66 resultados para Chipless RFID tag


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Unknown RFID tags appear when the unread tagged objects are moved in or tagged objects are misplaced. This paper studies the practically important problem of unknown tag detection while taking both time-efficiency and energy-efficiency of battery-powered active tags into consideration. We first propose a Sampling Bloom Filter which generalizes the standard Bloom Filter. Using the new filtering technique, we propose the Sampling Bloom Filter-based Unknown tag Detection Protocol (SBF-UDP), whose detection accuracy is tunable by the end users. We present the theoretical analysis to minimize the time and energy costs. SBF-UDP can be tuned to either the time-saving mode or the energy-saving mode, according to the specific requirements. Extensive simulations are conducted to evaluate the performance of the proposed protocol. The experimental results show that SBF-UDP considerably outperforms the previous related protocols in terms of both time-efficiency and energy-efficiency. For example, when 3 or more unknown tags appear in the RFID system with 30 000 known tags, the proposed SBF-UDP is able to successfully report the existence of unknown tags with a confidence more than 99%. While our protocol runs 9 times faster than the fastest existing scheme and reducing the energy consumption by more than 80%.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

RFID and Cloud computing are widely used in the IoT (Internet of Things). However, there are few research works which combine RFID ownership transfer schemes with Cloud computing. Subsequently, this paper points out the weaknesses in two protocols proposed by Xie et al. (2013) [3] and Doss et al. (2013) [9]. To solve the security issues of these protocols, we present a provably secure RFID ownership transfer protocol which achieves the security and privacy requirements for cloud-based applications. To be more specific, the communication channels among the tags, mobile readers and the cloud database are insecure. Besides, an encrypted hash table is used in the cloud database. Next, the presented protocol not only meets backward untraceability and the proposed strong forward untraceability, but also resists against replay attacks, tracing attacks, inner reader malicious impersonation attacks, tag impersonation attacks and desynchronization attacks. The comparisons of security and performance properties show that the proposed protocol has more security, higher efficiency and better scalability compared with other schemes.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In an environmental context, the use of RFID (radio frequency identification) and load cell sensor technology can be employed for not only bringing down waste management costs, but also to facilitate automating and streamlining waste (e.g., garbage, recycling, and green) identification and weight measurement processes for designing smart waste management systems. In this paper, we outline a RFID and sensor model for designing a system in real-time waste management. An application of the architecture is described in the area of RFID and sensor based automatic waste identity, weight, and stolen bins identification system (WIWSBIS).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The use of RHFID (Radio Frequency ldentification) technology can be employed for not only reducing companies management costs but also to track uniquely each shipping container, pallet, case, and product being manufactured, shipped and sold, to increase visibility and accountability in the supply chain. RFID technology connects the supply chain players (i.e., suppliers, manifacturers, distributors, retailers and customers) and allows them to exchange data and product information. Despite these potential benefits, there are challenges and obstacles with the deployment of a RFID-enabled system in the global supply chain. The paper outlines the major RFID issues faced by supply chain management. In this paper, we also present a case study on pharmaceutical supply chain management (SCM) applications by addressing and examining the issues of RFID implementation in a SCM system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Radio Frequency Identification (RFlD) technology is increasingly being explored for deployment in hospitals to improve their existing processes. In recent years, RPID pilots has lead to full scale implementation in hospitals, especially for tracking of expensive equipment as well as movable assets that are critical in surgeries. However, academic research is yet to emerge with a generic process model that can be adapted contextually for deployment of RPID in particular hospital settings. In this paper, we propose an action research framework for a pilot implementation of RPID in a large Indian hospital, the experiences of which will contribute to and result, in the development of such a process model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Radio Frequency Identification Technology (RFIO) has been explored for various process enhancements in clinical contexts, particularly hospitals, for asset tracking. The technology has been accepted in such environments, as it is inexpensive and, in principle, uncomplicated to integrate with other clinical support systems. It is perceived to offer many benefits to currently resource critical/strained clinical environments. This research investigation focuses on the exploitation of the potential of the technology, to enhance processes in clinical environments. In this paper, the researchers aimed to uncover if the technology, as presently deployed, has been able to achieve its potential and, in particular, if it has been fully integrated into processes in a way that maximises the benefits that were perceived. This research is part of a larger investigation that aims to develop a meta-model for integration of RFIO into processes in a form that will maximise benefits that may be achievable in clinical environments. As the first phase of the investigation, the key learning from a clinical context (hospital), which has deployed RFIO and attempted to integrate it into the processes, to enable better efficiencies, is presented in this paper. The case method has been used as a methodological framework. Two clinical contexts (hospitals) are involved in the larger project, which constitutes two phases. In Phase 1, semi structured interviews were conducted with a selected number of participants involved with the RFIO deployment project, before and after, in clinical context 1 (hereinafter named as CCl). The results were then synthesised drawing a set of key learning, from different viewpoints (implementers and users), as reported in this paper. These results outline a linear conduit for a new proposed implementation (CC2). On completion of the phase II, the researchers aim to construct a meta-model for maximising the potential of RFIO in clinical contexts. This paper is limited to the first phase that aims to draw key learning to inform the linear conduit.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

RFID is gaining significant thrust as the preferred choice of automatic identification and data collection system. However, there are various data processing and management problems such as missed readings and duplicate readings which hinder wide scale adoption of RFID systems. To this end we propose an approach that filters the captured data including both noise removal and duplicate elimination. Experimental results demonstrate that the proposed approach improves missed data restoration process when compared with the existing method.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Radio Frequency Identification is a radical technology that is being experimented in hospitals commonly for tracking high value equipment, in order to maximize the efficiency of processes. RFID deployment and integration is mostly vendor and business driven, and hence its potential is not maximized. In this chapter, we propose a strategic framework to develop a process model, that will assist in maximizing the potential of RFID in hospitals.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In a system where distributed network of Radio Frequency Identification (RFID) readers are used to collaboratively collect data from tagged objects, a scheme that detects and eliminates redundant data streams is required. To address this problem, we propose an approach that is based on Bloom filter to detect duplicate readings and filter redundant RFID data streams. We have evaluated the performance of the proposed approach and compared it with existing approaches. The experimental results demonstrate that the proposed approach provides superior performance as compared to the baseline approaches.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

RFID technology promises to revolutionize supply chains and usher in a new era of cost savings, efficiency and business intelligence. The use of low cost RFID devices in supply chain management systems has been increasing dramatically. While a lot of research has been carried out in trying to make a completely RFID enabled global supply chain a reality there still remains a number of hurdles to be surmounted before that vision can be realized. In this paper, we analyze the specific requirements of a RFID enabled global supply chain. Then we develop and present a RFID architecture that is optimized for developing global supply chain applications but is also fully compatible with the currently used RFID architectures. Finally we do a comparative analysis of our framework with the current RFID architecture standard showing our framework has a number of significant advantages over it.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we present a strategy to design the RSA parameters in such a manner so that the CRT-RSA decryption becomes more efficient than the existing methods. We achieve around 21% improvement in speed over the currently best known implementation strategy for CRT-RSA decryption with our properly chosen parameters that also helps in terms of less memory requirement. Moreover, we argue in detail the cryptographic security regarding our choice of the secret parameters.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The use of RFID (Radio Frequency Identification) technology can be employed for tracking and detecting each container, pallet, case, and product uniquely in the supply chain. It connects the supply chain stakeholders (i.e.; suppliers, manufacturers, wholesalers/distributors, retailers and customers) and allows them to exchange data and product information. Despite these potential benefits, security issues are the key factor in the deployment of a RFID-enabled system in the global supply chain. This paper proposes a hybrid approach to secure RFID transmission in Supply Chain Management (SCM) systems using modified Wired Equivalent Encryption (WEP) and Rivest, Shamir and Adleman (RSA) cryptosystem. The proposed system also addresses the common loop hole of WEP key algorithm and makes it more secure compare to the existing modified WEP key process.