12,057 research outputs found

    A Secure Quorum Based Multi-Tag RFID System

    Get PDF
    Radio Frequency Identification (RFID) technology has been expanded to be used in different fields that need automatic identifying and verifying of tagged objects without human intervention. RFID technology offers a great advantage in comparison with barcodes by providing accurate information, ease of use and reducing of labour cost. These advantages have been utilised by using passive RFID tags. Although RFID technology can enhance the efficiency of different RFID applications systems, researchers have reported issues regarding the use of RFID technology. These issues are making the technology vulnerable to many threats in terms of security and privacy. Different RFID solutions, based on different cryptography primitives, have been developed. Most of these protocols focus on the use of passive RFID tags. However, due to the computation feasibility in passive RFID tags, these tags might be vulnerable to some of the security and privacy threats. , e.g. unauthorised reader can read the information inside tags, illegitimate tags or cloned tags can be accessed by a reader. Moreover, most consideration of reserchers is focus on single tag authentication and mostly do not consider scenarios that need multi-tag such as supply chain management and healthcare management. Secret sharing schemes have been also proposed to overcome the key management problem in supply chain management. However, secret sharing schemes have some scalability limitations when applied with high numbers of RFID tags. This work is mainly focused on solving the problem of the security and privacy in multi-tag RFID based system. In this work firstly, we studied different RFID protocols such as symmetric key authentication protocols, authentication protocols based on elliptic curve cryptography, secret sharing schemes and multi-tag authentication protocols. Secondly, we consider the significant research into the mutual authentication of passive RFID tags. Therefore, a mutual authentication scheme that is based on zero-knowledge proof have been proposed . The main object of this work is to develop an ECC- RFID based system that enables multi-RFID tags to be authenticated with one reader by using different versions of ECC public key encryption schemes. The protocol are relied on using threshold cryptosystems that operate ECC to generate secret keys then distribute and stored secret keys among multi RFID tags. Finally, we provide performance measurement for the implementation of the proposed protocols.Ministry of higher education and scientific research, Baghdad-Ira

    The role of radio frequency identification (RFID) in improving the supply chain performance of small and medium construction companies in Australia and enhancing their competitiveness in the marketplace

    Get PDF
    Radio Frequency Identification (RFID) is being utilised more in Information Technology due to its features and capability that assist in enhancing productivity, efficiency in improving supply chain systems, and minimising cost. It is predicted to provide several advantages for both public and government organisations. RFID can increase the consistency and scalability of IT systems that permit organisations such as regional governments to focus their attention on their key business functions, including strategy formulation and adaptation. Limited studies have been conducted on the implementation of RFID in the construction industry to develop supply chain systems to improve performance. Moreover, there is an absence of exploratory research and studies that offer a comprehensive and holistic examination of the factors that impact the implementation of RFID. To date, there is also an absence of empirical studies regarding the factors that impact the employment of RFID in Australian SMEs in the construction industry. This research examines the adoption and use of information communication technologies, in particular RFID technology, for improving the performance of supply chain management systems in SME construction companies in Australia. The research objectives are to analyse the state of supply chain management systems in SME construction companies in Australia; and the potential of RFID technologies in helping to overcome the problems and challenges facing these companies. This study aims to explain the capability for creating value resulting from the adoption of RFID in SME construction companies in Australia. This research identifies the factors that are expected to impact its implementation and ascertains the factors that are essential for management to focus on when planning to implement RFID. These factors include emerging policies for adoption of RFID, expected advantages of implementation of RFID, along with highlighting the challenges and issues created by the adoption of RFID. The research model adopts a combination of three theories derived from the literature, namely, Diffusion of Innovation Theory, the Technology Organisation-Environment (Stoekel and Quirke) framework, and the Actor Network theory. This study aims to enhance knowledge about how information communication technology can play a role in improving supply chain performance, and how to optimise the use of supply chains to improve the performance of these businesses. A quantitative approach is used in this study to identify the key themes and constructs in a comprehensive survey of IT decision-makers within SME construction companies in Australia. The intention of this research is also to increase knowledge regarding factors that impact decision-making regarding the adoption of RFID within SME construction companies based in Australia. The research method used for the research is quantitative. As an in-depth study, this empirical study has involved IT managers in Australian-based SME construction companies and their employees‟ interaction with RFID suppliers. Through this, the study achieves the aim of providing in-depth insights into those factors that are perceived most likely to influence their employment of RFID; and identifying all vital factors on which to focus when planning to implement RFID, including the emerging legal setting that influences RFID implementation, expected merits of RFID implementation; and problems and issues that face SMEs when deciding to employ RFID. The study was conducted among 297 IT employees from 47 SMEs in the construction sector and RFID suppliers to conclude the outcomes of the exploratory stage. Factors such as compatibility, complexity, cost, security concerns, size of the firm, and expected advantages from the adoption of RFID are examined. The results and conclusion of the research can be used for firms‟ decision-making on whether to invest or not in the adoption of RFID

    Critical Management Issues for Implementing RFID in Supply Chain Management

    Get PDF
    The benefits of radio frequency identification (RFID) technology in the supply chain are fairly compelling. It has the potential to revolutionise the efficiency, accuracy and security of the supply chain with significant impact on overall profitability. A number of companies are actively involved in testing and adopting this technology. It is estimated that the market for RFID products and services will increase significantly in the next few years. Despite this trend, there are major impediments to RFID adoption in supply chain. While RFID systems have been around for several decades, the technology for supply chain management is still emerging. We describe many of the challenges, setbacks and barriers facing RFID implementations in supply chains, discuss the critical issues for management and offer some suggestions. In the process, we take an in-depth look at cost, technology, standards, privacy and security and business process reengineering related issues surrounding RFID technology in supply chains

