14,846 research outputs found

    Accessing Antecedents and Outcomes of RFID Implementation in Health Care

    Get PDF
    This research first conceptualizes, develops, and validates four constructs for studying RFID in health care, including Drivers (Internal and External), Implementation Level (Clinical Focus and Administrative Focus), Barriers (Cost Issues, Lack of Understanding, Technical Issues, and Privacy and Security Concerns), and Benefits (Patient Care, Productivity, Security and Safety, Asset Management, and Communication). Data for the study were collected from 88 health care organizations and the measurement scales were validated using structural equation modeling. Second, a framework is developed to discuss the causal relationships among the above mentioned constructs. It is found that Internal Drivers are positively related to Implementation Level, which in turn is positively related to Benefits and Performance. In addition, Barriers are found to be positively related to Implementation Level, which is in contrast to the originally proposed negative relationship. The research also compares perception differences regarding RFID implementation among the non-implementers, future implementers, and current implementers of RFID. It is found that both future implementers and current implementers consider RFID barriers to be lower and benefits to be higher compared to the non-implementers. This paper ends with our research implications, limitations and future research

    Quantitative Analysis for Authentication of Low-cost RFID Tags

    Full text link
    Formal analysis techniques are widely used today in order to verify and analyze communication protocols. In this work, we launch a quantitative verification analysis for the low- cost Radio Frequency Identification (RFID) protocol proposed by Song and Mitchell. The analysis exploits a Discrete-Time Markov Chain (DTMC) using the well-known PRISM model checker. We have managed to represent up to 100 RFID tags communicating with a reader and quantify each RFID session according to the protocol's computation and transmission cost requirements. As a consequence, not only does the proposed analysis provide quantitative verification results, but also it constitutes a methodology for RFID designers who want to validate their products under specific cost requirements.Comment: To appear in the 36th IEEE Conference on Local Computer Networks (LCN 2011

    Empirical Evidence of RFID Impacts on Supply Chain Performance

    Get PDF
    Purpose - The purpose of this paper is to investigate the actual benefits of radio frequency identification (RFID) on supply chain performance through the empirical evidence. Design/methodology/approach - The research reviews and classifies the existing quantitative empirical evidence of RFID on supply chain performance. The evidence is classified by process (operational or managerial) and for each process by effect (automational, informational, and transformational). Findings - The empirical evidence shows that the major effects from the implementation of RFID are automational effects on operational processes followed by informational effects on managerial processes. The RFID implementation has not reached transformational level on either operational or managerial processes. RFID has an automational effect on operational processes through inventory control and efficiency improvements. An informational effect for managerial processes is observed for improved decision quality, production control and the effectiveness of retail sales and promotions coordination. In addition, a three-stage model is proposed to explain the effects of RFID on the supply chain. Research limitations/implications - Limitations of this research include the use of secondary sources and the lack of consistency in performance measure definitions. Future research could focus on detailed case studies that investigate cross-functional applications across the organization and the supply chain. Practical implications - For managers, the empirical evidence presented can help them identify implementation areas where RFID can have the greatest impact. The data can be used to build the business case for RFID and therefore better estimate ROI and the payback period. Originality/value - This research fills a void in the literature by providing practitioners and researchers with a better understanding of the quantitative benefits of RFID in the supply chain

    Extended Abstract: Analysis of 1000 Arbiter PUF based RFID Tags

    Get PDF
    In this extended abstract a large-scale analysis of 4- way Arbiter PUFs is performed with measurement results from 1000 RFID tags. Arbiter PUFs are one of the most important building blocks in PUF-based protocols and have been the subject of many papers. However, in the past often only software simulations or a limited number of test chips were available for analysis. Therefore, the goal of this work is to verify earlier findings in regard to the uniqueness and reliability of Arbiter PUFs by using a much larger measurement set. Furthermore, we used machine learning algorithms to approximate and compare the internal delay differences of the employed PUF. One of the main research questions in this paper is to examine if any “outliers” occurred, i.e., if some tags performed considerably different. This might for example happen due to some unusual manufacturing variations or faults. However, our findings are that for all of the analyzed tags the parameters fell within the range of a Gaussian distribution without significant outliers. Hence, our results are indeed in line with the results of prior work

    A framework for smart production-logistics systems based on CPS and industrial IoT

    Get PDF
    Industrial Internet of Things (IIoT) has received increasing attention from both academia and industry. However, several challenges including excessively long waiting time and a serious waste of energy still exist in the IIoT-based integration between production and logistics in job shops. To address these challenges, a framework depicting the mechanism and methodology of smart production-logistics systems is proposed to implement intelligent modeling of key manufacturing resources and investigate self-organizing configuration mechanisms. A data-driven model based on analytical target cascading is developed to implement the self-organizing configuration. A case study based on a Chinese engine manufacturer is presented to validate the feasibility and evaluate the performance of the proposed framework and the developed method. The results show that the manufacturing time and the energy consumption are reduced and the computing time is reasonable. This paper potentially enables manufacturers to deploy IIoT-based applications and improve the efficiency of production-logistics systems

    Lightweight Mutual Authentication Protocol for Low Cost RFID Tags

    Full text link
    Radio Frequency Identification (RFID) technology one of the most promising technologies in the field of ubiquitous computing. Indeed, RFID technology may well replace barcode technology. Although it offers many advantages over other identification systems, there are also associated security risks that are not easy to be addressed. When designing a real lightweight authentication protocol for low cost RFID tags, a number of challenges arise due to the extremely limited computational, storage and communication abilities of Low-cost RFID tags. This paper proposes a real mutual authentication protocol for low cost RFID tags. The proposed protocol prevents passive attacks as active attacks are discounted when designing a protocol to meet the requirements of low cost RFID tags. However the implementation of the protocol meets the limited abilities of low cost RFID tags.Comment: 11 Pages, IJNS

    Formal Verification of Safety Properties for Ownership Authentication Transfer Protocol

    Full text link
    In ubiquitous computing devices, users tend to store some valuable information in their device. Even though the device can be borrowed by the other user temporarily, it is not safe for any user to borrow or lend the device as it may cause private data of the user to be public. To safeguard the user data and also to preserve user privacy we propose and model the technique of ownership authentication transfer. The user who is willing to sell the device has to transfer the ownership of the device under sale. Once the device is sold and the ownership has been transferred, the old owner will not be able to use that device at any cost. Either of the users will not be able to use the device if the process of ownership has not been carried out properly. This also takes care of the scenario when the device has been stolen or lost, avoiding the impersonation attack. The aim of this paper is to model basic process of proposed ownership authentication transfer protocol and check its safety properties by representing it using CSP and model checking approach. For model checking we have used a symbolic model checker tool called NuSMV. The safety properties of ownership transfer protocol has been modeled in terms of CTL specification and it is observed that the system satisfies all the protocol constraint and is safe to be deployed.Comment: 16 pages, 7 figures,Submitted to ADCOM 201

    A study on stryhcnos potatorum and pisum sativum as natural coagulants for meat food processing wastewater

    Get PDF
    Wastewater generated from meat food processing industry has significant effects on the environment. Many methods have been reported for removing turbidity, total suspended solids (TSS), chemical oxygen demand (COD), oil and grease (O&G) and colour from meat food processing wastewater (MFPW). The most common method among them is flocculation-coagulation process which is widely used. Although inorganic coagulants are prominent in wastewater treatments, its application may cause toxic residual. In this study, the attempt has been made to study the performance of S. Potatorum (nirmali) and P. Sativum (pea) seed as natural coagulants in the flocculation process. A further aim is to determine the optimum conditions for the treatment of MFPW effluents such as coagulant dosage, mixing rate and pH. An adsorption study was also carried out to study the adsorption potential of these coagulants to treat MFPW. A lab-scale treatment tank was developed to evaluate the effectiveness in MFPW treatment. Jar test results showed that optimum dosage, pH and mixing rate for S. Potatorum were pH 8 with dosage of 150 mg/L and 150 rpm mixing rate with the removal of turbidity, TSS, COD, O&G and colour are 91%, 97.6%, 58.4%, 79.9% and 84.3% respectively. Meanwhile, for P. Sativum, the optimum condition were observed at pH 8 with dosage of 150 mg/L and 150 rpm mixing rate with the removal of turbidity, TSS, COD, O&G and colour 87.8%, 97.3%, 65.5%, 77.9% and 76.5% respectively. The adsorption study was found that the analysis fitted well to the Langmuir isotherm for both natural coagulants. Results show that the percentage of turbidity, TSS, COD, O&G removal by chemical coagulants are quite similar than natural coagulants when lab-scale treatment tank was used to treat the MFPW. This indicated that these natural coagulants have a potential to use as alternative in wastewater treatment

    High-Security, Clone-proof RFID with Secure Distance Bounding

    Get PDF
    Wireless near-field (NFC) and short-range RFID “security” devices are ubiquitous, commonly found in vehicle security (keyless-entry, remote-start), access control (employee key cards), travel cards, point-of-sale (PoS) transactions via NFC-enabled mobile phone or credit card, among others. Whenever assets of high-value are at stake, adversaries will stop at nothing to gain access to those assets, so it should be assumed that security systems will be subjected to many forms of attack. There have already been several highly publicized successful breaches of keyless entry systems, including relay and key-cloning attacks. This poster describes a a highly-secure, distance-bounding, clone-proof RFID mechanism for protecting high-value assets. The system employs a unique combination of technologies to make it highly-resistant to relay attacks, probing, modeling, cloning and snooping
    • …
    corecore