scholarly journals A Framework for the Implementation of RFID Systems

10.5772/56511 ◽  
2013 ◽  
Vol 5 ◽  
pp. 9 ◽  
Author(s):  
S. L. Ting ◽  
Albert H. C. Tsang ◽  
Y. K. Tse

There are an increasing number of organizations planning to implement Radio Frequency Identification (RFID) systems to enhance their competitiveness. Due to the novelty of the technology, many managerial challenges exist in determining and planning for the implementation of such systems. These challenges often lead to wasted efforts and resources, as well as to failed implementations. This paper presents a systematic and holistic RFID implementation framework which has been validated by both users and experts. The framework outlines the important tasks to be performed in each step of the implementation process. To enable practitioners to make informed go/no-go decisions, essential considerations of implementation are also discussed in this paper. Furthermore, the critical success factors for the deployment of such systems are also elaborated.

Author(s):  
Yubao Hou ◽  
Hua Liang ◽  
Juan liu

In the traditional RFID (Radio Frequency IDentification) system, a secure wired channel communication is used between the reader and the server. The newly produced mobile RFID system is different from the traditional RFID system, the communication between the reader and the server is based on a wireless channel, and the authentication protocol is suitable for traditional RFID systems, but it cannot be used in mobile RFID systems. To solve this problem, a mutual authentication protocol MSB (Most Significant Bit) for super lightweight mobile radio frequency identification system is proposed based on bit replacement operation. MSB is a bitwise operation to encrypt information and reduce the computational load of communication entities. Label, readers, and servers authenticate first and then communicate, MSB may be used to resistant to common attacks. The security analysis of the protocol shows that the protocol has high security properties, the performance analysis of the protocol shows that the protocol has the characteristics of low computational complexity, the formal analysis of the protocol based on GNY logic Gong et al. (1990) provides a rigorous reasoning proof process for the protocol.


2017 ◽  
Vol 2017 ◽  
pp. 1-9 ◽  
Author(s):  
Ju-min Zhao ◽  
Ding Feng ◽  
Deng-ao Li ◽  
Wei Gong ◽  
Hao-xiang Liu ◽  
...  

Radio Frequency Identification (RFID) is an emerging technology for electronic labeling of objects for the purpose of automatically identifying, categorizing, locating, and tracking the objects. But in their current form RFID systems are susceptible to cloning attacks that seriously threaten RFID applications but are hard to prevent. Existing protocols aimed at detecting whether there are cloning attacks in single-reader RFID systems. In this paper, we investigate the cloning attacks identification in the multireader scenario and first propose a time-efficient protocol, called the time-efficient Cloning Attacks Identification Protocol (CAIP) to identify all cloned tags in multireaders RFID systems. We evaluate the performance of CAIP through extensive simulations. The results show that CAIP can identify all the cloned tags in large-scale RFID systems fairly fast with required accuracy.


2016 ◽  
Vol 8 (1) ◽  
pp. 102-126 ◽  
Author(s):  
Waqar Siddique

Abstract: This research turns e-government policy into practice in two ways, firstly to distil the lessons from existing evidence and experience about e-government implementation of policies and secondly by assessing the quality of the evidence, gaps in the existing research, and ways that research findings can support the implementation process in Pakistan. The main question, therefore, is how far national policy aspirations translate into actions, which are meaningful, tangible and measurable at a local level. This means the consistency of the goals at all levels remain the same i.e., macro and micro levels. This study identifies critical factors that determine the faith of policy implementation in Pakistan. The proposed model, which is based on these critical factors, is validate by analyzing different hypothesizes using empirical analysis i.e., quantitative and qualitative. This study provides a fair idea about intrinsic and extrinsic behavior of these critical success factors towards e-government policy implementation concerning Pakistan. This study also facilities successful e-government implementation in Pakistan by setting direction and guidelines for all implementation stakeholders.


Author(s):  
Simona Sternad ◽  
Samo Bobek ◽  
Zdenko Dezelak ◽  
Ana Lampret

Enterprise resource planning (ERP) solution implementation is a complex process, that requires substantial resources and efforts, and yet the results are very uncertain. The ERP hype has already reached SMEs, so the authors have examined the strategies, methods and critical success factors from SMEs point of view. The results of our survey in SMEs in Slovenia have shown that SMEs have to pay attention to different critical success factors in different phases of the implementation process. Moreover, there are differences in implementation process as opposed to large companies. Case studies of two SMEs have shown similar results. Recommendations for future SME implementations and comments of our findings can be found in conclusion.


Author(s):  
Ian Graham ◽  
Raluca Bunduchi ◽  
Martina Gerst ◽  
Robin Williams

For RFID technology (radio frequency identification), the forms of the standardisation processes are co-evolving with the technology and are being shaped by the technology itself and by the needs of users. However, the engagement of the large majority of end-users in standards development is at best limited. Based on semi-structured interviews with key actors in the automotive industry, the chapter discusses the role that RFID standards play in shaping the adoption of RFID systems in the automotive supply chain.


Author(s):  
Dennis M.L. Wong ◽  
Raphael C.W. Phan

In this chapter, we discuss the business implications, as well as security and privacy issues, of the widespread deployment of radio frequency identification (RFID) systems. We first describe, in more detail, the components that make up an RFID system to facilitate better understanding of the implications of each, and then review the commercial applications of the RFID. We then discuss the security and privacy issues for RFID systems and what mechanisms have been proposed to safeguard these. The topics discussed in this chapter highlight the benefits of using RFIDs for user convenience in ubiquitous and pervasive commercial services and e-businesses, while maintaining the integrity of such systems against malicious attacks on the users’ security and privacy. This is vital for a business establishment to coexist with peers and remain competitively attractive to customers.


The focus of this chapter is on various concepts that need to be carefully considered when defining an information systems strategic plan (ISSP) for enhancing public service delivery in the digital era. The first concept discussed is the critical success factors framework. This framework ensures that the ISSP strategic objectives are aligned with the corporate strategic objectives. The aim is to identify those critical success factors that ensure the successful implementation of the ISSP and to determine whether these factors are being achieved in the implementation process. Secondly, the chapter will consider the general implementation philosophy, including the IS application acquisition methods and the key IS features. This ensures the implementation of value for money IS applications. The third concept considered is related to the justification methods for undertaking IS applications. Finally, the chapter will discuss a number of ICT planning issues that may be applicable to the public sector.


2018 ◽  
Vol 2 (12) ◽  
Author(s):  
Gnanesswaran Vettrivel

Radio frequency identification (RFID) system is an automatic data capturing system that relies on remotely retrieving data stored on tags using devices called readers. The National Aeronautics and Space Administration (NASA) and a team of contractors, university researchers and technology vendors collaborated to investigate the reliability of RFID systems for automated crew-free inventory control aboard the ISS. In this manuscript we detail the decade long research accomplishments and the maturity of this RFID technology that is being currently used in Space for inventory management.


Sign in / Sign up

Export Citation Format

Share Document