362 research outputs found

    Case Study: Installing RFID Systems in Supermarkets

    Get PDF
    Radio frequency identification technology (RFID) is considered as the reference technology for wireless identification and item traceability. Supermarkets are one of those scenarios where the RFID potential can be harnessed. In theory, RFID in supermarkets shows several advantages compared with traditional barcode systems, offering real‐time inventory, stock control, cash queues, among others. In practice, its massive and global implementation is still being delayed due to the high quantity of factors that degrade the RFID system performance in these scenarios, causing uncontrolled items and identification losses and, at the end, economical losses. Some works in the scientific literature studied a single or a set of problems related to RFID performance, mostly focused on a specific communication layer: antennas and hardware design, interferences at physical layer, medium access control (MAC) protocols, security issues, or middleware challenges. However, there are no works describing in depth the set of factors affecting RFID performance in a specific scenario and contemplating the entire communication layer stack. The first challenge of this chapter is to provide a complete analysis of those physical and environmental factors, hardware and software limitations, and standard and regulation restrictions that have a direct impact on the RFID system performance in supermarkets. This analysis is addressed by communication layers, paying attention to the point of view of providers, supermarket companies, and final customers. Some of the most feasible and influential research works that address individual problems are also enumerated. Finally, taking the results extracted from this study, this chapter provides a Guide of Good Practices (GGPs), giving a global vision for addressing a successful RFID implementation project, useful for researchers, developers, and installers

    Prevention And Detection Mechanism For Security In Passive Rfid System

    Get PDF
    Low-cost radio frequency identification (RFID) tags conforming to the EPCglobal Class-1 Generation-2 standard are inherently insecure due to computational constraints. This thesis proposed the use of both prevention and detection mechanisms to solve the security and privacy issues. A lightweight cryptographic mutual authentication protocol which is resistant to tracking, denial of service (DoS) and replay attacks is proposed as a prevention mechanism. The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). The proposed protocol using 64 bits index is proved having the lowest non-unequivocally identification probability. In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. The correctness of the proposed protocol is demonstrated in a simulation model developed in JAVA TCP/IP socket. Next, the proposed protocol is implemented in RFID system including IAIK UHF Demo tag, TagSense Nano-UHF reader and back-end database. A GUI is created in a form of JAVA application to display data detected from tag. The proposed protocol implemented in real RFID system outperforms other related protocols because of 13.46 % shorter read time and write time consumed. The system is proved to be able to prevent tracking, DoS, and replay attacks from adversaries with moderate computation requirement compared to other related protocols

    Integration of RFID and Industrial WSNs to Create A Smart Industrial Environment

    Get PDF
    A smart environment is a physical space that is seamlessly embedded with sensors, actuators, displays, and computing devices, connected through communication networks for data collection, to enable various pervasive applications. Radio frequency identification (RFID) and Wireless Sensor Networks (WSNs) can be used to create such smart environments, performing sensing, data acquisition, and communication functions, and thus connecting physical devices together to form a smart environment. This thesis first examines the features and requirements a smart industrial environment. It then focuses on the realization of such an environment by integrating RFID and industrial WSNs. ISA100.11a protocol is considered in particular for WSNs, while High Frequency RFID is considered for this thesis. This thesis describes designs and implementation of the hardware and software architecture necessary for proper integration of RFID and WSN systems. The hardware architecture focuses on communication interface and AI/AO interface circuit design; while the driver of the interface is implemented through embedded software. Through Web-based Human Machine Interface (HMI), the industrial users can monitor the process parameters, as well as send any necessary alarm information. In addition, a standard Mongo database is designed, allowing access to historical and current data to gain a more in-depth understanding of the environment being created. The information can therefore be uploaded to an IoT Cloud platform for easy access and storage. Four scenarios for smart industrial environments are mimicked and tested in a laboratory to demonstrate the proposed integrated system. The experimental results have showed that the communication from RFID reader to WSN node and the real-time wireless transmission of the integrated system meet design requirements. In addition, compared to a traditional wired PLC system where measurement error of the integrated system is less than 1%. The experimental results are thus satisfactory, and the design specifications have been achieved

