SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Computer Applications Technology and Research
Volume 4– Issue 8, 614 - 617, 2015, ISSN: 2319–8656
www.ijsea.com 614
Review of the Introduction and Use of RFID
Fariba Ghorbany Beram
Sama Technical and Vocational
Training College Islamic Azad
University, Shoushtar Branch,
Shoushtar, Iran
Mojtaba Khayat
Sama Technical and Vocational
Training College Islamic Azad
University, Shoushtar Branch,
Shoushtar, Iran
Sajjad Ghorbany Beram
Sama Technical and Vocational
Training College Islamic Azad
University, Shoushtar Branch,
Shoushtar, Iran
Abstract: We live in an age where technology is an integral part of human daily life. The aim of the technology is secure, accurate,
correct use of time for mankind and nature brings it may also have disadvantages and challenges. In this paper we describe the RFID
technology. Today, this technology in hospitals, shops, airports, tracking birds are used. It can be used in hospital intensive care unit
for monitoring and remote patient care, which causes it to print patients and physicians are not required to comply with very close
distance, the result of which can cause safety Patients and physicians should be. The security technology implementation is a
challenge. This paper introduces the applications, the challenges we have this technology.
Keywords: Radio Frequency identification; tag; network; challenge
1. INTRODUCTION
Radio Frequency identification (RFID) is the popular wireless
induction system [1-7]. RFID tags were initially developed as
very small electronic hardware components having as their
main function to broadcast a unique identifying number upon
request. The simplest types of RFID tags are passive devices
that not have an internal power source and are incapable of
autonomous activity. They are powered by the reader’s radio
waves, with their antenna doubling as a source of inductive
power. While admittedly a new technology, the low-cost and
high convenience value of RFID tags gives them the potential
for massive deployment, for business automation applications
and as smart, mass-market, embedded devices that support
ubiquitous applications. However, current RFID protocols are
designed to optimize performance, with lesser attention paid
to resilience and security. Consequently, most RFID systems
are inherently insecure. The general design of a simple RFID
system is displayed through the following figure:
Figure 1: Diagram describing operation of the RFID system.
2. RFID TECHNOLOGY
A typical deployment of an RFID system involves three types
of legitimate entities, namely tags, readers and back-end
servers. The tags are attached to, or embedded in, objects to
be identified. They consist of a transponder and an RF
coupling element. The coupling element has an antenna coil to
capture RF power, clock pulses and data from the RFID
reader. The readers typically contain a transceiver, a control
unit, and a coupling element, to interrogate tags. They
implement a radio interface to the tags and also a high level
interface to a backend server that processes captured data. The
back-servers are trusted entities that maintain a database
containing the information needed to identify tags, including
their identification numbers. Since the integrity of an RFID
system is entirely dependent on the proper behavior of the
server, it is assumed that the server is physically secure and
not attackable. It is certainly legitimate to consider privacy
mechanisms that reduce the trust on the back-end server—for
instance, to mitigate the ability of the server to collect user-
behavior information, or to make the server function
auditable[8]. In this paper, however, we shall not investigate
such privacy attacks. Here we shall consider the servers to be
entirely trusted following:
 Signal strength limited to a required
distance;
 Radio frequency unable to work in certain
geographical areas;
 Electromagnetic field prone to interruption from
solar and electrical storms.
The medical and healthcare sectors are using this technology
as a means to keep track of medical equipment and the
delivery of pharmaceuticals that proved to be costly in the
past when it came to tracking them down. But now this
technology is being applied as a means of protecting online
medical information systems from those who are involved in
perpetrating the criminal activity of medical identity theft.
Because the identity of every individual is centred around
recognising specific features, personality, knowledge and
traits that define who we are requires having the
International Journal of Computer Applications Technology and Research
Volume 4– Issue 8, 614 - 617, 2015, ISSN: 2319–8656
www.ijsea.com 615
implementation of a robust identity management system that
can be used in determining our individual specific features
and characteristics through the provision of unique identifiers
in recognising us[9,10]. A general RFID architecture is
depicted in Figure 2.
Figure 2: A general RFID architecture
2.1 Classification of technologies
around RFID We identify three classes to order the relation
between RFID and network technologies:
• Enabling technology
• Enhancing technology
• Concurrent technology
In Figure 3 these classes are mapped onto
the RFID will be used to characterize the different
technologies.
Figure 3: Classification of technologies around RFID
3. APPLICATIONS
The deployment of a pervasive RFID-based infrastructure in
an everyday environment holds the promise of enabling new
classes of applications that go beyond tracking and
monitoring. Such a system could, for example, support
logging and analysis of individual tag movements over time,
allowing a user to ask questions such as ”how often do I get
interrupted in my office on an average day?”. Current and
historical data on groups of tags could also be used to identify
and analyze aggregate phenomena such as the impact of
seminars on improving communication between researchers.
Real-time streams of tag reads could be used in “find my
object” applications, reminding services [11,12], and to
actuate devices. Enabling these classes of application,
however, presents a significant challenge to the system
design. First, the system must be able to consistently and
accurately read tags and it must do so at a granularity
sufficient for the intended applications. The system must
support archiving and retrieval of tag reads and real-time
reporting of new reads. To enable the monitoring of large
spaces with a possibly large number of tags, the system must
scale to handle highvolume streams of tag reads. Finally,
because such a system will manage large amounts of
(potentially sensitive) personal data from multiple users, it
must be secure and support an appropriate privacy model. In
the following section, we present our preliminary system
architecture and discuss how these application requirements
affected its design. As an example Gartner (Gartner, 2005b)
claims that the RFID market will experience an annual growth
rate somewhere between 30% and 50% in the years 2004-
2010 ending up at 3 billion USD in 2010 (see Figure 5-7).
They say this refers to “the use of RFID technologies within a
supply chain environment to improve the visibility,
management and security of cargo shipments or supply chain
assets, such as conveyances or valuable mobile assets. The
applications and hardware that are used outside of the above
environment were excluded. These would include consumer
uses, such as contactless smart cards.”
Figure 4: RFID, worldwide size and growth, 2004-2010
The IDTechEx report provides some more data as depicted in
Figure 5.
International Journal of Computer Applications Technology and Research
Volume 4– Issue 8, 614 - 617, 2015, ISSN: 2319–8656
www.ijsea.com 616
Figure 5: Total RFID market projections 2006-2016
4. PRIVACY CHALLENGES
Pervasive RFID-based deployments raise privacy concerns
because they can enable the tracking of people and personal
objects by parties that would otherwise be unable or
unauthorized to do so. These concerns involve: the physical
security of the communication between tags and readers, the
security of the data stored in and processed by the system, and
controlled access to the data. In this study, we focused on the
latter problem and studied in-situ many of the privacy
concerns experienced by the participants. Chief among the
participants’ concerns was the perceived ease with which
one’s activities could be inferred from the data (e.g., time of
day, direction of movement, and set of tags seen). We were
able to validate this concern by writing a simple script that
could detect lunch breaks with better than 75% accuracy for
three of the participants, showing that participant P1 took 29
minute lunch breaks on average, P2 took about 32 minutes,
and P3 took the longest (40 minute) breaks. Similarly, it was
easy to infer potentially more sensitive information such as
when and how many times a participant used the restroom in a
day. Our initial approach to addressing these privacy concerns
was to allow display and deletion of one’s personal data via
the web interface. The limitation of this approach is that a user
can still see another’s data before that data is deleted. A more
appropriate option would be for users to specify high-level
rules that describe which TREs should be accessible to which
users and which TREs should be dropped automatically (e.g.,
all trips from my office to the restroom shorter than 2
minutes)[13]. For example, a query on a colleague’s location
could return approximate information (e.g., 4th floor) by
default, or more exact information (e.g., room 490) only a few
times per day. We are currently exploring the suitability of
such techniques for various applications. Finally, to protect
the privacy of non-participants, each Node Server
automatically discards any tag reads for a tag that is not
registered in our database[14].
5. CONCLUSION
In this paper, we motivated the benefits of RFID. As
mentioned, this technology has many applications is. Studies
show that in the near future this technology will be
increasingly used and welcomed. By examining the current
challenges in the technology and resolving the problems with
reliability Khatrbyshtr can use this technology.
6. REFERENCES
[1] Ajay Malik, "RTLS for Dummies," publishing by Wiley
publishing. Inc., USA, Indianapolis, Indiana, (2009) ISBN:
978-0-470-39868-5.
[2] J. Zhou, and J. Shi "RFID localization algorithms and
applications a review," The International Journal of
Intelligent Manufacturing, Vol. 20 (6), Springer Netherlands,
pp. 695-707, 2008.
[3] R. Want, "An Introduction to RFID Technology,"
IEEE Pervasive Computing, Vol. 5, pp. 25-33, 2006.
[4] G. Barber, and E. Tsibertzopoulos, "An Analysis of
Using EPCglobal class-1 generation-2 RFID Technology for
Wireless Asset Management," IEEE Military
Communications Conference (MILCOM 2005), Vol. 1, pp.
245-251, October 2005.
[5] K. Ahsan, H. Shah, and Paul Kingston, "RFID
Applications: An Introductory and Exploratory Study,"
IJCSI International Journal of Computer Science Issues,
Vol. 7, Issue 1, No. 3, January 2010.
[6] Benjamin D. Braaten, and Robert P. Scheeler, "Design
of Passive UHF RFID Tag Antennas Using Metamaterial-
Based Structures and Techniques," Radio Frequency
Identification Fundamentals and Applications, Design
Methods and Solutions, Book edited by: Cristina Turcu, pp.
324, February 2010,ISBN 9789537619725.
[7] Daniel M. Dobkin, "The RF in RFID: Passive UHF
RFID in Practice," Chapter 3: Radio Basics for UHF
RFID, (2007), ISBN: 9780750682091.
[8] Smith, J. R. RFID-based techniques for human-activity
detection. Communications of the ACM, 48(9), Sept. 2005.
[9] Songini, M. L. Wal-Mart details its RFID journey.
ComputerWorld, Mar. 2006.
[10] Stanford, V. Pervasive computing goes the last hundred
feet with RFID systems. IEEE Pervasive Computing, 2(2),
Apr. 2003.
[11] Sweeney, L. k-anonymity: A model for protecting
privacy. IJUFKS, 10(5):557–570, Oct. 2002.
[18] Want, R. The magic of RFID. ACM Queue, 2(7), Oct.
2004.
[12] Want, R. et. al. An overview of the PARCTAB
ubiquitous computing experiment. IEEE Personal
Communications, 2(6):28–33, Dec 1995.
International Journal of Computer Applications Technology and Research
Volume 4– Issue 8, 614 - 617, 2015, ISSN: 2319–8656
www.ijsea.com 617
[13] Want, R. et. al. Bridging physical and virtual worlds with
electronic tags. In CHI, pages 370–377, 1999.
[14] E. Wu, Y. Diao, and S. Rizvi. High-performance
complex event processing over streams. In Proc. of the 2006
SIGMOD Conf., June 2006

More Related Content

What's hot

IRJET- Library Management using RFID
IRJET-  	  Library Management using RFIDIRJET-  	  Library Management using RFID
IRJET- Library Management using RFIDIRJET Journal
 
Anomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile AssessmentAnomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile Assessmentijtsrd
 
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...IJECEIAES
 
IRJET - Image Watermarking using QR Code
IRJET -  	  Image Watermarking using QR CodeIRJET -  	  Image Watermarking using QR Code
IRJET - Image Watermarking using QR CodeIRJET Journal
 
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...IRJET Journal
 
Comparison study of machine learning classifiers to detect anomalies
Comparison study of machine learning classifiers  to detect anomalies Comparison study of machine learning classifiers  to detect anomalies
Comparison study of machine learning classifiers to detect anomalies IJECEIAES
 
Wireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field StudyWireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field StudyIJNSA Journal
 
A research survey rfid security & privacy issue
A research survey rfid security & privacy issueA research survey rfid security & privacy issue
A research survey rfid security & privacy issuecsandit
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkIOSR Journals
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemAM Publications
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewIJERA Editor
 
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...IJECEIAES
 

What's hot (16)

IRJET- Library Management using RFID
IRJET-  	  Library Management using RFIDIRJET-  	  Library Management using RFID
IRJET- Library Management using RFID
 
Anomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile AssessmentAnomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile Assessment
 
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
 
IRJET - Image Watermarking using QR Code
IRJET -  	  Image Watermarking using QR CodeIRJET -  	  Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
 
Kx3518741881
Kx3518741881Kx3518741881
Kx3518741881
 
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
 
Comparison study of machine learning classifiers to detect anomalies
Comparison study of machine learning classifiers  to detect anomalies Comparison study of machine learning classifiers  to detect anomalies
Comparison study of machine learning classifiers to detect anomalies
 
healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...
 
Wireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field StudyWireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field Study
 
A research survey rfid security & privacy issue
A research survey rfid security & privacy issueA research survey rfid security & privacy issue
A research survey rfid security & privacy issue
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection System
 
verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A Review
 
Assessment and Mitigation of Risks Involved in Electronics Payment Systems
Assessment and Mitigation of Risks Involved in Electronics Payment Systems Assessment and Mitigation of Risks Involved in Electronics Payment Systems
Assessment and Mitigation of Risks Involved in Electronics Payment Systems
 
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
 

Viewers also liked

A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksA Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksEditor IJCATR
 
Analytical Comparison of Mathematical Modeling in the Diagnostic Expert Systems
Analytical Comparison of Mathematical Modeling in the Diagnostic Expert SystemsAnalytical Comparison of Mathematical Modeling in the Diagnostic Expert Systems
Analytical Comparison of Mathematical Modeling in the Diagnostic Expert SystemsEditor IJCATR
 
Significant Role of Statistics in Computational Sciences
Significant Role of Statistics in Computational SciencesSignificant Role of Statistics in Computational Sciences
Significant Role of Statistics in Computational SciencesEditor IJCATR
 
A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingA Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingEditor IJCATR
 
Identifying Valid Email Spam Emails Using Decision Tree
Identifying Valid Email Spam Emails Using Decision TreeIdentifying Valid Email Spam Emails Using Decision Tree
Identifying Valid Email Spam Emails Using Decision TreeEditor IJCATR
 
Influence of Ion Beam and Carbon Black Filler Type on the Mechanical and Phys...
Influence of Ion Beam and Carbon Black Filler Type on the Mechanical and Phys...Influence of Ion Beam and Carbon Black Filler Type on the Mechanical and Phys...
Influence of Ion Beam and Carbon Black Filler Type on the Mechanical and Phys...Editor IJCATR
 
Mobile Device Application to locate an Interest Point using Google Maps
Mobile Device Application to locate an Interest Point using Google MapsMobile Device Application to locate an Interest Point using Google Maps
Mobile Device Application to locate an Interest Point using Google MapsEditor IJCATR
 
