RFID Applications and Security Review
Abstract
:1. Introduction
2. Materials and Methods
Data Description
3. RFID Applications
3.1. Internet of Things (IoT)
3.2. Supply Chain Management (SCM)
3.3. Localization
3.4. Traceability
3.5. Logistics Management
3.6. Ubiquitous Computing
3.7. Healthcare
3.8. Access Control
4. Security and Privacy
4.1. Authentication
4.2. Ownership Transfer
5. Discussion
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Zhong, R.Y.; Lan, S.; Xu, C.; Dai, Q.; Huang, G.Q. Visualization of RFID-enabled shopfloor logistics Big Data in Cloud Manufacturing. Int. J. Adv. Manuf. Technol. 2016, 84, 5–16. [Google Scholar] [CrossRef]
- Zhong, R.Y.; Xu, C.; Chen, C.; Huang, G.Q. Big Data Analytics for Physical Internet-based intelligent manufacturing shop floors. Int. J. Prod. Res. 2017, 55, 2610–2621. [Google Scholar] [CrossRef]
- Gaukler, G.M.; Seifert, R.W.; Hausman, W.H. Item-level RFID in the retail supply chain. Prod. Oper. Manag. 2007, 16, 65–76. [Google Scholar] [CrossRef] [Green Version]
- Loebbecke, C.; Huyskens, C.; Gogan, J. Emerging technologies in the service sector: An early exploration of item-level RFID on the fashion sales floor. In Proceedings of the International Working Conference on Information Technology in the Service Economy—Challenges and Possibilities for the 21st Century, Toronto, ON, Canada, 10–13 August 2008; Springer: Berlin/Heidelberg, Germany, 2008; Volume 267, pp. 189–198. [Google Scholar] [CrossRef] [Green Version]
- Velandia, D.M.S.; Kaur, N.; Whittow, W.G.; Conway, P.P.; West, A.A. Towards industrial internet of things: Crankshaft monitoring, traceability and tracking using RFID. Robot.-Comput.-Integr. Manuf. 2016, 41, 66–77. [Google Scholar] [CrossRef] [Green Version]
- Zhai, C.; Zou, Z.; Zhou, Q.; Mao, J.; Chen, Q.; Tenhunen, H.; Zheng, L.; Xu, L. A 2.4-GHz ISM RF and UWB hybrid RFID real-time locating system for industrial enterprise Internet of Things. Enterp. Inf. Syst. 2017, 11, 909–926. [Google Scholar] [CrossRef]
- Yang, L.; Chen, Y.; Li, X.Y.; Xiao, C.; Li, M.; Liu, Y. Tagoram: Real-Time Tracking of Mobile RFID Tags to High Precision Using COTS Devices. In Proceedings of the 20th ACM Annual International Conference on Mobile Computing and Networking (MobiCom), Maui, HI, USA, 7–11 September 2014; Association for Computing Machinery Learned Society: New York, NY, USA, 2014; pp. 237–248. [Google Scholar] [CrossRef]
- Amendola, S.; Lodato, R.; Manzari, S.; Occhiuzzi, C.; Marrocco, G. RFID Technology for IoT-Based Personal Healthcare in Smart Spaces. IEEE Internet Things J. 2014, 1, 144–152. [Google Scholar] [CrossRef]
- Jara, A.J.; Zamora, M.A.; Skarmeta, A.F.G. An internet of things-based personal device for diabetes therapy management in ambient assisted living (AAL). Pers. Ubiquitous Comput. 2011, 15, 431–440. [Google Scholar] [CrossRef]
- Nambiar, A.N. RFID Technology: A Review of its Applications. In Proceedings of the World Congress on Engineering and Computer Science, San Francisco, CA, USA, 20–22 October 2009; International Association of Engineers: Hong Kong, China, 2009; pp. 1253–1259. [Google Scholar]
- Thakare, Y.; Musale, S.; Ganorkar, S. A technological review of RFID & applications. In Proceedings of the IET Conference on Wireless, Mobile and Multimedia Networks, Mumbai, India, 11–12 January 2008; pp. 65–70. [Google Scholar] [CrossRef]
- Ngai, E.W.T.; Moon, K.K.L.; Riggins, F.J.; Yi, C.Y. RFID research: An academic literature review (1995–2005) and future research directions. Int. J. Prod. Econ. 2008, 112, 510–520. [Google Scholar] [CrossRef]
- Chao, C.C.; Yang, J.M.; Jen, W.Y. Determining technology trends and forecasts of RFID by a historical review and bibliometric analysis from 1991 to 2005. Technovation 2007, 27, 268–279. [Google Scholar] [CrossRef]
- Khoo, B. RFID—From tracking to the internet of things: A review of developments. In Proceedings of the 2010 IEEE/ACM Int’l Conference on Green Computing and Communications & Int’l Conference on Cyber, Physical and Social Computing, Hangzhou, China, 18–20 December 2010; pp. 533–538. [Google Scholar] [CrossRef]
- Zhang, X.D.; Yue, S.J.; Wang, W.M. The review of RFID applications in global postal and courier services. J. China Univ. Posts Telecommun. 2006, 13, 106–110. [Google Scholar] [CrossRef]
- Mishra, A.; Mishra, D. Application of RFID in Aviation Industry: An exploratory review. Promet-Traffic Transp. 2010, 22, 363–372. [Google Scholar] [CrossRef] [Green Version]
- Valero, E.; Adan, A.; Cerrada, C. Evolution of RFID Applications in Construction: A Literature Review. Sensors 2015, 15, 15988–16008. [Google Scholar] [CrossRef] [Green Version]
- Gulcharan, N.F.B.I.; Daud, H.; Nor, N.M.; Ibrahim, T.; Nyamasvisva, E.T. Limitation and Solution for Healthcare Network Using RFID Technology: A Review. In Proceedings of the 4th International Conference on Electrical Engineering and Informatics (ICEEI), Bangi, Malaysia, 24–25 June 2013; Elsevier: Amsterdam, The Netherlands, 2013; Volume 11, pp. 565–571. [Google Scholar] [CrossRef] [Green Version]
- Kolokathi, A.; Rallis, P. Radio Frequency Identification (RFID) in Healthcare: A Literature Review. In Proceedings of the 11th International Conference on Informatics, Management, and Technology in Healthcare (ICIMTH), Athens, Greece, 5–7 July 2013; IOS PRESS: Amsterdam, The Netherlands, 2013; Volume 190, pp. 157–159. [Google Scholar] [CrossRef]
- Haddara, M.; Staaby, A. RFID Applications and Adoptions in Healthcare: A Review on Patient Safety. In Proceedings of the International Conference on Health and Social Care Information Systems and Technologies (HCIST), Lisbon, Portugal, 21–23 November 2018; Elsevier: Amsterdam, The Netherlands, 2018; Volume 138, pp. 80–88. [Google Scholar] [CrossRef]
- Sarac, A.; Absi, N.; Dauzere-Peres, S. A literature review on the impact of RFID technologies on supply chain management. Int. J. Prod. Econ. 2010, 128, 77–95. [Google Scholar] [CrossRef]
- Musa, A.; Dabo, A.A. A Review of RFID in Supply Chain Management: 2000–2015. Glob. J. Flex. Syst. Manag. 2016, 17, 189–228. [Google Scholar] [CrossRef]
- Labbi, Z.; Senhadji, M.; Maarof, A.; Belkasmi, M. IoT smart homes based on RFID technology: Localization systems review. Association for Computing Machinery. In Proceedings of the 4th International Conference on Engineering and MIS, Istanbul, Turkey, 19–20 June 2018. [Google Scholar] [CrossRef]
- Chanchaichujit, J.; Balasubramanian, S.; Charmaine, N.S.M. A systematic literature review on the benefit-drivers of RFID implementation in supply chains and its impact on organizational competitive advantage. Cogent Bus. Manag. 2020, 7. [Google Scholar] [CrossRef]
- Sharma, D.; Mahto, R.; Harper, C.; Alqattan, S. Role of RFID technologies in transportation projects: A review. Int. J. Technol. Intell. Plan. 2020, 12, 349–377. [Google Scholar] [CrossRef]
- Ruiz-Rosero, J.; Ramirez-Gonzalez, G.; Viveros-Delgado, J. Software survey: ScientoPy, a scientometric tool for topics trend analysis in scientific publications. Scientometrics 2019, 121, 1165–1188. [Google Scholar] [CrossRef]
- Jarke, M.; Lenzerini, M.; Vassiliou, Y.; Vassiliadis, P. Fundamentals of Data Warehouses; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2002. [Google Scholar]
