mobile rfid
Recently Published Documents


TOTAL DOCUMENTS

253
(FIVE YEARS 17)

H-INDEX

19
(FIVE YEARS 2)

Author(s):  
Jiuwu Zhang ◽  
Xiulong Liu ◽  
Tao Gu ◽  
Xinyu Tong ◽  
Sheng Chen ◽  
...  

Author(s):  
Yubao Hou ◽  
Hua Liang ◽  
Juan Liu

In the traditional RFID system, the secure wired channel communication is used between the reader and the server, and the new mobile RFID system is different from the traditional RFID system. The reader and the server communicate based on the wireless channel. This makes authentication protocols applicable to traditional RFID systems not applicable to mobile RFID systems. To solve this defect, a two-way authentication protocol MSB is proposed for ultra-lightweight mobile radio frequency identification system based on bit replacement operation. MSB (most significant bit) encrypts information based on bitwise operations, and the amount of computation of the communication entity is reduced. Tags, readers, and servers first authenticate and then communicate. MSB can be resistant to common attacks. The security analysis of the protocol shows that the protocol has high security attributes, and the performance analysis of the protocol shows that the protocol has the characteristics of low calculation volume. The formal analysis of the protocol is given based on GNY logic.


Author(s):  
Yubao Hou ◽  
Hua Liang ◽  
Juan liu

In the traditional RFID (Radio Frequency IDentification) system, a secure wired channel communication is used between the reader and the server. The newly produced mobile RFID system is different from the traditional RFID system, the communication between the reader and the server is based on a wireless channel, and the authentication protocol is suitable for traditional RFID systems, but it cannot be used in mobile RFID systems. To solve this problem, a mutual authentication protocol MSB (Most Significant Bit) for super lightweight mobile radio frequency identification system is proposed based on bit replacement operation. MSB is a bitwise operation to encrypt information and reduce the computational load of communication entities. Label, readers, and servers authenticate first and then communicate, MSB may be used to resistant to common attacks. The security analysis of the protocol shows that the protocol has high security properties, the performance analysis of the protocol shows that the protocol has the characteristics of low computational complexity, the formal analysis of the protocol based on GNY logic Gong et al. (1990) provides a rigorous reasoning proof process for the protocol.


Sensors ◽  
2020 ◽  
Vol 20 (6) ◽  
pp. 1711 ◽  
Author(s):  
Qian Ma ◽  
Xia Li ◽  
Guanyu Li ◽  
Bo Ning ◽  
Mei Bai ◽  
...  

Radio Frequency Identification (RFID) technology has been widely used in indoor location tracking, especially serving human beings, due to its advantage of low cost, non-contact communication, resistance to hostile environments and so forth. Over the years, many indoor location tracking methods have been proposed. However, tracking mobile RFID readers in real-time has been a daunting task, especially for achieving high localization accuracy. In this paper, we propose a new Mobile RFID (M-RFID)-based Localization approach for Indoor Human Tracking, named MRLIHT. Based on the M-RFID model where RFID readers are equipped on the moving objects (human beings) and RFID tags are fixed deployed in the monitoring area, MRLIHT implements the real-time indoor location tracking effectively and economically. First, based on the readings of multiple tags detected by an RFID reader simultaneously, MRLIHT generates the response regions of tags to the reader. Next, MRLIHT determines the potential location region of the reader where two algorithms are devised. Finally, MRLIHT estimates the location of the reader by dividing the potential location region of the reader into finer-grained grids. The experimental results demonstrate that the proposed MRLIHT performs well in both accuracy and scalability.


Author(s):  
Jian Su ◽  
Zhengguo Sheng ◽  
Alex X. Liu ◽  
Yu Han ◽  
Yongrui Chen
Keyword(s):  

Author(s):  
Xiulong Liu ◽  
Jiuwu Zhang ◽  
Shan Jiang ◽  
Yanni Yang ◽  
Keqiu Li ◽  
...  

Sensors ◽  
2019 ◽  
Vol 20 (1) ◽  
pp. 22 ◽  
Author(s):  
Jia-Ning Luo ◽  
Ming-Hour Yang

Mobile radio frequency identification (RFID) has been extensively applied in a wide range of fields. In supply chain management, RFID is used to more efficiently manage the ownership transfer of cargo. The transfer of a group of tags belonging to multiple owners is often required at the front end of a supply chain. This study, therefore, proposes a secure, high-performance threshold multi-owner partial tag ownership transfer protocol that supports a mobile RFID environment and features the capabilities and security required for supporting existing ownership transfer environments (e.g., application for different authorities, designation of the transfer target, and ownership transfer of a group of tags). Moreover, the proposed protocol can resist against most of the known attacks on RFID.


Sign in / Sign up

Export Citation Format

Share Document