نتایج جستجو برای: rfid tags

تعداد نتایج: 24998  

2009
J. Vales-Alonso

In Radio Frequency Identification (RFID) systems a reader device detects and identifies nearby electronic tags. Traditionally,the performance of RFID systems and their identification protocols has been analyzed for static configurations, that is, without considering incoming or outgoing tags, but just a fixed number of initially unidentified tags ,and also it has been measure in terms of throug...

2017
Grishma Khadka Suk-Seung Hwang

Radio-frequency identification (RFID) is a tracking technology that enables immediate automatic object identification and rapid data sharing for a wide variety of modern applications using radio waves for data transmission from a tag to a reader. RFID is already well established in technical areas, and many companies have developed corresponding standards and measurement techniques. In the cons...

2011
Alfred Kobsa Rishab Nithyanand Gene Tsudik Ersin Uzun

The recent emergence of RFID tags capable of performing public key operations has enabled a number of new applications in commerce (e.g., RFIDenabled credit cards) and security (e.g., ePassports and access-control badges). While the use of public key cryptography in RFID tags mitigates many difficult security issues, certain important usability-related issues remain, particularly when RFID tags...

Journal: :Procedia Computer Science 2020

Journal: :I. J. Network Security 2018
Shin-Yan Chiou Wen-Tsai Ko Erl-Huei Lu

Mobile RFID applications combine RFID technologies and mobile device to create a new convenient application area. However, most of the applications suffer from the security issues due to insecure communication channels among tags, readers and servers. In 2012, Zhou et al. proposed an ECC-based mutual authentication protocol to promote mobile RFID applications security. However, we found their p...

2007
Mike Burmester Breno de Medeiros

Low-cost RFID tags are already being used for supply chain management and are a promising new technology that can be used to support the security of wireless ubiquitous applications. However current RFID technology is designed to optimize performance, with less attention paid to resilience and security. In this paper we analyze some of the most common types of attack on RFID tags: unauthorized ...

2012
Nivedita Das Indrajit Bhattacharya

RFID uses radio frequency waves to track and identify objects. RFID system consists of tags and readers. Passive RFID tags are more popular now days due to its simpler circuitry, lower weight and lower cost. Generally passive tags are attached with an object for unique identification. A tag contains information about the particular product, to which it is attached. RFID reader is used to interr...

Journal: :IJTHI 2009
Olli Pitkänen Marketta Niemelä

Radio Frequency Identification (RFID) technology offers a lot of promises. To redeem them, RFID applications have to respect privacy and they need to be supported by the legal system. The article evaluates how the current EU directives on data protection support emerging applications that are based on RFID tags. The evaluation is based on user scenarios that illustrate human needs in relation t...

Journal: :Computer Networks 2013
Waleed Alsalih Kashif Ali Hossam S. Hassanein

The emerging technology of Radio Frequency IDentification (RFID) has enabled a wide range of automated tracking and monitoring applications. However, the process of interrogating a set of RFID tags usually involves sharing a wireless communication medium by an RFID reader and many tags. Tag collisions result in a significant delay to the interrogation process, and such collisions are hard to ov...

2011
Wendong Xiao Jaya Shankar Pathmasuntharam

In an active RFID based wireless localization system, usually a number of RFID readers are required to generate localization beacon broadcasts from which a RFID tag can collect multiple RSSI measurements and forward them to a localization server for calculating the location of the tag. Such operations should be done from time to time when the tag is moving. Collisions may happen at the tag if t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید