Thursday, September 5, 2019
Radio Frequency Identification (RFID) System
Radio Frequency Identification (RFID) System Literature review 2.1 RFID The Radio Frequency Identification (RFID) system is a technology for automatedà identification. Exploration of RFID technology dates back to 1948 when Harry Stockman published hisà research titled Communication by means of the reflected power. Unfortunately technologies such asà integrated circuits, transistors and microprocessors were not yet available and RFID had to wait anotherà 20 years for its first commercial application (Landt 2005). Between 1970 and 1980 several researchà laboratories and academic institutions carried out work on RFID implementations for animal tracking,à theft prevention, item labelling and access control systems (Want 2006). Regardless of theseà applications, RFID systems remained obscure for many years. The first significant change to thisà occurred in the early nineties when companies across the world began to use RFID tags on a large scaleà due advancements in their energy efficiency and size reductions (Landt 2005).à Todays systems are usually composed of either passive or active RFID tags and RFID readers.à Active tags contain their own power source and thereby can transmit stronger signals and can beà accessed from further distances. Most commonly they operate on the ultra-high frequency (UHF) bandà and can achieve up to 100 metres range depending on the surrounding environment (Weinstein 2005).à There are currently two types of active tags. Transponders, also called semi-active tags, and Beacons.à Transponders stay in standby mode until receiving signal from the reader and then transmit a signalà back. Beacons emit signals and advertise their presence at pre-set intervals. Because of their on boardà power source, active tags are expensive, priced from $20 to $70 and vary in size from 2 centimetresà upwards (Williams et al. 2014). Passive tags do not incorporate a power supply and are powered by theà electromagnetic signal received from the reader through the tags antenna. The y operate on low, highà and ultra-high frequency with signals ranging up to 10 metres depending on the tags backscatter powerà (Weinstein 2005). The smallest passive tags can be size of a grain of rice and cost 1/10 of the price ofà the active tag (Williams et al. 2014).à Silva, Filipe and Pereira (2008) proposes a RFID based student attendance recording systemà that comprises of RFID readers operating at the 125 Kilohertz (KHz) frequency with an effective readà range up to 10 15 centimetres and passive RFID tags embedded into plastic cards. The tags store aà binary identifier which is unique to each student. Readers are connected to the local network with RJ45à connector through which they transfer scanned tag id to the server using the Transmission Controlà Protocol / Internet Protocol (TCP/IP). At least one reader is mounted in each of the classrooms andà students need to take their card out and place it near the reader in order to register their attendance.à Nainan, Parekh and Shah (2013) claimed that a similar RFID attendance registration system setupà decreased the time needed to record a students attendance by 98% compared to the manual entryà method. Collected data shows that the RFID system was able to record the attendance of 5 students perà second, however considering the short effective read range we have to conclude that multiple readersà were used during that experiment to achieve such result. Despite advances over the paper basedà registers, efficiency of attendance systems based on passive RFID tags is limited by the number ofà readers located in the classroom. Analogous systems based on the active RFID technology couldà increase ids collection efficiency by scanning multiple tags simultaneously from a further distanceà (Yoon, Chung and Less 2008), however such systems would introduce a number of additionalà technological and social issues. Bandwidth limitations coerce RFID tags to share a common broadcastà frequency and as a consequence multiple tags responding concurrently to the same reader can causeà packet collisions. Therefore to solve these issues, advanced anti-collision algorithms and methods mustà be employed during development process (Bin, Kobayashi and Shimizu 2005). Increased reading rangeà additionally raises serious privacy concerns as the users location could be tracked without their ownà consent (Ferguson, Thornley and Gibb, 2014). 2.2 Biometrics Numerous properties must be satisfied to categorise the biological measurement of a humanà physiological or behavioural characteristic as biometrics. The characteristics should be unique, everyà person should have it and it needs to be accessible so it can be measured. There are a number of differentà studies exploring biometric authentication for attendance registration systems. 2.2.1 Voice recognition Recent experiments by Dey et al. (2014) explore the capabilities of an attendance registrationà system based on voice recognition. The main core of the system is a Linux OS server integrated with aà computer telephony interface (CTI) card and pre-installed with interactive voice response (IVR)à software. The server is accessible only from the previously pre-defined phones which are installed inà the classrooms. Using installed phones users have to record a reference voice sample to enrol into theà system. During enrolment users are provided with a unique four digit speaker identification then theyà are asked to read for 3 minutes text of their own choice. Enrolled users can register their attendance byà entering the previously received speaker identification number and then answering some simple randomà questions generated by the system. The system logs user attendance if the recorded speech matches theà stored reference sample. Initial system evaluation performed o n the group of 120 students indicatedà very low efficiency. In order to achieve 94.2% recognition rate, each user needs to produce at least a 50à seconds sample. Authentication time is additionally extended by an average 26 seconds computationalà time needed to analyse provided speech sample. Additional limitations come with the maximum numberà of 32 concurrent calls that each server can handle. In essence, a long compulsory enrolment process,à the unnecessary burden of remembering a personal speaker identification number and the poorà registration efficiency time make the system a poor candidate for large group registers.à 2.2.2 Fingerprints According to Akinduyite et al. (2013) fingerprint attendance management systems can be moreà reliable and efficient than the voice based equivalent. They have achieved 97.4% recognition accuracyà with an average registration time of 4.29 seconds per student. The system implements fingerprintà scanners connected to a centralised server through the existing Wi-Fi infrastructure. As with the voiceà recognition system, an administrator has to capture reference fingerprint data from every user beforeà the system can be used. Collected fingerprint templates are stored on the server in a Microsoft SQLà Server database and later used to match scanned samples. Almost identical recognition rate of 98.57%à was achieved by Talaviya, Ramteke and Shete (2013) in the similar fingerprint system setup. Analogousà to the RFID based systems, the efficiency is closely related to the total number of the available scanners.à 2.2.3 Automated Face recognition All of the prior systems require users to provide a biometric sample manually by using one ofà the available scanners located in the environment. Kawaguchi et al. (2005) proposed a considerablyà different solution which automates sample collection. They introduced a face recognition method basedà on continuous observation. The system requires two cameras streaming live data to the centralized unità with preinstalled face detection and recognition software. The first camera, called the sensing cameraà is installed on the ceiling and points towards the rooms sitting area. The second camera, called theà capturing camera is located in front of the seats to capture students faces. The sensing camera scansà over the room in order to detect seats occupied by the students. Received image data is analysed usingà the Active Student Detecting (ASD) method developed by Nishiguchi et al. (2003). Once a student isà detected, the system directs the capturing camera to the found lo cation. The face image collected fromà the capturing camera is then processed by the system and the students attendance is recorded if aà matching template is found. Experiments in which the described system was evaluated on a group ofà 12 students revealed 80% accuracy in engaged seats detection and the same level during face detection.à The whole experiment took 79 minutes in which 8 scanning cycles were performed, resulting in 70%à total accuracy for the attendance registering. Despite advances in automated biometric samplesà collection, the described system seems to be inefficient, especially if we consider time required toà collect and analyse samples on such small group of students. Additional issues may arise if there areà any obstructions in the room which can restrict the cameras view or if a low ceiling prevents sensingà camera from covering the entire seating area. 2.2.4 Summary The biometric systems have many advantages over the other authentication technologies. Theà biometric characteristics are tightly linked to the owner and can prevent identity theft, are difficult toà duplicate and are very convenient as they are always available. Despite all these advances, all theà biometric systems share serious ethical, social and security implications. It was evidenced by manyà researchers that there is a fear of biometric technologies on the whole. The individuals and potentialà system users are concerned about privacy, autonomy, bodily integrity, dignity, equity and personalà liberty (Mordini and Tzovaras 2012; Kumar and Zhang 2010). The system administrators haveà additional overhead with the security of the collected biometric data. The individual biometricà characteristic cannot be replaced if they get stolen, therefore the legal responsibilities whilst storing thisà kind of data are colossal. 2.3 Wi-Fi An interesting and novel attendance registration method was proposed by Choi, Park and Yià (2015). The authors created a system which incorporates Wi-Fi technology built into smartphoneà devices. They had developed two versions of a smartphone application, one for the lecturers and oneà for the students. When a class session starts the lecturer has to create a Wi-Fi Access Point (AP) usingà his version of the application. The students attend the lecture and scan for the available Wi-Fi Accessà Points and if the lecturers AP is discovered and students device stays in its range for specified amountà of time then attendance registration process is triggered. To overcome limitations with the maximumà number of concurrent connections that single AP can handle, the created students version scans onlyà for the nearby networks but never connects to the found APs. Attendance is registered by submitting aà Message Digests 5 (MD5) hash token that combines a Service Set Identif ier (SSID) of the found APà and students smartphone Media Access Control (MAC) address. The hash token is uploaded to theà server which verifies submitted data and registers the students attendance in the local store. The systemà architecture requires collection of the reference MAC address of all the students for the purpose of theà later validation. The study does not describe what smartphone models were used throughout theà experiment, but it seems that they did not consider privacy features on iOS devices. According to Appleà (2013), since the release of iOS 7.0, the MAC identifier is no longer accessible through third partyà applications, moreover after iOS 8.0 release, real device MAC address is hidden from the access pointsà and swapped with a randomly generated one (Apple 2015 A). Taking into account that over 98% ofà iOS devices run on iOS 7.0 and above (Apple 2015 B), only confirms that the proposed system designà should be reviewed again. 2.4 Other 2.4.1 QR Code with face recognition Fadi and Nael (2014) combined biometrics with Quick Response Codes (QR). The proposedà methodology requires lecturers to generate a unique QR code and display it in the class. In order toà register their attendance, students need to download a mobile application, install it on their smartphonesà and use it to scan the presented QR code. The scanned code is then submitted to the server via theà existing University Wi-Fi infrastructure. Furthermore the application performs an identity check byà scanning the students facial image which is later used to create matching score by analysing a referenceà image stored on the servers. Lecturer can manually validate submitted images to confirm a studentsà identity if a low matching score raises any concerns. The QR code image could be effortlessly forwardedà to other students outside the classroom, therefore the system also collects a location stamp on the codeà submission. The apparent vulnerability of the system lies in the number of technologies that it dependsà on. Authors assumed that every student will have a smartphone device with front and back facingà cameras for the facial images and the QR scans and also a Global Positioning System (GPS) moduleà which will be accessible during the registration stage. Each classroom has to be also equipped with aà large screen to present codes to the students and this may not always be available.Ã
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.