期刊文献+
共找到63篇文章
< 1 2 4 >
每页显示 20 50 100
Application of Radio Frequency Identification (RFID) in Dairy Information Management 被引量:3
1
作者 Wu Hong-da 《Journal of Northeast Agricultural University(English Edition)》 CAS 2012年第1期78-81,共4页
As a kind of brand-new technology, radio frequency identification management, data control and acquisition. This paper introduced food safety system construction, analyzed the advantages and problems in dairy modem su... As a kind of brand-new technology, radio frequency identification management, data control and acquisition. This paper introduced food safety system construction, analyzed the advantages and problems in dairy modem suggestions for solution according to the practical situation. (RFID) plays an important role in dairy information tracing and culture function extension of managing breeding technology, and finally put forward some 展开更多
关键词 radio frequency identification rfid electronic identification tag CONTROL TRACING
下载PDF
A Modified Split⁃Ring Resonator Antenna for Radio Frequency Identification Tag 被引量:1
2
作者 CHEN Weikang NIU Zhenyi +2 位作者 LI Mengyuan XU Qian GU Changqing 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI CSCD 2021年第3期512-519,共8页
A compact antenna formed by three concentric split rings for ultra-high frequency(UHF)radio frequency identification(RFID)tag is proposed in this paper.The antenna is composed of two parts,an outer short-circuited rin... A compact antenna formed by three concentric split rings for ultra-high frequency(UHF)radio frequency identification(RFID)tag is proposed in this paper.The antenna is composed of two parts,an outer short-circuited ring modified from a traditional split-ring resonator(SRR)antenna and an inner SRR load,so the antenna can be regarded as a short-circuited ring loaded with SRR.According to the transmission line theory,to conjugate match with the capacitive input-impedance of a tag chip,the length of the short-circuited ring isλg/4 shorter than that of an open-circuited dipole of a traditional SRR antenna,whereλg is the wavelengh of the operating frequency.Hence,the size of the proposed antenna is more compact than that of the traditional SRR antenna.Thereafter,the proposed antenna is simulated and optimized by ANSYS high-frequency structure simulator(HFSS).The impedance,efficiency,and mutual coupling of the fabricated antenna are tested in a reverberation chamber(RC).The results show that the size of the presented antenna is 83%smaller than that of the traditional SRR antenna and the proposed antenna can cover the whole UHF RFID operating frequency band worldwide(840—960 MHz).The measured read range of the tag exhibits maximum values of 45 cm in free space and 37 cm under dense tag environment. 展开更多
关键词 radio frequency identification(rfid) compact antenna split-ring resonator(SRR) reverberation chamber(RC) dense tag environment
下载PDF
Remanufacturing Closed-Loop Supply Chain Model with Radio Frequency Identification Affecting Recycling Rate
3
作者 YANG Ai-feng WAN Si CHEN Ao 《Journal of Donghua University(English Edition)》 EI CAS 2016年第6期933-938,共6页
In order to construct a resource-saving and environment- friendly society, the advantages of radio frequency identification (RFID) were considered. And it put forward the idea of introducing RFID in the recycling ac... In order to construct a resource-saving and environment- friendly society, the advantages of radio frequency identification (RFID) were considered. And it put forward the idea of introducing RFID in the recycling activities of waste products. Taking into account such elements as the technical level of RFID, cost saving from remanufacturing and the cost of RFID tags, both centralized and decentralized supply chain models with different participants in waste product collection were created, in order to determine the optimal pricing strategy and RFID technical level. In the end, sensitivity analyses were conducted to analyze the impacts of scaling parameter for additional increased recovery rate with RFED on pricing and RFID technology level, and impacts of cost saving on the profits of participants in different remanufacturing closed-loop supply chain models. 展开更多
