Group coding of RF tags to verify the integrity of group of objects

Author(s):  
Yuki Sato ◽  
Jin Mitsugi ◽  
Osamu Nakamura ◽  
Jun Murai
Keyword(s):  
Author(s):  
Li Lu

Due to low cost and easy deployment, RFID has become a promising technology in many applications, such as retailing, medical-patient management, logistics, and supply chain management. Although a number of RFID standards have been issued and widely adopted by many off-the-shelf products, those standards, however, scarcely added privacy concerns because of computing and communication patterns. On the other hand, in RFID systems, RF tags emit their unique serial numbers to RF readers. Without privacy protection, however, any reader can identify a tag ID via the emitted serial number. Indeed, a malicious reader can easily perform bogus authentications with detected tags to retrieve sensitive information within its scanning range. The main obstacle to preserving privacy in RFID systems lies in the capability of tags. Due to the cost consideration, common RFID tags have tight constraints on power, computational capacity, and memory. Therefore, the mature cryptographic tools for bulky PCs are not suitable for RFID devices. In this chapter, the author focuses on the privacy issue to establish scalable and private RFID systems. The chapter first discusses the privacy issue in RFID systems; and then correspondingly introduces privacy preserving techniques including privacy-preserving authentication and secure ownership transfer. Finally, the theoretic formal privacy models for RFID systems are given, in which the author formally defines privacy and the behaviors of adversaries in RFID systems. Based on a formal model, say the weak privacy model, the chapter illustrates the methodology for designing highly efficient privacy-preserving authentication protocols.


Author(s):  
Nobuyuki Teraura ◽  
Kunio Ito ◽  
Naoki Takahashi ◽  
Kouichi Sakurai

RF tags based on RFID (Radio-frequency Identification) technology have been widely used in various fields including power plant construction and maintenance for the purpose of improving the identification and traceability of the many components in the facility. To date, various types of tags have been developed, including tags that are resistant to chemicals or high-temperature environments, which are used in specialized fields. When considering widespread use of RF tags in nuclear power plants, there is a concern about the effects of radiation on the RF tags, because the data stored in the tag may receive radiation damage, resulting in corruption of data. Here, we describe a newly designed RF tag that achieves resistance to radiation damage by attaching a radiation shield layer and incorporating automatic data-correction software. This radiation-resistant RF tag has been tested under real radiation exposure fields to verify the intended radiation-resistant functions. It is expected that the use of these radiation-resistant RF tags with a data reader and database system will increase the capabilities of RF tags applied to nuclear power plants and it is also expected to lead to reductions in worker radiation exposure doses.


2008 ◽  
Vol 20 (1) ◽  
pp. 189-195 ◽  
Author(s):  
Takashi Asakawa ◽  
◽  
Kazue Nishihara ◽  
Tadashi Yoshidome ◽  

This paper describes the method of presuming the angle of moving direction of an electric wheelchair by reading information of RF tags put on a floor using a rotary antenna, which is fixed underneath the wheelchair, revolving constantly above RF tags of the floor at a turning point. Our primary intention is to make a detection system of direction angle using RF tags for a voice controlled electric wheelchair. The voice instruction cannot give smooth nor detailed controls with ease unlike the joystick control. Because the voice control system can use only a few discrete instruction words. Thereby to assist smooth indoor motion, we proposed here a new method of automatic correction of the direction angle measured by the above rotary antenna and RF tags. We demonstrated experimentally to detect and correct the angle of moving direction when the wheelchair passes over the turning point, which was found to give accurate orientations.This paper is the full translation from the transactions of JSME Vol.73, No.729.


2012 ◽  
Vol 21 (06) ◽  
pp. 1240015 ◽  
Author(s):  
YOSHINORI OIKAWA

A UHF-band RFID system handling many RF tags has some advantages over a bar code system such as simultaneous multi-reading and long read range. Especially, it has been strongly desired by the logistics and the retail industries for efficiency of operation. Recently, user-friendly RFID systems are being studied. We focused on a gate system using RFID technologies. If the tag moving direction can be recognized at the RFID gate system, it will be very useful for the efficiency of inventory management and the checking of pilferage or shoplifting. In this paper, new methods of tag moving direction detection using the difference of passing time of two antennas without expensive external sensors is proposed and evaluated. Two methods are proposed for the specific procedure. The first one is to detect the time when the received power goes over the preset threshold. The second one is to estimate the aimed time using the maximum likelihood approach. Some experimental results of these methods are also shown and their feasibility is proved.


2003 ◽  
Vol 51 (8) ◽  
pp. 1740-1749 ◽  
Author(s):  
Daeyoung Kim ◽  
M.A. Ingram ◽  
W.W. Smith
Keyword(s):  

2014 ◽  
Vol 513-517 ◽  
pp. 3305-3308
Author(s):  
Chen Xi Chen ◽  
Dong Wang

Radio Frequency Identification (RFID) provides a non-line-of-sight and contactless approach for object identification. In the supply chain, objects are usually assembled into a group and RFID system enables us to quickly identify a group of objects. However, RFID system only provide the identified objects ID, unable to provide the missing objects IDs. This paper concerns the problem of missing objects detection and missing unique IDs recovery. In supply chain, a traditional method of items lost detection is encoding a group of objects ID before the shipment, and decoding when examine the integrity of the objects. In this paper, we propose a new scheme for missing objects detection and missing IDs recovery, which is called Linearly Independent Vectors Based Group Coding, abbreviated LIVGC. A numerical simulation reveals that the proposed method have higher recovery rate (>20%) than the EGC scheme in the same length of redundancy code.


2013 ◽  
Vol 71 (12) ◽  
pp. 1-5
Author(s):  
Randeep SinghTaggad ◽  
S. V. A. V. Prasad ◽  
Arvind Pathak
Keyword(s):  

Energies ◽  
2018 ◽  
Vol 11 (10) ◽  
pp. 2855
Author(s):  
Tae Kim ◽  
Dong Kim

In this paper, we propose a multi-dimensional sparse-coded ambient backscatter communication (MSC-AmBC) system for long-range and high-rate massive Internet of things (IoT) networks. We utilize the characteristics of the ambient sources employing orthogonal frequency division multiplexing (OFDM) modulation to mitigate strong direct-link interference and improve signal detection of AmBC at the reader. Also, utilization of the sparsity originated from the duty-cycling operation of batteryless RF tags is proposed to increase the dimension of signal space of backscatter signals to achieve either diversity or multiplexing gains in AmBC. We propose optimal constellation mapping and reflection coefficient projection and expansion methods to effectively construct multi-dimensional constellation for high-order backscatter modulation while guaranteeing sufficient energy harvesting opportunities at these tags. Simulation results confirm the feasibility of the long-range and high-rate AmBC in massive IoT networks where a huge number of active ambient sources and passive RF tags coexist.


Sign in / Sign up

Export Citation Format

Share Document