Abstract
the proposed method unite RFID tag information and sensor values into a 16-bit key to the authentication named as Radio Frequency Authentication Search Key (RFAS), which shows improvement in efficiency. The different strategies used in RFID environment, various parameters in human monitoring systems, classification on encryption techniques, the search techniques with decision making, and the need of optimization techniques. In this paper, the structure of RFAS key and its use in the monitoring scheme is explained. The workflow of RFAS key in monitoring and search inside a jail environment is also presented. Different key generation techniques are compared with RFAS key formation in this work.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Recent Technology and Engineering
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.