    Accessing Antecedents and Outcomes of RFID Implementation in Health Care

    Get PDF
    This research first conceptualizes, develops, and validates four constructs for studying RFID in health care, including Drivers (Internal and External), Implementation Level (Clinical Focus and Administrative Focus), Barriers (Cost Issues, Lack of Understanding, Technical Issues, and Privacy and Security Concerns), and Benefits (Patient Care, Productivity, Security and Safety, Asset Management, and Communication). Data for the study were collected from 88 health care organizations and the measurement scales were validated using structural equation modeling. Second, a framework is developed to discuss the causal relationships among the above mentioned constructs. It is found that Internal Drivers are positively related to Implementation Level, which in turn is positively related to Benefits and Performance. In addition, Barriers are found to be positively related to Implementation Level, which is in contrast to the originally proposed negative relationship. The research also compares perception differences regarding RFID implementation among the non-implementers, future implementers, and current implementers of RFID. It is found that both future implementers and current implementers consider RFID barriers to be lower and benefits to be higher compared to the non-implementers. This paper ends with our research implications, limitations and future research

    Reviewing the Drivers and Challenges in RFID Implementation in the Pharmaceutical Supply Chain

    Get PDF
    Counterfeiting is a global phenomenon that poses a serious financial threat to the pharmaceutical industry and more importantly jeopardizes public safety and security. Different measures, including new laws and regulations, have been put in place to mitigate the threat and tighten control in the pharmaceuticals supply chain. However, it appears that the most promising countermeasure is track-and-trace technology such as electronic-pedigree (E-pedigree) with Radio Frequency Identification (RFID) technology. In this study we present a framework exploring the antecedents and consequences of RFID applications in the pharmaceutical supply chain. The framework proposes that counterfeiting and E-pedigree regulation will drive the implementation of RFID in the pharmaceutical supply chain, which in turn provides strategic and operational benefits that enable competitive advantage. Meanwhile, the implementation of RFID requires overcoming many operational, technical and financial challenges. The framework provides a springboard that future study can explore using empirical data

    Radio Frequency Identification Technology: Applications, Technical Challenges and Strategies

    Get PDF
    Purpose - The purpose of this paper is to discuss the technology behind RFID systems, identify the applications of RFID in various industries, and discuss the technical challenges of RFID implementation and the corresponding strategies to overcome those challenges. Design/methodology/approach - Comprehensive literature review and integration of the findings from literature. Findings - Technical challenges of RFID implementation include tag cost, standards, tag and reader selection, data management, systems integration and security. The corresponding solution is suggested for each challenge. Research limitations/implications - A survey type research is needed to validate the results. Practical implications - This research offers useful technical guidance for companies which plan to implement RFID and we expect it to provide the motivation for much future research in this area. Originality/value - As the infancy of RFID applications, few researches have existed to address the technical issues of RFID implementation. Our research filled this gap

    Simulation of undular bores evolution with damping

    Get PDF
    Propagation of undular bores with damping is considered in the framework of perturbed extended Korteweg-de Vries (peKdV) equation. Two types of damping terms for the peKdV equation, namely linear and Chezy frictional terms, which describe the turbulent boundary layers in the fluid flow are considered. Solving the peKdV equation numerically using the method of lines shows that under the influence of damping, the lead-ing solitary wave of the undular bores will split from the nonlinear wavetrain, propagates and behaves like an isolated solitary wave. The amplitude of the leading wave will remain the same for some times before it starts to decay again at a larger time. In general the amplitude of the leading wave and the mean level across the undular bore decreases due to the effect of damping

    Radio Frequency Identification: Supply Chain Impact and Implementation Challenges

    Get PDF
    Radio Frequency Identification (RFID) technology has received considerable attention from practitioners, driven by mandates from major retailers and the United States Department of Defense. RFID technology promises numerous benefits in the supply chain, such as increased visibility, security and efficiency. Despite such attentions and the anticipated benefits, RFID is not well-understood and many problems exist in the adoption and implementation of RFID. The purpose of this paper is to introduce RFID technology to practitioners and academicians by systematically reviewing the relevant literature, discussing how RFID systems work, their advantages, supply chain impacts, and the implementation challenges and the corresponding strategies, in the hope of providing guidance for practitioners in the implementation of RFID technology and offering a springboard for academicians to conduct future research in this area

    An Exploratory Study of RFID Implementation in the Supply Chain

    Get PDF
    The purpose of this paper is to investigate the barriers and motivations for adopting radio frequency identification (RFID), the level of RFID implementation, the processes RFID is utilized in, and issues in the deployment of RFID. A survey instrument was developed based on a literature review. The survey was then distributed to the members of the Association for Operations Management Rhode Island and Boston chapters. The results were then analyzed. It was found that the majority of the surveyed firms are not considering RFID implementation. Lack of a business case and lack of understanding were cited as their main concerns. For firms considering RFID implementation and firms that had implemented RFID, better inventory management, obtaining competitive advantage, and cost reduction were the three most important motivations for adopting RFID. Financial concerns and the lack of a business case were the most prevalent issues. In addition, product tracking (pallets, cases, and items) in shipping was the most cited RFID application. It was also found that considering firms are facing less pressure from customers to adopt RFID and reported a much higher degree of apprehension regarding potential issues than implementing firms reported for actual difficulties faced. One of the limitations is the small sample size (n = 49) which may limit the generalizability of the results. By identifying barriers, motivations, and issues in the implementation of RFID, this study further educates practitioners on the challenges and opportunities of RFID, as well as providing direction to academicians for further research on this area
    • …
    corecore