3,237 research outputs found

    Leveraging RFID in hospitals: patient life cycle and mobility perspectives

    Get PDF
    The application of Radio Frequency Identification (RFID) to patient care in hospitals and healthcare facilities has only just begun to be accepted. This article develops a set of frameworks based on patient life cycle and time-and-motion perspectives for how RFID can be leveraged atop existing information systems to offer many benefits for patient care and hospital operations. It examines how patients are processed from admission to discharge, and considers where RFID can be applied. From a time-and-motion perspective, it shows how hospitals can apply RFID in three ways: fixed RFID readers interrogate mobile objects; mobile, handheld readers interrogate fixed objects; and mobile, handheld readers interrogate mobile objects. Implemented properly, RFID can significantly aid the medical staff in performing their duties. It can greatly reduce the need for manual entry of records, increase security for both patient and hospital, and reduce errors in administering medication. Hospitals are likely to encounter challenges, however, when integrating the technology into their day-to-day operations. What we present here can help hospital administrators determine where RFID can be deployed to add the most value

    RePos : relative position estimation of UHF-RFID tags for item-level localization

    Get PDF
    Radio frequency identification (RFID) technology brings tremendous applications in location-based services. Specifically, ultra-high frequency (UHF) RFID tag positioning based on phase (difference) of arrival (PoA/PDoA) has won great attention, due to its better positioning accuracy than signal strength-based methods. In most cases, such as logistics, retailing, and smart inventory management, the relative orders of the objects are much more attractive than absolute positions with centimetre-level accuracy. In this paper, a relative positioning (RePos) approach based on inter-tag distance and direction estimation is proposed. In the RePos positioning system, the measured phases are reconstructed based on unwrapping method. Then the distances from antenna to the tags are calculated using the distance differences of pairs of antenna's positions via a least-squares method. The relative relationships of the tags, including relative distances and angles, are obtained based on the geometry information extracted from PDoA. The experimental results show that the RePos RFID positioning system can realize about 0.28-meter ranging accuracy, and distinguish the levels and columns without ambiguity

    From M-ary Query to Bit Query: a new strategy for efficient large-scale RFID identification

    Get PDF
    The tag collision avoidance has been viewed as one of the most important research problems in RFID communications and bit tracking technology has been widely embedded in query tree (QT) based algorithms to tackle such challenge. Existing solutions show further opportunity to greatly improve the reading performance because collision queries and empty queries are not fully explored. In this paper, a bit query (BQ) strategy based Mary query tree protocol (BQMT) is presented, which can not only eliminate idle queries but also separate collided tags into many small subsets and make full use of the collided bits. To further optimize the reading performance, a modified dual prefixes matching (MDPM) mechanism is presented to allow multiple tags to respond in the same slot and thus significantly reduce the number of queries. Theoretical analysis and simulations are supplemented to validate the effectiveness of the proposed BQMT and MDPM, which outperform the existing QT-based algorithms. Also, the BQMT and MDPM can be combined to BQMDPM to improve the reading performance in system efficiency, total identification time, communication complexity and average energy cost

    Technologie RFID a Blochkchain v dodavatelském řetězci

    Get PDF
    The paper discusses the possibility of combining RFID and Blockchain technology to more effectively prevent counterfeiting of products or raw materials, and to solve problems related to production, logistics and storage. Linking these technologies can lead to better planning by increasing the transparency and traceability of industrial or logistical processes or such as efficient detection of critical chain sites.Příspěvek se zabývá možností kombinace technologií RFID a Blockchain pro účinnější zabránění padělání výrobků či surovin a řešení problémů spojených s výrobou, logistikou a skladováním. Spojení těchto technologií může vést k lepšímu plánování díky vyšší transparentnosti a sledovatelnosti průmyslových nebo logistických procesů, nebo například k efektivnímu zjišťování kritických míst řetězce

    Efficient and Low-Cost RFID Authentication Schemes

    Get PDF
    Security in passive resource-constrained Radio Frequency Identification (RFID) tags is of much interest nowadays. Resistance against illegal tracking, cloning, timing, and replay attacks are necessary for a secure RFID authentication scheme. Reader authentication is also necessary to thwart any illegal attempt to read the tags. With an objective to design a secure and low-cost RFID authentication protocol, Gene Tsudik proposed a timestamp-based protocol using symmetric keys, named YA-TRAP*. Although YA-TRAP* achieves its target security properties, it is susceptible to timing attacks, where the timestamp to be sent by the reader to the tag can be freely selected by an adversary. Moreover, in YA-TRAP*, reader authentication is not provided, and a tag can become inoperative after exceeding its pre-stored threshold timestamp value. In this paper, we propose two mutual RFID authentication protocols that aim to improve YA-TRAP* by preventing timing attack, and by providing reader authentication. Also, a tag is allowed to refresh its pre-stored threshold value in our protocols, so that it does not become inoperative after exceeding the threshold. Our protocols also achieve other security properties like forward security, resistance against cloning, replay, and tracking attacks. Moreover, the computation and communication costs are kept as low as possible for the tags. It is important to keep the communication cost as low as possible when many tags are authenticated in batch-mode. By introducing aggregate function for the reader-to-server communication, the communication cost is reduced. We also discuss different possible applications of our protocols. Our protocols thus capture more security properties and more efficiency than YA-TRAP*. Finally, we show that our protocols can be implemented using the current standard low-cost RFID infrastructures.Comment: 21 pages, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol 2, No 3, pp. 4-25, 201
    corecore