Assessment of the degree of RFID tag integration impact on the strength characteristics and performance of drill pipes joint

Author(s):  
V.N. Gnibidin ◽  
◽  
A.A. Podyachev ◽  
Author(s):  
Aakanksha Tewari ◽  
Brij B. Gupta

Internet of Things (IoT) is playing more and more important roles in our daily lives in the last decade. It can be a part of traditional machine or equipment to daily household objects as well as wireless sensor networks and devices. IoT has a huge potential which is still to be unleashed. However, as the foundation of IoT is the Internet and all the data collected by these devices is over the Internet, these devices also face threats to security and privacy. At the physical or sensor layer of IoT devices the most commonly used technology is RFID. Thus, securing the RFID tag by cryptographic mechanisms can secure our data at the device as well as during communication. This article first discusses the flaws of our previous ultra-lightweight protocol due to its vulnerability to passive secret disclosure attack. Then, the authors propose a new protocol to overcome the shortcomings of our previous work. The proposed scheme uses timestamps in addition to bitwise operation to provide security against de-synchronization and disclosure. This research also presents a security and performance analysis of our approach and its comparison with other existing schemes.


2021 ◽  
Author(s):  
Shirley. Gilbert

With recent advancement in Radio Frequency Identification (RFID) technology, in addition to reduction in cost of each unit, security has emerged as a major concern. Since an RFID tag has limited resources like memory, power and processing capabilities, authentication must be provided by encryption and decryption procedures that are lightweight consuming minimal resources. This report investigates some relevant RFID encryption algorithms and their possible implementations with respect to security, cost and performance. A survey and brief comparison of the algorithms are performed and the Tiny Encryption Algorithm (TEA) is selected as a feasible solution for encryption and decryption with an acceptable level of security. TEA is implemented on an FPGA (Field Programmable Gate Array) platform. After investigating several state-of-the-art authentication approaches, two protocols are designed incorporating TEA and implemented using VHDL. Simulations corroborate the functionality of the protocols and the two techniques are compared in terms of timing, cost, security and performance. Potential improvements to enhance the security and strengthen RF communication during authentication are explored.


2021 ◽  
Author(s):  
Shirley. Gilbert

With recent advancement in Radio Frequency Identification (RFID) technology, in addition to reduction in cost of each unit, security has emerged as a major concern. Since an RFID tag has limited resources like memory, power and processing capabilities, authentication must be provided by encryption and decryption procedures that are lightweight consuming minimal resources. This report investigates some relevant RFID encryption algorithms and their possible implementations with respect to security, cost and performance. A survey and brief comparison of the algorithms are performed and the Tiny Encryption Algorithm (TEA) is selected as a feasible solution for encryption and decryption with an acceptable level of security. TEA is implemented on an FPGA (Field Programmable Gate Array) platform. After investigating several state-of-the-art authentication approaches, two protocols are designed incorporating TEA and implemented using VHDL. Simulations corroborate the functionality of the protocols and the two techniques are compared in terms of timing, cost, security and performance. Potential improvements to enhance the security and strengthen RF communication during authentication are explored.


Author(s):  
V. I. Topchii ◽  
I. S. Aftanasiv ◽  
I. G. Svidrak

The paper proposes a fundamentally new method of vibration-centrifugal hardening of internal cylindrical surfaces of long-length steel parts, in particular artillery guns, belonging to a group of methods of surface plastic deformation, and is characterized by providing a significant level of energy for deformation of the material being processed. Artillery cannons, along with a system for targeting shooting guns, are perhaps the most responsible component, which not only provides range and accuracy of the aiming shot, but also regulates the durability of the gun in general. During each of the gun shots, the surface layers of the metal of the channel of its trunk are exposed to the destructive effects of high (up to 10000 °C) temperatures, the chemical action of powder gases, excessive pressures and mechanical wear on the movement of the shell. This leads to the destruction of the structure, strength and density of the metal surface layers, its burning and wear, which in the rest, leads to violations of the geometry of the working surface of the trunk channel. Violation of the geometry of the working surface of the channel of the gun barrel negatively affects the range, and most importantly, the precision of gunfire and other precision related tactical and technical characteristics of gun armament. Excessively worn internal working surface of the canal of the trunk of repair and restoration is practically not subject. This determines the availability of such characteristics for cannon weaponry as the permissible number of gunfire shots, which to a certain extent limits the duration of the effective use of guns. A rather common practice in mechanical engineering is that when the strength characteristics and capabilities of the materials used are practically exhausted, designers and developers draw their views on the technological capabilities to improve the operational properties of parts and units. Not the last position in their list is the reinforcing operations of the surface layers of the material of the details by various methods of surface plastic deformation, widely known in the literary primary sources under the acronym “PPE methods”. The common advantage of the best of a fairly wide variety of varieties (rolling, rolling, smoothing, blasting and vibrating processing, etc.) is that, without substituting the part for energy-intensive high-temperature heating, the strength characteristics and performance properties of the most loaded surface layers of the material of parts are improved. Accordingly, the use in manufacturing processes of the details of PPD methods helps to increase their reliability and longevity. The developed design of the reinforcement on the basis of the proposed method of vibration-centrifugal hardening treatment is used to strengthen the internal cylindrical channels of the trunk of large-caliber artillery cannons. The reinforcement is simple in structure, energy-saving, does not provide for the maintenance of highly skilled service personnel. The solid-state model of the device for the vibration-centrifugal hardening of the internal cylindrical surfaces of steel parts has been created


2015 ◽  
Vol 764-765 ◽  
pp. 1293-1297
Author(s):  
Jium Ming Lin ◽  
Cheng Hung Lin ◽  
Chia Hsien Lin

Five novel ideas are proposed in this paper to integrate an active RFID tag with a thermal convection angular accelerometer on a flexible substrate, thus the new device becomes a wireless sensor. The first innovative idea is that this device is without any movable parts, so it is very reliable. The second new idea is that it is made on a flexible substrate, such as plastic or polyimide, the thermal conductivity of the flexible substrate is much lower than silicon, and thus it can save more power and very useful for mobile operation. The third new idea is to apply xenon gas in the chamber to conduct the heat instead of the traditional carbon dioxide, so no oxidation and performance degradation effects will be produced on the heater and thermal sensors. The fourth new idea is to integrate with an active RFID tag on the same substrate, thus the device becomes a more useful wireless angular acceleration sensor. The final new idea is to apply a hemispherical chamber instead of the conventional rectangular one. From the simulation results one can see it is a good idea to apply a non-floating type angular accelerometer with a hemispherical chamber, the sensitivity performance is the best (395K/(rad/sec2)), and the response speed (693μs) is also comparable to the traditional one by using a floating type with a rectangular chamber (593μs). In summary, from the considerations of reliability, cost and performance, the non-floating type angular accelerometer with hemispherical chamber is a better choice.


2019 ◽  
Vol 8 (4) ◽  
pp. 7137-7142

RFID is one of the most suitable technologies for today’s world. RFID technology is mainly focused for tracking and locating the objects. The objects may be either moving or immovable. Normally RFID communication is based on the RFID Tag and the Reader permutations. The Readers were deployed in different locations for the better communication between the tag and reader. This paper is focused on the structured deployment of RFID readers to form a network using clustering mechanism. The performance of the network will be analyzed by various network attribute such as throughput, Accuracy, Missing tag ratio, Read Rate and Delay. For an efficient communication, the structured deployment of the RFID Reader’s is most important. The clustering method is used for the proper deployment of RFID readers for efficient communication. Cluster is the grouping of RFID readers based on the geographical locations. Every cluster has a cluster head (CH) and these Cluster heads are responsible for every transaction between the cluster to cluster communications. This cluster head have selected according to their energy level and the centrality of the adjunct. This paper detailed how the RFID readers and tags are communicated using the clustering mechanism and performance of the RFID network is analyzed and discuss the results.


Author(s):  
Navjot Kaur ◽  
Diana Segura Velandia ◽  
William Whittow ◽  
David Barwick ◽  
Ehidiamen Iredia ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document