1 Advanced RFID Systems, Security, and Applications Nemai Chandra Karmakar Monash University, Australia Information Science REFERENCE
2 Detailed Table of Contents Preface xv Section 1 Security Chapter 1 Security Risks/Vulnerability in a RFID System and Possible Defenses 1 Morshed U. Chowdlnny, Deakin University, Australia Biplob R. Ray, Melbourne Institute of Technology, Australia Remote technologies are changing our way of life. The radio frequency identification (RFID) system is a new technology which uses the open air to transmit information. This information transmission needs to be protected to provide user safety and privacy. Business will look for a system that has fraud resil ience to prevent the misuse of information to take dishonest advantage. The business and the user need to be assured that the transmitted information has no content which is capable of undertaking malicious activities. Public awareness of RFID security will help users and organizations to understand the need for security protection. Publishing a security guideline from the regulating body and monitoring imple mentation of that guideline in RFID systems will ensure that businesses and users are protected. This chapter explains the importance of security in a RFID system and will outline the protective measures. It also points out the research direction of RFID systems. Chapter 2 Security and Privacy in RFID Systems 16 Joarder Kainruzzaman, Monash University, Australia A. K. M. Azad, Monash University, Australia Nemai Chandra Karmakar, Monash University, Australia Gour C. Karmakar, Monash University, Australia Bala Srinivasan, Monash University, Australia Security and privacy protection are very critical requirements for the widespread deployment of RFID technologies for commercial applications. In this chapter, the authors first present the security and pri vacy requirement of any commercial system, and then highlight the security and privacy threats that are unique to an RFID system. The security and privacy preserving protocols for RFID system proposed in literature are elaborately discussed, analyzing their strengths, vulnerabilities, and implementation issues. The open research challenges that need further investigation, especially with the rapid introduction diverse RFID applications, are also presented. of
3 Chapter 3 The Evolution of Intelligent Classifiers into an Integrated Approach to Correct RFID Anomalies 41 Peter Darcy, Institute ofintegrated and Intelligent Systems, Griffith University, Australia Bela Stanlic, Institute ofintegrated and Intelligent Systems, Griffith University, Australia Abdul Sattar, Institute of Integrated and Intelligent Systems, Griffith University, Australia Radio Frequency Identification (RFID) refers to wireless technology that is used to seamlessly and automatical ly track various amounts of items around an environment. This technology has the potential to improve the efficiency and effectiveness of tasks such as shopping and inventory saving commercial organisations both time and money. Unfortunately, the wide scale adoption ofrfid systems have been hindered due to issues such as false-negative and false-positive anomalies that lower the integrity of captured data. In this chapter, we propose the utilisation three highly intelligent classifiers, specifically a BayesianNetwork,NeuralNetworkandNon-Monotonic Reasoning, to handle missing, wrong and dupli cate observations. After discovering the potential from using Bayesian Networks, Neural Networks and Non-Monotonic Reasoning to correct captured data, we decided to improve upon the original approach by combining the three methodologies into an integrated classifier. From our experimental evaluation, we have shown the high results obtained from cleaning both false-negative and false-positive anomalies using each of our concepts, and the potential it holds to enhance physical RFID systems. Chapter 4 Near Field Authentication 74 Vasileios Lakafosis, Georgia Institute of Technology, USA Edward Gebara, Georgia Institute of Technology, USA Manos M. Tentzeris, Georgia Institute of Technology, Gerald DeJean, Microsoft Research, USA Darko Kirovski, Microsoft Research, USA USA Counterfeiting affects many different sectors of the world trade, including the pharmaceutical and the aerospace industries, and, therefore, its impact is not only of financial nature but can also have fatal consequences. This chapter introduces a new robust RFID system with enhanced hardware-enabled au thentication and anti-counterfeiting capabilities. The system consists of two major components, namely the near-field certificates of authenticity (NF-CoAs), which complement typical RFID tags and serve as authenticity vouchers of the products they are attached to, and a microcontroller-enabled, low-power and low-cost reader. The high entropy and security of this framework stem from the unique, conductive, and dielectric, physical structure of the certificate instances and the highly complex electromagnetic effects that take place when such a certificate is brought in the reactive near-field area of the reader's antenna array. In particular, the reader's main task is to accurately extract the 5 to 6 GHz near-field response (NF fingerprint) of the NF-CoAs. The characterization of the reader's components, with an emphasis on the accuracy achieved, is provided. Rigorous performance analysis and security test results, including uniqueness among different instances, repeatability robustness for same instance and 2D to 3D projec tion attack resistance, are presented and verify the unique features of this technology. Rendering typical RFID tags physically unique and hard to near-exactly replicate by complementing them with NF-CoAs can prove a valuable tool against counterfeiting.
