SlideShare a Scribd company logo
ISSN (e): 2250 – 3005 || Volume, 05 || Issue, 05 || May – 2015 ||
International Journal of Computational Engineering Research (IJCER)
www.ijceronline.com Open Access Journal Page 23
Electronic Identification System using RFID
A.P.Adsul1
, DigvijayDamame2
, PoojaGarde3
, Kajal Jore4
, Kunal Shah5
Assistant Professor1
, U.G. Scholars 2,3,4,5
Department of IT, Sinhgad Institute of Technology and Science, Narhe, Pune-411041
I. INTRODUCTION
RFID is a generic technology concept that refers to the use of radio waves to identify objects. Any
object can be traced using RFID tags when those objects are moving in the network of RFID readers. The RFID
Reader Network here consists of densely deployed RFID Readers which are connected by short-range wireless
technologies in ad hoc mode. Consequently, an RFID system essentially consists of three parts: the RFID tag
itself, the RFID reader device and a backend IT system. For example, in school area the RFID network is
deployed by using Virtual Route Track algorithm. Using this algorithm, the system can real-timely track the
location of the students who are moving within the premises.
RFID – (Radio Frequency Identification) is the wireless use of electromagnetic fields to transfer data,
for the purposes of automatically identifying and tracking tags attached to objects. The tags contain
electronically stored information. Some tags are powered by electromagnetic induction from magnetic fields
produced near the reader. Some types collect energy from the interrogating radio waves and act as a passive
transponder.
RFID tags can be passive, active or battery-assisted passive. An active tag has an on-board battery and
periodically transmits its ID signal. A battery-assisted passive (BAP) has a small battery on board and is
activated when in the presence of an RFID reader. A passive tag is cheaper and smaller because it has no
battery; instead, the tag uses the radio energy transmitted by the reader. However, to operate a passive tag, it
must be illuminated with a power level roughly a thousand times stronger than for signal transmission. That
makes a difference in interference and in exposure to radiation. RFID systems can be classified by the type of
tag and reader. A Passive Reader Active Tag (PRAT) system has a passive reader which only receives radio
signals from active tags (battery operated, transmit only).An Active Reader Passive Tag (ARPT) system has an
active reader, which transmits interrogator signals and also receives authentication replies from passive tags.
An Active Reader Active Tag (ARAT) system uses active tags awoken with an interrogator signal from the
active reader. A variation of this system could also use a Battery-Assisted Passive (BAP) tag which acts like a
passive tag but has a small battery to power the tag's return reporting signal. RFID system has six different
frequency bands. These are 120-150 KHz (LF), 13.56 MHz (HF), 433 MHz (UHF), 865-868 MHz, 2450-
5800 MHz (microwave), 3.1–10 GHz (microwave).
II. SYSTEM OVERVIEW
Figure.1 shows, an active RFID system, active RFID readers are typically connected by physical cables for data
communications purposes. Active RFID systems have also been implemented using a Wi-Fi-based
infrastructure. Using P2P network architecture we will get a more flexible active RFID system.
ABSTRACT:
In this modernization Era and rapid growing metro cities, security is must in every field. This work
describes a location and the identity of the persons using RFID (Radio Frequency Identification) tags
and readers. RFID is an automatic identification (auto-ID) technology that uses tags and readers for
remotely storing and retrieving data. RFID reader can sense (identify) persons, animals, vehicles and
goods by interrogating transponders tagged on them. From this perspective, RFID Reader, Reader
Network is a Sensor and Sensor Network that is context-aware, respectively. However, only sensing is
not enough in many scenarios. Hence this work also proposes a tracking algorithm such as coined
Virtual Route Tracking (VRT), to realize tracking persons or objects in RFID Reader Network.
Electronic Identification System…
www.ijceronline.com Open Access Journal Page 24
Figure 1. System Overview
Figure 2. System Architecture
Figure. 2 demonstrate the system architecture of the RFID-based location system makes use of a
2.4GHz. This architecture includes major elements such as mobile, active tag, reader, node (reader), and server.
A tag is a 2.4 GHz active tag, which is attached to a tracking object. Each node is an active RFID reader that
communicates with the tags and the server. Using this architecture and virtual route track algorithm the location
of the person can easily get track. Architecture helps the system with implementing the use of Wi-Fi
technologies so that when the person get track by the RFID, the location of the person get updated on the server.
This technology is used for contacting end users (PARENTS) i.e. for sending messages to the parents. System
Network protocol stack consists of Application, TCP, IP, WI FI Driver, Physical layers. In Transmitting a
message travels down the stack from the application layer that initiates the message to the network interface that
places the message on network. In receiving message travels up the stack from the network interface to
application layer that uses the data in received message. Within local network the application layer
communicate directly with the WI FI driver.
2.1. VIRTUAL ROUTE TRACK PRINCIPLE
The Virtual Track algorithm is presented in Figure.3. The basis of VRT algorithm is that the debriefing
range of RFID system is very short compared to the distance between readers. Instead of powering the RFID
transponder directly by battery, it gets power through magnetic, electric and electromagnetic coupling with
RFID readers. One or more batteries are embedded for Active transponders. However, the embedded battery
only provides power to run chips, and data are transferred from transponder to reader by modulating on reflected
electromagnetic waves emitted by RFID reader, like the ways of Radars. Thus, the RFID system can achieve a
very short range varied from a few millimeters to several meters.
Figure 3. VRT Principle
Electronic Identification System…
www.ijceronline.com Open Access Journal Page 25
On the contrast, the range of wireless technologies used to connect RFID readers is large. For example,
ZigBee or UWB can connect two readers within 10 meters, and Bluetooth or Wi-Fi is effective at the distance of
100 meters. Therefore, when a transponder is sensed by a reader i.e. the transponder is located in the
interrogation zone of this reader; the real distance between reader and transponder is less than the range of the
RFID system. When the scale of the RFID Reader Network is large enough and the distance of deployed readers
is relatively long, VRT algorithm is very accurate.
The above figure3 indicates the RFID network in which the points denote the RFID reader and the lines
from one point to other point denote the path in which direction object is moving. The figure3 is in the form of
matrix. When an object is moving from reader (1, 1) to reader (2, 2) the straight line considered as track of the
transponder. In the above figure the object is moving following direction. The thick path denotes the actual path
of the object and the virtual line is defined as the track of the object.
Track = Virtual Route = (1, 1) (2, 2) (2, 3) (1, 4) (2, 5) (3,5)
(4, 4) (4, 3) (4, 2) (4, 1)
When a reader interrogates one transponder, the next reader interrogating it along the track MUST be
adjacent to the previous reader. According to the figure 3, it is obvious that the transponder at (2, 3) cannot jump
to (2, 5) directly without activating reader (1, 4), (2, 4) or (3, 4). Hence, the next reader of (2, 3) along the track
MUST be one of following readers: { (1,2), (1,3), (1,4), (2,2), (2,4), (3,2), (3,3), (3,4) } Hence, VRT algorithm
MUST choose adjacent readers along the track. If two successive readers along the track are not adjacent to each
other, special mechanism will be executed to guarantee that each reader along the track is contiguous to its last
and next reader in real-word position. The virtual line connecting readers in figure 3 looks like a Route
transferring data packets along the nodes. The route is not real in this so named as “Virtual Route”. In VRT
algorithm “Virtual Route” is used to stand for track of transponder in the RFID Reader Network. And that is
why this algorithm is coined Virtual Route Tracking (VRT).
Furthermore, the concept of Tracking Vector (TV) is used here [1]. In the collection of tracking
information and calculating the track the tracking vector plays a vital role. The combination of the transponder
identity, the interrogation time and the identifier of reader define as a Tracking Vector. The structure of TV is:
(Ti, tj, Rk) = < Transponder i timestamp j Reader k > Here, the transponder identity is a global unique number
(such as EPC global number) stored in the electronic chip of each transponder and interrogated by reader.
Timestamp is the interrogation time of RFID reader when the transponder entering its interrogation zone. Here
the assumption is that all RFID readers in RFID Reader Network are synchronous. And only one tracking vector
is generated no matter how long a transponder stays within the interrogation zone of one reader. The third
parameter in tracking vector is the identifier of the reader. VRT algorithm uses the position of readers to track
transponders. It is noted that successive selected readers are all adjacent to each other and therefore can form a
Virtual Route, therefore, reader identifiers of two successive Tracking vectors MUST stand for two contiguous
readers in real network.
2.2 TRACKING VECTOR ALGORITHM
The tracking calculation is as given. Suppose the following two TVs are sent to RFID Application
System simultaneously.
{ <T1, t1, R1> <T2, t2, R2> } (t1< t2).
The former reports that the reader with the identifier R1 has interrogated transponder T1 at time indicated by
timestamp t1. And the latter is the result of the reader R2 interrogated the transponder T2 at time indicated by
timestamp t2. If T1 is equal to T2, two Tracking vectors are derived from the same transponder. Suppose t2 is
greater than t1 and two readers are adjacent to each other, Virtual Route (or the track) is: Track = Virtual Route
= R1 → R2. However, the above is merely the simplest and ideal condition of tracking. The generalized
conditions are given as follow.
t1< t2 R1↔R2
T1=T2 t1= t2 R1 ∞ R2 (↔ : Adjacent, ∞ : Not Adjacent )
T1≠T2 t1> t2 R1= R2
Electronic Identification System…
www.ijceronline.com Open Access Journal Page 26
When transponder T1 is equal to T2, these two TVs are derived from one single transponder and
should be classified into the same vector group to calculate the track of this transponder. Otherwise, they are
classified into different vector groups for tracking transponder T1 and T2, respectively. About timestamp, when
t1 is less than t2, it is simply. And if t1 is greater than t2, exchange the sequence of two tracking vectors and it is
exactly as same as the above condition. The relationship of two readers can be grouped into three categories:
Adjacent, Not Adjacent and Equality. It is simply to calculate the condition that reader R1 is adjacent to R2.
However, the condition that R1 is not adjacent to R2 and the condition that R1 is equal to R2 require a more
complex processing method.
III. SYSTEM IMPLEMENTATION
The figure 4 shows the interfacing of Raspberry pi b+. The whole system is implemented by using
Raspberry pi b+ and Nordic nrf24L01. The connection between Raspberry pi b+ and nrf24L01 is shown in
figure 4 and the connection detail is shown in table 1.
Figure 4. Interfacing of Raspberry pi
Figure 5. System Implementation using Raspberry pi
Figure.5 shows the one reader and one tag connection by using router and one to one connector. The connection
of Raspberry pi b+ and nrf24L01 works as a reader as well as tag also.
Following table1 represents the interfacing of the pins of raspberry pi b+
Table 1Raspberry pi Interfacing Pin Details
Radio 7(miso) Gpio9/bcm21
Radio 6(miso) Gpio10/bcm19
Radio 5(sck) Gpio11/bcm23
Radio4 (csn) Gpio7/bcm26
Radio3 (ce) Gpio25/bcm22
Radio2 (3.3) 3.3v
Radio1 (gnd) Gnd
Electronic Identification System…
www.ijceronline.com Open Access Journal Page 27
IV. CONCLUSION
This System describes the concept of location tracking and updating the location using RFID system
which is based on the Virtual Route Track algorithm. System can easily track the location of the object. It helps
in keeping Security as its top priority.VRT algorithm can track tens and hundreds of transponders
simultaneously, instead of only one each time. This helps in time saving and managing multi task as required.
VRT is both effective and efficient in real network. System provides the advance tags and readers to work fast
and efficiently “Electronic Identification System” is going to reduce the crimes and will provide security and
information to parents as well as the society.
REFERENCES
[1]. Wei Jiang, Dan Yu, Yan Ma “A Tracking Algorithm in RFID Reader Network”, Proceedings of the Japan-China Joint Workshop on
Frontier of Computer Science and Technology (FCST'06) , 2006 IEEE
[2]. Felix C. P. Hui, Henry C. B. Chan, and S. H. Fung “RFID-based Location Tracking System Using a Peer-to-Peer Network
Architecture”, Proceedings of the International Multi Conference of Engineers and Computer Scientists Volume I IMECS, March
12 - 14, 2014, Hong Kong
[3]. Junyi Zhou · Jing Shi “RFID localization algorithms and applications—a review”,Science+Business Media, LLC, 2008, 696 – 698.
[4]. BaoXu, Wang Gang UWB Lab, Dept. of Telecommunication Engineering, Jiangsu University, Zhenjiang, Jiangsu Province,
“Random Sampling Algorithm in RFID Indoor Location System”, Proceedings of the Third IEEE International Workshop on
Electronic Design, Test and Applications (DELTA’06) 0-7695-2500-8/05 $20.00 © 2005 IEEE
[5]. Mohammed Bilal, Student, Department of Electronics & Communication, PG Studies, T John Institute of Technology ,“Real Time
Attendance Logging With Multi Node Embedded System Connected Via Wi-Fi”, International Journal of Reconfigurable and
Embedded Systems (IJRES) Vol. 1, No. 3, November 2012, pp. 103~107 ISSN: 2089-4864, 103 -106.
