SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
International Journal of Computer Applications Technology and Research
Volume 4– Issue 8, 614 - 617, 2015, ISSN: 2319–8656
www.ijsea.com 614
Review of the Introduction and Use of RFID
Fariba Ghorbany Beram
Sama Technical and Vocational
Training College Islamic Azad
University, Shoushtar Branch,
Shoushtar, Iran
Mojtaba Khayat
Sama Technical and Vocational
Training College Islamic Azad
University, Shoushtar Branch,
Shoushtar, Iran
Sajjad Ghorbany Beram
Sama Technical and Vocational
Training College Islamic Azad
University, Shoushtar Branch,
Shoushtar, Iran
Abstract: We live in an age where technology is an integral part of human daily life. The aim of the technology is secure, accurate,
correct use of time for mankind and nature brings it may also have disadvantages and challenges. In this paper we describe the RFID
technology. Today, this technology in hospitals, shops, airports, tracking birds are used. It can be used in hospital intensive care unit
for monitoring and remote patient care, which causes it to print patients and physicians are not required to comply with very close
distance, the result of which can cause safety Patients and physicians should be. The security technology implementation is a
challenge. This paper introduces the applications, the challenges we have this technology.
Keywords: Radio Frequency identification; tag; network; challenge
1. INTRODUCTION
Radio Frequency identification (RFID) is the popular wireless
induction system [1-7]. RFID tags were initially developed as
very small electronic hardware components having as their
main function to broadcast a unique identifying number upon
request. The simplest types of RFID tags are passive devices
that not have an internal power source and are incapable of
autonomous activity. They are powered by the reader’s radio
waves, with their antenna doubling as a source of inductive
power. While admittedly a new technology, the low-cost and
high convenience value of RFID tags gives them the potential
for massive deployment, for business automation applications
and as smart, mass-market, embedded devices that support
ubiquitous applications. However, current RFID protocols are
designed to optimize performance, with lesser attention paid
to resilience and security. Consequently, most RFID systems
are inherently insecure. The general design of a simple RFID
system is displayed through the following figure:
Figure 1: Diagram describing operation of the RFID system.
2. RFID TECHNOLOGY
A typical deployment of an RFID system involves three types
of legitimate entities, namely tags, readers and back-end
servers. The tags are attached to, or embedded in, objects to
be identified. They consist of a transponder and an RF
coupling element. The coupling element has an antenna coil to
capture RF power, clock pulses and data from the RFID
reader. The readers typically contain a transceiver, a control
unit, and a coupling element, to interrogate tags. They
implement a radio interface to the tags and also a high level
interface to a backend server that processes captured data. The
back-servers are trusted entities that maintain a database
containing the information needed to identify tags, including
their identification numbers. Since the integrity of an RFID
system is entirely dependent on the proper behavior of the
server, it is assumed that the server is physically secure and
not attackable. It is certainly legitimate to consider privacy
mechanisms that reduce the trust on the back-end server—for
instance, to mitigate the ability of the server to collect user-
behavior information, or to make the server function
auditable[8]. In this paper, however, we shall not investigate
such privacy attacks. Here we shall consider the servers to be
entirely trusted following:
 Signal strength limited to a required
distance;
 Radio frequency unable to work in certain
geographical areas;
 Electromagnetic field prone to interruption from
solar and electrical storms.
The medical and healthcare sectors are using this technology
as a means to keep track of medical equipment and the
delivery of pharmaceuticals that proved to be costly in the
past when it came to tracking them down. But now this
technology is being applied as a means of protecting online
medical information systems from those who are involved in
perpetrating the criminal activity of medical identity theft.
Because the identity of every individual is centred around
recognising specific features, personality, knowledge and
traits that define who we are requires having the
International Journal of Computer Applications Technology and Research
Volume 4– Issue 8, 614 - 617, 2015, ISSN: 2319–8656
www.ijsea.com 615
implementation of a robust identity management system that
can be used in determining our individual specific features
and characteristics through the provision of unique identifiers
in recognising us[9,10]. A general RFID architecture is
depicted in Figure 2.
Figure 2: A general RFID architecture
2.1 Classification of technologies
around RFID We identify three classes to order the relation
between RFID and network technologies:
• Enabling technology
• Enhancing technology
• Concurrent technology
In Figure 3 these classes are mapped onto
the RFID will be used to characterize the different
technologies.
Figure 3: Classification of technologies around RFID
3. APPLICATIONS
The deployment of a pervasive RFID-based infrastructure in
an everyday environment holds the promise of enabling new
classes of applications that go beyond tracking and
monitoring. Such a system could, for example, support
logging and analysis of individual tag movements over time,
allowing a user to ask questions such as ”how often do I get
interrupted in my office on an average day?”. Current and
historical data on groups of tags could also be used to identify
and analyze aggregate phenomena such as the impact of
seminars on improving communication between researchers.
Real-time streams of tag reads could be used in “find my
object” applications, reminding services [11,12], and to
actuate devices. Enabling these classes of application,
however, presents a significant challenge to the system
design. First, the system must be able to consistently and