- Jia, X.; Feng, Q.; Fan, T.; Lei, Q. RFID technology and its applications in Internet of Things (IoT). In Proceedings of the 2012 2nd International Conference on Consumer Electronics, Communications and Networks, Yichang, China, 21–23 April 2012; pp. 1282–1285. [Google Scholar] [CrossRef]
- Aggarwal, R.; Das, M. RFID security in the context of internet of things. In Proceedings of the 1st International Conference on Security of Internet of Things, Kollam, India, 17–19 August 2012; pp. 51–56. [Google Scholar] [CrossRef]
- Chen, B.; Dai, Y.; Jin, B.; Zou, X.; Zhou, L. The RFID-based electronic identity security platform of the Internet of Things. In Proceedings of the 2011 International Conference on Mechatronic Science, Electric Engineering and Computer, Jilin, China, 19–22 August 2011; pp. 246–249. [Google Scholar] [CrossRef]
- Ray, B.R.; Abawajy, J.; Chowdhury, M. Scalable RFID security framework and protocol supporting Internet of Things. Comput. Netw. 2014, 67, 89–103. [Google Scholar] [CrossRef]
- Das, M.L. Strong Security and Privacy of RFID System for Internet of Things Infrastructure. In Proceedings of the 3rd International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE), Kharagpur, India, 19–23 October 2013; Springer: Berlin/Heidelberg, Germany, 2013; Volume 8204, pp. 56–69. [Google Scholar]
- Khan, W.Z.; Zangoti, H.M.; Aalsalem, M.Y.; Zahid, M.; Arshad, Q. Mobile RFID in Internet of Things: Security Attacks, Privacy Risks, and Countermeasures. In Proceedings of the International Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications (ICRAMET), Jakarta, Indonesia, 3–5 October 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 36–41. [Google Scholar]
- Chamekh, M.; Hamdi, M.; El Asmi, S.; Kim, T.H. Security of RFID Based Internet of Things Applications: Requirements and Open Issues. In Proceedings of the 15th International Multi-Conference on Systems, Signals and Devices (SSD), Hammamet, Tunisia, 19–22 March 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 699–703. [Google Scholar]
- Shao, X. Study on security issue of internet of things based on RFID. In Proceedings of the 4th International Conference on Computational and Information Sciences, Chongqing, China, 17–19 August 2012; pp. 566–569. [Google Scholar] [CrossRef]
- Singh, N.; Hans, A.; Kaur, S. Layer and RFID Based Security Issues of Internet of Things. Int. J. Grid Distrib. Comput. 2016, 9, 301–310. [Google Scholar] [CrossRef]
- Jin, H.Y.; Tian, M. Research on security issues of RFID technology in IOT. In Proceedings of the 2012 National Conference on Information Technology and Computer Science, Lanzhou, China, 16–18 November 2012; pp. 52–54. [Google Scholar]
- Fan, K.; Li, J.; Li, H.; Liang, X.; Shen, X.; Yang, Y. ESLRAS: A lightweight RFID authentication scheme with high efficiency and strong security for internet of things. In Proceedings of the 2012 4th International Conference on Intelligent Networking and Collaborative Systems, Bucharest, Romania, 19–21 September 2012; pp. 323–328. [Google Scholar] [CrossRef]
- Sharma, V.; Vithalkar, A.; Hashmi, M. Lightweight Security Protocol for Chipless RFID in Internet of Things (IoT) Applications. In Proceedings of the 10th International Conference on Communication Systems and Networks (COMSNETS), Bangalore, IN, USA, 3–7 January 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 468–471. [Google Scholar]
- Zhu, W.; Yu, J.; Wang, T. A Security and Privacy Model for Mobile RFID Systems in the Internet of Things. In Proceedings of the 14th IEEE International Conference on Communication Technology (ICCT), Chengdu, China, 9–11 November 2012; IEEE: Piscataway, NJ, USA, 2012; pp. 726–732. [Google Scholar]
- Fernandez-Carames, T.M.; Fraga-Lamas, P.; Suarez-Albela, M.; Castedo, L. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications. Sensors 2017, 17, 28. [Google Scholar] [CrossRef] [Green Version]
- Bendavid, Y.; Bagheri, N.; Safkhani, M.; Rostampour, S. IoT Device Security: Challenging “A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function”. Sensors 2018, 18, 4444. [Google Scholar] [CrossRef] [Green Version]
- Rekleitis, E.; Rizomiliotis, P.; Gritzalis, S. How to protect security and privacy in the IoT: A policy-based RFID tag management protocol. Secur. Commun. Netw. 2014, 7, 2669–2683. [Google Scholar] [CrossRef]
- Figueroa, S.; Anorga, J.; Hernantes, J.; Francisco Carias, J.; Arrizabalaga, S. A RFID-based IoT Cybersecurity Lab in Telecommunications Engineering. In Proceedings of the 13th Technologies Applied to Electronics Teaching Conference (TAEE), La Laguna, Spain, 20–22 June 2018; IEEE: Piscataway, NJ, USA, 2018. [Google Scholar] [CrossRef]
- Abdolmaleki, B.; Baghery, K.; Khazaei, S.; Aref, M.R. Game-Based Privacy Analysis of RFID Security Schemes for Confident Authentication in IoT. Wirel. Pers. Commun. 2017, 95, 5057–5080. [Google Scholar] [CrossRef]
- Kypus, L.; Vojtech, L.; Kvarda, L. Qualitative And Security Parameters Inside Middleware Centric Heterogeneous RFID/IoT Networks, On-Tag Approach. In Proceedings of the 38th International Conference on Telecommunications and Signal Processing (TSP), Prague, Czech Republic, 9–11 July 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 21–25. [Google Scholar]
- Haenel, T.; Bothe, A.; Helmke, R.; Gericke, C.; Aschenbruck, N. Adjustable Security for RFID-Equipped IoT Devices. In Proceedings of the IEEE International Conference on RFID Technology and Application (RFID-TA), Warsaw, Poland, 20–22 September 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 208–213. [Google Scholar]
- Li, Z.; Wang, X. The Framework of Security Mechanism on the Internet of Things Based on RFID Boosting Low-Carbon Economy. In Proceedings of the International Conference on Low-carbon Transportation and Logistics, and Green Buildings (LTLGB), Beijing, China, 12–13 October 2012; Springer: Berlin/Heidelberg, Germany, 2013; pp. 1007–1013. [Google Scholar] [CrossRef]
- Petracca, M.; Bocchino, S.; Azzara, A.; Pelliccia, R.; Ghibaudi, M.; Pagano, P. WSN and RFID integration in the IoT scenario: An advanced safety system for industrial plants. J. Commun. Softw. Syst. 2013, 9, 104–113. [Google Scholar] [CrossRef]
- Liu, Y.; Li, G.W.; Gao, S. The Design of RFID Middleware Architecture for Application in the Advanced Manufacturing Industry and the Internet of Things. In Proceedings of the International Conference on Industrial Technology and Management Science (ITMS), Tianjin, China, 27–28 March 2015; Volume 34, pp. 1482–1487. [Google Scholar]
- de Barros Filho, I.E.; Silva, I.; Viegas, C.M.D. An Effective Extension of Anti-Collision Protocol for RFID in the Industrial Internet of Things (IIoT). Sensors 2018, 18, 4426. [Google Scholar] [CrossRef] [Green Version]
- Gao, H.; Guo, Y.; Cui, J.; Hao, H.; Shi, H. A communication protocol of RFID systems in internet of things. Int. J. Secur. Its Appl. 2012, 6, 91–102. [Google Scholar]
- Zhang, Z.; Xu, Q.L. Universal composable grouping-proof protocol for RFID tags in the internet of things. Jisuanji Xuebao/Chinese J. Comput. 2011, 34, 1188–1194. [Google Scholar] [CrossRef]
- Yin, Y.; Xu, M.; Zhang, Q.; Chen, J. Cryptanalysis of A New Lightweight RFID Mutual Authentication Protocol with Cache in Reader for IoT. In Proceedings of the IEEE 2nd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), Chengdu, China, 15–17 December 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 909–913. [Google Scholar]
- Fan, K.; Gong, Y.; Liang, C.; Li, H.; Yang, Y. Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G. Secur. Commun. Netw. 2016, 9, 3095–3104. [Google Scholar] [CrossRef] [Green Version]
- Toumi, K.; Ayari, M.; Azouz, S.L.; Bouet, M.; Pujolle, G. HAT: HIP address translation protocol for hybrid RFID/IP internet of things communication. In Proceedings of the International Conference on Wireless and Ubiquitous Systems, Sousse, Tunisia, 8–10 October 2010. [Google Scholar] [CrossRef]
- Tewari, A.; Gupta, B.B. Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. J. Supercomput. 2017, 73, 1085–1102. [Google Scholar] [CrossRef]
- Khalid, M.; Mujahid, U.; Najam-ul Islam, M. Cryptanalysis of ultralightweight mutual authentication protocol for radio frequency identification enabled Internet of Things networks. Int. J. Distrib. Sens. Netw. 2018, 14. [Google Scholar] [CrossRef] [Green Version]
- Xu, D.; Chen, Y. A safe RFID authentication protocol for Internet of Things. J. Theor. Appl. Inf. Technol. 2013, 48, 359–364. [Google Scholar]
- Asadpour, M.; Dashti, M.T. Scalable, privacy preserving radio-frequency identification protocol for the internet of things. Concurr.-Comput.-Pract. Exp. 2015, 27, 1932–1950. [Google Scholar] [CrossRef]
- Zhu, W.L.; Yu, J.P. A privacy preserving three-party authentication protocol for RFID systems in the internet of things. Shenzhen Daxue Xuebao (Ligong Ban)/J. Shenzhen Univ. Sci. Eng. 2012, 29, 95–99. [Google Scholar] [CrossRef]
- Olaleye, O.G.; Ali, A.; Perkins, D.; Bayoumi, M. Modeling and Performance Simulation of PULSE and MCMAC Protocols in RFID-based IoT Network Using OMNeT plus. In Proceedings of the IEEE International Conference on RFID (RFID), Orlando, FL, USA, 10–12 April 2018; IEEE: Piscataway, NJ, USA, 2018. [Google Scholar]
- Xu, L.D. Information architecture for supply chain quality management. Int. J. Prod. Res. 2011, 49, 183–198. [Google Scholar] [CrossRef]
- Lin, L.C. An integrated framework for the development of radio frequency identification technology in the logistics and supply chain management. Comput. Ind. Eng. 2009, 57, 832–842. [Google Scholar] [CrossRef]
- Butner, K. The smarter supply chain of the future. Strategy Leadersh. 2010, 38, 22–31. [Google Scholar] [CrossRef]
- Prater, E.; Frazier, G. Future impacts of RFID on e-supply chains in grocery retailing. Supply Chain.-Manag.- Int. J. 2005, 10, 134–142. [Google Scholar] [CrossRef] [Green Version]
- Jones, P.; Clarke-Hill, C.; Hillier, D.; Comfort, D. The benefits, challenges and impacts of radio frequency identification technology (RFID) for retailers in the UK. Mark. Intell. Plan. 2005, 23, 395–402. [Google Scholar] [CrossRef]
- Hong, I.H.; Dang, J.F.; Tsai, Y.H.; Liu, C.S.; Lee, W.T.; Wang, M.L.; Chen, P.C. An RFID application in the food supply chain: A case study of convenience stores in Taiwan. J. Food Eng. 2011, 106, 119–126. [Google Scholar] [CrossRef]
- Kim, E.Y.; Ko, E.; Kim, H.; Koh, C.E. Comparison of benefits of radio frequency identification: Implications for business strategic performance in the US and Korean retailers. Ind. Mark. Manag. 2008, 37, 797–806. [Google Scholar] [CrossRef]
- Zhu, L.; Wang, P.; Xi, S. Mean-Variance Analysis of Retailers Deploying RFID-Enabled Smart Shelves. Information 2018, 9, 40. [Google Scholar] [CrossRef] [Green Version]
- Helo, P.; Szekely, B. Logistics information systems—An analysis of software solutions for supply chain co-ordination. Ind. Manag. Data Syst. 2005, 105, 5–18. [Google Scholar] [CrossRef] [Green Version]
- Sahin, E.; Dallery, Y.; Gershwin, S. Performance evaluation of a traceability system: An application to the radio frequency identification technology. In Proceedings of the 2002 IEEE International Conference on Systems, Man and Cybernetics, Yasmine Hammamet, Tunisia, 6–9 October 2002; Volume 3, pp. 647–650. [Google Scholar]
- Zelbst, P.J.; Green Kenneth, W., Jr.; Sower, V.E.; Baker, G. RFID utilization and information sharing: The impact on supply chain performance. J. Bus. Ind. Mark. 2010, 25, 582–589. [Google Scholar] [CrossRef]
- Hou, J.L.; Huang, C.H. Quantitative performance evaluation of RFID applications in the supply chain of the printing industry. Ind. Manag. Data Syst. 2006, 106, 96–120. [Google Scholar] [CrossRef]
- Visich, J.K.; Li, S.; Khumawala, B.M.; Reyes, P.M. Empirical evidence of RFID impacts on supply chain performance. Int. J. Oper. Prod. Manag. 2009, 29, 1290–1315. [Google Scholar] [CrossRef] [Green Version]
- Lin, C.Y.; Ho, Y.H. RFID technology adoption and supply chain performance: An empirical study in China’s logistics industry. Supply Chain.-Manag.- Int. J. 2009, 14, 369–378. [Google Scholar] [CrossRef]
- Clarke, R.; Twede, D.; Tazelaar, J.; Boyer, K. Radio frequency identification (RFID) performance: The effect of tag orientation and package contents. Packag. Technol. Sci. 2006, 19, 45–54. [Google Scholar] [CrossRef]
- Wang, L.C.; Lin, Y.C.; Lin, P.H. Dynamic mobile RFID-based supply chain control and management system in construction. Adv. Eng. Inform. 2007, 21, 377–390. [Google Scholar] [CrossRef]
- Melski, A.; Thoroe, L.; Schumann, M. Managing RFID data in supply chains. Int. J. Internet Protoc. Technol. 2007, 2, 176–189. [Google Scholar] [CrossRef]
- Lee, C.H.; Chung, C.W. Efficient storage scheme and query processing for supply chain management using RFID. In Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data 2008, Vancouver, BC, Canada, 9–12 June 2008; pp. 291–302. [Google Scholar] [CrossRef]
- Fan, H.; Wu, Q.; Lin, Y.; Zhang, J. A Split-Path Schema-Based RFID Data Storage Model in Supply Chain Management. Sensors 2013, 13, 5757–5776. [Google Scholar] [CrossRef] [Green Version]
- Kang, Y.S.; Park, I.H.; Rhee, J.; Lee, Y.H. MongoDB-Based Repository Design for IoT-Generated RFID/Sensor Big Data. IEEE Sens. J. 2016, 16, 485–497. [Google Scholar] [CrossRef]
- Lee, C.H.; Chung, C.W. RFID Data Processing in Supply Chain Management Using a Path Encoding Scheme. IEEE Trans. Knowl. Data Eng. 2011, 23, 742–758. [Google Scholar] [CrossRef] [Green Version]
- Sellitto, C.; Burgess, S.; Hawking, P. Information quality attributes associated with RFID-derived benefits in the retail supply chain. Int. J. Retail Distrib. Manag. 2007, 35, 69–87. [Google Scholar] [CrossRef]
- Kelepouris, T.; McFarlane, D.; Parlikad, A. Developing a model for quantifying the quality and value of tracking information on supply chain decisions. In Proceedings of the 12th International Conference on Information Quality, Cambridge, MA, USA, 9–11 November 2007. [Google Scholar]
- Fan, T.; Tao, F.; Deng, S.; Li, S. Impact of RFID technology on supply chain decisions with inventory inaccuracies. Int. J. Prod. Econ. 2015, 159, 117–125. [Google Scholar] [CrossRef]
- Cannella, S.; Dominguez, R.; Framinan, J.M. Inventory record inaccuracy—The impact of structural complexity and lead time variability. Omega-Int. J. Manag. Sci. 2017, 68, 123–138. [Google Scholar] [CrossRef]
- Li, L. Technology designed to combat fakes in the global supply chain. Bus. Horiz. 2013, 56, 167–177. [Google Scholar] [CrossRef]
- Rahman, F.; Ahamed, S.I. Efficient detection of counterfeit products in large-scale RFID systems using batch authentication protocols. Pers. Ubiquitous Comput. 2014, 18, 177–188. [Google Scholar] [CrossRef]
- Wyld, D. Genuine medicine?: Why safeguarding the pharmaceutical supply chain from counterfeit drugs with RFID is vital for protecting public health and the health of the pharmaceutical industry. Compet. Rev. 2008, 18, 206–216. [Google Scholar] [CrossRef]
- Coustasse, A.; Arvidson, C.; Rutsohn, P. Pharmaceutical counterfeiting and the RFID technology intervention. J. Hosp. Mark. Public Relat. 2010, 20, 100–115. [Google Scholar] [CrossRef]
- Taylor, D. RFID in the Pharmaceutical Industry: Addressing Counterfeits with Technology. J. Med Syst. 2014, 38. [Google Scholar] [CrossRef]
- Li, Y.; Ding, X. Protecting RFID communications in supply chains. In Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, Singapore, 20–22 March 2007; pp. 234–241. [Google Scholar] [CrossRef]
- Singh, M.; Li, X.; Li, Z. Security and privacy protection in RFID-enabled supply chain management. Int. J. Radio Freq. Identif. Technol. Appl. 2011, 3, 294–318. [Google Scholar] [CrossRef] [Green Version]
- Dai, H.; Li, J.; Yan, N.; Zhou, W. Bullwhip effect and supply chain costs with low- and high-quality information on inventory shrinkage. Eur. J. Oper. Res. 2016, 250, 457–469. [Google Scholar] [CrossRef]
- Ustundag, A.; Tanyas, M. The impacts of Radio Frequency Identification (RFID) technology on supply chain costs. Transp. Res. Part E-Logist. Transp. Rev. 2009, 45, 29–38. [Google Scholar] [CrossRef]
- Bensel, P.; Gunther, O.; Tribowski, C.; Vogeler, S. Cost-benefit sharing in cross-company RFID applications: A case study approach [Partager les couts et les benefices des applications RFID impliquant plusieurs partenaires: Une approche par etudes de cas]. In Proceedings of the 29th International Conference on Information Systems, Paris, France, 14–17 December 2008. [Google Scholar]
- Ustundag, A. Evaluating RFID investment on a supply chain using tagging cost sharing factor. Int. J. Prod. Res. 2010, 48, 2549–2562. [Google Scholar] [CrossRef]
- Lee, C.K.M.; Chan, T.M. Development of RFID-based Reverse Logistics System. Expert Syst. Appl. 2009, 36, 9299–9307. [Google Scholar] [CrossRef]
- Kumar, S.; Dieveney, E.; Dieveney, A. Reverse logistic process control measures for the pharmaceutical industry supply chain. Int. J. Product. Perform. Manag. 2009, 58, 188–204. [Google Scholar] [CrossRef]
- Mladenow, A.; Novak, N.M.; Strauss, C. Internet of Things Integration in Supply Chains—An Austrian Business Case of a Collaborative Closed-Loop Implementation. In Proceedings of the 10th IFIP WG 8.9. Working Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Vienna, Austria, 13–14 December 2016; Volume 268, pp. 166–176. [Google Scholar] [CrossRef] [Green Version]
- Saab, S.S.; Nakad, Z.S. A Standalone RFID Indoor Positioning System Using Passive Tags. IEEE Trans. Ind. Electron. 2011, 58, 1961–1970. [Google Scholar] [CrossRef]
- Ma, Y.; Zhou, L.; Liu, K.; Wang, J. Iterative Phase Reconstruction and Weighted Localization Algorithm for Indoor RFID-Based Localization in NLOS Environment. IEEE Sens. J. 2014, 14, 597–611. [Google Scholar] [CrossRef]
- Wang, J.; Katabi, D. Dude, Where’s My Card? RFID Positioning That Works with Multipath and Non-Line of Sight. ACM SIGCOMM Comput. Commun. Rev. 2013, 43, 51–62. [Google Scholar] [CrossRef]
- Faseth, T.; Winkler, M.; Arthaber, H.; Magerl, G. The influence of multipath propagation on phase-based narrowband positioning principles in UHF RFID. In Proceedings of the 2011 1st IEEE-APS Topical Conference on Antennas and Propagation in Wireless Communications, Torino, Italy, 12–16 September 2011; pp. 1144–1147. [Google Scholar] [CrossRef]
- Han, S.; Lim, H.; Lee, J. An efficient localization scheme for a differential-driving mobile robot based on RFID system. IEEE Trans. Ind. Electron. 2007, 54, 3362–3369. [Google Scholar] [CrossRef]
- Park, S.; Hashimoto, S. Autonomous Mobile Robot Navigation Using Passive RFID in Indoor Environment. IEEE Trans. Ind. Electron. 2009, 56, 2366–2373. [Google Scholar] [CrossRef]
- Choi, B.S.; Lee, J.W.; Lee, J.J.; Park, K.T. A Hierarchical Algorithm for Indoor Mobile Robot Localization Using RFID Sensor Fusion. IEEE Trans. Ind. Electron. 2011, 58, 2226–2235. [Google Scholar] [CrossRef]
- Park, S.; Lee, H. Self-Recognition of Vehicle Position Using UHF Passive RFID Tags. IEEE Trans. Ind. Electron. 2013, 60, 226–234. [Google Scholar] [CrossRef]
- Catarinucci, L.; Tedesco, S.; Tarricone, L. Customized Ultra High Frequency Radio Frequency Identification Tags and Reader Antennas Enabling Reliable Mobile Robot Navigation. IEEE Sens. J. 2013, 13, 783–791. [Google Scholar] [CrossRef]
- Kim, M.; Chong, N.Y. RFID-based mobile robot guidance to a stationary target. Mechatronics 2007, 17, 217–229. [Google Scholar] [CrossRef]
- Akkaya, K.; Guvenc, I.; Aygun, R.; Pala, N.; Kadri, A. IoT-based Occupancy Monitoring Techniques for Energy-Efficient Smart Buildings. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), New Orleans, LA, USA, 9–12 March 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 58–63. [Google Scholar]
- Wang, H.T.; Jia, Q.S.; Song, C.; Yuan, R.; Guan, X. Estimation of Occupancy Level in Indoor Environment Based on Heterogeneous Information Fusion. In Proceedings of the 49th IEEE Conference on Decision and Control (CDC), Atlanta, GA, USA, 15–17 December 2010; IEEE: Piscataway, NJ, USA, 2010; pp. 5086–5091. [Google Scholar] [CrossRef]
- Saidi, K.S.; Teizer, J.; Franaszek, M.; Lytle, A.M. Static and dynamic performance evaluation of a commercially-available ultra wideband tracking system. Autom. Constr. 2011, 20, 519–530. [Google Scholar] [CrossRef]
- Fang, Y.; Cho, Y.K.; Zhang, S.; Perez, E. Case Study of BIM and Cloud-Enabled Real-Time RFID Indoor Localization for Construction Management Applications. J. Constr. Eng. Manag. 2016, 142. [Google Scholar] [CrossRef]
- Lee, H.S.; Lee, K.P.; Park, M.; Baek, Y.; Lee, S. RFID-Based Real-Time Locating System for Construction Safety Management. J. Comput. Civ. Eng. 2012, 26, 366–377. [Google Scholar] [CrossRef]
- Lee, E.K.; Oh, S.Y.; Gerla, M. RFID assisted vehicle positioning in VANETs. Pervasive Mob. Comput. 2012, 8, 167–179. [Google Scholar] [CrossRef]
- Dardari, D.; D’Errico, R.; Roblin, C.; Sibille, A.; Win, M.Z. Ultrawide Bandwidth RFID: The Next Generation? Proc. IEEE 2010, 98, 1570–1582. [Google Scholar] [CrossRef]
- Brchan, J.; Zhao, L.; Wu, J.; Williams, R.; Perez, L. A real-time RFID localization experiment using propagation models. In Proceedings of the 2012 6th IEEE International Conference on RFID, Orlando, FL, USA, 3–5 April 2012; pp. 141–148. [Google Scholar] [CrossRef] [Green Version]
- Hekimian-Williams, C.; Grant, B.; Liu, X.; Zhang, Z.; Kumar, P. Accurate localization of RFID tags using phase difference. In Proceedings of the 4th Annual IEEE International Conference on RFID, Orlando, FL, USA, 14–15 April 2010; pp. 89–96. [Google Scholar] [CrossRef] [Green Version]
- Zhou, C.; Griffin, J.D. Accurate Phase-Based Ranging Measurements for Backscatter RFID Tags. IEEE Antennas Wirel. Propag. Lett. 2012, 11, 152–155. [Google Scholar] [CrossRef]