[6]. Nidhi Verma Department of C.S.E. G.C.E.T. Greater Noida India “Determining the Algorithm for Location Based Services Using
Indoor Positioning Techniques”, International Journal of Advanced Research in Computer Science and Software Engineering,
Volume 2, Issue 7, July 2012, ISSN: 2277 128X .
[7]. Ben Ammar Hatem, Faculty of Engineering, University of Moncton, NB, Canada,ehb7342@umoncton.ca Hamam Habib Faculty of
Engineering, University of Moncton, NB, Canada, habib.hamam@umoncton.ca , “Bus Management System Using RFID In WSN”,
European and Mediterranean Conference on Information Systems 2010 ( EMCIS2010 ) April 12-13 2009, Abu Dhabi, UAE.
[8]. Mr. Nilesh Manganakar, Mr. Nikhil Pawar, Mr. Prathamesh Pulaskar, “Real Time Tracking of Complete Transport System Using
GPS”, Proceedings of National Conference on New Horizons in IT - NCNHIT 2013, ISBN 978-93-82338-79-6.

More Related Content

PPT
DOCX
Rfid
PDF
RFID based Attandance cum Security System
PDF
RFID Electromagnetic project (rfid)
PDF
Backscattering Control Logic Component using FPGA Device
PPT
Rfidppt398 (1)
PDF
Co4301524529
PDF
Implementation of radio frequency identification technology in accessing info...
Rfid
RFID based Attandance cum Security System
RFID Electromagnetic project (rfid)
Backscattering Control Logic Component using FPGA Device
Rfidppt398 (1)
Co4301524529
Implementation of radio frequency identification technology in accessing info...

What's hot (20)

PDF
Data_Integrity_in_RFID_Systems
PDF
43 97-101
PDF
Implementing radio frequency identification technology in libraries advantage...
PPTX
Ioe module 3
PDF
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
PDF
A Survey: SMS Sending Through RFID Sensors
PDF
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
PDF
FINAL YEAR PAPER
PDF
Design of Anti-collision Technique for RFID UHF Tag using Verilog
DOC
Use of rfid in operations management operations management 3 introduction
PPTX
Rfid based employee tracking
DOCX
Abstract Radio Frequency Identificatication
PPTX
RFID (RADIO FREQUENCY IDENTIFICATION)
PPTX
RFID based indoor tracking system
PPS
Basics Of Rfid Technology
PPTX
Presentation 2 rfid standards & protocols
PDF
A Project Report on RFID Based Attendance System.pdf
ODP
Evaluation of the Technology Supporting the Development of an Assets Tracking...
PDF
Use of rfid in operations management
PPTX
RFID and IR Based Attendance System
Data_Integrity_in_RFID_Systems
43 97-101
Implementing radio frequency identification technology in libraries advantage...
Ioe module 3
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
A Survey: SMS Sending Through RFID Sensors
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
FINAL YEAR PAPER
Design of Anti-collision Technique for RFID UHF Tag using Verilog
Use of rfid in operations management operations management 3 introduction
Rfid based employee tracking
Abstract Radio Frequency Identificatication
RFID (RADIO FREQUENCY IDENTIFICATION)
RFID based indoor tracking system
Basics Of Rfid Technology
Presentation 2 rfid standards & protocols
A Project Report on RFID Based Attendance System.pdf
Evaluation of the Technology Supporting the Development of an Assets Tracking...
Use of rfid in operations management
RFID and IR Based Attendance System
Ad

Viewers also liked (20)

PDF
The solution manual of c by robin
PDF
BLS AED PROVIDER Licence Nu. 381-15-112165-02-03
DOCX
RESUME C.J
PPTX
Pronouns
PDF
PPT
Mariaauxiliadora ativ5
PDF
The College Classroom Fa15 Meeting 5: Active Learning
PPT
Transfac Referral Program
DOC
Garricks-Updated Resume-VA15
PDF
Design fax 967 | Les gros mots du design | Design Biduling
PPT
Matrik
PDF
Could you summarize this passage?