accurately read tags and it must do so at a granularity
sufficient for the intended applications. The system must
support archiving and retrieval of tag reads and real-time
reporting of new reads. To enable the monitoring of large
spaces with a possibly large number of tags, the system must
scale to handle highvolume streams of tag reads. Finally,
because such a system will manage large amounts of
(potentially sensitive) personal data from multiple users, it
must be secure and support an appropriate privacy model. In
the following section, we present our preliminary system
architecture and discuss how these application requirements
affected its design. As an example Gartner (Gartner, 2005b)
claims that the RFID market will experience an annual growth
rate somewhere between 30% and 50% in the years 2004-
2010 ending up at 3 billion USD in 2010 (see Figure 5-7).
They say this refers to “the use of RFID technologies within a
supply chain environment to improve the visibility,
management and security of cargo shipments or supply chain
assets, such as conveyances or valuable mobile assets. The
applications and hardware that are used outside of the above
environment were excluded. These would include consumer
uses, such as contactless smart cards.”
Figure 4: RFID, worldwide size and growth, 2004-2010
The IDTechEx report provides some more data as depicted in
Figure 5.
International Journal of Computer Applications Technology and Research
Volume 4– Issue 8, 614 - 617, 2015, ISSN: 2319–8656
www.ijsea.com 616
Figure 5: Total RFID market projections 2006-2016
4. PRIVACY CHALLENGES
Pervasive RFID-based deployments raise privacy concerns
because they can enable the tracking of people and personal
objects by parties that would otherwise be unable or
unauthorized to do so. These concerns involve: the physical
security of the communication between tags and readers, the
security of the data stored in and processed by the system, and
controlled access to the data. In this study, we focused on the
latter problem and studied in-situ many of the privacy
concerns experienced by the participants. Chief among the
participants’ concerns was the perceived ease with which
one’s activities could be inferred from the data (e.g., time of
day, direction of movement, and set of tags seen). We were
able to validate this concern by writing a simple script that
could detect lunch breaks with better than 75% accuracy for
three of the participants, showing that participant P1 took 29
minute lunch breaks on average, P2 took about 32 minutes,
and P3 took the longest (40 minute) breaks. Similarly, it was
easy to infer potentially more sensitive information such as
when and how many times a participant used the restroom in a
day. Our initial approach to addressing these privacy concerns
was to allow display and deletion of one’s personal data via
the web interface. The limitation of this approach is that a user
can still see another’s data before that data is deleted. A more
appropriate option would be for users to specify high-level
rules that describe which TREs should be accessible to which
users and which TREs should be dropped automatically (e.g.,
all trips from my office to the restroom shorter than 2
minutes)[13]. For example, a query on a colleague’s location
could return approximate information (e.g., 4th floor) by
default, or more exact information (e.g., room 490) only a few
times per day. We are currently exploring the suitability of
such techniques for various applications. Finally, to protect
the privacy of non-participants, each Node Server
automatically discards any tag reads for a tag that is not
registered in our database[14].
5. CONCLUSION
In this paper, we motivated the benefits of RFID. As
mentioned, this technology has many applications is. Studies
show that in the near future this technology will be
increasingly used and welcomed. By examining the current
challenges in the technology and resolving the problems with
reliability Khatrbyshtr can use this technology.
6. REFERENCES
[1] Ajay Malik, "RTLS for Dummies," publishing by Wiley
publishing. Inc., USA, Indianapolis, Indiana, (2009) ISBN:
978-0-470-39868-5.
[2] J. Zhou, and J. Shi "RFID localization algorithms and
applications a review," The International Journal of
Intelligent Manufacturing, Vol. 20 (6), Springer Netherlands,
pp. 695-707, 2008.
[3] R. Want, "An Introduction to RFID Technology,"
IEEE Pervasive Computing, Vol. 5, pp. 25-33, 2006.
[4] G. Barber, and E. Tsibertzopoulos, "An Analysis of
Using EPCglobal class-1 generation-2 RFID Technology for
Wireless Asset Management," IEEE Military
Communications Conference (MILCOM 2005), Vol. 1, pp.
245-251, October 2005.
[5] K. Ahsan, H. Shah, and Paul Kingston, "RFID
Applications: An Introductory and Exploratory Study,"
IJCSI International Journal of Computer Science Issues,
Vol. 7, Issue 1, No. 3, January 2010.
[6] Benjamin D. Braaten, and Robert P. Scheeler, "Design
of Passive UHF RFID Tag Antennas Using Metamaterial-
Based Structures and Techniques," Radio Frequency
Identification Fundamentals and Applications, Design
Methods and Solutions, Book edited by: Cristina Turcu, pp.
324, February 2010,ISBN 9789537619725.
[7] Daniel M. Dobkin, "The RF in RFID: Passive UHF
RFID in Practice," Chapter 3: Radio Basics for UHF
RFID, (2007), ISBN: 9780750682091.
[8] Smith, J. R. RFID-based techniques for human-activity
detection. Communications of the ACM, 48(9), Sept. 2005.
[9] Songini, M. L. Wal-Mart details its RFID journey.
ComputerWorld, Mar. 2006.
[10] Stanford, V. Pervasive computing goes the last hundred
feet with RFID systems. IEEE Pervasive Computing, 2(2),
Apr. 2003.
[11] Sweeney, L. k-anonymity: A model for protecting
privacy. IJUFKS, 10(5):557–570, Oct. 2002.
[18] Want, R. The magic of RFID. ACM Queue, 2(7), Oct.
2004.
[12] Want, R. et. al. An overview of the PARCTAB
ubiquitous computing experiment. IEEE Personal
Communications, 2(6):28–33, Dec 1995.
International Journal of Computer Applications Technology and Research
Volume 4– Issue 8, 614 - 617, 2015, ISSN: 2319–8656
www.ijsea.com 617
[13] Want, R. et. al. Bridging physical and virtual worlds with
electronic tags. In CHI, pages 370–377, 1999.
[14] E. Wu, Y. Diao, and S. Rizvi. High-performance
complex event processing over streams. In Proc. of the 2006
SIGMOD Conf., June 2006

Más contenido relacionado

La actualidad más candente

IRJET- Library Management using RFID
IRJET-  	  Library Management using RFIDIRJET-  	  Library Management using RFID
IRJET- Library Management using RFIDIRJET Journal
 
Anomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile AssessmentAnomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile Assessmentijtsrd
 
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...IJECEIAES
 
IRJET - Image Watermarking using QR Code
IRJET -  	  Image Watermarking using QR CodeIRJET -  	  Image Watermarking using QR Code
IRJET - Image Watermarking using QR CodeIRJET Journal
 
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...IRJET Journal
 
Comparison study of machine learning classifiers to detect anomalies
Comparison study of machine learning classifiers  to detect anomalies Comparison study of machine learning classifiers  to detect anomalies
Comparison study of machine learning classifiers to detect anomalies IJECEIAES
 
Wireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field StudyWireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field StudyIJNSA Journal
 
A research survey rfid security & privacy issue
A research survey rfid security & privacy issueA research survey rfid security & privacy issue
A research survey rfid security & privacy issuecsandit
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkIOSR Journals
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemAM Publications
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewIJERA Editor
 
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...IJECEIAES
 

La actualidad más candente (16)

IRJET- Library Management using RFID
IRJET-  	  Library Management using RFIDIRJET-  	  Library Management using RFID
IRJET- Library Management using RFID
 
Anomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile AssessmentAnomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile Assessment
 
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
 
IRJET - Image Watermarking using QR Code
IRJET -  	  Image Watermarking using QR CodeIRJET -  	  Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
 
Kx3518741881
Kx3518741881Kx3518741881
Kx3518741881
 
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
 
Comparison study of machine learning classifiers to detect anomalies
Comparison study of machine learning classifiers  to detect anomalies Comparison study of machine learning classifiers  to detect anomalies
Comparison study of machine learning classifiers to detect anomalies
 
healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...
 
Wireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field StudyWireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field Study
 
A research survey rfid security & privacy issue
A research survey rfid security & privacy issueA research survey rfid security & privacy issue
A research survey rfid security & privacy issue
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection System
 
verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A Review
 
Assessment and Mitigation of Risks Involved in Electronics Payment Systems
Assessment and Mitigation of Risks Involved in Electronics Payment Systems Assessment and Mitigation of Risks Involved in Electronics Payment Systems
Assessment and Mitigation of Risks Involved in Electronics Payment Systems
 
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
 

Destacado

Expression of Query in XML object-oriented database
Expression of Query in XML object-oriented databaseExpression of Query in XML object-oriented database
Expression of Query in XML object-oriented databaseEditor IJCATR
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
 
Improved Learning Management System (i- LMS): A Flat Form for Content Creatio...
Improved Learning Management System (i- LMS): A Flat Form for Content Creatio...Improved Learning Management System (i- LMS): A Flat Form for Content Creatio...
Improved Learning Management System (i- LMS): A Flat Form for Content Creatio...Editor IJCATR
 
A Survey on the Clustering Algorithms in Sales Data Mining
A Survey on the Clustering Algorithms in Sales Data MiningA Survey on the Clustering Algorithms in Sales Data Mining
A Survey on the Clustering Algorithms in Sales Data MiningEditor IJCATR
 
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...Editor IJCATR
 
Route Update Overhead Reduction in MANETS Using Node Clustering
Route Update Overhead Reduction in MANETS Using Node ClusteringRoute Update Overhead Reduction in MANETS Using Node Clustering
Route Update Overhead Reduction in MANETS Using Node ClusteringEditor IJCATR
 
Duplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsDuplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsEditor IJCATR
 
Duplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsDuplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsEditor IJCATR
 
Performance Prediction of Service-Oriented Architecture - A survey
Performance Prediction of Service-Oriented Architecture - A surveyPerformance Prediction of Service-Oriented Architecture - A survey
Performance Prediction of Service-Oriented Architecture - A surveyEditor IJCATR
 
Impacts of Object Oriented Programming on Web Application Development
Impacts of Object Oriented Programming on Web Application DevelopmentImpacts of Object Oriented Programming on Web Application Development
Impacts of Object Oriented Programming on Web Application DevelopmentEditor IJCATR
 
Internal Architecture of Junction Based Router
Internal Architecture of Junction Based RouterInternal Architecture of Junction Based Router
Internal Architecture of Junction Based RouterEditor IJCATR
 
A Comparison between FPPSO and B&B Algorithm for Solving Integer Programming ...
A Comparison between FPPSO and B&B Algorithm for Solving Integer Programming ...A Comparison between FPPSO and B&B Algorithm for Solving Integer Programming ...
A Comparison between FPPSO and B&B Algorithm for Solving Integer Programming ...Editor IJCATR
 
Automatic License Plate Recognition using OpenCV
Automatic License Plate Recognition using OpenCVAutomatic License Plate Recognition using OpenCV
Automatic License Plate Recognition using OpenCVEditor IJCATR
 
A Survey on Decision Support Systems in Social Media
A Survey on Decision Support Systems in Social MediaA Survey on Decision Support Systems in Social Media
A Survey on Decision Support Systems in Social MediaEditor IJCATR
 
An Unsupervised Change Detection in Satellite IMAGES Using MRFFCM Clustering
An Unsupervised Change Detection in Satellite IMAGES Using MRFFCM ClusteringAn Unsupervised Change Detection in Satellite IMAGES Using MRFFCM Clustering
An Unsupervised Change Detection in Satellite IMAGES Using MRFFCM ClusteringEditor IJCATR
 

Destacado (18)

Expression of Query in XML object-oriented database
Expression of Query in XML object-oriented databaseExpression of Query in XML object-oriented database
Expression of Query in XML object-oriented database
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
 
Improved Learning Management System (i- LMS): A Flat Form for Content Creatio...
Improved Learning Management System (i- LMS): A Flat Form for Content Creatio...Improved Learning Management System (i- LMS): A Flat Form for Content Creatio...
Improved Learning Management System (i- LMS): A Flat Form for Content Creatio...
 
Ijcatr04051015
Ijcatr04051015Ijcatr04051015
Ijcatr04051015
 
A Survey on the Clustering Algorithms in Sales Data Mining
A Survey on the Clustering Algorithms in Sales Data MiningA Survey on the Clustering Algorithms in Sales Data Mining
A Survey on the Clustering Algorithms in Sales Data Mining
 
Ijsea04031002
Ijsea04031002Ijsea04031002
Ijsea04031002
 
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
 
Ijsea04031012
Ijsea04031012Ijsea04031012
Ijsea04031012
 
Route Update Overhead Reduction in MANETS Using Node Clustering
Route Update Overhead Reduction in MANETS Using Node ClusteringRoute Update Overhead Reduction in MANETS Using Node Clustering
Route Update Overhead Reduction in MANETS Using Node Clustering
 
Duplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsDuplicate Code Detection using Control Statements
Duplicate Code Detection using Control Statements
 
Duplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsDuplicate Code Detection using Control Statements
Duplicate Code Detection using Control Statements
 
Performance Prediction of Service-Oriented Architecture - A survey
Performance Prediction of Service-Oriented Architecture - A surveyPerformance Prediction of Service-Oriented Architecture - A survey
Performance Prediction of Service-Oriented Architecture - A survey
 
Impacts of Object Oriented Programming on Web Application Development
Impacts of Object Oriented Programming on Web Application DevelopmentImpacts of Object Oriented Programming on Web Application Development
Impacts of Object Oriented Programming on Web Application Development
 
Internal Architecture of Junction Based Router
Internal Architecture of Junction Based RouterInternal Architecture of Junction Based Router
Internal Architecture of Junction Based Router
 
A Comparison between FPPSO and B&B Algorithm for Solving Integer Programming ...
A Comparison between FPPSO and B&B Algorithm for Solving Integer Programming ...A Comparison between FPPSO and B&B Algorithm for Solving Integer Programming ...
A Comparison between FPPSO and B&B Algorithm for Solving Integer Programming ...
 
Automatic License Plate Recognition using OpenCV
Automatic License Plate Recognition using OpenCVAutomatic License Plate Recognition using OpenCV
Automatic License Plate Recognition using OpenCV
 
A Survey on Decision Support Systems in Social Media
A Survey on Decision Support Systems in Social MediaA Survey on Decision Support Systems in Social Media
A Survey on Decision Support Systems in Social Media
 
An Unsupervised Change Detection in Satellite IMAGES Using MRFFCM Clustering
An Unsupervised Change Detection in Satellite IMAGES Using MRFFCM ClusteringAn Unsupervised Change Detection in Satellite IMAGES Using MRFFCM Clustering
An Unsupervised Change Detection in Satellite IMAGES Using MRFFCM Clustering
 

Similar a Review of the Introduction and Use of RFID

A novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID dataA novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID dataijujournal
 
A novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID dataA novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID dataijujournal
 
A sector analysis for rfid human implantation
A sector analysis for rfid human implantationA sector analysis for rfid human implantation
A sector analysis for rfid human implantationAlexander Decker
 
A sector analysis for rfid human implantation
A sector analysis for rfid human implantationA sector analysis for rfid human implantation
A sector analysis for rfid human implantationAlexander Decker
 
IRJET- EMR using RFID Technology
IRJET- EMR using RFID TechnologyIRJET- EMR using RFID Technology
IRJET- EMR using RFID TechnologyIRJET Journal
 
IRJET- Improvisation in the Attendance Supervision Method through RFID ba...
IRJET-  	  Improvisation in the Attendance Supervision Method through RFID ba...IRJET-  	  Improvisation in the Attendance Supervision Method through RFID ba...
IRJET- Improvisation in the Attendance Supervision Method through RFID ba...IRJET Journal
 
Secured e-payment system based on automated authentication data and iterated ...
Secured e-payment system based on automated authentication data and iterated ...Secured e-payment system based on automated authentication data and iterated ...
Secured e-payment system based on automated authentication data and iterated ...TELKOMNIKA JOURNAL
 
RFID Technology: An Upgradation for Society
RFID Technology: An Upgradation for SocietyRFID Technology: An Upgradation for Society
RFID Technology: An Upgradation for SocietyIRJET Journal
 
Building a Smart Hospital using RFID technologiesPatrik Fu.docx
Building a Smart Hospital using RFID technologiesPatrik Fu.docxBuilding a Smart Hospital using RFID technologiesPatrik Fu.docx
Building a Smart Hospital using RFID technologiesPatrik Fu.docxhartrobert670
 
07.dsn.rfid reliability
07.dsn.rfid reliability07.dsn.rfid reliability
07.dsn.rfid reliabilitynikhiltiware
 
Radio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsRadio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsAhmad Sharifi
 
11 International Journal for Modern Trends in Science and Technology Smart At...
11 International Journal for Modern Trends in Science and Technology Smart At...11 International Journal for Modern Trends in Science and Technology Smart At...
11 International Journal for Modern Trends in Science and Technology Smart At...IJMTST Journal
 
RFID Technology An Overview
RFID Technology An OverviewRFID Technology An Overview
RFID Technology An Overviewijtsrd
 
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)inventionjournals
 
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodA Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodLuz Martinez
 
A UHF Radio Frequency Identification (RFID) System For Healthcare Design And...
A UHF Radio Frequency Identification (RFID) System For Healthcare  Design And...A UHF Radio Frequency Identification (RFID) System For Healthcare  Design And...
A UHF Radio Frequency Identification (RFID) System For Healthcare Design And...Jeff Nelson
 
Rfid based traffic controller using gsm
Rfid based traffic controller using gsmRfid based traffic controller using gsm
Rfid based traffic controller using gsmramesh chatty
 

Similar a Review of the Introduction and Use of RFID (20)

A novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID dataA novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID data
 
A novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID dataA novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID data
 
A sector analysis for rfid human implantation
A sector analysis for rfid human implantationA sector analysis for rfid human implantation
A sector analysis for rfid human implantation
 
A sector analysis for rfid human implantation
A sector analysis for rfid human implantationA sector analysis for rfid human implantation
A sector analysis for rfid human implantation
 
IRJET- EMR using RFID Technology
IRJET- EMR using RFID TechnologyIRJET- EMR using RFID Technology
IRJET- EMR using RFID Technology
 
IRJET- Improvisation in the Attendance Supervision Method through RFID ba...
IRJET-  	  Improvisation in the Attendance Supervision Method through RFID ba...IRJET-  	  Improvisation in the Attendance Supervision Method through RFID ba...
IRJET- Improvisation in the Attendance Supervision Method through RFID ba...
 
Secured e-payment system based on automated authentication data and iterated ...
Secured e-payment system based on automated authentication data and iterated ...Secured e-payment system based on automated authentication data and iterated ...
Secured e-payment system based on automated authentication data and iterated ...
 
RFID Technology: An Upgradation for Society
RFID Technology: An Upgradation for SocietyRFID Technology: An Upgradation for Society
RFID Technology: An Upgradation for Society
 
Building a Smart Hospital using RFID technologiesPatrik Fu.docx
Building a Smart Hospital using RFID technologiesPatrik Fu.docxBuilding a Smart Hospital using RFID technologiesPatrik Fu.docx
Building a Smart Hospital using RFID technologiesPatrik Fu.docx
 
07.dsn.rfid reliability
07.dsn.rfid reliability07.dsn.rfid reliability
07.dsn.rfid reliability
 
Radio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsRadio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutions
 
11 International Journal for Modern Trends in Science and Technology Smart At...
11 International Journal for Modern Trends in Science and Technology Smart At...11 International Journal for Modern Trends in Science and Technology Smart At...
11 International Journal for Modern Trends in Science and Technology Smart At...
 
