New Developments in RFID Technologies and Applications and Their Integration into IoT

A special issue of Future Internet (ISSN 1999-5903).

Deadline for manuscript submissions: closed (31 December 2018) | Viewed by 19636

Special Issue Editor


E-Mail Website
Guest Editor
Faculty of Engineering and Informatics, University of Bradford, Bradford BD7 1DP, UK
Interests: energy-efficient front-end design; radio frequency; energy harvesting; communications systems; 5G communications; sensor design; localisation-based services; signal processing; optimisation process; MIMO system design; health hazards; propagations, antennas and electromagnetic computational techniques
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

The quest in the research community to achieve scalable, energy-efficient, and robust ubiquitous system and applications, has inadvertently brought to fore the many desirable potentials of RFID. RFID, which supports the easy identification of physical objects and people, is a fast-paced research. Moreover, with the advent of the Internet of Things (IoT) paradigm, the integration of RFID systems in many wireless and ubiquitous applications has resulted in the development of many exciting, innovative and automated system. Furthermore, the introduction of IoT in healthcare to foster quality and safe healthcare applications, the need to elevate the many traditional applications of RFID becomes a reality requisite. Therefore, the field of RFID is gaining continued momentum in research and design, with the general acceptance as an efficient technology capable of ameliorating the many drawbacks of several technologies.

RFID, though widely accepted as an exciting technology, presents several significant design challenges and issues to engineers and researchers. These issues arise from the context-aware processing of RFID data, achieving efficient matching and read range, developing novel smart IoT-based applications, achieving smart and human interaction, and privacy and security issue of RFID data within the IoT context.

This Special Issue solicits original papers that contribute to the understanding of RFID and its impact on the design, development and use of applications in ubiquitous environments.

Specific Topics

Submission can focus on the conceptual and applied research in topics including, but not limited to:

  • Antenna and propagation in the RFID frequencies
  • Signal processing of data in RFID system
  • Pervasive applications in mobile and ubiquitous environments for identification and monitoring
  • RFID in eHealth
  • Touchless identification
  • RFID in Biomedical Applications
  • RFID inside a living body
  • Security on RFID technology
  • RFID and the Internet of Things
  • Passive and Active RFID Technologies and Applications

Submission should be high quality for an international journal, and should not have submitted or published elsewhere. However, the extended versions of conference papers that show significant improvement (minimal of over 30%) can be considered for review to this special issue.

Technical Programme Committee members:
1. Professor Peter Excell, Wrexham University
2. Professor Rami Qahwaji, University of Bradford
3. Professor Simon Shepherd, University of Bradford
4. Professor Jonathan Rodriguez, South Wales University
5. Professor Irfan Awan, University of Bradford
6. Professor Neil McEwan, University of Bradford
7. Dr James M Noras, University of Bradford
8. Dr Chan H See, University of Bolton
9. Dr Rameez Asif, University of Bradford/ Visibility Asset Management Solutions Co., UK
10. Dr Atojoko Achimugu Alpha, University of Bradford/ Avery.com, UK

Prof. Raed A. Abd-Alhameed
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (4 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

10 pages, 2912 KiB  
Article
Dual-Band Monopole Antenna for RFID Applications
by Naser Ojaroudi Parchin, Haleh Jahanbakhsh Basherlou, Raed A. Abd-Alhameed and James M. Noras
Future Internet 2019, 11(2), 31; https://doi.org/10.3390/fi11020031 - 30 Jan 2019
Cited by 21 | Viewed by 6956
Abstract
Over the past decade, radio-frequency identification (RFID) technology has attracted significant attention and become very popular in different applications, such as identification, management, and monitoring. In this study, a dual-band microstrip-fed monopole antenna has been introduced for RFID applications. The antenna is designed [...] Read more.
Over the past decade, radio-frequency identification (RFID) technology has attracted significant attention and become very popular in different applications, such as identification, management, and monitoring. In this study, a dual-band microstrip-fed monopole antenna has been introduced for RFID applications. The antenna is designed to work at the frequency ranges of 2.2–2.6 GHz and 5.3–6.8 GHz, covering 2.4/5.8 GHz RFID operation bands. The antenna structure is like a modified F-shaped radiator. It is printed on an FR-4 dielectric with an overall size of 38 × 45 × 1.6 mm3. Fundamental characteristics of the antenna in terms of return loss, Smith Chart, phase, radiation pattern, and antenna gain are investigated and good results are obtained. Simulations have been carried out using computer simulation technology (CST) software. A prototype of the antenna was fabricated and its characteristics were measured. The measured results show good agreement with simulations. The structure of the antenna is planar, simple to design and fabricate, easy to integrate with RF circuit, and suitable for use in RFID systems. Full article
Show Figures

