A new RFID Middleware architecture based on a hybrid security technique using data encryption and RBAC for modern real-time tracking applications

A Haibi, K Oufaska, K El Yassini, M Boulmalf… - Frontiers in …, 2023 - frontiersin.org
Radio Frequency Identification (RFID) is a contactless technology that has developed over
the 90s and 20th centuries. It employs electromagnetic or electrostatic coupling in the radio …

Generation of RFID test datasets using RSN tool

W Ryu, J Kwon, B Hong - Personal and ubiquitous computing, 2013 - Springer
This paper presents an RSN Tool to generate input datasets for testing RFID middleware. As
RFID middleware takes an important role in entire RFID systems, its performance should be …

Flexible capturing application for enhanced generation of EPCIS events

F Jia, S Jeon, B Hong, J Kwon… - International Journal of …, 2014 - journals.sagepub.com
Radio frequency identification (RFID) technology and electronic product code (EPC)
technology have been widely used to identify and keep track of physical objects. EPCglobal …

A Simulation Technique for RFID Adoption in Hospital

WS Ryu - The Journal of the Korea institute of electronic …, 2014 - koreascience.kr
As a key technology of U-health, RFID can be applied to the hospitals in a variety of cases
such as patient tracking, medical instrument management, and so on. However, adoption of …

A model-based approach for rfid application testing

A Huebner, C Facchi, M Meyer… - 2013 12th IEEE …, 2013 - ieeexplore.ieee.org
A new approach for testing Radio Frequency Identification applications is presented in this
paper. Therefore, a set based semantics is introduced to describe RFID applications. The …

[PDF][PDF] Methodology for Testing RFID Applications

A Hubner - 2018 - core.ac.uk
Abstract Radio Frequency Identification (RFID) is a promising technology for process
automation and beyond that capable of identifying objects without the need for a line-of …

An object transition flow model of test data set for simulation of RFID applications

G Kim, B Hong - 2014 IEEE 11th International Conference on e …, 2014 - ieeexplore.ieee.org
To evaluate the feasibility of RFID Applications, proper test data sets based on business
events should be prepared. There are performance issues in creating a large volume of …

A simulation technique to create dataset of RFID business events

W Ryu - Proceedings of the Korean Institute of Information and …, 2013 - koreascience.kr
As an wireless identification technology, RFID is now extending its application area
including logistics, medicine, and healthcare. Adoption of RFID demands high cost such as …

A Trust Evaluation Method for Supplier Selection

X Qiu, L Cao, P Li, L Zhao - … on Trust, Security and Privacy in …, 2013 - ieeexplore.ieee.org
Trust and reputation systems play important roles in supplier selection, a topic that has been
widely investigated from a business and operation point of view. However, we still lack of …

Generation of Business Event Data Sets for Testing RFID Information Services

G Kim, B Hong - International Journal of Software Engineering and …, 2015 - World Scientific
The testing of RFID information services requires a test data set of business events
comprising object, aggregation, quantity and transaction events. To generate business …