International Journal of

ADVANCED AND APPLIED SCIENCES

EISSN: 2313-3724, Print ISSN: 2313-626X

Frequency: 12

line decor
  
line decor

 Volume 7, Issue 12 (December 2020), Pages: 82-93

----------------------------------------------

 Original Research Paper

 Title: SMAS: An efficient automated student movement authentication system

 Author(s): Abdullah J. Alzahrani *

 Affiliation(s):

 College of Computer Science and Engineering, University of Ha’il, Ha’il, Saudi Arabia

  Full Text - PDF          XML

 * Corresponding Author. 

  Corresponding author's ORCID profile: https://orcid.org/0000-0001-5297-3494

 Digital Object Identifier: 

 https://doi.org/10.21833/ijaas.2020.12.009

 Abstract:

Current tracking technologies can produce substantial amounts of personal data that improve users’ lifestyles. This data can be utilized to enhance and support the safety of student transportation and monitor outcomes. Many vendors with profitable purposes are collecting and processing this data. One of the main tracking technologies currently in use is the Radio Frequency Identification (RFID) system that can be enabled as self-tracking, but it can also become more sophisticated with the resulting lack of privacy. RFID features and constraints could result in a variety of privacy and authentication issues. In this paper, an efficient automated student movement authentication system is proposed. This system will be useful for fleet operators in monitoring student movement and for parents to watch over their children’s safety. It uses two-factor authentication, i.e., RFID and biometric technologies, to guarantee automatic student movement identification. The proposed system is divided into four main components: a student movements collector, the enforcement of policies, the movement runtime validation, and the decision components that are based on rule-based and policy enforcement approaches. In addition, this approach evaluates with a simplified scenario by presenting the whole process through different phases, namely the student enrollment phase, the policy enforcement phase, and the validation algorithm phase. 

 © 2020 The Authors. Published by IASE.

 This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).

 Keywords: Authentication, Runtime validation, RFID, Tracking system

 Article History: Received 24 April 2020, Received in revised form 19 July 2020, Accepted 30 July 2020

 Acknowledgment:

No Acknowledgment.

 Compliance with ethical standards

 Conflict of interest: The authors declare that they have no conflict of interest.

 Citation:

  Alzahrani AJ (2020). SMAS: An efficient automated student movement authentication system. International Journal of Advanced and Applied Sciences, 7(12): 82-93

 Permanent Link to this page

 Figures

 Fig. 1 Fig. 2 Fig. 3

 Tables

 No Table

----------------------------------------------

 References (16)

  1. Abhilash R, Mahima R, Monisha S, and Nagashri R (2017). Smart tracking system for school buses. International Research Journal of Engineering and Technology, 4(4): 2519-2525.
  2. Bhor M, Kadam N, Shinde D, and Mane P (2017). Children safety and school bus tracking solution. International Journal of Electrical, Electronics and Computer Systems, 5(1): 19-22.   [Google Scholar]
  3. Cranor LF and Garfinkel S (2005). Security and usability: Designing secure systems that people can use. O'Reilly Media, Inc., Newton, USA.   [Google Scholar]
  4. CSI (2019). Original RFID smart gate reader: RFID walk through smart gate reader. Childs Safety India, Mumbai, India. 
  5. Finkenzeller K and Muller D (2010). Security of RFID systems. In: Finkenzeller K and Muller D (Eds.), RFID handbook: Fundamentals and applications in contactless smart cards, radio frequency identification and near-field communication: 213–232. John Wiley and Sons, Hoboken, USA. https://doi.org/10.1002/9780470665121.ch8   [Google Scholar]
  6. Janicke H, Siewe F, Jones K, Cau A, and Zedan H (2005). Analysis and run-time verification of dynamic security policies. In the International Workshop on Defence Applications of Multi-Agent Systems, Springer, Utrecht, Netherlands: 92-103. https://doi.org/10.1007/11683704_8   [Google Scholar]
  7. Karantzalis P (2015). Baseband circuits for an RFID receiver. In: Dobkin B and Williams J (Eds.), Analog circuit design: 1075-1076. Volume 3, Elsevier, Amsterdam, Netherlands. https://doi.org/10.1016/B978-0-12-800001-4.00499-3   [Google Scholar]
  8. Mil'Shtein S, Pillai A, Shendye A, Liessner C, and Baier M (2008). Fingerprint recognition algorithms for partial and full fingerprints. In the IEEE Conference on Technologies for Homeland Security, IEEE, Waltham, USA: 449-452. https://doi.org/10.1109/THS.2008.4534494   [Google Scholar]
  9. Minu MS and Adithya KD (2018). Real time college bus monitoring and notification system. International Journal of Advance Research in Science and Engineering, 7(4): 14-16.   [Google Scholar]
  10. Samarati P and de Vimercati SC (2000). Access control: Policies, models, and mechanisms. In: Focardi R and Gorrieri R (Eds.), International school on foundations of security analysis and design: 137-196. Springer, Berlin, Germany. https://doi.org/10.1007/3-540-45608-2_3   [Google Scholar]
  11. Shaaban K, Bekkali A, Hamida EB, and Kadri A (2013). Smart tracking system for school buses using passive RFID technology to enhance child safety. Journal of Traffic and Logistics Engineering, 1(2): 191-196. https://doi.org/10.12720/jtle.1.2.191-196   [Google Scholar]
  12. Syed Idrus SZ, Cherrier E, Rosenberger C, and Schwartzmann JJ (2013). A review on authentication methods. Australian Journal of Basic and Applied Sciences, 7(5): 95-107.   [Google Scholar]
  13. Vishaka A and Godse SP (2015). A survey on enhance security and tracking system for school bus and children. International Journal of Trend in Research and Development, 2(6): 272-276.   [Google Scholar]
  14. Wamba SF, Anand A, and Carter L (2013). RFID applications, issues, methods and theory: A review of the AIS basket of TOP journals. Procedia Technology, 9(1): 421-430. https://doi.org/10.1016/j.protcy.2013.12.047   [Google Scholar]
  15. Want R (2006). An introduction to RFID technology. IEEE Pervasive Computing, 5(1): 25-33. https://doi.org/10.1109/MPRV.2006.2   [Google Scholar]
  16. Zhou S, Zedan H, and Cau A (2005). Run-time analysis of time-critical systems. Journal of Systems Architecture, 51(5): 331-345. https://doi.org/10.1016/j.sysarc.2004.12.003   [Google Scholar]