AStudyonthe Componentsusedin RFIDSystemandits Challenges
AStudyonthe Componentsusedin RFIDSystemandits Challenges
net/publication/355778098
CITATIONS READS
13 2,707
1 author:
SEE PROFILE
All content following this page was uploaded by Muhammad Ahmad Baballe on 30 October 2021.
Review Article
A Study on the Components used in RFID System and its Challenges
*Muhammad Ahmad Baballe
Abstract
The Radio Frequency Identification (RFID) system is an essential wireless technique of identification of physically
placed objects in certain state spaces. The RFID system is the most emerging technology these days which is
becoming the alternate for the barcode. Hence this technology is receiving a lot of attention comparatively over the
past few years. The RFID system technology is used to automatically identify any item or a package. The automatic
identification can be done with the help of the RFID Tags and the RFID Reader units. The RFID tag contains a
transponder that can transmit wireless information over a short distance. The information is then received by the
device called the RFID Reader and is further processed through middleware infrastructure. Lots of the RFID
system applications are being used in various fields like Hospitals (Healthcare centers), Engineering, and
Livestock’s for traceability purposes. Acquaintance with the advantages and the risk of the RFID system. The
gumshoe of this technology has made a gigantic impact on our daily lives.
Keywords: Antenna, Middleware, Traceability, RFID system, RFID tags, RFID readers, microcontroller, Personal
Computer (PC).
Copyright © 2021 The Author(s): This is an open-access article distributed under the terms of the Creative Commons Attribution 4.0 International
License (CC BY-NC 4.0) which permits unrestricted use, distribution, and reproduction in any medium for non-commercial use provided the original
author and source are credited.
(3) The Frequency that operates within the range of 2.4 Microcontroller: A microcontroller is an extremely
GHz to 5.8 GHz is known as Ultra High Radio combined device, which includes one chip, all, or most
Frequency (UHRF) tag. Low Radio Frequency (LRF) of the parts needed to perform an application control
tags are usually economical and have slow speed as function. The PIC (peripheral interface controller) is an
compared to High Radio Frequency (HRF) tags, Low integrated circuit (IC) that was established to control
Radio Frequency (LRF) tags are usually used for the peripheral devices, improving load from the central
applications where the data transfer over a short processing unit (CPU). It also has a low memory
distance is required. The High Radio Frequency (HRF) capacity; it is also used in performing calculations and
tags can be used for medium-range applications having is controlled by software just like the central processing
faster speed and can be used to transfer the data over a unit (CPU). It is used in the designs where a local
long distance. The Ultra High Radio Frequency resolution needs to be taken. It helps in the
(UHRF) tags are fastest than both the Low Radio programming of the whole circuit. Below is the image
Frequency and High Radio Frequency tags. of the microcontroller.
the particular registered in the RFID tag then it marks by a motor. This signal is temporarily stored in the
the student attendance that is in the database. Missing microcontroller, when the lecturer or teacher finishes
the above readings, the system will automatically his or her class he or she must swap the RFID tag again
identify the fraud students. This two-factor automatic to the RFID reader and the system will decide
system reduces the misuse of identity theft for getting automatically that the class is finished. Therefore, the
attendance because they are not registered in the system microcontroller will pass the temporarily stored signal
database [15]. A Student Attendance Management to the computer database as the attendance. In case if a
System Based on RFID and Fingerprint Reader. The student is absent, the signal will pass it to the global
system also works as a two-factor verification system. system for mobile, modem and it will send this message
In the system, the RFID reader is linked with the to the parents of the students who were not present
computer and the computer has specific software that is during the lectures or lesson in the lecture room or the
used to measure the automatic attendance of the classroom. If any of the students go out before the
students which is developed by Microsoft Visual basic lecturer or teacher, the system will not count the student
studio and SQL. In the first place, the entire student present in the lecture room or classroom. The system
must register his or her RFID tag and Fingerprints and it itself is an added advantage and a reliable security
is stored in the database of the system. Once the system. Thus, the students cannot cheat the
students enter the classroom they need to use the RFID administration and their parents [18]. A system that will
tag and this will be read by the RFID reader which will work with the RFID technology and global system for
then check the database of the system to check if the tag mobile. In their research, they used a microcontroller as
is registered, if it is registered or correct then he moves a midway among global systems for mobile modules
to the next verification step. In the second step, the and RFID technology. Whenever the students enter the
fingerprint of the student is then verified. If it matched lecture room or classroom, they need to make use of
the information of the students registered he or her then their tag, which is read by the RFID reader, and it sends
the attendance of the student will be stored on the it to the global system for the mobile module. If the
server. Besides, the lecturers or teachers have identification card of the student or individual tag does
authentication to use the system, they can also act as not match with the stored information of the database
admin of the entire system [16]. An SD card module with he or she is considered as an unapproved person. If it
an RFID tag, which carries different voice codes, is accepts the tag, then the global system for the mobile
used in the system development. The tag identification module will send a message to the administration and
card and the code of the voice greeting are stored in the their parents that the students attended lectures or
SD card module. When the student enters the classroom lessons [19]. A system that uses web-based attendance
door, his or her RFID tag is being read. If the using four-tier architecture by the use of RFID and
identification card of the student tag matched with the Biometrics. In their system, the students, lecturers, or
stored data in the SD card then the particulars of the teachers' RFID has a unique code, which will be store in
student or person need to use the voice greeting, if it the database of the institution or school. The RFID
matches then the door will be open and the attendance reader and the fingerprint device are placed at the
of the student will be store in the excel sheet. The entrance door of the lecture room or classroom.
Student can view their attendance detail using the liquid Whenever the students want to enter the classroom,
crystal display (LCD) use in the research. In the they need to use the RFID tag which will be read by an
research, the Arduino connects the liquid crystal RFID reader and validates the identity of the students
display, the RFID reader, the SD card module, and the by comparing it with the information store in the
rest components use in the research. Likewise, the database whether the tag matches or not. The second
system has very simple schematics than another system stage of verification will be allowed if and only if the
because of the very simple components use and the first stage of verification is succeeded. The Verification
design of the whole system. Also, you can we get fast with the fingerprint is the second stage of the system
response and accurate results [17]. A model system and if the student's fingerprint matches with the data in
called the Microcontroller Based Attendance System the database then the attendance will be marked and
Using the RFID system and Global System for Mobile stored into the database, but if he or her record does not
(GSM) was designed. The system consists of three store or capture in the database then they will be no
atMega16microcontroller placed in between the RFID attendance for that student. The fingerprint verification
reader, Global System for Mobile modem, and the is merely acting in ten minutes including five minutes
computer. Each of the microcontrollers uses has its before the schedule and after the schedule of class
purpose. The system will starts whenever a lecturer or starting time. If anyone is late then it will deny
teacher used his or her RFID tag to enter the lecture providing attendance to that particular student that is
room or classroom then the students will enter the late but the students can stay at the lectures and learn
classroom also by swapping their RFID tags within five but will not have attendance for that class. Lastly, a
minutes. The RFID reader reads the RFID tag, sends the short message service (SMS) will be sent to the
signal to the first microcontroller, which will analyze students’ parents if the students are present or not in the
the signal of the RFID reader, and opens the classroom lecture room or classroom [20]. Prototype of the
door using infrared rays (IR) signal, which is influence attendance management system with the placement of a
bigger number of RFID readers placed in the room and CHALLENGES FACED USING THE RADIO
there is a server application maintains through a laptop. FREQUENCY IDENTIFICATION (RFID)
The radio frequency identification reader and the laptop SYSTEM
or personal computer (PC) are connected with the help 1) Loss of the radio frequency identification (RFID)
of a wireless router or LAN connection. Whenever a tags: This is just like the traditional locks and keys,
student or person enters the classroom or lecture room, you might likely or can forget or misplace your
he or she needs to use the RFID tag which is read by the tags, which you are using to open the secure
RFID reader and passes the student's attendance to the entrance the tags are registered to.
server through wireless or LAN connection. Since many 2) The radio frequency identification system can be
of the RFID readers are placed, more than one person hacked by hackers; the hackers can enter the secure
can get the attendance simultaneously and get the environment and do whatever they feel like doing
higher efficiency than the traditional method or using or even stealing without anyone knowing or aware
the single radio frequency identification reader [21]. In of their presence.
addition, proposed a system that is working with the 3) Power Shortage Issue: among the major issue or
RFID technology and Telegram Messenger Application. problems the radio frequency identification system
In their system, the students need to meet their lecturers is facing is the problem of electric power especially
or teachers for the tapping of their RFID tags. If the tags if it is connected or powered by it. The radio
match with tag information stored in the database, then frequency identification (RFID) systems may glitch
it will send the attendance to the management of the during power outages affecting some lockers to
institution or principal in the form of an excel sheet as either shut you out or worse leave the lockers open
well as sends a message to the specific student’s parent where people may try to steal what is inside.
via Telegram messenger. Meanwhile, facial verification 4) More Involved and More Expensive to Setup: the
cost is comparably average to other biometric radio frequency identification system requires locks
verification. It also could be considered for a better that are being wired to a secured server. The
system for developing an automatic attendance system. computer that is going to be used is where access is
The RFID technology with a fingerprint system is very controlled, programmed, and logged.
comparable to the RFID with the facial system. Each 5) If the server computer is not connected to the
characteristic of the table is providing similar ideas internet, and you have time-based access
except for their cost. Fingerprint biometric systems restrictions, you will need to manually change the
provide a very lower cost compare to Retina and Iris. computer’s clock twice a year when the time
Meanwhile, software, which makes use of visual studio changes.
and SQL, are costs in a great measure. Eventually, the
system is considered a high-cost system with a higher CONCLUSION
eminence [22]. Low-Cost Portable Smart Card Based In this paper, I have reviewed many papers related
Attendance System. Is the combination of RFID with to the radio frequency identification system we have
fingerprint biometric technology to enhance the safety seen their various improvements in the recent
level and integrity of the records. This design system technology and the benefit of using the radio frequency
does not merely make the system design simpler but identification system over the traditional paper-based
likewise improves the efficiency of the institution both attendance system in taking the attendance of the
in terms of manpower and time. This system does not employees or students. Also, the challenges faced using
merely abridge the method of taking attendance but the radio frequency identification system are discussed
decreases the rate of errors and permits for faster and its main components used in the implementation of
verification of student attendance, all with minimal the system.
human interaction [23]. Smart Attendance Monitoring
System (SAMS) A Face Recognition based Attendance
System for Classroom Environment. This system is
REFERENCES
developed by the integration of omnipresent [1] E. Orji, C. Oleka, U., Nduanya “Automatic Access
components to make a portable device for managing the Control System using Arduino and RFID”, Journal
student’s attendance using Face Recognition technology of Scientific and Engineering Research, vol. 5
[24]
. A Radio Frequency Identification Based Attendance issue 4, pp. 333-340, 2018.
System with Short Message Service (SMS) Backup [25]. [2] K. Vandana1, K. Anil Kumar, G. Sivani, G.
This project seeks to address means of automatically Devanand, E. Venkatanarayana, “Examination
registering the students recording attendance, saving Room Guidance System Using RFID and
students information on the personal computer (PC) as Arduino”, International Research Journal of
well as backing their information via the global system Engineering and Technology, Volume: 05 Issue: 04
for mobile communication, and finally making a | Apr-www.irjet.net, p-ISSN: 2395-0072, pp. 642-
decision on the worthiness of a student to sit for an 645, 2018.
examination course or attending the lectures [26]. [3] Çavaş, M., Ahmad, M., B., “A review advancement
of security alarm system using internet of things
(IoT), International Journal of New Computer
Architectures and their Applications (IJNCAA)
9(2): 38-49 The Society of Digital Information and [16] M. M. M. Thein, C. M. Nwe, and H. M. Tun,
Wireless Communications”, 2019. “Students’ Attendance Management System Based
[4] Juels A., Molnar D., Wagner D., “Security and On RFID and Fingerprint Reader,” Int. J. Sci.
Privacy Issues in E-passports”, Secure Comm Technol. Res., 2015.
2005, 1 st Intl. Conf. on Security & Privacy for [17] Y. Mishra, G. K. Marwah, and S. Verma, “Arduino
Emerging Areas in Communications Networks, Based Smart RFID Security and Attendance
pp.74-88, 2005. System with Audio Acknowledgement,” vol. 4, no.
[5] ISECOM, “Hacking Exposed Linux: Linux 01, pp. 363–367, 2015.
Security Secrets & Solutions”, (3/ed.), p.298, [18] K. Shukla, “Microcontroller Based Attendance
McGraw-Hill Osborne Media, 2008. System Using RFID and GSM,” vol. 5, no. 8, pp.
