نتایج جستجو برای: protocol rfid

تعداد نتایج: 257823  

2010
MARICEL O. BALITANAS TAIHOON KIM

To uniquely identify physical objects, Radio Frequency Identification (RFID) systems are used with its limitless possibilities and low cost. RFID is a method of remotely storing and retrieving data using devices called RFID tags. An RFID tag is a small object, such as an adhesive sticker, that can be attached to or incorporated into a product. But with this common scenario involving numerous ta...

2013
Bharathi

Radio Frequency Identification (RFID) System admits rapid identification of entities by itself in the discipline of pervasive computing. RFID system comprises readers and tags. Readers are communicating with the tag by broadcasting RF signals. In existing RFID system channel assignment, tag identification and collision is a vital issue. Henceforth efforts are requisite to minimize these issues....

Journal: :JSW 2014
Tiancheng Zhang Yifang Yin Dejun Yue Xirui Wang Ge Yu

Radio Frequency Identification (RFID) has been playing more and more important roles in domains such as supply chain management, commodity retail and health custody. RFID data can support functions such as object location, object tracking and trajectory analysis. However, at some point, to deploy many RFID devices into a real application scenario would be very difficult. In this paper, we prese...

Journal: :CoRR 2012
Rolando Trujillo-Rasua

Radio Frequency Identification (RFID) is a technology aimed at efficiently identifying and tracking goods and assets. Such identification may be performed without requiring line-of-sight alignment or physical contact between the RFID tag and the RFID reader, whilst tracking is naturally achieved due to the short interrogation field of RFID readers. That is why the reduction in price of the RFID...

2012
GENG Shu-qin

RFID is one of automatic technology to identify and collect object data quickly through RF digital signals. RFID increases productivity and convenience. RFID is used for hundreds, if not thousands, of applications such as preventing theft of automobiles and merchandise; gaining entrance to buildings; automating parking. But one of the largest disadvantages in RFID system is its low tag (transpo...

2017
Mahmoud Moshref

The most important research in the world in these days, research that looking at the internet of thing's (IoT) topics and their applications. Most of these applications depend on RFID system, which includes RFID readers and tags. The important issues in RFID system or network are how we can reduce anti-collision between readers to identify and read tags data. In these paper, we suggest an Impro...

2007
Mike Burmester Breno de Medeiros

Low-cost RFID tags are already being used for supply chain management and are a promising new technology that can be used to support the security of wireless ubiquitous applications. However current RFID technology is designed to optimize performance, with less attention paid to resilience and security. In this paper we analyze some of the most common types of attack on RFID tags: unauthorized ...

Journal: :IACR Cryptology ePrint Archive 2015
Seyed Salman Sajjadi GhaemMaghami Afrooz Haghbin Mahtab Mirmohseni

Radio Frequency Identification (RFID) applications have spread all over the world and, in order to provide their security and privacy, researchers proposed different kind of protocols. In this paper, we analyzes the privacy of a new protocol, proposed by YuJehn in 2015 which is based on Electronic Product Code Class1 Generation 2 (EPC C1 G2) standard. By applying the Ouafi-Phan privacy model, w...

Journal: :CoRR 2010
Mu'awya Naser Pedro Peris-Lopez Mohammd Rafie Jan C. A. van der Lubbe

In this paper, we analyze the security of an RFID authentication protocol proposed by Liu and Bailey [1], called Privacy and Authentication Protocol (PAP), and show its vulnerabilities and faulty assumptions. PAP is a privacy and authentication protocol designed for passive tags. The authors claim that the protocol, being resistant to commonly assumed attacks, requires little computation and pr...

Journal: :Computer Communications 2010
Basel Alomair Radha Poovendran

Embedding a Radio Frequency Identification (RFID) tag into individual items enables the unique identification of such items over the wireless medium, without the need for a line-of-sight path. One of the main challenges for the successful commercialization of the RFID technology is the efficient, yet private, identification of low-cost tags in the presence of adversaries attempting to illegally...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید