Enabling globally unique sensor ID with dual-interface RF tag
2011 IEEE SENSORS Proceedings, 2011In any sensor information system, unique identification (ID) of each sensor is indispensable. Usual practices to secure uniqueness of sensor ID is to use MAC or network address or to use a proprietary ID in application layer. In pervasive computing era, it is desirable to uniquely identify a sensor with a URN regardless of types of network to which the
Jin Mitsugi +5 more
openaire +1 more source
Fingerprint's core point based unique ID generation for security document
2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO), 2015Security documents like certificates, land revenue documents, etc., have only the individual's name, address, and in some cases a photo as means of personal identification. This makes criminal impersonation an easy task. This paper proposes a method for creating a unique ID based on the core point of the fingerprint of an individual.
Sajan Ambadiyil +2 more
openaire +1 more source
Empowering India through unique IDs to 1.2 billion indians
Journal of Biometrics & Biostatistics, 2013E an ID is a common challenge for poor. A resident typically accesses multiple service providers, at different times and needs to repeatedly re-establish his ID which is a problem for the poor. The Government of India has launched a project in 2009, under which an Aadhaar, (which means “ foundation”) , a unique 12 digit number, is issued to residents ...
openaire +1 more source
Self-Organized Scheme for Unique Cell ID Assignment during Femtocell Deployment
2019 53rd Asilomar Conference on Signals, Systems, and Computers, 2019Femtocell deployment has been a focus of wide research due to its potential to increase system capacity. There still are open challenges for the planning and management of femtocells caused by the potential interference issues that may arise when installing them under the coverage of larger cells (i.e., macrocells).
Khwandah, Sinan A. +4 more
openaire +3 more sources
ProMusicDB ID: Beyond a Unique Identifier for Professional Music
Music Reference Services Quarterly, 2015Music is increasingly being produced, published, distributed, discovered, and consumed online. Various aspects of professional music and related activities are featured on online portals with holdi...
openaire +1 more source
IoT-ID: A Novel Device-Specific Identifier Based on Unique Hardware Fingerprints
2020 IEEE/ACM Fifth International Conference on Internet-of-Things Design and Implementation (IoTDI), 2020A significant number of IoT devices are being deployed in the wild, mostly in remote locations and in untrusted conditions. This could include monitoring an electronic perimeter fence or a critical infrastructure such as telecom and power grids. Such applications rely on the fidelity of data reported from the IoT devices, and hence it is imperative to ...
Girish Vaidya +4 more
openaire +1 more source
Adaptive Generation of Unique IDs for Digital Chips through Analog Excitation
ACM Transactions on Design Automation of Electronic Systems, 2015Globalization of the integrated circuit design and manufacturing flow has successfully ameliorated design complexity and fabrication cost challenges, and helped deliver cost-effective products while meeting stringent time-to-market requirements. On the flip side, it has resulted in various forms of security vulnerabilities in the supply chain that ...
Chandra K. H. Suresh +2 more
openaire +1 more source
ASCIi based cryptography using unique id, matrix multiplication and palindrome number
The 2014 International Symposium on Networks, Computers and Communications, 2014Encryption is most effective way to achieve data security. This is done by converting the data into cipher text. The existing way of doing this was using Armstrong number. Since there are few Armstrong numbers therefore a crypt-analyst can easily find the key.
J Gitanjali +3 more
openaire +1 more source
Performance of BFSA Collision Resolution: RFID Including Non-unique Tag IDs
2014As RFID technology becomes ever more affordable, its large scale implementation has been a growing trend in recent years. While current protocols allow for non-unique tag IDs, most existing implementations largely optimize RFID system’s performance based on the assumption of unique tag IDs and treat the existence of non-unique tag IDs within reader’s ...
Chemburka, Kirti +3 more
openaire +2 more sources
Unique-ID based channel hopping rendezvous algorithm for cognitive radio ad hoc networks
2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE), 2017Rendezvous of cognitive radios on commonly available channels is fundamental and crucial phenomena in the formation of cognitive radio networks (CRNs). Rendezvous enables secondary users (SUs) to detect the presence of each other and establish communication links between them. The diversity in free available channels sensed by the SUs and non-awareness
Aishwarya Sagar Anand Ukey, Meenu Chawla
openaire +1 more source

