591 research outputs found

    Survey on Lightweight Primitives and Protocols for RFID in Wireless Sensor Networks

    Get PDF
    The use of radio frequency identification (RFID) technologies is becoming widespread in all kind of wireless network-based applications. As expected, applications based on sensor networks, ad-hoc or mobile ad hoc networks (MANETs) can be highly benefited from the adoption of RFID solutions. There is a strong need to employ lightweight cryptographic primitives for many security applications because of the tight cost and constrained resource requirement of sensor based networks. This paper mainly focuses on the security analysis of lightweight protocols and algorithms proposed for the security of RFID systems. A large number of research solutions have been proposed to implement lightweight cryptographic primitives and protocols in sensor and RFID integration based resource constraint networks. In this work, an overview of the currently discussed lightweight primitives and their attributes has been done. These primitives and protocols have been compared based on gate equivalents (GEs), power, technology, strengths, weaknesses and attacks. Further, an integration of primitives and protocols is compared with the possibilities of their applications in practical scenarios

    Modeling and simulation of an IoT enabled cold Chain Logistics management system

    Get PDF
    06.03.2018 tarihli ve 30352 sayılı Resmi Gazetede yayımlanan “Yükseköğretim Kanunu İle Bazı Kanun Ve Kanun Hükmünde Kararnamelerde Değişiklik Yapılması Hakkında Kanun” ile 18.06.2018 tarihli “Lisansüstü Tezlerin Elektronik Ortamda Toplanması, Düzenlenmesi ve Erişime Açılmasına İlişkin Yönerge” gereğince tam metin erişime açılmıştır.Dünya ekonomisinin etkileyici bir şekilde büyümesi, soğuk zincirde izlenmesi ve yönetilmesi gereken özellikle sıcaklık duyarlı ürünler için belirsizlik durumları karşısında etkin, esnek ve duyarlı olabilmek amacıyla lojistik hizmetleri talep eden tedarik zincirinde artış sağlamıştır. Bunun gerçekleştirilebilmesi için Lojistik şirketerinin uygun bilişim teknolojileri ile desteklenmesi gerekmektedir. İnternet kullanımı ile müşteri ve lojistik sağlayıcı arasında etkili bir bilgi akışı ortamı sağlanmaktadır; ancak lojistik hizmetindeki bilgi ve ürün akışı arasındaki mevcut açıklık, sıcaklık duyarlı nesneler hakkında gerçek zamanlı bilginin elde edilmesinde karar vericiler için lojistik yönetimini daha zor duruma getiren bir problem oluşturmaktadır. Nesnelerin İnterneti alanındaki gelişmeler soğuk zincir sanayilerinde izleme, yönetme ve gerçek zamanlı görünürlük sağlama ve uygun zeka seviyesi ile bilgi paylaşımı alanında potensiyel çözümler sunmaktadır. Bu çalışmada soğuk zincirin gerçek zamanlı ortam sıcaklığını izleme, yönetme ve soğuk zincir içerisindeki sıcaklık duyarlı ürünlerin raf ömrünün tahmin edilmesi aracılığıyla tüm karar vericilerin karar desteklerini geliştirmeye yardımcı olan IoT erişimli soğuk zincir lojistiği gösterilemektedir. Çalışma içerisinde, gerçek zamanlı ortam verileri IEEE 802.15.4 kablosuz algılayıcı ağ yapısı kullanılarak elde edilmiş ve toplanan veriler bir ağ geçidi aracılığıyla sunucuya, ürünlerin raf ömürlerinin geliştirilen karar destek sistemi yardıyla tahmin edilebilmesini sağlamak üzere, gönderilmiştir. Ayrıca, soğuk zincir içerisindeki bozulabilir ürünlerin tespiti için Radyo Frekanslı Tanıma (Radio Frequency Identification-RFID) kullanılmıştır. Çalışma içerisinde kullanılan tüm cihazlar ve protokoller olay-güdümlü Riverbed Modeler yazılımıyla modellenerek benzetimleri yapılmıştır.The Dramatic growth of world economy results growth in the supply chain which demands logistics service to be agile, flexible and responsive in the face of uncertainty, especially for temperature sensitive products that need to be monitored and managed in the cold chain. To achieve this, Logistics companies must be supported by appropriate information technologies. Internet provides an effective means of driving information between customer and logistics provider, however, existing gap between products flow and information flow in logistic service has created a problem in getting real-time information about temperature sensitive items which make logistics management more challenging for decision makers. The growth of internet of things (IoT) gives a potential solution for monitoring, managing, and achieving real-time visibility and sharing information with the appropriate level of intelligence in cold chain industries. This paper demonstrates IoT enabled cold chain logistics that helps to enhance the decision support of all actors through managing, monitoring the real-time ambient temperature of the cold chain and predicting the shelf-life of temperature sensitive products inside the cold chain. In the study, real-time data of ambient parameters are gathered using IEEE 802.15.4 based wireless sensor networks and sent to the remote server through a gateway so that the shelf life of the products can be predicted by the decision support system developed. Radio Frequency Identification (RFID) is also used for identification of perishable goods inside the cold chain. All the devices and protocols employed in the study are modeled and simulated using event-driven Riverbed Modeler software

    Ensuring Application Specific Security, Privacy and Performance Goals in RFID Systems

