A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
Scalable trajectory-based protocol for RFID tags identification
2011
2011 IEEE International Conference on RFID-Technologies and Applications
In this paper, we propose a new scheme for the fast identification of tags based on readers strategically distributed throughout the system. ...
Using the spatial location of tags, our scheme is able to expedite the identification of tags regardless of the identification protocol used. ...
In consequence, protocols based on key updating, in general, are not suitable for a distributed architecture. ...
doi:10.1109/rfid-ta.2011.6068650
dblp:conf/rfidta/Trujillo-RasuaS11
fatcat:puipr4zurvdybgh3ltvie6ddva
Predictive protocol for the scalable identification of RFID tags through collaborative readers
2012
Computers in industry (Print)
In this article, we propose a private and scalable protocol for RFID collaborative readers to securely identify RFID tags. ...
We define the general concepts of "next reader predictor" (NRP) and "previous reader predictor" (PRP) used by the readers to predict the trajectories of tags and collaborate efficiently. ...
To the best of our knowledge this is the first time that a predictive algorithm for collaborative readers based on trajectories is used to successfully speed up the identification process of RFID tags. ...
doi:10.1016/j.compind.2012.03.005
fatcat:n2z57d7zxrhaba22mx5gwmikhq
Privacy in RFID and mobile objects
[article]
2013
arXiv
pre-print
Assuming the existence of a lightweight, secure, private and scalable RFID identification protocol, there exist other concerns surrounding the RFID technology. ...
However, since tags are resource-constrained devices sending identification data wirelessly, designing secure and private RFID identification protocols is a challenging task. ...
Predictive protocol for the scalable identification of RFID tags: We improve the state-of-the-art of RFID identification schemes based on collaborative readers by proposing a protocol that predicts future ...
arXiv:1310.5476v1
fatcat:7lz5b242z5ht5hwzso4qffdojm
2020 Index IEEE Journal of Radio Frequency Identification Vol. 4
2020
IEEE Journal of Radio Frequency Identification
Rayhana, R., +, JRFID Sept. 2020 195-211 Cryptographic protocols Serial-Dependency Grouping-Proof Protocol for RFID EPC Gen2 Tags. ...
Rayhana, R., +, JRFID Sept. 2020 195-211 Data privacy Serial-Dependency Grouping-Proof Protocol for RFID EPC Gen2 Tags. ...
doi:10.1109/jrfid.2020.3040922
fatcat:cyb42wfc7zfanlmxna2gn2ubke
Machine Learning Techniques in RFID Datasets
2020
International journal of recent technology and engineering
A widespread application of RFID networks based on automatic data capture technology is supply chain management. ...
tagged objects. ...
This approach also overcomes all the disadvantages of the fixed window protocol for filtering RFID data. ...
doi:10.35940/ijrte.f9052.038620
fatcat:opsqzsoczbeuvgfkwzlcs5aoby
Review on security issues in RFID systems
2017
Advances in Science, Technology and Engineering Systems
Radio frequency Identification (RFID) is currently considered as one of the most used technologies for an automatic identification of objects or people. ...
Based on a combination of tags and readers, RFID technology has widely been applied in various areas including supply chain, production and traffic control systems. ...
Application domains
Animal tracking RFID tagging systems are considered as powerful tools for animal identification management and tracking. ...
doi:10.25046/aj020624
fatcat:letskv4rencurmxjxp32hblvrm
RFID-based Information System for Patients and Medical Staff Identification and Tracking
[chapter]
2010
Sustainable Radio Frequency Identification Solutions
Next we present a short "state of the art" of the RFID-based healthcare applications. Patient Identification ...
One study estimates that the market for RFID tags and systems in healthcare will rise rapidly from $90 million in 2006 to $2.1 billion in 2016. ...
RFID-based information system for patients and medical staff identification and tracking Our team proposed an integrated RFID-based system for patients and medical staff identification and tracking, called ...
doi:10.5772/8015
fatcat:wqbcpsjv6nfw5dfapjnfkeuyma
RFID Applications and Security Review
2021
Computation
Radio frequency identification (RFID) is widely used in several contexts, such as logistics, supply chains, asset tracking, and health, among others, therefore drawing the attention of many researchers ...
This paper presents a review of the most cited topics regarding RFID focused on applications, security, and privacy. ...
