{"title":"Improved physical layer collision recovery receivers for RFID readers","authors":"J. Kaitovic, M. Rupp","doi":"10.1109/RFID.2014.6810719","DOIUrl":"https://doi.org/10.1109/RFID.2014.6810719","url":null,"abstract":"Radio Frequency Identification (RFID) systems usually operate in a multiple RFID tag environment. If multiple tags respond simultaneously, a collision occurs and the information is discarded. In this paper, we propose a novel physical layer collision recovery mechanism. We analyse theoretical limits of the inventory time and show how our new method can approach such theoretical maxima. We propose a method that resolves more colliding tags by making collisions less destructive. In this method a postprocessing of the received signal by beamforming is performed. Furthermore, we investigate the influence of the proposed method on the system performance by means of simulations. We show that our method considerably shortens the time necessary to interrogate tags.","PeriodicalId":438738,"journal":{"name":"2014 IEEE International Conference on RFID (IEEE RFID)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114498320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Measel, Christopher S. Lester, Yifei Xu, Richard Primerano, M. Kam
{"title":"Detection performance of spread spectrum signatures for passive, chipless RFID","authors":"R. Measel, Christopher S. Lester, Yifei Xu, Richard Primerano, M. Kam","doi":"10.1109/RFID.2014.6810712","DOIUrl":"https://doi.org/10.1109/RFID.2014.6810712","url":null,"abstract":"Time-Domain Reflectometry (TDR) RFID tags are passive, chipless tags that use discontinuities along a transmission line to create reflections. The discontinuities may be designed to produce a bipodal signal encoded with the unique identifier of the tag. When multiple tags are co-located and interrogated simultaneously, multiple access interference degrades the ability of the reader to detect the tags accurately. Reader detection can be improved by using spread spectrum signatures as the unique identifiers to limit interference. This work evaluates the ability of Gold codes and Kasami-Large codes to improve detection performance of a passive, chipless TDR RFID system. Simulations were conducted for varying numbers of simultaneously interrogated tags using synthetic tag responses constructed from the measured waveform of a prototype TDR tag. Results indicate that the Gold Code signature set outperforms the Kasami-Large Code signature set and a random, naïve set for simultaneous interrogation of less than 15 tags. For larger numbers of simultaneous tags, a random set performs nearly as well as the Kasami-Large Code set and provides more useful signatures.","PeriodicalId":438738,"journal":{"name":"2014 IEEE International Conference on RFID (IEEE RFID)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132152709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WINDWare: Supporting ubiquitous computing with passive sensor enabled RFID","authors":"Asanga Wickramasinghe, D. Ranasinghe, A. Sample","doi":"10.1109/RFID.2014.6810709","DOIUrl":"https://doi.org/10.1109/RFID.2014.6810709","url":null,"abstract":"Recent emergence of passive sensor enabled RFID tags (sensor tags) is creating new possibilities for low cost and maintenance free paradigm for industrial and ubiquitous monitoring applications (such as structural health, elder care, cold chain management). Despite the clear advantages, the widespread adoption of sensor tag technology requires the development of middleware to support the management of data streams with integrated sensor and ID (identification) data. In this paper we propose a generic middleware architecture adhering to the standardized EPCglobal architecture for managing integrated ID and sensor data streams from sensor tags. Furthermore, we demonstrate its successful implementation, WINDWare, through laboratory experiments and an application demonstration.","PeriodicalId":438738,"journal":{"name":"2014 IEEE International Conference on RFID (IEEE RFID)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116139185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Joshua F. Ensworth, Stewart J. Thomas, Seunghwan Shin, M. Reynolds
{"title":"Waveform-aware ambient RF energy harvesting","authors":"Joshua F. Ensworth, Stewart J. Thomas, Seunghwan Shin, M. Reynolds","doi":"10.1109/RFID.2014.6810714","DOIUrl":"https://doi.org/10.1109/RFID.2014.6810714","url":null,"abstract":"In this paper we suggest a new class of RF energy harvesters, which we call “waveform aware harvesters”. In contrast to traditional rectenna designs, which are usually designed for high efficiency with continuous wave (CW) signals, waveform aware harvesters are RF to DC converters which are optimized for their performance with non-CW signals. We suggest that waveform aware harvesters may have significant advantages in ambient energy harvesting, where the available RF energy is in the form of communication waveforms of a variety of types. We present an initial proof-of-concept demonstration of a waveform aware harvester optimized for harvesting energy from 2.4 GHz Wi-Fi (802.11b/g) signals with a realistic traffic model. Under realistic traffic conditions, 