RFID-Cloud Smart Cart System
RFID-Cloud Smart Cart System
C. Arduino
As the main processing unit of the Smart Cart hardware or
brain and heart of the smart cart, an Arduino platform with
Atmel microcontroller is used. The Arduino is an open-source
prototyping platform based on easy-to-use hardware and
Fig. 3. The frequency spectrum of RF signals [4].
software [7]. With the help of Arduino board, people with
sufficient skills and knowledge can process input from
different sensors and output processed data into different
actuators, motors, displays or any other electrically controlled
device [7]. For this project, the Arduino Mega 2560 board
(illustrated in figure 5) with Atmel Atmega2560 8-bit AVR
microcontroller is chosen due to its robustness, the majority of
I/O pins and fast clocking rate [7]. However, Arduino boards
Fig. 4. An example of passive RFID tag/label used by Wal-Mart [4]. are only useful for prototyping and not for commercial product
design. At the project stage of designing final commercial
For instance, RF signals transmitted by RFID tags product, an industry standard microcontroller platform will be
operating in UHF and MW frequencies hardly penetrate water chosen, and original PCB layout will be designed.
containing bodies, thus, they work poorly near human tissue
[5]. However, the reading distance and data rate of these tags
are the largest [5]. On the other hand, LF and HF signals easily
penetrate water environments, but RFID tags transmitting in
these frequencies have lowest reading ranges and much less
data rates than UHF and MW systems [5]. However, 13.56
MHz HF RFID tags have pretty acceptable data rates and
reading distances and their signals easily penetrate humid
environments [5]. Moreover, this frequency band gained high Fig. 5. Arduino Mega 2560 board [7].
popularity and standardized in many countries [5]. There is a
wide variety of commercial RFID tags working in 13.56 MHz D. IBM Cloudant
frequency. Therefore, 13.56 MHz RFID tags and reader were
chosen in this paper. Differences between the RFID technology In this project, almost all data related to market items
and the existing system of barcode scanning are presented in and registered user accounts is stored in an online cloud
table 1 below. database named Cloudant developed by IBM. As the company
states, IBM Cloudant is a NoSQL database platform built for
TABLE I. COMPARISON OF BARCODE AND RFID TECHNOLOGIES the cloud, which can be used as a fully-managed DBaaS
Barcode scanners RFID readers
(DataBase as a Service) running on public cloud platforms [8].
The key factor for choosing this database is the fact that it has
Require close visual contact with Do not require visual contact, but
the bar-coded print. RFID tags must be brought to
RESTful API which allows easy access to the database from
any device, including Arduino based platforms [8]. This banking or other sources. Therefore, the smart cart user will
allowed the Smart cart hardware to retrieve from or put data acquire some virtual cash in his/her market account. The value
into the database by simply sending HTTP POST or PUT of this money and personal information along with purchase
messages over TCP protocol. Moreover, Cloudant offers free history will be stored in the Cloudant database. Market visitor
account which contributed to the successful development of can look at this information in the market website.
the project. Furthermore, Cloudant implemented secure After creating the account and putting some cash into it, the
connection based on SSL protocol which encrypts the visitor obtains a personal ID card provided by the market.
transmitted data so that it will not be stolen or retrieved by Then, the visitor switches on the smart cart, swipes this ID card
unauthorized persons. All data in Cloudant database is stored over it and authenticates himself in the Smart Cart System.
in JSON format [8]. After that, the visitor does shopping, chooses items with RFID
tags and swipes these tags over the RFID reader antenna of the
E. Similar projects smart cart. Therefore, smart cart gets unique ID codes of each
The idea of smart cart billing has gained a significant product lying inside it and transmits these codes to the
portion of interest among researchers which is proven by Cloudant database, after which, retrieves all information related
numerous existing articles on this topic. For instance, the to these items. Smart cart hardware shows the information such
article in reference [9] describes a similar project of Smart as item names and costs on its built-in OLED screen. The
customer looks into the display and can see the list of products
Cart and targets the same task of reducing queuing time in
lying inside the cart and all relevant information and total cost
markets. In that article, each product that lies in the smart cart
so that customer can make a better decision of what to
is scanned using RFID technology. The scanned information is purchase. Customer can easily remove an unwanted product
sent to main server database through wireless channels using out of the cart. However, it is expected that the customer will
ZigBee protocol. However, the embedded system in that manually delete the item from the list by selecting it and
article is different from the proposed project by its hardware pushing the “delete” button on the device. If the customer
implementation and in few mechanisms. The proposed project decides to finish purchasing and go billing, then he or she just
is more sophisticated in technology, hardware, and software presses the “pay” button on the smart cart which will send all
implementation. For example, the processing unit of purchased product information to the Cloudant database and
embedded system in the current project is Atmega2560 of will withdraw total cost from the personal cash of the user.
