SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1978
HIGH SECURITY IN AUTOMATED FARE COLLECTION FOR TOLL SYSTEM
WITH NFC USING AES ALGORITHM
Shilpa. D1, Jayasri. R2, Sanjana. R3, M. Abirami4
1Shilpa. D, Anna University, Chennai
2Jayasri. R, Anna University, Chennai
3Sanjana. R, Anna University, Chennai
4M. Abirami, Department of Computer Science and Engineering, Panimalar Institute of Technology, Tamil Nadu, India
---------------------------------------------------------------------------***---------------------------------------------------------------------------
Abstract - AFC Automated Fare Collection is gaining
popularity in terms of public transportation where the
transportation fee is calculated based on the length of the
trip time or based on the trip distance, AFC can read the NFC
(Near Field Communication) tag from where AFC will gather
all the relevant data about the trip. As Technology is
growing, there will be security problem with the NFC card,
as many Smartphone comes with the same frequency that
are associated with the NFC card, so it became easy for any
user to change the information that are stored in the NFC,
information like the check in time or shorten the route they
have travelled that cause a drastic change in the price
calculation. Our proposed model will provide all the
necessary security. This proposed project provides
protection to the entrance data and to monitor the
behaviour of an individual user. This project demonstrates a
simple payment system using NFC tag and a smart phone for
AFC in metro and toll.
Key Words: NFC card, AFC, AES Algorithm, Mobile Payment,
Wallet creation
1. INTRODUCTION
As we all know, a normal toll collection takes a lot of time
and there are traffic jams and we won’t get the
transparency in toll amount collection. For this, the
introduction to RFID was done. It was also used for
tracing vehicles. The drawback of RFID was that, it doesn’t
work properly in the cloudy climate. To overcome this
drawback, we introduced NFC i.e. Near Field
Communication. Also, AFC (Automated Fare Collection) is
gaining popularity in terms of public transportation
where the transportation fees is calculated based on the
length of the trip time or based on the trip distance. AFC
can read the NFC (Near Field Communication) tag from
where AFC will gather all the relevant data about the trip.
As Technology is growing there will a security problem
with the NFC card, as many Smartphone comes with the
same frequency that are associated with the NFC card, so
it became easy for any user to change the information that
are stored in the NFC, information like the check in time
or shorten the route they travel that cause the drastic
change in the price calculation. Our proposed model will
provide all the necessary security.
1.1 Contactless Payment
Contactless payment systems are the credit cards and
debit cards, or other devices, including smartphones, that
use radio-frequency identification or near field
communication for making secure payments.
1.2 Mobile payment
Mobile payment the payment services operated for
financial regulation and performed using a mobile device.
Instead of paying with cheque, cash or credit cards, a
consumer can use a mobile to pay. Although the concept of
using currency systems has a long history, it is only in this
century that the technology to support such systems has
become widely available.
Mobile payment is been used all over the world in different
ways.
2. EXISTING SYSTEM
Automated Fare Collection (AFC) systems have been
globally deployed for decades to automate manual
ticketing and charging systems likes metros and toll,
where the trip charge can be calculated based on the
information that is stored in the NFC Card, provided in
the station. While the card is displayed, AFC will reduce
the amount based on the trip distance (trip time) and data
is stored in the NFC in plain text format, and these would
became a security problem as many smart phones are
provided with inbuilt NFC. More over the frequency that
the smart phones are provided is same as that is contained
in the card so it became easy for any user for tampering
the data in the card.
The trip information are sent to sever only at the time of
completion of the trip since it became hard to cross check
the information that are associated in the card while
calculating the fair.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1979
3. PROPOSED SYSTEM
The proposed system has two different methodology for
providing security in AFC system. Protection for Entrance
data and Fair collection. Protecting the Entrance Data is
the process in which, whenever the user enters the toll
then that entrance information will be encrypted and
transmit the encrypted information to the server. If user
changes any information in the card, that information will
not be changed in the server. At the fair calculating unit,
the card information is read and decrypted and also the
information is cross verified in the server. Based on the
result, the fair will be calculated and each log is
maintained in the server, to easily track the particular
user.
A complete environment for monitoring the behaviour of
an individual user is done by means of driving licence info,
insurance info .etc. And all this information is attached
with the NFC card. While providing the card to the toll
System, it automatically checks all the necessary
parameter as it is.
4. METHODOLOGY
Fig 1: Working module
Every individual can register their vehicle for a NFC tag.
This tag will be given a unique ID, feasible to use with that
vehicle only. And an account is created for the use of that
particular smart tag and maintain transaction history in
the database. The user needs to deposit some minimum
amount to this account.
Every time a vehicle approaches the toll booth, first the
presence of the vehicle is detected. It will in turn activate
the NFC circuit to read the NFC enabled smart phone. The
transaction will begin, depending upon the balance
available, toll amount will be deducted directly. The
information like the insurance and driving licence info is
checked at the same time as the payment. The software
updates the details in the Centralized database server. A
mechanism to generate the bill and will be sent to user as a
text message.
5. IMPLEMENTATION
Fig 2: Hardware assembly
5.1 Near Field Communication
NFC allows devices that are closely placed, to wirelessly
transfer data back and forth. The technology is almost like
Bluetooth, but NFC uses far less power and works over
much shorter distances.
In the world of consumers, producers, use of NFC
technology to initiate contactless payments via credit
cards or mobile devices. Rather than physically swiping
the plastic, consumers simply move their smartphone or
card across an NFC reader to automate transactions.
NFC payment technology already comes with most
Android and iOS devices and a growing number of credit
and debit cards. Now contactless payments are turning to
