2,677 research outputs found
RFID Localisation For Internet Of Things Smart Homes: A Survey
The Internet of Things (IoT) enables numerous business opportunities in
fields as diverse as e-health, smart cities, smart homes, among many others.
The IoT incorporates multiple long-range, short-range, and personal area
wireless networks and technologies into the designs of IoT applications.
Localisation in indoor positioning systems plays an important role in the IoT.
Location Based IoT applications range from tracking objects and people in
real-time, assets management, agriculture, assisted monitoring technologies for
healthcare, and smart homes, to name a few. Radio Frequency based systems for
indoor positioning such as Radio Frequency Identification (RFID) is a key
enabler technology for the IoT due to its costeffective, high readability
rates, automatic identification and, importantly, its energy efficiency
characteristic. This paper reviews the state-of-the-art RFID technologies in
IoT Smart Homes applications. It presents several comparable studies of RFID
based projects in smart homes and discusses the applications, techniques,
algorithms, and challenges of adopting RFID technologies in IoT smart home
systems.Comment: 18 pages, 2 figures, 3 table
Precise vehicle location as a fundamental parameter for intelligent selfaware rail-track maintenance systems
The rail industry in the UK is undergoing substantial changes in response to a modernisation vision for 2040. Development and implementation of these will lead to a highly automated and safe railway. Real-time regulation of traffic will optimise the performance of the network, with trains running in succession within an adjacent movable safety zone. Critically, maintenance will use intelligent trainborne and track-based systems. These will provide accurate and timely information for condition based intervention at precise track locations, reducing possession downtime and minimising the presence of workers in operating railways. Clearly, precise knowledge of trains’ real-time location is of paramount importance.
The positional accuracy demand of the future railway is less than 2m. A critical consideration of this requirement is the capability to resolve train occupancy in adjacent tracks, with the highest degree of confidence. A finer resolution is required for locating faults such as damage or missing parts, precisely.
Location of trains currently relies on track signalling technology. However, these systems mostly provide an indication of the presence of trains within discrete track sections. The standard Global Navigation Satellite Systems (GNSS), cannot precisely and reliably resolve location as required either.
Within the context of the needs of the future railway, state of the art location technologies and systems were reviewed and critiqued. It was found that no current technology is able to resolve location as required. Uncertainty is a significant factor. A new integrated approach employing complimentary technologies and more efficient data fusion process, can potentially offer a more accurate and robust solution. Data fusion architectures enabling intelligent self-aware rail-track maintenance systems are proposed
Critical Management Issues for Implementing RFID in Supply Chain Management
The benefits of radio frequency identification (RFID) technology in the supply chain are fairly compelling. It has the potential to revolutionise the efficiency, accuracy and security of the supply chain with significant impact on overall profitability. A number of companies are actively involved in testing and adopting this technology. It is estimated that the market for RFID products and services will increase significantly in the next few years. Despite this trend, there are major impediments to RFID adoption in supply chain. While RFID systems have been around for several decades, the technology for supply chain management is still emerging. We describe many of the challenges, setbacks and barriers facing RFID implementations in supply chains, discuss the critical issues for management and offer some suggestions. In the process, we take an in-depth look at cost, technology, standards, privacy and security and business process reengineering related issues surrounding RFID technology in supply chains
Ensuring Application Specific Security, Privacy and Performance Goals in RFID Systems
Radio Frequency IDentification (RFID) is an automatic identification technology that uses radio frequency to identify objects. Securing RFID systems and providing privacy in RFID applications has been the focus of much academic work lately. To ensure universal acceptance of RFID technology, security and privacy issued must be addressed into the design of any RFID application. Due to the constraints on memory, power, storage capacity, and amount of logic on RFID devices, traditional public key based strong security mechanisms are unsuitable for them. Usually, low cost general authentication protocols are used to secure RFID systems. However, the generic authentication protocols provide relatively low performance for different types of RFID applications. We identified that each RFID application has unique research challenges and different performance bottlenecks based on the characteristics of the system. One strategy is to devise security protocols such that application specific goals are met and system specific performance requirements are maximized.
