www.nature.com/scientificreports OPEN PATL: A RFID Tag Localization based on Phased Array Antenna received: 17 October 2016 accepted: 06 February 2017 Published: 15 March 2017 Lanxin Qiu1,2,*, Xiaoxuan Liang1,2,* & Zhangqin Huang1,2 In RFID systems, how to detect the position ...
Oh and remember that this sort of “supply chain attack” is far from new there was a case in the UK where tiny mobile radio devices were installed in those supposedly secure “Electronic Point of Payment”(ePOS) systems of a major UK supermarket chain by we assume criminals in China as ...
In RFID systems, how to detect the position precisely is an important and challenging research topic. In this paper, we propose a range-free 2D tag localization method based on phased array antenna, called PATL. This method takes advantage of the adjusta
Yeah, three independently developed systems and a voting protocol. Remember last time you brought this up I pointed out that it’s developed into a new approach to COTS security called security through diversity. The idea is to reduce the effectiveness of exploits without really getting the develo...
Keywords: RFID; authentication; biometric information 1. Introduction With the rapid development of modern technology, new automatic identification technologies emerge in endlessly, among which radio frequency identification (RFID) technology has become the core technology of the Internet of Things with its...
2.1. RFID Technology RFID systems consist, in general, of three components: a tag, which is attached to an object; a reader; and a database. The tag communicates with the receiver using radio frequency signals. Some tags are powered with a power source, while some are not, relying on th...
With the development and integration of IoT perception technology in industries, UHF RFID is widely used in various industry fields with its advantages of low cost, fast, and long–distance batch identification [1,2,3]. The typical application modes for passive UHF RFID are usually gate–type ...
Rf-ecg: Heart rate variability assessment based on cots rfid tag array. In Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies; Association for Computing Machinery: New York, NY, USA, 2018; Volume 2, pp. 1–26. [Google Scholar] Yang, B.; Yu, C.; Dong,...
Additionally, some approaches may require active cooperation from the user, for example, in vision systems, where the user must maintain a specific posture or wear specific clothing. Some sensors, such as WiFi and RFID, may be at risk of privacy leakage, potentially revealing the user’s ...
Today, military and homeland security are struggling to equip its workforce with the basic functions provided by COTS technologies, i.e., commercial smart phones or Radio-frequency identification (RFID). Indeed, defense continues to drive innovation regarding advanced sensors, surveillance and ...