- Kronberger, R.; Knie, T.; Leonardi, R.; Dettmar, U.; Cremer, M.; Azzouzi, S. UHF RFID Localization System Based on a Phased Array Antenna. In Proceedings of the IEEE International Symposium on Antennas and Propagation (APSURSI)/USNC/URSI National Radio Science Meeting, Spokane, WA, USA, 3–8 July 2011; IEEE: Piscataway, NJ, USA, 2011; pp. 525–528. [Google Scholar]
- Kelepouris, T.; Pramatari, K.; Doukidis, G. RFID-enabled traceability in the food supply chain. Ind. Manag. Data Syst. 2007, 107, 183–200. [Google Scholar] [CrossRef]
- Feng, J.; Fu, Z.; Wang, Z.; Xu, M.; Zhang, X. Development and evaluation on a RFID-based traceability system for cattle/beef quality safety in China. Food Control. 2013, 31, 314–325. [Google Scholar] [CrossRef]
- Qian, J.P.; Yang, X.T.; Wu, X.M.; Zhao, L.; Fan, B.L.; Xing, B. A traceability system incorporating 2D barcode and RFID technology for wheat flour mills. Comput. Electron. Agric. 2012, 89, 76–85. [Google Scholar] [CrossRef]
- Ampatzidis, Y.G.; Vougioukas, S.G. Field experiments for evaluating the incorporation of RFID and barcode registration and digital weighing technologies in manual fruit harvesting. Comput. Electron. Agric. 2009, 66, 166–172. [Google Scholar] [CrossRef]
- Parreno-Marchante, A.; Alvarez-Melcon, A.; Trebar, M.; Filippin, P. Advanced traceability system in aquaculture supply chain. J. Food Eng. 2014, 122, 99–109. [Google Scholar] [CrossRef]
- Abad, E.; Palacio, F.; Nuin, M.; Gonzalez de Zarate, A.; Juarros, A.; Gomez, J.M.; Marco, S. RFID smart tag for traceability and cold chain monitoring of foods: Demonstration in an intercontinental fresh fish logistic chain. J. Food Eng. 2009, 93, 394–399. [Google Scholar] [CrossRef]
- Hsu, Y.C.; Chen, A.P.; Wang, C.H. A RFID-Enabled Traceability System for the Supply Chain of Live Fish. In Proceedings of the IEEE International Conference on Automation and Logistics, Qingdao, China, 1–3 September 2008; IEEE: Piscataway, NJ, USA, 2008; pp. 81–86. [Google Scholar]
- Ngai, E.W.T.; Cheng, T.C.E.; Lai, K.H.; Chai, P.Y.F.; Choi, Y.S.; Sin, R.K.Y. Development of an RFID-based traceability system: Experiences and lessons learned from an aircraft engineering company. Prod. Oper. Manag. 2007, 16, 554–568. [Google Scholar] [CrossRef] [Green Version]
- Shanahan, C.; Kernan, B.; Ayalew, G.; McDonnell, K.; Butler, F.; Ward, S. A framework for beef traceability from farm to slaughter using global standards: An Irish perspective. Comput. Electron. Agric. 2009, 66, 62–69. [Google Scholar] [CrossRef]
- Parent, C.; Spaccapietra, S.; Renso, C.; Andrienko, G.; Andrienko, N.; Bogorny, V.; Damiani, M.L.; Gkoulalas-Divanis, A.; Macedo, J.; Pelekis, N.; et al. Semantic Trajectories Modeling and Analysis. ACM Comput. Surv. 2013, 45. [Google Scholar] [CrossRef]
- Chongwatpol, J.; Sharda, R. RFID-enabled track and traceability in job-shop scheduling environment. Eur. J. Oper. Res. 2013, 227, 453–463. [Google Scholar] [CrossRef]
- Agrawal, R.; Cheung, A.; Kailing, K.; Schonauer, S. Towards traceability across sovereign, distributed RFID databases. In Proceedings of the 10th International Database Engineering and Applications Symposium (IDEAS 2006), Delhi, India, 11–14 December 2006; pp. 174–184. [Google Scholar]
- Cimino, M.G.C.A.; Marcelloni, F. Autonomic tracing of production processes with mobile and agent-based computing. Inf. Sci. 2011, 181, 935–953. [Google Scholar] [CrossRef]
- Chrysochou, P.; Chryssochoidis, G.; Kehagia, O. Traceability information carriers. The technology backgrounds and consumers’ perceptions of the technological solutions. Appetite 2009, 53, 322–331. [Google Scholar] [CrossRef]
- Song, J.H.; Lee, N.S.; Yoon, S.W.; Kwon, S.W.; Chin, S.; Kim, Y.S. Material tracker for construction logistics. In Proceedings of the 24th International Symposium on Automation and Robotics in Construction, Kochi, Japan, 19–21 September 2007; pp. 63–67. [Google Scholar]
- Schuh, G. Sm@rt Logistics: Intelligent networked systems. Cirp-Ann.-Manuf. Technol. 2006, 55, 505–508. [Google Scholar] [CrossRef]
- Wamba, S.F.; Chatfield, A.T. A contingency model for creating value from RFID supply chain network projects in logistics and manufacturing environments. Eur. J. Inf. Syst. 2009, 18, 615–636. [Google Scholar] [CrossRef] [Green Version]
- Baars, H.; Gille, D.; Strueker, J. Evaluation of RFID applications for logistics: A framework for identifying, forecasting and assessing benefits. Eur. J. Inf. Syst. 2009, 18, 578–591. [Google Scholar] [CrossRef]
- Zacharewicz, G.; Deschamps, J.C.; Francois, J. Distributed simulation platform to design advanced RFID based freight transportation systems. Comput. Ind. 2011, 62, 597–612. [Google Scholar] [CrossRef] [Green Version]
- Wang, Y.; Ho, O.; Huang, G.; Li, D. Study on vehicle management in logistics based on RFID, GPS and GIS. Int. J. Internet Manuf. Serv. 2008, 1, 294–304. [Google Scholar] [CrossRef]
- Castro, M.; Jara, A.J.; Skarmeta, A. Architecture for Improving Terrestrial Logistics Based on the Web of Things. Sensors 2012, 12, 6538–6575. [Google Scholar] [CrossRef] [PubMed]
- Chen, S.G. Fuzzy-scorecard based logistics management in robust SCM. Comput. Ind. Eng. 2012, 62, 740–745. [Google Scholar] [CrossRef]
- Johansson, O.; Palsson, H. The impact of Auto-ID on logistics performance: A benchmarking survey of Swedish manufacturing industries. Benchmarking 2009, 16, 504–522. [Google Scholar] [CrossRef]
- Schmidt, M.; Thoroe, L.; Schumann, M. RFID and Barcode in Manufacturing Logistics: Interface Concept for Concurrent Operation. Inf. Syst. Manag. 2013, 30, 100–115. [Google Scholar] [CrossRef]
- Chow, K.; Choy, K.; Lee, W. Design of a knowledge-based logistics management system: A case-based RFID approach. Int. J. Enterp. Netw. Manag. 2006, 1, 5–28. [Google Scholar] [CrossRef]
- Tesoriero, R.; Gallud, J.A.; Lozano, M.D.; Penichet, V.M.R. Tracking Autonomous Entities using RFID Technology. IEEE Trans. Consum. Electron. 2009, 55, 650–655. [Google Scholar] [CrossRef]
- Esposito, A.; Tarricone, L.; Zappatore, M.; Catarinucci, L.; Colella, R. A framework for context-aware home-health monitoring. Int. J. Auton. Adapt. Commun. Syst. 2010, 3, 75–91. [Google Scholar] [CrossRef]
- Raad, M. A ubiquitous mobile telemedicine system for the elderly using RFID. Int. J. Secur. Netw. 2010, 5, 156–164. [Google Scholar] [CrossRef]
- Bravo, J.; Hervas, R.; Chavira, G. Ubiquitous Computing in the classroom: An approach through identification process. J. Univers. Comput. Sci. 2005, 11, 1494–1504. [Google Scholar]
- Kim, T.H.; Ramos, C.; Mohammed, S. Smart City and IoT. Future Gener. Comput.-Syst.- Int. J. Escience 2017, 76, 159–162. [Google Scholar] [CrossRef]
- Roemer, K.; Domnitcheva, S. Smart Playing Cards: A Ubiquitous Computing Game. Pers. Ubiquitous Comput. 2002, 6, 371–377. [Google Scholar] [CrossRef]
- Romer, K.; Schoch, T.; Mattern, F.; Dubendorfer, T. Smart identification frameworks for ubiquitous computing applications. Wirel. Netw. 2004, 10, 689–700. [Google Scholar] [CrossRef] [Green Version]
- Friedewald, M.; Raabe, O. Ubiquitous computing: An overview of technology impacts. Telemat. Inform. 2011, 28, 55–65. [Google Scholar] [CrossRef]
- Lopez-de Ipina, D.; Diaz-de Sarralde, I.; Garcia-Zubia, J. An Ambient Assisted Living Platform Integrating RFID Data-on-Tag Care Annotations and Twitter. J. Univers. Comput. Sci. 2010, 16, 1521–1538. [Google Scholar]
- Wamba, S.; Ngai, E. Internet of things in healthcare: The case of RFID-enabled asset management. Int. J. Biomed. Eng. Technol. 2013, 11, 318–335. [Google Scholar] [CrossRef] [Green Version]
- Liu, C.F.; Gu, Y.M. The Research of Intelligent Medical Devices Management System Based on RFID Technology. In Proceedings of the International Conference on Information System and Artificial Intelligence (ISAI), Hong Kong, China, 24–26 June 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 29–33. [Google Scholar] [CrossRef]
- Adame, T.; Bel, A.; Carreras, A.; Melia-Segui, J.; Oliver, M.; Pous, R. CUIDATS: An RFID-WSN hybrid monitoring system for smart health care environments. Future Gener. Comput.-Syst.- Int. J. Escience 2018, 78, 602–615. [Google Scholar] [CrossRef]
- Tsirbas, H.; Giokas, K.; Koutsouris, D. “Internet of Things”, an RFID—IPv6 scenario in a healthcare environment. In Proceedings of the 12th Mediterranean Conference on Medical and Biological Engineering and Computing, Chalkidiki, Greece, 27–30 May 2010; Volume 29, pp. 808–811. [Google Scholar] [CrossRef]
- Fan, K.; Jiang, W.; Li, H.; Yang, Y. Lightweight RFID Protocol for Medical Privacy Protection in IoT. IEEE Trans. Ind. Inform. 2018, 14, 1656–1665. [Google Scholar] [CrossRef]
- Jisha, S.; Philip, M. Rfid based security platform for internet of things in health care environment. In Proceedings of the Online International Conference on Green Engineering and Technologies (IC-GET), Coimbatore, India, 19 November 2016; IEEE: Piscataway, NJ, USA, 2016. [Google Scholar]
- Ai, L.; Jun, D.Z.; Yun, S.; Ling, W.X. The intelligent signing system of internet of things about environmental health workers based on RFID. In Proceedings of the 6th International Conference on Electronics and Information Engineering (ICEIE), Dalian, China, 26–27 September 2015; 2015; Volume 9794. [Google Scholar] [CrossRef]
- Wickramasuriya, J.; Datt, M.; Mehrotra, S.; Venkatasubramanian, N. Privacy protecting data collection in media spaces. In Proceedings of the ACM Multimedia 2004—Proceedings of the 12th ACM International Conference on Multimedia, New York, NY, USA, 10–16 October 2004; Association for Computing Machinery (ACM): New York, NY, USA, 2004; pp. 48–55. [Google Scholar] [CrossRef]
- Wickramasuriya, J.; Alhazzazi, M.; Datt, M.; Mehrotra, S.; Venkatasubramanian, N. Privacy-protecting video surveillance. In Proceedings of the Conference on Real-Time Imaging IX, San Jose, CA, USA, 18–20 January 2005; Volume 5671, pp. 64–75. [Google Scholar] [CrossRef]
- Ayoade, J. Security implications in RFID and authentication processing framework. Comput. Secur. 2006, 25, 207–212. [Google Scholar] [CrossRef]
- Li, M.; Poovendran, R.; Falk, R.; Koepf, A.; Braun, M.; Sampigethaya, K.; Robinson, R.; Lintelman, S.; Seuschek, H. Multi-domain rfid access control using asymmetric key based tag-reader mutual authentication. In Proceedings of the 26th Congress of International Council of the Aeronautical Sciences 2008, Anchorage, AK, USA, 14–19 September 2008; Volume 2, pp. 2841–2850. [Google Scholar]
- Larchikov, A.; Panasenko, S.; Pimenov, A.V.; Timofeev, P. Combining RFID-Based Physical Access Control Systems with Digital Signature Systems to Increase Their Security. In Proceedings of the 22nd International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia, 17–19 September 2014; IEEE: Piscataway, NJ, USA, 2014. [Google Scholar]
- Chen, B.C.; Yang, C.T.; Yeh, H.T.; Lin, C.C. Mutual Authentication Protocol for Role-Based Access Control Using Mobile RFID. Appl. Sci. 2016, 6, 215. [Google Scholar] [CrossRef] [Green Version]
- Xie, W.; Xie, L.; Zhang, C.; Wang, Q.; Wang, C.; Tang, C. TOA: A tag-owner-assisting RFID authentication protocol toward access control and ownership transfer. Secur. Commun. Netw. 2014, 7, 934–944. [Google Scholar] [CrossRef]
- Courtois, N.T. The dark side of security by obscurity and cloning Mifare Classic rail and building passes, anywhere, anytime. In Proceedings of the International Conference on Security and Cryptography, Milan, Italy, 7–10 July 2009; pp. 331–338. [Google Scholar]
- Chen, Y.Y.; Huang, D.C.; Tsai, M.L.; Jan, J.K. A Design of Tamper Resistant Prescription RFID Access Control System. J. Med Syst. 2012, 36, 2795–2801. [Google Scholar] [CrossRef]
- Henseler, M.; Rossberg, M.; Schaefer, G. Credential Management for Automatic Identification Solutions in Supply Chain Management. IEEE Trans. Ind. Inform. 2008, 4, 303–314. [Google Scholar] [CrossRef] [Green Version]
- Qi, S.; Zheng, Y.; Li, M.; Liu, Y.; Qiu, J. Scalable Industry Data Access Control in RFID-Enabled Supply Chain. IEEE-ACM Trans. Netw. 2016, 24, 3551–3564. [Google Scholar] [CrossRef]
- Deng, H.F.; Deng, W.; Li, H.; Yang, H.J. Authentication and access control in RFID based logistics-customs clearance service platform. Int. J. Autom. Comput. 2010, 7, 180–189. [Google Scholar] [CrossRef]
- Nowicki, T.; Kiedrowicz, M.; Waszkowski, R.; Chodowska, A.; Lach, A. Access control system for RFID-tagged documents in supply chain management. Logforum 2017, 13, 91–101. [Google Scholar] [CrossRef]
- Kerschbaum, F. An Access Control Model for Mobile Physical Objects. In Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, Pittsburgh, PA, USA, 9–11 June 2010; pp. 193–202. [Google Scholar] [CrossRef] [Green Version]
- Atluri, V.; Shin, H.; Vaidya, J. Efficient security policy enforcement for the mobile environment. J. Comput. Secur. 2008, 16, 439–475. [Google Scholar] [CrossRef] [Green Version]
- Jensen, S.E.H.; Jacobsen, R.H. Access Control with RFID in the Internet of Things. In Proceedings of the IEEE 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA), Barcelona, Spain, 25–28 March 2013; IEEE: Piscataway, NJ, USA, 2013; pp. 554–559. [Google Scholar] [CrossRef]
- Al-Zewairi, M.; Alqatawna, J.; Al-Kadi, O. Privacy and security for RFID Access Control Systems: RFID Access Control Systems without back-end database. In Proceedings of the 2011 1st IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies, Amman, Jordan, 6–8 December 2011. [Google Scholar] [CrossRef]
- Al-Zewairi, M.; Alqatawna, J.; Atoum, J. Risk adaptive hybrid RFID access control system. Secur. Commun. Netw. 2015, 8, 3826–3835. [Google Scholar] [CrossRef]
- Almanza-Ojeda, D.L.; Hernandez-Gutierrez, A.; Ibarra-Manzano, M.A. Design and implementation of a vehicular access control using RFID. In Proceedings of the 3rd International Conference on Advanced Optoelectronics and Lasers/3rd International Conference on Precision Oscillations in Electronics and Optics/1st International Workshop on Image and Signal Processing (MEP 2006), Guanajuato, MEXICO, 7–11 November 2006; IEEE: Piscataway, NJ, USA, 2006. [Google Scholar]
- Mai, A.; Wei, Z.; Gao, M. An Access Control and Positioning Security Management System Based on RFID. In Proceedings of the 7th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC), Hangzhou, China, 26–27 August 2015; IEEE: Piscataway, NJ, USA, 2015. [Google Scholar] [CrossRef]
- Liu, J.; Xiao, Y.; Chen, C. Internet of things’ authentication and access control. Int. J. Secur. Netw. 2012, 7, 228–241. [Google Scholar] [CrossRef]
- Shi, J.; Li, Y.; Deng, R.H. A secure and efficient discovery service system in EPCglobal network. Comput. Secur. 2012, 31, 870–885. [Google Scholar] [CrossRef]
- Tounsi, W.; Cuppens-Boulahia, N.; Cuppens, F.; Garcia-Alfaro, J. Fine-grained privacy control for the RFID middleware of EPCglobal networks. In Proceedings of the 5th International Conference on Management of Emergent Digital EcoSystems, Luxembourg, 28–31 October 2013; pp. 60–67. [Google Scholar] [CrossRef] [Green Version]
- Taesung, K.; Howon, K. Access control for middleware in RFID systems. In Proceedings of the 8th International Conference Advanced Communication Technology, Dublin, Ireland, 20–22 February 2006; Volume 2, pp. 1020–1022. [Google Scholar]
- Tounsi, W.; Cuppens-Boulahia, N.; Cuppens, F.; Pujolle, G. Access and privacy control enforcement in RFID middleware systems: Proposal and implementation on the fosstrak platform. World Wide-Web-Internet Web Inf. Syst. 2016, 19, 41–68. [Google Scholar] [CrossRef] [Green Version]
- Michael, K.; Michael, M.G. The future prospects of embedded microchips in humans as unique identifiers: The risks versus the rewards. Media Cult. Soc. 2013, 35, 78–86. [Google Scholar] [CrossRef] [Green Version]
- Perakslis, C.; Michael, K. Indian Millennials: Are microchip implants a more secure technology for identification and access control? In Proceedings of the 2012 IEEE Conference on Technology and Society in Asia (T&SA), Singapore, 27–29 October 2012; 2012. [Google Scholar] [CrossRef] [Green Version]
- Perakslis, C.; Michael, K.; Michael, M.G.; Gable, R. Perceived Barriers for Implanting Microchips in Humans: A Transnational Study. In Proceedings of the IEEE Conference on Norbert Wiener in the 21st Century (21CW)—Driving Technology’s Future, Boston, MA, USA, 24–26 June 2014; IEEE: Piscataway, NJ, USA, 2014. [Google Scholar]
- Weber, R. Internet of Things—New security and privacy challenges. Comput. Law Secur. Rev. 2010, 26, 23–30. [Google Scholar] [CrossRef]
- Molnar, D.; Wagner, D. Privacy and security in library RFID issues, practices, and architectures. In Proceedings of the 11th ACM Conference on Computer and Communications Security, Washington, DC, USA, 25–29 October 2004; pp. 210–219. [Google Scholar]
- Juels, A.; Weis, S.A. Defining strong privacy for RFID (Extended abstract). In Proceedings of the 5th IEEE International Conference on Pervasive Computing and Communications, White Plains, NY, USA, 19–23 March 2007. [Google Scholar] [CrossRef]
- Gao, X.; Xiang, Z.; Wang, H.; Shen, J.; Huang, J.; Song, S. An approach to security and privacy of RFID system for supply chain. In Proceedings of the IEEE International Conference on E-Commerce Technology for Dynamic E-Business, Beijing, China, 13–15 September 2004; pp. 164–168. [Google Scholar]
- Hoque, M.E.; Rahman, F.; Ahamed, S.I.; Park, J.H. Enhancing Privacy and Security of RFID System with Serverless Authentication and Search Protocols in Pervasive Environments. Wirel. Pers. Commun. 2010, 55, 65–79. [Google Scholar] [CrossRef]
- Park, N. Customized Healthcare Infrastructure Using Privacy Weight Level Based on Smart Device. In Proceedings of the 5th International Conference on Convergence and Hybrid Information Technology (ICHIT), Daejeon, Korea, 22–24 September 2011; Volume 206, pp. 467–474. [Google Scholar]
- Shih, D.H.; Lin, C.Y.; Lin, B. RFID tags: Privacy and security aspects. Int. J. Mob. Commun. 2005, 3, 214–230. [Google Scholar] [CrossRef]
- Yang, G.; Geng, G.; Du, J.; Liu, Z.; Han, H. Security threats and measures for the Internet of Things. Qinghua Daxue Xuebao/J. Tsinghua Univ. 2011, 51, 1335–1340. [Google Scholar]
- Cai, S.; Li, Y.; Li, T.; Deng, R. Attacks and improvements to an RFID mutual authentication protocol and its extensions. In Proceedings of the 2nd ACM Conference on Wireless Network Security, Zurich, Switzerland, 16–18 March 2009; pp. 51–58. [Google Scholar] [CrossRef]
- Lo, N.; Yeh, K.H.; Yeun, C. New mutual agreement protocol to secure mobile RFID-enabled devices. Inf. Secur. Tech. Rep. 2008, 13, 151–157. [Google Scholar] [CrossRef]
- Pang, L.; He, L.; Pei, Q.; Wang, Y. Secure and efficient mutual authentication protocol for RFID conforming to the EPC C-1 G-2 Standard. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Shanghai, China, 7–10 April 2013; IEEE: Piscataway, NJ, USA, 2013; pp. 1870–1875. [Google Scholar]
- Kardas, S.; Akgun, M.; Kiraz, M.; Demirci, H. Cryptanalysis of lightweight mutual authentication and ownership transfer for RFID systems. In Proceedings of the 2011 Workshop on Lightweight Security and Privacy: Devices, Protocols, and Applications, Istanbul, Turkey, 14–15 March 2011; pp. 20–25. [Google Scholar] [CrossRef]
- Dehkordi, M.H.; Farzaneh, Y. Improvement of the Hash-Based RFID Mutual Authentication Protocol. Wirel. Pers. Commun. 2014, 75, 219–232. [Google Scholar] [CrossRef]
- Yeh, T.C.; Wu, C.H.; Tseng, Y.M. Improvement of the RFID authentication scheme based on quadratic residues. Comput. Commun. 2011, 34, 337–341. [Google Scholar] [CrossRef]
- Cheng, Z.Y.; Liu, Y.; Chang, C.C.; Chang, S.C. Authenticated RFID security mechanism based on chaotic maps. Secur. Commun. Netw. 2013, 6, 247–256. [Google Scholar] [CrossRef]
- Yeh, K.H.; Lo, N.; Winata, E. An efficient ultralightweight authentication protocol for RFID systems. Cryptol. Inf. Secur. Ser. 2010, 4, 49–60. [Google Scholar] [CrossRef]
- Chen, C.L.; Deng, Y.Y. Conformation of EPC Class 1 Generation 2 standards RFID system with mutual authentication and privacy protection. Eng. Appl. Artif. Intell. 2009, 22, 1284–1291. [Google Scholar] [CrossRef]
- David, M.; Prasad, N.R. Providing Strong Security and High Privacy in Low-Cost RFID Networks. In Proceedings of the 1st International ICST Conference, Turin, Italy, 03–05 June 2009; Volume 17, pp. 172–179. [Google Scholar]
- Rahman, F.; Bhuiyan, M.Z.A.; Ahamed, S.I. A privacy preserving framework for RFID based healthcare systems. Future Gener. Comput.-Syst.- Int. J. Escience 2017, 72, 339–352. [Google Scholar] [CrossRef] [Green Version]
- Chien, H.Y.; Yang, C.C.; Wu, T.C.; Lee, C.F. Two RFID-based Solutions to Enhance Inpatient Medication Safety. J. Med. Syst. 2011, 35, 369–375. [Google Scholar] [CrossRef]
- Sun, H.M.; Ting, W.C.; Wang, K.H. On the Security of Chien’s Ultralightweight RFID Authentication Protocol. IEEE Trans. Dependable Secur. Comput. 2011, 8, 315–317. [Google Scholar] [CrossRef]
- Chien, H.Y.; Huang, C.W. Security of ultra-lightweight RFID authentication protocols and its improvements. Acm SIGOPS Oper. Syst. Rev. 2007, 41, 83–86. [Google Scholar] [CrossRef]
- Chien, H.Y.; Laih, C.S. ECC-based lightweight authentication protocol with untraceability for low-cost RFID. J. Parallel Distrib. Comput. 2009, 69, 848–853. [Google Scholar] [CrossRef]
- Peris-Lopez, P.; Hernandez-Castro, J.C.; Estevez-Tapiador, J.M.; Ribagorda, A. Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard. Comput. Stand. Interfaces 2009, 31, 372–380. [Google Scholar] [CrossRef]
- Cobb, W.E.; Laspe, E.D.; Baldwin, R.O.; Temple, M.A.; Kim, Y.C. Intrinsic Physical-Layer Authentication of Integrated Circuits. IEEE Trans. Inf. Forensics Secur. 2012, 7, 14–24. [Google Scholar] [CrossRef]
- Tan, C.C.; Sheng, B.; Li, Q. Efficient Techniques for Monitoring Missing RFID Tags. IEEE Trans. Wirel. Commun. 2010, 9, 1882–1889. [Google Scholar] [CrossRef] [Green Version]
- Lo, N.W.; Yeh, K.H. Anonymous Coexistence Proofs for RFID Tags. J. Inf. Sci. Eng. 2010, 26, 1213–1230. [Google Scholar]
- Xin, W.; Guan, Z.; Yang, T.; Sun, H.; Chen, Z. An efficient privacy-preserving RFID ownership transfer protocol. In Proceedings of the 15th Asia-Pacific Web Conference on Web Technologies and Applications, Sydney, Australia, 4–6 April 2013; Volume 7808 LNCS, pp. 538–549. [Google Scholar] [CrossRef]
- Chen, C.L.; Lai, Y.L.; Chen, C.C.; Deng, Y.Y.; Hwang, Y.C. RFID ownership transfer authorization systems conforming EPCglobal class-1 generation-2 standards. Int. J. Netw. Secur. 2011, 13, 41–48. [Google Scholar]
- Chen, C.L.; Huang, Y.C.; Jiang, J.R. A secure ownership transfer protocol using EPCglobal Gen-2 RFID. Telecommun. Syst. 2013, 53, 387–399. [Google Scholar] [CrossRef]
- Niu, H.; Taqieddin, E.; Jagannathan, S. EPC Gen2v2 RFID Standard Authentication and Ownership Management Protocol. IEEE Trans. Mob. Comput. 2016, 15, 137–149. [Google Scholar] [CrossRef]
- Niu, H.; Jagannathan, S.; Taqieddin, E.S. A Gen2v2 Compliant RFID Authentication and Ownership Management Protocol. In Proceedings of the 39th Annual IEEE Conference on Local Computer Networks (LCN), Edmonton, AB, Canada, 8–11 September 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 331–336. [Google Scholar]
- Jappinen, P.; Hamalainen, H. Enhanced RFID security method with Ownership transfer. In Proceedings of the International Conference on Computational-Intelligence and Security, Suzhou, China, 13–17 December 2008; pp. 943–946. [Google Scholar]
- Gui, Y.Q.; Zhang, J.; Choi, H. An improved RFID security method with ownership transfer. In Proceedings of the 2011 International Conference on ICT Convergence, Seoul, Korea, 28–30 September 2011; pp. 594–596. [Google Scholar] [CrossRef]
- Chen, C.L.; Chien, C.F. An Ownership Transfer Scheme Using Mobile RFIDs. Wirel. Pers. Commun. 2013, 68, 1093–1119. [Google Scholar] [CrossRef]
- Fernandez-Mir, A.; Trujillo-Rasua, R.; Castella-Roca, J.; Domingo-Ferrer, J. A Scalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled Delegation. In Proceedings of the 7th Workshop on RFID Security and Privacy (RFIDSec), Amherst, MA, USA, 26–28 June 2011; Volume 7055, pp. 147–162. [Google Scholar]
- Chen, C.L.; Chen, Y.Y.; Huang, Y.C.; Liu, C.S.; Lin, C.I.; Shih, T.F. Anti-counterfeit ownership transfer protocol for low cost RFID system. WSEAS Trans. Comput. 2008, 7, 1149–1158. [Google Scholar]
- Li, T.; Jin, Z.; Pang, C. Secured ownership transfer scheme for low-cost RFID tags. In Proceedings of the 3rd International Conference on Intelligent Networks and Intelligent Systems, Shenyang, China, 1–3 November 2010; pp. 584–587. [Google Scholar] [CrossRef]
- Chinnappa, S.; Periaswamy, G.; Thompson, D.; Di, J. Ownership transfer of RFID tags based on electronic fingerprint. In Proceedings of the 2008 International Conference on Security and Management, Las Vegas, NV, USA, 14–17 July 2008; pp. 64–67. [Google Scholar]
- Zhang, R.; Zhu, L.; Xu, C.; Yi, Y. An Efficient and Secure RFID Batch Authentication Protocol with Group Tags Ownership Transfer. In Proceedings of the IEEE Conference Collaboration Internet Computing, Hangzhou, China, 28–30 October 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 168–175. [Google Scholar] [CrossRef]
- Li, Q.S.; Xu, X.L.; Chen, Z. PUF-based RFID Ownership Transfer Protocol in an Open Environment. In Proceedings of the 15th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT), Hong Kong, China, 9–11 December 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 131–137. [Google Scholar] [CrossRef]
- Cheng, S.; Varadharajan, V.; Mu, Y.; Susilo, W. A secure elliptic curve based RFID ownership transfer scheme with controlled delegation. Cryptol. Inf. Secur. Ser. 2013, 11, 31–43. [Google Scholar] [CrossRef]
- Chien, H.Y. De-synchronization Attack on Quadratic Residues-based RFID Ownership Transfer. In Proceedings of the 10th Asia Joint Conference on Information Security (AsiaJCIS 2015), Kaohsiung City, Taiwan, 24–26 May 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 42–47. [Google Scholar] [CrossRef]
- Wang, H.; Yang, X.; Huang, Q.; Long, K. A Novel Authentication Protocol Enabling RFID Tags Ownership Transfer. In Proceedings of the 14th IEEE International Conference on Communication Technology (ICCT), Chengdu, China, 09–11 November 2012; IEEE: Piscataway, NJ, USA, 2012; pp. 855–860. [Google Scholar]
- Zhou, X.; Wang, A.; Xi, T. A new optional ownership transfer mode of RFID tags. J. Inf. Comput. Sci. 2013, 10, 2471–2479. [Google Scholar] [CrossRef]
- Chen, Y.Y.; Tsai, M.L.; Chen, Y.T.; Jan, J.K. A tagged-product ownership transfer mechanism used in retailer and second-hand transaction. Int. J. Radio Freq. Identif. Technol. Appl. 2011, 3, 47–53. [Google Scholar] [CrossRef]
Indicator | Complete Name | Description |
---|---|---|
AGR | Average growth rate | The average difference between the number of documents published in one year and the number of documents published in the previous year. It indicates how the number of documents published for a topic has grown (positive number) or declined (negative number) on average in a time frame. |
ADY | Average documents per year | This is an absolute indicator that represents the average number of documents published inside a time frame for a specific topic. |
PDLY | Percentage of documents in last years | Relative indicator that represents the percentage of the ADY in relation to the total number of documents for a specific topic. |
h-index | Author-level metric | Using the “times cited” field, ScientoPy calculates the h-index of each topic for the different categories, such as authors, countries, institutions, and others. |
Pos | Author Keywords | Total | AGR | ADY | PDLY | h-Index |
---|---|---|---|---|---|---|
1 | Internet of Things | 2399 | 8.0 | 348.0 | 29.0 | 73 |
2 | Supply Chain Management | 408 | 1.0 | 16.5 | 8.1 | 49 |
3 | Localization | 402 | −4.5 | 28.0 | 13.9 | 32 |
4 | Traceability | 307 | −1.5 | 17.0 | 11.1 | 29 |
5 | Logistics | 264 | −1.5 | 11.0 | 8.3 | 20 |
6 | Ubiquitous Computing | 210 | 0.5 | 4.0 | 3.8 | 25 |
7 | Healthcare | 165 | 1.0 | 11.0 | 13.3 | 23 |
8 | Access Control | 131 | 2.0 | 8.0 | 12.2 | 14 |
Pos | Author Keywords | Total | AGR | ADY | PDLY | h-Index |
---|---|---|---|---|---|---|
1 | Security | 1974 | 2.0 | 107.0 | 10.8 | 57 |
2 | Authentication | 692 | 0.5 | 42.0 | 12.1 | 44 |
3 | Privacy | 671 | −2.0 | 19.0 | 5.7 | 49 |
4 | Ownership transfer | 93 | −2.0 | 3.5 | 7.5 | 16 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Munoz-Ausecha, C.; Ruiz-Rosero, J.; Ramirez-Gonzalez, G. RFID Applications and Security Review. Computation 2021, 9, 69. https://doi.org/10.3390/computation9060069
Munoz-Ausecha C, Ruiz-Rosero J, Ramirez-Gonzalez G. RFID Applications and Security Review. Computation. 2021; 9(6):69. https://doi.org/10.3390/computation9060069
Chicago/Turabian StyleMunoz-Ausecha, Cesar, Juan Ruiz-Rosero, and Gustavo Ramirez-Gonzalez. 2021. "RFID Applications and Security Review" Computation 9, no. 6: 69. https://doi.org/10.3390/computation9060069
APA StyleMunoz-Ausecha, C., Ruiz-Rosero, J., & Ramirez-Gonzalez, G. (2021). RFID Applications and Security Review. Computation, 9(6), 69. https://doi.org/10.3390/computation9060069