{"title":"Mobile-phone-readable 2.45GHz passive digital sensor tag","authors":"Y. Tetu, I. Jantunen, B. Gomez, S. Robinet","doi":"10.1109/RFID.2009.4911172","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911172","url":null,"abstract":"A 2.45GHz passive RFID tag including a digital pressure sensor and its use in a mobile-phone-centric architecture for sensor networks are described. The combination of a low-cost remote-powered sensor tag and an open architecture makes possible a variety of ambient intelligence applications. The tag gathers power from the ISM band at 2.45GHz and wireless pressure measurement is demonstrated at a distance of 42 cm with 0.5 W EIRP transmission power and 110 cm with 4 W. The sensor is able to carry out pressure measurement with a 12-bit-resolution and a 100Hz reading frequency.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127992989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Wada, N. Uchitomi, Y. Ota, T. Hori, K. Mutsuura, H. Okada
{"title":"A Novel localization scheme for passive RFID tags; Communication Range Recognition (CRR)","authors":"T. Wada, N. Uchitomi, Y. Ota, T. Hori, K. Mutsuura, H. Okada","doi":"10.1109/RFID.2009.4911209","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911209","url":null,"abstract":"This paper focuses on the localization technology of passive RFID (Radio Frequency IDentification) tags. By this technology, we will be able to detect some target, to get information on it, and to find the position and the distance of it. This paper proposes a novel scheme named Communication Range Recognition (CRR) in order to localize RFID tags effectively. This scheme finds the edges of the communication range of the RFID reader antenna when its position is moving by the robot appropriately. We evaluate the performance of the estimated position error through numerous experiments. We show that our proposed scheme can reduce the moving distance of the RFID reader without degrading the accuracy of localization in comparison with the conventional schemes.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130173353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptography is feasible on 4-Bit microcontrollers - A proof of concept","authors":"Markus Vogt, A. Poschmann, C. Paar","doi":"10.1109/RFID.2009.4911182","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911182","url":null,"abstract":"The RFID technology in combination with cryptographic algorithms and protocols is discussed widely as a promising solution against product counterfeiting. Usually the discussion is focussed on passive low-cost RFID-tags, which have harsh power constraints. 4-Bit microcontrollers have very low-power characteristics (5–60 μA) and are therefore an interesting platform for active and passive low-cost RFID-tags. To the best of our knowledge there are no implementations of cryptographic algorithms on a 4-bit microcontroller published so far. Therefore, the main contribution of this work is to demonstrate that cryptography is feasible on these ultra-constrained devices and to close this gap. We chose PRESENT [1] as the cryptographic algorithm, because contrary to many other ciphers, PRESENT uses a 4×4 S-Box. Our implementation draws a current of 6:7μA at a supply voltage of 1:8V and a frequency of 500 KHz and requires less than 200 ms for the processing of one data block.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"168 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134550490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Circularly polarized patch antenna with high Tx / Rx-separation","authors":"L. Mayer, A. Scholtz","doi":"10.1109/RFID.2009.4911200","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911200","url":null,"abstract":"In this contribution an antenna is described that allows simultaneous transmission and reception in the same frequency band. Circular polarization is employed for a most reliable communication with radio frequency identification (RFID) transponders that typically have linearly polarized antennas. To achieve high separation between transmitted and received signals, a square patch antenna originally transmitting horizontally and vertically polarized radiation is combined with a 3 dB-hybrid circuit. With this hybrid circuit the antenna can simultaneously radiate a right-hand circularly polarized wave and receive a left-hand circularly polarized wave. Furthermore, the transmit signal that is unintentionally leaking into the receive path can be compensated by tuning the hybrid circuit with two variable capacitance diodes. At 866MHz a maximum Tx / Rx-separation of 65 dB was achieved in a static scenario. In a time variant indoor scenario with a metal object moving on a conveyor belt a Tx / Rx-separation of more than 52 dB was achieved by continuously tuning the hybrid circuit with a minimum-search algorithm.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117334425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A low-power dual-clock strategy for digital circuits of EPC Gen2 RFID tag","authors":"Q. Luo, Li Guo, Qing Li, Gang Zhang, Junyu Wang","doi":"10.1109/RFID.2009.4911177","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911177","url":null,"abstract":"Power consumption is critical to the performance of EPC Gen2 RFID tags. System clock frequency of tags should be as low as possible to reduce the power consumption and still conform to the protocol. This paper analyses the impact of different clock strategies on digital circuits of EPC Gen2 tag. An error shift approach is proposed to reduce the backscatter link frequency (BLF) errors. A dual-clock strategy with both 1.28 and 2.56 MHz clocks for the digital circuits is developed. Compared with the 1.92 MHz unitary-clock strategy, the dual-clock strategy offers larger decoding margins and BLF margins, consumes 5.66% to 9.44% less power estimated in CMOS 0.18μm technologies, and fully conforms to the EPC Gen2 protocol as well.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117136148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effect of Gen2 protocol parameters on RFID tag performance","authors":"P. Nikitin, K. Rao","doi":"10.1109/RFID.2009.4911178","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911178","url":null,"abstract":"In this paper, we analyze the effect of Gen2 protocol parameters on RFID tag performance (tag sensitivity and backscatter efficiency). We describe our measurement methodology and perform characterization of several tags with different latest Gen2 ICs available on the market (Monza, UCODE, and Higgs families). To confirm our findings, we repeat measurements using conducted tag setup. We analyze data and draw conclusions on how the protocol parameters affect the tag performance in forward and reverse links.