International Workshop on RFID Technology最新文献

筛选
英文 中文
Routing Mechanism for Secure, Distributed Discovery Services for Global Auto-ID Networks 面向全球自动识别网络的安全、分布式发现服务路由机制
International Workshop on RFID Technology Pub Date : 2018-08-15 DOI: 10.5220/0001733101360141
Jons-Tobias Wamhoff, Eberhard Grummt, R. Ackermann
{"title":"Routing Mechanism for Secure, Distributed Discovery Services for Global Auto-ID Networks","authors":"Jons-Tobias Wamhoff, Eberhard Grummt, R. Ackermann","doi":"10.5220/0001733101360141","DOIUrl":"https://doi.org/10.5220/0001733101360141","url":null,"abstract":"Enterprises capture immense amounts of data in Auto-ID repositories as items travel along the supply chain. For collaboration among partners individual repositories need to be discoverable when they are not explicitly linked. At the same time confidential information including supply relationships needs to be protected. The task of identifying repositories by keeping the secrets of a supply chain is done by a Discovery Service. The discovery information can be spread over multiple nodes. The routing mechanism ensures that queries sent to any node within the Discovery Service hierarchy will be forwarded to all responsible nodes. By anonymizing the request and response propagation, the repositories and Discovery Service data nodes remain hidden as long as the request did not produce an authorized result set.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126274817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tag Loss Probability Evaluation for a Continuous Flow of Tags in the EPC-Global Standard epc -全球标准中标签连续流的标签丢失概率评估
International Workshop on RFID Technology Pub Date : 2018-08-12 DOI: 10.5220/0001742901150126
J. Vales-Alonso, M. Bueno-Delgado, E. Egea-López, J. García-Haro
{"title":"Tag Loss Probability Evaluation for a Continuous Flow of Tags in the EPC-Global Standard","authors":"J. Vales-Alonso, M. Bueno-Delgado, E. Egea-López, J. García-Haro","doi":"10.5220/0001742901150126","DOIUrl":"https://doi.org/10.5220/0001742901150126","url":null,"abstract":"This paper addresses the evaluation of a passive RFID system under a continuous flow of tag arrivals and departures, for instance, in a conveyor belt installation. In such configuration, the main operational variable is the Tag Loss Probability (TLP). Since tags stay in the coverage area of the reader for a finite amount of time, it is possible that some tags leave the area unidentified if many tags compete for being simultaneously identified. A suitable configuration of the system (flow speed, tags per block, time between blocks, etc.) must be selected to assure that TLP remains under a given operative threshold. In this paper we focus on the EPCglobal Class-1 Gen-2 standard, which specifies an anti-collision protocol based on Framed Slotted Aloha. Our work is aimed at evaluating the TLP for the different configurations of such protocol, and selecting the right scenario configuration to guarantee a TLP below a given limit. This issue has not been studied yet, despite of its relevance in real-world scenarios based on assembly lines or other dynamic environments. Simulation results show that both anti-collision protocol operation mode and flow configuration heavily impacts in the performance. Additionally, real test have been conducted which confirm simulation results.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128675326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HF RFID Readerfor Mouse Identification - Study of Magnetic Coupling between Multi-Antennas and a Ferrite Transponder 用于鼠标识别的高频射频识别阅读器——多天线和铁氧体应答器之间磁耦合的研究
International Workshop on RFID Technology Pub Date : 2016-11-21 DOI: 10.5220/0001728900320042
C. Ripoll, P. Poulichet, E. Colin, C. Maréchal, A. Moretto
{"title":"HF RFID Readerfor Mouse Identification - Study of Magnetic Coupling between Multi-Antennas and a Ferrite Transponder","authors":"C. Ripoll, P. Poulichet, E. Colin, C. Maréchal, A. Moretto","doi":"10.5220/0001728900320042","DOIUrl":"https://doi.org/10.5220/0001728900320042","url":null,"abstract":"This paper depicts an optimized RFID system operating at 13.56 MHz, used to recognize a mouse. When it passes near an antenna, the small transponder (1x6 mm) placed in its body communicates with the antenna. The distance of communication is small (around 3 centimeters) and our objective was to increase this distance. The transponder receives the signal from a coil wound around a magnetic circuit. The characteristics of the ferrite are very important for the communication. All the elements of the chain are taken into account in ADS simulation and we determine the value of the minimum voltage necessary for remote bias. Finite-element analysis is employed to extract the values of the generated magnetic field. The paper shows how to correlate the influent parameters to increase the communication distance. To improve this reading rate, a novel differential receiving antenna has been designed allowing an improved decoupling with the close transmitting antenna. An electrical model of the different parts has been performed. This includes the tag, the reader antennas and the coupling between them. These models have been validated by measurements and used for the simulations of the complete system.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128392646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RFID Tag Antennas Designed by Fractal Features and Manufactured by Printing Technology 基于分形特征的RFID标签天线设计与打印技术