This dissertation aims to address the problem of devising application specific security protocols for current and next generation RFID systems so that in each application area maximum performance can be achieved and system specific goals are met. In this dissertation, we propose four different authentication techniques for RFID technologies, providing solutions to the following research issues: 1) detecting counterfeit as well as ensuring low response time in large scale RFID systems, 2) preserving privacy and maintaining scalability in RFID based healthcare systems, 3) ensuring security and survivability of Computational RFID (CRFID) networks, and 4) detecting missing WISP tags efficiently to ensure reliability of CRFID based system\u27s decision. The techniques presented in this dissertation achieve good levels of privacy, provide security, scale to large systems, and can be implemented on resource-constrained RFID devices
The SARFID technique for discriminating tagged items moving through a UHF-RFID gate
The discrimination of tagged items moving along a conveyor belt from other tagged items that are present in the scenario is investigated, when a UHF-RFID gate is installed at a conveyor section. Indeed, tagged items that are static or randomly moving in the scenario (nomad tags) around the reader antenna could be detected even if they are not on the conveyor (false positive readings). The classification procedure here proposed exploits the SARFID phase-based technique used to localize tags on a conveyor belt, which takes advantage of the fact that the tagged items move along a conveyor, whose path and instantaneous speed are both known. The latter can be implemented with only a firmware upgrade, in any conveyor belt scenario already equipped with an RFID system, without any modification of the system infrastructure and additional (reference tags/multiple antennas) or ad hoc hardware. From experimental results in a real scenario, the discrimination between moving tags from static/nomad tags can be obtained with an overall accuracy greater than 99.9%, by employing only one reader antenna
Robotic Wireless Sensor Networks
In this chapter, we present a literature survey of an emerging, cutting-edge,
and multi-disciplinary field of research at the intersection of Robotics and
Wireless Sensor Networks (WSN) which we refer to as Robotic Wireless Sensor
Networks (RWSN). We define a RWSN as an autonomous networked multi-robot system
that aims to achieve certain sensing goals while meeting and maintaining
certain communication performance requirements, through cooperative control,
learning and adaptation. While both of the component areas, i.e., Robotics and
WSN, are very well-known and well-explored, there exist a whole set of new
opportunities and research directions at the intersection of these two fields
which are relatively or even completely unexplored. One such example would be
the use of a set of robotic routers to set up a temporary communication path
between a sender and a receiver that uses the controlled mobility to the
advantage of packet routing. We find that there exist only a limited number of
articles to be directly categorized as RWSN related works whereas there exist a
range of articles in the robotics and the WSN literature that are also relevant
to this new field of research. To connect the dots, we first identify the core
problems and research trends related to RWSN such as connectivity,
localization, routing, and robust flow of information. Next, we classify the
existing research on RWSN as well as the relevant state-of-the-arts from
robotics and WSN community according to the problems and trends identified in
the first step. Lastly, we analyze what is missing in the existing literature,
and identify topics that require more research attention in the future
Efficient Detection of Counterfeit Products in Large-scale RFID Systems Using Batch Authentication Protocols
RFID technology facilitates processing of product information, making it a promising technology for anti-counterfeiting. However, in large-scale RFID applications, such as supply chain, retail industry, pharmaceutical industry, total tag estimation and tag authentication are two major research issues. Though there are per-tag authentication protocols and probabilistic approaches for total tag estimation in RFID systems, the RFID authentication protocols are mainly per-tag-based where the reader authenticates one tag at each time. For a batch of tags, current RFID systems have to identify them and then authenticate each tag sequentially, one at a time. This increases the protocol execution time due to the large volume of authentication data. In this paper, we propose to detect counterfeit tags in large-scale system using efficient batch authentication protocol. We propose FSA-based protocol, FTest, to meet the requirements of prompt and reliable batch authentication in large-scale RFID applications. FTest can determine the validity of a batch of tags with minimal execution time which is a major goal of large-scale RFID systems. FTest can reduce protocol execution time by ensuring that the percentage of potential counterfeit products is under the user-defined threshold. The experimental result demonstrates that FTest performs significantly better than the existing counterfeit detection approaches, for example, existing authentication techniques
Distributed Inference and Query Processing for RFID Tracking and Monitoring
In this paper, we present the design of a scalable, distributed stream
processing system for RFID tracking and monitoring. Since RFID data lacks
containment and location information that is key to query processing, we
propose to combine location and containment inference with stream query
processing in a single architecture, with inference as an enabling mechanism
for high-level query processing. We further consider challenges in
instantiating such a system in large distributed settings and design techniques
for distributed inference and query processing. Our experimental results, using
both real-world data and large synthetic traces, demonstrate the accuracy,
efficiency, and scalability of our proposed techniques.Comment: VLDB201
Reasoning about uncertainty in location identification with RFID
Radio Frequency Identification (RFID) is set to revolutionise industrial control as it holds the potential to simplify and make more robust the tracking of parts or part carriers through manufacture, storage, distribution and ultimately the supply chain. RFID control is based on unique RFID transponder tags being attached to parts and used to identify the part as it moves through the factory or warehouse. Although RFID dramatically simplifies the process of tracking parts, there are certain situations that can lead to uncertainty about the true location of the part. This paper looks at two such situations: a robotic storage stack and a medicine cabinet. Both cases of uncertainty are successfully resolved by using a statistical filter. This work may lend itself to extensions and generalisations using Partially Observable Markov Decision Process (POMDP) models
- …