• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 293
  • 103
  • 94
  • 78
  • 68
  • 55
  • 21
  • 18
  • 18
  • 15
  • 13
  • 9
  • 7
  • 7
  • 5
  • Tagged with
  • 881
  • 161
  • 142
  • 133
  • 126
  • 103
  • 91
  • 79
  • 72
  • 71
  • 70
  • 66
  • 63
  • 62
  • 61
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Implementation of RSA Cryptosystem for Next Generation RFID Tags

Dighe, Ashish Arun 29 March 2011 (has links)
This thesis addresses concepts of implementing a RSA cryptosystem on a passive RFID tag. With a limited number of public key cryptosystems on passive RFID platforms, the proposed algorithm makes use of Montgomery multiplication primitives to reduce the amount of computation required on the power constrained tag therefore making the proposition viable. Public key cryptography is being suggested for next generation RFID systems to reduce the number of possible attack vectors native to this type of technology. By estimating the area, power and time constraints of the RFID platform, it was determined that the area constraint was the critical variable in determining the maximum implementable security variable. Although the application of this algorithm has been targeted for passive HF RFID platforms, the algorithm could be used in other low power, sized constrained applications.
32

Implementation of RSA Cryptosystem for Next Generation RFID Tags

Dighe, Ashish Arun 29 March 2011 (has links)
This thesis addresses concepts of implementing a RSA cryptosystem on a passive RFID tag. With a limited number of public key cryptosystems on passive RFID platforms, the proposed algorithm makes use of Montgomery multiplication primitives to reduce the amount of computation required on the power constrained tag therefore making the proposition viable. Public key cryptography is being suggested for next generation RFID systems to reduce the number of possible attack vectors native to this type of technology. By estimating the area, power and time constraints of the RFID platform, it was determined that the area constraint was the critical variable in determining the maximum implementable security variable. Although the application of this algorithm has been targeted for passive HF RFID platforms, the algorithm could be used in other low power, sized constrained applications.
33

Design and performance analysis of purely textile antenna for                                                   wireless applications

Dahal, Robi, Mercan, Demet January 2012 (has links)
This thesis work is concerned with the design and performance analysis of purely textile antenna for wireless applications. The materials used for radiating element, ground plane and dielectric substrate are purely textile. Two types of antennas are studied, the microstrip patch antenna and RFID tag antenna. Each type of antenna is designed and fabricated using two different conductive textile materials as radiating element.  The radiating element and ground plane of conventional printed antenna is manufactured with the metal plating on a solid dielectric substrate. The radiating element which is used in this thesis work has different characteristics as compared to printed antenna because it is made of conductive textile material which is less conductive than metal and elastic in nature. Each conductive textile material has different surface resistivity. The study has been made to analyze the effect on gain and radiation efficiency of the antenna when different conductive textile material is used as the radiating element. The measured results of the fabricated antennas present the full potential of conductive textile materials to be used as an antenna.
34

Implementation Study of IEEE 802 : 15.4

Hussain, Assad, Kazim Hafeez, Muhammad January 2006 (has links)
This thesis is analysis-based survey in which our task was to find out the suitability of IEEE 802.15.4 for the RFID systems in terms of power. We studied the different RFID systems. We analyzed the IEEE 802.15.4 to see how much this protocol can facilitate the RFID application, but we just considered the 2.4 GHz physical band as Free2move uses this band for its RFID products. Since semi-passive1 RFIDs are the closest competitors of the active RFID, so we also compared the IEEE 802.15.4 with ISO 18000-4 (mode2) to find out their pros and cons. We also tried to evaluate the hardware architecture proposed by Free2move. We compared proposed hardware components with other competitors available in the market. The main point of focus during hardware evaluation remained its power efficiency. As concluding part we have proposed an idea for using the IEEE 802.15.4 standard in semi- passive RFIDs.
35

Reliability test of a RIFD system for tool management on construction sites

Kalla, Naresh 15 May 2009 (has links)
In the construction industry, one of the aspects that affect the productivity of the construction crew is the availability of tools and supplies. Unavailability of tools and supplies results in a delay of the project, which in turn increases the cost of the project. If any such delays on job sites could be reduced, it would help the construction industry in reduction of time and cost losses. The construction industry is in need of a technology that would improve the presentday tool management system (TMS) to reduce the construction costs from delays in projects. Radio Frequency Identification (RFID) technology offers the possibility that tools and supplies, tagged with RFID devices, could be tracked down automatically. Although the potential of RFID is real, it does have limitations like any other technology. Without understanding and working with the limitations of RFID, this technology may disappoint many before its true and significant capabilities are realized. Before the technology is executed fullfledged, it needs to be tested for reliability on construction sites in particular. Researchers, from many parts of the world, have performed tests to understand the reliability of the RFID technology considering variables like metal interferences, reading range, multiple tag identification, etc. But these tests conducted could not discuss all the factors that may affect the reliability of the technology. This paper identifies other factors that might affect the reliability of RFID technology and tests are conducted to understand the influence of these factors on the readability of the RFID tags. Number of tools and the velocity with which tools are taken across the portal are two variables that are tested for reliability of RFID. Tests are conducted using the experiment setup that resembles a construction site tool management room entrance/exit. Results show a radical decrease in the readability of tags, while the numbers of the tools are increased gradually. And also, when the tools were taken across the RFID portal with gradual increasing velocity, the readability reduced. These results prove that both the tested parameters have an effect on the reliability of RFID technology for tool tracking.
36

A power efficient active RFID communication Protocol

Dávila García, Francisco Javier January 2007 (has links)
<p>Active Radio Frequency Identification (Active RFID) is a wireless automated technology used to identify, track, process and share information about an object or from the environment. As microcontrollers and radio frequency transponders are smaller in size, more power efficient, and less expensive, this technology is growing and starting to expand significantly through all the industries. The main purpose of with this project was to reduce the ower consumption of the active tags. This master thesis presents a functional TDMA based protocol which was designed and developed for a specific tracking system application.</p>
37

RFID : a catalyst for supply chain performance

Lakshmanan, Alagendran January 2009 (has links)
<p>THE ADVANTAGE OF RFID TECHNOLOGY IMPLEMENTATION IN A MANUFACTURING FIRM. THE TECHNOLOGY IMPLEMENTATION STREAM LINES THE LOSS OF INFORMATION FLOW WHEN THE PRODUCT MOVES ALONG THE DIFFERENT CHAIN MEMBERS. THE COMMON SHARING OF THE ASSOCIATED BENEFIT BRINGS HIGHER PROCESS EFFICEINCY , WHEN THE PRODUCT MOVES ALONG THE UPSTREAM AND DOWNSTREAM SUPPLY CHAIN FOR THE SELECTED PRODUCT. THE IMPLEMENTATION IS A CUSTOMISED SOLUTION FOR THE MANUFACTURING UNIT FOR ITS PRODUCT, THIS THESIS WILL ENABLE THE IMPLEMENTATORS THE VALUABLE IMPLEMENTATION PROCEDURES THAT ONE HAS TO FOLLOW TO TAKE RIGHT BENEFIT FROM THIS TECHNOLOGY.</p>
38

RFID-avläsning med mobiltelefon

Svensson, Torbjörn January 2007 (has links)
<p>MobileReader är en mobil RFID (Radio Frequency Identification) applikation. Syftet med denna applikation är att skapa en RFID-läsare som skall gå att bära med sig ute på fältet. I första hand kommer läsaren att kunna läsa passiva RFID-taggar på Lågfrekvens-bandet (LF) samt att vara anpassad för nyare mobiltelefoner av tillverkaren Sony Ericsson. Detta examensarbete resulterade i ett program avsett för en Atmel ATmega16 mikroprocessor. Mikroprocessorn tar emot data från en befintlig LF-läsare via ett protokoll vid namn Wiegand 44. Den inlästa datan paketeras in i ett PDU-paket, Protocol Data Unit, vilket är det protokoll som mobiltelefoner använder för att skicka SMS mellan MS, Mobile System, och BS, Base System.</p> / <p>MobileReader is a mobile RFID (Radio Frequency Identification) application. The purpose of this application is to create a reader, that can be carried out in the field. This project will concentrate on reading passive RFID-tags on the Lowfrequency band (LF) and will be customized for a newer mobile phone manufactured by Sony Ericsson. This has resulted in a program written for the Atmel ATmega16 microcontroller. The microcontroller receives data from an already existing LF-reader using the Wiegand 44 protocol. The data will be converted into a PDU-packet, Protocol Data Unit, which is the protocol used by mobile phones to send SMS between MS, Mobile System, and BS, Base System.</p>
39

