An Improvised Analysis of Smart Data For IoT-based Railway System Using RFID
An Improvised Analysis of Smart Data For IoT-based Railway System Using RFID
An improvised analysis of smart data for IoT-based railway system using RFID
Shirly Sudhakaran, R Maheswari and V Kanchana Devi
School of Computer Science and Engineering, Vellore Institute of Technology, Chennai, India
1. Introduction
based on their movement and also detecting the time
Digitization and digitalization are the new trend in dependency of the passengers with respect to the
today’s world that can be achieved by integrating wire- boarding time [7].
less technologies to make things smart [1]. RFID is Moving on to the challenges faced in establishing the
one such smart technology contributing to the advance- proposed structure, the localization of passengers by
ment of automation wherever needed [2]. The low cost the reader is more difficult as it needs to be done within
and convenience of deployment make RFID technology a stipulated time. Therefore, a reading space needs to
more favourable in using it for tracking and identi- be created especially for the detection of tags without
fying objects [3,4]. The location of any object can be passenger crowding. This avoids noisy data caused by
tracked by RFID either by “tag tracking” or by “reader the collision of signals [8]. Thus, the accuracy of pas-
tracking”. This work discusses the tracking of mobile senger detection can be increased and tracking is made
objects attached to RFID tags. These tags consist of effortless.
a chip and antenna that are activated by the radio Figure 1 shows the manual process ticketing sys-
waves transmitted by the RFID reader [5]. These read- tem used in the existing system. The passenger either
ers are installed at every entrance and exit of railway collects their ticket from the station ticket counter or
stations for localization, mapping, and activity anal- through the UTS (Unreserved Ticketing System) ticket
ysis of the passengers [6]. When a passenger enters booking application. The wait time from the start to the
the railway station, his or her information is gath- end of the process is longer than the automated process
ered by the reader and stored for further processing. proposed in the new system [9,10].
As customer demand is the most essential factor in Although the existing system uses semi-manual data
the decision-making of any business model, this pas- collection by gathering the passenger count based on
senger information can serve as the data required to the distribution of tickets inside the station premises
analyse consumer demand. The DBSCAN algorithm or through the UTS ticket booking application, the
is used to create clusters of high density and noise behaviour of the passengers is tedious to analyse. Con-
with low density, thereby categorizing the passengers versely, the proposed system can accumulate both the
CONTACT V Kanchana Devi [email protected]; [email protected] School of Computer Science and Engineering, Vellore
Institute of Technology, Chennai 600 127, India
© 2024 The Author(s). Published by Informa UK Limited, trading as Taylor & Francis Group.
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted
use, distribution, and reproduction in any medium, provided the original work is properly cited. The terms on which this article has been published allow the posting of the Accepted
Manuscript in a repository by the author(s) or with their consent.
362 S. SUDHAKARAN ET AL.
Figure 1. Ticketing process through the manual system in railway stations or through UTS mobile application.
count and the behaviour of a huge number of passen- Table 1. Mobile UTS application against the manual ticketing
gers within a few seconds. system was released by South Western Railway.
Total no. of Mobile Total no. of Growth of
S. No. Year UTS passengers tickets sold usage
1. 2018–19 3.5 million 5.67 lakhs 0.72%
2. Related works 2. 2019–20 7.6 million 13.43 lakhs 1.81%
3. 2020–21 4.98 lakhs 2.79 lakhs 5.61%
There exists a variety of approaches to the advance-
ment of a system. IoT paves new ways to fulfil these
demanding upgrades for a better living. Since this new once again registered immediately after it became fully
system uses RFID technology for ticketing, the same functional.
can be used for tracking purposes [10]. Though track- Figure 2 provides an insight into the usage of the
ing always seems as a breach of one’s privacy, controlled UTS mobile app. As stated by the officials, the passen-
activity on the gathered data with proper security can gers also prefer contactless payments. When this system
yield expected benefits to both society and the gov- is enhanced with RFID technology, various other ser-
ernment [11]. One of the major benefits that can be vices can also be furnished and also prediction samples
obtained from crowd management is the recognition can be used for analysis to build better infrastructure
of passenger behaviour [12]. These data can be clus- using algorithms such as the iDBSCAN algorithm.
tered and classified to frame a timetable as it focuses
only on customer demand. Thus, the last phase of SCM 4. Process of the proposed system
(Supply Chain Management) can be handled with IoT.
