Total views : 160

Security in Toll Gate using Internet of Things


  • St. Peters Institute of Higher Education and Research, Avadi, Chennai – 600054, Tamil Nadu, India


Objectives: This paper describes a system and method for security at the toll booth. The system uses an alternative payment method that allows the user to make the payment quickly avoiding delay and also uses a mobile application that allows the user to recharge the mobile wallet. Methods/Statistical Analysis: Every lane has been divided based on two categories: one lane for drivers who have sufficient balance in their wallet and the other lane for the other category. The other category includes the drivers not having balance in their wallet, payment through cash in case the individual does not have the application or, mobile malfunction. The transaction is performed through radio frequency communication. The lanes at the toll-booth are divided into two sub-lanes depending upon the amount of money present inside the wallet. Findings: The smart system comprises of a database of users that are saved and have register on their mobile application. In the event of any vehicle stolen, theft case or robbery this database can be helpful in identifying the culprit and the vehicle. The database is stored at the Regional Transport Office (RTO). Application/Improvements: The invention finds applications in entrance of school, college, university and offices, airport, railway parking and at sports stadium.


Avoid Delay, Internet of Things, Mobile Application, Mobile Wallet, Security, Sensors, Toll Gate, Wi-Fi.

Full Text:

 |  (PDF views: 120)


  • Huang JM. Research on Internet of Vehicles and its Application in Intelligent Transportation. Applied Mechanisms and Materials. 2013 Jun; 321-324:2818–21. Crossref
  • Rajasekaran P. A smarter toll gate based on Web of Things. Electronics, Computing and communication Technologies (CONECCT). 2013 IEEE International Conference; 2013 Jan 17-19. p. 1–6. Crossref
  • Han SH, Chu CH. Tamper Detection in RFID-Enabled Supply Chains Using Fragile Watermarking. RFID. 2008 IEEE International Conference; 2008 Apr 16-17. p. 111–17. Crossref


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.