期刊文献+
共找到72篇文章
< 1 2 4 >
每页显示 20 50 100
Application of Radio Frequency Identification (RFID) in Dairy Information Management 被引量:3
1
作者 Wu Hong-da 《Journal of Northeast Agricultural University(English Edition)》 CAS 2012年第1期78-81,共4页
As a kind of brand-new technology, radio frequency identification management, data control and acquisition. This paper introduced food safety system construction, analyzed the advantages and problems in dairy modem su... As a kind of brand-new technology, radio frequency identification management, data control and acquisition. This paper introduced food safety system construction, analyzed the advantages and problems in dairy modem suggestions for solution according to the practical situation. (RFID) plays an important role in dairy information tracing and culture function extension of managing breeding technology, and finally put forward some 展开更多
关键词 radio frequency identification rfid electronic identification tag CONTROL TRACING
在线阅读 下载PDF
Capture-aware Bayesian RFID Tag Estimate for Large-scale Identification 被引量:2
2
作者 Haifeng Wu Yang Wang Yu Zeng 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2018年第1期119-127,共9页
Dynamic framed slotted Aloha algorithm is one of popular passive radio frequency identification(RFID) tag anticollision algorithms. In the algorithm, a frame length requires dynamical adjustment to achieve higher iden... Dynamic framed slotted Aloha algorithm is one of popular passive radio frequency identification(RFID) tag anticollision algorithms. In the algorithm, a frame length requires dynamical adjustment to achieve higher identification efficiency.Generally, the adjustment of the frame length is not only related to the number of tags, but also to the occurrence probability of capture effect. Existing algorithms could estimate both the number of tags and the probability of capture effect. Under large-scale RFID tag identification, however, the number of tags would be much larger than an initial frame length. In this scenario, the existing algorithm's estimation errors would substantially increase. In this paper, we propose a novel algorithm called capture-aware Bayesian estimate, which adopts Bayesian rules to accurately estimate the number and the probability simultaneously. From numerical results, the proposed algorithm adapts well to the large-scale RFID tag identification. It has lower estimation errors than the existing algorithms. Further,the identification efficiency from the proposed estimate is also higher than the existing algorithms. 展开更多
关键词 ALOHA BAYESIAN capture effect LARGE-SCALE radio frequency identification(rfid)
在线阅读 下载PDF
A framework for locating multiple RFID tags using RF hologram tensors
3
作者 Xiangyu Wang Jian Zhang +2 位作者 Shiwen Mao Senthilkumar CG Periaswamy Justin Patton 《Digital Communications and Networks》 2025年第2期337-348,共12页
In this paper,we present a Deep Neural Network(DNN)based framework that employs Radio Frequency(RF)hologram tensors to locate multiple Ultra-High Frequency(UHF)passive Radio-Frequency Identification(RFID)tags.The RF h... In this paper,we present a Deep Neural Network(DNN)based framework that employs Radio Frequency(RF)hologram tensors to locate multiple Ultra-High Frequency(UHF)passive Radio-Frequency Identification(RFID)tags.The RF hologram tensor exhibits a strong relationship between observation and spatial location,helping to improve the robustness to dynamic environments and equipment.Since RFID data is often marred by noise,we implement two types of deep neural network architectures to clean up the RF hologram tensor.Leveraging the spatial relationship between tags,the deep networks effectively mitigate fake peaks in the hologram tensors resulting from multipath propagation and phase wrapping.In contrast to fingerprinting-based localization systems that use deep networks as classifiers,our deep networks in the proposed framework treat the localization task as a regression problem preserving the ambiguity between fingerprints.We also present an intuitive peak finding algorithm to obtain estimated locations using the sanitized hologram tensors.The proposed framework is implemented using commodity RFID devices,and its superior performance is validated through extensive experiments. 展开更多
