2009 IEEE International Conference on RFID最新文献

筛选
英文 中文
Hybrid ultrasound-RFID indoor positioning: Combining the best of both worlds 混合超声波- rfid室内定位:结合两者的优点
2009 IEEE International Conference on RFID Pub Date : 2009-04-27 DOI: 10.1109/RFID.2009.4911169
S. Holm
{"title":"Hybrid ultrasound-RFID indoor positioning: Combining the best of both worlds","authors":"S. Holm","doi":"10.1109/RFID.2009.4911169","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911169","url":null,"abstract":"Existing hybrid ultrasound/RF positioning systems usually measure ultrasonic time-of-flight. This operation requires a wide bandwidth and this makes it rather noise sensitive, limiting the useful range. Therefore a new system is proposed where only the room-indicating capability of ultrasound is utilized and combined with RF. A portable tag obtains the room location by receiving a narrow bandwidth signal from a stationary ultrasound transmitter. The result is then relayed back over RF. This combines the high accuracy of ultrasound to pin-point exactly the room location with the high communications capacity of RF that enables tracking of hundreds of simultaneously moving tags. Secondary parameters that may aid in refining the position such as ultrasound signal level and velocity may also be measured. In addition to the increased capacity, the use of portable receivers instead of transmitters, as in ultrasound-alone indoor positioning systems, also has the advantage of reduced user exposure to ultrasound due to the larger distance to the transmitters.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130754349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 68
Serialized TID numbers - A headache or a blessing for RFID crackers? 序列化的TID号码——RFID破解者的头痛还是祝福?
2009 IEEE International Conference on RFID Pub Date : 2009-04-27 DOI: 10.1109/RFID.2009.4911183
Mikko Lehtonen, A. Ruhanen, F. Michahelles, E. Fleisch
{"title":"Serialized TID numbers - A headache or a blessing for RFID crackers?","authors":"Mikko Lehtonen, A. Ruhanen, F. Michahelles, E. Fleisch","doi":"10.1109/RFID.2009.4911183","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911183","url":null,"abstract":"Though transponder ID (TID) numbers of RFID tags were originally introduced to identify the chip model, serialized TID numbers are currently advertised as security features of UHF chips. Serialized TID numbers do not provide any cryptographic protection, but they do introduce a practical hurdle against adversaries who want to clone RFID tags today. Furthermore, serialized TID numbers are important for end-users who want to protect their current UHF tags from cloning since cryptographic tags are not yet commercially available in that frequency range. In this overview paper, we analyze the suitability of serialized TID numbers for security applications by evaluating the effort to bypass the TID check based on known vulnerabilities and we compare this effort to the needed level of protection in an example of anti-counterfeiting in the tobacco industry. The analysis illustrates that the practical hurdle of TID checks is not high enough for industrial-scale security applications and that it can completely diminish due to commodification of the RFID technology. However, end-users of security applications can still benefit from the increased tag cloning resistance that serialized TID numbers provide before migrating to more secure solutions.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130602220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Low-power energy supply circuit for passive RFID transponder 无源RFID应答器的低功耗供电电路
2009 IEEE International Conference on RFID Pub Date : 2009-04-27 DOI: 10.1109/RFID.2009.4911175
Jianguo Hu, S. Wu, Ke Lin, H. Tan
{"title":"Low-power energy supply circuit for passive RFID transponder","authors":"Jianguo Hu, S. Wu, Ke Lin, H. Tan","doi":"10.1109/RFID.2009.4911175","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911175","url":null,"abstract":"This paper addresses low power design approaches for passive RFID transponder. It proposes a novel low power energy supply circuit, which includes amplitude limiter, rectifier circuit, analog power supply circuit, digital power supply circuit and high voltage power supply circuit. The simulation and measurement results show that proposed voltage rectifier, amplitude limiter and power supply circuit with low voltage checking can provide stable power supply voltage with a small input power and high conversion efficiency. It has been applied to a passive transponder chip design, which was fabricated successfully based on 0.35 μm CMOS process.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122447693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Verification methodology for battery lifetime requirements of higher class UHF RFID tags 更高等级超高频RFID标签电池寿命要求的验证方法
2009 IEEE International Conference on RFID Pub Date : 2009-04-27 DOI: 10.1109/RFID.2009.4911185
C. Trummer, C. M. Kirchsteiger, A. Janek, C. Steger, R. Weiss, M. Pistauer, D. Dalton
{"title":"Verification methodology for battery lifetime requirements of higher class UHF RFID tags","authors":"C. Trummer, C. M. Kirchsteiger, A. Janek, C. Steger, R. Weiss, M. Pistauer, D. Dalton","doi":"10.1109/RFID.2009.4911185","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911185","url":null,"abstract":"Today's higher class tags usually are powered by batteries. The battery's capacity and the application's power demand influence the operational lifetime of the tag. Therefore, the designated application and lifetime requirement have to be kept in mind when designing a higher class tag. Moreover, the lifetime requirement needs to be verified in order to ensure the application will be successful. However, verification of the lifetime requirement is usually a very complex task. A verification environment for the application and its lifetime requirement needs to be created manually. After simulation with a battery model the results can be compared to the requirements document. Due to the complex and time-consuming nature of verification this often results in later time-to-market and increasing costs. In this work we present a novel, highly automated methodology to verify battery lifetime requirements. From the requirements document of the higher class UHF RFID tag a verification environment is created automatically. After power estimation is performed a battery model can be connected to the automatically generated lifetime verification environment. Finally, simulation is performed to verify whether the higher class UHF RFID tag fulfills the lifetime requirement of the application. The main benefit of our methodology is a decrease in the verification effort due to the high degree of automation in the creation of the verification environment. Moreover, simulation time is decreased which enables faster exploration of various batteries. This results in faster time-to-market and a reduction of costs.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129339161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multifrequency-based range estimation of RFID Tags 基于多频的RFID标签距离估计
2009 IEEE International Conference on RFID Pub Date : 2009-04-27 DOI: 10.1109/RFID.2009.4911199
Xin Li, Yimin D. Zhang, M. Amin
{"title":"Multifrequency-based range estimation of RFID Tags","authors":"Xin Li, Yimin D. Zhang, M. Amin","doi":"10.1109/RFID.2009.4911199","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911199","url":null,"abstract":"Radio frequency identification (RFID) is a rapidly developing wireless communication technology for electronically identifying, locating, and tracking products, assets, and personnel. RFID has become one of the primarily means to construct a real-time locating system (RTLS) that tracks and identifies the location of objects in real time using simple, inexpensive tags attached to or embedded in objects and readers that receive the wireless signals from these tags to determine their locations. Most RFID tag localization techniques heavily rely on precise estimation of the range between a reader and the tags. Traditionally, range information is obtained from the received signal strength indication (RSSI). Such approach is inaccurate, particularly in a complicated propagation environment. Recent development on phase difference of arrival (PDOA) allows coherent signal processing for improved range estimation performance. Exploiting multiple frequencies may further improve the range estimation performance. In this paper, we focus on multifrequency-based techniques to achieve several important advantages in the range estimation of passive or semi-passive RFID tags. The use of well designed multiple frequencies allows effective phase upwrapping and elimination of the range ambiguity problem which may be encountered in PDOA methods. In a complicated propagation environment, the mutifrequency-based techniques provide frequency diversity for robust range estimation when signals are highly faded at some frequencies. These advantages not only yield improved range estimation accuracy of RFID tags in various applications, but also enable robust range estimation in challenging scenarios.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133600208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 144
Analysis, design and implementation of semi-passive Gen2 tag 半被动Gen2标签的分析、设计与实现
2009 IEEE International Conference on RFID Pub Date : 2009-04-27 DOI: 10.1109/RFID.2009.4911208
Wenyi Che, Yuqing Yang, Conghui Xu, N. Yan, Xi Tan, Qiang Li, Hao Min, Jie Tan
{"title":"Analysis, design and implementation of semi-passive Gen2 tag","authors":"Wenyi Che, Yuqing Yang, Conghui Xu, N. Yan, Xi Tan, Qiang Li, Hao Min, Jie Tan","doi":"10.1109/RFID.2009.4911208","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911208","url":null,"abstract":"An EPCglobal Gen2 compatible semi-passive (or be called battery-assisted passive) tag is proposed. The transmission link is studied to optimize power distribution in a backscatter RFID system. For long read range consideration, design targets for low power tag are given. The tag chip is implemented in SMIC 0.18 μm standard CMOS technology. A high efficiency AC-DC charge pump serves as a rectifier. A low power wake-up circuit detects the input energy level and controls a button cell battery to supply the chip. The equivalent tag power is 230 nW by measurement.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129116644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Preserving RFID data privacy 保护RFID数据隐私
2009 IEEE International Conference on RFID Pub Date : 2009-04-27 DOI: 10.1109/RFID.2009.4911184
B. Fung, Khalil Al-Hussaeni, Ming Cao
{"title":"Preserving RFID data privacy","authors":"B. Fung, Khalil Al-Hussaeni, Ming Cao","doi":"10.1109/RFID.2009.4911184","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911184","url":null,"abstract":"Radio Frequency IDentification (RFID), a technology for automatic object identification, has wide applications in many areas including manufacturing, healthcare, and transportation. Yet, the uniquely identifiable objects pose a privacy threat to individuals carrying the objects. Most previous work on privacy-preserving RFID technology, such as EPC re-encryption and killing tags, focused on the threats caused by the physical RFID tags in the data collection phase, but these techniques cannot address the privacy threats in the data publishing phase, when a large volume of RFID data is released to a third party. In this paper, we study the privacy threats caused by publishing RFID data. Even if the explicit identifying information, such as name and social security number, has been removed from the published RFID data, an adversary may identify a target victim's record or infer her sensitive value by matching a priori known visited locations and timestamps. RFID data by default is high-dimensional, so applying traditional anonymity model to RFID data suffers from the curse of high dimensionality, and would result in poor data usefulness. We define a new privacy model, develop an anonymization algorithm to address the special challenges on RFID data, and evaluate its performance in terms of data quality and efficiency.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131384396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Analysis and design of wideband passive UHF RFID tags using a circuit model 宽带无源超高频RFID标签的电路模型分析与设计
2009 IEEE International Conference on RFID Pub Date : 2009-04-27 DOI: 10.1109/RFID.2009.4911211
D. Deavours
{"title":"Analysis and design of wideband passive UHF RFID tags using a circuit model","authors":"D. Deavours","doi":"10.1109/RFID.2009.4911211","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911211","url":null,"abstract":"The great majority of commercial UHF RFID tags are based on dipole antennas using a modification of a T-match as a matching circuit. The literature contains examples of wideband matching, but provides little insight as to how wideband behavior is achieved. Here, we present a simple circuit-based theory to describe the antenna, matching circuit, and IC behavior; we present an approach for developing an impeding matching strategy to maximize bandwidth; and we present a concrete example and analysis using a method of moments (MoM) numerical solver. The results show very good agreement with theory.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127194583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
SAW RFID spread spectrum OFC and TDM technology SAW RFID扩频OFC和时分复用技术
2009 IEEE International Conference on RFID Pub Date : 2009-04-27 DOI: 10.1109/RFID.2009.4911213
J. Pavlina, N. Kozlovski, B. Santos, D. Malocha
{"title":"SAW RFID spread spectrum OFC and TDM technology","authors":"J. Pavlina, N. Kozlovski, B. Santos, D. Malocha","doi":"10.1109/RFID.2009.4911213","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911213","url":null,"abstract":"SAW based RFID sensors can offer wireless, passive operation over harsh environments, and various device embodiments are used for retrieval of the sensed data. SAW has many unique advantages over possible competing technologies, including the following characteristics: passive, radiation hard, operable over wide temperature ranges, small, rugged, inexpensive, and identifiable. In a multi-sensory environment, it is necessary both to identify the sensor and to retrieve the sensed information. The OFC SAW technology approach has been funded by NASA for possible inclusion in ground, space flight, and space exploration sensor applications. The purpose of this paper is to present the concept of encoding SAW-based sensors for use in a multiple-sensor environment. The emphasis will be on orthogonal frequency coded (OFC) devices overlaid with a form of time division multiplexing (TDM). It will be shown that in addition to the benefits of OFC such as enhanced processing gain and lower interrogation power spectral density (PSD), the TDM allows for a decrease in overlapping energy and therefore a decrease in intersensory collisions which are shown to cause peak ambiguity. This approach should be applicable to many different SAW-based sensors (such as temperature, pressure, liquid, gas, etc.), as well as allow for proper IDing. Measured device results are presented and compared with coupling of modes (COM) model predictions to demonstrate performance. This paper will discuss the use of SAW OFC in a temperature sensor application. Devices are then used in computer-simulated transceiver design, and the results of a prototype sensor system are discussed.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"232 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115016554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Security considerations in the design and peering of RFID Discovery Services RFID发现服务设计与对等中的安全考虑
2009 IEEE International Conference on RFID Pub Date : 2009-04-27 DOI: 10.1109/RFID.2009.4911171
T. Burbridge, M. Harrison
{"title":"Security considerations in the design and peering of RFID Discovery Services","authors":"T. Burbridge, M. Harrison","doi":"10.1109/RFID.2009.4911171","DOIUrl":"https://doi.org/10.1109/RFID.2009.4911171","url":null,"abstract":"There is growing interest in Discovery Services for locating RFID and supply chain data between companies globally, to obtain product lifecycle information for individual objects. Discovery Services are heralded as a means to find serial-level data from previously unknown parties, however more realistically they provide a means to reduce the communications load on the information services, the network and the requesting client application. Attempts to design a standardised Discovery Service will not succeed unless security is considered in every aspect of the design. In this paper we clearly show that security cannot be bolted-on in the form of access control, although this is also required. The basic communication model of the Discovery Service critically affects who shares what data with whom, and what level of trust is required between the interacting parties.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"7 1-2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120893236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信