scholarly journals Privacy-Preserving RFID-Based Search System

Electronics ◽  
2021 ◽  
Vol 10 (5) ◽  
pp. 599
Author(s):  
Ji Young Chun ◽  
Geontae Noh

The employment of mobile readers (or mobile phone collaborated with a Radio frequency identification (RFID) reader) opens a novel application for RFID technology. In particular, an RFID tag search system has been designed to find a particular tag in a group of tags using a mobile reader. Unfortunately, privacy infringement and availability issues in the search system have not been adequately addressed to date. In this paper, we propose a novel RFID tag search protocol that will enhance mobile reader user privacy while being able to operate under conditions of unstable connection to a central server. First, the proposed protocol preserves the privacy of mobile reader users. The privacy of the mobile reader user is at risk because the signal strength emitted from a mobile reader is much stronger than that from the tag, exposing the location of the mobile reader user and thus compromising the user’s privacy. Thus far, such privacy issues have been overlooked. The second issue is presented because of wireless connections that are either unreliable or too remote, causing a mobile reader to disconnect from the central server. The proposed protocol enables serverless RFID tag searches with passive tags, which obtain operating power from the mobile reader. In unstable environments, the protocol can successfully locate specific tags without any server.

2017 ◽  
Vol 25 (1) ◽  
pp. 21-42 ◽  
Author(s):  
Wesley Kukard ◽  
Lincoln Wood

This research explores how perceived consumer benefits affect the perceived privacy risks from implementation of Radio Frequency Identification (RFID) tags at an item-level in the Fast Moving Consumer Goods (FMCG) industry. Two new categories measure the benefits and risks: in-store and after-sales. These specific categories allow the respondents' willingness to accept RFID to be evaluated using a quantitative survey focused on the primary household grocery purchasers within the USA. The results suggest differences in perceptions of the in-store and after-sales risks and benefits of RFID use. While consumers are aware of privacy risks while using RFID technology, they would be willing to use the technology if sufficient benefits are available. This research moves the discussion away from a focus on consumer privacy issues to a balanced privacy/benefits approach for consumers and how that might affect their technology acceptance, suggesting that careful management of consumer benefits might allow FMCG firms to introduce RFID technology to support their global supply chains.


This study represents a device to identify the location of an Autism Spectrum Disorder(ASD) child using an Radio Frequency Identification (RFID). This is a wearable device, that is to be worn by the autism child, which allows the parent to track the child anytime, anywhere .The RFID technology is implied for the location tracking, The RFID Tag is affixed on the device, the reader which is supposed to sense the RFID tag is placed at the spots such as classroom etc. The reader when it senses the tag notifies the parent through a message. When an RFID tag passes through the electromagnetic zone, it detects the activation signal produced by the reader. The encoded data present in the integrated circuit of the tag is being encoded by the reader and the data is delivered to the host computer for processing. The location can be sent to parent in the form of a normal text message via GSM. Autism children deserve to acquire knowledge and explore the environment. To overcome the obstruction this device will be of immense help.


2018 ◽  
Vol 7 (4.6) ◽  
pp. 391
Author(s):  
Soumyasanta Rakshit ◽  
Dr. S. S. Sridhar

Using radio wave or radio frequency scanners to identify wirelessly any object is not so much complex in reality. The latest version of this technology is known as radio frequency identification or RFID. RFID has three building blocks: small tags built around microchips that carry a digital identification code; The RFID scanners also known as readers, the readers are also known as interrogators and networking hardware and the software to link scanners to the main computer databases that can be in hardware or cloud storage. In this project, we describe the implementation of RFID technology in the platform of asset management system in an organization. Using RFID technology track the all of the assets is the main aim of the project. The RFID interrogators open a serial port and then reads a RFID tag to use it as a unique parameter in the database to access and show the record associated to the RFID chip. Any change is wirelessly synchronized to the main database server.An admin will look after the whole server as an administration. If any new asset is introduced which is not in the main database, when the RFID scanner detects that the admin will get a notification message also in anyway if any asset will tamper by anything or anyone or if someone will try to steal any asset then again, the admin will get a notification message instantly.


2011 ◽  
Vol 314-316 ◽  
pp. 1325-1329
Author(s):  
Lei Xu ◽  
Hui Ming Huang

Radio frequency identification (RFID) technology may be applied to cylindrical objects, but the curving of an RFID tag brings on an increase in resonant frequency of the tag antenna. The tag can not function in an excessively curving case, since the deviation of the antenna resonant frequency from working frequency makes a reduction in inductive energy supplied by a transmitter. The variation in antenna resonant frequency is dependant upon column radius of the cylinder and curving angle of the tag. Analytically, it is found that a reduction in central distance, which is determined by column radius and curving angle, between compound straight tracks leads to the decreasing of overall antenna-coil inductance after the curving of the tag. By introducing a curving turn exponent, the overall antenna-coil inductance is calculated. After neglecting the less variation in overall tag capacitance, the antenna resonant frequency may be estimated. The result provides an instruction for designing a curving tag antenna to fit the tag antenna resonant frequency for working frequency of an RFID system.


Author(s):  
Peter J. Hawrylak ◽  
Nakeisha Schimke ◽  
John Hale ◽  
Mauricio Papa

Electronic healthcare or E-Health promises to offer better care at lower cost. This is critical as the cost of healthcare continues to increase and as the population ages. Radio Frequency Identification (RFID) technology is one form of wireless technology that will be part of the E-Health environment. RFID provides the ability to identify, track, and monitor patients and staff members. This enables better resource allocation, reduction of medical errors, and increased independence for patients. One part of E-Health is the Electronic Medical Record (EMR). New developments in RFID technology now enable the storage of all or part of the EMR on an RFID tag that remains with the patient. This chapter investigates the use of RFID in E-Health, how RFID can be used to store the EMR, and the security and privacy risks associated with using RFID to store the EMR.


2014 ◽  
Vol 708 ◽  
pp. 148-152
Author(s):  
Michal Balog ◽  
Žofia Šimeková ◽  
Pavol Semančo

Radio Frequency Identification (RFID) technology introduces the way of automated data collection, and processing to improve accuracy of processed data. In the present time possibilities in development and application of RFID technologies are almost limitless. Increasing expansion of RFID technology in almost any industry, where the RFID tag can be put on any product or material or component is an evidence of the previous assertion. Apart from technical aspects, i.e. security, the financial effect of the RFID technology implementation is also relevant in rail freight transport. Using this technology to keep records of technical condition of the wagons can be avoided a huge disaster caused by lack of knowledge about technical condition of the wagon. It can bring the return of initial investment and cost reduction.


2014 ◽  
Vol 513-517 ◽  
pp. 2453-2456
Author(s):  
Wei Dong

In this paper, we propose a new self-service library system. The new system adopts Radio Frequency Identification (RFID) technology so that patrons can check out and return library property at any time of the day. In addition, repetitive strain injuries among librarians are alleviated. Unlike traditional methods of old library circulation system which employed barcode as Identification of a book, a tiny RFID tag is attached to a book in the new circulation system. With its serial number programming and anti-theft information programming into the tag, it is believed that the new system has a better control on theft, nonreturns.


2021 ◽  
Vol 17 ◽  
pp. 16-21
Author(s):  
Jorge A. Ortega-Contreras ◽  
Yuriy S. Shmaliy ◽  
Jose A. Andrade-Lucio

This paper describes a way to improve the indoor navigation of mobile robots using radio frequency identification (RFID) technology. A net of RFID tags is deployed in the navigation space. A measurement system measures distances from the tags to the robot with in the presence of the firstorder Markov-Gauss colored measurement noise (CMN) and is combined with a digital gyroscope to measure the robot heading. To increase the localization accuracy, the Kalman filter (KF) and unbiased finite impulse response (UFIR) modified for CMN are used. It is shown that the navigation system developed is more accurate than the basic one employing the standard KF and UFIR filter


Author(s):  
Reem Hazim ◽  
Ahmed N. Rashid

An RFID technology facilitates the work of different industries, it's used widely in many applications, like in the banking system. Banks are trying to give better services to their customers by using modern technologies. This paper presents the identification of persons (customers, employees) in a BANK and to utilize the simulation of this technology in order to make an electronic banking system more useful. Our system splits into two parts. The first is concerned about the customer by giving RFID tag attached to a checkbook, the second part is concerned about the employees by giving RFID tags attached to Identification Card (IDC). These tags are scanned by readers when entering the bank and processing of their information is performed in order to identify, track, monitor, verify, and give more satisfying services to customers such as reduction of waiting time, ability to bring security, accuracy and integrity of the banking systems of the country by accelerating most of the banking works by using electronic infrastructures without disturbance for special customers.


2013 ◽  
Vol 684 ◽  
pp. 531-534 ◽  
Author(s):  
Yun Tian ◽  
Gong Liang Chen ◽  
Jian Hua Li

Radio frequency identification (RFID) has been applied to a variety of domains. RFID tag search problem becomes significant when the total number of tags is very large and only the data of a particular tag or a small group of tags are required. This paper proposes a lightweight serverless RFID tag search protocol in conformity with EPC C1G2 standards. The computation operations in the protocol are only PRNG and XOR. The security analysis shows that the protocol achieves authentication, data confidentiality, untraceability and data integrity.


Sign in / Sign up

Export Citation Format

Share Document