PDF
INSTRUCTOR BLS AED Nu.381-15-114565-02-06
PDF
Venkatraman
PPTX
Any share 5.0 secure file sync &amp; sharing for enterprise
PDF
Make du Jour ipadpalooza16
PDF
Radio Astronomy and radio telescopes
PPT
Xianweijing
The solution manual of c by robin
BLS AED PROVIDER Licence Nu. 381-15-112165-02-03
RESUME C.J
Pronouns
Mariaauxiliadora ativ5
The College Classroom Fa15 Meeting 5: Active Learning
Transfac Referral Program
Garricks-Updated Resume-VA15
Design fax 967 | Les gros mots du design | Design Biduling
Matrik
Could you summarize this passage?
INSTRUCTOR BLS AED Nu.381-15-114565-02-06
Venkatraman
Any share 5.0 secure file sync &amp; sharing for enterprise
Make du Jour ipadpalooza16
Radio Astronomy and radio telescopes
Xianweijing
Ad

Similar to Electronic Identification System using RFID (20)

PDF
A Novel Spatio-Temporal Data Redundancy Elimination Approach for RFID Systems...
PDF
A Novel Spatio-Temporal Data Redundancy Elimination Approach for RFID Systems...
PDF
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
PPTX
Electronic Toll Collection System Using RFID seminar.pptx
PDF
RFID based mobile robot for indoor navigation
PDF
Electronic voting machine using RFID
PDF
RFID Technology: An Upgradation for Society
DOCX
Running Head RFID Transportation2RFID in Tr.docx
PPTX
Radio frequency identification (rfid)
PPTX
RFID AND LIBRARIES
PPTX
Internet of Things and its Enabling Technologies - RFID
PDF
Mikel_Berdufi_RFID_NFC_REPORT
DOC
Rfid3
PPTX
Introduction to RFID
PPTX
Nimesh thakor
PDF
Radio Frequency identification (RFID)
PDF
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
PDF
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
PDF
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
A Novel Spatio-Temporal Data Redundancy Elimination Approach for RFID Systems...
A Novel Spatio-Temporal Data Redundancy Elimination Approach for RFID Systems...
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Electronic Toll Collection System Using RFID seminar.pptx
RFID based mobile robot for indoor navigation
Electronic voting machine using RFID
RFID Technology: An Upgradation for Society
Running Head RFID Transportation2RFID in Tr.docx
Radio frequency identification (rfid)
RFID AND LIBRARIES
Internet of Things and its Enabling Technologies - RFID
Mikel_Berdufi_RFID_NFC_REPORT
Rfid3
Introduction to RFID
Nimesh thakor
Radio Frequency identification (RFID)
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...

Recently uploaded (20)

PPTX
MYSQL Presentation for SQL database connectivity
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
cuic standard and advanced reporting.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Big Data Technologies - Introduction.pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Tartificialntelligence_presentation.pptx
PPTX
1. Introduction to Computer Programming.pptx
MYSQL Presentation for SQL database connectivity
Network Security Unit 5.pdf for BCA BBA.
20250228 LYD VKU AI Blended-Learning.pptx
Programs and apps: productivity, graphics, security and other tools
Accuracy of neural networks in brain wave diagnosis of schizophrenia
cuic standard and advanced reporting.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Group 1 Presentation -Planning and Decision Making .pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Assigned Numbers - 2025 - Bluetooth® Document
Encapsulation_ Review paper, used for researhc scholars
Agricultural_Statistics_at_a_Glance_2022_0.pdf
A Presentation on Artificial Intelligence
Empathic Computing: Creating Shared Understanding
Big Data Technologies - Introduction.pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Tartificialntelligence_presentation.pptx
1. Introduction to Computer Programming.pptx

Electronic Identification System using RFID

  • 1. ISSN (e): 2250 – 3005 || Volume, 05 || Issue, 05 || May – 2015 || International Journal of Computational Engineering Research (IJCER) www.ijceronline.com Open Access Journal Page 23 Electronic Identification System using RFID A.P.Adsul1 , DigvijayDamame2 , PoojaGarde3 , Kajal Jore4 , Kunal Shah5 Assistant Professor1 , U.G. Scholars 2,3,4,5 Department of IT, Sinhgad Institute of Technology and Science, Narhe, Pune-411041 I. INTRODUCTION RFID is a generic technology concept that refers to the use of radio waves to identify objects. Any object can be traced using RFID tags when those objects are moving in the network of RFID readers. The RFID Reader Network here consists of densely deployed RFID Readers which are connected by short-range wireless technologies in ad hoc mode. Consequently, an RFID system essentially consists of three parts: the RFID tag itself, the RFID reader device and a backend IT system. For example, in school area the RFID network