Researchers have been deducing that all the phases of The process of the proposed system starts with user
SCM can also be integrated with IoT to deliver auto- registration when the passenger registers their unique
mated SCM [13]. This can be very much helpful in the RFID in the UTS mobile application. The user details
warehousing of raw materials and supplies [14]. are verified and validated in the next stage. Subse-
quently, all the details are stored in the database, usually
in the cloud. These data are retrieved based on the ser-
vices provided to the passenger. Here, the passenger
3. Performance evaluation of the existing
uses the RFID tag as a transit card for a railway jour-
system
ney. Therefore, only the required details are retrieved
The performance evaluation of the mobile UTS appli- and processed for ticketing.
cation against the manual ticketing system was released Figure 3 shows the workflow of the proposed system.
by SWR (South Western Railway) press in December The flow begins with user registration followed by
2021. According to the data collected from the press user data processing based on the services requested
release, it is known that there is a steady rise in the by the customer. The customer is either the passenger
usage of mobile UTS by passengers [15]. It was stated or the government determined by the data retrieved
by the General Manager of South Western Railway that for the required service. Further, data analytics can be
“UTS on the mobile app would not only promote cash- performed for various purposes to predict and find a
less transactions, but also ensure contactless, hassle-free solution to enhance the system in different aspects.
ticketing”. The detail of every single passenger is taken into con-
From Table 1, one can find that there is a growth in sideration to build the cluster of high demand. Based
the usage of mobile UTS among passengers. Although on the results of the analysis, the passengers can be cat-
the app was rendered non-operational for around one egorized into regular passengers with regular time and
year, from March 2020 to February 2021 due to the route, irregular passengers with irregular time and reg-
cancellation of passenger trains during the pandemic ular route, and habitual passengers who do not follow
period, a steady rise in the usage of the app was any pattern. This helps the government authorities to
AUTOMATIKA 363
Figure 2. Performance evaluation UTS mobile application as per the data of South Western Railway.
pattern analysis by reconstructing the travel itineraries major components used in the hardware design of the
[17]. Thereby, the mining of spatial and temporal data system are as follows.
is done from the history of the journey with timestamps
performed by the passengers.
The proposed model incorporates a Random KD- 6.1. RFID system
Tree with a DBSCAN algorithm to build a better The following are the various types of RFID systems
way to organize data points in space. In dealing according to the frequency they operate at [18].
with public data, the algorithm must work in high- Based on the survey in Tables 2 and 3, High-
dimensional spaces addressing the limitations of map- Frequency Passive RFID tags are used in the proposed
ping the queries with the right points to achieve the system as it has higher data throughput and faster com-
desired outcome with the shortest decision time. The munication. The reader can read 50 tags per second
iDBSCAN algorithm works well in this case. The work- and can aid in ticketing payment and data transfer
ing of the algorithm is represented in Figure 5. applications.
6.2. Arduino UNO 40-pin board and uses the SPI protocol to establish
communication with RFID.
There exist various types of Arduino according to its
usage. Based on the requirement of the proposed sys-
tem, the Arduino UNO is chosen as the microprocessor 6.3. Host computer
wired with the RFID reader to process the collected The host computer is the system that is installed with
data into the cloud [24,25]. The Arduino UNO is a the application software where the data are stored,
366 S. SUDHAKARAN ET AL.
retrieved, and processed [16]. The data flow happens Table 3. Study of difference between passive and active RFID
between the host computers to the RFID reader. This tags.
is directly managed by the administrator either physi- Features Passive RFID tags Active RFID tags
cally or virtually present in the particular environment. Power source External (reader Internal
It indirectly supplies all the data that are stored in the provided)
Tag readability Only within the Extended range (100 m)
cloud storage. area covered by
the reader (3m)
Energization Energized only Always energized
when the reader
6.4. Power supply unit is present
Magnetic Field strength High Low
Though the DC power supply unit is not considered Shelf life Very High 5 years
one of the physical components, it is vital for mod- Data storage Limited (128 bytes) Larger amounts of data
Cost Cheaper Expensive
ern electronic equipment to perform a wide range of Size Smaller Bulky
operations [26]. The RFID readers and other compo-
nents need the right range of voltage supply to operate
without interruptions. in Figure 5. Randomized KD-tree is integrated into the
iDBSCAN algorithm to find the number of clusters in
the given dataset. This resultant of this event is stored
6.5. Data analytics and further clustering of the data points is performed
This section exploits the usage pattern of each passen- using the proposed iDBSAN algorithm.
