EST

Call for paper
April Edition 2017

International Journal of Applied Information Systems solicits high quality original research papers for the
March 15, 2017
April 2017 Edition of the journal.
The last date of research paper submission is
March 15, 2017
SUBMIT YOUR PAPER

Number 5

Design of RFID based Location Aware System to Mitigate Child Kidnapping in Nigerian Nursery and Primary Schools

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive
 

PrintEmail

journal image
 Download
1127
  • Opeyemi Emmanuel Matiluko and Dayo Reuben Aremu 2014. Design of RFID based Location Aware System to Mitigate Child Kidnapping in Nigerian Nursery and Primary Schools. International Journal of Applied Information Systems. 7, 5 (July 2014), 6-10. DOI=http://dx.doi.org/10.5120/ijais451195
  • @article{10.5120/ijais2017451568,
    author = {Opeyemi Emmanuel Matiluko and Dayo Reuben Aremu},
    title = {Design of RFID based Location Aware System to Mitigate Child Kidnapping in Nigerian Nursery and Primary Schools},
    journal = {International Journal of Applied Information Systems},
    issue_date = {July 2014},
    volume = {7},
    number = {},
    month = {July},
    year = {2014},
    issn = {},
    pages = {6-10},
    numpages = {},
    url = {/archives/volume7/number5/654-1195},
    doi = { 10.5120/ijais14-451195},
    publisher = { xA9 2013 by IJAIS Journal},
    address = {}
    }
    
  • %1 451195
    %A Opeyemi Emmanuel Matiluko
    %A Dayo Reuben Aremu
    %T Design of RFID based Location Aware System to Mitigate Child Kidnapping in Nigerian Nursery and Primary Schools
    %J International Journal of Applied Information Systems
    %@ 
    %V 7
    %N 
    %P 6-10
    %D 2014
    %I  xA9 2013 by IJAIS Journal
    

Abstract

With the fast progression of digital data exchange in electronic way, information security is becoming more important in data storage and transmission. Cryptography has come up as a solution which plays a vital role in information security system against malicious attacks. The confidentiality, Integrity and Availability are the three main goals of Information Security. To protect Confidentiality and Integrity of the message, key mechanisms and Hash functions are used. This paper proposes a novel scheme, which computes Hybrid HMAC based on improved SHA-512 algorithm. The proposed system gives a constant output of 512 bits for any input length of data and generates HMAC using multiple available keys. Paper also provides a method for reducing the time taken by traditional HMAC functions and increases complexity of SHA-512.

References

  1. Okengwu, K. (2011). "Kidnapping in Nigeria: Issues and common sense ways of surviving". Global Journal of Educational Research, 1(1), 1 – 8. Retrieve from http://www. globalresearchjournals. org/fullarticle/51404cb04bdbb.
  2. Curran, K. , & Norrby, S. (2009), RFID-Enabled Location Determination within Indoor Environments. International Journal of Ambient Computing and Intelligence (IJACI), Volume 1, Issue 4, Article 5, pages 63-86. http://www. igi-global. com/article/rfid-enabled-location-determination-within/37476.
  3. Hofmann-Wellenhof, B. , Lichtenegger, H. , & Collins, J. (2001), Global Positioning System Theory and Practice, 5th edn. Springer-Verlag Wien New York
  4. Pellerin, C. (2006), United States Updates Global Positioning System Technology - Available at: http://usinfo. state. gov/xarchives/display. html?p=washfile-english&y=2006&m=February&x=20060203125928l cnirellep0. 5061609
  5. Space Segment (2013). Retrieved December 25, 2013, from http://www. gps. gov/systems/gps/space/
  6. Tracking a suspect by any mobile phone (2005). BBC News. 03-08-2005. Retrieved December 19, 2013, from http://news. bbc. co. uk/2/hi/technology/4738219. stm.
  7. Radio-frequency identification (2013). Wikipedia. Retrieved September 20, 2013 from http://en. wikipedia. org/wiki/Radio_frequency_identification
  8. Norrby, S. (2008). Continous RFID-enabled location awareness. (Bachelor Thesis, University of Ulster, United Kingdom). Retrieved from http://scisweb. ulster. ac. uk/~kevin/stephen. zip

Keywords

RFID; location aware system; kidnapping; Passive Tag.

Index Terms

Computer Science
Information Sciences