نتایج جستجو برای: reader to tag collision

تعداد نتایج: 10630264  

Journal: :IEEE Transactions on Molecular, Biological, and Multi-Scale Communications 2022

This paper proposes an ultrasonic backscatter communication (UsBC) system for passive implantable medical devices (IMDs) that can operate without batteries, enabling versatile revolutionary applications future healthcare. The proposed UsBC consists of a reader and tag. sends interrogation pulses to the tag backscatters based on piezoelectric effect piezo transducer. We present several basic mod...

2006
Claude Castelluccia Gildas Avoine

We propose a protocol that can be used between an RFID tag and a reader to exchange a secret without performing any expensive computation. Similarly to the famous blocker tag suggested by Juels, Rivest, and Szydlo, our scheme makes use of special tags that we call noisy tags. Noisy tags are owned by the reader’s manager and set out within the reader’s field. They are regular RFID tags that gene...

2010
ILKER KORKMAZ COSKUN ATAY

In the last decade, Radio Frequency Identification (RFID) has become popular in so many fields from military to industry applications. RFID tags have been embedded into many various products especially in logistics sector. A tag stores individual information of its attached object and an RFID reader communicates with the tag in radio frequencies to identify the object. This object to be monitor...

2012
Ji Young Chun Jung Yeon Hwang Dong Hoon Lee

Radio frequency identification (RFID) technology is used to identify RFID-tagged objects automatically. An RFID system generally consists of three components: an RFID tag, an RFID reader, and a backend system. An RFID tag is a small device for identification, which is attached to or embedded in an object. It has an unique identifier and may optionally hold additional product information for the...

Journal: :JCM 2008
Tianjie Cao Peng Shen Elisa Bertino

Two effective attacks, namely de-synchronization attack and impersonation attack, against Ha et al. ’s LCSS RFID authentication protocol, Song and Mitchell’s protocol are identified. The former attack can break the synchronization between the RFID reader and the tag in a single protocol run so that they can not authenticate each other in any following protocol run. The latter can impersonate a ...

2014
Nan Li Yi Mu Willy Susilo Fuchun Guo Vijay Varadharajan

Radio Frequency Identification (RFID) has been widely adopted for object identification. An RFID system comprises three essential components, namely RFID tags, readers and a backend server. Conventionally, the system is considered to be controlled by a single party who maintains all the secret information. However, in some practical scenarios, RFID tags, readers and servers could be operated by...

Journal: :IJRFITA 2006
Alex K. Jones Swapna R. Dontharaju Shen Chih Tung Peter J. Hawrylak Leonid Mats Raymond R. Hoare James T. Cain Marlin H. Mickle

This paper describes the Passive Active RFID Tag (PART). The first innovation is an automated method to generate RFID tag controllers based on high-level descriptions of a customised set of RFID primitives. We are capable of targeting microprocessor-based or custom hardware-based controllers. The second innovation is a passive burst switch front-end to the active tag. This switch reduces power ...

Journal: :International Journal of Computer Applications 2013

2013
Nilanjana Pradhan

A novel approach toward realizing a pipelined dictionary machine to maintain RFID tag IDs. It employs a memory along with a simple Binary search Processor .The major function of the processor is to operate upon the tag IDs which accumulates within the reader’s memory. Tag IDs are the unique identifiers and considered here as Keys. The Binary Search Processor works on the tag IDs and sorts them ...

2014
Muhammad Khizer Kaleem Guang Gong

Radio Frequency IDentification (RFID) is a contactless, automatic identification wireless technology primarily used for identifying and tracking of objects, goods and humans. RFID is not only limited to identification and tracking applications. This proliferating wireless technology has been deployed in numerous securities sensitive applications such as access control, e-passports, contactless ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید