Academic literature on the topic 'Radio frequency identification systems Security measures'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Radio frequency identification systems Security measures.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Radio frequency identification systems Security measures"

1

Kang, Jian, Hui Mu, Hui Ren, Jicheng Jia, Lin Qi, and Zherui Zhang. "Electromagnetic Signal Intelligent Identification Based on Radio Frequency Fingerprints." Wireless Communications and Mobile Computing 2022 (June 7, 2022): 1–12. http://dx.doi.org/10.1155/2022/6296954.

Full text
Abstract:
Due to the open nature of WIFI connection, it is exposing its private information to the attackers. Traditional WIFI security methods are no longer able to meet the current security needs, and more and more wireless-side physical layer security solutions provide solutions, among which RF fingerprinting is an endogenous security technology with potential. Constructing an effective and accurate method to identify WIFI devices that steal information is a difficulty that today’s society needs to face. The main problem is not only that the recognition accuracy is difficult to improve but also the problem of data shortage. In this paper, we first construct a large-scale WIFI real-world measurement dataset. Next, we use PSD and bispectrum features, as well as complex ResNet schemes for WIFI device identification experiments, and compare and analyze them from multiple perspectives. The experimental results show that the proposed algorithm can achieve up to 97% recognition accuracy among 100 devices. Moreover, when the SNR is 0 dB, the complex ResNet method can still achieve 78% recognition accuracy among 100 devices. Finally, this paper summarizes the experimental analysis of the measured dataset and discusses the open issues related to this area.
APA, Harvard, Vancouver, ISO, and other styles
2

Lamrani Alaoui, Hasnae, Abdellatif El Ghazi, Mustapha Zbakh, Abdellah Touhafi, and An Braeken. "A Highly Efficient ECC-Based Authentication Protocol for RFID." Journal of Sensors 2021 (July 3, 2021): 1–16. http://dx.doi.org/10.1155/2021/8876766.

Full text
Abstract:
The availability of safety has always been a challenge in all fields of computing and networking, and the development of reliable security measures for low operating power systems has been a continuous task for researchers. This paper focuses on Radio Frequency Identification (RFID) systems, whose market is tremendously growing due to the increasing need for efficient supply chain and healthcare management. Two protocols are proposed that offer mutual authentication, confidentiality, forward security, anonymity, unlinkability, scalability, and resistance against the most important security attacks. They differ in storage requirements at the server side. Both proposed protocols are very efficient as the number of required elliptic curve multiplications is limited to two at the tag side. Moreover, the schemes are also more effective and secure than other related work presented in literature. In addition, we show how to extend the protocols in order to provide authentication with respect to multiple readers.
APA, Harvard, Vancouver, ISO, and other styles
3

Ruhil, Ankit, Dr Manjot Kaur Bhatia, and Pooja kumari. "SLIM: A Lightweight Block Cipher for Internet of Health Things." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (December 31, 2022): 370–81. http://dx.doi.org/10.22214/ijraset.2022.47879.

Full text
Abstract:
Abstract: Increased protection of resource-constrained devices, such as radio frequency identification (RFID) systems, is in high demand these days. For high-resource desktop PCs, current encryption techniques are sufficient. Access control systems, transaction banking systems, and payment systems are all examples of high-security applications where RFID technology are used. The attacker tries to deceive RFIDs in order to gain illegal access to services without paying for them or to get around security measures by detecting a secret password. The most difficult problem with RFID systems is ensuring effective protection against such infringements. For RFID systems, lightweight cryptography can give security assurance. SLIM is a novel ultralightweight cryptography technique for RFID devices presented in this paper. Since block ciphers are the most commonly used cryptographic and provide highly strong protection for IoT devices, SLIM is a 32-bit block cipher based on the Feistel structure. The most difficult aspect of creating a lightweight block cipher is balancing performance, cost, and security. SLIM, like all symmetric block ciphers, encrypts and decrypts using the same key. The suggested method performs well in both hardware and software contexts, has a small implementation footprint, a reasonable cost/security ratio for RFID devices, and is energyefficient. SLIM has shown high immunity to the most successful linear and differential cryptanalysis assaults, as well as a substantial margin of defense against them.
APA, Harvard, Vancouver, ISO, and other styles
4

Wei, Guo-heng, Yan-lin Qin, and Wei Fu. "An Improved Security Authentication Protocol for Lightweight RFID Based on ECC." Journal of Sensors 2022 (February 8, 2022): 1–6. http://dx.doi.org/10.1155/2022/7516010.

Full text
Abstract:
The security, privacy, and operation efficiency of radio frequency identification (RFID) must be fully measured in practical use. A few RFID authentication schemes based on elliptic curve cryptography (ECC) have been proposed, but most of them cannot resist the existing attacks. The scheme presented by Qian et al. could not resist impersonation attack according to our security analysis. Then, we propose a novel lightweight RFID authentication scheme, which is proved that it can resist server spoofing attack, tag masquerade attack, and provide other security properties of a RFID authentication scheme. Comparisons of computation and communication cost demonstrate that the proposed scheme is more suitable for the resource-constrained RFID authentication.
APA, Harvard, Vancouver, ISO, and other styles
5

DeMers, Gerard, Christopher Kahn, Per Johansson, Colleen Buono, Octav Chipara, William Griswold, and Theodore Chan. "Secure Scalable Disaster Electronic Medical Record and Tracking System." Prehospital and Disaster Medicine 28, no. 5 (June 26, 2013): 498–501. http://dx.doi.org/10.1017/s1049023x13008686.

Full text
Abstract:
AbstractIntroductionElectronic medical records (EMRs) are considered superior in documentation of care for medical practice. Current disaster medical response involves paper tracking systems and radio communication for mass-casualty incidents (MCIs). These systems are prone to errors, may be compromised by local conditions, and are labor intensive. Communication infrastructure may be impacted, overwhelmed by call volume, or destroyed by the disaster, making self-contained and secure EMR response a critical capability.ReportAs the prehospital disaster EMR allows for more robust content including protected health information (PHI), security measures must be instituted to safeguard these data. The Wireless Internet Information System for medicAl Response in Disasters (WIISARD) Research Group developed a handheld, linked, wireless EMR system utilizing current technology platforms. Smart phones connected to radio frequency identification (RFID) readers may be utilized to efficiently track casualties resulting from the incident. Medical information may be transmitted on an encrypted network to fellow prehospital team members, medical dispatch, and receiving medical centers. This system has been field tested in a number of exercises with excellent results, and future iterations will incorporate robust security measures.ConclusionA secure prehospital triage EMR improves documentation quality during disaster drills.DeMersG, KahnC, JohanssonP, BuonoC, ChiparaO, GriswoldW, ChanT. Secure scalable disaster electronic medical record and tracking system. Prehosp Disaster Med. 2013;28(5):1-4.
APA, Harvard, Vancouver, ISO, and other styles
6

Gvozdenovic, Nikola, Ralph Prestros, and Christoph F. Mecklenbräuker. "Far-Field Testing Method of Spurious Emission Produced by HF RFID." International Journal of Antennas and Propagation 2016 (2016): 1–6. http://dx.doi.org/10.1155/2016/4715898.

Full text
Abstract:
We present measurements of spurious emission produced by high-frequency radio frequency identification (HF RFID) using carrier frequency of 13.56 MHz. HF RFID tags produce unwanted emission due to rectification and more generally due to nonlinearity of analog front end. Depending on the conducting material of an HF RFID coil and surrounding dielectric material, the coil behaves as more or less good antenna on some harmonic frequencies. Exact characterization and analysis of unwanted emission is important from the security perspective as well as from the perspective of interference with other systems. Consequently we measured the harmonics produced in the integrated circuitry and characterized radiation properties of the antenna. Finally we present the measurements of the spurious emission performed in a Gigahertz Transverse Electromagnetic (GTEM) cell.
APA, Harvard, Vancouver, ISO, and other styles
7

Ogurtsov, Maxim, Vyacheslav Korolyov, and Oleksandr Khodzinskyi. "To the Problems of the National State Recognition System Improving." Cybernetics and Computer Technologies, no. 2 (September 30, 2022): 74–82. http://dx.doi.org/10.34229/2707-451x.22.2.8.

Full text
Abstract:
Introduction. A rapid increase in the number of objects that simultaneously take part in combat operations in the air requires improvement of systems for recognizing military objects both in terms of qualitative and quantitative indicators. This requires the development of appropriate algorithms for identifying new-generation "friend-foe" objects. Such algorithms can be based on various methods of information security, in particular symmetric and asymmetric cryptographic algorithms and other methods of cryptography. The purpose of the article is to survey modern systems of state recognition of objects (SSRO), identify their shortcomings and provide recommendations for their elimination. Results. The requirements for SSRO as a system for processing, transmitting, securing information and identifying objects based on cryptography and computer security methods are defined. Common and distinctive features for civil and military identification systems are highlighted. The advantages and disadvantages of the existing SSRO are shown. Recommendations are formulated to address the shortcomings of the existing SSRO. An example of a stand and a hardware and software basis for studying SSRO algorithms with backup channels is given. Conclusions. Eliminating the shortcomings of the SSRO and improving the level of its reliability will require the implementation of the following organizational and technical measures. 1. Replacing the current state recognition system with a more modern one, which will support more modern cryptographic algorithms and a larger number of recognition objects. Adding support for radio tag recognition (RF tags). 2. Support for recognition lines in various directions, including "ground – UAV", "plane – tank", "plane – UAV" and others. Adding support for the NATO standard – STANAG 4579, adopted in 2001, and others. 3. Using of broad-spectrum signals to reduce the probability of detection and interception, as well as a number of signal-code structures and a working frequency grid. Keywords: Friend-or-Foe, object identification, cryptography, backup channels.
APA, Harvard, Vancouver, ISO, and other styles
8

El Khamlichi, Mohamed, Alejandro Alvarez Melcon, Otman El Mrabet, Mohammed Ali Ennasar, and Juan Hinojosa. "Flexible UHF RFID Tag for Blood Tubes Monitoring." Sensors 19, no. 22 (November 9, 2019): 4903. http://dx.doi.org/10.3390/s19224903.

Full text
Abstract:
Low-cost and flexible radio frequency identification (RFID) tag for automatic identification, tracking, and monitoring of blood products is in great demand by the healthcare industry. A robust performance to meet security and traceability requirements in the different blood sample collection and analysis centers is also required. In this paper, a novel low-cost and flexible passive RFID tag is presented for blood sample collection tubes. The tag antenna is based on two compact symmetrical capacitive structures and works at the ultra-high frequency (UHF) European band (865 MHz–868 MHz). The tag antenna is designed considering the whole dielectric parameters such as the blood, substrate and tube. In this way, it operates efficiently in the presence of blood, which has high dielectric permittivity and loss. Measurement results of the proposed tag have confirmed simulation results. The measured performance of the tag shows good matching in the desired frequency band, leading to reading ranges up to 2.2 m, which is 4.4 times higher than typical commercial tags. The potential of this tag as a sensor to monitor the amount of blood contained in clinic tubes is also demonstrated. It is expected that the proposed tag can be useful and effective in future RFID systems to introduce security and traceability in different blood sample collection and analysis centers.
APA, Harvard, Vancouver, ISO, and other styles
9

Andziulis, Arūnas, Rimantas Plėštys, Sergej Jakovlev, Danielius Adomaitis, Konstantin Gerasimov, Mindaugas Kurmis, and Valdemaras Pareigis. "PRIORITY BASED TAG AUTHENTICATION AND ROUTING ALGORITHM FOR INTERMODAL CONTAINERS RFID SENSOR NETWORK." TRANSPORT 27, no. 4 (December 21, 2012): 373–82. http://dx.doi.org/10.3846/16484142.2012.750622.

Full text
Abstract:
Intermodal containers transportation management has always been a serious issue among logistics worldwide companies where the application of secure mobile information technologies (e.g. radio frequency identification systems (RFID) and sensor networks) could significantly improve the current situation by sending managers all the needed transportation conditions information. In this paper, we have focused on improving managerial decision making method by introducing the expert system evaluation functionality in a common software solution CTRMS for additional ICT risks evaluation. The basic risks involved in transportation and the appropriate measures are introduced as well. The pre-defined RFID sensor network was used to develop an optimal tag authentication and routing algorithm where tags and reader authentication protocols were defined and based upon the highest security assurance and the reader to tag response time criterias. A Nearest Neighbor (NN) heuristic approach and a Priority setting method were used to address the problem of routing within the RFID sensor network between tags with the objective function of minimizing the data transfer time between tags with the highest priority values. Computational results also indicate that when the tags have the same level of confidence in the system, they can exchange information without any additional verification, so making the authentication protocol less time consuming and therefore more effective against other proposed protocols.
APA, Harvard, Vancouver, ISO, and other styles
10

Lv, Hao, Teng Jiao, Yang Zhang, Fulai Liang, Fugui Qi, and Jianqi Wang. "A Novel Method for Breath Detection via Stepped-Frequency Continuous Wave Ultra-Wideband (SFCW UWB) Radars Based on Operational Bandwidth Segmentation." Sensors 18, no. 11 (November 10, 2018): 3873. http://dx.doi.org/10.3390/s18113873.

Full text
Abstract:
Human being detection via ultra-wideband (UWB) radars has shown great prospects in many areas, such as biomedicine, military operation, public security, emergency rescue, and so on. When a person stays stationary, the main feature that separates him/her from surroundings is the movement of chest wall due to breath. There have been many algorithms developed for breath detection while using UWB radars. However, those algorithms were almost based on a basic scheme that focused on processing in the time dimension of UWB data. They did not utilize the benefits from the wide operational bandwidth of UWB radars to show potential superiority over those narrowband systems such as a continuous wave (CW) Doppler radar. In this paper, a breath detection method was proposed based on operational bandwidth segmentation. A basic theoretical model was firstly introduced, indicating that characteristics of breath signals contained in UWB echoes were consistent among the operational frequencies, while those of clutters were not. So, the method divided a set of UWB echo data into a number of subsets, each of which corresponded to a sub-band within the operational bandwidth of the UWB radar. Thus information about the operational frequency is provided for subsequent processing. With the aid of the information, a breath enhancement algorithm was developed mainly by averaging the segmented UWB data along the operational frequency. The algorithm’s performance was verified by data measured by a stepped-frequency CW (SFCW) UWB radar. The experimental results showed that the algorithm performed better than that without the segmentation. They also showed its feasibility for fast detection of breath based on a short duration of data. Moreover, the method’s potential for target identification and impulse-radio (IR) UWB radar was investigated. In summary, the method provides a new processing scheme for UWB radars when they are used for breath detection. With this scheme, the UWB radars have a benefit of greater flexibility in data processing over those narrowband radars, and thus will perform more effectively and efficiently in practical applications.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Radio frequency identification systems Security measures"

1

Foley, Joseph Timothy 1976. "Security approaches for Radio Frequency Identification systems." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/38710.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Mechanical Engineering, 2007.
Includes bibliographical references (p. 253-270) and index.
In this thesis, I explore the challenges related to the security of the Electronic Product Code (EPC) class of Radio Frequency Identification (RFID) tags and associated data. RFID systems can be used to improve supply chain performance and automate asset management. However, an antagonist could use the functionality of the RFID tags and the EPC data to invade personal privacy or acquire access to unauthorized corporate information such as inventory levels. In addition, current RFID mechanisms expose secrets to the readers, which opens an avenue for exploits and information leakage. I examined the RFID security and privacy issues and designed a number of systems to improve tag authentication, privacy protection, and secure sharing of EPC data. The specific solutions I propose include TagCheck to protect tags from counterfeiting, JanusTag to allow recoverable dynamic recoding of tags, TagFolio for privacy policy enforcement, and TagDirective for secret management and access control. To prevent leakage at the application level during Object Name System (ONS) resolution, I propose the use of an anonymizing TorONS system.
(cont.) Lastly, to protect tags from being "mass killed", I designed two different categories of RFID tag kill-resistance mechanisms: active protection using Neighborhood Watch communities of readers and Exponential Rampup for tag self-defense. These technologies are combined under one umbrella called TinFoil, creating a comprehensive security solution that successfully protects the data in an EPC-enabled RFID system while minimizing required modifications to existing architecture.
by Joseph Timothy Foley.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
2

Xu, Dongming. "On the testing of the RFID security /." View abstract or full-text, 2009. http://library.ust.hk/cgi/db/thesis.pl?CSED%202009%20XU.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yassaei, Mahshid. "Security and privacy analysis of radio frequency identification systems." Thesis, McGill University, 2013. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=114506.

Full text
Abstract:
Radio Frequency Identification (RFID) technology is widely used for variousapplications from access control to object tracking systems. Automation and fasterservices provided by this technology have striking effects on our daily life. However,there are several security and privacy concerns about RFID systems that remainunsolved. During the past years, several attacks have been designed against MifareClassic and HID iClass, two of the most widely used RFID systems on the market.The aim of this study was to improve the security and privacy mechanisms of RFIDsystems through the development of tools and the methodology of system analysis, inthe hope to find the possible flaws before the adversaries do. As an example, effortswere made to partially analyze OPUS cards (the RFID-enabled public transportationpasses in Montreal) and several security and privacy violating specifications of thesecards were highlighted. It was revealed that the static identification number of thecard is transfered in the anticollision process which can be used to track the cardholder without his consent. In addition, the information about the last three usages ofthe card (the time, the date and the metro/bus station) are transferred unencryptedand before the authentication process. Only a linear conversion is applied to theinformation which can be reversed by a simple application such as the one developedand provided in this study.Furthermore, design modifications to improve the security and privacy level of RFIDsystems were provided. These modifications are categorized based on the cost andthe disruption of service that the application of these modifications imposes to themanufacturing company.Key Words: RFID Systems, Privacy, Security, OPUS Cards
Les technologies de radio identification (RFID) sont fortement utilisées dans diverses applications qui vont du contrôle d'accès aux systèmes de traçabilité d'objets. L'automatisation et la rapidité accrue des services que ces technologies rendent possibles ont des effets marqués sur notre vie quotidienne. Cependant, les systèmes RFID comportent de nombreux problèmes de sécurité et de protection de la vie privée qui ne sont toujours pas résolus. Au cours des dernières années, de nombreuses attaques ont été conues contre la puce Classic de MIFARE ainsi que la puce iClass d'HID, deux des systèmes RFID les plus répandus sur le marché. Le but de cette étude est d'améliorer les mécanismes de sécurité et de protection de la vie privée des systèmes RFID par le développement d'outils et la méthodologie d'analyse des systèmes, dans l'espoir de découvrir les failles de sécurité potentielles avant que des adversaires ne le fassent. Par exemple, nous avons procédé à une analyse partielle des cartes OPUS (les cartes qui contiennent les titres de transport en commun utilisés à Montréal, qui font usage de la technologie RFID), et mis en évidence de nombreux éléments des spécifications de ces cartes qui représentent une faille de sécurité ou de protection de la vie privée. Nous avons découvert que le numéro d'identification statique de la carte est transmis durant le processus anticollision, ce qui peut être utilisé pour suivre la trace du détenteur de la carte sans son consentement. De plus, des informations concernant les trois dernières utilisations d'une carte (l'heure, la date, et la station de métro ou d'autobus) sont transmis sans être chiffrés, et avant le processus d'authentification n'ait lieu. Seule une conversion linéaire est appliquée sur l'information, et cette conversion peut être inversée par une simple application telle que celle que nous avons développé au cours de cette étude. De plus, nous présentons des modifications visant à améliorer le niveau de sécurité et de protection de la vie privée des systèmes RFID. Nous classons ces modifications sur la base de leur coût et de la gravité des interruptions de service que l'application de ces modifications ferait subir au manufacturier.Mots clés: Systèmes RFID, protection de la vie privée, sécurité, cartes OPUS
APA, Harvard, Vancouver, ISO, and other styles
4

Schlesinger, Adam Ian. "Mitigating container security risk using real-time monitoring with active Radio Frequency Identification and sensors." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33353.

Full text
Abstract:
Thesis (M. Eng. in Logistics)--Massachusetts Institute of Technology, Engineering Systems Division, 2005.
Includes bibliographical references (leaves 57-60).
The global village in which we live enables increased trade and commerce across regions but also brings a complicated new set of challenges such as terrorist activity, human and drug smuggling and theft in foreign or domestic locations. Containers travel the globe, across all seven continents. In the wake of intensified security concerns since the September 11, 2001 attacks, tracking containers and their contents presents an increasing concern for those institutions and personnel charged with ensuring their security. This thesis analyzes the risks associated with global container transport. The concept of an e-container is set forth as a risk mitigation technology that uses real-time monitoring of a container's physical status acquired from an array of embedded RFID-enabled sensors. A framework is suggested that relates sensor-identified signatures and phenomena to behaviors representing breaches in container security. A theoretical model suggests which sensors are required to identify the individual breaches in order to mitigate container security risk.
y Adam Ian Schlesinger.
M.Eng.in Logistics
APA, Harvard, Vancouver, ISO, and other styles
5

Sakai, Kazuya. "Security and Privacy in Large-Scale RFID Systems." The Ohio State University, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=osu1386006971.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bitko, Gordon. "RFID in the retail sector a methodology for analysis of policy proposals and their implications for privacy, economic efficiency and security /." Santa Monica, CA : RAND, 2007. http://www.rand.org/pubs/rgsd_issertations/RGSD209/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mogiba, Ntombizandile Cynthia. "Utilising radio-frequency identification technologies as knowledge management enablers in academic libraries: a case study of the University of South Africa." Diss., 2018. http://hdl.handle.net/10500/25322.

Full text
Abstract:
The quest to generate, preserve and utilise knowledge is driving firms and organisations towards a knowledge-based approach to managing organisational knowledge assets. Therefore, knowledge management (KM) is becoming increasingly important for organisations such as academic libraries to enhance their competitive edge in performance, to become more effective and to keep the organisation’s knowledge for future use. The importance of KM cannot be overemphasised in terms of how academic libraries can find meaningful and effective ways to manage knowledge resources to improve the services rendered to information users. Pressure is mounting for academic libraries to attain, retain and share knowledge for strategic planning, decision-making and remaining competitive. The adoption of radio-frequency identification (RFID) technologies is one of the preferred approaches to managing organisational knowledge assets; therefore, this was the motivation for undertaking this study in order to understand how these new technologies can change the knowledge management landscape in academic libraries. A qualitative research methodology, informed by the interpretivist research philosophy, was adopted in this study. Data were collected from a sample of 12 participants using non-probability purposive and convenience sampling techniques. The use of purposive and convenience techniques was ideal for this study because the participants were readily available and possessed the relevant data required to address the research questions and research problem of the study. Open-ended questions were designed to form an interview guide, which was the main data collection instrument. Annual reports, system manuals and user manuals were consulted to augment the primary data collected to address the problem at hand. The findings from the study showed that RFID technologies improved efficiency, tracking and tracing, inventory management and assisted with planning. It was revealed that users of RFID technologies required further training and development to fully utilise these systems for the benefit of the organisation. The study was conducted using a small sample of 12 participants; therefore, it was recommended that further studies could be conducted with large sample sizes using different research strategies. It was suggested that further research should be conducted to establish how change programmes have been managed before in other departments or sections and how the staff exodus was managed. An organisation-wide research would be recommended to ascertain the views and opinions of a larger population so that findings can be generalisable.
Information Science
M. Inf. (Information Science)
APA, Harvard, Vancouver, ISO, and other styles
8

Ranasinghe, Damith Chinthana. "New directions in advanced RFID systems." 2007. http://hdl.handle.net/2440/58490.

Full text
Abstract:
Title page, abstract and table of contents only. The complete thesis in print form is available from the University of Adelaide Library.
A combination of Radio Frequency Identification technology and ubiquitous computing are revolutionising the manner in which we look at simple objects. Radio Frequency Identification (RFID) allows RFID labeled objects to be identified at a distance without physical contact, and ubiquitous computing provides a virtually connected environment for the objects. RFID labels are frequently referred to as the next generation barcodes. RFID Systems provide increased productivity, efficiency, convenience and many advantages over bar codes for numerous applications, especially global supply chain management. RFID labeling has a number of advantages over conventional bar code systems. The optics based bar code systems could be rendered useless by common everyday environments containing dirt, dust, smoke, grease, condensation and by misorientation and misalignment. Furthermore bar codes are subject to fraudulent duplication and counterfeiting with minimal effort. However, there are limitations and constraints inherent to RFID technology: semiconductor thresholds, limits on transmitted power, costs, antenna and coupling inefficiencies. Thus it is important for RFID designers to understand these limitations and constraints in order to optimise system designs and overcome inefficiencies where possible. Therefore the work presented in this dissertation seeks to improve the performance of advanced RFID systems by overcoming a number of these limitations. Prior to a discussion of improving performance, the author's interpretation of a modem RFID system along its evolutionary path as a ubiquitous RFID network and its application to supply chain management is described. Performance improvements are achieved by: the development of electromagnetic theory for RFID system analysis and optimisation; design and development of interrogator antennas; analysis of electrically small and tiny antennas for RFID labels; and development and utilisation of a design methodology for creating high performance label antennas and antennas for tagging metallic objects. Implementations of RFID systems have raised concerns regarding information security and possible violations of end-user privacy. The most profound concerns are raised against low cost RFID technology because of its potential for mass scale deployment, its pervasive nature, and the resource limitations preventing the provision of strong cryptographic solutions. There is a growing need in the RFID community to discover and develop techniques and methods to overcome various hurdles posed by the above-mentioned concerns. Thus, the thesis also considers the vulnerabilities of low cost RFID systems and associated insecurities and privacy concerns resulting from the latter. Prior to addressing such concerns impeding the deployment of low cost RFID technology, a framework within which to provide security services is also detailed. It has become important to both defme and identity a framework based around low cost RFID systems since RFID has become a "catch all" phrase for various other forms of technology. Addressing security and privacy of low cost RFID systems requires novel thinking. The later parts of the thesis outline design considerations for security mechanisms and a number of practicable solutions for providing the features of: mutual authentication; confidentiality; message content security; product authentication; anonymity and untraceability, that are necessary for low cost RFID systems to overcome the weaknesses identified in this dissertation. Implementing these security mechanisms requires the generation of true random tag parameters and true random numbers. Achieving these objectives using a hardware based true random number generator is also described and analysed. A final part of the thesis focuses on active RFID labels and improving their performance. The primary concern with active labels is the life of the onboard battery. Turn-on circuits provide a method of turning "on" and "off" an active label remotely to conserve valuable battery power. Analysis, development and testing of a turn-on circuit concept, based on interrogator field sensing, have provided a means of remotely activating and deactivating active RFID labels and conserving battery power. The final chapter of this thesis provides a detailed analysis, based on coupling relations between electromechanical systems, for evaluating the feasibility of a theft detection sensor, based on a turn-on circuit for an active RFID label, for preventing the theft of high value items. While low cost RFID needs to overcome certain security and privacy related barriers, RFID technology does provide novel and valid approaches to such security related applications as product authentication, anti-counterfeiting and theft detection. It is believed that the contributions from this thesis will extend and elaborate on the existing knowledge base, paving the way forward to allow further significant deployment of advanced RFID techno logy.
http://proxy.library.adelaide.edu.au/login?url= http://library.adelaide.edu.au/cgi-bin/Pwebrecon.cgi?BBID=1368084
Thesis (Ph.D.) -- University of Adelaide, School of Electrical and Electronic Engineering, 2007
APA, Harvard, Vancouver, ISO, and other styles
9

Muwanguzi, Mark. "Security framework for low cost RFID tags." Thesis, 2010. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1000289.

Full text
Abstract:
Thesis (MTech. degree in Computer Systems) -- Tshwane University of Technology, 2010.
Radio Frequency Identification (RFID) systems are becoming more popular today, especially in first world countries. This is a result of the systems wide range of applications. RFID technology is used in several industries, such as: transport, sport, medicine and government institutions. The advantages that the technology offers promote its widespread use and implementation in various industries. RFID systems have the capacity to store more information than other identification technologies (for example barcode technology). Data can be read with ease as it does not require line of sight and human intervention. Despite several implementations in many industries, RFID still has some disadvantages, for instance implementation cost and issues of security and privacy. The focus of this study is the security and privacy issues in the RFID environment.
APA, Harvard, Vancouver, ISO, and other styles
10

Mullani, Ally Aziz Jamal. "A strategic assessment of the challenges involved in entering the cargo containers tracking and security market for an RFID company /." 2005. http://ir.lib.sfu.ca/handle/1892/3644.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Radio frequency identification systems Security measures"

1

China) RFIDSec (Workshop) (2013 Guangzhou. Radio frequency identification system security: RFIDsec'13 Asia Workshop Proceedings. Amsterdam, Netherlands: IOS Press, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Singapore), Workshop on RFID Security (2010. Radio frequency identification system security: RFIDsec'10 Asia Workshop proceedings. Amsterdam: IOS Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

RFIDsec '11 Asia (2011 Wuxi Shi, China). Radio frequency identification system security: RFIDsec '11 Asia Workshop proceedings. Amsterdam: IOS Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Yan. Security in RFID and sensor networks. Boca Raton: Auerbach Publications, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Making the most of RFID in libraries. London: Facet Pub., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Advanced security and privacy for RFID technologies. Hershey, PA: Information Science Reference, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

United, States Congress House Committee on Energy and Commerce Subcommittee on Commerce Trade and Consumer Protection. RFID technology: What the future holds for commerce, security, and the consumer : hearing before the Subcommittee on Commerce, Trade, and Consumer Protection of the Committee on Energy and Commerce, House of Representatives, One Hundred Eighth Congress, second session, July 14, 2004. Washington: U.S. G.P.O., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tu shu guan RFID yan jiu: A study on RFID application in libraries. Beijing Shi: Guo jia tu shu guan, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Palmer, Martin. Making the most of RFID in libraries. London: Facet Pub., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lopez, Pedro Peris, Julio C. Hernandez-Castro, and Tieyan Li. Security and trends in wireless identification and sensing platform tags: Advancements in RFID. Hershey, PA: Information Science Reference, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Radio frequency identification systems Security measures"

1

Armknecht, Frederik, Liqun Chen, Ahmad-Reza Sadeghi, and Christian Wachsmann. "Anonymous Authentication for RFID Systems." In Radio Frequency Identification: Security and Privacy Issues, 158–75. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16822-2_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Klonowski, Marek, Krzysztof Majcher, Wojciech Macyna, and Filip Zagórski. "Hidden Bits Approach for Authentication in RFID Systems." In Radio Frequency Identification. Security and Privacy Issues, 48–58. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36140-1_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hinterwälder, Gesine, Christof Paar, and Wayne P. Burleson. "Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems." In Radio Frequency Identification. Security and Privacy Issues, 109–22. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36140-1_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Weis, Stephen A., Sanjay E. Sarma, Ronald L. Rivest, and Daniel W. Engels. "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems." In Security in Pervasive Computing, 201–12. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-39881-3_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gurumoorthy, Sasikumar, L. Venkateswara Reddy, and Sudhakaran Periakaruppan. "Design and Development of an Internet of Things (IoT)-Based Anti-Theft System in Museum Cultural Relics Using RFID." In Advances in Wireless Technologies and Telecommunication, 168–80. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-7998-7685-4.ch013.

Full text
Abstract:
Art colonnades and museums all over the world are the first option for individuals to visit for the enhancement of the cultural life of people. To ensure their safety, museums have established numerous cultural security measures. Traditional strategies do not obstruct their pace entirely. They only use a computer in the museum to check individuals at the entrance and exit. Therefore, the authors proposed a gallery anti-stealing device created on the internet-of-things (IoT) technology that ensures security through passive readers/writers of RFID. Radio frequency identification (RFID) remains a system that practices isolated data storing and recovery and offers object tracking with a unique identity code. The system then sends sound and light warning information, while the photographic camera structure is triggered to capture a picture at the same time. The recognition of the accuracy in the hardware component of the device can be additionally enhanced by the use of this technology to increase the safety of museum equipment.
APA, Harvard, Vancouver, ISO, and other styles
6

Fernández-Caramés, Tiago M., Paula Fraga-Lamas, Manuel Suárez-Albela, and Luis Castedo. "A Methodology for Evaluating Security in Commercial RFID Systems." In Radio Frequency Identification. InTech, 2017. http://dx.doi.org/10.5772/64844.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Xiao, Yang, Larissa Klimpel, Kaveh Ghaboosi, and Jingyuan Zhang. "Low-Cost Radio Frequency Identification Security." In Security in Distributed and Networking Systems, 151–67. WORLD SCIENTIFIC, 2007. http://dx.doi.org/10.1142/9789812770103_0007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gódor, Gyozo, and Sándor Imre. "Security Aspects in Radio Frequency Identification Systems." In Next Generation Data Communication Technologies, 187–225. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-61350-477-2.ch009.

Full text
Abstract:
Radio frequency identification technology is becoming ubiquitous, and as an unfortunate side effect, more and more authentication solutions come with more security issues. In former contributions, the authors introduced a solely hash-based secure authentication algorithm that is capable of providing protection against most of the well-known attacks and performs exceptionally well even in very large systems. The authors gave a theoretical analysis of Simple Lightweight Authentication Protocol (SLAP) protocol from security and performance point of view. This chapter gives a detailed examination of small computational capacity systems from the point of view of security. The authors define the model of attacker and the well-known attacks which can be achieved in these kinds of environments. Furthermore, the chapter gives a summary of the significant RFID authentication protocols which are found in literature. The authors present several lightweight authentication protocols and some novel elliptic curve cryptography based methods. Besides, the chapter illustrates the SLAP protocol’s performance characteristics with measurements carried out in a simulation environment and compares with the theoretical results. The authors show the effects of numerous attacks and the system’s different parameters on the authentication time. Finally, the chapter examines the performance and security characteristics of two other protocols chosen from the literature in order to compare to SLAP algorithm and give proper explanation for the differences between them.
APA, Harvard, Vancouver, ISO, and other styles
9

Pal, Kamalendu. "Radio Frequency Identification Systems Security Challenges in Supply Chain Management." In Smart Devices, Applications, and Protocols for the IoT, 220–42. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7811-6.ch010.

Full text
Abstract:
The radio frequency idtentification (RFID) is a wireless technology that enable automatic identification and extraction of stored information from any tagged object within a supply chain environment. A simple RFID system uses radio waves to collect and transfer data from a tag attached to an object linked to an RFID reader for identifying, tracking, and data capturing. However, RFID-based systems have numerous security- and privacy-related threats for the deployment of such technology in supply chain automation purpose. This chapter explains the technical fundamentals of RFID systems and its security threats. It also classifies the existing security and privacy threats into those which target the RFID components such as the tag, the communication channel, and the overall system threats. Finally, the chapter discusses the open research challenges that need further investigation, especially with the rapid introduction of diverse RFID applications in supply chain management (SCM).
APA, Harvard, Vancouver, ISO, and other styles
10

Pang, Les. "Radio Frequency IdentificationTechnology in Digital Government." In Information Security and Ethics, 2623–33. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch174.

Full text
Abstract:
Following technical strides in radio and radar in the 1930s and 1940s, the 1950s were a period of exploration for radio frequency identity (RFID) technology as shown by the landmark development of the long-range transponder systems for the “identification, friend or foe” for aircraft. Commercial use of RFID appeared in the 1960s, such as electronic article surveillance systems in retail stores to prevent theft. The 1970s were characterized by developmental work resulting in applications for animal tracking, vehicle tracking, and factory automation. RFID technology exploded during the 1980s in the areas of transportation and, to a lesser extent, personnel access and animals. Wider deployment of RFID tags for automated toll collection happened in the 1990s. Also, there was growing interest of RFID for logistics and having it work along side with bar codes. In the beginning of the 21st century, the application of RFID technology has been ubiquitous and now it is practically part of everyday life (Landt, 2001).
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Radio frequency identification systems Security measures"

1

Alshammri, Turki, Mohammed Albakheet, and Ibraheem Kateeb. "Survey on Radio Frequency Identification Security and Attacks." In ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3508072.3508095.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shen, Guanxiong, Junqing Zhang, Alan Marshall, Mikko Valkama, and Joseph Cavallaro. "Radio Frequency Fingerprint Identification for Security in Low-Cost IoT Devices." In 2021 55th Asilomar Conference on Signals, Systems, and Computers. IEEE, 2021. http://dx.doi.org/10.1109/ieeeconf53345.2021.9723287.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hlady, Joseph, and Somen Mondal. "Integration of Radio Frequency Identification and GIS for Asset Management." In 2008 7th International Pipeline Conference. ASMEDC, 2008. http://dx.doi.org/10.1115/ipc2008-64062.

Full text
Abstract:
The use of Radio Frequency Identification (RFID) has grown substantially in the past few years. Driven mostly by the retail supply chain management industry and by inventory control (loss prevention), RFID technology is finding more acceptance in the security and personal tracking sectors beyond simple pass cards. This growth has of course resulted in greater acceptance of RFID technology and more standardization of process and systems as well as decreased per unit costs. The oil and gas industry is being exposed to the potential use of RFID technology, mostly through the safety and equipment inspection portion of construction management. However, the application of RFID technology is expected to expand to the material tracking and asset management realms in the near future. Integrating the information provided by RFIDs with EPCM project and owner/operator Geographic Information Systems (GIS) is a logical next step towards maximizing the value of RFID technology. By linking assets tracked in the field during movement, lay-down and construction to a GIS, projects will have accurate, real-time data on the location of materials as well as be able to query about those assets after commissioning. This same capability is being modified for post-commission use of RFID with facility GISs. This paper outlines how existing GISs used during the EPCM phases and those employed after commissioning can display, utilize and analyze information provided by RFID technology.
APA, Harvard, Vancouver, ISO, and other styles
4

McCoy, Michael, Christopher Isert, Douglas Jackson, and John Naber. "A Frequency Counter Based Analog-to-Digital Converter for a Low-Power RFID Biomedical Telemetry System." In ASME 2007 2nd Frontiers in Biomedical Devices Conference. ASMEDC, 2007. http://dx.doi.org/10.1115/biomed2007-38114.

Full text
Abstract:
This paper describes a method for determining a digital representation of a remote sensing element using a novel and lower power method of analog to digital conversion [1]. This conversion process is most effective for low-frequency and very low current Radio Frequency Identification (RFID) sensing systems where the sensing element tags are powered by an inductively coupled carrier signal of fixed frequency. This method eliminates the need for a traditional, large and power-hungry Analog-to-Digital Converter (ADC). This approach is being developed for an orthopedic application that measures the invivo strain on titanium rods to help surgeons better understand the progress of fusion in spinal fusion surgery [2]. Previous work has been shown using the difference of two clocks for sending digital data from the reader to the tag [3], whereas this approach is optimized for sending digital data in the other direction, from tag to the reader. The sensor element may be a resistive or capacitive device integrated into an oscillator of variable frequency. This variable oscillation signal is then divided down and used as the time base to a frequency counter clocked by the recovered carrier signal. In recovering and using the carrier signal as an internal clock, an additional on chip oscillator is not necessary. The resultant value then undergoes additional post processing to add a unique identification string, a CRC check word, Manchester encoding, and Frequency-Shift Key (FSK) encoding for load modulation transmission [3,4].
APA, Harvard, Vancouver, ISO, and other styles
5

Couto, Christiana, Gabriela Moutinho de Souza Dias, Ronaldo Moreira Salles, and Gustavo Claudio Karl Couto. "A Scalable and Secure Protocol for RFID Based on “Advanced Encryption Standard” and Elliptic Curve Cryptography." In Simpósio Brasileiro de Computação Ubíqua e Pervasiva. Sociedade Brasileira de Computação - SBC, 2022. http://dx.doi.org/10.5753/sbcup.2022.222771.

Full text
Abstract:
Radio frequency identification systems are widely used to uniquely identify objects in many applications such as magnetic cards, security tags, and logistic management systems. Despite these advantages provided by the RFID system, there remain a multitude of security concerns related to spoofing and espionage that are all concerned with radio frequency interception. Current research analysis is promising, particularly the work of Ibrahim and Dalkiliç. Their findings are, however, limited by the amount of tags that can be processed—which under certain circumstances can exhaust the server. We designed our new protocol and conducted a performance analysis. When compared to the Ibrahim and Dalkiliç's protocol, our results revealed a drastic reduction in the communication cost that was proportional to the amount of tags authenticated. Once the results were tallied, we modeled our proposed protocol in a discrete event simulation. As a proof of concept, our protocol was then implemented in software and analyzed through an experiment whose metrics were: tag identity search speed in the back-end database and amount of tags. Our results show that the proposed protocol offers better performance compared to current standard iterations of similar technology.
APA, Harvard, Vancouver, ISO, and other styles
6

Fleisch, Ruth, Robert Schöch, and Christian Hillbrand. "A Batch Tracing System for Thermochemical Finishing Processes Enables New Services for Quality Management." In ASME 2012 11th Biennial Conference on Engineering Systems Design and Analysis. American Society of Mechanical Engineers, 2012. http://dx.doi.org/10.1115/esda2012-82299.

Full text
Abstract:
Manufacturing processes in the area of thermochemical treatment of work pieces impose lots of challenges due to the rough environment. High temperatures and the use of chemicals are aggravating conditions of salt bath nitrocarburizing processes, which are used to improve the wear resistance, the fatigue strength, and the corrosion resistance of components made from steel, cast iron, and sintered iron materials. The process is composed of preheating, nitrocarburizing, oxidizing, and multilevel cleaning. These stages are passed through consecutively, for what customer orders are combined in batches. It is an example of a discontinuous production which is characterized by a material flow which is interrupted in time. In this context a batch is an amount of pieces which form a whole and are processed together and therefore exhibit identical attributes with regard to the manufacturing process and the product quality. At present, the implementation of batch tracing mechanisms is difficult or impossible due to the harsh environment (hazardous chemicals, high temperatures …). As a consequence, wrong assignments of the finished pieces to the customers may occur while a possibility of documentation of the parameters concerning the manufacturing process is desirable. Several of the following reasons for the enhanced deployment of batch tracing thus apply: request of customers for security and information about the origin of the products (customer pull), new laws and regulations (regulatory push), availability of innovative communication and information technology (technology push), and increase in efficiency and advance of process reliability (industry pull). In this paper, we discuss batch tracing by means of intelligent RFID technology (radio frequency identification), which involves connections to sensors for measurements of ambient parameters. Information obtained by the RFID system such as the beginning and the length of stay of the batches in the different stages is merged with the temperatures delivered by the plant equipment. Thus identifying and determination of the position of the batches is achievable throughout the entire procedure. This allows the company to offer new supplementary services to the customers and to design the process in a more flexible way like prioritizing time-critical orders. In order to prove the technical feasibility of batch tracing in the field of thermochemical treatment two test cases are described: The first one is for gathering information about the functioning of the installed RFID system, the other one is the realization of the operational process in a simplified form.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography