Research and Development on Secure System of EPC Internet of Things Based on RFID and WSN

2011 ◽  
Vol 474-476 ◽  
pp. 220-223
Author(s):  
Xin Xie ◽  
Ying Wu ◽  
Hong Lei Chen

Electronic Product Code (EPC) system and Radio-frequency Identification (RFID) play an important role in the Internet of things. We analyze the security threats which exist in the communication channel among RFID components, for this reason, an encryption mechanism which is added into it. And, hundreds of sensor nodes can form one Wireless Sensor Network (WSN) successfully, which, to a large extent, owes to the special node architecture. This paper proposes a secure EPC system model to ensure the security of the whole EPC system by implanting the components of RFID into WSN nodes.

Author(s):  
Kirti Kangra ◽  
Jaswinder Singh

The internet of things (IoT) model connects physical devices to the virtual world and enables them to interact. It enables smart devices to communicate with other devices to exchange information. To link a wireless network or cloud network, it takes the help of several technologies such as radio frequency identification (RFID), wireless sensor network (WSN), near field communication (NFC), ZigBee, and others. The IoT requires a standard architecture and protocol stack to establish links between the devices. This chapter provides a brief introduction, pillars, the evolution, architecture, application of IoT, and issues related to IoT implementation in real life.


2013 ◽  
Vol 380-384 ◽  
pp. 2817-2821
Author(s):  
Xiao Nie

Nowadays, the internet of things (IOT) has attracted the attention of the researchers. As a key technology of the Internet of Things, RFID (Radio Frequency Identification) has also attracted the interest of industry and academia. One of the most important issues for the applications of the IOT based on RFID is security. In order to promote the development of IOT based on RFID, first of all, we briefly introduce the IOT system components and work process based on RFID, and then we deeply analyze the security threats in the IOT based on RFID, by the means of these analysis we discuss the current countermeasures for the security threats of RFID. Aiming at the RFID system, the corresponding technologies are raised such as Tag killing, Tag sleeping and blocker Tag; and the authentication based on HASH is the main method aiming at the communication process.


Energies ◽  
2021 ◽  
Vol 14 (9) ◽  
pp. 2417
Author(s):  
Andrzej Michalski ◽  
Zbigniew Watral

This article presents the problems of powering wireless sensor networks operating in the structures of the Internet of Things (IoT). This issue was discussed on the example of a universal end node in IoT technology containing RFID (Radio Frequency Identification) tags. The basic methods of signal transmission in these types of networks are discussed and their impact on the basic requirements such as range, transmission speed, low energy consumption, and the maximum number of devices that can simultaneously operate in the network. The issue of low power consumption of devices used in IoT solutions is one of the main research objects. The analysis of possible communication protocols has shown that there is a possibility of effective optimization in this area. The wide range of power sources available on the market, used in nodes of wireless sensor networks, was compared. The alternative possibilities of powering the network nodes from Energy Harvesting (EH) generators are presented.


2021 ◽  
pp. 1-10
Author(s):  
Jintao Tang ◽  
Lvqing Yang ◽  
Jiangsheng Zhao ◽  
Yishu Qiu ◽  
Yihui Deng

With the development of the Internet of Things and Radio Frequency Identification (RFID), indoor positioning technology as an important part of positioning technology, has been attracting much attention in recent years. In order to solve the problems of low precision, high cost and signal collision between readers, a new indoor positioning algorithm based on a single RFID reader combined with a Double-order Gated Recurrent Unit (GRU) are proposed in this paper. Firstly, the reader is moved along the specified direction to collect the sequential tag data. Then, the tag’s coordinate is taken as the target value to train models and compare them with existing algorithms. Finally, the best Gated Recurrent Unit positioning model is used to estimate the position of the tags. Experiment results show that the proposed algorithm can effectively improve positioning accuracy, reduce the number of readers, cut down the cost and eliminate the collisions of reader signals.


2021 ◽  
Author(s):  
Mohamad Oubai Al-Rejleh

The Internet of Things (IoT) is a revolutionary concept that emerged in the late 21st century, whereby everyday objects such as household items, cars, and wearables, equipped with sensors and (Radio Frequency Identification) RFID chips, can communicate with the internet and to their physical surroundings. These chips allow the connected items to share information, and allow the user to collect information about his/her “quantified self”, measuring personal data such as habits of usage, lifestyle, and location through internet networks. IoT enabled devices are designed to collect, store, share, and analyze of highly personal data ubiquitously and in real time. However, with this new affordance of connectivity, comes a potential loss of privacy for users, as ever increasing sets of personal data are collected and tracked. As such, there is a pressing need for privacy considerations to be embedded within the early stages of design of connected devices and networks.


2022 ◽  
pp. 168-180
Author(s):  
Sasikumar Gurumoorthy ◽  
L. Venkateswara Reddy ◽  
Sudhakaran Periakaruppan

Art colonnades and museums all over the world are the first option for individuals to visit for the enhancement of the cultural life of people. To ensure their safety, museums have established numerous cultural security measures. Traditional strategies do not obstruct their pace entirely. They only use a computer in the museum to check individuals at the entrance and exit. Therefore, the authors proposed a gallery anti-stealing device created on the internet-of-things (IoT) technology that ensures security through passive readers/writers of RFID. Radio frequency identification (RFID) remains a system that practices isolated data storing and recovery and offers object tracking with a unique identity code. The system then sends sound and light warning information, while the photographic camera structure is triggered to capture a picture at the same time. The recognition of the accuracy in the hardware component of the device can be additionally enhanced by the use of this technology to increase the safety of museum equipment.


Author(s):  
Maurice Dawson

Secure computing is essential as environments continue to become intertwined and hyperconnected. As the Internet of Things (IoT), Web of Things (WoT), and the Internet of Everything (IoE) dominate the landscape of technological platforms, protection these complicated networks is important. The everyday person who wishes to have more devices that allow the ability to be connected needs to be aware of what threats they could be potentially exposing themselves to. Additionally, for the unknowing consumer of everyday products needs to be aware of what it means to have sensors, Radio Frequency IDentification (RFID), Bluetooth, and WiFi enabled products. This submission explores how Availability, Integrity, and Confidentiality (AIC) can be applied to IoT, WoT, and IoE with consideration for the application of these architectures in the defense sector.


Sensors ◽  
2019 ◽  
Vol 19 (24) ◽  
pp. 5460 ◽  
Author(s):  
Franck Kimetya Byondi ◽  
Youchung Chung

This paper presents a passive cavity type Ultra High Frequency (UHF) Radio Frequency Identification (RFID) tag antenna having the longest read-range, and compares it with existing long-range UHF RFID tag antenna. The study also demonstrates mathematically and experimentally that our proposed longest-range UHF RFID cavity type tag antenna has a longer read-range than existing passive tag antennas. Our tag antenna was designed with 140 × 60 × 10 mm3 size, and reached 26 m measured read-range and 36.3 m mathematically calculated read-range. This UHF tag antenna can be applied to metal and non-metal objects. By adding a further sensing capability, it can have a great benefit for the Internet of Things (IoT) and wireless sensor networks (WSN).


2012 ◽  
Vol 39 (9) ◽  
pp. 1083-1088 ◽  
Author(s):  
Xuesong Shen ◽  
Ming Lu

The state-of-the-art tracking technologies, such as the global positioning system (GPS) and the radio frequency identification (RFID), lend themselves well to applications in relatively open areas, while falling short of accuracy and reliability in indoor or partially covered application settings due to signal blockage, distortion or deterioration. This research aims to address this challenge in construction engineering by exploring a cost-effective positioning methodology to realize automated and continuous tracking of construction resources. The emerging ZigBee-based wireless sensor networks (WSN) technology is introduced. A framework of WSN application is proposed for indoor construction resources tracking, which consists of a group of stationary and mobile sensor nodes that can communicate with one another. Real-time locations of the mobile nodes can be determined by applying the localization method based on received signal strength indicator (RSSI) and geometric trilateration.


Sensors ◽  
2020 ◽  
Vol 20 (4) ◽  
pp. 987
Author(s):  
Luciano Tarricone ◽  
Jasmin Grosinger

Radio frequency identification (RFID) is one of the crucial enabling technologies for the Internet of Things (IoT). This is leading to a continuous augmentation of RFID technologies, in terms of sensing capabilities, energetic autonomy, usability, and cost affordability, and this special issue proposes an overview on such a challenging scenario. The proposed results, in terms of cost reduction, miniaturization, and compatibility with complex systems and technologies, as well as the identification of the relevant criticalities, also pave the way to future steps being taken that go beyond the current IoT.


Sign in / Sign up

Export Citation Format

Share Document