The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Backscatter communication system is the backbone of many low cost and low power distributed wireless systems. This paper studies the physical layer security (PLS) performance of a backscatter system which contains several relays and an eavesdropper. We discuss the conditions for a positive secrecy rate of the system in two different situations. First, in the case of known information of eavesdropper,...
The baggage handling system has major impact on the security; especially in the airports. Improving baggage handling systems helps in many ways; to handle baggage in precise ways, to detect presence of explosives, any destructive materials in the baggage for security purposes. There are several technologies already being implemented in the airports. In this paper the different, effective and advanced...
Today, the world is influenced by new emerging technologies. As a result we are surrounded by a number of smart devices. These smart devices make our life easy and convenient. On the contrary, we are exposed to a number of threats and cyber attacks. There is always a threat to our privacy. In this paper, we discuss the different applications of IOT and the security threats involved.
Antennas for use of security gates to prevent the shoplifting have been researched and developed based on the monopulse system at 920 MHz. Because the radiation patterns of the conventional antenna with the security gates are not enough sharp, many false operations are pointed out to recognize the RF-tags located far from the security gates. Ideas for using large antennas or radio wave absorbers were...
Internet of things is a latest technology which has good number of benefits to its users. It's an emerging technology where we connect daily objects to the internet for sending and receiving data. For an example home automation system, various durable goods, vehicles (cars and trucks) sensors. We can combine all these with internet. We can send and receive information as per user's requirement. IoT...
Nowadays Vehicle Ad hoc Networks have an interesting research and application area in real time scenario. Vehicles are embedded with smart embedded sensors, processing ability and wireless communication capabilities will lead to an efficient development of road safety, comfort, information sharing and efficient control while on the road. In this paper, traffic related issues like signal jumps, expiry...
Supply-chain and inventory management are the main areas in the internet of things (IoT) requiring low cost and secure batch mode privacy and authentication of radio frequency identification (RFID) tags. Some additional security and quality of service requirements are also necessary for a secure RFID based supply chain application. In this paper, our contribution is twofold: first, we propose a new...
While keeping antenna size, a technique to narrow down the radiation patterns of the antennas operationally was proposed because of false operation of security gate to prevent shoplifting. The main emphasis was placed on the analog signal processing using the monopulse antenna system. After identifying the detected arrival angle of RF-waves from RFID-Tags, the positions of the RFID-Tags can be recognized,...
According The paper puts forward a novel coal mine management system to solve the real-time monitoring and highly efficient rescue problems of underground work platforms. The scheme of ZigBee wireless sensor network combined with Controller Area Net-work (CAN) bus is adopted in this system. ZigBee substation is set at proper intervals in mine laneways to acquire Radio Frequency Identification (RFID)...
The use of wireless technology has permeated every sphere of our lives and across all cross sections of society. Whether it is at the personal level or for the public good, wireless technology has evolved over the years to provide efficient systems to improve the quality of life on the planet. While there are a host of wireless technologies available today catering to applications in the Medical Field,...
The system proposed is a door unlocking system containing multiple doors any of which can be used to access a certain zone e.g. a laboratory or library. The system is implemented using a central server which contains a central database gathering all the information about the authorized personnel. The hardware components required are RFID reader, passive RFID tags, wireless transmitter & receiver...
Radio-frequency identification (RFID) uses electromagnetic fields for wireless communication that automatically recognized target devices with no physical interaction with the purpose of information transmission. The RFID system composed of transponder or tag, interrogator and back-end host system. The services of mobile RFID (M-RFID) networks can be setup by consolidating with current wireless networking...
Radio Frequency Identification Device (RFID) technology use in health care services has been shown to save lives, prevents errors, save costs and increases security. Implementation of RFID technology has been challenged with high implementation costs, substantial gap between technology implementation costs and the RFID-enabled benefits, lack of common standard of usage/data analysis and low operational...
A RFID indoor personnel location tracking system is proposed to manage the foreign visitors, for the safety issue of critical assets in confidential areas. The design of the low power wearable RFID location tag with identity binding function based on heart rate detection, and extreme low power method based on human posture are described in detail. The portable RFID location base stations and the communication...
In Vehicular Ad hoc Networks (VANETs), access control and authentication are crucial security services for both vehicle to vehicle (V2V) and vehicle to infrastructure (V2I) communications. On the other hand, services provided by VANETs would be reduced if the vehicle private data are misused and the privacy is not protected. In this paper, we investigate the secure access control with authentication...
An ultra-low power true random number generator (TRNG) based on sub-ranging SAR ADC is proposed. The proposed TRNG shares the coarse-ADC circuit with sub-ranging SAR ADC for area reduction. The shared coarse-ADC not only plays the role of discrete-time chaotic circuit or TRNG's entropy source but also reduces overall SAR ADC energy consumption by selectively activating the fine-SAR ADC. Also, the...
Recently, different RFID authentication protocols conforming to EPC Class 1 Generation 2 (EPC C1 G2) standard have been proposed. In 2013, Xiao et al. have proposed an improved mutual authentication protocol which claimed to eliminate the weaknesses of Yoon's protocol that has been proposed in 2012. In this paper, we study the security and the privacy of Xiao et al.'s protocol. It is shown that their...
Traditional access control systems lack the ability to cope with dynamic environments where several factors can affect the decision-making process. On the contrary, Risk-based access control systems offer a preeminent alternative where multiple risk factors sway the access control decision. Nonetheless, risk is often measured qualitatively, and is subject to uncertainty, thus, making it susceptible...
Compared to related traditional majors, the Internet of Things engineering major has greater integration and its own characteristics especially the extension characteristic. As for the industry hierarchy for Internet of Things, standardizations are still lacking for its layers. Hence, e-learning on Internet of Things engineering major is challenging with the development of related technologies. This...
Radio frequency Technology (RFID) is an automatic identification technology It consists of a transponder or "tag". The tag is the data carrying element of an RFID system. The "reader" contains a radio frequency receiver and sometimes a transmitter, a control unit and an antenna to provide data retrieval or communication with the tag. The following project proposes to build a Self-Aware...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.