1 / 30

無線射頻辨識 論文報告

無線射頻辨識 論文報告. 指導教授:黃秋煌 報告者:黃明維. Outline. Internet of Things architecture for a RFID-based product tracking business model SHARDIS: A Privacy-Enhanced Discovery Service for RFID-Based Product Information A Temporal-based Model of Uncertain RFID Data.

kaipo
Download Presentation

無線射頻辨識 論文報告

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 無線射頻辨識論文報告 指導教授:黃秋煌 報告者:黃明維

  2. Outline • Internet of Things architecture for a RFID-based product tracking business model • SHARDIS: A Privacy-Enhanced Discovery Service for RFID-Based Product Information • A Temporal-based Model of Uncertain RFID Data

  3. Internet of Things architecture for a RFID-based product tracking business model F´elix Jes´us Villanueva, David Villa, Francisco Moya, Maria Jos´e Santofimia, Juan Carlos L´opez 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing

  4. Introduction • Goods traceability is a growing application • This paper therefore proposes an evolution of goods trace applications, mainly motivated by the wish of obtaining a global ecosystem • This work proposes the use of Object-Oriented Distributed Middlewares • The information written in RFID tags is used for invoking remote methods in objects

  5. Good Recycle Business Model

  6. Good Recycle Business Model • User needs to install RFID readers at home and provide profile information • IoT business model: • Incremental • Fault tolerant • Scalability • Architecture reuse • The main drawback: Sensible information

  7. The Object-Oriented Middleware • Traditional object-oriented middleware • A specification of the interfaces of all services • Implementation • Server • Proposed platform • Identity of manufacturer within the product code in the RFID label • Interpret RFID identity and invoke the method

  8. The Object-Oriented Middleware • Architectural structure • Each entity has several input points and output points • Each entity also has a profile resolver in which other parties can get information related to the entity • A public key infrastructure protects the information • Inter-Domain Messaging(IDM) architecture • IDM overlay architecture • IDM imposes a global hierarchical addressing scheme for objects • Any client is able to invoke any other remote party in the system • The required information: Object identifier, Product code, Owner • The readers can communicate to remote objects through an a embedded IDM router

  9. The Object-Oriented Middleware

  10. The Object-Oriented Middleware • Identifiers • Manufacturer service identifier: It is an IDM address • Product kind identifier: A unique product number • Serial number: A unique serial number • Product tracking protocol proposal • An event service: get product tracking • A query service: get information from other parties.

  11. Conclusion • This paper proposes an architecture for massive RFID product tracking • The author of this article strongly believe that only by involving user, companies will be involved in IoT ecosystems. • In the proposed business model a novel global tracking system for products is proposed, in which users could obtain benefits from recycle activities.

  12. SHARDIS: A Privacy-Enhanced Discovery Service for RFID-Based Product Information Benjamin Fabian, Tatiana Ermakova, and Cristian Müller IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 8, NO. 3, AUGUST 2012

  13. Introduction • The standardization of a global numbering scheme for physical objects, the Electronic Product Code (EPC) that is stored on RFID tags • EPCglobal Network (EPCN) • Discovery Services (DS) for the EPCN • No official standard has been finalized • No sufficient mechanisms to address the privacy requirements

  14. Introduction (cont’d) • SHARDIS • SHARDIS will be deployed as an infrastructure peer-to-peer (P2P) network • We provide end-to-end document authenticity and data origin authentication by digital signatures • SHARDIS as a cooperative industrial infrastructure network will in practice be based on cryptographically secured node identifiers • SHARDIS address document

  15. Shamir’s Secret-sharing Scheme

  16. SHARDIS Architecture

  17. SHARDIS Publishing Procedure

  18. SHARDIS Publishing Procedure (cont’d)

  19. SHARDIS Publishing Procedure (cont’d)

  20. SHARDIS Lookup Procedure

  21. SHARDIS Lookup Procedure (cont’d)

  22. Reconstructing Multiple Documents

  23. Conclusion • This paper presented SHARDIS, a P2P-based discovery service architecture for the EPCglobal Network that enhances client privacy by applying secret-sharing on the information documents of interest • Without needing key predistribution, making it suitable for flexible, open, and global application scenarios of RFID and the EPC framework

  24. A Temporal-based Model of Uncertain RFID Data Dong Xie, Sheng Q.Z., Jiangang Ma 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing

  25. Introduction • A storing RFID data model employs a triplet (EPC, reader-id, timestamp), which is not very effective • Insufficient data • Incomplete data • Massive data • We propose a temporal-based data model of uncertain RFID data to capture uncertain RFID data and support complex queries

  26. Temporal-Based Data Model OWNER

  27. Querying Uncertain RFID Data • Tracking • Tracing

  28. Conclusion • This paper has identified several features of uncertain RFID data, and proposed a temporal-based data model for managing uncertain RFID data

  29. My Comment

  30. My Comment • Third paper can use EPCglobal framework.

More Related