关键词 Radio-frequency identification(rfid) Ultra-high frequency(UHF)passive rfid tag RF hologram tensor Indoor localization Deep learning(DL) Swin Transformer Self-supervised learning
在线阅读 下载PDF
一种RFID标签授权访问和所有权转换协议 被引量:2
4
作者 贺蕾 甘勇 +1 位作者 尹毅峰 金松河 《合肥工业大学学报(自然科学版)》 CAS CSCD 北大核心 2014年第2期172-175,214,共5页
文章针对RFID系统中标签所有权转换过程中的安全问题,提出一种用于对标签进行授权访问和所有权转换的协议,采用GNY逻辑分析了该协议的安全性,比较了该协议的计算复杂度。分析结果表明:该协议具有良好的安全性,能够为通过认证的用户提供... 文章针对RFID系统中标签所有权转换过程中的安全问题,提出一种用于对标签进行授权访问和所有权转换的协议,采用GNY逻辑分析了该协议的安全性,比较了该协议的计算复杂度。分析结果表明:该协议具有良好的安全性,能够为通过认证的用户提供访问次数受限的授权,以及对标签的所有权进行转换;保护标签所有权转换过程中的前向安全和后向安全,能够抵御重放攻击、中间人攻击和去同步化攻击;与现有研究成果相比,该协议中标签的计算消耗较小,适用于低成本标签。 展开更多
关键词 无线射频识别 授权 所有权转换 协议 GNY逻辑 RADIO frequency identification(rfid)
在线阅读 下载PDF
面向RFID供应链应用系统的标签处理过程建模方法 被引量:4
5
作者 钟叶 武岳山 沈玉龙 《计算机应用研究》 CSCD 北大核心 2020年第S01期197-198,共2页
RFID技术无法适应不同RFID应用场景的处理过程需求,致使RFID供应链应用系统的可重用性差,造成许多重复的软件设计和开发过程。为此,通过分析RFID供应链应用系统的业务特点,提取业务驱动力,构建应用场景模型,抽象供应链的业务工单,设计... RFID技术无法适应不同RFID应用场景的处理过程需求,致使RFID供应链应用系统的可重用性差,造成许多重复的软件设计和开发过程。为此,通过分析RFID供应链应用系统的业务特点,提取业务驱动力,构建应用场景模型,抽象供应链的业务工单,设计业务处理过程以及RFID标签处理过程中的状态修正逻辑,规范面向RFID供应链应用系统的标签处理过程建模方法。以新零售服饰领域为例,运用该建模方法,开发RFID零售服饰供应链应用系统,实例证明该系统能够很好地适应不同RFID零售应用场景的多种处理过程需求。 展开更多
关键词 rfid(radio frequency identification) rfid供应链应用系统 rfid标签处理过程
在线阅读 下载PDF
基于RFID安全技术的智能加工车间系统设计 被引量:8
6
作者 田梦凡 齐俊鹏 马锐 《计算机应用研究》 CSCD 北大核心 2020年第S01期207-210,共4页
随着物联网的不断发展,智能制造逐渐进入到应用与实施阶段。针对航天某车间面临的信息安全以及管理问题,提出基于无线射频识别技术(RFID)的智能手工生产车间系统设计方法。该系统主要由出入库生产工位模块以及管理模块构成。与后台数据... 随着物联网的不断发展,智能制造逐渐进入到应用与实施阶段。针对航天某车间面临的信息安全以及管理问题,提出基于无线射频识别技术(RFID)的智能手工生产车间系统设计方法。该系统主要由出入库生产工位模块以及管理模块构成。与后台数据库相结合,可以实现生产零件状态的实施监控。为了保证信息传输的安全性,使用SM7算法对数据进行加密,并使用交互式信息认证方案。为提高标签识别效率,提出一种动态帧时隙的防碰撞方法,以提高整个系统的运行效率。通过该系统达到了手工生产车间零件从生产、入库开始的精准定位,规范了车间管理,为后续智能制造大范围推广提供了新的思路。 展开更多
关键词 rfid(radio frequency identification)技术 物联网 信息安全 智能制造 SM7算法
在线阅读 下载PDF
Improved adaptive genetic algorithm based RFID positioning 被引量:10
7
作者 LI Yu WU Honglan SUN Youchao 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2022年第2期305-311,共7页
The existing active tag-based radio frequency identi-fication(RFID)localization techniques show low accuracy in practical applications.To address such problems,we propose a chaotic adaptive genetic algorithm to align ... The existing active tag-based radio frequency identi-fication(RFID)localization techniques show low accuracy in practical applications.To address such problems,we propose a chaotic adaptive genetic algorithm to align the passive tag ar-rays.We use chaotic sequences to generate the intersection points,the weakest single point intersection is used to ensure the convergence accuracy of the algorithm while avoiding the optimization jitter problem.Meanwhile,to avoid the problem of slow convergence and immature convergence of the algorithm caused by the weakening of individual competition at a later stage,we use adaptive rate of change to improve the optimiza-tion efficiency.In addition,to remove signal noise and outliers,we preprocess the data using Gaussian filtering.Experimental results demonstrate that the proposed algorithm achieves high-er localization accuracy and improves the convergence speed. 展开更多
关键词 radio frequency identification(rfid)positioning im-proved genetic algorithm Gaussian filter passive tags
在线阅读 下载PDF
ZigID:Improving visibility in industrial environments by combining WSN and RFID 被引量:5
8
作者 Pablo GARCíA ANSOLA Andrés GARCíA +2 位作者 Javier de las MORENAS Javier GARCíA ESCRIBANO Francisco Javier OTAMENDI 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2011年第11期849-859,共11页
