scholarly journals Marking Standing Trees with RFID Tags

Forests ◽  
2020 ◽  
Vol 11 (2) ◽  
pp. 150
Author(s):  
Gianni Picchi

Precision forestry and traceability services for the certification of timber products require reliable systems for the identification of items throughout the supply chains, starting from the inventory of standing trees. AutoID systems based on radio frequency identification (RFID) are regarded as the most promising technology for this purpose. Nevertheless, there is no information available regarding the capacity of RFID tags to withstand the climatic and biological wearing agents present in forests for long periods, while maintaining the stored information and the capacity to return a readable signal over time. In order to assess this aspect, seven RFID UHF tags, selected from the range of commercial models or developed for this purpose, were used to mark standing trees for two years. Results showed that all models proved able to maintain sufficient operative capacity to be identified with manual (proximity) readers. Some models suffered damage to the protective case or were deformed, with a strong decrease in readability. Tags with simple structure and lower cost proved strong enough to endure one year without major drawbacks, and could be best suited for deployment in integrated auto-ID supply chains if used as disposable components. More complex and expensive tags are best suited for long-term marking, but application on living trees requires specific solutions to prevent damage due to stem growth.

2013 ◽  
Vol 4 (4) ◽  
pp. 72-89
Author(s):  
Yanjun Zuo

Radio Frequency Identification (RFID) is an important wireless communication and pervasive computing technique used for automatic item identification and data capture. In this paper, we present a scheme for securely tracing material flow in supply chains using the inherent RFID authentication and data logging capability. The scheme provides not only an overall path tracing and verification through the entire supply chain, but also the product identification within the scope of a supply chain partner. RFID tags and readers are deployed to ensure that only authorized supply chain partners can identify the tagged items in a secure and private way. The authors develop tag-reader authentication protocols to ensure the authenticity of RFID tags and readers. Their approach avoids the single point failure of the supply chain server – there is no need for each supply chain partner to communicate with the server for every material flow. Therefore, it minimizes the risks caused by system interruptions due to network failures or server unavailability.


Author(s):  
Jordan Frith

The phrase the Internet of things was originally coined in a 1999 presentation about attaching radio frequency identification (RFID) tags to individual objects. These tags would make the objects machine-readable, uniquely identifiable, and, most importantly, wirelessly communicative with infrastructure. This chapter evaluates RFID as a piece of mobile communicative infrastructure, and it examines two emerging forms: near-field communication (NFC) and Bluetooth low-energy beacons. The chapter shows how NFC and Bluetooth low-energy beacons may soon move some types of RFID to smartphones, in this way evolving the use of RFID in payment and transportation and enabling new practices of post-purchasing behaviors.


2021 ◽  
Vol 13 (7) ◽  
pp. 3684
Author(s):  
Bibiana Bukova ◽  
Jiri Tengler ◽  
Eva Brumercikova

The paper focuses on the environmental burden created by Radio Frequency Identification (RFID) tags in the Slovak Republic (SR). In order to determine the burden there, a model example was created to calculate electronic waste produced by households in the SR by placing RFID tags into municipal waste. The paper presents a legislative regulatory approach towards the environmental impacts from using RFID tags in the SR, as well as an analysis of the environmental burden of using RFID tags throughout the world. The core of the paper is focused on the research conducted in order to calculate the environmental burden of a model household in the SR, where the number of used RFID tags per year was observed; then, the volume of e-waste produced by households of the Slovak Republic per year was determined. In the conclusion, we provide the results of the research presented and discuss including our own proposal for solving the problems connected with the environmental burden of RFID technology.


2013 ◽  
Vol 9 (1) ◽  
pp. 44 ◽  
Author(s):  
Raghav V. Sampangi ◽  
Srinivas Sampalli

Radio Frequency Identification (RFID) is a technology that is very popular due to the simplicity in its technology and high adaptability in a variety of areas. The simplicity in the technology, however, comes with a caveat – RFID tags have severe resource restrictions, which make them vulnerable to a range of security attacks. Such vulnerability often results in the loss of privacy of the tag owner and other attacks on tags. Previous research in RFID security has mainly focused on authenticating entities such as readers / servers, which communicate with the tag. Any security mechanism is only as strong as the encryption keys used. Since RFID communication is wireless, critical messages such as key exchange messages are vulnerable to attacks. Therefore, we present a mutual authentication protocol that relies on independent generation and dynamic updates of encryption keys thereby removing the need for key exchange, which is based on the concept of gene mutation and transfer. We also present an enhanced version of this protocol, which improves the security offered by the first protocol. The novelty of the proposed protocols is in the independent generation, dynamic and continuous updates of encryption keys and the use of the concept of gene mutation / transfer to offer mutual authentication of the communicating entities. The proposed protocols are validated by simulation studies and security analysis.


Author(s):  
M. Zaki Zakaria ◽  
Sofianita Mutalib ◽  
Shuzlina Abdul Rahman ◽  
Shamsul J Elias ◽  
A Zambri Shahuddin

Radio Frequency Identification (RFID) is a one of the fastest growing and most beneficial technologies being adopted by businesses today. One of the important issues is localization of items in a warehouse or business premise and to keep track of the said items, it requires devices which are costly to deploy. This is because many readers need to be placed in a search space. In detecting an object, a reader will only report the signal strength of the tag detected. Once the signal strength report is obtained, the system will compute the coordinates of the RFID tags based on each data grouping. In this paper, algorithms using genetic algorithm, particle swarm, ant colony optimization are proposed to achieve the shortest path for an RFID mobile reader, while covering full search area. In comparison, for path optimization, the mobile reader traverses from one node to the next, moving around encountered obstacles in its path.  The tag reading process is iterative, in which the reader arrives at its start point at the end of each round. Based on the shortest path, an algorithm that computes the location of items in the search area is used. The simulation results show that the ACO method works more effectively and efficiently compare to others when solving shortest path problems.


2017 ◽  
Vol 29 (1) ◽  
pp. 109-120 ◽  
Author(s):  
Sanja Bauk ◽  
Mimo Draskovic ◽  
Anke Schmeink

This paper considers some of the barriers in implementing the RFID (radio frequency identification) technology for identifying, locating, tracking and tracing goods in supply chains, along with a model for adopting cloud services that can mitigate these obstacles in the transitional environment. The analysis is based on the assessments of the implementation impediments, given by the experts in the field of logistics: university professors, assistants and entrepreneurs from three Western Balkan countries (Montenegro, Serbia, and Bosnia and Herzegovina). Since the professionals’ assessments are influenced by their experiences from the transitional economies, which are faced with limited abilities to invest in expensive business information systems, the main hypothesis is that moving the logistics into the cloud may resolve or at least alleviate the considered problems. On the basis of the available secondary literature resources on pros and cons of RFID implementation into supply chains, and the statistical analysis of the consciously completed questionnaires in the survey, the model for adopting cloud services for providing RFID-enabled goods and related activities in the considered economies is proposed at a logical level. The paper also gives some directions for further research work in this domain.


2008 ◽  
Vol 07 (01) ◽  
pp. 9-14 ◽  
Author(s):  
Selwyn Piramuthu

Radio Frequency Identification (RFID) is promising, as a technique, to enable tracking of essential information about objects as they pass through supply chains. Information thus tracked can be utilised to efficiently operate the supply chain. Effective management of the supply chain translates to huge competitive advantage for the firms involved. Among several issues that impede seamless integration of RFID tags in a supply chain, one of the problems encountered while reading RFID tags is that of collision, which occurs when multiple tags transmit data to the same receiver slot. Data loss due to collision necessitates re-transmission of lost data. We consider this problem when Framed Slotted ALOHA protocol is used. Using machine learning, we adaptively configure the number of slots per frame to reduce the number of collisions while improving throughput.


Sign in / Sign up

Export Citation Format

Share Document