is deployed by using Virtual Route Track algorithm. Using this algorithm, the system can real-timely track the location of the students who are moving within the premises. RFID – (Radio Frequency Identification) is the wireless use of electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects. The tags contain electronically stored information. Some tags are powered by electromagnetic induction from magnetic fields produced near the reader. Some types collect energy from the interrogating radio waves and act as a passive transponder. RFID tags can be passive, active or battery-assisted passive. An active tag has an on-board battery and periodically transmits its ID signal. A battery-assisted passive (BAP) has a small battery on board and is activated when in the presence of an RFID reader. A passive tag is cheaper and smaller because it has no battery; instead, the tag uses the radio energy transmitted by the reader. However, to operate a passive tag, it must be illuminated with a power level roughly a thousand times stronger than for signal transmission. That makes a difference in interference and in exposure to radiation. RFID systems can be classified by the type of tag and reader. A Passive Reader Active Tag (PRAT) system has a passive reader which only receives radio signals from active tags (battery operated, transmit only).An Active Reader Passive Tag (ARPT) system has an active reader, which transmits interrogator signals and also receives authentication replies from passive tags. An Active Reader Active Tag (ARAT) system uses active tags awoken with an interrogator signal from the active reader. A variation of this system could also use a Battery-Assisted Passive (BAP) tag which acts like a passive tag but has a small battery to power the tag's return reporting signal. RFID system has six different frequency bands. These are 120-150 KHz (LF), 13.56 MHz (HF), 433 MHz (UHF), 865-868 MHz, 2450- 5800 MHz (microwave), 3.1–10 GHz (microwave). II. SYSTEM OVERVIEW Figure.1 shows, an active RFID system, active RFID readers are typically connected by physical cables for data communications purposes. Active RFID systems have also been implemented using a Wi-Fi-based infrastructure. Using P2P network architecture we will get a more flexible active RFID system. ABSTRACT: In this modernization Era and rapid growing metro cities, security is must in every field. This work describes a location and the identity of the persons using RFID (Radio Frequency Identification) tags and readers. RFID is an automatic identification (auto-ID) technology that uses tags and readers for remotely storing and retrieving data. RFID reader can sense (identify) persons, animals, vehicles and goods by interrogating transponders tagged on them. From this perspective, RFID Reader, Reader Network is a Sensor and Sensor Network that is context-aware, respectively. However, only sensing is not enough in many scenarios. Hence this work also proposes a tracking algorithm such as coined Virtual Route Tracking (VRT), to realize tracking persons or objects in RFID Reader Network.
  • 2. Electronic Identification System… www.ijceronline.com Open Access Journal Page 24 Figure 1. System Overview Figure 2. System Architecture Figure. 2 demonstrate the system architecture of the RFID-based location system makes use of a 2.4GHz. This architecture includes major elements such as mobile, active tag, reader, node (reader), and server. A tag is a 2.4 GHz active tag, which is attached to a tracking object. Each node is an active RFID reader that communicates with the tags and the server. Using this architecture and virtual route track algorithm the location of the person can easily get track. Architecture helps the system with implementing the use of Wi-Fi technologies so that when the person get track by the RFID, the location of the person get updated on the server. This technology is used for contacting end users (PARENTS) i.e. for sending messages to the parents. System Network protocol stack consists of Application, TCP, IP, WI FI Driver, Physical layers. In Transmitting a message travels down the stack from the application layer that initiates the message to the network interface that places the message on network. In receiving message travels up the stack from the network interface to application layer that uses the data in received message. Within local network the application layer communicate directly with the WI FI driver. 2.1. VIRTUAL ROUTE TRACK PRINCIPLE The Virtual Track algorithm is presented in Figure.3. The basis of VRT algorithm is that the debriefing range of RFID system is very short compared to the distance between readers. Instead of powering the RFID transponder directly by battery, it gets power through magnetic, electric and electromagnetic coupling with RFID readers. One or more batteries are embedded for Active transponders. However, the embedded battery only provides power to run chips, and data are transferred from transponder to reader by modulating on reflected electromagnetic waves emitted by RFID reader, like the ways of Radars. Thus, the RFID system can achieve a very short range varied from a few millimeters to several meters. Figure 3. VRT Principle
  • 3. Electronic Identification System… www.ijceronline.com Open Access Journal Page 25 On the contrast, the range of wireless technologies used to connect RFID readers is large. For example, ZigBee or UWB can connect two readers within 10 meters, and Bluetooth or Wi-Fi is effective at the distance of 100 meters. Therefore, when a transponder is sensed by a reader i.e. the transponder is located in the interrogation zone of this reader; the real distance between reader and transponder is less than the range of the RFID system. When the scale of the RFID Reader Network is large enough and the distance of deployed readers is relatively long, VRT algorithm is very accurate. The above figure3 indicates the RFID network in which the points denote the RFID reader and the lines from one point to other point denote the path in which direction object is moving. The figure3 is in the form of matrix. When an object is moving from reader (1, 1) to reader (2, 2) the straight line considered as track of the transponder. In the above figure the object is moving following direction. The thick path denotes the actual path of the object and the virtual line is defined as the track of the object. Track = Virtual Route = (1, 1) (2, 2) (2, 3) (1, 4) (2, 5) (3,5) (4, 4) (4, 3) (4, 2) (4, 1) When a reader interrogates one transponder, the next reader interrogating it along the track MUST be adjacent to the previous reader. According to the figure 3, it is obvious that the transponder at (2, 3) cannot jump to (2, 5) directly without activating reader (1, 4), (2, 4) or (3, 4). Hence, the next reader of (2, 3) along the track MUST be one of following readers: { (1,2), (1,3), (1,4), (2,2), (2,4), (3,2), (3,3), (3,4) } Hence, VRT algorithm MUST choose adjacent readers along the track. If two successive readers along the track are not adjacent to each other, special mechanism will be executed to guarantee that each reader along the track is contiguous to its last and next reader in real-word position. The virtual line connecting readers in figure 3 looks like a Route transferring data packets along the nodes. The route is not real in this so named as “Virtual Route”. In VRT algorithm “Virtual Route” is used to stand for track of transponder in the RFID Reader Network. And that is why this algorithm is coined Virtual Route Tracking (VRT). Furthermore, the concept of Tracking Vector (TV) is used here [1]. In the collection of tracking information and calculating the track the tracking vector plays a vital role. The combination of the transponder identity, the interrogation time and the identifier of reader define as a Tracking Vector. The structure of TV is: (Ti, tj, Rk) = < Transponder i timestamp j Reader k > Here, the transponder identity is a global unique number (such as EPC global number) stored in the electronic chip of each transponder and interrogated by reader. Timestamp is the interrogation time of RFID reader when the transponder entering its interrogation zone. Here the assumption is that all RFID readers in RFID Reader Network are synchronous. And only one tracking vector is generated no matter how long a transponder stays within the interrogation zone of one reader. The third parameter in tracking vector is the identifier of the reader. VRT algorithm uses the position of readers to track transponders. It is noted that successive selected readers are all adjacent to each other and therefore can form a Virtual Route, therefore, reader identifiers of two successive Tracking vectors MUST stand for two contiguous readers in real network. 2.2 TRACKING VECTOR ALGORITHM The tracking calculation is as given. Suppose the following two TVs are sent to RFID Application System simultaneously. { <T1, t1, R1> <T2, t2, R2> } (t1< t2). The former reports that the reader with the identifier R1 has interrogated transponder T1 at time indicated by timestamp t1. And the latter is the result of the reader R2 interrogated the transponder T2 at time indicated by timestamp t2. If T1 is equal to T2, two Tracking vectors are derived from the same transponder. Suppose t2 is greater than t1 and two readers are adjacent to each other, Virtual Route (or the track) is: Track = Virtual Route = R1 → R2. However, the above is merely the simplest and ideal condition of tracking. The generalized conditions are given as follow. t1< t2 R1↔R2 T1=T2 t1= t2 R1 ∞ R2 (↔ : Adjacent, ∞ : Not Adjacent ) T1≠T2 t1> t2 R1= R2
