Mathematics and Computer Science

| Peer-Reviewed |

Ubiquitous Computing with Radio Frequency IDentification Tags

Received: 23 July 2023    Accepted: 14 August 2023    Published: 28 August 2023
Views:       Downloads:

Share This Article

Abstract

Ubiquitous computing is seen as a promising and revolutionary technological path. The goal of promoting marketable innovations and applications is addressed through intense research and developmental activities and policy strategies. This article discusses the state-of-the-art approach of the use case and the drawbacks of identification tags for radio frequency. Radio Frequency IDentification or RFID technology is a growing trend among separate automated technologies for identification. RFIDs are used in construction, engineering, chemical, manufacturing, retail, logistics, and other public industries. The importance and various advantages of RFID in different industries are therefore sometimes different. In this paper, we have performed an extensive literature survey of its current applications and the security measures that can be taken to improve the system. The paper gives an extended model of possible RFID applications in the field of mass gathering and other related applications such as crowd management and stampede management. To manage or optimize the degree of mortality rate concerning the size of the crowd, the paper proposes algorithmic approaches that can be implemented to minimize the degree of mortality. At the end of the RFID applications, other suggested applications have also been provided. Apart from the current RFID security measures, some proposed security solutions such as Tag Data Security, Maintaining Reader Integrity, Personal Privacy, and Improved Hash Lock have also been provided.

DOI 10.11648/j.mcs.20230803.12
Published in Mathematics and Computer Science (Volume 8, Issue 3, May 2023)
Page(s) 73-86
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

DDOS, Digestive Tags, Bacon, EPC, Eavesdropper, Cryptanalysis, Randomized Hash Function