be mainstream, with a growing number of stores and
restaurants adding their own in-store NFC readers —
including McDonald's etc.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1980
Fig 3: NFC chip
5.2 How does it work?
For NFC, a user should either touch or show his phone to
an enabled device and he or she will be able to share data
without physically building up a connection. Nowadays,
this innovation has been set in many Android, Windows
and iOS phones. Hence, NFC has turned out to be more
necessary than any other technology in recent times,
especially when it's about mobile payments.
After installing the payment app on the phone, one needs
to tap the phone on the credit card terminal and a
connection will be made using NFC.
Presently, there are some NFC compatible cell phones like
Samsung's Galaxy Series, Google's Nexus Series, and the
iPhone. These are the following NFC applications that can
provide a layer of security to the transactions:
1. Google pay
2. Samsung pay
3. Apple pay
4. Android pay
5.3 Advantages of NFC
NFC technology comes with various security features that
help to protect financial data from prying eyes, including:
5.3.1 Proximity Protection
Contactless payment solutions work over short distances.
This proximity protection represents the first level of
defence in NFC.
5.3.2 User Initiation
To begin each transaction, the customer must initiate the
contactless payment process. This usually requires a NFC
application to be launched within the phone in order to
create a connection between the device and the reader. So
even if a thief gets closer, no transactions can happen in
standby mode.
5.3.3 Secure Element Validation
Whenever a connection has been made, the mobile device
has to be validated, this process assigns a unique digital
signature to every payment rather than transferring credit
card numbers between the device and the reader.
Working Arena
Fig 4: Implementation of NFC based toll collection system
6. ARCHITECTURE OF NFC BASED TOLL SYSTEM
The components of the NFC based toll collection system
technology work as follows:
6.1 User Registration & Wallet Creation
Initially user needs to register into bank application as fair
reduction would be based on the user account detail, then
the user needs to register their name in the server then
the server will generate the particular unique id to the
user. Based on that id sever can able to track the
particular user. Once the user logins, he or she needs to
add the particular amount to the server wallet or add the
corresponding account information in the server so that
the AFC will automatically reduce the amount from the
user account.
6.2 Vehicle Insurance Checking
Whenever a vehicle passes through a toll gate user uses
NFC tag to swipe through toll gate so that amount will be
deducted automatically. At the same time the automated
fair collection machine also checks for the vehicle
insurance to check whether it is valid or expired. If toll
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1981
machine finds that the insurance is expired it
automatically updates the database. Once vehicle
insurance expiry is found, vehicle will be blocked and it
cannot pass through the toll gate till the insurance amount
is reduced from the user account.
6.3 Track the particular User
Based upon the User ID we can track the particular user
and the amount of fair he paid when he passes through
the toll gate. If a vehicle is theft it becomes easy to track
vehicle and find it by law enforcement agencies.
6.4 Protecting User Entrance Data
Another way to avoid the data tampering by using NFC is
make that Process online and protect the entrance data.
Whenever the user enters into the station then the
information will be recorded into the NFC card as an
cipher text and as well as that information will be loaded
into the server with the time of entrance and the way that
user enter so that if any user try to change any
information in NFC card by using mobile phone, that
information will not be changed into the server, if user
place the card in the exit end then the AFC will cross verify
the data into the server and reduce the accurate amount
from the user account or wallet.
Fig 5: NFC based toll collection system
Database
server
Bank
Application
App
server
User
Login
Add Account Details (or) Add
Money to Wallet
Providing Entrance Data
User
Registration
Encrypt Data
Upload to
Server
Verify Data to
Reduce
Amount
Check Vehicle
Insurance Validity
Updating
Details
If Insurance Is Not
Valid and Verify
Police Data
Vehicle Blocked
Police
Uploads
Theft Vehicle
Details
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1982
Fig 6: Working of system
7. CONCLUSION
A new security system, named Near Field Communication,
for automatic fare collection in toll system is proposed.
Digital transformations has changed the world and every
startup has embraced the contactless payment
frameworks. In the future, we will pay with our phones
and NFC applications are the ticket to that wonderful
future ahead. Because of the numerous current Smartcard
information breaches, now is a great time to use a solution
that protects our wallets from robbery and fraud. An
alternative security algorithm is proposed, called AES
algorithm and additionally insurance and driving license
details are added to the system.
REFERENCES
[1] F. Dang, P. Zhou, Z. Li, E. Zhai, A. Mohaisen, Q. Wen, M.
Li, "Large scale invisible attack on AFC systems with NFC-
equipped smartphones", Proc. IEEE INFOCOM, pp. 1-9,
2017.
[2] F. Dang, P. Zhou, Z. Li, Y. Liu, "NFC-enabled attack on
cyber physical systems: A practical case study", Proc. IEEE
INFOCOM workshop, pp. 289-294, 2017.
[3] C. J. Mitchell, "On the security of 2-key triple
DES", IEEE Trans. Inf. Theory, vol. 62, no. 11, pp. 6260-
6267, Nov. 2016.
[4] Xi Chen, X. Wu, X. Li, X. Ji, Y. He, Y. Liu "Privacy-aware
high-quality map generation with participatory sensing",
IEEE Trans. Mobile comput, vol. 15, no. 3, Mar. 2016.
[5] M. Roland, J. Langer, J. Scharinger, "Relay attacks on
secure element-enabled mobile devices", Proc. IFIP Int. Inf.
Secur. Conf., pp. 1-12, 2012.
[6] D. J. Bernstein, N. Duif, T. Lange, P. Schwabe, B.-Y. Yang,
"High-speed high-security signatures", J. Cryptographic
Eng., vol. 2, no. 2, pp. 77-89, Sep. 2012.
[7] R. Verdult, F. Kooman, "Practical attacks on NFC
enabled cell phones", Proc. Int. Workshop Near Field
Commun., pp. 77-82, Feb. 2011.
[8] L. Francis, G. Hancke, K. Mayes, K. Markantonakis,
"Practical NFC peer-to-peer relay attack using mobile
phones", Proc. Int. Workshop Radio Freq. Identification:
Secur. Privacy Issues, pp. 35-49, 2010.
[9] G. de Koning Gans, J.H. Hoepman, F. D. Garcia, "A
practical attack on the MIFARE classic", Proc. Int. Conf.
Smart Card Res. Adv. Appl., pp. 267-282, 2008.
[10] E. Haselsteiner, K. Breitfuß, "Security in near field
communication (NFC): Strengths and weaknesses", Proc.
Int. Workshop Radio Freq. Identification: Secur. Privacy
Issues, pp. 12-14, 2006.

More Related Content

What's hot

IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET Journal
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewIJSRD
 
Pay-Cloak:Biometric
Pay-Cloak:BiometricPay-Cloak:Biometric
Pay-Cloak:Biometricijtsrd
 
IRJET - Three Layered Security for Banking
IRJET -  	  Three Layered Security for BankingIRJET -  	  Three Layered Security for Banking
IRJET - Three Layered Security for BankingIRJET Journal
 
Smart Verification of Passenger using AI
Smart Verification of Passenger using AISmart Verification of Passenger using AI
Smart Verification of Passenger using AIijtsrd
 
Security Protocols for USB Mass Storage Devices
Security Protocols for USB Mass Storage DevicesSecurity Protocols for USB Mass Storage Devices
Security Protocols for USB Mass Storage DevicesIRJET Journal
 
Device Verification and SafetyUsing RFID Tag
Device Verification and SafetyUsing RFID TagDevice Verification and SafetyUsing RFID Tag
Device Verification and SafetyUsing RFID TagIJSRED
 
IOT Cloud Based Real Time Automobile Monitoring System
IOT Cloud Based Real Time Automobile Monitoring SystemIOT Cloud Based Real Time Automobile Monitoring System
IOT Cloud Based Real Time Automobile Monitoring SystemDr. Amarjeet Singh
 
IRJET - Precocious ATM System using Iris Scanner
IRJET -  	  Precocious ATM System using Iris ScannerIRJET -  	  Precocious ATM System using Iris Scanner
IRJET - Precocious ATM System using Iris ScannerIRJET Journal
 
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET Journal
 
IRJET- Aadhar Card Based Electronic Voting System
IRJET-  	  Aadhar Card Based Electronic Voting SystemIRJET-  	  Aadhar Card Based Electronic Voting System
IRJET- Aadhar Card Based Electronic Voting SystemIRJET Journal
 
IRJET- Automatic Gate Control and Parking System using AVR Controller
IRJET- Automatic Gate Control and Parking System using AVR ControllerIRJET- Automatic Gate Control and Parking System using AVR Controller
IRJET- Automatic Gate Control and Parking System using AVR ControllerIRJET Journal
 
IRJET - Image Thresholding based Secured Electronic Smart Voting Machine ...
IRJET -  	  Image Thresholding based Secured Electronic Smart Voting Machine ...IRJET -  	  Image Thresholding based Secured Electronic Smart Voting Machine ...
IRJET - Image Thresholding based Secured Electronic Smart Voting Machine ...IRJET Journal
 
Automation in Ticketing System for A Modern Transport
Automation in Ticketing System for A Modern TransportAutomation in Ticketing System for A Modern Transport
Automation in Ticketing System for A Modern TransportIRJET Journal
 
Real time driving license with aadhar information
Real time driving license with aadhar informationReal time driving license with aadhar information
Real time driving license with aadhar informationshasi shasi
 
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-eventsIjiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-eventsIJIR JOURNALS IJIRUSA
 
IRJET-Effective and Secure E- Voting Application in GSM Module using IOT
IRJET-Effective and Secure E- Voting Application in GSM Module using IOTIRJET-Effective and Secure E- Voting Application in GSM Module using IOT
IRJET-Effective and Secure E- Voting Application in GSM Module using IOTIRJET Journal
 
IRJET- ATM Security using GSM and MEMS Sensor
IRJET- ATM Security using GSM and MEMS SensorIRJET- ATM Security using GSM and MEMS Sensor
IRJET- ATM Security using GSM and MEMS SensorIRJET Journal
 

What's hot (20)

IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature Review
 
Pay-Cloak:Biometric
Pay-Cloak:BiometricPay-Cloak:Biometric
Pay-Cloak:Biometric
 
IRJET - Three Layered Security for Banking
IRJET -  	  Three Layered Security for BankingIRJET -  	  Three Layered Security for Banking
IRJET - Three Layered Security for Banking
 
Smart Verification of Passenger using AI
Smart Verification of Passenger using AISmart Verification of Passenger using AI
Smart Verification of Passenger using AI
 
Security Protocols for USB Mass Storage Devices
Security Protocols for USB Mass Storage DevicesSecurity Protocols for USB Mass Storage Devices
Security Protocols for USB Mass Storage Devices
 
Device Verification and SafetyUsing RFID Tag
Device Verification and SafetyUsing RFID TagDevice Verification and SafetyUsing RFID Tag
Device Verification and SafetyUsing RFID Tag
 
IOT Cloud Based Real Time Automobile Monitoring System
IOT Cloud Based Real Time Automobile Monitoring SystemIOT Cloud Based Real Time Automobile Monitoring System
IOT Cloud Based Real Time Automobile Monitoring System
 
IRJET - Precocious ATM System using Iris Scanner
IRJET -  	  Precocious ATM System using Iris ScannerIRJET -  	  Precocious ATM System using Iris Scanner
IRJET - Precocious ATM System using Iris Scanner
 
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
 
Presentation iot
Presentation iotPresentation iot
Presentation iot
 
IRJET- Aadhar Card Based Electronic Voting System
IRJET-  	  Aadhar Card Based Electronic Voting SystemIRJET-  	  Aadhar Card Based Electronic Voting System
IRJET- Aadhar Card Based Electronic Voting System
 
IRJET- Automatic Gate Control and Parking System using AVR Controller
IRJET- Automatic Gate Control and Parking System using AVR ControllerIRJET- Automatic Gate Control and Parking System using AVR Controller
IRJET- Automatic Gate Control and Parking System using AVR Controller
 
IRJET - Image Thresholding based Secured Electronic Smart Voting Machine ...
IRJET -  	  Image Thresholding based Secured Electronic Smart Voting Machine ...IRJET -  	  Image Thresholding based Secured Electronic Smart Voting Machine ...
IRJET - Image Thresholding based Secured Electronic Smart Voting Machine ...
 
Automation in Ticketing System for A Modern Transport
Automation in Ticketing System for A Modern TransportAutomation in Ticketing System for A Modern Transport
Automation in Ticketing System for A Modern Transport
 
Real time driving license with aadhar information
Real time driving license with aadhar informationReal time driving license with aadhar information
Real time driving license with aadhar information
 
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-eventsIjiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
 
IRJET-Effective and Secure E- Voting Application in GSM Module using IOT
IRJET-Effective and Secure E- Voting Application in GSM Module using IOTIRJET-Effective and Secure E- Voting Application in GSM Module using IOT
IRJET-Effective and Secure E- Voting Application in GSM Module using IOT
 
IRJET- ATM Security using GSM and MEMS Sensor
IRJET- ATM Security using GSM and MEMS SensorIRJET- ATM Security using GSM and MEMS Sensor
IRJET- ATM Security using GSM and MEMS Sensor
 

Similar to IRJET- High Security in Automated Fare Collection for TollSystem with NFC using AES Algorithm

IRJET- Smart Shopping Application using NFC
IRJET- Smart Shopping Application using NFCIRJET- Smart Shopping Application using NFC
IRJET- Smart Shopping Application using NFCIRJET Journal
 
Secure Bus-Ticketing System using NFC
Secure Bus-Ticketing System using NFCSecure Bus-Ticketing System using NFC
Secure Bus-Ticketing System using NFCIJERA Editor
 
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURES
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURESNEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURES
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURESIRJET Journal
 
AUTOMATED TOLL COLLECTION
AUTOMATED TOLL COLLECTIONAUTOMATED TOLL COLLECTION
AUTOMATED TOLL COLLECTIONNaveen Sampath
 
NFiD: An NFC based system for Digital Business Cards
NFiD: An NFC based system for Digital Business CardsNFiD: An NFC based system for Digital Business Cards
NFiD: An NFC based system for Digital Business CardsIRJET Journal
 
AUTOMATING VEHICLE FINE COLLECTION SYSTEM USING NFC AND GPS
AUTOMATING VEHICLE FINE COLLECTION SYSTEM USING NFC AND GPSAUTOMATING VEHICLE FINE COLLECTION SYSTEM USING NFC AND GPS
AUTOMATING VEHICLE FINE COLLECTION SYSTEM USING NFC AND GPSJournal For Research
 
Paper id 252014116
Paper id 252014116Paper id 252014116
Paper id 252014116IJRAT
 
SIM application toolkit in the context of Near Field communication Applications
SIM application toolkit in the context of Near Field communication ApplicationsSIM application toolkit in the context of Near Field communication Applications
SIM application toolkit in the context of Near Field communication ApplicationsMukta Gupta
 
IRJET- IoT based Sensor Enabled Smart Parking System
IRJET- IoT based Sensor Enabled Smart Parking SystemIRJET- IoT based Sensor Enabled Smart Parking System
IRJET- IoT based Sensor Enabled Smart Parking SystemIRJET Journal
 
IRJET- Smart Campus an Android and Web based Application using IoT and NFC Te...
IRJET- Smart Campus an Android and Web based Application using IoT and NFC Te...IRJET- Smart Campus an Android and Web based Application using IoT and NFC Te...
IRJET- Smart Campus an Android and Web based Application using IoT and NFC Te...IRJET Journal
 
Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Deepak Kl
 
SMART BUS TICKET RESERVATION SYSTEM
SMART BUS TICKET RESERVATION SYSTEMSMART BUS TICKET RESERVATION SYSTEM
SMART BUS TICKET RESERVATION SYSTEMIRJET Journal
 
Near Field Communication : Tap and Know
Near Field Communication : Tap and KnowNear Field Communication : Tap and Know
Near Field Communication : Tap and KnowIRJET Journal
 
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...IRJET Journal
 
JITI Public Transportation Seminar 2018, " Public Transportation in a Cashles...
JITI Public Transportation Seminar 2018, " Public Transportation in a Cashles...JITI Public Transportation Seminar 2018, " Public Transportation in a Cashles...
JITI Public Transportation Seminar 2018, " Public Transportation in a Cashles...NFC Forum
 
IRJET- Smart Bus Fare Collection System
IRJET- Smart Bus Fare Collection SystemIRJET- Smart Bus Fare Collection System
IRJET- Smart Bus Fare Collection SystemIRJET Journal
 
IRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT SystemIRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT SystemIRJET Journal
 
Transforming the NFC Public Transport Experience from Vision to Reality -- Th...
Transforming the NFC Public Transport Experience from Vision to Reality -- Th...Transforming the NFC Public Transport Experience from Vision to Reality -- Th...
Transforming the NFC Public Transport Experience from Vision to Reality -- Th...NFC Forum
 
NFC (Near Field Communication) by sandip murari
NFC (Near Field Communication) by sandip murariNFC (Near Field Communication) by sandip murari
NFC (Near Field Communication) by sandip murariSandip Murari
 

Similar to IRJET- High Security in Automated Fare Collection for TollSystem with NFC using AES Algorithm (20)

IRJET- Smart Shopping Application using NFC
IRJET- Smart Shopping Application using NFCIRJET- Smart Shopping Application using NFC
IRJET- Smart Shopping Application using NFC
 
Secure Bus-Ticketing System using NFC
Secure Bus-Ticketing System using NFCSecure Bus-Ticketing System using NFC
Secure Bus-Ticketing System using NFC
 
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURES
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURESNEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURES
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURES
 
AUTOMATED TOLL COLLECTION
AUTOMATED TOLL COLLECTIONAUTOMATED TOLL COLLECTION
AUTOMATED TOLL COLLECTION
 
NFiD: An NFC based system for Digital Business Cards
NFiD: An NFC based system for Digital Business CardsNFiD: An NFC based system for Digital Business Cards
NFiD: An NFC based system for Digital Business Cards
 
