首页 > 最新文献

International Workshop on RFID Technology最新文献

英文 中文
M2MGen- An Application Generator for Machine to Machine (M2M) Applications M2MGen-一个用于机器对机器(M2M)应用的应用程序生成器
Pub Date : 1900-01-01 DOI: 10.5220/0002411301330140
Chanan Glezer, S. Krishnamurthy, K. Schloeder, Omer Anson, Gil Tahan
This research conceptualizes an architecture (M2MGen) aimed at generating M2M applications as a service offered by a telecommunications network provider. M2MGen employs various plug-ins and knowledge constructs which can be configured to meet requirements of clients from various industry sectors interested in deploying M2M applications. The architecture addresses the following aspects: Data-acquisition Management, Communication Management, Business-service Management and Control Management.
本研究概念化了一种架构(M2MGen),旨在将M2M应用程序作为电信网络提供商提供的服务生成。M2MGen使用各种插件和知识结构,可以对其进行配置,以满足对部署M2M应用程序感兴趣的各个行业部门的客户的需求。该体系结构涉及以下方面:数据采集管理、通信管理、业务服务管理和控制管理。
{"title":"M2MGen- An Application Generator for Machine to Machine (M2M) Applications","authors":"Chanan Glezer, S. Krishnamurthy, K. Schloeder, Omer Anson, Gil Tahan","doi":"10.5220/0002411301330140","DOIUrl":"https://doi.org/10.5220/0002411301330140","url":null,"abstract":"This research conceptualizes an architecture (M2MGen) aimed at generating M2M applications as a service offered by a telecommunications network provider. M2MGen employs various plug-ins and knowledge constructs which can be configured to meet requirements of clients from various industry sectors interested in deploying M2M applications. The architecture addresses the following aspects: Data-acquisition Management, Communication Management, Business-service Management and Control Management.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122345395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fast and Simple Anti-collision Protocol based on Up-down Counter and one Bit Reader Response 基于上下计数器和一位读写器响应的快速简单防碰撞协议
Pub Date : 1900-01-01 DOI: 10.5220/0003017300970107
U. S. Mohammed, Mostafa Salah
This paper describes a simple fast protocol of counter based anticollision approaches. The tag processing is depending on one depth counter and conflict pointer to determine its replying order and the current replying bit. The main advantage of the proposed protocol is the simple one bit reader response in the identification process. The one bit reader response will provide the tags all information about the new state of the current depth position of replying. The tags will transmit its IDs without reader interruption until the reader detects the collision state or the identification state. Based on this idea, the identification process will be faster than the traditional counter based anti collision protocols and the overhead information will be reduced. Performed computer simulations have shown that the collision recovery scheme is very fast and simple. The simulation results shows that the proposed technique outperforms most of the recent techniques in most cases.
本文描述了一种简单快速的基于计数器的防碰撞方法协议。标签处理依赖于一个深度计数器和冲突指针来确定其应答顺序和当前应答位。该协议的主要优点是在识别过程中采用简单的1位读写器响应。1位阅读器响应将向标签提供有关当前应答深度位置的新状态的所有信息。标签将不中断读取器发送其id,直到读取器检测到冲突状态或识别状态。基于此思想,识别过程将比传统的基于计数器的防碰撞协议更快,并且减少了开销信息。计算机仿真结果表明,该方法快速、简单。仿真结果表明,该方法在大多数情况下都优于现有的大多数方法。
{"title":"Fast and Simple Anti-collision Protocol based on Up-down Counter and one Bit Reader Response","authors":"U. S. Mohammed, Mostafa Salah","doi":"10.5220/0003017300970107","DOIUrl":"https://doi.org/10.5220/0003017300970107","url":null,"abstract":"This paper describes a simple fast protocol of counter based anticollision approaches. The tag processing is depending on one depth counter and conflict pointer to determine its replying order and the current replying bit. The main advantage of the proposed protocol is the simple one bit reader response in the identification process. The one bit reader response will provide the tags all information about the new state of the current depth position of replying. The tags will transmit its IDs without reader interruption until the reader detects the collision state or the identification state. Based on this idea, the identification process will be faster than the traditional counter based anti collision protocols and the overhead information will be reduced. Performed computer simulations have shown that the collision recovery scheme is very fast and simple. The simulation results shows that the proposed technique outperforms most of the recent techniques in most cases.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114465536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How RFID Technology can Assist the Visually Impaired: The Sesamonet System RFID技术如何帮助视障人士:芝麻网系统
Pub Date : 1900-01-01 DOI: 10.5220/0001733301420148
M. Barboni, F. Rizzo, Graziano Azzalin, Marco Sironi
The Project’s objective is the development of an integrated system to increase mobility of people with disabilities and their personal safety and security, by identifying a secure path to walk through selected areas, particularly for people with visual disability. This is done through the use of mature and proven technologies (RFID, antennas, bluetooth, etc.) which only have to be integrated for this specific application.The system is based on 3 main components: a path made of transponders, a customdesigned walking cane and a smart phone. Each RFID tag is associated to a message or a small beep. The system describes the environment and warns the user if there is a potential danger such as a road crossing
该项目的目标是开发一个综合系统,通过为残疾人,特别是视力障碍者在选定区域确定安全的行走路径,提高残疾人的行动能力和人身安全。这是通过使用成熟和经过验证的技术(RFID,天线,蓝牙等)来完成的,这些技术只需要集成到这个特定的应用程序中。该系统由3个主要部件组成:由应答器组成的路径、定制设计的手杖和智能手机。每个RFID标签都与一条消息或一声小嘟嘟声相关联。该系统描述环境,并警告用户是否有潜在的危险,如过马路
{"title":"How RFID Technology can Assist the Visually Impaired: The Sesamonet System","authors":"M. Barboni, F. Rizzo, Graziano Azzalin, Marco Sironi","doi":"10.5220/0001733301420148","DOIUrl":"https://doi.org/10.5220/0001733301420148","url":null,"abstract":"The Project’s objective is the development of an integrated system to increase mobility of people with disabilities and their personal safety and security, by identifying a secure path to walk through selected areas, particularly for people with visual disability. This is done through the use of mature and proven technologies (RFID, antennas, bluetooth, etc.) which only have to be integrated for this specific application.The system is based on 3 main components: a path made of transponders, a customdesigned walking cane and a smart phone. Each RFID tag is associated to a message or a small beep. The system describes the environment and warns the user if there is a potential danger such as a road crossing","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"375 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126717762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
RFID Use in Hospitals: A Business Perspective RFID在医院的应用:商业视角
Pub Date : 1900-01-01 DOI: 10.5220/0002429300820092
T. Berezny, K. Hassanein
RFID technology is experiencing wide adoption in a number of industries while providing numerous unique benefits to each. However, the healthcare industry has been slow to adopt this promising technology, with some claiming cost constraints, satisfaction with barcodes or lack of universal standards as reasons. This paper provides an overview of RFID technology, and discusses the facilitating and inhibiting factors for its adoption within hospital environments. It further provides an analysis of the needs and concerns of the main hospital stakeholders impacted by this technology with the goal of maximizing the potential for realizing its full promise to improve and optimize healthcare delivery.
RFID技术正在许多行业中得到广泛采用,同时为每个行业提供了许多独特的好处。然而,医疗保健行业在采用这种有前途的技术方面进展缓慢,一些人声称成本限制、对条形码的满意或缺乏通用标准是原因。本文概述了RFID技术,并讨论了其在医院环境中采用的促进和抑制因素。它进一步分析了受该技术影响的主要医院利益相关者的需求和关切,目标是最大限度地实现其改善和优化医疗保健服务的全部承诺。
{"title":"RFID Use in Hospitals: A Business Perspective","authors":"T. Berezny, K. Hassanein","doi":"10.5220/0002429300820092","DOIUrl":"https://doi.org/10.5220/0002429300820092","url":null,"abstract":"RFID technology is experiencing wide adoption in a number of industries while providing numerous unique benefits to each. However, the healthcare industry has been slow to adopt this promising technology, with some claiming cost constraints, satisfaction with barcodes or lack of universal standards as reasons. This paper provides an overview of RFID technology, and discusses the facilitating and inhibiting factors for its adoption within hospital environments. It further provides an analysis of the needs and concerns of the main hospital stakeholders impacted by this technology with the goal of maximizing the potential for realizing its full promise to improve and optimize healthcare delivery.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"11 13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134642952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Review of RFID in the Supply Chain RFID在供应链中的绩效评估
Pub Date : 1900-01-01 DOI: 10.5220/0002433800500060
Paul Golding, Vanesa M. Tennant
A throwaway cutting tip (31) has two substantially polygonal main surfaces (32, 33) and cutting edges (42, 43, 44, 45, 49, 50) in the form of a curved line projecting inwardly in the direction of the thickness of the tip. The cutting edges extend between nose portions (38, 39, 40, 41) positioned at apexes of the polygon. The main surface has a flat central portion (47) in the middle. A rake surface having two portions extends between the flat central portion and the cutting edge. The rake surface (51) has a flat portion (56) and a curved, concave portion (53). The curved concave surface portion (53) connecting the lowermost edge (52) of the flat rake surface portion to the flat central portion functions as a chip breaking surface. The chip breaking is enhanced by a plurality of projections (55) arranged along the curved concave surface portion. Each nose portion has a nose protecting surface (38a, 39a, 40a, 41a) extending parallel to the flat central portion inwardly from an end edge defined between lateral surfaces (34, 35, 36, 37) and the main surface.
一种一次性切割尖端(31)具有两个基本多边形的主表面(32、33)和切割边缘(42、43、44、45、49、50),其形式为沿尖端厚度方向向内突出的曲线。切割边缘在位于多边形顶点的鼻部(38、39、40、41)之间延伸。所述主表面在中间具有平坦的中心部分(47)。具有两部分的耙面在平坦的中心部分和切削刃之间延伸。耙面(51)具有平坦部分(56)和弯曲、凹部分(53)。将平耙面部分的最下缘(52)连接到平中心部分的弯曲凹面部分(53)作为切屑破碎面。通过沿所述弯曲凹表面部分设置的多个凸出物(55)来增强所述断片。每个机头部分具有机头保护表面(38a、39a、40a、41a),从定义在侧表面(34、35、36、37)和主表面之间的端缘向内平行延伸至平坦的中心部分。
{"title":"Performance Review of RFID in the Supply Chain","authors":"Paul Golding, Vanesa M. Tennant","doi":"10.5220/0002433800500060","DOIUrl":"https://doi.org/10.5220/0002433800500060","url":null,"abstract":"A throwaway cutting tip (31) has two substantially polygonal main surfaces (32, 33) and cutting edges (42, 43, 44, 45, 49, 50) in the form of a curved line projecting inwardly in the direction of the thickness of the tip. The cutting edges extend between nose portions (38, 39, 40, 41) positioned at apexes of the polygon. The main surface has a flat central portion (47) in the middle. A rake surface having two portions extends between the flat central portion and the cutting edge. The rake surface (51) has a flat portion (56) and a curved, concave portion (53). The curved concave surface portion (53) connecting the lowermost edge (52) of the flat rake surface portion to the flat central portion functions as a chip breaking surface. The chip breaking is enhanced by a plurality of projections (55) arranged along the curved concave surface portion. Each nose portion has a nose protecting surface (38a, 39a, 40a, 41a) extending parallel to the flat central portion inwardly from an end edge defined between lateral surfaces (34, 35, 36, 37) and the main surface.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126988623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Pipe-DEPCAS: A Middleware Solution for EPC-RFID Data Acquisition Systems 管道- depcas: EPC-RFID数据采集系统的中间件解决方案
Pub Date : 1900-01-01 DOI: 10.5220/0002431601250132
C. Cerrada, Ismael Abad, J. A. Cerrada, Vicente Dies
The huge growth of the RFID devices market, such as EPC (Electronic Product Code) elements in the most varied areas of the industry and the services, joined to the new advantages that every day are discovered on their intensive use, have provoked the immediate attention of multitude of HW, SW and custom solutions providers. The heterogeneous applications in which these devices can be used makes that the methods and develops for their management and control differ from the classical ones known till now. In this type of applications it is necessary to include some mechanism of acquisition and management of the radio frequency information. In this article a possible solution for this question is presented. It represents a middleware solution based on a pipeline and filter architecture that brings together the suitable proportion of flexibility, power of calculation, connectivity and simplicity of use to achieve suitable solutions for automation, management and control of goods and services. It has been developed in a more generic framework, that we call DEPCAS (Data EPC Acquisition System), and it is denoted as Pipe-DEPCAS. This specific solution contributes in this field with the best practices of design at the time that it assures an effective control of cost on having used standards of opened code and very known, simple and refined architectures. The paper describes DEPCAS and Pipe-DEPCAS new concepts and developments.