    Performance Analysis of Effective Range and Orientation of UHF Passive RFID

    Get PDF
    The purpose of this research is to characterize the performance of UHF passive RFID tags. Factors of importance are the impact of tag orientation and distance from the RFID reader. Within this study, a comprehensive literature review of RFID technology is presented as well as the methodology used for the research. Furthermore, an analysis of RFID tag experiments is discussed and the results reviewed. To accomplish this task, two main objectives have been established as goals for the study. The first objective is to determine an optimum tag orientation within the RFID reader’s normal read range. Once the optimum tag orientation is determined, the orientation is used to perform range variation tests. The end goal of these tests is to find the maximum range at which the tags are readable under normal conditions using standard equipment. Grasping an idea of RFID tag boundaries contributes to the security and privacy of the technology. This is extremely important as RFID tags are becoming the logistical tool of choice for Department of Defense (DoD) supply chains. This fundamental study creates a foundation that may support both offensive and defensive oriented research. By understanding tag weaknesses and strengths, users of the technology can make sound decisions that lead to the protection of valuable information and assets

    Critical Management Issues for Implementing RFID in Supply Chain Management

    Get PDF
    The benefits of radio frequency identification (RFID) technology in the supply chain are fairly compelling. It has the potential to revolutionise the efficiency, accuracy and security of the supply chain with significant impact on overall profitability. A number of companies are actively involved in testing and adopting this technology. It is estimated that the market for RFID products and services will increase significantly in the next few years. Despite this trend, there are major impediments to RFID adoption in supply chain. While RFID systems have been around for several decades, the technology for supply chain management is still emerging. We describe many of the challenges, setbacks and barriers facing RFID implementations in supply chains, discuss the critical issues for management and offer some suggestions. In the process, we take an in-depth look at cost, technology, standards, privacy and security and business process reengineering related issues surrounding RFID technology in supply chains

    Next Generation Auto-Identification and Traceability Technologies for Industry 5.0: A Methodology and Practical Use Case for the Shipbuilding Industry

    Get PDF
    [Abstract] Industry 5.0 follows the steps of the Industry 4.0 paradigm and seeks for revolutionizing the way industries operate. In fact, Industry 5.0 focuses on research and innovation to support industrial production sustainability and place the well-being of industrial workers at the center of the production process. Thus, Industry 5.0 relies on three pillars: it is human-centric, it encourages sustainability and it is aimed at developing resilience against disruptions. Such core aspects cannot be fully achieved without a transparent end-to-end human-centered traceability throughout the value chain. As a consequence, Auto-Identification (Auto-ID) technologies play a key role, since they are able to provide automated item recognition, positioning and tracking without human intervention or in cooperation with industrial operators. Although the most popular Auto-ID technologies provide a certain degree of security and productivity, there are still open challenges for future Industry 5.0 factories. This article analyzes and evaluates the Auto-ID landscape and delivers a holistic perspective and understanding of the most popular and the latest technologies, looking for solutions that cope with harsh, diverse and complex industrial scenarios. In addition, it describes a methodology for selecting Auto-ID technologies for Industry 5.0 factories. Such a methodology is applied to a specific use case of the shipbuilding industry that requires identifying the main components of a ship during its construction and repair. To validate the outcomes of the methodology, a practical evaluation of passive and active UHF RFID tags was performed in an Offshore Patrol Vessel (OPV) under construction, showing that a careful selection and evaluation of the tags enables product identification and tracking even in areas with a very high density of metallic objects. As a result, this article serves as a useful guide for industrial stakeholders, including future developers and managers that seek for deploying identification and traceability technologies in Industry 5.0 scenarios.This work was supported in part by the Auto-Identication for Intelligent Products Research Line of the Navantia-Universidade da Coruña Joint Research Unit under Grant IN853B-2018/02, and in part by the Centro de Investigación de Galicia ``CITIC,'' funded by Xunta de Galicia and the European Union (European Regional Development Fund-Galicia 2014_2020 Program) under Grant ED431G 2019/01Xunta de Galicia; IN853B-2018/02Xunta de Galicia; ED431G 2019/0

