Enhancing Academic Security with RFID-Based Smart Locks and Real-Time Attendance Tracking System
DOI:
https://doi.org/10.29103/micoms.v4i.950Keywords:
RFID-based Smart Lock, Real-Time Attendance Tracking, Academic Security, Internet of Things, E-KTP IdentificationAbstract
In this study, we propose a novel RFID-based smart lock system integrated with real-time attendance tracking to enhance academic security. Traditional security methods such as mechanical locks and manual attendance systems are prone to various limitations, including lost keys, falsification, and lack of automatic tracking. Our system utilizes E-KTP cards as RFID identification tools, supported by Internet of Things (IoT) technology, to provide automated door access and efficient attendance monitoring. The implementation results demonstrate a high accuracy rate of 99.5% in reading E-KTP cards, with an average response time of 850 Ms and a 99.5% uptime during a 30-day testing period. The system can handle up to 40 access requests per minute during peak hours. Additionally, it reduces access time by 91%, lowers errors from 5% to 0.2%, cuts operational costs by 60%, and decreases maintenance time by 75%. Security is reinforced through dual encryption using the Vigenère and Bcrypt algorithms, ensuring no security breaches over six months. The dashboard provides real-time monitoring, and the automated attendance system reduces human error, integrating seamlessly with academic databases for user verification and schedule management. This research demonstrates the effectiveness of RFID and IoT technologies in modernizing and securing academic environments.
References
1] Karygiannis, Tom, et al. "Guidelines for securing radio frequency identification (RFID) systems." NIST Special publication 80 (2007): 1-154.
[2] Weis, Stephen A. "RFID (radio frequency identification): Principles and applications." System 2.3 (2007): 1-23.
[3] Weis, Stephen August. Security and privacy in radio-frequency identification devices. Diss. Massachusetts Institute of Technology, 2003.
[4] Ilie-Zudor, Elisabeth, et al. "A survey of applications and requirements of unique identification systems and RFID techniques." Computers in Industry 62.3 (2011): 227-252
[5] Fikry, Muhammad, et al. "Analysis of Model-Free Reinforcement Learning Algorithm for Target Tracking." Journal of Computer Engineering, Electronics and Information Technology 1.1 (2022): 01-10.
[6] Hadi, Achmad Farchan, Mochammad Taufik, and Hudiono Hudiono. "Design and build a hotel service reservation and verification system using web-based e-KTP." Journal of Telecommunication Network (Jurnal Jaringan Telekomunikasi) 13.4 (2023): 355-359.
[7] Gangwar, Veer P., and Deepika Reddy. "Hospitality industry 5.0: Emerging trends in guest perception and experiences." Opportunities and Challenges of Business 5.0 in Emerging Markets (2023): 185-211.
[8] Tompunu, Alan Novi, and Yulian Mirza. "Room Door Security System Using Microcontroller-Based On E-KTP." Journal of Physics: Conference Series. Vol. 1500. No. 1. IOP Publishing, 2020.
[9] Fikry, Muhammad. "Aplikasi Java Kriptografi Menggunakan Algoritma Vigenere." TECHSI-Jurnal Teknik Informatika 8.1 (2019): 1-9.
[10] Ghadekar, Premanand, et al. "IOT enable door lock system using cognitive abilities." Artificial Intelligence and Information Technologies. CRC Press, 2024. 329-339.
[11] Ishaq, Kashif, and Samra Bibi. "IoT based smart attendance system using RFID: A systematic literature review." arXiv preprint arXiv:2308.02591 (2023).
[12] Finkenzeller, Klaus. RFID handbook: fundamentals and applications in contactless smart cards, radio frequency identification and near-field communication. John wiley & sons, 2010.
[13] Ferdous, Raquib Md, Ahmed Wasif Reza, and Muhammad Faisal Siddiqui. "Renewable energy harvesting for wireless sensors using passive RFID tag technology: A review." Renewable and Sustainable Energy Reviews 58 (2016): 1114-1128.
[14] Koagouw, Enjel Maria, Sisca Beatrix Kairupan, and Marthinus Mandagi. "Implementation The Indonesian Electronic Identity Card Policy in The Office of Population's Civil Registration Minahasa regency." Technium Soc. Sci. J. 21 (2021): 85.
[15] Soemartono, Triyuni. "The Dynamic of e-KTP Evaluation Program in DKI Jakarta." BISNIS & BIROKRASI: Jurnal Ilmu Administrasi dan Organisasi 20.2 (2014): 5.
[16] Gupta, Aditya, et al. "SeCrypt: A Password Manager." Int J Innov Res Sci Eng Technol (2022).
[17] Ertaul, Levent, Manpreet Kaur, and Venkata Arun Kumar R. Gudise. "Implementation and performance analysis of pbkdf2, bcrypt, scrypt algorithms." Proceedings of the international conference on wireless networks (ICWN). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), 2016.
[18] Fan, Haopeng, et al. "Cache attacks on subkey calculation of Blowfish." Journal of Computer Security Preprint (2024): 1-27.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Muhammad Al Imran, Muhammad Fikry, Sujacka Retno
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
COPYRIGHT NOTICE
Authors retain copyright and grant the journal right of first publication and this work is licensed under a Creative Commons Attribution-ShareAlike 4.0 that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
All articles in this journal may be disseminated by listing valid sources and the title of the article should not be omitted. The content of the article is liable to the author.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
In the dissemination of articles, the author must declare https://proceedings.unimal.ac.id/micoms/index as the first party to publish the article.