RFID设备市场的巨大增长,如EPC(电子产品代码)元素在最多样化的行业和服务领域,加上每天在其密集使用中发现的新优势,已经引起了众多硬件,软件和定制解决方案提供商的立即关注。这些设备的异构应用使得其管理和控制的方法和发展与目前已知的经典方法有所不同。在这种类型的应用中,有必要包括一些射频信息的获取和管理机制。本文为这个问题提出了一个可能的解决方案。它代表了一种基于管道和过滤器架构的中间件解决方案,将适当比例的灵活性、计算能力、连接性和简单性结合在一起,以实现对商品和服务的自动化、管理和控制的合适解决方案。它是在一个更通用的框架中开发的,我们称之为DEPCAS(数据EPC获取系统),它被表示为管道-DEPCAS。这个特定的解决方案在这个领域中贡献了最佳的设计实践,它确保了在使用开放代码标准和非常知名的、简单的和精细的体系结构的情况下有效地控制成本。本文介绍了DEPCAS和Pipe-DEPCAS的新概念和发展。
{"title":"Pipe-DEPCAS: A Middleware Solution for EPC-RFID Data Acquisition Systems","authors":"C. Cerrada, Ismael Abad, J. A. Cerrada, Vicente Dies","doi":"10.5220/0002431601250132","DOIUrl":"https://doi.org/10.5220/0002431601250132","url":null,"abstract":"The huge growth of the RFID devices market, such as EPC (Electronic Product Code) elements in the most varied areas of the industry and the services, joined to the new advantages that every day are discovered on their intensive use, have provoked the immediate attention of multitude of HW, SW and custom solutions providers. The heterogeneous applications in which these devices can be used makes that the methods and develops for their management and control differ from the classical ones known till now. In this type of applications it is necessary to include some mechanism of acquisition and management of the radio frequency information. In this article a possible solution for this question is presented. It represents a middleware solution based on a pipeline and filter architecture that brings together the suitable proportion of flexibility, power of calculation, connectivity and simplicity of use to achieve suitable solutions for automation, management and control of goods and services. It has been developed in a more generic framework, that we call DEPCAS (Data EPC Acquisition System), and it is denoted as Pipe-DEPCAS. This specific solution contributes in this field with the best practices of design at the time that it assures an effective control of cost on having used standards of opened code and very known, simple and refined architectures. The paper describes DEPCAS and Pipe-DEPCAS new concepts and developments.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116099488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Sensor Network Capabilities through a Cost-Effective RFID Tag for Sensor Data Transmission 通过一个具有成本效益的RFID标签来增强传感器网络的能力,用于传感器数据传输
Pub Date : 1900-01-01 DOI: 10.5220/0001742101750180
L. Catarinucci, L. Tarricone, R. Colella, A. Esposito
The use of Radio Frequency Identification (RFID) technology for the automatic transmission of physical parameters in wireless sensor networks, could undoubtedly pave the way to a large class of attractive applications, ranging from healthcare, automotive, diagnostic systems, robotics and many others. Nevertheless, although some RFID tags capable to transmit sensor-like information are already on the market, only a restrict number of sensors, such as those for temperature or pressure measurement, can be easily miniaturized and embedded in the RFID chip. The integration of more complex sensors, in fact, appears to be complicated and extremely expensive. In this paper, a costeffective general-purpose multi-ID tag is proposed. It can be connected to generic sensors, and is capable to transmit a proper combination of ID codes depending on the actual value at its input. Such a tag represents the natural evolution of standard RFID technology: neither the digital design nor the cost of the tag is substantially modified.
