A review of passive self-sensing tag

Sensor Review ◽  
2017 ◽  
Vol 37 (3) ◽  
pp. 338-345 ◽  
Author(s):  
Yawei Xu ◽  
Lihong Dong ◽  
Haidou Wang ◽  
Jiannong Jing ◽  
Yongxiang Lu

Purpose Radio frequency identification tags for passive sensing have attracted wide attention in the area of Internet of Things (IoT). Among them, some tags can sense the property change of objects without an integrated sensor, which is a new trend of passive sensing based on tag. The purpose of this paper is to review recent research on passive self-sensing tags (PSSTs). Design/methodology/approach The PSSTs reported in the past decade are classified in terms of sensing mode, composition and the ways of power supply. This paper presents operation principles of PSSTs and analyzes the characteristics of them. Moreover, the paper focuses on summarizing the latest sensing parameters of PSSTs and their matching equipment. Finally, some potential applications and challenges faced by this emerging technique are discussed. Findings PSST is suitable for long-term and large-scale monitoring compared to conventional sensors because it gets rid of the limitation of battery and has relatively low cost. Also, the static information of objects stored in different PSSTs can be identified by a single reader without touch. Originality/value This paper provides a detailed and timely review of the rapidly growing research in PSST.

2020 ◽  
Vol 63 (8) ◽  
pp. 1271-1271
Author(s):  
Qianqian Su ◽  
Rui Zhang ◽  
Rui Xue

Abstract Modular exponentiation, as a fundamental operation used in many public-key cryptosystems, has always be considered to be very time-consuming. It is difficult for some devices with limited computation capability, such as mobile devices and low-cost radio frequency identification (RFID) tags, to perform large-scale modular exponentiations. In cryptosystems, one typical case of modular exponentiation is that the modulus is a composite number. For instance, in RSA algorithm, the modulus is the product of two distinct prime numbers. In this paper, we investigate how to securely and efficiently outsource composite modular exponentiations and put forward two secure outsourcing algorithms for composite modular exponentiations based on single untrusted cloud. The first algorithm, named MCExp, is designed for outsourcing single composite modular exponentiation, i.e. $u^a$ mod $N$. The second algorithm, named SMCExp, is designed for outsourcing simultaneous composite modular exponentiation, i.e. $\prod ^{n}_{i=1}u^{a_i}_{i}$ mod $N$. Different from algorithms based on two untrusted servers, the proposed algorithms are very practical because they avoid the strong assumption that there must exist two servers without collusion. The proposed algorithms not only protect the privacy of the exponent and the base simultaneously, but also enable users to verify the correctness of the result returned by the cloud with high probability. Compared with using the square-and-multiply algorithm, the user can achieve higher efficiency by using the proposed algorithms. Besides, we prove the security of our algorithms and conduct several experiments to demonstrate the efficiency of the proposed algorithms. Finally, we show that the proposed algorithms can be used to construct the secure outsourcing algorithms for Shamir’s identity-based signature and identity-based multi-signature.


2016 ◽  
Vol 29 (2) ◽  
pp. 236-247 ◽  
Author(s):  
Kaori Kusuda ◽  
Kazuhiko Yamashita ◽  
Akiko Ohnishi ◽  
Kiyohito Tanaka ◽  
Masaru Komino ◽  
...  

Purpose – To prevent malpractices, medical staff has adopted inventory time-outs and/or checklists. Accurate inventory and maintenance of surgical instruments decreases the risk of operating room miscounting and malfunction. In our previous study, an individual management of surgical instruments was accomplished using Radio Frequency Identification (RFID) tags. The purpose of this paper is to evaluate a new management method of RFID-tagged instruments. Design/methodology/approach – The management system of RFID-tagged surgical instruments was used for 27 months in clinical areas. In total, 13 study participants assembled surgical trays in the central sterile supply department. Findings – While using the management system, trays were assembled 94 times. During this period, no assembly errors occurred. An instrument malfunction had occurred after the 19th, 56th, and 73th uses, no malfunction caused by the RFID tags, and usage history had been recorded. Additionally, the time it took to assemble surgical trays was recorded, and the long-term usability of the management system was evaluated. Originality/value – The system could record the number of uses and the defective history of each surgical instrument. In addition, the history of the frequency of instruments being transferred from one tray to another was recorded. The results suggest that our system can be used to manage instruments safely. Additionally, the management system was acquired of the learning effect and the usability on daily maintenance. This finding suggests that the management system examined here ensures surgical instrument and tray assembly quality.


2004 ◽  
Vol 814 ◽  
Author(s):  
Steven K. Volkman ◽  
Yunan Pei ◽  
David Redinger ◽  
Shong Yin ◽  
Vivek Subramanian