    Get PDF
    Radio Frequency IDentification (RFID) is an automatic identification technology that uses radio frequency to identify objects. Securing RFID systems and providing privacy in RFID applications has been the focus of much academic work lately. To ensure universal acceptance of RFID technology, security and privacy issued must be addressed into the design of any RFID application. Due to the constraints on memory, power, storage capacity, and amount of logic on RFID devices, traditional public key based strong security mechanisms are unsuitable for them. Usually, low cost general authentication protocols are used to secure RFID systems. However, the generic authentication protocols provide relatively low performance for different types of RFID applications. We identified that each RFID application has unique research challenges and different performance bottlenecks based on the characteristics of the system. One strategy is to devise security protocols such that application specific goals are met and system specific performance requirements are maximized. This dissertation aims to address the problem of devising application specific security protocols for current and next generation RFID systems so that in each application area maximum performance can be achieved and system specific goals are met. In this dissertation, we propose four different authentication techniques for RFID technologies, providing solutions to the following research issues: 1) detecting counterfeit as well as ensuring low response time in large scale RFID systems, 2) preserving privacy and maintaining scalability in RFID based healthcare systems, 3) ensuring security and survivability of Computational RFID (CRFID) networks, and 4) detecting missing WISP tags efficiently to ensure reliability of CRFID based system\u27s decision. The techniques presented in this dissertation achieve good levels of privacy, provide security, scale to large systems, and can be implemented on resource-constrained RFID devices

    Energy-efficient active tag searching in large scale RFID systems

    Get PDF
    Radio Frequency Identification (RFID) has attracted much research attention in recent years. RFID can support automatic information tracing and management during the management process in many fields. A typical field that uses RFID is modern warehouse management, where products are attached with tags and the inventory of products is managed by retrieving tag IDs. Many practical applications require searching a group of tags to determine whether they are in the system or not. The existing studies on tag searching mainly focused on improving the time efficiency but paid little attention to energy efficiency which is extremely important for active tags powered by built-in batteries. To fill in this gap, this paper investigates the tag searching problem from the energy efficiency perspective. We first propose an Energy-efficient tag Searching protocol in Multiple reader RFID systems, namely ESiM, which pushes per tag energy consumption to the limit as each tag needs to exchange only one bit data with the reader. We then develop a time efficiency enhanced version of ESiM, namely TESiM, which can dramatically reduce the execution time while only slightly increasing the transmission overhead. Extensive simulation experiments reveal that, compared to state-of-the-art solution in the current literature, TESiM reduces per tag energy consumption by more than one order of magnitude subject to comparable execution time. In most considered scenarios, TESiM even reduces the execution time by more than 50%.This work is partially supported by the National Science Foundation of China (Grant Nos. 61103203, 61332004, 61402056 and 61420106009), NSFC/RGC Joint Research Scheme (Grant No. N_PolyU519/12), and the EU FP7 CLIMBER project (Grant Agreement No. PIRSES-GA-2012-318939)

    A survey on subjecting electronic product code and non-ID objects to IP identification

    Full text link
    Over the last decade, both research on the Internet of Things (IoT) and real-world IoT applications have grown exponentially. The IoT provides us with smarter cities, intelligent homes, and generally more comfortable lives. However, the introduction of these devices has led to several new challenges that must be addressed. One of the critical challenges facing interacting with IoT devices is to address billions of devices (things) around the world, including computers, tablets, smartphones, wearable devices, sensors, and embedded computers, and so on. This article provides a survey on subjecting Electronic Product Code and non-ID objects to IP identification for IoT devices, including their advantages and disadvantages thereof. Different metrics are here proposed and used for evaluating these methods. In particular, the main methods are evaluated in terms of their: (i) computational overhead, (ii) scalability, (iii) adaptability, (iv) implementation cost, and (v) whether applicable to already ID-based objects and presented in tabular format. Finally, the article proves that this field of research will still be ongoing, but any new technique must favorably offer the mentioned five evaluative parameters.Comment: 112 references, 8 figures, 6 tables, Journal of Engineering Reports, Wiley, 2020 (Open Access

    The Study on Secure RFID Authentication and Access Control

    Get PDF

    WSN and RFID integration to support intelligent monitoring in smart buildings using hybrid intelligent decision support systems

    Get PDF
    The real time monitoring of environment context aware activities is becoming a standard in the service delivery in a wide range of domains (child and elderly care and supervision, logistics, circulation, and other). The safety of people, goods and premises depends on the prompt reaction to potential hazards identified at an early stage to engage appropriate control actions. This requires capturing real time data to process locally at the device level or communicate to backend systems for real time decision making. This research examines the wireless sensor network and radio frequency identification technology integration in smart homes to support advanced safety systems deployed upstream to safety and emergency response. These systems are based on the use of hybrid intelligent decision support systems configured in a multi-distributed architecture enabled by the wireless communication of detection and tracking data to support intelligent real-time monitoring in smart buildings. This paper introduces first the concept of wireless sensor network and radio frequency identification technology integration showing the various options for the task distribution between radio frequency identification and hybrid intelligent decision support systems. This integration is then illustrated in a multi-distributed system architecture to identify motion and control access in a smart building using a room capacity model for occupancy and evacuation, access rights and a navigation map automatically generated by the system. The solution shown in the case study is based on a virtual layout of the smart building which is implemented using the capabilities of the building information model and hybrid intelligent decision support system.The Saudi High Education Ministry and Brunel University (UK
    corecore