Spelling suggestions: "subject:"[een] RFID"" "subject:"[enn] RFID""
201 |
Management model logistic for the use of planning and inventory tools in a selling company of the automotive sector in PeruCarazas, Luis, Barrios, Manuel, Nuñez, Victor, Raymundo, Carlos, Dominguez, Francisco 01 January 2019 (has links)
El texto completo de este trabajo no está disponible en el Repositorio Académico UPC por restricciones de la casa editorial donde ha sido publicado. / One of the most important problems affecting companies that assemble and market vehicles is stock depletion of finished products. Therefore, many small and medium-sized enterprises (SMEs) have attempted to manage this situation by using tools such as the Q mode, which continuously reviews inventories but does not indicate when and in what quantity a company must supply its sales outlets but requires a more complex level of supplier development and supply chain management efficiency than SMEs can achieve. Likewise, with our proposal we achieved a 50% decrease in stock depletion, based on an analysis of model results, with a confidence level of 95% and a certainty level of 75.30%, projecting a profit of 59000 soles with a return cost of 1.41 and a recovery period of 2 years and 4 months, ensuring both the sustainability and profitability of the proposal.
|
202 |
Fast and secure RFID identificationXu, Jiaqi January 2020 (has links)
No description available.
|
203 |
UHF RFID Antenna Impedance Matching TechniquesSockolov, Kamron 01 March 2017 (has links) (PDF)
Radio Frequency Identification (RFID) systems use electromagnetic signals to wirelessly identify and track RFID-tagged objects. A reader transmits a carrier wave request signal to an RFID tag, which then transmits a unique identification signal back to the reader. Applications include supply chain inventory management, automated toll booth fee systems, sports event timing, restricted access control, pet monitoring and retail theft prevention. An RFID tag includes an antenna connected to a Radio Frequency Integrated Circuit (RFIC). RFID tags in the ultra-high frequency (UHF), industrial, scientific and medical (ISM) 902-928MHz band and global Electronic Product Code (EPC) 860‑960MHz band are powered passively (power extracted from carrier wave) and cost less than 15 cents per tag. Low cost UHF ISM RFID tags are an effective solution for tracking large inventories. UHF ISM tag antennas are typically planar dipoles printed onto a plastic dielectric substrate (inlay). Power exchange and transmit range is maximized when a tag antenna’s input impedance is conjugate matched to the RFIC input impedance. Since RFIC input impedance includes capacitive reactance, optimized antenna input impedance includes compensating inductive reactance.
The T-match network adds inductive matching microstrips to conjugate match the RFIC. Narrowband (±1.5% of center frequency) and broadband (±5% of center frequency) lumped element designs also use inductive matching strips. Narrowband, lumped element design is accomplished through Smith Chart matching assuming lumped antenna elements. The broadband lumped element design is accomplished through a circuit transformation to an equivalent network and tuning the transformed circuit to resonate from 865MHz to 955MHz, with a center frequency of 910MHz.
This thesis demonstrates a start-to-finish design process for narrow (±1.5% of center frequency) and broadband (±5% of center frequency) RFID tag antennas [3]. Furthermore, antenna matching element geometries are parametrically swept to characterize input impedance frequency response. Thesis accomplishments include (a) narrow and broadband antenna designs, (b) Keysight’s Advanced Design System (ADS) Momentum simulations, (c) antenna fabrication, and (d) differential probe impedance setup and antenna impedance measurements. Additional items include (e) impedance adjustments (f) tag range testing and (g) narrow vs. broadband matching technique comparisons. Antennas were fabricated in Cal Poly’s Graphic Communication Department by silk-screening silver conductive ink onto DuPont Melinix Polyethylene Terephthalate (PET) plastic. Impedance simulations are compared to fabricated antenna impedance measurements and range testing results.
|
204 |
Design, Fabrication, and Interrogation of Integrated Wireless SAW Temperature SensorsGallagher, Mark 01 January 2015 (has links)
Wireless surface acoustic wave (SAW) sensors offer unique advantages over other sensor technologies because of their inherent ability to operate in harsh environments and completely passive operation, providing a reliable, maintenance-free life cycle. For certain SAW sensor applications the challenge is building a wirelessly interrogatable device with the same lifetime as the SAW substrate. The design of these application intensive sensors is complicated by the degradation of device bond wires, die adhesive, and antenna substrate. In an effort to maximize the benefits of the platform, this dissertation demonstrates wafer-level integrated SAW sensors that directly connect the thin film SAW to a thick film on-wafer antenna. Fully integrated device embodiments are presented that operate over a wide range of temperatures using different fabrication techniques, substrates, and coding principles.
|
205 |
Model za lokalizaciju proizvoda primenom tehnologija Interneta stvari / A model for product localization based on Internet of Things technologiesŠenk Ivana 11 May 2016 (has links)
<p>U doktorskoj disertaciji razmatrana je mogućnost lokalizacije proizvoda primenom tehnologija Interneta stvari. Postavljen je model za lokalizaciju proizvoda koji primenjuje RFID tehnologiju i bežične senzorske mreže. U okviru modela, predložen je i realizovan hibridni metod za lokalizaciju proizvoda koji kombinuje podatke dobijene metodom najbližih suseda i metodom optimizacije rojem čestica, a zatim i hibridni metod za lokalizaciju proizvoda koji kombinuje podatke dobijene u RFID sistemu i u bežičnoj senzorskoj mreži. Mogućnosti primene predloženog modela su eksperimentalno ispitane u simuliranim sistemima i u laboratorijskoj okolini sa industrijskim elementima..</p> / <p>This dissertation discusses the possibilities of product localization based on Internet of things technologies. A model for product localization has been proposed based on RFID technology and wireless sensor networks. Within the model, a hybrid localization method which combines outputs from nearest neighbours method and particle swarm optimization for product localization has been proposed and developed, followed by a hybrid localization method which combines data from RFID system and wireless sensor network. The application possibilities for the proposed model have been experimentally tested in simulated systems and in laboratory conditions with industrial elements.</p>
|
206 |
Indexation d'une base de données images : application à la localisation et la cartographie fondées sur des radio-étiquettes et des amers visuels pour la navigation d'un robot en milieu intérieur / Indexation of an image data base : application to the localization and the mapping from RFID tags and visual landmarks for the indoor navigation of a robotRaoui, Younès 29 April 2011 (has links)
Ce mémoire concerne les techniques d'indexation dans des bases d'image, ainsi que les méthodes de localisation en robotique mobile. Il fait le lien entre les travaux en Perception du pôle Robotique et Intelligence Artificielle du LAAS-CNRS, et les recherches sur la fouille de données menées à l'Université de Rabat. Depuis une dizaine d'années, la vision est devenue une source de données sensorielles essentielles sur les robots mobiles: elle fournit en particulier des représentations de l'environnement dans lequel doit se déplacer un robot sous la forme de modèles géométriques ou de modèles fondés sur l'apparence. Concernant la vision, seules les représentations fondées sur l'apparence ont été considérées; elles consistent en une base d'images acquises lors de déplacements effectués de manière supervisée durant une phase d'apprentissage. Le robot se localise en recherchant dans la base d'images, celle qui ressemble le plus à l'image courante: les techniques exploitées pour ce faire sont des méthodes d'indexation, similaires à celles exploitées en fouille de données sur Internet par exemple. Nous proposons une approche fondés sur des points d'intérêt extraits d'images en couleur texturées. Par ailleurs, nous présentons une technique de navigation par RFID (Radio Frequency IDentifier) qui utilise la méthode MonteCarlo, appliquée soit de manière intuitive, soit de manière formelle. Enfin, nous donnons des résultats très préliminaires sur la combinaison d'une perception par capteurs RFID et par capteurs visuels afin d'améliorer la précision de la localisation du robot mobile. / This document is related both to indexing methods in image data bases and to localization methods used in mobile robotics. It exploits the relationships between research works on Perception made in the Robotics department of LAAS-CNRS in Toulouse, and on Data Mining performed by the LIMAIARF lab at the Rabat University. Computer Vision has become a major source of sensory data on mobile robots for about ten years; it allows to build especially representations of the environment in which a robot has to execute motions, either by geometrical maps or by appearance-based models. Concerning computer vision, only appearance-based representations have been studied; they consist on a data base of images acquired while the robot is moved in an interactive way during a learning step. Robot self-localization is provided by searching in this data base, the image which looks like the one acquired from the current position: this function is performed from indexing or data mining methods, similar to the ones used on Internet. It is proposed an indexing method based on interest points extracted from color and textured images. Moreover, geometrical representations are also considered for an RFID-based navigation method, based on particle filtering, used either in a classical formal way or with a more intuitive approach. Finally, very preliminar results are described on a multi-sensory approach using both Vision and RFID tags in order to improve the accuracy on the robot localization
|
207 |
Self-describing objects with tangible data structures / Objets intelligents avec des données tangiblesSinha, Arnab 28 May 2014 (has links)
En informatique ubiquitaire, l'observation du monde physique et de son "contexte" (une représentation haut niveau de la situation physique) est essentielle. Il existe de nombreux moyens pour observer le contexte. Typiquement, cela consiste en un traitement en plusieurs étapes commençant par la récupération de données brutes issues de capteurs. Diverses technologies de capteurs sont utilisées pour la récupération d'informations de bas niveau sur les activités physiques en cours. Ces données sont ensuite rassemblées, analysées et traitées ailleurs dans les systèmes d'information afin d'offrir une reconnaissance de contexte. Les applications déployées réagissent alors en fonction du contexte/de la situation détecté(e). Parmis les capteurs utilisés, les tags RFID, une technologie émergente, permettent de créer un lien virtuel direct entre les objets physiques et les systèmes d'information. En plus de stocker des identifiants, ils offrent un espace mémoire générique aux objets auxquels ils sont attachés, offrant de nouvelles possibilités d'architectures en informatique omniprésente. Dans cette thèse, nous proposons une approche originale tirant parti de l'espace mémoire offerts aux objets réels par les tags RFID. Dans notre approche, les objets supportent directement le système d'information. Ce type d'intégration permet de réduire les communications requises par le traitement à distance. Pour ce faire, des données sémantiques sont tout d'abord attachées aux objets afin de les rendre auto-descriptifs. Ainsi, les données pertinentes concernant une entité physique sont directement disponibles pour un traitement local. Les objets peuvent ensuite être liés virtuellement grâce à des structures de données dédiées ou ad hoc et distribuées sur les objets eux-mêmes. Ce faisant, le traitement des données peut se faire de façon directe. Par exemple, certaines propriétés peuvent être vérifiées localement sur un ensemble d'objets. Une relation physique peut être déduite directement de la structure de données, d'où le nom de "structures de données tangibles". Vis-à-vis des approches conventionnelles tirant parti des identifiants, notre approche offrent des avantages en termes de vie privée, de mise à l'échelle, d'autonomie et d'indépendance vis-à-vis des infrastructures. Le défi se situe au niveau de son expressivité limitée à cause du faible espace mémoire disponible sur les tags RFID. Les principes sont validés dans deux prototypes aux applications différentes. Le premier prototype est développé dans le domaine de la gestion de déchets afin d'aider le tri et d'améliorer le recyclage. Le deuxième offre des services supplémentaires, tels qu'une assistance lors du montage et de la vérification d'objets composés de plusieurs parties, grâce aux structures de données distribuées sur les différentes parties. / Pervasive computing or ambient computing aims to integrate information systems into the environment, in a manner as transparent as possible to the users. It allows the information systems to be tightly coupled with the physical activities within the environment. Everyday used objects, along with their environment, are made smarter with the use of embedded computing, sensors etc. and also have the ability to communicate among themselves. In pervasive computing, it is necessary to sense the real physical world and to perceive its “context” ; a high level representation of the physical situation. There are various ways to derive the context. Typically, the approach is a multi-step process which begins with sensing. Various sensing technologies are used to capture low level information of the physical activities, which are then