Enhancing Academic Security with RFID-Based Smart Locks and Real-Time Attendance Tracking System

Authors

  • Muhammad Al Imran Universitas Malikussaleh
  • Muhammad Fikry Universitas Malikussaleh
  • Sujacka Retno Universitas Malikussaleh

DOI:

https://doi.org/10.29103/micoms.v4i.950

Keywords:

RFID-based Smart Lock, Real-Time Attendance Tracking, Academic Security, Internet of Things, E-KTP Identification

Abstract

In this study, we propose a novel RFID-based smart lock system integrated with real-time attendance tracking to enhance academic security. Traditional security methods such as mechanical locks and manual attendance systems are prone to various limitations, including lost keys, falsification, and lack of automatic tracking. Our system utilizes E-KTP cards as RFID identification tools, supported by Internet of Things (IoT) technology, to provide automated door access and efficient attendance monitoring. The implementation results demonstrate a high accuracy rate of 99.5% in reading E-KTP cards, with an average response time of 850 Ms and a 99.5% uptime during a 30-day testing period. The system can handle up to 40 access requests per minute during peak hours. Additionally, it reduces access time by 91%, lowers errors from 5% to 0.2%, cuts operational costs by 60%, and decreases maintenance time by 75%. Security is reinforced through dual encryption using the Vigenère and Bcrypt algorithms, ensuring no security breaches over six months. The dashboard provides real-time monitoring, and the automated attendance system reduces human error, integrating seamlessly with academic databases for user verification and schedule management. This research demonstrates the effectiveness of RFID and IoT technologies in modernizing and securing academic environments.

References

1] Karygiannis, Tom, et al. "Guidelines for securing radio frequency identification (RFID) systems." NIST Special publication 80 (2007): 1-154.

[2] Weis, Stephen A. "RFID (radio frequency identification): Principles and applications." System 2.3 (2007): 1-23.

[3] Weis, Stephen August. Security and privacy in radio-frequency identification devices. Diss. Massachusetts Institute of Technology, 2003.

[4] Ilie-Zudor, Elisabeth, et al. "A survey of applications and requirements of unique identification systems and RFID techniques." Computers in Industry 62.3 (2011): 227-252

[5] Fikry, Muhammad, et al. "Analysis of Model-Free Reinforcement Learning Algorithm for Target Tracking." Journal of Computer Engineering, Electronics and Information Technology 1.1 (2022): 01-10.

[6] Hadi, Achmad Farchan, Mochammad Taufik, and Hudiono Hudiono. "Design and build a hotel service reservation and verification system using web-based e-KTP." Journal of Telecommunication Network (Jurnal Jaringan Telekomunikasi) 13.4 (2023): 355-359.

[7] Gangwar, Veer P., and Deepika Reddy. "Hospitality industry 5.0: Emerging trends in guest perception and experiences." Opportunities and Challenges of Business 5.0 in Emerging Markets (2023): 185-211.

[8] Tompunu, Alan Novi, and Yulian Mirza. "Room Door Security System Using Microcontroller-Based On E-KTP." Journal of Physics: Conference Series. Vol. 1500. No. 1. IOP Publishing, 2020.

[9] Fikry, Muhammad. "Aplikasi Java Kriptografi Menggunakan Algoritma Vigenere." TECHSI-Jurnal Teknik Informatika 8.1 (2019): 1-9.

[10] Ghadekar, Premanand, et al. "IOT enable door lock system using cognitive abilities." Artificial Intelligence and Information Technologies. CRC Press, 2024. 329-339.

[11] Ishaq, Kashif, and Samra Bibi. "IoT based smart attendance system using RFID: A systematic literature review." arXiv preprint arXiv:2308.02591 (2023).

[12] Finkenzeller, Klaus. RFID handbook: fundamentals and applications in contactless smart cards, radio frequency identification and near-field communication. John wiley & sons, 2010.

[13] Ferdous, Raquib Md, Ahmed Wasif Reza, and Muhammad Faisal Siddiqui. "Renewable energy harvesting for wireless sensors using passive RFID tag technology: A review." Renewable and Sustainable Energy Reviews 58 (2016): 1114-1128.

[14] Koagouw, Enjel Maria, Sisca Beatrix Kairupan, and Marthinus Mandagi. "Implementation The Indonesian Electronic Identity Card Policy in The Office of Population's Civil Registration Minahasa regency." Technium Soc. Sci. J. 21 (2021): 85.

[15] Soemartono, Triyuni. "The Dynamic of e-KTP Evaluation Program in DKI Jakarta." BISNIS & BIROKRASI: Jurnal Ilmu Administrasi dan Organisasi 20.2 (2014): 5.

[16] Gupta, Aditya, et al. "SeCrypt: A Password Manager." Int J Innov Res Sci Eng Technol (2022).

[17] Ertaul, Levent, Manpreet Kaur, and Venkata Arun Kumar R. Gudise. "Implementation and performance analysis of pbkdf2, bcrypt, scrypt algorithms." Proceedings of the international conference on wireless networks (ICWN). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), 2016.

[18] Fan, Haopeng, et al. "Cache attacks on subkey calculation of Blowfish." Journal of Computer Security Preprint (2024): 1-27.

Downloads

Published

2024-12-18