Saturday, November 16, 2019
Radio Frequency Identification (RFID) System
Radio Frequency Identification (RFID) System    Literature review  2.1 RFID  The Radio Frequency Identification (RFID) system is a technology for automatedà  identification. Exploration of RFID technology dates back to 1948 when Harry Stockman published hisà  research titled Communication by means of the reflected power. Unfortunately technologies such asà  integrated circuits, transistors and microprocessors were not yet available and RFID had to wait anotherà  20 years for its first commercial application (Landt 2005). Between 1970 and 1980 several researchà  laboratories and academic institutions carried out work on RFID implementations for animal tracking,à  theft prevention, item labelling and access control systems (Want 2006). Regardless of theseà  applications, RFID systems remained obscure for many years. The first significant change to thisà  occurred in the early nineties when companies across the world began to use RFID tags on a large scaleà  due advancements in their energy efficiency and size reductions (Landt 2005).à    Todays systems are usually composed of either passive or active RFID tags and RFID readers.à  Active tags contain their own power source and thereby can transmit stronger signals and can beà  accessed from further distances. Most commonly they operate on the ultra-high frequency (UHF) bandà  and can achieve up to 100 metres range depending on the surrounding environment (Weinstein 2005).à  There are currently two types of active tags. Transponders, also called semi-active tags, and Beacons.à  Transponders stay in standby mode until receiving signal from the reader and then transmit a signalà  back. Beacons emit signals and advertise their presence at pre-set intervals. Because of their on boardà  power source, active tags are expensive, priced from $20 to $70 and vary in size from 2 centimetresà  upwards (Williams et al. 2014). Passive tags do not incorporate a power supply and are powered by theà  electromagnetic signal received from the reader through the tags antenna. The   y operate on low, highà  and ultra-high frequency with signals ranging up to 10 metres depending on the tags backscatter powerà  (Weinstein 2005). The smallest passive tags can be size of a grain of rice and cost 1/10 of the price ofà  the active tag (Williams et al. 2014).à    Silva, Filipe and Pereira (2008) proposes a RFID based student attendance recording systemà  that comprises of RFID readers operating at the 125 Kilohertz (KHz) frequency with an effective readà  range up to 10  15 centimetres and passive RFID tags embedded into plastic cards. The tags store aà  binary identifier which is unique to each student. Readers are connected to the local network with RJ45à  connector through which they transfer scanned tag id to the server using the Transmission Controlà  Protocol / Internet Protocol (TCP/IP). At least one reader is mounted in each of the classrooms andà  students need to take their card out and place it near the reader in order to register their attendance.à    Nainan, Parekh and Shah (2013) claimed that a similar RFID attendance registration system setupà  decreased the time needed to record a students attendance by 98% compared to the manual entryà  method. Collected data shows that the RFID system was able to record the attendance of 5 students perà  second, however considering the short effective read range we have to conclude that multiple readersà  were used during that experiment to achieve such result. Despite advances over the paper basedà  registers, efficiency of attendance systems based on passive RFID tags is limited by the number ofà  readers located in the classroom. Analogous systems based on the active RFID technology couldà  increase ids collection efficiency by scanning multiple tags simultaneously from a further distanceà  (Yoon, Chung and Less 2008), however such systems would introduce a number of additionalà  technological and social issues. Bandwidth limitations coerce RFID tags to share a common broadcastà     frequency and as a consequence multiple tags responding concurrently to the same reader can causeà  packet collisions. Therefore to solve these issues, advanced anti-collision algorithms and methods mustà  be employed during development process (Bin, Kobayashi and Shimizu 2005). Increased reading rangeà  additionally raises serious privacy concerns as the users location could be tracked without their ownà  consent (Ferguson, Thornley and Gibb, 2014).  2.2 Biometrics  Numerous properties must be satisfied to categorise the biological measurement of a humanà  physiological or behavioural characteristic as biometrics. The characteristics should be unique, everyà  person should have it and it needs to be accessible so it can be measured. There are a number of differentà  studies exploring biometric authentication for attendance registration systems.  2.2.1 Voice recognition  Recent experiments by Dey et al. (2014) explore the capabilities of an attendance registrationà  system based on voice recognition. The main core of the system is a Linux OS server integrated with aà  computer telephony interface (CTI) card and pre-installed with interactive voice response (IVR)à  software. The server is accessible only from the previously pre-defined phones which are installed inà  the classrooms. Using installed phones users have to record a reference voice sample to enrol into theà  system. During enrolment users are provided with a unique four digit speaker identification then theyà  are asked to read for 3 minutes text of their own choice. Enrolled users can register their attendance byà  entering the previously received speaker identification number and then answering some simple randomà  questions generated by the system. The system logs user attendance if the recorded speech matches theà  stored reference sample. Initial system evaluation performed o   n the group of 120 students indicatedà  very low efficiency. In order to achieve 94.2% recognition rate, each user needs to produce at least a 50à  seconds sample. Authentication time is additionally extended by an average 26 seconds computationalà  time needed to analyse provided speech sample. Additional limitations come with the maximum numberà  of 32 concurrent calls that each server can handle. In essence, a long compulsory enrolment process,à  the unnecessary burden of remembering a personal speaker identification number and the poorà  registration efficiency time make the system a poor candidate for large group registers.à    2.2.2 Fingerprints  According to Akinduyite et al. (2013) fingerprint attendance management systems can be moreà  reliable and efficient than the voice based equivalent. They have achieved 97.4% recognition accuracyà  with an average registration time of 4.29 seconds per student. The system implements fingerprintà  scanners connected to a centralised server through the existing Wi-Fi infrastructure. As with the voiceà  recognition system, an administrator has to capture reference fingerprint data from every user beforeà  the system can be used. Collected fingerprint templates are stored on the server in a Microsoft SQLà  Server database and later used to match scanned samples. Almost identical recognition rate of 98.57%à  was achieved by Talaviya, Ramteke and Shete (2013) in the similar fingerprint system setup. Analogousà  to the RFID based systems, the efficiency is closely related to the total number of the available scanners.à    2.2.3 Automated Face recognition  All of the prior systems require users to provide a biometric sample manually by using one ofà  the available scanners located in the environment. Kawaguchi et al. (2005) proposed a considerablyà  different solution which automates sample collection. They introduced a face recognition method basedà  on continuous observation. The system requires two cameras streaming live data to the centralized unità  with preinstalled face detection and recognition software. The first camera, called the sensing cameraà  is installed on the ceiling and points towards the rooms sitting area. The second camera, called theà  capturing camera is located in front of the seats to capture students faces. The sensing camera scansà  over the room in order to detect seats occupied by the students. Received image data is analysed usingà  the Active Student Detecting (ASD) method developed by Nishiguchi et al. (2003). Once a student isà  detected, the system directs the capturing camera to the found lo   cation. The face image collected fromà  the capturing camera is then processed by the system and the students attendance is recorded if aà  matching template is found. Experiments in which the described system was evaluated on a group ofà  12 students revealed 80% accuracy in engaged seats detection and the same level during face detection.à  The whole experiment took 79 minutes in which 8 scanning cycles were performed, resulting in 70%à  total accuracy for the attendance registering. Despite advances in automated biometric samplesà  collection, the described system seems to be inefficient, especially if we consider time required toà  collect and analyse samples on such small group of students. Additional issues may arise if there areà  any obstructions in the room which can restrict the cameras view or if a low ceiling prevents sensingà  camera from covering the entire seating area.  2.2.4 Summary  The biometric systems have many advantages over the other authentication technologies. Theà  biometric characteristics are tightly linked to the owner and can prevent identity theft, are difficult toà  duplicate and are very convenient as they are always available. Despite all these advances, all theà  biometric systems share serious ethical, social and security implications. It was evidenced by manyà  researchers that there is a fear of biometric technologies on the whole. The individuals and potentialà  system users are concerned about privacy, autonomy, bodily integrity, dignity, equity and personalà  liberty (Mordini and Tzovaras 2012; Kumar and Zhang 2010). The system administrators haveà  additional overhead with the security of the collected biometric data. The individual biometricà  characteristic cannot be replaced if they get stolen, therefore the legal responsibilities whilst storing thisà  kind of data are colossal.  2.3 Wi-Fi  An interesting and novel attendance registration method was proposed by Choi, Park and Yià  (2015). The authors created a system which incorporates Wi-Fi technology built into smartphoneà  devices. They had developed two versions of a smartphone application, one for the lecturers and oneà  for the students. When a class session starts the lecturer has to create a Wi-Fi Access Point (AP) usingà  his version of the application. The students attend the lecture and scan for the available Wi-Fi Accessà  Points and if the lecturers AP is discovered and students device stays in its range for specified amountà  of time then attendance registration process is triggered. To overcome limitations with the maximumà  number of concurrent connections that single AP can handle, the created students version scans onlyà  for the nearby networks but never connects to the found APs. Attendance is registered by submitting aà  Message Digests 5 (MD5) hash token that combines a Service Set Identif   ier (SSID) of the found APà  and students smartphone Media Access Control (MAC) address. The hash token is uploaded to theà  server which verifies submitted data and registers the students attendance in the local store. The systemà  architecture requires collection of the reference MAC address of all the students for the purpose of theà  later validation. The study does not describe what smartphone models were used throughout theà  experiment, but it seems that they did not consider privacy features on iOS devices. According to Appleà  (2013), since the release of iOS 7.0, the MAC identifier is no longer accessible through third partyà  applications, moreover after iOS 8.0 release, real device MAC address is hidden from the access pointsà  and swapped with a randomly generated one (Apple 2015 A). Taking into account that over 98% ofà  iOS devices run on iOS 7.0 and above (Apple 2015 B), only confirms that the proposed system designà  should be reviewed again.  2.4 Other  2.4.1 QR Code with face recognition  Fadi and Nael (2014) combined biometrics with Quick Response Codes (QR). The proposedà  methodology requires lecturers to generate a unique QR code and display it in the class. In order toà  register their attendance, students need to download a mobile application, install it on their smartphonesà  and use it to scan the presented QR code. The scanned code is then submitted to the server via theà  existing University Wi-Fi infrastructure. Furthermore the application performs an identity check byà  scanning the students facial image which is later used to create matching score by analysing a referenceà  image stored on the servers. Lecturer can manually validate submitted images to confirm a studentsà  identity if a low matching score raises any concerns. The QR code image could be effortlessly forwardedà  to other students outside the classroom, therefore the system also collects a location stamp on the codeà  submission. The apparent vulnerability of the system lies in the    number of technologies that it dependsà  on. Authors assumed that every student will have a smartphone device with front and back facingà  cameras for the facial images and the QR scans and also a Global Positioning System (GPS) moduleà  which will be accessible during the registration stage. Each classroom has to be also equipped with aà  large screen to present codes to the students and this may not always be available.à      
Subscribe to:
Post Comments (Atom)
 
 
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.