Special Issue "New Developments in RFID Technologies and Applications and Their Integration into IoT"

A special issue of Future Internet (ISSN 1999-5903).

Deadline for manuscript submissions: closed (31 December 2018)

Special Issue Editor

Guest Editor
Prof. Dr. Raed Abd-Alhameed

Faculty of Engineering and Informatics, University of Bradford, BD7 1DP Bradford, U.K.
Website | E-Mail
Interests: Radio Frequency Engineering, Beamforming, Phased Array and MIMO antennas, Indoor and Outdoor Propagation, Bioelectromagnetics, Electromagnetic Computational Techniques, EMC, Reconfigurable RF Front End, Energy efficient Power Amplifiers, RF predistorter design, Hybrid Computational Optimization

Special Issue Information

Dear Colleagues,

The quest in the research community to achieve scalable, energy-efficient, and robust ubiquitous system and applications, has inadvertently brought to fore the many desirable potentials of RFID. RFID, which supports the easy identification of physical objects and people, is a fast-paced research. Moreover, with the advent of the Internet of Things (IoT) paradigm, the integration of RFID systems in many wireless and ubiquitous applications has resulted in the development of many exciting, innovative and automated system. Furthermore, the introduction of IoT in healthcare to foster quality and safe healthcare applications, the need to elevate the many traditional applications of RFID becomes a reality requisite. Therefore, the field of RFID is gaining continued momentum in research and design, with the general acceptance as an efficient technology capable of ameliorating the many drawbacks of several technologies.

RFID, though widely accepted as an exciting technology, presents several significant design challenges and issues to engineers and researchers. These issues arise from the context-aware processing of RFID data, achieving efficient matching and read range, developing novel smart IoT-based applications, achieving smart and human interaction, and privacy and security issue of RFID data within the IoT context.

This Special Issue solicits original papers that contribute to the understanding of RFID and its impact on the design, development and use of applications in ubiquitous environments.

Specific Topics

Submission can focus on the conceptual and applied research in topics including, but not limited to:

  • Antenna and propagation in the RFID frequencies
  • Signal processing of data in RFID system
  • Pervasive applications in mobile and ubiquitous environments for identification and monitoring
  • RFID in eHealth
  • Touchless identification
  • RFID in Biomedical Applications
  • RFID inside a living body
  • Security on RFID technology
  • RFID and the Internet of Things
  • Passive and Active RFID Technologies and Applications

Submission should be high quality for an international journal, and should not have submitted or published elsewhere. However, the extended versions of conference papers that show significant improvement (minimal of over 30%) can be considered for review to this special issue.

Technical Programme Committee members:
1. Professor Peter Excell, Wrexham University
2. Professor Rami Qahwaji, University of Bradford
3. Professor Simon Shepherd, University of Bradford
4. Professor Jonathan Rodriguez, South Wales University
5. Professor Irfan Awan, University of Bradford
6. Professor Neil McEwan, University of Bradford
7. Dr James M Noras, University of Bradford
8. Dr Chan H See, University of Bolton
9. Dr Rameez Asif, University of Bradford/ Visibility Asset Management Solutions Co., UK
10. Dr Atojoko Achimugu Alpha, University of Bradford/ Avery.com, UK

Prof. Raed A. Abd-Alhameed
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1000 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (3 papers)

View options order results:
result details:
Displaying articles 1-3
Export citation of selected articles as:

Research

Open AccessArticle RFID Based Manufacturing Process of Cloud MES
Future Internet 2018, 10(11), 104; https://doi.org/10.3390/fi10110104
Received: 6 September 2018 / Revised: 20 October 2018 / Accepted: 24 October 2018 / Published: 30 October 2018
PDF Full-text (3378 KB) | HTML Full-text | XML Full-text
Abstract
RFID (radio frequency identification) is widely used in the manufacturing processes of enterprises. At the same time, with the advent of the Industry 4.0 era, Manufacturing Execution System (MES) systems began to evolve into cloud MES systems. In this paper, a RFID-based manufacturing
[...] Read more.
RFID (radio frequency identification) is widely used in the manufacturing processes of enterprises. At the same time, with the advent of the Industry 4.0 era, Manufacturing Execution System (MES) systems began to evolve into cloud MES systems. In this paper, a RFID-based manufacturing process for cloud MES is proposed and a framework manufacturing process fora cloud MES system centered on machine tools is constructed. The process division of the manufacturing process, RFID configuration and cloud processing are analyzed, and other key technologies involved in implementing the framework are briefly discussed. Finally, the effectiveness of a RFID-based manufacturing process of cloud MES is verified by two different types of case analysis namely photovoltaic slice production and garment outsourcing processing. Full article
Figures