使用射频识别(RFID)技术在无线传感器网络中自动传输物理参数,无疑可以为大量有吸引力的应用铺平道路,包括医疗保健,汽车,诊断系统,机器人和许多其他应用。然而,尽管一些能够传输类似传感器信息的RFID标签已经上市,但只有有限数量的传感器,如用于温度或压力测量的传感器,可以很容易地小型化并嵌入RFID芯片中。事实上,集成更复杂的传感器看起来既复杂又极其昂贵。本文提出了一种具有成本效益的通用多id标签。它可以连接到通用传感器,并且能够根据其输入的实际值传输适当的ID代码组合。这样的标签代表了标准RFID技术的自然演变:无论是数字设计还是标签的成本都没有实质性的改变。
{"title":"Enhancing Sensor Network Capabilities through a Cost-Effective RFID Tag for Sensor Data Transmission","authors":"L. Catarinucci, L. Tarricone, R. Colella, A. Esposito","doi":"10.5220/0001742101750180","DOIUrl":"https://doi.org/10.5220/0001742101750180","url":null,"abstract":"The use of Radio Frequency Identification (RFID) technology for the automatic transmission of physical parameters in wireless sensor networks, could undoubtedly pave the way to a large class of attractive applications, ranging from healthcare, automotive, diagnostic systems, robotics and many others. Nevertheless, although some RFID tags capable to transmit sensor-like information are already on the market, only a restrict number of sensors, such as those for temperature or pressure measurement, can be easily miniaturized and embedded in the RFID chip. The integration of more complex sensors, in fact, appears to be complicated and extremely expensive. In this paper, a costeffective general-purpose multi-ID tag is proposed. It can be connected to generic sensors, and is capable to transmit a proper combination of ID codes depending on the actual value at its input. Such a tag represents the natural evolution of standard RFID technology: neither the digital design nor the cost of the tag is substantially modified.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127821491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trust Framework for RFID Tracking in Supply Chain Management 供应链管理中RFID跟踪的信任框架
Pub Date : 1900-01-01 DOI: 10.5220/0002172400170026
M. Singh, Xue Li
RFID tracking systems are in an open system environment, where different organizations have different business workflows and operate on different standards and protocols. RFID tracking to be effective, it is imperative for RFID tracking systems to trust each other and be collaborative. However, RFID tracking systems operating in the open system environment are constantly evolving and hence, the related trust and the collaborations need to be dynamic to changes. This paper presents a seven-layer RFID trust framework to promote the resolution of merging with both social and technology traits in enhancing security, privacy and integrity of global RFID tracking systems. An example of integration of our trust framework with supply-chain management applications and trust evaluation is also presented.
RFID跟踪系统处于一个开放的系统环境中,不同的组织有不同的业务工作流程,并在不同的标准和协议上运行。RFID跟踪要想有效,RFID跟踪系统之间的相互信任和协作是必不可少的。然而,在开放系统环境下运行的RFID跟踪系统是不断发展的,因此,相关的信任和协作需要动态变化。本文提出了一个七层RFID信任框架,以促进解决融合社会和技术特征的问题,提高全球RFID跟踪系统的安全性、隐私性和完整性。最后给出了一个将我们的信任框架与供应链管理应用和信任评估相结合的例子。
{"title":"Trust Framework for RFID Tracking in Supply Chain Management","authors":"M. Singh, Xue Li","doi":"10.5220/0002172400170026","DOIUrl":"https://doi.org/10.5220/0002172400170026","url":null,"abstract":"RFID tracking systems are in an open system environment, where different organizations have different business workflows and operate on different standards and protocols. RFID tracking to be effective, it is imperative for RFID tracking systems to trust each other and be collaborative. However, RFID tracking systems operating in the open system environment are constantly evolving and hence, the related trust and the collaborations need to be dynamic to changes. This paper presents a seven-layer RFID trust framework to promote the resolution of merging with both social and technology traits in enhancing security, privacy and integrity of global RFID tracking systems. An example of integration of our trust framework with supply-chain management applications and trust evaluation is also presented.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131693781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Classification of RFID Attacks RFID攻击分类
Pub Date : 1900-01-01 DOI: 10.5220/0001738800730086
Aikaterini Mitrokotsa, Melanie R. Rieback, A. Tanenbaum
RFID (Radio Frequency Identification) systems are emerging as one of the most pervasive computing technologies in history due to their low cost and their broad applicability. Although RFID networks have many advantages, they also present a number of inherent vulnerabilities with serious potential security implications. This paper develops a structural methodology for risks that RFID networks face by developing a classification of RFID attacks, presenting their important features, and discussing possible countermeasures. The goal of the paper is to categorize the existing weaknesses of RFID systems so that a better understanding of RFID attacks can be achieved and subsequently more efficient and effective algorithms, techniques and procedures to combat these attacks may be developed.
