Теми рефератів
> Реферати > Курсові роботи > Звіти з практики > Курсові проекти > Питання та відповіді > Ессе > Доклади > Учбові матеріали > Контрольні роботи > Методички > Лекції > Твори > Підручники > Статті Контакти
Реферати, твори, дипломи, практика » Курсовые проекты » Radio Frequency Identification Technology

Реферат Radio Frequency Identification Technology





"justify">" WORM (Write Once Read Many) except the unique identifier tags contains such a write-once memory unit, which can then be read repeatedly.

RW (Read and Write) such tags contain an identifier and a memory unit to read/write data. The data therein may be overwritten by a large number of times.execution: adhesive paper or mylar tags; Standard plastic cards; Disk labels; Different kinds of trinkets; Special version for harsh environments.the moment there is a huge variety of labels, so you can pick the right performance for every task, depending on the needs of the customer.


1.2 The overall architecture of RFID-systems

RFID system mainly consists of two parts: the Reader and the RFID Tag, between them through radio frequency way to communication. Each tag has a unique electronic code, be attached to each object to identify the different objects, and some labels can also store related objects of simple information. Reader will launch to label read signals, and receive tag Morris information, then carries on the preliminary treatment of information and send back backend systems. A typical RFID system structure is shown in Figure 1.


Fig. 1. RFID system structure

working principle of RFID is: the reader sends out radio waves of specific frequency energy to the electronic tags, electronic tag receives the radio waves. If is a passive tag, the induced current obtained with the energy stored in the chip information sent to the reader, if is an active tags, the active information in the chip of a particular frequency of the signal sent to the reader. Reader receives the feedback signal sent to the information system for processing.with other identification technology, RFID identification system have more advantages, such as no-contact, high degree of automation, durable and reliable, recognition speed, adapt the working environment, enabling both high speed and multi-tag identification and so on. Meanwhile, it does not need artificial view that manufactures barcode which saves Labour costs, and solved the two difficult problems in retail: out of stock and loss of goods (due to theft and supply chain to be disturbed for the loss of product) (Z. Mingxiu, 2012, p. 3).



1.3 Reader


Mandatory element of the RFID system is the reader that provides access to information stored on the transponder. The reader generates an electromagnetic field that activates the transponder. It, in turn, transmits the coded information reader. Depending on the bandwidth and the type of transponder data can be read at distances from a few centimeters to several meters. Are stationary and mobile.


1.4 RFID standards


Standard ISO 15693 (13.56 MHz) standard ISO 18000 (860 MHz) common technology, characterized by difficulties counterfeit labels. Best examples of tags can operate at a distance of 1 meter. The most promising technology, wherein increased reading speed, as well as a range of from 1 to 7 meters without line of sight.


1.5 RFID Security Threats

security threats to RFID technology can be put into several classes; Sniffing (or Eavesdropping), Spoofing, Cloning, Replay, Relay, and Denial of service attacks. The highest levels of security risks to an RFID network are sniffing and eavesdropping attacks. Eavesdropping/sniffing is an unauthorized access to tags. A rogue reader can read a tag and record information that may be sensitive and confidential. Spoofing attacks involve secretly scanning as well. It is not only recording a data transmission from a legitimate tag but also copying the original tag s ID and making itself appear to be valid. Replay attack involves using a tag s response to a rogue reader s challenge to impersonate the tag. Relay attacks are alike to the replay attack but it delays the valid tag to response to the authentic reader. The last type of threat is the denial of service attack. It is against the accessibility of the RFID system and can hit any portion of the system (tag, reader, and controller-backend computers), such as removing the RFID tag from merchandise before it is checked out of the store, and swapping and placing tags on merchandise that has a lower cost. All attacks affect database integrity on the backend systems because of the inventory mismatches. (L. Burton, 2013, p. 3)



2. Software

component integration with the accounting system of the developers involved in decisions (Solution Providers), such as Taxonomy. Professionally built system does not require retraining of personnel, not force transfer/convert data without disrupting the normal rhythm of t...


Назад | сторінка 2 з 4 | Наступна сторінка





Схожі реферати:

  • Реферат на тему: Застосування RFID-технології в логістиці і складуванні
  • Реферат на тему: Технологія радіочастотної ідентифікації (RFID-технології)
  • Реферат на тему: Підвищення ефективності вантажних операцій шляхом застосування системи RFID ...
  • Реферат на тему: Information Society Concept
  • Реферат на тему: System and structure of the constitutional law of Ukraine: theoretic and me ...