Explore chapters and articles related to this topic
A Novel Framework of Smart Cities Using Internet of Things (IoT): Opportunities and Challenges
Published in Sanjay Kumar Biswash, Sourav Kanti Addya, Cloud Network Management, 2020
Rahul Chauhan, Preeti Mishra, R.C. Joshi
In terms of service the IoT can be categorised in two different domains. First is ’object’ based and second is ’Internet’ based. Internet services is the main focus in Internet based architecture while data is being sensed & collected by the objects. In object based architecture [321], data and smart objects become the main backbone and multiple sensing devices are working together to realize the common goal. Networking of sensors and connecting to them on the Internet is required in both cases. RFID, Barcode and WSN are the integrated part of sensing layer which is the innermost layer on an IoT network. RFID is associated with radio frequency identification technology available in the form of active and passive tags. Having a diverse application from security to the unique identification of smart devices in an IoT network. Barcode is associated with the representation of data in the network in machine readable form and this uniqueness is created by varying the width and line space. Just like RFID it is also used for creating the unique identity and has an application in security and authentication. The interconnected network of diverse sensors with the ability to sense and act according to the programmable device is called wireless sensor network (WSN). As the sensor fabrication technology is getting cheaper, more compact and affordable sensors are commercially available for sensing applications.
An efficient tag identification algorithm for dynamic environment in RFID systems
Published in Artde D.K.T. Lam, Stephen D. Prior, Siu-Tsen Shen, Sheng-Joue Young, Liang-Wen Ji, Engineering Innovation and Design, 2019
Kuang-Li Tseng, Chen-Chuan Wu, Chiu-Kuo Liang
Radio-frequency identification (RFID) is modern technology that is widely used in industrial applications, such as object identification and tracking, supply-chain management, wireless sensor networks (Li, et al., 2007; Shirehjini, et al., 2012), and inventory management (Vogt, 2002). Traditional identification systems, such as barcodes, are inefficient at automatic identification and data collection due to their read rate, visibility, and contact limitations. On the contrary, the RFID systems can provide fast and reliable communication without the requirement of physical visibility or contact between readers and tags. Based on these advantageous features, today’s RFID technology goes beyond identification of objects and is being used for localization (Dardari, et al., 2016; Qiu, et al., 2016) and sensing applications (Naderiparizi, et al., 2015).
RFID Specification Revisited
Published in Lu Yan, Yan Zhang, Laurence T. Yang, Huansheng Ning, The Internet of Things, 2008
Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. Estevez-Tapiador, Arturo Ribagorda
RFID (Radio Frequency Identification) is the name given to all technologies that use radio waves to automatically identify and account transactions on people, animals, or objects [1] by means of electromagnetic proximity [2]. RFID technology is not new, as one of its first usages dates from 1940 where a RFID-based Identification Friend or Foe (IFF) system was used [3]. There are multiple standards related to RFID technology. In this chapter, the Electronic Product Code (EPC) Class-1 Generation-2 is examined. This standard can be considered as the “universal” standard for Class-1 RFID tags. Class-1 RFID tags are very limited both in their computational and storage capabilities. Because of these severe restrictions, the usage of standard cryptographic primitives is not possible. However, RFID tags are susceptible to attacks also found in other technologies, such as wireless, bluetooth, smart-cards, etc. Therefore, once the EPC Class-1 Generation-2 specification is explained, a security analysis will reveal its weak points. Furthermore, current proposals to enhance its security level are presented and analyzed. Finally, the chapter is concluded identifying some open research issues to increment the security of low-cost RFID tags.
Developing an RFID-based tracking system to improve the control of construction surplus soil disposal in Taiwan
Published in Journal of the Chinese Institute of Engineers, 2019
Rong-yau Huang, Tsung-Yi Tsai, Han-Hsiang Wang
Radio-frequency identification (RFID) is a wireless sensor technology that uses radio waves and signals to wirelessly transmit, retrieve, and store data to identify the status of objects and contents. RFID can be read at long ranges and be operated in extreme environments. This technology has been widely applied in object identification and tracking (Domdouzis, Kumar, and Anumba 2007; McCarthy et al. 2003; Uddin et al. 2009). Jaselskis et al. (1995) proposed that potential RFID applications in construction include concrete operations, human resources, equipment expense allocation, and material control. In Taiwan, RFID has also been implemented in construction areas, such as concrete specimen management, precast concrete component identification, fire-proof door verification, and steel structure assembling (Wang 2008; Lin, Cheung, and Siao 2014). In this study, we developed an RFID-based system to track the disposal of construction-site surplus soil for automating data processing to prevent human errors and manipulation. By applying the developed system, the effectiveness of tracking construction surplus soil disposal can be improved.
Lightweight authentication scheme with inverse operation on passive RFID tags
Published in Journal of the Chinese Institute of Engineers, 2019
Yali Liu, Xinchun Yin, Yongquan Dong, Keke Huang
Radio frequency identification (RFID) is a technology which can remotely identify objects automatically. Its adoption is quite low cost. Nowadays, RFID technology has been deployed in many application scenarios such as transportation, education, agriculture, military and defenses, industry, government, tickets, access control, inventory checking, supply chain management, and payments (Luan et al. 2012; Lu et al. 2014). With the widespread applications of RFID technology, privacy problems (Zuo 2010), various practical malicious attacks (Lee, Chien, and Laih 2012; Plos et al. 2013; Hermans, Peeters, and Preneel 2014), and the omission of security features (Ahmadian, Salmasizadeh, and Aref 2013; Avoine, Coisel, and Martin 2014; Sundaresan et al. 2015) threaten RFID systems. They are vulnerable to attacks, such as eavesdropping, intercepting, modification, blocking and jamming, counterfeiting, spoofing, man in the middle, traceability, desynchronization, and denial of service.
Accuracy of human motion capture systems for sport applications; state-of-the-art review
Published in European Journal of Sport Science, 2018
Eline van der Kruk, Marco M. Reijne
Radio frequency identification (RFID) is a wireless non-contact system which uses electromagnetic waves and electromagnetic fields to transfer data from a tag attached to an object, to the RFID reader. There are two sorts of tags: active tags, which actively emit radio waves, and passive tags, which can be read only over short ranges since they are powered and read via magnetic fields (induction). Passive tags practically have no lifetime, since they do not require any power from batteries (Shirehjini, Yassine, & Shirmohammadi, 2012). The RFID carpet of Shirehjini et al. (2012) consists of passive tags and reported accuracies of 0.17 m in a 5.4-m2 area (Shirehjini et al., 2012). Ubisense is a commercially available system, originally designed for enterprises to track assets and personnel, that uses the active RFID technology. In sports, the system was tested at an indoor basketball field (420 m2), reporting an accuracy of 0.19 m (Perrat, Smith, Mason, Rhodes, & Goosey-Tolfrey, 2015; Rhodes, Mason, Perrat, Smith, & Goosey-Tolfrey, 2014).