Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (2)

Search Parameters:
Keywords = ISO/IEC 14443

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
15 pages, 11615 KB  
Article
A Fully Integrated RFID Reader SoC
by Jian-Guo Hu, Wen-Zhuo Mei, Jin Wu, Jia-Wei Li and De-Ming Wang
Micromachines 2023, 14(9), 1691; https://doi.org/10.3390/mi14091691 - 29 Aug 2023
Cited by 4 | Viewed by 3151
Abstract
The traditional RFID reader module relies on a discrete original design. This design integrates a microcontroller, high-frequency RFID reader IC and other multiple chips onto a PCB board, leading to bottlenecks in cost, power consumption, stability and reliability. To align with the trend [...] Read more.
The traditional RFID reader module relies on a discrete original design. This design integrates a microcontroller, high-frequency RFID reader IC and other multiple chips onto a PCB board, leading to bottlenecks in cost, power consumption, stability and reliability. To align with the trend towards high integration, miniaturization and low power consumption in RFID reader, this paper introduces a fully integrated RFID Reader SoC. The SoC employs the open-source Cortex-M0 core to integrate the RF transceiver, analog circuits, baseband protocol processing, memory and interface circuits into one chip. It’s compatible with ISO/IEC 14443 A-type and B-type and ISO/IEC 15693 transmission protocols and rates. Manufactured using a 0.18 μm process, the chip is compatible with multiple standards. The optimized design of the digital baseband control circuit results in a chip area of only 11.95 mm2 offering clear advantages in both area and integration compared to similar work. Full article
(This article belongs to the Special Issue System-on-a-Chip (SoC): Design and Applications)
Show Figures

Figure 1

31 pages, 12174 KB  
Article
Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications
by Tiago M. Fernández-Caramés, Paula Fraga-Lamas, Manuel Suárez-Albela and Luis Castedo
Sensors 2017, 17(1), 28; https://doi.org/10.3390/s17010028 - 24 Dec 2016
Cited by 73 | Viewed by 18123
Abstract
The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine [...] Read more.
The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3) to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol. Full article
(This article belongs to the Special Issue New Generation Sensors Enabling and Fostering IoT)
Show Figures

Figure 1

Back to TopTop