Internal Architecture of Junction Based Router
Internal Architecture of Junction Based Router Internal Architecture of Junction Based Router
Internal Architecture of Junction Based Router Editor IJCATR
 
A Method for Sudanese Vehicle License Plates Detection and Extraction
A Method for Sudanese Vehicle License Plates Detection and ExtractionA Method for Sudanese Vehicle License Plates Detection and Extraction
A Method for Sudanese Vehicle License Plates Detection and ExtractionEditor IJCATR
 
An IT Approach to Improve the Compilation of Clinical Access Indicators and D...
An IT Approach to Improve the Compilation of Clinical Access Indicators and D...An IT Approach to Improve the Compilation of Clinical Access Indicators and D...
An IT Approach to Improve the Compilation of Clinical Access Indicators and D...Editor IJCATR
 
Model-Driven Architecture for Cloud Applications Development, A survey
Model-Driven Architecture for Cloud Applications Development, A surveyModel-Driven Architecture for Cloud Applications Development, A survey
Model-Driven Architecture for Cloud Applications Development, A surveyEditor IJCATR
 
Photo-Oxygenation of Trans Anethole
Photo-Oxygenation of Trans AnetholePhoto-Oxygenation of Trans Anethole
Photo-Oxygenation of Trans AnetholeEditor IJCATR
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
 
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksA Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksEditor IJCATR
 
Exploration and Supremacy of Li-Fi over Wi-Fi
Exploration and Supremacy of Li-Fi over Wi-FiExploration and Supremacy of Li-Fi over Wi-Fi
Exploration and Supremacy of Li-Fi over Wi-FiEditor IJCATR
 
A Security Model for Virtual Infrastructure in the Cloud
A Security Model for Virtual Infrastructure in the CloudA Security Model for Virtual Infrastructure in the Cloud
A Security Model for Virtual Infrastructure in the CloudEditor IJCATR
 

Viewers also liked (17)

A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksA Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor Networks
 
Ijcatr04061009
Ijcatr04061009Ijcatr04061009
Ijcatr04061009
 
Analytical Comparison of Mathematical Modeling in the Diagnostic Expert Systems
Analytical Comparison of Mathematical Modeling in the Diagnostic Expert SystemsAnalytical Comparison of Mathematical Modeling in the Diagnostic Expert Systems
Analytical Comparison of Mathematical Modeling in the Diagnostic Expert Systems
 
Significant Role of Statistics in Computational Sciences
Significant Role of Statistics in Computational SciencesSignificant Role of Statistics in Computational Sciences
Significant Role of Statistics in Computational Sciences
 
A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingA Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud Computing
 
Identifying Valid Email Spam Emails Using Decision Tree
Identifying Valid Email Spam Emails Using Decision TreeIdentifying Valid Email Spam Emails Using Decision Tree
Identifying Valid Email Spam Emails Using Decision Tree
 
Influence of Ion Beam and Carbon Black Filler Type on the Mechanical and Phys...
Influence of Ion Beam and Carbon Black Filler Type on the Mechanical and Phys...Influence of Ion Beam and Carbon Black Filler Type on the Mechanical and Phys...
Influence of Ion Beam and Carbon Black Filler Type on the Mechanical and Phys...
 
Mobile Device Application to locate an Interest Point using Google Maps
Mobile Device Application to locate an Interest Point using Google MapsMobile Device Application to locate an Interest Point using Google Maps
Mobile Device Application to locate an Interest Point using Google Maps
 
Internal Architecture of Junction Based Router
Internal Architecture of Junction Based Router Internal Architecture of Junction Based Router
Internal Architecture of Junction Based Router
 
A Method for Sudanese Vehicle License Plates Detection and Extraction
A Method for Sudanese Vehicle License Plates Detection and ExtractionA Method for Sudanese Vehicle License Plates Detection and Extraction
A Method for Sudanese Vehicle License Plates Detection and Extraction
 
An IT Approach to Improve the Compilation of Clinical Access Indicators and D...
An IT Approach to Improve the Compilation of Clinical Access Indicators and D...An IT Approach to Improve the Compilation of Clinical Access Indicators and D...
An IT Approach to Improve the Compilation of Clinical Access Indicators and D...
 
Model-Driven Architecture for Cloud Applications Development, A survey
Model-Driven Architecture for Cloud Applications Development, A surveyModel-Driven Architecture for Cloud Applications Development, A survey
Model-Driven Architecture for Cloud Applications Development, A survey
 
Photo-Oxygenation of Trans Anethole
Photo-Oxygenation of Trans AnetholePhoto-Oxygenation of Trans Anethole
Photo-Oxygenation of Trans Anethole
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
 
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksA Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor Networks
 
Exploration and Supremacy of Li-Fi over Wi-Fi
Exploration and Supremacy of Li-Fi over Wi-FiExploration and Supremacy of Li-Fi over Wi-Fi
Exploration and Supremacy of Li-Fi over Wi-Fi
 
A Security Model for Virtual Infrastructure in the Cloud
A Security Model for Virtual Infrastructure in the CloudA Security Model for Virtual Infrastructure in the Cloud
A Security Model for Virtual Infrastructure in the Cloud
 

