Volume 4, No. 3, March 2013
Journal of Global Research in Computer Science
CASE STUDY
Available Online at www.jgrcs.info
© JGRCS 2010, All Rights Reserved 83
INTEGRATING MCT WITH RFID: A CASE STUDY
Majid Zaman
1
, Muheet Ahmed Butt
2
1
Scientist, Directorate of IT &SS, University of Kashmir, Srinagar
2
Scientist, PG Department of Computer Science, University of Kashmir, Srinagar, J&K, India
ermuheet@gmail.com
Abstract: Mobile Communication Technology (MCT) has advanced manifold over the past few years and has established as a leading wireless
communication medium. It has a distinct advantage of getting integrated with existing Information Technology environments at very low system
requirements. RFID (Radio Frequency Identification) is the wireless non-contact use of radio-frequency electromagnetic fields to transfer data,
for the purposes of automatically identifying and tracking tags attached to objects, Since RFID tags can be attached to clothing, possessions, or
even implanted within people, the possibility of reading personally-linked information without consent has raised privacy concern [1]. In this
paper we introduce a system where in we have proposed the integration of two technologies Mobile SMS & RFID to achieve security for
inventory system which is totally independent of human intervention and does not need 24X7 human surveillance but will rely on SMS based
alert as and when system security is being compromised.
INTRODUCTION
The term Information Communication System can
technically be defined as a structure which describes the
organized collection, processing, transmission, and
dissemination of information in accordance with defined
procedures, whether automated or manual. The purpose of
developing an Information Communication System is
therefore to establish a system which delivers information
and communication services in an organization and the
activities and management of the information systems
function in planning, designing, developing, implementing,
and operating the systems and providing services [4]. These
systems capture, store, process, and communicate data,
information, and knowledge. The system structure includes
both technical components and human operators and users.
The environment of the System varies from being a single
organization or a combination of organizations and/or
society as a whole or a section of society depending upon
the nature of the Organization.
Information Technology has improved manifold our
intellectual and physical abilities more than anything since
the development of the written word. Some of the
magnificent scientific marvels such as the Internet, the
global positioning system, and the human genome project
became possible only with advances in information
technology. It is estimated that presently there are ten billion
computers in the world. Most of the products have
computers embedded invisibly in them, making goods as
well as services safer, more secure, flexible, and energy-
efficient. The costs of the I T products have been showing a
significant downward trend and as such are affordable to
common man. The tremendous advances in productivity
that we have witnessed in the past decade rest on this
foundation. We are hard-pressed to think of change of
comparable magnitude in human history. In the future, we
can expect our computational infrastructure to offer an even
more impressive range of social and economic benefits as it
grows to include billions of people worldwide. Information
technologies have the potential to reduce energy
consumption, provide improved health care at lower cost,
enhance security, reduce pollution, enable further creation of
worldwide communities, engender new business models,
and contribute to the education of people anywhere in the
world. These new benefits will be facilitated by geometric
advances of the technology in semiconductor and magnetic
storage, as well as in electronic and optical communications.
The past two decades has seen explosions in mobile
technology and its applications. It has enabled new
businesses and new ways to link people. The way we have
moved beyond stand-alone computers or components to
build large, integrated, distributed information systems that
are in service to society [8] the mobile technology has also
made significant progress in linking the people involving
extremely low resources.
RFID, the acronym refers to small electronic devices that
consist of a small chip and an antenna. The chip typically is
capable of carrying 2,000 bytes of data or less. The RFID
device serves the same purpose as a bar code or a magnetic
strip on the back of a credit card or ATM card; it provides a
unique identifier for that object. And, just as a bar code or
magnetic strip must be scanned to get the information, the
RFID device must be scanned to retrieve the identifying
information [2].
The RFID reader reads the id number from passive tag and
send to the microcontroller, if the id number is valid then
microcontroller send the SMS request to the authenticated
person mobile number, for the original password to open the
bank locker, if the person send the password to the
microcontroller, which will verify the passwords entered by
the key board and received from authenticated mobile
phone. if these two passwords are matched the locker will be
opened otherwise it will be remain in locked position, This
system is more secure than other systems because two
passwords required for verification. This system also creates
a log containing check-in and check-out of each user along
with basic information of user.