14,846 research outputs found
Accessing Antecedents and Outcomes of RFID Implementation in Health Care
This research first conceptualizes, develops, and validates four constructs for studying RFID in health care, including Drivers (Internal and External), Implementation Level (Clinical Focus and Administrative Focus), Barriers (Cost Issues, Lack of Understanding, Technical Issues, and Privacy and Security Concerns), and Benefits (Patient Care, Productivity, Security and Safety, Asset Management, and Communication). Data for the study were collected from 88 health care organizations and the measurement scales were validated using structural equation modeling. Second, a framework is developed to discuss the causal relationships among the above mentioned constructs. It is found that Internal Drivers are positively related to Implementation Level, which in turn is positively related to Benefits and Performance. In addition, Barriers are found to be positively related to Implementation Level, which is in contrast to the originally proposed negative relationship. The research also compares perception differences regarding RFID implementation among the non-implementers, future implementers, and current implementers of RFID. It is found that both future implementers and current implementers consider RFID barriers to be lower and benefits to be higher compared to the non-implementers. This paper ends with our research implications, limitations and future research
Quantitative Analysis for Authentication of Low-cost RFID Tags
Formal analysis techniques are widely used today in order to verify and
analyze communication protocols. In this work, we launch a quantitative
verification analysis for the low- cost Radio Frequency Identification (RFID)
protocol proposed by Song and Mitchell. The analysis exploits a Discrete-Time
Markov Chain (DTMC) using the well-known PRISM model checker. We have managed
to represent up to 100 RFID tags communicating with a reader and quantify each
RFID session according to the protocol's computation and transmission cost
requirements. As a consequence, not only does the proposed analysis provide
quantitative verification results, but also it constitutes a methodology for
RFID designers who want to validate their products under specific cost
requirements.Comment: To appear in the 36th IEEE Conference on Local Computer Networks (LCN
2011
Empirical Evidence of RFID Impacts on Supply Chain Performance
Purpose - The purpose of this paper is to investigate the actual benefits of radio frequency identification (RFID) on supply chain performance through the empirical evidence.
Design/methodology/approach - The research reviews and classifies the existing quantitative empirical evidence of RFID on supply chain performance. The evidence is classified by process (operational or managerial) and for each process by effect (automational, informational, and transformational).
Findings - The empirical evidence shows that the major effects from the implementation of RFID are automational effects on operational processes followed by informational effects on managerial processes. The RFID implementation has not reached transformational level on either operational or managerial processes. RFID has an automational effect on operational processes through inventory control and efficiency improvements. An informational effect for managerial processes is observed for improved decision quality, production control and the effectiveness of retail sales and promotions coordination. In addition, a three-stage model is proposed to explain the effects of RFID on the supply chain.
Research limitations/implications - Limitations of this research include the use of secondary sources and the lack of consistency in performance measure definitions. Future research could focus on detailed case studies that investigate cross-functional applications across the organization and the supply chain.
Practical implications - For managers, the empirical evidence presented can help them identify implementation areas where RFID can have the greatest impact. The data can be used to build the business case for RFID and therefore better estimate ROI and the payback period.
Originality/value - This research fills a void in the literature by providing practitioners and researchers with a better understanding of the quantitative benefits of RFID in the supply chain
Extended Abstract: Analysis of 1000 Arbiter PUF based RFID Tags
In this extended abstract a large-scale analysis of 4-
way Arbiter PUFs is performed with measurement results from
1000 RFID tags. Arbiter PUFs are one of the most important
building blocks in PUF-based protocols and have been the
subject of many papers. However, in the past often only software
simulations or a limited number of test chips were available for
analysis. Therefore, the goal of this work is to verify earlier
findings in regard to the uniqueness and reliability of Arbiter
PUFs by using a much larger measurement set. Furthermore, we
used machine learning algorithms to approximate and compare
the internal delay differences of the employed PUF. One of the
main research questions in this paper is to examine if any
“outliers” occurred, i.e., if some tags performed considerably
different. This might for example happen due to some unusual
manufacturing variations or faults. However, our findings are that
for all of the analyzed tags the parameters fell within the range
of a Gaussian distribution without significant outliers. Hence, our
results are indeed in line with the results of prior work
A framework for smart production-logistics systems based on CPS and industrial IoT
Industrial Internet of Things (IIoT) has received increasing attention from both academia and industry. However, several challenges including excessively long waiting time and a serious waste of energy still exist in the IIoT-based integration between production and logistics in job shops. To address these challenges, a framework depicting the mechanism and methodology of smart production-logistics systems is proposed to implement intelligent modeling of key manufacturing resources and investigate self-organizing configuration mechanisms. A data-driven model based on analytical target cascading is developed to implement the self-organizing configuration. A case study based on a Chinese engine manufacturer is presented to validate the feasibility and evaluate the performance of the proposed framework and the developed method. The results show that the manufacturing time and the energy consumption are reduced and the computing time is reasonable. This paper potentially enables manufacturers to deploy IIoT-based applications and improve the efficiency of production-logistics systems
Lightweight Mutual Authentication Protocol for Low Cost RFID Tags
Radio Frequency Identification (RFID) technology one of the most promising
technologies in the field of ubiquitous computing. Indeed, RFID technology may
well replace barcode technology. Although it offers many advantages over other
identification systems, there are also associated security risks that are not
easy to be addressed. When designing a real lightweight authentication protocol
for low cost RFID tags, a number of challenges arise due to the extremely
limited computational, storage and communication abilities of Low-cost RFID
tags. This paper proposes a real mutual authentication protocol for low cost
RFID tags. The proposed protocol prevents passive attacks as active attacks are
discounted when designing a protocol to meet the requirements of low cost RFID
tags. However the implementation of the protocol meets the limited abilities of
low cost RFID tags.Comment: 11 Pages, IJNS
Formal Verification of Safety Properties for Ownership Authentication Transfer Protocol
In ubiquitous computing devices, users tend to store some valuable
information in their device. Even though the device can be borrowed by the
other user temporarily, it is not safe for any user to borrow or lend the
device as it may cause private data of the user to be public. To safeguard the
user data and also to preserve user privacy we propose and model the technique
of ownership authentication transfer. The user who is willing to sell the
device has to transfer the ownership of the device under sale. Once the device
is sold and the ownership has been transferred, the old owner will not be able
to use that device at any cost. Either of the users will not be able to use the
device if the process of ownership has not been carried out properly. This also
takes care of the scenario when the device has been stolen or lost, avoiding
the impersonation attack. The aim of this paper is to model basic process of
proposed ownership authentication transfer protocol and check its safety
properties by representing it using CSP and model checking approach. For model
checking we have used a symbolic model checker tool called NuSMV. The safety
properties of ownership transfer protocol has been modeled in terms of CTL
specification and it is observed that the system satisfies all the protocol
constraint and is safe to be deployed.Comment: 16 pages, 7 figures,Submitted to ADCOM 201
A study on stryhcnos potatorum and pisum sativum as natural coagulants for meat food processing wastewater
Wastewater generated from meat food processing industry has significant effects on the environment. Many methods have been reported for removing turbidity, total suspended solids (TSS), chemical oxygen demand (COD), oil and grease (O&G) and colour from meat food processing wastewater (MFPW). The most common method among them is flocculation-coagulation process which is widely used. Although inorganic coagulants are prominent in wastewater treatments, its application may cause toxic residual. In this study, the attempt has been made to study the performance of S. Potatorum (nirmali) and P. Sativum (pea) seed as natural coagulants in the flocculation process. A further aim is to determine the optimum conditions for the treatment of MFPW effluents such as coagulant dosage, mixing rate and pH. An adsorption study was also carried out to study the adsorption potential of these coagulants to treat MFPW. A lab-scale treatment tank was developed to evaluate the effectiveness in MFPW treatment. Jar test results showed that optimum dosage, pH and mixing rate for S. Potatorum were pH 8 with dosage of 150 mg/L and 150 rpm mixing rate with the removal of turbidity, TSS, COD, O&G and colour are 91%, 97.6%, 58.4%, 79.9% and 84.3% respectively. Meanwhile, for P. Sativum, the optimum condition were observed at pH 8 with dosage of 150 mg/L and 150 rpm mixing rate with the removal of turbidity, TSS, COD, O&G and colour 87.8%, 97.3%, 65.5%, 77.9% and 76.5% respectively. The adsorption study was found that the analysis fitted well to the Langmuir isotherm for both natural coagulants. Results show that the percentage of turbidity, TSS, COD, O&G removal by chemical coagulants are quite similar than natural coagulants when lab-scale treatment tank was used to treat the MFPW. This indicated that these natural coagulants have a potential to use as alternative in wastewater treatment
High-Security, Clone-proof RFID with Secure Distance Bounding
Wireless near-field (NFC) and short-range RFID “security” devices are ubiquitous, commonly found in vehicle security (keyless-entry, remote-start), access control (employee key cards), travel cards, point-of-sale (PoS) transactions via NFC-enabled mobile phone or credit card, among others. Whenever assets of high-value are at stake, adversaries will stop at nothing to gain access to those assets, so it should be assumed that security systems will be subjected to many forms of attack. There have already been several highly publicized successful breaches of keyless entry systems, including relay and key-cloning attacks.
This poster describes a a highly-secure, distance-bounding, clone-proof RFID mechanism for protecting high-value assets. The system employs a unique combination of technologies to make it highly-resistant to relay attacks, probing, modeling, cloning and snooping
- …