Layered OSGi-based Reconfigurable Lightweight RFID Reader Protocol

نویسندگان

  • Aniruddha Bhattacharjya
  • Rajat Kumar Pal
چکیده

Radio Frequency Identification (RFID) systems are emerging as a practical means of auto-identification in a wide variety of applications in the modern era and as one of the most pervasive computing technologies in history. A typical RFID system is usually composed of four parts: tag, RFID reader, RFID middleware and application system. The host system seeking between the hardware and the enterprise system should introduce intelligent operational environment using configurable rules and lightweight, event driven architecture for smoothing and restricting high volume of raw events injected from the physical world. Such implementation should be part and parcel of a generic middle-ware platform to ensure an open environment and adaptability. To make the RFID reader integration uniform and effective, and meet the low calculation requirement of low-cost readers, a layered OSGi-based Reconfigurable Lightweight RFID Reader Protocol is presented here. Bearing in mind that the EPC standard has become a virtual standard of RFID system due to its rapid development, to meet the demand of EPC Reader Protocol Standard (RPS), the presented protocol is specified in four layers, respectively the Discovery Layer, the Reader Layer, the Tag Layer and the Notify Layer. Differ from EPCRPS, in which different Messaging/Transport Bindings provide for different kinds of transport, the Messaging Layer and the Transport Layer are no longer designed to be working in pairs. This protocol makes the reader integration uniform and effective.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

متن کامل

An Ultra-lightweight RFID Distance Bounding Protocol

Security and privacy of RFID systems have become very important issues along with their increasing applications. Recently, Jeon and Yoon proposed a new ultra-lightweight RFID authentication protocol(RAPLT) using merge and separation operations. Since their protocol uses very lightweight bitwise operations: XOR, merge, and separation operations, it will be suitable for the applications using low...

متن کامل

A Secure RFID Reader Protocol based on SLRRP

The research on the security of RFID (Radio Frequency Identification) has occupied the attention. Most of previous research results focus on the security and privacy between a RFID tag and a reader. However, the research on the security between a reader and a back-end server leaves much to be desired. And moreover The standard parties of RFID reader protocol, that are EPCglobal Reader Protocol ...

متن کامل

RSPAE: RFID Search Protocol based on Authenticated Encryption

Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...

متن کامل

A Quadratic Residue-Based Lightweight RFID Mutual Authentication Protocol with Constant-Time Identification

—Many RFID authentication protocols have been developed in recent years. However, most require the reader to search all tags in the system to identify a single tag. This problem makes the protocols impractical in large-scale RFID deployments. To address this problem, we propose a privacypreserving mutual authentication protocol for RFID systems with constant-time identification, based on Quadr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010