Rfid3
Rfid3Rfid3
Rfid3
 
RFID Technology An Overview
RFID Technology An OverviewRFID Technology An Overview
RFID Technology An Overview
 
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
 
Chowdhury rfidhpms
Chowdhury rfidhpmsChowdhury rfidhpms
Chowdhury rfidhpms
 
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodA Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
 
Sallabi2016
Sallabi2016Sallabi2016
Sallabi2016
 
A UHF Radio Frequency Identification (RFID) System For Healthcare Design And...
A UHF Radio Frequency Identification (RFID) System For Healthcare  Design And...A UHF Radio Frequency Identification (RFID) System For Healthcare  Design And...
A UHF Radio Frequency Identification (RFID) System For Healthcare Design And...
 
Rfid based traffic controller using gsm
Rfid based traffic controller using gsmRfid based traffic controller using gsm
Rfid based traffic controller using gsm
 

Más de Editor IJCATR

Text Mining in Digital Libraries using OKAPI BM25 Model
 Text Mining in Digital Libraries using OKAPI BM25 Model Text Mining in Digital Libraries using OKAPI BM25 Model
Text Mining in Digital Libraries using OKAPI BM25 ModelEditor IJCATR
 
Green Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyGreen Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyEditor IJCATR
 
Policies for Green Computing and E-Waste in Nigeria
 Policies for Green Computing and E-Waste in Nigeria Policies for Green Computing and E-Waste in Nigeria
Policies for Green Computing and E-Waste in NigeriaEditor IJCATR
 
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Editor IJCATR
 
Optimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsOptimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsEditor IJCATR
 
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Editor IJCATR
 
Web Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteWeb Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteEditor IJCATR
 
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 Evaluating Semantic Similarity between Biomedical Concepts/Classes through S... Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...Editor IJCATR
 
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 Semantic Similarity Measures between Terms in the Biomedical Domain within f... Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Semantic Similarity Measures between Terms in the Biomedical Domain within f...Editor IJCATR
 
A Strategy for Improving the Performance of Small Files in Openstack Swift
 A Strategy for Improving the Performance of Small Files in Openstack Swift  A Strategy for Improving the Performance of Small Files in Openstack Swift
A Strategy for Improving the Performance of Small Files in Openstack Swift Editor IJCATR
 
Integrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationIntegrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationEditor IJCATR
 
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 Assessment of the Efficiency of Customer Order Management System: A Case Stu... Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Assessment of the Efficiency of Customer Order Management System: A Case Stu...Editor IJCATR
 
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Editor IJCATR
 
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
 
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Editor IJCATR
 
Hangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineHangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineEditor IJCATR
 
Application of 3D Printing in Education
Application of 3D Printing in EducationApplication of 3D Printing in Education
Application of 3D Printing in EducationEditor IJCATR
 
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Editor IJCATR
 
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Editor IJCATR
 
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsDecay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsEditor IJCATR
 

Más de Editor IJCATR (20)

Text Mining in Digital Libraries using OKAPI BM25 Model
 Text Mining in Digital Libraries using OKAPI BM25 Model Text Mining in Digital Libraries using OKAPI BM25 Model
Text Mining in Digital Libraries using OKAPI BM25 Model
 
Green Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyGreen Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendly
 
Policies for Green Computing and E-Waste in Nigeria
 Policies for Green Computing and E-Waste in Nigeria Policies for Green Computing and E-Waste in Nigeria
Policies for Green Computing and E-Waste in Nigeria
 
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
 
Optimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsOptimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation Conditions
 
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
 
Web Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteWeb Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source Site
 
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 Evaluating Semantic Similarity between Biomedical Concepts/Classes through S... Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 Semantic Similarity Measures between Terms in the Biomedical Domain within f... Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 
A Strategy for Improving the Performance of Small Files in Openstack Swift
 A Strategy for Improving the Performance of Small Files in Openstack Swift  A Strategy for Improving the Performance of Small Files in Openstack Swift
A Strategy for Improving the Performance of Small Files in Openstack Swift
 
Integrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationIntegrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and Registration
 
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 Assessment of the Efficiency of Customer Order Management System: A Case Stu... Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
 
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
 
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
 
Hangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineHangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector Machine
 
Application of 3D Printing in Education
Application of 3D Printing in EducationApplication of 3D Printing in Education
Application of 3D Printing in Education
 
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
 
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
 
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsDecay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
 

Último

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Último (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

