Skip to main content

2012 | OriginalPaper | Buchkapitel

2. Characteristics and Limitations of Conventional RFIDs

verfasst von : Faranak Nekoogar, Farid Dowla

Erschienen in: Ultra-Wideband Radio Frequency Identification Systems

Verlag: Springer US

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Although RFID technology has been proven to be sufficiently adequate for some applications, such as toll collection and anti-theft systems, there are numerous other applications that cannot benefit from this technology due to some of the limitations of the conventional RFID technologies. With the widespread interest and usage of RFIDs, the vulnerabilities of current RFID systems are becoming apparent. These limitations are directly related to the environment that the tags and readers ­communicate. This environment consists of both the wireless channel and the physical object that the tags are attached to. Various objects and systems in the wireless channel can cause a range of signal degradation such as attenuation, ­multipath fading, and interference to the RF signal carrying the tag information. Since the reliability of an RFID system is directly dependent on the robustness of the tag-reader RF link, the signaling scheme becomes a fundamental area of study for characterization and further performance improvement of such systems.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Courtesy of Karthik Ramakrishnan from University of Kansas [12]. Portions reprinted with permission from “Performance Benchmarks for Passive UHF RFID Tags” Master’s Thesis by Karthik Ramakrishnan, University of Kansas, 2003.
 
2
This work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under Contract, DE-AC52-07NA27344-LLNL-PRES-401143
 
Literatur
1.
Zurück zum Zitat “Ultra-Wideband Communications – Fundamentals and Applications”, F. Nekoogar, Prentice Hall PTR, Aug. 2005. ISBN: 0131463268. “Ultra-Wideband Communications – Fundamentals and Applications”, F. Nekoogar, Prentice Hall PTR, Aug. 2005. ISBN: 0131463268.
2.
Zurück zum Zitat M. Eunni, “A Novel Planar Microstrip Antenna Design for UHF RFID”, Master’s Thesis defense, 2006. M. Eunni, “A Novel Planar Microstrip Antenna Design for UHF RFID”, Master’s Thesis defense, 2006.
10.
Zurück zum Zitat D. Yee, “RFID – moving beyond compliance…”, RFID Summit Singapore (2004). D. Yee, “RFID – moving beyond compliance…”, RFID Summit Singapore (2004).
11.
Zurück zum Zitat D. Brown, “RFID Implementation”, ISBN-13: 978–0072263244. D. Brown, “RFID Implementation”, ISBN-13: 978–0072263244.
12.
Zurück zum Zitat K. Ramakrishnan “Performance Benchmarks for Passive UHF RFID Tags” Master’s Thesis, University of Kansas, 2003. K. Ramakrishnan “Performance Benchmarks for Passive UHF RFID Tags” Master’s Thesis, University of Kansas, 2003.
13.
Zurück zum Zitat D. Deavours, “UHF EPC Tag Performance Evaluation” a production of RFID Alliance Lab, May 2005. D. Deavours, “UHF EPC Tag Performance Evaluation” a production of RFID Alliance Lab, May 2005.
Zurück zum Zitat J.D. Taylor, Ed. Introduction to Ultra-wideband Radar Systems, (Boca Raton, FL. CRC Press, 1995). J.D. Taylor, Ed. Introduction to Ultra-wideband Radar Systems, (Boca Raton, FL. CRC Press, 1995).
Zurück zum Zitat Avoine, G., Oechslin, P.: RFID Traceability: A Multilayer Problem. In: Patrick, A., Yung,M. (eds.). In: Proc. of the Ninth Int’l Conf. on Financial Cryptography and Data Security (FC’05), Lecture Notes in Computer Science, Vol. 3570. (2005) 125–140. Avoine, G., Oechslin, P.: RFID Traceability: A Multilayer Problem. In: Patrick, A., Yung,M. (eds.). In: Proc. of the Ninth Int’l Conf. on Financial Cryptography and Data Security (FC’05), Lecture Notes in Computer Science, Vol. 3570. (2005) 125–140.
Zurück zum Zitat Bolotnyy, L., Robins, G.: Physically Unclonable Function-Based Security and Privacy in RFID Systems. In: Proc. of PerCom’07. New York, USA (2007) 211–220. Bolotnyy, L., Robins, G.: Physically Unclonable Function-Based Security and Privacy in RFID Systems. In: Proc. of PerCom’07. New York, USA (2007) 211–220.
Zurück zum Zitat “Performance Benchmarks for Passive UHF RFID Tags” Master’s Thesis by Karthik Ramakrishnan, University of Kansas, 2003. “Performance Benchmarks for Passive UHF RFID Tags” Master’s Thesis by Karthik Ramakrishnan, University of Kansas, 2003.
Zurück zum Zitat Juels, A.: Stengthening EPC Tags Against Cloning. In: Proc. of ACMWorkshop onWireless Security (WiSe’05). ACM Press (2005) 67–76. Juels, A.: Stengthening EPC Tags Against Cloning. In: Proc. of ACMWorkshop onWireless Security (WiSe’05). ACM Press (2005) 67–76.
Zurück zum Zitat Burton, G.J., Ohlke, G.P., (May 2000), Exploitation of millimeter waves for through-wall surveillance during military operations in urban terrain, Land Force Technical Staff Programme, Royal Military College of Canada, Kingston, Ontario. Burton, G.J., Ohlke, G.P., (May 2000), Exploitation of millimeter waves for through-wall surveillance during military operations in urban terrain, Land Force Technical Staff Programme, Royal Military College of Canada, Kingston, Ontario.
Zurück zum Zitat Dimitriou, T.: A Lightweight RFID Protocol to Protect Against Traceability and Cloning Attacks. In: Proc. of IEEE Conf. on Security and Privacy for Emerging Areas in Communication Networks, (2005). Dimitriou, T.: A Lightweight RFID Protocol to Protect Against Traceability and Cloning Attacks. In: Proc. of IEEE Conf. on Security and Privacy for Emerging Areas in Communication Networks, (2005).
Zurück zum Zitat EPCGlobal: Class-1 generation-2 UHF RFID Protocol for Communications at 860 MHz-960 MHz. In: EPC Radio-Frequency Identity Protocols, Vol. 1.1.0, (2005). EPCGlobal: Class-1 generation-2 UHF RFID Protocol for Communications at 860 MHz-960 MHz. In: EPC Radio-Frequency Identity Protocols, Vol. 1.1.0, (2005).
Zurück zum Zitat Fedhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong Authentication for RFID Systems Using the AES Algorithm. In: Proc. of Cryptographic Hardware and Embedded Systems (CHES’04), Vol. 3156. Lecture Notes in Computer Science. (2004) 357–370. Fedhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong Authentication for RFID Systems Using the AES Algorithm. In: Proc. of Cryptographic Hardware and Embedded Systems (CHES’04), Vol. 3156. Lecture Notes in Computer Science. (2004) 357–370.
Zurück zum Zitat Fishkin, K., Roy, S., Jiang, B.: SomeMethods for Privacy in RFID Communication. In: Proc. of the 1st European Workshop on Security (2004) 42–53. Fishkin, K., Roy, S., Jiang, B.: SomeMethods for Privacy in RFID Communication. In: Proc. of the 1st European Workshop on Security (2004) 42–53.
Zurück zum Zitat Garfinkel, S., Juels, A., Pappu, R.: RFID Privacy: An Overview of Problems and Proposed Solutions. In: IEEE Security & Privacy, Vol. 3. (2005) 34–43. Garfinkel, S., Juels, A., Pappu, R.: RFID Privacy: An Overview of Problems and Proposed Solutions. In: IEEE Security & Privacy, Vol. 3. (2005) 34–43.
Zurück zum Zitat Hancke, G., Kuhn, M.: An RFID Distance Bounding Protocol. In: Proc. of the 1st Int’l Conf. on Security and Privacy for Emerging Areas in Communications Networks (SecureComm 2005) (2005) 67–73. Hancke, G., Kuhn, M.: An RFID Distance Bounding Protocol. In: Proc. of the 1st Int’l Conf. on Security and Privacy for Emerging Areas in Communications Networks (SecureComm 2005) (2005) 67–73.
Zurück zum Zitat Inoue, S., Yasuura, H.: RFID Privacy Using User-Controllable Uniqueness. In: Proc. of RFID Privacy Workshop. MIT, Massachusetts, USA (2003). Inoue, S., Yasuura, H.: RFID Privacy Using User-Controllable Uniqueness. In: Proc. of RFID Privacy Workshop. MIT, Massachusetts, USA (2003).
Zurück zum Zitat Juels, A.: Minimalist Cryptography for Low-cost RFID Tags. In: Proc. of the 4th Conf. on Security in Communication Networks (SCN’04), Vol. 3352. Lecture Notes in Computer Science. Springer-Verlag (2004) 149–164. Juels, A.: Minimalist Cryptography for Low-cost RFID Tags. In: Proc. of the 4th Conf. on Security in Communication Networks (SCN’04), Vol. 3352. Lecture Notes in Computer Science. Springer-Verlag (2004) 149–164.
Metadaten
Titel
Characteristics and Limitations of Conventional RFIDs
verfasst von
Faranak Nekoogar
Farid Dowla
Copyright-Jahr
2012
Verlag
Springer US
DOI
https://doi.org/10.1007/978-1-4419-9701-2_2

Neuer Inhalt