ArticlePDF Available

RFID technology and its applications in Internet of Things (IoT)

Authors:

Abstract

Radio frequency identification system (RFID) is an automatic technology and aids machines or computers to identify objects, record metadata or control individual target through radio waves. Connecting RFID reader to the terminal of Internet, the readers can identify, track and monitor the objects attached with tags globally, automatically, and in real time, if needed. This is the so-called Internet of Things (IoT). RFID is often seen as a prerequisite for the IoT. This paper introduces the technologies of RFID and IoT, discusses the applications and challenges of RFID technology used in IoT.
6HUYLFH
1HWZRUN
3HUFHSWLRQ
$SSOLFDWLRQ
'DWD0DQDJHPHQW
&RUH1HWZRUN
$FFHVV1HWZRUN
'DWD&ROOHFWLRQ
/RJLVWLFV6XSSO\
'LVDVWHU:DUQLQJ
$JULFXOWXUH0DQDJHPHQW
(QYLURQPHQW0RQLWRU
0LOLWDU\0HGLFLQH
'LUHFWRU\6HUYLFHV
006HUYLFHV
4R66HUYLFHV
8ELTXLWRXV1HWZRUN
)DFLOLW\&RQWURO
*HRPDWLFV
'RFXPHQWDWLRQ
*60
*356
* ,6'13671
3ULYDWH1HWZRUN
:/$1:61
:L0D[ :3$1
,QWHUQHW1*1HWF
$FFHVV*DWHZD\
(WKHUQHW
6DWHOOLWH1HWZRUN
'HYLFH*DWHZD\
007HUPLQDO*DWHZD\
:61*DWHZD\
5),'0RELOH
5HDGHU
5),'
5HDGHU
6HQVRU1RGH
2SWLFDOILEHU
&DUG5HDGHU
&DPHUD
7UDQVGXFHU
6PDUW6HQVRU
2WKHU)DFLOLW\
:6161
:L)L
5),'
%OXHWRRWK
HWF
Fig.1 The system architecture of Internet of Things (IOT)
RFID Technology and Its Applications in Internet of
Things (IOT)
Xiaolin Jia1,2, Quanyuan Feng2, Taihua Fan1, Quanshui Lei1
1School of Computer Science and Technology, Southwest University of Science and Technology, Mianyang, China
2School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China
Abstract—Radio frequency identification system (RFID) is an
automatic technology and aids machines or computers to identify
objects, record metadata or control individual target through
radio waves. Connecting RFID reader to the terminal of Internet,
the readers can identify, track and monitor the objects attached
with tags globally, automatically, and in real time, if needed. This
is the so-called Internet of Things (IOT). RFID is often seen as a
prerequisite for the IOT. This paper introduces the technologies
of RFID and IOT, discusses the applications and challenges of
RFID technology used in IOT.
Keywords-RFID technology; application; Internet of Things
I. INTRODUCTION
Radio frequency identification system (RFID) is an
automatic technology and aids machines or computers to
identify objects, record metadata or control individual target
through radio waves [1]. The RFID technology was first
appeared in 1945, as an espionage tool for the Soviet Union,
which retransmitted incident radio waves with audio
information. Similarly, the IFF (Identification Friend or Foe)
transponder developed in the United Kingdom was routinely
used by the allies in World War II to identify aircraft as friend
or foe.
A typically RFID system is consisted of tags (transmitters/
responders) and readers (transmitters/receivers) [2]. The tag is
a microchip connected with an antenna, which can be attached
to an object as the identifier of the object. The RFID reader
communicates with the RFID tag using radio waves. The main
advantage of RFID technology is the automated identification
and data capture that promises wholesale changes across a
broad spectrum of business activities and aims to reduce the
cost of the already used systems such as bar codes. Although
RFID technology was discovered many years ago, it has
advanced and evolved only during the last decade since cost
has been the main limitation in all implementations.
As predicted in [3], RFID is one of the big opportunities in
information technology, which will change the world broadly
and deeply. When the RFID readers abided by appropriate
communication protocols are connected to the terminal of
Internet, the readers distributed throughout the world can
identify, track and monitor the objects attached with tags
globally, automatically, and in real time, if needed. This is the
so-called Internet of Things (IOT).
