The development of the business
applications as well as the advancement in the technology has led strong urge
and requirements in developing and implementing dynamic security in the
computer systems. The main attributes implementing system security in the real
life situation include the application monitoring and controlling of the computer
system. The human security is highly limited due to the errors, the inaccuracy,
and unreliability. The automation of the system is securing the industries
against possible loss is vital and crucial for the economy of the particular
industry. The Radio Frequency Identification (RFID) technology provides the
right solution to the automation of the security problems within the business
industries. The major industries that
apply the RFID technology include the automatic vehicle identification, the inventory
management, the work – in – process, the container and yard management, the
document and jewels tracking and the patient monitoring.
The
problem definition
The vehicle industries have encountered
the unsolved problem regarding the stolen vehicles and their recovery to the
owners. The security issue regarding the stolen vehicles has increased leading
to fear and worries on the methodologies suitable for recovering stolen
vehicles. Most vehicles get lost, and some tomes fail to get way in which they can
get traced back. The vehicle owners have also encountered the problem based on
the monitoring the vehicle on transit. The vehicle owners require monitoring
the vehicles used in transporting of goods and services for the security of the
cargo and the container. The approach of monitoring and controlling the vehicle
would solve the problems of the stolen vehicles and the lost items during the
transportation process (Bolić, et at… 2010).The data and information of the
vehicle based on the status of the goods and the vehicle desire to get recorded
and stored by the managing team. The concerns of the clients and the trust of
the vehicle owners require to get solved by implementing the security to the
vehicle and the goods on transit.
General
description of the business problem
The analysis research on the current
system has indicated that the security of vehicle get compromised when the
stolen vehicle or the transporting vehicle get into narrow streets as well as
the high building blocks. The GPS signal is highly affected by the tall
building, the valleys and the remote areas blocked by tall structures (Rawal,
2009). The GPS signals in the environments as mentioned earlier get weak and
fail to get transmitted to the monitoring center. The signals displayed through
the GPS within the blocked site have poor visibility making it difficult for
the vehicle users to identify the monitored vehicle on the sharp bending and
high steep environments. The stems initial systems indicated that the general
system applied in monitoring and checking the vehicle using the GPS cause the
high level of interrupt and overlapping causing g multipath problems at the
receiving end. The research on the current GPS system indicated that the GPS
location is never precise. The position provides at the monitoring center
indicate that the vehicle monitored the present high level of position drift
for the vehicle location. The utilization of the GPS technology in providing
vehicle security and monitoring strategies has a lot of inconveniences. The
technology does not guarantee high standards management that meets the user’s
needs.
The
vehicle monitoring industry has realized that the simple Global Positioning
System (GPS) methodology has a limitation in determining the real location of
the vehicle. The GPS technology alone does not provide the real-time
information for the vehicle location especially when the vehicle is running.
The monitoring problem becomes critical especially when the vehicle pass
through the tunnels and the built ups. The achievement of a reliable car
navigation system and technology is a requirement to facilitate easier and high
positioning accuracy as desired in the requirement. The security of the vehicle
requires the implementation of the up – to – date map database. The vehicle
industry experience shortcoming in managing and controlling the vehicle
security due to lack of sophisticated technology that allow real-time
monitoring of vehicles as well as the accurate positioning of the vehicles. The
current monitoring system requires improvement through the combination of the
GPS plus other technologies to achieve a dynamic security control in the
monitoring center. The vehicle monitoring center shall implement the proposed
system in the maintenance and acquisition of the required system to ensure that
the vehicle owners acquire the specific requirements as quoted in the
requirement documents. The vehicle security and monitoring system shall get,
solved through the implementation and the installation of the Global System for
Mobile Communication (GSM). The GSM technology shall get embedded in the
vehicle user mobile devices to enhance tracking of the vehicles in any place
and location.
Overview
of RFID
The RFID technology is an improvement of
different technologies that support the technology of things in the entire
global environment. The RFID technology uses the application of the
electromagnetic waves to automate the process of searching, identifying and
displaying people and the objects. The RFID technology incorporates the modules
that enhance the automatic location and capturing of data and information. The RFID technology has the composition of
two main architectural components namely the transponder or the tag and the
interrogator or the reader. The transponder gets embedded in the main object
that requires get monitoring or identifying. The RFID tag technology is
classified into two main categories namely the active RFID tag and the passive
RFID tag. The passive RFID tags architecture does not contain the internal
battery or the power sources. The active RFID tags have built-in batteries thus
enabling them to work for long distances. The active RFID tags get designed in
a manner that they never depend on other RFID enabled equipment like the nearby
field or the interrogator to perform the transmission or the receiving
functions.