802.11b/g client transmissions are bursty, with a high peak-to-average ratio and a low duty cycle. We demonstrate optimized recovery of harvested energy from single 802.11b/g transmission bursts on the order of 1 ms in duration. We present an expression for maximizing usable energy stored in an energy reservoir given a signal model and parameters of the energy-harvester circuit. In contrast to other work where assumptions of CW sources lead to the desirability of a large storage capacitor, our approach considers the existing communication signal model and optimizes capacitor size to maximize the stored usable energy for a short transmission burst.","PeriodicalId":438738,"journal":{"name":"2014 IEEE International Conference on RFID (IEEE RFID)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123099298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A highly accurate and scalable approach for addressing location uncertainty in asset tracking applications","authors":"Rengamathi Sankarkumar, D. Ranasinghe, T. Sathyan","doi":"10.1109/RFID.2014.6810710","DOIUrl":"https://doi.org/10.1109/RFID.2014.6810710","url":null,"abstract":"Tracking systems that use RFID are increasingly being used for monitoring the movement of goods in supply chains. While these systems are effective, they still have to overcome significant challenges, such as missing reads, to improve their performance further. In this paper, we describe an optimised tracking algorithm to predict the locations of objects in the presence of missed reads using particle filters. To achieve high location accuracy we develop a model that characterises the motion of objects in a supply chain. The model is also adaptable to the changing nature of a business such as flow of goods, path taken by goods through the supply chain, and sales volumes. A scalable tracking algorithm is achieved by an object compression technique, which also leads to a significant improvement in accuracy. The results of a detailed simulation study shows that our object compression technique yields high location accuracy (above 98% at 0.95 read rate) with significant reductions in execution time and memory usage.","PeriodicalId":438738,"journal":{"name":"2014 IEEE International Conference on RFID (IEEE RFID)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131135744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. P. Cortes, J. P. M. Brito, Rafael Cantalice, Everton Ghignatti, A. Olmos, F. Chávez, M. Lubaszewski
{"title":"A low-power RF/analog front-end architecture for LF passive RFID tags with dynamic power sensing","authors":"F. P. Cortes, J. P. M. Brito, Rafael Cantalice, Everton Ghignatti, A. Olmos, F. Chávez, M. Lubaszewski","doi":"10.1109/RFID.2014.6810713","DOIUrl":"https://doi.org/10.1109/RFID.2014.6810713","url":null,"abstract":"This paper presents a low power, low voltage RF/analog front-end architecture for LF RFID tags with a dynamic power sensing scheme. The front-end converts the incoming RF power into DC using a system that adjusts its performance according to the available RF power. The power sensing scheme, composed by a feedback system that “regulates” the RF clamp stage, improves the incoming available power to the system. All building blocks together with the RF air link and antenna interface were modeled using digital and electrical signals with high abstraction level, validating the architecture. Part of the proposed AFE architecture was silicon proven in a preliminary CMOS 0.18μm process test chip. This preliminary part includes the regulation stages and part of the RF section. It shows excellent results for a maximum of 3μA DC current consumption, over a wide range of input RF power.","PeriodicalId":438738,"journal":{"name":"2014 IEEE International Conference on RFID (IEEE RFID)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114613156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the power of active relay attacks using custom-made proxies","authors":"Thomas Korak, M. Hutter","doi":"10.1109/RFID.2014.6810722","DOIUrl":"https://doi.org/10.1109/RFID.2014.6810722","url":null,"abstract":"A huge number of security-relevant systems nowadays use contactless smart cards. Such systems, like payment systems or access control systems, commonly use single-pass or mutual authentication protocols to proof the origin of the card holder. The application of relay attacks allows to circumvent this authentication process without needing to attack the implementation or protocol itself. Instead, the entire wireless communication is simply forwarded using a proxy and a mole allowing to relay messages over a large distance. In this paper, we present several relay attacks on an ISO/IEC 14443-based smart card implementing an AES challenge-response protocol. We highlight the strengths and weaknesses of two different proxy types: an NFC smart phone and a dedicated custom-made proxy device. First, we propose a “three-phones-in-the-middle” attack that allows to relay the communication over more than 360 feet (110 meters). Second, we present a custom-made proxy that solves major relay-attack restrictions that apply on almost all NFC smart phones, for example, cloning of the victim's UID, adaption of low-level