Analyse und Modellierung objektgebundener Datenflüsse in Wertschöpfungsketten

Petzold, Jana-Cordelia January 2009 (has links)
Zugl.: Cottbus, Techn. Univ., Diss.
40

Ανάλυση θεμάτων ασφάλειας στα RFID συστήματα

Τσεκές, Χρήστος 14 July 2015 (has links)
Σε αυτό το πρώτο κεφάλαιο αναλύονται βασικές αρχές της κρυπτογραφίας ιδιωτικού και δημοσίου κλειδιού. Επίσης γίνεται μελέτη επιπλέον τεχνικών όπως συναρτήσεις κατακερματισμού και γεννήτριες ψευδοτυχαίων αριθμών. Τέλος τα χαρακτηριστικά των πιο διαδεδομένων κατηγοριών πρωτοκόλλων πιστοποίησης που χρησιμοποιούνται στη κρυπτογραφία. Στο Κεφάλαιο 2 γίνεται μια παρουσίαση της τεχνολογίας RFID. Αρχικά αναλύεται κάθε κομμάτι του συστήματος και ποιά είναι η λειτουργία του καθενός. Στη συνέχεια παρουσιάζονται οι αρχές λειτουργίας των συσκευών που αποτελούν το σύστημα. Τέλος γίνεται μια ιστορική αναδρομή των RFID συστημάτων και αναφέρονται μερικά από τα πρότυπα που έχουν κυριαρχήσει σήμερα. Στο Κεφάλαιο 3 αναλύονται οι κίνδυνοι που έρχεται αντιμέτωπο ένα RFID σύστημα και γίνεται μια παρουσίαση των επιθέσεων που μπορούν να προσβάλλουν ένα τέτοιο σύστημα. Στο Κεφάλαιο 4 συζητάμε τις κατευθυντήριες γραμμές που πρέπει να ακολουθήσουμε για την προστασία των RFID συστημάτων και τους ελέγχους που πρέπει να γίνουν σε αυτά. Επίσης αναλύουμε τις διάφορες τεχνικές που χρησιμοποιούνται για την ασφαλή επικοινωνία, καθώς και συγκεκριμένα παραδείγματα χαρακτηριστικά για κάθε κατηγορία. Στο Κεφάλαιο 5 γίνεται ανάλυση κάποιων συγκεκριμένων πρωτοκόλλων που πιστεύω υπογραμμίζουν το συμπέρασμα που καταλήγω με τη μελέτη που έκανα. Δηλαδή ότι τα RFID συστήματα πρέπει ακόμα και για το παράγοντα της ασφάλειας να σχεδιάζονται κατάλληλα έτσι ώστε να προβλέπουν την εξέλιξη του συστήματος και ότι ο πρέπει να γίνει ο συνδυασμός τεχνικών για την αποδοτικότερη υλοποίηση μέτρων ασφαλείας στα RFID. Το Κεφάλαιο 6 είναι ο επίλογος όπου επισημαίνουμε τα συμπεράσματα που βγαίνουν από την εργασία αυτή. / In the first chapter we analyze some basic cryptographic primitives drawn from private and public key cryptography. We also study the functionality of hash functions and Pseudorandom Number Generators. Also some Message Authentication Codes and the importance of digital signatures. In Chapter 2 we present briefly the RFID technology. Firstly we analyze each component of the system and the function that it has. We continue mentioning the working principles of those components. Finally the Chronology of the RFID technology is presented, along with some basic standards for the technology. In Chapter 3 we discuss all the dangers that a RFID system faces and also a list of the most popular attacks against those systems. In Chapter 4 at first some basics directions that someone must follow in order to design a secure RFID system are given. Some basic controls that we have in our disposal in order to defend our systems as well as some more advanced topics. Specific examples of those techniques are anlyzed and it is checked in what level they qualify for implementation on RFID systems/ In Chapter 5 we chose some implementations with specific properties that highlight in my opinion some important matters that need to be considered in RFID security. Chapter 6 is the epilogue which highlights the results of this dissertation.

Page generated in 0.0376 seconds