Radio-Frequency Identification (RFID): Emerging Technologies, Applications and Improvement Strategies ( Media and Communications - Technologies, Policies and Challenges )

Publication series :Media and Communications - Technologies, Policies and Challenges

Author: Xinxin Fan (Department of Electrical and Computer Engineering   University of Waterloo   Waterloo   ON   Canada)  

Publisher: Nova Science Publishers, Inc.‎

Publication year: 2014

E-ISBN: 9781631177521

P-ISBN(Hardback):  9781631177507

Subject: TB General Industrial Technology

Keyword: Engineering

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Radio-Frequency Identification (RFID): Emerging Technologies, Applications and Improvement Strategies

Chapter

Evaluation of RFID Electronic Label System Application in Container Transportation

RFID Application Analyses in Container Port

References

Chapter 2: RFID TECHNOLOGY FOR DRUG LABELLING IN THE EMERGENCY DEPARTMENT: RFID TO MINIMISE THE OCCURRENCE OF ADVERSE EVENTS

Abstract

Introduction

Methods

Configurable Parameters of the RFID Labels

Requirements of the Selected RFID Label

Discussion

Acknowledgments

References

Chapter 3: APPLICATIONS OF RFID TECHNOLOGY IN THE CONSTRUCTION INDUSTRY: AN ACADEMIC LITERATURE REVIEW

Abstract

Introduction

RFID Technology: An Overview

Practical Issues Associated with the Use of RFID in Construction

Conclusion

References

Chapter 4: SOFTWARE DEFINED RADIO, GNU RADIO, RFID AND THEIR APPLICATIONS

Abstract

1. Introduction

2. Need for SDR

3. Evolution of SDR

4. SPEAKeasy

5. GNU Radio

6. Universal Software Radio Peripheral (USRP)

7. RFID Architecture

8. USRP for Emulating an RFID Reader

References

Chapter 5: ASPECTS OF RFID SECURITIES

Abstract

1. Introduction

2. Overview of Security of EPCglobal Class 1 Gen 2 UHF Tags

3. RFID Attacks and Countermeasures

Conclusion

References

Chapter 6: LIGHTWEIGHT CRYPTOGRAPHY FOR PASSIVE RFID SYSTEMS: A RESEARCH SURVEY

Abstract

1. Introduction

2. Lightweight Block Ciphers

3. Lightweight Stream Ciphers

4. Lightweight (Pseudo)Random Number Generators

Conclusion

References

Chapter 7: LOW-COMPLEXITY ATTACKS ON SELECTED LIGHTWEIGHT STREAM CIPHERS

Abstract

1. Introduction

2. Crypto-1

3. Hitag-2 Cipher

4. The Atmel Cipher

5. A2U2: A Lightweight Stream Cipher for RFID Tags

6. Conclusion

References

Chapter 8: GROUPING PROOF PROTOCOLS BASED ON LOW-COST RFID TAGS

Abstract

1. Introduction

2. RelatedWork

3. The Proposed Protocols

4. Security Analysis and Performance Evaluation

Conclusion

Acknowledgment

References

Chapter 9: SIDE-CHANNEL ATTACKS ON RFID SYSTEMS – STATE OF THE ART

Abstract

1. Introduction

2. Operation Principle of Passive RFID Systems

3. Side-Channel Attacks

4. Tools for Side-Channel Attacks on RFID Systems

5. A Framework for Side-Channel Attacks on RFID Systems

6. Side-Channel Attacks on RFID Systems in Practice

Conclusion

References

INDEX

The users who browse this book also browse


No browse record.