2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)最新文献

筛选
英文 中文
A comparative study of direct and indirect static peering for inter-domain sip calls 域间sip呼叫的直接和间接静态对等比较研究
2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA) Pub Date : 2013-09-01 DOI: 10.1109/RFID-TA.2013.6694541
A. A. Khudher, Leau Yu Beng, S. Ramadass
{"title":"A comparative study of direct and indirect static peering for inter-domain sip calls","authors":"A. A. Khudher, Leau Yu Beng, S. Ramadass","doi":"10.1109/RFID-TA.2013.6694541","DOIUrl":"https://doi.org/10.1109/RFID-TA.2013.6694541","url":null,"abstract":"Voice over IP (VoIP) has a promise future in communication era. VoIP services can be delivered through different means of protocols. Session Initiation Protocol (SIP) is a common protocol used to initiate, modify and terminate voice call between two parties. One SIP service provider can peer with others through what it called SIP peering. The main aim of SIP peering is not only bring all together but also share other services such as free of charge calls. Technically, SIP peering might be achieved through different scenarios such as Static Direct Peering, Static Indirect Peering or On-demand Peering. Each of such constructs from several functions and relationships which however characterize the peering addressing and routing. In this paper we made a comparative study of Direct and Indirect Static Peering and we found that Indirect Peering is more involved in VoIP industry as it known for its simplicity, efficiency, trusted party and high opportunity of having free voice calls.","PeriodicalId":253369,"journal":{"name":"2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","volume":"261 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124265502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Concepts and types of peer-to-peer network topology for live video streaming 实时视频流的点对点网络拓扑的概念和类型
2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA) Pub Date : 2013-09-01 DOI: 10.1109/RFID-TA.2013.6694540
Ammar Waysi AlTuhafi, S. Ramadass, Yung-Wey Chong
{"title":"Concepts and types of peer-to-peer network topology for live video streaming","authors":"Ammar Waysi AlTuhafi, S. Ramadass, Yung-Wey Chong","doi":"10.1109/RFID-TA.2013.6694540","DOIUrl":"https://doi.org/10.1109/RFID-TA.2013.6694540","url":null,"abstract":"Peer-to-peer (P2P) systems have been widely used in today's network. The limitation of server-client systems in number of clients that can be served leads to invent p2p systems enable sharing of contents with individual nodes in the network. In p2p systems tasks such as video streaming are shared among individual nodes directly to other nodes in the network; which leads to substantial impact in terms of performance. This paper discusses the concepts and types of P2P topology used in video streaming and explaining distributing hash table (DHT) and its functions which is the main difference of structured topology comparing to unstructured topology. These types of topologies have been discussed, including their strengths and weaknesses.","PeriodicalId":253369,"journal":{"name":"2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129107886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Attack and defense mechanisms of malicious EPC event injection in EPC discovery service EPC发现服务中恶意EPC事件注入的攻防机制
2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA) Pub Date : 2013-09-01 DOI: 10.1109/RFID-TA.2013.6694532
Su Mon Kywe, Yingjiu Li, Jie Shi
{"title":"Attack and defense mechanisms of malicious EPC event injection in EPC discovery service","authors":"Su Mon Kywe, Yingjiu Li, Jie Shi","doi":"10.1109/RFID-TA.2013.6694532","DOIUrl":"https://doi.org/10.1109/RFID-TA.2013.6694532","url":null,"abstract":"A supply chain usually involves collaboration among multi-national companies and it is well-known that information sharing is a critical success factor in supply chain management. Electronic Product Code Discovery Service (EPCDS) is a newly proposed concept which allows supply chain companies to search for their unknown partners globally and share information efficiently. As EPCDS contains critical business information about partnership relationship and product movement, access control systems are integrated into EPCDS for privacy protection. Although currently proposed access control systems include authentication and authorization of supply chain companies, they do not consider authentication of business information published by the companies. This vulnerability enables malicious EPC event injection attack, where forged business information are registered to EPCDS by malicious parties. With such exploitation, adversaries can impersonate as legitimate supply chain partners, bypass the access control systems of EPCDS and get access to previously unauthorized information. To the best of our knowledge, our paper is the first to discover the possibility of such attack in EPCDS. Our paper discusses threat model and different types of adversaries for the attack. We then present general defense mechanisms and define the security requirements of preventive measures. We also propose a new prevention mechanism, where pseudo-random numbers are generated by EPC tags and serves as authentication tokens for registering EPC events. Moreover, our paper analyzes how existing solutions, such as tailing, can be modified to detect malicious EPC event injection in EPCDS.","PeriodicalId":253369,"journal":{"name":"2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","volume":"03 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130235300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Geographic routing protocol issues in vehicular ad hoc networks 车载自组织网络中的地理路由协议问题
2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA) Pub Date : 2013-09-01 DOI: 10.1109/RFID-TA.2013.6694538
Sabri M. Hanshi, Mohammad M. Kadhum
{"title":"Geographic routing protocol issues in vehicular ad hoc networks","authors":"Sabri M. Hanshi, Mohammad M. Kadhum","doi":"10.1109/RFID-TA.2013.6694538","DOIUrl":"https://doi.org/10.1109/RFID-TA.2013.6694538","url":null,"abstract":"Due to high mobility and nature of vehicular adhoc environment, routing decisions in such a network are becoming a hard task. Therefore, the routing protocol must be robust to frequent link disruptions and aware of the environment surrounding the network. It is noticeable that routing-based position protocols are more appropriate for high dynamic and fast topology change networks. Many routing protocols have been proposed to enhance the delivery of data packets in a vehicular network. The goal of this paper is to review the current position-based routing protocols, in order to get more insight on the capability of these routing protocols in handling different challenges of vehicular ad-hoc networks.","PeriodicalId":253369,"journal":{"name":"2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128114389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An RFID authentication protocol with flexible path authentication 具有柔性路径认证的RFID认证协议
2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA) Pub Date : 2013-09-01 DOI: 10.1109/RFID-TA.2013.6694516
D. Moriyama
{"title":"An RFID authentication protocol with flexible path authentication","authors":"D. Moriyama","doi":"10.1109/RFID-TA.2013.6694516","DOIUrl":"https://doi.org/10.1109/RFID-TA.2013.6694516","url":null,"abstract":"RFID technology enables us to identify many products with wireless communication. When RFID tags are attached to the various products for management, authorization to interact with the tag is changed in the life-cycle. In this paper, we propose the first RFID authentication protocol with flexible path authentication which the RFID reader and tag authenticate each other and the path can be verified by the current owner. We introduce a new security model for these protocols to prevent impersonation attacks and ensure the tag's privacy.","PeriodicalId":253369,"journal":{"name":"2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116195272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of RFID mesh network for Electric Vehicle smart charging infrastructure 面向电动汽车智能充电基础设施的RFID网状网络设计
2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA) Pub Date : 2013-09-01 DOI: 10.1109/RFID-TA.2013.6694512
Ching-Yen Chung, A. Shepelev, Charlie Qiu, C. Chu, R. Gadh
{"title":"Design of RFID mesh network for Electric Vehicle smart charging infrastructure","authors":"Ching-Yen Chung, A. Shepelev, Charlie Qiu, C. Chu, R. Gadh","doi":"10.1109/RFID-TA.2013.6694512","DOIUrl":"https://doi.org/10.1109/RFID-TA.2013.6694512","url":null,"abstract":"With an increased number of Electric Vehicles (EVs) on the roads, charging infrastructure is gaining an ever-more important role in simultaneously meeting the needs of the local distribution grid and of EV users. This paper proposes a mesh network RFID system for user identification and charging authorization as part of a smart charging infrastructure providing charge monitoring and control. The Zigbee-based mesh network RFID provides a cost-efficient solution to identify and authorize vehicles for charging and would allow EV charging to be conducted effectively while observing grid constraints and meeting the needs of EV drivers.","PeriodicalId":253369,"journal":{"name":"2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116546102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A planar wideband inductively coupled feed patch antenna for UHF RFID tag 一种用于超高频RFID标签的平面宽带电感耦合馈电贴片天线
2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA) Pub Date : 2013-09-01 DOI: 10.1109/RFID-TA.2013.6694504
M. Bashri, M. Ibrahimy, S. Motakabber