关键词 radio frequency identification(rfid) technology closedloop supply chain REMANUFACTURING Stackelberg game PRICING
下载PDF
Recovery of Collided RFID Tags With Frequency Drift on Physical Layer 被引量:3
4
作者 Junzhi Li Haifeng Wu Yu Zeng 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2020年第6期1593-1603,共11页
In a passive ultra-high frequency(UHF)radio frequency identification(RFID)system,the recovery of collided tag signals on a physical layer can enhance identification efficiency.However,frequency drift is very common in... In a passive ultra-high frequency(UHF)radio frequency identification(RFID)system,the recovery of collided tag signals on a physical layer can enhance identification efficiency.However,frequency drift is very common in UHF RFID systems,and will have an influence on the recovery on the physical layer.To address the problem of recovery with the frequency drift,this paper adopts a radial basis function(RBF)network to separate the collision signals,and decode the signals via FM0 to recovery collided RFID tags.Numerical results show that the method in this paper has better performance of symbol error rate(SER)and separation efficiency compared to conventional methods when frequency drift occurs. 展开更多
关键词 frequency drift radial basis function(RBF) radio frequency identification(rfid) separation efficiency tag collision
下载PDF
Capture-aware Bayesian RFID Tag Estimate for Large-scale Identification 被引量:1
5
作者 Haifeng Wu Yang Wang Yu Zeng 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2018年第1期119-127,共9页
Dynamic framed slotted Aloha algorithm is one of popular passive radio frequency identification(RFID) tag anticollision algorithms. In the algorithm, a frame length requires dynamical adjustment to achieve higher iden... Dynamic framed slotted Aloha algorithm is one of popular passive radio frequency identification(RFID) tag anticollision algorithms. In the algorithm, a frame length requires dynamical adjustment to achieve higher identification efficiency.Generally, the adjustment of the frame length is not only related to the number of tags, but also to the occurrence probability of capture effect. Existing algorithms could estimate both the number of tags and the probability of capture effect. Under large-scale RFID tag identification, however, the number of tags would be much larger than an initial frame length. In this scenario, the existing algorithm's estimation errors would substantially increase. In this paper, we propose a novel algorithm called capture-aware Bayesian estimate, which adopts Bayesian rules to accurately estimate the number and the probability simultaneously. From numerical results, the proposed algorithm adapts well to the large-scale RFID tag identification. It has lower estimation errors than the existing algorithms. Further,the identification efficiency from the proposed estimate is also higher than the existing algorithms. 展开更多
关键词 ALOHA BAYESIAN capture effect LARGE-SCALE radio frequency identification(rfid)
下载PDF
面向RFID供应链应用系统的标签处理过程建模方法 被引量:4
6
作者 钟叶 武岳山 沈玉龙 《计算机应用研究》 CSCD 北大核心 2020年第S01期197-198,共2页
RFID技术无法适应不同RFID应用场景的处理过程需求,致使RFID供应链应用系统的可重用性差,造成许多重复的软件设计和开发过程。为此,通过分析RFID供应链应用系统的业务特点,提取业务驱动力,构建应用场景模型,抽象供应链的业务工单,设计... RFID技术无法适应不同RFID应用场景的处理过程需求,致使RFID供应链应用系统的可重用性差,造成许多重复的软件设计和开发过程。为此,通过分析RFID供应链应用系统的业务特点,提取业务驱动力,构建应用场景模型,抽象供应链的业务工单,设计业务处理过程以及RFID标签处理过程中的状态修正逻辑,规范面向RFID供应链应用系统的标签处理过程建模方法。以新零售服饰领域为例,运用该建模方法,开发RFID零售服饰供应链应用系统,实例证明该系统能够很好地适应不同RFID零售应用场景的多种处理过程需求。 展开更多
关键词 rfid(radio frequency identification) rfid供应链应用系统 rfid标签处理过程
下载PDF
基于RFID安全技术的智能加工车间系统设计 被引量:8
7
作者 田梦凡 齐俊鹏 马锐 《计算机应用研究》 CSCD 北大核心 2020年第S01期207-210,共4页
随着物联网的不断发展,智能制造逐渐进入到应用与实施阶段。针对航天某车间面临的信息安全以及管理问题,提出基于无线射频识别技术(RFID)的智能手工生产车间系统设计方法。该系统主要由出入库生产工位模块以及管理模块构成。与后台数据... 随着物联网的不断发展,智能制造逐渐进入到应用与实施阶段。针对航天某车间面临的信息安全以及管理问题,提出基于无线射频识别技术(RFID)的智能手工生产车间系统设计方法。该系统主要由出入库生产工位模块以及管理模块构成。与后台数据库相结合,可以实现生产零件状态的实施监控。为了保证信息传输的安全性,使用SM7算法对数据进行加密,并使用交互式信息认证方案。为提高标签识别效率,提出一种动态帧时隙的防碰撞方法,以提高整个系统的运行效率。通过该系统达到了手工生产车间零件从生产、入库开始的精准定位,规范了车间管理,为后续智能制造大范围推广提供了新的思路。 展开更多
关键词 rfid(radio frequency identification)技术 物联网 信息安全 智能制造 SM7算法
下载PDF
Design and simulation of self-powered radio frequency identification (RFID) tags for mobile temperature monitoring 被引量:6
8
作者 CHU HeQun WU GuangMin +3 位作者 CHEN JianMing FEI Fei MAI John D LI Wen J 《Science China(Technological Sciences)》 SCIE EI CAS 2013年第1期1-7,共7页
This paper presents a design for a self-powered radio frequency identification (RFID) tag with a thin film bulk acoustic reso- nating piezoelectric power supply (PPS), which can be used for portable remote temperature... This paper presents a design for a self-powered radio frequency identification (RFID) tag with a thin film bulk acoustic reso- nating piezoelectric power supply (PPS), which can be used for portable remote temperature monitoring. We call this system a PPS-RFID for short. The RFID systems have been found to have many applications in the internet of things (IOT) in the past decade. But semi-active RFID tags require an onboard battery which limits their applications in many fields. For these reasons, our research focuses on power sources for the RFID tags. This paper emphasizes the circuit design and simulation of PPS. In our tests, 0.283 mW was generated by PPS at 1 Hz vibration by a 650 N impact force. The results showed that the integrated PPS could supply sufficient power for the designed PPS-RFID tag. The PPS-RFID tag can be widely used for temperature monitoring during mobile transport of perishable items such as medicines or food. 展开更多
关键词 self-powered radio frequency identification rfid PIEZOELECTRIC temperature monitoring energy harvesting internet of things
原文传递
An analog front-end circuit for ISO/IEC 15693-compatible RFID transponder IC 被引量:4
9
作者 LIU Dong-sheng ZOU Xue-cheng +1 位作者 YANG Qiu-ping XIONG Ting-wen 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第10期1765-1771,共7页
The 13.56 MHz analog front-end circuit for ISO/IEC 15693-compatible radio frequency identification (RFID) trans- ponder IC presented in this paper converts RF power to DC and extracts clock and data from the interroga... The 13.56 MHz analog front-end circuit for ISO/IEC 15693-compatible radio frequency identification (RFID) trans- ponder IC presented in this paper converts RF power to DC and extracts clock and data from the interrogator by 10% or 100% ASK modulation. The transponder sends data back to the interrogator by load modulation technology. The electrostatic discharge (ESD) protection circuits function to limit RF voltage to a safe level. An inductive coupling simulation modelling for 13.56 MHz RFID system is presented, with simulation results showing that the transponder operates over a wide range of electromagnetic field strength from Hmin (150 mA/m) to Hmax (5 A/m). The transponder IC is implemented in SMIC 0.35-μm three-metal two-poly mixed signal CMOS technology with embedded EEPROM. 展开更多
关键词 radio frequency identification rfid ISO/IEC 15693 Transponder IC Analog front-end
下载PDF
Improved adaptive genetic algorithm based RFID positioning 被引量:5
10
作者 LI Yu WU Honglan SUN Youchao 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2022年第2期305-311,共7页
The existing active tag-based radio frequency identi-fication(RFID)localization techniques show low accuracy in practical applications.To address such problems,we propose a chaotic adaptive genetic algorithm to align ... The existing active tag-based radio frequency identi-fication(RFID)localization techniques show low accuracy in practical applications.To address such problems,we propose a chaotic adaptive genetic algorithm to align the passive tag ar-rays.We use chaotic sequences to generate the intersection points,the weakest single point intersection is used to ensure the convergence accuracy of the algorithm while avoiding the optimization jitter problem.Meanwhile,to avoid the problem of slow convergence and immature convergence of the algorithm caused by the weakening of individual competition at a later stage,we use adaptive rate of change to improve the optimiza-tion efficiency.In addition,to remove signal noise and outliers,we preprocess the data using Gaussian filtering.Experimental results demonstrate that the proposed algorithm achieves high-er localization accuracy and improves the convergence speed. 展开更多
关键词 radio frequency identification(rfid)positioning im-proved genetic algorithm Gaussian filter passive tags
下载PDF
ATTACKS AND IMPROVEMENTS ON THE RFID AUTHENTICATION PROTOCOLS BASED ON MATRIX 被引量:3
11
作者 Wang Shaohui Liu Sujuan 《Journal of Electronics(China)》 2013年第1期33-39,共7页
Most of the Radio Frequency IDentification (RFID) authentication protocols, proposed to preserve security and privacy, are analysed to show that they can not provide security against some passive or active attacks. In... Most of the Radio Frequency IDentification (RFID) authentication protocols, proposed to preserve security and privacy, are analysed to show that they can not provide security against some passive or active attacks. In this paper, the security of two matrix-based protocols, proposed by Karthikeyan and Nesterenko (KN protocol) and Ramachandra et al. (RRS protocol) that conform to Electronic Product Code Class-1 Generation-2 (EPC Class-1 Gen-2) standard, are investigated. Using the linear relationship of multiplication of matrix and vector, we point out that both protocols can not provide scalability, and they are vulnerable to passive impersonation attack. In addition, both protocols are totally insecure if the adversary can compromise one tag to extract the secrets. A modified lightweight matrix-based authentication protocol is presented, which can resist mainly common attacks on an RFID authentication system including eavesdropping, relay attack, desynchronization attack, impersonation attack and tag tracking attack. The new protocol also has the desirable scalability property and can keep secure under compromising attack. 展开更多
关键词 radio frequency identification rfid Mutual authentication Matrix-based Imper-sonation attack PRIVACY SCALABILITY
下载PDF
Localization of pallets in warehouses using passive RFID system 被引量:2
12
作者 周俊儒 张宏建 周洪亮 《Journal of Central South University》 SCIE EI CAS CSCD 2015年第8期3017-3025,共9页
Warehouse operation has become a critical activity in supply chain. Position information of pallets is important in warehouse management which can enhance the efficiency of pallets picking and sortation. Radio frequen... Warehouse operation has become a critical activity in supply chain. Position information of pallets is important in warehouse management which can enhance the efficiency of pallets picking and sortation. Radio frequency identification(RFID) has been widely used in warehouse for item identifying. Meanwhile, RFID technology also has great potential for pallets localization which is underutilized in warehouse management. RFID-based checking-in and inventory systems have been applied in warehouse management by many enterprises. Localization approach is studied, which is compatible with existing RFID checking-in and inventory systems. A novel RFID localization approach is proposed for pallets checking-in. Phase variation of nearby tags was utilized to estimate the position of added pallets. A novel inventory localization approach combing angle of arrival(AOA) measurement and received signal strength(RSS) is also proposed for pallets inventory. Experiments were carried out using standard UHF passive RFID system. Experimental results show an acceptable localization accuracy which can satisfy the requirement of warehouse management. 展开更多
关键词 warehouse management radio frequency identification rfid LOCALIZATION tag phase
下载PDF
A Physical Layer Network Coding Based Tag Anti-Collision Algorithm for RFID System 被引量:3
13
作者 Cuixiang Wang Xing Shao +1 位作者 Yifan Meng Jun Gao 《Computers, Materials & Continua》 SCIE EI 2021年第1期931-945,共15页
In RFID(Radio Frequency IDentification)system,when multiple tags are in the operating range of one reader and send their information to the reader simultaneously,the signals of these tags are superimposed in the air,w... In RFID(Radio Frequency IDentification)system,when multiple tags are in the operating range of one reader and send their information to the reader simultaneously,the signals of these tags are superimposed in the air,which results in a collision and leads to the degrading of tags identifying efficiency.To improve the multiple tags’identifying efficiency due to collision,a physical layer network coding based binary search tree algorithm(PNBA)is proposed in this paper.PNBA pushes the conflicting signal information of multiple tags into a stack,which is discarded by the traditional anti-collision algorithm.In addition,physical layer network coding is exploited by PNBA to obtain unread tag information through the decoding operation of physical layer network coding using the conflicting information in the stack.Therefore,PNBA reduces the number of interactions between reader and tags,and improves the tags identification efficiency.Theoretical analysis and simulation results using MATLAB demonstrate that PNBA reduces the number of readings,and improve RFID identification efficiency.Especially,when the number of tags to be identified is 100,the average needed reading number of PNBA is 83%lower than the basic binary search tree algorithm,43%lower than reverse binary search tree algorithm,and its reading efficiency reaches 0.93. 展开更多
关键词 radio frequency identification(rfid) tag anti-collision algorithm physical layer network coding binary search tree algorithm
下载PDF
Automated Identification Algorithm Using CNN for Computer Vision in Smart Refrigerators 被引量:2
14
作者 Pulkit Jain Paras Chawla +2 位作者 Mehedi Masud Shubham Mahajan Amit Kant Pandit 《Computers, Materials & Continua》 SCIE EI 2022年第5期3337-3353,共17页
Machine Learning has evolved with a variety of algorithms to enable state-of-the-art computer vision applications.In particular the need for automating the process of real-time food item identification,there is a huge... Machine Learning has evolved with a variety of algorithms to enable state-of-the-art computer vision applications.In particular the need for automating the process of real-time food item identification,there is a huge surge of research so as to make smarter refrigerators.According to a survey by the Food and Agriculture Organization of the United Nations(FAO),it has been found that 1.3 billion tons of food is wasted by consumers around the world due to either food spoilage or expiry and a large amount of food is wasted from homes and restaurants itself.Smart refrigerators have been very successful in playing a pivotal role in mitigating this problem of food wastage.But a major issue is the high cost of available smart refrigerators and the lack of accurate design algorithms which can help achieve computer vision in any ordinary refrigerator.To address these issues,this work proposes an automated identification algorithm for computer vision in smart refrigerators using InceptionV3 and MobileNet Convolutional Neural Network(CNN)architectures.The designed module and algorithm have been elaborated in detail and are considerably evaluated for its accuracy using test images on standard fruits and vegetable datasets.A total of eight test cases are considered with accuracy and training time as the performance metric.In the end,real-time testing results are also presented which validates the system’s performance. 展开更多
关键词 CNN computer vision Internet of Things(IoT) radio frequency identification(rfid) graphical user interface(GUI)
下载PDF
Design of logic process based low-power 512-bit EEPROM for UHF RFID tag chip 被引量:2
15
作者 金丽妍 LEE J H KIM Y H 《Journal of Central South University》 SCIE EI CAS 2010年第5期1011-1020,共10页
A 512-bit EEPROM IP was designed by using just logic process based devices.To limit the voltages of the devices within 5.5 V,EEPROM core circuits,control gate(CG) and tunnel gate(TG) driving circuits,DC-DC converters:... A 512-bit EEPROM IP was designed by using just logic process based devices.To limit the voltages of the devices within 5.5 V,EEPROM core circuits,control gate(CG) and tunnel gate(TG) driving circuits,DC-DC converters:positive pumping voltage(VPP=4.75 V) ,negative pumping voltage(VNN=4.75 V) ,and VNNL(=VNN/2) generation circuit were proposed.In addition,switching powers CG high voltage(CG_HV) ,CG low voltage(CG_LV) ,TG high voltage(TG_HV) ,TG low voltage(TG_LV) ,VNNL_CG and VNNL_TG switching circuit