Filters








30 Hits in 2.3 sec

Distance Bounding with Delayed Responses

Sangho Lee, Jin Seok Kim, Sung Je Hong, Jong Kim
2012 IEEE Communications Letters  
Distance-bounding protocols enable the establishment of an upper bound on the distance between two communicating parties in such a way that their degree of proximity can be verified.  ...  This letter proposes a new method to increase the number of response states of distance-bounding protocols by injecting intentional delays to each round.  ...  [13] have presented a generic techniquecalled MUltiState Enhancement (MUSE)-that uses modulation to encode more than two states into a signal.  ... 
doi:10.1109/lcomm.2012.073112.121134 fatcat:ghwo4i4yuzb7jih7m2lokrksia

Shedding Light on RFID Distance Bounding Protocols and Terrorist Fraud Attacks [article]

Pedro Peris-Lopez, Julio C. Hernandez-Castro, Christos Dimitrakakis, Aikaterini Mitrokotsa, Juan M. E. Tapiador
2010 arXiv   pre-print
Distance bounding protocols represent a promising countermeasure to hinder relay attacks.  ...  In 2008, Kim et al. [1] proposed a new distance bounding protocol with the objective of being the best in terms of security, privacy, tag computational overhead and fault tolerance.  ...  The Hitomi RFID Distance Bounding Protocol In this section, a new RFID distance bounding protocol is presented.  ... 
arXiv:0906.4618v2 fatcat:o3orzslvy5bqlgdg5gg4qcxkui

Securing Low-cost RFID Systems: A Research Survey

Qi Chai
2014 International Journal of RFID Security and Cryptography  
RFID (Radio Frequency IDentification) technology has moved from academic obscurity into mainstream business and practice.  ...  This paper provides a general overview of the rather broad area of RFID security and privacy and gives the main citations for the comprehensive understanding and further explorations of this area.  ...  Their key idea is to let the passive verifiers learn the distance bounds while the active verifier executes distance bounding with the prover.  ... 
doi:10.20533/ijrfidsc.2046.3715.2014.0015 fatcat:skq7whrbwffhjf22v6ub672al4

Program

2021 2021 IEEE International Conference on RFID (RFID)  
Results show a good agreement with the different approaches with an error less than 0.5 dB and are only at 3.5 dB from the introduced bound.  ...  A modified k-NN algorithm, described here as a weighted Euclidian distance k-NN algorithm is presented that reduces total error from 41.1 cm to 32.5 cm.  ...  Achieving Multistate Vector Scattering with Unmodified Digital Input/Output Pins Stewart Thomas and James Howe (Bucknell University, USA) This paper studies the potential of multistate vector scattering  ... 
doi:10.1109/rfid52461.2021.9444380 fatcat:4g4yxtwpszh7robhdrzh6blmxa

Security of Distance-Bounding

Gildas Avoine, Jorge Munilla, Alberto Peinado, Kasper Bonne Rasmussen, Dave Singelée, Aslan Tchamkerten, Rolando Trujillo-Rasua, Serge Vaudenay, Muhammed Ali Bingöl, Ioana Boureanu, Srdjan čapkun, Gerhard Hancke (+4 others)
2018 ACM Computing Surveys  
Distance bounding protocols allow a verifier to both authenticate a prover and evaluate whether the latter is located in his vicinity.  ...  This survey analyzes and compares in a unified manner many existing distance bounding protocols with respect to several key security and complexity features.  ...  ., an RFID reader could have such a precise clock but an RFID tag not. Distance-Bounding Based on RTT Both these issues can be addressed using an RTT distance-estimation approach.  ... 
doi:10.1145/3264628 fatcat:cn734ifv5fhczfjjviwexu7cti

Imaging Systems in Assistive Technology [chapter]

Milo Klma, Stanislav Vtek
2012 Assistive Technologies  
It means that fall detection can be simply based on bounding box aspect ratio measurement.  ...  We can list them in the following summary: correction of transfer functions (contrast enhancement) incl. histogram equalization, de-noising, sharpening (edge enhancement), white balance, color system transformation  ... 
doi:10.5772/31519 fatcat:ox2ysc376zh6dc73n6lms5lvja

An RFID Unilateral Distance Bounding Protocol and Analysis Over a Noisy Channel

Rahim Entezari, Hossein Bahramgiri, Mahnaz Tajamolian
2015 unpublished
Distance Bounding (DB) protocols verify that the tag is within a certain distance form reader. This process can be done by measuring the round trip time for message exchange.  ...  form of automatic identification systems used for humans and objects is radio frequency identification (RFID). Fast and almost error-free calculations have led to its wide application in many places.  ...  [17] proposed a generic technique called MUltiState Enhancement (MUSE) that is based on a more efficient use of void challenges. In fact, they extended the void challenges to P-states.  ... 
fatcat:kaqqgppc7jgrxds3c6jjqmvaru

2019 Index IEEE Transactions on Microwave Theory and Techniques Vol. 67

2019 IEEE transactions on microwave theory and techniques  
Shao, Q., +, TMTT Sept. 2019 3617-3627 Design of Multistate Diplexers on Uniform-and Stepped-Impedance Stub-Loaded Resonators.  ...  Vosoogh, A., +, TMTT Sept. 2019 3783-3797 Design of Multistate Diplexers on Uniform-and Stepped-Impedance Stub-Loaded Resonators.  ... 
doi:10.1109/tmtt.2019.2953035 fatcat:hyq2vngaxrcqlggu7bzcbzdyba

2019-2020 Index IEEE Transactions on Industrial Electronics Vol. 67

2020 IEEE transactions on industrial electronics (1982. Print)  
Li, T., +, TIE April 2020 3236-3247 Dual-Mode RFID Tag IC Supporting Gen-2 and Visible RFID Modes Using a Process-Compensating Self-Calibrating Clock Generator.  ...  Zhan, H., +, TIE Dec. 2020 10897-10904 Dual-Mode RFID Tag IC Supporting Gen-2 and Visible RFID Modes Using a Process-Compensating Self-Calibrating Clock Generator.  ... 
doi:10.1109/tie.2020.3045338 fatcat:gljm7ngg3fakvmnfswcbb5vwiu

A Comprehensive Survey on Particle Swarm Optimization Algorithm and Its Applications

Yudong Zhang, Shuihua Wang, Genlin Ji
2015 Mathematical Problems in Engineering  
Elitist mechanism with crowding distance sorting was used to improve the number and diversity of the solutions. Ghanei et al.  ...  [120] intended to propose a hybrid of AIS and PSO-based SVM (HIP-SVM) for optimizing SVM parameters and applied it to radio frequency identification (RFID) based positioning system.  ... 
doi:10.1155/2015/931256 fatcat:ubc5eywnhzdjllxjaywe4czhnm

2021 Index IEEE Internet of Things Journal Vol. 8

2021 IEEE Internet of Things Journal  
Multistation-Based Collaborative Charging Strategy for High-Density Low-Power Sensing Nodes in Industrial Internet of Things.  ...  Gao, Y., +, JIoT Nov. 1, 2021 15785-15795 Passive UHF RFID-Based Knitted Wearable Compression Sensor.  ... 
doi:10.1109/jiot.2022.3141840 fatcat:42a2qzt4jnbwxihxp6rzosha3y

Location privacy: The challenges of mobile service devices

Anne S.Y. Cheung
2014 Computer Law and Security Review  
For a discussion of RFID, see Marcus R. Wigan & Roger Clarke, 'Big Data's Big Unintended Consequences' (2013) 46:6 IEEE Computer 46-53. 3 M.G.  ...  Location and Geo-Location Information The rapid development and enhancement of modern positioning technologies has facilitated the collection of location information, making it possible for us to examine  ... 
doi:10.1016/j.clsr.2013.11.005 fatcat:vezr6pxo2vg3dgbjnl5uq2qima

Communication systems for building automation and control

Wolfgang Kastner, Georg Neugschwandtner, Stefan Soucek, H. Michael Newman
2005 Proceedings of the IEEE  
A segment can contain up to 250 devices and cover a maximum distance of 1000 m (multiple segments are possible).  ...  Network variables are bound via 14-bit unique identifiers (selectors).  ... 
doi:10.1109/jproc.2005.849726 fatcat:n2jag3ezrfbvdju6cvs5idrvsy

Watching Our Children Electronically: A (Post)phenomenology of Classroom Management Software in Schools

Tracy Boger
2018
from a distance.  ...  imposed accountability measures are intended to enhance education, in actuality they appear to skew and obscure educational goals.  ... 
doi:10.7939/r3pc2tr4b fatcat:ebhgvskapbba7dmxwbwdwctone

Recovery of stereopsis in human adults with strabismus through perceptual learning

J. Ding, D. Levi
2010 Journal of Vision  
Does adding black-white alternation to this pattern strengthen 36 Tuesday Talks 7 : Multimodal interactions and multistability feature combination across objects?  ...  A rapid performance enhancement was found that was maximal at around 100 ms post cue onset. This enhancement was followed by a decline, but only when there was competition from distractors.  ...  We measured the shortest distance between the ball and the participants' Posters : Perception and action Thursday 227 racket.  ... 
doi:10.1167/10.7.1124 fatcat:w3a4vu2hybhcvjwfqrryzzilbi
« Previous Showing results 1 — 15 out of 30 results