Abstract

the proposed method unite RFID tag information and sensor values into a 16-bit key to the authentication named as Radio Frequency Authentication Search Key (RFAS), which shows improvement in efficiency. The different strategies used in RFID environment, various parameters in human monitoring systems, classification on encryption techniques, the search techniques with decision making, and the need of optimization techniques. In this paper, the structure of RFAS key and its use in the monitoring scheme is explained. The workflow of RFAS key in monitoring and search inside a jail environment is also presented. Different key generation techniques are compared with RFAS key formation in this work.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call