23,325 research outputs found

    Tamper detection in RFID-enabled supply chains using fragile watermarking

    Get PDF
    While mainstream RFID research has been focused on solving privacy issues, security in general and data tampering in specific is still an open question. This paper analyzes potential security threats especially data tampering in RFID-enabled supply chains and proposes solutions how these threats might be addressed using fragile watermarking technologies. We first survey RFID system and its security problems, and then explain the importance of fragile watermarking schemes for RFID systems and possible applications using fragile watermarking to detect and locate any modification in RFID systems. Finally we suggest possible solutions using fragile watermarking for RFID-enabled supply chain

    Using Radio Frequency Identification Technology In Healthcare

    Get PDF
    In the healthcare industry, medical treatment can be a matter of life and death, so that any mistakes may cause irreversible consequences. As hospitals have sought to reduce these types of errors, Radio Frequency Identification Technology (RFID) has become a solution in the healthcare industry to address these problems. Since 2005, RFID has generated a lot of interest in healthcare to make simpler the identification process for tracking and managing medical resources to improve their use and to reduce the need for future costs for purchasing duplicate equipment. There are rising concerns linked to the privacy and security issues, when RFID tags are used for tracking items carried by people. A tag by its design will respond to a reader\u27s query without the owner\u27s consent and without the owner even noticing it. When RFID tags contain patients\u27 personal data and medical history, they have to be protected to avoid any leaking of privacy-sensitive information. To address these concerns, we propose an Intelligent RFID System which is a RFID card system that embeds smart tags in insurance cards, medical charts, and medical bracelets to store medical information. Patient data is sent to the insurance providers by way of a clearinghouse that translates the information from the healthcare facility into a format that the insurance company can process. To ensure data protection, an additional security layer was added to secure the communication between the tags and the readers. This security layer will allow only authorized readers to poll tags for the patient\u27s medical tags and prevent unauthorized access to tag data. It will simplify the maintenance and transfer of patient data in a secure, feasible and cost effective way

    RANCANG BANGUN ALAT PATROLI LINGKUNGAN PERKANTORAN PENGEMBANGAN AMANO PR600 BERBASIS RADIO FREQUENCY IDENTIFICATION (RFId)

    Get PDF
    Lingkungan perkantoran yang aman merupakan hal mutlak yang diidamkan banyak orang. Banyak cara dan metoda (gozali, 2016; Putri, 2016; Marina, 2011) yang digunakan perkantoran untuk melakukan pengamanan. Berawal dari sebuah sistim patroli yang dilakukan dengan menggunakan alat yang bernama Amano PR600. Secara umum alat ini dapat membantu petugas keamanan dalam bertugas. Namun, dalam sistemnya alat ini masih berkerja secara manual. Sehingga kemungkinan terjadinya kesalahan manusia (human eror) bisa terjadi. Sistem pengoperasian secara manual pada alat tersebut mendorong penulis untuk membuat sebuah alat yang dapat memperbaiki sistem patroli keamanan yang dilakukan pada lingkungan-lingkungan perkantoran yang sangat rawan terhadap gangguan keamanan. Alat ini akan membantu petugas patroli untuk melakukan patroli keamanan lingkungan perkantoran. Dimana alat ini menggunakan sistim kerja Radio Frequency Identification (RFId). Cara kerjanya yaitu memberi instruksi kepada petugas untuk patroli dilingkungan perkantoran untuk membaca ID kartu RFId yang telah diletakan pada tiap-tiap ruangan.; Environment office safe it is crucial and a coveted a lot of people. A lot of ways and methods (Gozali, 2016 ; Putri, 2016 ; Marina, 2011) the office to do security. Starting from a system, which is done by using an instrument called Amano PR600. In general it can assist security personnel in the line of duty. However, in the system it is still working on a manual. So the likelihood of a human error (human has an error). The operation of the manual on the device encourages writers to make a device that can improve the system security patrol in these environments office is prone to security problems. This will help patrol officers to patrol the security environment office, where it uses systems of Radio Frequency Victim Identification (RFId). The way his working which gives instructions to officers to patrol in the office to read ID cards RFId that have grown in every room which routes to be traversed by the will were randomised automatically by the system

    Lightweight mutual authentication, owner transfer, and secure search protocols for RFID systems

    Get PDF
    RFID technology can potentially be applied almost everywhere. A typical RFID system involves a reader and a number of tags, which may range from the battery-powered ones with Wi-Fi capabilities, to the low-cost ones that are constrained in resources with even no internal power. Keeping RFID systems secure is important, because they are vulnerable to a number of malicious attacks. As for low-cost RFID systems, security problems become much more challenging, as many traditional security mechanisms are inefficient or even impossible due to resource constraints. Some existing solutions utilize traditional cryptographic primitives such as hash or encryption functions, which are often too expensive in hardware to be implemented on low-cost RFID tags. Furthermore, some other lightweight solutions have been reported to be broken, revealing their keys and ID numbers to the attackers. In this thesis, we propose lightweight solutions to Mutual Authentication and Ownership Transfer for RFID systems. Mutual Authentication mitigates the issues of eavesdropping and cloning of tags. Only authenticated readers and tags will successfully communicate with each other. Furthermore, we adapt our Mutual Authentication scheme to secure the Ownership Transfer of RFID tags, which is a pertinent issue in the scope of RFID. When an item passes from one owner to another, it is undesirable for the old owner to be able to access the tag or read data from it. The new user must therefore update the access-granting information without revealing this to the old owner. Tag search is another important functionality that a RFID system should provide. In this thesis, we study how to secure tag search with a focus on low-cost RFID systems for which existing solution is not efficient. These protocols are all realized by utilizing minimalistic cryptography such as Physically Unclonable Functions (PUF) and Linear Feedback Shift Registers (LFSR). PUFs and LFSRs are very efficient in hardware, and provide the low-cost RFID tags with unique characteristics that prevent a multitude of attacks. Compared to existing solutions built on top of hash functions that require 8000 - 10000 gates, our experimental results show that the schemes we propose demand only between 650 - 1400 gates for 64 bit variables and can be easily accommodated by the cheapest RFID tags with only 2000 gates available for security functions

    A Survey of RFID Authentication Protocols Based on Hash-Chain Method

    Get PDF
    Security and privacy are the inherent problems in RFID communications. There are several protocols have been proposed to overcome those problems. Hash chain is commonly employed by the protocols to improve security and privacy for RFID authentication. Although the protocols able to provide specific solution for RFID security and privacy problems, they fail to provide integrated solution. This article is a survey to closely observe those protocols in terms of its focus and limitations.Comment: Third ICCIT 2008 International Conference on Convergence and Hybrid Information Technolog

    Radio Frequency Identification Technology: Applications, Technical Challenges and Strategies

    Get PDF
    Purpose - The purpose of this paper is to discuss the technology behind RFID systems, identify the applications of RFID in various industries, and discuss the technical challenges of RFID implementation and the corresponding strategies to overcome those challenges. Design/methodology/approach - Comprehensive literature review and integration of the findings from literature. Findings - Technical challenges of RFID implementation include tag cost, standards, tag and reader selection, data management, systems integration and security. The corresponding solution is suggested for each challenge. Research limitations/implications - A survey type research is needed to validate the results. Practical implications - This research offers useful technical guidance for companies which plan to implement RFID and we expect it to provide the motivation for much future research in this area. Originality/value - As the infancy of RFID applications, few researches have existed to address the technical issues of RFID implementation. Our research filled this gap

    Critical Management Issues for Implementing RFID in Supply Chain Management

    Get PDF
    The benefits of radio frequency identification (RFID) technology in the supply chain are fairly compelling. It has the potential to revolutionise the efficiency, accuracy and security of the supply chain with significant impact on overall profitability. A number of companies are actively involved in testing and adopting this technology. It is estimated that the market for RFID products and services will increase significantly in the next few years. Despite this trend, there are major impediments to RFID adoption in supply chain. While RFID systems have been around for several decades, the technology for supply chain management is still emerging. We describe many of the challenges, setbacks and barriers facing RFID implementations in supply chains, discuss the critical issues for management and offer some suggestions. In the process, we take an in-depth look at cost, technology, standards, privacy and security and business process reengineering related issues surrounding RFID technology in supply chains

    Digitalisasi Manajemen Sistem Dokumen Pengelolaan Perpustakaan Universitas Bumigora Menggunakan Teknologi Radio Frequency Identification (RFID)

    Get PDF
    Bumigora University developed a web-based library information and data processing system, while the contents of the development of the system were only limited to a single information system in which only admin operators handled the system without any direct interaction with library users, while in the analysis and development of the library system only limited to acquisition and return transactions with a system without involving library human resources, but there are problems that are still often encountered in the management of a library at Bumigora University, there is no guarantee of book safety in the library and the work system of library human resources is not yet optimal. Based on this, a Wireless RFID (Radio Frequency Identification) Technology device is needed. This technology supports the identification of book library reshelving, book libraries, book returns with self-service which is expected to provide more accurate information, improve future library services in addition to complementing security aspects. The purpose of this study is to describe the opportunities for Wireless RFID (Radio Frequency Identification) technology to be applied in the Bumigora University library. This study uses an explanatory theory that must be built by researchers based on general data in observations that must be analyzed, explained and interpreted, and uses qualitative methods. The results show that the use of RFID technology in libraries applies both to university libraries, regional libraries, school libraries and others. The use of RFID by Higher Education Libraries will greatly support the following: a. High Speed ​​Inventory System b. Fast Circulation Process The use of RFID will speed up a borrowing and returning circulation process. Therefore, the application of Wireless RFID (Radio Frequency Identification) Technology in the Bumigora University library is needed to create a safe and professional library management

    Radio Frequency Identification: Supply Chain Impact and Implementation Challenges

    Get PDF
    Radio Frequency Identification (RFID) technology has received considerable attention from practitioners, driven by mandates from major retailers and the United States Department of Defense. RFID technology promises numerous benefits in the supply chain, such as increased visibility, security and efficiency. Despite such attentions and the anticipated benefits, RFID is not well-understood and many problems exist in the adoption and implementation of RFID. The purpose of this paper is to introduce RFID technology to practitioners and academicians by systematically reviewing the relevant literature, discussing how RFID systems work, their advantages, supply chain impacts, and the implementation challenges and the corresponding strategies, in the hope of providing guidance for practitioners in the implementation of RFID technology and offering a springboard for academicians to conduct future research in this area

    A sector analysis for RFID technologies: fundamental and technical analysis for financial decision making problems

    Get PDF
    Automatic identification technologies have been used in a wide range of applications for reducing the amount of time and labor needed to input data and improving data accuracy. As an important automatic identification technology, radio frequency identification (RFID) technologies allow contactless reading and these technologies are particularly successful in manufacturing and other environments where traditional identification technologies such as bar codes can not perform well. By integrating the RFID technology into their business models, companies may save time, lower labor cost, improve products quality and provide better service. RFID is the wireless technology that uses RF communication to identify, track and manage objects and collect and store data. RFID technology enables companies to develop applications that create value by tracking and identifying objects, animals or people. Business applications of RFID technology can be seen in areas such as manufacturing, supply chain management, software integration, security systems, asset tracking and many others. RFID technology was predicted to be one of the “top ten” technologies in 2004 by CNN. Although, the RFID market is less than five years old, it has been applied to many different industries, from retail industry to logistics, or from healthcare to service business industry – and it is still growing. Particularly, RFID has fundamental influences on today's retailing and supply chain management for applications like asset tracking the inventory control and management. RFID technology also finds major application in mobile phones and is widely used in toll collection of highways, for payments in restaurants, vending machines, retail and parking lots. There are a wide range of RFID systems currently being used or being developed. Examples to these systems include but not limited to the following; automatic vehicle and personnel access control for security (Simpson, 2006), airport passenger and baggage tracking (Ferguson, 2006), tracing blood for cutting down errors such as giving patients wrong blood types (Ranger, 2006), payment process systems (Ramachandran, 2006), production control in manufacturing (Liu & Miao, 2006), transfusion medicine (Knels, 2006) real-time inventory control by automated identification of items in warehouses, tracking and management of physical files, tracking of books in the libraries (Shadid, 2005). For some other applications, interested reader is referred to (Finkenzeller, 2003; Smith, 2004). RFID solution providers claim that their technology and solutions bring significant benefits and have valuable advantages in practice. As new RFID solutions being developed and more RFID tags and equipments being used, these solutions will become more cost effective and RFID businesses are expected to grow rapidly. Since RFID is fairly new, it’s difficult to measure resulting sales increases or heightened customer satisfaction quotients. On the other hand, according to IDC estimation (IDC is a subsidiary of International Data Group, a leading technology media, research, and events company and provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets), companies in the retail sector will spend nearly 1.3billiononRFIDintheirsupplychainoperationsin2008,comparedtoabout1.3 billion on RFID in their supply chain operations in 2008, compared to about 91.5 million in 2003 which corresponds to annual growth rate of 70 percent. In a similar look; the Wireless Data Research Group projected that the global market for RFID increased from 1billionin2003to1 billion in 2003 to 3 billion in 2007 (Asif & Mandviwalla, 2005). There are two major drivers of this growth. The first one is the adoption of RFID technology by major retailers and government agencies. The second one is the reduction in the price of RFID tags, readers, and IT systems required to deploy RFID. Given the huge potential of RFID technology, there has been a huge emergence of RFID specialty companies and the development of RFID practices within many market-leading companies. Due to huge emergence, it is desirable to make a sector analysis. In this study, we perform a sector analysis for RFID technologies for researchers and analysts. We investigate public RFID companies traded on the stock exchange markets, summarize their financial performance, describe their RF products, services, and applications, and perform fundamental and technical analysis
    • …
    corecore