958 resultados para Chipless RFID tag


Relevância:

80.00% 80.00%

Publicador:

Resumo:

Nell’attuale contesto, caratterizzato da un’elevata attenzione alla qualità e alla sicurezza degli alimenti e alle soluzioni tese a garantirli, l’implementazione di sistemi microelettronici per il controllo del prodotto attraverso supporti miniaturizzati e a basso costo può risultare un’opportunità strategica. Oggetto della ricerca di dottorato sono stati lo studio dell’utilizzo di sensori e strumentazione innovativi per la misurazione ed il controllo di parametri ambientali di conservazione di prodotti alimentari e per la loro identificazione mediante la tecnologia della radiofrequenza. Allo scopo è stato studiato il contesto in cui operano gli attori principali della filiera agroalimentare ed è stata sviluppata un’idea di etichetta progettata per essere in grado di emettere attivamente segnale di allarme in caso di necessità (etichetta RFID intelligente semi-passiva). Il prototipo di chip, realizzato in via sperimentale, è stato validato positivamente, sia come strumento di misura, sia in termini di prestazione nel caso studio del monitoraggio della conservazione di un prodotto alimentare in condizioni controllate di temperatura e radiazione luminosa. Le significative evidenze analitiche di reazioni di degradazione dello stato qualitativo del prodotto, quali analisi di pH e colore, raccolte durante il periodo di osservazione di 64 giorni, hanno trovato riscontro con le misure rilevate dal chip prototipo. I risultati invitano ad individuare un partner industriale, con il quale sperimentare l’applicazione della tecnologia proposta.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Die Steuerung logistischer und produktionstechnischer Systeme ist heute durchgängig hierarchisch organisiert. Auch dezentrale und wandelbare Systeme mit eingebetteten fraktalen oder adaptiven Elementen oder Regelkreisen lassen sich in ihrer Gesamtheit stets auf eine zeitgenaue zentrale Planung zurückführen. „Realtime Logistics“ bezeichnet im Gegensatz hierzu die echtzeitnahe Materialflusssteuerung auf Basis einer autonomen, selbstgesteuerten Abwicklung der im einzelnen logistischen Objekt implementierten Mission. Hierzu werden mobile Softwareagenten eingesetzt, die zunächst synchron zum Objekt, und in Zukunft eingebettet im logistischen Objekt, laufen werden.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Die lösbare Verbindung von mechanischen Komponenten innerhalb von Maschinen und Anlagen wird zumeist über Schraubverbindungen realisiert. Um eine ausreichende Verbindung zu erzielen werden derzeit die Klemmkräfte durch ein definiertes Anzugsmoment aufgebracht. Bei der Berechnung des Momentes entsprechend der benötigten Kraft finden Reibbeiwerte innerhalb der Schraubverbindung Berücksichtigung, welche nur bedingt ermittelt werden können. In kritischen Maschinenkomponenten wird daher eine Überdimensionierung der Schrauben zur Erhöhung der Sicherheit akzeptiert. Die direkte Kraftmessung mittels einer intelligenten Unterlegscheibe und eine transpondergestützte Datenübertragung ermöglicht es, die Kräfte genau einzustellen und somit die Sicherheit zu erhöhen.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Food safety has always been a social issue that draws great public attention. With the rapid development of wireless communication technologies and intelligent devices, more and more Internet of Things (IoT) systems are applied in the food safety tracking field. However, connection between things and information system is usually established by pre-storing information of things into RFID Tag, which is inapplicable for on-field food safety detection. Therefore, considering pesticide residue is one of the severe threaten to food safety, a new portable, high-sensitivity, low-power, on-field organophosphorus (OP) compounds detection system is proposed in this thesis to realize the on-field food safety detection. The system is designed based on optical detection method by using a customized photo-detection sensor. A Micro Controller Unit (MCU) and a Bluetooth Low Energy (BLE) module are used to quantize and transmit detection result. An Android Application (APP) is also developed for the system to processing and display detection result as well as control the detection process. Besides, a quartzose sample container and black system box are also designed and made for the system demonstration. Several optimizations are made in wireless communication, circuit layout, Android APP and industrial design to realize the mobility, low power and intelligence.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Dissertação de Mestrado, Engenharia Electrónica e Telecomunicações, Faculdade de Ciências e Tecnologia, Universidade do Algarve, 2014

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In this paper we propose a novel secure tag ownership transfer scheme for closed loop RFID systems. An important property of our method is that the ownership transfer is guaranteed to be atomic and the scheme is protected against desynchronisation leading to permanent DoS. Further, it is suited to the computational constraints of EPC Class-1 Gen-2 passive RFID tags as they only use the CRC and PRNG functions that passive RFID tags are capable of. We provide a detailed security analysis to show that our scheme satisfies the required security properties of tag anonymity, tag location privacy, forward secrecy, forward untraceability while being resistant to replay, desynchronisation and server impersonation attacks. Performance comparisons show that our scheme is practical and can be implemented on passive low-cost RFID tags.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In this paper we propose a secure ownership transfer protocol for a multi-tag and multi-owner RFID environment. Most of the existing work in this area do not comply with the EPC Global Class-1 Gen-2 (C1G2) standard since they use expensive hash operations or sophisticated encryption schemes that cannot be implemented on low-cost passive tags that are highly resource constrained. Our work aims to fill this gap by proposing a protocol based on simple XOR and 128-bit Pseudo Random Number Generators (PRNG), operations that can be easily implemented on low-cost passive RFID tags. The protocol thus achieves EPC C1G2 compliance while meeting the security requirements. Also, our protocol provides additional protection using a blind-factor to prevent tracking attacks.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The objective of the research is to develop security protocols for EPC C1G2 RFID Passive Tags in the areas of ownership transfer and grouping proof.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In this paper we propose a secure ownership transfer protocol for a multi-tag multi-owner RFID environment that provides individual-owner-privacy. To our knowledge, the existing schemes do not provide individual-owner-privacy and most of the existing schemes do not comply with the EPC Global Class-1 Gen-2 (C1G2) standard since the protocols use expensive hash operations or sophisticated encryption schemes that cannot be implemented on low-cost passive tags that are highly resource constrained. Our work aims to fill these gaps by proposing a protocol that provides individual-owner-privacy, based on simple XOR and 128-bit pseudo-random number generators (PRNG), operations that are easily implemented on low-cost RFID tags while meeting the necessary security requirements thus making it a viable option for large scale implementations. Our protocol also provides additional protection by hiding the pseudo-random numbers during all transmissions using a blind-factor to prevent tracking attacks.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

I sistemi di identificazione tramite radiofrequenza hanno acquistato negli ultimi tempi una sempre maggiore importanza per il mondo produttivo, soprattutto nel settore della movimentazione delle merci, evolvendo verso applicazioni di tracciamento sempre più avanzate. La tesi si propone di analizzare in dettaglio la tecnologia RFId, chiarendone gli aspetti fondamentali ed esponendo criticità e punti di forza.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

La tesi è incentrata sul progetto di un PCB in grado di testare il corretto funzionamento del chip GRETA, un integrato dedicato, che implementa un nodo intelligente basato su harvesting RF. L'integrato implementa un sistema innovativo di comunicazione per RFID, che sfrutta la metodologia Green Tagging, per la trasmissione di sequenze RF. Vengono elaborate le diverse fasi di progettazione e di design pcb attraverso un programma di cad. Lo scopo è quello di realizzare un unico sistema perfettamente controllabile dall'utente, che attraverso i componenti messi a disposizione dalla scheda di testing, permetta di ricevere, inviare o escludere i segnali che afferiscono ai pin di Input/output del chip integrato. E' stata introdotta la possibilità di pilotare/testare separatamente le sottoparti interne al chip, con lo scopo di isolare eventuali malfunzionamenti.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

RFID has been widely used in today's commercial and supply chain industry, due to the significant advantages it offers and the relatively low production cost. However, this ubiquitous technology has inherent problems in security and privacy. This calls for the development of simple, efficient and cost effective mechanisms against a variety of security threats. This paper proposes a two-step authentication protocol based on the randomized hash-lock scheme proposed by S. Weis in 2003. By introducing additional measures during the authentication process, this new protocol proves to enhance the security of RFID significantly, and protects the passive tags from almost all major attacks, including tag cloning, replay, full-disclosure, tracking, and eavesdropping. Furthermore, no significant changes to the tags is required to implement this protocol, and the low complexity level of the randomized hash-lock algorithm is retained.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper, the security of two recent RFID mutual authentication protocols are investigated. The first protocol is a scheme proposed by Huang et al. [7] and the second one by Huang, Lin and Li [6]. We show that these two protocols have several weaknesses. In Huang et al.’s scheme, an adversary can determine the 32-bit secret password with a probability of 2−2 , and in Huang-Lin-Li scheme, a passive adversary can recognize a target tag with a success probability of 1−2−4 and an active adversary can determine all 32 bits of Access password with success probability of 2−4 . The computational complexity of these attacks is negligible.

Relevância:

30.00% 30.00%

Publicador: