首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Radio frequency identification (RFID) technology system is quickly evolved many applications to manage personnel can be more efficient for automation systems. We combine the RSA encryption and decryption algorithms to raise the safety and the information security systems. The RFID environment has been communicated to exchange data for heterogeneous wireless networks. In this paper, it is implemented the RFID-based campus system solutions to security and privacy of RFID system for wireless mesh network applications. We propose to enhance the security algorithm combined RFID devices for the antenna arrays system. This paper is also presented the integrated framework for the application and integration systems based on service oriented architecture, and given a specific application of the framework combined with campus system.  相似文献   

2.
Consumer Acceptance of RFID Technology: An Exploratory Study   总被引:1,自引:0,他引:1  
Radio frequency identification (RFID) technology is used in numerous applications and offers a plethora of interesting potential new applications. However, this potential raises issues that require addressing to achieve its widespread acceptance by consumers. This paper investigates the factors that affect consumer acceptance of RFID technology. The purpose of this effort is to develop and test a theoretical model that contextualizes the technology acceptance model (TAM) within the context of RFID technology. The research model proposes that convenience, culture, privacy, regulation, and security are the principal factors influencing the consumerspsila acceptance of RFID. However, the results show that convenience, culture, and security are significant predictors. This study is the first in the RFID literature to use the TAM for explaining consumer acceptance of RFID technology. The findings suggest that: (1) higher perceived convenience of RFID technology leads to greater acceptance of this technology; (2) societal beliefs, value systems, norms, and/or behaviors influence the extent of consumer acceptance of RFID technology; and (3) higher perceived importance of and less willingness to sacrifice personal information security lead to lower intention to use RFID technology. Contextualization of TAM to RFID technology makes this study relevant to practitioners because the results can provide insight to organizations using or exploring the use of RFID technology.  相似文献   

3.
SARIF: A novel framework for integrating wireless sensor and RFID networks   总被引:2,自引:0,他引:2  
Radio frequency identification (RFID) is a promising technology for ubiquitous computing. When we embed RFID tags into environment-sensitive objects, RFID networks must be integrated with wireless sensor networks (WSNs). In this article, we first identify key requirements for designing an efficient and flexible integration framework. Based on the requirements, we propose a sensor and an RFID integration framework (SARIF). As middleware that operates on top of RFID networks and WSNs, SARIF enables the design of diverse applications flexibly and manages network resources efficiently. We also demonstrate the effectiveness of SARIF by implementing a prototype.  相似文献   

4.
Radio frequency identification (RFID) systems are very effective for identifying objects. Existing published works focus on designing efficient collision resolution protocols for the tag identification problem in RFID systems with passive RFID tags. However, advances in low‐cost and low‐power sensing technologies will make active RFID tags more popular and affordable in the near future. In multiple object identification systems with active tags, the tags are designed for extremely low‐cost large‐scale applications such that battery replacement is not feasible. This imposes a critical energy‐constraint on the communication protocols used in these systems. In this paper, we analyze energy consumption and identification times for several protocols. The objective is to decrease energy consumption of tags by reducing both the total identification time and the total active time. Copyright © 2007 John Wiley & Sons, Ltd.  相似文献   

5.
A radio frequency identification (RFID) system is a special kind of sensor network to identify an object or a person using radio frequency transmission. A typical RFID system includes transponders (tags) and interrogators (readers): tags are attached to objects/persons, and readers communicate with the tags in their transmission ranges via radio signals. RFID systems have been gaining more and more popularity in areas such as supply chain management, automated identification systems, and any place requiring identifications of products or people. RFID technology is better than barcode in many ways, and may totally replace barcode in the future if certain technologies can be achieved such as low cost and protection of personal privacy. This paper provides a technology survey of RFID systems and various RFID applications. We also discuss five critical research issues: cost control, energy efficiency, privacy issue, multiple readers' interference, and security issue. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   

6.
Presently the necessity of building anticollision RFID systems with dynamic location change of tags appear more often. Such solutions are used in identification of moving cars, trains (automatic identification of vehicles – AVI processes) as well as moving parts and elements in industry, commerce, science and medicine (internet of things). In the paper there were presented operation stages in the RFID anticollision system necessary to communicate with groups of tags entering and leaving read/write device interrogation zone and communication phases in conditions of dynamic location change of tags. The mentioned aspects influence RFID system reliability, which is characterized by the efficiency coefficient and the identification probability of objects in specific interrogation zone. The communication conditions of correct operation of multiple RFID system are crucial for efficient exchange of data with all tags during their dynamic location changes. Presented problem will be the base to specify new application tag parameters (such as maximum speed of tag motion) and synthesis of interrogation zone required for concrete anticollision RFID applications with dynamic location change of tags.  相似文献   

7.
《Microelectronics Reliability》2015,55(11):2324-2330
The reliability of a commercially available isotropic conductive adhesive (ICA) deposited via laser induced forward transfer (LIFT) printing is reported. ICAs are particularly important for surface mount device (SMD) integration onto low-cost, large-area system-in-foil (SiF) applications such as radio frequency identification (RFID) transponder tags. For such tags, and for SiF in general, the reliability of the printed interconnects under harsh circumstances is critical. In this study, the reliability of surface mounted resistors bonded onto screen-printed conductive circuitry on polymer foil was assessed. The prepared samples were subjected to thermal shock testing (TST), accelerated humidity testing (AHT) and flexural testing, while electrical measurements were conducted at regular intervals. Die shear testing was performed to evaluate the bond strength. The reliability characteristics of the LIFT-printed samples were benchmarked against current industry standard stencil printing process. Finally, the applicability of the LIFT–ICA process for practical applications is demonstrated using RFID transponder integration and testing.  相似文献   

8.
徐丽萍 《通信技术》2012,45(8):118-119,122
射频识别(RFID,Radio Frequency Identification)是一种非接触式的自动识别技术,也称为"无线条形码",射频识别以非接触性、识别速度快、可以多卡识别等优于其他自动识别技术的特性受到广泛重视。应用非常广泛,如动物识别、门禁控制、生产线自动化控制、停车场管理、物料管理等等。对RFID系统的工作原理进行了介绍,重点分析了读写器硬件结构,电子标签硬件结构,希望对RFID系统的开发有所帮助。  相似文献   

9.
A myriad of applications are emerging, in which energy conservation is a critical system parameter for communications. Radio frequency identification device (RFID) networks, smart cards, and even mobile computing devices, in general, need to conserve energy. In RFID systems, nodes are small battery-operated inexpensive devices with radio receiving/transmitting and processing capabilities, integrated into the size of an ID card or smaller. These identification devices are designed for extremely low-cost large-scale applications, such that the replacement of batteries is not feasible. This imposes a critical energy constraint on the communications (access) protocols used in these systems, so that the total time a node needs to be active for transmitting or receiving information should be minimized. Among existing protocols, classical random access protocols are not energy conserving, while deterministic protocols lead to unacceptable delays. This paper deals with designing communications protocols with energy constraint, in which the number of time slots in which tags need to be in the active state is minimized, while the access delay meets the applications constraints. We propose three classes of protocols which combine the fairness of random access protocols with low energy requirements  相似文献   

10.
移动RFID技术的应用与设计   总被引:1,自引:2,他引:1  
射频识别技术(RFID)具有远距离、非接触识别,抗恶劣环境,识别高速移动物体,数据存储容量大等特点,近年来已成为研究与应用的热点。随着互联网、无线通信技术和移动设备的发展,越来越多的工作人员加入了移动办公的行列,从事移动商务活动,RFID技术与移动业务的结合成为未来商务发展的亮点。介绍了RFID技术在移动商务方面的典型应用,提出了以智能手机为平台的第二代身份证(二代证)RFID阅读器的设计,使与二代证相关信息的移动联网查询成为可能,促使人们能更好地开展移动商务活动。  相似文献   

11.
The government has plans for electronic ID cards, passports and vehicle identification. In industry, smartcards, intelligent tickets, RFID and active tags are increasingly available at low cost. Technology that was not originally designed for identification and tracking is now being used in that role. Wi-Fi tags are now available, and a number of technology vendors provide Wi-Fi location-based services. We are seeing a proliferation of user and object identifiers (more correctly termed ‘identifying tokens’) that can be read at a range. Barriers between the physical and information world are disappearing and contactless identifiers promise great benefits for their users. Identifiers can be read at high speeds and low cost without human intervention. The convergence of technologies causes an increased number of players to rely on identifiers that are reused in multiple domains and contexts. The result is that the user loses control over their identifiers, and security and privacy vulnerabilities affect the value of the identifiers to applications. In this paper, we describe what we mean by identifier security, and discuss the options available to the system designer to mitigate the security and privacy risks. We remark on the lack of a common regulatory framework for the control of identifiers, and suggest that technology should be used to provide the first and best layer of defence.  相似文献   

12.
Radio-wave attenuation negatively affects RF communications in a RFID system. In order to ensure the reliability of RFID system, one must predict the radio-wave path-loss accurately before detailed design. However, it is infeasible to estimate the path-loss for the container RFID systems using the conventional path-loss models such as the Okumura model, two-ray model and so on. This paper firstly focuses on studying the radio propagation mechanism in the container RFID system, analyzing the radio-wave diffraction in the container metallic environment and establishing a mathematic model to estimate the path-loss between the readers and tags. A test in a real container working area was conducted and it was found that the actual measuring results are consistent with the corresponding computing results according to the established path-loss model. The model is further used to analyze some performances of the container RFID system. A group of curves are obtained to show the relationships among the identification distance, the sending power and the BER (bit error rate). The paper is concluded that the TE polarization mode cannot be applied to a container RFID system and the attenuation caused by multi-path propagation will dramatically reduce the recognition reliability of a container RFID system.  相似文献   