The
RFID reader has the built in antennae that enhance the reading, the
interrogation and the writing of the tags.
The RFID reader device detects and identifies the tags attached or
embedded to the selected item. The RFID reader device communicates with the tag
via the reader antenna. The antennae
broadcast the data and the information through the electromagnetic radio
frequency waves to the tag. The tag responds by sending the feedback that
contains the signals corresponding to the location of the readings. The reader
identifies the feedback from the tag then the reader decodes the information as
it sends it to the middleware. The process involves the establishment of the
communication sessions that get initialized through the exchange of the
identification data and information. The identification process occurs by the
reader sending the request signals to the tags within the nearby field. The tag
that receives the requested signal responds by sending the identification data
and information (Zhang, et al… 2014).
The communication session gets established through the established
sessions to avoid biases and the collision of the data, and information
exchanged.
Business
justification
The vehicle industry requires a
sophisticated system that guarantees that the vehicle security and monitoring
system acquire the real-time vehicle data and information according to the
specification and the requirement by the vehicle owners. The proposed technology required to mitigate
the visibility and inaccurate monitoring of vehicles shall implement the
combination of the technologies. The technologies to get incorporated in the
system include the Radiofrequency Identification (RFID), the Global Positioning
system (GPS), General Packet Radio Services (GPRS) and the application of the
LANDMARK method (Zhang, et al… 2015). The improvement of the existing system
shall incorporate the acquisition of a variety of complex environments that
would satisfy the requirements specified by the vehicle owners. The proposed
technology can provide high precise vehicle location. The proposed system also
has the capability of the provision of the mechanical information about the
vehicle status as well as the technology of the wireless data and information
communication.
The LANDMARK approach technology
provides the accurate vehicle location through the fixing of the longitudinal
and latitudinal calculation depending on the physical and logical location of
data and information. The LANDMARK technology guarantees the provision and the
designation of the precise vehicle location. The technology provides data and
information related to the software and the hardware components of the
monitored vehicle. The implementation of the proposed system shall guarantee
the integration of the intranet vehicle searching capability. The system shall
enable the users of the system and the vehicle owners to search and track the
location of the vehicles through the World Wide Web. The Telnet capability
shall get enhanced through the implementation of the GPRS to indicate the
vehicle location terminal as well as the integrating the internet technology
and the Geographical Information System (GIS) technology. The proposed system has the capability of
incorporating the future extension of the user requirements thus increasing the
scope and the usability of the system. The proposed system has modules for
integrating the intelligent fleet management system for improving the public
transportation and management system.
Benefits
of RFID Technology
1. The benefits of the RFID are that the
technology applies the use of the frequency thus the RFID does not require
implementing the line of sight. The old technology applied the use of the
barcode, the barcode technology suffer from the limitation of requiring the
line of sight between the scanner and the barcode. The items get scanned must
get close contact between the scanner and the object. The RFID technology
applies to allow the communication between the monitoring center and the RFID
devices to take place without direct contact.
2. The RFID technology guarantee highly
automated identification, reading and interpretation of data and information
from the embedded tags. The RFID technology supports bulk recording of goods
and services. The whole contents of the container can get scanned without
necessarily scanning the items one by one. The RFID reduce the labor required
for scanning the items in one roof.
3. The RFID tags promote the transmission of
the information from one area to another through improved transmission speed.
The data and information relating a specific search occur within a short span
of time. The searching of a particular vehicle has no influence on the location
of the vehicle. The RFID performs
high-speed operations in transmitting data and information through the waves.
4. The RFID technology offers huge storage
location that stores big data and information in large volume. The type of data
and information stored include the characteristics and features of the vehicle,
the information regarding the model, make, manufacture, serial numbers and the
batch number of the items.
5. The RFID technology has a high level of
flexibility and modularity. The data and information have the attributes of
being written and rewritten on the RFID tags. The tags usually carry the most
updated information regarding the location and the places where the particular
vehicle gets located. The data and
information on the RFID tags get updated automatically as the vehicle moves.
The RFID technology supports the real life application and records information
using dynamic principles.
Disadvantages
of DFID Technology
1. The RFID technology has some limitations
arising from the issues with reading and transmission of data and information.
The network line transmitting data and information may have errors and problems
thus affecting the data and information related to the monitoring center. The
RFID technology gets affected by the simultaneous signals transmitted to same
monitoring and controlling location. The data and information collision occur
on the receiving end resulting in the inability of the tag responding to the
simultaneous operations (Zhang, et al… 2014). The problems with motoring get
rampant when the monitoring and controlling zone is under a third party. The
signals relayed may conflict causing bottleneck and traffic on the transmitting
line.
