2009 IEEE International Conference on RFID最新文献

筛选
英文 中文
Mobile-phone-readable 2.45GHz passive digital sensor tag 手机可读2.45GHz无源数字传感器标签
2009 IEEE International Conference on RFID Pub Date : 2009-04-27 DOI: 10.1109/RFID.2009.4911172
Y. Tetu, I. Jantunen, B. Gomez, S. Robinet
{"title":"Mobile-phone-readable 2.45GHz passive digital sensor tag","authors":"Y. Tetu, I. Jantunen, B. Gomez, S. Robinet","doi":"10.1109/RFID.2009.4911172","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911172","url":null,"abstract":"A 2.45GHz passive RFID tag including a digital pressure sensor and its use in a mobile-phone-centric architecture for sensor networks are described. The combination of a low-cost remote-powered sensor tag and an open architecture makes possible a variety of ambient intelligence applications. The tag gathers power from the ISM band at 2.45GHz and wireless pressure measurement is demonstrated at a distance of 42 cm with 0.5 W EIRP transmission power and 110 cm with 4 W. The sensor is able to carry out pressure measurement with a 12-bit-resolution and a 100Hz reading frequency.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127992989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Novel localization scheme for passive RFID tags; Communication Range Recognition (CRR) 一种新的无源RFID标签定位方案通信距离识别(CRR)
2009 IEEE International Conference on RFID Pub Date : 2009-04-27 DOI: 10.1109/RFID.2009.4911209
T. Wada, N. Uchitomi, Y. Ota, T. Hori, K. Mutsuura, H. Okada
{"title":"A Novel localization scheme for passive RFID tags; Communication Range Recognition (CRR)","authors":"T. Wada, N. Uchitomi, Y. Ota, T. Hori, K. Mutsuura, H. Okada","doi":"10.1109/RFID.2009.4911209","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911209","url":null,"abstract":"This paper focuses on the localization technology of passive RFID (Radio Frequency IDentification) tags. By this technology, we will be able to detect some target, to get information on it, and to find the position and the distance of it. This paper proposes a novel scheme named Communication Range Recognition (CRR) in order to localize RFID tags effectively. This scheme finds the edges of the communication range of the RFID reader antenna when its position is moving by the robot appropriately. We evaluate the performance of the estimated position error through numerous experiments. We show that our proposed scheme can reduce the moving distance of the RFID reader without degrading the accuracy of localization in comparison with the conventional schemes.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130173353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Cryptography is feasible on 4-Bit microcontrollers - A proof of concept 加密在4位微控制器上是可行的-概念证明
2009 IEEE International Conference on RFID Pub Date : 2009-04-27 DOI: 10.1109/RFID.2009.4911182
Markus Vogt, A. Poschmann, C. Paar
{"title":"Cryptography is feasible on 4-Bit microcontrollers - A proof of concept","authors":"Markus Vogt, A. Poschmann, C. Paar","doi":"10.1109/RFID.2009.4911182","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911182","url":null,"abstract":"The RFID technology in combination with cryptographic algorithms and protocols is discussed widely as a promising solution against product counterfeiting. Usually the discussion is focussed on passive low-cost RFID-tags, which have harsh power constraints. 4-Bit microcontrollers have very low-power characteristics (5–60 μA) and are therefore an interesting platform for active and passive low-cost RFID-tags. To the best of our knowledge there are no implementations of cryptographic algorithms on a 4-bit microcontroller published so far. Therefore, the main contribution of this work is to demonstrate that cryptography is feasible on these ultra-constrained devices and to close this gap. We chose PRESENT [1] as the cryptographic algorithm, because contrary to many other ciphers, PRESENT uses a 4×4 S-Box. Our implementation draws a current of 6:7μA at a supply voltage of 1:8V and a frequency of 500 KHz and requires less than 200 ms for the processing of one data block.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"168 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134550490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Circularly polarized patch antenna with high Tx / Rx-separation 高Tx / rx分离的圆极化贴片天线
2009 IEEE International Conference on RFID Pub Date : 2009-04-27 DOI: 10.1109/RFID.2009.4911200
L. Mayer, A. Scholtz
{"title":"Circularly polarized patch antenna with high Tx / Rx-separation","authors":"L. Mayer, A. Scholtz","doi":"10.1109/RFID.2009.4911200","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911200","url":null,"abstract":"In this contribution an antenna is described that allows simultaneous transmission and reception in the same frequency band. Circular polarization is employed for a most reliable communication with radio frequency identification (RFID) transponders that typically have linearly polarized antennas. To achieve high separation between transmitted and received signals, a square patch antenna originally transmitting horizontally and vertically polarized radiation is combined with a 3 dB-hybrid circuit. With this hybrid circuit the antenna can simultaneously radiate a right-hand circularly polarized wave and receive a left-hand circularly polarized wave. Furthermore, the transmit signal that is unintentionally leaking into the receive path can be compensated by tuning the hybrid circuit with two variable capacitance diodes. At 866MHz a maximum Tx / Rx-separation of 65 dB was achieved in a static scenario. In a time variant indoor scenario with a metal object moving on a conveyor belt a Tx / Rx-separation of more than 52 dB was achieved by continuously tuning the hybrid circuit with a minimum-search algorithm.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117334425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A low-power dual-clock strategy for digital circuits of EPC Gen2 RFID tag EPC Gen2 RFID标签数字电路的低功耗双时钟策略
2009 IEEE International Conference on RFID Pub Date : 2009-04-27 DOI: 10.1109/RFID.2009.4911177
Q. Luo, Li Guo, Qing Li, Gang Zhang, Junyu Wang
{"title":"A low-power dual-clock strategy for digital circuits of EPC Gen2 RFID tag","authors":"Q. Luo, Li Guo, Qing Li, Gang Zhang, Junyu Wang","doi":"10.1109/RFID.2009.4911177","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911177","url":null,"abstract":"Power consumption is critical to the performance of EPC Gen2 RFID tags. System clock frequency of tags should be as low as possible to reduce the power consumption and still conform to the protocol. This paper analyses the impact of different clock strategies on digital circuits of EPC Gen2 tag. An error shift approach is proposed to reduce the backscatter link frequency (BLF) errors. A dual-clock strategy with both 1.28 and 2.56 MHz clocks for the digital circuits is developed. Compared with the 1.92 MHz unitary-clock strategy, the dual-clock strategy offers larger decoding margins and BLF margins, consumes 5.66% to 9.44% less power estimated in CMOS 0.18μm technologies, and fully conforms to the EPC Gen2 protocol as well.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117136148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Effect of Gen2 protocol parameters on RFID tag performance Gen2协议参数对RFID标签性能的影响
2009 IEEE International Conference on RFID Pub Date : 2009-04-27 DOI: 10.1109/RFID.2009.4911178
P. Nikitin, K. Rao
{"title":"Effect of Gen2 protocol parameters on RFID tag performance","authors":"P. Nikitin, K. Rao","doi":"10.1109/RFID.2009.4911178","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911178","url":null,"abstract":"In this paper, we analyze the effect of Gen2 protocol parameters on RFID tag performance (tag sensitivity and backscatter efficiency). We describe our measurement methodology and perform characterization of several tags with different latest Gen2 ICs available on the market (Monza, UCODE, and Higgs families). To confirm our findings, we repeat measurements using conducted tag setup. We analyze data and draw conclusions on how the protocol parameters affect the tag performance in forward and reverse links.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129529980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Flexible evaluation of RFID system parameters using rapid prototyping 利用快速原型技术灵活评估RFID系统参数
2009 IEEE International Conference on RFID Pub Date : 2009-04-27 DOI: 10.1109/RFID.2009.4911188
C. Angerer, R. Langwieser
{"title":"Flexible evaluation of RFID system parameters using rapid prototyping","authors":"C. Angerer, R. Langwieser","doi":"10.1109/RFID.2009.4911188","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911188","url":null,"abstract":"Today's RFID systems are dependent on a wide range of different parameters, that influence the overall performance. Such system parameters can for example be the selected data rate, encoding scheme, modulation setting, transmit power or different hardware configurations, like one or two antenna scenarios. Furthermore, it is often desired to optimise several performance goals, like read-out range, read-out quality, throughput, etc., which are often contradicting each other. In order to achieve a desired performance of an RFID system, it is essential to understand the influences of the individual parameters of interest and their interconnection. Due to the multitude, wide range and interdependencies of influencing factors, this however is a complex task. Simulations offer insights in these relations but rely on the correct modeling of the dependencies of- and between the parameters. With our established prototyping system for RFID, we are able to flexibly and accurately explore the influence and interconnection of such parameters in a wide range on a basis of real-time measurements. Results on the evaluation of read-out quality depending on the transmit power and the data rate are presented.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117333708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
