scholarly journals 5G-Compliant Authentication Protocol for RFID

Electronics ◽  
2020 ◽  
Vol 9 (11) ◽  
pp. 1951 ◽  
Author(s):  
Jorge Munilla ◽  
Adel Hassan ◽  
Mike Burmester

The term “Internet of Things” was originally coined when radio frequency identification (RFID) technology was being developed to refer to applications where RFID tagged objects and sensors enabled computers to achieve effective situational awareness without human intervention. Currently, this term encompasses a myriad of medium/small devices connected to the Internet. On the other hand, 5G is a key enabling technology that will support next generation wireless communications. Moreover, 5G aims to realize the “Internet of Everything”. Surprisingly, despite the expected relationship between these two technologies, RFID tags have not been properly integrated into 4G and it is not clear if this will change in 5G. RFID is considered as a parallel technology where, at best, it has connection to the core network using back-end servers as gateways between the two technologies. With the aim of overcoming this problem, this paper proposes a 5G compliant RFID protocol that allows RFID tags to act as fully fledged 5G subscribers while taking into account the main characteristics of RFID systems. This proposal leverages the separation between USIM and mobile equipment within the user equipment to implement a 5G compliant protocol where tags accomplish the authentication part, as 5G subscribers, while readers assume the mobile equipment role, carrying out the 5G communication and most of the resource consuming tasks.

2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Zhiyong He

Radio Frequency Identification (RFID) technology has been used in numerous applications, e.g., supply chain management and inventory control. This paper focuses on the practically important problem of the rapid estimation of the number of tags in large-scale RFID systems with multiple readers and multicategory RFID tags. RFID readers are often static and have to be deployed strategically after careful planning to cover the entire monitoring area, but reader-to-reader collision (R2Rc) remains a problem. R2Rc decreases the reliability of the estimation of the tag population size, because it results in the failure of communication between the reader and tags. In this paper, we propose a coloring graph-based estimation scheme (CGE), which is the first estimation framework designed for multireader and multicategory RFID systems to determine the distribution of tags in different categories. CGE allows for the use of any estimation protocol to determine the number of tags, prevents R2Rc, and results in higher time efficiency and less power-consumption than the classic scheduling method DCS.


Sensors ◽  
2018 ◽  
Vol 18 (9) ◽  
pp. 2902 ◽  
Author(s):  
Pagán Alexander ◽  
Rania Baashirah ◽  
Abdelshakour Abuzneid

Radio frequency identification (RFID) is a technology that has grown in popularity and in the applications of use. However, there are major issues regarding security and privacy with respect to RFID technology which have caught the interest of many researchers. There are significant challenges which must be overcome to resolve RFID security and privacy issues. One reason is the constraints attached to the provision of security and privacy in RFID systems. Along with meeting the security and privacy needs of RFID technology, solutions must be inexpensive, practical, reliable, scalable, flexible, inter-organizational, and long-lasting. To make RFID identifiers effective and efficient they must identify the item(s) while resisting attacks aimed at obtaining the tag’s information and compromising the system or making it possible to bypass the protection RFID tags are supposed to provide. Different authentication methods have been proposed, researched, and evaluated in the literature. In this work, we proposed our methodology in evaluating RFID authentication, and a few of the most promising authentication methods are reviewed, compared, and ranked in order to arrive at a possible best choice of protocol to use.


2021 ◽  
Vol 13 (7) ◽  
pp. 3684
Author(s):  
Bibiana Bukova ◽  
Jiri Tengler ◽  
Eva Brumercikova

The paper focuses on the environmental burden created by Radio Frequency Identification (RFID) tags in the Slovak Republic (SR). In order to determine the burden there, a model example was created to calculate electronic waste produced by households in the SR by placing RFID tags into municipal waste. The paper presents a legislative regulatory approach towards the environmental impacts from using RFID tags in the SR, as well as an analysis of the environmental burden of using RFID tags throughout the world. The core of the paper is focused on the research conducted in order to calculate the environmental burden of a model household in the SR, where the number of used RFID tags per year was observed; then, the volume of e-waste produced by households of the Slovak Republic per year was determined. In the conclusion, we provide the results of the research presented and discuss including our own proposal for solving the problems connected with the environmental burden of RFID technology.


Author(s):  
Maurice Dawson

Secure computing is essential as environments continue to become intertwined and hyperconnected. As the Internet of Things (IoT), Web of Things (WoT), and the Internet of Everything (IoE) dominate the landscape of technological platforms, protection these complicated networks is important. The everyday person who wishes to have more devices that allow the ability to be connected needs to be aware of what threats they could be potentially exposing themselves to. Additionally, for the unknowing consumer of everyday products needs to be aware of what it means to have sensors, Radio Frequency IDentification (RFID), Bluetooth, and WiFi enabled products. This submission explores how Availability, Integrity, and Confidentiality (AIC) can be applied to IoT, WoT, and IoE with consideration for the application of these architectures in the defense sector.


2018 ◽  
Vol 2 (12) ◽  
Author(s):  
Gnanesswaran Vettrivel

Radio frequency identification (RFID) system is an automatic data capturing system that relies on remotely retrieving data stored on tags using devices called readers. The National Aeronautics and Space Administration (NASA) and a team of contractors, university researchers and technology vendors collaborated to investigate the reliability of RFID systems for automated crew-free inventory control aboard the ISS. In this manuscript we detail the decade long research accomplishments and the maturity of this RFID technology that is being currently used in Space for inventory management.


2018 ◽  
Vol 10 (9) ◽  
pp. 82
Author(s):  
Masoumeh Safkhani ◽  
Nasour Bagheri ◽  
Mahyar Shariat

Passive Radio Frequency IDentification (RFID) tags are generally highly constrained and cannot support conventional encryption systems to meet the required security. Hence, designers of security protocols may try to achieve the desired security only using limited ultra-lightweight operations. In this paper, we show that the security of such protocols is not provided by using rotation functions. In the following, for an example, we investigate the security of an RFID authentication protocol that has been recently developed using rotation function named ULRAS, which stands for an Ultra-Lightweight RFID Authentication Scheme and show its security weaknesses. More precisely, we show that the ULRAS protocol is vulnerable against de-synchronization attack. The given attack has the success probability of almost ‘1’, with the complexity of only one session of the protocol. In addition, we show that the given attack can be used as a traceability attack against the protocol if the parameters’ lengths are an integer power of 2, e.g., 128. Moreover, we propose a new authentication protocol named UEAP, which stands for an Ultra-lightweight Encryption based Authentication Protocol, and then informally and formally, using Scyther tool, prove that the UEAP protocol is secure against all known active and passive attacks.


2015 ◽  
Vol 2 (2) ◽  
pp. 62-77 ◽  
Author(s):  
Mohammadali Forouzandeh ◽  
Nemai Chandra Karmakar

In the past few years Radio Frequency Identification(RFID)has grown to be one of the most popular technologies in the area of identification systems. Following a brief survey of RFID systems, this paper provides a technical review of work undertaken in the field of time-domain chipless RFID tags and sensors. This paper aims not only to address the chipless tags which use Time Domain Reflectometry (TDR) concept for data encoding but also for the use of Ultra-Wideband Impulse-Radar (UWB-IR) as a time-domain measurement technique. The penultimate section intends to focus on time-domain reading setups and finally, a brief comparison between this method and other chipless techniques is provided.


Author(s):  
Naseer Ali Hussien ◽  
Saif Abd alradha Alsaidi ◽  
Iman Kadhim Ajlan ◽  
Mohamed Fazil Mohamed Firdhous ◽  
Haider TH. Salim Alrikabi

<p>The Internet of Things (IoT) incorporates most extensive number of innovations and imagines a mixture of things or questions around us that, through one of a kind tending to plans and standard correspondence conventions, consume the ability to connect through one another's also collaborate by their neighbors in the direction of attain regular purposes. The misuse of such a standard has been broadly explored in Internet-related investigates. As a result, a few plans have been suggested that utilization informal organizations to hunt Internet assets, to course activity, or to choose powerful strategies for substance dissemination. The essential understood this knowledge remains persistent locality everywhere us as a diverse carrier of things or articles – i.e. Radio-Frequency identification (RFID) sensors, labels, cellular telephones, actuators, and more – that finished novel inclining to ideas, consume the ability to subordinate through one another besides chip in through their neighbors to realize normal objectives of shopping situation in business sector. Web of Things (IoT) overpowered standard imperfection for structure code, which backing to shopping in business sector or undertaking gathering of most prominent concern and examinant.</p><p> </p>


2021 ◽  
Vol 17 ◽  
pp. 16-21
Author(s):  
Jorge A. Ortega-Contreras ◽  
Yuriy S. Shmaliy ◽  
Jose A. Andrade-Lucio

This paper describes a way to improve the indoor navigation of mobile robots using radio frequency identification (RFID) technology. A net of RFID tags is deployed in the navigation space. A measurement system measures distances from the tags to the robot with in the presence of the firstorder Markov-Gauss colored measurement noise (CMN) and is combined with a digital gyroscope to measure the robot heading. To increase the localization accuracy, the Kalman filter (KF) and unbiased finite impulse response (UFIR) modified for CMN are used. It is shown that the navigation system developed is more accurate than the basic one employing the standard KF and UFIR filter


Author(s):  
Qutubud Din ◽  
Akhtar Sayed ◽  
Fida Husain Yousafzai ◽  
Jiong Yu

Using of this latest RFID (Radio Frequency Identification) technology for an organization to improve the efficiency of organization security and maintain the record automatically. Security is the biggest challenge for everything and everywhere it’s the first priority of organization responsible authorities and they must provide the best way to deal these problems with full confidence. With help of RFID Technology it’s more easy and faster to identify the object is authorized or unauthorized to access or denied from the restricted premises. RFID Technology based on two components RFID Reader (Interrogator) & RFID Tags (Transponder). The tag contains an integrated circuit a unique number that number is assign to the object and it’s become the identification I’D of the object. This is used for processing data, modulating and demodulating the radio frequency signal that is being transmitted to RFID Reader, RFID reader read the tag and send the query to database for comparison of information which are exist in the existing database. The tag information is stored in the database the database is pass the query to micro controller the micro controller is perform operation on the base of object requirement and send back the information to database. The developed software performing functionality automatic and authentic. RFID Tags used as ID (identification number) registered in database is presenting the organization concerned object to allow access to the restricted premises otherwise denied the access inside the organization and saved all movement which pass through at the entrance and provide easily understandable, user-friendly and flexible interface for user. Maintain and update all information automatically. To minimize manually checking and record maintenance headache.


Sign in / Sign up

Export Citation Format

Share Document