Automatic Authorized Access and Unauthorized Denied Security Data Maintenance for Organization Using RFID Technology

Authors(4) :-Qutubud Din, Akhtar Sayed, Fida Husain Yousafzai, Jiong Yu

Using of this latest RFID (Radio Frequency Identification) technology for an organization to improve the efficiency of organization security and maintain the record automatically. Security is the biggest challenge for everything and everywhere it’s the first priority of organization responsible authorities and they must provide the best way to deal these problems with full confidence. With help of RFID Technology it’s more easy and faster to identify the object is authorized or unauthorized to access or denied from the restricted premises. RFID Technology based on two components RFID Reader (Interrogator) & RFID Tags (Transponder). The tag contains an integrated circuit a unique number that number is assign to the object and it’s become the identification I’D of the object. This is used for processing data, modulating and demodulating the radio frequency signal that is being transmitted to RFID Reader, RFID reader read the tag and send the query to database for comparison of information which are exist in the existing database. The tag information is stored in the database the database is pass the query to micro controller the micro controller is perform operation on the base of object requirement and send back the information to database. The developed software performing functionality automatic and authentic. RFID Tags used as ID (identification number) registered in database is presenting the organization concerned object to allow access to the restricted premises otherwise denied the access inside the organization and saved all movement which pass through at the entrance and provide easily understandable, user-friendly and flexible interface for user. Maintain and update all information automatically. To minimize manually checking and record maintenance headache.

Authors and Affiliations

Qutubud Din
School of Software College, Xinjiang University, Urumqi, Xinjiang China and Computer Science and Information Technology, University of Swat, Swat, KPK, Pakistan
Akhtar Sayed
Computer Science and Information Technology, University of Swat, Swat, KPK, Pakistan
Fida Husain Yousafzai
Computer Science and Information Technology, University of Swat, Swat, KPK, Pakistan
Jiong Yu
School of Software College, Xinjiang University, Urumqi, Xinjiang China

Authorized Access, Unauthorized Denied, Identification I'D, RFID and RFID Tags.

  1. Ravi, K.S., et al., RFID based security system. International Journal of Innovative Technology and Exploring Engineering, 2013. 2(5): p. 132-134.
  2. Nwaji, O.G., N.C. Onyebuchi, and F. Kelechi, Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance System. International Journal of Science & Emerging Technologies IJSET, 2013: p. 200-211.
  3. Kumawat, A. and K. Chandramore, Automatic toll collection system using RFID. International Journal of Electrical and Electronics Research, 2014. 2(2).
  4. Mishra, Y., G.K. Marwah, and S. Verma, Arduino Based Smart RFID Security and Attendance System with Audio Acknowledgement. International Journal of Engineering Research and Technology, 2015. 4(1): p. 363-367.
  5. Gynanendra K Verma, Pawan Tripathi, IIIT Allahabad a paper on “Adigital security system with door lock system using rfid technology”.
  6. Dhrubajyoti Adak, Manoj Kumar Pain, Uttam Kumar Dey “rfid based security system using arduino module” ISSN 2229-5518, Volume 8, Issue 3, March-2017.
  7. Enrique Valero, Antonio Adán and Carlos Cerrada “Evolution of RFID Applications in Construction A Literature Review” ISSN 1424-8220, 2015 ,15 ,15988-16008. doi:10.3390/s150715988.
  8. Satyasrikanth P, Mahaveer Penna, Dileep Reddy Bolla “automatic toll collection system using rfid” ISSN 2320–088X, IJCSMC, Vol. 5, Issue. 8, August 2016, pg.247 – 253.
  9. T. Dimitriou. A lightweight RFID protocol to protect against traceability and cloning attacks. In Conference on Security and Privacy for Emerging Areas in Communication Networks – SecureComm, Athens, Greece, September 2005. IEEE.
  10. A. Juels. RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Computing, 24(2):381–394, February 2006.
  11. Qutubud Din, Shah Faisal, JiongYua “New Approach toward Requirements Analysis at Elicitation Phase in Software Engineering” ( IJCTT ) - Volume 67 Issue 3 – March 2019.

Publication Details

Published in : Volume 5 | Issue 2 | March-April 2019
Date of Publication : 2019-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 1051-1057
Manuscript Number : CSEIT11952288
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Qutubud Din, Akhtar Sayed, Fida Husain Yousafzai, Jiong Yu , "Automatic Authorized Access and Unauthorized Denied Security Data Maintenance for Organization Using RFID Technology", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 2, pp.1051-1057, March-April-2019. Available at doi : https://doi.org/10.32628/CSEIT11952288
Journal URL : https://res.ijsrcseit.com/CSEIT11952288 Citation Detection and Elimination     |      |          | BibTeX | RIS | CSV

Article Preview