ger type to understand the daily usage of the transit
network. To deduce the spatial and temporal pattern of
7. Experimentation
passengers the iDBSCAN algorithm is used as it has the
capability to detect clusters of varying shapes and sizes. The hardware setup is done between RC522 and
Similarly, a travel pattern, influenced by the diverse Arduino UNO. Table 4 represents the wiring between
nature of human behaviour, may exhibit a wide range Arduino UNO and RFID reader which is used to read
of shapes and sizes. It uses the boarding and destina- the data of the passengers from the environment it is
tion points of every single passenger to create clusters. installed in.
The analytics of the consumer data is done with R stu- Figure 7 shows the real-time implementation of the
dio. The working of the iDBSCAN algorithm is shown proposed system done is a closed setup. The Arduino
AUTOMATIKA 367
Figure 7. Interfacing of RFID module with Arduino for automatic data collection from the users.
Table 4. PIN wiring of Arduino UNO to RFID reader. check for new cards, so as to notify for the new registra-
RC522 Arduino UNO tion of unregistered RFID user cards. Once the Arduino
1 Gnd RFID set-up is done, the unique code of the RFID card
2 5 is obtained by reading and displaying it on the host
3 3.3V
4 -
computer serial monitor with Algorithm 3.
5 12
6 11
7 13 Algorithm 3: Display UID on Serial Monitor
8 10 1. Serial.print("UID tag :");
2. String content = "";
3. byte letter;
UNO is interfaced with an RFID reader to read the data 4. for(byte i = 0;i < mfrc522.uid.size;i++)
5. {
from the RFID tags. 6. Serial.print(mfrc522.uid.uidByte[i] < 0x10?"0":" ");
Algorithm 1 is used to initiate a serial communica- 7. Serial.print(mfrc522.uid.uidByte[i],HEX);
8. content.concat(String(mfrc522.uid.uidByte[i] < 0x10?"0":" "));
tion between Arduino and host computer and interface 9. content.concat(String(mfrc522.uid.uidByte[i],HEX));
the RFID reader with Arduino. Algorithm 2 is used to 10. }
11. Serial.println();
12. Serial.print("Message: ");
13. content.toUpperCase();
Algorithm 1: RFID reader Setup 14. if (content.substring(1) = = BD 22 C2 32)
15. {
1. void setup()
16. Serial.println("Authorized access");
2. {
17. Serial.println();
3. Serial.begin(9600);
18. delay(3000);
4. SPI.begin();
19. }
5. mfrc522.PCD_Init();
20. else {
6. Serial.println("Approximate your card to the reader ... ");
21. Serial.println("Access denied");
7. Serial.println();
22. delay(3000);
8. }
23. }
Table 5. Test cases on flow of a single event in the process of user validation.
Test case no. Description Pre-conditions Pass/Fail Expected results
TC\_001 Validate user login Registered user only allowed Pass Login successfully
TC\_001a Validate user login Registered user only allowed Fail Login Unsuccessfully
TC\_002 Put Smartcard Valid user only allowed Pass Value Get Successfully
TC\_003 Get Input Values Registered user only allowed Pass Get Values successfully
TC\_004 Value Pass Arduino Registered user only allowed Pass Pass Values successfully
TC\_005 File Upload with Encryption Registered user only allowed Pass Upload successfully
TC\_006 Stored Database Registered user only allowed Pass Stored successfully
TC\_007 Validate Admin login Admin only allowed Pass Login successfully
TC\_008 Download the excel sheet Admin only allowed Pass Download Successfully
TC\_009 R Programming Process Valid user only allowed Pass Process Successfully
TC\_010 Show the Prediction Valid user only allowed Pass Result Successfully
first on destination points and second on boarding starts with user validation until the result analysis. Also,
points. Importantly, the order of these two levels can based on the result, the cases are tested if prediction
be swapped without altering the results. Employing for enhancement is possible or not with the obtained
iDBSCAN separately in each level enhances the over- results.
all clustering algorithm’s robustness, and the results Figures 9–11 show the graph drawn from the analy-
from each level prove valuable for subsequent passenger sis of the results obtained through the RFID module. It
categorization. is evident that the number of tickets purchased by the
Meanwhile, the users are provided with an upgraded passengers is more through the online ticketing process
version of UTS that also saves the unique ID number when compared with the traditional manual process.
of the passenger’s RFID tag and the trip details. This Though there may be a drop due to network issues, the
set-up not only creates an automated system, but brings performance of the proposed system is more efficient
in the concept of transparency between the governing than the existing system. Analysis was made for differ-
body and the public. ent time periods during peak hours, afternoon hours,
and late nights.
Thus, the IoT based Indian Railways System brings
8. Results and discussion
in the concept of Online Ticketing System for the pas-
The proposed system uses IoT devices and mobile sengers with the following advantages:
application for online ticketing. Further, the gathered
data from the environment are used for prediction. • Decrease in wait time
RFID, Arduino, and a host computer are the physical • Crowd management
devices used in the environment. The aggregate of the • Hassle -free ticketing
data collected is used to draw a graph to analyse the • Reduced labour and paperwork for the government
difference in time taken between manual ticketing and
online ticketing. The data collected can be used for various anal-
Figure 8 shows that a registered RFID tag is autho- yses based on the user’s requirement. Hence, RFID
rized for further services, here the passenger does with Arduino makes data collection simple and
online ticketing, whereas a tag that is not registered is easier.
denied services. This paper categorizes passenger travel characteris-
The modules are run through test cases to anal- tics into spatial and temporal travel patterns, defining
yse if the system satisfies the conditions and yields distinct passenger types. Three clusters of passengers
the expected output or not. Based on the outcomes emerge as follows:
in Table 5, future modifications are done to frame the
perfect model according to the requirements. 1. Regular Passengers: Defined as individuals with
Table 5 shows the various test cases run on the pro- consistent travel times and routes. Their travel
posed system in the flow of a single event. This test schedules and journeys remain constant.
AUTOMATIKA 369
Figure 9. Analysis of traditional ticketing system vs automated ticketing system during peak hours.
Figure 10. Analysis of traditional ticketing system vs automated ticketing system during afternoon hours.
Figure 11. Analysis of traditional ticketing system vs automated ticketing system during night hours.
370 S. SUDHAKARAN ET AL.
2. Irregular Passengers: Characterized by irregular Table 6. Descriptive statistics of the transit passenger types.
travel times but consistent routes. These passen- Average
gers do not adhere to specific time ranges but Usage of transit card journey made
follow regular routes. Regular passenger 68% 82%
Irregular passenger 15% 65%
3. Habitual Passengers: This category includes pas- Habitual passenger 6% 1%
sengers who exhibit neither temporal nor spatial
patterns in their travel. They lack regular travel
times and routes. characterization of passengers. The analysis of
passenger categorization provides a comprehensive
The categorization is based on two straightforward understanding of each passenger type and yields key
rules: insights into their characteristics.
1. Rule 1: If no temporal or spatial travel pattern is
identified, the passenger is classified as an irregular 1. Most irregular passengers exhibit a lack of dis-
passenger. cernible travel patterns. This group infrequently
2. Rule 2: If more than 50% of journeys occur within utilizes public transport, with 99% of them being
regular times and routes, the passenger is identified sporadic users of the automated ticketing system.
as a regular passenger. Additionally, their contribution to the total ticket
3. Rule 3: The remaining passengers fall into the cat- revenue is relatively low, accounting for only 15%.
egory of habitual passengers. This suggests that promoting the sale of more tran-
sit cards may not yield significant profits for both
In Figure 12, it is evident that regular passengers the governing authority and society. Instead, there
predominantly undertook their travels during peak is a need to encourage these passengers to increase
periods. In contrast, irregular passengers exhibited a their travel frequency.