How to improve security and reduce hardware demands of the WIPR RFID protocol 如何提高WIPR RFID协议的安全性,降低对硬件的要求
2009 IEEE International Conference on RFID Pub Date : 2009-04-27 DOI: 10.1109/RFID.2009.4911191
Jiang Wu, Douglas R Stinson
{"title":"How to improve security and reduce hardware demands of the WIPR RFID protocol","authors":"Jiang Wu, Douglas R Stinson","doi":"10.1109/RFID.2009.4911191","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911191","url":null,"abstract":"In this paper, we analyze and improve WIPR, an RFID identification scheme based on public key techniques with efficient hardware implementation. First we analyze the security and privacy features of WIPR. We show that a reduced version of WIPR is vulnerable to short padding attacks and WIPR needs a random number generator with certain properties to withstand reset attacks. We discuss countermeasures to avoid these attacks. Then we propose two variants of WIPR, namely WIPR-SAEP and WIPR-RNS, to improve its security and to further reduce its hardware cost. Using an additional hash function, WIPR-SAEP achieves provable security in the sense that violating the security properties leads to solving the integer factoring problem. WIPR-RNS uses a residue number system (RNS) for computation, and reduces the hardware costs of WIPR. WIPR-RNS provides a better security guarantee than WIPR in that it does not use a non-standard cryptographic primitive in WIPR. WIPR-SAEP and WIPR-RNS can be combined into one scheme.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123901366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
A passive SAW based RFID system for use on ordnance 一种用于军械的无源SAW射频识别系统
2009 IEEE International Conference on RFID Pub Date : 2009-04-27 DOI: 10.1109/RFID.2009.4911207
P. Hartmann
{"title":"A passive SAW based RFID system for use on ordnance","authors":"P. Hartmann","doi":"10.1109/RFID.2009.4911207","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911207","url":null,"abstract":"Automatic RFID tracking of ordnance in transport or storage has been difficult or impossible due to the dangers that arise from possible accidental actuation of electro-explosive devices by RF electromagnetic fields. Limits on the maximum RF power densities that meet Hazards of Electromagnetic Radiation to Ordnance (HERO) emission standards preclude many passive RFID systems from operating safely in the vicinity of ordnance due to the high level of RF radiation needed to power the electronics onboard the RFID tag. This paper describes a Surface Acoustic Wave (SAW) based RFID system that allows safe operation of an RFID system with no standoff or separation distance between the reader antenna and the item of ordnance. Surface Acoustic Wave RFID systems are a “chipless” technology that utilize the piezoelectric properties of certain monolithic crystal materials to provide a truly passive RFID technology which can be operated at RF power levels well below those established for safety near ordnance.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126491490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Untraceable RFID authentication protocols: Revision of EC-RAC 不可追溯的RFID认证协议:EC-RAC的修订
2009 IEEE International Conference on RFID Pub Date : 2009-04-27 DOI: 10.1109/RFID.2009.4911179
Y. Lee, L. Batina, I. Verbauwhede
{"title":"Untraceable RFID authentication protocols: Revision of EC-RAC","authors":"Y. Lee, L. Batina, I. Verbauwhede","doi":"10.1109/RFID.2009.4911179","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911179","url":null,"abstract":"Radio Frequency IDentification (RFID) systems are steadily becoming paramount due to their vast applications such as supply chains, inventory, tolling, baggage management, access control etc. While they have potentials to improve our lives, they also present a privacy risk. Privacy is often overlooked in many applications, but due to pervasiveness of RFIDs the issue has to be taken into account. However, additional security always comes at price and the scarceness of resources on a tag makes conventional privacy-preserving protocols infeasible. In this paper we propose several authentication protocols that are all made of the same building blocks. More precisely, we first revise the EC-RAC (Elliptic Curve Based Randomized Access Control) protocol and we expand it into several authentication protocols. All the proposed protocols satisfy the basic requirements, which are the system scalability, un-traceability and security against cloning attacks and replay attacks, but each protocol has different security properties. The security proofs are implied by means of cryptographic reductions, i.e. they are based on the security of the Schnorr protocol and the hardness of the decisional Diffie-Hellman problem.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126534989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 86
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信