Similar to Review of the Introduction and Use of RFID

A novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID dataA novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID dataijujournal
 
A novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID dataA novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID dataijujournal
 
A sector analysis for rfid human implantation
A sector analysis for rfid human implantationA sector analysis for rfid human implantation
A sector analysis for rfid human implantationAlexander Decker
 
A sector analysis for rfid human implantation
A sector analysis for rfid human implantationA sector analysis for rfid human implantation
A sector analysis for rfid human implantationAlexander Decker
 
IRJET- EMR using RFID Technology
IRJET- EMR using RFID TechnologyIRJET- EMR using RFID Technology
IRJET- EMR using RFID TechnologyIRJET Journal
 
IRJET- Improvisation in the Attendance Supervision Method through RFID ba...
IRJET-  	  Improvisation in the Attendance Supervision Method through RFID ba...IRJET-  	  Improvisation in the Attendance Supervision Method through RFID ba...
IRJET- Improvisation in the Attendance Supervision Method through RFID ba...IRJET Journal
 
Secured e-payment system based on automated authentication data and iterated ...
Secured e-payment system based on automated authentication data and iterated ...Secured e-payment system based on automated authentication data and iterated ...
Secured e-payment system based on automated authentication data and iterated ...TELKOMNIKA JOURNAL
 
RFID Technology: An Upgradation for Society
RFID Technology: An Upgradation for SocietyRFID Technology: An Upgradation for Society
RFID Technology: An Upgradation for SocietyIRJET Journal
 
Building a Smart Hospital using RFID technologiesPatrik Fu.docx
Building a Smart Hospital using RFID technologiesPatrik Fu.docxBuilding a Smart Hospital using RFID technologiesPatrik Fu.docx
Building a Smart Hospital using RFID technologiesPatrik Fu.docxhartrobert670
 
07.dsn.rfid reliability
07.dsn.rfid reliability07.dsn.rfid reliability
07.dsn.rfid reliabilitynikhiltiware
 
Radio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsRadio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsAhmad Sharifi
 
11 International Journal for Modern Trends in Science and Technology Smart At...
11 International Journal for Modern Trends in Science and Technology Smart At...11 International Journal for Modern Trends in Science and Technology Smart At...
11 International Journal for Modern Trends in Science and Technology Smart At...IJMTST Journal
 
RFID Technology An Overview
RFID Technology An OverviewRFID Technology An Overview
RFID Technology An Overviewijtsrd
 
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)inventionjournals
 
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodA Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodLuz Martinez
 
A UHF Radio Frequency Identification (RFID) System For Healthcare Design And...
A UHF Radio Frequency Identification (RFID) System For Healthcare  Design And...A UHF Radio Frequency Identification (RFID) System For Healthcare  Design And...
A UHF Radio Frequency Identification (RFID) System For Healthcare Design And...Jeff Nelson
 
Rfid based traffic controller using gsm
Rfid based traffic controller using gsmRfid based traffic controller using gsm
Rfid based traffic controller using gsmramesh chatty
 

Similar to Review of the Introduction and Use of RFID (20)

A novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID dataA novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID data
 
A novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID dataA novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID data
 
A sector analysis for rfid human implantation
A sector analysis for rfid human implantationA sector analysis for rfid human implantation
A sector analysis for rfid human implantation
 
A sector analysis for rfid human implantation
A sector analysis for rfid human implantationA sector analysis for rfid human implantation
A sector analysis for rfid human implantation
 
IRJET- EMR using RFID Technology
IRJET- EMR using RFID TechnologyIRJET- EMR using RFID Technology
IRJET- EMR using RFID Technology
 
IRJET- Improvisation in the Attendance Supervision Method through RFID ba...
IRJET-  	  Improvisation in the Attendance Supervision Method through RFID ba...IRJET-  	  Improvisation in the Attendance Supervision Method through RFID ba...
IRJET- Improvisation in the Attendance Supervision Method through RFID ba...
 
Secured e-payment system based on automated authentication data and iterated ...
Secured e-payment system based on automated authentication data and iterated ...Secured e-payment system based on automated authentication data and iterated ...
Secured e-payment system based on automated authentication data and iterated ...
 
RFID Technology: An Upgradation for Society
RFID Technology: An Upgradation for SocietyRFID Technology: An Upgradation for Society
RFID Technology: An Upgradation for Society
 
Building a Smart Hospital using RFID technologiesPatrik Fu.docx
Building a Smart Hospital using RFID technologiesPatrik Fu.docxBuilding a Smart Hospital using RFID technologiesPatrik Fu.docx
Building a Smart Hospital using RFID technologiesPatrik Fu.docx
 
07.dsn.rfid reliability
07.dsn.rfid reliability07.dsn.rfid reliability
07.dsn.rfid reliability
 
Radio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsRadio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutions
 
11 International Journal for Modern Trends in Science and Technology Smart At...
11 International Journal for Modern Trends in Science and Technology Smart At...11 International Journal for Modern Trends in Science and Technology Smart At...
11 International Journal for Modern Trends in Science and Technology Smart At...
 
Rfid3
Rfid3Rfid3
Rfid3
 
RFID Technology An Overview
RFID Technology An OverviewRFID Technology An Overview
RFID Technology An Overview
 
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
 
Chowdhury rfidhpms
Chowdhury rfidhpmsChowdhury rfidhpms
Chowdhury rfidhpms
 
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodA Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
 
Sallabi2016
Sallabi2016Sallabi2016
Sallabi2016
 
A UHF Radio Frequency Identification (RFID) System For Healthcare Design And...
A UHF Radio Frequency Identification (RFID) System For Healthcare  Design And...A UHF Radio Frequency Identification (RFID) System For Healthcare  Design And...
A UHF Radio Frequency Identification (RFID) System For Healthcare Design And...
 
Rfid based traffic controller using gsm
Rfid based traffic controller using gsmRfid based traffic controller using gsm
Rfid based traffic controller using gsm
 

More from Editor IJCATR

Text Mining in Digital Libraries using OKAPI BM25 Model
 Text Mining in Digital Libraries using OKAPI BM25 Model Text Mining in Digital Libraries using OKAPI BM25 Model
Text Mining in Digital Libraries using OKAPI BM25 ModelEditor IJCATR
 
Green Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyGreen Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyEditor IJCATR
 
Policies for Green Computing and E-Waste in Nigeria
 Policies for Green Computing and E-Waste in Nigeria Policies for Green Computing and E-Waste in Nigeria
Policies for Green Computing and E-Waste in NigeriaEditor IJCATR
 
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Editor IJCATR
 
Optimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsOptimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsEditor IJCATR
 
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Editor IJCATR
 
Web Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteWeb Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteEditor IJCATR
 
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 Evaluating Semantic Similarity between Biomedical Concepts/Classes through S... Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...Editor IJCATR
 
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 Semantic Similarity Measures between Terms in the Biomedical Domain within f... Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Semantic Similarity Measures between Terms in the Biomedical Domain within f...Editor IJCATR
 
A Strategy for Improving the Performance of Small Files in Openstack Swift
 A Strategy for Improving the Performance of Small Files in Openstack Swift  A Strategy for Improving the Performance of Small Files in Openstack Swift
A Strategy for Improving the Performance of Small Files in Openstack Swift Editor IJCATR
 
Integrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationIntegrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationEditor IJCATR
 
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 Assessment of the Efficiency of Customer Order Management System: A Case Stu... Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Assessment of the Efficiency of Customer Order Management System: A Case Stu...Editor IJCATR
 
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Editor IJCATR
 
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
 
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Editor IJCATR
 
Hangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineHangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineEditor IJCATR
 
Application of 3D Printing in Education
Application of 3D Printing in EducationApplication of 3D Printing in Education
Application of 3D Printing in EducationEditor IJCATR
 
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Editor IJCATR
 
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Editor IJCATR
 
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsDecay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsEditor IJCATR
 

More from Editor IJCATR (20)

Text Mining in Digital Libraries using OKAPI BM25 Model
 Text Mining in Digital Libraries using OKAPI BM25 Model Text Mining in Digital Libraries using OKAPI BM25 Model
Text Mining in Digital Libraries using OKAPI BM25 Model
 
Green Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyGreen Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendly
 
Policies for Green Computing and E-Waste in Nigeria
 Policies for Green Computing and E-Waste in Nigeria Policies for Green Computing and E-Waste in Nigeria
Policies for Green Computing and E-Waste in Nigeria
 
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
 
Optimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsOptimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation Conditions
 
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
 
Web Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteWeb Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source Site
 
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 Evaluating Semantic Similarity between Biomedical Concepts/Classes through S... Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 Semantic Similarity Measures between Terms in the Biomedical Domain within f... Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 
A Strategy for Improving the Performance of Small Files in Openstack Swift
 A Strategy for Improving the Performance of Small Files in Openstack Swift  A Strategy for Improving the Performance of Small Files in Openstack Swift
A Strategy for Improving the Performance of Small Files in Openstack Swift
 
Integrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationIntegrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and Registration
 
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 Assessment of the Efficiency of Customer Order Management System: A Case Stu... Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
 
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
 
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
 
Hangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineHangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector Machine
 
Application of 3D Printing in Education
Application of 3D Printing in EducationApplication of 3D Printing in Education
Application of 3D Printing in Education
 
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
 
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
 
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsDecay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
 

