scholarly journals Reader Scheduling for Tag Population Estimation in Multicategory and Multireader RFID Systems

2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Zhiyong He

Radio Frequency Identification (RFID) technology has been used in numerous applications, e.g., supply chain management and inventory control. This paper focuses on the practically important problem of the rapid estimation of the number of tags in large-scale RFID systems with multiple readers and multicategory RFID tags. RFID readers are often static and have to be deployed strategically after careful planning to cover the entire monitoring area, but reader-to-reader collision (R2Rc) remains a problem. R2Rc decreases the reliability of the estimation of the tag population size, because it results in the failure of communication between the reader and tags. In this paper, we propose a coloring graph-based estimation scheme (CGE), which is the first estimation framework designed for multireader and multicategory RFID systems to determine the distribution of tags in different categories. CGE allows for the use of any estimation protocol to determine the number of tags, prevents R2Rc, and results in higher time efficiency and less power-consumption than the classic scheduling method DCS.

Sensors ◽  
2018 ◽  
Vol 18 (9) ◽  
pp. 2902 ◽  
Author(s):  
Pagán Alexander ◽  
Rania Baashirah ◽  
Abdelshakour Abuzneid

Radio frequency identification (RFID) is a technology that has grown in popularity and in the applications of use. However, there are major issues regarding security and privacy with respect to RFID technology which have caught the interest of many researchers. There are significant challenges which must be overcome to resolve RFID security and privacy issues. One reason is the constraints attached to the provision of security and privacy in RFID systems. Along with meeting the security and privacy needs of RFID technology, solutions must be inexpensive, practical, reliable, scalable, flexible, inter-organizational, and long-lasting. To make RFID identifiers effective and efficient they must identify the item(s) while resisting attacks aimed at obtaining the tag’s information and compromising the system or making it possible to bypass the protection RFID tags are supposed to provide. Different authentication methods have been proposed, researched, and evaluated in the literature. In this work, we proposed our methodology in evaluating RFID authentication, and a few of the most promising authentication methods are reviewed, compared, and ranked in order to arrive at a possible best choice of protocol to use.


Electronics ◽  
2020 ◽  
Vol 9 (11) ◽  
pp. 1951 ◽  
Author(s):  
Jorge Munilla ◽  
Adel Hassan ◽  
Mike Burmester

The term “Internet of Things” was originally coined when radio frequency identification (RFID) technology was being developed to refer to applications where RFID tagged objects and sensors enabled computers to achieve effective situational awareness without human intervention. Currently, this term encompasses a myriad of medium/small devices connected to the Internet. On the other hand, 5G is a key enabling technology that will support next generation wireless communications. Moreover, 5G aims to realize the “Internet of Everything”. Surprisingly, despite the expected relationship between these two technologies, RFID tags have not been properly integrated into 4G and it is not clear if this will change in 5G. RFID is considered as a parallel technology where, at best, it has connection to the core network using back-end servers as gateways between the two technologies. With the aim of overcoming this problem, this paper proposes a 5G compliant RFID protocol that allows RFID tags to act as fully fledged 5G subscribers while taking into account the main characteristics of RFID systems. This proposal leverages the separation between USIM and mobile equipment within the user equipment to implement a 5G compliant protocol where tags accomplish the authentication part, as 5G subscribers, while readers assume the mobile equipment role, carrying out the 5G communication and most of the resource consuming tasks.


2021 ◽  
Vol 13 (7) ◽  
pp. 3684
Author(s):  
Bibiana Bukova ◽  
Jiri Tengler ◽  
Eva Brumercikova

The paper focuses on the environmental burden created by Radio Frequency Identification (RFID) tags in the Slovak Republic (SR). In order to determine the burden there, a model example was created to calculate electronic waste produced by households in the SR by placing RFID tags into municipal waste. The paper presents a legislative regulatory approach towards the environmental impacts from using RFID tags in the SR, as well as an analysis of the environmental burden of using RFID tags throughout the world. The core of the paper is focused on the research conducted in order to calculate the environmental burden of a model household in the SR, where the number of used RFID tags per year was observed; then, the volume of e-waste produced by households of the Slovak Republic per year was determined. In the conclusion, we provide the results of the research presented and discuss including our own proposal for solving the problems connected with the environmental burden of RFID technology.


2017 ◽  
Vol 2017 ◽  
pp. 1-9 ◽  
Author(s):  
Ju-min Zhao ◽  
Ding Feng ◽  
Deng-ao Li ◽  
Wei Gong ◽  
Hao-xiang Liu ◽  
...  

Radio Frequency Identification (RFID) is an emerging technology for electronic labeling of objects for the purpose of automatically identifying, categorizing, locating, and tracking the objects. But in their current form RFID systems are susceptible to cloning attacks that seriously threaten RFID applications but are hard to prevent. Existing protocols aimed at detecting whether there are cloning attacks in single-reader RFID systems. In this paper, we investigate the cloning attacks identification in the multireader scenario and first propose a time-efficient protocol, called the time-efficient Cloning Attacks Identification Protocol (CAIP) to identify all cloned tags in multireaders RFID systems. We evaluate the performance of CAIP through extensive simulations. The results show that CAIP can identify all the cloned tags in large-scale RFID systems fairly fast with required accuracy.


