Minimum Time Extrema Estimation for Large-Scale Radio-Frequency Identification Systems

2020 ◽  
Vol 35 (5) ◽  
pp. 1099-1114
Author(s):  
Xiao-Jun Zhu ◽  
Li-Jie Xu ◽  
Xiao-Bing Wu ◽  
Bing Chen
2017 ◽  
Vol 2017 ◽  
pp. 1-9 ◽  
Author(s):  
Ju-min Zhao ◽  
Ding Feng ◽  
Deng-ao Li ◽  
Wei Gong ◽  
Hao-xiang Liu ◽  
...  

Radio Frequency Identification (RFID) is an emerging technology for electronic labeling of objects for the purpose of automatically identifying, categorizing, locating, and tracking the objects. But in their current form RFID systems are susceptible to cloning attacks that seriously threaten RFID applications but are hard to prevent. Existing protocols aimed at detecting whether there are cloning attacks in single-reader RFID systems. In this paper, we investigate the cloning attacks identification in the multireader scenario and first propose a time-efficient protocol, called the time-efficient Cloning Attacks Identification Protocol (CAIP) to identify all cloned tags in multireaders RFID systems. We evaluate the performance of CAIP through extensive simulations. The results show that CAIP can identify all the cloned tags in large-scale RFID systems fairly fast with required accuracy.


2019 ◽  
Vol 24 (2) ◽  
pp. 142-155 ◽  
Author(s):  
Chengcheng Wang ◽  
Zhongzhi Xu ◽  
Ronghua Du ◽  
Haifeng Li ◽  
Pu Wang

2018 ◽  
Vol 14 (4) ◽  
pp. 155014771877128 ◽  
Author(s):  
Jinkai Liu ◽  
Yanqing Qiu ◽  
Kezhao Yin ◽  
Wentong Dong ◽  
Jiaqing Luo

The radio frequency identification technology was given greater interest as it is widely used for identification and localization in the cognitive radio sensor networks. While radio frequency identification–based indoor localization is attractive, the need for a large-scale and high-density deployment of readers and reference tags is costly. Using mobile readers mounted on guide rails, we design and implement an RFID indoor localization system, which requires neither reference tags nor received signal strength indicator functions, for stock-taking and searching in warehouse operations. In particular, we install two guide rails, which can allow a reader to move horizontally or vertically, on the ceiling of a warehouse or workshop. We then propose a continuous scanning algorithm to improve the accuracy for locating a single tagged object and a category-based scheduling algorithm to shorten the time for locating multiple tagged objects. Our primary experimental results show that RFID indoor localization system can achieve high time efficiency and localization accuracy in the indoor localization.


Sensors ◽  
2019 ◽  
Vol 19 (13) ◽  
pp. 2957 ◽  
Author(s):  
Feng Zhu ◽  
Peng Li ◽  
He Xu ◽  
Ruchuan Wang

Radio frequency identification is one of the key techniques for Internet of Things, which has been widely adopted in many applications for identification. However, there exist various security and privacy issues in radio frequency identification (RFID) systems. Particularly, one of the most serious threats is to clone tags for the goal of counterfeiting goods, which causes great loss and danger to customers. To solve these issues, lots of authentication protocols are proposed based on physical unclonable functions that can ensure an anti-counterfeiting feature. However, most of the existing schemes require secret parameters to be stored in tags, which are vulnerable to physical attacks that can further lead to the breach of forward secrecy. Furthermore, as far as we know, none of the existing schemes are able to solve the security and privacy problems with good scalability. Since many existing schemes rely on exhaustive searches of the backend server to validate a tag and they are not scalable for applications with a large scale database. Hence, in this paper, we propose a lightweight RFID mutual authentication protocol with physically unclonable functions (PUFs). The performance analysis shows that our proposed scheme can ensure security and privacy efficiently in a scalable way.


Author(s):  
C.K. Shyamala ◽  
Anand K Rajagopalan

Automatic identification systems represent a wide classification of devices used primarily in commercial settings for inventory/logistics control. Familiar examples of such devices are bar codes, magnetic strips, smart cards, RFID (Radio frequency identification) and biometric and voice recognition. Security is especially lax in low powered RF (radio frequency) systems communicating through an unsecured radio wave channel. Security represents a critical component for enabling the large scale adoption of automatic identification systems. Providing an effective security solution for low powered systems is a major area of concern; it directs research towards ‘power consumption aware’ computations in security solutions. This paper proposes a Lightweight Inter-Zonal Authentication Protocol for moving objects in low powered RF systems. Formal validation and a thorough analysis of the protocol in SPAN security tool reveals its effectiveness and resiliency to attacks – eaves dropping, reader and tag impersonation, replay and desynchronization.


2020 ◽  
Vol 10 (10) ◽  
pp. 3623 ◽  
Author(s):  
Jaehun Park ◽  
Yong-Jeong Kim ◽  
Byung Kwon Lee

Radio-frequency identification (RFID) technology-based real-time indoor location awareness has been widely studied. In this paper, a passive RFID-based indoor inventory localization method for small and medium-sized enterprises (SMEs) is proposed to effectively manage their indoor inventory tracking in terms of the multi-stacking racking (MSR). To achieve this, we introduce a concept of reference tags and a calculation of measurement for the distance between the RFID reader and reference tag to improve the accuracy of the item location recognition. To illustrate the efficacy and applicability of the method, an empirical case study that applies it to an electronic device manufacturing company is conducted. It was noted that there was no significant difference in the location awareness rate of the proposed system compared with the existing active RFID-based methods. Also, it is demonstrated that the construction can be relatively inexpensive in terms of identifying the location of the items loaded in MSR and relatively narrow areas using a passive tag. This advantage makes it suitable for SMEs that have issues with large-scale facility investment, applying the method to compare the location difference between the registered location information in the inventory system and the actual location of the item in the rack.


Author(s):  
Arunabh Chattopadhyay ◽  
Jérémy Stentz ◽  
Rajit Gadh

A web-based architecture of an radio frequency identification (RFID) tracking solution is proposed and deployed. The architecture attempts to depart from the typical localized approach of most RFID middlewares. The middleware has been replaced by a web service residing in a cloud. The traditional roles of the middleware such as tag data filtering, sorting, storage, and event processing have been redistributed amongst an RFID reader-based application and the web service. This architecture provides more flexibility and control to large scale RFID-based supply chain operations which are global in nature and unsuitable to the traditional localized middleware-based architecture of RFID tracking solutions. The feasibility of the web-based architecture is further augmented by validating performance parameters such as tag processing and primitive and complex event processing delay. Different subarchitectures are also proposed based on performance data for different scales of operations.


2020 ◽  
Vol 2 (3) ◽  
pp. 106-116
Author(s):  
C. K. Shyamala ◽  
Anand K. Rajagopalan

Automatic identification systems represent a wide classification of devices used primarily in commercialsettings for inventory/logistics control. Familiar examples of such devices are bar codes, magnetic strips, smartcards, RFID (Radio frequency identification) and biometric and voice recognition. Security is especially lax in low powered RF (radio frequency) systems communicating through an unsecured radio wave channel. Security represents a critical component for enabling the large scale adoption of automatic identification systems. Providing an effective security solution for low powered systems is a major area of concern; it directs research towards ‘power consumption aware’ computations in security solutions. This paper proposes a Lightweight Inter-Zonal Authentication Protocol for moving objects in low powered RF systems. Formal validation and a thorough analysis of the protocol in SPAN security tool reveals its effectiveness and resiliency to attacks–eaves dropping, reader and tag impersonation, replay and desynchronization.


Sign in / Sign up

Export Citation Format

Share Document