Recently uploaded

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 

Review of the Introduction and Use of RFID

  • 1. International Journal of Computer Applications Technology and Research Volume 4– Issue 8, 614 - 617, 2015, ISSN: 2319–8656 www.ijsea.com 614 Review of the Introduction and Use of RFID Fariba Ghorbany Beram Sama Technical and Vocational Training College Islamic Azad University, Shoushtar Branch, Shoushtar, Iran Mojtaba Khayat Sama Technical and Vocational Training College Islamic Azad University, Shoushtar Branch, Shoushtar, Iran Sajjad Ghorbany Beram Sama Technical and Vocational Training College Islamic Azad University, Shoushtar Branch, Shoushtar, Iran Abstract: We live in an age where technology is an integral part of human daily life. The aim of the technology is secure, accurate, correct use of time for mankind and nature brings it may also have disadvantages and challenges. In this paper we describe the RFID technology. Today, this technology in hospitals, shops, airports, tracking birds are used. It can be used in hospital intensive care unit for monitoring and remote patient care, which causes it to print patients and physicians are not required to comply with very close distance, the result of which can cause safety Patients and physicians should be. The security technology implementation is a challenge. This paper introduces the applications, the challenges we have this technology. Keywords: Radio Frequency identification; tag; network; challenge 1. INTRODUCTION Radio Frequency identification (RFID) is the popular wireless induction system [1-7]. RFID tags were initially developed as very small electronic hardware components having as their main function to broadcast a unique identifying number upon request. The simplest types of RFID tags are passive devices that not have an internal power source and are incapable of autonomous activity. They are powered by the reader’s radio waves, with their antenna doubling as a source of inductive power. While admittedly a new technology, the low-cost and high convenience value of RFID tags gives them the potential for massive deployment, for business automation applications and as smart, mass-market, embedded devices that support ubiquitous applications. However, current RFID protocols are designed to optimize performance, with lesser attention paid to resilience and security. Consequently, most RFID systems are inherently insecure. The general design of a simple RFID system is displayed through the following figure: Figure 1: Diagram describing operation of the RFID system. 2. RFID TECHNOLOGY A typical deployment of an RFID system involves three types of legitimate entities, namely tags, readers and back-end servers. The tags are attached to, or embedded in, objects to be identified. They consist of a transponder and an RF coupling element. The coupling element has an antenna coil to capture RF power, clock pulses and data from the RFID reader. The readers typically contain a transceiver, a control unit, and a coupling element, to interrogate tags. They implement a radio interface to the tags and also a high level interface to a backend server that processes captured data. The back-servers are trusted entities that maintain a database containing the information needed to identify tags, including their identification numbers. Since the integrity of an RFID system is entirely dependent on the proper behavior of the server, it is assumed that the server is physically secure and not attackable. It is certainly legitimate to consider privacy mechanisms that reduce the trust on the back-end server—for instance, to mitigate the ability of the server to collect user- behavior information, or to make the server function auditable[8]. In this paper, however, we shall not investigate such privacy attacks. Here we shall consider the servers to be entirely trusted following:  Signal strength limited to a required distance;  Radio frequency unable to work in certain geographical areas;  Electromagnetic field prone to interruption from solar and electrical storms. The medical and healthcare sectors are using this technology as a means to keep track of medical equipment and the delivery of pharmaceuticals that proved to be costly in the past when it came to tracking them down. But now this technology is being applied as a means of protecting online medical information systems from those who are involved in perpetrating the criminal activity of medical identity theft. Because the identity of every individual is centred around recognising specific features, personality, knowledge and traits that define who we are requires having the
  • 2. International Journal of Computer Applications Technology and Research Volume 4– Issue 8, 614 - 617, 2015, ISSN: 2319–8656 www.ijsea.com 615 implementation of a robust identity management system that can be used in determining our individual specific features and characteristics through the provision of unique identifiers in recognising us[9,10]. A general RFID architecture is depicted in Figure 2. Figure 2: A general RFID architecture 2.1 Classification of technologies around RFID We identify three classes to order the relation between RFID and network technologies: • Enabling technology • Enhancing technology • Concurrent technology In Figure 3 these classes are mapped onto the RFID will be used to characterize the different technologies. Figure 3: Classification of technologies around RFID 3. APPLICATIONS The deployment of a pervasive RFID-based infrastructure in an everyday environment holds the promise of enabling new classes of applications that go beyond tracking and monitoring. Such a system could, for example, support logging and analysis of individual tag movements over time, allowing a user to ask questions such as ”how often do I get interrupted in my office on an average day?”. Current and historical data on groups of tags could also be used to identify and analyze aggregate phenomena such as the impact of seminars on improving communication between researchers. Real-time streams of tag reads could be used in “find my object” applications, reminding services [11,12], and to actuate devices. Enabling these classes of application, however, presents a significant challenge to the system design. First, the system must be able to consistently and accurately read tags and it must do so at a granularity sufficient for the intended applications. The system must support archiving and retrieval of tag reads and real-time reporting of new reads. To enable the monitoring of large spaces with a possibly large number of tags, the system must scale to handle highvolume streams of tag reads. Finally, because such a system will manage large amounts of (potentially sensitive) personal data from multiple users, it must be secure and support an appropriate privacy model. In the following section, we present our preliminary system architecture and discuss how these application requirements affected its design. As an example Gartner (Gartner, 2005b) claims that the RFID market will experience an annual growth rate somewhere between 30% and 50% in the years 2004- 2010 ending up at 3 billion USD in 2010 (see Figure 5-7). They say this refers to “the use of RFID technologies within a supply chain environment to improve the visibility, management and security of cargo shipments or supply chain assets, such as conveyances or valuable mobile assets. The applications and hardware that are used outside of the above environment were excluded. These would include consumer uses, such as contactless smart cards.” Figure 4: RFID, worldwide size and growth, 2004-2010 The IDTechEx report provides some more data as depicted in Figure 5.
  • 3. International Journal of Computer Applications Technology and Research Volume 4– Issue 8, 614 - 617, 2015, ISSN: 2319–8656 www.ijsea.com 616 Figure 5: Total RFID market projections 2006-2016 4. PRIVACY CHALLENGES Pervasive RFID-based deployments raise privacy concerns because they can enable the tracking of people and personal objects by parties that would otherwise be unable or unauthorized to do so. These concerns involve: the physical security of the communication between tags and readers, the security of the data stored in and processed by the system, and controlled access to the data. In this study, we focused on the latter problem and studied in-situ many of the privacy concerns experienced by the participants. Chief among the participants’ concerns was the perceived ease with which one’s activities could be inferred from the data (e.g., time of day, direction of movement, and set of tags seen). We were able to validate this concern by writing a simple script that could detect lunch breaks with better than 75% accuracy for three of the participants, showing that participant P1 took 29 minute lunch breaks on average, P2 took about 32 minutes, and P3 took the longest (40 minute) breaks. Similarly, it was easy to infer potentially more sensitive information such as when and how many times a participant used the restroom in a day. Our initial approach to addressing these privacy concerns was to allow display and deletion of one’s personal data via the web interface. The limitation of this approach is that a user can still see another’s data before that data is deleted. A more appropriate option would be for users to specify high-level rules that describe which TREs should be accessible to which users and which TREs should be dropped automatically (e.g., all trips from my office to the restroom shorter than 2 minutes)[13]. For example, a query on a colleague’s location could return approximate information (e.g., 4th floor) by default, or more exact information (e.g., room 490) only a few times per day. We are currently exploring the suitability of such techniques for various applications. Finally, to protect the privacy of non-participants, each Node Server automatically discards any tag reads for a tag that is not registered in our database[14]. 5. CONCLUSION In this paper, we motivated the benefits of RFID. As mentioned, this technology has many applications is. Studies show that in the near future this technology will be increasingly used and welcomed. By examining the current challenges in the technology and resolving the problems with reliability Khatrbyshtr can use this technology. 6. REFERENCES [1] Ajay Malik, "RTLS for Dummies," publishing by Wiley publishing. Inc., USA, Indianapolis, Indiana, (2009) ISBN: 978-0-470-39868-5. [2] J. Zhou, and J. Shi "RFID localization algorithms and applications a review," The International Journal of Intelligent Manufacturing, Vol. 20 (6), Springer Netherlands, pp. 695-707, 2008. [3] R. Want, "An Introduction to RFID Technology," IEEE Pervasive Computing, Vol. 5, pp. 25-33, 2006. [4] G. Barber, and E. Tsibertzopoulos, "An Analysis of Using EPCglobal class-1 generation-2 RFID Technology for Wireless Asset Management," IEEE Military Communications Conference (MILCOM 2005), Vol. 1, pp. 245-251, October 2005. [5] K. Ahsan, H. Shah, and Paul Kingston, "RFID Applications: An Introductory and Exploratory Study," IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 1, No. 3, January 2010. [6] Benjamin D. Braaten, and Robert P. Scheeler, "Design of Passive UHF RFID Tag Antennas Using Metamaterial- Based Structures and Techniques," Radio Frequency Identification Fundamentals and Applications, Design Methods and Solutions, Book edited by: Cristina Turcu, pp. 324, February 2010,ISBN 9789537619725. [7] Daniel M. Dobkin, "The RF in RFID: Passive UHF RFID in Practice," Chapter 3: Radio Basics for UHF RFID, (2007), ISBN: 9780750682091. [8] Smith, J. R. RFID-based techniques for human-activity detection. Communications of the ACM, 48(9), Sept. 2005. [9] Songini, M. L. Wal-Mart details its RFID journey. ComputerWorld, Mar. 2006. [10] Stanford, V. Pervasive computing goes the last hundred feet with RFID systems. IEEE Pervasive Computing, 2(2), Apr. 2003. [11] Sweeney, L. k-anonymity: A model for protecting privacy. IJUFKS, 10(5):557–570, Oct. 2002. [18] Want, R. The magic of RFID. ACM Queue, 2(7), Oct. 2004. [12] Want, R. et. al. An overview of the PARCTAB ubiquitous computing experiment. IEEE Personal Communications, 2(6):28–33, Dec 1995.
  • 4. International Journal of Computer Applications Technology and Research Volume 4– Issue 8, 614 - 617, 2015, ISSN: 2319–8656 www.ijsea.com 617 [13] Want, R. et. al. Bridging physical and virtual worlds with electronic tags. In CHI, pages 370–377, 1999. [14] E. Wu, Y. Diao, and S. Rizvi. High-performance complex event processing over streams. In Proc. of the 2006 SIGMOD Conf., June 2006