dc.contributor.author |
Noprianto, Noprianto |
|
dc.contributor.author |
Wakhidah, Rokhimatul |
|
dc.contributor.author |
Ariyanto, Rudy |
|
dc.contributor.author |
Syaifudin, Yan W. |
|
dc.date.accessioned |
2023-05-06T10:20:44Z |
|
dc.date.available |
2023-05-06T10:20:44Z |
|
dc.date.issued |
2023-09-01 |
|
dc.identifier.issn |
2210-142X |
|
dc.identifier.uri |
https://journal.uob.edu.bh:443/handle/123456789/4923 |
|
dc.description.abstract |
In the past, people had to carry around a thick wallet filled with cash when they wanted to make a payment. But now it
can be replaced with an electronic wallet (e-wallet) or electronic card (e-money). E-money is one example of the application of RFID
in the financial sector. Also often used for identity cards (e-identity). With RFID technology, we can access a room or class that has
an RFID reader installed. In most cases, granting access to a room can be done by directly coming to register the RFID or accessing
the reader by accessing a specific URL address. This will cause problems if the number is even hundreds. Another problem is the
data communication model to the reader device which is carried out by direct access to the URL or communication socket, especially
for communication sockets for users who are still new to it will be very difficult. This study proposes data communication to the
reader device via remote (remote) on a local network or long distance (internet) and utilizes web communication model services and
Protocol Message Queuing Telemetry Transport (MQTT) to wrap socket communication to RFID reader devices. In addition to socket
communication, the communication model between applications uses JWT tokens with SHA-256 hashing algorithms that have been set
up for access control to add security so as to avoid unknown requests. Auditing techniques are also a concern so that any data changes
can be monitored easily. Additional security for writing and reading cards with key A and key B diversification techniques helps avoid
taking or changing data on RFID cards. Furthermore, the test results on the AR-725E reader device show that RFID cards can be
detected with a maximum distance of 3 cm. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
University of Bahrain |
en_US |
dc.subject |
RFID; e-money; e-identity; door access; web service; MQTT |
en_US |
dc.title |
Door Access System Design Using RFID Technology |
en_US |
dc.identifier.doi |
http://dx.doi.org/10.12785/ijcds/140162 |
|
dc.volume |
14 |
en_US |
dc.issue |
1 |
en_US |
dc.pagestart |
1 |
en_US |
dc.pageend |
1 |
en_US |
dc.contributor.authorcountry |
Indonesia |
en_US |
dc.contributor.authoraffiliation |
Politeknik Negeri Malang |
en_US |
dc.contributor.authoraffiliation |
State Polytechnic of Malang |
en_US |
dc.source.title |
International Journal of Computing and Digital Systems |
en_US |
dc.abbreviatedsourcetitle |
IJCDS |
en_US |