aggregated, analyzed and computed elsewhere in the information systems, to become aware of the context. Deployed applications then react, depending on the context situation. Among sensors, RFID is an important emerging technology which allows a direct digital link between information systems and physical objects. Besides storing identification data, RFID also provides a general purpose storage space on objects, enabling new architectures for pervasive computing. In this thesis, we defend an original approach adopting the later use of RFID i.e. a digital memory integrated to real objects. The approach uses the principle where the objects self-support information systems. This way of integration reduces the need of communication for remote processing. The principle is realized in two ways. First, objects are piggybacked with semantic information, related to itself ; as self-describing objects. Hence, relevant information associated with the physical entities are readily available locally for processing. Second, group of related objects are digitally linked using dedicated or ad-hoc data structure, distributed over the objects. Hence, it would allow direct data processing - like validating some property involving the objects in proximity. This property of physical relation among objects can be interpreted digitally from the data structure ; this justifies the appellation “Tangible Data Structures”. Unlike the conventional method of using identifiers, our approach has arguments on its benefits in terms of privacy, scalability, autonomy and reduced dependency with respect to infrastructure. But its challenge lies in the expressivity due to limited memory space available in the tags. The principles are validated by prototyping in two different application domains. The first application is developed for waste management domain that helps in efficient sorting and better recycling. And the second, provides added services like assistance while assembling and verification for composite objects, using the distributed data structure across the individual pieces.
|
208 |
An innovative operational management method for process excellence in global operations and in the production of composite materials throughout the aeronautics supply chain / Une méthode opérationnelle et innovante vers l'excellence des procédés pour la production de matériaux composites utilisés dans l'aéronautiqueAlhas, Haydar Ali 16 May 2014 (has links)
Dans le cadre de cette thèse, nous rechercherons comment éliminer les opérations de non-valeur-ajoutée dans la fabrication des pièces en matériaux composites incluant la fixation des puces RFID directement dans les pièces en matériaux composites utilisées dans les industries aéronautiques et spatiales. Nous proposerons une nouvelle méthode innovante. Cette méthode industrielle utilise la technologie RFID pour aider éliminer les étapes de non-valeur-ajoutée qui empêchent des améliorations opérationnelles. En plus d’aider à éliminer des opérations de non-valeur-ajoutée, cette technologie peut permettre d’augmenter la communication transverse entre des processus opérationnels. L'utilisation appropriée de technologie RFID peut aussi aider à augmenter la visibilité des produits, des données et des outils dans la fabrication. Les étapes de contrôle inutiles qui induisent des délais de processus plus importants et des coûts additionnels plus élevés peuvent automatiquement être éliminées. De plus, cette méthode permet d’assurer une macro et micro traçabilité. La technologie RFID marche très bien tant avec la fibre de verre qu'avec les composés de fibre de carbone industriels. L’intégration de ces aides technologiques dans les pièces composites permet de créer des matériaux "intelligents" et de communiquer avec d'autres systèmes industriels qui sont voisins, ou dans un autre pays via le logiciel. Et cette capacité peut aider à réduire la documentation et améliorer la traçabilité pendant les phases industrielles transverses de l'entreprise. Les Informations peuvent être stockées sur la puce à l’avance ou bien après chaque processus. Ceci permet aussi d’élaborer de nouveaux processus et des occasions de traitement de la part de la société pour les parties qui sont en service. De cette façon, la puce peut permettre une communication entre le fabricant et le client. Les informations sur l'Étiquette RFID permettent aux pièces d'être gérées plus rapidement et à distance pendant tout le cycle de vie de la pièce. Les informations enregistrées sur la puce pendant la fabrication de la pièce composite peuvent même être lues, avec un ajout d’information, pendant que la pièce est en service. La méthode que nous proposons est la fixation la puce RFID dans les pièces en matériaux composites. Le dépistage et le contrôle automatiques de ces parties permettra à nos processus industriels d'être plus efficaces et visibles pendant la fabrication, aussi bien que le support après la livraison du produit. Dans un proche avenir, des entreprises nationales et internationales transformeront leur ingénierie et procédés de fabrication en appliquant cette méthode novatrice qui accélère les cycles de vie, maximise l'efficacité et élimine des étapes inutiles dans le processus. En conséquence, ces entreprises seront dans une bien meilleure position pour maximiser leur productivité et des nouvelles occasions de produit/marché aussi bien que la documentation de produit efficace et les processus de production aideront des entreprise ou les clients à abaisser leurs coûts d'exploitation, à augmenter la productivité des salariés, à améliorer la conformité, le délai de diminution et à faire des progrès plus rapides dans le domaine de la durabilité. En résumé, le fait de diminuer le délai de livraison à chaque étape dans le processus "On-Target" soutiendra) grandement la performance de " On-Cost" et " On-Quality". En utilisant cette méthode, les fabricants deviendront capables de diminuer considérablement leurs coûts, d’améliorer de façon significative les améliorations de processus, d’augmenter l’innovation à chaque étape du processus et de lancer dans l’entreprise des actions qui lui conféreront une vaste excellence opérationnelle. / The main objective of this thesis is to improve the traditional manufacturing processes in the company and to replace the traditional manufacturing methodology by new method in order to improve the manufacturing efficiency (time, cost, quality, safety of the products etc.). In the frame of this thesis, we will focus on how to eliminate the non-value added operations in the manufacturing by the embedding RFID tags directly in the composite parts used in aerospace companies. We will propose a new innovative state of the art composite manufacturing method that uses RFID technology to help eliminate non-value added manual steps that impede operational improvements. This technology can help to eliminate non-value added operations and increase the communication across operational processes. The appropriate use of RFID technology can also help increase the visibility of the products, data, and tools in manufacturing. The unnecessary control steps which induce higher process lead-times and higher additional costs can automatically be eliminated. The macro and micro traceability of processes and products (such as the part information, lifecycle, movement history and location) can all be automated and digitized with less manual intervention and less paper documentation. Carefully using this technology across our production processes, we can rapidly transform operational processes and improve their accuracy, control and efficiency. This is a lean, innovative and value adding innovative approach that significantly increases the visibility and monitoring of processes. RFID technology works very well with both glass and carbon fibre composites’ manufacturing. This technology helps makes the composite parts “smart” and communicate with other manufacturing systems that are nearby or in another country via software. And this capability can help reduce documentation and improve traceability during the manufacturing phases and across the company. Information can be stored on the tag before and/or after each process. This also enables new process and company service opportunities for parts that are in-service. In this way, the tag can enable a communication between the manufacturer and customer. The information on the RFID Tag enables the parts to be managed faster and remotely across the full lifecycle of the part. The information recorded on the RFID Tag during the manufacturing of the composite parts can even be read and more information can be read during in-service. This information can create an advantage for any modification of the parts, repair, and maintenance in the future. In this way, RFID based processes can reduce unnecessary steps across the whole supply chain and reduce the high workload of manual processes and documentation. Furthermore, costs can be minimized due to increased visibility and elimination of unnecessary steps across processes. Using RFID technology by direct embedding of the RFID Tag in the composite parts intends to measure and reduce “Process Variation”. The idea here is not to move the tasks, but to optimize and eliminating the non-value added tasks by using RFID based production method “embedding of RFID Tag in Composite parts”. The method that we propose is embedding the RFID tag in the composite parts. Automatically tracking and monitoring these parts will enable our industrial processes to be more efficient and visible during manufacturing as well as in service-processes that occur after delivery of the product. As mentioned previously, the intention here to enable our composite parts to be “smart” so they can be communicated to automatically across their lifecycle. This will help create an industrial "Internet of Things”. [...]