AUTOMATING VEHICLE FINE COLLECTION SYSTEM USING NFC AND GPS
AUTOMATING VEHICLE FINE COLLECTION SYSTEM USING NFC AND GPSAUTOMATING VEHICLE FINE COLLECTION SYSTEM USING NFC AND GPS
AUTOMATING VEHICLE FINE COLLECTION SYSTEM USING NFC AND GPS
 
Paper id 252014116
Paper id 252014116Paper id 252014116
Paper id 252014116
 
SIM application toolkit in the context of Near Field communication Applications
SIM application toolkit in the context of Near Field communication ApplicationsSIM application toolkit in the context of Near Field communication Applications
SIM application toolkit in the context of Near Field communication Applications
 
IRJET- IoT based Sensor Enabled Smart Parking System
IRJET- IoT based Sensor Enabled Smart Parking SystemIRJET- IoT based Sensor Enabled Smart Parking System
IRJET- IoT based Sensor Enabled Smart Parking System
 
IRJET- Smart Campus an Android and Web based Application using IoT and NFC Te...
IRJET- Smart Campus an Android and Web based Application using IoT and NFC Te...IRJET- Smart Campus an Android and Web based Application using IoT and NFC Te...
IRJET- Smart Campus an Android and Web based Application using IoT and NFC Te...
 
Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)
 
NFC Basic Concepts
NFC Basic ConceptsNFC Basic Concepts
NFC Basic Concepts
 
SMART BUS TICKET RESERVATION SYSTEM
SMART BUS TICKET RESERVATION SYSTEMSMART BUS TICKET RESERVATION SYSTEM
SMART BUS TICKET RESERVATION SYSTEM
 
Near Field Communication : Tap and Know
Near Field Communication : Tap and KnowNear Field Communication : Tap and Know
Near Field Communication : Tap and Know
 
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
 
JITI Public Transportation Seminar 2018, " Public Transportation in a Cashles...
JITI Public Transportation Seminar 2018, " Public Transportation in a Cashles...JITI Public Transportation Seminar 2018, " Public Transportation in a Cashles...
JITI Public Transportation Seminar 2018, " Public Transportation in a Cashles...
 
IRJET- Smart Bus Fare Collection System
IRJET- Smart Bus Fare Collection SystemIRJET- Smart Bus Fare Collection System
IRJET- Smart Bus Fare Collection System
 
IRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT SystemIRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT System
 
Transforming the NFC Public Transport Experience from Vision to Reality -- Th...
Transforming the NFC Public Transport Experience from Vision to Reality -- Th...Transforming the NFC Public Transport Experience from Vision to Reality -- Th...
Transforming the NFC Public Transport Experience from Vision to Reality -- Th...
 
NFC (Near Field Communication) by sandip murari
NFC (Near Field Communication) by sandip murariNFC (Near Field Communication) by sandip murari
NFC (Near Field Communication) by sandip murari
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...jabtakhaidam7
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...ronahami
 
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...gragchanchal546
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...ppkakm
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...vershagrag
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 

Recently uploaded (20)

Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 

IRJET- High Security in Automated Fare Collection for TollSystem with NFC using AES Algorithm

