RFID based Authorization Method for Computer Systems in Smart Library Environments

RFID based Authorization Method for Computer Systems in Smart Library Environments

In recent years, intelligent systems have emerged with the concept of the Internet of Things. The purpose of intelligent systems is to use technological innovations to improve the quality of life of people. Smart systems are now being used almost everywhere. Concepts such as smart city, smart classroom, smart library, smart hospital and smart transportation have emerged. With the cameras, sensors and many other devices used in smart systems, data from the environment can be analyzed and remote control operations can be performed. In this study, RFID based authorization system has been developed in the publicly available computers used in smart libraries. In many places, as in universities, there are common computers or laboratory devices that can be used by everyone. The aim of this study is to ensure the common use of devices belonging to common use against existing users. The devices are controlled by an RFID based system developed for these devices. Using the ID cards of the students or staff, the person is authorized to use the devices for the defined period of time. This study has two main contributions. First, a modular system compatible with all electronic devices except the computer has been made by using RFID technology. The second is to provide a more efficient working environment by ensuring fair use of computers and other devices accessible.

___

  • [1] C. M. Roberts, “Radio frequency identification (RFID),” Computers & Security, vol. 25, no. 1, 2006, pp. 18-26.
  • [2] A. Ustundag. “The value of RFID,” Springer London Limited, 2013.
  • [3] N. Saparkhojayev & S. Guvercin, “Attendance Control System based on RFID technology,” International Journal of Computer Science Issues (IJCSI), vol. 9, no. 1, pp. 227-230, 2012.
  • [4] M. Dhanalakshmi & U. Mamatha, “RFID based library management system,” Proceedings of ASCNT, pp. 227-234, Noida, India, 2009.
  • [5] K. Coyle, “Management of RFID in Libraries,” The Journal of Academic Librarianship, vol. 31, no. 5, pp. 486-489, 2005.
  • [6] I. Markakis, T. Samaras, A. C. Polycarpou & J. N. Sahalos, “An RFID- enabled library management system using low-SAR smart bookshelves,” International Conference on Electromagnetics in Advanced Applications (ICEAA), pp. 227-230, Torino, Italy, 2013.
  • [7] A. P. Renold & R. J. Rani, “An internet based RFID library management system,” IEEE Conference on Information & Communication Technologies, pp. 932-936, Tamil Nadu, India, 2013.
  • [8] Z. Bi, Y. Liu, J. Krider, J. Buckland, A. Whiteman, D. Beachy & J. Smith, “Realtime force monitoring of smart grippers for Internet of Things (IoT) applications,” Journal of Industrial Information Integration, vol. 11, pp. 19-28, 2018.
  • [9] H. Chen, “Applications of cyber-physical system: a literature review,” Journal of Industrial Integration and Management, vol. 2, no. 3, 2017.
  • [10] F. Civerchia, S. Bocchino, C. Salvadori, E. Rossi, L. Maggiani & M. Petracca, “Industrial Internet of Things monitoring solution for advanced predictive maintenance applications,” Journal of Industrial Information Integration, vol. 7, pp. 4-12, 2017.
  • [11] S. Fang, X. L. Da, Y. Zhu, J. Ahati, H. Pei, J. Yan & Z. Liu, “An integrated system for regional environmental monitoring and management based on internet of things,” IEEE Transactions on Industrial Informatics, vol. 10, no. 2, pp. 1596-1605, 2014.
  • [12] J. H. Kim, “A review of cyber-physical system research relevant to the emerging IT trends: industry 4.0, IoT, big data, and cloud computing,” Journal of Industrial Integration and Management, vol. 2, no. 3, 2017.
  • [13] C. T. Lai, P. R. Jackson & W. Jiang, “Shifting paradigm to servicedominant logic via Internet-of-Things with applications in the elevators industry,” Journal of Management Analytics, vol. 4, no. 1, pp. 35-54, 2017.
  • [14] Y. Lu & L. X. Da, “Internet of Things (IoT) cybersecurity research: a review of current research topics,” IEEE Internet of Things Journal, vol. 6, no. 2, pp. 2103-2115, 2018.
  • [15] G. Peretti, V. Lakkundi & M. Zorzi, “BlinkToSCoAP: An end-to-end security framework for the Internet of Things,” International Conference on Communication Systems and Networks (COMSNETS), pp. 1-6, Bangalore, India, 2015.
  • [16] Z. Rashid, J. Melià-Seguí, R. Pous & E. Peig, “Using augmented reality and internet of things to improve accessibility of people with motor disabilities in the context of smart cities,” Future Generation Computer Systems, vol. 76, pp. 248-261, 2017.
  • [17] L. D. Xu, E. L. Xu & L. Li, “Industry 4.0: state of the art and future trends,” International Journal of Production Research, vol. 56, no. 8, pp. 2941-2962, 2018.
  • [18] L. X. Da, W. He & S. Li, “Internet of things in industries: A survey,” IEEE Transactions on industrial informatics, vol. 10, no. 4, 2233- 2243, 2014.
  • [19] L. Wang, L. X. Da, Z. Bi & Y. Xu, “Data cleaning for RFID and WSN integration,” IEEE transactions on industrial informatics, vol. 10, no. 1, pp. 408-418, 2013.
  • [20] Z. Huixia, W. Fulin & S. Ruixia, “The application of the internet of things in China modern agriculture [j],” Chinese Agricultural Science Bulletin, vol. 27, no. 2, pp. 310-314, 2011.
  • [21] Y. Zhang, R. Yu, S. Xie, W. Yao, Y. Xiao & M. Guizani, “Home M2M networks: architectures, standards, and QoS improvement,” IEEE Communications Magazine, vol. 49, no. 4, pp. 44-52, 2011.
  • [22] Y. Zhang, R. Yu, M. Nekovee, Y. Liu, S. Xie & S. Gjessing, “Cognitive machineto- machine communications: Visions and potentials for the smart grid,” IEEE network, vol. 26, no. 3, pp. 6-13, 2012.
  • [23] K. Fan, P. Song & Y. Yang, “ULMAP: Ultralightweight NFC mutual authentication protocol with pseudonyms in the tag for IoT in 5G,” Mobile Information Systems, vol. 2017, pp. 1-7, 2017.
  • [24] R. Want, “An introduction to RFID technology,” IEEE pervasive computing, vol. 5, pp. 25- 33, 2006.