scholarly journals RFID Applications and Security Review

Computation ◽  
2021 ◽  
Vol 9 (6) ◽  
pp. 69
Author(s):  
Cesar Munoz-Ausecha ◽  
Juan Ruiz-Rosero ◽  
Gustavo Ramirez-Gonzalez

Radio frequency identification (RFID) is widely used in several contexts, such as logistics, supply chains, asset tracking, and health, among others, therefore drawing the attention of many researchers. This paper presents a review of the most cited topics regarding RFID focused on applications, security, and privacy. A total of 62,685 records were downloaded from the Web of Science (WoS) and Scopus core databases and processed, reconciling the datasets to remove duplicates, resulting in 40,677 unique elements. Fundamental indicators were extracted and are presented, such as the citation number, average growth rate, and average number of documents per year. We extracted the top topics and reviewed the relevant indicators using a free Python tool, ScientoPy. The results are discussed in the following sections: the first is the Applications Section, whose subsections are the Internet of Things (IoT), Supply Chain Management, Localization, Traceability, Logistics, Ubiquitous Computing, Healthcare, and Access Control; the second is the Security and Privacy section, whose subsections are Authentication, Privacy, and Ownership Transfer; finally, we present the Discussion section. This paper intends to provide the reader with a global view of the current status of trending RFID topics and present different analyses from different perspectives depending on motivations or background.

2015 ◽  
pp. 1884-1902
Author(s):  
Konstantinos Mourtzoukos ◽  
Nikos Kefalakis ◽  
John Soldatos

Despite the proliferation of RFID (Radio Frequency Identification) applications, there are still only a limited number of open-loop inter-enterprise applications that address global supply chains. The implementation of such inter-enterprise applications hinges on standards and techniques for discovering and accessing RFID tagged objects across different repositories of RFID information residing across different administrative domains. In this chapter, the authors introduce an open and novel implementation of an ONS (Object Naming Service) solution for inter-enterprise tracking and tracing RFID applications. The solution is part of the open source AspireRFID project and provides a sound basis for integrating tracking (“google-of-things” like) applications for the RFID and the Internet-of-Things (IoT). As part of the presentation of the solution, this chapter illustrates the main challenges associated with the integration of inter-enterprise applications, along with strategies for confronting them.


Author(s):  
Konstantinos Mourtzoukos ◽  
Nikos Kefalakis ◽  
John Soldatos

Despite the proliferation of RFID (Radio Frequency Identification) applications, there are still only a limited number of open-loop inter-enterprise applications that address global supply chains. The implementation of such inter-enterprise applications hinges on standards and techniques for discovering and accessing RFID tagged objects across different repositories of RFID information residing across different administrative domains. In this chapter, the authors introduce an open and novel implementation of an ONS (Object Naming Service) solution for inter-enterprise tracking and tracing RFID applications. The solution is part of the open source AspireRFID project and provides a sound basis for integrating tracking (“google-of-things” like) applications for the RFID and the Internet-of-Things (IoT). As part of the presentation of the solution, this chapter illustrates the main challenges associated with the integration of inter-enterprise applications, along with strategies for confronting them.


2018 ◽  
Vol 3 (1) ◽  
pp. 22-32 ◽  
Author(s):  
Ernest Ezema ◽  
Azizol Abdullah ◽  
Nor Fazlida Binti Mohd

The concept of the Internet of Things (IoT) has evolved over time. The introduction of the Internet of Things and Services into the manufacturing environment has ushered in a fourth industrial revolution: Industry 4.0. It is no doubt that the world is undergoing constant transformations that somehow change the trajectory and history of humanity. We can illustrate this with the first and second industrial revolutions and the information revolution. IoT is a paradigm based on the internet that comprises many interconnected technologies like RFID (Radio Frequency Identification) and WSAN (Wireless Sensor and Actor Networks) to exchange information. The current needs for better control, monitoring and management in many areas, and the ongoing research in this field, have originated the appearance and creation of multiple systems like smart-home, smart-city and smart-grid. The IoT services can have centralized or distributed architecture. The centralized approach provides is where central entities acquire, process, and provide information while the distributed architectures, is where entities at the edge of the network exchange information and collaborate with each other in a dynamic way. To understand the two approaches, it is necessary to know its advantages and disadvantages especially in terms of security and privacy issues. This paper shows that the distributed approach has various challenges that need to be solved. But also, various interesting properties and strengths. In this paper we present the main research challenges and the existing solutions in the field of IoT security, identifying open issues, the industrial revolution and suggesting some hints for future research.


