{"title":"A comparative study of direct and indirect static peering for inter-domain sip calls","authors":"A. A. Khudher, Leau Yu Beng, S. Ramadass","doi":"10.1109/RFID-TA.2013.6694541","DOIUrl":"https://doi.org/10.1109/RFID-TA.2013.6694541","url":null,"abstract":"Voice over IP (VoIP) has a promise future in communication era. VoIP services can be delivered through different means of protocols. Session Initiation Protocol (SIP) is a common protocol used to initiate, modify and terminate voice call between two parties. One SIP service provider can peer with others through what it called SIP peering. The main aim of SIP peering is not only bring all together but also share other services such as free of charge calls. Technically, SIP peering might be achieved through different scenarios such as Static Direct Peering, Static Indirect Peering or On-demand Peering. Each of such constructs from several functions and relationships which however characterize the peering addressing and routing. In this paper we made a comparative study of Direct and Indirect Static Peering and we found that Indirect Peering is more involved in VoIP industry as it known for its simplicity, efficiency, trusted party and high opportunity of having free voice calls.","PeriodicalId":253369,"journal":{"name":"2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","volume":"261 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124265502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Concepts and types of peer-to-peer network topology for live video streaming","authors":"Ammar Waysi AlTuhafi, S. Ramadass, Yung-Wey Chong","doi":"10.1109/RFID-TA.2013.6694540","DOIUrl":"https://doi.org/10.1109/RFID-TA.2013.6694540","url":null,"abstract":"Peer-to-peer (P2P) systems have been widely used in today's network. The limitation of server-client systems in number of clients that can be served leads to invent p2p systems enable sharing of contents with individual nodes in the network. In p2p systems tasks such as video streaming are shared among individual nodes directly to other nodes in the network; which leads to substantial impact in terms of performance. This paper discusses the concepts and types of P2P topology used in video streaming and explaining distributing hash table (DHT) and its functions which is the main difference of structured topology comparing to unstructured topology. These types of topologies have been discussed, including their strengths and weaknesses.","PeriodicalId":253369,"journal":{"name":"2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129107886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attack and defense mechanisms of malicious EPC event injection in EPC discovery service","authors":"Su Mon Kywe, Yingjiu Li, Jie Shi","doi":"10.1109/RFID-TA.2013.6694532","DOIUrl":"https://doi.org/10.1109/RFID-TA.2013.6694532","url":null,"abstract":"A supply chain usually involves collaboration among multi-national companies and it is well-known that information sharing is a critical success factor in supply chain management. Electronic Product Code Discovery Service (EPCDS) is a newly proposed concept which allows supply chain companies to search for their unknown partners globally and share information efficiently. As EPCDS contains critical business information about partnership relationship and product movement, access control systems are integrated into EPCDS for privacy protection. Although currently proposed access control systems include authentication and authorization of supply chain companies, they do not consider authentication of business information published by the companies. This vulnerability enables malicious EPC event injection attack, where forged business information are registered to EPCDS by malicious parties. With such exploitation, adversaries can impersonate as legitimate supply chain partners, bypass the access control systems of EPCDS and get access to previously unauthorized information. To the best of our knowledge, our paper is the first to discover the possibility of such attack in EPCDS. Our paper discusses threat model and different types of adversaries for the attack. We then present general defense mechanisms and define the security requirements of preventive measures. We also propose a new prevention mechanism, where pseudo-random numbers are generated by EPC tags and serves as authentication tokens for registering EPC events. Moreover, our paper analyzes how existing solutions, such as tailing, can be modified to detect malicious EPC event injection in EPCDS.","PeriodicalId":253369,"journal":{"name":"2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","volume":"03 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130235300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Geographic routing protocol issues in vehicular ad hoc networks","authors":"Sabri M. Hanshi, Mohammad M. Kadhum","doi":"10.1109/RFID-TA.2013.6694538","DOIUrl":"https://doi.org/10.1109/RFID-TA.2013.6694538","url":null,"abstract":"Due to high mobility and nature of vehicular adhoc environment, routing decisions in such a network are becoming a hard task. Therefore, the routing protocol must be robust to frequent link disruptions and aware of the environment surrounding the network. It is noticeable that routing-based position protocols are more appropriate for high dynamic and fast topology change networks. Many routing protocols have been proposed to enhance the delivery of data packets in a vehicular network. The goal of this paper is to review the current position-based routing protocols, in order to get more insight on the capability of these routing protocols in handling different challenges of vehicular ad-hoc networks.","PeriodicalId":253369,"journal":{"name":"2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128114389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An RFID authentication protocol with flexible path authentication","authors":"D. Moriyama","doi":"10.1109/RFID-TA.2013.6694516","DOIUrl":"https://doi.org/10.1109/RFID-TA.2013.6694516","url":null,"abstract":"RFID technology enables us to identify many products with wireless communication. When RFID tags are attached to the various products for management, authorization to interact with the tag is changed in the life-cycle. In this paper, we propose the first RFID authentication protocol with flexible path authentication which the RFID reader and tag authenticate each other and the path can be verified by the current owner. We introduce a new security model for these protocols to prevent impersonation attacks and ensure the tag's privacy.","PeriodicalId":253369,"journal":{"name":"2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116195272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ching-Yen Chung, A. Shepelev, Charlie Qiu, C. Chu, R. Gadh
{"title":"Design of RFID mesh network for Electric Vehicle smart charging infrastructure","authors":"Ching-Yen Chung, A. Shepelev, Charlie Qiu, C. Chu, R. Gadh","doi":"10.1109/RFID-TA.2013.6694512","DOIUrl":"https://doi.org/10.1109/RFID-TA.2013.6694512","url":null,"abstract":"With an increased number of Electric Vehicles (EVs) on the roads, charging infrastructure is gaining an ever-more important role in simultaneously meeting the needs of the local distribution grid and of EV users. This paper proposes a mesh network RFID system for user identification and charging authorization as part of a smart charging infrastructure providing charge monitoring and control. The Zigbee-based mesh network RFID provides a cost-efficient solution to identify and authorize vehicles for charging and would allow EV charging to be conducted effectively while observing grid constraints and meeting the needs of EV drivers.","PeriodicalId":253369,"journal":{"name":"2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116546102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A planar wideband inductively coupled feed patch antenna for UHF RFID tag","authors":"M. Bashri, M. Ibrahimy, S. Motakabber","doi":"10.1109/RFID-TA.2013.6694504","DOIUrl":"https://doi.org/10.1109/RFID-TA.2013.6694504","url":null,"abstract":"A planar wideband patch antenna for ultra-high frequency (UHF) radio frequency identification (RFID) tag for metallic applications is presented in this research work. Three different shape patches are inductively coupled to a triangle loop to excite three resonances close to each other to form wide impedance bandwidth for universal application UHF (860-960 MHz) RFID. The structure of the proposed antenna exhibits planar profile to provide ease of fabrication for cost reduction well suited for mass production. The simulation of the antenna was carried out using Finite Element Method (FEM) based software, Ansoft HFSS v13. The performance of the design was verified by the simulation and measurement results which show good agreement. The simulated and measured impedance bandwidth of 113 MHz and 117 MHz (return loss ≥ 6 dB) was achieved to cover the entire UHF RFID operating frequency band worldwide.","PeriodicalId":253369,"journal":{"name":"2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126179753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Environmental determinants of RFID adoption in retail supply chain, a binary logistic regression analysis","authors":"Soleyman Paydar, I. R. Endut, A. Lajevardi","doi":"10.1109/RFID-TA.2013.6694547","DOIUrl":"https://doi.org/10.1109/RFID-TA.2013.6694547","url":null,"abstract":"Radio frequency identification (RFID) is an automatic identification and real-time data capture technology which allows for greater inventory visibility and better control of supply chain. Nevertheless, most of the RFID studies only discussed the applications or challenges of RFID technology; while rare attentions have been paid on empirically studying factors affecting the adoption of RFID in the retail chains. Drawing both on the diffusion of innovation (DOI) theory and RFID technology, this paper assesses the influence of a set of environmental determinants on the intention to adopt RFID technology. Retail chains in Malaysia were chosen for an empirical survey; 77 valid data sets were obtained and SPSS software was used to analyze the research model. Research findings reveal that social uncertainty and competitive pressure are significantly associated with the adoption of RFID. Empirical result could provide as reference for government, RFID's system developer and retail companies in n advancing the RFID adoption.","PeriodicalId":253369,"journal":{"name":"2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131280741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Sirajo Aliyu, Hassan Chizari, A. Abdullah
{"title":"Integrated sensor and RFID network node placement in disaster monitoring applications","authors":"Muhammad Sirajo Aliyu, Hassan Chizari, A. Abdullah","doi":"10.1109/RFID-TA.2013.6694534","DOIUrl":"https://doi.org/10.1109/RFID-TA.2013.6694534","url":null,"abstract":"Sensors are becoming more popular in many applications with the mission of sending and receiving information from the monitoring environment. However coverage and prolonging the network lifetime are challenging issues in disaster monitoring application. In this paper Sensors and RFID's are integrated together not only to reduce the cost of deployment but also to reduce the energy consumption and increase the coverage of the monitoring region, four different scenarios are been used and a flooding algorithm was developed to ensure an efficient message broadcast all over the network in order to reduce energy consumption in the network and to have full coverage of the monitoring region.","PeriodicalId":253369,"journal":{"name":"2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133853769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Motion sensitive RFID in wireless sensor network platform","authors":"Farah Hazwani Mohd Zanal, W. Ismail","doi":"10.1109/RFID-TA.2013.6694533","DOIUrl":"https://doi.org/10.1109/RFID-TA.2013.6694533","url":null,"abstract":"This paper explains the development of integrating sensor with Radio Frequency Identification (RFID) perform it in Wireless Sensor Network (WSN). Normally RFID is to detect the presence of the object but by integrating it with WSN, RFID can provide the information to the reader via multi-hop network. The information consists of the current condition of the object as well as the identification of the tag. The proposed system also analyzed on the detection range with and without multi-hop, the anti-collision capability, self-healing and latency of the system.","PeriodicalId":253369,"journal":{"name":"2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114315725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}