0% found this document useful (0 votes)
47 views13 pages

An Improvised Analysis of Smart Data For IoT-based Railway System Using RFID

The document discusses using RFID technology to enable contactless ticketing and online payments for passengers on Chennai Suburban Railways. It proposes installing RFID readers at station entrances and exits to track passengers using RFID tags. Data from the tags would be analyzed using clustering algorithms to understand passenger demand and crowd patterns over time.

Uploaded by

rana bakhsh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views13 pages

An Improvised Analysis of Smart Data For IoT-based Railway System Using RFID

The document discusses using RFID technology to enable contactless ticketing and online payments for passengers on Chennai Suburban Railways. It proposes installing RFID readers at station entrances and exits to track passengers using RFID tags. Data from the tags would be analyzed using clustering algorithms to understand passenger demand and crowd patterns over time.

Uploaded by

rana bakhsh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

AUTOMATIKA

2024, VOL. 65, NO. 1, 361–372


https://doi.org/10.1080/00051144.2023.2295141

An improvised analysis of smart data for IoT-based railway system using RFID
Shirly Sudhakaran, R Maheswari and V Kanchana Devi
School of Computer Science and Engineering, Vellore Institute of Technology, Chennai, India

ABSTRACT ARTICLE HISTORY


RFID (radio frequency identification) is a progressively adopted technology in today’s auto- Received 1 November 2023
mated world. Wireless technologies have enabled contactless payments, tracking, identifying, Accepted 8 December 2023
and many more features in a system that can be introduced to build a smart environment. KEYWORDS
This work overviews the usage of the IoT (Internet of Things) platform for tracking passen- RFID; online payment;
gers and enabling online payments through wireless sensors and RFID technology in Chennai tracking; passengers; IoT;
Suburban Railways. The tracking system consists of an RFID reader that can locate and track DBSCAN; transit cards
passive as well as mobile objects attached with passive RFID tags. The proposed system incor-
porates the installation of RFID readers at every entrance and exit of the railway station, and
every passenger carries their own RFID tags. This not only enables online payments for passen-
gers but also helps the government in tracking the crowd for demand monitoring. The new
methodology creates a digital workspace and enforces lawful safety regulations both for the
administration and the consumers. A prototype of the proposed system is implemented in real-
time to understand the workings of the system. Data collection is done through RFID tags that
act as transit cards and an analysis for consumer demand is done using the DBSCAN (Density-
Based Spatial Clustering of Application with Noise) algorithm with a Randomized KD-tree for
the analysis of spatial and temporal patterns. A new algorithm, the iDBSCAN (improved Density-
Based Spatial Clustering of Application with Noise) algorithm is proposed for faster performance
on the datasets.

1. Introduction
based on their movement and also detecting the time
Digitization and digitalization are the new trend in dependency of the passengers with respect to the
today’s world that can be achieved by integrating wire- boarding time [7].
less technologies to make things smart [1]. RFID is Moving on to the challenges faced in establishing the
one such smart technology contributing to the advance- proposed structure, the localization of passengers by
ment of automation wherever needed [2]. The low cost the reader is more difficult as it needs to be done within
and convenience of deployment make RFID technology a stipulated time. Therefore, a reading space needs to
more favourable in using it for tracking and identi- be created especially for the detection of tags without
fying objects [3,4]. The location of any object can be passenger crowding. This avoids noisy data caused by
tracked by RFID either by “tag tracking” or by “reader the collision of signals [8]. Thus, the accuracy of pas-
tracking”. This work discusses the tracking of mobile senger detection can be increased and tracking is made
objects attached to RFID tags. These tags consist of effortless.
a chip and antenna that are activated by the radio Figure 1 shows the manual process ticketing sys-
waves transmitted by the RFID reader [5]. These read- tem used in the existing system. The passenger either
ers are installed at every entrance and exit of railway collects their ticket from the station ticket counter or
stations for localization, mapping, and activity anal- through the UTS (Unreserved Ticketing System) ticket
ysis of the passengers [6]. When a passenger enters booking application. The wait time from the start to the
the railway station, his or her information is gath- end of the process is longer than the automated process
ered by the reader and stored for further processing. proposed in the new system [9,10].
As customer demand is the most essential factor in Although the existing system uses semi-manual data
the decision-making of any business model, this pas- collection by gathering the passenger count based on
senger information can serve as the data required to the distribution of tickets inside the station premises
analyse consumer demand. The DBSCAN algorithm or through the UTS ticket booking application, the
is used to create clusters of high density and noise behaviour of the passengers is tedious to analyse. Con-
with low density, thereby categorizing the passengers versely, the proposed system can accumulate both the

CONTACT V Kanchana Devi [email protected]; [email protected] School of Computer Science and Engineering, Vellore
Institute of Technology, Chennai 600 127, India
© 2024 The Author(s). Published by Informa UK Limited, trading as Taylor & Francis Group.
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted
use, distribution, and reproduction in any medium, provided the original work is properly cited. The terms on which this article has been published allow the posting of the Accepted
Manuscript in a repository by the author(s) or with their consent.
362 S. SUDHAKARAN ET AL.

Figure 1. Ticketing process through the manual system in railway stations or through UTS mobile application.

count and the behaviour of a huge number of passen- Table 1. Mobile UTS application against the manual ticketing
gers within a few seconds. system was released by South Western Railway.
Total no. of Mobile Total no. of Growth of
S. No. Year UTS passengers tickets sold usage
1. 2018–19 3.5 million 5.67 lakhs 0.72%
2. Related works 2. 2019–20 7.6 million 13.43 lakhs 1.81%
3. 2020–21 4.98 lakhs 2.79 lakhs 5.61%
There exists a variety of approaches to the advance-
ment of a system. IoT paves new ways to fulfil these
demanding upgrades for a better living. Since this new once again registered immediately after it became fully
system uses RFID technology for ticketing, the same functional.
can be used for tracking purposes [10]. Though track- Figure 2 provides an insight into the usage of the
ing always seems as a breach of one’s privacy, controlled UTS mobile app. As stated by the officials, the passen-
activity on the gathered data with proper security can gers also prefer contactless payments. When this system
yield expected benefits to both society and the gov- is enhanced with RFID technology, various other ser-
ernment [11]. One of the major benefits that can be vices can also be furnished and also prediction samples
obtained from crowd management is the recognition can be used for analysis to build better infrastructure
of passenger behaviour [12]. These data can be clus- using algorithms such as the iDBSCAN algorithm.
tered and classified to frame a timetable as it focuses
only on customer demand. Thus, the last phase of SCM 4. Process of the proposed system
(Supply Chain Management) can be handled with IoT.
Researchers have been deducing that all the phases of The process of the proposed system starts with user
SCM can also be integrated with IoT to deliver auto- registration when the passenger registers their unique
mated SCM [13]. This can be very much helpful in the RFID in the UTS mobile application. The user details
warehousing of raw materials and supplies [14]. are verified and validated in the next stage. Subse-
quently, all the details are stored in the database, usually
in the cloud. These data are retrieved based on the ser-
vices provided to the passenger. Here, the passenger
3. Performance evaluation of the existing
uses the RFID tag as a transit card for a railway jour-
system
ney. Therefore, only the required details are retrieved
The performance evaluation of the mobile UTS appli- and processed for ticketing.
cation against the manual ticketing system was released Figure 3 shows the workflow of the proposed system.
by SWR (South Western Railway) press in December The flow begins with user registration followed by
2021. According to the data collected from the press user data processing based on the services requested
release, it is known that there is a steady rise in the by the customer. The customer is either the passenger
usage of mobile UTS by passengers [15]. It was stated or the government determined by the data retrieved
by the General Manager of South Western Railway that for the required service. Further, data analytics can be
“UTS on the mobile app would not only promote cash- performed for various purposes to predict and find a
less transactions, but also ensure contactless, hassle-free solution to enhance the system in different aspects.
ticketing”. The detail of every single passenger is taken into con-
From Table 1, one can find that there is a growth in sideration to build the cluster of high demand. Based
the usage of mobile UTS among passengers. Although on the results of the analysis, the passengers can be cat-
the app was rendered non-operational for around one egorized into regular passengers with regular time and
year, from March 2020 to February 2021 due to the route, irregular passengers with irregular time and reg-
cancellation of passenger trains during the pandemic ular route, and habitual passengers who do not follow
period, a steady rise in the usage of the app was any pattern. This helps the government authorities to
AUTOMATIKA 363

Figure 2. Performance evaluation UTS mobile application as per the data of South Western Railway.

need to use railways to commute they can enter the


source and destination of their travel in the application.
The specified amount of price for the selected jour-
ney will be deducted from the application wallet. After
all this online process is done, the passenger can pro-
ceed with the journey. Above all, this process can be
performed from anywhere within a 5 km radius of the
source station and anytime within one hour before the
commencement of the journey.
Figure 4 presents the working model of online rail-
way ticketing through IoT. RFID tags are used by the
passengers to register their journey which is later read
by the RFID readers in the railway stations. The pools
of data from the readers are later used for analysis pur-
poses as required by the user. In between data connec-
tivity and data analytics, various processes take place.
Encryption of data is performed to secure the shared
resources as both user data and client activities on the
data are classified. After data retrieval from the cloud,
the preferred platform for analytics should be used to
Figure 3. Flowchart of user validation. simulate the desired results. The sample results can be
used by government officials for the enhancement of the
facilitate the consumers with high demand, i.e. during system and also as a part of the samples shared with the
peak hours. user for the betterment of user services.
The analysis of transit passenger behaviour leads to
5. Working model the enhancement of results obtained from the auto-
mated ticketing system. This involves breaking down
Firstly, the passenger receives their unique RFID each type of passenger into subcategories based on var-
tag which is used as a lifetime ticket for railway ious transfer behaviours, modes and routes utilized,
transportation. This tag is registered in the existing card types, and frequency of usage, using an impro-
UTS mobile application with its unique ID that already vised DBSCAN algorithm adopted from the existing
has the general passenger details such as the passen- model [16]. Essentially, the objective is to leverage the
ger name, date of birth, age, gender, and address, which broad information about passenger types to achieve a
are retrieved from any one of the government issued more detailed comprehension of clusters, their specific
ID submitted: KYC (Know Your Customer). Once this requirements, and the necessary capabilities for effec-
process is completed the passenger needs to recharge tive service provision. It is noticeable that in the existing
their transit cards to avail tickets. Whenever passengers model, passenger categorization is done through travel
364 S. SUDHAKARAN ET AL.

Figure 4. The three phases of workflow in the proposed system.

pattern analysis by reconstructing the travel itineraries major components used in the hardware design of the
[17]. Thereby, the mining of spatial and temporal data system are as follows.
is done from the history of the journey with timestamps
performed by the passengers.
The proposed model incorporates a Random KD- 6.1. RFID system
Tree with a DBSCAN algorithm to build a better The following are the various types of RFID systems
way to organize data points in space. In dealing according to the frequency they operate at [18].
with public data, the algorithm must work in high- Based on the survey in Tables 2 and 3, High-
dimensional spaces addressing the limitations of map- Frequency Passive RFID tags are used in the proposed
ping the queries with the right points to achieve the system as it has higher data throughput and faster com-
desired outcome with the shortest decision time. The munication. The reader can read 50 tags per second
iDBSCAN algorithm works well in this case. The work- and can aid in ticketing payment and data transfer
ing of the algorithm is represented in Figure 5. applications.

6.1.1. RFID reader


6. Design and implementation of the system The RFID reader forms the base of the RFID tech-
The requirement specification states the technical nology. It has its antenna through which radio signals
essentials of the proposed system. It comprises the are transmitted in the environment it is being installed
RFID reader and tag, a host computer to control the [19]. These radio waves need to be detected by the tags
operations performed in the environment, a database registered with the particular readers and a response
to store the passenger data, and a data analytics tool for is sent from the tags to register their presence in the
further processing of demanding enhancements study. premises [20]. Thus, a reader collects all the data from
Figure 6 presents the physical design of the proposed its surroundings and these data are gathered for further
system. The RFID reader is embedded with Arduino processing. RC522 is used as the reader to collect data
UNO that processes the passenger data once read by [21]. It is an 8-pin board and requires a 3.3 V power
the RFID reader. These data are stored in the cloud and supply to operate.
only the required data are retrieved based on the factors
demanded by the passengers. 6.1.2. RFID tag
The main RFID system can be categorized into two The core of the RFID system is the RFID tags that are
modules: the base module and the consumer mod- battery-free [22]. These tags contain a chip that is iden-
ule. The base module comprises the RFID reader, host tified by its unique identification number [23]. Each tag
computer, and database and the consumer module is peculiar and unique and thus solves the case for single
comprises the RFID tag and a mobile application. The object identification.
AUTOMATIKA 365

Figure 5. Flowchart of the proposed iDBSCAN algorithm.