Sensors ◽  
2018 ◽  
Vol 18 (10) ◽  
pp. 3584 ◽  
Author(s):  
Rania Baashirah ◽  
Abdelshakour Abuzneid

Radio Frequency Identification (RFID) is one of the leading technologies in the Internet of Things (IoT) to create an efficient and reliable system to securely identify objects in many environments such as business, health, and manufacturing areas. Recent RFID authentication protocols have been proposed to satisfy the security features of RFID communication. In this article, we identify and review some of the most recent and enhanced authentication protocols that mainly focus on the authentication between a reader and a tag. However, the scope of this survey includes only passive tags protocols, due to the large scale of the RFID framework. We examined some of the recent RFID protocols in term of security requirements, computation, and attack resistance. We conclude that only five protocols resist all of the major attacks, while only one protocol satisfies all of the security requirements of the RFID system.


2021 ◽  
Vol 21 (4) ◽  
pp. 316-321
Author(s):  
Abdul Basit ◽  
Muhammad Irfan Khattak ◽  
Ayman Althuwayb ◽  
Jamel Nebhen

In this article, a simple method is developed to design a highly miniaturized tri-band bandpass filter (BPF) utilizing two asymmetric coupled resonators with one step discontinuity and one uniform impedance resonator (UIR) for worldwide interoperability for microwave access (WiMAX) and radio frequency identification (RFID) applications. The first and second passbands located at 3.7 GHz and 6.6 GHz are achieved through two asymmetric coupled step impedance resonators (SIRs), while the third passband, centered at 9 GHz, is achieved using a half-wavelength UIR, respectively. The fundamental frequencies of this BPF are implemented by tuning the physical length ratio (α) and impedance ratio (R) of the asymmetric SIRs. The proposed filter is designed and fabricated with a circuit dimension of 13.69 mm × 25 mm (0.02 λg × 0.03 λg), where λg represents the guided wavelength at the first passband. The experimental and measured results are provided with good matching.


2021 ◽  
pp. 1-10
Author(s):  
Jintao Tang ◽  
Lvqing Yang ◽  
Jiangsheng Zhao ◽  
Yishu Qiu ◽  
Yihui Deng

With the development of the Internet of Things and Radio Frequency Identification (RFID), indoor positioning technology as an important part of positioning technology, has been attracting much attention in recent years. In order to solve the problems of low precision, high cost and signal collision between readers, a new indoor positioning algorithm based on a single RFID reader combined with a Double-order Gated Recurrent Unit (GRU) are proposed in this paper. Firstly, the reader is moved along the specified direction to collect the sequential tag data. Then, the tag’s coordinate is taken as the target value to train models and compare them with existing algorithms. Finally, the best Gated Recurrent Unit positioning model is used to estimate the position of the tags. Experiment results show that the proposed algorithm can effectively improve positioning accuracy, reduce the number of readers, cut down the cost and eliminate the collisions of reader signals.


2021 ◽  
Author(s):  
Mohamad Oubai Al-Rejleh

The Internet of Things (IoT) is a revolutionary concept that emerged in the late 21st century, whereby everyday objects such as household items, cars, and wearables, equipped with sensors and (Radio Frequency Identification) RFID chips, can communicate with the internet and to their physical surroundings. These chips allow the connected items to share information, and allow the user to collect information about his/her “quantified self”, measuring personal data such as habits of usage, lifestyle, and location through internet networks. IoT enabled devices are designed to collect, store, share, and analyze of highly personal data ubiquitously and in real time. However, with this new affordance of connectivity, comes a potential loss of privacy for users, as ever increasing sets of personal data are collected and tracked. As such, there is a pressing need for privacy considerations to be embedded within the early stages of design of connected devices and networks.


Author(s):  
Masoud Mohammadian ◽  
Ric Jentzsch

Radio frequency identification (RFID) is a promising technology for improving services and reduction of cost in health care. Accurate almost real time data acquisition and analysis of patient data and the ability to update such a data is a way to improve patients care and reduce cost in health care systems. This article employs wireless radio frequency identification technology to acquire patient data and integrates wireless technology for fast data acquisition and transmission, while maintaining the security and privacy issues. An intelligent agent framework is proposed to assist in managing patients health care data in a hospital environment. A data classification method based on fuzzy logic is proposed and developed to improve the data security and privacy of data collected and propagated.


Author(s):  
Isak Karabegović ◽  
Edina Karabegović ◽  
Mehmed Mahmic ◽  
Ermin Husak

From the very knowledge of Industry 4.0, its implementation is carried out in all segments of society, but we still do not fully understand the breadth and speed of its implementation. We are currently witnessing major changes in all industries, so new business methods are emerging. There is a transformation of production systems, a new form of consumption, delivery, and transportation, all thanks to the implementation of new technological discoveries that cover robotics and automation, the internet of things (IoT), 3D printers, smart sensors, radio frequency identification (RFID), etc. Robotic technology is one of the most important technologies in Industry 4.0, so that the robot application in the automation of production processes with the support of information technology brings us to smart automation (i.e., smart factories). The changes are so deep that, from the perspective of human history, there has never been a time of greater promise or potential danger.


Sign in / Sign up

Export Citation Format

Share Document