were supplied for the CG and TG driving circuit.Furthermore,a sequential pumping scheme and a new ring oscillator with a dual oscillation period were proposed.To reduce a power consumption of EEPROM in the write mode,the reference voltages VREF_VPP for VPP and VREE_VNN for VNN were used by dividing VDD(1.2 V) supply voltage supplied from the analog block in stead of removing the reference voltage generators.A voltage level detector using a capacitive divider as a low-power DC-DC converter design technique was proposed.The result shows that the power dissipation is 0.34μW in the read mode,13.76μW in the program mode,and 13.66μW in the erase mode. 展开更多
关键词 electrically erasable programmable read-only memory (EEPROM) logic process DC-DC converter ring oscillator sequential pumping scheme dual oscillation period radio frequency identification rfid
下载PDF
Security and privacy threats in RFID traceability network 被引量:1
16
作者 Chu Chao-Hsien 《Journal of Southeast University(English Edition)》 EI CAS 2008年第S1期132-135,共4页
To address security and privacy issues in radio frequency identification (RFID) traceability networks, a multi-layer privacy and security framework is proposed, which includes four facets: a security model, a communic... To address security and privacy issues in radio frequency identification (RFID) traceability networks, a multi-layer privacy and security framework is proposed, which includes four facets: a security model, a communication protocol, access permission and privacy preservation. According to the security requirements that are needed in an RFID system, a security model that incorporates security requirements that include privacy of tag data, privacy of ownership, and availability of tag identity is introduced. Using this model, a secure communication protocol that can be used for anti-counterfeiting, automatic identification and privacy preservation is then developed. In order to manage the number of parties, data records of items, and complicated transitions of access permissions in an item-level traceability context, a well-designed access control protocol is proposed to parties that can prove the physical possession of an item;meanwhile, to address the privacy issues during data sharing in an RFID network, a vision of database systems that take responsibility for the privacy of the data they manage is also presented. 展开更多
关键词 traceability network radio frequency identification (rfid) security protocol privacy protection strategy
下载PDF
A compact transmit/receive switch for 2.4 GHz reader-less active RFID tag transceiver 被引量:1
17
作者 Mohammad Arif Sobhan Bhuiyan Mamun Bin Ibne Reaz +2 位作者 Jubayer Jalil Labonnah Farzana Rahman Tae Gyu Chang 《Journal of Central South University》 SCIE EI CAS CSCD 2015年第2期546-551,共6页
Radio frequency identification(RFID) is a ubiquitous identification technology nowadays. An on-chip high-performance transmit/receive(T/R) switch is designed and simulated in 0.13-μm CMOS technology for reader-less R... Radio frequency identification(RFID) is a ubiquitous identification technology nowadays. An on-chip high-performance transmit/receive(T/R) switch is designed and simulated in 0.13-μm CMOS technology for reader-less RFID tag. The switch utilizes only the transistor width and length(W/L) optimization, proper gate bias resistor and resistive body floating technique and therefore,exhibits 1 d B insertion loss, 31.5 d B isolation and 29.2 d Bm 1-d B compression point(P1d B). Moreover, the switch dissipates only786.7 n W power for 1.8/0 V control voltages and is capable of switching in 794 fs. Above all, as there is no inductor or capacitor used in the circuit, the size of the switch is 0.00208 mm2 only. This switch will be appropriate for reader-less RFID tag transceiver front-end as well as other wireless transceivers operated at 2.4 GHz band. 展开更多
关键词 body floating CMOS radio frequency identificationrfid transmit/receive(T/R) switch TRANSCEIVER
下载PDF
RFID-based Production Data Analysis in an IoT-enabled Smart Job-shop 被引量:1
18
作者 Kai Ding Pingyu Jiang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2018年第1期128-138,共11页