4 Section 2 Middleware Chapter 5 Edgeware in RFID Systems 101 Geoffrey Ramadan, Unique Micro Design, Australia An RFID system is an enabling technology encompassing both hardware and software. This chapter presents a software interface that integrates both middleware and enterprise software to RFID automate the system. The developed software is called Edgeware. The chapter presents an industrial perspective of complete implementation of an RFID system to automate the whole process of a big and complex business. In this chapter the definition, evaluation, value proposition, and implementation procedure of Edgeware are presented. Chapter 6 Design and Implementation of an Event-Based RFID Middleware 110 Angelo Ciicinolta, University ofmessina, Italy Antonino Longo Minnolo, University of Messina, Italy Antonio Puliqfito, University ofmessina, Italy The downward trend in the cost of RFID technology is producing a strong impact on the industrial world that is using such powerful technology in order to rethink and optimize most of the existing busi ness processes. In this sense, the chipless technology is playing a key role to facilitate the adoption of RFID in enterprises. All this implies the use of solutions that simplify the adoption of the continuously evolving RFID technology and allow keeping a high-level vision versus the specific technical details. In brief, it is mandatory to abstract the technological level and makes transparent the physical devices to the application level. The widespread use of the RFID technology also produces a large volume of data from many objects scattered everywhere, that have to be managed. In these complex scenarios, the RFID middleware represents an ideal solution that favors the technology integration, reducing costs for application development and introducing real benefits to the business processes. In this chapter, the authors describe the main features of our event-based RFID middleware and its powerful architecture. Their middleware is able to assure an effective process of technological abstraction, switching from a vision linked to the specific issues of interfacing devices (chipless tags, readers, sensor networks, GPS, WiFi, etc.) to the management of the event generated by each device. In brief, "event-based" means to integrate the management logic of different devices. Section 3 Anti-Collision Protocol Chapter 7 RFID Tag Anti-Collision Protocols Ching-Nung Yang, National Dong Hwa University, Taiwan Jyun-Yan He, National Dong Hwa University, Taiwan Yu-Ching Kim, National Dong Hwa University, Taiwan 133 A tag collision problem (or missed reads) in Radio Frequency Identification (RFID) system happens when multiple tags respond to a reader simultaneously. At this time, the reader cannot differentiate these tags correctly. This problem is often seen whenever a large volume of RFID tags are read together in
5 the same radio frequency field. Tag collisions will degrade identification efficiency, and this unreliable identification will compromise the usefulness of RFID system. This chapter introduces tag collision problem and discusses tag anti-collision protocols, including ALOHA-based protocol, Binary Tree (BT) protocol, and Query Tree (QT) protocol. To date, most tag anti-collision protocols are QT protocols. Thus, in this chapter, the authors briefly describe some elegant researches on QT protocols, and also introduce their recent research results on QT protocols. Chapter 8 Managing Tag Collision in RFID Data Streams using Smart Tag Anti-Collision Techniques 155 Prapassara Pupimwiwat, Griffith Bela Stantic, Griffith University, Australia University, Australia Radio Frequency Identification (RFID) is considered an emerging technology for advancing awide range of applications, such as supply chain management and distribution. However, despite the extensive devel opment of the RFID technology in many areas, the RFID tags collision problems remain a serious issue. Collision problems occur due to the simultaneous presence of multiple numbers of tags within the reader zone. To solve collision problems, different anti-collision methods have been mentioned in literature. These methods are either insufficient or too complex, with a high overhead cost of implementation. In this chapter, the authors propose a novel deterministic anti-collision algorithm using combinations of Q-ary trees with the intended goal to minimise memory usage queried by the RFID reader. By reducing the size of queries, the RFID reader can preserve memories, and the identification time can be improved. In addition, the chapter introduces a novel probabilistic group-based anti-collision method to improve the overall performance of the tag recognition process. Section 4 Applications Chapter 9 Passive UHF RFID Technology Applied to Automatic Vehicle Identification: Antennas, Propagation Models and Some