3,137 research outputs found

    A survey on subjecting electronic product code and non-ID objects to IP identification

    Full text link
    Over the last decade, both research on the Internet of Things (IoT) and real-world IoT applications have grown exponentially. The IoT provides us with smarter cities, intelligent homes, and generally more comfortable lives. However, the introduction of these devices has led to several new challenges that must be addressed. One of the critical challenges facing interacting with IoT devices is to address billions of devices (things) around the world, including computers, tablets, smartphones, wearable devices, sensors, and embedded computers, and so on. This article provides a survey on subjecting Electronic Product Code and non-ID objects to IP identification for IoT devices, including their advantages and disadvantages thereof. Different metrics are here proposed and used for evaluating these methods. In particular, the main methods are evaluated in terms of their: (i) computational overhead, (ii) scalability, (iii) adaptability, (iv) implementation cost, and (v) whether applicable to already ID-based objects and presented in tabular format. Finally, the article proves that this field of research will still be ongoing, but any new technique must favorably offer the mentioned five evaluative parameters.Comment: 112 references, 8 figures, 6 tables, Journal of Engineering Reports, Wiley, 2020 (Open Access

    A secure and private RFID authentication protocol based on quadratic residue

    Get PDF
    Radio Frequency IDentification based systems are getting pervasively deployed in many real-life applications in various settings for identification and authentication of remote objects. However, the messages that are transmitted over a insecure channel, are vulnerable to security and privacy concerns such as data privacy, location privacy of tag owner and etc. Recently, Yeh et al.'s proposed a RFID authentication protocol based on quadratic residue which is claimed to provide location privacy and prevent possible attacks. In this paper, we formally analyzed the protocol and we proved that the protocol provides destructive privacy according to Vaudenay privacy model. Moreover, we proposed a unilateral authentication protocol and we prove that our protocol satisfies higher privacy level such as narrow strong privacy. Besides, we proposed an enhanced version of our proposed protocol, which has same privacy level as Yeh at al protocol, but has reader authentication against stronger adversaries. Furthermore, the enhanced version of our protocol uses smaller number of cryptographic operations when compared to Yeh at al protocol and it is also cost efficient at the server and tag side and requires O(1) complexity to identify a RFID tag

    A Real-Time Laboratory Testbed For Evaluating Localization Performance Of WIFI RFID Technologies

    Get PDF
    A realistic comparative performance evaluation of indoor Geolocation systems is a complex and challenging problem facing the research community. This is due to the fact that performance of these systems depends on the statistical variations of the fading multipath characteristics of the wireless channel, the density and distribution of the access points in the area, and the number of the training points used by the positioning algorithm. This problem, in particular, becomes more challenging when we address RFID devices, because the RFID tags and the positioning algorithm are implemented in two separate devices. In this thesis, we have designed and implemented a testbed for comparative performance evaluation of RFID localization systems in a controlled and repeatable laboratory environment. The testbed consists of a real-time RF channel simulator, several WiFi 802.11 access points, commercial RFID tags, and a laptop loaded with the positioning algorithm and its associated user interface. In the real-time channel simulator the fading multipath characteristics of the wireless channel between the access points and the RFID tags is modeled by a modified site-specific IEEE 802.11 channel model which combines this model with the correlation model of shadow fading existing in the literature. The testbed is first used to compare the performance of the modified IEEE 802.11 channel model and the Ray Tracing channel model previously reported in the literature. Then, the testbed with the new channel model is used for comparative performance evaluation of two different WiFi RFID devices

    Goodbye, ALOHA!

    Get PDF
    ©2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.The vision of the Internet of Things (IoT) to interconnect and Internet-connect everyday people, objects, and machines poses new challenges in the design of wireless communication networks. The design of medium access control (MAC) protocols has been traditionally an intense area of research due to their high impact on the overall performance of wireless communications. The majority of research activities in this field deal with different variations of protocols somehow based on ALOHA, either with or without listen before talk, i.e., carrier sensing multiple access. These protocols operate well under low traffic loads and low number of simultaneous devices. However, they suffer from congestion as the traffic load and the number of devices increase. For this reason, unless revisited, the MAC layer can become a bottleneck for the success of the IoT. In this paper, we provide an overview of the existing MAC solutions for the IoT, describing current limitations and envisioned challenges for the near future. Motivated by those, we identify a family of simple algorithms based on distributed queueing (DQ), which can operate for an infinite number of devices generating any traffic load and pattern. A description of the DQ mechanism is provided and most relevant existing studies of DQ applied in different scenarios are described in this paper. In addition, we provide a novel performance evaluation of DQ when applied for the IoT. Finally, a description of the very first demo of DQ for its use in the IoT is also included in this paper.Peer ReviewedPostprint (author's final draft

    EXPERIMENTAL INVESTIGATION TO INFORM OPTIMAL CONFIGURATIONS FOR DYNAMIC NEAR-FIELD PASSIVE UHF RFID SYSTEMS

    Get PDF
    RFID has been characterized as a “disruptive technology” that has the potential to revolutionize numerous key sectors. A key advantage of passive RFID applications is the ability to wirelessly transmit automatic identification and related information using very little power. This paper presents an experimental investigation to inform the optimal configuration for programming passive ultra-high frequency (UHF) RFID media in dynamic applications. Dynamic programming solutions must be designed around the tag’s functionality, the physical programming configuration and environment. In this investigation, we present a methodology to determine an optimal configuration to maximize the systems programming efficiency for dynamic applications

    Communication Subsystems for Emerging Wireless Technologies

    Get PDF
    The paper describes a multi-disciplinary design of modern communication systems. The design starts with the analysis of a system in order to define requirements on its individual components. The design exploits proper models of communication channels to adapt the systems to expected transmission conditions. Input filtering of signals both in the frequency domain and in the spatial domain is ensured by a properly designed antenna. Further signal processing (amplification and further filtering) is done by electronics circuits. Finally, signal processing techniques are applied to yield information about current properties of frequency spectrum and to distribute the transmission over free subcarrier channels
    corecore