201 research outputs found

    COMPLEX PULSE FORMING TEACHNIQUE USING AM DETECTOR TYPE CIRCUITRY AND THE APPLICATION OF CDMA TO RFID FOR THE SIMULTANEOUS READING OF MULTIPLE TAGS

    Get PDF
    A novel complex ultra wideband RF pulse forming technique has been implemented in this research, using the coefficients derived from discrete Fourier transform of a virtual pulse train. Incorporated in this technique is a multiple frequency communication systems designed such that transmitter receiver proximity and the fading effect of the individual frequencies make part of a corresponding modulation technique. A code division multiple access (CDMA) application to RFID to greatly reduce read time, while at the same time eliminating inter tag interference, has been investigated with the analysis of a typical cart aisle scenario. With the current rate of growth of inventory world wide there is a tremendous need for more efficient method of data gathering, data storage, and data retrieval. In this dissertation, the application of the CDMA RFID technology has been analyzed to demonstrate the potentials of integrating the RFID technology to the EPC global numbering system

    A holistic approach examining RFID design for security and privacy

    Get PDF
    This paper adopts a holistic approach to Radio Frequency Identification (RFID) security that considers security and privacy under resource constraints concurrently. In this context, a practical realisation of a secure passive (battery-less) RFID tag is presented. The tag consists of an off the shelf front end combined with a bespoke 0.18 μm Application Specific Integrated Circuit (ASIC) assembled as a -sized prototype. The ASIC integrates the authors’ ultra low power novel Advanced Encryption Standard (AES) design together with a novel random number generator and a novel protocol, which provides both security and privacy. The analysis presented shows a security of 64-bits against many attack methods. Both modelled and measured power results are presented. The measured average core power consumed during continuous normal operation is 1.36 μW

    Prevention And Detection Mechanism For Security In Passive Rfid System

    Get PDF
    Low-cost radio frequency identification (RFID) tags conforming to the EPCglobal Class-1 Generation-2 standard are inherently insecure due to computational constraints. This thesis proposed the use of both prevention and detection mechanisms to solve the security and privacy issues. A lightweight cryptographic mutual authentication protocol which is resistant to tracking, denial of service (DoS) and replay attacks is proposed as a prevention mechanism. The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). The proposed protocol using 64 bits index is proved having the lowest non-unequivocally identification probability. In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. The correctness of the proposed protocol is demonstrated in a simulation model developed in JAVA TCP/IP socket. Next, the proposed protocol is implemented in RFID system including IAIK UHF Demo tag, TagSense Nano-UHF reader and back-end database. A GUI is created in a form of JAVA application to display data detected from tag. The proposed protocol implemented in real RFID system outperforms other related protocols because of 13.46 % shorter read time and write time consumed. The system is proved to be able to prevent tracking, DoS, and replay attacks from adversaries with moderate computation requirement compared to other related protocols

    Advanced power saving technologies for UHF band active RFID systems.

    Get PDF
    Wei Dacheng.Thesis (M.Phil.)--Chinese University of Hong Kong, 2006.Includes bibliographical references.Abstracts in English and Chinese.Table of Contents --- p.VIIIList of Tables --- p.XIList of Figures --- p.XIIList of Abbreviations --- p.XVChapter Chapter 1 --- IntroductionChapter 1.1 --- Introduction to RFID system --- p.1Chapter 1.2 --- Why we choose Active RFID system --- p.4Chapter 1.3 --- Objective of the research --- p.6Chapter 1.3.1 --- Requirement analysis --- p.7Chapter 1.3.2 --- Selection of RFID system and standard --- p.8Chapter 1.4 --- Original contribution of this dissertation --- p.9Chapter 1.5 --- Organization of the dissertation --- p.9Reference --- p.10Chapter Chapter 2 --- Implementation of An Active RFID SystemChapter 2.1 --- RFID System hardware design and related protocol --- p.1Chapter 2.2 --- Introduction to ISO 18000-7 --- p.7Chapter 2.3 --- Microcontroller specification --- p.12Chapter 2.4 --- RF model specifications --- p.14Chapter 2.5 --- Communication between a PC and a Reader --- p.15Chapter 2.6 --- Programming --- p.16Chapter 2.6.1 --- Procedure sequences of Reader and Tag --- p.17Chapter 2.6.2 --- Sequence of data transmission and reception --- p.24Chapter 2.6.3 --- CRC implementation --- p.28Chapter 2.7 --- Testing result --- p.31Reference --- p.35Chapter Chapter 3 --- Novel Power Saving Methods for an Active RFID SystemChapter 3.1 --- Some drawbacks of the existing Active RFID protocol --- p.1Chapter 3.1.1 --- Power consumption problem --- p.1Chapter 3.1.2 --- Multi-Reader problem --- p.9Chapter 3.2 --- Solutions of the Multi-Reader problem and power saving problem --- p.10Chapter 3.2.1 --- A solution to the power saving problem --- p.11Chapter 3.2.2 --- A solution to the Multi-Reader problem --- p.16Reference --- p.21Chapter Chapter 4 --- A Probe-fed Compact Half-wave Length Dipole Antenna for Active RFID SystemChapter 4.1 --- Requirement of an antenna for Active RFID system --- p.1Chapter 4.2 --- A probe-fed half-wave length dipole EE shape antenna for metallic object application --- p.2Chapter 4.3 --- Electromagnetic simulation results --- p.5Chapter 4.4 --- Operating principle analysis --- p.9Chapter 4.5 --- Using V shape structure to increase the bandwidth --- p.19Chapter 4.6 --- Prototyping and measurement results --- p.22Chapter 4.7 --- Conclusion --- p.28Reference --- p.29Chapter Chapter 5 --- Conclusio

