Analysis of different techniques to define metadata structure in NFC/RFID cards to reduce access latency, optimize capacity, and guarantee integrity
Intelligent Manufacturing Systems, Volume # 10 | Part# 1
Jara, Antonio J.; Alcolea, Alberto F.; Zamora, Miguel A.; Skarmeta, Antonio F. G.
Digital Object Identifier (DOI)
meta-level knowledge,pharmacokinetic data,knowledge-based systems,internet of things,NFC,RFID
RFID/NFC cards/tags are widely used in a very diverse range of applications; these applications have usually a low data requirements, e.g. they are based on either just an ID for the data information or in a reduced and static set of fields. Therefore, the data structure can be easily defined and stored, without optimization needs, in the cards/tags. The problem with data structure appears when the application requirements define large, dynamic and miscellaneous information to be stored, such as an Electronic Health Record for e-Health application and a Truckload Record for Intelligent Transport Systems (ITS). Therefore, that information needs to be carefully stored to reach the register that we are looking for very quickly and to optimize the card/tag space, which is very constrained. Consequently, this paper proposes a set of design issues and techniques to define the metadata structure in NFC/RFID tags and cards to reduce search time, read time and optimize capacity. For this paper has been defined an example of the metadata structure from a Pharmaceutical Information System, where the patient card based on MiFare stores drugs history, patient allergies and general patient information. The reduction of space reached for this solution following the design issues and techniques in this paper has been about 189%, a reduction of time to find a register reaching a direct access to the records, instead of sequential search, and consequently a reduction for read time.
 Anokwa, Y., Borriello, G., Pering, T., and Want, R. (2007). A User Interaction Model for NFC Enabled Applications. Proceedings of the Fifth IEEE international Conference on Pervasive Computing and Communications Workshops.  Borrelli, C. (2001). IEEE 802.3 Cyclic Redundancy Check, Application Note: Virtex Series and Virtex-II Family.  Bravo, J., Hervas, R., Casero, G., Peña, R., Vergara, M., Nava, S., Chavira, G., and Villareal, V., (2009) Enabling NFC Technology to Public Services. Ambient Inttelligent Perspectives, ISBN: 978-1-58603-956-2.  Castagnoli G., Bräuer, S., and Herrmann M. (1993). Optimiation of Cyclic Redundancy-Check Codes with 24 and 32 Parity Bus, IEEE Transactions on Communications, Vol. 41, No. 6, June 1993.  Domdouzis, K., Kumar, B., and Anumba, C. (2007) Radio-Frequency Identification (RFID) applications: a brief introduction, Advanced Engineering Informatics 21 (4), pp. 350-355.  Gerst, M., Bunduchi, R., and Graham I. (2005). Current issues in RFID standardization, RFID standardization, Workshop, February 22nd, 2005, pages 3-12.  Jara, A. J., Zamora, M. A., Skarmeta, A. F. G. (2009), NFC/RFID applications in medicine: security challenges and solutions. 5th International Conference on Intelligent Environments (IE'09), proceedings of the 5th International Conference On Intelligent Environments. Series: Ambient Intelligence and Smart Environments. IOS Press. Vol: 4. pp: 879-884.  Jara, A. J., Belchi, F. J., Alcolea, A. F., Santa, J., Zamora, M. A., Skarmeta, A. F. G. (2010). A Pharmaceutical Intelligent Information System to Detect Allergies and Adverse Drugs Reactions based on Internet of Things. 8th IEEE International Conference on Pervasive Computing and Communications, PerCom 2010.  Koopman, P, and Chakravarty, T. (2004). Cyclic Redundancy Code (CRC) Polynomial Selection For Embedded Networks, Dependable Systems and Networks, International Conference on, p. 145, 2004 International Conference on Dependable Systems and Networks.  Knospe, H., Pohl, H. (2004). RFID security, Information Security Technical Report, Volume 9, Issue 4, December 2004, Pages 39-50, ISSN 1363-4127.  López-Calvet, J.C. (2005). The role of RFID in the mobile phone, Telektronikk 3/4.2005, ISSN 0085-7130.  Morales-Salcedo, R., Ogata, H., and Yano, Y. (2006). Using RFID and dynamic metadata in an educational digital library. Proceedings of the 5th IASTED international Conference on Web-Based Education, Ed. International Association Of Science And Technology For Development. ACTA Press, Anaheim, CA, 323-331.  Mulliner, C. (2009). Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones, Availability, Reliability and Security, International Conference on, pp. 695-700, 2009 International Conference on Availability, Reliability and Security.  Nguyen Duc, D., Park, J, Lee, H., and Kim, K. (2006) Enhancing Security of EPCglobal Gen-2 RFID Tag against: Traceability and Cloning, SCIS 2006 The 2006 Symposium on Cryptography and Information Security.  Pasquet, M., Alimi, V., and Rosenberger C. (2008). An E-payment Platform For Training and Research, The 2008 International Symposium on Collaborative Technologies and Systems (CTS 2008).  Veli-Jussi Raitila (2007), Tag, you're it - NFC in a home environment, TKK T-110.5190 Seminar on Internetworking.