Open Access Open Access  Restricted Access Subscription or Fee Access

Victim Identification and Distress Alert with RFID using Cloud Database

M. Premkumar, M.P. Girish, K. Mukil Raj, I. Karthikiran

Abstract


RFID is an upcoming technology that is being deployed in a number of days to day applications. But RFID systems suffer from drawbacks such as inefficient data administration. There is an increasing urge to tackle these issues to make the technology stand out. Cloud computing is one of the upcoming segments of IT industry that provides efficient solutions for managing and using the data that is collected with RFID. This paper proposes an intelligent distress alert system that not only sends distress alert but also provides the victim’s personal information such as home address, contact details, medical details etc to the predefined contacts (email ids),  which are fetched  from a cloud server when the RFID tag of the victim is scanned. In addition to the alert, it also provides the contacts with the exact location (latitude and longitude) where the incident has taken place.


Full Text:

PDF

References


RFID in cloud environment for Attendance Monitoring system A. Parvathy, B. Rajasekhar, C.Nithya, K.Thenmozhi, J.B.B. Rayappan, Pethuru Raj and Rengarajan Amirtharajan School of Electrical & Electronics Engineering, SASTRA University, Tamil Nadu, India – 613401 ##Infrastructure Architect, Global Cloud Center of Excellence, IBM India, Bangalore, 560045 amir@ece.sastra.edu

A New Security and Privacy Framework for RFID in Cloud Computing Suleyman Kardas Serkan C,elik uhammed Ali Bing¨ol, and Albert Levi TU¨BI˙TAK BI˙LGEM UEKAE, Gebze, Kocaeli, Turkey, Sabancı University, Faculty of Engineering and Natural Sciences, ˙Istanbul, Turkey

Identification of Car Passengers with RFID for Automatic Crash Notification; Dongfang Ouyang; This thesis is presented as part of Degree of Master of Science in Electrical Engineering Blekinge Institute of Technology November 2008 Blekinge Institute

S.E. Watkins, T.M. Swift, and M.J. Molander, “RFID Instrumentation in a Field Application,” Region 5 Technical Conference, 2007 IEEE, pp.400-403, 20-22 April 2007.

J. Ziegler, M. Graube, L. Urbas, “RFID as universal entry point to linked data clouds,” RFID-Technologies and Applications (RFIDTA), 2012 IEEE International Conference on , pp.281-286, 5-7 Nov. 2012.

Sung-ho Kim, Hong-Jin Lee, Han-Wool Jung, Beom-Ki Maeng, and Yongsu Park, “IPAP: Improved privacy and authentication protocol for passive RFID tags,” Network Infrastructure and Digital Content, 2010 2nd IEEE International Conference on , pp.30-34, 24-26 Sept. 2010.

M. Kassim, H. Mazlan, N. Zaini, and M.K. Salleh, “Web-based student attendance system using RFID technology,” Control and System Graduate Research Colloquium (ICSGRC), 2012 IEEE , pp.213-218, 16-17 July 2012.

A.N.M. Noman, K. Curran, and T. Lunney, “A Watermarking Based Tamper Detection Solution for RFID Tags,” Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2010 Sixth International Conference on, pp.98-101, 15-17 Oct.

A.N.M. Noman, S.M.M. Rahman, and C. Adams, “Improving security and usability of low cost RFID tags,” Privacy, Security and Trust (PST), 2011 Ninth Annual International Conference on , pp.134-141, 19-21 July 2011.

A. Bekkali and M. Matsumoto, “RFID Indoor Tracking based on Inter-tags Distance Measurement,” Wireless Telecommunications Symposium, 2007. WTS 2007, pp.1, 26-28 April 2007.

N. Nasri, A. Kachouri, M. Samet, and L. Andrieux, “CSMA-based MAC protocol for collision avoidance in a dense RFID network,” Informatics and Systems (INFOS), 2010 The 7th International Conference on, pp.1-5, 28-30 March 2010.

Shang-Wei W. et al., 2006. RFID application in hospitals: a case study on demonstration RFID project in a Taiwan Hospital. In: HICSS, System Sciences, Proceedings of the 39th Annual Hawaii International Conference. 04-07 Jan, Vol. 8, pp. 184a-184a.

B. Manish and M. Shahram, RFID Field Guide—Deploying Radio Frequency Identification Systems. New Jersey: Prentice Hall, 2005, ch. 1-3.

R. Want, RFID Explained: A Primer on Radio Frequency Identification Technologies. Pennsylvania: Morgan & Claypool Publishers, 2006, ch. 2, ch. 5.




DOI: http://dx.doi.org/10.36039/AA072016004.

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.