Crypt-Tag Authentication in NFC Implementation for Medicine Data Management

Abstract

This study focus on the implementation of expiry date detection for medicine using RFID in the health care industry. The motivation for doing this research is the process of searching for the expired medicine is a time consuming and lack of security features included in current NFC implementation. Therefore, the objective of this research is to study the RFID technology used for detecting medicine expiry product and to develop a new system that integrated NFC with authentication feature. Moreover, the problem of current data management for medicine still using manual or barcode system that lead to inconsistency, easy duplication and human error. Here, the NFC is chosen, due to smaller distance of signal coverage, since less interference and the time spending for sniffing activity by the hacker can be reduced. The system is developed using C#, SQLite, Visual Studio, NFC Tag and NFC reader (ACR122U-A9). Experiments have shown that the proposed system has produced medicine expiry date system and only authorized person in charge can monitor the medicine. The impact of the proposed system produces safer, greener and easier environment for better medicine data management. The significance of this study gives a medicine expiry date detection system for health care.

Authors and Affiliations

Z. Zainal Abidin, N. A. Zakaria, N. Harum, M. R. Baharon, Ee-Song Hong, Z. Abal Abas, Z. Ayop, N. A. Mat Ariff

Keywords

Related Articles

Impact Propagation of Human Errors on Software Requirements Volatility

Requirements volatility (RV) is one of the key risk sources in software development and maintenance projects because of the frequent changes made to the software. Human faults and errors are major factors contributing to...

CluSandra: A Framework and Algorithm for Data Stream Cluster Analysis

The clustering or partitioning of a dataset’s records into groups of similar records is an important aspect of knowledge discovery from datasets. A considerable amount of research has been applied to the identification o...

Image Retrieval using DST and DST Wavelet Sectorization

The concept of sectorization of the transformed images for CBIR is an innovative idea. This paper introduces the concept of Wavelet generation for Discrete sine transform (DST).The sectorization of the DST transformed i...

Representing Job Scheduling for Volunteer Grid Environment using Online Container Stowage

Volunteer grid computing comprises of volunteer resources which are unpredictable in nature and as such the scheduling of jobs among these resources could be very uncer-tain. It is also difficult to ensure the successful...

An Overview of Mutation Strategies in Bat Algorithm

Bat algorithm (BA) is a population based stochastic search technique encouraged from the intrinsic manner of bee swarm seeking for their food source. BA has been mostly used to resolve diverse kind of optimization proble...

Download PDF file
  • EP ID EP393770
  • DOI 10.14569/IJACSA.2018.090913
  • Views 113
  • Downloads 0

How To Cite

Z. Zainal Abidin, N. A. Zakaria, N. Harum, M. R. Baharon, Ee-Song Hong, Z. Abal Abas, Z. Ayop, N. A. Mat Ariff (2018). Crypt-Tag Authentication in NFC Implementation for Medicine Data Management. International Journal of Advanced Computer Science & Applications, 9(9), 93-100. https://europub.co.uk/articles/-A-393770