Innovative RFID Applications

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Electrical, Electronics and Communications Engineering".

Deadline for manuscript submissions: closed (31 December 2018) | Viewed by 31673

Special Issue Editor


E-Mail Website
Guest Editor
Department of Computer Education, Jeju National University, Jeju City, Korea
Interests: computer education; M2M; IoT; O2N and related security issues; WSN; mobile/wireless networks and related security issues
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

A Fourth Industrial Revolution is currently building on the Third—the digital revolution that has been occurring since the middle of the last century. It is characterized by a fusion of technologies that is blurring the lines between the physical, digital, and biological spheres. Internet of Small Things (IoST) represents an emerging era of networking that connects a variety of common appliances to one another, as well as with the rest of the Internet, to vastly improve our lives. Industrial and research organizations expect that tens of billions of daily life objects can communicate with each other in the near future for the realization of a hyper-connected society that is called the Internet of Small Things (IoST).

This Special Issue offers an overview of ongoing research on innovative RFID application techniques, and brings together cutting-edge research work on security and privacy problems with respect to technological, behavioral, legal, and cultural aspects. We anticipate that innovative RFID application techniques will soon be adopted to large networked systems, and we believe that the role of the IoST becomes very important in this context. This Special Issue aims to highlight the latest research results and advances on various innovative RFID processing algorithms, architectures, and technologies for innovative RFID applications systems, sensor data fusion, and processing at node side (client) or host side in the IoST, and especially their applications in the IoT environment. It will include related topics to demonstrate pioneering work in this field, to investigate novel solutions, and to discuss the performance analysis. Contributions containing novel and original findings in this field are welcome.

Submitted papers may focus on original work in innovative RFID sensor data fusion and processing at node side (client) or host side in IoST, power-efficient implementation of innovative RFID protocols, algorithms for the IoST, and secure application case studies. Both theoretical and technical papers are welcome. Original contributions showing practical approaches are also welcome.

Potential topics include, but are not limited to:

  • Software architecture of an embedded system for innovative RFID applications
  • Fast and complexity-awareness algorithms for real-time innovative RFID applications
  • Signal optimization techniques for innovative RFID applications
  • Privacy issues, protocols, and algorithms for IoST, RFID
  • Privacy and security metrics and quantification in innovative RFID sensor networks
  • Security issues, protocols, and algorithms for innovative RFID, IoST
  • Sensors data fusion and processing at node side (client) or host side in innovative RFID, IoST
  • Power-efficient implementation of new protocol and algorithms for innovative RFID, IoST
  • Secure application case studies
  • Standardization initiatives
  • Architectural performance evaluation of system
  • Big data analysis technique on smart surveillance systems and application in innovative RFID, IoST

Prof. Dr. Namje Park
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Innovative RFID
  • RFID Sensor
  • Internet of Small Things (IoST)
  • Internet-of-Things (IoT)
  • RFID Big data analysis
  • Performance evaluation of Innovative RFID
  • Complexity-awareness algorithms
  • RFID Privacy issues
  • Power-efficient implementation

Published Papers (5 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

12 pages, 3429 KiB  
Article
Improved Anti-Collision Algorithm for the Application on Intelligent Warehouse
by Yishu Qiu, Yezi Xu, Lvqing Yang, Jinsheng Lu and Dingzhao Li
Appl. Sci. 2019, 9(8), 1596; https://doi.org/10.3390/app9081596 - 17 Apr 2019
Cited by 5 | Viewed by 2541
Abstract
As an important part of economic development, warehousing logistics also needs to be transformed and upgraded in order to adapt to the development of the new situation. The RFID reader records the related information of the goods to improve the efficiency of warehouse [...] Read more.
As an important part of economic development, warehousing logistics also needs to be transformed and upgraded in order to adapt to the development of the new situation. The RFID reader records the related information of the goods to improve the efficiency of warehouse operation by identifying the RFID tags attached to the goods in batches. This paper also proposes an improved group-based anti-collision algorithm (GMQT) to solve the problem of tag collision in the process of Radio Frequency Identification (RFID) identification. The simulation results show that the GMQT algorithm improves the recognition efficiency of the system. The algorithm has the advantages of small data transmission and stable performance; in particular, the recognition efficiency is not affected by the number of tags. Full article
(This article belongs to the Special Issue Innovative RFID Applications)
Show Figures

Figure 1

21 pages, 3624 KiB  
Article
False Positive RFID Detection Using Classification Models
by Ganjar Alfian, Muhammad Syafrudin, Bohan Yoon and Jongtae Rhee
Appl. Sci. 2019, 9(6), 1154; https://doi.org/10.3390/app9061154 - 19 Mar 2019
Cited by 34 | Viewed by 6866
Abstract
Radio frequency identification (RFID) is an automated identification technology that can be utilized to monitor product movements within a supply chain in real-time. However, one problem that occurs during RFID data capturing is false positives (i.e., tags that are accidentally detected by the [...] Read more.
Radio frequency identification (RFID) is an automated identification technology that can be utilized to monitor product movements within a supply chain in real-time. However, one problem that occurs during RFID data capturing is false positives (i.e., tags that are accidentally detected by the reader but not of interest to the business process). This paper investigates using machine learning algorithms to filter false positives. Raw RFID data were collected based on various tagged product movements, and statistical features were extracted from the received signal strength derived from the raw RFID data. Abnormal RFID data or outliers may arise in real cases. Therefore, we utilized outlier detection models to remove outlier data. The experiment results showed that machine learning-based models successfully classified RFID readings with high accuracy, and integrating outlier detection with machine learning models improved classification accuracy. We demonstrated the proposed classification model could be applied to real-time monitoring, ensuring false positives were filtered and hence not stored in the database. The proposed model is expected to improve warehouse management systems by monitoring delivered products to other supply chain partners. Full article
(This article belongs to the Special Issue Innovative RFID Applications)
Show Figures

