Professional Documents
Culture Documents
Abstract: Internet of Things (IoT) is relying on exchange of information and work progress through radio frequency identification
(RFID), which is an emerging technology and one of the most important technology in the computing world. This kind of
technologies has found its applications in various fields ranging from healthcare, construction, smart shopping, hospitality to
transportation sector and many more. In this system, Billing can be generated from the shopping cart. The idea is to save customers
time by providing digital billing system which you get through the registered mail of our website. A compartment is kept in which
all the products are attached with RFID tags/cards. The benefit of this project exceeds the development of a smart world in a
particular field as inventory management becomes much easier, as well as all the items can be read by the RFID reader rather than
scanned manually by the laborer. Purchasing product information will get stored in the database. The billing will get generated at
the mobile display as well as on the server. This system shows how RFID technology makes life easier and secure and thus helpful
in the future. This system describes about IoT, concentrating its use in improving and securing the future
shopping.
Keywords: IoT; RFID; Smart Shopping; RFID tags; Raspberry pi 3; RFID readers (MFRC522); Radio frequency;
I. INTRODUCTION experience for the customer. This system is based on Radio
Frequency Identification (RFID) technology.
Internet of Things (IoT) is an emerging technology in today’s RFID technology makes use of radio waves to transfer the data
industry, which has a greater impact on society. IoT is a between the reader and the movable RFID tag or card. RFID
network of physical devices, sensors, embedded software which technology was invented during early 1940's but it entered the
enables the devices to exchange data between them. The main mainstream during 1990's and RFID tags were used for item
aim of any technology is to make human life as simple as tagging during 2007 and beyond. RFID technology consists of
possible. In today’s modern life, shopping in a mall or a three parts
supermarket has become an everyday activity, where the 1. The antenna
customer has to spend a lot of time in the queue at the billing 2. The reader
counter. Our major objective was to reduce the customer’s 3. The RFID tags which contains information.
waiting time, by generating an automatic bill. Our proposed
Secure Smart Shopping System creates a better shopping
Conference Paper: Third National Conference on “Advances in Computing and Information Technology”
Organized by: School of Computing and Information Technology, REVA University, Bengaluru, India
197
Vishwas B et al, International Journal of Advanced Research in Computer Science, 9 (Special Issue III), May 2018, 197-201
The antenna emits the radio signals to activate the tag, the In our smart shopping system, we are replacing RFID instead windows
reader encodes the data present in the RFID tags. The tag of barcode because RFID has more advantages over barcode raspbian
contains the microchip attached to the antenna, where the chip which are listed above.
can store up to 2 kilobytes of data. There are two types of RFID i. Barcodes needs sightline but RFID does not need
tags available sightline. In case of a system which has barcode and if an
1. Active Tags item has to be read/scanned, the item and the scanner has to be
2. Passive Tags placed directly in front of each other or else the barcode won’t
scan the item properly. But in case of RFID it’s not the same.
An Active RFID tag contains its own transmitter along with its Here the RFID reader and the item need not be in sightline
own power supply (which is usually a battery) for the because they use radio waves to communicate with each other.
transmission of data whereas a Passive RFID tag does not ii) Barcodes can only be read but RFID can be both read/write.
contain its own power supply, it waits for the reader to send the Barcode system of shopping leads to lots of confusion because
energy to the antenna which is converted to the radio waves to barcodes can only be read and they cannot be rewritten. For
transfer the data whenever the tag is present within the read example, if in a store, and if there is a discount sale going on
zone. RFID systems can operate at three different frequencies and if the store employee has forgotten to apply the discount for
1. Low Frequency (LF): operates at the frequency of 30 a particular item then he cannot apply the discount for the item
KHz to 300 KHz, and can be read within a range of once again because barcodes cannot be rewritten/modified as
needed. But in case of RFID, the tags can we rewritten/modified
10cm.
as needed.
2. High Frequency (HF): operates at the frequency of
iii) Barcodes are not durable but RFID are durable. If any
3MHz to 30MHz, and can be read within a range of information has to be written on a barcode, it has to be printed
10cm to 1m. on paper labels which are not very strong and can be easily
3. Ultra-High Frequency (UHF): operates at the damaged due to harsh climatic conditions and won’t give proper
frequency of 300MHz to 3GHz, and can be read within results or else they are unreadable. But in case of RFID they are
a range of 12m. usually protected by a hard case so that they can withstand heat
and harsh climatic conditions. Because of this RFID’s are more
Our proposed system makes use of High-Frequency Passive tag. durable when compared to barcodes. iv) Barcode does not
The data transmitted by the RFID tag is stored in the encrypt data but RFID has the ability to encrypt the data.
database and it is further processed by Raspberry pi3 Barcodes can easily be hacked and any third party user can
to generate the automatic bill. The system makes use of easily read the data because the data is always readable in
Raspberry pi3 Model B. Raspberry pi3 is neither a barcode. But in case of RFID, the information is very secure
microprocessor nor microcontroller, it is a small computer with because the information is in a encrypted form and it cannot be
the system on the chip( SoC), which contains a multi-core easily read.
processor, I/O peripherals, USB port, ROM, RAM. Raspberry v. Barcode can contain/store limited amount of
pi3 uses either free or open source software which helps in information whereas RFID tags can contain and store data in
expanding the learning environment. It also provides processor huge amounts. vi) Barcode can scan/read only one tag at one
pins as GPIOs which are directly accessible and helps time but RFID can scan/read up to 40 tags at once.
to understand the hardware implementation from the basic vii) If we use RFID instead of barcode, customer time will be
level. saved and manual work will also be reduced.
In the existing system and as of related work we have done The proposed system requires the following major softwares to
many of the papers and authors have stated the system of smart accomplish the proposed functionality.
trolley but not of the entire smart shopping system. During Software
these days, shopping and purchasing items in malls and Description
supermarkets has become a daily routine. In most of these Required
malls and supermarkets after the customer purchases the items Raspbian
and goes to the billing counter for paying the bill, the cashier It is Debian based operating system for (Operating
uses barcode system to scan the item and generate the bill Raspberry pi. This system uses Raspbian System)
which is long and time consuming process and this leads to long Stretch.
queues at the billing counters. To overcome the above It is a relational database management system. SQLite3
mentioned problem we have used RFID instead of barcode in SQLite is not a client-server database engine as
our Smart Shopping System. it supports easy way to access database and
Barcodes are continuous black bars which contain some useful store information into the database through
information and that information could be read by a scanner. network
Information in barcode can be recognized by measuring the It is free and open-source terminal emulator; PuTTY
width of bars and the distance between those bars. As we all serial console and network file transfer
know that RFID stands for radio frequency identification, it application. This system uses the software to
uses radio waves to interact between an item and a system. establish SSH connection between Microsoft
Conference Paper: Third National Conference on “Advances in Computing and Information Technology”
Organized by: School of Computing and Information Technology, REVA University, Bengaluru, India
198
Vishwas B et al, International Journal of Advanced Research in Computer Science, 9 (Special Issue III), May 2018, 197-201
IV. DESIGN/METHODOLOGY:
1. REGISTRATION:
When the user wishes to shop in our system, first he
has to login in to our system. If he is a new user then he
has to first register with the system and then he is
allowed for shopping. The user has to register by
giving details like name, mobile number, email-ID and
a password where all the fields are validated and
password is encrypted and all these data is stored in
the database.
2. LOGIN:
After the user registers for the system, he can log
into the system by entering his/her email-ID and
password. The system now will validate the email-ID
and password and logs the user into the system.
3. POST LOGIN:
After the user has registered and logged in to the
system, the system requests the user to scan his user
card which would be given to him at the time of check
in.As soon as the user scans his card, the system
age contains options like this- F
i
g
1
:
O
v
e
r
v
i
e
w
o
f
S
m
a
r
t
S
e
c
u
r
e
S
h
o
p
p
i
n
g
S
y
s
i) Add item to the cart. iv) Pay and Checkout:
ii) Remove item from the cart. The user after seeing the bill can select this option number 4 for
iii) Display the bill. paying the bill amount. The system asks user to enter the
iv) Pay and amount that he has to pay, if he pays the entire amount then he
Checkout. can check out. If he pays partial amount from the total amount,
iv)
Exit.
i).Add item to the cart: the remaining Amount will be displayed and the system wor
When user wants to shop and add items to the cart he can select requests the user to pay the remaining amount and checkout. ldwi
this option. As soon as the user selects this option, the system v).Exit: de
tells the user to scan the item which he/she wants to shop and The user after seeing his/her bill and paying the entire amount sen
add it into the cart. After the user scans his item which is can exit from the shopping system by choosing option number ding
equipped with RFID tags/cards, the system tells the user that the 5. .
item is added/updated to his cart. The system gives the user an Thu
option to wish to add more items to his cart or not. The user can s,
choose any of the options and proceed further for billing. V. CONCLUSION sho
ii).Remove item from the cart: pper
The user after shopping his items can also wish to remove the The Internet of Things (IoT), put just, is the followings
items from the cart by selecting this option. The system tells sensible advance for remote systems, by putting Radiowill
the user to scan the item which he wants to remove. If Frequency Identifications (RFIDs, basically remote GPShav
proper item which he wants to remove is scanned and if that beacons) in each possible question made by organizationse
item is found in the cart then the system pops up with a message and governments. Likewise, we have utilized IoT andthe
saying that the item is removed from your cart. If that item is RFIDs to make a framework which will gigantically affectcap
not found in the cart, the system pops up with a message saying lives of ordinary citizens who sit tight for quite a while inacit
that the item is not found in your cart. Later the user can choose 'Q's in shopping centers for charging. Our framework, They to
any of the options and proceed for billing. iii).Display the bill: Secure Smart Shopping System is a charging framework
The user wishes to see his/her bill at any time of shopping by which is quicker and effective than the conventional
selecting this option. As soon as the user selects option 3, charging Systems. In this task, we have effectively made a
his/her bill will be displayed. The bill contains item id, item Secure Smart Shopping System where clients can without
name, quantity, price, total number of items and the total much of a stretch shop by enrolling once and signing in.
amount that the user has to pay at the time of checkout. This framework is easy to understand, dependable,
productive and temperate as we have used light-weight
servers and databases. The basic approach and predictable
client encounter accomplished through the keen shopping
arrangement will help become the digitalized showcase
and, permit purchaser gadget makers to all the
more effortlessly assemble items that can bolster
Conference Paper: Third National Conference on “Advances in Computing and Information Technology”
Organized by: School of Computing and Information Technology, REVA University, Bengaluru, India
199
Vishwas B et al, International Journal of Advanced Research in Computer Science, 9 (Special Issue III), May 2018, 197-201
Conference Paper: Third National Conference on “Advances in Computing and Information Technology”
Organized by: School of Computing and Information Technology, REVA University, Bengaluru, India
201