The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The revolutionary network that totally changed how the humankind life, the Internet, is now evolving into the Internet of things; which is being achieved by fetching the network connectivity to legacy industrial or commercial devices, as well as everyday objects. This connectivity may be an Internet connection, where the Internet protocol and related technologies are in use. But, there are also many...
The UHF Radiofrequency Identification technology offers nowadays a viable technological solution for the implementation of low-level environmental monitoring of connected critical infrastructures to be protected from both physical threats and cyber attacks. An RFID sensor network was developed within the H2020 SCISSOR project, by addressing the design of both hardware components, that is a new family...
One of the popular concepts nowadays is the Internet of Things (IoT). IoT will convert our daily life objects into smart objects. In order to become a part of the IoT network, these smart devices will require some technologies and protocols. In this paper, we will study the different te chnologies that enable the smart objects to be come a part of the IoT network. Furthermore, we will have a look...
The dynamic processes occurring on the market of logistics services determine the implementation of change and the search for optimal solutions. Modern logistics centres that are adjusted to the needs, while also supported by modern technology are the answer to the declared demand from courier firms that place an emphasis on the speed of delivery and quality of service. The application of RFID technologies...
The tree-based tags anti-collision algorithm is an important method in the anti-collision algorithms. In this paper, several typical tree algorithms are evaluated. The comparison of algorithms is summarized including time complexity, communication complexity and recognition, and the characteristics and disadvantages of each algorithm are pointed out. Finally, the improvement strategies of tree anti-collision...
Nowadays, security is a part that consent by many institution including academic for example in University campus, some of campus have been implement automatic system in campus area to control visitor to enter University also for the staffs and students, but the system is in standalone with introduce new gate pass. Most of University has been use Information Technology (IT) in application for academic...
In this paper a system for increasing children's safety is proposed. The focus is on the daily route from home to school and vice versa, assuming the use of school buses. IoT paradigm is exploited together with different localization techniques i.e. RFID and GPS, in order to design a solution for parents willing to make certain of their child's following the main steps to school or home, i.e. taking...
In spite of the availability of digital password lockers and advanced door locks, hacking the lock code by an unauthorized person has become a plain-sailing task. Various electronic locks are currently available in the market based on Password, RFID, Biometrics, OTP, Cryptography, Wireless and IoT. Every system has its own advantages and disadvantages where one system overcomes the limitations of...
In order to solve the problems of complex experiment management, complicated teaching task arrangement, limited student experiment conditions, and to provide a high efficiency of experiment teaching and security experiment environment for the majority of teachers and students, this paper investigates and analyzes the present situation of experiment management in colleges and universities. Based on...
Radio Frequency Identification (RFID) makes it a supporting technology for the Internet of things (IoT). While RFID has been widely used and developed rapidly, its security and privacy issues cannot be ignored. With the development of cloud computing, cloud based RFID system has become a new solution. Protecting the security of RFID system in cloud environment is particularly important. Not verifying...
The implementation of RFID technology in computer systems gives access to quality information on the location or object tracking in real time, thereby improving workflow and lead to safer, faster and better business decisions. This paper discusses the quantitative indicators of the quality of the computer system supported by RFID technology applied in monitoring facilities (pallets, packages and people)...
UHF-RFID (Ultra High Frequency Radio Frequency Identification), with the feature of reliable, accurate and fast, has been used in the vehicular traffic management system to relief the urban traffic congestion, air pollution etc. To strengthen the system security and improve the performance of the tag, a secure, high performance UHF-RFID tag is designed and implemented in this paper. Authentication...
With the proliferation of shopping, the diversification of patterns of payment has been inevitable. Recently, Near Field Communication (NFC) was included in the list of new patterns of payment which are implemented by many different technologies. In this study, it is aimed to apply different types of security measures taken against various attack types targeting NFC based virtual shopping systems...
In smart factories and smart homes, devices such as smart sensors are connected to the Internet. Independent of the context in which such a smart sensor is deployed, the possibility to change its configuration parameters in a secure way is essential. Existing solutions do provide only minimal security or do not allow to transfer arbitrary configuration data. In this paper, we present an NFC- and QR-code...
Radio Frequency Identification (RFID) security has not been properly handled in numerous applications, such as in public transportation systems. In this paper, a methodology to reverse engineer and detect security flaws is put into practice. Specifically, the communications protocol of an ISO/IEC 14443-B public transportation card used by hundreds of thousands of people in Spain was analyzed. By applying...
The main purpose of this manuscript is to make the banking process a completely automatic system, which will increase security features and at the same time increase the efficiency in the working of the banks to a great extent. The entire transaction system will be completely automatic, which will make the banking process much faster, thus saving the time of the customers and also making the system...
The goal of this project is to perceive and detect gas leakage, gas cylinder drop level, food count and library book history of the student by using gas sensor, weight sensor and RFID (Radio Frequency Identification) approach and to provide complete information and usefulness needed. This proposed system defines the design of RASPBERRY PI based on a security system for use in industries or hostel...
Thanks to their crucial role in different areas such as supply chain and healthcare, Radio Frequency Identification (RFID) technologies have currently attracted a lot of attention. They are mainly used for identifying objects and people based on a combination of tags and readers. Nevertheless, this identification brings out many challenges and concerns including security which still remains an open...
Radio Frequency Identification (RFID) devices are widely used in many domains such as tracking, marking and management of goods, smart houses (IoT), supply chains, etc. However, there is a big number of challenges which must still be overcome to ensure RFID security and privacy. In addition, due to the low cost and low consumption power of UHF RFID tags, communications between tags and readers are...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.