References
[1] Camacho-Cogollo, Javier Enrique, Isis Bonet, and Ernesto Iadanza. "RFID technology in health care." Clinical Engineering Handbook. Academic Press, 2020. 33-41.
[2] Elbasani, Ermal, Pattamaset Siriporn, and Jae Sung Choi. "A Survey on RFID in Industry 4.0." Internet of Things for Industry 4.0. Springer, Cham, 2020. 1-16.
[3] Papapostolou, Apostolia, and Hakima Chaouchi. "Exploiting multi-modality and diversity for localization enhancement: WiFi & RFID usecase." 2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications. IEEE, 2019.
[4] Monico, Dominick L. "Low cost long distance RFID reading." U. S. Patent No. 6, 259, 369. 10 Jul. 2001.
[5] Dastoori, K., B. Makin, and S. Bappoo. "The effectiveness of passive RFID Tags in the presence of charged particles." Journal of Electrostatics 67.2-3 (2009): 468-472.
[6] Liu, Yali, Martianus Frederic Ezerman, and Huaxiong Wang. "Double verification protocol via secret sharing for low-cost RFID Tags." Future Generation Computer Systems 90 (2019): 118-128.
[7] Mitra, Mala. "Privacy for RFID systems to prevent tracking and cloning." International Journal of Computer Science and Network Security 8.1 (2008): 1-5.
[8] Jeong, Soyeon, et al. "Read/Interrogation Enhancement of Chipless RFIDs Using Machine Learning Techniques." IEEE Antennas and Wireless Propagation Letters 18.11 (2019): 2272-2276.
[9] Al-Shaery, Ali M., Mohamed O. Khozium, Norah S. Farooqi, Shroug S. Alshehri, and Mohammad Adnan MB Al-Kawa. "Problem solving in crowd management using heuristic approach." IEEE Access 10 (2022): 25422-25434.
[10] Hussain, Muzammil, and Arshad Hashmi. "SECURITY THREATS IN IOT VIA LAYERED ARCHITECHTURE." International Journal of Future Generation Communication and Networking 12.5 (2019): 173-185.
[11] Shariq, Mohd, and Karan Singh. "A vector-space-based lightweight rfid authentication protocol." International Journal of Information Technology 14, no. 3 (2022): 1311-1320.
[12] Sklovsky, Vladimir, Ruben R. Formoso, and Lyle A. Gaastra. "Method and system for monitoring secure application execution events during contactless RFID/NFC communication." U. S. Patent No. 10, 311, 427. 4 Jun. 2019.
[13] Ke, Qiao, Jakub Siłka, Michał Wieczorek, Zongwen Bai, and Marcin Woźniak. "Deep neural network heuristic hierarchization for cooperative intelligent transportation fleet management." IEEE Transactions on Intelligent Transportation Systems 23, no. 9 (2022): 16752-16762.
[14] Gao, Ming, and YuBin Lu. "URAP: A new ultra-lightweight RFID authentication protocol in passive RFID system." The Journal of Supercomputing 78, no. 8 (2022): 10893-10905.
[15] Shariq, Mohd, Karan Singh, Pramod Kumar Maurya, Ali Ahmadian, and David Taniar. "AnonSURP: an anonymous and secure ultralightweight RFID protocol for deployment in internet of vehicles systems." The Journal of Supercomputing (2022): 1-26.
[16] Alajami, Abdussalam A., Guillem Moreno, and Rafael Pous. "A ROS Gazebo Plugin Design to Simulate RFID Systems." IEEE Access 10 (2022): 93921-93932.
[17] Ahsan, Kamran, Hanifa Shah, and Paul Kingston. "RFID applications: An introductory and exploratory study." arXiv preprint arXiv: 1002.1179 (2010).
[18] Welbourne, Evan, et al. "Building the internet of things using RFID: the RFID ecosystem experience." IEEE Internet computing 13.3 (2009): 48-55.
[19] Nunes-Silva, P., et al. "Applications of RFID technology on the study of bees." Insectes sociaux 66.1 (2019): 15-24.
[20] Nikooghadam, Mahdi, Hamid Reza Shahriari, and Saeid Tousi Saeidi. "HAKECC: Highly efficient authentication and key agreement scheme based on ECDH for RFID in IOT environment." Journal of Information Security and Applications 76 (2023): 103523.
[21] Kumar, Vikas, Rahul Kumar, Akber Ali Khan, Vinod Kumar, Yu-Chi Chen, and Chin-Chieh Chang. "RAFI: robust authentication framework for IoT-based RFID infrastructure." Sensors 22, no. 9 (2022): 3110.
[22] Tewari, Aakanksha, and B. B. Gupta. "Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID Tags." The Journal of Supercomputing 73.3 (2017): 1085-1102.
[23] Shen, Han, et al. "Efficient RFID authentication using elliptic curve cryptography for the internet of things." Wireless Personal Communications 96.4 (2017): 5253-5266.
[24] Shuyu, Chen, and Yan Limin. "A low-overhead PUF for anti-clone attack of RFID tags." Microelectronics Journal 126 (2022): 105497.
[25] Hernandez-Castro, Julio Cesar, et al. "Cryptanalysis of the David-Prasad RFID ultralightweight authentication protocol." International Workshop on Radio Frequency IDentification: Security and Privacy Issues. Springer, Berlin, Heidelberg, 2010.
[26] Wang, Xingmiao, Kai Fan, Kan Yang, Xiaochun Cheng, Qingkuan Dong, Hui Li, and Yintang Yang. "A new RFID ultra-lightweight authentication protocol for medical privacy protection in smart living." Computer Communications 186 (2022): 121-132.
[27] Bowers, John H., and Thomas J. Clare. "Rfid Tags which are virtually activated and/or deactivated and apparatus and methods of using same in an electronic security system." U. S. Patent No. 6, 025, 780. 15 Feb. 2000.
[28] Feldhofer, Martin. "An authentication protocol in a security layer for RFID smart Tags." Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference (IEEE Cat. No. 04CH37521). Vol. 2. IEEE, 2004.
[29] Sadiku, Matthew NO, Abayomi J. Ajayi-Majebi, and Philip O. Adebo. "Ubiquitous Manufacturing." In Emerging Technologies in Manufacturing, pp. 215-231. Cham: Springer International Publishing, 2023.
[30] Mertler, Craig A., and Rachel Vannatta Reinhart. Advanced and multivariate statistical methods: Practical application and interpretation. Taylor & Francis, 2016.
[31] Glidden, Rob, et al. "Design of ultra-low-cost UHF RFID Tags for supply chain applications." IEEE Communications Magazine 42.8 (2004): 140-151.
[32] Gope, Prosanta, Yuening Wang, Zengpeng Li, and Biplab Sikdar. "QR-PUF: Design and Implementation of A RFID-based Secure Inpatient Management System Using XOR-Arbiter-PUF and QR-Code." IEEE Transactions on Network Science and Engineering (2022).
[33] Vena, Arnaud, et al. "Design of chipless RFID Tags printed on paper by flexography." IEEE Transactions on Antennas and Propagation 61.12 (2013): 5868-5877.
[34] Leong, Kin Seong, Mun Leng Ng, and Peter H. Cole. "Investigation on the deployment of HF and UHF RFID Tag in livestock identification." 2007 IEEE Antennas and Propagation Society International Symposium. IEEE, 2007.
[35] Brito, Jerry. "Relax, don’t do it: Why RFID privacy concerns are exaggerated and legislation is premature." UCLA JL & TECH. 2004 (2004): 5.
[36] Kim, Do-Yun, et al. "Effects of reader-to-reader interference on the UHF RFID interrogation range." IEEE Transactions on Industrial Electronics 56.7 (2019): 2337-2346.
[37] Kortvedt, Henning, and S. Mjolsnes. "Eavesdropping near field communication." The Norwegian Information Security Conference (NISK). Vol. 27. 2009.
[38] Hussien, Naseer Ali, et al. "Smart Shopping System with RFID Technology Based on Internet of Things." International Journal of Interactive Mobile Technologies (iJIM) 14.04 (2020): 17-29.
[39] Brand, Timothy K. "Antenna system and method for reading low frequency Tags." U. S. Patent No. 6, 750, 771. 15 Jun. 2014.
[40] Egbert, William C. "Ultra high frequency radio frequency identification Tag." U. S. Patent No. 7, 215, 295. 8 May 2017.
[41] Mohammad, Gouse Baig, Shitharth Shitharth, Salman Ali Syed, Raman Dugyala, K. Sreenivasa Rao, Fayadh Alenezi, Sara A. Althubiti, and Kemal Polat. "Mechanism of internet of things (IoT) integrated with radio frequency identification (RFID) technology for healthcare system." Mathematical Problems in Engineering 2022 (2022): 1-8.
[42] Whitesmith, Howard William, Timothy John Palmer, and Alan Edward Ball. "RFID detection system." U. S. Patent No. 6, 577, 238. 10 Jun. 2013.
[43] Khan, Muhammad Ayaz, Subhan Ullah, Tahir Ahmad, Khwaja Jawad, and Attaullah Buriro. "Enhancing Security and Privacy in Healthcare Systems Using a Lightweight RFID Protocol." Sensors 23, no. 12 (2023): 5518.
[44] Fu, Yongqing, Chun Zhang, and Jingchao Wang. "A research on Denial of Service attack in passive RFID system." 2010 International Conference on Anti-Counterfeiting, Security and Identification. IEEE, 2010.
[45] Puica, Elena. "Improving Supply Chain Management by Integrating RFID with IoT Shared Database: Proposing a System Architecture." In IFIP International Conference on Artificial Intelligence Applications and Innovations, pp. 159-170. Cham: Springer Nature Switzerland, 2023.
[46] Mtita, Collins, Maryline Laurent, and Jacques Delort. "Efficient serverless radio-frequency identification mutual authentication and secure Tag search protocols with untrusted readers." IET Information Security 10.5 (2016): 262-271.
[47] Ngai, Ka Ming, et al. "Human stampedes: a systematic review of historical and peer-reviewed sources." Disaster medicine and public health preparedness 3.4 (2019): 191-195.
[48] Turksonmez, Halit, and Mehmet Hilal Ozcanhan. "ENHANCING SECURITY OF RFID-ENABLED IOT SUPPLY CHAIN." Malaysian Journal of Computer Science 36, no. 3 (2023): 289-307.
[49] Grace, R. Kingsy, and S. Manju. "A Comprehensive Review of Wireless Sensor Networks Based Air Pollution Monitoring Systems." Wireless Personal Communications 108.4 (2019): 2499-2515.
[50] Wei, Guo-heng, Yan-lin Qin, and Wei Fu. "An improved security authentication protocol for lightweight RFID based on ECC." Journal of Sensors 2022 (2022).
Cite This Article
  • APA Style

