3,237 research outputs found
Leveraging RFID in hospitals: patient life cycle and mobility perspectives
The application of Radio Frequency Identification (RFID) to patient care in hospitals and healthcare facilities has only just begun to be accepted. This article develops a set of frameworks based on patient life cycle and time-and-motion perspectives for how RFID can be leveraged atop existing information systems to offer many benefits for patient care and hospital operations.
It examines how patients are processed from admission to discharge, and considers where RFID can be applied. From a time-and-motion perspective, it shows how hospitals can apply RFID in three ways: fixed RFID readers interrogate mobile objects; mobile, handheld readers interrogate fixed objects; and mobile, handheld readers interrogate mobile objects.
Implemented properly, RFID can significantly aid the medical staff in performing their duties. It can greatly reduce the need for manual entry of records, increase security for both patient and hospital, and reduce errors in administering medication. Hospitals are likely to encounter challenges, however, when integrating the technology into their day-to-day operations. What we present here can help hospital administrators determine where RFID can be deployed to add the most value
RePos : relative position estimation of UHF-RFID tags for item-level localization
Radio frequency identification (RFID) technology brings tremendous applications in location-based services. Specifically, ultra-high frequency (UHF) RFID tag positioning based on phase (difference) of arrival (PoA/PDoA) has won great attention, due to its better positioning accuracy than signal strength-based methods. In most cases, such as logistics, retailing, and smart inventory management, the relative orders of the objects are much more attractive than absolute positions with centimetre-level accuracy. In this paper, a relative positioning (RePos) approach based on inter-tag distance and direction estimation is proposed. In the RePos positioning system, the measured phases are reconstructed based on unwrapping method. Then the distances from antenna to the tags are calculated using the distance differences of pairs of antenna's positions via a least-squares method. The relative relationships of the tags, including relative distances and angles, are obtained based on the geometry information extracted from PDoA. The experimental results show that the RePos RFID positioning system can realize about 0.28-meter ranging accuracy, and distinguish the levels and columns without ambiguity
From M-ary Query to Bit Query: a new strategy for efficient large-scale RFID identification
The tag collision avoidance has been viewed as one of the most important research problems in RFID communications and bit tracking technology has been widely embedded in query tree (QT) based algorithms to tackle such challenge. Existing solutions show further opportunity to greatly improve the reading performance because collision queries and empty queries are not fully explored. In this paper, a bit query (BQ) strategy based Mary query tree protocol (BQMT) is presented, which can not only eliminate idle queries but also separate collided tags into many small subsets and make full use of the collided bits. To further optimize the reading performance, a modified dual prefixes matching (MDPM) mechanism is presented to allow multiple tags to respond in the same slot and thus significantly reduce the number of queries. Theoretical analysis and simulations are supplemented to validate the effectiveness of the proposed BQMT and MDPM, which outperform the existing QT-based algorithms. Also, the BQMT and MDPM can be combined to BQMDPM to improve the reading performance in system efficiency, total identification time, communication complexity and average energy cost
Technologie RFID a Blochkchain v dodavatelském řetězci
The paper discusses the possibility of combining RFID and Blockchain technology to more effectively prevent counterfeiting of products or raw materials, and to solve problems related to production, logistics and storage. Linking these technologies can lead to better planning by increasing the transparency and traceability of industrial or logistical processes or such as efficient detection of critical chain sites.Příspěvek se zabývá možností kombinace technologií RFID a Blockchain pro účinnější zabránění padělání výrobků či surovin a řešení problémů spojených s výrobou, logistikou a skladováním. Spojení těchto technologií může vést k lepšímu plánování díky vyšší transparentnosti a sledovatelnosti průmyslových nebo logistických procesů, nebo například k efektivnímu zjišťování kritických míst řetězce
Efficient and Low-Cost RFID Authentication Schemes
Security in passive resource-constrained Radio Frequency Identification
(RFID) tags is of much interest nowadays. Resistance against illegal tracking,
cloning, timing, and replay attacks are necessary for a secure RFID
authentication scheme. Reader authentication is also necessary to thwart any
illegal attempt to read the tags. With an objective to design a secure and
low-cost RFID authentication protocol, Gene Tsudik proposed a timestamp-based
protocol using symmetric keys, named YA-TRAP*. Although YA-TRAP* achieves its
target security properties, it is susceptible to timing attacks, where the
timestamp to be sent by the reader to the tag can be freely selected by an
adversary. Moreover, in YA-TRAP*, reader authentication is not provided, and a
tag can become inoperative after exceeding its pre-stored threshold timestamp
value. In this paper, we propose two mutual RFID authentication protocols that
aim to improve YA-TRAP* by preventing timing attack, and by providing reader
authentication. Also, a tag is allowed to refresh its pre-stored threshold
value in our protocols, so that it does not become inoperative after exceeding
the threshold. Our protocols also achieve other security properties like
forward security, resistance against cloning, replay, and tracking attacks.
Moreover, the computation and communication costs are kept as low as possible
for the tags. It is important to keep the communication cost as low as possible
when many tags are authenticated in batch-mode. By introducing aggregate
function for the reader-to-server communication, the communication cost is
reduced. We also discuss different possible applications of our protocols. Our
protocols thus capture more security properties and more efficiency than
YA-TRAP*. Finally, we show that our protocols can be implemented using the
current standard low-cost RFID infrastructures.Comment: 21 pages, Journal of Wireless Mobile Networks, Ubiquitous Computing,
and Dependable Applications (JoWUA), Vol 2, No 3, pp. 4-25, 201
- …