logo

RFID and Mobile Fusion for Authenticated ATM transaction

   

Added on  2020-05-11

111 Pages27574 Words62 Views
Running head: RFID AND MOBILE FUSION FOR AUTHENTICATED TRANSACTION
RFID and mobile fusion for authenticated ATM transaction
Name of the Student:
Name of the University:
Author note:

1RFID AND MOBILE FUSION FOR AUTHENTICATED TRANSACTION
Abstract
This paper gives a research on radio frequency identification (RFID) innovation. At first RFID
tags were created to in the long run supplant scanner tags in supply chains. Their favorable
circumstances are that they can be perused remotely and without observable pathway; contain
more data than scanner tags. The RFID innovation did not stop at thing level labeling. Since the
utilizations for RFID tags are so across the board, there is an extensive enthusiasm for bringing
down the expenses for creating them. For reasons unknown printing labels may turn into a
feasible other option to customary creation. The study deals with reviewing literature from
different sources. In addition, research methodology, finding and analysis as well as conclusion
and recommendations are discussed in the study.

2RFID AND MOBILE FUSION FOR AUTHENTICATED TRANSACTION
Acknowledgement
Conducting the research study enhances me to improve my knowledge as well as analytical
ability in RFID technology. It gave me the chance to face challenges all the while and conquer
them. It will not be possible to conduct the research without the significant direction of my
professors, companions and every one of who have added to this advancing knowledge. I also
want to thank my supervisor __________ for helping me in my research work as well as give
their full support during the research process. I would also thank all the participants within this
study for giving their time and helping me out. From the support of people, I am inspired to work
on the research in this subject area. Finally, thank you to my family members those help me and
encourage me.
Thank You.

3RFID AND MOBILE FUSION FOR AUTHENTICATED TRANSACTION
Table of Contents
Chapter 1: Introduction....................................................................................................................8
1.1 Background of the study............................................................................................................8
1.2 Research Aims and Objectives..................................................................................................9
1.2.1 Aims of the study....................................................................................................................9
1.2.2 Objectives of the study...........................................................................................................9
1.3 Research Questions..................................................................................................................10
1.4 Problem Statement...................................................................................................................10
1.5 Rationale of the study..............................................................................................................12
1.6 Structure of the study...............................................................................................................13
Capter 2: Literature Review...........................................................................................................15
2.1 Preface.....................................................................................................................................15
2.2 Overview of Radio Frequency Identification (RFID) technology...........................................15
2.3 Development history of RFID.................................................................................................19
2.4 Components in RFID used at present days..............................................................................20
2.4.1 Frequency bands...................................................................................................................22
2.4.2 Sources of energy.................................................................................................................23
2.4.3 Standards...............................................................................................................................24
2.5 Principles of RFID...................................................................................................................24
2.6 Applications of RFID..............................................................................................................29

4RFID AND MOBILE FUSION FOR AUTHENTICATED TRANSACTION
2.6.1 Supply chain management system........................................................................................29
2.6.2 Application in fashion industry............................................................................................32
2.6.3 Inventory management.........................................................................................................33
2.6.4 Production control................................................................................................................34
2.6.5 Retail management...............................................................................................................34
2.6.6 RFID for brand segregation..................................................................................................36
2.6.7 RFID tags for care labeling...................................................................................................37
2.7 Advantages of RFID technology.............................................................................................39
2.8 Privacy and security issues in RFID........................................................................................40
2.9 Summary..................................................................................................................................43
Chapter 3: Research Methodology................................................................................................43
3.1 Preface.....................................................................................................................................43
3.2 Method Outline........................................................................................................................43
3.3 Research Onion........................................................................................................................44
3.4 Research Philosophy................................................................................................................45
3.5 Research Approach..................................................................................................................46
3.6 Research Design......................................................................................................................46
3.7 Research strategy.....................................................................................................................48
3.8 Data Collection........................................................................................................................48
3.9 Sample Size.............................................................................................................................49

5RFID AND MOBILE FUSION FOR AUTHENTICATED TRANSACTION
3.10 Data Analysis.........................................................................................................................49
3.11 Accessibility issues................................................................................................................50
3.12 Ethical Consideration.............................................................................................................50
3.13 Gantt chart.............................................................................................................................51
3.14 Summary................................................................................................................................51
Chapter 4: Results and findings.....................................................................................................53
4.1 Preface.....................................................................................................................................53
4.2 Quantitative analysis................................................................................................................53
4.3 Summary..................................................................................................................................76
Chapter 5: Conclusion and Recommendations..............................................................................77
5.1 Conclusion...............................................................................................................................77
5.2 Linking with objectives...........................................................................................................77
5.3 Recommendations....................................................................................................................78
5.4 Limitation and Future scopes...................................................................................................79
References......................................................................................................................................81
Bibliography..................................................................................................................................91
Appendices..................................................................................................................................108
Appendix 1...................................................................................................................................108
Appendix 2...................................................................................................................................109

6RFID AND MOBILE FUSION FOR AUTHENTICATED TRANSACTION
List of tables
Table 1: Differences between active tags and passive tags...............................................15
Table 2: Use of RFID technology......................................................................................51
Table 3: Time-period of using RFID technology..............................................................53
Table 4: Major drivers for implementing RFID................................................................54
Table 5: Advantages of using RFID technology...............................................................56
Table 6: Purposes of implementing RFID.........................................................................57
Table 7: the objectives for using RFID..............................................................................59
Table 8: Tracking products accurately as advantage for RFID.........................................60
Table 9: Reader specifications of RFID............................................................................62
Table 10: Antenna specifications of RFID........................................................................63
Table 11: Product specifications of RFID.........................................................................65
Table 12: Privacy and security in RFID............................................................................66
Table 13: Cost of implementing RFID..............................................................................68
Table 14: Governments’ support for RFID.......................................................................69
Table 15: Major concerns for implementing RFID technology........................................71
Table 16: Future of RFID technology...............................................................................72
Table 17: Gantt chart.......................................................................................................106

7RFID AND MOBILE FUSION FOR AUTHENTICATED TRANSACTION
List of figures
Figure 1: A passive RFID tag............................................................................................22
Figure 2: Near filed mechanism of RFID tags..................................................................27
Figure 3: Far field mechanism of RFID tags.....................................................................29
Figure 4: Benefits in supply chain.....................................................................................31
Figure 5: Research onion...................................................................................................45
Figure 6: Use of RFID technology....................................................................................54
Figure 7: Time-period of using RFID technology.............................................................55
Figure 8: Major drivers for implementing RFID...............................................................56
Figure 9: Advantages of using RFID technology..............................................................58
Figure 10: Purposes of implementing RFID......................................................................59
Figure 11: the objectives for using RFID..........................................................................61
Figure 12: Tracking products accurately as advantage for RFID......................................62
Figure 13: Reader specifications of RFID.........................................................................64
Figure 14: Antenna specifications of RFID.......................................................................65
Figure 15: Product specifications of RFID........................................................................67
Figure 16: Privacy and security in RFID...........................................................................68
Figure 17: Cost of implementing RFID.............................................................................70
Figure 18: Governments’ support for RFID......................................................................71
Figure 19: Major concerns for implementing RFID technology.......................................73
Figure 20: Future of RFID technology..............................................................................74

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Asia Pacific Management Review
|79
|17932
|28

MBA Project Dissertation 2022
|64
|20487
|26

Women’s knowledge regarding cervical smear test
|56
|13370
|489

Factors Affecting Online Shopping of Thai Students at University of Northampton
|52
|12514
|107

Using Information Technology to bridge the gap between Irish Dieters and Irish Food Products and Services
|70
|23236
|96

Concept of Sustainability in Context of Tourism Industry
|56
|13572
|419