SlideShare a Scribd company logo
1 of 9
Download to read offline
Journal of Information Engineering and Applications                                        www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.1, 2011


                  Framework of Smart Mobile RFID Networks
                                           Pradeep Kumar
                           ECE Deptt. , Vidya Vihar Institute of Technology
                       Maranga, Purnea, Bihar-854301, India,Tel: +917870248311
                     Web:www.pradeepjec.page4.me, Email: pra_deep_jec@yahoo.co.in
Abstract

Basically RFID (radio-frequency identification) is a wireless communication technology within the L1 (Layer
1, the physical layer of the OSI 7-layer Reference Model) and L2 scopes between RFID tag and reader. The
RFID reader reads the code in the RFID tag and interprets it by communicating with the IS(information
services) server via a proper communication network. This is the typical architecture defined by EPC
(electronic product Code)global. RFID networks need to provide value added services in order to give better
visibility to inventory movement across supply chain or closed loop applications like Asset tracking or Work In
Progress tracking. The RFID reader can be stationary or mobile. A mobile RFID reader affords more
applications than the stationary one. Mobile RFID is a newly emerging technology which uses the mobile
phone as an RFID reader with a wireless technology and provides new valuable services to the user by
integrating RFID and ubiquitous sensor network infrastructure with mobile communication and wireless
internet. The mobile RFID enables business to provide new services to mobile customers by securing services
and transactions from the end-user to a company's existing e-commerce and IT systems. In this paper, I describe
about the core components of mobile RFID, advantages and its applications in scenario of smart networks.
Although there are several types of mobile RFID readers in the market, I focused on mobile RFID technology
that has several positive features including security, network architecture, operation scenario, and code
resolution mechanism.

Keywords: EPC network, RFID, Mobile RFID, Smart RFID network

1. Introduction

RFID (Radio Frequency IDentification) has been recognized as a key technology for ubiquitous networks,
which in turn is defined as an environment in which information can be acquired anytime and anywhere through
network access service . Currently, RFID technologies consider the environment in which RFID tags are mobile
and RFID readers are stationary. However, in the future, RFID technologies could consider an environment in
which RFID tags are stationary and readers are mobile. RFID based on mobile telecommunications services
could be the best example of this kind of usage. RFID-based mobile telecommunications services could be
defined as services which provide information access through the telecommunication network by reading RFID
tags on certain objects using an RFID reader in mobile terminals such as cell phones. RFID tags play an
important role as a bridge between offline objects and online information. The RFID enabled cell phone was
introduced by Nokia in 2004.

In these domains, RFID technology holds the promise to eliminate many existing business problems by bridging
the economically costly gap between the virtual world of IT systems and the real world of products and
logistical units. Common benefits include more efficient material handling processes, elimination of manual
inventory counts, and the automatic detection of empty shelves and expired products in retail stores. RFID
technology has a number of advantages over other identification technologies. It does not require line-of-sight
alignment, multiple tags can be identified almost simultaneously, and the tags do not destroy the integrity or
aesthetics of the original object. The location of tagged objects can thus be monitored automatically and
continuously. The EPC Network, originally proposed by the Auto-ID Center and further developed by the
members of EPC global, is currently one of the predominant standardization effort of the RFID community.
RFID networks need to provide value added services in order to give better visibility to inventory movement
across supply chain or closed loop applications like Asset tracking or Work In Progress tracking.

In traditional RFID applications, such as access control, there was little need for RFID middleware because the
RFID readers were not networked and the RFID data were only consumed by a single application. In novel
application domains, such as supply chain management and logistics, there is no longer a 1-to-1 relationship


13 | P a g e
www.iiste.org
Journal of Information Engineering and Applications                                          www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.1, 2011
between reader and application instance, however. In these domains, many readers distributed across factories,
warehouses, and distribution centers capture RFID data that need to be disseminated to a variety of applications.
This introduces the need for an RFID infrastructure that hides proprietary reader device interfaces, provides
configuration and system management of reader devices, and filters and aggregates the captured RFID data.
This frees applications from the need of maintaining connections to individual reader devices.

The rest of this paper is structured as follows. In Section 2,I give detail about the EPC networks. Section 3
provides a brief overview of RFID technology and outlines the constraints imposed by the characteristics of
RFID. In Section 4, I describe about smart RFID networks. I continue by presenting some sample applications
and advantages of Mobile RFID in Section 5 and in section 6 conclusions are given.

2. EPC Network

A typical RFID network model may refer to the network architecture of EPC global as shown in figure 1 where
the network entities are RFID tags, readers, ALE host, event management server called EPC-IS, EPC-IS service
location server called EPC-DS, and code resolution server called ONS. Business application servers such as
ERP, CRM, SCM, etc. are out of scope because they stay at back-end and are associated indirectly with an RFID
network. Such a network model is for B2B applications.




                                     Fig. 1. EPC Network’s Configuration.




3.RFID
Radio Frequency Identification (RFID) is an automatic identification technology which allows
remote interrogation of ID data on RFID tags using radio frequency as a means of wireless communication
between tagged objects and RFID readers.




14 | P a g e
www.iiste.org
Journal of Information Engineering and Applications                                       www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.1, 2011




                                  Fig. 2. EPC Network roles and interfaces




                                         Fig.3.A simple RFID system

4. Smart RFID Networks

RFID technology leads us to the world of connected objects. It enables the inventory to speak for its presence
and drives the processes as opposed to processes driving the inventory. This paradigm shift opens up new
avenues and new approach to achieve process efficiency, better inventory management and improved business
intelligence.

RFID Networks enable businesses to build Event Driven Applications and react to real time information. If


15 | P a g e
www.iiste.org
Journal of Information Engineering and Applications                                           www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.1, 2011
business processes start working with the real time events the enterprises can become more efficient and lean.

To have a successful RFID implementation and reap true benefits, businesses have to
-     Identify the business goals
-     Build RFID networks that give them the visibility to “assets” and “inventory” and achieve business goals
-     Collect and convert the RFID data into “actions” and perhaps in real time.

An RFID network generates a continuous stream of data and because of its sheer volume it needs to be handled
very carefully. In the world of connected objects, the goal is to have efficient RFID Networks that give the right
information to the right application at the right time (3R’s) and make Enterprise Management Systems Event
Driven.

    •    Data becomes valuable information if it is relevant to the recipient. In the application-driven RFID
         Network, applications define the rules for processing RFID reads. The network layer executes those
         rules for organizing the RFID data, and then delivers quality information to its subscribers. The most
         common example would be a RFID Network providing a location service. Anytime if an application
         wants to know the last location of an EPC, it can query        the   RFID network to get one. This
         service could help in recall management or just in time replenishment if one knows how far the
         inventory is reached in its supply chain.




                                   Fig.4. General Topology of RFID Network


    •    Similarly “Smart” RFID Network can provide other services such as dwelling times at a particular
         location or transit times between two locations. RFID networks can also provide complex services for
         instance “no product received (at a location)” or “no product stocked”. This service can help in
         monitoring promotion execution in the retail supply chain or ensure customer satisfaction in any
         Supply Chain. Another example of complex service would be to push alerts out to subscribers when the
         inventory is aging or is already reached to the stale status.




16 | P a g e
www.iiste.org
Journal of Information Engineering and Applications                                            www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.1, 2011
5. Mobile RFID

5.1. Mobile RFID Technology

RFID is expected to be the base technology for the ubiquitous network or computing, and is likely to be
associated with other technologies such as MEMS (Micro Electro Mechanical Systems), Telematics, and
Sensors. Meanwhile, it is widely accepted that Korea is one of the countries that has established a robust mobile
telecommunication networks in the world. In particular, about 78% of the population uses mobile phones and
more than 95% of those phones have Internet-enabled functions. Currently, Korea has recognized the potential
of RFID technology and has tried to converge it with mobile phone. Mobile phones integrated with RFID can be
expected to create new markets and provide new services to end-users, and as such will be considered as an
exemplary technology fusion. Furthermore, it may evolve its particular functions as an end user terminal device,
or a u-device (Ubiquitous device), in the world of ubiquitous information technology. Actually, the mobile
RFID phone may represent two types of mobile phone device; one is the RFID-reader-equipped mobile phone,
and the other is the RFID-tag-attached mobile phone. Each type of mobile phone has different application
domains: On the one hand, for example, the RFID-tag-attached type can be used as a device for payment, entry
control, and identity authentication, and the main feature of this application stems from the fact that RFID
readers exist in the fixed position and recognize each phone, giving the user specific services like door opening;
on the other hand, the RFID reader equipped mobile phone, to which Korea is currently paying considerable
attention, can be utilized to provide end-users with detailed information about the tagged object through
accessing the mobile wireless network.

The basic communication scenario for mobile RFID service is as follows: First, a mobile RFID phone reads the
RFID tags on an object and fetches the code stored in it . Second, a mobile RFID phone should execute the code
resolution with which the mobile RFID phone obtains the location of the remote server that provides
information on the product or an adequate mobile service. The code resolution protocol is identical with the
DNS protocol. The ODS server in figure 5 as a DNS server and is similar to EPCglobal’s ONS (Object Name
Service) server. The mobile RFID phone directs queries on the location of the server with a code to the ODS
server, then the ODS server replies by giving the location of the server. Finally, the mobile RFID phone requests
contents or a service from the designated server whose location has been acquired from the ODS server.




                            Fig. 5. Detailed Mobile RFID’s Code Resolution Process.


Figure 5 illustrates the detailed code resolution process. The code store in the RFID tag is formed of a bit string
such as ‘01001101110…’ and this bit string should be translated into a meaningful form such as EPC, mCode
(Mobile RFID Code), uCode, ISO Code, or something else . Given that ‘1.2.3.4’ is obtained from a bit string
translation and that ‘1.2.3.4’ should be converted into a URN (Uniform Resource Name) form as


17 | P a g e
www.iiste.org
Journal of Information Engineering and Applications                                         www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.1, 2011
‘urn:mcode:cb:1.2.3.4’ , the remaining code resolution process is the same as the DNS reverse
lookup process. The mobile RFID reader requests contents retrieval after code resolution. The RFID application
in the mobile RFID phone requests contents from the WAP or web server returned by the code resolution.

5.2 Mobile RFID services

For a long time, RFID has stayed in B2B business fields such as transport and logistics, supply chain
management, manufacturing and processing, and inventory control due to various problems such as still
expensive RFID tag price, lack of 100% reading accuracy, limited operation conditions, etc.




                           Fig.6. Use cases of mobile RFID applications and services

The model of the mobile RFID service as shown in figure 2 defines three additional entities and two
relationships compared to those defined in the RFID tag, the RFID access network, RFID reader, the
relationship between the RFID tag and RFID reader, and the relationship between the RFID reader and the
application server.




                             Fig. 7. Model of Mobile RFID Data Communication.


5.3 Advantages

Today we spend significant time stopping to scan bar codes. Collectively, over time, we introduce latency in the
speed and efficiency with which we are able to move products through the supply chain. If you can remove bar

18 | P a g e
www.iiste.org
Journal of Information Engineering and Applications                                            www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.1, 2011
code scanning from an operator’s activities and collect the data through RFID, operators become more efficient
at moving material and a wealth of efficiencies can be achieved. What this ultimately means is that if you are
going to implement RFID, which represents some incremental costs in terms of product tagging, you’ll need to
modify your processes to optimize the benefits of RFID. This is not a new concept. We changed processes in
warehousing and distribution centers when we moved from paper pick lists to real-time RF based data collection
using bar code technology. We will change the way we do things again, because RFID allows us to automate
data collection and get better utilization of our facilities, our labor, and achieve better velocity through our
warehousing operations. And again the benefits of data collection automation are maximized by moving the
tagging and implementation of RFID upstream. This moves the costs of tagging products to points upstream
where greater efficiencies of tag programming and application can be realized. It also reduces costs associated
with segregating tagged versus non-tagged products. Over the past several years we’ve done a deep
investigation into the current practices within warehousing and distribution to look at how these practices would
benefit from the combination of a mobile RFID solution and tagging “upstream”. See below in fig.8.




                     Fig.8. Combination of a mobile RFID solution and tagging “upstream”.

5.4 Mobile RFID – Shipping & Receiving

If you look specifically at shipping and receiving, these are really just specialized instances of a warehouse
move. You still have the same basic data content that you need to capture - “what have I got” and “where is it
going/where is it coming from”? Today that is generally done by scanning a bar code on the pallet load that
represents the load itself. The location is captured by scanning a bar code over the dock door as you go in or out.
The earliest RFID implementations have all focused on a fixed reader placed at the dock door. You capture the
“what is it” by reading the content of the pallet for as many tags as you can capture via the RFID reader as the
forklift takes the load through the portal. The location element is implied by the network address of the fixed
reader itself. If we look at an alternative solution based on a forklift mounted RFID reader you can still capture
the same two data elements; the ”what is it” by reading the pallet via the forklift mounted RFID reader and the
location by use of a location tag placed in the dock door vicinity. A major advantage of the mobile solution is
economical. In a typical warehouse you’d have around 100 dock doors, and those dock doors would be serviced
by as few as 10 to 20 different forklifts. In the fixed RFID portal world you’d need 100 fixed RFID readers. In
the mobile RFID world you’d only need 10 to 20 mobile RFID readers – a much more economical solution.
Furthermore, the mobile RFID readers can be leveraged in other internal warehouse moves where it can
generate further improvements in visibility, efficiency and velocity.

5.5 Mobile RFID – Case Picking

Case picking is another instance where a mobile RFID solution is beneficial. Today, the bar code for the pallet is
available to the forklift operator on a spool. The operator scans the bar code for the pallet and is given his first
pick location. The operator goes to it and scans a location or a pallet tag that he is picking from. That validates
to the system that he is picking the right product. He is told to pick six cases and put them on the pallet. We

19 | P a g e
www.iiste.org
Journal of Information Engineering and Applications                                            www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.1, 2011
hope he has picked six and not five. He hops in the forklift and is assigned the next location and repeats the
process until done. At that point the pallet is taken to a shrink wrap machine and in many cases to an audit
station where they check the correct count and SKU for that particular pallet load. At best, if the operator got the
count and SKU’s correct for that pallet load, you now have a redundant activity at an incremental expense. If he
did not get it right, you have to break down the pallet and correct it. The cost of recovery is very high.

Tag readers interrogate tags for their data through an RF interface. To provide additional functionality, readers
may contain internal storage, processing power connections to back-end databases. Computations, such as
cryptographic calculations, may be carried out by the reader on behalf of a tag. The channel from reader-to-tag
may be referred to as the forward channel. Similarly, the tagto- reader channel may be referred to as the
backward channel. In practice, readers might be handheld devices or incorporated into a fixed location. One
application of a fixed reader is a 'smart shelf'. Smart shelves could detect when items are added or removed, and
would play a key role in a real-time inventory control system. Fundamentally, readers are quite simple devices
and could be incorporated into mobile devices like cellular phones or PDAs. A standalone, hand-held reader
with a wireless connection to a back-end database may cost around US $100-200. If RFID tags become
ubiquitous in consumer items, tag reading may become a desirable feature on consumer electronics .




                                         Fig. 9. The mobile RFID Reader.


6. Conclusions

As mentioned above, mobile RFID is an emergent and promising application that uses RFID technology.
However, the mobility of reader and its service model – which differs from the RFID service in the retail and
supply chain – will give rise to additional security threats. To address these issues, while both are important
tools, neither killing nor recoding is the final answer in RFID privacy. The killing alone is not enough, and new
mechanisms are needed for building privacy-preserving RFID architectures. In this chapter, we have tried to
introduce the concept of mobile RFID and expose some of the additional security threats caused by it. The
frequency band to support the air protocol is allocated from 908.5MHz to 914MHz in Korea in order to comply
with ISO 18000-6 for air interface communications at 860MHz to 960MHz. We also describe a way of
incorporating the new technology to work with cell phones in particular, both as an external security reading
device (replacing 900MHz) and as an added security service to manage all RFID mobile device mediums. With
this purpose in mind, the application areas of this service platform are also briefly presented. By doing so,
customized security and privacy protection can be achieved. In this regard, the suggested technique is an
effective solution for security and privacy protection in a networked mobile RFID service system.


Acknowledgment

The author would like to thank Miss K.Jayanthi and Dr.Abhay Kumar for their insightful advice and guidance,
and unknown reviewers for their useful remarks and suggestions.

References


20 | P a g e
www.iiste.org
Journal of Information Engineering and Applications                                         www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.1, 2011
Architecture Review Committee, EPCglobal, Lawrenceville, NJ, “The EPCglobal architecture framework,”
2005. [Online]. Available: www. epcglobalinc.org
Baehyo Park, Seoklae Lee, and Heugyoul Youm. A proposal for personal identifier management framework on
the Internet. ITU-T, COM17-D165, (2006).
Brusey.J, C. Floerkemeier, M. Harrison, and M. Fletcher, “Reasoning about uncertainty in location identification
with RFID,” presented at the Workshop Reason. With Uncertainty Robot. IJCAI, Acapulco, Mexico, 2003.
EPCglobal, Lawrenceville, NJ, “Reader protocol standard, version 1.1,” 2006. [Online]. Available:
www.epcglobalinc.org
EPCglobal, Lawrenceville, NJ, “The application level events (ALE) specification, version 1.0,” 2005 [Online].
Available: www.epcglobalinc. org
EPCglobal, Lawrenceville, NJ, “EPC information services (EPCIS) version 1.0, specification,” 2007. [Online].
Available: www.epcglobalinc.org
EPCglobal, Lawrenceville, NJ, “Class 1 generation 2 UHF air interface protocol standard version 1.0.9,” 2005
[Online]. Available: www.epcglobalinc.Org
European Telecommunications Standards Institute (ETSI), Sophia Antipolis, France, “Electromagnetic
compatibility and radio spectrum matters (ERM); Radio frequency identification equipment operating in the
band 865 MHz to 868 MHz with power levels up to 2 W,” Tech. Rep. EN 302 208-1 V1.1.1, 2004 [Online].
Available: www.etsi.org
Falck.G, “The newRFID standard in Europe,” RFID J., 2004. [Online]. Available: www.rfidjournal.com
Floerkemeier.C, R. Schneider, and M. Langheinrich, Scanning With a Purpose—Supporting the Fair Information
Principles in RFID Protocols,
H. Murakami, H. Nakashima, H. Tokuda, and M. Yasumura, Eds. Berlin, Germany: Springer-Verlag, June 2005,
vol. 3598, pp. 214–231.
International Organization for Standardization, Geneva, Switzerland, “Information technology—Radio
frequency identification for item management—Part 6: Parameters for air interface communications at 860 MHz
to 960 MHz,” 2004.
Jongsuk Chae, and Sewon Oh, Information Report on Mobile RFID in Korea. ISO/IEC JTC1/SC 31/WG4
N0922, Information paper, ISO/IEC JTC1 SC31 WG4 SG 5, (2005).
Karthaus.U and M. Fischer, “Fully integrated passive UHF RFID transponder IC with 16.7-_W minimum RF
input power,” IEEE J. Solid-State Circuits, vol. 38, no. 10, pp. 1602–1608, Oct. 2003.
Klaus Finkenzeller, RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and
Identification, Wiley (2003).
Langheinrich.M, “RFID and Privacy,” in Security, Privacy and Trust in Modern Data Management,M. Petkovic
and W. Jonker, Eds. New York: Springer-Verlag, 2006.
Leong.K.S, M. L. Ng, and P. H. Cole, “The reader collision problem in RFID systems,” in Proc. IEEE Int.
Symp. Microw., Antenna, Propag. EMC Technol. Wireless Commun. (MAPE), 2005, pp. 658–661.
Mitsuo Tsukada, and Atsunobu Narita, Development models of network aspects of identification systems
(including RFID) (NID) and proposal on approach for the standardization, ITU-T, JCA-NID Document 2006-I-
014, (2006).
Namje Park, Jin Kwak, Seungjoo Kim, Dongho Won, and Howon Kim, WIPI Mobile Platform with Secure
Service for Mobile RFID Network Environment. Lecture Notes in Computer Science, vol.3842, Springer-
Verlag, 741 (2006).
Ohkubo.M, K. Suzuki, and S. Kinoshita, Cryptographic Approach to ‘Privacy-Friendly’ Tags, RFID Privacy
Workshop, (2003).
Sangkeun Yoo, Mobile RFID Activities in Korea, Contribution Paper of the APT Standardization Program,
(2005).
Sarma.S.E, S. A. Weis, and D.W. Engels, RFID systems, Security and privacy implications. Technical Report
MIT-AUTOID-WH-014, AutoID Center, MIT, (2002).
Sullivan L., Middleware enables RFID tests, Information week, no.991, (2004).
Tsuji T., Kouno S., Noguchi J., Iguchi M., Misu N., and Kawamura M., Asset management solution based on
RFID, NEC Journal of Advanced Technology, vol.1, no.3, 188 (2004).
Weis, S. et al, Security and Privacy Aspects of Low-Cost Radio Frequency identification Systems, First
International Conference on Security in Pervasive Computing, (2003).
Wung Park, and Byoungnam Lee, Proposal for participating in the Correspondence Group on RFID in ITU-T,
Information Paper, ASTAP Forum, (2004).
Yongwoon Kim, and Noboru Koshizuka. Review report of Standardization Issues on Network
Aspects of Identification including RFID, ITU-T, Paper TD315, (2006).


21 | P a g e
www.iiste.org

More Related Content

What's hot

5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
Battery-free RFID sensors in the IoT
Battery-free RFID sensors in the IoTBattery-free RFID sensors in the IoT
Battery-free RFID sensors in the IoTFARSENS
 
RFID Privacy & Security Issues
RFID Privacy & Security IssuesRFID Privacy & Security Issues
RFID Privacy & Security IssuesBrent Muir
 
RFID in retail sector
RFID in retail sectorRFID in retail sector
RFID in retail sectorsedadoc
 
RFID application in scm and vm
RFID application in scm and vmRFID application in scm and vm
RFID application in scm and vmMohnish Madkaikar
 
Barcode & RFiD in Supply Chain
Barcode & RFiD in Supply ChainBarcode & RFiD in Supply Chain
Barcode & RFiD in Supply ChainExistco Pty Ltd
 
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...Onyebuchi nosiri
 
I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...
I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...
I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...CPqD
 
Rfid seminar (1)
Rfid seminar (1)Rfid seminar (1)
Rfid seminar (1)GITAM
 
Enhancement of security in rfid using rsa algorithm
Enhancement of security in rfid using rsa algorithmEnhancement of security in rfid using rsa algorithm
Enhancement of security in rfid using rsa algorithmAlexander Decker
 

What's hot (17)

5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
Rfid ppt
Rfid pptRfid ppt
Rfid ppt
 
Battery-free RFID sensors in the IoT
Battery-free RFID sensors in the IoTBattery-free RFID sensors in the IoT
Battery-free RFID sensors in the IoT
 
RFID Privacy & Security Issues
RFID Privacy & Security IssuesRFID Privacy & Security Issues
RFID Privacy & Security Issues
 
RFID in retail sector
RFID in retail sectorRFID in retail sector
RFID in retail sector
 
RFID application in scm and vm
RFID application in scm and vmRFID application in scm and vm
RFID application in scm and vm
 
Barcode & RFiD in Supply Chain
Barcode & RFiD in Supply ChainBarcode & RFiD in Supply Chain
Barcode & RFiD in Supply Chain
 
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
 
Iot intro
Iot introIot intro
Iot intro
 
RFID security ppt
RFID security pptRFID security ppt
RFID security ppt
 
I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...
I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...
I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...
 
Rfid seminar (1)
Rfid seminar (1)Rfid seminar (1)
Rfid seminar (1)
 
Enhancement of security in rfid using rsa algorithm
Enhancement of security in rfid using rsa algorithmEnhancement of security in rfid using rsa algorithm
Enhancement of security in rfid using rsa algorithm
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
B0110508
B0110508B0110508
B0110508
 
Rfid Tags India
Rfid Tags IndiaRfid Tags India
Rfid Tags India
 

Viewers also liked

Smart Home Tech Short
Smart Home Tech ShortSmart Home Tech Short
Smart Home Tech Shortchowfei
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 

Viewers also liked (8)

Smart Home Tech Short
Smart Home Tech ShortSmart Home Tech Short
Smart Home Tech Short
 
Rfid ppt
Rfid pptRfid ppt
Rfid ppt
 
Smart homes
Smart homesSmart homes
Smart homes
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 

Similar to 3.[13 21]framework of smart mobile rfid networks

3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networks3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networksAlexander Decker
 
RFID Technology: An Upgradation for Society
RFID Technology: An Upgradation for SocietyRFID Technology: An Upgradation for Society
RFID Technology: An Upgradation for SocietyIRJET Journal
 
Revolutionizing Asset Tracking with RFID and IoT.pdf
Revolutionizing Asset Tracking with RFID and IoT.pdfRevolutionizing Asset Tracking with RFID and IoT.pdf
Revolutionizing Asset Tracking with RFID and IoT.pdfriyak40
 
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Liz Sims
 
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleIJERA Editor
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
3 supply chain management
3 supply chain management3 supply chain management
3 supply chain managementcindyrevi
 
IMPLEMENTING UHF RFID READER ON SMARTPHONE PLATFORM FOR IOT SENSING
IMPLEMENTING UHF RFID READER ON SMARTPHONE PLATFORM FOR IOT SENSINGIMPLEMENTING UHF RFID READER ON SMARTPHONE PLATFORM FOR IOT SENSING
IMPLEMENTING UHF RFID READER ON SMARTPHONE PLATFORM FOR IOT SENSINGcscpconf
 
RFID Technology An Overview
RFID Technology An OverviewRFID Technology An Overview
RFID Technology An Overviewijtsrd
 
A survey of mobile rfid and its security issues
A survey of mobile rfid and its security issuesA survey of mobile rfid and its security issues
A survey of mobile rfid and its security issuesSeenivasan SR
 
International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI) International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI) inventionjournals
 
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)inventionjournals
 
RFID readers in India - RFID manufacturers
RFID readers in India - RFID manufacturersRFID readers in India - RFID manufacturers
RFID readers in India - RFID manufacturersPOXO RFID AUTOMATION
 
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodA Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodLuz Martinez
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisoliaPositive Hack Days
 
Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Positive Hack Days
 
What is the role of RFID chips in logistics What is the role o.pdf
What is the role of RFID chips in logistics What is the role o.pdfWhat is the role of RFID chips in logistics What is the role o.pdf
What is the role of RFID chips in logistics What is the role o.pdfarihantcommunication
 

Similar to 3.[13 21]framework of smart mobile rfid networks (20)

3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networks3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networks
 
RFID Technology: An Upgradation for Society
RFID Technology: An Upgradation for SocietyRFID Technology: An Upgradation for Society
RFID Technology: An Upgradation for Society
 
Revolutionizing Asset Tracking with RFID and IoT.pdf
Revolutionizing Asset Tracking with RFID and IoT.pdfRevolutionizing Asset Tracking with RFID and IoT.pdf
Revolutionizing Asset Tracking with RFID and IoT.pdf
 
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)
 
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
3 supply chain management
3 supply chain management3 supply chain management
3 supply chain management
 
Rfid3
Rfid3Rfid3
Rfid3
 
IMPLEMENTING UHF RFID READER ON SMARTPHONE PLATFORM FOR IOT SENSING
IMPLEMENTING UHF RFID READER ON SMARTPHONE PLATFORM FOR IOT SENSINGIMPLEMENTING UHF RFID READER ON SMARTPHONE PLATFORM FOR IOT SENSING
IMPLEMENTING UHF RFID READER ON SMARTPHONE PLATFORM FOR IOT SENSING
 
RFID Technology An Overview
RFID Technology An OverviewRFID Technology An Overview
RFID Technology An Overview
 
A survey of mobile rfid and its security issues
A survey of mobile rfid and its security issuesA survey of mobile rfid and its security issues
A survey of mobile rfid and its security issues
 
Frid based final year report
Frid based final year reportFrid based final year report
Frid based final year report
 
International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI) International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI)
 
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
 
RFID readers in India - RFID manufacturers
RFID readers in India - RFID manufacturersRFID readers in India - RFID manufacturers
RFID readers in India - RFID manufacturers
 
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodA Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisolia
 
Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.
 
What is the role of RFID chips in logistics What is the role o.pdf
What is the role of RFID chips in logistics What is the role o.pdfWhat is the role of RFID chips in logistics What is the role o.pdf
What is the role of RFID chips in logistics What is the role o.pdf
 

More from Alexander Decker

A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 
A study to evaluate the attitude of faculty members of public universities of...
A study to evaluate the attitude of faculty members of public universities of...A study to evaluate the attitude of faculty members of public universities of...
A study to evaluate the attitude of faculty members of public universities of...Alexander Decker
 
A study to assess the knowledge regarding prevention of pneumonia among middl...
A study to assess the knowledge regarding prevention of pneumonia among middl...A study to assess the knowledge regarding prevention of pneumonia among middl...
A study to assess the knowledge regarding prevention of pneumonia among middl...Alexander Decker
 
A study regarding analyzing recessionary impact on fundamental determinants o...
A study regarding analyzing recessionary impact on fundamental determinants o...A study regarding analyzing recessionary impact on fundamental determinants o...
A study regarding analyzing recessionary impact on fundamental determinants o...Alexander Decker
 
A study on would be urban-migrants’ needs and necessities in rural bangladesh...
A study on would be urban-migrants’ needs and necessities in rural bangladesh...A study on would be urban-migrants’ needs and necessities in rural bangladesh...
A study on would be urban-migrants’ needs and necessities in rural bangladesh...Alexander Decker
 

More from Alexander Decker (20)

A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 
A study to evaluate the attitude of faculty members of public universities of...
A study to evaluate the attitude of faculty members of public universities of...A study to evaluate the attitude of faculty members of public universities of...
A study to evaluate the attitude of faculty members of public universities of...
 
A study to assess the knowledge regarding prevention of pneumonia among middl...
A study to assess the knowledge regarding prevention of pneumonia among middl...A study to assess the knowledge regarding prevention of pneumonia among middl...
A study to assess the knowledge regarding prevention of pneumonia among middl...
 
A study regarding analyzing recessionary impact on fundamental determinants o...
A study regarding analyzing recessionary impact on fundamental determinants o...A study regarding analyzing recessionary impact on fundamental determinants o...
A study regarding analyzing recessionary impact on fundamental determinants o...
 
A study on would be urban-migrants’ needs and necessities in rural bangladesh...
A study on would be urban-migrants’ needs and necessities in rural bangladesh...A study on would be urban-migrants’ needs and necessities in rural bangladesh...
A study on would be urban-migrants’ needs and necessities in rural bangladesh...
 

Recently uploaded

Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckHajeJanKamps
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...Operational Excellence Consulting
 
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryWhittensFineJewelry1
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingrajputmeenakshi733
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerAggregage
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdfChris Skinner
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...Hector Del Castillo, CPM, CPMM
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers referencessuser2c065e
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfDanny Diep To
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
BAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptxBAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptxran17april2001
 

Recently uploaded (20)

Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deck
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
 
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
 
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptxThe Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
 
WAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdfWAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdf
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketing
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon Harmer
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers reference
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
BAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptxBAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptx
 