The objective of this work is to provide decision-making processes with an updated/real picture of the mobile resources in industrial environments through a constant feedback of information.The combination of identifi... The objective of this work is to provide decision-making processes with an updated/real picture of the mobile resources in industrial environments through a constant feedback of information.The combination of identification technologies and wireless sensor networks(WSN) is proposed as a key development to guarantee an accurate and timely supply of online information regarding the localization and tracking of the mobile wireless devices.This approach uses a cooperative and distributed localization system,called ZigID,which is a WSN based on a Zigbee network with radio frequency identification(RFID) active tags as end nodes.The WSN can recover not only the ID information stored at the tags attached to mobile resources,but also any other useful data captured by specific sensors for acceleration,temperature,humidity and fuel status.This paper also shows the development of ZigID,including devices and information flows,as well as its implementation in ground handling operations at the Ciudad Real Central Airport,Spain. 展开更多
关键词 Radio frequency identification(rfid) TRACKING Wireless sensor networks(WSNs)
原文传递
An analog front-end circuit for ISO/IEC 15693-compatible RFID transponder IC 被引量:4
9
作者 LIU Dong-sheng ZOU Xue-cheng +1 位作者 YANG Qiu-ping XIONG Ting-wen 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第10期1765-1771,共7页
The 13.56 MHz analog front-end circuit for ISO/IEC 15693-compatible radio frequency identification (RFID) trans- ponder IC presented in this paper converts RF power to DC and extracts clock and data from the interroga... The 13.56 MHz analog front-end circuit for ISO/IEC 15693-compatible radio frequency identification (RFID) trans- ponder IC presented in this paper converts RF power to DC and extracts clock and data from the interrogator by 10% or 100% ASK modulation. The transponder sends data back to the interrogator by load modulation technology. The electrostatic discharge (ESD) protection circuits function to limit RF voltage to a safe level. An inductive coupling simulation modelling for 13.56 MHz RFID system is presented, with simulation results showing that the transponder operates over a wide range of electromagnetic field strength from Hmin (150 mA/m) to Hmax (5 A/m). The transponder IC is implemented in SMIC 0.35-μm three-metal two-poly mixed signal CMOS technology with embedded EEPROM. 展开更多
关键词 Radio frequency identification rfid ISO/IEC 15693 Transponder IC Analog front-end
在线阅读 下载PDF
Localization of pallets in warehouses using passive RFID system 被引量:2
10
作者 周俊儒 张宏建 周洪亮 《Journal of Central South University》 SCIE EI CAS CSCD 2015年第8期3017-3025,共9页
Warehouse operation has become a critical activity in supply chain. Position information of pallets is important in warehouse management which can enhance the efficiency of pallets picking and sortation. Radio frequen... Warehouse operation has become a critical activity in supply chain. Position information of pallets is important in warehouse management which can enhance the efficiency of pallets picking and sortation. Radio frequency identification(RFID) has been widely used in warehouse for item identifying. Meanwhile, RFID technology also has great potential for pallets localization which is underutilized in warehouse management. RFID-based checking-in and inventory systems have been applied in warehouse management by many enterprises. Localization approach is studied, which is compatible with existing RFID checking-in and inventory systems. A novel RFID localization approach is proposed for pallets checking-in. Phase variation of nearby tags was utilized to estimate the position of added pallets. A novel inventory localization approach combing angle of arrival(AOA) measurement and received signal strength(RSS) is also proposed for pallets inventory. Experiments were carried out using standard UHF passive RFID system. Experimental results show an acceptable localization accuracy which can satisfy the requirement of warehouse management. 展开更多
关键词 warehouse management radio frequency identification rfid LOCALIZATION tag phase
在线阅读 下载PDF
ATTACKS AND IMPROVEMENTS ON THE RFID AUTHENTICATION PROTOCOLS BASED ON MATRIX 被引量:3
11
作者 Wang Shaohui Liu Sujuan 《Journal of Electronics(China)》 2013年第1期33-39,共7页
Most of the Radio Frequency IDentification (RFID) authentication protocols, proposed to preserve security and privacy, are analysed to show that they can not provide security against some passive or active attacks. In... Most of the Radio Frequency IDentification (RFID) authentication protocols, proposed to preserve security and privacy, are analysed to show that they can not provide security against some passive or active attacks. In this paper, the security of two matrix-based protocols, proposed by Karthikeyan and Nesterenko (KN protocol) and Ramachandra et al. (RRS protocol) that conform to Electronic Product Code Class-1 Generation-2 (EPC Class-1 Gen-2) standard, are investigated. Using the linear relationship of multiplication of matrix and vector, we point out that both protocols can not provide scalability, and they are vulnerable to passive impersonation attack. In addition, both protocols are totally insecure if the adversary can compromise one tag to extract the secrets. A modified lightweight matrix-based authentication protocol is presented, which can resist mainly common attacks on an RFID authentication system including eavesdropping, relay attack, desynchronization attack, impersonation attack and tag tracking attack. The new protocol also has the desirable scalability property and can keep secure under compromising attack. 展开更多
关键词 Radio Frequency identification rfid Mutual authentication Matrix-based Imper-sonation attack PRIVACY SCALABILITY
在线阅读 下载PDF
Recovery of Collided RFID Tags With Frequency Drift on Physical Layer 被引量:3
12
作者 Junzhi Li Haifeng Wu Yu Zeng 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2020年第6期1593-1603,共11页
In a passive ultra-high frequency(UHF)radio frequency identification(RFID)system,the recovery of collided tag signals on a physical layer can enhance identification efficiency.However,frequency drift is very common in... In a passive ultra-high frequency(UHF)radio frequency identification(RFID)system,the recovery of collided tag signals on a physical layer can enhance identification efficiency.However,frequency drift is very common in UHF RFID systems,and will have an influence on the recovery on the physical layer.To address the problem of recovery with the frequency drift,this paper adopts a radial basis function(RBF)network to separate the collision signals,and decode the signals via FM0 to recovery collided RFID tags.Numerical results show that the method in this paper has better performance of symbol error rate(SER)and separation efficiency compared to conventional methods when frequency drift occurs. 展开更多
关键词 Frequency drift radial basis function(RBF) radio frequency identification(rfid) separation efficiency tag collision
在线阅读 下载PDF
Analysis of dipole-like ultra high frequency RFID tags close to metallic surfaces 被引量:3
13
作者 Ling-fei MO Hong-jian ZHANG Hong-liang ZHOU 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2009年第8期1217-1222,共6页
It is a challenge for passive RFID tags to be mounted on the surface of metal because the parameters of tag antennas,such as the impedance matching,the radiation efficiency and the radiation pattern,are seriously affe... It is a challenge for passive RFID tags to be mounted on the surface of metal because the parameters of tag antennas,such as the impedance matching,the radiation efficiency and the radiation pattern,are seriously affected by the metallic surface.This paper presents the characteristics of the dipole-like antennas of ultra high frequency(UHF) radio frequency identification(RFID) tags that are placed close to metallic surfaces.The finite element method(FEM) and method of moment(MoM) were used to simulate the changes of the antenna parameters near the metallic surface.Two typical dipole-like antennas close to the metallic surface,a closed loop antenna and a loaded meander antenna,were modeled,and the performance was evaluated.Experiment was carried out and the results were in good agreement with the simulation,showing that a distance of 0.05λ~0.1λ(λ is the free space wavelength) from the metallic surface could make the dipole-like UHF RFID tag performance be acceptable. 展开更多
关键词 Radio frequency identification rfid TAG Metallic surface Finite element method (FEM) Method of moment (MoM)
原文传递
Bi-slotted Binary Tree Algorithm with Stack for Radio Frequency Identification Tag Anti-Collision 被引量:2
14
作者 田芸 陈恭亮 李建华 《Journal of Shanghai Jiaotong university(Science)》 EI 2013年第2期173-179,共7页
A radio frequency identification (RFID) reader will fail to identify tags if a collision occurs. This paper proposes a bi-slotted binary tree algorithm (BSBTA) with stack for RFID tag anti-collision to improve the per... A radio frequency identification (RFID) reader will fail to identify tags if a collision occurs. This paper proposes a bi-slotted binary tree algorithm (BSBTA) with stack for RFID tag anti-collision to improve the performance of binary tree algorithm (BTA). In BSBTA, the reader detects collisions by Manchester code and stores colliding prefixes in a stack. The query is composed of a two-bit prefix and an index value. Following every reader query, there are two timeslots for tags whose pointers and identities (IDs) match the query to respond, one for the tag whose next bit is 0 and the other for the tag with 1 as its next bit. Performance analysis and evaluation are also given. The time complexity and the communication complexity of BTA and BSBTA are derived. The simulation results compare the performance of BSBTA with several related anti-collision algorithms. It is shown that BSBTA outperforms BTA in terms of the average number of responded bits and timeslots for one tag identification. 展开更多
关键词 radio frequency identification (rfid) ANTI-COLLISION binary tree tag identification
原文传递
A Physical Layer Network Coding Based Tag Anti-Collision Algorithm for RFID System 被引量:3
15
作者 Cuixiang Wang Xing Shao +1 位作者 Yifan Meng Jun Gao 《Computers, Materials & Continua》 SCIE EI 2021年第1期931-945,共15页
In RFID(Radio Frequency IDentification)system,when multiple tags are in the operating range of one reader and send their information to the reader simultaneously,the signals of these tags are superimposed in the air,w... In RFID(Radio Frequency IDentification)system,when multiple tags are in the operating range of one reader and send their information to the reader simultaneously,the signals of these tags are superimposed in the air,which results in a collision and leads to the degrading of tags identifying efficiency.To improve the multiple tags’identifying efficiency due to collision,a physical layer network coding based binary search tree algorithm(PNBA)is proposed in this paper.PNBA pushes the conflicting signal information of multiple tags into a stack,which is discarded by the traditional anti-collision algorithm.In addition,physical layer network coding is exploited by PNBA to obtain unread tag information through the decoding operation of physical layer network coding using the conflicting information in the stack.Therefore,PNBA reduces the number of interactions between reader and tags,and improves the tags identification efficiency.Theoretical analysis and simulation results using MATLAB demonstrate that PNBA reduces the number of readings,and improve RFID identification efficiency.Especially,when the number of tags to be identified is 100,the average needed reading number of PNBA is 83%lower than the basic binary search tree algorithm,43%lower than reverse binary search tree algorithm,and its reading efficiency reaches 0.93. 展开更多
关键词 Radio frequency identification(rfid) tag anti-collision algorithm physical layer network coding binary search tree algorithm
在线阅读 下载PDF
A New Relay Attack on Distance Bounding Protocols and Its Solution with Time-Stamped Authentication for RFID 被引量:2
16
作者 WEI Guoheng ZHANG Huanguo WANG Ya 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第1期37-46,共10页
Relay attack is one of the most threatening challenges against radio frequency identification(RFID) now. Distance bounding protocols have been introduced to thwart relay attacks. They form a family of challenge-resp... Relay attack is one of the most threatening challenges against radio frequency identification(RFID) now. Distance bounding protocols have been introduced to thwart relay attacks. They form a family of challenge-response authentication protocols and confirm the round-trip time at the Rapid Bit Exchange phase. They enable a reader to authenticate and to establish an upper bound on the physical distance to an entrusted tag. We design an effective attack against a family of such protocols to launch the spoofing attacks within effective distance successfully, which demonstrates that existing protocols cannot eliminate such attacks completely. The thesis proposes a new program with time- stamping verification to correct the defect and verify the effectiveness. 展开更多
关键词 radio frequency identificationrfid distance bounding protocol relay attack rapid bit exchange
原文传递
RFHUI:an RFID based human-unmanned aerial vehicle interaction system in an indoor environment 被引量:3
17
作者 Jian Zhang Zhitao Yu +5 位作者 Xiangyu Wang Yibo Lv Shiwen Mao Senthilkumar CG.Periaswamy Justin Patton Xuyu Wang 《Digital Communications and Networks》 SCIE 2020年第1期14-22,共9页
In this paper,we present an RFID based human and Unmanned Aerial Vehicle(UAV)Interaction system,termed RFHUI,to provide an intuitive and easy-to-operate method to navigate a UAV in an indoor environment.It relies on t... In this paper,we present an RFID based human and Unmanned Aerial Vehicle(UAV)Interaction system,termed RFHUI,to provide an intuitive and easy-to-operate method to navigate a UAV in an indoor environment.It relies on the passive Radio-Frequency IDentification(RFID)technology to precisely track the pose of a handheld controller,and then transfer the pose information to navigate the UAV.A prototype of the handheld controller is created by attaching three or more Ultra High Frequency(UHF)RFID tags to a board.A Commercial Off-The-Shelf(COTS)RFID reader with multiple antennas is deployed to collect the observations of the tags.First,the precise positions of all the tags can be obtained by our proposed method,which leverages a Bayesian filter and Channel State Information(CSI)phase measurements collected from the RFID reader.Second,we introduce a Singular Value Decomposition(SVD)based approach to obtain a 6-DoF(Degrees of Freedom)pose of the controller from estimated positions of the tags.Furthermore,the pose of the controller can be precisely tracked in a real-time manner,while the user moves the controller.Finally,control commands will be generated from the controller's pose and sent to the UAV for navigation.The performance of the RFHUI is evaluated by several experiments.The results show that it provides precise poses with 0.045m mean error in position and 2.5∘mean error in orientation for the controller,and enables the controller to precisely and intuitively navigate the UAV in an indoor environment. 展开更多
关键词 Radio-Frequency identification(rfid) Human Computer Interaction(HCI) Unmanned Aerial Vehicle(UAV) Singular Value Decomposition(SVD) Localization NAVIGATION
在线阅读 下载PDF
Automated Identification Algorithm Using CNN for Computer Vision in Smart Refrigerators 被引量:2
18
作者 Pulkit Jain Paras Chawla +2 位作者 Mehedi Masud Shubham Mahajan Amit Kant Pandit 《Computers, Materials & Continua》 SCIE EI 2022年第5期3337-3353,共17页
Machine Learning has evolved with a variety of algorithms to enable state-of-the-art computer vision applications.In particular the need for automating the process of real-time food item identification,there is a huge... Machine Learning has evolved with a variety of algorithms to enable state-of-the-art computer vision applications.In particular the need for automating the process of real-time food item identification,there is a huge surge of research so as to make smarter refrigerators.According to a survey by the Food and Agriculture Organization of the United Nations(FAO),it has been found that 1.3 billion tons of food is wasted by consumers around the world due to either food spoilage or expiry and a large amount of food is wasted from homes and restaurants itself.Smart refrigerators have been very successful in playing a pivotal role in mitigating this problem of food wastage.But a major issue is the high cost of available smart refrigerators and the lack of accurate design algorithms which can help achieve computer vision in any ordinary refrigerator.To address these issues,this work proposes an automated identification algorithm for computer vision in smart refrigerators using InceptionV3 and MobileNet Convolutional Neural Network(CNN)architectures.The designed module and algorithm have been elaborated in detail and are considerably evaluated for its accuracy using test images on standard fruits and vegetable datasets.A total of eight test cases are considered with accuracy and training time as the performance metric.In the end,real-time testing results are also presented which validates the system’s performance. 展开更多
关键词 CNN computer vision Internet of Things(IoT) radio frequency identification(rfid) graphical user interface(GUI)
在线阅读 下载PDF
An Efficient and Secure Authentication Protocol for RFID Systems 被引量:1
19
作者 Monzur Morshed Anthony Atkins 《International Journal of Automation and computing》 EI 2012年第3期257-265,共9页
The use of radio frequency identification (RFID) tags may cause privacy violation of users carrying an RFID tag. Due to the unique identification number of the RFID tag, the possible privacy threats are information le... The use of radio frequency identification (RFID) tags may cause privacy violation of users carrying an RFID tag. Due to the unique identification number of the RFID tag, the possible privacy threats are information leakage of a tag, traceability of the consumer, denial of service attack, replay attack and impersonation of a tag, etc. There are a number of challenges in providing privacy and security in the RFID tag due to the limited computation, storage and communication ability of low-cost RFID tags. Many research works have already been conducted using hash functions and pseudorandom numbers. As the same random number can recur many times, the adversary can use the response derived from the same random number for replay attack and it can cause a break in location privacy. This paper proposes an RFID authentication protocol using a static identifier, a monotonically increasing timestamp, a tag side random number and a hash function to protect the RFID system from adversary attacks. The proposed protocol also indicates that it requires less storage and computation than previous existing RFID authentication protocols but offers a larger range of security protection. A simulation is also conducted to verify some of the privacy and security properties of the proposed protocol. 展开更多
关键词 Radio frequency identification (rfid) SECURITY PRIVACY TIMESTAMP authentication protocol
原文传递
Design of logic process based low-power 512-bit EEPROM for UHF RFID tag chip 被引量:2
20
作者 金丽妍 LEE J H KIM Y H 《Journal of Central South University》 SCIE EI CAS 2010年第5期1011-1020,共10页
A 512-bit EEPROM IP was designed by using just logic process based devices.To limit the voltages of the devices within 5.5 V,EEPROM core circuits,control gate(CG) and tunnel gate(TG) driving circuits,DC-DC converters:... A 512-bit EEPROM IP was designed by using just logic process based devices.To limit the voltages of the devices within 5.5 V,EEPROM core circuits,control gate(CG) and tunnel gate(TG) driving circuits,DC-DC converters:positive pumping voltage(VPP=4.75 V) ,negative pumping voltage(VNN=4.75 V) ,and VNNL(=VNN/2) generation circuit were proposed.In addition,switching powers CG high voltage(CG_HV) ,CG low voltage(CG_LV) ,TG high voltage(TG_HV) ,TG low voltage(TG_LV) ,VNNL_CG and VNNL_TG switching circuit were supplied for the CG and TG driving circuit.Furthermore,a sequential pumping scheme and a new ring oscillator with a dual oscillation period were proposed.To reduce a power consumption of EEPROM in the write mode,the reference voltages VREF_VPP for VPP and VREE_VNN for VNN were used by dividing VDD(1.2 V) supply voltage supplied from the analog block in stead of removing the reference voltage generators.A voltage level detector using a capacitive divider as a low-power DC-DC converter design technique was proposed.The result shows that the power dissipation is 0.34μW in the read mode,13.76μW in the program mode,and 13.66μW in the erase mode. 展开更多
关键词 electrically erasable programmable read-only memory (EEPROM) logic process DC-DC converter ring oscillator sequential pumping scheme dual oscillation period radio frequency identification rfid
在线阅读 下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部