CFP last date
20 May 2024
Reseach Article

Efficient Record Management using RFID - Arduino Technology

by Ratnakumari Challa, B. Reddaiah, K. Srinivasa Rao
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 181 - Number 14
Year of Publication: 2018
Authors: Ratnakumari Challa, B. Reddaiah, K. Srinivasa Rao
10.5120/ijca2018917823

Ratnakumari Challa, B. Reddaiah, K. Srinivasa Rao . Efficient Record Management using RFID - Arduino Technology. International Journal of Computer Applications. 181, 14 ( Sep 2018), 42-45. DOI=10.5120/ijca2018917823

@article{ 10.5120/ijca2018917823,
author = { Ratnakumari Challa, B. Reddaiah, K. Srinivasa Rao },
title = { Efficient Record Management using RFID - Arduino Technology },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2018 },
volume = { 181 },
number = { 14 },
month = { Sep },
year = { 2018 },
issn = { 0975-8887 },
pages = { 42-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume181/number14/29894-2018917823/ },
doi = { 10.5120/ijca2018917823 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:06:01.074649+05:30
%A Ratnakumari Challa
%A B. Reddaiah
%A K. Srinivasa Rao
%T Efficient Record Management using RFID - Arduino Technology
%J International Journal of Computer Applications
%@ 0975-8887
%V 181
%N 14
%P 42-45
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Increase in on-line activities or E-commerce there is a need of efficient and secure management of records that store the data of various transactions and its assets. It is very difficult to manage large number of records manually where different operations are to be carried-out in limited period of time. It basically increases time and effort in traditional transaction management and in goods management process in business field where human resource are applied, and there is a problem of knowing the stock details like expiration through manual record checking. So, this work provides a technique to give efficient record management and secured transactions by retrieving efficient information from the tag contained in goods or stocks. It gives quick information about stock while verification. So, it provides information like Product name, Tag -id, DMFG, expiry date and details about how long the product can be used. Through this work time can be saved in processing the records and cost in doing business activities will be minimized.

References
  1. Martin Feldhofer, Sandra Dominikusand and Johannes Wolkerstorffer ,” Institute for applied Information Processing and Communications, Strong Authentication for RFID systems using AES algorithm”.
  2. International Organization for Standardization. ISO/IEC 9798-2: “Information Technology - Security techniques - Entity Authentication Mechanisms Part 2: Entity authentication using symmetric techniques”, ISO/IEC, 1993.
  3. A. Juels and R. Pappu. “Squealing Euros: Privacy protection in RFID-enabled bank notes”, In Financial Cryptography, 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers, volume2742 of Lecture Notes in Computer Science, pages 103–121. Springer, 2003.
  4. International Organization for Standardization. ISO/IEC 18000-3.Information Technol-ogy AIDC Techniques — RFID for Item Management, March 2003.
  5. A. Juels, R. L. Rivest and M. Szydlo. “The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy”, In Proceedings of the 10th ACM Conference on Computer and Communication Security, pages 103–111. ACM Press, 2003.
  6. S. E. Sarma, S. A. Weis and D. W. Engels. “RFID Systems and Security and Privacy Implications. In Cryptographic Hardware and Embedded Systems – CHES2002”, 4th international Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, vol-ume 2523 of Lecture Notes in Computer Science, pages 454–470. Springer, 2002.
  7. S. Srinivasan, Basic Cloud Computing Types, Springer, 142 P. 10, 2014.
  8. Imran Ashraf, An Overview of Service Models of Cloud Computing, International Journal of Multidisciplinary and Current Research, Aug 2014.
  9. Xiaoyan Yang, Xuanpin and G Li, Jifang Li, “Application Study on Public Key Cryptography in mobile Payment, Proceedings of the 5th WSEAS Int. Conference on Information Security and Privacy”, Venice, Italy, November 20-22, 2006.
  10. ShafiGoldwasserand MihirBellare, Lecture Notes on Cryptography, Cambridge, Massachusetts, July 2008.
Index Terms

Computer Science
Information Sciences

Keywords

E-commerce Record management Tag-id DMFG RFID Arduino.