نتایج جستجو برای: reader to tag collision
تعداد نتایج: 10630264 فیلتر نتایج به سال:
This paper proposes an ultrasonic backscatter communication (UsBC) system for passive implantable medical devices (IMDs) that can operate without batteries, enabling versatile revolutionary applications future healthcare. The proposed UsBC consists of a reader and tag. sends interrogation pulses to the tag backscatters based on piezoelectric effect piezo transducer. We present several basic mod...
We propose a protocol that can be used between an RFID tag and a reader to exchange a secret without performing any expensive computation. Similarly to the famous blocker tag suggested by Juels, Rivest, and Szydlo, our scheme makes use of special tags that we call noisy tags. Noisy tags are owned by the reader’s manager and set out within the reader’s field. They are regular RFID tags that gene...
In the last decade, Radio Frequency Identification (RFID) has become popular in so many fields from military to industry applications. RFID tags have been embedded into many various products especially in logistics sector. A tag stores individual information of its attached object and an RFID reader communicates with the tag in radio frequencies to identify the object. This object to be monitor...
Radio frequency identification (RFID) technology is used to identify RFID-tagged objects automatically. An RFID system generally consists of three components: an RFID tag, an RFID reader, and a backend system. An RFID tag is a small device for identification, which is attached to or embedded in an object. It has an unique identifier and may optionally hold additional product information for the...
Two effective attacks, namely de-synchronization attack and impersonation attack, against Ha et al. ’s LCSS RFID authentication protocol, Song and Mitchell’s protocol are identified. The former attack can break the synchronization between the RFID reader and the tag in a single protocol run so that they can not authenticate each other in any following protocol run. The latter can impersonate a ...
Radio Frequency Identification (RFID) has been widely adopted for object identification. An RFID system comprises three essential components, namely RFID tags, readers and a backend server. Conventionally, the system is considered to be controlled by a single party who maintains all the secret information. However, in some practical scenarios, RFID tags, readers and servers could be operated by...
This paper describes the Passive Active RFID Tag (PART). The first innovation is an automated method to generate RFID tag controllers based on high-level descriptions of a customised set of RFID primitives. We are capable of targeting microprocessor-based or custom hardware-based controllers. The second innovation is a passive burst switch front-end to the active tag. This switch reduces power ...
A novel approach toward realizing a pipelined dictionary machine to maintain RFID tag IDs. It employs a memory along with a simple Binary search Processor .The major function of the processor is to operate upon the tag IDs which accumulates within the reader’s memory. Tag IDs are the unique identifiers and considered here as Keys. The Binary Search Processor works on the tag IDs and sorts them ...
Radio Frequency IDentification (RFID) is a contactless, automatic identification wireless technology primarily used for identifying and tracking of objects, goods and humans. RFID is not only limited to identification and tracking applications. This proliferating wireless technology has been deployed in numerous securities sensitive applications such as access control, e-passports, contactless ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید