نتایج جستجو برای: rfid tags
تعداد نتایج: 24998 فیلتر نتایج به سال:
This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an active mobile device to enforce centralized ACL-based access control policies. Selective RFID Jammin...
With the rapid proliferation of RFID technologies, RFID has been introduced to the applications like safety inspection and warehouse management. Conventionally a number of deployment rules are specified for these applications. This paper studies a practically important problem of rule checking over RFID tags, i.e., checking whether the specified rules are satisfied according to the RFID tags wi...
In the coming future ubiquitous society, Radio Frequency Identification (RFID) tags will be affixed to every product and person. This technology is anticipated to be a key technology that will be utilized by various ubiquitous services where these tags will be used to identify things and people and will automatically take advantage of contextual information such as location. On the other hand, ...
We propose three indoor localization algorithms, namely the leveled nearest-neighbor, leveled multilateration and leveled Bayesian inference, to locate stationary objects (books, merchandise) by affixing passive RFID tags to them. The algorithms use a number of passive tags deployed on the known coordinates as reference points. The simulation results show that the proposed leveled detectable co...
RFID is an automatic identification (Auto-ID) technology. Tiny data-carrying devices known as RFID tags are attached to objects. Readers can interrogate those tags wirelessly so that the associated objects can be identified. For instance, those objects could be supermarket articles to be scanned at the checkout. Other Auto-ID technologies include barcode systems, optical character recognition, ...
RFID is an automatic identification (Auto-ID) technology. Tiny data-carrying devices known as RFID tags are attached to objects. Readers can interrogate those tags wirelessly so that the associated objects can be identified. For instance, those objects could be supermarket articles to be scanned at the checkout. Other Auto-ID technologies include barcode systems, optical character recognition, ...
Security in passive resource-constrained Radio Frequency Identification (RFID) tags is of much interest nowadays. Supply-chain, inventory management are the areas where low-cost and secure batchmode authentication of RFID tags is required. Resistance against illegal tracking, cloning, timing, and replay attacks are necessary for a secure RFID authentication scheme. Reader authentication is also...
Radio frequency identification (RFID) tags are small electronic devices working in the radio frequency range. They use wireless radio communications to automatically identify objects or people without the need for line-of-sight or contact, and are widely used in inventory tracking, object location, environmental monitoring. This paper presents a design of a covert RFID tag network for target di...
Radio Frequency Identification (RFID) technologies are applied in many fields for a variety of applications today. Recently, new solutions are proposed to deploy RF tags on the ground instead of attaching them to objects for RFID-based monitoring and localization. However, the optimal tag deployment strategy is yet to be addressed. In this paper, we identify the optimal deployment patterns that...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید