Development of an IoT-Enabled RFID Attendance System for Educational Institutions: Addressing Proxy Attendance Challenges

Authors

  • Spandan Parikh Student, Department of Computer Engineering, V.V.P Engineering College, Rajkot, Gujarat, India
  • Harikrishna Parikh Student, Department of Electronics, Saurashtra University, Rajkot, Gujarat, India

Keywords:

Attendance Management, RFID Technology, Internet of Things, Educational Institutions, Proxy Detection, Academic Integrity

Abstract

Managing student attendance efficiently and reliably is a long-standing challenge in educational institutions, especially in the face of widespread proxy attendance practices. This study presents the design and development of a low-cost, IoT-enabled, RFID-based attendance system aimed at eliminating proxy attendance and improving academic accountability. Utilising ESP32 microcontroller-based embedded systems interfaced with MFRC522 RFID modules to collect attendance. The same is stored in a database hosted on a web server using a MySQL-PHP backend. The system records attendance in real-time and displays it on a web-based dashboard accessible to authorised users (faculty and administrators). Although formal field testing has not been conducted, the system was successfully demonstrated in a simulated environment using mock data (student, faculty and administrator). The system shows potential for reliability, cost-effectiveness, and scalability for broader institutional adoption.

References

Finkenzeller , Klaus. RFID handbook: fundamentals and applications in contactless smart cards, radio frequency identification and near-field communication: John wiley & sons; 2020.

L Z, Y W, H Z. Design and Implementation of RFID Reader System Based on MFRC522. In Proceedings of the IEEE International Conference on Information and Automation.; 2017.

Feb WR.2, 5(1):25-33.. An introduction to RFID technology. IEEE pervasive computing. 2006 February; 5(1): 25-33.

Juels A. RFID security and privacy: a research survey. IEEE Journal on Selected Areas in Communications. 2006 February; 24(2): 381-394.

Karygiannis T, Eydt B, Barber G, Bunn L, Phillips T. Guidelines for securing radio frequency identification (RFID) systems.. 2007 Apr 6;80:1-54. Special Publication. ; 2007.

G A, MA B, S K, C L, B M. A framework for analysing RFID distance bounding protocols. Journal of Computer Security. 2011; 19(2): 289-317.

Published

2025-10-03