Planning
The system of vehicle tracking system
shall have implementation through the application of four layer architecture to
control and manage the location of the vehicle. The layers involved shall
include the physical layer, the device layer, the data transmission layer and
the application layer.
The Physical Layer: The physical layer has the architecture
composing of the passive tags. The vehicle mounted with the controller device
send the electromagnetic signals in the form of the waves to the embedded tags.
The tags get the information thus retrieving the location information from the
updated tags. The RFID tags may have installation along the roads in a
particular positioning that maximize the geographical coverage and the accuracy
of the position.
The Device Layer: The device layer is
the vehicle controller composed of the RFID module, the GPRS module, The GPS
module and the sensing module. The device layer has responsibility for
collecting the detailed information regarding the location of the vehicle. The
collected information gets transmitted to the central controlling location. The
device controller collects the information regarding the Identification
information, the GPS position and the vehicle status, the storage, the
transmission of the information to the monitoring and controlling center and
transmission of data and information to the cloud by GPRS network (Zhang, et
al… 2015).
Data
transmission layer: The data transmission layer is responsible for transmitting
data and information collected from the device layer by the GPRS network
(Lehpamer, 2012). The transmission rate of the RFID is approximately 256 kbps.
Data
Application Layer: The application data layer incorporates the data module and
knowledge module. The monitoring and
controlling center make use of the center management module and the cloud
platform to monitor, control and manage remote vehicles. The cloud acts as the
repository center capable of storing analyzing and compiling information
involving the vehicle position, the vehicle status, and the real-time
circumstance.
Purchasing
The
RFID require strong and dynamic systems for the complete implementation of the
system. The following hardware and software requirement form the basic
requirements for the implementation of the system.
1. The RFID software with multiple numbers of
items that get scanned within short time requires purchasing a processor with a
speed of 6.56 Gigahertz per second (Mitrokotsa, et al… 2012).
2. The RFID system requires purchasing of
fully automated computer systems with accurate automation and compatible with
the proposed technology.
Impact of Implementation
The
RFID system shall require implementation through strictly following the
policies and rules set by the International Standards for Organization (ISO).
The individuals responsible for the utilization of the system shall require
training on the issue regarding the bleaching of the data and information as well
as training on policies governing personal privacy and confidentiality. The
industry must conform to the rules and regulations as well as the standards set
by the ISO.
Maintenance of the
system
The RFID system is a
rigid system with complex mechanical and physical framework that ensure that
the entire hardware and software components have secure measures from direct
damages. The RFID devices exist in sealed and protective coating that are
usually water and dust proof. The RFID technology requires minimal extra
operations on maintaining and protecting the system.
Conclusion
The
vehicle industry is a dynamic industry focusing on the implementation and the
maintenance of the value of customer assets and commodities. The security issue
poses the major threat and attack within the vehicle industry. The solution to
the security and monitoring problem is the application of the RFID system
getting incorporated with the GPRS and the GPS to locate the vehicle
accurately. The combination of the complex systems guarantees to locate the
vehicle within any environment with its complexity. The proposed system is
highly efficient and effective in the provision of searching and tracking of
the vehicle even in the tunnels and the areas with long building structures.
The RFID technology also provides a high level of intelligent platforms that
facilitate the powerful information processing through the cloud computing as
well as the analyzing vehicle hardware and software component devices. The RFID
solution paradigms guarantee stability and reliability within the vehicle
industry.
References
Bolić, M., Simplot-Ryl, D.,
& Stojmenović, I. (2010). RFID
systems: Research trends and
challenges.
Chichester, West Sussex: Wiley
Lehpamer, H. (2012). RFID design principles
Mitrokotsa, A., Sheng, Q. Z.,
& Maamar, Z. (2012). User-driven RFID applications and
challenges. Personal and Ubiquitous Computing, 16, 3,
223-224
Rawal, A. (2009). RFID: The
Next Generation Auto-ID Technology - A review of radio
frequency
identification technology, including its successes and challenges. Microwave
Journal, 52, 3, 58.
Zhang, D., Huang, H., & Jo,
M. (2015). Future RFID technology and applications: visions and
challenges. Telecommunication Systems :
Modelling, Analysis, Design and
Management, 58, 3,
193-194
Zhang, D., Huang, H., &
Jo, M. (2014). Future RFID technology and applications: visions and
challenges. Telecommunication Systems.
Sherry Roberts is the author of this paper. A senior editor at MeldaResearch.Com in custom essay research paper if you need a similar paper you can place your order from online research paper writer.
No comments:
Post a Comment