2,144 Hits in 8.3 sec

Semi-Passive RFID Development Platform for Implementing and Attacking Security Tags

Thomas Plos, Manfred Aigner, Thomas Baier, Martin Feldhofer, Michael Hutter, Thomas Korak, Erich Wenger
2012 International Journal of RFID Security and Cryptography  
Its main applications are in developing hardware prototypes of passive tags, extending RFID protocols with security functionality, and for attacking real RFID devices with side-channel analysis.  ...  We show how the developed semi-passive RFID tags can help implementing and attacking security-enhanced RFID systems.  ...  A powerful development platform for implementation of the digital part of a real passive RFID tag is the main reason for this research work. Figure 3 presents the architecture of the FPGA DemoTags.  ... 
doi:10.20533/ijrfidsc.2046.3715.2012.0003 fatcat:gfxogv5urnbgdhgqksrqkxifpi

A Brief Overview of RFID Tag Design in FPGA

2016 International Journal of Science and Research (IJSR)  
In this paper a brief overview of the RFID tag design is discussed along with the comparative study of different design of the tag.  ...  Radio Frequency Identification (RFID) now-a-days, widely using technology in the field of auto-identification of objects. The system consists of two basic blocks-tag and a reader.  ...  Functional verification can be performed by implementing the digital core in the FPGA. [7] Conclusion The design of the baseband of RFID tag implemented in FPGA provides flexibility to the design.  ... 
doi:10.21275/v5i5.nov163900 fatcat:icc7fzzv7vdvfcy43pptggfghm

RFID service for non-RFID enabled devices: Embedded hardware implementation

Oscar Botero, Hakima Chaouchi
2011 Procedia Computer Science  
In this paper we present the design and implementation of a RFID service conceived for devices with non-RFID hardware but a WLAN interface.  ...  More specifically, we utilized embedded hardware to build an affordable and practical device that allows obtaining lists of tag IDs by using a common WLAN interface.  ...  For certain applications this system provides an integration platform into the RFID networks for devices that have no suitable hardware (RFID Reader).  ... 
doi:10.1016/j.procs.2011.07.012 fatcat:xpw7vkf3ajfuzdlfkv3jubfpgu

Implementation of Symmetric Algorithms on a Synthesizable 8-Bit Microcontroller Targeting Passive RFID Tags [chapter]

Thomas Plos, Hannes Groß, Martin Feldhofer
2011 Lecture Notes in Computer Science  
The vision of the secure Internet-of-Things is based on the use of security-enhanced RFID technology. In this paper, we describe the implementation of symmetric-key primitives on passive RFID tags.  ...  The microcontroller was designed to fulfill the fierce constraints concerning chip area and power consumption in passive RFID tags.  ...  This work has been supported by the Austrian Government through the research program FIT-IT Trust in IT Systems under the Project Number 820843 (Project CRYPTA) and by the IAP Programme P6/26 BCRYPT of  ... 
doi:10.1007/978-3-642-19574-7_8 fatcat:sqhe5icgwneu5czlufhkmllade

Development of Sensing and Computing Enhanced Passive RFID Tags Using the Wireless Identification and Sensing Platform [chapter]

Alanson Sample, Daniel Yeager, Michael Buettner, Joshua Smith
2009 Development and Implementation of RFID Technology  
With this device, one bit of sensor data was encoded by using anti-parallel tilt switches to multiplex one of two RFID tag ICs to a single antenna.  ...  While the functionality of today's passive RFID tags is extremely limited, today's tags can already be thought of as a layer of invisible computing that is seamlessly embedded in objects throughout the  ...  Development of Sensing and Computing Enhanced Passive RFID Tags Using the Wireless Identification and Sensing Platform 137 only by the device hardware.  ... 
doi:10.5772/6521 fatcat:ojevjy4uxfhllcgepoqrup6zu4

A Multi-protocol Baseband Modem Processor for a Mobile RFID Reader [chapter]

Seok Joong Hwang, Joon Goo Lee, Seon Wook Kim, Sunshin Ahn, Si-Gyung Koo, Jihun Koo, Kyung Ho Park, Woo Shik Kang
2006 Lecture Notes in Computer Science  
This paper presents architecutre of a multi-protocol RFID reader on mobile devices. We have considered several design parameters, such as low power consumption, cost effectiveness and flexibility.  ...  In RFID (Radio Frequency IDentification) systems, a tag reader communicates with tags, reads their identification codes, and accesses their related database through network infrastructure.  ...  CONCLUSION In this paper, we presented architecture and implementation of a multi-protocol RFID reader on mobile devices such as mobile phones and PDAs.  ... 
doi:10.1007/11802167_79 fatcat:khku63ssuzbuxeb5ldwuwhuzru

Smart Solutions for RFID based Inventory Management Systems: A Survey

Ali Alwadi, Amjad Gawanmeh, Sazia Parvin, Jamal N. Al-Karaki
2017 Scalable Computing : Practice and Experience  
In addition, the latest researches in the RFID infrastructure and middle wares are evaluated. This includes passive RFID Tags, RFID Antennas, RFID middleware, and the RFID Reader.  ...  We first outline the design challenges for RFID-based inventory management systems followed by a comprehensive survey of various RFID technologies, RFID types, and RFID architectures.  ...  Due to its design simplicity, Near-Field system was one of the first RFID techniques to be used for the implementation of RFID tags, in particular, passive ones.  ... 
doi:10.12694/scpe.v18i4.1333 fatcat:bvgqjzilozbndnoi5on4pfzcmq

Tracking of Returnable Packaging and Transport Units with active RFID in the grocery supply chain

Alejandro S. Martínez-Sala, Esteban Egea-López, Felipe García-Sánchez, Joan García-Haro
2009 Computers in industry (Print)  
In this paper we show the work developed in collaboration with ECOMOVISTAND in order to turn the MT into an intelligent product platform by embedding Active RFID tags.  ...  and first stage for developing new value-added services.  ...  In our opinion, such an approach lacks flexibility and forces either the device providers to develop a number of drivers for different platforms or the middleware maintainers to implement adapters to different  ... 
doi:10.1016/j.compind.2008.12.003 fatcat:ae5cjrocsfdo3ozl3mmoblwiie

Application of Auto-ID in agent-based manufacturing control

T. N. Wong, C. B. Leung
2010 The 40th International Conference on Computers & Indutrial Engineering  
A MAS infrastructure for FAC control has been developed to incorporate the coordination of the RFID devices.  ...  Subsequently, the RFID technology is adopted in a flexible assembly cell (FAC) to evaluate the feasibility of integrating the RFID devices in a multi-agent based manufacturing control system.  ...  An RFID system is made up of three components: RFID tag, RFID reader, and the RFID middleware. RFID tags are categorized as either passive or active.  ... 
doi:10.1109/iccie.2010.5668198 fatcat:cjt5kfv4incm7gjvbvvr2ktsgm

Development of RFID Based Smart Sensor Prototype for Wireless Industrial Monitoring and Control

Urmila Deshmukh, R. N. Moghe
2011 International Journal of Instrumentation Control and Automation  
A prototype system for wireless industrial monitoring and control was developed using a commercially available 12.5 GHZ RFID passive tags.  ...  A receiving unit (Interrogator) emits an electromagnetic field which when detected by passive RFID tag causes it to transfer sensor information (data stored in memory) to the interrogator.  ...  In the current implementation, smart sensor nodes equipped with sensors to monitor the status of a machine,store the health information in a RFID tag.  ... 
doi:10.47893/ijica.2011.1032 fatcat:rl6moxzsfvb3dlkk5fx7zuzwju

Wearable Flexible Lightweight Modular RFID Tag With Integrated Energy Harvester

Sam Lemey, Sam Agneessens, Patrick Van Torre, Kristof Baes, Jan Vanfleteren, Hendrik Rogier
2016 IEEE transactions on microwave theory and techniques  
A novel wearable radio frequency identification (RFID) tag with sensing, processing, and decision-taking capability is presented for operation in the 2.45-GHz RFID superhigh frequency (SHF) band.  ...  The tag is powered by an integrated light harvester, with a flexible battery serving as an energy buffer.  ...  Khelifi from the Solar Cells Lab, Department of Electronics and Information Systems (ELIS), Ghent University, for her valuable help with the PV module measurements, and Dr.  ... 
doi:10.1109/tmtt.2016.2573274 fatcat:alh4sprx5bfwvpyzkm27uk3tgu

RFID Middleware Design and Architecture [chapter]

Mehdia Ajana El Khaddar, Mohammed Boulmalf, Hamid Harroud, Mohammed Elkoutbi
2011 Designing and Deploying RFID Applications  
Because these tags contain more hardware than passive RFID tags, they are more expensive and are reserved for costly items that are read over greater distances (United States Government Accountability  ...  A passive tag should store, at a minimum, a unique identifier for the item tagged, and can be read from a range of about 10 to 20 feet under perfect conditions (United States Government Accountability  ...  Therefore, it delivers new and enhanced capabilities to create a robust, flexible, and scalable platform for capturing new business value from sensor data.  ... 
doi:10.5772/16917 fatcat:nwb72pussvbibm5nql4sydeozu

It Application in Library - Rfid Technology

Prof. Kuldeep P. Pawar
2012 IOSR Journal of Humanities and Social Science  
Real potential of RFID as a cross-institution platform for identification will be limited by use of proprietary RFID systems and hence recommends system integrators, vendors and libraries to adopt standards  ...  & follow best practices guidelines issued by NISO for use of RFID in Libraries.  ...  RFID Implementation in Libraries Phase wise Planning for deployment of complete solution * Estimated timeline for tagging 4 Lakhs (four lac) items Procurement of Hardware: Sourcing of RFID hardware i.e  ... 
doi:10.9790/0837-0110508 fatcat:qd6w5qis2faj7hv6ogevjnawlq

Implementation of radio frequency identification middleware with database

Bocheng Chen, Andy Mak, Fengqun Lin, Bo Yuan, Wenhuang Liu, Hongyang Wang
2017 Transactions of the Institute of Measurement and Control  
This study shows that the simple RFID middleware is suitable for SMEs to use and the open source can be easily applied to make a platform based on the RFID middleware.  ...  This paper introduces the principle of a radio frequency identification (RFID) middleware, including its characteristics, problems and implementation in relation to Electronic Product Code (EPC).  ...  Funding The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: This work was supported by the State Key Lab for Manufacturing  ... 
doi:10.1177/0142331216684550 fatcat:zwbdqfqutbandlamoxg74ixuvi

Data remanence effects on memory-based entropy collection for RFID systems

Nitesh Saxena, Jonathan Voris
2011 International Journal of Information Security  
The implementation of a true random number generator on Intel's WISP (Wireless Identification and Sensing Platform) RFID tag is also presented, which is the first to the authors' best knowledge.  ...  Random number generation is a fundamental security primitive. This relatively simple requirement is beyond the capacity of passive RFID (Radio Frequency Identification) tags, however.  ...  They would also like to give a special thanks to Dan Yeager both for his comments on this paper and his advice on WISP programming.  ... 
doi:10.1007/s10207-011-0139-0 fatcat:jbqmoobr7bb4pps4m3ci6lpku4
« Previous Showing results 1 — 15 out of 2,144 results