|
209 |
Cadeia de suprimentos na velocidade do pensamento. / Supply chain at the speed at the thoughs.Gomes, José Eurípedes 11 October 2006 (has links)
Nesta pesquisa desenvolveu-se um estudo para otimizar a Cadeia de Suprimentos com a utilização da tecnologia de Identificação por Rádio Freqüência (Radio Frequency Identification - RFID). Faz parte do escopo do estudo desenvolver um método de otimização envolvendo FMEA e Seis Sigma para suportar o entendimento do processo e identificar os pontos fracos e onde, no processo, deve ser melhorado. O método desenvolvido e chamado de CDA PEM foi aplicado à Cadeia de Suprimentos com resultados surpreendentes tanto do ponto de vista de metodologia como pelos resultados apresentados. Os principais resultados desta pesquisa mostram que com a utilização da tecnologia RFID pode-se otimizar a Cadeia de Suprimentos centenas de vezes com relação à sua velocidade. Tomando-se como exemplo o processo de recebimento de suprimentos no Centro de Distribuição no atual processo, demora, no melhor caso, 3,22 horas, mediana 12,12 horas, média aritmética 18,28 horas e máximo 98,12 horas. Os resultados indicam uma otimização de 193 vezes para o ponto mínimo, 727 vezes para a mediana, 1091 vezes para a média aritmética e 5887 vezes para o ponto máximo, tomando-se como tempo de referência 60 segundos (tempo gasto pelo sistema RFID para ler um palete de 60 caixas). Tomando-se o mesmo processo nas mesmas condições, ou seja, ponto mínimo 3,22 horas, mediana 12,12 horas, média aritmética 18,28 horas e ponto máximo 98,12 horas, os resultados indicam uma otimização de 386 vezes para o ponto mínimo, 1454 vezes para a mediana, 2182 vezes para a média aritmética e 11 774 vezes para o ponto máximo, tomando-se, neste caso, o tempo de 30 segundos (tempo gasto pelo sistema RFID para ler um palete de 60 caixas). Outro tempo de processo RFID de 10 segundos para ler a mesma quantidade de caixas também foi estudado, mas deverá demorar um pouco mais para entrar em operação. Os primeiros processos deverão operar com tempos entre 10 e 120 segundos, conforme mostrado no tópico ?monitorar? inserido neste trabalho. Pontos importantes de melhorias também foram encontrados na tecnologia atual dos equipamentos que compõem o sistema RFID. Um dos itens que produz grande impacto são as etiquetas inteligentes porque existem várias áreas de oportunidades de melhorias. Por exemplo, descobriu-se que as etiquetas dentro das caixas, ou seja, afixadas no produto, representa a melhor situação, uma vez que, com isto, permite-se fazer um rastreamento completo do produto ao longo da Cadeia de Suprimentos até o momento da reciclagem dos produtos já usados pelos clientes. Portanto, encontra-se uma dificuldade maior de leitura do que com etiquetas afixadas nas caixas dos produtos. Entretanto, fez-se um estudo detalhado dos paletes e, finalmente, obteve-se um índice de leitura de 100%, o que evidencia claramente a viabilidade da utilização da tecnologia em larga escala nos próximos anos pelo mercado, como forma de otimização da Cadeia de Suprimentos. Finalmente, com o advento desta tecnologia, o mercado deverá caminhar para uma integração completa da Cadeia de Suprimentos desde os fornecedores de matérias primas até o momento da reciclagem dos produtos pelos recicladores. Com isto, começa-se a gerir a Cadeia de Suprimentos dentro da nova tendência de mercado que é substituir o modelo ainda vigente chamado de empurrado, ou seja, o planejamento feito pelo fabricante, com os pedidos vindos do Centro de Distribuição, com uma variabilidade muito grande ao longo da Cadeia de Suprimentos, por um novo modelo no qual a Cadeia de Suprimentos, por si só, seja auto-renovável do ponto de vista de informações mais próximas da realidade. Neste momento, estará começando a substituição de inventário por informações, o que, na verdade, faz-se necessário ter informações e dispor do produto ao cliente no momento certo, em uma Cadeia de Suprimentos ideal o inventário dever ser do tamanho da demanda. / Herein, we developed a study to optimize the Supply Chain utilizing the Radio Frequency Identification (RFID) technology. It is part of the scope of this study to develop a method of optimization related to FMEA and Six Sigma to support the understanding of the process, to identify the weak points, and to identify which aspects of the process should be improved. The method developed and called CDA PEM was applied to the Supply Chain and showed surprising and significant results. The main results of this research show that with the use of RFID technology, the Supply Chain