M. Virili, F. Lolli, F. Alimenti, P. Mezzanotte, M. Dionigi, L. Roselli
{"title":"A way towards an organic frequency doubler for harmonic RFID applications","authors":"M. Virili, F. Lolli, F. Alimenti, P. Mezzanotte, M. Dionigi, L. Roselli","doi":"10.1109/RFID-TA.2012.6404511","DOIUrl":"https://doi.org/10.1109/RFID-TA.2012.6404511","url":null,"abstract":"This paper describes the realization and the measurement of a paper printed, low cost, frequency doubler for harmonic RFID applications. The proposed tag structure consists of two aerial resonators (RX and TX) printed on paper and a Schottky diode able to double the frequency of the received signal. This work aims at proving the feasibility of a fully organic frequency doubler exploiting paper printed coils and organic diode (pentacene based). At this level of the development, paper coils, using a fairly mature technology, have been developed accounting for the present performance and geometrical constraints of state of the art, lab developed, organic Schottky diodes. The obtained results confirm that the assumed approach can be pursued and represents a clear reference for the future development of the fully organic structure.","PeriodicalId":232862,"journal":{"name":"2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125198478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enforcing RFID data visibility restrictions using XACML security policies","authors":"M. Pardal, M. Harrison, S. Sarma, J. Marques","doi":"10.1109/RFID-TA.2012.6404558","DOIUrl":"https://doi.org/10.1109/RFID-TA.2012.6404558","url":null,"abstract":"Radio Frequency Identification (RFID) technology allows automatic data capture from tagged objects moving in a supply chain. This data can be very useful if it is used to answer traceability queries, however it is distributed across many different repositories, owned by different companies. Discovery Services (DS) are designed to assist in retrieving the RFID data relevant for traceability queries while enforcing sharing policies that are defined and required by participating companies to prevent sensitive data from being exposed. In this paper we define an interface for Supply Chain Authorization (SC-Az) and describe the implementation of two visibility restriction mechanisms based on Access Control Lists (ACLs) and Capabilities. Both approaches were converted to the standard eXtensible Access Control Markup Language (XACML) and their correctness and performance was evaluated for supply chains with increasing size.","PeriodicalId":232862,"journal":{"name":"2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122076909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ricardo Baccarelli, G. Orecchini, F. Alimenti, L. Roselli
{"title":"Feasibility study of a fully organic, CNT based, harmonic RFID gas sensor","authors":"Ricardo Baccarelli, G. Orecchini, F. Alimenti, L. Roselli","doi":"10.1109/RFID-TA.2012.6404559","DOIUrl":"https://doi.org/10.1109/RFID-TA.2012.6404559","url":null,"abstract":"This paper presents a feasibility study of a fully organic RFID gas sensor, realized by combining CNT deposition with inkjet printing on paper, able to achieve performance of interest for emerging applications in the field of Internet of Things (IoT) and Large Area Electronics (LAE). The advancement with respect to the state of the art is made possible by adopting a more sophisticated yet simple and innovative architecture implementing a Wheatstone bridge on a harmonic tag. Tremendous margins for sensitivity improvement are demonstrated while keeping the beauty of a fully organic, autonomous and chipless realization.","PeriodicalId":232862,"journal":{"name":"2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","volume":"390 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133320214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Handling the NDEF signature record type in a secure manner","authors":"Thomas Korak, Lukas Wilfinger","doi":"10.1109/RFID-TA.2012.6404492","DOIUrl":"https://doi.org/10.1109/RFID-TA.2012.6404492","url":null,"abstract":"Today's society is used to get information of different types of items in a fast and convenient way using e.g., a camera or a barcode scanner in combination with the Internet. Using near-field communication (NFC) this information procurement can be further simplified. The desired information is obtained by just touching a so-called NFC tag with an NFC-capable device (e.g. smartphone). Of course also new opportunities for attackers rise with this technology, the content of the tags can be changed in order to provide wrong information. The NFC Forum has addressed this issue by introducing digital signatures on the NFC tags. In this work we have used a state-of-the-art smartphone with NFC functionality and Android operating system in order to point out different security vulnerabilities which rise even with signed tags. Using a self-developed Android application that handles the digital signatures on NFC tags, we could show these security vulnerabilities in real-world examples. Our achieved results show that the integration of a digital signature on NFC tags is not enough to provide integrity and authenticity of the data. Also the handling of data has to be done with great care. Suggestions for creating signed tags in a secure way are also given in the result section.","PeriodicalId":232862,"journal":{"name":"2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131576628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RFID as universal entry point to linked data clouds","authors":"Jens Ziegler, Markus Graube, L. Urbas","doi":"10.1109/RFID-TA.2012.6404530","DOIUrl":"https://doi.org/10.1109/RFID-TA.2012.6404530","url":null,"abstract":"Semantic web technologies are a key enabler for future information systems. The concept of Linked Data allows flexible inter-organizational collaboration and dynamic data integration. It surpasses the limitations of prevalent relational databases and proprietary access technologies. RFID, on the other hand, has been successfully applied to integrate physical artifacts into complex information systems. It allows the identification of artifacts by a unique identifier leveraging concepts such as the Internet of Things. Using the existing RFID ecosystem as universal entry point to Linked Data clouds makes it possible to connect the semantic description of the real world with the physical artifacts within this world. This provides new ways of merging and exploring real and virtual content. This paper presents an approach for using RFID as universal entry point to Linked Data clouds for task-driven and context-aware mobile support systems.","PeriodicalId":232862,"journal":{"name":"2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130936015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. D'hoe, N. Stevens, Jean-Pierre Goemaere, L. D. Strycker, B. Nauwelaers
{"title":"Optimization of an RFID loop antenna with smart goal functions","authors":"K. D'hoe, N. Stevens, Jean-Pierre Goemaere, L. D. Strycker, B. Nauwelaers","doi":"10.1109/RFID-TA.2012.6404524","DOIUrl":"https://doi.org/10.1109/RFID-TA.2012.6404524","url":null,"abstract":"It is very challenging to create reliable RFID systems within the vicinity of metallic environments. Most solutions for this kind of applications are accommodated with a multi antenna setup of circular loop antennas. Within this paper we will present an optimized loop antenna which is placed in a metallic tunnel. The setup with a single loop antenna has a comparable reliability with a multi antenna setup. The presented loop antenna is the result of an automated antenna design tool which combines MATLAB® and CST EM Studio®. A genetic algorithm with smart defined RFID goal functions is implemented and forms the core of the automated antenna design tool. The paper shows some promising results for the optimized loop antenna within this typical application.","PeriodicalId":232862,"journal":{"name":"2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121714601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Jimenez-Irastorza, A. Beriain, J. F. Sevillano, I. Rebollo, R. Berenguer
{"title":"A 0.6V and 0.53µW nonius TDC for a passive UHF RFID pressure sensor tag","authors":"A. Jimenez-Irastorza, A. Beriain, J. F. Sevillano, I. Rebollo, R. Berenguer","doi":"10.1109/RFID-TA.2012.6404516","DOIUrl":"https://doi.org/10.1109/RFID-TA.2012.6404516","url":null,"abstract":"This work presents a full passive UHF RFID pressure sensor tag which uses a nonius based TDC capacitive sensor interface. The proposed converter has a fully digital output and allows reducing power consumption while maintaining the required resolution. The nonius based TDC has been designed using TSMC 90nm standard CMOS technology. Post-layout simulations show that the converter presents a 12 bit resolution and 9 effective bits in the time range from 10μs to 40μs when VDD varies in the range from 0.55V to 0.7V and temperature variations in the range from 0°C to 60°C are considered. The maximum measurement time is 49.9μs and the average power consumption of the converter is 0.53μW at 10 samples per second from a 0.6V voltage supply.","PeriodicalId":232862,"journal":{"name":"2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115777986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Chipless RFID multiresonators fabricated by Fill until Full (FuF) technique","authors":"S. Pranonsatit, Pimsiriporn Narkcharoen","doi":"10.1109/RFID-TA.2012.6404552","DOIUrl":"https://doi.org/10.1109/RFID-TA.2012.6404552","url":null,"abstract":"For simple and low cost manufacturing process of electronic circuits and components, Fill until Full (FuF) technique was introduced. The application of FuF is demonstrated through the fabrication of 3-bit multiresonators for chipless RFID transponders. Spiral resonators were located along microstrip on Teflon substrates. Silver conductive ink was employed. Each resonator operates as a stop-band filter at a designed frequency. The designed frequencies are 1.94, 2.58 and 2.49 GHz, for bit 2, 1 and 0, respectively. Measured values of |S21|2 within ±100 MHz frequency band show that the threshold for logic `0' and `1' are -2.77 dB and -0.92 dB, resulting in 1.85 dB margin for distinguishing the different logic data. In conclusions, FuF is verified to be suitable for the application. The proposed technique and the fabricated multiresonator components are capable of contributing further expansion in chipless RFID technology.","PeriodicalId":232862,"journal":{"name":"2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125987155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"High gain design of small axial mode helical antenna over a cylindrical cavity for RFID applications","authors":"N. Rimbault, A. Sharaiha, S. Collardey","doi":"10.1109/RFID-TA.2012.6404562","DOIUrl":"https://doi.org/10.1109/RFID-TA.2012.6404562","url":null,"abstract":"Increasing the range of Radio Frequency Identification (RFID) system without parasitic tag reading is a challenging problem. A small helix antenna with high gain for RFID reader covering UHF band of 860MHz-960MHz is presented in this article. We show that using a cylindrical shaped ground plane can increase the gain of helix antennas in several UHF RFID frequency bands. The cylindrical ground plane geometry has been simulated and optimized with HFSS software. The optimal structure has a total size of 680×680×300mm3 and exhibits a constant realized gain around 13.8dBic over a large bandwidth with a good axial ratio (less than 2dB).","PeriodicalId":232862,"journal":{"name":"2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116915589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aikaterini Mitrokotsa, Cristina Onete, S. Vaudenay
{"title":"Mafia fraud attack against the RČ Distance-Bounding Protocol","authors":"Aikaterini Mitrokotsa, Cristina Onete, S. Vaudenay","doi":"10.1109/RFID-TA.2012.6404571","DOIUrl":"https://doi.org/10.1109/RFID-TA.2012.6404571","url":null,"abstract":"At ACM CCS 2008, Rasmussen and Čapkun introduced a distance-bounding protocol [22] (henceforth RČ protocol) where the prover and verifier use simultaneous transmissions and the verifier counts the delay between sending a challenge (starting with a hidden marker) and receiving the response. Thus, the verifier is able to compute an upper bound on the distance separating it and the prover. Distance bounding protocols should resist to the most classical types of attacks such as distance fraud and mafia fraud. In mafia fraud, a man-in-the-middle adversary attempts to prove to a legitimate verifier that the prover is in the verifier's proximity, even though the prover is in reality far away and does not wish to run the protocol. The RČ protocol was only claiming to resist distance fraud attacks. In this paper, we show a concrete mafia fraud attack against the RČ protocol, which relies on replaying the prover nonce which was used in a previous session between a legitimate prover and the verifier. This attack has a large probability of success. We propose a new protocol called LPDB that is not vulnerable to the presented attack. It offers state-of-the-art security in addition to the notion of location privacy achieved by the RČ protocol.","PeriodicalId":232862,"journal":{"name":"2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116975379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}