首页 > 最新文献

International Workshop on RFID Technology最新文献

英文 中文
Routing Mechanism for Secure, Distributed Discovery Services for Global Auto-ID Networks 面向全球自动识别网络的安全、分布式发现服务路由机制
Pub Date : 2018-08-15 DOI: 10.5220/0001733101360141
Jons-Tobias Wamhoff, Eberhard Grummt, R. Ackermann
Enterprises capture immense amounts of data in Auto-ID repositories as items travel along the supply chain. For collaboration among partners individual repositories need to be discoverable when they are not explicitly linked. At the same time confidential information including supply relationships needs to be protected. The task of identifying repositories by keeping the secrets of a supply chain is done by a Discovery Service. The discovery information can be spread over multiple nodes. The routing mechanism ensures that queries sent to any node within the Discovery Service hierarchy will be forwarded to all responsible nodes. By anonymizing the request and response propagation, the repositories and Discovery Service data nodes remain hidden as long as the request did not produce an authorized result set.
当物品在供应链中流通时,企业会在自动识别存储库中捕获大量数据。对于合作伙伴之间的协作,需要在没有显式链接的情况下发现单个存储库。同时,包括供应关系在内的机密信息需要得到保护。通过保存供应链的秘密来标识存储库的任务由Discovery Service完成。发现信息可以分布在多个节点上。路由机制确保发送到Discovery Service层次结构中的任何节点的查询将被转发到所有负责的节点。通过匿名化请求和响应传播,只要请求没有产生授权的结果集,存储库和Discovery Service数据节点就保持隐藏状态。
{"title":"Routing Mechanism for Secure, Distributed Discovery Services for Global Auto-ID Networks","authors":"Jons-Tobias Wamhoff, Eberhard Grummt, R. Ackermann","doi":"10.5220/0001733101360141","DOIUrl":"https://doi.org/10.5220/0001733101360141","url":null,"abstract":"Enterprises capture immense amounts of data in Auto-ID repositories as items travel along the supply chain. For collaboration among partners individual repositories need to be discoverable when they are not explicitly linked. At the same time confidential information including supply relationships needs to be protected. The task of identifying repositories by keeping the secrets of a supply chain is done by a Discovery Service. The discovery information can be spread over multiple nodes. The routing mechanism ensures that queries sent to any node within the Discovery Service hierarchy will be forwarded to all responsible nodes. By anonymizing the request and response propagation, the repositories and Discovery Service data nodes remain hidden as long as the request did not produce an authorized result set.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126274817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tag Loss Probability Evaluation for a Continuous Flow of Tags in the EPC-Global Standard epc -全球标准中标签连续流的标签丢失概率评估
Pub Date : 2018-08-12 DOI: 10.5220/0001742901150126
J. Vales-Alonso, M. Bueno-Delgado, E. Egea-López, J. García-Haro
This paper addresses the evaluation of a passive RFID system under a continuous flow of tag arrivals and departures, for instance, in a conveyor belt installation. In such configuration, the main operational variable is the Tag Loss Probability (TLP). Since tags stay in the coverage area of the reader for a finite amount of time, it is possible that some tags leave the area unidentified if many tags compete for being simultaneously identified. A suitable configuration of the system (flow speed, tags per block, time between blocks, etc.) must be selected to assure that TLP remains under a given operative threshold. In this paper we focus on the EPCglobal Class-1 Gen-2 standard, which specifies an anti-collision protocol based on Framed Slotted Aloha. Our work is aimed at evaluating the TLP for the different configurations of such protocol, and selecting the right scenario configuration to guarantee a TLP below a given limit. This issue has not been studied yet, despite of its relevance in real-world scenarios based on assembly lines or other dynamic environments. Simulation results show that both anti-collision protocol operation mode and flow configuration heavily impacts in the performance. Additionally, real test have been conducted which confirm simulation results.
本文讨论了在标签到达和离开的连续流下的无源RFID系统的评估,例如,在传送带安装中。在这种配置中,主要操作变量是标签丢失概率(Tag Loss Probability, TLP)。由于标签在阅读器的覆盖范围内停留的时间是有限的,因此如果许多标签竞争同时被识别,则可能有些标签离开该区域而未被识别。必须选择合适的系统配置(流速、每个区块的标签、区块之间的时间等),以确保TLP保持在给定的操作阈值以下。本文重点研究了EPCglobal Class-1 Gen-2标准,该标准规定了一种基于帧开槽Aloha的防碰撞协议。我们的工作旨在评估这种协议的不同配置的TLP,并选择正确的场景配置来保证TLP低于给定的限制。尽管这个问题在基于装配线或其他动态环境的现实场景中具有相关性,但尚未对其进行研究。仿真结果表明,防碰撞协议的操作方式和流配置对性能有很大影响。并进行了实际试验,验证了仿真结果。
{"title":"Tag Loss Probability Evaluation for a Continuous Flow of Tags in the EPC-Global Standard","authors":"J. Vales-Alonso, M. Bueno-Delgado, E. Egea-López, J. García-Haro","doi":"10.5220/0001742901150126","DOIUrl":"https://doi.org/10.5220/0001742901150126","url":null,"abstract":"This paper addresses the evaluation of a passive RFID system under a continuous flow of tag arrivals and departures, for instance, in a conveyor belt installation. In such configuration, the main operational variable is the Tag Loss Probability (TLP). Since tags stay in the coverage area of the reader for a finite amount of time, it is possible that some tags leave the area unidentified if many tags compete for being simultaneously identified. A suitable configuration of the system (flow speed, tags per block, time between blocks, etc.) must be selected to assure that TLP remains under a given operative threshold. In this paper we focus on the EPCglobal Class-1 Gen-2 standard, which specifies an anti-collision protocol based on Framed Slotted Aloha. Our work is aimed at evaluating the TLP for the different configurations of such protocol, and selecting the right scenario configuration to guarantee a TLP below a given limit. This issue has not been studied yet, despite of its relevance in real-world scenarios based on assembly lines or other dynamic environments. Simulation results show that both anti-collision protocol operation mode and flow configuration heavily impacts in the performance. Additionally, real test have been conducted which confirm simulation results.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128675326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HF RFID Readerfor Mouse Identification - Study of Magnetic Coupling between Multi-Antennas and a Ferrite Transponder 用于鼠标识别的高频射频识别阅读器——多天线和铁氧体应答器之间磁耦合的研究
Pub Date : 2016-11-21 DOI: 10.5220/0001728900320042
C. Ripoll, P. Poulichet, E. Colin, C. Maréchal, A. Moretto
This paper depicts an optimized RFID system operating at 13.56 MHz, used to recognize a mouse. When it passes near an antenna, the small transponder (1x6 mm) placed in its body communicates with the antenna. The distance of communication is small (around 3 centimeters) and our objective was to increase this distance. The transponder receives the signal from a coil wound around a magnetic circuit. The characteristics of the ferrite are very important for the communication. All the elements of the chain are taken into account in ADS simulation and we determine the value of the minimum voltage necessary for remote bias. Finite-element analysis is employed to extract the values of the generated magnetic field. The paper shows how to correlate the influent parameters to increase the communication distance. To improve this reading rate, a novel differential receiving antenna has been designed allowing an improved decoupling with the close transmitting antenna. An electrical model of the different parts has been performed. This includes the tag, the reader antennas and the coupling between them. These models have been validated by measurements and used for the simulations of the complete system.
