Abstract: The dynamic facility layout problem is a really critical issue in the competitive industrial market; thus, solving this problem requires robust design and effective simulation systems. The sustainable simulation requires inputting reliable and accurate data into the system. So this paper describes an automated system integrated into the real environment to measure the duration of the material handling operations, collect the data in real-time, and determine the variances between the actual and estimated time schedule of the operations in order to update the simulation software and redesign the facility layout periodically. The automated method- time measurement system collects the real data through using Radio Frequency-Identification (RFID) and Internet of Things (IoT) technologies. Hence, attaching RFID- antenna reader and RFID tags enables the system to identify the location of the objects and gathering the time data. The real duration gathered will be manipulated by calculating the moving average duration of the material handling operations, choosing the shortest material handling path, and then updating the simulation software to redesign the facility layout accommodating with the shortest/real operation schedule. The periodic simulation in real-time is more sustainable and reliable than the simulation system relying on an analysis of historical data. The case study of this methodology is in cooperation with a workshop team for producing mechanical parts. Although there are some technical limitations, this methodology is promising, and it can be significantly useful in the redesigning of the manufacturing layout.
Abstract: Radio Frequency Identification (RFID) is a blooming technology which uses radio frequency to track the objects. This technology transmits signals between tag and reader to fetch information from the tag with a unique serial identity. Generally, the drawbacks of RFID technology are high cost, high consumption of power and weak authentication systems between a reader and a tag. The proposed protocol utilizes less dynamic power using reversible truncated multipliers which are implemented in RFID tag-reader with mutual authentication protocol system to reduce both leakage and dynamic power consumption. The proposed system was simulated using Xilinx and Cadence tools.
Abstract: Privacy of RFID systems is receiving increasing attention in the RFID community. RFID privacy is important as the RFID tags will be attached to all kinds of products and physical objects including people. The possible abuse or excessive use of RFID tracking capability by malicious users can lead to potential privacy violations. In this paper, we will discuss how the different industries use RFID and the potential privacy and security issues while RFID is implemented in these industries. Although RFID technology offers interesting services to customer and retailers, it could also endanger the privacy of end-users. Personal data can be leaked if a protection mechanism is not deployed in the RFID systems. The paper summarizes many different solutions for implementing privacy and security while deploying RFID systems.
Abstract: The Radio Frequency Identification (RFID) technology
has a diverse base of applications, but it is also prone to security
threats. There are different types of security attacks which limit the
range of the RFID applications. For example, deploying the RFID
networks in insecure environments could make the RFID system
vulnerable to many types of attacks such as spoofing attack, location
traceability attack, physical attack and many more. Therefore, security
is often an important requirement for RFID systems. In this paper,
RFID mutual authentication protocol is implemented based on mobile
agent technology and timestamp, which are used to provide strong
authentication and integrity assurances to both the RFID readers and
their corresponding RFID tags. The integration of mobile agent
technology and timestamp provides promising results towards
achieving this goal and towards reducing the security threats in RFID
systems.
Abstract: To avoid battery assisted tags with limited lifetime batteries, it is proposed here to replace them by energy harvesting
systems, able to feed from local environment. This would allow total
independence to RFID systems, very interesting for applications
where tag removal from its location is not possible. Example is here
described for luggage safety in airports, and is easily extendable to similar situation in terms of operation constraints. The idea is to fix
RFID tag with energy harvesting system not only to identify luggage
but also to supply an embedded microcontroller with a sensor
delivering luggage weight making it impossible to add or to remove
anything from the luggage during transit phases. The aim is to
optimize the harvested energy for such RFID applications, and to
study in which limits these applications are theoretically possible.
Proposed energy harvester is based on two energy sources:
piezoelectricity and electromagnetic waves, so that when the luggage
is moving on ground transportation to airline counters, the piezo
module supplies the tag and its microcontroller, while the RF module
operates during luggage transit thanks to readers located along the
way. Tag location on the luggage is analyzed to get best vibrations, as
well as harvester better choice for optimizing the energy supply
depending on applications and the amount of energy harvested during
a period of time. Effects of system parameters (RFID UHF
frequencies, limit distance between the tag and the antenna necessary
to harvest energy, produced voltage and voltage threshold) are
discussed and working conditions for such system are delimited.
