Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 24 of 24

Full-Text Articles in Physical Sciences and Mathematics

Guest Editors Introduction: Rfid - A Unique Radio Innovation For The 21st Century, Rajit Gadh, George Roussos, K. Michael, George Q. Huang, Shiv Prabhu, Peter Chu Aug 2010

Guest Editors Introduction: Rfid - A Unique Radio Innovation For The 21st Century, Rajit Gadh, George Roussos, K. Michael, George Q. Huang, Shiv Prabhu, Peter Chu

Professor Katina Michael

In 1948, the Proceedings of the Institute of Radio Engineers published Harry Stockman’s seminal work on “communication by means of reflected power,” which many consider as the first paper on RFID. The paper concluded by expressing the expectation that “considerable research and development work has to be done before the remaining basic problems in reflected-power communication are solved, and before the field of useful applications is explored.” It is only appropriate that after more than 60 years following the publication of this work by its progenitor, in this special issue the Proceedings of the IEEE review current developments towards the …


Protecting Privacy And Ensuring Security Of Rfid Systems Using Private Authentication Protocols, Md. Endadul Hoque Aug 2010

Protecting Privacy And Ensuring Security Of Rfid Systems Using Private Authentication Protocols, Md. Endadul Hoque

Master's Theses (2009 -)

Radio Frequency IDentification (RFID) systems have been studied as an emerging technology for automatic identification of objects and assets in various applications ranging from inventory tracking to point of sale applications and from healthcare applications to e-passport. The expansion of RFID technology, however, gives rise to severe security and privacy concerns. To ensure the widespread deployment of this technology, the security and privacy threats must be addressed. However, providing solutions to the security and privacy threats has been a challenge due to extremely inadequate resources of typical RFID tags. Authentication protocols can be a possible solution to secure RFID communications. …


Towards Secure And Scalable Tag Search Approaches For Current And Next Generation Rfid Systems, Farzana Rahman Aug 2010

Towards Secure And Scalable Tag Search Approaches For Current And Next Generation Rfid Systems, Farzana Rahman

Master's Theses (2009 -)

The technology behind Radio Frequency Identification (RFID) has been around for a while, but dropping tag prices and standardization efforts are finally facilitating the expansion of RFID systems. The massive adoption of this technology is taking us closer to the well known ubiquitous computing scenarios. However, the widespread deployment of RFID technology also gives rise to significant user security issues. One possible solution to these challenges is the use of secure authentication protocols to protect RFID communications. A natural extension of RFID authentication is RFID tag searching, where a reader needs to search for a particular RFID tag out of …


Driving Retail Sales Through Effective Supply Chain Management Technology, James Haws Jul 2010

Driving Retail Sales Through Effective Supply Chain Management Technology, James Haws

Regis University Student Publications (comprehensive collection)

Supply chain management coordinates the production and distribution of a product with the goal of increasing profitability and productivity. Advancements in technology and workflows in recent years have enabled distributors, suppliers, and retailers to operate more efficiently and effectively. Although significant technological advancements have been made in supply chain management, inventory management still causes a number of problems for retailers. The average out-of -stock rate nationally is approximately at an 8% level (Corsten & Gruen, 2003). Inadequate inventory management can reduce retail sales, drive up costs associated with transportation and storage, decrease customer loyalty, and ultimately lead to a significant …


The Diffusion Of Rfid Implants For Access Control And Epayments: Case Study On Baja Beach Club In Barcelona, K. Michael, M.G. Michael Jun 2010

The Diffusion Of Rfid Implants For Access Control And Epayments: Case Study On Baja Beach Club In Barcelona, K. Michael, M.G. Michael

M. G. Michael

RFID implants for humans have been used in a variety of contexts since their commercial inception in 2003. The VeriChip product which typically carries a 16 digit number was first marketed as an identification device in the ehealth space (e.g. for emergency response), then as an access control mechanism (e.g. security), and finally as an epayment solution (e.g. the purchase of drinks at clubs). This paper investigates the story behind RFID implants for club patronage access control and epayment. The study uses a two-fold qualitative approach in the collection of data for the single case study of the Baja Beach …


The Diffusion Of Rfid Implants For Access Control And Epayments: Case Study On Baja Beach Club In Barcelona, K. Michael, M.G. Michael Jun 2010

The Diffusion Of Rfid Implants For Access Control And Epayments: Case Study On Baja Beach Club In Barcelona, K. Michael, M.G. Michael

Professor Katina Michael

RFID implants for humans have been used in a variety of contexts since their commercial inception in 2003. The VeriChip product which typically carries a 16 digit number was first marketed as an identification device in the ehealth space (e.g. for emergency response), then as an access control mechanism (e.g. security), and finally as an epayment solution (e.g. the purchase of drinks at clubs). This paper investigates the story behind RFID implants for club patronage access control and epayment. The study uses a two-fold qualitative approach in the collection of data for the single case study of the Baja Beach …


Revisiting Unpredictability-Based Rfid Privacy Models, Junzuo Lai, Robert Huijie Deng, Yingjiu Li Jun 2010

Revisiting Unpredictability-Based Rfid Privacy Models, Junzuo Lai, Robert Huijie Deng, Yingjiu Li

Research Collection School Of Computing and Information Systems

Recently, there have been several attempts in establishing formal RFID privacy models in the literature. These models mainly fall into two categories: one based on the notion of indistinguishability of two RFID tags, denoted as ind-privacy, and the other based on the unpredictability of the output of an RFID protocol, denoted as unp-privacy. Very recently, at CCS’09, Ma et al. proposed a modified unp-privacy model, referred to as unp -privacy. In this paper, we first revisit the existing RFID privacy models and point out their limitations. We then propose a new RFID privacy model, denoted as …


Rfid-Enabled Warehouse Process Optimization In The Tpl Industry, S. F. Wamba, A. T. Chatfield Jan 2010

Rfid-Enabled Warehouse Process Optimization In The Tpl Industry, S. F. Wamba, A. T. Chatfield

Dr Samuel Fosso Wamba

Using the value chain model and a longitudinal real-world case study of a third-party logistics (TPL) supply chain, this study provides support for the enabling role of RFID technology in effecting warehouse process optimization. Furthermore, the findings of our study reveal the RFID technology implementation costs as the key inhibitors factor of RFID widespread adoption and usage among suppliers.


Rfid-Enabled Inventory Control Optimization: A Proof Of Concept In A Small-To-Medium Retailer, H. Dane, Katina Michael, S. F. Wamba Jan 2010

Rfid-Enabled Inventory Control Optimization: A Proof Of Concept In A Small-To-Medium Retailer, H. Dane, Katina Michael, S. F. Wamba

Dr Samuel Fosso Wamba

This study examines the impact of radio-frequency identification (RFID) technology on the inventory control practices of a small-to-medium retailer using a proof of concept (PoC) approach. The exploratory study was conducted using a single case study of a hardware retailer stocking 5000 product lines provided by 110 active suppliers. To analyze the present mode of operation, procedural documents, semi-structured interviews and a participant observation was conducted. The basis for the proof of concept was a future mode of operation using a quasi-experimental design. Results indicate that in a small-to-medium retail environment, RFID technology could act as a loss prevention mechanism, …


Rfid-Enabled Warehouse Optimization: Lessons From Early Adopters In The 3pl Industry, S. F. Wamba, T. R. Coltman, Katina Michael Jan 2010

Rfid-Enabled Warehouse Optimization: Lessons From Early Adopters In The 3pl Industry, S. F. Wamba, T. R. Coltman, Katina Michael

Dr Samuel Fosso Wamba

This paper presents the impact of RFID technology on the picking and shipping processes of one RFID-enabled warehouse in the 3PL industry. The findings from our study confirm initial results from many studies where RFID implementation has been shown to enable business process redesign, improve data quality, real-time data collection and synchronization and enhance system integration. In this study we show that the full potential of RFID technology is dependent upon the involvement of all supply chain members involved in implementation. Moreover, firms considering implementing RFID technology need to take into account their investment in complementary assets such as employee …


Understanding The Impact Of Emerging Technologies On Process Optimization: The Case Of Rfid Technology, S. F. Wamba, Y. Bendavid Jan 2010

Understanding The Impact Of Emerging Technologies On Process Optimization: The Case Of Rfid Technology, S. F. Wamba, Y. Bendavid

Dr Samuel Fosso Wamba

This paper examines the case of one supply chain in the electricity sector where RFID technology integrated with firm’s information systems acts as an enabler of process optimization. Using a business process approach and laboratory simulation, we explain how the implementation of RFID technology can increase the visibility of information at various layers of the supply chain, allowing members to gather precise information on real demand and improve replenishment processes. On the other hand, while RFID technology has the potential to automate some processes, human intervention is still required. Therefore, use case scenarios and sensitivity analysis should be carefully considered …


An Information System Design Theory For And Rfid University-Based Laboratory, S. F. Wamba, Katina Michael Jan 2010

An Information System Design Theory For And Rfid University-Based Laboratory, S. F. Wamba, Katina Michael

Dr Samuel Fosso Wamba

RFID technology is defined as a wireless automatic identification and data capture (AIDC) technology and is considered as “the next big thing” in the management and “the next revolution in supply chain”. Recently, the topic has attracted the interest of the industrial community as well as the scientific community. Following this tendency, this paper applies an Information Systems Design Theory (ISDT) for an RFID-based University Laboratory. For practitioners, the paper provides some insights into the set-up and use of RFID laboratory in university settings, and at the same time, it offers a set of hypotheses that can be empirically tested.


E-Government Challenge In Disaster Evacuation Response: The Role Of Rfid Technology In Building Safe And Secure Local Communities, A. Chatfield, S. F. Wamba, T. Hirokazu Jan 2010

E-Government Challenge In Disaster Evacuation Response: The Role Of Rfid Technology In Building Safe And Secure Local Communities, A. Chatfield, S. F. Wamba, T. Hirokazu

Dr Samuel Fosso Wamba

While geographic information systems (GIS) can provide information on the static locations of critical infrastructure and evacuation routes, they do not provide the dynamically changing locations of things and people on the move. In contrast, radio frequency identification (RFID) wireless network technology can automatically identify and track the movement of assets (i.e., fire engines, ambulances, and rescue workers) and vulnerable citizens on the move (i.e., the elderly and the disabled), and hence providing local governments and communities with real-time information and enhanced decision-making capabilities, during chaotic disaster response operations (i.e., evacuation). Although the potential high impact and strategic value of …


E-Government Challenge In Disaster Evacuation Response: The Role Of Rfid Technology In Building Safe And Secure Local Communities, A. Chatfield, S. F. Wamba, T. Hirokazu Jan 2010

E-Government Challenge In Disaster Evacuation Response: The Role Of Rfid Technology In Building Safe And Secure Local Communities, A. Chatfield, S. F. Wamba, T. Hirokazu

Faculty of Informatics - Papers (Archive)

While geographic information systems (GIS) can provide information on the static locations of critical infrastructure and evacuation routes, they do not provide the dynamically changing locations of things and people on the move. In contrast, radio frequency identification (RFID) wireless network technology can automatically identify and track the movement of assets (i.e., fire engines, ambulances, and rescue workers) and vulnerable citizens on the move (i.e., the elderly and the disabled), and hence providing local governments and communities with real-time information and enhanced decision-making capabilities, during chaotic disaster response operations (i.e., evacuation). Although the potential high impact and strategic value of …


Rfid-Enabled Warehouse Process Optimization In The Tpl Industry, S. F. Wamba, A. T. Chatfield Jan 2010

Rfid-Enabled Warehouse Process Optimization In The Tpl Industry, S. F. Wamba, A. T. Chatfield

Faculty of Informatics - Papers (Archive)

Using the value chain model and a longitudinal real-world case study of a third-party logistics (TPL) supply chain, this study provides support for the enabling role of RFID technology in effecting warehouse process optimization. Furthermore, the findings of our study reveal the RFID technology implementation costs as the key inhibitors factor of RFID widespread adoption and usage among suppliers.