protocol parameters, direct request for Waiting Time Extensions, or active modifications of the messages. Finally, we propose an attack that allows to induce single bit faults during the anticollision of the card which forces the reader to re-send or temporarily stall the communication which can be exploited by attacks to gain additional relay time.","PeriodicalId":438738,"journal":{"name":"2014 IEEE International Conference on RFID (IEEE RFID)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127016108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fusing RFID and computer vision for probabilistic tag localization","authors":"M. Goller, Christoph Feichtenhofer, A. Pinz","doi":"10.1109/RFID.2014.6810717","DOIUrl":"https://doi.org/10.1109/RFID.2014.6810717","url":null,"abstract":"The combination of RFID and computer vision systems is an effective approach to mitigate the limited tag localization capabilities of current RFID deployments. In this paper, we present a hybrid RFID and computer vision system for localization and tracking of RFID tags. The proposed system combines the information from the two complementary sensor modalities in a probabilistic manner and provides a high degree of flexibility. In addition, we introduce a robust data association method which is crucial for the application in practical scenarios. To demonstrate the performance of the proposed system, we conduct a series of experiments in an article surveillance setup. This is a frequent application for RFID systems in retail where previous approaches solely based on RFID localization have difficulties due to false alarms triggered by stationary tags. Our evaluation shows that the fusion of RFID and computer vision provides robustness to false positive observations and allows for a reliable system operation.","PeriodicalId":438738,"journal":{"name":"2014 IEEE International Conference on RFID (IEEE RFID)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130323371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Igarashi, Yuki Sato, Yuusuke Kawakita, J. Mitsugi, H. Ichikawa
{"title":"A feasibility study on simultaneous data collection from multiple sensor RF tags with multiple subcarriers","authors":"Y. Igarashi, Yuki Sato, Yuusuke Kawakita, J. Mitsugi, H. Ichikawa","doi":"10.1109/RFID.2014.6810724","DOIUrl":"https://doi.org/10.1109/RFID.2014.6810724","url":null,"abstract":"Wireless and battery-less health monitoring of machinery and structures have been a dream in mechanical engi-neering. Particularly, simultaneous data collection from multiple sensors is required to detect failure or malfunction before it becomes fatal problem. In this paper, a concept of simultaneous data collection from multiple sensor RF tags with multiple subcarriers is proposed and its feasibility is examined. To facilitate the inclusion of sensor data in RF tag and to obtain the number of available communication channels, an analog modulation of digitally generated subcarriers is employed. The unavoidable mutual interference among subcarriers, stemming from the pulse shape of subcarrier in RF tags, is eliminated by a swift interference rejection method. We examined the feasibility and the performance of the concept with a two-subcarrier prototype in which the interference rejection is executed in a software defined radio platform. It is shown that the proposed concept is feasible. In order to evaluate the effect of the interference rejection method, we examined the correlation between the original sensor data and the recovered sensor data in a worst case interference environment. It is shown that the correlation coefficient is significantly improved from 0.00 to 0.91.","PeriodicalId":438738,"journal":{"name":"2014 IEEE International Conference on RFID (IEEE RFID)","volume":"347 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116536857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Localization of passive UHF RFID tags based on inverse synthetic apertures","authors":"M. Scherhaufl, M. Pichler, A. Stelzer","doi":"10.1109/RFID.2014.6810716","DOIUrl":"https://doi.org/10.1109/RFID.2014.6810716","url":null,"abstract":"This paper introduces a 2D localization system for passive UHF RFID tags based on phase evaluation of the backscattered transponder signals. To increase the accuracy and robustness of the position estimates an inverse synthetic aperture radar approach is performed. A MIMO system where paths take turns to act as transmitter with the remaining paths serving as receivers, is used to enable the position estimation. For proof of concept, a local position measurement system demonstrator comprising an RFID reader, passive EPC Gen 2 RFID tags, several transceivers, baseband hardware, and signal processing was built. Measurements were carried out in an indoor office environment, which was surrounded by drywalls and concrete floor and ceiling, and the experimental results show a robust and accurate localization with a root-mean-square deviation below 0.1 and a median error of 0.01m.","PeriodicalId":438738,"journal":{"name":"2014 IEEE International Conference on RFID (IEEE RFID)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115071418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}