Development of an IoT-Enabled RFID Attendance System for Educational Institutions: Addressing Proxy Attendance Challenges
Keywords:
Attendance Management, RFID Technology, Internet of Things, Educational Institutions, Proxy Detection, Academic IntegrityAbstract
Managing student attendance efficiently and reliably is a long-standing challenge in educational institutions, especially in the face of widespread proxy attendance practices. This study presents the design and development of a low-cost, IoT-enabled, RFID-based attendance system aimed at eliminating proxy attendance and improving academic accountability. Utilising ESP32 microcontroller-based embedded systems interfaced with MFRC522 RFID modules to collect attendance. The same is stored in a database hosted on a web server using a MySQL-PHP backend. The system records attendance in real-time and displays it on a web-based dashboard accessible to authorised users (faculty and administrators). Although formal field testing has not been conducted, the system was successfully demonstrated in a simulated environment using mock data (student, faculty and administrator). The system shows potential for reliability, cost-effectiveness, and scalability for broader institutional adoption.
References
Finkenzeller , Klaus. RFID handbook: fundamentals and applications in contactless smart cards, radio frequency identification and near-field communication: John wiley & sons; 2020.
L Z, Y W, H Z. Design and Implementation of RFID Reader System Based on MFRC522. In Proceedings of the IEEE International Conference on Information and Automation.; 2017.
Feb WR.2, 5(1):25-33.. An introduction to RFID technology. IEEE pervasive computing. 2006 February; 5(1): 25-33.
Juels A. RFID security and privacy: a research survey. IEEE Journal on Selected Areas in Communications. 2006 February; 24(2): 381-394.
Karygiannis T, Eydt B, Barber G, Bunn L, Phillips T. Guidelines for securing radio frequency identification (RFID) systems.. 2007 Apr 6;80:1-54. Special Publication. ; 2007.
G A, MA B, S K, C L, B M. A framework for analysing RFID distance bounding protocols. Journal of Computer Security. 2011; 19(2): 289-317.
Published
Issue
Section
Copyright (c) 2025 Journal of Engineering Design and Analysis

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
We, the undersigned, give an undertaking to the following effect with regard to our article entitled
“_______________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________________” submitted for publication in (Journal title)________________________________________________ _______________________________________________________Vol.________, Year _________:-
1. The article mentioned above has not been published or submitted to or accepted for publication in any form, in any other journal.
2. We also vouchsafe that the authorship of this article will not be contested by anyone whose name(s) is/are not listed by us here.
3. I/We declare that I/We contributed significantly towards the research study i.e., (a) conception, design and/or analysis and interpretation of data and to (b) drafting the article or revising it critically for important intellectual content and on (c) final approval of the version to be published.
4. I/We hereby acknowledge ADRs conflict of interest policy requirement to scrupulously avoid direct and indirect conflicts of interest and, accordingly, hereby agree to promptly inform the editor or editor's designee of any business, commercial, or other proprietary support, relationships, or interests that I/We may have which relate directly or indirectly to the subject of the work.
5. I/We also agree to the authorship of the article in the following sequence:-
Authors' Names (in sequence) Signature of Authors
1. _____________________________________ _____________________________________
2. _____________________________________ _____________________________________
3. _____________________________________ _____________________________________
4. _____________________________________ _____________________________________
5. _____________________________________ _____________________________________
6. _____________________________________ _____________________________________
7. _____________________________________ _____________________________________
8. _____________________________________ _____________________________________
Important
(I). All the authors are required to sign independently in this form in the sequence given above. In case an author has left the institution/ country and whose whereabouts are not known, the senior author may sign on his/ her behalf taking the responsibility.
(ii). No addition/ deletion/ or any change in the sequence of the authorship will be permissible at a later stage, without valid reasons and permission of the Editor.
(iii). If the authorship is contested at any stage, the article will be either returned or will not be
processed for publication till the issue is solved.