scholarly journals Banknote Validation through an Embedded RFID Chip and an NFC-Enabled Smartphone

2015 ◽  
Vol 2015 ◽  
pp. 1-8 ◽  
Author(s):  
Mohamed Hamdy Eldefrawy ◽  
Muhammad Khurram Khan

With the new, state-of-the-art printing devices and equipment, there has been rapid growth in the counterfeiting of banknotes. Traditional security features on banknotes are easy targets for counterfeiters, and they can easily imitate the original banknotes with fake ones. Conventional methods for validating currency require specialized devices for the authentication of banknotes. However, cost and lack of mobility of sophisticated banknote validation devices are big problems for general consumers. Modern digital solutions are attempting to complement the traditional security features through embedding radio frequency identification (RFID) chips in the banknotes, for example, Euro currency. Unfortunately, the requirement of specialized RFID readers for banknote validation impedes their widespread proliferation among consumers. To overcome this problem, a new method of banknote validation using an RFID chip and an NFC-enabled smartphone is presented. The consumer sends a banknote validation request to the Monetary Agency (MA) using her or his smartphone and an Internet connection. TheMAreplies by sending a random challenge to the consumer’s smartphone. The RFID chip in the banknote receives the challenge, via the NFC, and calculates an equivalent response to theMA’s challenge. If any of the messages are incorrect, authentication is denied. By the proposed method, consumers can easily and instantly check the originality of currency notes with theMAusing their smartphones and an Internet connection. The proposed system is less expensive, computationally, than regular methods and preserves the privacy of people who carry banknotes.

2018 ◽  
Vol 7 (3.1) ◽  
pp. 133
Author(s):  
D Pradeepa ◽  
R Valarmady ◽  
S G Rajasekar

Radio Frequency Identification (RFID) implies a system that exchanges the data remotely, utilizing radio frequency waves. It is programmed identification innovation. This paper is about RFID based system for library management that permits quick exchange stream and will make simple to deal with the exercises like issue and return of books from the library absent much manual intercession. This system depends on RFID readers and detached RFID tags that can store the data electronically which can be perused by the RFID readers. This system will influence clients to issue to and return of books through RFID tags simple and furthermore ascertain the comparing fine connected with the timeframe the nonappearance of the book from the library.  


Author(s):  
Li Zhekun ◽  
Rajit Gadh ◽  
B. S. Prabhu

Industrial and consumer applications of Radio Frequency Identification (RFID) are explored. The state-of-the-art and development in RFID technology is reviewed. A currently operative smart parts based manufacturing system is described which uses RFID as the key technology. The role of RFID in the emerging Wireless Internet Manufacturing field is highlighted.


2014 ◽  
Vol 528 ◽  
pp. 359-363
Author(s):  
Dong Bo Liu ◽  
Jia Bin Hu ◽  
Chang Cheng Wu

As the development radio frequency identification, main researches are mainly focused on the information safety of the air interface, the communication protocol between the tag and the reader. If the air interface is not security, the information cannot be protected, bringing a serious threat to the system security. Although the physical based method can solve this problem in a certain extent, communication safety still cannot be satisfied. Therefore, in order to improve the information safety, this paper introduces a new method about how the tag and the reader authenticate each other. Experimental results show that the proposed method can improve the information security in the authentication process between the tag and the reader on the radio frequency identification system.


Author(s):  
Nemai Chandra Karmakar

Various smart antennas developed for automatic radio frequency identification (RFID) readers are presented. The main smart antennas types of RFID readers are switched beam, phased array, adaptive beamfsorming and multiple input multiple output (MIMO) antennas. New development in the millimeter wave frequency band?60 GHz and above? exploits micro-electromechanical system (MEMS) devices and nano-components. Realizing the important of RFID applications in the 900 MHz frequency band, a 3×2-element planar phased array antenna has been designed in a compact package at Monash University. The antenna covers 860-960 GHz frequency band with more than 10 dB input return loss, 12 dBi broadside gain and up to 40° elevation beam scanning with a 4-bit reflection type phase shifter array. Once implemented in the mass market, RFID smart antennas will contribute tremendously in the areas of RFID tag reading rates, collision mitigation, location finding of items and capacity improvement of the RFID system.


2012 ◽  
Vol 2012 ◽  
pp. 1-12
Author(s):  
Shigeaki Sakurai

This paper deals with transactions with their classes. The classes represent the difference of conditions in the data collection. This paper redefines two kinds of supports: characteristic support and possible support. The former one is based on specific classes assigned to specific patterns. The latter one is based on the minimum class in the classes. This paper proposes a new method that efficiently discovers patterns whose characteristic supports are larger than or equal to the predefined minimum support by using their possible supports. Also, this paper verifies the effect of the method through numerical experiments based on the data registered in the UCI machine learning repository and the RFID (radio frequency identification) data collected from two apparel shops.


Electronics ◽  
2020 ◽  
Vol 9 (7) ◽  
pp. 1168
Author(s):  
Amira S. El Batouty ◽  
Hania H. Farag ◽  
Amr A. Mokhtar ◽  
El-Sayed A. El-Badawy ◽  
Moustafa H. Aly

Radio Frequency Identification (RFID) technology is widely utilized by businesses, organizations and wireless communication systems. RFID technology is secured using different ways of data encryption, e.g., Advanced Encryption Standard (AES). The Substitution Box (S-Box) is the core of AES. In this paper, a new algorithm is proposed to generate a modified S-Box with new keys, specifically a key and plaintext-dependent S-Box using an improved RC4 encryption algorithm with Logistic Chaotic Maps (LCM). The strength of the proposed S-Box is tested throughout the paper, and compared against the state-of-the-art S-Box implementations, namely, the static S-Box, dynamic S-box, KSA and PRGA S-Box, and RC4 S-Boxes with Henon chaotic maps. The comparison between the state-of-the-art S-Boxes and the proposed S-Box demonstrates that the use of the Logistic Chaotic Map increases the security of the S-Box and makes the differential and linear cryptography more sturdy. In particular, using the strict avalanche test, we demonstrate that the proposed S-Box improves the security by achieving a cipher text bit-flip ratio of 0.4765, which is closer to 0.5 (where half the bits are flipped), while maintaining a minimum elapsed time of 19 milliseconds for encryption and decryption.


Author(s):  
Abdülkadir ÇAKIR ◽  
Halil KAYGISIZ

The current study aimed to reveal that personnel control by the employer should be conducted using Radio Frequency Identification (RFID) technology in an easier and more modular way. The most important feature differentiating the RFID from the existing technologies is that it works wirelessly. The hardware used in the study can be managed via Ethernet port. In this study, it is ensured that data be transmitted via Internet by using a mobile cellular communication system. The control of the set up system can be conducted wirelessly via any environment in which an Internet connection can be established. Thanks to the created system, information about arrival and departure dates of the places to where the mobile personnel should go can be monitored 24/7 from anywhere that has internet connection. As a result of the tests and applications that have been conducted, it has been seen that the data could not be transmitted in a radio-frequency environment because of the error caused by the RFID tag. As a result of the calculations made after the application, it has been put forward that the error margin is 7±1%.


Author(s):  
Kamalendu Pal

The advent of Radio Frequency Identification (RFID) technique, low-cost wireless sensor devices, and web-based technologies are ushering new ways to take control of the plethora of data created by the Internet of Things (IoT) approach has gained popularity in the modern manufacturing industry. This mechanism provides an opportunity of remotely storing and retrieving data from RFID-tags. Products labelled with such tags can be scanned efficiently using RFID-readers that do not require line-of-sight. This type of identification and access to information on tags are used by manufacturing business operations, can lead to improving logistics, and better customer service. However, the widespread use of RFID technology also introduces serious security and privacy risks since the information stored in tags can easily be retrieved by hidden RFID-readers, eventually leading to the violation of genuine business operation privacy. This chapter discusses the open research challenges of RFID applications in the manufacturing supply chain operations.


Micromachines ◽  
2021 ◽  
Vol 12 (7) ◽  
pp. 819
Author(s):  
Nabil Khalid ◽  
Rashid Mirzavand ◽  
Ashwin K. Iyer

We present a survey on battery-less Radio Frequency Identification (RFID-based wireless sensors that have emerged in the past several years. We discuss the evolution of RFID turning into wireless sensors. Moreover, we talk about different components of these battery-less RFID-based wireless sensors, five main topologies that transform a simple RFID chip into a battery-less wireless sensor, and state-of-the-art implementations of these topologies. In battery-less wireless sensors, the read range is of key importance. Hence, we discuss how each component of the sensor plays its role in determining the read range and how each topology exploits these components to optimize read range, complexity, and/or cost. Additionally, we discuss potential future directions that can help provide improvements in RFID-based wireless sensor technology.


Author(s):  
Liang Hsiao-Mei ◽  
Wang Chih-Hwa ◽  
Shann-Ren ◽  
Kang ◽  
Hsuuw Yan-Der ◽  
...  

This project uses ultrahigh-frequency (UHF) ear tags and readers with a readable range of 3 to 5 m. Forty stags were tagged with radio-frequency identification (RFID) ear tags and allocated into 20 pens. When deer with RFID ear tags walked through the aisle, handheld RFID readers, used as personal digital assistants (PDAs), and stationary RFID readers in frequency range received signals from the tags, and individual deer tag data were transmitted immediately and completely through wireless PDAs to a computer. The inputted data were sent to the deer-farm management system to be collated and organized. Farmers obtained individual deer data without approaching the deer, which decreased the risk of the deer attacking. Employing UHF-RFID technology integrated with software contributes to enhancing the efficiency of deer identification and farm management.


Sign in / Sign up

Export Citation Format

Share Document