Indonesian Journal of Electrical Engineering and Computer Science
Vol. 8, No. 3, December 2017, pp. 651 ~ 653
DOI: 10.11591/ijeecs.v8.i3.pp651-653  651
Received August 10, 2017; Revised October 22, 2017; Accepted November 13, 2017
NFC Based Digital Innovation Technique to Eliminate
Coin Shortage Problem
Paramasivam E., D. Arivazhagan
Department of Information Technology, AMET University, Chennai, India
Abstract
India has an issue with little change in Restaurants, Auto-Taxi drivers, Retail Shops, Public
Busses, and Markets wherever individuals experience the ill effects of coin lack issue. Yet at the same
time, the regular man confronts lack of progress and frequently being paid in éclairs, mints and biting
gums. This venture proposes an inventive arrangement called Byte-COIN; to take care of the coin lack
issue that we are confront in our nation. The arrangement included a secured advanced payment
framework that has reason assembled margins on the sum required in the exchange. Every exchange
includes the support of the vendor and customer. In spite of the fact that there is no instant contact with the
bank at the time of year of exchange, a base support of banks is important to effectively execute this.
There is no need of a web association, in this way making it available to all aspects of the nation.
Keywords: Byte, Coin, RBI, NFC, ARM Cortex M-3
Copyright © 2017 Institute of Advanced Engineering and Science. All rights reserved.
1. Introduction
RBI supplies billions of coins each year in different divisions crosswise over India. Yet at
the same time, the regular man confronts lack of progress and frequently being paid in éclairs,
mints and biting gums [1]. The client needs to have an affirmed Byte-COIN card. Every retailer
and businessperson ought to claim a Byte-COIN gadget. It has a couple of key reason
fabricated constraints. Each card can hold a most extreme of just 200 Rs. Every gadget has a
most extreme day by day point of confinement of 20000 Rs [2]. Any single coin exchange can
just exchange a sum in the vicinity of 1 and 9 Rs. The card stores subtle elements like the client
telephone number, name, adjust sum and a protected key.
The per user has a double show screen, the retailer side one is a GUI in light of touch
screen TFT show sort while the client centred one is representation show sort [3]. Both the
show carries on keen in indicating just the important data as per the watcher. Retailer side show
dependably demonstrates the present adjust on the retailer gadget.
A retailer must take his Byte-COIN gadget to the bank to energize with the coveted
sum. On accepting the sum from the retailer, a bank clerk can associate the gadget to the bank
machine utilizing USB link and exchange the coveted revive sum [4]. The bank will keep up a
database of the gadgets issued; accordingly the gadget will be naturally checked for its
validness. Survey on encryption techniques used to secure cloud storage system is discussed
in [5]. Analysis of cloud computing technology is explained in [6].
2. Proposed Methodologies
This venture proposes an imaginative arrangement called Byte-COIN, to take care of
every exchange includes the support of the merchant and shopper. In spite of the fact that there
is no straight making contact with the bank at the period of exchange, a base significance of
banks is main to efficiently perform this. Major part of web association, in this way creation it
open to all features of the nation.
 ISSN: 2502-4752
IJEECS Vol. 8, No.3, December 2017 : 651 – 653
652
Figure 1. Block diagram of byte coin
2.1. NFC
The entire payment process is carried over NFC, which is a secure and universal
contactless communication technology evolved from RFID. It operates in the 13.56MHz radio
frequency band and the communication typically happens at 10 cm or lesser distance. Thus the
transaction happens when the two devices are at very close proximity to each other. A NFC
controller from NXP semiconductor is used for this purpose. The cards used in this project are
standard Type-A NFC tags. Although we have not used, the recently introduced NTAG Type 2
NFC cards offer much superior security mechanisms for a project like this.
• Short range contactless technology
• Limited to 10cm range
• Very high privacy
• 13.56 MHz frequency
• 106 to 424 Kbps data rate
• Low cost and low power than Bluetooth or Wi-Fi
• Three operating modes
– Read/Write
– Peer to Peer
3. Result and Implementation
The accompanying strategy compresses a coin exchange,
• Before starting a coin exchange, each card will be tried for its legitimacy. A genuine card is
a one that has an encoded memory territory that has a protected key which will be utilized
for further exchange.
• Once the card is put on the gadget, it gets checked and the retailer will be affirmed with
this data.
• The retailer ought to press the acknowledge catch to start the exchange. The peruser now
demonstrates the present adjust of the card in both presentations.
• Each coin exchange information is encoded utilizing RC5 stream cryptography.
• The heading of exchange, either to or from the card must be chosen physically.
• The retailer enters the measure of rupees to be exchanged.
IJEECS ISSN: 2502-4752 
NFC Based Digital Innovation Technique to Eliminate Coin Shortage Problem (Paramasivam E.)
653
• Depending on the bearing of exchange, the sum gets added to the past adjust sum in the
card or in the gadget. Both the gadget and card store the computerized money in their
encoded memory locale.
• Immediately after this, the gadget sends a SMS with the present adjust sum on the card to
the client.
• The show demonstrates the fruitful finishing of the exchange.
• This closes the entire exchange.
Figure 2. Implementation of Bytecoin
Even though the way this ramble can be executed even without the support of a bank, it
will be mind blowing while at the same time considering the wide insistence and the entire
arrangement sound judgment of the ramble. The card and the contraption ought to be issued by
the bank experts in the wake of testing and endorsing. A bank can keep up the client folder both
the contraption proprietors and card proprietors. This will make the support technique a less
troublesome one. Since there is a focal database to store the card and the gadget motivations
behind energy there is an approach to manage organization it for occasion a lost card or a
stolen gadget.
References
[1] Zhao B Mahoney. Analysis of a NFC Wireless Power System. 2010.
[2] M Emms, et al. Practical Attack on Contactless Payment Cards. In Workshop-Heath, Wealth and
Identity Theft. 2011.
[3] R Lifchitz. Hacking the NFC Credit Cards. Hackito Ergo Sum conference.
[4] J Rodrigues, et al. A Secure NFC Application for Credit Transfer Among Mobile Phones. 2012: 1-5.
[5] Kirubakaramoorthi R, Arivazhagan D, Helen D. Survey on Encryption Techniques used to Secure
Cloud Storage System. Indian journal of Science and Technology. 2015; 8(36).
[6] Kirubakaramoorthi R, Arivazhagan D, Helen D. Analysis of Cloud Computing Technology. Indian
Journal of Science and Technology. 2015; 8(21).

More Related Content

PPTX
Mobile Wallet security
PPTX
Dissertation presentation on Digital Wallet
PPTX
Trends in banking sector
PDF
Mobile based secure digital wallet for peer to peer payment system
PPT
E wallet by amin
PPSX
E banking Services
PPTX
How to use digital wallet effectively
PDF
Mobile Payments in India - Operative Guidelines for Banks
Mobile Wallet security
Dissertation presentation on Digital Wallet
Trends in banking sector
Mobile based secure digital wallet for peer to peer payment system
E wallet by amin
E banking Services
How to use digital wallet effectively
Mobile Payments in India - Operative Guidelines for Banks

What's hot (20)

PPTX
Digital wallet
PPT
Technology In Indian Banking 2008
PPTX
Payment systems
PPT
Digital Payment Campaign
PPTX
BlueHornet Webinar: The Rise of the Digital Wallet - New Opportunities for Em...
PPTX
Electronic and mobile banking
PPTX
New innovations in banking industry
PPS
43394328 e-banking
PPT
Mobile Money Transfer (MMT)
PDF
Mobile Wallets - Brief Info Overview
PPTX
Mobile banking
PPTX
Innovation of Products & Services in Banking
PPTX
MBA Best Mobile Banking Presentation
PPTX
Digital wallet(p)
PPTX
Payment systems
PPTX
Digital payment
PDF
Bitex presentation-lightpaper latest
PPTX
E-BANKING (ORGANISATION, MANAGEMENT AND TECHNOLOGY)
PPTX
Fintech
PDF
DIGITAL BANKING
Digital wallet
Technology In Indian Banking 2008
Payment systems
Digital Payment Campaign
BlueHornet Webinar: The Rise of the Digital Wallet - New Opportunities for Em...
Electronic and mobile banking
New innovations in banking industry
43394328 e-banking
Mobile Money Transfer (MMT)
Mobile Wallets - Brief Info Overview
Mobile banking
Innovation of Products & Services in Banking
MBA Best Mobile Banking Presentation
Digital wallet(p)
Payment systems
Digital payment
Bitex presentation-lightpaper latest
E-BANKING (ORGANISATION, MANAGEMENT AND TECHNOLOGY)
Fintech
DIGITAL BANKING
Ad

Similar to 15 9247 nfc based digital innovation (edit ari) (20)

PDF
Digits ico-whitepaper-1v8c
PDF
An ATM Multi-Protocol Emulation Network
PPTX
Digital wallet (e-wallet)
DOCX
Money pad future wallet
PDF
MOBILE BASED SECURE DIGITAL WALLET FOR PEER TO PEER PAYMENT SYSTEM
PDF
IRJET - A Survey Paper on Secure Digital Payment
PPTX
Epayments system in India and globally iit project
PPTX
Digital cash, near feild communication and ultra cash
PPTX
Digital wallet
PDF
Application to Quickly and Safely Store and Recover Credit Card’s Information...
PPTX
E walllet / Digital Wallet
PDF
Secure E-payment Protocol
PPTX
Digital Cash Overview
PDF
An Improvement To The Set Protocol Based On Signcryption
PPTX
Electronic payment system
PPTX
technical seminar-money pad.pptx
PPT
Moneypad
PPTX
RBI Tokenization And Impact on Digital Adoption
PDF
IRJET- Smart Shopping Application using NFC
PPTX
Money pad ppt
Digits ico-whitepaper-1v8c
An ATM Multi-Protocol Emulation Network
Digital wallet (e-wallet)
Money pad future wallet
MOBILE BASED SECURE DIGITAL WALLET FOR PEER TO PEER PAYMENT SYSTEM
IRJET - A Survey Paper on Secure Digital Payment
Epayments system in India and globally iit project
Digital cash, near feild communication and ultra cash
Digital wallet
Application to Quickly and Safely Store and Recover Credit Card’s Information...
E walllet / Digital Wallet
Secure E-payment Protocol
Digital Cash Overview
An Improvement To The Set Protocol Based On Signcryption
Electronic payment system
technical seminar-money pad.pptx
Moneypad
RBI Tokenization And Impact on Digital Adoption
IRJET- Smart Shopping Application using NFC
Money pad ppt
Ad

More from IAESIJEECS (20)

PDF
08 20314 electronic doorbell...
PDF
07 20278 augmented reality...
PDF
06 17443 an neuro fuzzy...
PDF
05 20275 computational solution...
PDF
04 20268 power loss reduction ...
PDF
03 20237 arduino based gas-
PDF
02 20274 improved ichi square...
PDF
01 20264 diminution of real power...
PDF
08 20272 academic insight on application
PDF
07 20252 cloud computing survey
PDF
06 20273 37746-1-ed
PDF
05 20261 real power loss reduction
PDF
04 20259 real power loss
PDF
03 20270 true power loss reduction
PDF
02 15034 neural network
PDF
01 8445 speech enhancement
PDF
08 17079 ijict
PDF
07 20269 ijict
PDF
06 10154 ijict
PDF
05 20255 ijict
08 20314 electronic doorbell...
07 20278 augmented reality...
06 17443 an neuro fuzzy...
05 20275 computational solution...
04 20268 power loss reduction ...
03 20237 arduino based gas-
02 20274 improved ichi square...
01 20264 diminution of real power...
08 20272 academic insight on application
07 20252 cloud computing survey
06 20273 37746-1-ed
05 20261 real power loss reduction
04 20259 real power loss
03 20270 true power loss reduction
02 15034 neural network
01 8445 speech enhancement
08 17079 ijict
07 20269 ijict
06 10154 ijict
05 20255 ijict

Recently uploaded (20)

PDF
Categorization of Factors Affecting Classification Algorithms Selection
PDF
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
PDF
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
PPTX
tack Data Structure with Array and Linked List Implementation, Push and Pop O...
PDF
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PDF
August -2025_Top10 Read_Articles_ijait.pdf
PPTX
Management Information system : MIS-e-Business Systems.pptx
PDF
Abrasive, erosive and cavitation wear.pdf
PPTX
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
PPTX
"Array and Linked List in Data Structures with Types, Operations, Implementat...
PPTX
Feature types and data preprocessing steps
PDF
Exploratory_Data_Analysis_Fundamentals.pdf
PPTX
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
PDF
distributed database system" (DDBS) is often used to refer to both the distri...
PDF
Soil Improvement Techniques Note - Rabbi
PPTX
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
Categorization of Factors Affecting Classification Algorithms Selection
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
tack Data Structure with Array and Linked List Implementation, Push and Pop O...
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
August -2025_Top10 Read_Articles_ijait.pdf
Management Information system : MIS-e-Business Systems.pptx
Abrasive, erosive and cavitation wear.pdf
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
"Array and Linked List in Data Structures with Types, Operations, Implementat...
Feature types and data preprocessing steps
Exploratory_Data_Analysis_Fundamentals.pdf
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
distributed database system" (DDBS) is often used to refer to both the distri...
Soil Improvement Techniques Note - Rabbi
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx

15 9247 nfc based digital innovation (edit ari)

  • 1. Indonesian Journal of Electrical Engineering and Computer Science Vol. 8, No. 3, December 2017, pp. 651 ~ 653 DOI: 10.11591/ijeecs.v8.i3.pp651-653  651 Received August 10, 2017; Revised October 22, 2017; Accepted November 13, 2017 NFC Based Digital Innovation Technique to Eliminate Coin Shortage Problem Paramasivam E., D. Arivazhagan Department of Information Technology, AMET University, Chennai, India Abstract India has an issue with little change in Restaurants, Auto-Taxi drivers, Retail Shops, Public Busses, and Markets wherever individuals experience the ill effects of coin lack issue. Yet at the same time, the regular man confronts lack of progress and frequently being paid in éclairs, mints and biting gums. This venture proposes an inventive arrangement called Byte-COIN; to take care of the coin lack issue that we are confront in our nation. The arrangement included a secured advanced payment framework that has reason assembled margins on the sum required in the exchange. Every exchange includes the support of the vendor and customer. In spite of the fact that there is no instant contact with the bank at the time of year of exchange, a base support of banks is important to effectively execute this. There is no need of a web association, in this way making it available to all aspects of the nation. Keywords: Byte, Coin, RBI, NFC, ARM Cortex M-3 Copyright © 2017 Institute of Advanced Engineering and Science. All rights reserved. 1. Introduction RBI supplies billions of coins each year in different divisions crosswise over India. Yet at the same time, the regular man confronts lack of progress and frequently being paid in éclairs, mints and biting gums [1]. The client needs to have an affirmed Byte-COIN card. Every retailer and businessperson ought to claim a Byte-COIN gadget. It has a couple of key reason fabricated constraints. Each card can hold a most extreme of just 200 Rs. Every gadget has a most extreme day by day point of confinement of 20000 Rs [2]. Any single coin exchange can just exchange a sum in the vicinity of 1 and 9 Rs. The card stores subtle elements like the client telephone number, name, adjust sum and a protected key. The per user has a double show screen, the retailer side one is a GUI in light of touch screen TFT show sort while the client centred one is representation show sort [3]. Both the show carries on keen in indicating just the important data as per the watcher. Retailer side show dependably demonstrates the present adjust on the retailer gadget. A retailer must take his Byte-COIN gadget to the bank to energize with the coveted sum. On accepting the sum from the retailer, a bank clerk can associate the gadget to the bank machine utilizing USB link and exchange the coveted revive sum [4]. The bank will keep up a database of the gadgets issued; accordingly the gadget will be naturally checked for its validness. Survey on encryption techniques used to secure cloud storage system is discussed in [5]. Analysis of cloud computing technology is explained in [6]. 2. Proposed Methodologies This venture proposes an imaginative arrangement called Byte-COIN, to take care of every exchange includes the support of the merchant and shopper. In spite of the fact that there is no straight making contact with the bank at the period of exchange, a base significance of banks is main to efficiently perform this. Major part of web association, in this way creation it open to all features of the nation.
  • 2.  ISSN: 2502-4752 IJEECS Vol. 8, No.3, December 2017 : 651 – 653 652 Figure 1. Block diagram of byte coin 2.1. NFC The entire payment process is carried over NFC, which is a secure and universal contactless communication technology evolved from RFID. It operates in the 13.56MHz radio frequency band and the communication typically happens at 10 cm or lesser distance. Thus the transaction happens when the two devices are at very close proximity to each other. A NFC controller from NXP semiconductor is used for this purpose. The cards used in this project are standard Type-A NFC tags. Although we have not used, the recently introduced NTAG Type 2 NFC cards offer much superior security mechanisms for a project like this. • Short range contactless technology • Limited to 10cm range • Very high privacy • 13.56 MHz frequency • 106 to 424 Kbps data rate • Low cost and low power than Bluetooth or Wi-Fi • Three operating modes – Read/Write – Peer to Peer 3. Result and Implementation The accompanying strategy compresses a coin exchange, • Before starting a coin exchange, each card will be tried for its legitimacy. A genuine card is a one that has an encoded memory territory that has a protected key which will be utilized for further exchange. • Once the card is put on the gadget, it gets checked and the retailer will be affirmed with this data. • The retailer ought to press the acknowledge catch to start the exchange. The peruser now demonstrates the present adjust of the card in both presentations. • Each coin exchange information is encoded utilizing RC5 stream cryptography. • The heading of exchange, either to or from the card must be chosen physically. • The retailer enters the measure of rupees to be exchanged.
  • 3. IJEECS ISSN: 2502-4752  NFC Based Digital Innovation Technique to Eliminate Coin Shortage Problem (Paramasivam E.) 653 • Depending on the bearing of exchange, the sum gets added to the past adjust sum in the card or in the gadget. Both the gadget and card store the computerized money in their encoded memory locale. • Immediately after this, the gadget sends a SMS with the present adjust sum on the card to the client. • The show demonstrates the fruitful finishing of the exchange. • This closes the entire exchange. Figure 2. Implementation of Bytecoin Even though the way this ramble can be executed even without the support of a bank, it will be mind blowing while at the same time considering the wide insistence and the entire arrangement sound judgment of the ramble. The card and the contraption ought to be issued by the bank experts in the wake of testing and endorsing. A bank can keep up the client folder both the contraption proprietors and card proprietors. This will make the support technique a less troublesome one. Since there is a focal database to store the card and the gadget motivations behind energy there is an approach to manage organization it for occasion a lost card or a stolen gadget. References [1] Zhao B Mahoney. Analysis of a NFC Wireless Power System. 2010. [2] M Emms, et al. Practical Attack on Contactless Payment Cards. In Workshop-Heath, Wealth and Identity Theft. 2011. [3] R Lifchitz. Hacking the NFC Credit Cards. Hackito Ergo Sum conference. [4] J Rodrigues, et al. A Secure NFC Application for Credit Transfer Among Mobile Phones. 2012: 1-5. [5] Kirubakaramoorthi R, Arivazhagan D, Helen D. Survey on Encryption Techniques used to Secure Cloud Storage System. Indian journal of Science and Technology. 2015; 8(36). [6] Kirubakaramoorthi R, Arivazhagan D, Helen D. Analysis of Cloud Computing Technology. Indian Journal of Science and Technology. 2015; 8(21).