Abstract: RFID system is used to identify objects such as passenger identification in public transportation, instead of linear or 2-dimensional barcodes. Key advantages of RFID system are to identify objects without physical contact, and to write arbitrary information into RFID tag. These advantages may help to improve maritime safety and efficiency of activity on the sea. However, utilization of RFID system for maritime scenes has not been considered. In this paper, we evaluate the availability of a generic RFID system operating on the sea. We measure RSSI between RFID tag floating on the sea and RFID antenna, and check whether a RFID reader can access a tag or not, while the distance between a floating buoy and the ship, and the angle are changed. Finally, we discuss the feasibility and the applicability of RFID system on the sea through the results of our preliminary experiment.
Abstract: Current proposals for E-passport or ID-Card is similar to a regular passport with the addition of tiny contactless integrated circuit (computer chip) inserted in the back cover, which will act as a secure storage device of the same data visually displayed on the photo page of the passport. In addition, it will include a digital photograph that will enable biometric comparison, through the use of facial recognition technology at international borders. Moreover, the e-passport will have a new interface, incorporating additional antifraud and security features. However, its problems are reliability, security and privacy. Privacy is a serious issue since there is no encryption between the readers and the E-passport. However, security issues such as authentication, data protection and control techniques cannot be embedded in one process. In this paper, design and prototype implementation of an improved E-passport reader is presented. The passport holder is authenticated online by using GSM network. The GSM network is the main interface between identification center and the e-passport reader. The communication data is protected between server and e-passport reader by using AES to encrypt data for protection will transferring through GSM network. Performance measurements indicate a 19% improvement in encryption cycles versus previously reported results.
Abstract: RFID system, in which we give identification number to each item and detect it with radio frequency, supports more variable service than barcode system can do. For example, a refrigerator with RFID reader and internet connection will automatically notify expiration of food validity to us. But, in spite of its convenience, RFID system has some security threats, because anybody can get ID information of item easily. One of most critical threats is privacy invasion. Existing privacy protection schemes or systems have been proposed, and these schemes or systems defend normal users from attempts that any attacker tries to get information using RFID tag value. But, these systems still have weakness that attacker can get information using analogous value instead of original tag value. In this paper, we mention this type of attack more precisely and suggest 'Tag Broker Model', which can defend it. Tag broker in this model translates original tag value to random value, and user can only get random value. Attacker can not use analogous tag value, because he/she is not able to know original one from it.
Abstract: The underground shopping mall has the constructional
problem of the fire evacuation. Also, the people sometimes lose their
direction and information of current time in the mall. If the
emergencies such as terrorist explosions or gas explosions are
happened, they have to go out soon. Under such circumstances, inside
of the mall has high risk for life. In this research, the authors propose a
way that he/she can go out from the underground shopping mall
quickly. If the narrow exits are discovered by using active RFID
(Radio Frequency Identification) tags and using cellular phones, they
can evacuate as soon as possible. To verify this hypothesis, the authors
design the model and carry out the agent-based simulation. They treat,
as a case study, the Tenjin mall in Fukuoka Prefecture in Japan. The
result of the simulation is that the case of the pedestrian with using
active RFID tags and cellular phones reduced the amount of time to
spend on the evacuation. Even if the diffusion of RFID tags and
cellular phones was not perfect, they could show the effectiveness of
reducing the time of evacuation.
Abstract: Radio Frequency Identification (RFID) system is
looked upon as one of the top ten important technologies in the 20th
century and find its applications in many fields such as car industry.
The intelligent cars are one important part of this industry and always
try to find new and satisfied intelligent cars. The purpose of this
paper is to introduce an intelligent car with the based of RFID. By
storing the moving control commands such as turn right, turn left,
speed up and speed down etc. into the RFID tags beforehand and
sticking the tags on the tracks Car can read the moving control
commands from the tags and accomplish the proper actions.
Abstract: EPC Class-1 Generation-2 UHF tags, one of Radio
frequency identification or RFID tag types, is expected that most
companies are planning to use it in the supply chain in the short term
and in consumer packaging in the long term due to its inexpensive
cost. Because of the very cost, however, its resources are extremely
scarce and it is hard to have any valuable security algorithms in it. It
causes security vulnerabilities, in particular cloning the tags for
counterfeits. In this paper, we propose a product authentication
solution for anti-counterfeiting at application level in the supply chain
and mobile RFID environment. It aims to become aware of
distribution of spurious products with fake RFID tags and to provide a
product authentication service to general consumers with mobile
RFID devices like mobile phone or PDA which has a mobile RFID
reader. We will discuss anti-counterfeiting mechanisms which are
required to our proposed solution and address requirements that the
mechanisms should have.
