida, pp. 215-222, March, 2009.
[5] SourishBehera and Rajesh Kushwaha, “ RFID Based
People Management System”, Proceedings of Annual
Seminar on C-DAC Noida Technologies (ASCNT),
C-DAC, Noida, pp. 227-234, March, 2009.
[6] Bill Glover and Himanshu Bhatt , “RFID Essentials”,
O'Reilly Media, A Text Book, Edition 2006 ISBN
0-596-00944-5, pp. 88- 89,2006.
[7] Unnati A. Patel, “Student Management System
Based on RFID Technology”, International Journal of
Emerging Trends & Technology in Computer Science
48 International Journal for Modern Trends in Science and Technology
A Novel RFID Readers Employee Management System
(IJETTCS) , Vol. 2, Issue 6, ISSN 2278-6856,pp.
173-178, November – December 2013.
[8] Paolo Magrassi,” The Role Of Auto Identification
Technologies”, Strategic Analysis Report, Gartner
Research Group, Stamford, USA, 2002.
[9] Miles and Stephen Bell ,”RFID Technology and
Applications”, RFID Jounal, London: Cambridge
University Press, Orlando, pp. 6– 8,2011.

More Related Content

What's hot

Novel construction of Secure RFID Authentication Protocol
Novel construction of Secure RFID Authentication ProtocolNovel construction of Secure RFID Authentication Protocol
Novel construction of Secure RFID Authentication ProtocolCSCJournals
 
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...Information Security Awareness Group
 
RFID Technology An Overview
RFID Technology An OverviewRFID Technology An Overview
RFID Technology An Overviewijtsrd
 
Survey on information sharing
Survey on information sharingSurvey on information sharing
Survey on information sharingijcisjournal
 
IRJET - Lightweight ECC based RFID Authentication Protocol
IRJET - Lightweight ECC based RFID Authentication ProtocolIRJET - Lightweight ECC based RFID Authentication Protocol
IRJET - Lightweight ECC based RFID Authentication ProtocolIRJET Journal
 
A Review on QR Code for Hiding Private Information
A Review on QR Code for Hiding Private InformationA Review on QR Code for Hiding Private Information
A Review on QR Code for Hiding Private InformationIRJET Journal
 
3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networks3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networksAlexander Decker
 
Radio Frequency Identification
Radio Frequency IdentificationRadio Frequency Identification
Radio Frequency IdentificationNadeem Raza
 
Microsoft Biz Talk Rfid 2009 – Connecting The Extreme Edge To The Cloud
Microsoft Biz Talk Rfid 2009 – Connecting The Extreme Edge To The CloudMicrosoft Biz Talk Rfid 2009 – Connecting The Extreme Edge To The Cloud
Microsoft Biz Talk Rfid 2009 – Connecting The Extreme Edge To The Cloudrsnarayanan
 
A research survey rfid security & privacy issue
A research survey rfid security & privacy issueA research survey rfid security & privacy issue
A research survey rfid security & privacy issuecsandit
 
Ug 3 1 r19 cse syllabus
Ug 3 1 r19 cse syllabusUg 3 1 r19 cse syllabus
Ug 3 1 r19 cse syllabusSubbuBuddu
 
Unicaseeds Demo Days - Cryptolab
Unicaseeds Demo Days - CryptolabUnicaseeds Demo Days - Cryptolab
Unicaseeds Demo Days - CryptolabUnicaseed
 
Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
	Monitoring and Centering a Remote Discrete Using Rfid through Sim Module	Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
Monitoring and Centering a Remote Discrete Using Rfid through Sim Moduleinventionjournals
 
Machine Readable Travel Documents (MRTD) - Biometric Passport
Machine Readable Travel Documents (MRTD) - Biometric PassportMachine Readable Travel Documents (MRTD) - Biometric Passport
Machine Readable Travel Documents (MRTD) - Biometric PassportTariq Tauheed
 

What's hot (17)

C361520
C361520C361520
C361520
 
Novel construction of Secure RFID Authentication Protocol
Novel construction of Secure RFID Authentication ProtocolNovel construction of Secure RFID Authentication Protocol
Novel construction of Secure RFID Authentication Protocol
 
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
 
RFID Technology An Overview
RFID Technology An OverviewRFID Technology An Overview
RFID Technology An Overview
 
Survey on information sharing
Survey on information sharingSurvey on information sharing
Survey on information sharing
 
IRJET - Lightweight ECC based RFID Authentication Protocol
IRJET - Lightweight ECC based RFID Authentication ProtocolIRJET - Lightweight ECC based RFID Authentication Protocol
IRJET - Lightweight ECC based RFID Authentication Protocol
 
A Review on QR Code for Hiding Private Information
A Review on QR Code for Hiding Private InformationA Review on QR Code for Hiding Private Information
A Review on QR Code for Hiding Private Information
 
3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networks3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networks
 
Radio Frequency Identification
Radio Frequency IdentificationRadio Frequency Identification
Radio Frequency Identification
 
Microsoft Biz Talk Rfid 2009 – Connecting The Extreme Edge To The Cloud
Microsoft Biz Talk Rfid 2009 – Connecting The Extreme Edge To The CloudMicrosoft Biz Talk Rfid 2009 – Connecting The Extreme Edge To The Cloud
Microsoft Biz Talk Rfid 2009 – Connecting The Extreme Edge To The Cloud
 
A research survey rfid security & privacy issue
A research survey rfid security & privacy issueA research survey rfid security & privacy issue
A research survey rfid security & privacy issue
 
B0110508
B0110508B0110508
B0110508
 
Ug 3 1 r19 cse syllabus
Ug 3 1 r19 cse syllabusUg 3 1 r19 cse syllabus
Ug 3 1 r19 cse syllabus
 
Unicaseeds Demo Days - Cryptolab
Unicaseeds Demo Days - CryptolabUnicaseeds Demo Days - Cryptolab
Unicaseeds Demo Days - Cryptolab
 
Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
	Monitoring and Centering a Remote Discrete Using Rfid through Sim Module	Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
 
Co4301524529
Co4301524529Co4301524529
Co4301524529
 
Machine Readable Travel Documents (MRTD) - Biometric Passport
Machine Readable Travel Documents (MRTD) - Biometric PassportMachine Readable Travel Documents (MRTD) - Biometric Passport
Machine Readable Travel Documents (MRTD) - Biometric Passport
 

Viewers also liked

Aircraft Electrical Power Generation & Distribution System Units Through an A...
Aircraft Electrical Power Generation & Distribution System Units Through an A...Aircraft Electrical Power Generation & Distribution System Units Through an A...
Aircraft Electrical Power Generation & Distribution System Units Through an A...IJMTST Journal
 
Modeling Optimization Voltage Index Unified Power Flow Controller Equivalent ...
Modeling Optimization Voltage Index Unified Power Flow Controller Equivalent ...Modeling Optimization Voltage Index Unified Power Flow Controller Equivalent ...
Modeling Optimization Voltage Index Unified Power Flow Controller Equivalent ...IJMTST Journal
 
A Comparative Analysis of Intelligent Techniques to obtain MPPT by Metaheuris...
A Comparative Analysis of Intelligent Techniques to obtain MPPT by Metaheuris...A Comparative Analysis of Intelligent Techniques to obtain MPPT by Metaheuris...
A Comparative Analysis of Intelligent Techniques to obtain MPPT by Metaheuris...IJMTST Journal
 
Power Quality Improvement of Utility Current in Grid Connected Photovoltaic S...
Power Quality Improvement of Utility Current in Grid Connected Photovoltaic S...Power Quality Improvement of Utility Current in Grid Connected Photovoltaic S...
Power Quality Improvement of Utility Current in Grid Connected Photovoltaic S...IJMTST Journal
 
Low Power Implementation of Booth’s Multiplier using Reversible Gates
Low Power Implementation of Booth’s Multiplier using Reversible GatesLow Power Implementation of Booth’s Multiplier using Reversible Gates
Low Power Implementation of Booth’s Multiplier using Reversible GatesIJMTST Journal
 
Comparative Study of Speed Characteristics of DC Motor with and without Contr...
Comparative Study of Speed Characteristics of DC Motor with and without Contr...Comparative Study of Speed Characteristics of DC Motor with and without Contr...
Comparative Study of Speed Characteristics of DC Motor with and without Contr...IJMTST Journal
 
A Review on Optimal Location and Parameter Settings of FACTS Devices in Power...
A Review on Optimal Location and Parameter Settings of FACTS Devices in Power...A Review on Optimal Location and Parameter Settings of FACTS Devices in Power...
A Review on Optimal Location and Parameter Settings of FACTS Devices in Power...IJMTST Journal
 
Average Phase-Leg Technique on Coupling Impedance Impact Modular Inverter Par...
Average Phase-Leg Technique on Coupling Impedance Impact Modular Inverter Par...Average Phase-Leg Technique on Coupling Impedance Impact Modular Inverter Par...
Average Phase-Leg Technique on Coupling Impedance Impact Modular Inverter Par...IJMTST Journal
 
Performance Improved Multipliers Based on Non-Redundant Radix-4 Signed-Digit ...
Performance Improved Multipliers Based on Non-Redundant Radix-4 Signed-Digit ...Performance Improved Multipliers Based on Non-Redundant Radix-4 Signed-Digit ...
Performance Improved Multipliers Based on Non-Redundant Radix-4 Signed-Digit ...IJMTST Journal
 
Time and Low Power Operation Using Embedded Dram to Gain Cell Data Retention
Time and Low Power Operation Using Embedded Dram to Gain Cell Data RetentionTime and Low Power Operation Using Embedded Dram to Gain Cell Data Retention
Time and Low Power Operation Using Embedded Dram to Gain Cell Data RetentionIJMTST Journal
 
Improvement in Error Resilience in BIST using hamming code
Improvement in Error Resilience in BIST using hamming codeImprovement in Error Resilience in BIST using hamming code
Improvement in Error Resilience in BIST using hamming codeIJMTST Journal
 
Reactive Power Sharing in Islanded Microgrid by Droop Control Method
Reactive Power Sharing in Islanded Microgrid by Droop Control MethodReactive Power Sharing in Islanded Microgrid by Droop Control Method
Reactive Power Sharing in Islanded Microgrid by Droop Control MethodIJMTST Journal
 
Error Identification in RAM using Input Vector Monitoring Concurrent BIST Arc...
Error Identification in RAM using Input Vector Monitoring Concurrent BIST Arc...Error Identification in RAM using Input Vector Monitoring Concurrent BIST Arc...
Error Identification in RAM using Input Vector Monitoring Concurrent BIST Arc...IJMTST Journal
 
Aluminum Doped CdSe Thin Films: Structural Characterization
Aluminum Doped CdSe Thin Films: Structural CharacterizationAluminum Doped CdSe Thin Films: Structural Characterization
Aluminum Doped CdSe Thin Films: Structural CharacterizationIJMTST Journal
 
Predictive Analytics in Education Context
Predictive Analytics in Education ContextPredictive Analytics in Education Context
Predictive Analytics in Education ContextIJMTST Journal
 
An Energy Efficiency Systematic Cell Design Methodology Using Inputs XOR & XNOR
An Energy Efficiency Systematic Cell Design Methodology Using Inputs XOR & XNORAn Energy Efficiency Systematic Cell Design Methodology Using Inputs XOR & XNOR
An Energy Efficiency Systematic Cell Design Methodology Using Inputs XOR & XNORIJMTST Journal
 
Wind-Turbine Asynchronous Generator Synchronous Condenser with Excitation in ...
Wind-Turbine Asynchronous Generator Synchronous Condenser with Excitation in ...Wind-Turbine Asynchronous Generator Synchronous Condenser with Excitation in ...
Wind-Turbine Asynchronous Generator Synchronous Condenser with Excitation in ...IJMTST Journal
 
Smart Grid Data Centers Distributed & ICTs Sustainability on Generation Energ...
Smart Grid Data Centers Distributed & ICTs Sustainability on Generation Energ...Smart Grid Data Centers Distributed & ICTs Sustainability on Generation Energ...
Smart Grid Data Centers Distributed & ICTs Sustainability on Generation Energ...IJMTST Journal
 
Data Volume Compression Using BIST to get Low-Power Pseudorandom Test Pattern...
Data Volume Compression Using BIST to get Low-Power Pseudorandom Test Pattern...Data Volume Compression Using BIST to get Low-Power Pseudorandom Test Pattern...
Data Volume Compression Using BIST to get Low-Power Pseudorandom Test Pattern...IJMTST Journal
 

Viewers also liked (19)

Aircraft Electrical Power Generation & Distribution System Units Through an A...
Aircraft Electrical Power Generation & Distribution System Units Through an A...Aircraft Electrical Power Generation & Distribution System Units Through an A...
Aircraft Electrical Power Generation & Distribution System Units Through an A...
 
Modeling Optimization Voltage Index Unified Power Flow Controller Equivalent ...
Modeling Optimization Voltage Index Unified Power Flow Controller Equivalent ...Modeling Optimization Voltage Index Unified Power Flow Controller Equivalent ...
Modeling Optimization Voltage Index Unified Power Flow Controller Equivalent ...
 
A Comparative Analysis of Intelligent Techniques to obtain MPPT by Metaheuris...
A Comparative Analysis of Intelligent Techniques to obtain MPPT by Metaheuris...A Comparative Analysis of Intelligent Techniques to obtain MPPT by Metaheuris...
A Comparative Analysis of Intelligent Techniques to obtain MPPT by Metaheuris...
 
Power Quality Improvement of Utility Current in Grid Connected Photovoltaic S...
Power Quality Improvement of Utility Current in Grid Connected Photovoltaic S...Power Quality Improvement of Utility Current in Grid Connected Photovoltaic S...
Power Quality Improvement of Utility Current in Grid Connected Photovoltaic S...
 
Low Power Implementation of Booth’s Multiplier using Reversible Gates
Low Power Implementation of Booth’s Multiplier using Reversible GatesLow Power Implementation of Booth’s Multiplier using Reversible Gates
Low Power Implementation of Booth’s Multiplier using Reversible Gates
 
Comparative Study of Speed Characteristics of DC Motor with and without Contr...
Comparative Study of Speed Characteristics of DC Motor with and without Contr...Comparative Study of Speed Characteristics of DC Motor with and without Contr...
Comparative Study of Speed Characteristics of DC Motor with and without Contr...
 
A Review on Optimal Location and Parameter Settings of FACTS Devices in Power...
A Review on Optimal Location and Parameter Settings of FACTS Devices in Power...A Review on Optimal Location and Parameter Settings of FACTS Devices in Power...
A Review on Optimal Location and Parameter Settings of FACTS Devices in Power...
 
Average Phase-Leg Technique on Coupling Impedance Impact Modular Inverter Par...
Average Phase-Leg Technique on Coupling Impedance Impact Modular Inverter Par...Average Phase-Leg Technique on Coupling Impedance Impact Modular Inverter Par...
Average Phase-Leg Technique on Coupling Impedance Impact Modular Inverter Par...
 
Performance Improved Multipliers Based on Non-Redundant Radix-4 Signed-Digit ...
Performance Improved Multipliers Based on Non-Redundant Radix-4 Signed-Digit ...Performance Improved Multipliers Based on Non-Redundant Radix-4 Signed-Digit ...
Performance Improved Multipliers Based on Non-Redundant Radix-4 Signed-Digit ...
 
Time and Low Power Operation Using Embedded Dram to Gain Cell Data Retention
Time and Low Power Operation Using Embedded Dram to Gain Cell Data RetentionTime and Low Power Operation Using Embedded Dram to Gain Cell Data Retention
Time and Low Power Operation Using Embedded Dram to Gain Cell Data Retention
 
Improvement in Error Resilience in BIST using hamming code
Improvement in Error Resilience in BIST using hamming codeImprovement in Error Resilience in BIST using hamming code
Improvement in Error Resilience in BIST using hamming code
 
Reactive Power Sharing in Islanded Microgrid by Droop Control Method
Reactive Power Sharing in Islanded Microgrid by Droop Control MethodReactive Power Sharing in Islanded Microgrid by Droop Control Method
Reactive Power Sharing in Islanded Microgrid by Droop Control Method
 
Error Identification in RAM using Input Vector Monitoring Concurrent BIST Arc...
Error Identification in RAM using Input Vector Monitoring Concurrent BIST Arc...Error Identification in RAM using Input Vector Monitoring Concurrent BIST Arc...
Error Identification in RAM using Input Vector Monitoring Concurrent BIST Arc...
 
Aluminum Doped CdSe Thin Films: Structural Characterization
Aluminum Doped CdSe Thin Films: Structural CharacterizationAluminum Doped CdSe Thin Films: Structural Characterization
Aluminum Doped CdSe Thin Films: Structural Characterization
 
Predictive Analytics in Education Context
Predictive Analytics in Education ContextPredictive Analytics in Education Context
Predictive Analytics in Education Context
 
An Energy Efficiency Systematic Cell Design Methodology Using Inputs XOR & XNOR
An Energy Efficiency Systematic Cell Design Methodology Using Inputs XOR & XNORAn Energy Efficiency Systematic Cell Design Methodology Using Inputs XOR & XNOR
An Energy Efficiency Systematic Cell Design Methodology Using Inputs XOR & XNOR
 
Wind-Turbine Asynchronous Generator Synchronous Condenser with Excitation in ...
Wind-Turbine Asynchronous Generator Synchronous Condenser with Excitation in ...Wind-Turbine Asynchronous Generator Synchronous Condenser with Excitation in ...
Wind-Turbine Asynchronous Generator Synchronous Condenser with Excitation in ...
 
Smart Grid Data Centers Distributed & ICTs Sustainability on Generation Energ...
Smart Grid Data Centers Distributed & ICTs Sustainability on Generation Energ...Smart Grid Data Centers Distributed & ICTs Sustainability on Generation Energ...
Smart Grid Data Centers Distributed & ICTs Sustainability on Generation Energ...
 
Data Volume Compression Using BIST to get Low-Power Pseudorandom Test Pattern...
Data Volume Compression Using BIST to get Low-Power Pseudorandom Test Pattern...Data Volume Compression Using BIST to get Low-Power Pseudorandom Test Pattern...
Data Volume Compression Using BIST to get Low-Power Pseudorandom Test Pattern...
 

Similar to A Novel RFID Readers Employee Management System

Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...IRJET Journal
 
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodA Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodLuz Martinez
 
Radio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsRadio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsAhmad Sharifi
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...IRJET Journal
 
Secured authentication of radio-frequency identification system using PRESENT...
Secured authentication of radio-frequency identification system using PRESENT...Secured authentication of radio-frequency identification system using PRESENT...
Secured authentication of radio-frequency identification system using PRESENT...IJECEIAES
 
RFID Technology: An Upgradation for Society
RFID Technology: An Upgradation for SocietyRFID Technology: An Upgradation for Society
RFID Technology: An Upgradation for SocietyIRJET Journal
 
3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networks3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networksAlexander Decker
 
IRJET- Examination Room Guidance System using RFID and Arduino
IRJET-  	  Examination Room Guidance System using RFID and ArduinoIRJET-  	  Examination Room Guidance System using RFID and Arduino
IRJET- Examination Room Guidance System using RFID and ArduinoIRJET Journal
 
07.dsn.rfid reliability
07.dsn.rfid reliability07.dsn.rfid reliability
07.dsn.rfid reliabilitynikhiltiware
 
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleIJERA Editor
 
Internet of Things and its Enabling Technologies - RFID
Internet of Things  and its Enabling Technologies - RFIDInternet of Things  and its Enabling Technologies - RFID
Internet of Things and its Enabling Technologies - RFIDSwetha Kogatam
 
A RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUE
A RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUEA RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUE
A RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUEcscpconf
 
RFID Based Security and Access Control System using ARDUINO
RFID Based Security and Access Control System using ARDUINORFID Based Security and Access Control System using ARDUINO
RFID Based Security and Access Control System using ARDUINOIJMTST Journal
 
Radio_Frequency_Identification_RFID_Based_Car_Park.pdf
Radio_Frequency_Identification_RFID_Based_Car_Park.pdfRadio_Frequency_Identification_RFID_Based_Car_Park.pdf
Radio_Frequency_Identification_RFID_Based_Car_Park.pdfManju Badiger
 

Similar to A Novel RFID Readers Employee Management System (20)

Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
 
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodA Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
 
Radio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsRadio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutions
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
RFID security ppt
RFID security pptRFID security ppt
RFID security ppt
 
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
 
Secured authentication of radio-frequency identification system using PRESENT...
Secured authentication of radio-frequency identification system using PRESENT...Secured authentication of radio-frequency identification system using PRESENT...
Secured authentication of radio-frequency identification system using PRESENT...
 
RFID Technology: An Upgradation for Society
RFID Technology: An Upgradation for SocietyRFID Technology: An Upgradation for Society
RFID Technology: An Upgradation for Society
 
3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networks3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networks
 
IRJET- Examination Room Guidance System using RFID and Arduino
IRJET-  	  Examination Room Guidance System using RFID and ArduinoIRJET-  	  Examination Room Guidance System using RFID and Arduino
IRJET- Examination Room Guidance System using RFID and Arduino
 
07.dsn.rfid reliability
07.dsn.rfid reliability07.dsn.rfid reliability
07.dsn.rfid reliability
 
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
 
Rfid
RfidRfid
Rfid
 
Internet of Things and its Enabling Technologies - RFID
Internet of Things  and its Enabling Technologies - RFIDInternet of Things  and its Enabling Technologies - RFID
Internet of Things and its Enabling Technologies - RFID
 
A RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUE
A RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUEA RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUE
A RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUE
 
RFID Based Security and Access Control System using ARDUINO
RFID Based Security and Access Control System using ARDUINORFID Based Security and Access Control System using ARDUINO
RFID Based Security and Access Control System using ARDUINO
 
Rfid3
Rfid3Rfid3
Rfid3
 
Rfid for smart city
Rfid for smart cityRfid for smart city
Rfid for smart city
 
Radio_Frequency_Identification_RFID_Based_Car_Park.pdf
Radio_Frequency_Identification_RFID_Based_Car_Park.pdfRadio_Frequency_Identification_RFID_Based_Car_Park.pdf
Radio_Frequency_Identification_RFID_Based_Car_Park.pdf
 

Recently uploaded

Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 

Recently uploaded (20)

Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 

A Novel RFID Readers Employee Management System

  • 1. 43 International Journal for Modern Trends in Science and Technology Volume: 2 | Issue: 10 | October 2016 | ISSN: 2455-3778IJMTST A Novel RFID Readers Employee Management System Avula Surendra1 | K. Madanna2 1PG Scholar, Department of ECE, Geethanjali College of Engineering & Technology, Kurnool, AP, India. 2Associate Professor, Department of ECE, Geethanjali College of Engineering & Technology, Kurnool, AP, India. Radio Frequency Identification (RFID) is a new generation of Auto Identification and Data collection technology which helps to automate business processes and allows identification of large number of tagged objects using radio waves. RFID based Employee Management System (EMS) would allow complete hands-free access control, monitoring the whereabouts of employee and record the attendance of the employee as well. The access tag can be read up to 5 (~16 feet) meters from the RFID reader, which usually eliminates the need to handle the tag or to walk very close to the reader. This freedom is particularly important to handicapped workers, staff carrying packages. The proposed system is based on UHF RFID readers, supported with antennas at gate and transaction sections, and employee identification cards containing RFID transponders which are able to electronically store information that can be read / written even without the physical contact with the help of radio medium. This paper presents the experiments conducted to set up RFID based EMS. KEYWORDS: API, GUI, RFID, Readers, Tags/Transponders, UHF Copyright © 2016 International Journal for Modern Trends in Science and Technology All rights reserved. I. INTRODUCTION The objective of the paper is to discuss the issues of Radio frequency identification (RFID), what are the concepts of employee management system, cloud based employee management system and give proposed cloud based RFID authentication protocol. RFID is a technology, which has gained increased attention of researchers and practitioner’s. This enables acquisition of data about an object without need of direct line of sight from transponders and readers [4]. To make RFID system more secure, authentication is one solution. It also maintains the security and privacy of system. Tag identification without authentication raise a security problem. Attackers sometime may tap, change and resend messages from the tag as if it has the tagged object. An Employee management system using RFID becomes efficient on cloud system because it has several advantages like (1) Verifier is enabled to authenticate the tagged objects using any reader over internet. (2) Pay on demand resource distribution is effective for small and medium scale organizations. (3) Cloud is more robust due to resource sufficiency. However, this cloud-based RFID is in sufficient in two aspects. (1) Most current works focused on functionalities without giving importance to security and privacy. (2)No study shows that classical RFID schemes meet the security and privacy requirements of cloud based systems. This system can be effectively used for calculating the attendance, salary of a particular employee for particular month and for track keeping of him/her. Classical RFID schemes when moved to cloud, they are having the problems of insecure database, privacy of tags and a reader gets revealed which is not acceptable. Because cloud is publically available to any one and the clients cannot fully trust on the cloud service providers. So to recover from these drawbacks, cloud-based RFID authentication protocol should get developed. It also secures the database using hashing technique like SHA1 and maintains the ABSTRACT
  • 2. 44 International Journal for Modern Trends in Science and Technology A Novel RFID Readers Employee Management System privacy of tags, readers [3]. Successful implementation of this system brings the advantages like deployment cost saving, pervasiveness of authentication. Tag verification complexity reduces to O(1). It preserves the privacy of tag and reader holders. It makes the database more secure. II. RELATED WORK 2.1 Traditional RFID There is an extensive work on RFID authentication schemes which are, backend server based and server-less [1] [2]. The back end server based RFID is shown in Figure 1. It is composed of tags, readers and backend server. Readers identify and verify the tags by querying to backend server. However, the drawback is limited mobility of readers. Figure 1: the backend-server-based RFID architecture. The server-less RFID scheme is shown in Figure 2. It is composed of tags, readers and CA (Certification Agency). Figure 2: Server-less RFID architecture There are two phases in server less scheme: initialization and authentication [5]. The mobile reader accesses the CA (Certification Agency) and downloads the AL (Access List) through the secure connection in an initialization phase. The mobile reader is generally a portable device such as notebook computer or smart phones. It might be stolen. Then AL is stored in it. It may wrongly be used to imitate the tags. Credentials of tag authentication are derived with the help of tags key and RID. It makes AL exclusively usable for the reader. But as a result, it is not possible for tag to create a valid request without the RID. In the authentication phase, the reader challenges a tag with RID, waiting for tags response with H (RID, Kt). The reader then searches its AL and finds the matched value to verify the Kt. It then identifies the TID. Sever-less RFID architecture provides readers with the scalability. However, there are drawbacks in server-less authentication protocol. (1) All they transmit RID in plaintext. (2) Searching through AL has complexity of O (N), where N denotes the number of tags. (3) Computational processes of searching and verifying are executed all by single personnel portable device, which reduces the performance significantly. 2.2 Requirements of cloud based RFID Cloud based RFID has many advantages, but has the challenges of security and privacy. Existing authentication protocols are inapplicable to cloud based employee management system because of lacking two primary capabilities. Firstly, instead of providing protection to front end communication, protection of backend communication is important in Cloud based authentication schemes. Also in cloud based schemes, mobile readers often accesses the public cloud using open wireless connections. There are two solutions for this issue. (1) Establish VPN connections among readers and cloud in a network layer. (2) In application layer design an RFID authentication protocol protecting backend security [1]. Secondly, these schemes are required to prevent the privacy of tags/readers from untrustworthy cloud. Therefore, readers/tags should provide the confidentiality about data storage, which is against the cloud. III. PROPOSED SOLUTION 3.1 VPN Agency Existing cloud based RFID system has four participants. They are tag owner, verifier, VPN agency and cloud provider [1] [6]. The VPN agency has VPN routing between readers and the cloud. Cloud service of RFID authentication is given by cloud provider to the verifier and tag owner. VPN routing makes communication between the reader
  • 3. 45 International Journal for Modern Trends in Science and Technology Volume: 2 | Issue: 10 | October 2016 | ISSN: 2455-3778IJMTST and cloud as secure as in privet intranet. Attackers are able to intercept, block and resend the TCP/IP packets in the network layer. On the other hand, network-layer-anonymity of readers accessing the cloud is achieved. 3.2 Encrypted Hash Table Figure 3: Proposed Cloud-based RFID authentication scheme An EHT is proposed to prevent client’s data confidentiality and access anonymity from revealing to the cloud provider. It is illustrated in Figure 4. The index which is a hash digest H (RID||TID||SID) uniquely denotes the session with SID from the reader with RID to tag with TID. The record indexed by H (RID||TID||SID) is E (RID||TID||SID||Data). It is a cipher text according to the reader defined encryption algorithm with a reader managed key. The RID field is used to check the integrity of the cipher text after decryption by reader. Mutual authentication is done using TID between reader and the tag. The SID field is the identifier which is a term in a reader defined sequence. The data field stores any application data such as location of tag and access time. 3.3 Proposed Cloud-based RFID authentication Protocol The proposed cloud based RFID authentication protocol is illustrated in Figure 4 [1]. For simplicity, replace RID by R, replace TID by T and SID by S. Encrypted function E (RID||TID||SID||Data) in EHT is now simplified to E (R||T||S). Other notations listed in this section are as shown in Table 1. S+1 is the next incremental term after Sth term in the sequence defined by reader. 1st step is for the reader to obtain T and S. The tag generates H (T||R||S) as an authentication request and sends generated authentication request to the reader. H (R||T||S) acts as an index to the cipher text E (R||T||S). Figure 4: Proposed cloud based RFID authentication Protocol. The reader does the following operation. (1) It reads the cipher text from the cloud EHT and decrypts it in the useful form (2) It then verifies R for integrity and obtains T and S. Authentication of the tag take place in 2nd step. The reader challenges the tag by generating a random number Nr. The tag calculates hash based on challenge Nr received from reader. The tag uses H (R||T||Nr) to generate random nonce Nt and sends Nt as its challenge to the reader. Synchronization of S between the encrypted hash table (EHT) and the tag take place in 3rd step. The reader checks the integrity after reading the next record indexed by H (R||T||(S+1)) from the EHT. Tag has been desynchronized if the valid record is present in EHT. The reader continues the same action until it finds the last valid record, assuming its SID is M. In 4th step the cloud EHT gets updated. In EHT, cipher text E (R||T||M’) having index H (R||T||M’) is added by reader, where M’=M+1. A message of H (R||T||M’) + H (E (R||T||M’)) is send back to the reader from the cloud to confirm that the updating is successful. 5th step is to send a comprehensive response to be verified by the tag. In response to tag’s random challenge Nt, reader calculates H (R||T||Nt). For simple encryption, response is XORed with M’. Encrypted M’ is sent to tag with index H (R||T||M’) and get verified by a tag. 6th step does authentication of the reader and also it repairs the desynchronization. To obtain M’, tag calculates H (R||T||Nt). Calculated value gets XORed with the received value H(R||T||Nt) M’. It then calculates and verifies H(R||T||M’). If
  • 4. 46 International Journal for Modern Trends in Science and Technology A Novel RFID Readers Employee Management System success, it means the M’ is not modified. By updating S=M’ on the tag, synchronization is achieved. IV. IMPLEMENTATION 4.1 Mathematical Model In the proposed cloud based RFID authentication scheme readers anonymously access the cloud through wireless or wired connections. An encrypted hash table stores the client’s secrets in encrypted form so that secrets should not be easily revealed to the cloud [3]. The first RFID authentication protocol is proposed which preserves the privacy of readers and tags. Defining System: Consider an organization with N employees S = {} Identifying input: Let, S = {Db, U, T, A, R, Cp} Where, Db = System database with two tables: - Employee - RFID track U is set of users such that,u1, u2, u3… un ϵ U T is set of users track such that, t1, t2, t3 ….tn ϵ T A is set of user’s attendance such that, a1, a2, a3 …an ϵ A R is set of user’s RFID tag such that, r1, r2...rn ϵ R Venn diagram of the System: Figure5: Set diagram of employee management system Functionalities: The functions of the system are as follows: (1) U = new Employee (u_id, u_name, u_add, RFID’) Where, RFID’ = SHA1 (RFID tag) SHA1 algorithm: Input: Max 264-1 bit uses 512 bit block size Output: 160 bit digests Steps: Padding message with single one followed by zeros until the final block has 448 bits and appends the size of original message as an unsigned integer of 64 bit. Initialize the 5 hash blocks (h0, h1, h2, h3, h4) to the specific constants defined in SHA1 standard Hash (for each 512 bit block) Allocate an 80 words array for the message schedule First 16 words are obtained by splitting message into 32 bit block. Rests of the words are generated by following algorithm: Word [i-3] XOR Word [i-14] XOR Word [i-16] then left rotate it by 1 bit. Loop 80 times doing the following: Calculate SHA function() and constant K(these are based on current round number). e = d d = c c = b(rotated left 30) b = a a = a(rotated left 5) + SHA function() + e + k + Word[i] Add a, b, c, d and e to the hash output. Output the concatenation (h0, h1, h2, h3, h4) which is the message digest. (2) t = new Track Info (RFID’, location, date, time) Keep track of particular employee at different time. (3) a = get Attendence Info (RFID’, Date) Calculate employee attendance for particular period. 4.2 Block Diagram of the System Block diagram of employee management system using cloud based RFID authentication is illustrated in Figure 6. System contains the following parts: (i) RFID Reader: It is used to read the tags using radio channels and passes to the verifier for the authentication. (ii) Webcam: Webcam is used to take the snapshot when reader tries to read the tag. Figure 6: Employee management system using Cloud based RFID authentication
  • 5. 47 International Journal for Modern Trends in Science and Technology Volume: 2 | Issue: 10 | October 2016 | ISSN: 2455-3778IJMTST iii. Cloud Service provider: Cloud service providers are those who provide private/public cloud. Different terminals can be connected to the cloud through the internet network. Deploying employee database, tracking database, admin web service module on the public cloud enable users to access database and web service from anywhere/anytime using Internet. iv. Admin: Admin may be the individual machine which has administrative functionality. Admin is connected to cloud service provider via internet connectivity. Admin’s web service is deployed on the public cloud which client can access. v. Client: Client may be the individual machine or a thin client. Client is connected to cloud service provider using internet connectivity. V. IMPLEMENTATION In this system of employee management, a new cloud based RFID authentication protocol is developed which provides security and confidentiality. It helps for calculating attendance, salary of an employee and also keeps a track of him/her. It provides other advantages like deployment cost savings, pervasiveness of service and scalability. Also, Comparison of the tag verification complexity in traditional sever based model, server-less model and cloud-based RFID model is shown in Figure 7. Both server-based and server less RFID authentication protocols depends on search through the database or AL to find matching TID. It makes computational complexity to verify tags as O (n), where n is number of tags. It means these two protocols are not well scalable. In proposed protocol index H(R|T|S) is generated by tag, it is then send to reader. Reader then read the matched record from EHT instead of searching through all TID’s. Hence, complexity of proposed scheme is only O (1). That means, itis better scalable than most of the other protocols. Figure 7: Comparison in the complexity of protocols Figure 8: Scalability v/s tag verification complexity graph VI. CONCLUSION RFID Based Employee Management System is systematically characterizes the reliability of RFID systems and its dependence on various practical factors. The results will provide important guidelines for real world deployment of RFID-based tracking applications as well as simple yet effective solutions to guarantee reliability. Reading items and objects in motion can be done accurately using RFID. A system developed with a log in windows enables security and the overall cost of implementing the system may seem high but after a year of running the system, very high benefits will be realized. The whole system is very convenient and saves much on time. REFERENCES [1] D. Lakshmi and M. Kumar, “A Pilot Project for Postal Parcel Tracking Using UHF RFID Tags”, Proceedings of Annual Seminar on C-DAC Noida Technologies (ASCNT), pp 28-33, February, 2008. [2] Charles A. Walton, "Portable Radio Frequency Emitting Identifier", U.S. Patent 4,384,288 issue date May 17, 1983. [3] C. Englund and H. Wallin, “RFID in Wireless Sensor Network”, Tech. Report, Department of Signals and Systems, Chalmers University of Technology, Sweden, pp.1-69,2004. [4] Lalit Kumar and ChandanMaity, “ Design and Development of Low Cost UHF Reader”, Proceedings of Annual Seminar on CDAC Noida Technologies (ASCNT), C-DAC, Noida, pp. 215-222, March, 2009. [5] SourishBehera and Rajesh Kushwaha, “ RFID Based People Management System”, Proceedings of Annual Seminar on C-DAC Noida Technologies (ASCNT), C-DAC, Noida, pp. 227-234, March, 2009. [6] Bill Glover and Himanshu Bhatt , “RFID Essentials”, O'Reilly Media, A Text Book, Edition 2006 ISBN 0-596-00944-5, pp. 88- 89,2006. [7] Unnati A. Patel, “Student Management System Based on RFID Technology”, International Journal of Emerging Trends & Technology in Computer Science
  • 6. 48 International Journal for Modern Trends in Science and Technology A Novel RFID Readers Employee Management System (IJETTCS) , Vol. 2, Issue 6, ISSN 2278-6856,pp. 173-178, November – December 2013. [8] Paolo Magrassi,” The Role Of Auto Identification Technologies”, Strategic Analysis Report, Gartner Research Group, Stamford, USA, 2002. [9] Miles and Stephen Bell ,”RFID Technology and Applications”, RFID Jounal, London: Cambridge University Press, Orlando, pp. 6– 8,2011.