scholarly journals Passive Radio-Frequency Identification Tag-Based Indoor Localization in Multi-Stacking Racks for Warehousing

2020 ◽  
Vol 10 (10) ◽  
pp. 3623 ◽  
Author(s):  
Jaehun Park ◽  
Yong-Jeong Kim ◽  
Byung Kwon Lee

Radio-frequency identification (RFID) technology-based real-time indoor location awareness has been widely studied. In this paper, a passive RFID-based indoor inventory localization method for small and medium-sized enterprises (SMEs) is proposed to effectively manage their indoor inventory tracking in terms of the multi-stacking racking (MSR). To achieve this, we introduce a concept of reference tags and a calculation of measurement for the distance between the RFID reader and reference tag to improve the accuracy of the item location recognition. To illustrate the efficacy and applicability of the method, an empirical case study that applies it to an electronic device manufacturing company is conducted. It was noted that there was no significant difference in the location awareness rate of the proposed system compared with the existing active RFID-based methods. Also, it is demonstrated that the construction can be relatively inexpensive in terms of identifying the location of the items loaded in MSR and relatively narrow areas using a passive tag. This advantage makes it suitable for SMEs that have issues with large-scale facility investment, applying the method to compare the location difference between the registered location information in the inventory system and the actual location of the item in the rack.

2018 ◽  
Vol 14 (4) ◽  
pp. 155014771877128 ◽  
Author(s):  
Jinkai Liu ◽  
Yanqing Qiu ◽  
Kezhao Yin ◽  
Wentong Dong ◽  
Jiaqing Luo

The radio frequency identification technology was given greater interest as it is widely used for identification and localization in the cognitive radio sensor networks. While radio frequency identification–based indoor localization is attractive, the need for a large-scale and high-density deployment of readers and reference tags is costly. Using mobile readers mounted on guide rails, we design and implement an RFID indoor localization system, which requires neither reference tags nor received signal strength indicator functions, for stock-taking and searching in warehouse operations. In particular, we install two guide rails, which can allow a reader to move horizontally or vertically, on the ceiling of a warehouse or workshop. We then propose a continuous scanning algorithm to improve the accuracy for locating a single tagged object and a category-based scheduling algorithm to shorten the time for locating multiple tagged objects. Our primary experimental results show that RFID indoor localization system can achieve high time efficiency and localization accuracy in the indoor localization.


Author(s):  
Pablo Picazo-Sanchez ◽  
Lara Ortiz-Martin ◽  
Pedro Peris-Lopez ◽  
Julio C. Hernandez-Castro

Radio Frequency Identification (RFID) is a common technology for identifying objects, animals, or people. The main form of barcode-type RFID device is known as an Electronic Product Code (EPC) and the most popular standard for passive RFID tags is Class-1 Generation-2. In this technology, the information transmitted between devices is through the air, therefore adversaries can eavesdrop these messages passed on the insecure radio channel and finally, the security of the system can be compromised. In this chapter, the authors analyze the security of EPC Class-1 Generation-2 standard, showing its security weaknesses and presenting some possible countermeasures.


2017 ◽  
Vol 2017 ◽  
pp. 1-9 ◽  
Author(s):  
Ju-min Zhao ◽  
Ding Feng ◽  
Deng-ao Li ◽  
Wei Gong ◽  
Hao-xiang Liu ◽  
...  

Radio Frequency Identification (RFID) is an emerging technology for electronic labeling of objects for the purpose of automatically identifying, categorizing, locating, and tracking the objects. But in their current form RFID systems are susceptible to cloning attacks that seriously threaten RFID applications but are hard to prevent. Existing protocols aimed at detecting whether there are cloning attacks in single-reader RFID systems. In this paper, we investigate the cloning attacks identification in the multireader scenario and first propose a time-efficient protocol, called the time-efficient Cloning Attacks Identification Protocol (CAIP) to identify all cloned tags in multireaders RFID systems. We evaluate the performance of CAIP through extensive simulations. The results show that CAIP can identify all the cloned tags in large-scale RFID systems fairly fast with required accuracy.


2019 ◽  
Vol 24 (2) ◽  
pp. 142-155 ◽  
Author(s):  
Chengcheng Wang ◽  
Zhongzhi Xu ◽  
Ronghua Du ◽  
Haifeng Li ◽  
Pu Wang

Sensors ◽  
2019 ◽  
Vol 19 (13) ◽  
pp. 2957 ◽  
Author(s):  
Feng Zhu ◽  
Peng Li ◽  
He Xu ◽  
Ruchuan Wang

Radio frequency identification is one of the key techniques for Internet of Things, which has been widely adopted in many applications for identification. However, there exist various security and privacy issues in radio frequency identification (RFID) systems. Particularly, one of the most serious threats is to clone tags for the goal of counterfeiting goods, which causes great loss and danger to customers. To solve these issues, lots of authentication protocols are proposed based on physical unclonable functions that can ensure an anti-counterfeiting feature. However, most of the existing schemes require secret parameters to be stored in tags, which are vulnerable to physical attacks that can further lead to the breach of forward secrecy. Furthermore, as far as we know, none of the existing schemes are able to solve the security and privacy problems with good scalability. Since many existing schemes rely on exhaustive searches of the backend server to validate a tag and they are not scalable for applications with a large scale database. Hence, in this paper, we propose a lightweight RFID mutual authentication protocol with physically unclonable functions (PUFs). The performance analysis shows that our proposed scheme can ensure security and privacy efficiently in a scalable way.


2017 ◽  
pp. 641-661
Author(s):  
Peter J. Hawrylak ◽  
Chris Hart

Radio Frequency Identification (RFID) technology enables wireless communication between a RFID reader and a RFID tag. One type, passive RFID tags, need no battery, being powered from the RFID reader's radio frequency signal. Passive RFID tags can support memories that can be used to store portions of the patient's medical history. One form factor for passive RFID tags is an employee ID (used for wireless access) or credit card form factor. This form factor allows the patient to carry their medical information with them. RFID benefits include providing information to Emergency Medical Technicians (EMTs), maintaining a patient's vaccination history and providing emergency contact information, all in a clear and unmistakable format. This simplifies information exchange during patient transfers, a cause of many preventable medical mistakes and errors. Cheap and simple systems, such as the one presented in this chapter, can reduce stress and prevent possible errors. Such systems with an intuitive human-machine interface can reduce the duration of a patient visit throughput. This system can prevent simple errors such as the administration of the wrong drug, dose, or drug omission, which is a major issue in hospitals. This requires that information be stored in a standardised manner, with limited healthcare provider access and use to protect patient privacy. This chapter explores the use of passive RFID tags to store medical information about a patient, with specific focus on storage of a child's vaccination history and safety.


Author(s):  
C.K. Shyamala ◽  
Anand K Rajagopalan

Automatic identification systems represent a wide classification of devices used primarily in commercial settings for inventory/logistics control. Familiar examples of such devices are bar codes, magnetic strips, smart cards, RFID (Radio frequency identification) and biometric and voice recognition. Security is especially lax in low powered RF (radio frequency) systems communicating through an unsecured radio wave channel. Security represents a critical component for enabling the large scale adoption of automatic identification systems. Providing an effective security solution for low powered systems is a major area of concern; it directs research towards ‘power consumption aware’ computations in security solutions. This paper proposes a Lightweight Inter-Zonal Authentication Protocol for moving objects in low powered RF systems. Formal validation and a thorough analysis of the protocol in SPAN security tool reveals its effectiveness and resiliency to attacks – eaves dropping, reader and tag impersonation, replay and desynchronization.


Sign in / Sign up

Export Citation Format

Share Document