Figure 1

11 pages, 3378 KiB  
Article
RFID Based Manufacturing Process of Cloud MES
by Chuang Wang, Xu’nan Chen, Abdel-Hamid Ali Soliman and Zhixiang Zhu
Future Internet 2018, 10(11), 104; https://doi.org/10.3390/fi10110104 - 30 Oct 2018
Cited by 10 | Viewed by 5388
Abstract
RFID (radio frequency identification) is widely used in the manufacturing processes of enterprises. At the same time, with the advent of the Industry 4.0 era, Manufacturing Execution System (MES) systems began to evolve into cloud MES systems. In this paper, a RFID-based manufacturing [...] Read more.
RFID (radio frequency identification) is widely used in the manufacturing processes of enterprises. At the same time, with the advent of the Industry 4.0 era, Manufacturing Execution System (MES) systems began to evolve into cloud MES systems. In this paper, a RFID-based manufacturing process for cloud MES is proposed and a framework manufacturing process fora cloud MES system centered on machine tools is constructed. The process division of the manufacturing process, RFID configuration and cloud processing are analyzed, and other key technologies involved in implementing the framework are briefly discussed. Finally, the effectiveness of a RFID-based manufacturing process of cloud MES is verified by two different types of case analysis namely photovoltaic slice production and garment outsourcing processing. Full article
Show Figures

Figure 1

19 pages, 7867 KiB  
Article
A Modified BA Anti-Collision Protocol for Coping with Capture Effect and Interference in RFID Systems
by Isam A. Hussein, Basil H. Jasim and Ramzy S. Ali
Future Internet 2018, 10(10), 96; https://doi.org/10.3390/fi10100096 - 01 Oct 2018
Viewed by 2910
Abstract
Radio frequency identification (RFID) technology has widely been used in the last few years. Its applications focus on auto identification, tracking, and data capturing issues. However, RFID suffers from the main problem of tags collision when multiple tags simultaneously respond to the reader [...] Read more.
Radio frequency identification (RFID) technology has widely been used in the last few years. Its applications focus on auto identification, tracking, and data capturing issues. However, RFID suffers from the main problem of tags collision when multiple tags simultaneously respond to the reader request. Many protocols were proposed to solve the collision problems with good identification efficiency and an acceptable time delay, such as the blocking anti-collision protocol (BA). Nevertheless, most of these protocols assumed that the RFID reader could decode the tag’s signal only when there was one tag responding to the reader request once each time. Hence, they ignored the phenomenon of the capture effect, which results in identifying the tag with the stronger signal as the multiple tags simultaneously respond. As a result, many tags will not be identified under the capture effect. Therefore, the purpose of this paper is to take the capture effect phenomenon into consideration in order to modify the blocking BA protocol to ensure a full read rate, i.e., identifying all the tags in the frame without losing any tag. Moreover, the modifications include distinguishing between collision and interference responses (for the period of staying tags) in the noisy environments, for the purpose of enhancing the efficiency of the identification. Finally, the simulation and analytical results show that our modifications and MBA protocol outperform the previous protocols in the same field, such as generalized query tree protocols (GQT1 and GQT2), general binary tree (GBT), and tweaked binary tree (TBT). Full article
Show Figures

Figure 1

15 pages, 412 KiB  
Article
On the Security of Rotation Operation Based Ultra-Lightweight Authentication Protocols for RFID Systems
by Masoumeh Safkhani, Nasour Bagheri and Mahyar Shariat
Future Internet 2018, 10(9), 82; https://doi.org/10.3390/fi10090082 - 21 Aug 2018
Cited by 5 | Viewed by 3359
Abstract
Passive Radio Frequency IDentification (RFID) tags are generally highly constrained and cannot support conventional encryption systems to meet the required security. Hence, designers of security protocols may try to achieve the desired security only using limited ultra-lightweight operations. In this paper, we show [...] Read more.
Passive Radio Frequency IDentification (RFID) tags are generally highly constrained and cannot support conventional encryption systems to meet the required security. Hence, designers of security protocols may try to achieve the desired security only using limited ultra-lightweight operations. In this paper, we show that the security of such protocols is not provided by using rotation functions. In the following, for an example, we investigate the security of an RFID authentication protocol that has been recently developed using rotation function named ULRAS, which stands for an Ultra-Lightweight RFID Authentication Scheme and show its security weaknesses. More precisely, we show that the ULRAS protocol is vulnerable against de-synchronization attack. The given attack has the success probability of almost ‘1’, with the complexity of only one session of the protocol. In addition, we show that the given attack can be used as a traceability attack against the protocol if the parameters’ lengths are an integer power of 2, e.g., 128. Moreover, we propose a new authentication protocol named UEAP, which stands for an Ultra-lightweight Encryption based Authentication Protocol, and then informally and formally, using Scyther tool, prove that the UEAP protocol is secure against all known active and passive attacks. Full article
Show Figures

Figure 1

Back to TopTop