The IOT refers to uniquely identifiable objects (things) and
their virtual representations in an Internet-like structure. The
IOT first became popular through the Auto-ID Center and
related market analysts publications. RFID is often seen as a
prerequisite for the IOT. If all objects of daily life were
equipped with radio tags, they could be identified and
inventoried by computers. This paper introduces the primary
concepts and technologies of RFID and IOT, discusses the
applications and challenges of RFID technology used in IOT.
II. IOT AND RFID TECHNOLOGY
A. Internet of Things
Internet of Things (IOT) is a global network infrastructure,
linking physical and virtual objects through the exploitation of
data capture and communication capabilities. It will offer
specific object identification, sensor and connection capability
as the basis for the development of independent cooperative
services and applications. These will be characterized by a high
degree of autonomous data capture, event transfer, network
connectivity and interoperability.
The IOT system architecture is generally divided into three
layers: the perception layer, the network layer, and the service
layer (or application layer), as shown in Fig.1.
Perception layer: It is the information origin and the core
layer of IOT. All kinds of information of the physical world
used in IOT are perceived and collected in this layer, by the
technologies of sensors, wireless sensors network (WSN), tags
1282
978-1-4577-1415-3/12/$26.00 ©2012 IEEE
Reader TagApplication
Command Command
Response Response
Master Slave
Master Slave
Data flow
Fig.2 The components of a RFID system
and reader-writers, RFID system, camera, global position
system (GPS), intelligent terminals, electronic data interface
(EDI), objects, and so like.
Network layer: This layer, also called transport layer,
including access network and core network, provides
transparent data transmission capability. By the existing mobile
communication network, radio access network, wireless sensor
network (WSN) and other communications equipment, such as
global system for mobile communications (GSM), general
packet radio service (GPRS), worldwide interoperability for
microwave access (WiMax), wireless fidelity (WiFi), Ethernet,
etc., the information form perception layer can be sent to the
upper layer. At the same time, this layer provides an efficient,
reliable, trusted network infrastructure platform to upper layer
and large scale industry application [4].
Service layer: This layer, also called application layer,
includes data management sub-layer and application service
sub-layer. The data management sub-layer provides processing
complex data and uncertain information, such as restructuring,
cleaning and combining, and provides directory service, market
to market (M2M) service, Quality of Service (QoS), facility
management, geomatics, etc. by service oriented architecture
(SOA), cloud computing technologies, and so on. The
application service sub-layer transforms information to content
and provides good user interface for upper level enterprise
application and end users, such as logistics and supply, disaster
warning, environmental monitoring, agricultural management,
production management, and so forth.
B. RFID System
RFID systems are composed of three main components:
RFID tags, reader, application system [2][5], as shown in Fig.2.
RFID tags: also known as transponders (transmitter/
responder), are attached to the objects to count or identify.
Tags could be either active or passive. Active tags are those
that have partly or fully battery powered, have the capability to
communicate with other tags, and can initiate a dialogue of
their own with the tag reader. Passive tags, on the other hand,
do not need any internal power source but are powered up by
the tag reader. Tags consist mainly of a coiled antenna and a
microchip, with the main purpose of storing data.
Reader: also known as transceiver (transmitter/receiver)
made up of a radio frequency interface (RFI) module and
control unit. Its main functions are to activate the tags,
structure the communication sequence with the tag, and
transfer data between the application software and tags.
Application system: also called data processing system,
which can be an application or database, depending on the
application. The application software initiates all readers and
tags activities. RFID provides a quick, flexible, and reliable
way for electronically detecting, tracking and controlling a
variety of items. RFID systems use radio transmissions to send
energy to a RFID tag while the tag emits a unique
identification code back to a data collection reader linked to an
information management system. The data collected from the
tag can then be sent either directly to a host computer, or stored
in a portable reader and up-loaded later to the host computer.
C. RFID Tags
RFID tags come in many different shapes, sizes, and
capabilities. When an RFID solution is designed, the solution’s
architect must take into account both business and technology
requirements before choosing the type of RFID tag to use [6].
All RFID tags have the following essential components in
common: antenna, integrated circuit, printed circuit board (or
substrate).
The main responsibility of antenna of RFID tag is to
transmit and receive radio waves for the purpose of
communication. The antenna is also known as the coupling
mechanism, which can transform the energy in the form of
electromagnetic radiation. This is the way the tag and reader
communicating each other. In a suitable environment and
proximity to an RFID reader, the antenna can collect enough
energy to power the tag’s other components without a battery.
The integrated circuit (IC) is a packaged collection of
discrete components that provide the brains for the tag. The IC
in a RFID tag is much like a microprocessor found in any
cellular phone or computer, but it is usually not very
sophisticated. For many RFID tags, the IC component has only
a single purpose, to transmit the tag’s unique identifier (ID). If
the tag has any peripheral components, the IC is also the master
controller that is responsible for gathering any extra
information and transmitting it along with the tag’s ID.
The printed circuit board (PCB) is the material that holds
the tag together. The circuit board may be rigid or flexible, and
is composed of many different types of materials, depending on
the type and purpose of the tag. For example, tags that are used
for tracking components on an assembly line where extremely
high temperatures may be encountered would tend to be much
more rigid and are usually placed inside a protective enclosure.
Tags are built to comply with a categorization called a class.
Classes progressively have greater capability. EPCglobal has
defined six classifications for RFID tags (0 to 5). A general
description of functionality that each class is required to
comply is as follows.
¾ Class 0/class 1: These classes provide the basic radio
frequency (RF) passive capability. Class 0 is factory-
programmed. Beyond class 0, including class 1, the
tags are user-programmable.
¾ Class 2: Additional functionality is added, which
includes encryption and read-write RF memory
1283
Fig.3 RFID reader consisting of control system and HF interface [2]
¾ Class 3: Batteries are found on board that will power
logic in the computer circuit. Class 3 provides longer
range and broadband communications
¾ Class 4: Active tags are part of the definition of class
4 tags. Peer-to-peer communications and additional
sensing are also included.
¾ Class 5: Class 5 tags contain enough power to activate
other tags and could be effectively classified as a
reader.
Passive tags, which have no built-in power source and the
power is provided by the radio frequency wave created by the
reader, are usually classified in the class 0 to 3 range. Class 4
describes active tags, which have an internal power source (a
battery), that provides the necessary power for the operation of
the tag over a period of time. Class 5 is reserved for tag readers
and active tags that can read data from other tags.
D. RFID Reader
RFID readers are also referred to as interrogators because
they query tags as the tags enter their read range. The reader is
responsible for orchestrating the communication with any tags
in its read range and then presenting the tags’ data to an
application that can make use of the data.
Readers in all systems can be reduced to two fundamental
functional blocks: the control system and the high frequency
(HF) interface, consisting of a transmitter and receiver, as
shown in Fig.3. The entire system is controlled by an external
application via control commands.
The reader’s HF interface performs the following functions:
(a) generation of high frequency transmission power to activate
the transponder and supply it with power; (b) modulation of the
transmission signal to send data to the transponder; (c)
reception and demodulation of HF signals transmitted by a
transponder.
The reader’s control unit performs the following functions:
(a) communication with the application software and the
execution of commands from the application software; (b)
control of the communication with a transponder (master–slave
principle, as shown in Fig.2); (c) signal coding and decoding.
In more complex systems the following additional functions
are available: (d) execution of an anti-collision algorithm; (e)
encryption and decryption of the data to be transferred between
transponder and reader; (f) performance of authentication
between transponder and reader.
The control unit is usually based upon a microprocessor to
perform these complex functions. Cryptological procedures,
such as stream ciphering between transponder and reader, and
also signal coding, are often performed in an additional ASIC
(application specific integrated circuit) module to relieve the
processor of calculation intensive processes.