本文描述了一个优化的RFID系统,工作在13.56 MHz,用于识别鼠标。当它经过天线附近时,放置在体内的小型应答器(1x6毫米)与天线通信。通信距离很小(大约3厘米),我们的目标是增加这个距离。应答器从绕在磁路上的线圈接收信号。铁氧体的特性对通信是非常重要的。在ADS仿真中考虑了链的所有元素,并确定了远程偏置所需的最小电压值。采用有限元分析方法提取了产生的磁场值。本文介绍了如何关联输入参数以增加通信距离。为了提高读取速率,设计了一种新型差分接收天线,使其与近距离发射天线更好地解耦。对不同部件进行了电学建模。这包括标签、读取器天线和它们之间的耦合。这些模型已通过测量验证,并用于整个系统的模拟。
{"title":"HF RFID Readerfor Mouse Identification - Study of Magnetic Coupling between Multi-Antennas and a Ferrite Transponder","authors":"C. Ripoll, P. Poulichet, E. Colin, C. Maréchal, A. Moretto","doi":"10.5220/0001728900320042","DOIUrl":"https://doi.org/10.5220/0001728900320042","url":null,"abstract":"This paper depicts an optimized RFID system operating at 13.56 MHz, used to recognize a mouse. When it passes near an antenna, the small transponder (1x6 mm) placed in its body communicates with the antenna. The distance of communication is small (around 3 centimeters) and our objective was to increase this distance. The transponder receives the signal from a coil wound around a magnetic circuit. The characteristics of the ferrite are very important for the communication. All the elements of the chain are taken into account in ADS simulation and we determine the value of the minimum voltage necessary for remote bias. Finite-element analysis is employed to extract the values of the generated magnetic field. The paper shows how to correlate the influent parameters to increase the communication distance. To improve this reading rate, a novel differential receiving antenna has been designed allowing an improved decoupling with the close transmitting antenna. An electrical model of the different parts has been performed. This includes the tag, the reader antennas and the coupling between them. These models have been validated by measurements and used for the simulations of the complete system.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128392646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RFID Tag Antennas Designed by Fractal Features and Manufactured by Printing Technology 基于分形特征的RFID标签天线设计与打印技术
Pub Date : 2016-11-10 DOI: 10.5220/0002418400930099
Chi-Fang Huang, Jing-Qing Zhan, T. Hao
Based on the fractal features, this work is to design RFID Tag antennas with minimum area needed as a tag. The designed passive tag is to be responsible for the EM wave of 915MHz from the reader. The concept of complex conjugated matching is used in designing the antenna. Electromagnetic Simulation tool is also used to help this design as well. The techniques of measuring the material parameters necessary in the design procedure are also mentioned in this paper. Offset printing technology is employed to manufacture these tag antennas which is assumed as a kind of low-cost tags. Real performance of these tags is also shown in this work.
基于分形特征,设计标签所需面积最小的RFID标签天线。设计的无源标签负责读取器915MHz的电磁波。在天线设计中采用了复共轭匹配的概念。电磁仿真工具也被用来帮助这个设计。文中还介绍了在设计过程中所需要的材料参数的测量技术。这种标签天线采用胶印技术制造,是一种低成本的标签。这些标签的真实性能也显示在这项工作中。
{"title":"RFID Tag Antennas Designed by Fractal Features and Manufactured by Printing Technology","authors":"Chi-Fang Huang, Jing-Qing Zhan, T. Hao","doi":"10.5220/0002418400930099","DOIUrl":"https://doi.org/10.5220/0002418400930099","url":null,"abstract":"Based on the fractal features, this work is to design RFID Tag antennas with minimum area needed as a tag. The designed passive tag is to be responsible for the EM wave of 915MHz from the reader. The concept of complex conjugated matching is used in designing the antenna. Electromagnetic Simulation tool is also used to help this design as well. The techniques of measuring the material parameters necessary in the design procedure are also mentioned in this paper. Offset printing technology is employed to manufacture these tag antennas which is assumed as a kind of low-cost tags. Real performance of these tags is also shown in this work.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134223529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
CSMA Multi-stage Anti-collision Protocol for Active RFID Systems 有源RFID系统多阶段防碰撞协议
Pub Date : 2016-11-08 DOI: 10.5220/0003051900660078
Alejandro Palomo-López, M. Bueno-Delgado, E. Egea-López, J. Alcaraz, J. Vales-Alonso
Current anti-collision protocols for active RFID systems stem from the ISO-18000-7 standard, which selects Frame Slotted Aloha as the underlying Medium Access Control protocol. However, these approaches neglect the possibility of using the Listen-Before-Talk mechanism already available in active RFID tags. In this work, a Carrier Sense Multiple Access mechanism with Multi-Stage, (CSMA/MS), derived from the quasi-optimal Sift distribution, is developed in order to substitute the anti-collision procedure in active tags. The key of CSMA/MS is to concatenate various contention windows, where only winners contend in the next contention windows. We demonstrate that this approach nearly achieves a 100% of identification probability per slot, improving Sift results and outperforming standard procedure.
目前有源RFID系统的防碰撞协议源于ISO-18000-7标准,该标准选择帧槽Aloha作为底层介质访问控制协议。然而,这些方法忽略了使用有源RFID标签中已有的先听后说机制的可能性。本文提出了一种基于准最优Sift分布的载波感知多阶段多址机制(CSMA/MS),以取代主动标签中的防碰撞过程。CSMA/MS的关键是将多个争用窗口串联起来,只有胜者才能在下一个争用窗口中竞争。我们证明了这种方法几乎实现了每个槽100%的识别概率,改进了Sift结果并优于标准程序。
{"title":"CSMA Multi-stage Anti-collision Protocol for Active RFID Systems","authors":"Alejandro Palomo-López, M. Bueno-Delgado, E. Egea-López, J. Alcaraz, J. Vales-Alonso","doi":"10.5220/0003051900660078","DOIUrl":"https://doi.org/10.5220/0003051900660078","url":null,"abstract":"Current anti-collision protocols for active RFID systems stem from the ISO-18000-7 standard, which selects Frame Slotted Aloha as the underlying Medium Access Control protocol. However, these approaches neglect the possibility of using the Listen-Before-Talk mechanism already available in active RFID tags. In this work, a Carrier Sense Multiple Access mechanism with Multi-Stage, (CSMA/MS), derived from the quasi-optimal Sift distribution, is developed in order to substitute the anti-collision procedure in active tags. The key of CSMA/MS is to concatenate various contention windows, where only winners contend in the next contention windows. We demonstrate that this approach nearly achieves a 100% of identification probability per slot, improving Sift results and outperforming standard procedure.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124710518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Maximization of the Operating Volume using HF RFID Loop Antennas 使用高频射频识别环路天线的操作体积最大化
Pub Date : 2010-06-08 DOI: 10.5220/0003026000230029
K. D'hoe, N. Stevens, Jean-Pierre Goemaere, L. D. Strycker, B. Nauwelaers
This article describes how a passive radio frequency identification (RFID) system is optimized. Our attention focuses on the operating volume of a circular loop antenna. Hereby the design of loop antennas is given a new approach to establish a maximum operating volume. Therefore, the off-axis magnetic field is investigated. This is done for a circular loop in free space and in the vicinity of a metal plane. A numerical approach is given towards the maximization of the operating volume. The goal is to provide new insights into the design of a loop antenna and enhance the reliability of the RFID system.
本文介绍了如何优化无源射频识别(RFID)系统。我们的注意力集中在环形天线的工作体积上。从而为环形天线的设计提供了一种确定最大工作体积的新途径。因此,对离轴磁场进行了研究。这是在自由空间和金属平面附近的圆形环路中完成的。给出了一种使操作容积最大化的数值方法。目标是为环形天线的设计提供新的见解,并提高RFID系统的可靠性。
{"title":"Maximization of the Operating Volume using HF RFID Loop Antennas","authors":"K. D'hoe, N. Stevens, Jean-Pierre Goemaere, L. D. Strycker, B. Nauwelaers","doi":"10.5220/0003026000230029","DOIUrl":"https://doi.org/10.5220/0003026000230029","url":null,"abstract":"This article describes how a passive radio frequency identification (RFID) system is optimized. Our attention focuses on the operating volume of a circular loop antenna. Hereby the design of loop antennas is given a new approach to establish a maximum operating volume. Therefore, the off-axis magnetic field is investigated. This is done for a circular loop in free space and in the vicinity of a metal plane. A numerical approach is given towards the maximization of the operating volume. The goal is to provide new insights into the design of a loop antenna and enhance the reliability of the RFID system.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116791799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Traceability Service to Facilitate RFID Adoption in the Retail Supply Chain 可追溯性服务促进RFID在零售供应链中的应用
Pub Date : 2009-05-06 DOI: 10.5220/0002197200490058
Gabriel Hermosillo, J. Ellart, L. Seinturier, L. Duchien
Nowadays, companies are suffering changes in the way they deal with their inventories and their whole supply chain management. New technologies are emerging to help them adapt to the changes and keep a competitive status, but the adoption of such technologies is not always easy. Even though a lot of research has been done for RFID, there are still some areas that are being left aside, like the traceability aspect, which is one of the most important concerns in the retail supply chain. We propose a service named TRASER (TRAceability SErvice for the Retail supply chain) that will help the companies adopt the new technologies into their existing environments, dealing with persistence and traceability, and allowing the users to manage their operation according to their business rules, workflows and historical data.
如今,企业处理库存和整个供应链管理的方式正在发生变化。新技术不断涌现,以帮助他们适应变化并保持竞争地位,但采用这些技术并不总是那么容易。尽管已经对RFID进行了大量的研究,但仍有一些领域被搁置一边,比如可追溯性方面,这是零售供应链中最重要的问题之一。我们提出了一个名为TRASER(零售供应链的可追溯性服务)的服务,它将帮助公司将新技术应用到他们现有的环境中,处理持久性和可追溯性,并允许用户根据他们的业务规则、工作流和历史数据来管理他们的操作。
{"title":"A Traceability Service to Facilitate RFID Adoption in the Retail Supply Chain","authors":"Gabriel Hermosillo, J. Ellart, L. Seinturier, L. Duchien","doi":"10.5220/0002197200490058","DOIUrl":"https://doi.org/10.5220/0002197200490058","url":null,"abstract":"Nowadays, companies are suffering changes in the way they deal with their inventories and their whole supply chain management. New technologies are emerging to help them adapt to the changes and keep a competitive status, but the adoption of such technologies is not always easy. Even though a lot of research has been done for RFID, there are still some areas that are being left aside, like the traceability aspect, which is one of the most important concerns in the retail supply chain. We propose a service named TRASER (TRAceability SErvice for the Retail supply chain) that will help the companies adopt the new technologies into their existing environments, dealing with persistence and traceability, and allowing the users to manage their operation according to their business rules, workflows and historical data.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115712500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
RFID based Anti-Counterfeiting Utilizing Supply Chain Proximity 基于供应链接近的RFID防伪技术
Pub Date : 2008-06-12 DOI: 10.5220/0001742601010114
Ali Dada, C. Magerkurth
This paper discusses a novel RFID-based approach to determine probabilities of items in a supply chain as being counterfeits based on their proximity to already identified counterfeits. The central idea is that items moving close to fakes are more likely to be fakes than items traveling with genuine items. The required proximity information can be deduced from events in EPCIS repositories for RFID-tagged items. The paper discusses two mathematical algorithms for calculating the probabilities and presents the results of a comparative simulation study. The results are discussed in terms of conclusions for a future implementation with RFID-tracked supply chains.
本文讨论了一种基于rfid的新方法,根据产品与已识别的假冒产品的接近程度来确定供应链中假冒产品的概率。其核心思想是,与真品同行的物品相比,靠近假货的物品更有可能是假货。所需的接近信息可以从EPCIS存储库中的事件中推断出带有rfid标签的项目。本文讨论了计算概率的两种数学算法,并给出了比较仿真研究的结果。根据结论讨论了这些结果,以便将来使用rfid跟踪的供应链实现。
{"title":"RFID based Anti-Counterfeiting Utilizing Supply Chain Proximity","authors":"Ali Dada, C. Magerkurth","doi":"10.5220/0001742601010114","DOIUrl":"https://doi.org/10.5220/0001742601010114","url":null,"abstract":"This paper discusses a novel RFID-based approach to determine probabilities of items in a supply chain as being counterfeits based on their proximity to already identified counterfeits. The central idea is that items moving close to fakes are more likely to be fakes than items traveling with genuine items. The required proximity information can be deduced from events in EPCIS repositories for RFID-tagged items. The paper discusses two mathematical algorithms for calculating the probabilities and presents the results of a comparative simulation study. The results are discussed in terms of conclusions for a future implementation with RFID-tracked supply chains.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115342410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RFID Privacy Protection Scheme for Secure Ubiquitous Computing 安全普适计算的RFID隐私保护方案
Pub Date : 2007-12-01 DOI: 10.5220/0002411201170124
Hyun Seok Kim, Jung-Hyun Oh, Jin-Young Choi
A Radio-Frequency-Identification (RFID) tag is a small and inexpensive device that consists of an IC chip and an antenna which communicate by radio frequency. It emits an ID in response to a query from a radio communication device called as a reader. For this reason, the RFID tag is used for management of goods and it is used as a substitute for a bar code. However, RFID system may infringe on a consumer’s privacy because it has a strong tracing ability. In this paper we describe problems of previous works on RFID security protocols and specify several known attacks and introduce PPP(Privacy Protection Protocol) for a RFID security protocol which serves as a proof of concept for authentication an RFID tag to a reader device using the vernam and standard encryption as a cryptographic primitive. To verify our protocol, we use model checking methodology, that is, Casper(A Compiler for Security Protocol), CSP(Communicating Sequential Processes) and then verify security properties such as secrecy and authentication using FDR(Failure Divergence Refinement) tool.
射频识别(RFID)标签是一种小而便宜的设备,由一个集成电路芯片和一个通过射频通信的天线组成。它发出一个ID,以响应来自称为阅读器的无线电通信设备的查询。由于这个原因,RFID标签被用于管理货物,它被用作条形码的替代品。然而,RFID系统具有很强的追踪能力,可能会侵犯消费者的隐私。在本文中,我们描述了以前在RFID安全协议方面的工作中的问题,并指定了几种已知的攻击,并介绍了RFID安全协议的PPP(隐私保护协议),该协议作为使用vernam和标准加密作为加密原语的RFID标签对阅读器设备进行身份验证的概念证明。为了验证我们的协议,我们使用模型检查方法,即Casper(安全协议编译器),CSP(通信顺序过程),然后使用FDR(故障发散细化)工具验证安全性属性,例如保密性和身份验证。
{"title":"RFID Privacy Protection Scheme for Secure Ubiquitous Computing","authors":"Hyun Seok Kim, Jung-Hyun Oh, Jin-Young Choi","doi":"10.5220/0002411201170124","DOIUrl":"https://doi.org/10.5220/0002411201170124","url":null,"abstract":"A Radio-Frequency-Identification (RFID) tag is a small and inexpensive device that consists of an IC chip and an antenna which communicate by radio frequency. It emits an ID in response to a query from a radio communication device called as a reader. For this reason, the RFID tag is used for management of goods and it is used as a substitute for a bar code. However, RFID system may infringe on a consumer’s privacy because it has a strong tracing ability. In this paper we describe problems of previous works on RFID security protocols and specify several known attacks and introduce PPP(Privacy Protection Protocol) for a RFID security protocol which serves as a proof of concept for authentication an RFID tag to a reader device using the vernam and standard encryption as a cryptographic primitive. To verify our protocol, we use model checking methodology, that is, Casper(A Compiler for Security Protocol), CSP(Communicating Sequential Processes) and then verify security properties such as secrecy and authentication using FDR(Failure Divergence Refinement) tool.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126118088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RFID Uses for Prosis Ambient Control RFID用于环境控制
Pub Date : 1900-01-01 DOI: 10.5220/0002911000810088
P. Pujo, Y. Dubromelle, F. Ounnar
Product traceability is now an obligation in terms of observability and flexibility of manufacturing systems and logistics chains. RFID technologies are due to be more and more integrated into existing communication networks. New infotronics technologies will enlarge the capabilities to interact, to react and to customise control systems with innovative possibilities. New control approaches should be proposed based on the use of emerging technologies that would allow their operability in manufacturing sites. A model for ambient control production systems is proposed, based on a set of holonic entities interacting through set of entities that offer ambient service. After describing the PROSIS model, the ambient services that can be provided are presented.
就制造系统和物流链的可观察性和灵活性而言,产品可追溯性现在是一项义务。RFID技术将越来越多地集成到现有的通信网络中。新的信息电子技术将以创新的可能性扩大交互、反应和定制控制系统的能力。应根据新兴技术的使用,提出新的控制办法,使其能够在制造现场进行操作。提出了一种环境控制生产系统模型,该模型基于一组全息实体通过一组提供环境服务的实体相互作用。在描述了PROSIS模型之后,给出了可以提供的环境服务。
{"title":"RFID Uses for Prosis Ambient Control","authors":"P. Pujo, Y. Dubromelle, F. Ounnar","doi":"10.5220/0002911000810088","DOIUrl":"https://doi.org/10.5220/0002911000810088","url":null,"abstract":"Product traceability is now an obligation in terms of observability and flexibility of manufacturing systems and logistics chains. RFID technologies are due to be more and more integrated into existing communication networks. New infotronics technologies will enlarge the capabilities to interact, to react and to customise control systems with innovative possibilities. New control approaches should be proposed based on the use of emerging technologies that would allow their operability in manufacturing sites. A model for ambient control production systems is proposed, based on a set of holonic entities interacting through set of entities that offer ambient service. After describing the PROSIS model, the ambient services that can be provided are presented.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116907580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
International Workshop on RFID Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1