نتایج جستجو برای: rfid tags
تعداد نتایج: 24998 فیلتر نتایج به سال:
In Radio Frequency Identification (RFID) systems a reader device detects and identifies nearby electronic tags. Traditionally,the performance of RFID systems and their identification protocols has been analyzed for static configurations, that is, without considering incoming or outgoing tags, but just a fixed number of initially unidentified tags ,and also it has been measure in terms of throug...
Radio-frequency identification (RFID) is a tracking technology that enables immediate automatic object identification and rapid data sharing for a wide variety of modern applications using radio waves for data transmission from a tag to a reader. RFID is already well established in technical areas, and many companies have developed corresponding standards and measurement techniques. In the cons...
The recent emergence of RFID tags capable of performing public key operations has enabled a number of new applications in commerce (e.g., RFIDenabled credit cards) and security (e.g., ePassports and access-control badges). While the use of public key cryptography in RFID tags mitigates many difficult security issues, certain important usability-related issues remain, particularly when RFID tags...
Mobile RFID applications combine RFID technologies and mobile device to create a new convenient application area. However, most of the applications suffer from the security issues due to insecure communication channels among tags, readers and servers. In 2012, Zhou et al. proposed an ECC-based mutual authentication protocol to promote mobile RFID applications security. However, we found their p...
Low-cost RFID tags are already being used for supply chain management and are a promising new technology that can be used to support the security of wireless ubiquitous applications. However current RFID technology is designed to optimize performance, with less attention paid to resilience and security. In this paper we analyze some of the most common types of attack on RFID tags: unauthorized ...
RFID uses radio frequency waves to track and identify objects. RFID system consists of tags and readers. Passive RFID tags are more popular now days due to its simpler circuitry, lower weight and lower cost. Generally passive tags are attached with an object for unique identification. A tag contains information about the particular product, to which it is attached. RFID reader is used to interr...
Radio Frequency Identification (RFID) technology offers a lot of promises. To redeem them, RFID applications have to respect privacy and they need to be supported by the legal system. The article evaluates how the current EU directives on data protection support emerging applications that are based on RFID tags. The evaluation is based on user scenarios that illustrate human needs in relation t...
The emerging technology of Radio Frequency IDentification (RFID) has enabled a wide range of automated tracking and monitoring applications. However, the process of interrogating a set of RFID tags usually involves sharing a wireless communication medium by an RFID reader and many tags. Tag collisions result in a significant delay to the interrogation process, and such collisions are hard to ov...
In an active RFID based wireless localization system, usually a number of RFID readers are required to generate localization beacon broadcasts from which a RFID tag can collect multiple RSSI measurements and forward them to a localization server for calculating the location of the tag. Such operations should be done from time to time when the tag is moving. Collisions may happen at the tag if t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید