Research on the Security Monitoring of the Amusement Ride of Tourist Sites Based on RFID
نویسندگان
چکیده
RFID (Radio Frequency Identification) is a new technology making use of radio frequency to do non-touching, two-way data transit between the reader and the electronic tag to identify target and exchange data. Because it is non-touching; it can work from long distance; it is fit to work in an unfavorable environment; it can identify moving target, it is widely used in industry, commerce, storage, transportation. This paper introduces the application of the RFID technology and its state of development and discusses the general situation of its application in different fields. Moreover, this paper takes the tourist mini-train as an example, designs a security monitoring system based on RFID and discusses its application in tourist industry.
منابع مشابه
The Role of RFID to Improve Materials Flow in Mega-projects Site
In according to quantity of various consumption materials in construction sites of complex projects such as oil industry, infrastructure, and large scale commercial, management and monitoring of materials can affect on the final time and cost of project’s activities. In today’s world of rising labor costs and labor shortages, automated materials tracking can provide some advantage to impr...
متن کاملThe Role of RFID to Improve Materials Flow in Mega-projects Site
In according to quantity of various consumption materials in construction sites of complex projects such as oil industry, infrastructure, and large scale commercial, management and monitoring of materials can affect on the final time and cost of project’s activities. In today’s world of rising labor costs and labor shortages, automated materials tracking can provide some advantage to impr...
متن کاملRSPAE: RFID Search Protocol based on Authenticated Encryption
Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...
متن کاملTraceability improvements of a new RFID protocol based on EPC C1 G2
Radio Frequency Identification (RFID) applications have spread all over the world. In order to provide their security and privacy, researchers proposed different kinds of protocols. In this paper, we analyze the privacy of a new protocol, proposed by Yu-Jehn in 2015 which is based on Electronic Product Code Class1 Generation 2 (EPC C1 G2) standard. By applying the Ouafi_Phan privacy model, we s...
متن کاملComparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis
The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Wireless Sensor Network
دوره 2 شماره
صفحات -
تاریخ انتشار 2010