Additionally, protocols implement new methods for ensuring privacy for tag owners, and allowing secure, private, and scalable ownershiptransfer [227] . ...
doi:10.3390/computation9060069
fatcat:obj6ws6g3vf2jnjkemwm4zlkqi
A Computational Architecture Based on RFID Sensors for Traceability in Smart Cities
2015
Sensors
In order to accomplish these tasks, we propose the design of a smart sensor network based on RFID communication technologies, reliability patterns and integration techniques. ...
In this paper, we present a novel distributed system for obtaining, representing and providing the flow and movement of people in densely populated geographical areas. ...
Acknowledgments We would like to express our acknowledgement to the RFID Controls Company for proving the necessary infrastructure to make possible the experimentation. ...
doi:10.3390/s150613591
pmid:26067195
pmcid:PMC4507584
fatcat:okcpjttvjzapzl2cj5sscbdstq
An access control model for mobile physical objects
2010
Proceeding of the 15th ACM symposium on Access control models and technologies - SACMAT '10
RFID tags. ...
In this paper we propose a new access control model as an extension to attribute-based access control that allows trajectory-based visibility policies. ...
Adopting cryptographic primitives on the RFID tag seems to be the only solution. Second, our authentication protocol may reveal the entire trajectory to a player. ...
doi:10.1145/1809842.1809873
dblp:conf/sacmat/Kerschbaum10
fatcat:cxueeo5tw5debbw3dpytgryfye
GOSSIPY: A distributed localization system for Internet of Things using RFID technology
2013
2013 IEEE Global Communications Conference (GLOBECOM)
In this paper, we propose the GOSSIPY system for localizing mobile RFID tags using a group of ad hoc heterogeneous mobile RFID readers. ...
Readers in a neighborhood share interrogation information, estimate tag locations accordingly and employ both proactive and reactive protocols to ensure timely dissemination of location information. ...
available mobile RFID infrastructure in place for localization, and
3) Sustain robustness and scalability. ...
doi:10.1109/glocom.2013.6831061
dblp:conf/globecom/EslimIH13
fatcat:rlmqndlljvdrbm4dns3pkgzugq
Tracer: Taming Anomalous Events with CRFID Tags for Trajectory Management
2013
International Journal of Distributed Sensor Networks
Among variant devices for trace detection, computational radio frequency identification (CRFID) tags are promising to draw precise trajectory from the data reported by their accelerometers. ...
In this paper, we propose to employ CRFID tags as tagging devices and develop a working system, Tracer, for precise trajectory detection. ...
Acknowledgments The authors thank the anonymous reviewers for their insightful comments and feedbacks. ...
doi:10.1155/2013/148353
fatcat:dbirvv6zojakhlwixzvy6nbr4y
CPS-Based Smart Warehouse for Industry 4.0: A Survey of the Underlying Technologies
2018
Computers
Finally, we point out some challenging issues in the future CPS-based smart warehouse, which could open some new research directions. ...
Third, human activity recognition: human activity recognition can be applied in human-computer interaction for remote machine operations. ...
There are two types of tag identification protocols: Aloha-based protocols and tree-based protocols. The Aloha-based protocol is a kind of Time Division Multiple Access (TDMA) mechanism. ...
doi:10.3390/computers7010013
fatcat:wa73qiue4jetjf2v2ngukxh3jy
USING RFID TECHNOLOGY AT OPERATING A DRONE SWARMS IN COMMUNICATION SYSTEM MODE
2020
Information and Telecommunication Sciences
The procedure for exchange of control commands in a swarm using RFID is described. ...
Currently, of great interest for developers of modern distributed electronic communications systems are communication architectures based on a swarm (a connected set of separate mobile devices-nodes) of ...
In [28] , a new collision avoidance algorithm for IoT is proposed, which is called the UAV-based multiple tags anti-collision protocol (UMTAP). ...
doi:10.20535/2411-2976.22020.16-23
fatcat:qetjajheyrfj3dt66q4ps7chma
Managing RFID Data: Challenges, Opportunities and Solutions
2014
IEEE Communications Surveys and Tutorials
The advances of Radio-Frequency Identification (RFID) technology have significantly enhanced the capability of capturing data from pervasive space. ...
We investigate the research progress in RFID with anti-collision algorithms, authentication and privacy protection protocols, localization and activity sensing, as well as performance tuning in realistic ...
Disadvantages For the query tree-based algorithms, the delay for tag identification is subject to the length and distribution of tag IDs. ...
doi:10.1109/surv.2014.022614.00143
fatcat:dmqiy5uutne53iqljc5pgobd6i
« Previous
Showing results 1 — 15 out of 615 results