Author(s):  
Perry Forsythe ◽  
Alireza Ahmadian Fard Fini ◽  
Alireza Jalali Yazdi

The full benefit of prefabricated timber systems in the construction of multi-story buildings depends on integration and efficiency in the upstream logistics and supply chain. The purpose of this research is therefore to determine the potential value that the use of Radio-Frequency Identification technology (RFID) can contribute to the prefabricated construction of timber, and to undertake the basic development of a RFID tracking model for this purpose. The methods used in this study not only build on the knowledge gained from previous literature, but also include interviews with industry experts, field trial design and field trials. The research showed that the RFID tracking system's value proposition tends to be strongest where there are large scale and vertically integrated supply chains, logistics complexity between a limited number of discrete but partnered supply chain links and/or internal logistical complexity problems. Therefore, five distinct added value stages of RFID applications have been found in incoming delivery logistics, factory panel production, outgoing delivery logistics, on-site installation and third parties who can inspect the finished construction work. Application of RFID technology in prefabrication factory environments, where fixed readers can be used in predefined processes, was found promising. However, due to the temporary nature of the sites and the associated investment, the capacity for high automation levels is thought to be more limited on site.


2018 ◽  
Vol 2 (12) ◽  
Author(s):  
Gnanesswaran Vettrivel

Radio frequency identification (RFID) system is an automatic data capturing system that relies on remotely retrieving data stored on tags using devices called readers. The National Aeronautics and Space Administration (NASA) and a team of contractors, university researchers and technology vendors collaborated to investigate the reliability of RFID systems for automated crew-free inventory control aboard the ISS. In this manuscript we detail the decade long research accomplishments and the maturity of this RFID technology that is being currently used in Space for inventory management.


2018 ◽  
Vol 10 (9) ◽  
pp. 82
Author(s):  
Masoumeh Safkhani ◽  
Nasour Bagheri ◽  
Mahyar Shariat

Passive Radio Frequency IDentification (RFID) tags are generally highly constrained and cannot support conventional encryption systems to meet the required security. Hence, designers of security protocols may try to achieve the desired security only using limited ultra-lightweight operations. In this paper, we show that the security of such protocols is not provided by using rotation functions. In the following, for an example, we investigate the security of an RFID authentication protocol that has been recently developed using rotation function named ULRAS, which stands for an Ultra-Lightweight RFID Authentication Scheme and show its security weaknesses. More precisely, we show that the ULRAS protocol is vulnerable against de-synchronization attack. The given attack has the success probability of almost ‘1’, with the complexity of only one session of the protocol. In addition, we show that the given attack can be used as a traceability attack against the protocol if the parameters’ lengths are an integer power of 2, e.g., 128. Moreover, we propose a new authentication protocol named UEAP, which stands for an Ultra-lightweight Encryption based Authentication Protocol, and then informally and formally, using Scyther tool, prove that the UEAP protocol is secure against all known active and passive attacks.


2015 ◽  
Vol 2 (2) ◽  
pp. 62-77 ◽  
Author(s):  
Mohammadali Forouzandeh ◽  
Nemai Chandra Karmakar

In the past few years Radio Frequency Identification(RFID)has grown to be one of the most popular technologies in the area of identification systems. Following a brief survey of RFID systems, this paper provides a technical review of work undertaken in the field of time-domain chipless RFID tags and sensors. This paper aims not only to address the chipless tags which use Time Domain Reflectometry (TDR) concept for data encoding but also for the use of Ultra-Wideband Impulse-Radar (UWB-IR) as a time-domain measurement technique. The penultimate section intends to focus on time-domain reading setups and finally, a brief comparison between this method and other chipless techniques is provided.


2021 ◽  
Vol 17 ◽  
pp. 16-21
Author(s):  
Jorge A. Ortega-Contreras ◽  
Yuriy S. Shmaliy ◽  
Jose A. Andrade-Lucio

This paper describes a way to improve the indoor navigation of mobile robots using radio frequency identification (RFID) technology. A net of RFID tags is deployed in the navigation space. A measurement system measures distances from the tags to the robot with in the presence of the firstorder Markov-Gauss colored measurement noise (CMN) and is combined with a digital gyroscope to measure the robot heading. To increase the localization accuracy, the Kalman filter (KF) and unbiased finite impulse response (UFIR) modified for CMN are used. It is shown that the navigation system developed is more accurate than the basic one employing the standard KF and UFIR filter


Author(s):  
Qutubud Din ◽  
Akhtar Sayed ◽  
Fida Husain Yousafzai ◽  
Jiong Yu

Using of this latest RFID (Radio Frequency Identification) technology for an organization to improve the efficiency of organization security and maintain the record automatically. Security is the biggest challenge for everything and everywhere it’s the first priority of organization responsible authorities and they must provide the best way to deal these problems with full confidence. With help of RFID Technology it’s more easy and faster to identify the object is authorized or unauthorized to access or denied from the restricted premises. RFID Technology based on two components RFID Reader (Interrogator) & RFID Tags (Transponder). The tag contains an integrated circuit a unique number that number is assign to the object and it’s become the identification I’D of the object. This is used for processing data, modulating and demodulating the radio frequency signal that is being transmitted to RFID Reader, RFID reader read the tag and send the query to database for comparison of information which are exist in the existing database. The tag information is stored in the database the database is pass the query to micro controller the micro controller is perform operation on the base of object requirement and send back the information to database. The developed software performing functionality automatic and authentic. RFID Tags used as ID (identification number) registered in database is presenting the organization concerned object to allow access to the restricted premises otherwise denied the access inside the organization and saved all movement which pass through at the entrance and provide easily understandable, user-friendly and flexible interface for user. Maintain and update all information automatically. To minimize manually checking and record maintenance headache.


Sign in / Sign up

Export Citation Format

Share Document