Experiment Report On RFID System Services
Table of contents
Data Collection
In this era of modern technology, usage of RFID in organization is increasing rapidly so, activists are very concerned about user’s privacy, security, and proposing much solution that may address RFID security issues. There are two methods of addressing these problems. One is technology and the other is public policy. This technology was used in Second World War first time and the first article about this technology issued in 1960’s. Today there are many applications using RFID for example automobiles remote without key entry, highway toll collection etc. This rate of application usage highlights some facts about that cannot be neglected: like high rate of private and confidential data security risks in RFID systems.
As we discussed in our previous section that RFID has many privacy threats may include action threats, location threats, association threats, and preference threats. Moreover, it has some data security threats namely infrastructure threat, trust perimeter threat, transaction threat and many more. The case that was supposed as ideal for addressing the problems is in self-changing of technology. Once the solutions developed, they can be integrated and enforced by regulatory bodies. Technology amendments are needed because killing of particular issues is not adequate. So, there are many solutions proposed for these issues in this technology. These are tag pseudonym, encryption, blocker tags and tag passwords. There are some policy solutions as well. Data collection is obviously an important step in the process of research. We need data related to our research domain and authentic sources of it. At first we need to have a messy amount of data and from this data, selection is to be done about our domain specification. To step forward in this process of research, we need to take it into a systematic fashion.
A. Data Sources
As we already know that, data source is the root authority from which we can get authentic data for our research. It could be database from a particular system, file of any format or a live data. Data source in research can be primary or secondary. It means that we are getting our data from an original source so that data could be authentic, genuine, and veritable or we are using information that is assembled by someone else but proved as true and real. Data can be gather through various ways like experiments, interviews, journals, and articles.
B. Data collection
Information should be gathered in a systematic way using techniques for the reliability and acceptability of data. In our domain, we first identify issues and their solutions and collect data on it. Then we select issues and their solutions and make a goal. After that, we will propose methods and approaches.
Design and implementation
Here we are going to show a full design of Radio FID systems as a security system dealing with fundamental issues of security and privacy. First, we need to understand our system. There are a number of employees whose record is maintained in a database and every participant have assigned a tag for his secure identification. Employees will be identified with this identification through a reader. In this system, the idea of FSK modulation has been used in which we use a technique for transmission and acceptance of signals. It works on two frequencies 14 MHZ and 16MHz, which are discrete. This system helps for successful secure communication between tag and reader.
A. Data pre-processing
Now we have a lot of data collection and storage we need to alter ate this raw data into such a form that is readable and understandable. Raw data is inconsistent, duplicate and more error prone. Our data is noisy, has outliers, lacking certains instances and attribute values to solve these problems we use data preprocessing. It involves some steps. Firstly we import our libraries and datasets and check out values which are no found or missing. Then divide it into two parts: training and testing data sets and at last feature scaling. To compress massive data we will proposed a methodology depended upon path coding technique. This technique will notify the cyclic movements along long paths and individual movements of paths will be considered. There will be two algorithms which we executes. One is aggregate and the other is graph. In past years, many models have been developed to effectively and efficiently process data related to RFID. There is a lot of work on solving inconsistencies and probabilities of data. These problems have two important reasons and aspects: repairing of database and answering queries consistently.
B. Feature selection or dimension reduction
We have a lot of data collection. We don’t require all that data. So, we will select some of the attributes and variables that are required according to our domain and are closely related. After selection, our data will be reduced and in more concise and comprehend form. This is feature selection or dimension reduction.
C. Proposed methodology
There are different types of research methodologies including qualitative and quantitative methodologies. Quantitative is something about numbers or quantity’. In this research method numerical value is measures, compared it with previous records and find out for future periods. It provides basic relationship between observed findings and their mathematical expressions. Qualitative is something about nonquantitative. It does not involve measurements but actually depends on the observations of people and what they say or do. It is about characteristics, symbols and detailed explanation of things.
In the RFID issues solution particular domain data mining will be done. Data mining is collection and analyzing of data from which we can get useful information to find relations and different patterns. We are applying this methodology because RFID data is simple, accurate, special and secular and there is a large quantity of data. By using basic methods we can convert data into numbers and categories. For categorization of RFID data, we can clean data, perform analysis, classify and cluster frequent data.
D. Experiment setup
Hardware usedAlien 9800 reader and alien 9610 antenna was used in our experiment. Gain is 6 dB and beam width is 35 degrees. Tags are general purpose supporting EPC 1 class 2nd generation standards. Belt is used for circular conveyor which is 18m long. It has two parallel tracks. Each track is 4. 4m long. Belt speed can be adjusted. RFID reader gives two processes. One is interactive and the other is autonomous. When user gives commands to read tags to reader, reader operates otherwise it remains silent. This is interactive approach. Whereas when reader automatically performs reading tags without user command, this approach is called autonomous.
Software used
The reader software has been used. It is an interface between tag and computer. It makes a connection and send information from computer to tag and vice versa. It does not involve any encryption or decryption of data. The other software that has been used is tag software. It is actually a storage device used to store ids information. It needs a microcontroller to ensure that the data is properly and sequentially sent. Tag information which is stored cannot be changed and software just transmit data not receives but only for the response to identification request signal. The graphical user application has also been used. It actually performs the function of form input. Where some field data is required which is entered as input. It asks some employee information in fields and after authentication tag information can be stored.
Result Analysis
A. Expected Results
We loss some amount of data while sending it to reader. Tags information is confidential but at long distance some information can be hacked by hackers or third parties. Solution will be the encryption and decryption of data and confidential information through cryptography so that if someone get this data, he would not be able to understand and make harm.
B. Summary Conclusion
We conducted these experiments to check the effects of mobility on RFID performance and security. We have found that at a certain speed of mobility, information loss and performance lacking and there are counter measures described which can be used for better results. Our purpose of research is to get better ideas about enhancing RFID security by giving solutions of it and after its usage. This is a section in which we report our findings after applying methodologies of research. We have found these results successfully and reported it.
Experiment and result analysis chapter
A. Outline
Level 1: We have used path trees and map tables to group data. Path tree can be applied directly where the data is frequent. It is not for management of process and difficult to trace. To complete process need, we need many processes. Processes can be complex and errors can done the damage. These processes also has some limitations for example procuring data in real environment is difficult and there exists some technical problems in a limited environmental scenario. So, securing data of RFID is difficult.
Level 2: Here is my procedure. A probing signal is sent by reader. Tags gives their tag ID through reader. From the tags ID received reader will find bits that are collided and a sequence of 1 and 0 will be generated. Then the sequence will be sent to tags for collided bits and bits will be memorized in tags. This is tag identification process which can use to measure the security of RFID systems. Radio frequency ID tag anticollision protocol is used for identification purposes. Tree based algorithm will be used to measure performance of this method.
Level 3: Coming specific to our domain, in our system of RFID security issues and solutions, we will feature key and summarize RFID security problem solutions. We will preprocess specter, unsatisfied, unclassified, missing and incomplete data. We will make a frame work in which these problems could be addressed efficiently. Development of rules for RFID issues solutions will be done. According to the preprocessing substructure, arrangement, skimmed and outline data are created in the retail stages.
Level 4: If the measures that has been proposed are installed, RFID security and performance can be increased and it could be used for tracking people in computing applications comparably at lower cost than other censor devices.
Cite this Essay
To export a reference to this article please select a referencing style below