Research on the Security Monitoring of the Amusement Ride of Tourist Sites Based on RFID

نویسندگان

  • Jian Shangguan
  • Yingchun Lv
  • Mu Zhang
چکیده

RFID (Radio Frequency Identification) is a new technology making use of radio frequency to do non-touching, two-way data transit between the reader and the electronic tag to identify target and exchange data. Because it is non-touching; it can work from long distance; it is fit to work in an unfavorable environment; it can identify moving target, it is widely used in industry, commerce, storage, transportation. This paper introduces the application of the RFID technology and its state of development and discusses the general situation of its application in different fields. Moreover, this paper takes the tourist mini-train as an example, designs a security monitoring system based on RFID and discusses its application in tourist industry.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Role of RFID to Improve Materials Flow in Mega-projects Site

In according to quantity of various consumption materials in construction sites of complex projects such as oil industry, infrastructure, and large scale commercial, management and monitoring of materials can affect on the final time and cost of project’s activities. In today’s world of rising labor costs and labor shortages, automated materials tracking can provide some advantage to impr...

متن کامل

The Role of RFID to Improve Materials Flow in Mega-projects Site

In according to quantity of various consumption materials in construction sites of complex projects such as oil industry, infrastructure, and large scale commercial, management and monitoring of materials can affect on the final time and cost of project’s activities. In today’s world of rising labor costs and labor shortages, automated materials tracking can provide some advantage to impr...

متن کامل

RSPAE: RFID Search Protocol based on Authenticated Encryption

Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...

متن کامل

Traceability improvements of a new RFID protocol based on EPC C1 G2

Radio Frequency Identification (RFID) applications have spread all over the world. In order to provide their security and privacy, researchers proposed different kinds of protocols. In this paper, we analyze the privacy of a new protocol, proposed by Yu-Jehn in 2015 which is based on Electronic Product Code Class1 Generation 2 (EPC C1 G2) standard. By applying the Ouafi_Phan privacy model, we s...

متن کامل

Comparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis

The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Wireless Sensor Network

دوره 2  شماره 

صفحات  -

تاریخ انتشار 2010