  • 4. Electronic Identification System… www.ijceronline.com Open Access Journal Page 26 When transponder T1 is equal to T2, these two TVs are derived from one single transponder and should be classified into the same vector group to calculate the track of this transponder. Otherwise, they are classified into different vector groups for tracking transponder T1 and T2, respectively. About timestamp, when t1 is less than t2, it is simply. And if t1 is greater than t2, exchange the sequence of two tracking vectors and it is exactly as same as the above condition. The relationship of two readers can be grouped into three categories: Adjacent, Not Adjacent and Equality. It is simply to calculate the condition that reader R1 is adjacent to R2. However, the condition that R1 is not adjacent to R2 and the condition that R1 is equal to R2 require a more complex processing method. III. SYSTEM IMPLEMENTATION The figure 4 shows the interfacing of Raspberry pi b+. The whole system is implemented by using Raspberry pi b+ and Nordic nrf24L01. The connection between Raspberry pi b+ and nrf24L01 is shown in figure 4 and the connection detail is shown in table 1. Figure 4. Interfacing of Raspberry pi Figure 5. System Implementation using Raspberry pi Figure.5 shows the one reader and one tag connection by using router and one to one connector. The connection of Raspberry pi b+ and nrf24L01 works as a reader as well as tag also. Following table1 represents the interfacing of the pins of raspberry pi b+ Table 1Raspberry pi Interfacing Pin Details Radio 7(miso) Gpio9/bcm21 Radio 6(miso) Gpio10/bcm19 Radio 5(sck) Gpio11/bcm23 Radio4 (csn) Gpio7/bcm26 Radio3 (ce) Gpio25/bcm22 Radio2 (3.3) 3.3v Radio1 (gnd) Gnd
  • 5. Electronic Identification System… www.ijceronline.com Open Access Journal Page 27 IV. CONCLUSION This System describes the concept of location tracking and updating the location using RFID system which is based on the Virtual Route Track algorithm. System can easily track the location of the object. It helps in keeping Security as its top priority.VRT algorithm can track tens and hundreds of transponders simultaneously, instead of only one each time. This helps in time saving and managing multi task as required. VRT is both effective and efficient in real network. System provides the advance tags and readers to work fast and efficiently “Electronic Identification System” is going to reduce the crimes and will provide security and information to parents as well as the society. REFERENCES [1]. Wei Jiang, Dan Yu, Yan Ma “A Tracking Algorithm in RFID Reader Network”, Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology (FCST'06) , 2006 IEEE [2]. Felix C. P. Hui, Henry C. B. Chan, and S. H. Fung “RFID-based Location Tracking System Using a Peer-to-Peer Network Architecture”, Proceedings of the International Multi Conference of Engineers and Computer Scientists Volume I IMECS, March 12 - 14, 2014, Hong Kong [3]. Junyi Zhou · Jing Shi “RFID localization algorithms and applications—a review”,Science+Business Media, LLC, 2008, 696 – 698. [4]. BaoXu, Wang Gang UWB Lab, Dept. of Telecommunication Engineering, Jiangsu University, Zhenjiang, Jiangsu Province, “Random Sampling Algorithm in RFID Indoor Location System”, Proceedings of the Third IEEE International Workshop on Electronic Design, Test and Applications (DELTA’06) 0-7695-2500-8/05 $20.00 © 2005 IEEE [5]. Mohammed Bilal, Student, Department of Electronics & Communication, PG Studies, T John Institute of Technology ,“Real Time Attendance Logging With Multi Node Embedded System Connected Via Wi-Fi”, International Journal of Reconfigurable and Embedded Systems (IJRES) Vol. 1, No. 3, November 2012, pp. 103~107 ISSN: 2089-4864, 103 -106. [6]. Nidhi Verma Department of C.S.E. G.C.E.T. Greater Noida India “Determining the Algorithm for Location Based Services Using Indoor Positioning Techniques”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 7, July 2012, ISSN: 2277 128X . [7]. Ben Ammar Hatem, Faculty of Engineering, University of Moncton, NB, Canada,ehb7342@umoncton.ca Hamam Habib Faculty of Engineering, University of Moncton, NB, Canada, habib.hamam@umoncton.ca , “Bus Management System Using RFID In WSN”, European and Mediterranean Conference on Information Systems 2010 ( EMCIS2010 ) April 12-13 2009, Abu Dhabi, UAE. [8]. Mr. Nilesh Manganakar, Mr. Nikhil Pawar, Mr. Prathamesh Pulaskar, “Real Time Tracking of Complete Transport System Using GPS”, Proceedings of National Conference on New Horizons in IT - NCNHIT 2013, ISBN 978-93-82338-79-6.