615 Hits in 5.1 sec

Scalable trajectory-based protocol for RFID tags identification

Rolando Trujillo-Rasua, Agusti Solanas
2011 2011 IEEE International Conference on RFID-Technologies and Applications  
In this paper, we propose a new scheme for the fast identification of tags based on readers strategically distributed throughout the system.  ...  Using the spatial location of tags, our scheme is able to expedite the identification of tags regardless of the identification protocol used.  ...  In consequence, protocols based on key updating, in general, are not suitable for a distributed architecture.  ... 
doi:10.1109/rfid-ta.2011.6068650 dblp:conf/rfidta/Trujillo-RasuaS11 fatcat:puipr4zurvdybgh3ltvie6ddva

Predictive protocol for the scalable identification of RFID tags through collaborative readers

Rolando Trujillo-Rasua, Agusti Solanas, Pablo A. Pérez-Martínez, Josep Domingo-Ferrer
2012 Computers in industry (Print)  
In this article, we propose a private and scalable protocol for RFID collaborative readers to securely identify RFID tags.  ...  We define the general concepts of "next reader predictor" (NRP) and "previous reader predictor" (PRP) used by the readers to predict the trajectories of tags and collaborate efficiently.  ...  To the best of our knowledge this is the first time that a predictive algorithm for collaborative readers based on trajectories is used to successfully speed up the identification process of RFID tags.  ... 
doi:10.1016/j.compind.2012.03.005 fatcat:n2z57d7zxrhaba22mx5gwmikhq

Privacy in RFID and mobile objects [article]

Rolando Trujillo-Rasua
2013 arXiv   pre-print
Assuming the existence of a lightweight, secure, private and scalable RFID identification protocol, there exist other concerns surrounding the RFID technology.  ...  However, since tags are resource-constrained devices sending identification data wirelessly, designing secure and private RFID identification protocols is a challenging task.  ...  Predictive protocol for the scalable identification of RFID tags: We improve the state-of-the-art of RFID identification schemes based on collaborative readers by proposing a protocol that predicts future  ... 
arXiv:1310.5476v1 fatcat:7lz5b242z5ht5hwzso4qffdojm

2020 Index IEEE Journal of Radio Frequency Identification Vol. 4

2020 IEEE Journal of Radio Frequency Identification  
Rayhana, R., +, JRFID Sept. 2020 195-211 Cryptographic protocols Serial-Dependency Grouping-Proof Protocol for RFID EPC Gen2 Tags.  ...  Rayhana, R., +, JRFID Sept. 2020 195-211 Data privacy Serial-Dependency Grouping-Proof Protocol for RFID EPC Gen2 Tags.  ... 
doi:10.1109/jrfid.2020.3040922 fatcat:cyb42wfc7zfanlmxna2gn2ubke

Machine Learning Techniques in RFID Datasets

2020 International journal of recent technology and engineering  
A widespread application of RFID networks based on automatic data capture technology is supply chain management.  ...  tagged objects.  ...  This approach also overcomes all the disadvantages of the fixed window protocol for filtering RFID data.  ... 
doi:10.35940/ijrte.f9052.038620 fatcat:opsqzsoczbeuvgfkwzlcs5aoby

Review on security issues in RFID systems

Mohamed El Beqqal, Mostafa Azizi
2017 Advances in Science, Technology and Engineering Systems  
Radio frequency Identification (RFID) is currently considered as one of the most used technologies for an automatic identification of objects or people.  ...  Based on a combination of tags and readers, RFID technology has widely been applied in various areas including supply chain, production and traffic control systems.  ...  Application domains Animal tracking RFID tagging systems are considered as powerful tools for animal identification management and tracking.  ... 
doi:10.25046/aj020624 fatcat:letskv4rencurmxjxp32hblvrm

RFID-based Information System for Patients and Medical Staff Identification and Tracking [chapter]

Tudor Ioan, Cristina Turcu, Cornel Turcu, Marius Cerlinc
2010 Sustainable Radio Frequency Identification Solutions  
Next we present a short "state of the art" of the RFID-based healthcare applications. Patient Identification  ...  One study estimates that the market for RFID tags and systems in healthcare will rise rapidly from $90 million in 2006 to $2.1 billion in 2016.  ...  RFID-based information system for patients and medical staff identification and tracking Our team proposed an integrated RFID-based system for patients and medical staff identification and tracking, called  ... 
doi:10.5772/8015 fatcat:wqbcpsjv6nfw5dfapjnfkeuyma

RFID Applications and Security Review

Cesar Munoz-Ausecha, Juan Ruiz-Rosero, Gustavo Ramirez-Gonzalez
2021 Computation  
Radio frequency identification (RFID) is widely used in several contexts, such as logistics, supply chains, asset tracking, and health, among others, therefore drawing the attention of many researchers  ...  This paper presents a review of the most cited topics regarding RFID focused on applications, security, and privacy.  ...  Additionally, protocols implement new methods for ensuring privacy for tag owners, and allowing secure, private, and scalable ownershiptransfer [227] .  ... 
doi:10.3390/computation9060069 fatcat:obj6ws6g3vf2jnjkemwm4zlkqi

A Computational Architecture Based on RFID Sensors for Traceability in Smart Cities

Higinio Mora-Mora, Virgilio Gilart-Iglesias, David Gil, Alejandro Sirvent-Llamas
2015 Sensors  
In order to accomplish these tasks, we propose the design of a smart sensor network based on RFID communication technologies, reliability patterns and integration techniques.  ...  In this paper, we present a novel distributed system for obtaining, representing and providing the flow and movement of people in densely populated geographical areas.  ...  Acknowledgments We would like to express our acknowledgement to the RFID Controls Company for proving the necessary infrastructure to make possible the experimentation.  ... 
doi:10.3390/s150613591 pmid:26067195 pmcid:PMC4507584 fatcat:okcpjttvjzapzl2cj5sscbdstq

An access control model for mobile physical objects

Florian Kerschbaum
2010 Proceeding of the 15th ACM symposium on Access control models and technologies - SACMAT '10  
RFID tags.  ...  In this paper we propose a new access control model as an extension to attribute-based access control that allows trajectory-based visibility policies.  ...  Adopting cryptographic primitives on the RFID tag seems to be the only solution. Second, our authentication protocol may reveal the entire trajectory to a player.  ... 
doi:10.1145/1809842.1809873 dblp:conf/sacmat/Kerschbaum10 fatcat:cxueeo5tw5debbw3dpytgryfye

GOSSIPY: A distributed localization system for Internet of Things using RFID technology

Lobna M. Eslim, Walid M. Ibrahim, Hossam S. Hassanein
2013 2013 IEEE Global Communications Conference (GLOBECOM)  
In this paper, we propose the GOSSIPY system for localizing mobile RFID tags using a group of ad hoc heterogeneous mobile RFID readers.  ...  Readers in a neighborhood share interrogation information, estimate tag locations accordingly and employ both proactive and reactive protocols to ensure timely dissemination of location information.  ...  available mobile RFID infrastructure in place for localization, and 3) Sustain robustness and scalability.  ... 
doi:10.1109/glocom.2013.6831061 dblp:conf/globecom/EslimIH13 fatcat:rlmqndlljvdrbm4dns3pkgzugq

Tracer: Taming Anomalous Events with CRFID Tags for Trajectory Management

Rui Li, Jinsong Han, Zhi Wang, Jizhong Zhao, Yihong Gong, Xiaobin Zhang
2013 International Journal of Distributed Sensor Networks  
Among variant devices for trace detection, computational radio frequency identification (CRFID) tags are promising to draw precise trajectory from the data reported by their accelerometers.  ...  In this paper, we propose to employ CRFID tags as tagging devices and develop a working system, Tracer, for precise trajectory detection.  ...  Acknowledgments The authors thank the anonymous reviewers for their insightful comments and feedbacks.  ... 
doi:10.1155/2013/148353 fatcat:dbirvv6zojakhlwixzvy6nbr4y

CPS-Based Smart Warehouse for Industry 4.0: A Survey of the Underlying Technologies

2018 Computers  
Finally, we point out some challenging issues in the future CPS-based smart warehouse, which could open some new research directions.  ...  Third, human activity recognition: human activity recognition can be applied in human-computer interaction for remote machine operations.  ...  There are two types of tag identification protocols: Aloha-based protocols and tree-based protocols. The Aloha-based protocol is a kind of Time Division Multiple Access (TDMA) mechanism.  ... 
doi:10.3390/computers7010013 fatcat:wa73qiue4jetjf2v2ngukxh3jy


Serhii Kravchuk, Irina Kravchuk
2020 Information and Telecommunication Sciences  
The procedure for exchange of control commands in a swarm using RFID is described.  ...  Currently, of great interest for developers of modern distributed electronic communications systems are communication architectures based on a swarm (a connected set of separate mobile devices-nodes) of  ...  In [28] , a new collision avoidance algorithm for IoT is proposed, which is called the UAV-based multiple tags anti-collision protocol (UMTAP).  ... 
doi:10.20535/2411-2976.22020.16-23 fatcat:qetjajheyrfj3dt66q4ps7chma

Managing RFID Data: Challenges, Opportunities and Solutions

Lei Xie, Yafeng Yin, Athanasios V. Vasilakos, Sanglu Lu
2014 IEEE Communications Surveys and Tutorials  
The advances of Radio-Frequency Identification (RFID) technology have significantly enhanced the capability of capturing data from pervasive space.  ...  We investigate the research progress in RFID with anti-collision algorithms, authentication and privacy protection protocols, localization and activity sensing, as well as performance tuning in realistic  ...  Disadvantages For the query tree-based algorithms, the delay for tag identification is subject to the length and distribution of tag IDs.  ... 
doi:10.1109/surv.2014.022614.00143 fatcat:dmqiy5uutne53iqljc5pgobd6i
« Previous Showing results 1 — 15 out of 615 results