Asset Management Security System Using RFID Technology


  • Soumyasanta Rakshit
  • Dr. S. S. Sridhar





Using radio wave or radio frequency scanners to identify wirelessly any object is not so much complex in reality. The latest version of this technology is known as radio frequency identification or RFID. RFID has three building blocks: small tags built around microchips that carry a digital identification code; The RFID scanners also known as readers, the readers are also known as interrogators and networking hardware and the software to link scanners to the main computer databases that can be in hardware or cloud storage. In this project, we describe the implementation of RFID technology in the platform of asset management system in an organization. Using RFID technology track the all of the assets is the main aim of the project. The RFID interrogators open a serial port and then reads a RFID tag to use it as a unique parameter in the database to access and show the record associated to the RFID chip. Any change is wirelessly synchronized to the main database server.An admin will look after the whole server as an administration. If any new asset is introduced which is not in the main database, when the RFID scanner detects that the admin will get a notification message also in anyway if any asset will tamper by anything or anyone or if someone will try to steal any asset then again, the admin will get a notification message instantly.


[1] Dr. Ridha Kamoua, Xuan Wang, Weifeng Zheng. “Personal Asset Tracking.†Electrical and Computer Engineering, Stony Brook University 2016.

[2] Kishor T.Patil, Dr. Santosh k. Narayan. “An improved Fragile Watermarking Method for Tamper Detection between RFID Tag.†Amravati University, 2014.

[3] C.C Tan, Q LI. “A Robust and Secure RFID based pedigree system.†ICICS, 2006.

[4] Etuenne Perret Grenoble Alpes. “Micrometric Displacement Sensor Based on Chip les RFID.†LCIS, Valence, F-26900, France Institut Universitaire de France.

[5] Sergio Bravo Solorio, Asoke K. Nandi. “Secure Fragile Watermarking Method for image authentication for improve tampering localisation and self-recovery capabilities.†Signal Processing Book, 2016

[6] F.Y.Shih,Yi-Ta Wu. “A Novel Fragile Watermarking Techniqueâ€. IEEE 2004

[7] John C Nelson, Timo Santala, Jonathan Lenchner, Robert Calio, Michael Frissora, John E. Miller. “Locating and Tracking data center assets using active RFID tags and a mobile robot.†IEEE 2013

[8] Daquiang Zhang, Min Chen, Laurence Tianruo Yang, Shengjie Zhao, Minyi Guo, Yin Zhang. “Real-Time Locating Systems Using active RFID for Internet of things.†IEEE 2014

[9] I.J Garcia Zuazola, A. Sharma, J.C. Batchelor, I. Angulo, A. Perallos, W.G. Whittow, J.M.H Elmirghni, R. Langley. “Radio frequency identification miniature interrogator antenna sprayed over an in-vehicle chasis.†IEEE 2012

[10] Muthuselvi R. “Asset tracking and management system for library using active radio frequency identification.†Computer Science Engineering, Kamaraj College of Engineering & Technology. 2016

[11] K.T Patil, Sanket Sonawane, Saili Shinde, Dr. S.K. Narayankhedkar. “Tamper Detection technique in RFID System.†IJERA 2015

[12] Vidyasagar Potdar, Elizabeth Chang. “Tamper Detection in RFID tags.†IEEE 2007

[13] Woo Chaw Seng. “Digital image watermarking methods for copyright protection and authentication.†Artificial Intelligence, University of Malaya. 2012

View Full Article: