IMPLEMENTATION OF RELIABLE ATTENDENCE SYSTEM USING ANDROID AND NEAR FIELD COMMUNICATION TECHNOLOGY VIJAY KAKANI

Similar documents
LIBRARY ACCESS SYSTEM SMARTPHONE APPLICATION USING ANDROID

Security in Near Field Communication (NFC)

Abracon PTM Introduction to ANFCA Series Flexible Peel & Stick NFC Antennas

Gemalto Mifare 1K Datasheet

NFC. Technical Overview. Release r05

A Novel Approach Of Mobile Based Student Attendance Tracking System Using Android Application

ENABLING WIRELESS DATA COMMUNICATION IN CONSTRUCTION MANAGEMENT SYSTEM

Living Requirements Document: Sniffit

NFC Based Equipment Management Inventory System

Near Field Communication in Cell Phones

IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS

RFID Penetration Tests when the truth is stranger than fiction

An NFC Ticketing System with a new approach of an Inverse Reader Mode

Using RFID Techniques for a Universal Identification Device

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

Significance of Tokenization in Promoting Cloud Based Secure Elements

Development of a wireless home anti theft asset management system. Project Proposal. P.D. Ehlers Study leader: Mr. D.V.

3. Identification of water pumps through RFID technology. 4. Wireless control of remote water pump using RF technology.

Your Mobile Phone as a Ticket (NFC)

Fahad H.Alshammari, Rami Alnaqeib, M.A.Zaidan, Ali K.Hmood, B.B.Zaidan, A.A.Zaidan

An in-building multi-server cloud system based on shortest Path algorithm depending on the distance and measured Signal strength

Document Capture and Distribution

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

Sensors-enabled Smart Attendance Systems Using NFC and RFID Technologies

Keywords RFID READER, FPGA, GSM.

Development of Hybrid Radio Frequency Identification and Biometric Security Attendance System

Loyalty Systems over Near Field Communication (NFC)

ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK

Localization System for Roulette and other Table Games

Smart Card Authentication. Administrator's Guide

Oil & Gas Inventory Management System

Samsung SDS. Enterprise Mobility Management

Software Tool for Implementing RSA Algorithm

Fast remote data access for control of TCP/IP network using android Mobile device

Installer and Admin App Guide

Student Attendance Through Mobile Devices

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT

Secure Mobile POS System

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

ENERGY HARVESTED ELECTRONIC SHELF LABEL

A Model-based Methodology for Developing Secure VoIP Systems

The newspaper on the digital road

Chapter 4. The sleep and activities of daily living (ADL) monitoring application

Secure Active RFID Tag System

Using the T&D Thermo App with TR-7wf Data Loggers

Threat Modeling for offline NFC Payments

Manisha R. Patil. Keywords Cloud service provider, Identity Provider, Enhanced Client Profile, Identity Management, Privacy, Trust Manager.

Degree Certificate Authentication using QR Code and Smartphone

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Privacy and Security in library RFID Issues, Practices and Architecture

GS-SL2X00 Series. GS-WTX00 Series. Enterprise Android Barcode Device. User Manual

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Enabling the secure use of RFID

RFID based Bill Generation and Payment through Mobile

Dr. Pat Mirenda. Software Design Specification Document

PREFETCH VIDEO CONFERENCE OVER LAN THROUGH PC S OR LAPTOPS

MOBILE GAMING SYSTEM POLICIES

SecureCom Mobile s mission is to help people keep their private communication private.

E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption

2 SYSTEM DESCRIPTION TECHNIQUES

Lab Exercise Objective. Requirements. Step 1: Fetch a Trace

Measurement and Analysis Introduction of ISO7816 (Smart Card)

SYSTEM DEVELOPMENT AND IMPLEMENTATION

Chapter 4: Tools of Modern Systems Analysis

Security Levels for Web Authentication using Mobile Phones

3D PASSWORD. Snehal Kognule Dept. of Comp. Sc., Padmabhushan Vasantdada Patil Pratishthan s College of Engineering, Mumbai University, India

What is our purpose?

PrivyLink Internet Application Security Environment *

Remote Desktop Access through Android Mobiles and Android Mobiles Access through Web Browser

IDRBT Working Paper No. 11 Authentication factors for Internet banking

Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader

CPS221 Lecture: Layered Network Architecture

융프라우 수출향 RAC APP_IB_E_34261A(2).indd 오후 2:10:18

DESIGN AND IMPLEMENTATION OF AN INTRANET SECURITY AND ACCESS CONTROL SYSTEM IN UBI-COM

Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht (info@eonline.de) V0.1draft

AN1304. NFC Type MIFARE Classic Tag Operation. Application note PUBLIC. Rev October Document information

RFID Security: Threats, solutions and open challenges

AN1305. MIFARE Classic as NFC Type MIFARE Classic Tag. Application note COMPANY PUBLIC. Rev October Document information

Integrating F5 Application Delivery Solutions with VMware View 4.5

PUF Physical Unclonable Functions

TOTAL DEFENSE MOBILE SECURITY USER S GUIDE

SSL VPN Technology White Paper

RFID Based 3D Indoor Navigation System Integrated with Smart Phones

Voltage SecureData Web with Page-Integrated Encryption (PIE) Technology Security Review

Final Year Project Interim Report

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

Agent-based University Library System

Applying the NFC Secure Element in Mobile Identity Apps. RANDY VANDERHOOF Executive Director Smart Card Alliance

Operating instructions TSE Wireless Software Home

Design of Chatting Application Based on Android Bluetooth

Automated Blood Bank Management System Using Direct Call Routing Technique

Chapter 17. Transport-Level Security

Information Security Group (ISG) Core Research Areas. The ISG Smart Card Centre. From Smart Cards to NFC Smart Phone Security

Dr. Z. A. Usmani, Mohsin,Diksha,Husainali,AbdulKadir Page 15

PrinterOn Mobile App for ios and Android

ABSTRACT I. INTRODUCTION

Transcription:

IMPLEMENTATION OF RELIABLE ATTENDENCE SYSTEM USING ANDROID AND NEAR FIELD COMMUNICATION TECHNOLOGY VIJAY KAKANI Department of Electronic and Computer Engineering, University of Limerick, Ireland Abstract Technology is an outcome of education, but in this modern technological era time has come to education to get benefits from technology. Student attendance monitoring system is a system that will take students attendance by using android and NFC technology. This system mainly comprises of active NFC device (Mobile Device) which is used as a reader, passive NFC tags which are embedded to the students ID cards and Server machine with database and application server. Android application installed in active NFS device will read student s NFC tag embedded card and identify the unique identifier assign to student and that will be transfer to application server with other details in a encrypted secured message over wireless network and stored in the database.interfaces will be provided to access and analyze data in a secured way to administration staff to look in to daily attendance and to create timely reports. This System will replace old and inefficient paper based systems. This paper discusses the framework implementation of the system with corresponding software designing diagrams. On the other hand, the results are illustrated from the implemented procedure using the Samsung NFC tag with the android implemented NFC code. Keywords: NFC technology, Student Attendance system, Android SDK, NFC tags 1. Introduction Near Field Communication (NFC) is an integration of contactless smart card communication technology in mobile devices such as mobile phones. NFC Technology offers three modes of operation and each mode differs from the others in terms of communication and data processing model. Each mode has properties that can distinguished, advantages and disadvantages; so that each one of them offers different business opportunities and different perspectives of value added. In this work we study NFC applications currently available, as well as its application prototypes. Subsequently, we analyze the applications in order to find the features that offer. The central idea of this work is to implement some of the emerging technologies such as computing, mobile smart card technology and near field communications. The concept of Near Field Communication (NFC) is indeed a short range high frequency wireless technology which facilitates the users to exchange data between the devices at certain limited range of distance (10 centimeters). The concept of NFC is based on the wireless communication between the two entities making the protocol more commonly called as the peer-to-peer communication protocol. Here the two parties participating in the wireless communications are the computer peripherals and the customer electronic. This communications in the wireless mode operates at the reasonable radio frequencies like 13.56 MHz [1] [2] which indeed don t require any sort of permissions or licenses. But each and every country has its limitations on the use of RF frequency ranges. In this project point of view, the usage of operating distance is set up between 0~20 cm. In this mode of wireless transfer the communicating entities share the single RF channel making the communication scenario as half duplex listen before talk policy. The device must talk or transmit the signal after listening to the signal transmitted by the other device and making the confirmation that the other devices aren t transmitting. This indeed has the two entities mentioned with certain terminology like Initiator and the Target. As the name indicates, the initiator makes the initial communication and controls the data exchange and the Target responds to the Initiator by answering to the requests sent by Initiator. Thereby using android in this project could have the capability of gaining more access and having more flexibility with the recent technologies. In the perspective of the use cases for the NFC, initially there are 3 main use cases: Card emulation: In this the NFC device acts as if an existing card with contactless in practice [3]. Reader mode: In this mode, the NFC device will be active and also reads the passive RFID tag for interactive advertising and other initial issues [3]. Peer-to-Peer mode: In this mode, the NFC devices communicate with each other in the way by exchanging information. In this scenario, the usage of android beam is done in order to communicate with each other [3]. The NFC communication also supports the active and passive mode of communications: Active mode: In this mode, the both devices generate the RF fields of their own to carry the data. As such the name says the devices acting in the communication are in the active mode [4]. Passive mode: In this mode, only one device acts as a generator of the RF field and the other will use the load modulation to transfer the data. In such cases, the protocol itself specifies the device that is responsible for the generation of RF field is Initiator [4]. 5