AbstractLow-resistance printed conductors are crucial for the development of ultra-low cost electronic systems such as radio frequency identification tags. Low resistance conductors are required to enable the fabrication of high-Q inductors, capacitors, tuned circuits, and interconnects. Furthermore, conductors of appropriate workfunction are also required to enable fabrication of printed Schottky diodes, necessary for rectification in RFID circuits. Last year, we demonstrated the formation of low-resistance conductive printed structures using gold nanoparticles. Here we demonstrate, for the first time, technologies for formation of printed conductors using silver and copper nanoparticles. These are particularly advantageous for several reasons. First, both silver and copper offer a 2X reduction in sheet resistance over gold, resulting in improved interconnect performance and inductor Q. Second, the material costs associated with both silver and copper are expected to be significantly cheaper than gold. Third, the workfunction of silver enables the fabrication of all-printed Schottky diodes with a silver rectifying contact to many common printable organic semiconductors.Solutions of organic-encapsulated silver and copper nanoparticles may be printed and subsequently annealed to form low-resistance conductor patterns. We describe novel processes for forming silver and copper nanoparticles, and discuss the optimization of the printing/annealing processes to demonstrate plastic-compatible low-resistance conductors. By optimizing both the size of the nanoparticle and the encapsulant sublimation kinetics, it is possible to produce particles that anneal at low-temperatures (<150 °C) to form continuous films having low resistivity and appropriate workfunction for formation of rectifying contacts. This represents a major component required for all- printed RFID.


Author(s):  
Aisha Aseeri ◽  
Omaimah Bamasag

Purpose In the past few years, HB-like protocols have gained much attention in the field of lightweight authentication protocols due to their efficient functioning and large potential applications in low-cost radio frequency identification tags, which are on the other side spreading so fast. However, most published HB protocols are vulnerable to man-in-the-middle attacks such as GRS or OOV attacks. The purpose of this research is to investigate security issues pertaining to HB-like protocols with an aim of improving their security and efficiency. Design/methodology/approach In this paper, a new and secure variant of HB family protocols named HB-MP* is proposed and designed, using the techniques of random rotation. The security of the proposed protocol is proven using formal proofs. Also, a prototype of the protocol is implemented to check its applicability, test the security in implementation and to compare its performance with the most related protocol. Findings The HB-MP* protocol is found secure against passive and active adversaries and is implementable within the tight resource constraints of today’s EPC-type RFID tags. Accordingly, the HB-MP* protocol provides higher security than previous HB-like protocols without sacrificing performance. Originality/value This paper proposes a new HB variant called HB-MP* that tries to be immune against the pre-mentioned attacks and at the same time keeping the simple structure. It will use only lightweight operations to randomize the rotation of the secret.


Author(s):  
Han Tao ◽  
Shui Yongan

This chapter overviews a complementary technology to the integrated circuit based radio frequency identification (RFID)---- Surface Acoustic Wave (SAW) based RFID. The fundamental principle and applications of SAW RFID are presented. In order to guarantee the encoding capacity and reliable reading range, the design criteria in coding scheme, tag design and a time domain interrogated reader design are discussed in detail. As an example, a low-cost SAW RFID system applied in poultry farming management is introduced.


Author(s):  
Marcel Papert ◽  
Patrick Rimpler ◽  
Alexander Pflaum

Purpose This work analyzes a pharmaceutical supply chain (PSC) in terms of supply chain visibility (SCV). The current good distribution practice (GDP) guideline demands increased visibility from firms. The purpose of this paper is to propose a solution for SCV enhancements based on automatic identification (Auto-ID) technologies. Design/methodology/approach The authors qualitatively analyze data from ten case studies of actors in a PSC. A review of Auto-ID technologies supports the derivation of solutions to enhance SCV. Findings This work shows that the functionalities of Auto-ID technologies offered by current practical monitoring solutions and challenges created by the GDP guideline necessitate further SCV enhancements. To enhance SCV, the authors propose three solutions: securPharm with passive radio frequency identification tags, transport containers with sensor nodes, and an SCV dashboard. Research limitations/implications This study is limited to a PSC in Germany and is therefore not intended to be exhaustive. Thus, the results serve as a foundation for further analyses. Practical implications This study provides an overview of the functionality of Auto-ID technologies. In juxtaposition with the influence of the GDP guideline, the use of our Auto-ID-based solutions can help to enhance SCV. Originality/value This work analyzes a PSC in Germany, with consideration given to the influence of current legislation. Based on a multiple-case-study design, the authors derive three Auto-ID-based solutions for enhancing SCV.


2020 ◽  
Vol 38 (4) ◽  
pp. 695-710
Author(s):  
Yun-Fang Tu ◽  
Gwo-Jen Hwang

Purpose This study aims to explore the transformation of the roles of libraries, application trends and potential research issues of library-supported mobile learning. Design/methodology/approach The publications in the Scopus database from 2009 to 2018 are reviewed and analyzed from various aspects, such as the roles of libraries in mobile learning, types of libraries, research foci and sensing or location-based technologies. Findings The role of libraries as learning material providers is examined the most in library-supported mobile learning studies, followed by the role as inquiry context providers and as knowledge-sharing platforms. In terms of the role as learning material providers, academic libraries were investigated the most and radio frequency identification (RFID) was mainly adopted. In terms of the role as inquiry context providers, special libraries were explored the most; adopted sensing technologies were more diverse (e.g. QR code, augmented reality, RFID and Global Positioning System). Only special libraries played a role as knowledge-sharing platforms, adopting augmented reality. Most research on library-supported mobile learning mainly focused on investigating the affective domain during mobile learning. Practical implications Five potential applications of educational roles in library-supported mobile learning are suggested based on the findings of the present study. Originality/value The current study provides insights relevant to the educational roles of library-supported mobile learning. The findings and suggestions can serve as references for researchers and school teachers conducting library-supported mobile learning.


Sign in / Sign up

Export Citation Format

Share Document