Arduino platform that is more robust, practical, low-power These items will be deleted from the product database so that
than the old 8051 platform used in the article [9]. Moreover, anti-theft security gates will not detect RFID tags attached to
there is a plenty of advancements in this project such as a purchased items. However, if an item, which is not yet
secure cloud database, fast data transmission over Wi-Fi purchased, is passed across security gates, a security staff will
protocol, original design of the casing, reliable and practical approach the user and instruct how to use the Smart Cart
payment option that will be discussed later. There is another system.
scientific research on the same field [10], in which the product A clear illustration of integration and
data is read using barcode scanner that is good regarding cost, intercommunication of three systems is shown in the block
workload and already established infrastructure but requires a diagram in figure 6. In this diagram, double-headed arrows
vision of the bar-code to scan. The bar-code scanner is built show that communication goes in both directions and single-
right into the smart cart. The amount of product is checked via headed arrow represents one directional communication. For
weight scanner, and data is transmitted to the base station via example, anti-theft gates only get information about the
ZigBee protocol, as in the first case. However, when the detected RFID tags from the Cloudant database while Smart
traditional bar-code scanner is used instead of RFID reader, it Cart hardware reads and updates information in the database.
imposes several difficulties both to the customer and the Since the Cloudant database is already developed by IBM and
market staff. Firstly, customers may face some issues when commercially available, it is not regarded as a part of the Smart
manually scanning bar-codes, since bar-codes may get Cart system but intensively used.
visually distorted. Secondly, market staff will lose certain item
tracking opportunities provided by RFID tags. Thirdly, bar-
code readers are more expensive than RFID readers, which
will significantly affect overall cost of the system when many
smart carts are used. Moreover, there is the possibility of
cheating of customers when they just put items into the smart
cart without passing them through the bar-code scanner.
Concerning this point, RFID technology is more secure
regarding cheating because each RFID tag in the market can
be tracked and unauthorized RFID tags (or unpaid products)
just cannot be passed through the anti-theft security gates of
supermarkets.
III. METHODOLOGY
In general, a market will have many Smart Carts that will
serve a swarm of visitors. All these Smart Carts connect to the Fig. 6. Block diagram of the entire system.
Internet through their Wi-Fi modules. Firstly, the market visitor
who intends to use Smart Cart system registers and creates an Moreover, there are some basic steps that customer should
account in the website provided by the market. After that, this do to accomplish the shopping process. A flowchart describing
person transfers some money into this account via internet what a customer is expected to do is illustrated in figure 7.
B. Anti-theft RFID security gates
Whenever a new technology is introduced to the general
public, it often the case when someone tries to bypass security
measures and cheats. The Smart Cart system is very vulnerable
to such cheating actions of some dishonest users. In order to
remove this vulnerability and prevent cheating, anti-theft
security gates are used in the Smart Cart system. These gates
are commonly used in the libraries or book stores. For this
project, the manufacturer and model of security gates along
with the software that runs these devices are left for the
consideration of the market owners again. However, there are
some general requirements for the security gates: detect all
Fig. 7. Actions followed by the market visitor. 13.56MHz RFID tags passing through the gate; have
appropriate distance between two sides of the gate to let
A. The market website
visitors pass through them; have connection to a computer or
The main functions of the market website are: microcontroller which sends all read data of RFID tags to the
1. Provide convenient visual interface and user account Cloudant server and determines whether they exist in the
database; have appropriate alarm system which clearly notifies
2. Communicate with IBM Cloudant and retrieve user data market security staff. An example of anti-theft security gate is
3. Provide reliable money transfer from user bank accounts illustrated in figure 9 below. This security gate is the property
or web-money sources. of Nazarbayev University library.
Fig. 19. The top view of the hardware assembly with outer casing.
Fig. 17. The top view of the hardware assembly and PCB.
Fig. 20. The bottom view of the hardware assembly with outer casing.