International Workshop on RFID Technology Pub Date : 2016-11-10 DOI: 10.5220/0002418400930099
Chi-Fang Huang, Jing-Qing Zhan, T. Hao
{"title":"RFID Tag Antennas Designed by Fractal Features and Manufactured by Printing Technology","authors":"Chi-Fang Huang, Jing-Qing Zhan, T. Hao","doi":"10.5220/0002418400930099","DOIUrl":"https://doi.org/10.5220/0002418400930099","url":null,"abstract":"Based on the fractal features, this work is to design RFID Tag antennas with minimum area needed as a tag. The designed passive tag is to be responsible for the EM wave of 915MHz from the reader. The concept of complex conjugated matching is used in designing the antenna. Electromagnetic Simulation tool is also used to help this design as well. The techniques of measuring the material parameters necessary in the design procedure are also mentioned in this paper. Offset printing technology is employed to manufacture these tag antennas which is assumed as a kind of low-cost tags. Real performance of these tags is also shown in this work.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134223529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
CSMA Multi-stage Anti-collision Protocol for Active RFID Systems 有源RFID系统多阶段防碰撞协议
International Workshop on RFID Technology Pub Date : 2016-11-08 DOI: 10.5220/0003051900660078
Alejandro Palomo-López, M. Bueno-Delgado, E. Egea-López, J. Alcaraz, J. Vales-Alonso
{"title":"CSMA Multi-stage Anti-collision Protocol for Active RFID Systems","authors":"Alejandro Palomo-López, M. Bueno-Delgado, E. Egea-López, J. Alcaraz, J. Vales-Alonso","doi":"10.5220/0003051900660078","DOIUrl":"https://doi.org/10.5220/0003051900660078","url":null,"abstract":"Current anti-collision protocols for active RFID systems stem from the ISO-18000-7 standard, which selects Frame Slotted Aloha as the underlying Medium Access Control protocol. However, these approaches neglect the possibility of using the Listen-Before-Talk mechanism already available in active RFID tags. In this work, a Carrier Sense Multiple Access mechanism with Multi-Stage, (CSMA/MS), derived from the quasi-optimal Sift distribution, is developed in order to substitute the anti-collision procedure in active tags. The key of CSMA/MS is to concatenate various contention windows, where only winners contend in the next contention windows. We demonstrate that this approach nearly achieves a 100% of identification probability per slot, improving Sift results and outperforming standard procedure.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124710518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Maximization of the Operating Volume using HF RFID Loop Antennas 使用高频射频识别环路天线的操作体积最大化
International Workshop on RFID Technology Pub Date : 2010-06-08 DOI: 10.5220/0003026000230029
K. D'hoe, N. Stevens, Jean-Pierre Goemaere, L. D. Strycker, B. Nauwelaers
{"title":"Maximization of the Operating Volume using HF RFID Loop Antennas","authors":"K. D'hoe, N. Stevens, Jean-Pierre Goemaere, L. D. Strycker, B. Nauwelaers","doi":"10.5220/0003026000230029","DOIUrl":"https://doi.org/10.5220/0003026000230029","url":null,"abstract":"This article describes how a passive radio frequency identification (RFID) system is optimized. Our attention focuses on the operating volume of a circular loop antenna. Hereby the design of loop antennas is given a new approach to establish a maximum operating volume. Therefore, the off-axis magnetic field is investigated. This is done for a circular loop in free space and in the vicinity of a metal plane. A numerical approach is given towards the maximization of the operating volume. The goal is to provide new insights into the design of a loop antenna and enhance the reliability of the RFID system.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116791799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Traceability Service to Facilitate RFID Adoption in the Retail Supply Chain 可追溯性服务促进RFID在零售供应链中的应用
International Workshop on RFID Technology Pub Date : 2009-05-06 DOI: 10.5220/0002197200490058
Gabriel Hermosillo, J. Ellart, L. Seinturier, L. Duchien