Fig. 1 Active mode Fig. 2 Passive mode 2. System Analysis 2.1. Existing System Presently we are implementing some manual registers to enter the student attendants and for other details which lead to lot of time consuming process and it was very complicated work to retrieve the student details from older days to check his attendants. After this we implemented barcode readers to give authentication to the users (students) but it was quite unsecured process where the barcode can be corrupted. So for more secured authentication fingerprint readers were implemented but it was a very expensive process. 2.2. Proposed System In the proposed system implementing a very simple NFC (Near Field Communication) System with an android application device to track the attendance details of the student and providing some access permissions to the student in the campus. The system implemented in NFC was highly secured. Although the higher-layer cryptographic protocols (e.g., SSL) are used to establish a secure channel in order to overcome General Security Threats like Eavesdropping, Data modification, Relay attack, and Lost property and Walk-off. Fig. 3 Proposed system schematic 3. Flow Schematic of the Proposed System 3.1 System Modules The following are the modules used in the project to accomplish the task, there are hereby very important stages of the total implementation. NFC reader Data Transfer Data Maintenance 3.1.1 NFC Reader: 6

In this module the active NFC device read the passive NFC tags to authenticate the student. This module consists of passive mode of communication and then the whole picture of transferring data to the database comes next to this stage. In this stage, the NFC tags which has its significant information stored as the encrypted data could later be read by the reader (NFC enabled phone in this case) to decrypt and send the information to the server as well store in the database. This is the initial module that is to be implemented using NFC tag and a reader which can read it. 3.1.2 Data Transfer: In this module the student details which were retrieved from the passive tag were used as a reference of the particular student and his/her in time when he entered and his/her out time when leave the campus wear updated to the server in secured manner. The security provided to the data while transferring from NFC device to the server in wireless medium by implementing the higher-layer cryptographic protocols (e.g., SSL) to establish a secure channel and need to overcome General Security Threats like Eavesdropping, Data modification, Relay attack, and Lost property and Walkoff. Data security will be provided though application server and Database management system. This step is very important in terms of the security aspects, being involved with some techniques to prevent the attacks on the system information that is transferred to the server from the reader device. 3.1.3 Data maintenance: In data maintenance process the data received from the active NFC device was decrypted and use the student id and name as reference and updates the student details like in time, out time, late time and absent in the database and send the report to the student and the parents about the student status report And the data was not supposed to be modified other than the administrator. Maintaining such system requires exact accessibility and errorless storage facilities. Fig. 4 Flow schematic of the proposed system The system flow starts with the user making a contactless communication using his/her NFC enabled device towards the NFC tag; a passive RFID card in which the details of the student is stored and also the reader can also be used in the another context making the user to access to the services on campus. Firstly, the user initiates the communication between the reader and the card, thereby the information present in the card, i.e.; name and ID details of the student are sensed by the reader (NFC enabled device) and then these are sent to the server or processing unit of the whole institute or organization to prepare a data log and to acquire the access permissions. Here at this point of system flow, the very crucial issue comes to play regarding the security for the data transferred from the reader device to the processing system using wireless networks etc. Here in the proposed system, some of the algorithms and high end cryptographic security systems are used such as secure socket layer protocols in order to present the security aspect and to prevent the data from attackers. Finally, the student or the staff in that organization gets the access to the services provided and also the records are stored in the data base about the user using the service at that point of time. Later on the records can be cross checked or retrieved if needs and these retrieving access permissions are also limited to the users, staff and the parents. For instance, the student is willing to see his record of attendance this month, and then he/she can log into the system with their data information and see the details. The admin will have full access to the system and can control each and every record upto-date. Here ends the flow schematic making the system more user friendly in nature. 4. System Design using UML diagrams 7

