A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
Semi-Passive RFID Development Platform for Implementing and Attacking Security Tags
2012
International Journal of RFID Security and Cryptography
Its main applications are in developing hardware prototypes of passive tags, extending RFID protocols with security functionality, and for attacking real RFID devices with side-channel analysis. ...
We show how the developed semi-passive RFID tags can help implementing and attacking security-enhanced RFID systems. ...
A powerful development platform for implementation of the digital part of a real passive RFID tag is the main reason for this research work. Figure 3 presents the architecture of the FPGA DemoTags. ...
doi:10.20533/ijrfidsc.2046.3715.2012.0003
fatcat:gfxogv5urnbgdhgqksrqkxifpi
A Brief Overview of RFID Tag Design in FPGA
2016
International Journal of Science and Research (IJSR)
In this paper a brief overview of the RFID tag design is discussed along with the comparative study of different design of the tag. ...
Radio Frequency Identification (RFID) now-a-days, widely using technology in the field of auto-identification of objects. The system consists of two basic blocks-tag and a reader. ...
Functional verification can be performed by implementing the digital core in the FPGA. [7]
Conclusion The design of the baseband of RFID tag implemented in FPGA provides flexibility to the design. ...
doi:10.21275/v5i5.nov163900
fatcat:icc7fzzv7vdvfcy43pptggfghm
RFID service for non-RFID enabled devices: Embedded hardware implementation
2011
Procedia Computer Science
In this paper we present the design and implementation of a RFID service conceived for devices with non-RFID hardware but a WLAN interface. ...
More specifically, we utilized embedded hardware to build an affordable and practical device that allows obtaining lists of tag IDs by using a common WLAN interface. ...
For certain applications this system provides an integration platform into the RFID networks for devices that have no suitable hardware (RFID Reader). ...
doi:10.1016/j.procs.2011.07.012
fatcat:xpw7vkf3ajfuzdlfkv3jubfpgu
Implementation of Symmetric Algorithms on a Synthesizable 8-Bit Microcontroller Targeting Passive RFID Tags
[chapter]
2011
Lecture Notes in Computer Science
The vision of the secure Internet-of-Things is based on the use of security-enhanced RFID technology. In this paper, we describe the implementation of symmetric-key primitives on passive RFID tags. ...
The microcontroller was designed to fulfill the fierce constraints concerning chip area and power consumption in passive RFID tags. ...
This work has been supported by the Austrian Government through the research program FIT-IT Trust in IT Systems under the Project Number 820843 (Project CRYPTA) and by the IAP Programme P6/26 BCRYPT of ...
doi:10.1007/978-3-642-19574-7_8
fatcat:sqhe5icgwneu5czlufhkmllade
Development of Sensing and Computing Enhanced Passive RFID Tags Using the Wireless Identification and Sensing Platform
[chapter]
2009
Development and Implementation of RFID Technology
With this device, one bit of sensor data was encoded by using anti-parallel tilt switches to multiplex one of two RFID tag ICs to a single antenna. ...
While the functionality of today's passive RFID tags is extremely limited, today's tags can already be thought of as a layer of invisible computing that is seamlessly embedded in objects throughout the ...
Development of Sensing and Computing Enhanced Passive RFID Tags Using the Wireless Identification and Sensing Platform 137 only by the device hardware. ...
doi:10.5772/6521
fatcat:ojevjy4uxfhllcgepoqrup6zu4
A Multi-protocol Baseband Modem Processor for a Mobile RFID Reader
[chapter]
2006
Lecture Notes in Computer Science
This paper presents architecutre of a multi-protocol RFID reader on mobile devices. We have considered several design parameters, such as low power consumption, cost effectiveness and flexibility. ...
In RFID (Radio Frequency IDentification) systems, a tag reader communicates with tags, reads their identification codes, and accesses their related database through network infrastructure. ...
CONCLUSION In this paper, we presented architecture and implementation of a multi-protocol RFID reader on mobile devices such as mobile phones and PDAs. ...
doi:10.1007/11802167_79
fatcat:khku63ssuzbuxeb5ldwuwhuzru
Smart Solutions for RFID based Inventory Management Systems: A Survey
2017
Scalable Computing : Practice and Experience
In addition, the latest researches in the RFID infrastructure and middle wares are evaluated. This includes passive RFID Tags, RFID Antennas, RFID middleware, and the RFID Reader. ...
We first outline the design challenges for RFID-based inventory management systems followed by a comprehensive survey of various RFID technologies, RFID types, and RFID architectures. ...
Due to its design simplicity, Near-Field system was one of the first RFID techniques to be used for the implementation of RFID tags, in particular, passive ones. ...
doi:10.12694/scpe.v18i4.1333
fatcat:bvgqjzilozbndnoi5on4pfzcmq
Tracking of Returnable Packaging and Transport Units with active RFID in the grocery supply chain
2009
Computers in industry (Print)
In this paper we show the work developed in collaboration with ECOMOVISTAND in order to turn the MT into an intelligent product platform by embedding Active RFID tags. ...
and first stage for developing new value-added services. ...