{"title":"A planar wideband inductively coupled feed patch antenna for UHF RFID tag","authors":"M. Bashri, M. Ibrahimy, S. Motakabber","doi":"10.1109/RFID-TA.2013.6694504","DOIUrl":"https://doi.org/10.1109/RFID-TA.2013.6694504","url":null,"abstract":"A planar wideband patch antenna for ultra-high frequency (UHF) radio frequency identification (RFID) tag for metallic applications is presented in this research work. Three different shape patches are inductively coupled to a triangle loop to excite three resonances close to each other to form wide impedance bandwidth for universal application UHF (860-960 MHz) RFID. The structure of the proposed antenna exhibits planar profile to provide ease of fabrication for cost reduction well suited for mass production. The simulation of the antenna was carried out using Finite Element Method (FEM) based software, Ansoft HFSS v13. The performance of the design was verified by the simulation and measurement results which show good agreement. The simulated and measured impedance bandwidth of 113 MHz and 117 MHz (return loss ≥ 6 dB) was achieved to cover the entire UHF RFID operating frequency band worldwide.","PeriodicalId":253369,"journal":{"name":"2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126179753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Environmental determinants of RFID adoption in retail supply chain, a binary logistic regression analysis 零售供应链中RFID采用的环境决定因素,二元逻辑回归分析
2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA) Pub Date : 2013-09-01 DOI: 10.1109/RFID-TA.2013.6694547
Soleyman Paydar, I. R. Endut, A. Lajevardi
{"title":"Environmental determinants of RFID adoption in retail supply chain, a binary logistic regression analysis","authors":"Soleyman Paydar, I. R. Endut, A. Lajevardi","doi":"10.1109/RFID-TA.2013.6694547","DOIUrl":"https://doi.org/10.1109/RFID-TA.2013.6694547","url":null,"abstract":"Radio frequency identification (RFID) is an automatic identification and real-time data capture technology which allows for greater inventory visibility and better control of supply chain. Nevertheless, most of the RFID studies only discussed the applications or challenges of RFID technology; while rare attentions have been paid on empirically studying factors affecting the adoption of RFID in the retail chains. Drawing both on the diffusion of innovation (DOI) theory and RFID technology, this paper assesses the influence of a set of environmental determinants on the intention to adopt RFID technology. Retail chains in Malaysia were chosen for an empirical survey; 77 valid data sets were obtained and SPSS software was used to analyze the research model. Research findings reveal that social uncertainty and competitive pressure are significantly associated with the adoption of RFID. Empirical result could provide as reference for government, RFID's system developer and retail companies in n advancing the RFID adoption.","PeriodicalId":253369,"journal":{"name":"2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131280741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Integrated sensor and RFID network node placement in disaster monitoring applications 集成传感器和RFID网络节点放置在灾害监测应用中
2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA) Pub Date : 2013-09-01 DOI: 10.1109/RFID-TA.2013.6694534
Muhammad Sirajo Aliyu, Hassan Chizari, A. Abdullah
{"title":"Integrated sensor and RFID network node placement in disaster monitoring applications","authors":"Muhammad Sirajo Aliyu, Hassan Chizari, A. Abdullah","doi":"10.1109/RFID-TA.2013.6694534","DOIUrl":"https://doi.org/10.1109/RFID-TA.2013.6694534","url":null,"abstract":"Sensors are becoming more popular in many applications with the mission of sending and receiving information from the monitoring environment. However coverage and prolonging the network lifetime are challenging issues in disaster monitoring application. In this paper Sensors and RFID's are integrated together not only to reduce the cost of deployment but also to reduce the energy consumption and increase the coverage of the monitoring region, four different scenarios are been used and a flooding algorithm was developed to ensure an efficient message broadcast all over the network in order to reduce energy consumption in the network and to have full coverage of the monitoring region.","PeriodicalId":253369,"journal":{"name":"2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133853769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Motion sensitive RFID in wireless sensor network platform 运动敏感RFID无线传感网络平台
2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA) Pub Date : 2013-09-01 DOI: 10.1109/RFID-TA.2013.6694533
Farah Hazwani Mohd Zanal, W. Ismail
{"title":"Motion sensitive RFID in wireless sensor network platform","authors":"Farah Hazwani Mohd Zanal, W. Ismail","doi":"10.1109/RFID-TA.2013.6694533","DOIUrl":"https://doi.org/10.1109/RFID-TA.2013.6694533","url":null,"abstract":"This paper explains the development of integrating sensor with Radio Frequency Identification (RFID) perform it in Wireless Sensor Network (WSN). Normally RFID is to detect the presence of the object but by integrating it with WSN, RFID can provide the information to the reader via multi-hop network. The information consists of the current condition of the object as well as the identification of the tag. The proposed system also analyzed on the detection range with and without multi-hop, the anti-collision capability, self-healing and latency of the system.","PeriodicalId":253369,"journal":{"name":"2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114315725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信