{"title":"Mobile-phone-readable 2.45GHz passive digital sensor tag","authors":"Y. Tetu, I. Jantunen, B. Gomez, S. Robinet","doi":"10.1109/RFID.2009.4911172","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911172","url":null,"abstract":"A 2.45GHz passive RFID tag including a digital pressure sensor and its use in a mobile-phone-centric architecture for sensor networks are described. The combination of a low-cost remote-powered sensor tag and an open architecture makes possible a variety of ambient intelligence applications. The tag gathers power from the ISM band at 2.45GHz and wireless pressure measurement is demonstrated at a distance of 42 cm with 0.5 W EIRP transmission power and 110 cm with 4 W. The sensor is able to carry out pressure measurement with a 12-bit-resolution and a 100Hz reading frequency.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127992989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Wada, N. Uchitomi, Y. Ota, T. Hori, K. Mutsuura, H. Okada
{"title":"A Novel localization scheme for passive RFID tags; Communication Range Recognition (CRR)","authors":"T. Wada, N. Uchitomi, Y. Ota, T. Hori, K. Mutsuura, H. Okada","doi":"10.1109/RFID.2009.4911209","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911209","url":null,"abstract":"This paper focuses on the localization technology of passive RFID (Radio Frequency IDentification) tags. By this technology, we will be able to detect some target, to get information on it, and to find the position and the distance of it. This paper proposes a novel scheme named Communication Range Recognition (CRR) in order to localize RFID tags effectively. This scheme finds the edges of the communication range of the RFID reader antenna when its position is moving by the robot appropriately. We evaluate the performance of the estimated position error through numerous experiments. We show that our proposed scheme can reduce the moving distance of the RFID reader without degrading the accuracy of localization in comparison with the conventional schemes.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130173353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptography is feasible on 4-Bit microcontrollers - A proof of concept","authors":"Markus Vogt, A. Poschmann, C. Paar","doi":"10.1109/RFID.2009.4911182","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911182","url":null,"abstract":"The RFID technology in combination with cryptographic algorithms and protocols is discussed widely as a promising solution against product counterfeiting. Usually the discussion is focussed on passive low-cost RFID-tags, which have harsh power constraints. 4-Bit microcontrollers have very low-power characteristics (5–60 μA) and are therefore an interesting platform for active and passive low-cost RFID-tags. To the best of our knowledge there are no implementations of cryptographic algorithms on a 4-bit microcontroller published so far. Therefore, the main contribution of this work is to demonstrate that cryptography is feasible on these ultra-constrained devices and to close this gap. We chose PRESENT [1] as the cryptographic algorithm, because contrary to many other ciphers, PRESENT uses a 4×4 S-Box. Our implementation draws a current of 6:7μA at a supply voltage of 1:8V and a frequency of 500 KHz and requires less than 200 ms for the processing of one data block.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"168 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134550490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Circularly polarized patch antenna with high Tx / Rx-separation","authors":"L. Mayer, A. Scholtz","doi":"10.1109/RFID.2009.4911200","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911200","url":null,"abstract":"In this contribution an antenna is described that allows simultaneous transmission and reception in the same frequency band. Circular polarization is employed for a most reliable communication with radio frequency identification (RFID) transponders that typically have linearly polarized antennas. To achieve high separation between transmitted and received signals, a square patch antenna originally transmitting horizontally and vertically polarized radiation is combined with a 3 dB-hybrid circuit. With this hybrid circuit the antenna can simultaneously radiate a right-hand circularly polarized wave and receive a left-hand circularly polarized wave. Furthermore, the transmit signal that is unintentionally leaking into the receive path can be compensated by tuning the hybrid circuit with two variable capacitance diodes. At 866MHz a maximum Tx / Rx-separation of 65 dB was achieved in a static scenario. In a time variant indoor scenario with a metal object moving on a conveyor belt a Tx / Rx-separation of more than 52 dB was achieved by continuously tuning the hybrid circuit with a minimum-search algorithm.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117334425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A low-power dual-clock strategy for digital circuits of EPC Gen2 RFID tag","authors":"Q. Luo, Li Guo, Qing Li, Gang Zhang, Junyu Wang","doi":"10.1109/RFID.2009.4911177","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911177","url":null,"abstract":"Power consumption is critical to the performance of EPC Gen2 RFID tags. System clock frequency of tags should be as low as possible to reduce the power consumption and still conform to the protocol. This paper analyses the impact of different clock strategies on digital circuits of EPC Gen2 tag. An error shift approach is proposed to reduce the backscatter link frequency (BLF) errors. A dual-clock strategy with both 1.28 and 2.56 MHz clocks for the digital circuits is developed. Compared with the 1.92 MHz unitary-clock strategy, the dual-clock strategy offers larger decoding margins and BLF margins, consumes 5.66% to 9.44% less power estimated in CMOS 0.18μm technologies, and fully conforms to the EPC Gen2 protocol as well.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117136148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effect of Gen2 protocol parameters on RFID tag performance","authors":"P. Nikitin, K. Rao","doi":"10.1109/RFID.2009.4911178","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911178","url":null,"abstract":"In this paper, we analyze the effect of Gen2 protocol parameters on RFID tag performance (tag sensitivity and backscatter efficiency). We describe our measurement methodology and perform characterization of several tags with different latest Gen2 ICs available on the market (Monza, UCODE, and Higgs families). To confirm our findings, we repeat measurements using conducted tag setup. We analyze data and draw conclusions on how the protocol parameters affect the tag performance in forward and reverse links.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129529980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Flexible evaluation of RFID system parameters using rapid prototyping","authors":"C. Angerer, R. Langwieser","doi":"10.1109/RFID.2009.4911188","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911188","url":null,"abstract":"Today's RFID systems are dependent on a wide range of different parameters, that influence the overall performance. Such system parameters can for example be the selected data rate, encoding scheme, modulation setting, transmit power or different hardware configurations, like one or two antenna scenarios. Furthermore, it is often desired to optimise several performance goals, like read-out range, read-out quality, throughput, etc., which are often contradicting each other. In order to achieve a desired performance of an RFID system, it is essential to understand the influences of the individual parameters of interest and their interconnection. Due to the multitude, wide range and interdependencies of influencing factors, this however is a complex task. Simulations offer insights in these relations but rely on the correct modeling of the dependencies of- and between the parameters. With our established prototyping system for RFID, we are able to flexibly and accurately explore the influence and interconnection of such parameters in a wide range on a basis of real-time measurements. Results on the evaluation of read-out quality depending on the transmit power and the data rate are presented.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117333708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How to improve security and reduce hardware demands of the WIPR RFID protocol","authors":"Jiang Wu, Douglas R Stinson","doi":"10.1109/RFID.2009.4911191","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911191","url":null,"abstract":"In this paper, we analyze and improve WIPR, an RFID identification scheme based on public key techniques with efficient hardware implementation. First we analyze the security and privacy features of WIPR. We show that a reduced version of WIPR is vulnerable to short padding attacks and WIPR needs a random number generator with certain properties to withstand reset attacks. We discuss countermeasures to avoid these attacks. Then we propose two variants of WIPR, namely WIPR-SAEP and WIPR-RNS, to improve its security and to further reduce its hardware cost. Using an additional hash function, WIPR-SAEP achieves provable security in the sense that violating the security properties leads to solving the integer factoring problem. WIPR-RNS uses a residue number system (RNS) for computation, and reduces the hardware costs of WIPR. WIPR-RNS provides a better security guarantee than WIPR in that it does not use a non-standard cryptographic primitive in WIPR. WIPR-SAEP and WIPR-RNS can be combined into one scheme.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123901366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A passive SAW based RFID system for use on ordnance","authors":"P. Hartmann","doi":"10.1109/RFID.2009.4911207","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911207","url":null,"abstract":"Automatic RFID tracking of ordnance in transport or storage has been difficult or impossible due to the dangers that arise from possible accidental actuation of electro-explosive devices by RF electromagnetic fields. Limits on the maximum RF power densities that meet Hazards of Electromagnetic Radiation to Ordnance (HERO) emission standards preclude many passive RFID systems from operating safely in the vicinity of ordnance due to the high level of RF radiation needed to power the electronics onboard the RFID tag. This paper describes a Surface Acoustic Wave (SAW) based RFID system that allows safe operation of an RFID system with no standoff or separation distance between the reader antenna and the item of ordnance. Surface Acoustic Wave RFID systems are a “chipless” technology that utilize the piezoelectric properties of certain monolithic crystal materials to provide a truly passive RFID technology which can be operated at RF power levels well below those established for safety near ordnance.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126491490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Untraceable RFID authentication protocols: Revision of EC-RAC","authors":"Y. Lee, L. Batina, I. Verbauwhede","doi":"10.1109/RFID.2009.4911179","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911179","url":null,"abstract":"Radio Frequency IDentification (RFID) systems are steadily becoming paramount due to their vast applications such as supply chains, inventory, tolling, baggage management, access control etc. While they have potentials to improve our lives, they also present a privacy risk. Privacy is often overlooked in many applications, but due to pervasiveness of RFIDs the issue has to be taken into account. However, additional security always comes at price and the scarceness of resources on a tag makes conventional privacy-preserving protocols infeasible. In this paper we propose several authentication protocols that are all made of the same building blocks. More precisely, we first revise the EC-RAC (Elliptic Curve Based Randomized Access Control) protocol and we expand it into several authentication protocols. All the proposed protocols satisfy the basic requirements, which are the system scalability, un-traceability and security against cloning attacks and replay attacks, but each protocol has different security properties. The security proofs are implied by means of cryptographic reductions, i.e. they are based on the security of the Schnorr protocol and the hardness of the decisional Diffie-Hellman problem.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126534989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}