6.2. Arduino UNO 40-pin board and uses the SPI protocol to establish
communication with RFID.
There exist various types of Arduino according to its
usage. Based on the requirement of the proposed sys-
tem, the Arduino UNO is chosen as the microprocessor 6.3. Host computer
wired with the RFID reader to process the collected The host computer is the system that is installed with
data into the cloud [24,25]. The Arduino UNO is a the application software where the data are stored,
366 S. SUDHAKARAN ET AL.

Figure 6. Components of Online Railway Ticketing System using RFID.

Table 2. Overview of different types of RFID.


Features LF HF UHF
Frequency range 30–300 kHz 3–30 MHz 300 MHz–3 GHz
Operates at 125 –134 kHz 13.56 Mhz 860–960 MHz
read range ≤ 10 cm ≤ 30 cm ≤ 100 m
interference Not sensitive Moderately sensitive Very sensitive
Data transmission Very low Moderate Very fast
applications Access control Animal control Contactless payment Used in smart cards Store inventories Identification of medication

retrieved, and processed [16]. The data flow happens Table 3. Study of difference between passive and active RFID
between the host computers to the RFID reader. This tags.
is directly managed by the administrator either physi- Features Passive RFID tags Active RFID tags
cally or virtually present in the particular environment. Power source External (reader Internal
It indirectly supplies all the data that are stored in the provided)
Tag readability Only within the Extended range (100 m)
cloud storage. area covered by
the reader (3m)
Energization Energized only Always energized
when the reader
6.4. Power supply unit is present
Magnetic Field strength High Low
Though the DC power supply unit is not considered Shelf life Very High 5 years
one of the physical components, it is vital for mod- Data storage Limited (128 bytes) Larger amounts of data
Cost Cheaper Expensive
ern electronic equipment to perform a wide range of Size Smaller Bulky
operations [26]. The RFID readers and other compo-
nents need the right range of voltage supply to operate
without interruptions. in Figure 5. Randomized KD-tree is integrated into the
iDBSCAN algorithm to find the number of clusters in
the given dataset. This resultant of this event is stored
6.5. Data analytics and further clustering of the data points is performed
This section exploits the usage pattern of each passen- using the proposed iDBSAN algorithm.
ger type to understand the daily usage of the transit
network. To deduce the spatial and temporal pattern of
7. Experimentation
passengers the iDBSCAN algorithm is used as it has the
capability to detect clusters of varying shapes and sizes. The hardware setup is done between RC522 and
Similarly, a travel pattern, influenced by the diverse Arduino UNO. Table 4 represents the wiring between
nature of human behaviour, may exhibit a wide range Arduino UNO and RFID reader which is used to read
of shapes and sizes. It uses the boarding and destina- the data of the passengers from the environment it is
tion points of every single passenger to create clusters. installed in.
The analytics of the consumer data is done with R stu- Figure 7 shows the real-time implementation of the
dio. The working of the iDBSCAN algorithm is shown proposed system done is a closed setup. The Arduino
AUTOMATIKA 367

Figure 7. Interfacing of RFID module with Arduino for automatic data collection from the users.

