-
141
Industrial Pipe-Rack Health Monitoring System Based on Reliable-Secure Wireless Sensor Network
Published 2012-10-01Get full text
Article -
142
IoT-Based Library Automation & Monitoring system: Developing an Implementation framework
Published 2017-12-01“…IoT as a prevalent phenomenon is transforming daily life by the usage of the smart features of Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) technologies. …”
Get full text
Article -
143
An Efficient Adaptive Anticollision Algorithm Based on 4-Ary Pruning Query Tree
Published 2013-12-01“…In radio frequency identification system (RFID), the efficiency in which the reader identifies multiple tags is closely related to the methods to solve the collision of multiple tags. …”
Get full text
Article -
144
Reconstructing a lightweight security protocol in the radio‐frequency identification systems
Published 2023-07-01“…The use of RFID to secure IoT systems is growing rapidly, for it provides small‐scale efficient security mechanisms. …”
Get full text
Article -
145
An overview of smart agriculture using internet of things (IoT) and web services
Published 2025-06-01“…The abstract underscores the importance of GUI applications for user-friendly interaction with IoT systems and the widespread use of RFID for tracking items, especially in supply chain management and inventory tracking. …”
Get full text
Article -
146
Key technologies of personnel location’s management system for pumped storage power station
Published 2018-05-01“…The ultra wideband location has the advantages of low power consumption,high speed transmission and high security level,especially it can support high location accuracy.It plays an irreplaceable role in the information construction of pumped storage power station.The ultra wideband positioning technology was introduced.The positioning technologies such as RFID,ZigBee,high-frequency pulse were compared and analyzed.The system architecture and positioning principle were described.Finally,the application of the pumped storage power station were introduced.…”
Get full text
Article -
147
Research progress of the antenna technology for internet of things
Published 2019-07-01“…From the perspectives of RFID antennas, wearable/implantable antennas, multi-physical sensing antennas, energy harvesting antennas, and on-chip package antennas based on advanced materials and processes, the current research progress of antenna technology for internet of things was introduced. …”
Get full text
Article -
148
Novel and lightweight digital signature scheme
Published 2010-01-01“…Digital signatures have many applications in information security,including authentication,data integrity and non-repudiation.However,the number theoretic-based schemes such as RSA and ECC are relatively slow in performance.These schemes do not seem to be suitable for small computing devices with limited computing capacity,such as smart cards,wireless sensor networks,and active RFID tags.Based on the hash authentication technology,a novel lightweight digital signature scheme was proposed for achieving secure and efficient signature function.Security analysis and experimental results show that it can be used as a possible alternative to the current public key cryptosystems.…”
Get full text
Article -
149
Research of authentication techniques for the Internet of things
Published 2020-07-01“…Identity authentication technology is a key technology in the Internet of things (IoT)security field which ensures the authenticity of the identity information of users and device nodes connected to the IoT.Due to the low cost,low power consumption,small storage of IoT devices and heterogeneity of IoT network,the identity authentication mechanisms in traditional computer networks are often not applicable.Firstly,the development process of IoT was introduced,the security risks of IoT and the challenges faced by the authentication work were analyzed.Then the emphasis was put on comparison of the advantages and disadvantages among five typical authentication protocols.Moreover,the authentication technologies in several practical scenarios of RFID,smart grid,Internet of vehicles,and smart home were summarized and analyzed.Finally,the future research direction was discussed.…”
Get full text
Article -
150
A novel fast tag number estimation algorithm
Published 2017-10-01“…Tag number estimation is one of the key technologies in radio frequency identification (RFID) system.The conventional estimation algorithms usually interrogate all time slots before estimating the tag quantity,which lead to large payload and time consumption.A rapid estimation algorithm was proposed.By judging the collision of the first 4 slots in each frame,the Q parameter values could be adjusted quickly,and then the number of tag estimates could be obtained by querying a small number of slots.Simulation results show that compared with the traditional tag estimation algorithm,the proposed algorithm has the advantages of fast estimation speed and small estimation error,and is very suitable for fast estimation.…”
Get full text
Article -
151
Breaking novel and lightweight digital <sub>s</sub> ignature scheme
Published 2013-07-01“…The signature schemes based on RSA and ECC do not seem suitable for special application area such as wire-less sensor network, smart card and wireless RFID since they suffer from low computing efficiency. …”
Get full text
Article -
152
Technology evolution and industry development of 5G + industrial proximity network