more flexible pattern, initiating their journeys later in 2. Regular passengers encompass individuals with
the morning (from 8:00 AM) and concluding earlier constrained time and travel patterns, exemplified
(by 6:00 PM) than other passenger classes. A ten- by college-going students. This passenger category
tative assumption about trip purposes can be made: tends to undertake more travel during peak peri-
regular passengers are likely engaged in school- and ods compared to other types.
work-related trips, whereas irregular passengers may 3. Habitual time passengers refer to individuals who
be associated with less rigidly scheduled activities, such frequently travel but lack a consistent time sched-
as leisure or shopping. Conversely, habitual passengers, ule and travel to various destinations. Given their
characterized by an absence of any discernible tempo- necessity to visit multiple locations, this passenger
ral travel pattern, tended to travel during peak periods, category demands greater transit mobility. Con-
akin to transit commuters. sequently, they engage in more transfers and bus
Table 6 presents the descriptive statistics for each journeys than any other type, with school students
passenger type, contributing valuable insights to the being a notable example.
[16] Koppikar U, Hiremath S, Shiralkar A, et al. Iot based Management (ICONSTEM); 2016.p. 72–76. doi:10.110
smart attendance monitoring system using RFID. Pro- 9/ICONSTEM.2016.7560926
ceedings of the 2019 1st International Conference on [22] Dong-Ying Li, Shun-Dao Xie, R.-J. Chen and H.-Z. Tan,
Advances in Information Technology (ICAIT); 2019. Design of internet of things system for library materials
p. 193–197. management using UHF RFID. Proceedings of the 2016
[17] Kieu M, Bhaskar A, Chung E. Passenger segmentation IEEE International Conference on RFID Technology
using smart card data. IEEE Trans Intell Transp Syst. and Applications (RFID-TA), 2016. p. 44–48.
2013. doi:10.1109/TITS.2014.2368998 [23] Laxmi AR, Mishra A. Rfid based logistic management
[18] Morozova TV, Gurov VV. Research in RFID vulner- system using internet of things (IoT). Proceedings of the
ability. Proceedings of the 2017 IEEE Conference of 2018 Second International Conference on Electronics,
Russian Young Researchers in Electrical and Elec- Communication and Aerospace Technology (ICECA);
tronic Engineering (EIConRus); 2017. p. 501–503. 2018. p. 556–559.
doi:10.1109/EIConRus.2017.7910601 [24] Swathi B, Pooja T, Kumar PS, et al. Survey on IoT based
[19] Sun W. Orientation-Aware RFID-based sensing. Pro- farm freshness mobile application. Proceedings of the
ceedings of the 2021 IEEE International Conference 2022 International Conference on Advanced Comput-
on RFID Technology and Applications (RFID-TA); ing Technologies and Applications (ICACTA); 2022.
2021. p. 52–54. doi:10.1109/RFID-TA53372.2021.961 p. 1–7.
7342 [25] Arbain N, Nordin NF, Isa NM, et al. LAS: Web-
[20] Costanzo A, Masotti D, Francia P, et al. Detection and based laboratory attendance system by integrating
movement estimation of items by a smart microwave RFID-ARDUINO technology. Proceedings of the 2014
hand-held reader. Proceedings of the 2014 IEEE RFID 2nd International Conference on Electrical, Electron-
Technology and Applications Conference (RFID-TA); ics and System Engineering (ICEESE); 2014. p. 89–94.
2014. p. 214–218. doi:10.1109/RFID-TA.2014.6934 doi:10.1109/ICEESE.2014.7154601
230 [26] Gruber S, Reinisch H, Hofer G, et al. Measure-
[21] Aarthy DK, Vandanaa S, Varshini M, et al. Auto- ment methods for power requirements of high perfor-
matic identification of traffic violations and theft avoid- mance UHF RFID tags. Proceedings of the 2009 IEEE
ance. Proceedings of the 2016 Second International International Conference on RFID; 2009. p. 20–27.
Conference on Science Technology Engineering and doi:10.1109/RFID.2009.4911181
© 2024 The Author(s). Published by Informa UK Limited, trading as Taylor
and Francis Group. This work is licensed under the Creative Commons
Attribution License creativecommons.org/licenses/by/4.0/ (the “License”).
Notwithstanding the ProQuest Terms and Conditions, you may use this
content in accordance with the terms of the License.