velocity can be optimized hundreds of times. For instance, today, receiving supplies in the Distribution Department the process takes in the best case scenario 3.22 hours, a median time of 12.12 hours, an arithmetic mean time of 18.28 hours and a maximum time of 98.12 hours. Results indicate an optimization of 193-fold for the lowest point, 727-fold for the median, 1,091-fold for the arithmetic mean and 5,887-fold for the highest point, considering 60 seconds as the reference time (time spent by the RFID system to read a pallet of 60 boxes). Considering the same process in the same conditions, lowest point 3.22 hours, median 12.12 hours, arithmetic mean 18.28 hours and highest point 98.12 hours, results show a 386-fold optimization for the lowest point, 1,454-fold for the median, 2,182-fold for the arithmetic mean and a 11,774-fold improvement for the highest point, considering in this case 30 seconds as the reference time (i.e., time spent by the RFID system to read a pallet of 60 boxes). Ten seconds was also studied as the time spent for the RFID system to read the same amount of boxes, but it may take a little longer to start operating. The first processes should operate with times between 10 and 120 seconds, as shown in the topic Monitor in this thesis. Important aspects of improvement were also found in the present technology of equipment that compose the RFID system. One of the items that generated great impact is the intelligent labels which offer several areas of opportunity for improvement. For example, one has discovered that the labels inside the boxes, affixed on the product represent the best scenario, once this allows a complete tracking of the product through the Supply Chain until the moment of reconstructing the products used by the clients. Thus, it is more difficult to read the labels if they are not affixed on the product box. However, a thorough study of pallets was performed and finally a reading of a 100% was achieved. This brings clear evidences of the viability of the technology utilization in a large scale over the next several years in the market as a way of optimizing the Supply Chain. Finally, with technological advances, the market should reach a complete integration of the Supply Chain from the raw materials suppliers to the product re-assemblers. This way, the Supply Chain is managed by a new market tendency, which is to replace the former imposed model (planned by the manufacturer, with the invoices coming from the Distribution Department and with a large volume through the Supply Chain) for a new model where the Supply Chain itself is self-renewable regarding the real information. At this moment, inventory is being replaced by information. It is essential to have information and make the product available for the client at the right time. In an ideal Supply Chain, the inventory level has to match demand.
|
210 |
Protocoles RFID pour l'authentification sur les courbes elliptiques / RFID Authentication protocols using elliptic curves cryptographyBenssalah, Mustapha 09 December 2014 (has links)
Actuellement, la technologie RFID (Radio Frequency Identification) est utilisée dans plusieurs domaines d'applications allant de l'identification dans les chaines d'approvisionnement à l'authentification dans les applications les plus sensibles telles que: les titres de transport, la médicine, les systèmes de surveillance, les cartes de crédit ou encore le passeport biométrique. Cependant, la nature sans-fil des données échangées rend cette technologie vulnérable à un certain nombre d'attaques et de nouvelles menaces. Ceci, engendre deux principaux problèmes à savoir; celui lié à la sécurité des informations échangées et celui lié à l'atteinte à la vie privée du propriétaire de l'étiquette. Par conséquent, cette technologie nécessite l'emploi de mécanismes de sécurité pour lutter contre tout type d'attaque et menace, ce qui peut se donner par le service authentification. Néanmoins, il se trouve que les étiquettes RFID imposent de fortes contraintes en termes de ressources matérielles telles que le temps de calcul, l'espace de stockage et l'énergie consommée et communication, ainsi, les primitives cryptographiques classiques telles que l'AES (Advanced Encryption Standard), le RSA (Rivest, Shamir and Adleman), etc. ne peuvent plus être employées. C'est pourquoi, dans la plupart des applications RFID, que nous retrouvons sur le marché, adoptent la cryptographie légère ou ultralégère (à faible coût) qui s'avère la principale solution pour résoudre le problème de capacité limitée, mais son limitation réside dans son niveau de sécurité. Ainsi, avec les moyens de calcul que nous disposons aujourd'hui, ces systèmes deviennent de plus en plus vulnérables à un nombre important d'attaques, d'où la nécessité de chercher des primitives cryptographiques qui soient à la fois robustes et sûres envers tout type d'attaques et en conformités avec contraintes imposées par les étiquettes RFID. Par conséquent, l'étude et l'exploitation des applications RFID est d'intérêt primordial afin de mieux comprendre et maitriser les menaces et les risques de cette technologie. A travers les travaux de recherche présentés dans cette thèse, nous nous sommes inscrits dans cette compétition qui consiste à chercher des solutions permettant de résoudre les problèmes liés à la sécurité de systèmes RFID, allant de l'authentification ultralégère à celle adoptant les courbes elliptiques (ECC) pour les étiquettes actives ou encore à la génération de clés de chiffrement pour les crypto-systèmes ECC. Parmi les tâches développées au cours de ces travaux de thèse, nous avons proposé de nouveaux protocoles d'authentification RFID en utilisant les concepts des courbes elliptiques qui présentent plus d'efficacité, de sécurité et de robustesse. Dans part, nous avons cryptanalyé, développé et proposé des protocoles d'authentification légers et ultralégers convenables aux étiquettes à faible coût. Plus loin, une autre contribution importante qui rentre dans le cadre de la génération aléatoire des clés de chiffrement, nous avons proposé un nouveau générateur pseudo aléatoire (PRNG) construit à base de plusieurs courbes elliptiques auto-sélectionnées convenable aux applications de type sécurisation des systèmes embarqués, la sécurité et simulations informatiques ou plus encore pour les systèmes miniaturisés à base des ECC tels que les cartes à puces et les étiquettes RFID. / The deployment and use of radio-frequency identification (RFID) technology is growing rapidly in different aspects of our daily life. This technology is used not only in traditional applications such as access control and container identification but also in security services such as in biometric passports, medicine, RFID-embedded cards. However, the main drawback of exchanging data wirelessly is the security issue. These systems are especially vulnerable to different attacks such as, eavesdropping attack, tracking attack, active attacks. For these reasons, the security and privacy of the RFID systems are to be addressed seriously and considered as a crucial matter before deploying this technology. These security mechanisms may be given by the authentication service. However, it turns out that RFID tags impose challenging constraints in terms of storage requirements, computing power, bandwidth and computational cost, thus, it is hard for them to implement or to adapt the existing custom cryptographic primitives and protocols or modern ciphers, such as AES (Advanced Encryption standard), RSA (Rivest, Shamir and Adleman), etc., which require a huge computational workload and storage space. Hence only lightweight cryptographic primitives can be implemented. Therefore, with the development of the calculation means, these systems are becoming increasingly vulnerable to a significant number of attacks. Consequently, the need for strong and secure cryptographic primitives compliant with the tag's challenging constraints must be addressed seriously. In addition, the study and the exploitation of the RFID applications is paramount interest in order to understand and master the threats and risks of this technology. Through the research presented in this thesis, we entered in this competition which consists to find solutions and solving problems related to the RFID systems security, ranging from the use of the lightweight authentication to those adopting elliptic curves cryptography. Among the tasks developed in the thesis works, we have proposed new RFID authentication protocols using the elliptic curves concepts that present more efficiency, security and robustness. In the other hand, we have cryptanalyzed, developed and proposed efficient lightweight and ultra-lightweight authentication protocols suitable for low cost RFID tags. Further, another important contribution which comes within the framework of the random generation of encryption keys, we have proposed a new pseudo-random generator (PRNG) constructed by randomly selecting points from elliptic curves, suitable for applications such as security systems, computer physic simulations, cryptographic applications and control coding.
|
Page generated in 0.0551 seconds