scholarly journals An Approach to Faulty Reader Detection in RFID Reader Network

Author(s):  
Hairulnizam Mahdin ◽  
Jemal H. Abawajy

Radio Frequency Identification (RFID) technology is becoming increasingly popular as an automated tool for object monitoring and identification in a cost-efficient manner. RFID systems are made up of heterogeneous components consisting of both hardware and software. RFID components such as the readers are prone to failures with serious consequences to the overall system. Thus, issues such as reliability and dependability of RFID systems are receiving attention recently. This mandates fault management that includes monitoring the health of RFID readers and accessing the RFID reader configurations remotely. Therefore, an approach that detects the faulty readers with the aim to minimize the impacts of the faulty readers on the system reliability and dependability is of paramount importance. In this chapter, the authors discuss an approach to detect faulty readers in networked RFID system environments. Performance evaluation of the approach against other techniques is presented and shows that it performs reasonably well in the presence of faulty readers.

Author(s):  
Yubao Hou ◽  
Hua Liang ◽  
Juan liu

In the traditional RFID (Radio Frequency IDentification) system, a secure wired channel communication is used between the reader and the server. The newly produced mobile RFID system is different from the traditional RFID system, the communication between the reader and the server is based on a wireless channel, and the authentication protocol is suitable for traditional RFID systems, but it cannot be used in mobile RFID systems. To solve this problem, a mutual authentication protocol MSB (Most Significant Bit) for super lightweight mobile radio frequency identification system is proposed based on bit replacement operation. MSB is a bitwise operation to encrypt information and reduce the computational load of communication entities. Label, readers, and servers authenticate first and then communicate, MSB may be used to resistant to common attacks. The security analysis of the protocol shows that the protocol has high security properties, the performance analysis of the protocol shows that the protocol has the characteristics of low computational complexity, the formal analysis of the protocol based on GNY logic Gong et al. (1990) provides a rigorous reasoning proof process for the protocol.


2019 ◽  
Vol 8 (1) ◽  
pp. 13-19
Author(s):  
Meli Mildawati ◽  
Wildian Wildian

Sistem pengaman sepeda motor menggunakan radio frequency identification (RFID) dan notifikasi melalui handphone yang dikontrol dengan modul Arduino Uno telah dirancang bangun. RFID terdiri dari sebuah RFID tag dan RFID reader. RFID tag yang memiliki kode yang berbeda-beda, digunakan sebagai kunci untuk menghidupkan sepeda motor setelah kunci kontak digunakan. RFID reader dapat membaca tag pada jarak maksimal 1,26 cm. Sepeda motor yang dihidupkan tanpa menggunakan RFID tag atau RFID tag tidak sesuai menyebabkan aktifnya reed switch pada pelek roda depan. Ketika roda telah berputar sebanyak empat kali, maka alarm aktif dan GSM SIM 800L mengirimkan notifikasi berupa SMS sebanyak satu kali dan misscall sebanyak tiga kali ke nomor handphone pemilik sepeda motor. Waktu delay rata-rata SMS dan miscall berturut-turut adalah 5,42 s, 8,62 s, 61,14 s dan 113,16 s. Kata kunci: sistem pengaman sepeda motor, RFID, Arduino Uno , reed switch, GSM SIM 800L


2010 ◽  
Vol 1 (1) ◽  
pp. 51-74
Author(s):  
Muhammad Kifli Hutagalung

Peningkatan jumlah kendaraan bermotor berbanding lurus dengan jumlah pencurian kendaraan bermotor itu sendiri. Para produsen sepeda motor hanya mengandalkan kunci kontak dan kunci stang untuk pengaman sepeda motor dari pencurian. Metode konvensional ini sangat muda untuk dijebol. Radio Frequency Identification (RFID) adalah metode pengamanan dengan menggunakan tag (transponder) sebagai penanda identitas sebuah benda atau kepemilikan sebuah benda. Berbeda dengan kartu ATM atau smart card lainnya penggunaan RFID tidak perlu kontak langsung  dengan pembaca atau readernya, sehingga faktor kerusakan tag/kartu RFID dapat dihindari. Dengan memadukan Tag, RFID Reader dan Mikrokontroler AT89SS8253, rangkaian relay dan motor servo dapat dibangun sebuah pengaman sepeda motor yang lebih handal. Pada kondisi sepeda motor mati pengaman ini akan aktif artinya semua perangkat sepeda motor tidak dapat digunakan dari rem, gas, saluran minyak dan lain- lain. Ketika seseorang mencoba untuk memutus hubungan kabel kunci kontak maka sistema alarm akan aktif dengan ditandai bunyi alarm dan klakson serta semua lampu akan hidup. Sedangkan rem, klose, gas, gigi tidak dapat digunakan. Begitu juga saluran minyak dari tangki ke mesin terputus.


2018 ◽  
Vol 89 (4) ◽  
pp. 560-571 ◽  
Author(s):  
Xiaochen Chen ◽  
Leena Ukkonen ◽  
Johanna Virkki

Passive radio frequency identification-based technology is a convincing approach to the achievement of versatile energy- and cost-efficient wireless platforms for future wearable applications. By using two-part antenna structures, the antenna-electronics interconnections can remain non-stressed, which can significantly improve the reliability of the textile-embedded wireless components. In this article, we describe fabrication of two-part stretchable and non-stretchable passive ultra-high frequency radio frequency identification textile tags using electro-textile and embroidered antennas, and test their reliability when immersed as well as under cyclic strain. The results are compared to tags with traditional one-part dipole antennas fabricated from electro-textiles and by embroidery. Based on the results achieved, the initial read ranges of the two-part antenna tags, around 5 m, were only slightly shorter than those of the one-part antenna tags. In addition, the tag with two-part antennas can maintain high performance in a moist environment and during continuous stretching, unlike the one-part antenna tag where the antenna-integrated circuit attachment is under stress.


2017 ◽  
Vol 2017 ◽  
pp. 1-9 ◽  
Author(s):  
Ju-min Zhao ◽  
Ding Feng ◽  
Deng-ao Li ◽  
Wei Gong ◽  
Hao-xiang Liu ◽  
...  

Radio Frequency Identification (RFID) is an emerging technology for electronic labeling of objects for the purpose of automatically identifying, categorizing, locating, and tracking the objects. But in their current form RFID systems are susceptible to cloning attacks that seriously threaten RFID applications but are hard to prevent. Existing protocols aimed at detecting whether there are cloning attacks in single-reader RFID systems. In this paper, we investigate the cloning attacks identification in the multireader scenario and first propose a time-efficient protocol, called the time-efficient Cloning Attacks Identification Protocol (CAIP) to identify all cloned tags in multireaders RFID systems. We evaluate the performance of CAIP through extensive simulations. The results show that CAIP can identify all the cloned tags in large-scale RFID systems fairly fast with required accuracy.


2017 ◽  
Vol 7 (1) ◽  
pp. 73
Author(s):  
Mar Fuah

One of the problems in the criminal case completions is that the difficulty of making decision to estimate when the settlement of the case file will be fulfilled. It is caused by the number of case files handled and detention time changing. Therefore, the fast and accurate information is needed. The research aims to develop a monitoring system tracking and tracking of scheduling rules using Rule Based Expert Systems method with 17 rules, and supported by Radio Frequency Identification technology (RFID) in the form of computer applications. Based on the output of the system, an analysis is performed in the criminal case settlement process with a set of IF-THEN rules. The RFID reader read the data of case files through radio wave signals emitted by the antenna toward active-Tag attached in the criminal case file. The system is designed to monitor the tracking and tracing of RFID-based scheduling rules in realtime way that was built in the form of computer application in accordance with the system design. This study results in no failure in reading active tags by the RFID reader to detect criminal case files that had been examined. There were many case files handled in three different location, they were the constabulary, prosecutor, and judges of district court and RFID was able to identify them simultaneously. So, RFID supports the implementation of Rule Based Expert Systems very much for realtime monitoring in criminal case accomplishment.


Sign in / Sign up

Export Citation Format

Share Document