Rfid-Enabled Inventory Control Optimization: A Proof Of Concept In A Small-To-Medium Retailer, H. Dane, Katina Michael, S. F. Wamba Jan 2010

Rfid-Enabled Inventory Control Optimization: A Proof Of Concept In A Small-To-Medium Retailer, H. Dane, Katina Michael, S. F. Wamba

Faculty of Informatics - Papers (Archive)

This study examines the impact of radio-frequency identification (RFID) technology on the inventory control practices of a small-to-medium retailer using a proof of concept (PoC) approach. The exploratory study was conducted using a single case study of a hardware retailer stocking 5000 product lines provided by 110 active suppliers. To analyze the present mode of operation, procedural documents, semi-structured interviews and a participant observation was conducted. The basis for the proof of concept was a future mode of operation using a quasi-experimental design. Results indicate that in a small-to-medium retail environment, RFID technology could act as a loss prevention mechanism, …


An Analysis Of The Radio Frequency Identification (Rfid) Technology Implementation Within An Independent Public Library System: A Case Study Of The North Canton, Ohio Public Library, Keith P. Lyons Jan 2010

An Analysis Of The Radio Frequency Identification (Rfid) Technology Implementation Within An Independent Public Library System: A Case Study Of The North Canton, Ohio Public Library, Keith P. Lyons

CCE Theses and Dissertations

An Analysis of the Radio Frequency Identification (RFID) Technology Implementation within an Independent Public Library System:

A Case Study of the North Canton, Ohio Public Library

by

Keith P. Lyons

June 2010

Public libraries require efficient control systems to maintain accurate inventories, statistics, and records of patron borrowing. Generally, public libraries use barcode technology to accomplish these tasks. Radio frequency identification (RFID) has gained the attention of public library personnel in recent years as a replacement for barcodes. RFID implementation contributes to improved staff productivity, increased operational efficiency, and improved item security as well. While potential benefits are significant, issues …


A Survey And Tutorial Of Rfid Anti-Collision Protocols, Dheeraj K. Klair, Kwan-Wu Chin, Raad Raad Jan 2010

A Survey And Tutorial Of Rfid Anti-Collision Protocols, Dheeraj K. Klair, Kwan-Wu Chin, Raad Raad

Faculty of Informatics - Papers (Archive)

RFID technologies have revolutionized the asset tracking industry, with applications ranging from automated checkout to monitoring the medication intakes of elderlies. In all these applications, fast, and in some cases energy efficient, tag reading is desirable, especially with increasing tag numbers. In practice, tag reading protocols face many problems. A key one being tag collision, which occurs when multiple tags reply simultaneously to a reader. As a result, an RFID reader experiences low tag reading performance, and wastes valuable energy. Therefore, it is important that RFID application developers are aware of current tag reading protocols. To this end, this paper …


Unveiling The Potential Of Rfid-Enabled Intelligent Patient Management : Results Of A Delphi Study, S. F. Wamba, E. W. T. Ngai Jan 2010

Unveiling The Potential Of Rfid-Enabled Intelligent Patient Management : Results Of A Delphi Study, S. F. Wamba, E. W. T. Ngai

Faculty of Informatics - Papers (Archive)

Information technology (IT) in general, and radio frequency identification (RFID) technology in particular, are considered as key enablers of healthcare sector transformation in terms of better quality of care, improved patient management, and increased healthcare efficiency and effectiveness. There is, however, a shortage of studies on the impact of RFID technology on patient management-related processes. This study intends to fill this knowledge gap in literature by unveiling the potential of RFID-enabled intelligent patient management. Twelve patient management-related processes are identified, followed by the assessment of the impact of RFID on the said processes by a panel of experts using a …


Social-Technical Issues Facing The Humancentric Rfid Implantee Sub-Culture Through The Eyes Of Amal Graafstra, Amal Graafstra, Katina Michael, M G. Michael Jan 2010

Social-Technical Issues Facing The Humancentric Rfid Implantee Sub-Culture Through The Eyes Of Amal Graafstra, Amal Graafstra, Katina Michael, M G. Michael

Faculty of Informatics - Papers (Archive)

Radio-frequency identification (RFID) tags and transponders have traditionally been used to identify domesticated animals so that they can be reunited with their owners in the event that they stray. In the late 1990s, industry started to investigate the benefits of using RFID to identifying non-living things throughout the supply chain toward new efficiencies in business operations. Not long after, people began to consider the possibilities of getting RFID tag or transponder implants for themselves. Mr Amal Graafstra of the United States is one of the first, and probably most well-known ‘do it yourselfer’ (DIY) implantees, who enjoys building customized projects …


Evidential Recovery In A Rfid Business System, Brian Cusack, Ar Kar Ayaw Jan 2010

Evidential Recovery In A Rfid Business System, Brian Cusack, Ar Kar Ayaw

Australian Digital Forensics Conference

Efficient stock management in the commercial retail sector is being dominated by Radio Frequency Identification (RFID) tag implementations. Research reports of the security risk of RFID tags show that breaches are likely and that forensic readiness is a requirement. In this paper a RFID tag business simulation is reported that replicates previous research reports of security breaches with the purpose of identifying potential evidence after such attacks. A Read/Write Tag was cloned and used to replicate a SQL poisoning attack on a simulated Business System. A forensic investigation was then undertaken to identify potential locations for evidential recovery. This paper …


An Rfid Based Indoor Tracking Method For Navigating Visually Impaired People, Ruşen Öktem, Eli̇f Aydin Jan 2010

An Rfid Based Indoor Tracking Method For Navigating Visually Impaired People, Ruşen Öktem, Eli̇f Aydin

Turkish Journal of Electrical Engineering and Computer Sciences

This paper tackles the RFID based tracking problem in an obscured indoor environment. The proposed solution is an integral part of a navigation aid for guiding visually impaired people in a store. It uses RF signal strengths and is based on the Bayes Decision Theory. An observation vector is formed by received radio signal strength indication values, transmitted from three transmitters at distinct frequencies in the UHF band. The indoor area is divided into square grids, where each grid is considered as a class. The problem of tracking is expressed as classifying the observed radio signal strengths to the most …


Vulnerability Analysis Of Rfid Protocols For Tag Ownership Transfer, Pedro Peris-Lopez, Julio Hernandez-Castro, Juan Tapiador, Tieyan Li, Yingjiu Li Jan 2010

Vulnerability Analysis Of Rfid Protocols For Tag Ownership Transfer, Pedro Peris-Lopez, Julio Hernandez-Castro, Juan Tapiador, Tieyan Li, Yingjiu Li

Research Collection School Of Computing and Information Systems

In RFIDSec’08, Song proposed an ownership transfer scheme, which consists of an ownership transfer protocol and a secret update protocol [7]. The ownership transfer protocol is completely based on a mutual authentication protocol proposed in WiSec’08 [8]. In Rizomiliotis et al. (2009) [6], van Deursen and Radomirovic (2008), the first weaknesses to be identified (tag and server impersonation) were addressed and this paper completes the consideration of them all. We find that the mutual authentication protocol, and therefore the ownership transfer protocol, possesses certain weaknesses related to most of the security properties initially required in protocol design: tag information leakage, …


Security And Performance Analysis For Rfid Protocols, Bing Liang Jan 2010

Security And Performance Analysis For Rfid Protocols, Bing Liang

Dissertations and Theses Collection (Open Access)

Radio Frequency Identification (RFID) is an advanced object identification technology that has already been applied in various industries. However, the insecure nature of the communication channel between readers and tags makes RFID systems vulnerable to various kinds of attacks. In recent years, many new methods have been proposed to improve the security of RFID systems, such as disabling tags, agent management and establishing cryptographic protocols. Among them, we focus on the last approach, which is more economic and convenient in certain cases. The first part of our work is to categorize typical existing RFID protocols according to their security levels. …