Skip to main content
Erschienen in: Wireless Personal Communications 2/2019

24.05.2019

Performance Enhancement with Improved Security an Approach for Formulating RFID as an Itinerary in Promulgating Succour for Object Detection

verfasst von: M. Thurai Pandian, R. Sukumar

Erschienen in: Wireless Personal Communications | Ausgabe 2/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In real time process, tracking of objects allows an agency to record, track, and examine an object and these features enhance the public service through better on-time performance and quicker response time for emergency. Radio-frequency identification (RFID) method is proposed to address the problem of security for automatically identifying and tracking tags attached to objects and to transfer data it is a wireless non-contact radio-frequency electromagnetic fields. Moreover, along with Performance Enhancement with Improved Security approach the new RFID method is established for enhancing the performance as well as guaranteeing security features and the components of a typical RFID method comprises RFID reader, RFID tag, backend system, and the cluster head. The tag is entrenched in the tracked object and it does not need to be within line of sight of the reader like a barcode. Moreover, SECF method is to apply secure RFID method and increase the efficiency in tracking of objects with improved security.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Wang, B., & Ma, M. (2012). A server independent authentication scheme for RFID systems. IEEE Transactions on Industrial Informatics, 8, 689–696.CrossRef Wang, B., & Ma, M. (2012). A server independent authentication scheme for RFID systems. IEEE Transactions on Industrial Informatics, 8, 689–696.CrossRef
2.
Zurück zum Zitat Garfinkel, S. L., Juels, A., & Pappu, R. (2005). RFID privacy: An overview of problems and proposed solutions. IEEE Security Privacy, 3, 34–43.CrossRef Garfinkel, S. L., Juels, A., & Pappu, R. (2005). RFID privacy: An overview of problems and proposed solutions. IEEE Security Privacy, 3, 34–43.CrossRef
3.
Zurück zum Zitat Tan, C. C., Sheng, B., & Li, Q. (2008). Secure and serverless RFID authentication and search protocols. IEEE Transactions on Wireless Communications, 7, 1400–1407.CrossRef Tan, C. C., Sheng, B., & Li, Q. (2008). Secure and serverless RFID authentication and search protocols. IEEE Transactions on Wireless Communications, 7, 1400–1407.CrossRef
4.
Zurück zum Zitat Qian, C., Liu, Y., Ngan, H., & Ni, L. M. (2008). ASAP: Scalable collision arbitration for large RFID systems. IEEE Transactions on Parallel and Distributed Systems, 24, 1277–1288.CrossRef Qian, C., Liu, Y., Ngan, H., & Ni, L. M. (2008). ASAP: Scalable collision arbitration for large RFID systems. IEEE Transactions on Parallel and Distributed Systems, 24, 1277–1288.CrossRef
5.
Zurück zum Zitat Bonuccelli, M. A., Lonetti, F., & Martelli, F. (2007). Tree slotted ALOHA: A new protocol for tag identification in RFID networks. Elsevier Ad Hoc Networks. Bonuccelli, M. A., Lonetti, F., & Martelli, F. (2007). Tree slotted ALOHA: A new protocol for tag identification in RFID networks. Elsevier Ad Hoc Networks.
6.
Zurück zum Zitat Konstantinou, N. (2012). Expowave: An RFID anti-collision algorithm for dense and lively environments. IEEE Transactions on Communications, 60, 352–356.CrossRef Konstantinou, N. (2012). Expowave: An RFID anti-collision algorithm for dense and lively environments. IEEE Transactions on Communications, 60, 352–356.CrossRef
7.
Zurück zum Zitat Thiesse, F., Fleisch, E., & Dierkes, M. (2006). Lot track: RFID-based process control in the semiconductor industry. IEEE Pervasive Computing, 5(1), 47–53.CrossRef Thiesse, F., Fleisch, E., & Dierkes, M. (2006). Lot track: RFID-based process control in the semiconductor industry. IEEE Pervasive Computing, 5(1), 47–53.CrossRef
8.
Zurück zum Zitat Bu, K., Xiao, B., Xiao, Q., & Chen, S. (2012). Efficient misplaced-tag pinpointing in large RFID systems. IEEE Transactions on Parallel and Distributed Systems, 23, 2094–2106.CrossRef Bu, K., Xiao, B., Xiao, Q., & Chen, S. (2012). Efficient misplaced-tag pinpointing in large RFID systems. IEEE Transactions on Parallel and Distributed Systems, 23, 2094–2106.CrossRef
9.
Zurück zum Zitat Tan, C., Sheng, B., & Li, Q. (2010). Efficient techniques for monitoring missing RFID tags. IEEE Transactions on Wireless Communication, 9(6), 1882–1889.CrossRef Tan, C., Sheng, B., & Li, Q. (2010). Efficient techniques for monitoring missing RFID tags. IEEE Transactions on Wireless Communication, 9(6), 1882–1889.CrossRef
10.
Zurück zum Zitat Kang, L., Zhang, J., Wu, K., Zhang, D., & Ni, L. M. (2012). RCSMA: Receiver-based carrier sense multiple access in UHF RFID systems. IEEE Transactions on Parallel and Distributed Systems, 23, 735–743.CrossRef Kang, L., Zhang, J., Wu, K., Zhang, D., & Ni, L. M. (2012). RCSMA: Receiver-based carrier sense multiple access in UHF RFID systems. IEEE Transactions on Parallel and Distributed Systems, 23, 735–743.CrossRef
11.
Zurück zum Zitat Jia, X., Feng, Q., & Yu, L. (2012). Stability analysis of an efficient anti-collision protocol for RFID tag identification. IEEE Transactions on Communications, 60, 2285–2294.CrossRef Jia, X., Feng, Q., & Yu, L. (2012). Stability analysis of an efficient anti-collision protocol for RFID tag identification. IEEE Transactions on Communications, 60, 2285–2294.CrossRef
12.
Zurück zum Zitat Chen, W. T. (2009). An accurate tag estimate method for improving the performance of an RFID anti-collision algorithm based on dynamic frame length ALOHA. IEEE Transactions on Automation Science and Engineering, 6(1), 9–15.CrossRef Chen, W. T. (2009). An accurate tag estimate method for improving the performance of an RFID anti-collision algorithm based on dynamic frame length ALOHA. IEEE Transactions on Automation Science and Engineering, 6(1), 9–15.CrossRef
13.
Zurück zum Zitat Su, W., Alchazidis, N. V., & Ha, T. T. (2010). Multiple RFID tags access algorithm. IEEE Transactions on Mobile Computing, 9(2), 174–187.CrossRef Su, W., Alchazidis, N. V., & Ha, T. T. (2010). Multiple RFID tags access algorithm. IEEE Transactions on Mobile Computing, 9(2), 174–187.CrossRef
14.
Zurück zum Zitat Liu, H., Ning, H., Zhang, Y., He, D., Xiong, Q., & Yang, L. T. (2013). Grouping-proofs based authentication protocol for distributed RFID systems. IEEE Transactions on Parallel and Distributed Systems, 24, 1321–1330.CrossRef Liu, H., Ning, H., Zhang, Y., He, D., Xiong, Q., & Yang, L. T. (2013). Grouping-proofs based authentication protocol for distributed RFID systems. IEEE Transactions on Parallel and Distributed Systems, 24, 1321–1330.CrossRef
15.
Zurück zum Zitat Zuo, Y. (2010). Survivable RFID systems: Issues, challenges, and techniques. IEEE Transactions on Systems, Man, and Cybernetics Part C: Applications and Reviews, 40, 406–418. Zuo, Y. (2010). Survivable RFID systems: Issues, challenges, and techniques. IEEE Transactions on Systems, Man, and Cybernetics Part C: Applications and Reviews, 40, 406–418.
16.
Zurück zum Zitat Ren, K., Yu, S., Lou, W., & Zhang, Y. (2010). PEACE: A novel privacy-enhanced yet accountable security method for metropolitan wireless mesh networks. IEEE Transactions on Parallel and Distributed Systems, 21(2), 203–215.CrossRef Ren, K., Yu, S., Lou, W., & Zhang, Y. (2010). PEACE: A novel privacy-enhanced yet accountable security method for metropolitan wireless mesh networks. IEEE Transactions on Parallel and Distributed Systems, 21(2), 203–215.CrossRef
17.
Zurück zum Zitat Zhu, H., Li, M., Zhu, Y., & Ni, L. M. (2009). HERO: Online real-time vehicle tracking. IEEE Transactions on Parallel and Distributed Systems, 20, 740–752.CrossRef Zhu, H., Li, M., Zhu, Y., & Ni, L. M. (2009). HERO: Online real-time vehicle tracking. IEEE Transactions on Parallel and Distributed Systems, 20, 740–752.CrossRef
18.
Zurück zum Zitat Bu, K., Liu, X., Luo, J., Xiao, B., & Wei, G. (2013). Unreconciled collisions uncover cloning attacks in anonymous RFID systems. IEEE Transactions on Information Forensics and Security, 8, 429–439.CrossRef Bu, K., Liu, X., Luo, J., Xiao, B., & Wei, G. (2013). Unreconciled collisions uncover cloning attacks in anonymous RFID systems. IEEE Transactions on Information Forensics and Security, 8, 429–439.CrossRef
19.
Zurück zum Zitat Kalansuriya, P., Bhattacharyya, R., & Sarma, S. (2013). RFID tag antenna-based sensing for pervasive surface crack detection. IEEE Sensors Journal, 13, 1564–1570.CrossRef Kalansuriya, P., Bhattacharyya, R., & Sarma, S. (2013). RFID tag antenna-based sensing for pervasive surface crack detection. IEEE Sensors Journal, 13, 1564–1570.CrossRef
20.
Zurück zum Zitat Wu, H., Zeng, Y., Feng, J., & Gu, Y. (2013). Binary tree slotted ALOHA for passive RFID tag anticollision. IEEE Transactions on Parallel and Distributed Systems, 24, 19–31.CrossRef Wu, H., Zeng, Y., Feng, J., & Gu, Y. (2013). Binary tree slotted ALOHA for passive RFID tag anticollision. IEEE Transactions on Parallel and Distributed Systems, 24, 19–31.CrossRef
21.
Zurück zum Zitat Boaventura, A. J. S., & Carvalho, N. B. (2013). Extending reading range of commercial RFID readers. IEEE Transactions on Microwave Theory and Techniques, 61, 633–640.CrossRef Boaventura, A. J. S., & Carvalho, N. B. (2013). Extending reading range of commercial RFID readers. IEEE Transactions on Microwave Theory and Techniques, 61, 633–640.CrossRef
Metadaten
Titel
Performance Enhancement with Improved Security an Approach for Formulating RFID as an Itinerary in Promulgating Succour for Object Detection
verfasst von
M. Thurai Pandian
R. Sukumar
Publikationsdatum
24.05.2019
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2019
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-019-06591-9

Weitere Artikel der Ausgabe 2/2019

Wireless Personal Communications 2/2019 Zur Ausgabe

Neuer Inhalt