[6] Cardullo MW & William LP, “Transponder 127–131, 2017.
Apparatus and System”, US 3713148, (Published [19] S. Konatham, B. S. Chalasani, N. Kulkarni, and T.
May 21, 1970, Issued Jan 23, 1973). El Talib, “Attendance generating A system using
[7] Bitkom, “RFID: Technology, Systems,s and RFID and GSM,” in 2016 IEEE Long Island
Applications”, RFID Journal, Whitepaper, Systems, Applications, and Technology
http://www.rfidjournal.com, 2005. Conference, LISAT, pp. 3–5, 2016.
[8] Wikipedia, “Radio-Frequency Identification”, [20] R. Roy, “A web-enabled secured system designed
Web: http://en.wikipedia.org, (Accessed: 30-09- for attendance monitoring applying biometric and
2012). Radio Frequency Identification (RFID)
[9] Yongqiang Z., Ji L, “The Design of Wireless technology,” in 2014 International Conference on
Fingerprint Attendance System, International Signal Propagation and Computer Technology,
Conference on Communication Technology, ICCT ICSPCT, pp. 653–657, 2014.
'06, Handan, Hebei, China, 27-30 pp. 27-30 [21] T. Sanjay, “Attendance Management system”, 4(7),
November 2006. vol. 4, no. 7, pp. 541–543, 2014.
[10] Man M, Kyng L.Y. “Utilizing MYKAD Touch N [22] M. B. Chaniago and A. Junaidi, “Student Presence
Go features for Student Attendance System Using Rfid and Telegram Messenger Application,”
(TITO)”. Proceeding of 1st International Malaysian 8th Widyatama Univ. IEEE, pp. 1–5, 2016.
Educational Technology Convention Johor Bahru, [23] Vinod, V. M., Murugesan, G., Mekala, V.,
Malaysia, pp.114-120, 2-5 November 2007. Thokaiandal, S., Vishnudevi, M., & Siddharth, S.
[11] Sidi, Jonathan, Syahrul N, Junaini, and Lau, S. M. (2021). “A Low-Cost Portable Smart Card
Ling. “Tracking Student Attendance using Based Attendance System”. IOP Conference
Interactive Student Attendance Management Series: Materials Science and Engineering,
System”, Third Malaysian Software Engineering https://doi.org/10.1088/1757-899x/1012/1/012046.
Conference (MySEC’07), Selangor, Malaysia, pp. [24] Bhattacharya, S., Nainala, G. S., Das, P., & Rout
1-5, 3 – 4 December 2007. ray, “A Smart attendance monitoring system
[12] Z. Pala and N. Inanc, “Smart Parking Applications (SAMS): A face recognition based attendance
Using RFID Technology”, Proceedings of 1st system for classroom environment”. Proceedings -
Annual RFID Eurasia, Istanbul, Turkey, pp.1 – 3, IEEE 18th International Conference on Advanced
5-6 September 2007. Learning Technologies, pp358–360.
[13] Olanipekun and O. K. Boyinbode, “An RFID-based https://doi.org/10.1109/ICALT.2018.00090. 2018.
automatic attendance system in educational [25] Ukoima, K. N., Ekwe, O. A., & Ezeonye, C. S.
institutions of Nigeria,” Int. J. Smart Home, vol. 9, “Radio Frequency Identification (RFID) Based
no. 12, pp. 65–74, 2015. Attendance System with Short Message Service
[14] H. D., N. Salih, A. Al, B. Al-Sadawi, and H. (SMS) Backup”. IOSR Journal of Computer
Alsharqi, “Attendance and Information System Engineering (IOSR-JCE), 21(2), pp. 1–8.
using RFID and Web-Based Application for https://doi.org/10.9790/0661-2102010108. 2019.
Academic Sector,” Int. J. Adv. Computer. Sci. [26] Baballe, M., A., Nababa, F., A., “The need of using
Appl., vol. 9, no. 1, pp. 266–274, 2018. a Radio Frequency Identification (RFID) System”,
[15] P. S. S. Srivignessh and M. Bhaskar, “RFID and International Journal of New Computer
pose invariant face verification based automated Architectures and their Applications (IJNCAA)
classroom attendance system,” in International 11(2): 22-29 The Society of Digital Information
Conference on Microelectronics, Computing, and and Wireless Communications, 2021.
Communication, 2016.