RFID(无线射频识别)系统由于其低成本和广泛的适用性,正在成为历史上最普及的计算技术之一。尽管RFID网络有许多优点,但它们也存在一些固有的漏洞,具有严重的潜在安全隐患。本文通过对RFID攻击进行分类,提出其重要特征,并讨论可能的对策,为RFID网络面临的风险开发了一种结构方法。本文的目的是对RFID系统现有的弱点进行分类,以便更好地了解RFID攻击,并随后开发出更有效的算法、技术和程序来对抗这些攻击。
{"title":"Classification of RFID Attacks","authors":"Aikaterini Mitrokotsa, Melanie R. Rieback, A. Tanenbaum","doi":"10.5220/0001738800730086","DOIUrl":"https://doi.org/10.5220/0001738800730086","url":null,"abstract":"RFID (Radio Frequency Identification) systems are emerging as one of the most pervasive computing technologies in history due to their low cost and their broad applicability. Although RFID networks have many advantages, they also present a number of inherent vulnerabilities with serious potential security implications. This paper develops a structural methodology for risks that RFID networks face by developing a classification of RFID attacks, presenting their important features, and discussing possible countermeasures. The goal of the paper is to categorize the existing weaknesses of RFID systems so that a better understanding of RFID attacks can be achieved and subsequently more efficient and effective algorithms, techniques and procedures to combat these attacks may be \u0000developed.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121271980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 105
X-CleLo: Intelligent Deterministic RFID Data Transformer 智能确定性RFID数据转换器
Pub Date : 1900-01-01 DOI: 10.5220/0003015700030012
Peter Darcy, Bela Stantic, A. Sattar
Recently, passive Radio Frequency Identification (RFID) systems have received an exponential amount of attention as researchers have worked tirelessly to implement a stable and reliable system. Unfortunately, despite vast improvements in the quality of RFID technology, a significant amount of erroneous data is still captured in the system. Currently, the problems associated with RFID have been addressed by cleaning algorithms to enhance the data quality. In this paper, we present X-CleLo, a means to intelligently clean and enhance the dirty data using Clausal Defeasible Logic. The extensive experimental study we have conducted has shown that the X-CleLo method has several advantages against a currently utilised cleaning technique and achieves a higher cleaning rate.
最近,无源射频识别(RFID)系统受到了指数级的关注,因为研究人员已经不知疲倦地实现了一个稳定可靠的系统。不幸的是,尽管RFID技术的质量有了很大的提高,但系统中仍然捕获了大量的错误数据。目前,与RFID相关的问题已经通过清洗算法来解决,以提高数据质量。在本文中,我们提出了X-CleLo,一种使用子句可否定逻辑智能清理和增强脏数据的方法。我们进行的大量实验研究表明,与目前使用的清洁技术相比,X-CleLo方法具有几个优势,并且可以实现更高的清洁速率。
{"title":"X-CleLo: Intelligent Deterministic RFID Data Transformer","authors":"Peter Darcy, Bela Stantic, A. Sattar","doi":"10.5220/0003015700030012","DOIUrl":"https://doi.org/10.5220/0003015700030012","url":null,"abstract":"Recently, passive Radio Frequency Identification (RFID) systems have received an exponential amount of attention as researchers have worked tirelessly to implement a stable and reliable system. Unfortunately, despite vast improvements in the quality of RFID technology, a significant amount of erroneous data is still captured in the system. Currently, the problems associated with RFID have been addressed by cleaning algorithms to enhance the data quality. In this paper, we present X-CleLo, a means to intelligently clean and enhance the dirty data using Clausal Defeasible Logic. The extensive experimental study we have conducted has shown that the X-CleLo method has several advantages against a currently utilised cleaning technique and achieves a higher cleaning rate.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122377227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
International Workshop on RFID Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1