15,862 Hits in 3.1 sec

RFID Applications and Adoptions in Healthcare: A Review on Patient Safety

Moutaz Haddara, Anna Staaby
2018 Procedia Computer Science  
Through a literature review, this paper attempts to explore the challenges of RFID adoption in healthcare, with a focus on patient safety.  ...  Even though RFID promises several benefits for the healthcare industry, the adoption of RFID technology in the health sector has not been as striking as anticipated and still lags behind compared to other  ...  These security and privacy challenges are amplified by the lack of industrial standards and secure protocols for RFID in healthcare (38) .  ... 
doi:10.1016/j.procs.2018.10.012 pmid:32288898 pmcid:PMC7129262 fatcat:4lhlvfwskvchhkvtd2nbmkjytu

Privacy preserving on Radio Frequency Identification systems

Hua Wang, Lili Sun, Jianming Yong, Yongbing Zhang
2009 2009 13th International Conference on Computer Supported Cooperative Work in Design  
The security and privacy challenges are analysed after a brief introduction of various RFID systems and their associated operations.  ...  This paper focuses on the challenges on the privacy of Radio Frequency Identification (RFID) systems.  ...  Acknowledgement We would like to thank the reviewers' constructive comments on the paper.  ... 
doi:10.1109/cscwd.2009.4968136 dblp:conf/cscwd/WangSYZ09 fatcat:ytel6xee6vgohi3zkpvgydeyoq

RFID Technology in Libraries: A Review of Literature of Indian Perspective

Parul Gupta, Margam Madhusudhan
2016 DESIDOC Journal of Library & Information Technology  
This article is an attempt to assess the potential of these aspects after the implementation of RFID technology and factors responsible for the slow influx of the technology, as revealed in the reported  ...  It is hoped that the present study will help Librarians and Library professionals in improving the return on investment and proving the long-term security of the library.  ...  in the near future.  ... 
doi:10.14429/djlit.37.1.10772 fatcat:u5men6vhg5ebjapmaz2gvzulii

Augmented RFID Technologies for the Internet of Things and Beyond

Luciano Tarricone, Jasmin Grosinger
2020 Sensors  
to future steps being taken that go beyond the current IoT.  ...  such a challenging scenario.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s20040987 pmid:32059516 pmcid:PMC7071111 fatcat:rwsoncvdrvdrpklrjzjpumxlfe

Future RFID technology and applications: visions and challenges

Daqiang Zhang, Hongyu Huang, Minho Jo
2014 Telecommunications Systems  
devices, the leading-edge innovations RFID applications, the business value and performance measurement, and security and privacy attacks.  ...  With massive RFID adoption, RFID presents a series of challenging issues that are significant and should be overcome before enjoying the benefits from RFID.  ...  In the seventh paper, Enabling RFID Technology for Healthcare: Application, Architecture, and Challenges, the authors focus on the application of RFID in the healthcare.  ... 
doi:10.1007/s11235-014-9865-8 fatcat:6cywgvjxvbcuvn5w2jdruwnhuq

Authentication Process between RFID Tag and Mobile Agent Under U-healthcare System

Jung Tae Kim
2014 International Journal of Bio-Science and Bio-Technology  
The strict security needs and requirements of ubiquitous medical applications is a big challenge.  ...  Section III presents model of attacks in U-healthcare system. Section IV provides the security analyses in RFID application under U-healthcare system. Finally, section V made a conclusion.  ...  Debargh Acharya presented an overview of current security threats in pervasive healthcare applications and analyzed the outstanding issues and future challenges [7] .  ... 
doi:10.14257/ijbsbt.2014.6.3.13 fatcat:rvvzd2lfj5eidjbcieoajv3p5q

RFID Technology for the Health Care Sector

Jordi Castella-Roca, Agusti Solanas
2008 Recent Patents on Electrical Engineering  
Then the benefits and barriers to implementing RFID technology are summarized. Finally, suggestions for successful RFID adoption are proposed to aid future RFID applications in health care.  ...  The classification tree structure of RFID research is constructed on the basis of problems faced in health care and the corresponding RFID solutions in order to present a systemic and comprehensive research  ...  By analyzing the benefits and barriers to implementing RFID technology, suggestions for successful RFID adoption are concluded to aid future RFID applications in hospitals.  ... 
doi:10.2174/1874476110801010022 fatcat:yyaeco6cbrg53ou4n7yum42lmu

Internet of Things (IoT) based Smart Environment integrating various Business Applications

Vimal Jerald, Albert Rabara, Daisy Premila
2015 International Journal of Computer Applications  
and the various objects and devices are connected using RFID technology.  ...  It also brings forth an idea of establishing IoT information Kendra which infers and processes the data extracted by the various sectors in the smart environment.  ...  Future Enhancements The future research in IoT may concentrate on the challenges and issues discussed in the paper.  ... 
doi:10.5120/ijca2015906622 fatcat:yokc2wtfcrgbnlz7x25g7hxtz4

A Critical Analysis on the Security Concerns of Internet of Things (IoT)

M. U.Farooq, Muhammad Waseem, Anjum Khairi, Sadia Mazhar
2015 International Journal of Computer Applications  
This paper analyzes the security issues and challenges and provides a well defined security architecture as a confidentiality of the user's privacy and security which could result in its wider adoption  ...  IoT is rapidly developing; however there are uncertainties about its security and privacy which could affect its sustainable development.  ...  Weber, "Internet of Things -New security and privacy challenges," in Computer Law and Security Review (CLSR), 2010, pp. 23-30 -Rodrigo Roman, Pablo Najera and Javier Lopez, "Securing the  ... 
doi:10.5120/19547-1280 fatcat:2y2ku4llujfrdeazrcevbp3hju

An Unconditionally Secure Lightweight RFID Authentication Protocol with Untraceability [chapter]

Hung-Yu Chien
2011 Current Trends and Challenges in RFID  
Our future work is to further analyze and improve the security of unconditional secure RFID protocols. denotes a 2N-bit random number which is drawn uniformly from the * p Z , m denotes that it is used  ...  The security of this protocol mainly relies on the RFID reader's capability to deliver random numbers to RFID tags in an authenticated and secure way.  ...  An Unconditionally Secure Lightweight RFID Authentication Protocol with Untraceability, Current Trends and Challenges in RFID, Prof.  ... 
doi:10.5772/17595 fatcat:unmpegzz7vahdfs5v6wgq7orti

A Novel Concept of Security Authentication As A Service to Enhance RFID Based Manufacturing

Irfan Syamsuddin
2020 Zenodo  
In the next section, a new concept of Cloud RFID Manufacturing is described and argued. Finally, conclusion and future research direction is presented in the last section.  ...  In the future, the research will be enhanced by running the algorithm in cloud simulation environment in order to find out level of adaptivity according to different user's requirements as well as the  ... 
doi:10.5281/zenodo.3787267 fatcat:57bgc72nvne4xdktumcqjkbxeq

Security Vulnerabilities in RFID Networks

Junaid Ahsenali Chaudhry, Malrey Lee
2013 International journal of advanced smart convergence  
At the end of this paper, future security challenges are discussed.  ...  In this paper, the researcher explains existing security challenges in RFID networks then the effects of these threats on security and privacy of RFID are discussed.  ...  By concerning the pervasive usage of RFID in future and the importance of security and privacy for everyone, the decision to select this topic was easy.  ... 
doi:10.7236/ijasc2013.2.2.7 fatcat:lsynrr4srvcttpdredyqjkh57i

A Survey Paper: Implementation of the Internet of Things in Industry

Andi Kurniawan
2020 ITEJ (Information Technology Engineering Journals)  
industry, and identifies trends and research challenges.  ...  In understanding the development of IoT in the industry, the paper reviews the latest IoT research, a survey that compares the use of IoT from several existing papers, the main applications of IoT in the  ...  CHALLENGES AND FUTURE TRENDS It is widely accepted that IoT technology and applications are still in its infancy.  ... 
doi:10.24235/itej.v5i1.42 fatcat:2y4fdkmzgnerdcj5ok37tzeope

A Multilevel Authentication based on the RFID technique for a Multiple Mobile cloud user in Cloud storage: A Survey

2015 International Journal of Research and Applications  
security and privacy challenges in clouds. 4 We also discuss various approaches to address these challenges and explore the future work needed to provide a trustworthy cloud computing environment.  ...  One of the challenges is to construct the cloud computing secure architecture on mobile internet.  ... 
doi:10.17812/ijra.2.8(63)2015 fatcat:z2gzxxx5n5gppj7gc22n466izi

Internetworking Objects with RFID [chapter]

Rune Hylsberg, Qi Zhang, Thomas Skjdebjerg
2011 Deploying RFID - Challenges, Solutions, and Open Issues  
One major challenge in securing RFID tags is a shortage of computational resources within the tag. RFID sensor devices tend to be prone to failure, for example due to battery depletion.  ...  for the future.  ... 
doi:10.5772/18223 fatcat:msdm2rjgtbhprfaxpxgzh4dmhi
« Previous Showing results 1 — 15 out of 15,862 results