Table 4. PIN wiring of Arduino UNO to RFID reader. check for new cards, so as to notify for the new registra-
RC522 Arduino UNO tion of unregistered RFID user cards. Once the Arduino
1 Gnd RFID set-up is done, the unique code of the RFID card
2 5 is obtained by reading and displaying it on the host
3 3.3V
4 -
computer serial monitor with Algorithm 3.
5 12
6 11
7 13 Algorithm 3: Display UID on Serial Monitor
8 10 1. Serial.print("UID tag :");
2. String content = "";
3. byte letter;
UNO is interfaced with an RFID reader to read the data 4. for(byte i = 0;i < mfrc522.uid.size;i++)
5. {
from the RFID tags. 6. Serial.print(mfrc522.uid.uidByte[i] < 0x10?"0":" ");
Algorithm 1 is used to initiate a serial communica- 7. Serial.print(mfrc522.uid.uidByte[i],HEX);
8. content.concat(String(mfrc522.uid.uidByte[i] < 0x10?"0":" "));
tion between Arduino and host computer and interface 9. content.concat(String(mfrc522.uid.uidByte[i],HEX));
the RFID reader with Arduino. Algorithm 2 is used to 10. }
11. Serial.println();
12. Serial.print("Message: ");
13. content.toUpperCase();
Algorithm 1: RFID reader Setup 14. if (content.substring(1) = = BD 22 C2 32)
15. {
1. void setup()
16. Serial.println("Authorized access");
2. {
17. Serial.println();
3. Serial.begin(9600);
18. delay(3000);
4. SPI.begin();
19. }
5. mfrc522.PCD_Init();
20. else {
6. Serial.println("Approximate your card to the reader ... ");
21. Serial.println("Access denied");
7. Serial.println();
22. delay(3000);
8. }
23. }

Algorithm 2: RFID tag check The iDBSCAN algorithm characterizes clusters as


1. loop() areas of high point density, separated by regions with
2. {
3. if(!mfrc522.
lower point density. It involves two key global parame-
4. PICC_IsNewCardPresent()) ters: the maximum density for destination points and
5. { the minimum number of boarding points. A point
6. return;
7. } is considered a central point if it has a density of at
8. if(! mfrc522.PICC_ReadCardSerisl()) least a specified threshold within a given radius. The
9. {
10. return; algorithm is applied independently for mining spatial
11. } and temporal patterns. In the context of regular pas-
12. }
sengers, a two-level iDBSCAN application is utilized −
368 S. SUDHAKARAN ET AL.

Figure 8. RFID tag access checking with the reader module.

Table 5. Test cases on flow of a single event in the process of user validation.
Test case no. Description Pre-conditions Pass/Fail Expected results
TC\_001 Validate user login Registered user only allowed Pass Login successfully
TC\_001a Validate user login Registered user only allowed Fail Login Unsuccessfully
TC\_002 Put Smartcard Valid user only allowed Pass Value Get Successfully
TC\_003 Get Input Values Registered user only allowed Pass Get Values successfully
TC\_004 Value Pass Arduino Registered user only allowed Pass Pass Values successfully
TC\_005 File Upload with Encryption Registered user only allowed Pass Upload successfully
TC\_006 Stored Database Registered user only allowed Pass Stored successfully
TC\_007 Validate Admin login Admin only allowed Pass Login successfully
TC\_008 Download the excel sheet Admin only allowed Pass Download Successfully
TC\_009 R Programming Process Valid user only allowed Pass Process Successfully
TC\_010 Show the Prediction Valid user only allowed Pass Result Successfully

first on destination points and second on boarding starts with user validation until the result analysis. Also,
points. Importantly, the order of these two levels can based on the result, the cases are tested if prediction
be swapped without altering the results. Employing for enhancement is possible or not with the obtained
iDBSCAN separately in each level enhances the over- results.
all clustering algorithm’s robustness, and the results Figures 9–11 show the graph drawn from the analy-
from each level prove valuable for subsequent passenger sis of the results obtained through the RFID module. It
categorization. is evident that the number of tickets purchased by the
Meanwhile, the users are provided with an upgraded passengers is more through the online ticketing process
version of UTS that also saves the unique ID number when compared with the traditional manual process.
of the passenger’s RFID tag and the trip details. This Though there may be a drop due to network issues, the
set-up not only creates an automated system, but brings performance of the proposed system is more efficient
in the concept of transparency between the governing than the existing system. Analysis was made for differ-
body and the public. ent time periods during peak hours, afternoon hours,
and late nights.
Thus, the IoT based Indian Railways System brings
8. Results and discussion
in the concept of Online Ticketing System for the pas-
The proposed system uses IoT devices and mobile sengers with the following advantages:
application for online ticketing. Further, the gathered
data from the environment are used for prediction. • Decrease in wait time
RFID, Arduino, and a host computer are the physical • Crowd management
devices used in the environment. The aggregate of the • Hassle -free ticketing
data collected is used to draw a graph to analyse the • Reduced labour and paperwork for the government
difference in time taken between manual ticketing and
online ticketing. The data collected can be used for various anal-
Figure 8 shows that a registered RFID tag is autho- yses based on the user’s requirement. Hence, RFID
rized for further services, here the passenger does with Arduino makes data collection simple and
online ticketing, whereas a tag that is not registered is easier.
denied services. This paper categorizes passenger travel characteris-
The modules are run through test cases to anal- tics into spatial and temporal travel patterns, defining
yse if the system satisfies the conditions and yields distinct passenger types. Three clusters of passengers
the expected output or not. Based on the outcomes emerge as follows:
in Table 5, future modifications are done to frame the
perfect model according to the requirements. 1. Regular Passengers: Defined as individuals with
Table 5 shows the various test cases run on the pro- consistent travel times and routes. Their travel
posed system in the flow of a single event. This test schedules and journeys remain constant.
AUTOMATIKA 369

Figure 9. Analysis of traditional ticketing system vs automated ticketing system during peak hours.

Figure 10. Analysis of traditional ticketing system vs automated ticketing system during afternoon hours.

Figure 11. Analysis of traditional ticketing system vs automated ticketing system during night hours.
370 S. SUDHAKARAN ET AL.

2. Irregular Passengers: Characterized by irregular Table 6. Descriptive statistics of the transit passenger types.
travel times but consistent routes. These passen- Average
gers do not adhere to specific time ranges but Usage of transit card journey made
follow regular routes. Regular passenger 68% 82%
Irregular passenger 15% 65%
3. Habitual Passengers: This category includes pas- Habitual passenger 6% 1%
sengers who exhibit neither temporal nor spatial
patterns in their travel. They lack regular travel
times and routes. characterization of passengers. The analysis of
passenger categorization provides a comprehensive
The categorization is based on two straightforward understanding of each passenger type and yields key
rules: insights into their characteristics.
1. Rule 1: If no temporal or spatial travel pattern is
identified, the passenger is classified as an irregular 1. Most irregular passengers exhibit a lack of dis-
passenger. cernible travel patterns. This group infrequently
2. Rule 2: If more than 50% of journeys occur within utilizes public transport, with 99% of them being
regular times and routes, the passenger is identified sporadic users of the automated ticketing system.
as a regular passenger. Additionally, their contribution to the total ticket
3. Rule 3: The remaining passengers fall into the cat- revenue is relatively low, accounting for only 15%.
egory of habitual passengers. This suggests that promoting the sale of more tran-
sit cards may not yield significant profits for both
In Figure 12, it is evident that regular passengers the governing authority and society. Instead, there
predominantly undertook their travels during peak is a need to encourage these passengers to increase
periods. In contrast, irregular passengers exhibited a their travel frequency.
more flexible pattern, initiating their journeys later in 2. Regular passengers encompass individuals with
the morning (from 8:00 AM) and concluding earlier constrained time and travel patterns, exemplified
(by 6:00 PM) than other passenger classes. A ten- by college-going students. This passenger category
tative assumption about trip purposes can be made: tends to undertake more travel during peak peri-
regular passengers are likely engaged in school- and ods compared to other types.
work-related trips, whereas irregular passengers may 3. Habitual time passengers refer to individuals who
be associated with less rigidly scheduled activities, such frequently travel but lack a consistent time sched-
as leisure or shopping. Conversely, habitual passengers, ule and travel to various destinations. Given their
characterized by an absence of any discernible tempo- necessity to visit multiple locations, this passenger
ral travel pattern, tended to travel during peak periods, category demands greater transit mobility. Con-
akin to transit commuters. sequently, they engage in more transfers and bus
Table 6 presents the descriptive statistics for each journeys than any other type, with school students
passenger type, contributing valuable insights to the being a notable example.

Figure 12. Journey made by the passenger with respect to time.


AUTOMATIKA 371

Characterizing passenger demand based on the pro- References


portion of each type provides insight into the overall [1] Garrido-Hidalgo C, Hortelano D, Roda-Sanchez L,
service requirements for each region. An area domi- et al. IoT heterogeneous mesh network deployment for
nated by regular passengers necessitates timely services, human-in-the-loop challenges towards a social and sus-
while an abundance of irregular passengers may indi- tainable industry 4.0. IEEE Access. 2018;6:28417–28437.
cate issues with the provided transit service. Governing doi:10.1109/ACCESS.2018.2836677
[2] Li N, Tan J, Zhu Z. Monitor and control system
authorities have the opportunity to enhance revenue with RFID technology in discrete manufacturing line.
and promote transit-oriented developments by increas- Proceedings of the IEEE International Conference
ing the number of high-value customers, such as transit on RFID-Technology and Applications, Guangzhou,
commuters. However, it is also important to address the China; 2010. p. 71–76[10894].
needs of other passenger types to maintain customer [3] Samydurai A, Sudhakaran S, Caledoss S, et al. OTGP
and anti-theft using RFID. Int J Curr Multidiscipl Stud.
equity and the overall attractiveness of the system.
2016;2:269–272.
This section proposes practical service improvements [4] Shukoor MA, Mukeshbhai SS, Dey S. 12-Bit mul-
leveraging the knowledge of passenger categorization. tiresonator based chipless RFID system for Low-cost
Understanding each passenger type aids transit author- item tracking. Proceedings of the 2021 IEEE Interna-
ities in strategic planning, allowing for the development tional Conference on RFID Technology and Applica-
of transit-on-demand services that cater to individuals tions (RFID-TA); 2021. p. 136–138.
[5] Subrahmannian A, Behera SK. Chipless RFID: A unique
requiring regular travel where standard routes are not technology for mankind. IEEE J Radio Freq Identif.
available. 2022;6:151–163. doi:10.1109/JRFID.2022.3146902
[6] Zhang X, Lakafosis V, Traille A, et al. Performance anal-
ysis of “fast-moving” RFID tags in state-of-the-art high-
9. Conclusion speed railway systems. Proceedings of the 2010 IEEE
International Conference on RFID-Technology and
This research depicts the features of a system when
Applications; 2010. p. 281–285. doi:10.1109/RFID-TA.
a part of it is automated with IoT enabling technolo- 2010.5529918
gies. Though the world has been following the manual [7] Li S-S. An improved DBSCAN algorithm based on the
method of gathering and processing data for decades, neighbor similarity and fast nearest neighbor query.
embedding IoT with everyday things has introduced IEEE Access. 2020;8:47468–47476. doi:10.1109/ACCE
humans to smart things. The process performed and SS.2020.2972034
[8] Wang W-L, Huang CT, Ke B-T. An algorithm for RFID
measured in this research triggers the integration of signal collision with Meridian theory. 2012 interna-
IoT technologies in the near future. Integrating sen- tional Symposium on Computer, Consumer and Con-
sors and actuators with the existing system creates a trol; 2012. p. 725–728. doi:10.1109/IS3C.2012.188
whole new environment of automatic processing in the [9] Nandhini S. Automatic bus fare collection system
payment system. Fully contactless online payments are using RFID. Int J Adv Res Comput Eng Technol.
2017;6:218–223.
introduced in Chennai Suburban Railways for efficient
[10] Nunes AA, Galvão Dias T, Falcão e Cunha J. Pas-
crowd handling. The raw data collected can be used senger journey destination estimation from automated
for numerous analyses based on the user’s require- fare collection system data using spatial validation.
ments. Various other ensuing works discussed open IEEE Trans Intell Transp Syst. 2016;17(1):133–142.
new approaches and ways to build a smart city. doi:10.1109/TITS.2015.2464335
Ongoing efforts are underway to extend this paper, [11] Tan CC, Li Q, Xie L. Privacy protection for RFID-based
tracking systems. Proceedings of the 2010 IEEE Inter-
utilizing transit card data from additional time periods national Conference on RFID (IEEE RFID 2010); 2010:
to assess the impacts of various policies on passengers. 53–60. doi:10.1109/RFID.2010.5467261
Further examinations into behaviours like “coming- [12] Yamin M, Ades Y. Crowd management with RFID and
back-home” and the categorization of trip distances will wireless technologies. Proceedings of the 2009 First
contribute to a more comprehensive understanding of International Conference on Networks & Communica-
tions; 2009. p. 439–442. doi:10.1109/NetCoM.2009.14
passenger types. Simultaneously, the insights obtained
[13] Behl R, Dhir S. Role of IoT in supply chain innova-
from this paper have proven valuable in enhancing tion: A survey analysis. Proceedings of the 2022 inter-
passenger characterization and improving services for national mobile and embedded technology conference
individual regular passengers. (MECON); 2022: 33–36. doi:10.1109/MECON53876.
2022.9752327
[14] Prasad Tripathy R, Ranjan Mishra M, Dash SR.
Disclosure statement Next generation warehouse through disruptive IoT
No potential conflict of interest was reported by the author(s). blockchain. Proceedings of the 2020 International Con-
ference on Computer Science, Engineering and Appli-
cations (ICCSEA); 2020. p. 1–6.
Availability of Data and Materials [15] “Steady rise in use of UTS Mobile app ticketing”.
https://www.thehindu.com/news/national/karnataka/s
All data generated or analysed during this study are teady-rise-in-use-of-uts-mobile-app-ticketing/article37
included in this published article. 928188.ece.
372 S. SUDHAKARAN ET AL.

[16] Koppikar U, Hiremath S, Shiralkar A, et al. Iot based Management (ICONSTEM); 2016.p. 72–76. doi:10.110
smart attendance monitoring system using RFID. Pro- 9/ICONSTEM.2016.7560926
ceedings of the 2019 1st International Conference on [22] Dong-Ying Li, Shun-Dao Xie, R.-J. Chen and H.-Z. Tan,
Advances in Information Technology (ICAIT); 2019. Design of internet of things system for library materials
p. 193–197. management using UHF RFID. Proceedings of the 2016
[17] Kieu M, Bhaskar A, Chung E. Passenger segmentation IEEE International Conference on RFID Technology
using smart card data. IEEE Trans Intell Transp Syst. and Applications (RFID-TA), 2016. p. 44–48.
2013. doi:10.1109/TITS.2014.2368998 [23] Laxmi AR, Mishra A. Rfid based logistic management
[18] Morozova TV, Gurov VV. Research in RFID vulner- system using internet of things (IoT). Proceedings of the
ability. Proceedings of the 2017 IEEE Conference of 2018 Second International Conference on Electronics,
Russian Young Researchers in Electrical and Elec- Communication and Aerospace Technology (ICECA);
tronic Engineering (EIConRus); 2017. p. 501–503. 2018. p. 556–559.
doi:10.1109/EIConRus.2017.7910601 [24] Swathi B, Pooja T, Kumar PS, et al. Survey on IoT based
[19] Sun W. Orientation-Aware RFID-based sensing. Pro- farm freshness mobile application. Proceedings of the
ceedings of the 2021 IEEE International Conference 2022 International Conference on Advanced Comput-
on RFID Technology and Applications (RFID-TA); ing Technologies and Applications (ICACTA); 2022.
2021. p. 52–54. doi:10.1109/RFID-TA53372.2021.961 p. 1–7.
7342 [25] Arbain N, Nordin NF, Isa NM, et al. LAS: Web-
[20] Costanzo A, Masotti D, Francia P, et al. Detection and based laboratory attendance system by integrating
movement estimation of items by a smart microwave RFID-ARDUINO technology. Proceedings of the 2014
hand-held reader. Proceedings of the 2014 IEEE RFID 2nd International Conference on Electrical, Electron-
Technology and Applications Conference (RFID-TA); ics and System Engineering (ICEESE); 2014. p. 89–94.
2014. p. 214–218. doi:10.1109/RFID-TA.2014.6934 doi:10.1109/ICEESE.2014.7154601
230 [26] Gruber S, Reinisch H, Hofer G, et al. Measure-
[21] Aarthy DK, Vandanaa S, Varshini M, et al. Auto- ment methods for power requirements of high perfor-
matic identification of traffic violations and theft avoid- mance UHF RFID tags. Proceedings of the 2009 IEEE
ance. Proceedings of the 2016 Second International International Conference on RFID; 2009. p. 20–27.
Conference on Science Technology Engineering and doi:10.1109/RFID.2009.4911181
© 2024 The Author(s). Published by Informa UK Limited, trading as Taylor
and Francis Group. This work is licensed under the Creative Commons
Attribution License creativecommons.org/licenses/by/4.0/ (the “License”).
Notwithstanding the ProQuest Terms and Conditions, you may use this
content in accordance with the terms of the License.

You might also like