4.1 Use Case Diagrams A use case diagram in the unified modeling language is a form of behavioral diagram shaped from a Use-case analysis. This presents a pictorial overview functionality of the system in terms of actors, their goals and any dependencies between them. Fig. 5 Use case diagram of the NFC system 4.2. Data Flow Diagram: The data flow is explained between the staff and the system controller and the students data with the server and thereby the admin data etc. Fig. 6 First level DFD diagram 8

4.3. Entity Relationship Diagram: An entity-relationship diagram is a modeling language diagram that creates a graphical representation of the entities, and the relationships between entities, and also creates a clear picture of all the entities involved and each action performed via system. 5. Results and Discussions 1. Stick the TechTile (NFC Tag) to a non-metal surface. Fig. 7 Entity Relationship Diagram Fig. 8 Samsung NFC tag used in the practical session 2. Enable NFC in the Samsung Galaxy S3 through settings menu. Fig. 9 Screenshot of NFC enabled device with android program apps. 3. Open the NFC writer application: a. Input Student ID and Student Name b. Save information temporarily in the memory using button Save to Tag 9

c. Tap the tag with the phone and the display should read Message to tag written. Fig. 10 Sequence of screenshots showing the tag writing process 4. Open the NFC reader application: a. Tap the tag with the phone and the display should read the student details of all the students registered in the tag. b. Delete button may be used to empty the NFC tag and freeing the memory. Fig. 11 Sequence of screenshots showing the tag reading process 6. Conclusion This NFC Attendance System using Android focuses on the elements like the user friendly system which is capable of having the student records in an organization with secured manner. The NFC system used in this project is carried by the virtual android elements like NFC tag and NFC reader as the emulator. This android virtual device enables the system to view the graphical user interface thereby creating the real android device functioning with the NFC tag. The system efficiency and handling costs are also some of the factors that are discussed in the feasibility study; explaining the easy access to the system and cost efficiency in the user s point of view. Coming to the other very important aspect is the error probability and technical aspects, which are also discussed during the feasibility study; these are the vital features of the system making this NFC system as a user friendly and efficient system. In the results and discussions section, the programming code fragments are executed in the ellipse tool kit and android sdk tool kit to get the output as the practical NFC tag-reader communication is demonstrated in a great way. References 1. C. Patauner1, H. Witschnig1, D. Rinner2, A. Maier3, E. Merlin1, E. Leitgeb2 High Speed RFID/NFC at the Frequency of 13.56 MHz, 1.NXP Semiconductors 2.Institute of Broadband Communications, Graz University of Technology 3.Fachhochschule Technikum K arnten 2. Yang, B., & Sun, J. (2011). Near field communication technology. Linkopings Universitet, 3. Cavoukian, A. (2012). Near Field Communications. 4. Haselsteiner, E., & Breitfuß, K. (2006, July). Security in near field communication (NFC). In Workshop on RFID Security RFIDSec. 10