Crypt-Tag Authentication in NFC Implementation for Medicine Data Management

Abstract

This study focus on the implementation of expiry date detection for medicine using RFID in the health care industry. The motivation for doing this research is the process of searching for the expired medicine is a time consuming and lack of security features included in current NFC implementation. Therefore, the objective of this research is to study the RFID technology used for detecting medicine expiry product and to develop a new system that integrated NFC with authentication feature. Moreover, the problem of current data management for medicine still using manual or barcode system that lead to inconsistency, easy duplication and human error. Here, the NFC is chosen, due to smaller distance of signal coverage, since less interference and the time spending for sniffing activity by the hacker can be reduced. The system is developed using C#, SQLite, Visual Studio, NFC Tag and NFC reader (ACR122U-A9). Experiments have shown that the proposed system has produced medicine expiry date system and only authorized person in charge can monitor the medicine. The impact of the proposed system produces safer, greener and easier environment for better medicine data management. The significance of this study gives a medicine expiry date detection system for health care.

Authors and Affiliations

Z. Zainal Abidin, N. A. Zakaria, N. Harum, M. R. Baharon, Ee-Song Hong, Z. Abal Abas, Z. Ayop, N. A. Mat Ariff

Keywords

Related Articles

A Survey of Malware Detection Techniques based on Machine Learning

Diverse malware programs are set up daily focusing on attacking computer systems without the knowledge of their users. While some authors of these programs intend to steal secret information, others try quietly to prove...

Route Optimization in Network Mobility

NEtwork MObility (NEMO) controls mobility of a number of mobile nodes in a comprehensive way using one or more mobile routers. To choose a route optimization scheme, it is very important to have a quantitative comparison...

DLBS: Decentralize Load-Balance Scheduling Algorithm for Real-Time IoT Services in Mist Computing

Internet of Things (IoT) has been industrially investigated as Platforms as a Services (PaaS). The naive design of these types of services is to join the classic centralized Cloud computing infrastructure with IoT servic...

Visualizing Composition in Design Patterns

Visualization of design patterns information play a vital role in analysis, design and comprehension of software applications. Different representations of design patterns have been proposed in literature, but each repre...

Online Estimation of Wind Turbine Tip Speed Ratio by Adaptive Neuro-Fuzzy Algorithm

The efficiency of a wind turbine highly depends on the value of tip speed ratio during its operation. The power coefficient of a wind turbine varies with tip speed ratio. For maximum power extraction, it is very importan...

Download PDF file
  • EP ID EP393770
  • DOI 10.14569/IJACSA.2018.090913
  • Views 106
  • Downloads 0

How To Cite

Z. Zainal Abidin, N. A. Zakaria, N. Harum, M. R. Baharon, Ee-Song Hong, Z. Abal Abas, Z. Ayop, N. A. Mat Ariff (2018). Crypt-Tag Authentication in NFC Implementation for Medicine Data Management. International Journal of Advanced Computer Science & Applications, 9(9), 93-100. https://europub.co.uk./articles/-A-393770