13.
Even though object identification is its main objective, it is generally accepted that there are some technological challenges that should be addressed in order to exploit the full potential of RFID (Radio frequency identification). The anti-collision problem is one of them. Despite the different proposed methods, it still needs further study on how to improve identification ability. This paper presents a novel algorithm with IDMA (Interleave division multiple access) scheme to resolve the anti-collision problem for RFID. IDMA, which is one of the most promising technologies for high data rate wireless systems, can be regarded as a special case of CDMA (Code division multiple access). In contrast to CDMA, which separates tags by signatures or spreading codes, distinct interleavers are the only means to separate tags for IDMA. In this paper, a RFID based IDMA receiver is proposed and compared to classical systems. Simulation results demonstrate that this system provides an improvement in performance in terms of bit error rate in dense scenarios (large number of tags) and it offers an efficient alternative to systems with classical spreading sequence.  相似文献   

14.
The radio-frequency identification (RFID) concept is expanded to millimeter-wave frequencies and millimeter-wave identification (MMID) in this paper. The MMID concept and a comparison with UHF RFID are presented, showing the limitations and benefits of MMID. Three feasible applications are suggested for MMID, which are: (1) wireless mass memory; (2) an automatic identification system with pointing functionality; and (3) transponder communication with automotive radar. To demonstrate the feasibility of the MMID system, experimental results for both downlink and backscattering-based uplink are presented at 60 GHz.  相似文献   

15.
徐进  戎蒙恬 《信息技术》2009,(7):10-13,18
射频识别技术是一项拥有广阔市场前景的新兴技术,它利用射频通信实现非接触式自动识别技术,实现对标签的识别和对标签内数据的处理.与无线通信一样,射频识别技术存在着由各种干扰引起的读取可靠性的问题,文中以实验的方法表现了射频识别技术读取可靠性的问题,通过分析数据,提出了提高射频识别系统读取可靠性的办法.  相似文献   

16.
针对国内外射频识别技术的迅猛发展,结合射频识别技术的应用背景,阐述了读写器中最大的耗能器件—功率放大器的研究现状;指出CMOS工艺应用于功率放大器设计的局限性和可行性;最后,探讨了将CMOS功率放大器应用于射频识别技术的主要研究方向。  相似文献   

17.
程嘉远 《现代雷达》2018,40(8):55-59
深度学习是当前人工神经网络领域的研究热点,广泛应用于字符识别、图像识别和语音识别等应用中。雷达通信目标识别是通信对抗的前提和关键。文中分析了模板匹配法、DS证据理论等传统通信目标识别方法的在特征提取、模型表达方面的不足,对深度学习神经网络在通信目标识别中的应用进行了初步探讨,并提出了一种基于深度学习的通信目标识别框架。该框架和思路同样适用于雷达对抗目标识别等问题,可为深度学习在雷达目标识别领域的应用提供支撑。  相似文献   

18.
Many anti‐collision protocols have been proposed at present. Almost all known protocols exhibit an overall identification efficiency smaller than 50%. And all of them are proposed for general purpose applications and do not consider the distribution characteristic of tag IDs in different radio frequency identification (RFID) systems. In real world, there are many RFID systems, in which the tag IDs are mostly distributed continuously, such as in container terminals, warehouse management, supply chain management, and so on. This paper presents an efficient anti‐collision protocol, named improved collision tree protocol (ICT), to identify RFID tags simultaneously. The main novelties of this paper include that the duality and certainty principle is introduced and used in ICT to improve the tag identification efficiency, and the continuous and partially continuous distributions of tag IDs are taken into account in this paper. Both the theoretical and experimental results indicate that ICT improves the tag identification efficiency up to 100% when the tag IDs are distributed continuously, and always above 50% even when the tag IDs are distributed uniformly. For straightforward and efficient, ICT can be used in various RFID tag identification conditions, especially when the tag IDs are distributed continuously or partially continuously. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   

19.
Collision and security issues are considered as barriers to RFID applications.In this paper,a parallelizable anti-collision based on chaotic sequence combined dynamic frame slotted aloha to build a high-efficiency RFID system is proposed.In the tags parallelizable identification,we design a Discrete Markov process to analyze the success identification rate.Then a mutual authentication security protocol merging chaotic anti-collision is presented.The theoretical analysis and simulation results show that the proposed identification scheme has less than 45.1%of the identification time slots compared with the OVSF-system when the length of the chaos sequence is 31.The success identification rate of the proposed chaotic anti-collision can achieve 63%when the number of the tag is100.We test the energy consumption of the presented authentication protocol,which can simultaneously solve the anti-collision and security of the UHF RFID system.  相似文献   

20.
李元忠  林睿南  朱宏  李朗 《电讯技术》2016,56(8):944-948
短程通信和射频识别技术分属物联网的传输层和感知层,具有部分共同特点。介绍了这两项技术(包括自行开发的专利技术和创新基金项目相关的关键技术)在管理对象的信息数字化、防伪、交通信号控制、海关和油气储运的可视化管理中的应用情况,指出它们还可以推广应用于物流、城市交通及车辆监控等工程中。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号