{"title":"A Traceability Service to Facilitate RFID Adoption in the Retail Supply Chain","authors":"Gabriel Hermosillo, J. Ellart, L. Seinturier, L. Duchien","doi":"10.5220/0002197200490058","DOIUrl":"https://doi.org/10.5220/0002197200490058","url":null,"abstract":"Nowadays, companies are suffering changes in the way they deal with their inventories and their whole supply chain management. New technologies are emerging to help them adapt to the changes and keep a competitive status, but the adoption of such technologies is not always easy. Even though a lot of research has been done for RFID, there are still some areas that are being left aside, like the traceability aspect, which is one of the most important concerns in the retail supply chain. We propose a service named TRASER (TRAceability SErvice for the Retail supply chain) that will help the companies adopt the new technologies into their existing environments, dealing with persistence and traceability, and allowing the users to manage their operation according to their business rules, workflows and historical data.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115712500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
RFID based Anti-Counterfeiting Utilizing Supply Chain Proximity 基于供应链接近的RFID防伪技术
International Workshop on RFID Technology Pub Date : 2008-06-12 DOI: 10.5220/0001742601010114
Ali Dada, C. Magerkurth
{"title":"RFID based Anti-Counterfeiting Utilizing Supply Chain Proximity","authors":"Ali Dada, C. Magerkurth","doi":"10.5220/0001742601010114","DOIUrl":"https://doi.org/10.5220/0001742601010114","url":null,"abstract":"This paper discusses a novel RFID-based approach to determine probabilities of items in a supply chain as being counterfeits based on their proximity to already identified counterfeits. The central idea is that items moving close to fakes are more likely to be fakes than items traveling with genuine items. The required proximity information can be deduced from events in EPCIS repositories for RFID-tagged items. The paper discusses two mathematical algorithms for calculating the probabilities and presents the results of a comparative simulation study. The results are discussed in terms of conclusions for a future implementation with RFID-tracked supply chains.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115342410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RFID Privacy Protection Scheme for Secure Ubiquitous Computing 安全普适计算的RFID隐私保护方案
International Workshop on RFID Technology Pub Date : 2007-12-01 DOI: 10.5220/0002411201170124
Hyun Seok Kim, Jung-Hyun Oh, Jin-Young Choi
{"title":"RFID Privacy Protection Scheme for Secure Ubiquitous Computing","authors":"Hyun Seok Kim, Jung-Hyun Oh, Jin-Young Choi","doi":"10.5220/0002411201170124","DOIUrl":"https://doi.org/10.5220/0002411201170124","url":null,"abstract":"A Radio-Frequency-Identification (RFID) tag is a small and inexpensive device that consists of an IC chip and an antenna which communicate by radio frequency. It emits an ID in response to a query from a radio communication device called as a reader. For this reason, the RFID tag is used for management of goods and it is used as a substitute for a bar code. However, RFID system may infringe on a consumer’s privacy because it has a strong tracing ability. In this paper we describe problems of previous works on RFID security protocols and specify several known attacks and introduce PPP(Privacy Protection Protocol) for a RFID security protocol which serves as a proof of concept for authentication an RFID tag to a reader device using the vernam and standard encryption as a cryptographic primitive. To verify our protocol, we use model checking methodology, that is, Casper(A Compiler for Security Protocol), CSP(Communicating Sequential Processes) and then verify security properties such as secrecy and authentication using FDR(Failure Divergence Refinement) tool.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126118088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RFID Uses for Prosis Ambient Control RFID用于环境控制
International Workshop on RFID Technology Pub Date : 1900-01-01 DOI: 10.5220/0002911000810088
P. Pujo, Y. Dubromelle, F. Ounnar
{"title":"RFID Uses for Prosis Ambient Control","authors":"P. Pujo, Y. Dubromelle, F. Ounnar","doi":"10.5220/0002911000810088","DOIUrl":"https://doi.org/10.5220/0002911000810088","url":null,"abstract":"Product traceability is now an obligation in terms of observability and flexibility of manufacturing systems and logistics chains. RFID technologies are due to be more and more integrated into existing communication networks. New infotronics technologies will enlarge the capabilities to interact, to react and to customise control systems with innovative possibilities. New control approaches should be proposed based on the use of emerging technologies that would allow their operability in manufacturing sites. A model for ambient control production systems is proposed, based on a set of holonic entities interacting through set of entities that offer ambient service. After describing the PROSIS model, the ambient services that can be provided are presented.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116907580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信