Abstract: Lately, an interest has grown greatly in the usages of
RFID in an un-presidential applications. It is shown in the adaptation
of major software companies such as Microsoft, IBM, and Oracle
the RFID capabilities in their major software products. For example
Microsoft SharePoints 2010 workflow is now fully compatible with
RFID platform. In addition, Microsoft BizTalk server is also capable
of all RFID sensors data acquisition. This will lead to applications
that required high bit rate, long range and a multimedia content in
nature. Higher frequencies of operation have been designated for
RFID tags, among them are the 2.45 and 5.8 GHz. The higher the
frequency means higher range, and higher bit rate, but the drawback
is the greater cost. In this paper we present a single layer, low
profile patch antenna operates at 5.8 GHz with pure resistive input
impedance of 50 and close to directive radiation. Also, we propose
a modification to the design in order to improve the operation band
width from 8.7 to 13.8
Abstract: The next stage of the home networking environment is
supposed to be ubiquitous, where each piece of material is equipped
with an RFID (Radio Frequency Identification) tag. To fully support
the ubiquitous environment, home networking middleware should be
able to recommend home services based on a user-s interests and
efficiently manage information on service usage profiles for the users.
Therefore, USN (Ubiquitous Sensor Network) technology, which
recognizes and manages a appliance-s state-information (location,
capabilities, and so on) by connecting RFID tags is considered. The
Intelligent Multi-Agent Middleware (IMAM) architecture was
proposed to intelligently manage the mobile RFID-based home
networking and to automatically supply information about home
services that match a user-s interests. Evaluation results for
personalization services for IMAM using Bayesian-Net and Decision
Trees are presented.
Abstract: RFID tag is a small and inexpensive microchip which is
capable of transmitting unique identifier through wireless network in a
short distance. If a group of RFID tags can be scanned simultaneously
by one reader, RFID Group proof could be generated. Group proof can
be used in various applications, such as good management which is
usually achieved using barcode system. A lot of RFID group proof
schemes have been proposed by many researchers. In this paper, we
introduce some existing group proof schemes and then analyze their
vulnerabilities to the privacy. Moreover, we propose a new attack
model, which threats the privacy of user by tracking tags in a group.
Abstract: This paper is about hiding RFID tag identifier (ID)
using handheld device like a cellular phone. By modifying the tag ID
of objects periodically or manually using cellular phone built-in a
RFID reader chip or with a external RFID reader device, we can
prevent other people from gathering the information related with
objects querying information server (like an EPC IS) with a tag ID or
deriving the information from tag ID-s code structure or tracking the
location of the objects and the owner of the objects. In this paper, we
use a cryptographic algorithm for modification and restoring of RFID
tag ID, and for one original tag ID, there are several different
temporary tag ID, periodically.
Abstract: RFID (Radio Frequency IDentification) system has
been widely used in our life, such as transport systems, passports,
automotive, animal tracking, human implants, library, and so on.
However, the RFID authentication protocols between RF (Radio
Frequency) tags and the RF readers have been bring about various
privacy problems that anonymity of the tags, tracking, eavesdropping,
and so on. Many researchers have proposed the solution of the
problems. However, they still have the problem, such as location
privacy, mutual authentication. In this paper, we show the problems of
the previous protocols, and then we propose a more secure and
efficient RFID authentication protocol.
Abstract: The radio frequency identification (RFID) is a
technology for automatic identification of items, particularly in
supply chain, but it is becoming increasingly important for industrial
applications. Unlike barcode technology that detects the optical
signals reflected from barcode labels, RFID uses radio waves to
transmit the information from an RFID tag affixed to the physical
object. In contrast to today most often use of this technology in
warehouse inventory and supply chain, the focus of this paper is an
overview of the structure of RFID systems used by RFID technology
and it also presents a solution based on the application of RFID for
brand authentication, traceability and tracking, by implementing a
production management system and extending its use to traders.