In our opinion, such an approach lacks flexibility and forces either the device providers to develop a number of drivers for different platforms or the middleware maintainers to implement adapters to different ...
doi:10.1016/j.compind.2008.12.003
fatcat:ae5cjrocsfdo3ozl3mmoblwiie
Application of Auto-ID in agent-based manufacturing control
2010
The 40th International Conference on Computers & Indutrial Engineering
A MAS infrastructure for FAC control has been developed to incorporate the coordination of the RFID devices. ...
Subsequently, the RFID technology is adopted in a flexible assembly cell (FAC) to evaluate the feasibility of integrating the RFID devices in a multi-agent based manufacturing control system. ...
An RFID system is made up of three components: RFID tag, RFID reader, and the RFID middleware. RFID tags are categorized as either passive or active. ...
doi:10.1109/iccie.2010.5668198
fatcat:cjt5kfv4incm7gjvbvvr2ktsgm
Development of RFID Based Smart Sensor Prototype for Wireless Industrial Monitoring and Control
2011
International Journal of Instrumentation Control and Automation
A prototype system for wireless industrial monitoring and control was developed using a commercially available 12.5 GHZ RFID passive tags. ...
A receiving unit (Interrogator) emits an electromagnetic field which when detected by passive RFID tag causes it to transfer sensor information (data stored in memory) to the interrogator. ...
In the current implementation, smart sensor nodes equipped with sensors to monitor the status of a machine,store the health information in a RFID tag. ...
doi:10.47893/ijica.2011.1032
fatcat:rl6moxzsfvb3dlkk5fx7zuzwju
Wearable Flexible Lightweight Modular RFID Tag With Integrated Energy Harvester
2016
IEEE transactions on microwave theory and techniques
A novel wearable radio frequency identification (RFID) tag with sensing, processing, and decision-taking capability is presented for operation in the 2.45-GHz RFID superhigh frequency (SHF) band. ...
The tag is powered by an integrated light harvester, with a flexible battery serving as an energy buffer. ...
Khelifi from the Solar Cells Lab, Department of Electronics and Information Systems (ELIS), Ghent University, for her valuable help with the PV module measurements, and Dr. ...
doi:10.1109/tmtt.2016.2573274
fatcat:alh4sprx5bfwvpyzkm27uk3tgu
RFID Middleware Design and Architecture
[chapter]
2011
Designing and Deploying RFID Applications
Because these tags contain more hardware than passive RFID tags, they are more expensive and are reserved for costly items that are read over greater distances (United States Government Accountability ...
A passive tag should store, at a minimum, a unique identifier for the item tagged, and can be read from a range of about 10 to 20 feet under perfect conditions (United States Government Accountability ...
Therefore, it delivers new and enhanced capabilities to create a robust, flexible, and scalable platform for capturing new business value from sensor data. ...
doi:10.5772/16917
fatcat:nwb72pussvbibm5nql4sydeozu
It Application in Library - Rfid Technology
2012
IOSR Journal of Humanities and Social Science
Real potential of RFID as a cross-institution platform for identification will be limited by use of proprietary RFID systems and hence recommends system integrators, vendors and libraries to adopt standards ...
& follow best practices guidelines issued by NISO for use of RFID in Libraries. ...
RFID Implementation in Libraries Phase wise Planning for deployment of complete solution * Estimated timeline for tagging 4 Lakhs (four lac) items Procurement of Hardware: Sourcing of RFID hardware i.e ...
doi:10.9790/0837-0110508
fatcat:qd6w5qis2faj7hv6ogevjnawlq
Implementation of radio frequency identification middleware with database
2017
Transactions of the Institute of Measurement and Control
This study shows that the simple RFID middleware is suitable for SMEs to use and the open source can be easily applied to make a platform based on the RFID middleware. ...
This paper introduces the principle of a radio frequency identification (RFID) middleware, including its characteristics, problems and implementation in relation to Electronic Product Code (EPC). ...
Funding The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: This work was supported by the State Key Lab for Manufacturing ...
doi:10.1177/0142331216684550
fatcat:zwbdqfqutbandlamoxg74ixuvi
Data remanence effects on memory-based entropy collection for RFID systems
2011
International Journal of Information Security
The implementation of a true random number generator on Intel's WISP (Wireless Identification and Sensing Platform) RFID tag is also presented, which is the first to the authors' best knowledge. ...
Random number generation is a fundamental security primitive. This relatively simple requirement is beyond the capacity of passive RFID (Radio Frequency Identification) tags, however. ...
They would also like to give a special thanks to Dan Yeager both for his comments on this paper and his advice on WISP programming. ...
doi:10.1007/s10207-011-0139-0
fatcat:jbqmoobr7bb4pps4m3ci6lpku4
« Previous
Showing results 1 — 15 out of 2,144 results