III. APPLICATIONS OF RFID TECHNOLOGY
The functions of RFID system generally include three
aspects: monitoring, tracking, and supervising. Monitoring
generally means to be aware of the state of a system, by
repeated observing the particular conditions, especially to
detect them and give warning of change. Tracking is the
observing of persons or objects on the move and supplying a
timely ordered sequence of respective location data to a model.
Supervising is the monitoring of the behaviors, activities, or
other changing information, usually of people. It is sometimes
done in a secret or inconspicuous manner.
The RFID applications are numerous and far reaching. The
most interesting and successful applications include those for
supply chain management, production process control, and
objects tracking management. Now RFID has been gradually
and broadly used in the following fields.
¾ Logistics and Supply
¾ Manufacturing
¾ Agriculture Management
¾ Health Care and Medicine
¾ Marine Terminal Operation
¾ Military and Defense
¾ Payment Transactions
¾ Environment Monitor and Disaster Warning
¾ Transportation and Retailing
¾ Warehousing and Distribution Systems
¾ Other applications in many walks of life businesses
For instance, in Manufacturing, RFID technology offers a
number of applications in the automotive industry. A RFID-
based antitheft vehicle immobilizer is a protective device
installed in many cars. RFID also holds great promise for the
assembly and manufacturing processes of automobiles, in
particular, for flexible and agile production planning, spare
parts, and inventory management. RFID technology not only
helps to automate the whole assembly process in which a
significant reduction in cost and shrinkage can be achieved, but
it also offers improved services to automobile users that
include more efficient replacement part ordering and
automated generation of maintenance reminders. The benefits
that RFID offers to the automotive industry, both to the
production process as well as to end users, are visibility,
traceability, flexibility, and added security.
As illustrated in Fig.4, the evolution of IOT is coinciding
with that of RFID and sensor technologies. Form supply-chain
helper to vertical-market applications to ubiquitous positioning,
1284
2000 2010 2020 time
Source: SRI Consulting Business Inte lligence
RFID tags for facilitation
routing inventorying,
and loss prevention
Surveillance, security,
healthcare, transport, food
safety, document management
Locating people and
everyday objects
Teleoperation and
telepresence: Ability
to monitor and control
distant objects
Supply-Chain Helpers
Vertical-Market Applications
Ubiquitous Positioning
Physical-World Web
Demand for
expedited logistics
Cost reduction leading t o
diffusion into 2nd
wave of applications
Ability of devices located
indoors to receive
geolocation signals
Miniaturization, powe r-
efficient electronics, and
available spectrum
Software agents and
advanced sensor fusion
Technology Reach
Fig.4 Technology roadmap of Internet of Things (IOT)
and so on, the RFID technology is a very important and
fundamental groundwork for IOT.
IV. CHALLENGES OF RFID TECHNOLOGY
Although promising, RFID is not without its challenges,
which arise from both a technological and usage point of view.
A. Collision Problems
Communication between tags and readers are inherently
susceptible to electromagnetic interference. Simultaneous
transmissions in RFID lead to collisions as readers and tags
typically operate on a same wireless channel. Therefore,
efficient anti-collision protocols for identifying multi-tags
simultaneously are of great importance for the development of
large-scale RFID applications [1].
Many anti-collision protocols for RFID tag identification
have been proposed, such as query tree protocol (QT), binary
tree protocol (BT), frame slotted ALOHA protocol (FSA), etc.,
but almost all known protocols exhibit an overall
identification efficiency small than 50%. Besides, uniform IDs
distribution has always been assumed in the past. Furthermore,
it is very useful for pointing out the best performing features
of RFID tag identification protocols, and for designing new
and better protocols. In [1], we present a novel and efficient
anti-collision protocol for RFID tag identification, i.e.,
collision tree protocol (CT), which outperforms all the other
anti-collision protocols proposed so far.
B. Security and Privacy Concerns
Security and privacy issues [7] of RFID tags can effect both
organizations and individuals. Unprotected tags may be
vulnerable to eavesdropping, traffic analysis, spoofing or denial
of service and many more. Even unauthorized readers can
affect the privacy by accessing tags without enough access
control. Even if the tag content is secure then also it can be
tracked by the predictable tag responses; “location privacy” can
be affected by a traffic analysis attack. Attacker can also
threaten the security of systems, which depends on RFID
technology through the denial of service attack.