    Shabbir Hassan, Ahmad Raza Shibli, Rehan Raza. (2023). Ubiquitous Computing with Radio Frequency IDentification Tags. Mathematics and Computer Science, 8(3), 73-86. https://doi.org/10.11648/j.mcs.20230803.12

    Copy | Download

    ACS Style

    Shabbir Hassan; Ahmad Raza Shibli; Rehan Raza. Ubiquitous Computing with Radio Frequency IDentification Tags. Math. Comput. Sci. 2023, 8(3), 73-86. doi: 10.11648/j.mcs.20230803.12

    Copy | Download

    AMA Style

    Shabbir Hassan, Ahmad Raza Shibli, Rehan Raza. Ubiquitous Computing with Radio Frequency IDentification Tags. Math Comput Sci. 2023;8(3):73-86. doi: 10.11648/j.mcs.20230803.12

    Copy | Download

  • @article{10.11648/j.mcs.20230803.12,
      author = {Shabbir Hassan and Ahmad Raza Shibli and Rehan Raza},
      title = {Ubiquitous Computing with Radio Frequency IDentification Tags},
      journal = {Mathematics and Computer Science},
      volume = {8},
      number = {3},
      pages = {73-86},
      doi = {10.11648/j.mcs.20230803.12},
      url = {https://doi.org/10.11648/j.mcs.20230803.12},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.mcs.20230803.12},
      abstract = {Ubiquitous computing is seen as a promising and revolutionary technological path. The goal of promoting marketable innovations and applications is addressed through intense research and developmental activities and policy strategies. This article discusses the state-of-the-art approach of the use case and the drawbacks of identification tags for radio frequency. Radio Frequency IDentification or RFID technology is a growing trend among separate automated technologies for identification. RFIDs are used in construction, engineering, chemical, manufacturing, retail, logistics, and other public industries. The importance and various advantages of RFID in different industries are therefore sometimes different. In this paper, we have performed an extensive literature survey of its current applications and the security measures that can be taken to improve the system. The paper gives an extended model of possible RFID applications in the field of mass gathering and other related applications such as crowd management and stampede management. To manage or optimize the degree of mortality rate concerning the size of the crowd, the paper proposes algorithmic approaches that can be implemented to minimize the degree of mortality. At the end of the RFID applications, other suggested applications have also been provided. Apart from the current RFID security measures, some proposed security solutions such as Tag Data Security, Maintaining Reader Integrity, Personal Privacy, and Improved Hash Lock have also been provided.},
     year = {2023}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Ubiquitous Computing with Radio Frequency IDentification Tags
    AU  - Shabbir Hassan
    AU  - Ahmad Raza Shibli
    AU  - Rehan Raza
    Y1  - 2023/08/28
    PY  - 2023
    N1  - https://doi.org/10.11648/j.mcs.20230803.12
    DO  - 10.11648/j.mcs.20230803.12
    T2  - Mathematics and Computer Science
    JF  - Mathematics and Computer Science
    JO  - Mathematics and Computer Science
    SP  - 73
    EP  - 86
    PB  - Science Publishing Group
    SN  - 2575-6028
    UR  - https://doi.org/10.11648/j.mcs.20230803.12
    AB  - Ubiquitous computing is seen as a promising and revolutionary technological path. The goal of promoting marketable innovations and applications is addressed through intense research and developmental activities and policy strategies. This article discusses the state-of-the-art approach of the use case and the drawbacks of identification tags for radio frequency. Radio Frequency IDentification or RFID technology is a growing trend among separate automated technologies for identification. RFIDs are used in construction, engineering, chemical, manufacturing, retail, logistics, and other public industries. The importance and various advantages of RFID in different industries are therefore sometimes different. In this paper, we have performed an extensive literature survey of its current applications and the security measures that can be taken to improve the system. The paper gives an extended model of possible RFID applications in the field of mass gathering and other related applications such as crowd management and stampede management. To manage or optimize the degree of mortality rate concerning the size of the crowd, the paper proposes algorithmic approaches that can be implemented to minimize the degree of mortality. At the end of the RFID applications, other suggested applications have also been provided. Apart from the current RFID security measures, some proposed security solutions such as Tag Data Security, Maintaining Reader Integrity, Personal Privacy, and Improved Hash Lock have also been provided.
    VL  - 8
    IS  - 3
    ER  - 

    Copy | Download

Author Information
  • Department of Computer Science, Aligarh Muslim University, Aligarh, India

  • Department of Computer Science, Aligarh Muslim University, Aligarh, India

  • Department of Computer Science and Engineering, NIT Calicut, Kerala, India

  • Sections