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1978 HIGH SECURITY IN AUTOMATED FARE COLLECTION FOR TOLL SYSTEM WITH NFC USING AES ALGORITHM Shilpa. D1, Jayasri. R2, Sanjana. R3, M. Abirami4 1Shilpa. D, Anna University, Chennai 2Jayasri. R, Anna University, Chennai 3Sanjana. R, Anna University, Chennai 4M. Abirami, Department of Computer Science and Engineering, Panimalar Institute of Technology, Tamil Nadu, India ---------------------------------------------------------------------------***--------------------------------------------------------------------------- Abstract - AFC Automated Fare Collection is gaining popularity in terms of public transportation where the transportation fee is calculated based on the length of the trip time or based on the trip distance, AFC can read the NFC (Near Field Communication) tag from where AFC will gather all the relevant data about the trip. As Technology is growing, there will be security problem with the NFC card, as many Smartphone comes with the same frequency that are associated with the NFC card, so it became easy for any user to change the information that are stored in the NFC, information like the check in time or shorten the route they have travelled that cause a drastic change in the price calculation. Our proposed model will provide all the necessary security. This proposed project provides protection to the entrance data and to monitor the behaviour of an individual user. This project demonstrates a simple payment system using NFC tag and a smart phone for AFC in metro and toll. Key Words: NFC card, AFC, AES Algorithm, Mobile Payment, Wallet creation 1. INTRODUCTION As we all know, a normal toll collection takes a lot of time and there are traffic jams and we won’t get the transparency in toll amount collection. For this, the introduction to RFID was done. It was also used for tracing vehicles. The drawback of RFID was that, it doesn’t work properly in the cloudy climate. To overcome this drawback, we introduced NFC i.e. Near Field Communication. Also, AFC (Automated Fare Collection) is gaining popularity in terms of public transportation where the transportation fees is calculated based on the length of the trip time or based on the trip distance. AFC can read the NFC (Near Field Communication) tag from where AFC will gather all the relevant data about the trip. As Technology is growing there will a security problem with the NFC card, as many Smartphone comes with the same frequency that are associated with the NFC card, so it became easy for any user to change the information that are stored in the NFC, information like the check in time or shorten the route they travel that cause the drastic change in the price calculation. Our proposed model will provide all the necessary security. 1.1 Contactless Payment Contactless payment systems are the credit cards and debit cards, or other devices, including smartphones, that use radio-frequency identification or near field communication for making secure payments. 1.2 Mobile payment Mobile payment the payment services operated for financial regulation and performed using a mobile device. Instead of paying with cheque, cash or credit cards, a consumer can use a mobile to pay. Although the concept of using currency systems has a long history, it is only in this century that the technology to support such systems has become widely available. Mobile payment is been used all over the world in different ways. 2. EXISTING SYSTEM Automated Fare Collection (AFC) systems have been globally deployed for decades to automate manual ticketing and charging systems likes metros and toll, where the trip charge can be calculated based on the information that is stored in the NFC Card, provided in the station. While the card is displayed, AFC will reduce the amount based on the trip distance (trip time) and data is stored in the NFC in plain text format, and these would became a security problem as many smart phones are provided with inbuilt NFC. More over the frequency that the smart phones are provided is same as that is contained in the card so it became easy for any user for tampering the data in the card. The trip information are sent to sever only at the time of completion of the trip since it became hard to cross check the information that are associated in the card while calculating the fair.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1979 3. PROPOSED SYSTEM The proposed system has two different methodology for providing security in AFC system. Protection for Entrance data and Fair collection. Protecting the Entrance Data is the process in which, whenever the user enters the toll then that entrance information will be encrypted and transmit the encrypted information to the server. If user changes any information in the card, that information will not be changed in the server. At the fair calculating unit, the card information is read and decrypted and also the information is cross verified in the server. Based on the result, the fair will be calculated and each log is maintained in the server, to easily track the particular user. A complete environment for monitoring the behaviour of an individual user is done by means of driving licence info, insurance info .etc. And all this information is attached with the NFC card. While providing the card to the toll System, it automatically checks all the necessary parameter as it is. 4. METHODOLOGY Fig 1: Working module Every individual can register their vehicle for a NFC tag. This tag will be given a unique ID, feasible to use with that vehicle only. And an account is created for the use of that particular smart tag and maintain transaction history in the database. The user needs to deposit some minimum amount to this account. Every time a vehicle approaches the toll booth, first the presence of the vehicle is detected. It will in turn activate the NFC circuit to read the NFC enabled smart phone. The transaction will begin, depending upon the balance available, toll amount will be deducted directly. The information like the insurance and driving licence info is checked at the same time as the payment. The software updates the details in the Centralized database server. A mechanism to generate the bill and will be sent to user as a text message. 5. IMPLEMENTATION Fig 2: Hardware assembly 5.1 Near Field Communication NFC allows devices that are closely placed, to wirelessly transfer data back and forth. The technology is almost like Bluetooth, but NFC uses far less power and works over much shorter distances. In the world of consumers, producers, use of NFC technology to initiate contactless payments via credit cards or mobile devices. Rather than physically swiping the plastic, consumers simply move their smartphone or card across an NFC reader to automate transactions. NFC payment technology already comes with most Android and iOS devices and a growing number of credit and debit cards. Now contactless payments are turning to be mainstream, with a growing number of stores and restaurants adding their own in-store NFC readers — including McDonald's etc.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1980 Fig 3: NFC chip 5.2 How does it work? For NFC, a user should either touch or show his phone to an enabled device and he or she will be able to share data without physically building up a connection. Nowadays, this innovation has been set in many Android, Windows and iOS phones. Hence, NFC has turned out to be more necessary than any other technology in recent times, especially when it's about mobile payments. After installing the payment app on the phone, one needs to tap the phone on the credit card terminal and a connection will be made using NFC. Presently, there are some NFC compatible cell phones like Samsung's Galaxy Series, Google's Nexus Series, and the iPhone. These are the following NFC applications that can provide a layer of security to the transactions: 1. Google pay 2. Samsung pay 3. Apple pay 4. Android pay 5.3 Advantages of NFC NFC technology comes with various security features that help to protect financial data from prying eyes, including: 5.3.1 Proximity Protection Contactless payment solutions work over short distances. This proximity protection represents the first level of defence in NFC. 5.3.2 User Initiation To begin each transaction, the customer must initiate the contactless payment process. This usually requires a NFC application to be launched within the phone in order to create a connection between the device and the reader. So even if a thief gets closer, no transactions can happen in standby mode. 5.3.3 Secure Element Validation Whenever a connection has been made, the mobile device has to be validated, this process assigns a unique digital signature to every payment rather than transferring credit card numbers between the device and the reader. Working Arena Fig 4: Implementation of NFC based toll collection system 6. ARCHITECTURE OF NFC BASED TOLL SYSTEM The components of the NFC based toll collection system technology work as follows: 6.1 User Registration & Wallet Creation Initially user needs to register into bank application as fair reduction would be based on the user account detail, then the user needs to register their name in the server then the server will generate the particular unique id to the user. Based on that id sever can able to track the particular user. Once the user logins, he or she needs to add the particular amount to the server wallet or add the corresponding account information in the server so that the AFC will automatically reduce the amount from the user account. 6.2 Vehicle Insurance Checking Whenever a vehicle passes through a toll gate user uses NFC tag to swipe through toll gate so that amount will be deducted automatically. At the same time the automated fair collection machine also checks for the vehicle insurance to check whether it is valid or expired. If toll
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1981 machine finds that the insurance is expired it automatically updates the database. Once vehicle insurance expiry is found, vehicle will be blocked and it cannot pass through the toll gate till the insurance amount is reduced from the user account. 6.3 Track the particular User Based upon the User ID we can track the particular user and the amount of fair he paid when he passes through the toll gate. If a vehicle is theft it becomes easy to track vehicle and find it by law enforcement agencies. 6.4 Protecting User Entrance Data Another way to avoid the data tampering by using NFC is make that Process online and protect the entrance data. Whenever the user enters into the station then the information will be recorded into the NFC card as an cipher text and as well as that information will be loaded into the server with the time of entrance and the way that user enter so that if any user try to change any information in NFC card by using mobile phone, that information will not be changed into the server, if user place the card in the exit end then the AFC will cross verify the data into the server and reduce the accurate amount from the user account or wallet. Fig 5: NFC based toll collection system Database server Bank Application App server User Login Add Account Details (or) Add Money to Wallet Providing Entrance Data User Registration Encrypt Data Upload to Server Verify Data to Reduce Amount Check Vehicle Insurance Validity Updating Details If Insurance Is Not Valid and Verify Police Data Vehicle Blocked Police Uploads Theft Vehicle Details
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1982 Fig 6: Working of system 7. CONCLUSION A new security system, named Near Field Communication, for automatic fare collection in toll system is proposed. Digital transformations has changed the world and every startup has embraced the contactless payment frameworks. In the future, we will pay with our phones and NFC applications are the ticket to that wonderful future ahead. Because of the numerous current Smartcard information breaches, now is a great time to use a solution that protects our wallets from robbery and fraud. An alternative security algorithm is proposed, called AES algorithm and additionally insurance and driving license details are added to the system. REFERENCES [1] F. Dang, P. Zhou, Z. Li, E. Zhai, A. Mohaisen, Q. Wen, M. Li, "Large scale invisible attack on AFC systems with NFC- equipped smartphones", Proc. IEEE INFOCOM, pp. 1-9, 2017. [2] F. Dang, P. Zhou, Z. Li, Y. Liu, "NFC-enabled attack on cyber physical systems: A practical case study", Proc. IEEE INFOCOM workshop, pp. 289-294, 2017. [3] C. J. Mitchell, "On the security of 2-key triple DES", IEEE Trans. Inf. Theory, vol. 62, no. 11, pp. 6260- 6267, Nov. 2016. [4] Xi Chen, X. Wu, X. Li, X. Ji, Y. He, Y. Liu "Privacy-aware high-quality map generation with participatory sensing", IEEE Trans. Mobile comput, vol. 15, no. 3, Mar. 2016. [5] M. Roland, J. Langer, J. Scharinger, "Relay attacks on secure element-enabled mobile devices", Proc. IFIP Int. Inf. Secur. Conf., pp. 1-12, 2012. [6] D. J. Bernstein, N. Duif, T. Lange, P. Schwabe, B.-Y. Yang, "High-speed high-security signatures", J. Cryptographic Eng., vol. 2, no. 2, pp. 77-89, Sep. 2012. [7] R. Verdult, F. Kooman, "Practical attacks on NFC enabled cell phones", Proc. Int. Workshop Near Field Commun., pp. 77-82, Feb. 2011. [8] L. Francis, G. Hancke, K. Mayes, K. Markantonakis, "Practical NFC peer-to-peer relay attack using mobile phones", Proc. Int. Workshop Radio Freq. Identification: Secur. Privacy Issues, pp. 35-49, 2010. [9] G. de Koning Gans, J.H. Hoepman, F. D. Garcia, "A practical attack on the MIFARE classic", Proc. Int. Conf. Smart Card Res. Adv. Appl., pp. 267-282, 2008. [10] E. Haselsteiner, K. Breitfuß, "Security in near field communication (NFC): Strengths and weaknesses", Proc. Int. Workshop Radio Freq. Identification: Secur. Privacy Issues, pp. 12-14, 2006.