Figure 1

Open AccessArticle A Modified BA Anti-Collision Protocol for Coping with Capture Effect and Interference in RFID Systems
Future Internet 2018, 10(10), 96; https://doi.org/10.3390/fi10100096
Received: 19 August 2018 / Revised: 22 September 2018 / Accepted: 24 September 2018 / Published: 1 October 2018
PDF Full-text (7867 KB) | HTML Full-text | XML Full-text
Abstract
Radio frequency identification (RFID) technology has widely been used in the last few years. Its applications focus on auto identification, tracking, and data capturing issues. However, RFID suffers from the main problem of tags collision when multiple tags simultaneously respond to the reader
[...] Read more.
Radio frequency identification (RFID) technology has widely been used in the last few years. Its applications focus on auto identification, tracking, and data capturing issues. However, RFID suffers from the main problem of tags collision when multiple tags simultaneously respond to the reader request. Many protocols were proposed to solve the collision problems with good identification efficiency and an acceptable time delay, such as the blocking anti-collision protocol (BA). Nevertheless, most of these protocols assumed that the RFID reader could decode the tag’s signal only when there was one tag responding to the reader request once each time. Hence, they ignored the phenomenon of the capture effect, which results in identifying the tag with the stronger signal as the multiple tags simultaneously respond. As a result, many tags will not be identified under the capture effect. Therefore, the purpose of this paper is to take the capture effect phenomenon into consideration in order to modify the blocking BA protocol to ensure a full read rate, i.e., identifying all the tags in the frame without losing any tag. Moreover, the modifications include distinguishing between collision and interference responses (for the period of staying tags) in the noisy environments, for the purpose of enhancing the efficiency of the identification. Finally, the simulation and analytical results show that our modifications and MBA protocol outperform the previous protocols in the same field, such as generalized query tree protocols (GQT1 and GQT2), general binary tree (GBT), and tweaked binary tree (TBT). Full article
Figures

Figure 1

Open AccessArticle On the Security of Rotation Operation Based Ultra-Lightweight Authentication Protocols for RFID Systems
Future Internet 2018, 10(9), 82; https://doi.org/10.3390/fi10090082
Received: 7 July 2018 / Revised: 12 August 2018 / Accepted: 17 August 2018 / Published: 21 August 2018
PDF Full-text (412 KB) | HTML Full-text | XML Full-text
Abstract
Passive Radio Frequency IDentification (RFID) tags are generally highly constrained and cannot support conventional encryption systems to meet the required security. Hence, designers of security protocols may try to achieve the desired security only using limited ultra-lightweight operations. In this paper, we show
[...] Read more.
Passive Radio Frequency IDentification (RFID) tags are generally highly constrained and cannot support conventional encryption systems to meet the required security. Hence, designers of security protocols may try to achieve the desired security only using limited ultra-lightweight operations. In this paper, we show that the security of such protocols is not provided by using rotation functions. In the following, for an example, we investigate the security of an RFID authentication protocol that has been recently developed using rotation function named ULRAS, which stands for an Ultra-Lightweight RFID Authentication Scheme and show its security weaknesses. More precisely, we show that the ULRAS protocol is vulnerable against de-synchronization attack. The given attack has the success probability of almost ‘1’, with the complexity of only one session of the protocol. In addition, we show that the given attack can be used as a traceability attack against the protocol if the parameters’ lengths are an integer power of 2, e.g., 128. Moreover, we propose a new authentication protocol named UEAP, which stands for an Ultra-lightweight Encryption based Authentication Protocol, and then informally and formally, using Scyther tool, prove that the UEAP protocol is secure against all known active and passive attacks. Full article
Figures

Figure 1

Future Internet EISSN 1999-5903 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top