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129529980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multipath fading measurements for multi-antenna backscatter RFID at 5.8 GHz","authors":"J. Griffin, G. Durgin","doi":"10.1109/RFID.2009.4911197","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911197","url":null,"abstract":"UHF and microwave backscatter RF-tag systems, including radio frequency identification (RFID) and sensor systems, experience multipath fading that can be more severe than that found in a conventional transmitter-to-receiver channel. Previous work has shown that multipath fading can be reduced on the modulated-backscatter signal received from the RF tag in a non-line-of-sight (NLOS) channel if more than one RF-tag antenna is used to modulate backscatter. This paper presents the first multipath fading measurements for backscatter tags using multiple antennas at 5.79 GHz - the center of the 5.725–5.850 GHz, unlicensed industrial, scientific, and medical (ISM) frequency band that may offer reliable operation for future, miniature RF tags. NLOS measurement results are presented as cumulative density functions (CDF) and fade margins for use in backscatter radio link budget analysis and a detailed description of the custom backscatter testbed used to take the measurements is provided. The measurements show that gains are available for multiple-antenna RF tags and results match well with gains predicted using the analytic fading distributions derived previously.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131263773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Flexible evaluation of RFID system parameters using rapid prototyping","authors":"C. Angerer, R. Langwieser","doi":"10.1109/RFID.2009.4911188","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911188","url":null,"abstract":"Today's RFID systems are dependent on a wide range of different parameters, that influence the overall performance. Such system parameters can for example be the selected data rate, encoding scheme, modulation setting, transmit power or different hardware configurations, like one or two antenna scenarios. Furthermore, it is often desired to optimise several performance goals, like read-out range, read-out quality, throughput, etc., which are often contradicting each other. In order to achieve a desired performance of an RFID system, it is essential to understand the influences of the individual parameters of interest and their interconnection. Due to the multitude, wide range and interdependencies of influencing factors, this however is a complex task. Simulations offer insights in these relations but rely on the correct modeling of the dependencies of- and between the parameters. With our established prototyping system for RFID, we are able to flexibly and accurately explore the influence and interconnection of such parameters in a wide range on a basis of real-time measurements. Results on the evaluation of read-out quality depending on the transmit power and the data rate are presented.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117333708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of stacked RFID tags","authors":"Feng Lu, Xiaosheng Chen, Terry Tao Ye","doi":"10.1109/RFID.2009.4911194","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911194","url":null,"abstract":"Most RFID tag performance analysis is based on the assumption that the tag is stand-alone when interacting with the readers. However, in the real world, RFID tags are often stacked together when deployed, i.e., RFID-labeled carton boxes stacked on the pallet. When multiple RFID tag antennas are placed close to each other, each antenna behaves like a shielding and reflecting object to others and the radiation pattern and other EM properties will be detuned. The stacking impact often leads to performance degradation and in many cases, read and write failure. In this paper, we first derive an RCS model to generalize a loaded antenna as a shielding and reflecting object. We then introduce a normalized mutual impedance matrix of multiple antennas to formulate the coupling effects among stacked antennas. To quantify and visualize the stacking impact in a real world scenario, we also construct a 3-D EM model in Agilent® AMDS consisting of 27 (3 × 3 × 3) stacked carton boxes, each with Alien® tags attached on the surface. Our theoretical calculation agrees with the simulation and shows that both tag radiation pattern and other EM properties will be greatly altered by neighboring tags. Compared with tags in stand-alone scenarios, the degradation at different positions could be very significant (more than 6dB in some directions).","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116409840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How to improve security and reduce hardware demands of the WIPR RFID protocol","authors":"Jiang Wu, Douglas R Stinson","doi":"10.1109/RFID.2009.4911191","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911191","url":null,"abstract":"In this paper, we analyze and improve WIPR, an RFID identification scheme based on public key techniques with efficient hardware implementation. First we analyze the security and privacy features of WIPR. We show that a reduced version of WIPR is vulnerable to short padding attacks and WIPR needs a random number generator with certain properties to withstand reset attacks. We discuss countermeasures to avoid these attacks. Then we propose two variants of WIPR, namely WIPR-SAEP and WIPR-RNS, to improve its security and to further reduce its hardware cost. Using an additional hash function, WIPR-SAEP achieves provable security in the sense that violating the security properties leads to solving the integer factoring problem. WIPR-RNS uses a residue number system (RNS) for computation, and reduces the hardware costs of WIPR. WIPR-RNS provides a better security guarantee than WIPR in that it does not use a non-standard cryptographic primitive in WIPR. WIPR-SAEP and WIPR-RNS can be combined into one scheme.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123901366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}