RFID Technology: Beyond Cash-Based Methods in Vending Machine
RFID Technology: Beyond Cash-Based Methods in Vending Machine
Abstract—This paper characterizes the design, implementation x Multiple sizes of coin types vary from country to
and employment of cashless and secure payment system in country.
vending machine by using radio frequency identification x Currency detection is not possible for currency
technology, to improve the traditional cash-based payment which is not already coded/ stored in database of
system that involved lot of problems and risks i.e., hacking, VM.
auditing, storing, currency and material of coins and notes.
x Coin based VM can easily be hacked through
RFID is achieving momentum in a multiple sectors like retail,
security, transportation, pharmaceuticals, defense, healthcare
different ways e.g. pulling coin back by tying it with
etc., and a host of other fields, and now vending machines. a thread after successful vend.
Our proposed methodology consists of passive RFID x Cash-based VM accepts new and fresh notes only.
identification cards and reader for consumers, Arduino Mega x Consumer doesn’t always have cash.
microcontroller, SPI protocol for RFID and Arduino x Time to time auditing and maintenance of cash is a
interfacing, keypad for password protection, liquid crystal huge problem of this system.
display (LCD) for displaying consumer name and current x Security of machine is always challenging, when it
balance, and SMS is sent for notification using GSM module. has cash in it. 24/7 surveillance is required for the
Spiral coil architecture is supported by DC motors powered by security of traditional VM.
relays in mechanical structure of vending machine. It also x No password protection in conventional VM system.
describes how such product-oriented RFID card based vending
Mechanism and methods used in the development of
machine can maximum facilitates the system engineering.
VMs has been changed over a period of time to make it more
Keywords- RFID (Radio frequency identification); UID secure and more adaptive to the human requirements e.g.
(Unique Identification Number); Keypad; LCD (Liquid Crystal physical display screen has been replaced to LCD screen,
Display); Arduino; SPI (Serial peripheral interface); GSM; VMs and revolution from FSM model to physical design of cash
( Vending Machines); Cashless; IOTs based VMs, and now cashless based method is being
introduced (in our proposed methodology), and will be
discussed further in this paper [1]. Establishment of cashless
I. INTRODUCTION
vending system has become essential to overcome the
Consumption has become an essential part of human- security threats / issues (discussed above) incorporated with
life’s basic routine activities, and machine based sales plays cash billing system in vending machines [3]. Development
a vital role in today’s busy life of our society. Machines are and installation of this system will allow consumers to use
now dominating modern life style, and as vending machines the RFID cards already purchased and using in other
are one of the machine based sales, so they are affecting payment areas e.g. in toll plaza etc.
human-machine relation in a positive way [1].Vending RFID technology has introduced the novel cashless
machines are the (non-vendor) machines [2] that provides payment system, and replaced the traditional cash based
edible and non-edible items such as snacks, beverages, methods in vending machines. Additional features added to
tickets and coffee etc., and are breaking the limitations of RFID VMs are security and reduction of man power.
locale and time, by providing its 24/7 services everywhere, Security is achieved by making VMs password protected
with the consumption of 2,500 to 4,400 kWh power per year (password entered by RFID holder provided to him at the
in best way possible. VMs are available in office buildings, time of RFID purchase) and a notification SMS generated
shopping malls, metro/bus stations, airports, universities, and sent to customer using GSM module after each
traffic and uptown area etc., [1]. So, its benefits include (no successful vend to make them more effective. One of the
need of human energy (reduction in man power as it doesn’t main reasons to use radio-frequency-identification (RFID)
need vendor)), flexibility in time, and time saving as distance technology specifically is due to its property of self-
between human and VMs is less. Challenges with traditional identification which makes it relatively more capable than
cash (coin and note)-based vending machines are listed other technologies [3]. Expenses used in sales can be reduced
below: using RFID. RFID technology is gaining momentum as it is
x The storage of coins is a limiting factor, as the boundless in applications, and revolutionizing human life in
storage become full the coin handling becomes an variety of sectors. It is breaking restraint in its applications
issue. from industrial sector to home control, from retail and
Selected in
Type Globally available RFID Vending
machine
Model No. of models Mifare
MFRC522
Type Active / Passive Passive
Battery Battery / Batteryless Batteryless
Host Interfaces SPI / I2C SPI
Suceess / Accuracy variable Low power, Figure 1. SPI Arduino Master, RFID Slave serial interfacing
rate high frequency
Strength from tag to High/Very low Very low
reader
Data communicates with a B_D baud rate that shows
HF (High number of symbols transmitted per second. B_D is generated
Frequency spectrum UHF/SHF (active) frequency in master mode, with sequence of divider (2 to 128 range)
LF/HF/UHF (Passive) spectrum) stages. Baud rate register contains 8 bit-data helps to
(Passive) initializes a value that divides bus-clock. . Baud-rate
125 kHz & 134.3 kHz (LF) division is done by the following equations [11]:
3-30 MHz (HF)
Frequency ranges in 860-960 MHz (UHF, 13.56MHz
Hertz passive) (HF, passive) (1)
433 MHz (UHF, active)
2.45 GHz (SHF, active)
Bytes in UID (unique
(2)
identification 4 or 7 bytes 4 Bytes
number) Where,
190
Authorized licensed use limited to: Sant Gadge Baba Amravati University. Downloaded on August 03,2023 at 06:48:33 UTC from IEEE Xplore. Restrictions apply.
= Baud Rate password stored against RFID UID of consumer card are the
= SPI baud rate preselection bits key parameters for providing security in proposed
= SPI baud rate selection bits methodology. System checks the information against UID, if
= Bus clock that UID is stored against that specific RFID card, then it
= Baud Rate Divisor asks for password. After password validation, consumer is
authorized to vend. After each successful vend, an additional
C. RFID Security Sytem incorporated SMS facility sends an SMS to the respective
RFID VM provides solution to all problems (including consumer about current and after-transaction balance using
security) discussed in the introduction section. Fig 2 GSM module. So, he can report the company if he hasn’t
demonstrates the RFID security system flow chart. Input to used that vending facility. VM owner gets a low vend level
the system is provided by RFID UID, after system and GSM SMS as well for smooth working of system.
module initialization. GSM module, UID, and four digit
191
Authorized licensed use limited to: Sant Gadge Baba Amravati University. Downloaded on August 03,2023 at 06:48:33 UTC from IEEE Xplore. Restrictions apply.
RFID card is being read by RFID reader in fig 4 (c) and
user current balance is being displayed on LCD. Fig 4 (d)
show the final integrated vending machine using radio
frequency identification technology.
The results of the experiments performed to find the
accuracy of vending machine using radio frequency
identification technology for multiple vending items are
tabulated in Table 2. Performance is calculated for both 25
and 50 iterations, and the results are noted. Correctly vended
and percentage accuracy is measured for these vending items
i.e. soft drink bottle, snacks family pack (Lays), dry milk box,
juice box, chocolate, biscuit roll, beverage can, and M n Ms.
Plot of percentage accuracy vs type of vending Item is
Figure 3. (a) shown in Fig. 5.
IV. CONCLUSION
The paper introduces the novel cashless and secure
payment system development in vending machine, using
RFID technology based on electromagnetic fields.
Contactless and battery free wireless sensor RFID, integrated
with GSM and Arduino provides numerous benefits, and has
Figure 4. (a) Spiral coils to hold vending items (b) DC motors to rotate also solved the issues related to traditional coin and note
spiral coils (c) LCD show user’s current balance in RFID card (d) based payment methods like insecurity, auditing and storing
Final RFID based vending machine.
of cash. Introduced system also bring improvements in
192
Authorized licensed use limited to: Sant Gadge Baba Amravati University. Downloaded on August 03,2023 at 06:48:33 UTC from IEEE Xplore. Restrictions apply.
sensing and communication capabilities. RFID’s potential [5] T. Good and M. Benaissa, "A low-frequency RFID to challenge
facilities are very wide, and it will bring many other novel security and privacy concerns," 2009 IEEE 6th International
Conference on Mobile Adhoc and Sensor Systems, Macau, 2009, pp.
applications in the future—that can definitely not be 856-863.
envisioned now. This system has low maintenance cost, but
[6] K. Ackland, M. Lotya, D. J. Finn and P. Stamenov, "Use of slits of
has some limitations related to the storage of large databases defined width in metal layers within ID-1 cards, as reactive couplers
of consumers and has a high startup cost. Table 3 shows the for near-field passive RFID at 13.56 MHz," 2016 IEEE International
difference and excellence achieved by our proposed Conference on RFID (RFID), Orlando, FL, 2016, pp. 1-4.
methodology (RFID) over traditional VMs, by improving [7] U. Farooq, M. Hasan, M. Amar, A. Hanif and M. Usman Asad,
security and other features our proposed methodology “RFID Based Security and Access Control System,” August 2014
outperforms in all aspects. IACSIT International Journal of Engineering and Technology,
Singapore, Vol. 6, No. 4, pp. 309-314.
TABLE III. ENHANCED FEATURES IN RFID VM [8] A. Ghanekar, B. Kishor and S. Bandewar, “Design and
Implementation of SPI Bus Protocol,” 2016 IJAREEIE International
Features Comparison Journal of Advanced Research in Electrical, Electronics and
Traditional RFID VM Instrumentation Engineering, 2016, pp. 4155-4157
Features
Cash-Based (Our Cashless [9] S. Choudhury, G.K. Singh and R.M. Mehra “Design and Verification
VM Methodology )
Serial Peripheral Interface (SPI) Protocol for Low Power
Coin / Note Handling 9 ×
Applications,” 2014 IJIRSET International Journal of Innovative
Auditing 9 × Research in Science, Engineering and Technology, 2014, pp. 16750-
Human-Energy needed for VM security 9 × 16758
LCD displays balance after tranasction 9 9 [10] F. Leens, “An introduction to I2C and SPI protocols,” Feb 2009 IEEE
Instrumentation and Measurement Magazine, 2009.
Password Protection × 9
[11] M. Turner and J. Naber, "The design of a bi-directional, RFID-based
Secured from Hacking × 9 ASIC for interfacing with SPI bus peripherals," 2010 53rd IEEE
SMS to consumer using GSM × 9 International Midwest Symposium on Circuits and Systems, Seattle,
SMS to owner using GSM × 9 WA, 2010, pp. 554-557.
[12] Motorola Inc., “SPI Block Guide V03.06,” March 2003.
V. FUTURE WORK [13] V. Vaid, “Comparison of different attributes in modeling a FSM
The future enhancements in RFID card based vending based vending machine in 2 different style,” 2014 ICES International
machine can be an integration of a cooling condenser with Conference on Embedded system, 2014, pp. 18-21.
the system to provide cold drinks etc. Push button used to [14] B. Roy and B. Mukherjee, "Design of a Coffee Vending Machine
vend particular vending item can be replaced with a touch Using Single Electron Devices: (An Example of Sequential Circuit
screen system. By increasing the number of stacks in the Design)," 2010 International Symposium on Electronic System
Design, Bhubaneswar, 2010, pp. 38-43.
mechanical structure of vending machine, will increase the
vending items capacity in machine. Current performance of [15] K. Kim, D. H. Park, H. Bang, G. Hong and S. i. Jin, "Smart coffee
vending machine using sensor and actuator networks," 2014 IEEE
this machine can be grown further in IOTs by using the web International Conference on Consumer Electronics (ICCE), Las
based system to store and process big consumer’s data online. Vegas, NV, 2014, pp. 71-72.
ACKNOWLEDGMENT [16] A. Nizam Ansari, A. Navada, S. Agarwal, S. Patil and B. A.
Sonkamble, "Automation of attendance system using RFID,
This work was encouraged and supported by Dr. Aqib biometrics, GSM Modem with .Net framework," 2011 International
Perwaiz (Assistant Director R&D), and Dr. Saad Rehman Conference on Multimedia Technology, Hangzhou, 2011, pp. 2976-
2979.
(Assistant Professor) NUST University, Islamabad, Pakistan.
[17] I. Zalbide, E. D'Entremont, A. Jiménez, H. Solar, A. Beriain and R.
REFERENCES Berenguer, "Battery-free wireless sensors for industrial applications
based on UHF RFID technology," IEEE SENSORS 2014 Proceedings,
[1] G C. Wenshan, H. Yanqun and L. Minyang, "Influential Factors of Valencia, 2014, pp. 1499-1502.
Vending Machine Interface to Enhance the Interaction Performance,"
[18] M. Kaur, M. Sandhu, N. Mohan and P. S. Sandhu “RFID Technology
2015 8th International Conference on Intelligent Computation
Principles, Advantages, Limitations & Its Applications,” 2011
Technology and Automation (ICICTA), Nanchang, 2015, pp. 486-
International Journal of Computer and Electrical Engineering, Vol.3,
489.
No.1, February, 2011, pp. 151-157.
[2] A. S. P. H. Navarro, C. B. Carlos and C. M. F. Monteiro, "User
[19] M. Bhuvaneswari, S. Sukhumar, N. Divya, S. Kalpanadevi and N.
Centered Design of an Autonomous Mobile Robot Vending Machine
Vanitha, “Embedded System Based Automatic Ticket Vending
Concept," 2016 International Conference on Autonomous Robot
Machine for Modern Transport System,” November 2013 IJARCCE
Systems and Competitions (ICARSC), Braganca, 2016, pp. 259-264.
International Journal of Advanced Research in Computer and
[3] R. M. Woo-Garcia, U. H. Lomeli-Dorantes, F. López-Huerta, A. L. Communication Engineering, Vol. 2, Issue 11, 2013, pp. 4251-4255.
Herrera-May and J. Martínez-Castillo, "Design and Implementation
[20] A. Qaiser and S. A. Khan, "Automation of Time and Attendance
of a system access control by RFID," 2016 IEEE International
using RFID Systems," 2006 International Conference on Emerging
Engineering Summit, II Cumbre Internacional de las Ingenierias (IE-
Technologies, Peshawar, 2006, pp. 60-63.
Summit), Boca del Rio, 2016, pp. 1-4.
[21] A. Cuiyi, "Financial system security analysis based on macro finance
[4] M. Kisic, B. Dakic, M. Damnjanovic, A. Menicanin, N. Blaz and L.
perspective," 2016 International Conference on Industrial Economics
Zivanov, "Design and simulation of 13.56 MHz RFID tag in ink-jet
System and Industrial Security Engineering (IEIS), Sydney, NSW,
printing technology," Proceedings of the 36th International Spring
2016, pp. 1-3.
Seminar on Electronics Technology, Alba Iulia, 2013, pp. 263-267.
193
Authorized licensed use limited to: Sant Gadge Baba Amravati University. Downloaded on August 03,2023 at 06:48:33 UTC from IEEE Xplore. Restrictions apply.