The research of RFID Middleware's Data Management Model

被引:4
作者
Wang Yanyan [1 ]
Zhao Xiaofeng [1 ]
Wu Yaohua [1 ]
Xu Peipei [1 ]
机构
[1] Shandong Univ, Sch Control Sci & Engn, Logist Inst, Jinan 250061, Shandong, Peoples R China
来源
2008 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION AND LOGISTICS, VOLS 1-6 | 2008年
关键词
Radio frequency identification; RFID; Middleware; Data filtration; Data security; Data compression;
D O I
10.1109/ICAL.2008.4636602
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of RFID applications, the rapidly increasing number of companies actively participated in the RFID system development and the RFID devices which adopt the different communications protocol. So the RFID Middleware becomes a very hot topic. RFID middleware is a new breed of application software which facilitates data communication between automatic identification equipments like RFID readers and enterprise applications. At the same time, the data of the application program are written in the tag and data security is very important to ensure application software security such as WMS, ERP. This paper refers to data management model of RFID Middle to increase the data security and tag capacity and describe the architecture of RFID Middleware. Because the capacity of tag is limited, the store space of the ciphertext is must be considered and it is possible that the key table is very big in order to reduce the query speed. So this system used two-step encryption and adopted improved the transposition encryption. To increase the storing capacity of RFID tag, this paper adopt LZW compression algorithm. The RFID Middle rapidly becomes the common interface of different RFID devices.
引用
收藏
页码:2565 / 2568
页数:4
相关论文
共 14 条
[1]   A scalable and provably secure hash-based RFID protocol [J].
Avoine, G ;
Oechslin, P .
Third IEEE International Conference on Pervasive Computing and Communications, Workshops, 2005, :110-114
[2]  
AVOINE G, 2005, LECT NOTES COMPUTER, P291
[3]  
GAUKLER GM, THESIS STANFORD U
[4]  
Holtz K., 1993, Wescon/93 Conference Record (Cat. No.93RC0500-9), P140, DOI 10.1109/WESCON.1993.488424
[5]  
Juels A., 2006, IEEE J FEB, P35
[6]   Multiple pattern matching in LZW compressed text [J].
Kida, T ;
Takeda, M ;
Shinohara, A ;
Miyazaki, M ;
Arikawa, S .
DCC '98 - DATA COMPRESSION CONFERENCE, 1998, :103-112
[7]  
KIM TS, AUTHORIZATION POLICY
[8]  
Landt J., 2001, Shrouds of time: The history of RFID
[9]   RFID technology and applications [J].
Nath, B ;
Reynolds, F ;
Want, R .
IEEE PERVASIVE COMPUTING, 2006, 5 (01) :22-24
[10]  
PARK SM, LOAD BALANCING METHO