RFID Tag Area Management Base on IOT

Article Preview

Abstract:

Traditional Radio Frequency Identification (RFID) Tag Equipment has some problems like these: it is difficult to realize if the tag is kept out, destroyed, or taken away abnormally. It cant accurately judge where the area the tag had moved to is. Besides, it is difficult to distinguish the right of the tag in the Tag Management. To solve these issues, this paper serves with a method which is based on the Internet of Things (IOT). It mainly includes as the following: the tag is activated in the Controlled Area, the judgment of the tag access the Controlled Area, whether the tag exists in the Controlled Area or not. These methods can reform the problems that the Traditional RFID Tag Equipment has.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 756-759)

Pages:

4529-4532

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] J. Wu and H. Li, A Dominating-Set-Based Routing Scheme in A Hoc Wireless Networks, , Telecomm. SystemsJ., vol. 3, pp.63-84, (2001).

Google Scholar

[2] Gil Soto Tolosa, Outdoor Lighting Controls, Conference Proceedings of LONWORLD 2005, unpublished, Paris, France, October 20, 20.

Google Scholar

[3] Thornton F. RFID Security[M]. [S. l. ]: Syngress Publishing, Inc., 2007: 2-40.

Google Scholar

[4] Molnar D, Soppera A, Wagner D. A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags[C]/Proc. of Conf. on Selected Areas in Cryptography. [S. l. ]: Springer-Verlag, 2005: 276-290.

DOI: 10.1007/11693383_19

Google Scholar

[5] Wengchuang Wang, Keren Wang. RFID Security protocol base on McEliece[J]. Computer Engineering 2009, 35(8): 171-173.

Google Scholar

[6] Ryu Eun-Kyung, Takagi Tsuyoshi. A Hybrid Approach for Privacy-preserving RFID Tags[J]. Computer Standards & Interfaces, 2009, 31(4): 812-815.

DOI: 10.1016/j.csi.2008.09.001

Google Scholar

[7] Golle P, Jakobsson M, Juels A, et al. Universal Re-encryption for Mixnets[C]/Proc. of RSA Conference on Cryptographers' Track. Berlin, Germany: Springer-Verlag, 2004: 163-178.

DOI: 10.1007/978-3-540-24660-2_14

Google Scholar

[8] Zhanglin Li, Guizhang Lu, Yunwei Xin. secondary encryption technology in the RFID security [J]. Computer Engineering, 2008, 34(3): 160-162.

Google Scholar

[9] Gong Li, Needham R, Yahalom R. Reasoning About Belief in Cryptographic Protocols[C]/Proc. of 1990 IEEE Symp. on Research in Security and Privacy. Los Alamitos, USA: IEEE Computer Society, 1990: 234-248.

DOI: 10.1109/risp.1990.63854

Google Scholar

[10] Jinhua Ding, Jintao Li, Bo Feng. RFID security authentication protocol based on Hash function [J]. Computer Research and Development, 2009, 46(4): 583-594.

Google Scholar

[11] Saito J, Ryou J C, Sakurai K. Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags[C]/Proc. of International Conference on Embedded and Ubiquitous Computing. Berlin, Germany: Springer-Verlag, 2004: 879-890.

DOI: 10.1007/978-3-540-30121-9_84

Google Scholar