G400 Computer Science

  • 60,000+ Completed Assignments

  • 3000+ PhD Experts

  • 100+ Subjects

Answer:

Introduction

1.1. Background of the study 

Secure authentication protocol has been proposed in this project that provides data to the entities that has been authorized for the implementation of security between the database and readers. Backend servers and RFID readers has communication channels as assumed from the previous case studies. Though there are some potential problems regarding the security concern of the ATM transaction hence the implementation of RFID has been found necessary as well as helpful from future perspective.

1.2. Research Aims and Objectives

The aim of the research is to identify the RFID and mobile fusion for the authenticated transaction in ATMs.

1.3. Aims and Objectives of the study

The aim of the study is to introduce the primary concept of privacy, in RFID tags and clandestine tracking.

1.4. Research Questions

  1. How the RFID and mobile fusion can be effectively used in the online industry?
  2. How does this technology affect the common people’s daily life?
  3. How can this technology be implemented?

1.5. Problem Statement

The case study investigates the concept of RFID tags and clandestine tracking that deal with the RFID readers and scanning of RFID tags. This invention is a method that gathers the sensitive data and information from the RFID tags.

1.6. Rationale of the study

The case study on “RFID and mobile fusion for authenticated ATM transaction” is selected to analyze the working principle of RFID ATM card.

1.7. 

In today’s date people mostly deals with money by using mobile banking, utility cards and internet banking. It is sophisticated as well as a useful way that makes our everyday life much easier and convenient.  RFID implemented in ATM transaction may help in betterment of the security aspects in our daily life.

Chapter 2: Literature Review

2.1. Introduction

The literature review is initiated at the starting of the thesis work to gain skills and knowledge about the change process in the management firms. The primary literature review forms information base necessary to design the project work (Anand and Fosso Wamba 2013). Electromagnetic fields to identify and track tags attached to objects automatically by using Radio-frequency identification (RFID) (Deshmukh and Mohite 2016).  RFID are which are attached to objects, are used for tracking and managing the people, assets, electronic devices etc. Used in various other applications such as: Access management, Tracking of goods, Tracking of person and animals, Contactless payment, Airport Baggage tracking logistics, Tracking bills and processes, Human Identification, Institutions and Complement to barcode. As assumed in the previous works that the channel of communication between the server and the RFID tags are secure and hence the concentration is one improving the security measure of RFID reader and RFID tags.

Chapter 3: Research Methodology

3.1. Introduction

In this chapter, research philosophy, approach and design is discussed to gain knowledge on data collection.

3.2. Method Outline

In this area of research study, as the research topic refers “RFID and mobile fusion for authenticated ATM transaction”, the research will follow the systematic approach toward the conclusion of the study. The issue that has been identified is that it is tough to identify the credit card actual owner in the electronic payment system. Hence the main objective of the scheme is to propose a security contactless credit card and for identifying the architecture of RFID that offers functionalities for secure transaction over online (Chu 2015).

3.3. Research Onion

Research onion is depicted as the methodological tool that can help in listing the key divisions of any research that has the ability to successfully analyze the topic. The research onion is helpful for academic students as a tool. This by following each stage of techniques conducts the research process in a proper format, which helps in deriving results of the research process. The Research onion has been categorized in six main divisions: strategies, approaches, time horizons, choices, techniques, philosophies and procedures thus enable the better research and collect more information for the analysis of the results.

3.4. Research Approach

Research Approach is able to define the entire planning as well as process for executing the entire research work appropriately from start to end in some cohesive manner. There are two kind of research approach: are Inductive Research approach and Deductive research approach.

3.5. Data Collection Process

As said by Veal in 2006, data collection enables standard formats of research work that helps in the derivation of accurate result in the research paper process. The two main categories of data sources are Primary and Secondary approach. Here, as per the requirement the researcher collects data and information of “RFID and mobile fusion for authenticated ATM transaction”. The primary research is to be done for the survey of data collection for this case study. The

3.6. Ethical Consideration

  • The primary approach should follow the Data ProtectionAct of 1998.
  • Violating the act may considered as an ethical violation resulting penalty.
  • Primary survey must not include any personal queries and this may hurt the ethics of an individual or an organization.
  • The survey must not be pressurized to someone; one should be free to attain the survey.

3.7. Limitations of the study

The researcher will conduct this area of study with utmost care throughout the entire research study. Though, for some default limitations, there can be some gap. The research study is basically on the security authentication protocol that may provide information to the authorized entity. But there can be some problems dealing with the aspects of transaction security to great extent.

3.8. 

In this chapter, the topic “RFID and mobile fusion for authenticated ATM transaction” the researcher will follow the systematic methodology for carrying out the efficient research outcomes. The researcher methodology is able to provide essential guideline to the research for completing the case study along with the research philosophy, data sources, and research approach as well as research design.

Reference

Anand, A. and Fosso Wamba, S., 2013. Business value of RFID-enabled healthcare transformation projects. Business Process Management Journal, 19(1), pp.111-145.

Chu, J., 2015. Applications of RFID Technology [Book\/Software Reviews]. IEEE Microwave Magazine, 16(6), pp.64-65.

Deshmukh, N.S. and Mohite, J.N., 2016. RFID & Mobile Fusion for Authenticated ATM Transaction. Imperial Journal of Interdisciplinary Research, 2(10).

DiGiampaolo, E. and Martinelli, F., 2014. Mobile robot localization using the phase of passive UHF RFID signals. IEEE Transactions on Industrial Electronics, 61(1), pp.365-376.

Ghodke, S.S., Kolhe, H., Chaudhari, S., Deshpande, K. and Athavle, S., 2014. ATM transaction security system using biometric palm print recognition and transaction confirmation system. International Journal Of Engineering And Computer Science, 3(4), pp.5332-5335.

Kitsos, P. ed., 2016. Security in RFID and sensor networks. CRC Press.

Rawat, S.S., Saidulu, S. and Ranjan, R., 2016. Secure ATM Door Locking System Using RFID. In Innovations in Computer Science and Engineering(pp. 1-8). Springer Singapore.

Ustundag, A., 2014. The value of RFID. Springer.

Why Student Prefer Us ?
Top quality papers

We do not compromise when it comes to maintaining high quality that our customers expect from us. Our quality assurance team keeps an eye on this matter.

100% affordable

We are the only company in UK which offers qualitative and custom assignment writing services at low prices. Our charges will not burn your pocket.

Timely delivery

We never delay to deliver the assignments. We are very particular about this. We assure that you will receive your paper on the promised date.

Round the clock support

We assure 24/7 live support. Our customer care executives remain always online. You can call us anytime. We will resolve your issues as early as possible.

Privacy guaranteed

We assure 100% confidentiality of all your personal details. We will not share your information. You can visit our privacy policy page for more details.

Upload your Assignment and improve Your Grade

Boost Grades