Review of the Introduction and Use of RFID

  • 1. International Journal of Computer Applications Technology and Research Volume 4– Issue 8, 614 - 617, 2015, ISSN: 2319–8656 www.ijsea.com 614 Review of the Introduction and Use of RFID Fariba Ghorbany Beram Sama Technical and Vocational Training College Islamic Azad University, Shoushtar Branch, Shoushtar, Iran Mojtaba Khayat Sama Technical and Vocational Training College Islamic Azad University, Shoushtar Branch, Shoushtar, Iran Sajjad Ghorbany Beram Sama Technical and Vocational Training College Islamic Azad University, Shoushtar Branch, Shoushtar, Iran Abstract: We live in an age where technology is an integral part of human daily life. The aim of the technology is secure, accurate, correct use of time for mankind and nature brings it may also have disadvantages and challenges. In this paper we describe the RFID technology. Today, this technology in hospitals, shops, airports, tracking birds are used. It can be used in hospital intensive care unit for monitoring and remote patient care, which causes it to print patients and physicians are not required to comply with very close distance, the result of which can cause safety Patients and physicians should be. The security technology implementation is a challenge. This paper introduces the applications, the challenges we have this technology. Keywords: Radio Frequency identification; tag; network; challenge 1. INTRODUCTION Radio Frequency identification (RFID) is the popular wireless induction system [1-7]. RFID tags were initially developed as very small electronic hardware components having as their main function to broadcast a unique identifying number upon request. The simplest types of RFID tags are passive devices that not have an internal power source and are incapable of autonomous activity. They are powered by the reader’s radio waves, with their antenna doubling as a source of inductive power. While admittedly a new technology, the low-cost and high convenience value of RFID tags gives them the potential for massive deployment, for business automation applications and as smart, mass-market, embedded devices that support ubiquitous applications. However, current RFID protocols are designed to optimize performance, with lesser attention paid to resilience and security. Consequently, most RFID systems are inherently insecure. The general design of a simple RFID system is displayed through the following figure: Figure 1: Diagram describing operation of the RFID system. 2. RFID TECHNOLOGY A typical deployment of an RFID system involves three types of legitimate entities, namely tags, readers and back-end servers. The tags are attached to, or embedded in, objects to be identified. They consist of a transponder and an RF coupling element. The coupling element has an antenna coil to capture RF power, clock pulses and data from the RFID reader. The readers typically contain a transceiver, a control unit, and a coupling element, to interrogate tags. They implement a radio interface to the tags and also a high level interface to a backend server that processes captured data. The back-servers are trusted entities that maintain a database containing the information needed to identify tags, including their identification numbers. Since the integrity of an RFID system is entirely dependent on the proper behavior of the server, it is assumed that the server is physically secure and not attackable. It is certainly legitimate to consider privacy mechanisms that reduce the trust on the back-end server—for instance, to mitigate the ability of the server to collect user- behavior information, or to make the server function auditable[8]. In this paper, however, we shall not investigate such privacy attacks. Here we shall consider the servers to be entirely trusted following:  Signal strength limited to a required distance;  Radio frequency unable to work in certain geographical areas;  Electromagnetic field prone to interruption from solar and electrical storms. The medical and healthcare sectors are using this technology as a means to keep track of medical equipment and the delivery of pharmaceuticals that proved to be costly in the past when it came to tracking them down. But now this technology is being applied as a means of protecting online medical information systems from those who are involved in perpetrating the criminal activity of medical identity theft. Because the identity of every individual is centred around recognising specific features, personality, knowledge and traits that define who we are requires having the
  • 2. International Journal of Computer Applications Technology and Research Volume 4– Issue 8, 614 - 617, 2015, ISSN: 2319–8656 www.ijsea.com 615 implementation of a robust identity management system that can be used in determining our individual specific features and characteristics through the provision of unique identifiers in recognising us[9,10]. A general RFID architecture is depicted in Figure 2. Figure 2: A general RFID architecture 2.1 Classification of technologies around RFID We identify three classes to order the relation between RFID and network technologies: • Enabling technology • Enhancing technology • Concurrent technology In Figure 3 these classes are mapped onto the RFID will be used to characterize the different technologies. Figure 3: Classification of technologies around RFID 3. APPLICATIONS The deployment of a pervasive RFID-based infrastructure in an everyday environment holds the promise of enabling new classes of applications that go beyond tracking and monitoring. Such a system could, for example, support logging and analysis of individual tag movements over time, allowing a user to ask questions such as ”how often do I get interrupted in my office on an average day?”