Published 2022-05-01“…In recent years, IoT technology had been widely used in new retail, smart logistics, smart parks, smart manufacturing and other industries, including product management based on RFID, equipment data collection based on short-distance communication, equipment remote control based on deterministic transmission, etc.These communication technologies used for equipment connection and data intercommunication were called industrial proximity network.The concept, development history of proximity network was introduced, and demand for the integration of proximity network and cellular network in the digital and intelligent transformation of verticals was analyzed.Then the architecture, technical advantages and development trends of 5G+ industrial proximity network and its typical applications were expounded, which aimed to provide new ideas for the developing of industrial proximity network.…”
Get full text
Article -
153
Ambient backscatter communications technology for batteryless IoT
Published 2019-06-01“…As one of the core enabling technologies supporting the batteryless Internet of things(IoT),ambient backscattering communication technology has the characteristics of low power consumption and low cost.Firstly,the basic concept of ambient backscattering communication technology and the research status at home and abroad were introduced.Then,based on an in-depth analysis of the differences between ambient backscattering communication technology and RFID technology,the technical difficulties faced by the ambient backscattering communication system were described in detail,including large detection delay,high bit error rate,low transmission rate and short communication distance.In addition,a series of potential solutions to the challenges were proposed.Finally,the future research directions of ambient backscattering communication were prospected.…”
Get full text
Article -
154
Zero correlation-integral attack of MIBS block cipher
Published 2016-11-01“…MIBS is a lightweight block cipher for extremely constrained environments such as RFID tags and sensor networks. The MIBS algorithm's ability to resist zero correlation-integral analysis was evaluated. …”
Get full text
Article -
155
Coding technology of passive internet of things
Published 2023-09-01“…Passive backscatter communication can free wireless sensors from limited-life batteries and heavy manual maintenance, and will also reduce their hardware cost.Passive backscatter communication is one of the key technologies to realize the passive internet of things (IoT).Due to the limited resources of passive sensor nodes, how to use coding technology to improve system reliability has become a challenging problem for passive IoT.The coding and decoding technologies of passive nodes in the passive IoT were focused on.Firstly, the development history of traditional channel coding and the existing RFID channel coding and decoding schemes were systematically expounded.Then, three suitable coding schemes were selected for passive backscatter communication technology.Finally, the performance of these three encoding schemes were compared by simulation and the advantages and disadvantages were summarized.…”
Get full text
Article -
156
Design concept of novel balanced multi-band antenna for sensor
Published 2010-01-01“…Design concept of a novel balanced multi-band tag antenna for Internet of things sensors applications was proposed.The antenna has a symmetrical structure so that it can be easily and directly integrated with differential driving RF front ends.The antenna’s surface current distribution,radiation patterns,impedance matching characteristics and gain,were numerically studied by using computer simulations,and the operating principle of the antenna was determined.Based on the numerically and basic experimental results,it is concluded that the antenna has a compact size and moderate gain,and can cover the bands of 2.4~2.5GHz/5.1~12GHz,which are for RFID and short-range wireless access applications.Thus the antenna can be used as tag antenna for wireless sensors in Internet of things.…”
Get full text
Article -
157
An Intelligent Traffic Flow Control System Based on Radio Frequency Identification and Wireless Sensor Networks
Published 2014-05-01“…This study primarily focuses on the use of radio frequency identification (RFID) as a form of traffic flow detection, which transmits collected information related to traffic flow directly to a control system through an RS232 interface. …”
Get full text
Article -
158
Biclique cryptanalysis on lightweight block ciphers I-PRESENT-80 and I-PRESENT-128
Published 2017-11-01“…I-PRESENT was a lightweight SPN block cipher for resource-constraint environments such as RFID tags and sensor networks.The biclique structures of I-PRESENT with sieve-in-the-middle technique was an constracted.The biclique cryptanalysis schemes on full-round I-PRESENT-80 and I-PRESENT-128 were proposed for the first time.The results show that the data complexity of the biclique cryptanalysis on I-PRESENT-80 and I-PRESENT-128 is 2 <sup>26</sup> and 2<sup>36</sup> chosen ciphertexts respectively,and the time complexity on them is 2 <sup>79.48</sup> and 2 <sup>127.33</sup> encryptions respectively.The time and data complexity are better than that of the exhaustive attack.In addition,the time complexity on them can be reduced to 2 <sup>78.61</sup> and 2<sup>126.48</sup> encryptions by using related-key technology of I-PRESENT.…”
Get full text
Article -
159
Research on Transmission Capacity Characteristics of the Cluster Flight Spacecraft Network
Published 2021-01-01Get full text
Article -
160
Research on Interactive Art Online Teaching System Based on BS Mode and Internet of Things
Published 2021-01-01“…Design the overall structure of the art teaching system according to THE B/S structure, build the interactive art online teaching model according to the system role use cases, introduce the RFID technology in the Internet of Things to control the information transmission of the interactive art online teaching system, and complete the code development of interactive art online teaching function. …”
Get full text
Article