RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification
RFID: Applications, Security, and Privacy
RFID: Applications, Security, and Privacy
RFID Privacy: An Overview of Problems and Proposed Solutions
IEEE Security and Privacy
Privacy and Technologies of Identity: A Cross-Disciplinary Conversation
Privacy and Technologies of Identity: A Cross-Disciplinary Conversation
Privacy threats and issues in mobile RFID
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
Securing RFID Systems by Detecting Tag Cloning
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
A Mobile Personalized RFID System
NBIS '09 Proceedings of the 2009 International Conference on Network-Based Information Systems
RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Security analysis and implementation leveraging globally networked RFIDs
PWC'06 Proceedings of the 11th IFIP TC6 international conference on Personal Wireless Communications
RFID system with fairness within the framework of security and privacy
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
RFID traceability: a multilayer problem
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
WIPI mobile platform with secure service for mobile RFID network environment
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
Mobile RFID applications and security challenges
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
Modeling privacy for off-line RFID systems
CARDIS'10 Proceedings of the 9th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Application
Secure UHF/HF dual-band RFID: strategic framework approaches and application solutions
ICCCI'11 Proceedings of the Third international conference on Computational collective intelligence: technologies and applications - Volume Part I
Secure RFID personal data management using privacy reference profile
FGIT'11 Proceedings of the Third international conference on Future Generation Information Technology
Hi-index | 0.00 |
The typical Radio Frequency Identification (RFID) architecture, defined by EPCglobal, comprises RFID tags, which are embedded or attached to objects, an RFID reader and Information Services (ISs) server. The RFID reader can be stationary or mobile; the latter enables more applications. This paper describes the core components required for realising a mobile RFID application, such as mobile RFID reader and the platform and network architectures. Although several types of mobile RFID readers are available, we propose and analyse the characteristics of customised mobile RFID technology, which affords several advantages related to security, network architecture, and operation scenario etc.