    A Lightweight RFID Security Protocol Based on Elliptic Curve Cryptography

    Get PDF
    Abstract Radio Frequency Identification (RFID) is a promising new technology that is widely deployed for object tracking and monitoring, ticketing, supply-chain management, contactless payment, etc. However, RFID related security problems attract more and more attentions. This paper has studied a novel elliptic curve cryptography (ECC) based RFID security protocol and it shows some great features. Firstly, the high strength of ECC encryption provides convincing security for communication and tag memory data access. Secondly, the public-key cryptography used in the protocol reduces the key storage requirement and the backend system just store the private key. Thirdly, the new protocol just depends on simple calculations, such as XOR, bitwise AND, and so forth, which reduce the tag computation. Finally, the computational performance, security features, and the formal proof based on BAN logic are also discussed in detail in the paper

    Nano-networks communication architecture: Modeling and functions

    Get PDF
    Nano-network is a communication network at the Nano-scale between Nano-devices. Nano-devices face certain challenges in functionalities, because of limitations in their processing capabilities and power management. Hence, these devices are expected to perform simple tasks, which require different and novel approaches. In order to exploit different functionalities of Nano-machines, we need to manage and control a set of Nano-devices in a full Nano-network using an appropriate architecture. This step will enable unrivaled applications in the biomedical, environmental and industrial fields. By the arrival of Internet of Things (IoT) the use of the Internet has transformed, where various types of objects, sensors and devices can interact making our future networks connect nearly everything from traditional network devices to people. In this paper, we provide an unified architectural model of Nano-network communication with a layered approach combining Software Defined Network (SDN), Network Function Virtualization (NFV) and IoT technologies and present how this combination can help in Nano-networks’ context. Consequently, we propose a set of functions and use cases that can be implemented by Nano-devices and discuss the significant challenges in implementing these functions with Nano-technology paradigm and the open research issues that need to be addressed.Peer ReviewedPostprint (published version

    2013 TSU Undergraduate Research Program

    Get PDF

    Fast RFID counting under unreliable radio channels.

    Get PDF
    Sze, Wai Kit.Thesis (M.Phil.)--Chinese University of Hong Kong, 2009.Includes bibliographical references (leaves 77-83).Abstracts in English and Chinese.Abstract --- p.iAcknowledgement --- p.viChapter 1 --- Introduction --- p.1Chapter 2 --- Background and Related Work --- p.8Chapter 3 --- RFID Tag-set Cardinality estimation based on a Two-parameter implicit Channel Model --- p.13Chapter 3.1 --- System Model --- p.14Chapter 3.2 --- Number of Empty Slots Observed by the Reader --- p.16Chapter 3.3 --- Estimator Accuracy and Performance Analysis --- p.25Chapter 3.4 --- Results and Discussions --- p.32Chapter 3.5 --- Chapter Summary --- p.41Chapter 4 --- RFID Tag-set Cardinality estimation over Unknown Channel --- p.42Chapter 4.1 --- System Model --- p.43Chapter 4.2 --- Baseline: The Union-based approach --- p.45Chapter 4.2.1 --- Motivation --- p.46Chapter 4.2.2 --- Union Algorithm --- p.46Chapter 4.2.3 --- Analysis of the Union algorithm --- p.47Chapter 4.3 --- "Probabilistic Tag-counting over Lossy, Unknown channels via the Mh model" --- p.52Chapter 4.3.1 --- "Novel Interpretation of Mh for RFID Counting over Lossy, Unknown Channels" --- p.52Chapter 4.3.2 --- The Moment Estimator --- p.55Chapter 4.3.3 --- Sample Coverage Estimator --- p.57Chapter 4.3.4 --- Estimating the overall Tag population t --- p.59Chapter 4.4 --- Performance Validation and Comparison --- p.62Chapter 4.5 --- Chapter Summary --- p.65Chapter 5 --- Conclusions and Future Work --- p.73Chapter A --- Proof of Equation (3.6) in Chapter 3 --- p.75Bibliography --- p.7
    corecore