Abstract: Radio Frequency Identification (RFID) is a blooming technology which uses radio frequency to track the objects. This technology transmits signals between tag and reader to fetch information from the tag with a unique serial identity. Generally, the drawbacks of RFID technology are high cost, high consumption of power and weak authentication systems between a reader and a tag. The proposed protocol utilizes less dynamic power using reversible truncated multipliers which are implemented in RFID tag-reader with mutual authentication protocol system to reduce both leakage and dynamic power consumption. The proposed system was simulated using Xilinx and Cadence tools.
Abstract: Radio Frequency Identification (RFID) is one of the most commonly used technologies in IoTs and Wireless Sensor Networks which makes the devices identification and tracking extremely easy to manage. Since RFID uses wireless channel for communication, which is open for all types of adversaries, researchers have proposed many Ultralightweight Mutual Authentication Protocols (UMAPs) to ensure security and privacy in a cost-effective manner. These UMAPs involve simple bitwise logical operators such as XOR, AND, OR & Rot, etc., to design the protocol messages. However, most of these UMAPs were later reported to be vulnerable against many malicious attacks. In this paper, we have presented a detailed overview of some eminent UMAPs and also discussed the many security attacks on them. Finally, some recommendations and suggestions have been discussed, which can improve the design of the UMAPs.
Abstract: This paper introduces a framework to digitalize lean manufacturing tools to enhance smart lean-based manufacturing environments or Lean 4.0 manufacturing systems. The paper discusses the integration between lean tools and the powerful features of recent real-time data capturing systems with the help of Information and Communication Technologies (ICT) to develop an intelligent real-time monitoring and controlling system of production operations concerning lean targets. This integration is represented in the Lean 4.0 system called Dynamic Value Stream Mapping (DVSM). Moreover, the paper introduces the practice of Radio Frequency Identification (RFID) and ICT to smartly support lean tools and practices during daily production runs to keep the lean system alive and effective. This work introduces a practical description of how the lean method tools 5S, standardized work, and poka-yoke can be digitalized and smartly monitored and controlled through DVSM. A framework of the three tools has been discussed and put into practice in a German switchgear manufacturer.
Abstract: Internet of Things (IoT) is a powerful industry system, which end-devices are interconnected and automated, allowing the devices to analyze data and execute actions based on the analysis. The IoT technology leverages the technology of Radio-Frequency Identification (RFID) and Wireless Sensor Network (WSN), including mobile and sensor. These technologies contribute to the evolution of IoT. However, due to more devices are connected each other in the Internet, and data from various sources exchanged between things, confidentiality of the data becomes a major concern. This paper focuses on one of the major challenges in IoT; authentication, in order to preserve data integrity and confidentiality are in place. A few solutions are reviewed based on papers from the last few years. One of the proposed solutions is securing the communication between IoT devices and cloud servers with Elliptic Curve Cryptograhpy (ECC) based mutual authentication protocol. This solution focuses on Hyper Text Transfer Protocol (HTTP) cookies as security parameter. Next proposed solution is using keyed-hash scheme protocol to enable IoT devices to authenticate each other without the presence of a central control server. Another proposed solution uses Physical Unclonable Function (PUF) based mutual authentication protocol. It emphasizes on tamper resistant and resource-efficient technology, which equals a 3-way handshake security protocol.
Abstract: An electrically small meander line antenna is designed for impedance matching with RF transceiver chip CC1101. The design provides the flexibility of tuning the reactance of the antenna over a wide range of values: highly capacitive to highly inductive. The antenna was printed with silver ink on FR4 substrate using the screen printing design process. The antenna impedance was perfectly matched to CC1101 at 433 MHz. The measured radiation efficiency of the antenna was 81.3% at resonance. The 3 dB and 10 dB fractional bandwidth of the antenna was 14.5% and 4.78%, respectively. The read range of the antenna was compared with a copper wire monopole antenna over a distance of five meters. The antenna, with a perfect impedance match with RF transceiver chip CC1101, shows improvement in the read range compared to a monopole antenna over the specified distance.
Abstract: Privacy of RFID systems is receiving increasing attention in the RFID community. RFID privacy is important as the RFID tags will be attached to all kinds of products and physical objects including people. The possible abuse or excessive use of RFID tracking capability by malicious users can lead to potential privacy violations. In this paper, we will discuss how the different industries use RFID and the potential privacy and security issues while RFID is implemented in these industries. Although RFID technology offers interesting services to customer and retailers, it could also endanger the privacy of end-users. Personal data can be leaked if a protection mechanism is not deployed in the RFID systems. The paper summarizes many different solutions for implementing privacy and security while deploying RFID systems.
Abstract: A modified two dimensional (2D) logistic map based on cross feedback control is proposed. This 2D map exhibits more random chaotic dynamical properties than the classic one dimensional (1D) logistic map in the statistical characteristics analysis. So it is utilized as the pseudo-random (PN) sequence generator, where the obtained real-valued PN sequence is quantized at first, then applied to radio frequency identification (RFID) communication system in this paper. This system is experimentally validated on a cortex-M0 development board, which shows the effectiveness in key generation, the size of key space and security. At last, further cryptanalysis is studied through the test suite in the National Institute of Standards and Technology (NIST).
Abstract: AmI proposes a new way of thinking about computers, which follows the ideas of the Ubiquitous Computing vision of Mark Weiser. In these, there is what is known as a Disappearing Computer Initiative, with users immersed in intelligent environments. Hence, technologies need to be adapted so that they are capable of replacing the traditional inputs to the system by embedding these in every-day artifacts. In this work, we present an approach, which uses Radiofrequency Identification (RFID) and Near Field Communication (NFC) technologies. In the latter, a new form of interaction appears by contact. We compare both technologies by analyzing their requirements and advantages. In addition, we propose using a combination of RFID and NFC.
Abstract: Wireless sensors, also known as wireless sensor nodes,
have been making a significant impact on human daily life. The
Radio Frequency Identification (RFID) and Wireless Sensor Network
(WSN) are two complementary technologies; hence, an integrated
implementation of these technologies expands the overall
functionality in obtaining long-range and real-time information on the
location and properties of objects and people. An approach for
integrating ZigBee and RFID networks is proposed in this paper, to
create an energy-efficient network improved by the benefits of
combining ZigBee and RFID architecture. Furthermore, the
compatibility and requirements of the ZigBee device and
communication links in the typical RFID system which is presented
with the real world experiment on the capabilities of the proposed
Abstract: In this paper, an attempt has been made for the design
of a robotic library using an intelligent system. The robot works on
the ARM microprocessor, motor driver circuit with 5 degrees of
freedom with Wi-Fi and GPS based communication protocol. The
authenticity of the library books is controlled by RFID. The proposed
robotic library system is facilitated with embedded system and ARM.
In this library issuance system, the previous potential readers’
authentic review reports have been taken into consideration for
recommending suitable books to the deserving new users and the
issuance of books or periodicals is based on the users’ decision. We
have conjectured that the Wi-Fi based robotic library management
system would allow fast transaction of books issuance and it also
produces quality readers.
Abstract: This qualitative case study seeks to understand and
explain the deployment of radio frequency identification (RFID)
systems in two countries (i.e., in Taiwan for the adoption of electric
scooters and in Finland for supporting glass bottle recycling) using
the “Technology-Organization-Environment” theoretical framework.
This study also seeks to highlight the relevance and importance of
pursuing environmental sustainability in firms and in society in
general due to the social urgency of the issues involved.
Abstract: Radio Frequency Identification (RFID) has become a
key technology in the emerging concept of Internet of Things (IoT).
Naturally, business applications would require the deployment of
various RFID systems developed by different vendors that use
different data formats and structures. This heterogeneity poses a
challenge in developing real-life IoT systems with RFID, as
integration is becoming very complex and challenging. Semantic
integration is a key approach to deal with this challenge. To do so,
ontology for RFID systems need to be developed in order to
annotated semantically RFID systems, and hence, facilitate their
integration. Accordingly, in this paper, we propose ontology for
RFID systems. The proposed ontology can be used to semantically
enrich RFID systems, and hence, improve their usage and reasoning.
Abstract: The Radio Frequency Identification (RFID) technology
has a diverse base of applications, but it is also prone to security
threats. There are different types of security attacks which limit the
range of the RFID applications. For example, deploying the RFID
networks in insecure environments could make the RFID system
vulnerable to many types of attacks such as spoofing attack, location
traceability attack, physical attack and many more. Therefore, security
is often an important requirement for RFID systems. In this paper,
RFID mutual authentication protocol is implemented based on mobile
agent technology and timestamp, which are used to provide strong
authentication and integrity assurances to both the RFID readers and
their corresponding RFID tags. The integration of mobile agent
technology and timestamp provides promising results towards
achieving this goal and towards reducing the security threats in RFID
Abstract: Food supply chain is one of the most complex supply
chain networks due to its perishable nature and customer oriented
products, and food safety is the major concern for this industry. IT
system could help to minimize the production and consumption of
unsafe food by controlling and monitoring the entire system.
However, there have been many issues in adoption of IT system in
this industry specifically within SMEs sector. With this regard, this
study presents a novel approach to use IT and tractability systems in
the food supply chain, using application of RFID and central
Abstract: This paper describes an optimization tool-based
design strategy for a Current Mode Logic CML divide-by-2 circuit.
Representing a building block for output frequency generation in a
RFID protocol based-frequency synthesizer, the circuit was designed
to minimize the power consumption for driving of multiple loads
with unbalancing (at transceiver level). Implemented with XFAB
XC08 180 nm technology, the circuit was optimized through
MunEDA WiCkeD tool at Cadence Virtuoso Analog Design
Abstract: Logistics processes of perishable food in the supply
chain include the distribution activities and the real time temperature
monitoring to fulfil the cold chain requirements. The paper presents
the use of RFID (Radio Frequency Identification) technology as an
identification tool of receiving and shipping activities in the cold
store. At the same time, the use of RFID data loggers with
temperature sensors is presented to observe and store the
temperatures for the purpose of analyzing the processes and having
the history data available for traceability purposes and efficient recall
Abstract: To avoid battery assisted tags with limited lifetime batteries, it is proposed here to replace them by energy harvesting
systems, able to feed from local environment. This would allow total
independence to RFID systems, very interesting for applications
where tag removal from its location is not possible. Example is here
described for luggage safety in airports, and is easily extendable to similar situation in terms of operation constraints. The idea is to fix
RFID tag with energy harvesting system not only to identify luggage
but also to supply an embedded microcontroller with a sensor
delivering luggage weight making it impossible to add or to remove
anything from the luggage during transit phases. The aim is to
optimize the harvested energy for such RFID applications, and to
study in which limits these applications are theoretically possible.
Proposed energy harvester is based on two energy sources:
piezoelectricity and electromagnetic waves, so that when the luggage
is moving on ground transportation to airline counters, the piezo
module supplies the tag and its microcontroller, while the RF module
operates during luggage transit thanks to readers located along the
way. Tag location on the luggage is analyzed to get best vibrations, as
well as harvester better choice for optimizing the energy supply
depending on applications and the amount of energy harvested during
a period of time. Effects of system parameters (RFID UHF
frequencies, limit distance between the tag and the antenna necessary
to harvest energy, produced voltage and voltage threshold) are
discussed and working conditions for such system are delimited.
Abstract: The purpose of this paper is to focus on security and safety issues facing by pharmaceutical industry globally when counterfeit drugs are in question. Hence, there is an intense need to secure and authenticate pharmaceutical products in the emerging counterfeit product market. This paper will elaborate the application of radio frequency identification (RFID) in pharmaceutical industry and to identify its key benefits for patient’s care. The benefits are: help to co-ordinate the stream of supplies, accuracy in chains of supplies, maintaining trustworthy information, to manage the operations in appropriate and timely manners and finally deliver the genuine drug to patient. It is discussed that how RFID supported supply chain information sharing (SCIS) helps to combat against counterfeit drugs. And a solution how to tag pharmaceutical products; since, some products prevent RFID implementation in this industry. In this paper, a proposed model for pharma industry distribution suggested to combat against the counterfeit drugs when they are in supply chain.
Abstract: In this study, an local invariant generalized Houghtransform (LI-GHT) method is proposed for integrated circuit (IC) visual positioning. The original generalized Hough transform (GHT) is robust to external noise; however, it is not suitable for visual positioning of IC chips due to the four-dimensionality (4D) of parameter space which leads to the substantial storage requirement and high computational complexity. The proposed LI-GHT method can reduce the dimensionality of parameter space to 2D thanks to the rotational invariance of local invariant geometric feature and it can estimate the accuracy position and rotation angle of IC chips in real-time under noise and blur influence. The experiment results show that the proposed LI-GHT can estimate position and rotation angle of IC chips with high accuracy and fast speed. The proposed LI-GHT algorithm was implemented in IC visual positioning system of radio frequency identification (RFID) packaging equipment.