. Current and historical data on groups of tags could also be used to identify and analyze aggregate phenomena such as the impact of seminars on improving communication between researchers. Real-time streams of tag reads could be used in “find my object” applications, reminding services [11,12], and to actuate devices. Enabling these classes of application, however, presents a significant challenge to the system design. First, the system must be able to consistently and accurately read tags and it must do so at a granularity sufficient for the intended applications. The system must support archiving and retrieval of tag reads and real-time reporting of new reads. To enable the monitoring of large spaces with a possibly large number of tags, the system must scale to handle highvolume streams of tag reads. Finally, because such a system will manage large amounts of (potentially sensitive) personal data from multiple users, it must be secure and support an appropriate privacy model. In the following section, we present our preliminary system architecture and discuss how these application requirements affected its design. As an example Gartner (Gartner, 2005b) claims that the RFID market will experience an annual growth rate somewhere between 30% and 50% in the years 2004- 2010 ending up at 3 billion USD in 2010 (see Figure 5-7). They say this refers to “the use of RFID technologies within a supply chain environment to improve the visibility, management and security of cargo shipments or supply chain assets, such as conveyances or valuable mobile assets. The applications and hardware that are used outside of the above environment were excluded. These would include consumer uses, such as contactless smart cards.” Figure 4: RFID, worldwide size and growth, 2004-2010 The IDTechEx report provides some more data as depicted in Figure 5.
  • 3. International Journal of Computer Applications Technology and Research Volume 4– Issue 8, 614 - 617, 2015, ISSN: 2319–8656 www.ijsea.com 616 Figure 5: Total RFID market projections 2006-2016 4. PRIVACY CHALLENGES Pervasive RFID-based deployments raise privacy concerns because they can enable the tracking of people and personal objects by parties that would otherwise be unable or unauthorized to do so. These concerns involve: the physical security of the communication between tags and readers, the security of the data stored in and processed by the system, and controlled access to the data. In this study, we focused on the latter problem and studied in-situ many of the privacy concerns experienced by the participants. Chief among the participants’ concerns was the perceived ease with which one’s activities could be inferred from the data (e.g., time of day, direction of movement, and set of tags seen). We were able to validate this concern by writing a simple script that could detect lunch breaks with better than 75% accuracy for three of the participants, showing that participant P1 took 29 minute lunch breaks on average, P2 took about 32 minutes, and P3 took the longest (40 minute) breaks. Similarly, it was easy to infer potentially more sensitive information such as when and how many times a participant used the restroom in a day. Our initial approach to addressing these privacy concerns was to allow display and deletion of one’s personal data via the web interface. The limitation of this approach is that a user can still see another’s data before that data is deleted. A more appropriate option would be for users to specify high-level rules that describe which TREs should be accessible to which users and which TREs should be dropped automatically (e.g., all trips from my office to the restroom shorter than 2 minutes)[13]. For example, a query on a colleague’s location could return approximate information (e.g., 4th floor) by default, or more exact information (e.g., room 490) only a few times per day. We are currently exploring the suitability of such techniques for various applications. Finally, to protect the privacy of non-participants, each Node Server automatically discards any tag reads for a tag that is not registered in our database[14]. 5. CONCLUSION In this paper, we motivated the benefits of RFID. As mentioned, this technology has many applications is. Studies show that in the near future this technology will be increasingly used and welcomed. By examining the current challenges in the technology and resolving the problems with reliability Khatrbyshtr can use this technology. 6. REFERENCES [1] Ajay Malik, "RTLS for Dummies," publishing by Wiley publishing. Inc., USA, Indianapolis, Indiana, (2009) ISBN: 978-0-470-39868-5. [2] J. Zhou, and J. Shi "RFID localization algorithms and applications a review," The International Journal of Intelligent Manufacturing, Vol. 20 (6), Springer Netherlands, pp. 695-707, 2008. [3] R. Want, "An Introduction to RFID Technology," IEEE Pervasive Computing, Vol. 5, pp. 25-33, 2006. [4] G. Barber, and E. Tsibertzopoulos, "An Analysis of Using EPCglobal class-1 generation-2 RFID Technology for Wireless Asset Management," IEEE Military Communications Conference (MILCOM 2005), Vol. 1, pp. 245-251, October 2005. [5] K. Ahsan, H. Shah, and Paul Kingston, "RFID Applications: An Introductory and Exploratory Study," IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 1, No. 3, January 2010. [6] Benjamin D. Braaten, and Robert P. Scheeler, "Design of Passive UHF RFID Tag Antennas Using Metamaterial- Based Structures and Techniques," Radio Frequency Identification Fundamentals and Applications, Design Methods and Solutions, Book edited by: Cristina Turcu, pp. 324, February 2010,ISBN 9789537619725. [7] Daniel M. Dobkin, "The RF in RFID: Passive UHF RFID in Practice," Chapter 3: Radio Basics for UHF RFID, (2007), ISBN: 9780750682091. [8] Smith, J. R. RFID-based techniques for human-activity detection. Communications of the ACM, 48(9), Sept. 2005. [9] Songini, M. L. Wal-Mart details its RFID journey. ComputerWorld, Mar. 2006. [10] Stanford, V. Pervasive computing goes the last hundred feet with RFID systems. IEEE Pervasive Computing, 2(2), Apr. 2003. [11] Sweeney, L. k-anonymity: A model for protecting privacy. IJUFKS, 10(5):557–570, Oct. 2002. [18] Want, R. The magic of RFID. ACM Queue, 2(7), Oct. 2004. [12] Want, R. et. al. An overview of the PARCTAB ubiquitous computing experiment. IEEE Personal Communications, 2(6):28–33, Dec 1995.
  • 4. International Journal of Computer Applications Technology and Research Volume 4– Issue 8, 614 - 617, 2015, ISSN: 2319–8656 www.ijsea.com 617 [13] Want, R. et. al. Bridging physical and virtual worlds with electronic tags. In CHI, pages 370–377, 1999. [14] E. Wu, Y. Diao, and S. Rizvi. High-performance complex event processing over streams. In Proc. of the 2006 SIGMOD Conf., June 2006