Performance Improvement of Group Coding with RF Tags on Missing Objects Detection and Data Recovery

2014 ◽  
Vol 513-517 ◽  
pp. 3305-3308
Author(s):  
Chen Xi Chen ◽  
Dong Wang

Radio Frequency Identification (RFID) provides a non-line-of-sight and contactless approach for object identification. In the supply chain, objects are usually assembled into a group and RFID system enables us to quickly identify a group of objects. However, RFID system only provide the identified objects ID, unable to provide the missing objects IDs. This paper concerns the problem of missing objects detection and missing unique IDs recovery. In supply chain, a traditional method of items lost detection is encoding a group of objects ID before the shipment, and decoding when examine the integrity of the objects. In this paper, we propose a new scheme for missing objects detection and missing IDs recovery, which is called Linearly Independent Vectors Based Group Coding, abbreviated LIVGC. A numerical simulation reveals that the proposed method have higher recovery rate (>20%) than the EGC scheme in the same length of redundancy code.

Author(s):  
Kamalendu Pal

Radio Frequency Identification (RFID) is a technology that uses radio frequency signals to identify tagged objects. RFID is an important technology used by the Internet of Things (IoT) applications. This technology enables communication between the main devices used in RFID system, the reader, and the tags. The tags share a common communication channel. Therefore, if more than one tag tries to send information at the same time, the reader will be incapable of differentiating these signals in the case of radio signals interference. This phenomenon is known as tag collision problem. The problem of tag collision is one of the major disadvantages for fast tagged-object identification in supply chain management. This chapter describes four different types of binary search algorithms for avoidance of tag collision, and then presents a performance measurement mechanism for RFID application system. Finally, simulation-based experimental results on the performance of these algorithms are presented.


2011 ◽  
Vol 2 (1) ◽  
pp. 25-40
Author(s):  
Yanjun Zuo

Radio Frequency Identification (RFID) has been applied in various high security and high integrity settings. As an important ubiquitous technique, RFID offers opportunities for real-time item tracking, object identification, and inventory management. However, due to the high distribution and vulnerability of its components, an RFID system is subject to various threats which could affect the system’s abilities to provide essential services to users. Although there have been intensive studies on RFID security and privacy, there is still no complete solution to RFID survivability. In this paper, the authors classify the RFID security techniques that could be used to enhance an RFID system’s survivability from three aspects, i.e., resilience, robustness and fault tolerance, damage assessment and recovery. A threat model is presented, which can help users identify devastating attacks on an RFID system. An RFID system must be empowered with strong protection to withstand those attacks and provide essential functions to users.


Author(s):  
Yanjun Zuo

Radio Frequency Identification (RFID) has been applied in various high security and high integrity settings. As an important ubiquitous technique, RFID offers opportunities for real-time item tracking, object identification, and inventory management. However, due to the high distribution and vulnerability of its components, an RFID system is subject to various threats which could affect the system’s abilities to provide essential services to users. Although there have been intensive studies on RFID security and privacy, there is still no complete solution to RFID survivability. In this paper, the authors classify the RFID security techniques that could be used to enhance an RFID system’s survivability from three aspects, i.e., resilience, robustness and fault tolerance, damage assessment and recovery. A threat model is presented, which can help users identify devastating attacks on an RFID system. An RFID system must be empowered with strong protection to withstand those attacks and provide essential functions to users.


Author(s):  
Yubao Hou ◽  
Hua Liang ◽  
Juan liu

In the traditional RFID (Radio Frequency IDentification) system, a secure wired channel communication is used between the reader and the server. The newly produced mobile RFID system is different from the traditional RFID system, the communication between the reader and the server is based on a wireless channel, and the authentication protocol is suitable for traditional RFID systems, but it cannot be used in mobile RFID systems. To solve this problem, a mutual authentication protocol MSB (Most Significant Bit) for super lightweight mobile radio frequency identification system is proposed based on bit replacement operation. MSB is a bitwise operation to encrypt information and reduce the computational load of communication entities. Label, readers, and servers authenticate first and then communicate, MSB may be used to resistant to common attacks. The security analysis of the protocol shows that the protocol has high security properties, the performance analysis of the protocol shows that the protocol has the characteristics of low computational complexity, the formal analysis of the protocol based on GNY logic Gong et al. (1990) provides a rigorous reasoning proof process for the protocol.


2008 ◽  
Vol 3 (1) ◽  
pp. 55-70
Author(s):  
Dharmaraj Veeramani ◽  
Jenny Tang ◽  
Alfonso Gutierrez

Radio frequency identification (RFID) is a rapidly evolving technology for automatic identification and data capture of products. One of the barriers to the adoption of RFID by organizations is difficulty in assessing the potential return on investment (ROI). Much of the research and analyses to date of ROI in implementing RFID technology have focused on the benefits to the retailer. There is a lack of a good understanding of the impact of RFID at upper echelons of the supply chain. In this paper, we present a framework and models for assessing the value of RFID implementation by tier-one suppliers to major retailers. We also discuss our real-life application of this framework to one of Wal-Mart’s top 100 suppliers


2009 ◽  
Vol 16-19 ◽  
pp. 1043-1047
Author(s):  
Sun Wei ◽  
Li Hua Dong ◽  
Yao Hua Dong

In the domain of manufacture and logistics, Radio Frequency Identification (RFID) holds the promise of real-time identifying, locating, tracking and monitoring physical objects without line of sight due to an enhanced efficiency, accuracy, and preciseness of object identification, and can be used for a wide range of pervasive computing applications. To achieve these goals, RFID data has to be collected, filtered, and transformed into semantic application data. However, the amount of RFID data is huge. Therefore, it requires much time to extract valuable information from RFID data for object tracing. This paper specifically explores options for modeling and utilizing RFID data set by XML-encoding for tracking queries and path oriented queries. We then propose a method which translates the queries to SQL queries. Based on the XML-encoding scheme, we devise a storage scheme to process tracking queries and path oriented queries efficiently. Finally, we realize the method by programming in a software system for manufacture and logistics laboratory. The system shows that our approach can process the tracing or path queries efficiently.


2011 ◽  
Vol 179-180 ◽  
pp. 949-954 ◽  
Author(s):  
Xiao Hua Cao ◽  
Juan Wan

Internal material supply management for manufacturing workshops usually suffers from message delay and abnormal logistics events, which seriously holdback the reactivity capability of production system. As a rapid, real-time, accurate information collection tools, Radio Frequency identification (RFID) technology has become an important driver in the production and logistics activities. This paper presents a new idea that uses RFID technology to monitor real-timely the abnormal logistics events which occur at each work space in the internal material supply chain and proposes its construction method in details. With the experimental verification of prototype system, the proposed RFID-based monitoring system can find in time the abnormal logistics events of internal material supply chain and largely improve the circulation velocity of production logistics, and reduce the rate of mistake which frequently occurred in traditional material management based on Kanban.


2013 ◽  
Vol 93 (1) ◽  
pp. 23-33 ◽  
Author(s):  
P. Barge ◽  
P. Gay ◽  
V. Merlino ◽  
C. Tortia

Barge, P., Gay, P., Merlino, V. and Tortia, C. 2013. Radio frequency identification technologies for livestock management and meat supply chain traceability. Can. J. Anim. Sci. 93: 23–33. Animal electronic identification could be exploited by farmers as an interesting opportunity to increase the efficiency of herd management and traceability. Although radio frequency identification (RFID) solutions for animal identification have already been envisaged, the integration of a RFID traceability system at farm level has to be carried out carefully, considering different aspects (farm type, number and species of animals, barn structure). The tag persistence on the animal after application, the tag-to-tag collisions in the case of many animals contemporarily present in the reading area of the same antenna and the barn layout play determinant roles in system reliability. The goal of this paper is to evaluate the RFID identification system performance and determine the best practice to apply these devices in livestock management. RFID systems were tested both in laboratory, on the farm and in slaughterhouses for the implementation of a traceability system with automatic animal data capture. For this purpose a complete system for animal identification and tracking, accomplishing regulatory compliance as well as supply chain management requirements, has been developed and is described in the paper. Results were encouraging for identification of calves both in farms and slaughterhouses, while in swine breeding, identification was critical for small piglets. In this case, the design of a RFID gate where tag-to-tag collisions are avoided should be envisaged.


This paper discourses about a very general problem that occurs in everyday life. In many universities, students are at risk of misplacement or theft of valuables. So, to avoid such mis happening, the development of security system was designed for providing the safety of university student belongings. The proposed security system contains some common information, methodology, schematics and some details related to technical field that is employed into the system, such as RFID (Radio Frequency Identification) and barcode readers along with the design of the established system. For the functioning of the system in a most effectively manner, assumptions with some specific requirements that is needed to be met are encompassed in this paper


Sign in / Sign up

Export Citation Format

Share Document