
Fill This Form To Receive Instant Help
Words: 1515
Published: Jun 01, 2024
The internet of things (IoT) has resulted in various technological transformations. The internet of things is based on any object being equipped with the relevant technology to perform various computing functions (Bendavid et al., 2018) . The internet of things is widely applicable and is moving from experimentation to practical application in the business world. Radio- frequency identification (RFID) is an important aspect of the internet of things. RFID relies on the use of electromagnetic fields to follow up on tags attached to different objects. RFID systems rely on the use of tags. The tags are attached to the objects of interest. RFID tags are created to be either passive or active. Active tags rely on an onboard battery that is used in the transmission of signals. On the other hand, a passive tag does not incorporate the use of a battery (Lee & Chien, 2015). It is preferred since it is cheaper compared to an active tag (. A passive tag relies on the use of radio energy that originates from the reader. Operation of a passive tag requires a power level that is strong to guarantee signal transmission.
One of the methods of authenticating RFID tags without internet connections is the use of Physical Unclonable Function (PUF). The aim of the method is to increase security and ensure that unauthorized access is denied. The PUF technology has, however, been proposed owing to the fact that it is more secure compared to other options. PUF technology is proposed due to the cost-effective nature of the strategy. The PUF-based authentication protocol constitutes of several distinct stages. The four stages include registration, mutual verification, tag verification, and update process (Bendavid et al., 2018). In the first stage, the reader instates the process by sending a search request. The reader also receives the tag’s response. In the second phase, the reader generates and a random number. In the authentication phase, both the tag and the reader are mutually authenticated.
In vehicle access tracking systems, RFID systems rely on authentication to stop vehicle theft. It is difficult to check vehicles manually, and this poses a problem that can be addressed through the Internet of things (Srivastava et al., 2015). Vehicles are attached to license plate identification through an RFID tag. During the time when the vehicle is entering the gate, the IR sensor becomes active. The activation of the IR sensor results in the whole system becoming activated. At the checkpoint, the information at the tag is read by the RFID reader (Cho et al., 2015). For the vehicle to be authorized, the license number has to be read. A match of the information from the tag and the vehicle’s registration number results in the car being allowed to pass.
The Raspberry Pi is a series of small single-board computers whose size can be compared to that of a credit card. It deals with different components such as Egoman, RS Components, and Newark element14. For long term storage and booting purposes, the design relays on a micro SD card instead of a hardware design. It makes use of various programming tools such as Linux, python. Raspberry Pi is bundled with Bluetooth, on-board wifi, and USB boot abilities. It uses ‘python’ as its default language, which is a widely used high-level programming language (Benítez, 2017).
The process begins with the installation of a smart rationing system, which interfaces RFID card and reader, fingerprint scanner, website, database, and raspberry pi. It consists of a fingerprint sensor, which the fingerprint of an individual is scanned. If the fingerprint matches the information in the database, then the RFID card is scanned through its reader. Each card contains a unique code. Every individual whose details are in the database is given a unique number, which is identified by the RFID reader after the card is scanned (Warke et al., 2018). A raspberry pi acts as the main controller. It takes the unique number from the RFID reader and uses it to access corresponding information or records in the database, which it then sends to the server. It displays that the individual is valid if the RFID card unique code matches the information stored in the database. When controlling raspberry pi over the internet, the safest and most convenient way is using cloud connections.
The RFID tag is used for authentication purposes, while the Raspberry Pi is used as the microcontroller. The RFID reader connects any microcontroller UART directly with an RS232 converter to PC (Kanvitha, Sirisha, & Chowdary, 2017). It can function properly with any 125 KHz RFID tags. Using the Raspberry Pi, and through the use of any programming tools such as Linux, Python, the USB based webcam can be turned up into a fully functional IP web. An RFID reader reads the values on tags and feeds them on the Raspberry Pi processor. For example, RFID Tag details of a theft vehicle can be entered from any browser which in turn gives Raspberry pi the details as an input (Priyanka, 2017). Then the raspberry pi compares the RFID tag details that are already stored with the dynamic details. In the event that the details match, then raspberry pi takes the snapshot of the vehicle and sends the details to the particular mail ID. The Camera is usually interfaced to the raspberry pi processor, which stores the image data in SD card.
References
Keep in mind: This sample was shared by another student.