An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols

BB Gupta, M Quamara - Concurrency and Computation …, 2020 - Wiley Online Library
Understanding of any computing environment requires familiarity with its underlying
technologies. Internet of Things (IoT), being a new era of computing in the digital world, aims …

A survey on the Internet of Things security: State-of-art, architecture, issues and countermeasures

O Yousuf, RN Mir - Information & Computer Security, 2019 - emerald.com
Purpose Internet of Things (IoT) is a challenging and promising system concept and requires
new types of architectures and protocols compared to traditional networks. Security is an …

Maxwell-a 64 FPGA supercomputer

R Baxter, S Booth, M Bull, G Cawood… - Second NASA/ESA …, 2007 - ieeexplore.ieee.org
We present the initial results from the FHPCA Supercomputer project at the University of
Edinburgh. The project has successfully built a general-purpose 64 FPGA computer and …

PET: Probabilistic estimating tree for large-scale RFID estimation

Y Zheng, M Li - IEEE Transactions on Mobile Computing, 2011 - ieeexplore.ieee.org
Estimating the number of RFID tags in the region of interest is an important task in many
RFID applications. In this paper, we propose a novel approach for efficiently estimating the …

Managing RFID data: Challenges, opportunities and solutions

L Xie, Y Yin, AV Vasilakos, S Lu - … communications surveys & …, 2014 - ieeexplore.ieee.org
The advances of Radio-Frequency Identification (RFID) technology have significantly
enhanced the capability of capturing data from pervasive space. It becomes a great …

Scalable RFID systems: a privacy-preserving protocol with constant-time identification

B Alomair, A Clark, J Cuellar… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
In RFID literature, most “privacy-preserving” protocols require the reader to search all tags in
the system in order to identify a single tag. In another class of protocols, the search …

Identification-free batch authentication for RFID tags

L Yang, J Han, Y Qi, Y Liu - The 18th IEEE International …, 2010 - ieeexplore.ieee.org
Cardinality estimation and tag authentication are two major issues in large-scale Radio
Frequency Identification (RFID) systems. While there exist both per-tag and probabilistic …

Efficient missing tag detection in RFID systems

W Luo, S Chen, T Li, S Chen - 2011 Proceedings IEEE …, 2011 - ieeexplore.ieee.org
RFID tags have many important applications in automated warehouse management. One
example is to monitor a set of tags and detect whether some tags are missing-the objects to …

Privacy-friendly authentication in RFID systems: on sublinear protocols based on symmetric-key cryptography

G Avoine, MA Bingöl, X Carpent… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
The recent advent of ubiquitous technologies has raised an important concern for citizens:
the need to protect their privacy. So far, this wish was not heard of industrials, but national …

RFID Authentication System Based on User Biometric Information

Y Huang, B Fu, N Peng, Y Ba, X Liu, S Zhang - Applied Sciences, 2022 - mdpi.com
Traditional authentication technologies usually perform identity authentication based on
user information verification (eg, entering the password) or biometric information (eg …