نتایج جستجو برای: reader to tag collision

تعداد نتایج: 10630264  

2005
Haedong Lee Dooho Choi Sokjoon Lee Howon Kim

This paper is about hiding RFID tag identifier (ID) using handheld device like a cellular phone. By modifying the tag ID of objects periodically or manually using cellular phone built-in a RFID reader chip or with a external RFID reader device, we can prevent other people from gathering the information related with objects querying information server (like an EPC IS) with a tag ID or deriving t...

Journal: :EURASIP Journal on Wireless Communications and Networking 2011

2013
Milad HajMirzaei

Tag collision is one of the most important issues in RFID systems and many tag anti-collision protocols were proposed in literature. But some kind of these protocols like Tree-based protocols (specifically Query tree) which its performance depends on tag ID length and construction, have some issues like ID distribution. In this paper we discuss about Query tree protocol which may influenced by ...

2013
Ming-Shen Jian Jain-Shing Wu

Radio Frequency identification (RFID) is the popular wireless induction system [1-7]. The same as the general bar code identification, each RFID tag in an RFID system is assumed that equips a unique ID (UID) itself. A standard RFID system is consisted of Tag, Reader, and Application. When an independent RFID tag approaches the RFID antenna, the induc‐ tion between RFID tag and antenna happens. ...

2012
Marek Klonowski Krzysztof Majcher Wojciech Macyna Filip Zagórski

We present an authentication scheme designed for tiny and strictly constrained devices like RFID-tags. Authentication is based on the symmetric key shared between a tag and a reader. While a tag needs to perform only simple operations in order to authenticate: to pick n/2+b random values and then to compute XORs of some values, a reader needs to try 2 possible values to check if a tag replied c...

2006
Chiu C. Tan Bo Sheng Qun Li

With the increasing popularity of RFID applications, different authentication schemes have been proposed to provide security and privacy protection to users. Most recent RFID protocols use a central database to store the RFID tag data. An RFID reader first queries the RFID tag and returns the reply to the database. After authentication, the database returns the tag data to the reader. In this p...

Journal: :J. Network and Computer Applications 2011
Roberto Di Pietro Refik Molva

In this paper, we provide the following contributions to enhance the security of RFID based systems. First, we assume that among multiple servers storing the information related to the tags some of them can be compromised. For this new threat scenario, we devise a technique to make RFID identification server dependent, providing a different unique secret key shared by a tag and a server. The so...

2006
Su-Ryun Lee Chae-Woo Lee

In RFID system, one of the problems that we must solve is the collision between tags that may occur when a reader attempts to read a number of tags simultaneously. Most of the popular anti-collision algorithms are based on the ALOHA-type algorithm, which are simple and show good performance when the number of tags to read is small. However, for ALOHA-type algorithms the time required to read th...

2011
Chuyen T. NGUYEN Kazunori HAYASHI Megumi KANEKO Petar POPOVSKI Hideaki SAKAI

In this paper, Radio Frequency IDentification (RFID) tag set cardinality estimation problem is considered under the model of multiple independent reader sessions with unreliable radio communication links in which transmission errors might occur. After the R-th reader session, the number of tags detected in j (j = 1, 2, ..., R) reader sessions is updated, which we call observed evidence. Then, i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید