RFID Applications and Challenges
نویسندگان
چکیده
Radio Frequency identification (RFID) is the popular wireless induction system [1-7]. The same as the general bar code identification, each RFID tag in an RFID system is assumed that equips a unique ID (UID) itself. A standard RFID system is consisted of Tag, Reader, and Application. When an independent RFID tag approaches the RFID antenna, the induc‐ tion between RFID tag and antenna happens. The RFID antenna reads the information and content recorded in the tag. Then the information is translated into the computational data by the RFID reader. Due to the portable RFID tag and untouched data transmission, many local or small area wireless applications for track and trace based on RFID systems were proposed.
منابع مشابه
RFID: A Bibliographical Literature Review with Future Research Directions
Abstract Purpose of this paper: The purpose of this article is to review some of the most prominent applications of RFID in industries and to provide a comprehensive review of the work done from 1985 through 2007 and the research trend on that. The effectiveness of RFID and the challenges that it is facing with are also discussed. Some applications of radio frequency identification in supply ...
متن کاملSome Applications of RFID in Manufacturing Engineering
Three of the major technical challenges that restricted RFID applications in manufacturing engineering were investigated in this paper. The three challenges are: interference and reader collision, liquids and metal items, and antenna positioning and orientation. The progress in overcoming these challenges and the technical solutions to these barriers were surveyed. Some applications of RFID in ...
متن کاملRFID (Radio Frequency Identification): Principles and Applications
Deployment of radio frequency identification (RFID) systems is rapidly growing and has the potential to affect many different industries and applications. We present a brief history of RFID technology and automatic identification systems. We summarize major RFID applications, and present a primer on RFID fundamental principles. Finally, we discuss several challenges and obstacles to RFID adopti...
متن کاملEnhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملSecurity Challenges for User-Oriented RFID Applications
In this article, we examine the role played by RFID in enabling user-oriented networked applications. We explain why RFID is seen to be an important building block of the ‘Internet of Things’ and examine how RFID, assisted by the deployment of NFC devices, is increasingly facilitating useroriented, Internet-based application architectures. Finally, we look at the high-level security challenges ...
متن کاملRSPAE: RFID Search Protocol based on Authenticated Encryption
Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...
متن کامل