You are on page 1of 4

Design and Implementation of Unique National Identity Card Using RFID Technology

Mrs. R. Ramya,
Pursuing Ph.D, Pondicherry University Asst.Professor in ECE Sri Manakula Vinayagar Engineering College, Madagadipet, Puducherry 605 107.

B.BADRINATH @ SRINIVASAN
IV year, Sri Manakula Vinayagar Engineering College, Madagadipet, Puducherry 605 107.

R.VIGNESH KUMAR
IV year, Sri Manakula Vinayagar Engineering College, Madagadipet, Puducherry 605 107.

mithulramya@rediffmail.com ABSTRACT

upgrade1990@gmail.com

vicky_pandiyan@yahoo.co.in

Data management and organization of data has become a prime issue at present. RFID (Radio Frequency Identification) technology has become a solution for such problems. Data collection has become a very important part of the census system and in other government related activities where information of an individual is needed. Various storage methods and manual identification methods are needed in order to identify such data. The individual has to maintain large amount of hard copies of data. In this project, we present a novel idea of using RFID technology to organize and store large amounts of data using a single RFID tag. The security to data is provided by the use of cryptographic techniques. Applications like, the use of the RFID tag as a national identification card is explained in this paper.

method. A single RFID card is used as a means to identify many types of information. Whenever the user uses his tag, the reader identifies and the embedded unit checks the authenticity of the tag. If the tag is authorized, the concern persons detail will be retrieved from the Database.

1.1 RFID:
RFID is an auto identification technology. Costs of RFID technology have reduced and it has become commercially available. The object of any RFID system is to carry data in suitable transponders, generally known as tags, and to retrieve data, by machine-readable means, at a suitable time and place to satisfy particular applications needs .

General Terms
Encryption, Cryptographic techniques, micro controller, GSM modem

1.2

TECHNICAL OVERVIEW

Keywords:
card

RFID, Microcontroller, National Identity

1.

INTRODUCTION

The RFID tag is loaded with the user information such as name, address proof, medical history, business related information and digital image of the RFID owner updated at frequent intervals of time. This information is read by the suitable RFID reader. We have interfaced the RFID reader with the embedded unit. The requested information from the RFID tag is obtained and it is transferred serial port RS 232 or it can be interfaced using USB. The micro controller is used to verify and communicate the required data. Security is provided to user information by the use of cryptographic techniques. General information such as license details, Voter ID details, etc. can be viewed by RFID readers without using cryptographic techniques. But sensitive personal information such as medical history, business related information, etc. can be viewed only with the consent of the user. Decryption keys are provided to the users of the database system. Security and privacy of the user is protected by this

RFID technology is an auto identification technology like the smart card, bar code and biometric scanning systems. The advantage of RFID technology over these technologies is that RFID technology does not need line of sight communication for identifying data from RFID tags. RFID tags can store the identification number of the individual. Specialized RFID readers can identify these numbers and obtain data from the local database connected to the readers. In another method the RFID can contain read write memory which can store and be updated with data at regular intervals. These data can be used to monitor the RFID tags at various locations. RFID tags can be classified according to the power sources and frequency of operation. According to the power sources RFID tags are divided into active and passive tags. Active tags usually have an on board battery and passive tags use the power of RFID reader signal for retransmission of the requested information. According to the frequency of operation RFID tags are classified as low frequency, medium frequency, high frequency, very high frequency and ultra high frequency or the microwave frequency type. RFID readers also can be classified into active and passive type readers. Cryptographic methods can be used to provide security and privacy to content sensitive data stored in RFID tags. Encryption and decryption keys are to be used in database

systems in order to protect such data from eavesdropping and clandestine tracking. The micro controller can be used to interface the RFID modules and the GSM modem to serially communicate data. The GSM modem is a module which can support the SIM card, which is the component of Global System for Mobile module. The micro controller can be interfaced with the serial interface IC namely the MAX 232 IC which is compatible with the serial communication standards of the personal computer. The GSM module can connect the micro controller interface with a remote located database.

3.2

Implementation

2.

DESIGN AND IMPLEMENTATION

In the current work we have designed following operating points. One is General data identification at organizations, verification of authenticity of the tag in the embedded unit and retrieval of individual identification data from the database. A. Section 1- General data identification: Figure 1. General data collection and person counter The Figure 1 represents typical block diagram for implementing general data collection and person counter using RFID technology. Atmel 89C51 micro controller is proposed as a base device. The micro controller is interfaced with RFID reader that can detect general user information from the RFID tags. It can be used also in counting the number of persons present in an auditorium, and in tracking RFID tag user movements inside a building [2]. The data from the tags can be communicated serially to the micro controller using the RS 232 communication interface with the help of the MAX 232 IC. The micro controller can also be interfaced with the GSM modem. So the unit will be very mobile and handy. The data can be transferred to remote locations that may not be known to the tag holders improving safety.

In this method, general user data can be identified by RFID reader. No special decryption keys are required to read data from RFID tags. UHF tags can be used to dynamically monitor the RFID tag holder inside an auditorium, conference halls, convention centers, etc. The use of the passive tags is more prevalent. The passive tags are of less cost and they carry unique number. The unique number can be linked to databases and they can be used to access user information. Each data can be provided with a password and a master database can be used to obtain all the information regarding the particular user. By interfacing a GSM modem and a RFID reader with a microcontroller the user data can be identified from remote locations.

B. Section 2- Verification process:


This unit consists of an 8051 embedded micro controller module interfaced with the RFID reader can be used at various locations to identify license details of the particular vehicle owner, in election office to identify the voter, in hospitals, in passport office and in ration office. The total controller program is developed in embedded C language and is downloaded into the memory for operation. The data from the RFID tag is collected in the RFID reader and is transferred to the embedded unit through RS232 serial port. The operation of the 8051 controller is to verify whether the tag of the user is authorized or unauthorized.

C. Section 3- Retrieval of data from the database:


In this method, when the embedded unit verifies the authenticity of the user the unique number from the tag is sent to the PC. The PC in the respective organization has the centralized database which has the details about the user. In case of sensitive content; cryptographic techniques are used to protect such data. The management systems have to use passwords to obtain such data. Some of the public key encryption systems like RSA, DES and AES algorithms can be used to protect user data . Similarly, in case of the Overall Administrator they have the master key which can access the entire details of the user. Figure 2. Census system Figure 2 represents typical block diagram for implementation of census system is shown. In a census process use of RFID tags makes data verification and data updates about individuals, in a more efficient way [4]. Officials taking census can use a RFID reader interfaced to a portable computer, to verify information from RFID tag of an individual. The system can also be made very much handy by using the GSM modem which increases the portability. The GSM modem receives the tag details and transfers it to the database located at different location. More than one location also can be programmed into the GSM modem such that copies of the tag number can be

synchronously transferred to the remote locations. This improves the verification time and data processing time. The census cost is reduced and the census efficiency improves. .

These computers have the necessary decryption codes to decode encrypted data and a centralized database for accessing entire user details.

3.

ADVANTAGES
[1] By using RFID technology line of sight data identification is not required in case of active tag [2] Efficiency of data collection is improved [3] Portability is improved [4] Data can be transmitted to remote locations by using GSM modem [5] Cost per identity card is reduced [6] Data security is provided for sensitive data [7] Fake identity is prevented [8] User data updates are easier

Figure 3. Medical information identification system Figure 3 represents typical block diagram for implementation of medical information identification system is shown. In case of medical emergency if RFID tags are used, the medical history of the respective person can be easily identified. It will be very efficient as a centralized database can be used for many regions [4]. Security to user data is provided by use of encryption of data present in the RFID tags [3]. RFID readers interfaced with micro controller using serial port are connected to computers. These computers have the necessary decryption codes to decode encrypted data and a centralized database for accessing user medical history.

4.

CONCLUSION

In this project, we have designed a novel method of using a single RFID card instead of carrying large amount of hard copies of authentification such as voter id, passport, license, health card, etc. This method uses latest RFID technology and popular micro controllers to perform data identification and verification tasks. This facilitates the fast and convenient by reducing the paper work, and makes the identification process easy. All these processes can be easily carried out in practical by use of RFID technology. In India we have not implemented any automated system for database verification system. Thus we have proposed this model at low cost.

5.

ACKNOWLEDGMENTS

We thank Mrs.R.Ramya, for consistent support towards development of our project and this paper.

6.

REFERENCES
[1] S.Srinivasan,
S.Vani, Dr.H.Ranganathan. An embedded system and RFID solution for transport related issues (IEEE Conference),2010. [2] Sewon Oh, Joosang Park, Yongioon Lee, RFID based middleware system for Automatic Identification. IEEE International conference on service operations and Logistics, and Information,2005. [3] Shi-Cho Cha Kuan-Ju Huang Hsiang-Meng Chang, An Efficient and flexible way to protect privacy in RFID environment with licenses. IEEE International conference RFID, April 16-17,2008. [4] Kin Seong Leong, Mun Leng Ng, Member, IEEE, Alfio R.Grasso, Peter H.Cole, Synchronization of RFID readers for dense RFID readers environments, International symposium on Applications and Internet Workshops (SAINTW 06), 2005. [5] Urachada KetProm, Chaichana Mitrpant, Putchapan Lowjun, Closing digital gap on RFID Usage for better farm management, PICMET 2007, 5-9 August 07.

Figure 4. Overall administrator Figure 4 represents typical block diagram for implementation of Overall identification system is shown. In case of emergency if RFID tags are used, the entire details of the respective person can be easily identified. It will be very efficient as a centralized database can be used for many regions [4]. Security to user data is provided by use of encryption of data present in the RFID tags [3]. RFID readers interfaced with micro controller using serial port are connected to computers.

You might also like