Under industry 4.0, internet of things(IoT), especially radio frequency identification(RFID) technology, has been widely applied in manufacturing environment. This technology can bring convenience to production contro... Under industry 4.0, internet of things(IoT), especially radio frequency identification(RFID) technology, has been widely applied in manufacturing environment. This technology can bring convenience to production control and production transparency. Meanwhile, it generates increasing production data that are sometimes discrete, uncorrelated, and hard-to-use. Thus,an efficient analysis method is needed to utilize the invaluable data. This work provides an RFID-based production data analysis method for production control in Io T-enabled smart job-shops.The physical configuration and operation logic of Io T-enabled smart job-shop production are firstly described. Based on that,an RFID-based production data model is built to formalize and correlate the heterogeneous production data. Then, an eventdriven RFID-based production data analysis method is proposed to construct the RFID events and judge the process command execution. Furthermore, a near big data approach is used to excavate hidden information and knowledge from the historical production data. A demonstrative case is studied to verify the feasibility of the proposed model and methods. It is expected that our work will provide a different insight into the RFIDbased production data analysis. 展开更多
关键词 Data analysis internet of things(IoT) production control radio frequency identification(rfid) smart jobshop
下载PDF
A collision recovery algorithm using optimal Q parameter based on BIBD in RFID 被引量:1
19
作者 Cui Yinghua 《High Technology Letters》 EI CAS 2016年第4期350-354,共5页
In this work,an optimal Q algorithm based on a collision recovery scheme is presented. Tags use BIBD-( 16,4,1) codes instead of RN16 s. Therefore,readers can make a valid recognition even in collision slots. A way of ... In this work,an optimal Q algorithm based on a collision recovery scheme is presented. Tags use BIBD-( 16,4,1) codes instead of RN16 s. Therefore,readers can make a valid recognition even in collision slots. A way of getting the optimal slot-count parameter is studied and an optimal Q algorithm is proposed. The theoretical and simulation results show that the proposed algorithm can improve reading efficiency by 100% more than the conventional Q algorithm. Moreover,the proposed scheme changes little to the existing standard. Thus,it is easy to implement and compatible with ISO 18000-6C. 展开更多
关键词 radio frequency identification(rfid) anti-collision collision recovery balanced incomplete block design(BIBD) Q algorithm
下载PDF
EMAP: An Efficient Mutual Authentication Protocol for Passive RFID Tags
20
作者 Guo-Rui Li Ying Wang +1 位作者 Cui-Rong Wang Jing-Sha He 《International Journal of Automation and computing》 EI 2012年第1期108-112,共5页
Radio frequency identification (RFID) system is a contactless automatic identification system, which uses small and low cost RFID tags. The primary problem of current security and privacy preserving schemes is that,... Radio frequency identification (RFID) system is a contactless automatic identification system, which uses small and low cost RFID tags. The primary problem of current security and privacy preserving schemes is that, in order to identify only one single tag, these schemes require a linear computational complexity on the server side. We propose an efficient mutual authentication protocol for passive RFID tags that provides confidentiality, untraceability, mutual authentication, and efficiency. The proposed protocol shifts the heavy burden of asymmetric encryption and decryption operations on the more powerful server side and only leaves lightweight hash operation on tag side. It is also efficient in terms of time complexity, space complexity, and communication cost, which are very important for practical large-scale RFID applications. 展开更多
关键词 radio frequency identification rfid SECURITY PRIVACY AUTHENTICATION CONFIDENTIALITY un-traceability efficiency.
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部