Problems Relative to Electromagnetic Compatibility 188 Salvador Ricardo Meneses Gonzalez, ESIME Zacatenco, Mexico Roberto Linares y Miranda, ESIME Zacatenco, Mexico In this chapter, propagation channel aspects in current passive UHF RFID systems applied for automatic vehicular identification (AVI) are presented, considering the antennas design for passive UHF RFID tag and some problems relative to the electromagnetic compatibility. These issues are focused on RFID link, reader-tag-reader, and the channel modelling that is supported with measurements, and reader-reader interference problems are analysed. Chapter 10 Exploring Value-Added Applications of Chipless RFID Systems to Enhance Wider Adoption 221 Ming K. Lim, Aston University, UK Radio-frequency identification technology (RFID) is a popular modern technology proven to deliver a range of value-added benefits to achieve system and operational efficiency, as well as cost-effectiveness. The operational characteristics ofrfid outperform barcodes in many aspects. Despite its well-perceived benefits, a definite rationale for larger scale adoption is still not so promising. One of the key reasons is
6 in the market is still high implementation cost, especially the cost of tags for applications involving item-level tagging. This has resulted in the development of chipless RFID tags which cost much less than conventional chipbased tags. Despite the much lower tag cost, the uptake of chipless RFID system not as widespread as predicted by RFID experts. This chapter explores the value-added applications of chipless RFID system to promote wider adoption. The chipless technology's technical and operational characteristics, benefits, limitations and current uses will also be examined. The merit of this chapter is to contribute fresh propositions to the promising applications of chipless RFID to increase its adoption in the industries that are currently not (or less popular in) utilising it, such as retail, logistics, manufac turing, healthcare, and service sectors. Chapter 11 Potential Impact of RFID-Based Tracing Systems on the Integrity of Pharmaceutical Products 241 Michele Mqffia, University of Saknto, Italy Luca Mainetli, University ofsaknto, Italy Luigi Patrono, University of Saknto, Italy Emamiela Urso, University of Saknto, Italy Radio Frequency Identification (RFID) is going to play a crucial role as auto-identification technology in a wide range of applications such as healthcare, logistics, supply chain management, ticketing, et cetera. The use of electromagnetic waves to identify, trace, and track people or goods allows solving many problems related to auto-identification devices based on optical reading (i.e. bar code). Currently, high interest is concentrated on the use of Radio Frequency (RF) solutions in healthcare and pharmaceutical supply chain, in order to improve drugs flow transparency and patients' safety. Unfortunately, there is a possibility that drug interaction with electromagnetic fields (EMFs) generated by RF devices, such as RFID readers, deteriorate the potency of bioactive compounds. This chapter proposes an experimental multidisciplinary approach to investigate potential alterations induced by EMFs on drug molecular structure and performance. To show the versatility of this approach, some experimental results obtained on two biological pharmaceuticals (peptide hormone-based) are discussed. Chapter GHz Portable Wireless Monitoring System for Sleep Apnea Diagnosis in Wireless Body Sensor Network (WBSN) Using Active RFID and MIMO Technology 264 Yang Yang, Monash University, Australia Abdur Rahim, Monash University, Australia Nemai Chandra Karmakar, Monash University, Australia Sleep apnea is a severe, potentially life-threatening condition that requires immediate medical attention. In this chapter, a novel wireless sleep apnea monitoring system is proposed to avoid uncomfortable sleep in an unfamiliar sleep laboratory in traditional PSG-based wired monitoring systems. In wireless sleep apnea monitoring system, signal propagation paths may be affected by fading because of reflection, dif fraction, energy absorption, shadowing by the body, body movement, and the surrounding environment. To combat the fading effect in WBSN, the MIMO technology is introduced in this chapter. In addition, the presented active RFID based system is composed of two main parts. The first is an on-body sensor system; the second is a reader and base station. In order to minimize the physical size of the on-body sensors and to avoid interference with 2.4 GHz wireless applications, the system is designed to operate in the 5.8 GHz ISM band. Each on-body sensor system consists of a physiological signal detection circuit, an analogue-to-digital convertor (ADC), a microcontroller (MCU), a transceiver, a channel selection bandpass filter (BPF), and a narrow band antenna.
7 Chapter 13 Chipless RF1D Sensor for High Voltage Condition Monitoring 304 Emran Amin, Monash University, Australia Nemai C. Karmakar, Monash University, Australia Anovel approach for non-invasive radiometric Partial Discharge (PD) detection and localization of faulty power apparatuses in switchyards using Chipless Radio Frequency Identification (RFID) based sensor is presented. The sensor integrates temperature sensing together with PD detection to assist on-line au tomated condition monitoring of high voltage equipment. The sensor is a multi-resonator based passive circuit with two antennas for reception of PD signal from the source and transmission of the captured PD to the base station. The sensor captures PD signal, processes it with designated spectral signatures as identification data bits, incorporates temperature information, and retransmits the data with PD signals to the base station. Analyzing the PD signal in the base station, both the PD levels and temperature of a particular faulty source can be retrieved. The prototype sensor was designed, fabricated, and tested for performance analysis. Results verify that the sensor is capable of identifying different sources at the events of PD. The proposed low cost passive RFID based PD sensor has a major advantage over existing condition monitoring techniques due to its scalability to large substations for mass deployment. Chapter 14 Recent Advancements in Smart Sensors and Sensing Technology 334 Subhas C. Mukhopadhyay, Massey University, New Zealand The chapter presents the design and development of very low cost planar sensors and sensing systems for measuring fat contents in meat, leather quality assessment, food quality, and biomedical application such as cancer detection, agriculture, and RFID based detection systems. The sensors comprise planar passive microwave integrated circuits in the forms of microstrip meander lines, mesh and inter-digital capacitance. The sensors are excited with voltage controlled oscillators (VCOs) and power supply units. A data acquisition system based on a microcontroller and an op-amp based interfacing circuits complete the sensing system. The results of various characteristics parameters of samples are presented and com pared with the results from expensive conventional measurement set up. These low cost sensors bring benefits in the sensing technology with novel and accurate concepts. Compilation of References 354 About the Contributors 382 Index 390
12 The Internet of Things (IOT) 12.1 Moving toward a Smarter Internet Imagine a world where billions of objects can sense, communicate and share information, all interconnected over public or private Internet
Business Innovation Observatory Traceability across the Value Chain Advanced tracking systems Case study 40 Internal Market, Industry, Entrepreneurship and SMEs The views expressed in this report, as well
JIEM, 2012 5(1):22-52 Online ISSN: 2013-0953 Print ISSN: 2013-8423 http://dx.doi.org/10.3926/jiem.412 A study of RFID adoption for vehicle tracking in a container terminal S. L. Ting, L. X. Wang, W. H.
NESSI White Paper, December 2012 Big Data A New World of Opportunities Contents 1. Executive Summary... 3 2. Introduction... 4 2.1. Political context... 4 2.2. Research and Big Data... 5 2.3. Purpose of
Duke Energy: Developing the communications platform to enable a more intelligent electric grid David Masters David.Masters@duke-energy.com Manager, Technology Development Duke Energy February 1, 2011 Certain
EVALUATING THE USE OF SNMP AS A WIRELESS NETWORK MONITORING TOOL FOR IEEE 802.11 WIRELESS NETWORKS A Thesis Presented to the Graduate School of Clemson University In Partial Fulfillment of the Requirements
IEEE COMMUNICATIONS SURVEYS ACTIVE NETWORKS: APPLICATIONS, SECURITY, SAFETY, AND ARCHITECTURES KONSTANTINOS PSOUNIS STANFORD UNIVERSITY ABSTRACT Active networks represent a new approach to network architecture.
A System-Aware Cyber Security Architecture Rick A. Jones and Barry Horowitz* Regular Paper Systems and Information Engineering, University of Virginia, Charlottesville, VA 22904 A SYSTEM-AWARE CYBER SECURITY
PROJECT FINAL REPORT Grant Agreement number: 212117 Project acronym: FUTUREFARM Project title: FUTUREFARM-Integration of Farm Management Information Systems to support real-time management decisions and
Recommendation for Space Data System Practices SECURITY ARCHITECTURE FOR SPACE DATA SYSTEMS RECOMMENDED PRACTICE CCSDS 351.0-M-1 MAGENTA BOOK November 2012 Recommendation for Space Data System Practices
Università degli Studi di Roma La Sapienza Dottorato di Ricerca in Ingegneria Informatica XXVI Ciclo 2013 Timely Processing of Big Data in Collaborative Large-Scale Distributed Systems Leonardo Aniello
Future Internet Roadmap Deliverable 1.1 Service Web 3.0 Public Roadmap Authors: Elena Simperl (UIBK) Ioan Toma (UIBK) John Domingue (OU) Graham Hench (STI) Dave Lambert (OU) Lyndon J B Nixon (STI) Emilia
Radio Frequency Identification (RFID) Tags and Reader Antennas Based on Conjugate Matching and Metamaterial Concepts Ph.D. Thesis written by Gerard Zamora González Under the supervision of Jordi Bonache
ISSN 1868-9558 JOURNAL ISSUE 22 // JULY 2014» PAGE 4 Big Data security by Rohde & Schwarz» PAGE 16 Wearables Smart protocols for smart technology by Rutronik The role of Big Data & Data Security in M2M
Multimedia Traffic Security Architecture for the Internet of Things Liang Zhou, Nanjng University of Posts and Telecommunications Han-Chieh Chao, National Ilan University Abstract An important challenge
ESCUELA TÉCNICA SUPERIOR DE INGENIERÍA DE TELECOMUNICACIÓN UNIVERSIDAD POLITÉCNICA DE CARTAGENA Trabajo Fin de Master Food traceability using RFID and Wireless Sensor Networks in an Aquaculture Enterprise.
THE PRESIDENT S NATIONAL SECURITY TELECOMMUNICATIONS ADVISORY COMMITTEE NSTAC Report to the President on the Internet of Things November 19, 2014 TABLE OF CONTENTS EXECUTIVE SUMMARY... ES-1 1.0 INTRODUCTION...
INVITED PAPER Cyber Physical System Security for the Electric Power Grid Control in power systems that may be vulnerable to security attacks is discussed in this paper as are control loop vulnerabilities,
Digital Forensic Trends and Future Farhood Norouzizadeh Dezfoli, Ali Dehghantanha, Ramlan Mahmoud, Nor Fazlida Binti Mohd Sani, Farid Daryabar Faculty of Computer Science and Information Technology University
Future Internet Bandwidth Trends: An Investigation on Current and Future Disruptive Technologies Yanyan Zhuang Theodore S. Rappaport Justin Cappos Rick McGeer Department of Computer Science and Engineering
INVITED PAPER Cyber Physical Security of a Smart Grid Infrastructure By Yilin Mo, Tiffany Hyun-Jin Kim, Kenneth Brancik, Dona Dickinson, Heejo Lee, Adrian Perrig, and Bruno Sinopoli ABSTRACT It is often
28 Intelligent Value Chain Networks: Business Intelligence and Other ICT Tools and Technologies in Supply/Demand Chains Evelin Vatovec Krmac University of Ljubljana, Faculty of Maritime Studies and Transport
Master Thesis University of Twente Faculty of Electrical Engineering, Mathematics and Computer Science (EEMCS) Design and Analysis of Communication Systems (DACS) Integration of IEC 61850 MMS and LTE to
: An Analysis of Challenges, Solutions and Opportunities Antonio J. Jara 1, Latif Ladid 2, and Antonio Skarmeta 3 1 Vice-chair, IEEE ComSoc IoT ETC University of Applied Sciences Western Switzerland (HES-SO)
faculty of economicsand business operations Societal Impact of Wireless Revolution in the Netherlands and Possible Measures Authors (RuG): Prof.dr.ir. J.C. Wortmann, Drs. J.B. van Meurs, Dr. Ir. F.B.E.
Computer Networks 52 (2008) 2260 2279 Contents lists available at ScienceDirect Computer Networks journal homepage: www.elsevier.com/locate/comnet Nanonetworks: A new communication paradigm Ian F. Akyildiz