3.[13 21]framework of smart mobile rfid networks

  • 1. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.1, 2011 Framework of Smart Mobile RFID Networks Pradeep Kumar ECE Deptt. , Vidya Vihar Institute of Technology Maranga, Purnea, Bihar-854301, India,Tel: +917870248311 Web:www.pradeepjec.page4.me, Email: pra_deep_jec@yahoo.co.in Abstract Basically RFID (radio-frequency identification) is a wireless communication technology within the L1 (Layer 1, the physical layer of the OSI 7-layer Reference Model) and L2 scopes between RFID tag and reader. The RFID reader reads the code in the RFID tag and interprets it by communicating with the IS(information services) server via a proper communication network. This is the typical architecture defined by EPC (electronic product Code)global. RFID networks need to provide value added services in order to give better visibility to inventory movement across supply chain or closed loop applications like Asset tracking or Work In Progress tracking. The RFID reader can be stationary or mobile. A mobile RFID reader affords more applications than the stationary one. Mobile RFID is a newly emerging technology which uses the mobile phone as an RFID reader with a wireless technology and provides new valuable services to the user by integrating RFID and ubiquitous sensor network infrastructure with mobile communication and wireless internet. The mobile RFID enables business to provide new services to mobile customers by securing services and transactions from the end-user to a company's existing e-commerce and IT systems. In this paper, I describe about the core components of mobile RFID, advantages and its applications in scenario of smart networks. Although there are several types of mobile RFID readers in the market, I focused on mobile RFID technology that has several positive features including security, network architecture, operation scenario, and code resolution mechanism. Keywords: EPC network, RFID, Mobile RFID, Smart RFID network 1. Introduction RFID (Radio Frequency IDentification) has been recognized as a key technology for ubiquitous networks, which in turn is defined as an environment in which information can be acquired anytime and anywhere through network access service . Currently, RFID technologies consider the environment in which RFID tags are mobile and RFID readers are stationary. However, in the future, RFID technologies could consider an environment in which RFID tags are stationary and readers are mobile. RFID based on mobile telecommunications services could be the best example of this kind of usage. RFID-based mobile telecommunications services could be defined as services which provide information access through the telecommunication network by reading RFID tags on certain objects using an RFID reader in mobile terminals such as cell phones. RFID tags play an important role as a bridge between offline objects and online information. The RFID enabled cell phone was introduced by Nokia in 2004. In these domains, RFID technology holds the promise to eliminate many existing business problems by bridging the economically costly gap between the virtual world of IT systems and the real world of products and logistical units. Common benefits include more efficient material handling processes, elimination of manual inventory counts, and the automatic detection of empty shelves and expired products in retail stores. RFID technology has a number of advantages over other identification technologies. It does not require line-of-sight alignment, multiple tags can be identified almost simultaneously, and the tags do not destroy the integrity or aesthetics of the original object. The location of tagged objects can thus be monitored automatically and continuously. The EPC Network, originally proposed by the Auto-ID Center and further developed by the members of EPC global, is currently one of the predominant standardization effort of the RFID community. RFID networks need to provide value added services in order to give better visibility to inventory movement across supply chain or closed loop applications like Asset tracking or Work In Progress tracking. In traditional RFID applications, such as access control, there was little need for RFID middleware because the RFID readers were not networked and the RFID data were only consumed by a single application. In novel application domains, such as supply chain management and logistics, there is no longer a 1-to-1 relationship 13 | P a g e www.iiste.org
  • 2. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.1, 2011 between reader and application instance, however. In these domains, many readers distributed across factories, warehouses, and distribution centers capture RFID data that need to be disseminated to a variety of applications. This introduces the need for an RFID infrastructure that hides proprietary reader device interfaces, provides configuration and system management of reader devices, and filters and aggregates the captured RFID data. This frees applications from the need of maintaining connections to individual reader devices. The rest of this paper is structured as follows. In Section 2,I give detail about the EPC networks. Section 3 provides a brief overview of RFID technology and outlines the constraints imposed by the characteristics of RFID. In Section 4, I describe about smart RFID networks. I continue by presenting some sample applications and advantages of Mobile RFID in Section 5 and in section 6 conclusions are given. 2. EPC Network A typical RFID network model may refer to the network architecture of EPC global as shown in figure 1 where the network entities are RFID tags, readers, ALE host, event management server called EPC-IS, EPC-IS service location server called EPC-DS, and code resolution server called ONS. Business application servers such as ERP, CRM, SCM, etc. are out of scope because they stay at back-end and are associated indirectly with an RFID network. Such a network model is for B2B applications. Fig. 1. EPC Network’s Configuration. 3.RFID Radio Frequency Identification (RFID) is an automatic identification technology which allows remote interrogation of ID data on RFID tags using radio frequency as a means of wireless communication between tagged objects and RFID readers. 14 | P a g e www.iiste.org
  • 3. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.1, 2011 Fig. 2. EPC Network roles and interfaces Fig.3.A simple RFID system 4. Smart RFID Networks RFID technology leads us to the world of connected objects. It enables the inventory to speak for its presence and drives the processes as opposed to processes driving the inventory. This paradigm shift opens up new avenues and new approach to achieve process efficiency, better inventory management and improved business intelligence. RFID Networks enable businesses to build Event Driven Applications and react to real time information. If 15 | P a g e www.iiste.org
  • 4. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.1, 2011 business processes start working with the real time events the enterprises can become more efficient and lean. To have a successful RFID implementation and reap true benefits, businesses have to - Identify the business goals - Build RFID networks that give them the visibility to “assets” and “inventory” and achieve business goals - Collect and convert the RFID data into “actions” and perhaps in real time. An RFID network generates a continuous stream of data and because of its sheer volume it needs to be handled very carefully. In the world of connected objects, the goal is to have efficient RFID Networks that give the right information to the right application at the right time (3R’s) and make Enterprise Management Systems Event Driven. • Data becomes valuable information if it is relevant to the recipient. In the application-driven RFID Network, applications define the rules for processing RFID reads. The network layer executes those rules for organizing the RFID data, and then delivers quality information to its subscribers. The most common example would be a RFID Network providing a location service. Anytime if an application wants to know the last location of an EPC, it can query the RFID network to get one. This service could help in recall management or just in time replenishment if one knows how far the inventory is reached in its supply chain. Fig.4. General Topology of RFID Network • Similarly “Smart” RFID Network can provide other services such as dwelling times at a particular location or transit times between two locations. RFID networks can also provide complex services for instance “no product received (at a location)” or “no product stocked”. This service can help in monitoring promotion execution in the retail supply chain or ensure customer satisfaction in any Supply Chain. Another example of complex service would be to push alerts out to subscribers when the inventory is aging or is already reached to the stale status. 16 | P a g e www.iiste.org
  • 5. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.1, 2011 5. Mobile RFID 5.1. Mobile RFID Technology RFID is expected to be the base technology for the ubiquitous network or computing, and is likely to be associated with other technologies such as MEMS (Micro Electro Mechanical Systems), Telematics, and Sensors. Meanwhile, it is widely accepted that Korea is one of the countries that has established a robust mobile telecommunication networks in the world. In particular, about 78% of the population uses mobile phones and more than 95% of those phones have Internet-enabled functions. Currently, Korea has recognized the potential of RFID technology and has tried to converge it with mobile phone. Mobile phones integrated with RFID can be expected to create new markets and provide new services to end-users, and as such will be considered as an exemplary technology fusion. Furthermore, it may evolve its particular functions as an end user terminal device, or a u-device (Ubiquitous device), in the world of ubiquitous information technology. Actually, the mobile RFID phone may represent two types of mobile phone device; one is the RFID-reader-equipped mobile phone, and the other is the RFID-tag-attached mobile phone. Each type of mobile phone has different application domains: On the one hand, for example, the RFID-tag-attached type can be used as a device for payment, entry control, and identity authentication, and the main feature of this application stems from the fact that RFID readers exist in the fixed position and recognize each phone, giving the user specific services like door opening; on the other hand, the RFID reader equipped mobile phone, to which Korea is currently paying considerable attention, can be utilized to provide end-users with detailed information about the tagged object through accessing the mobile wireless network. The basic communication scenario for mobile RFID service is as follows: First, a mobile RFID phone reads the RFID tags on an object and fetches the code stored in it . Second, a mobile RFID phone should execute the code resolution with which the mobile RFID phone obtains the location of the remote server that provides information on the product or an adequate mobile service. The code resolution protocol is identical with the DNS protocol. The ODS server in figure 5 as a DNS server and is similar to EPCglobal’s ONS (Object Name Service) server. The mobile RFID phone directs queries on the location of the server with a code to the ODS server, then the ODS server replies by giving the location of the server. Finally, the mobile RFID phone requests contents or a service from the designated server whose location has been acquired from the ODS server. Fig. 5. Detailed Mobile RFID’s Code Resolution Process. Figure 5 illustrates the detailed code resolution process. The code store in the RFID tag is formed of a bit string such as ‘01001101110…’ and this bit string should be translated into a meaningful form such as EPC, mCode (Mobile RFID Code), uCode, ISO Code, or something else . Given that ‘1.2.3.4’ is obtained from a bit string translation and that ‘1.2.3.4’ should be converted into a URN (Uniform Resource Name) form as 17 | P a g e www.iiste.org
  • 6. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.1, 2011 ‘urn:mcode:cb:1.2.3.4’ , the remaining code resolution process is the same as the DNS reverse lookup process. The mobile RFID reader requests contents retrieval after code resolution. The RFID application in the mobile RFID phone requests contents from the WAP or web server returned by the code resolution. 5.2 Mobile RFID services For a long time, RFID has stayed in B2B business fields such as transport and logistics, supply chain management, manufacturing and processing, and inventory control due to various problems such as still expensive RFID tag price, lack of 100% reading accuracy, limited operation conditions, etc. Fig.6. Use cases of mobile RFID applications and services The model of the mobile RFID service as shown in figure 2 defines three additional entities and two relationships compared to those defined in the RFID tag, the RFID access network, RFID reader, the relationship between the RFID tag and RFID reader, and the relationship between the RFID reader and the application server. Fig. 7. Model of Mobile RFID Data Communication. 5.3 Advantages Today we spend significant time stopping to scan bar codes. Collectively, over time, we introduce latency in the speed and efficiency with which we are able to move products through the supply chain. If you can remove bar 18 | P a g e www.iiste.org
  • 7. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.1, 2011 code scanning from an operator’s activities and collect the data through RFID, operators become more efficient at moving material and a wealth of efficiencies can be achieved. What this ultimately means is that if you are going to implement RFID, which represents some incremental costs in terms of product tagging, you’ll need to modify your processes to optimize the benefits of RFID. This is not a new concept. We changed processes in warehousing and distribution centers when we moved from paper pick lists to real-time RF based data collection using bar code technology. We will change the way we do things again, because RFID allows us to automate data collection and get better utilization of our facilities, our labor, and achieve better velocity through our warehousing operations. And again the benefits of data collection automation are maximized by moving the tagging and implementation of RFID upstream. This moves the costs of tagging products to points upstream where greater efficiencies of tag programming and application can be realized. It also reduces costs associated with segregating tagged versus non-tagged products. Over the past several years we’ve done a deep investigation into the current practices within warehousing and distribution to look at how these practices would benefit from the combination of a mobile RFID solution and tagging “upstream”. See below in fig.8. Fig.8. Combination of a mobile RFID solution and tagging “upstream”. 5.4 Mobile RFID – Shipping & Receiving If you look specifically at shipping and receiving, these are really just specialized instances of a warehouse move. You still have the same basic data content that you need to capture - “what have I got” and “where is it going/where is it coming from”? Today that is generally done by scanning a bar code on the pallet load that represents the load itself. The location is captured by scanning a bar code over the dock door as you go in or out. The earliest RFID implementations have all focused on a fixed reader placed at the dock door. You capture the “what is it” by reading the content of the pallet for as many tags as you can capture via the RFID reader as the forklift takes the load through the portal. The location element is implied by the network address of the fixed reader itself. If we look at an alternative solution based on a forklift mounted RFID reader you can still capture the same two data elements; the ”what is it” by reading the pallet via the forklift mounted RFID reader and the location by use of a location tag placed in the dock door vicinity. A major advantage of the mobile solution is economical. In a typical warehouse you’d have around 100 dock doors, and those dock doors would be serviced by as few as 10 to 20 different forklifts. In the fixed RFID portal world you’d need 100 fixed RFID readers. In the mobile RFID world you’d only need 10 to 20 mobile RFID readers – a much more economical solution. Furthermore, the mobile RFID readers can be leveraged in other internal warehouse moves where it can generate further improvements in visibility, efficiency and velocity. 5.5 Mobile RFID – Case Picking Case picking is another instance where a mobile RFID solution is beneficial. Today, the bar code for the pallet is available to the forklift operator on a spool. The operator scans the bar code for the pallet and is given his first pick location. The operator goes to it and scans a location or a pallet tag that he is picking from. That validates to the system that he is picking the right product. He is told to pick six cases and put them on the pallet. We 19 | P a g e www.iiste.org
  • 8. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.1, 2011 hope he has picked six and not five. He hops in the forklift and is assigned the next location and repeats the process until done. At that point the pallet is taken to a shrink wrap machine and in many cases to an audit station where they check the correct count and SKU for that particular pallet load. At best, if the operator got the count and SKU’s correct for that pallet load, you now have a redundant activity at an incremental expense. If he did not get it right, you have to break down the pallet and correct it. The cost of recovery is very high. Tag readers interrogate tags for their data through an RF interface. To provide additional functionality, readers may contain internal storage, processing power connections to back-end databases. Computations, such as cryptographic calculations, may be carried out by the reader on behalf of a tag. The channel from reader-to-tag may be referred to as the forward channel. Similarly, the tagto- reader channel may be referred to as the backward channel. In practice, readers might be handheld devices or incorporated into a fixed location. One application of a fixed reader is a 'smart shelf'. Smart shelves could detect when items are added or removed, and would play a key role in a real-time inventory control system. Fundamentally, readers are quite simple devices and could be incorporated into mobile devices like cellular phones or PDAs. A standalone, hand-held reader with a wireless connection to a back-end database may cost around US $100-200. If RFID tags become ubiquitous in consumer items, tag reading may become a desirable feature on consumer electronics . Fig. 9. The mobile RFID Reader. 6. Conclusions As mentioned above, mobile RFID is an emergent and promising application that uses RFID technology. However, the mobility of reader and its service model – which differs from the RFID service in the retail and supply chain – will give rise to additional security threats. To address these issues, while both are important tools, neither killing nor recoding is the final answer in RFID privacy. The killing alone is not enough, and new mechanisms are needed for building privacy-preserving RFID architectures. In this chapter, we have tried to introduce the concept of mobile RFID and expose some of the additional security threats caused by it. The frequency band to support the air protocol is allocated from 908.5MHz to 914MHz in Korea in order to comply with ISO 18000-6 for air interface communications at 860MHz to 960MHz. We also describe a way of incorporating the new technology to work with cell phones in particular, both as an external security reading device (replacing 900MHz) and as an added security service to manage all RFID mobile device mediums. With this purpose in mind, the application areas of this service platform are also briefly presented. By doing so, customized security and privacy protection can be achieved. In this regard, the suggested technique is an effective solution for security and privacy protection in a networked mobile RFID service system. Acknowledgment The author would like to thank Miss K.Jayanthi and Dr.Abhay Kumar for their insightful advice and guidance, and unknown reviewers for their useful remarks and suggestions. References 20 | P a g e www.iiste.org
  • 9. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.1, 2011 Architecture Review Committee, EPCglobal, Lawrenceville, NJ, “The EPCglobal architecture framework,” 2005. [Online]. Available: www. epcglobalinc.org Baehyo Park, Seoklae Lee, and Heugyoul Youm. A proposal for personal identifier management framework on the Internet. ITU-T, COM17-D165, (2006). Brusey.J, C. Floerkemeier, M. Harrison, and M. Fletcher, “Reasoning about uncertainty in location identification with RFID,” presented at the Workshop Reason. With Uncertainty Robot. IJCAI, Acapulco, Mexico, 2003. EPCglobal, Lawrenceville, NJ, “Reader protocol standard, version 1.1,” 2006. [Online]. Available: www.epcglobalinc.org EPCglobal, Lawrenceville, NJ, “The application level events (ALE) specification, version 1.0,” 2005 [Online]. Available: www.epcglobalinc. org EPCglobal, Lawrenceville, NJ, “EPC information services (EPCIS) version 1.0, specification,” 2007. [Online]. Available: www.epcglobalinc.org EPCglobal, Lawrenceville, NJ, “Class 1 generation 2 UHF air interface protocol standard version 1.0.9,” 2005 [Online]. Available: www.epcglobalinc.Org European Telecommunications Standards Institute (ETSI), Sophia Antipolis, France, “Electromagnetic compatibility and radio spectrum matters (ERM); Radio frequency identification equipment operating in the band 865 MHz to 868 MHz with power levels up to 2 W,” Tech. Rep. EN 302 208-1 V1.1.1, 2004 [Online]. Available: www.etsi.org Falck.G, “The newRFID standard in Europe,” RFID J., 2004. [Online]. Available: www.rfidjournal.com Floerkemeier.C, R. Schneider, and M. Langheinrich, Scanning With a Purpose—Supporting the Fair Information Principles in RFID Protocols, H. Murakami, H. Nakashima, H. Tokuda, and M. Yasumura, Eds. Berlin, Germany: Springer-Verlag, June 2005, vol. 3598, pp. 214–231. International Organization for Standardization, Geneva, Switzerland, “Information technology—Radio frequency identification for item management—Part 6: Parameters for air interface communications at 860 MHz to 960 MHz,” 2004. Jongsuk Chae, and Sewon Oh, Information Report on Mobile RFID in Korea. ISO/IEC JTC1/SC 31/WG4 N0922, Information paper, ISO/IEC JTC1 SC31 WG4 SG 5, (2005). Karthaus.U and M. Fischer, “Fully integrated passive UHF RFID transponder IC with 16.7-_W minimum RF input power,” IEEE J. Solid-State Circuits, vol. 38, no. 10, pp. 1602–1608, Oct. 2003. Klaus Finkenzeller, RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, Wiley (2003). Langheinrich.M, “RFID and Privacy,” in Security, Privacy and Trust in Modern Data Management,M. Petkovic and W. Jonker, Eds. New York: Springer-Verlag, 2006. Leong.K.S, M. L. Ng, and P. H. Cole, “The reader collision problem in RFID systems,” in Proc. IEEE Int. Symp. Microw., Antenna, Propag. EMC Technol. Wireless Commun. (MAPE), 2005, pp. 658–661. Mitsuo Tsukada, and Atsunobu Narita, Development models of network aspects of identification systems (including RFID) (NID) and proposal on approach for the standardization, ITU-T, JCA-NID Document 2006-I- 014, (2006). Namje Park, Jin Kwak, Seungjoo Kim, Dongho Won, and Howon Kim, WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. Lecture Notes in Computer Science, vol.3842, Springer- Verlag, 741 (2006). Ohkubo.M, K. Suzuki, and S. Kinoshita, Cryptographic Approach to ‘Privacy-Friendly’ Tags, RFID Privacy Workshop, (2003). Sangkeun Yoo, Mobile RFID Activities in Korea, Contribution Paper of the APT Standardization Program, (2005). Sarma.S.E, S. A. Weis, and D.W. Engels, RFID systems, Security and privacy implications. Technical Report MIT-AUTOID-WH-014, AutoID Center, MIT, (2002). Sullivan L., Middleware enables RFID tests, Information week, no.991, (2004). Tsuji T., Kouno S., Noguchi J., Iguchi M., Misu N., and Kawamura M., Asset management solution based on RFID, NEC Journal of Advanced Technology, vol.1, no.3, 188 (2004). Weis, S. et al, Security and Privacy Aspects of Low-Cost Radio Frequency identification Systems, First International Conference on Security in Pervasive Computing, (2003). Wung Park, and Byoungnam Lee, Proposal for participating in the Correspondence Group on RFID in ITU-T, Information Paper, ASTAP Forum, (2004). Yongwoon Kim, and Noboru Koshizuka. Review report of Standardization Issues on Network Aspects of Identification including RFID, ITU-T, Paper TD315, (2006). 21 | P a g e www.iiste.org