Jons-Tobias Wamhoff, Eberhard Grummt, R. Ackermann
{"title":"Routing Mechanism for Secure, Distributed Discovery Services for Global Auto-ID Networks","authors":"Jons-Tobias Wamhoff, Eberhard Grummt, R. Ackermann","doi":"10.5220/0001733101360141","DOIUrl":"https://doi.org/10.5220/0001733101360141","url":null,"abstract":"Enterprises capture immense amounts of data in Auto-ID repositories as items travel along the supply chain. For collaboration among partners individual repositories need to be discoverable when they are not explicitly linked. At the same time confidential information including supply relationships needs to be protected. The task of identifying repositories by keeping the secrets of a supply chain is done by a Discovery Service. The discovery information can be spread over multiple nodes. The routing mechanism ensures that queries sent to any node within the Discovery Service hierarchy will be forwarded to all responsible nodes. By anonymizing the request and response propagation, the repositories and Discovery Service data nodes remain hidden as long as the request did not produce an authorized result set.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126274817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Vales-Alonso, M. Bueno-Delgado, E. Egea-López, J. García-Haro
{"title":"Tag Loss Probability Evaluation for a Continuous Flow of Tags in the EPC-Global Standard","authors":"J. Vales-Alonso, M. Bueno-Delgado, E. Egea-López, J. García-Haro","doi":"10.5220/0001742901150126","DOIUrl":"https://doi.org/10.5220/0001742901150126","url":null,"abstract":"This paper addresses the evaluation of a passive RFID system under a continuous flow of tag arrivals and departures, for instance, in a conveyor belt installation. In such configuration, the main operational variable is the Tag Loss Probability (TLP). Since tags stay in the coverage area of the reader for a finite amount of time, it is possible that some tags leave the area unidentified if many tags compete for being simultaneously identified. A suitable configuration of the system (flow speed, tags per block, time between blocks, etc.) must be selected to assure that TLP remains under a given operative threshold. In this paper we focus on the EPCglobal Class-1 Gen-2 standard, which specifies an anti-collision protocol based on Framed Slotted Aloha. Our work is aimed at evaluating the TLP for the different configurations of such protocol, and selecting the right scenario configuration to guarantee a TLP below a given limit. This issue has not been studied yet, despite of its relevance in real-world scenarios based on assembly lines or other dynamic environments. Simulation results show that both anti-collision protocol operation mode and flow configuration heavily impacts in the performance. Additionally, real test have been conducted which confirm simulation results.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128675326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Ripoll, P. Poulichet, E. Colin, C. Maréchal, A. Moretto
{"title":"HF RFID Readerfor Mouse Identification - Study of Magnetic Coupling between Multi-Antennas and a Ferrite Transponder","authors":"C. Ripoll, P. Poulichet, E. Colin, C. Maréchal, A. Moretto","doi":"10.5220/0001728900320042","DOIUrl":"https://doi.org/10.5220/0001728900320042","url":null,"abstract":"This paper depicts an optimized RFID system operating at 13.56 MHz, used to recognize a mouse. When it passes near an antenna, the small transponder (1x6 mm) placed in its body communicates with the antenna. The distance of communication is small (around 3 centimeters) and our objective was to increase this distance. The transponder receives the signal from a coil wound around a magnetic circuit. The characteristics of the ferrite are very important for the communication. All the elements of the chain are taken into account in ADS simulation and we determine the value of the minimum voltage necessary for remote bias. Finite-element analysis is employed to extract the values of the generated magnetic field. The paper shows how to correlate the influent parameters to increase the communication distance. To improve this reading rate, a novel differential receiving antenna has been designed allowing an improved decoupling with the close transmitting antenna. An electrical model of the different parts has been performed. This includes the tag, the reader antennas and the coupling between them. These models have been validated by measurements and used for the simulations of the complete system.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128392646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RFID Tag Antennas Designed by Fractal Features and Manufactured by Printing Technology","authors":"Chi-Fang Huang, Jing-Qing Zhan, T. Hao","doi":"10.5220/0002418400930099","DOIUrl":"https://doi.org/10.5220/0002418400930099","url":null,"abstract":"Based on the fractal features, this work is to design RFID Tag antennas with minimum area needed as a tag. The designed passive tag is to be responsible for the EM wave of 915MHz from the reader. The concept of complex conjugated matching is used in designing the antenna. Electromagnetic Simulation tool is also used to help this design as well. The techniques of measuring the material parameters necessary in the design procedure are also mentioned in this paper. Offset printing technology is employed to manufacture these tag antennas which is assumed as a kind of low-cost tags. Real performance of these tags is also shown in this work.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134223529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alejandro Palomo-López, M. Bueno-Delgado, E. Egea-López, J. Alcaraz, J. Vales-Alonso
{"title":"CSMA Multi-stage Anti-collision Protocol for Active RFID Systems","authors":"Alejandro Palomo-López, M. Bueno-Delgado, E. Egea-López, J. Alcaraz, J. Vales-Alonso","doi":"10.5220/0003051900660078","DOIUrl":"https://doi.org/10.5220/0003051900660078","url":null,"abstract":"Current anti-collision protocols for active RFID systems stem from the ISO-18000-7 standard, which selects Frame Slotted Aloha as the underlying Medium Access Control protocol. However, these approaches neglect the possibility of using the Listen-Before-Talk mechanism already available in active RFID tags. In this work, a Carrier Sense Multiple Access mechanism with Multi-Stage, (CSMA/MS), derived from the quasi-optimal Sift distribution, is developed in order to substitute the anti-collision procedure in active tags. The key of CSMA/MS is to concatenate various contention windows, where only winners contend in the next contention windows. We demonstrate that this approach nearly achieves a 100% of identification probability per slot, improving Sift results and outperforming standard procedure.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124710518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. D'hoe, N. Stevens, Jean-Pierre Goemaere, L. D. Strycker, B. Nauwelaers
{"title":"Maximization of the Operating Volume using HF RFID Loop Antennas","authors":"K. D'hoe, N. Stevens, Jean-Pierre Goemaere, L. D. Strycker, B. Nauwelaers","doi":"10.5220/0003026000230029","DOIUrl":"https://doi.org/10.5220/0003026000230029","url":null,"abstract":"This article describes how a passive radio frequency identification (RFID) system is optimized. Our attention focuses on the operating volume of a circular loop antenna. Hereby the design of loop antennas is given a new approach to establish a maximum operating volume. Therefore, the off-axis magnetic field is investigated. This is done for a circular loop in free space and in the vicinity of a metal plane. A numerical approach is given towards the maximization of the operating volume. The goal is to provide new insights into the design of a loop antenna and enhance the reliability of the RFID system.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116791799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gabriel Hermosillo, J. Ellart, L. Seinturier, L. Duchien
{"title":"A Traceability Service to Facilitate RFID Adoption in the Retail Supply Chain","authors":"Gabriel Hermosillo, J. Ellart, L. Seinturier, L. Duchien","doi":"10.5220/0002197200490058","DOIUrl":"https://doi.org/10.5220/0002197200490058","url":null,"abstract":"Nowadays, companies are suffering changes in the way they deal with their inventories and their whole supply chain management. New technologies are emerging to help them adapt to the changes and keep a competitive status, but the adoption of such technologies is not always easy. Even though a lot of research has been done for RFID, there are still some areas that are being left aside, like the traceability aspect, which is one of the most important concerns in the retail supply chain. We propose a service named TRASER (TRAceability SErvice for the Retail supply chain) that will help the companies adopt the new technologies into their existing environments, dealing with persistence and traceability, and allowing the users to manage their operation according to their business rules, workflows and historical data.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115712500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RFID based Anti-Counterfeiting Utilizing Supply Chain Proximity","authors":"Ali Dada, C. Magerkurth","doi":"10.5220/0001742601010114","DOIUrl":"https://doi.org/10.5220/0001742601010114","url":null,"abstract":"This paper discusses a novel RFID-based approach to determine probabilities of items in a supply chain as being counterfeits based on their proximity to already identified counterfeits. The central idea is that items moving close to fakes are more likely to be fakes than items traveling with genuine items. The required proximity information can be deduced from events in EPCIS repositories for RFID-tagged items. The paper discusses two mathematical algorithms for calculating the probabilities and presents the results of a comparative simulation study. The results are discussed in terms of conclusions for a future implementation with RFID-tracked supply chains.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115342410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RFID Privacy Protection Scheme for Secure Ubiquitous Computing","authors":"Hyun Seok Kim, Jung-Hyun Oh, Jin-Young Choi","doi":"10.5220/0002411201170124","DOIUrl":"https://doi.org/10.5220/0002411201170124","url":null,"abstract":"A Radio-Frequency-Identification (RFID) tag is a small and inexpensive device that consists of an IC chip and an antenna which communicate by radio frequency. It emits an ID in response to a query from a radio communication device called as a reader. For this reason, the RFID tag is used for management of goods and it is used as a substitute for a bar code. However, RFID system may infringe on a consumer’s privacy because it has a strong tracing ability. In this paper we describe problems of previous works on RFID security protocols and specify several known attacks and introduce PPP(Privacy Protection Protocol) for a RFID security protocol which serves as a proof of concept for authentication an RFID tag to a reader device using the vernam and standard encryption as a cryptographic primitive. To verify our protocol, we use model checking methodology, that is, Casper(A Compiler for Security Protocol), CSP(Communicating Sequential Processes) and then verify security properties such as secrecy and authentication using FDR(Failure Divergence Refinement) tool.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126118088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RFID Uses for Prosis Ambient Control","authors":"P. Pujo, Y. Dubromelle, F. Ounnar","doi":"10.5220/0002911000810088","DOIUrl":"https://doi.org/10.5220/0002911000810088","url":null,"abstract":"Product traceability is now an obligation in terms of observability and flexibility of manufacturing systems and logistics chains. RFID technologies are due to be more and more integrated into existing communication networks. New infotronics technologies will enlarge the capabilities to interact, to react and to customise control systems with innovative possibilities. New control approaches should be proposed based on the use of emerging technologies that would allow their operability in manufacturing sites. A model for ambient control production systems is proposed, based on a set of holonic entities interacting through set of entities that offer ambient service. After describing the PROSIS model, the ambient services that can be provided are presented.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116907580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}