نتایج جستجو برای: rfid system

تعداد نتایج: 2236517  

2014
Kishor T. Patil Santosh K. Narayankhedkar

Tampering of RFID (Radio Frequency Identification) tag data results in misinterpretation of the object to which the tag is attached. Due to the advantages offered by RFID in the field of contactless auto identification, it is being used in the widespread range of applications. With growing adoption of RFID in industries, supply chain management, healthcare systems, security systems, government ...

Journal: :IACR Cryptology ePrint Archive 2013
Raghuvir Songhela Manik Lal Das

Radio Frequency IDentification (RFID) systems are gaining enormous interests at industry due to their vast applications such as supply chain, access control, inventory, transport, health care and home appliances. Although tag identification is the primary security goal of an RFID system, privacy issue is equally, even more, important concern in RFID system because of pervasiveness of RFID tags....

2006
Melanie R. Rieback Georgi N. Gaydadjiev Bruno Crispo Rutger F.H. Hofman Andrew S. Tanenbaum

This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an “RFID firewall”, enabling individuals to monitor and control access to their RFID tags by combining a standard-issue RFID reader with unique RFID tag emulation capabilities. Our system provides a platfor...

2015
Sharif Vakili Ravi Pandit Eric L. Singman Jeffrey Appelbaum Michael V. Boland

BACKGROUND Understanding how patients move through outpatient clinics is important for optimizing clinic processes. This study compares the costs, benefits, and challenges of two clinically important methods for measuring patient flow: (1) a commercial system using infrared (IR) technology that passively tracks patient movements and (2) a custom-built, low cost, networked radio frequency identi...

Journal: :J. Inf. Sci. Eng. 2010
Hsi-Wen Wang Ren-Guey Lee Chun-Chieh Hsiao Guan-Yu Hsieh

Radio frequency identification (RFID) systems have recently been used in a large number of applications. Security and privacy issues have also imposed significant challenges on these systems. Cryptography and authentication protocols have been utilized to effectively solve the security and privacy problems in RFID systems. In this paper, we integrate public key encryption, embedded computation,...

2006

Efficiency: data capturing can be done with less or without labor involved, data collection speed is greatly improved as multiple tags can be identified almost simultaneously; Flexibility: there are not many restrictions on tag placements; Improved data accuracy level: with RFID system, objects can be tracked on the item level; Cost savings: despite all these benefits, RFID is not much more exp...

Journal: :Computer Communications 2021

Advantages of Physically Uncloneable Functions (PUFs) have led to appearing a substantial number novel identification and authentication based systems such as Radio frequency (RFID), which is expected replace the conventional bar-code system due its advantages real-time recognition considerable objects. For example, RFID can be used identify an unmanned aerial vehicle (UAV) when it attached wit...

2014
Nan Li Yi Mu Willy Susilo Fuchun Guo Vijay Varadharajan

Radio Frequency Identification (RFID) has been widely adopted for object identification. An RFID system comprises three essential components, namely RFID tags, readers and a backend server. Conventionally, the system is considered to be controlled by a single party who maintains all the secret information. However, in some practical scenarios, RFID tags, readers and servers could be operated by...

2014
Xiaoqiang Ren

The RFID-based positioning equipment, which is widely used in mine operation such as coal mine, has the advantages of low cost and maturity. It can locate human effectively so that it could improve the production safety situation and provide guarantee for disaster prevention and relief. However, the traditional RFID technology has the drawbacks of small monitoring range and no orientation which...

2004
Kenneth P. Fishkin Bing Jiang Matthai Philipose Sumit Roy

A novel method to infer interactions with passive RFID tagged objects is described. The method allows unobtrusive detection of human interactions with RFID tagged objects without requiring any modifications to existing communications protocols or RFID hardware. The object motion detection algorithm was integrated into a RFID monitoring system and tested in laboratory and home environments. The ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید