• Corpus ID: 14589384

RFID ( Radio Frequency Identification ) : Principles and Applications

  title={RFID ( Radio Frequency Identification ) : Principles and Applications},
  author={Stephen A. Weis},
  • S. Weis
  • Published 2007
  • Computer Science
Deployment of radio frequency identification (RFID) systems is rapidly growing and has the potential to affect many different industries and applications. We present a brief history of RFID technology and automatic identification systems. We summarize major RFID applications, and present a primer on RFID fundamental principles. Finally, we discuss several challenges and obstacles to RFID adoption, as well as emerging technologies relevant to RFID. 

Figures and Tables from this paper

A Review on RFID Technology and Applications
This paper primarily focuses on RFID technology with its hardware components, basic system and applications.
Middleware Architectures for RFID Systems: A Survey
This paper reviews existing main RFIDmiddleware systems and compares their main features and Observations regarding the capability of existing middleware systems are also discussed.
AFA-RFID: Physical layer authentication for passive RFID tags
This research introduces analogue fingerprints as a means to authenticate passive RFID tags using analogue computing principles, which increases the amount of potential authentication data whilst reducing the potential for counterfeiting.
Radio Frequency Identification Detection Collision Mitigation Technique
It was observed that research so far has paid less attention to the possibility of collision occurrence among readers operating within a domain, and the paper offered means by which such scenarios could be avoided.
An Analysis of Authentication for Passive RFID Tags
This paper contributes a critical analysis of current approaches in order to identify requirements for RFID tag authentication, focusing on passive RFID tags used for product authentication.
Review of Various Aspects of Radio Frequency IDentification (RFID) Technology
This text gives the brief review of RFID Technology with discussion on frequency ranges, standards, and applications with emerging innovations.
Signal loss of RFID technology with short distance and high frequency
  • S. F. Wong, W. I. Ho, K. C. Sun
  • Business
    2016 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM)
  • 2016
To obtain an automatic and intelligent monitoring system, RFID is used to aid with CCTV system which is an innovative method. Therefore, some problems exist as integrating these two technologies, and
Efficient RFID Modulation Scheme for Better Ubiquitous Network Performance
This paper plans to employ the use of two popular metrics – Bit Error Ratio and Signal-to-Noise Ratio to evaluate the success rate of the digital data transmission in RFID to enhance the performance index of the future ubiquitous network.
Design of a Hybrid RFID-WLAN Based Smart Parking and Vehicle Finding System
  • Shumin Li, Rajan Kadel
  • Computer Science, Business
    2019 Cybersecurity and Cyberforensics Conference (CCC)
  • 2019
The proposed system is based on radio-frequency identification (RFID), wireless local area network (WLAN) technologies and mobile phone application and the accuracy and effectiveness is better than the existing system based on global positioning system (GPS), Wi-Fi, cellular, google maps technologies.
Lightweight Authentication Protocol for Low-Cost RFID Tags
This paper proposes a function and a protocol to ensure pre-shared key authentication in low-cost RFID (Radio Frequency Identification) tag systems that cannot support strong cryptography which needs costly resources.


RFID security and privacy: a research survey
  • A. Juels
  • Business
    IEEE Journal on Selected Areas in Communications
  • 2006
This survey examines approaches proposed by scientists for privacy protection and integrity assurance in RFID systems, and treats the social and technical context of their work.
Is your cat infected with a computer virus?
This paper presents the first self-replicating RFID virus, which uses RFID tags as a vector to compromise backend RFID middleware systems, via a SQL injection attack.
Squealing Euros: Privacy Protection in RFID-Enabled Banknotes
A simple and practical system that provides a high degree of privacy assurance that depends on a careful separation of the privileges offered by optical vs. radio-frequency contact with banknotes and full exploitation of the limited access-control capabilities of RFID tags.
Communication by Means of Reflected Power
Point-to-point communication, with the carrier power generated at the receiving end and the transmitter replaced by a modulated reflector, represents a transmission system which possesses new and
Spychips: How Major Corporations and Government Plan to Track Your Every Move with RFID
All Access to Share Ebook Spychips How Major Corporations And Government Plan To Track Your Every Move With RFID PDF. Free Download Share Ebook Spychips How Major Corporations And Government Plan To
Authenticating Pervasive Devices with Human Protocols
This paper analyzes a particular human-to-computer authentication protocol designed by Hopper and Blum (HB), and shows it to be practical for low-cost pervasive devices, and proves the security of the HB+ protocol against active adversaries based on the hardness of the Learning Parity with Noise (LPN) problem.
Available in:
This bibliography, which was compiled in conjunction with a review of the developmental disabilities literature focusing on interventions with challenging behavior, contains references for 151
This work focuses on integrating RAM and Disk Based Verification within the Mur$\varphi Verifier within the IFIP WG 10.5 Advanced Research Working Conference in L'Aquila, Italy.
Radio Frequency Identification Available at
  • Radio Frequency Identification Available at
  • 2006
Webpage. Available at: http://www
  • speedpass.com
  • 2006