Due to its cost and resource constraint limitations, RFID
system does not have a sufficient security and privacy support.
Many researcher and scientist work to implement low cost
security and privacy protocol to increase the applicability. Lots
of lightweight solutions have been proposed for RFID, but they
are still expensive and vulnerable to the security and do not
fully resolve the security issues. So there is a good research
scope in the field of designing an efficient ultra-lightweight
cryptographic protocol for low-cost RFID system.
C. Other Challenges
Three other issues also are mainly holding back RFID’s
widespread adoption. The first one is the cost. The RFID tags
are still more expensive than printed labels. The second issue is
design. It is still needed to engineer tags and readers so that
they guarantee highly reliable identification. Another challenge
to RFID is its integration into existing systems. It is significant
to develop effective RFID middleware which used to link new
RFID systems into existing back-end infrastructures.
Despite these challenges, it’s only a matter of time before
these issues could be solved. RFID’s potential benefits are
large, and many novel applications will be see in the future,
even some of which can not begin to imagine.
V. CONCLUSION
The IOT uses a variety of information sensing identification
device and information processing equipment, such as RFID,
WSN, GPRS, etc. combining with the Internet to form an
extensive network in order to informationize and intelligentize
the entities or objects. This paper analyzes the applications and
challenges of RFID technology, which is the important and
foundational component of IOT.
ACKNOWLEDGMENT
This work is supported by the National Natural Science
Foundation of China under Grant 60990320 and 60990323;
10876029, and the National 863 Propjet of China under Grant
2009AA01Z230; and the Southwest University of Science and
Technology (SWUST) funded project of China under Grant
11XNZD83.
REFERENCES
[1] X.L. Jia, Q.Y. Feng, C.Z. Ma, “An efficient anti-collision protocol for
RFID tag identification,” IEEE Communications Letters, vol.14, no.11,
pp.1014-1016, 2010.
[2] K. Finkenzeller, RFID Handbook: Fundamentals and Applications in
Contactless Smart Cards, Radio Frequency Identification and Near-Field
Communication, New York: Wiley, 2010.
[3] D.Culler, “10 Emerging Technologies That Will Change the World,”
Technology Review, pp.33-49, Feb., 2003.
[4] Y.X.Lu, T.B.Chen, Y.Meng, “Evalution guideling system and intelligent
evaluation process on the Internet of Things,” American Journal of
Engineering and Technology Research, vol.11, no.9, pp.537-541, 2011.
[5] O.Bang, J.H.Choi, D.Lee and H.Lee, “Efficient Novel Anti-collision
Protocols for Passive RFID Tags,” Auto-ID Labs White Paper WP-
HARDWARE-050, MIT, Mar.2009.
[6] J.Banks, M.Pachano, L.Thompson and D.hanny, RFID Applied, New
York: John Wiley & Sons, Inc., 2007.
[7] R.K.Pateriya, S.Sharma, “The Evolution of RFID Security and Privacy:
A Research Survey,” 2011 International Conference on Communication
Systems and Network Technologies (CSNT), pp.115-119, June 2011.
1285
... It was designed in 1948 for short-range radio communication between settled areas and moving objects. RFID is an automated technology that allows computers or machines to recognize objects based on radio waves and record data to control them (Jia et al., 2012). An RFID system typically consists of a tag (which contains an antenna and a diagnostic chipset) and a reader (which includes a radio receiver). ...
Article
Full-text available
IoT is a game-changer across all fields, including chemistry. Embracing sustainable practices and green chemistry, the miniaturization and automation of systems, and their integration into IoT is key to achieving these principles, as a rising trend with momentum. Particularly, IoT and analytical chemistry are linked in the rapid exchange of analytical data for environmental, industrial, healthcare, and educational applications. Meanwhile, cooperation with other fields of science is evident, and there is a prompt and subjective analysis of information related to analytical systems and methodologies. This paper will review the concepts, requirements, and architecture of IoT and its role in the miniaturization and automation of analytical tools using electronic modules and sensors. The aim is to explore the standards and perspectives of IoT and its interaction with different aspects of analytical chemistry. Additionally, it aimed to explain the basics and applications of IoT for chemists, and its relevance to different subfields of analytical chemistry, particularly in the field of environmental chemical surveillance. The article also covers updating IoT devices and creating DIY-based degradation devices to enhance the educational aspect of chemistry and reduce barriers to lab facilities and equipment. Lastly, it will explore how IoT is really important and how it’s going to significantly impact analytical chemistry. Graphical Abstract
... With RFID readers, individuals can immediately identify, track, and monitor all RFID-linked things. Warehousing, medical manufacturing, marketing, and supplier management are the application fields of RFID [9]. Thus, RFID, with its readers and tags, plays a critical role in IoT applications. ...
Article
In today’s modern society, video surveillance is a growing trend and it can revolutionize many aspects of technology, especially in future smart cities that will transform traditional surveillance systems into intelligent and interconnected networks. It may be difficult for even well-trained employees to process and respond immediately to monitored data. Moreover, IoT-enabled surveillance systems overcome the challenges and flaws of conventional passive monitoring techniques by offering real-time surveillance and automated notifications for suspicious activity, intrusions, or anomalies. Therefore, the objective of this article is to provide an Internet of Things (IoT)-based smart surveillance system that may successfully connect the ecosystem, resulting in enhanced monitoring for smart city services. The primary goal of this study is to provide a comprehensive review of several IoT-based surveillance techniques used in various smart city applications. The categorization of tasks for each section is as follows: to present the historical context overview; to examine the significance of IoT and its application in smart cities; to present a standardized architecture for IoT-based smart city surveillance; to highlight an authoritative and thorough review of current IoT-based smart surveillance systems; and to identify various research issues. The methods used are: statistical graph or chart approach, schematic, and timeline diagram. Conclusions. This article outlines numerous research challenges for future video surveillance that may be addressed by researchers. In summary, this comprehensive review provides a valuable and streamlined resource for future researchers exploring smart city surveillance through the IoT.
... As a result of its numerous applications in the supply chain, transportation [10], logistics, tracking [11], home automation, and security [12], this technology has sparked an interest. RFID is one of the aiding technologies for IoT and uses RF (radio frequency) waves to uniquely identify items [13]. All over the world, the distribution of RFID readers and their connection to the internet via appropriate communication protocols permit them to track, monitor and identify objects in real time on a global scale [14]. ...
Article
In today's technological age, most customers must stand in line at the supermarket to shop because it is a timeconsuming process. Because of a barcode-based billing method, a large population in the supermarket during discount offers or weekends causes problems with long lines. The Smart Shopping System with RFID Data Module is a revolutionary approach to enhance the traditional shopping experience by incorporating Radio-Frequency Identification (RFID) technology. This project aims to streamline and optimize the shopping process, making it more efficient, convenient, and personalized for both retailers and consumers. Each product is equipped with an RFID tag containing unique identification information, allowing for seamless monitoring and management throughout the supply chain. This project proposes a smart way for people to bill their products while they shop and it provides an android application based smart trolly assistant for people to navigate in big shopping malls.
Chapter
The agricultural industry contributes significantly to the economy. As demand for food is rising due to burgeoning population pressure, improved technologies like artificial intelligence (AI) and the Internet of Things (IoT) in farming systems will help to reap more production per farm to meet the increasing food demand and the net income of farmers as well. To achieve the goal, it is essential to manage damage to crops by insects, pests, and diseases through primary plant protection measures. The major constraints faced by the farmer are lack of awareness and proper information. So, for providing real-time information to the farmers, a smart crop monitoring system integrating advanced technologies is needed. This comprises crop health monitoring, yield and field mapping, soil monitoring, weather forecasts, and other tools that can assist farmers in making smart informed decisions to prevent crop losses and enhance production quality. A smart crop monitoring system has developed using technologies like the Internet of Things (IoT) and artificial intelligence (AI) to cater to numerous farming applications, such as detecting soil quality, meteorological conditions, and crop requirements.
Chapter
Artificial Intelligence (AI) remain evolved as a central focus on international terrain, whereas the Internet of Things (IoT) is balanced to convey transformative changes in diverse disciplines. The anticipated revolution of sustainable future growth is likely compelled by the integration of Artificial Intelligence and the Internet of Things (AIoT) owing to this technology's comprehensive coverage of applications. The AIoT application fields are extensive and diverse. It is imperative to emphasize the Sustainable Development Goals (SDGs) of technical evolution. This chapter aims to identify the significance of artificial intelligence in IoT and the trust models in integrating AI with IoT. The impacts of SDGs on digitization are emphasized, and security measures for AIoT are outlined. The strategies and drivers for SDGs toward digitization are emphasized in the context of AIoT. The chapter further outlined the existing challenges and future research directions.
Article
Optical identification is often done with spatial or temporal visual pattern recognition and localization. Temporal pattern recognition, depending on the technology, involves a trade-off between communication frequency, range, and accurate tracking. We propose a solution with light-emitting beacons that improves this trade-off by exploiting fast event-based cameras and, for tracking, sparse neuromorphic optical flow computed with spiking neurons. The system is embedded in a simulated drone and evaluated in an asset monitoring use case. It is robust to relative movements and enables simultaneous communication with, and tracking of, multiple moving beacons. Finally, in a hardware lab prototype, we demonstrate for the first time beacon tracking performed simultaneously with state-of-the-art frequency communication in the kHz range.
Conference Paper
Full-text available
This paper presents the recent technical research on the problems of privacy and security for radio frequency identification (RFID). RFID technology is already used widely and is increasingly becoming a part of daily life. However, issues regarding security and privacy with respect to RFID technology have not been resolved satisfactorily. There are huge number of challenges, which must be overcome to resolve RFID security and privacy issues. It is because of the many constraints attached to the provision of security and privacy in RFID systems. These challenges are chiefly technical and economic in nature but also include ethical and social issues. Along with meeting the security and privacy needs of RFID technology, solutions must be inexpensive, practical, reliable, scalable, flexible, inter-organizational, and long lasting. This paper reviews the approaches which had been proposed by scientists for privacy protection and integrity assurance in RFID systems, and treats the social and technical context of their work. This paper can be useful as a reference for non specialist, as well as for specialist readers.
Article
In this paper, an efficient anti-collision protocol, named collision tree protocol (CT), is proposed, and a collision tree is put forward to capture the complete communications between the reader and tags in an execution of CT. The main novelty of CT is that both the generating of prefixes and the splitting of tag group are according to the collided bit directly. Both the properties of collision tree and the results of experiments show that the proposed protocol improves the efficiency of tags identification up to 50% and achieves the best performance of the tree-based tags identification protocols.
Article
Traducción de: RFID-Handbuch Contenido: 1. Introducción; 2. Características distintivas de los sistemas de identificación por radio frecuencias; 3. Principios básicos de operación; 4. Principios físicos de los sistemas de identificación por radio frecuencia; 5. Rangos de las frecuencias y regulaciones para la licitación de radio; 6. Codificación y modulación; 7. Integridad de los datos; 8. Seguridad de los datos; 9. Estandarización; 10. Arquitectura de los portadores electrónicos de datos; 11. Lectores; 12. Manufactura de tarjetas inteligentes sin contacto y transponedor; 13. Ejemplos de aplicaciones; 14. Apéndice.
Evalution guideling system and intelligent evaluation process on the Internet of Things
  • Y X Lu
  • T B Chen
  • Y Meng
Y.X.Lu, T.B.Chen, Y.Meng, "Evalution guideling system and intelligent evaluation process on the Internet of Things," American Journal of Engineering and Technology Research, vol.11, no.9, pp.537-541, 2011.
Efficient Novel Anti-collision Protocols for Passive RFID Tags
  • O Bang
  • J H Choi
  • D Lee
  • H Lee
O.Bang, J.H.Choi, D.Lee and H.Lee, "Efficient Novel Anti-collision Protocols for Passive RFID Tags," Auto-ID Labs White Paper WP-HARDWARE-050, MIT, Mar.2009.