International journal of

ADVANCED AND APPLIED SCIENCES

EISSN: 2313-3724, Print ISSN:2313-626X

Frequency: 12

line decor
  
line decor

 Volume 6, Issue 10 (October 2019), Pages: 1-6

----------------------------------------------

 Original Research Paper

 Title: Secure vehicle tracking using RFID

 Author(s): Ibrahim M. Alseadoon, Rabie A. Ramadan *, Ahmed Y. Khedr, Badr M. Alshammari

 Affiliation(s):

 College of Computer Science and Engineering, University of Hail, Hail, Saudi Arabia

  Full Text - PDF          XML

 * Corresponding Author. 

  Corresponding author's ORCID profile: https://orcid.org/0000-0002-0281-9381

 Digital Object Identifier: 

 https://doi.org/10.21833/ijaas.2019.10.001

 Abstract:

Localization technology such as GPS is one of the most methods used to guide drivers to their final destination. It is also used in some other applications including tracking. However, it seems that GPS technology by itself might not be sufficient especially in tunnels and mountains. First, to have a strong signal between an orbiting satellite and a GPS receiver, there must be a relatively clear line of sight. Obstructions such as buildings, trees, and large mountain passes can potentially weaken the strength of the signal from the satellites and make the positioning data less reliable. Also, GPS localization signals in most of the tracking applications sent Short Message Service (SMS) that are not never secured. Therefore, SMS signal might be intercepted, eavesdropped, replayed, and modified and this might lead to misguided vehicles, trucks, container cargos and trains. This paper concerns the security of vehicles tracking information for the sake of transportation security. This paper also suggests other localization technology along with GPS for accurate localization such as RFID in addition to proposing a lightweight security algorithm for tracking information. 

 © 2019 The Authors. Published by IASE.

 This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).

 Keywords: Localization, Tracking, RFID, Internet of things

 Article History: Received 16 March 2019, Received in revised form 12 July 2019, Accepted 17 July 2019

 Acknowledgement:

This research was supported by Research Deanship, University of Hail, KSA.

 Compliance with ethical standards

 Conflict of interest:  The authors declare that they have no conflict of interest.

 Citation:

 Alseadoon IM, Ramadan RA, and Khedr AY et al. (2019). Secure vehicle tracking using RFID. International Journal of Advanced and Applied Sciences, 6(10): 1-6

 Permanent Link to this page

 Figures

 Fig. 1 Fig. 2 Fig. 3 Fig. 4 Fig. 5 

 Tables

 Table 1 Table 2 Table 3 

----------------------------------------------

 References (13) 

  1. Altunbasak H and Owen H (2007). An architectural framework for data link layer security with security inter-layering. In the 2007 IEEE SoutheastCon, IEEE, Richmond, USA: 607-614. https://doi.org/10.1109/SECON.2007.342975    [Google Scholar]
  2. Buttyan L and Csik L (2010). Security analysis of reliable transport layer protocols for wireless sensor networks. In the 8th IEEE International Conference on Pervasive Computing and Communications Workshops, IEEE, Mannheim, Germany: 419-424. https://doi.org/10.1109/PERCOMW.2010.5470633    [Google Scholar]
  3. Infanta J and Hemalatha M (2013). Enhancing building security with RFID and ZigBee. International Journal of Engineering and Technology, 5(1): 265-272.    [Google Scholar]
  4. Kamarulazizi K and Ismail DW (2010). Electronic toll collection system using passive RFID technology. Journal of Theoretical and Applied Information Technology, 22(2): 70-76.    [Google Scholar]
  5. Lee JH and Ernst T (2011). Security issues of IPv6 communications in cooperative intelligent transportation systems (poster). In the IEEE Vehicular Networking Conference, IEEE, Amsterdam, Netherlands: 284-290. https://doi.org/10.1109/VNC.2011.6117112    [Google Scholar]
  6. Lim TS, Sim SC, and Mansor MM (2009). RFID based attendance system. In the IEEE Symposium on Industrial Electronics and Applications, IEEE, Kuala Lumpur, Malaysia, 2: 778-782. https://doi.org/10.1109/ISIEA.2009.5356360    [Google Scholar]
  7. Mohandes M (2008). An RFID-based pilgrim identification system (A pilot study). In the 11th International Conference on Optimization of Electrical and Electronic Equipment, IEEE, Brasov, Romania: 107-112. https://doi.org/10.1109/OPTIM.2008.4602508    [Google Scholar]
  8. Padrón G, García C, Quesada-Arencibia A, Alayón F, and Pérez R (2014). Using massive vehicle positioning data to improve control and planning of public road transport. Sensors (Basel, Switzerland), 14(4): 7342-7358. https://doi.org/10.3390/s140407342    [Google Scholar] PMid:24763212 PMCid:PMC4029661
  9. Radhamani G and Ramasamy K (2002). Security issues in WAP WTLS protocol. In the IEEE International Conference on Communications, Circuits and Systems and West Sino Expositions, IEEE, Chengdu, China, 1: 483-487. https://doi.org/10.1109/ICCCAS.2002.1180664    [Google Scholar]
  10. Ramadan RA (2009). Leveraging RFID technology for intelligent classroom. In the 4th International Design and Test Workshop, IEEE, Riyadh, Saudi Arabia: 1-6. https://doi.org/10.1109/IDT.2009.5404113    [Google Scholar]
  11. Salehi M, Sepahvand I, and Yarahmadi M (2014). TLCSBFL: A traffic lights control system based on fuzzy logic. International Journal of u-and e-Service, Science and Technology, 7(3): 27-34. https://doi.org/10.14257/ijunesst.2014.7.3.03    [Google Scholar]
  12. Ting-ting C (2012). Study of an underground-based cyclic timetable impact on arrangement for bus schedule reliability. In the International Conference on Information Management, Innovation Management and Industrial Engineering, IEEE, Sanya, China: 3: 503-506. https://doi.org/10.1109/ICIII.2012.6340028    [Google Scholar]
  13. Usman M, Ahmed I, Aslam MI, Khan S, and Shah UA (2017). SIT: A lightweight encryption algorithm for secure internet of things. International Journal of Advanced Computer Science and Applications, 8(1): 402-411. https://doi.org/10.14569/IJACSA.2017.080151    [Google Scholar]