    PLACE: Physical Layer Cardinality Estimation for Large-Scale RFID Systems

    Full text link

    Embedded system for networked real-time RFID reader

    Get PDF
    Erilaisia tuotantoprosessiin liitettäviä jäljitettävyysketjuja on käytössä useilla eri teollisuudenaloilla. Jäljitettävyydellä pyritään sekä parantamaan tuotantoprosessia että liittämään enemmän prosessitietoa itse lopputuotteeseen. Huomattavista säästömahdollisuuksista huolimatta koko puunjalostusprosessin kattavaa jäljitettävyyttä ei metsäteollisuuteen ole kuitenkaan toteutettu. Tämä diplomityö on toteutettu osana suurta kansainvälistä Indisputable Key -projektia, jossa tähdätään puutavaran jäljitettävyyden parantamiseen ja jäljitettävyystiedon hyödyntämiseen käytännössä. Tässä työssä suunnitellaan ja toteutetaan RFID lukijan sulautettu järjestelmä. RFID-lukija suunnitellaan VTT:llä, ja sitä käytetään metsäkoneen harvesteripäässä osana puutavaran jäljitettävyysketjua. Käyttöympäristö ja -tarkoitus asettavat RFID-lukijalle ja sulautetulle järjestelmälle vaatimuksia sekä kommunikointiin ja käytettyihin rajapintoihin että myös radiotaajuisen elektroniikan hallintaan. Toteutettu sulautettu järjestelmä hoitaa RFID-lukijan kommunikoinnin isäntäjärjestelmän kanssa käyttäen metsäkoneen CAN-väylää. Lisäksi myös sarjamuotoinen kommunikointi toteutetaan lukijan testaamista ja esittelyä varten. Sekä isäntä-lukija-rajapinnassa että ilmarajapinnassa kommunikoinnissa sulautetun järjestelmän ja muun jäljitettävyysketjun välillä hyödynnetään yleisesti laajassa käytössä olevia RFID-standardeja. Lisäksi sulautettu järjestelmä hoitaa RFID-lukijan sisäistä toimintaa ja elektroniikan hallinnan. Työn tuloksena saadaan sulautettu järjestelmä, joka on testaamalla ja mittaamalla todettu sopivaksi käytettäväksi Indisputable Key -projektissa ja metsäkoneessa. RFID-lukijaa, johon sulautettu järjestelmä toteutetaan, hyödynnetään Indisputable Key -projektin laajan mittakaavan testeissä, jotka on suunniteltu suoritettaviksi talvella 2009-2010.Traceability chains are used in multiple industrial fields to gather more knowledge about the manufacturing processes and, also, to link gathered data to the final product. Although, significant savings would be possible also in Forestry, no complete traceability chain yet exists. This thesis is written as a part of a large international Indisputable Key project that aims to improve the traceability in Forestry leading to economical and environmental improvements in the wood processing. In this thesis an embedded system for an RFID reader is designed and implemented. The RFID reader is designed at VTT to be used in a forest harvester head as a part of the wood material traceability chain. Using environment and purpose set requirements for the reader and the embedded software in terms of networking possibilities and used communication interface standards as well as electronics control. The designed embedded system handles the host communication to the rest of the traceability system via the forest harvester CAN network, but, also, additional serial line interface for host communication is implemented and used for testing and demonstration purposes. Embedded system of the reader handles both host and air interface communication through widely used EPCglobal RFID protocols. In addition to the networking and host and tag communication interfaces, the embedded system controls the inner operation of the RFID reader and RF electronics. Harvester head, where the RFID reader is utilized, limits the use of normal RF designs and sets requirements also for the RF electronics control. The result of the thesis is an embedded system that is tested and measured to be suitable for the use in the Indisputable Key and the forest harvester. RFID reader is utilized in the Indisputable Key final demonstrations and large-scale testing that are scheduled to be conducted in Winter 2009-2010
    corecore