Enhancing Academic Security with RFID-Based Smart Locks and Real-Time Attendance Tracking System

Authors

  • Muhammad Al Imran Universitas Malikussaleh
  • Muhammad Fikry Universitas Malikussaleh
  • Sujacka Retno Universitas Malikussaleh

Keywords:

RFID-based Smart Lock, Real-time Attendance Tracking, Academic Security, Internet of Things (IoT), E-KTP Identification

Abstract

In this study, we propose a novel RFID-based smart lock system integrated with real-time attendance tracking to enhance academic security. Traditional security methods such as mechanical locks and manual attendance systems are prone to various limitations, including lost keys, falsification, and lack of automatic tracking. Our system utilizes E-KTP cards as RFID identification tools, supported by Internet of Things (IoT) technology, to provide automated door access and efficient attendance monitoring. The implementation results demonstrate a high accuracy rate of 99.5% in reading E-KTP cards, with an average response time of 850 Ms and a 99.5% uptime during a 30-day testing period. The system can handle up to 40 access requests per minute during peak hours. Additionally, it reduces access time by 91%, lowers errors from 5% to 0.2%, cuts operational costs by 60%, and decreases maintenance time by 75%. Security is reinforced through dual encryption using the Vigenère and Bcrypt algorithms, ensuring no security breaches over six months. The dashboard provides real-time monitoring, and the automated attendance system reduces human error, integrating seamlessly with academic databases for user verification and schedule management. This research demonstrates the effectiveness of RFID and IoT technologies in modernizing and securing academic environments.

References

[1] Karygiannis, Tom, et al. "Guidelines for securing radio frequency identification (RFID) systems." NIST Special publication 80 (2007): 1-154.

[2] Weis, Stephen A. "RFID (radio frequency identification): Principles and applications." System 2.3 (2007): 1-23.

[3] Weis, Stephen August. Security and privacy in radio-frequency identification devices. Diss. Massachusetts Institute of Technology, 2003.

[4] Ilie-Zudor, Elisabeth, et al. "A survey of applications and requirements of unique identification systems and RFID techniques." Computers in Industry 62.3 (2011): 227-252

[5] Fikry, Muhammad, et al. "Analysis of Model-Free Reinforcement Learning Algorithm for Target Tracking." Journal of Computer Engineering, Electronics and Information Technology 1.1 (2022): 01-10.

[6] Hadi, Achmad Farchan, Mochammad Taufik, and Hudiono Hudiono. "Design and build a hotel service reservation and verification system using web-based e-KTP." Journal of Telecommunication Network (Jurnal Jaringan Telekomunikasi) 13.4 (2023): 355-359.

[7] Gangwar, Veer P., and Deepika Reddy. "Hospitality industry 5.0: Emerging trends in guest perception and experiences." Opportunities and Challenges of Business 5.0 in Emerging Markets (2023): 185-211.

[8] Muhammad, Fikry. "BASIS DATA." (2019).

[9] Emakpor, Sunday, and Emmanuel Esekhaigbe. "Development of an RFID-based security door system." J. Elect. Control Technol. Res 1 (2020): 9-16.

[10] Prity, Sadia Akter, Jannatul Afrose, and Md Mahmudul Hasan. "RFID Based Smart Door Lock Security System." American Journal of Sciences and Engineering Research E-ISSN-2348-703X 4.3 (2021).

[11] Fikry, Muhammad, and Sozo Inoue. "Optimizing Forecasted Activity Notifications with Reinforcement Learning." Sensors 23.14 (2023): 6510.

[12] Aribowo, Arnold, and Alfa Satya Putra. "Lecturer and student attendance system with RFID." Journal of Physics: Conference Series. Vol. 1858. No. 1. IOP Publishing, 2021.

[13] Wijaya, Kristianto, et al. "Smart RFID System for Locker Cabinet Security Using Android App." 2022 4th International Conference on Cybernetics and Intelligent System (ICORIS). IEEE, 2022.

[14] POWER, UNIT-III UTILIZATION OF ELECTRICAL. "UNIT-II ELECTRICAL MACHINES 9." PANIMALAR ENGINEERING COLLEGE.

[15] Muhammad Fikry. “Performance Analysis of Smart Technology With Face Detection Using YOLOv3 and InsightFace for Student Attendance Monitoring”. International Journal of Intelligent Systems and Applications in Engineering, vol. 12, no. 4, June 2024, pp. 3490 -, https://ijisae.org/index.php/IJISAE/article/view/6865.

[16] Koppikar, Unnati, et al. "IoT based smart attendance monitoring system using RFID." 2019 1st International Conference on advances in information technology (ICAIT). IEEE, 2019.

[17] Than, Shwe Sin Myat, Akari Myint Soe, and Mya Thet Khaing. "Employee Attendance Record System using Microcontroller." International Journal Of All Research Writings 3.1 (2020): 85-90.

[18] Tompunu, Alan Novi, and Yulian Mirza. "Room Door Security System Using Microcontroller-Based On E-KTP." Journal of Physics: Conference Series. Vol. 1500. No. 1. IOP Publishing, 2020.

[19] Kassim, Murizah, et al. "Web-based student attendance system using RFID technology." 2012 IEEE Control and System Graduate Research Colloquium. IEEE, 2012.

[20] Ishaq, Kashif, and Samra Bibi. "IoT based smart attendance system using RFID: A systematic literature review." arXiv preprint arXiv:2308.02591 (2023).

[21] Fikry, Muhammad. "Aplikasi Java Kriptografi Menggunakan Algoritma Vigenere." TECHSI-Jurnal Teknik Informatika 8.1 (2019): 1-9.

[22] Ghadekar, Premanand, et al. "IOT enable door lock system using cognitive abilities." Artificial Intelligence and Information Technologies. CRC Press, 2024. 329-339.

[23] Ishaq, Kashif, and Samra Bibi. "IoT based smart attendance system using RFID: A systematic literature review." arXiv preprint arXiv:2308.02591 (2023).

[24] Finkenzeller, Klaus. RFID handbook: fundamentals and applications in contactless smart cards, radio frequency identification and near-field communication. John wiley & sons, 2010.

[25] Ferdous, Raquib Md, Ahmed Wasif Reza, and Muhammad Faisal Siddiqui. "Renewable energy harvesting for wireless sensors using passive RFID tag technology: A review." Renewable and Sustainable Energy Reviews 58 (2016): 1114-1128.

[26] Koagouw, Enjel Maria, Sisca Beatrix Kairupan, and Marthinus Mandagi. "Implementation The Indonesian Electronic Identity Card Policy in The Office of Population's Civil Registration Minahasa regency." Technium Soc. Sci. J. 21 (2021): 85.

[27] Soemartono, Triyuni. "The Dynamic of e-KTP Evaluation Program in DKI Jakarta." BISNIS & BIROKRASI: Jurnal Ilmu Administrasi dan Organisasi 20.2 (2014): 5.

[28] Gupta, Aditya, et al. "SeCrypt: A Password Manager." Int J Innov Res Sci Eng Technol (2022).

[29] Ertaul, Levent, Manpreet Kaur, and Venkata Arun Kumar R. Gudise. "Implementation and performance analysis of pbkdf2, bcrypt, scrypt algorithms." Proceedings of the international conference on wireless networks (ICWN). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), 2016.

[30] Fan, Haopeng, et al. "Cache attacks on subkey calculation of Blowfish." Journal of Computer Security Preprint (2024): 1-27.

Downloads

Published

2025-01-07

Most read articles by the same author(s)