Graphical abstract

19 pages, 660 KiB  
Article
Novel Designated Ownership Transfer with Grouping Proof
by Kuo-Yu Tsai, Ming Hour Yang, Jia Ning Luo and Wei-Tim Liew
Appl. Sci. 2019, 9(4), 724; https://doi.org/10.3390/app9040724 - 19 Feb 2019
Cited by 10 | Viewed by 2312
Abstract
In the supply chain management literature, various mobile radio frequency identification (RFID) protocols have been proposed for minimizing cargo theft during transport while ensuring the integrity of the entire cargo load or transferring ownership of a tagged item to another owner. These protocols [...] Read more.
In the supply chain management literature, various mobile radio frequency identification (RFID) protocols have been proposed for minimizing cargo theft during transport while ensuring the integrity of the entire cargo load or transferring ownership of a tagged item to another owner. These protocols are generally called grouping proof protocols and ownership transfer protocols, respectively. However, no protocol has been proposed that can achieve both requirements. In this paper, we propose a novel designated ownership transfer with grouping proof protocol that simultaneously generates grouping proofs and authenticates the consistency between the receipt proof and pick proof while ensuring that ownership of the cargo is transferred to the new designated owner in one attempt. In addition, the proposed scheme is robust against attacks (such as replay, denial-of-service, and denial-of-proof attacks) and has security features, such as forward/backward secrecy and message integrity. Full article
(This article belongs to the Special Issue Innovative RFID Applications)
Show Figures

Figure 1

11 pages, 3370 KiB  
Article
Application of RFID to Soil-Erosion Research
by Anthony Parsons, James Cooper, Yuichi Onda and Naoki Sakai
Appl. Sci. 2018, 8(12), 2511; https://doi.org/10.3390/app8122511 - 06 Dec 2018
Cited by 7 | Viewed by 2631
Abstract
Soil erosion is a problem of global significance; yet obtaining data on rates of soil erosion is not straightforward. Radio-Frequency Identification (RFID) offers the prospect of improvements in estimates of these rates through better understanding of the movement of individual soil particles. We [...] Read more.
Soil erosion is a problem of global significance; yet obtaining data on rates of soil erosion is not straightforward. Radio-Frequency Identification (RFID) offers the prospect of improvements in estimates of these rates through better understanding of the movement of individual soil particles. We report on two laboratory experiments to measure the travel distances of surrogate soil particles during erosion events. In the first experiment, we used RFID tags that need to be placed within a reader for identification. In the second, we used tags with a booster antenna that allowed remote detection. The recovery rate of particles in the first experiment was 81.7%. Most likely, lost particles were buried by other moving sediment. The distribution of travel distances is well fitted by a Burr 4-parameter distribution which lends support to its use for modelling travel distances of eroded particles. In the second experiment, the average distance from which particles could be detected was 62 mm and the average error in locating particles was 17.9 mm. We attribute much of this error to the assumptions that the detection field is a circle on the ground with the reader at its centre, and that the same detection range exists for all positions of the reader. RFID is shown to provide insights into the movement of individual soil particles, but improvements are needed in both particle detection range and modelling of soil particle movement before the full potential of RFID for measuring soil erosion can be realized. Full article
(This article belongs to the Special Issue Innovative RFID Applications)
Show Figures

Figure 1

28 pages, 1120 KiB  
Article
A Comparison of RFID Anti-Collision Protocols for Tag Identification
by Nikola Cmiljanic, Hugo Landaluce and Asier Perallos
Appl. Sci. 2018, 8(8), 1282; https://doi.org/10.3390/app8081282 - 01 Aug 2018
Cited by 12 | Viewed by 16711
Abstract
Radio Frequency Identification (RFID) is a technology that uses radio frequency signals to identify objects. RFID is one of the key technologies used by the Internet of Things (IoT). This technology enables communication between the main devices used in RFID, the reader and [...] Read more.
Radio Frequency Identification (RFID) is a technology that uses radio frequency signals to identify objects. RFID is one of the key technologies used by the Internet of Things (IoT). This technology enables communication between the main devices used in RFID, the reader and the tags. The tags share a communication channel. Therefore, if several tags attempt to send information at the same time, the reader will be unable to distinguish these signals. This is called the tag collision problem. This results in an increased time necessary for system identification and energy consumption. To minimize tag collisions, RFID readers must use an anti-collision protocol. Different types of anti-collision protocols have been proposed in the literature in order to solve this problem. This paper provides an update including some of the most relevant anti-collision protocols. Full article
(This article belongs to the Special Issue Innovative RFID Applications)
Show Figures

Figure 1

Back to TopTop