scholarly journals Tunable Compact UHF RFID Metal Tag Based on CPW Open Stub Feed PIFA Antenna

2012 ◽  
Vol 2012 ◽  
pp. 1-8 ◽  
Author(s):  
Lingfei Mo ◽  
Chunfang Qin

For the ultrahigh frequency radio frequency identification (UHF RFID) metal tag, it always has the difficulties of compact designing, especially for the conjugate impedance matching, low antenna gain, and fabrication or environmental detuning. In this paper, a tunable compact UHF RFID metal tag is designed based on CPW open stub feed PIFA antenna. By changing the length of the open stub, the impedance of the PIFA antenna could be tuned in a large scale for conjugate impedance matching. The open stub makes it easy to tune the resonant frequency to alleviate the fabrication detuning or the environmental detuning, even after the manufacture. Moreover, the CPW structure of the open stub feed can resist the effects of the metallic surface and increase the antenna gain for the compact PIFA antenna. Modeling analysis and simulation are in good agreement with the measurement results. It showed that the UHF RFID metal tag could be designed compact with good performance based on the CPW open stub feed PIFA antenna.

The Radio Frequency Identification (RFID) technology has been increasingly used for various application such as tracking of products, smart cards, identification, item management, security etc. In this paper, the performance parameter of the passive UHF RFID tag antenna has been studied for four different substrate materials viz., FR4 epoxy, PET, Rogers 4350, Taconic TLY materials. A simple meandered dipole antenna has been designed using a T-match stub for impedance matching of the tag antenna with the attached RFID chip. These different substrates are then designed separately, for the same antenna geometry. The effect of using these substrates on RFID tag antenna parameters such as reflection coefficient, antenna gain, VWSR, radiation pattern, impedance, ease of optimization level, read range, and radiation efficiency are then observed.


2016 ◽  
Vol 12 (11) ◽  
pp. 40
Author(s):  
Xiaoguang Zhang ◽  
Yijie Zhao ◽  
Wei Zhao

Large scale path loss modeling plays a fundamental role in designing both fixed and mobile radio systems. Wireless system are complex systems, so that prediction of the radio coverage is not done in an exact manner. Therefore before setting the system we need to choose a proper model of predicting path loss and interference. These proper methods depend upon the system environment, desired radio coverage and system frequency. In this paper of predicting path loss and interference analysis of UHF-RFID, we try to eliminate the problems associated of positioning and interference suppression system of library books to RFID systems. Simulation results show that the proposed method can thus improve overall system performance substantially.


Author(s):  
Varun Bhogal ◽  
Zornitza Genova Prodanoff ◽  
Sanjay P. Ahuja ◽  
Kenneth Martin

RFID (radio frequency identification) technology has gained popularity in a number of applications. Decreased cost of hardware components along with wide adoption of international RFID standards have led to the rise of this technology. One of the major factors associated with the implementation of RFID infrastructure is the cost of tags. RFID tags operating in the low frequency spectrum are widely used because they are the least expensive, but have a small implementation range. This paper presents an analysis of RFID performance across low frequency (LF), high frequency (HF), and ultra-high frequency (UHF) environments. The authors' evaluation is theoretical, using a passive-tag BFSA based simulation model that assumes 10 to 1,500 tags per reader and is created with OPNET Modeler 17. Ceteris paribus, the authors' results indicate that total census delay is lowest for UHF tags, while network throughput performance of LF tags is highest for large scale implementations of hundreds of tags in reader's range. A statistical analysis has been conducted on the findings for the three different sets.


Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1093
Author(s):  
Piotr Jankowski-Mihułowicz ◽  
Mariusz Węglarski ◽  
Mateusz Chamera ◽  
Patryk Pyt

In order to respond the growing interest towards radio frequency identification textile transponders, the authors propose a new approach to design radio frequency identification (RFID) devices by introducing the RFIDtex concept. The coupling system of inductive loops is implemented in the textronic structure with the RFID interface in order to split the transponder into two independently manufactured components. Then both modules can be easily integrated into the RFIDtex tag. The presented simulation and measurement results prove the concept of manufacturing a relatively small antenna in the form of a meandered dipole sewn in with a single thread, and further, that can be connected to the RFID chip through the coupling system without galvanic junctions. The achieved parameters clearly indicate that the tag can correctly communicate with the read/write device as well as the coupling between its both parts works properly, and the impedance matching is possible in this case. The possibility of confectioning products with electronic identification tags at the textile factory site and improved resistance to the impact of environmental conditions are the main advantage of the proposed approach to the RFID devices designing. The RFIDtex transponder idea proposed by the authors was restricted in the patent no PL 231291 B1.


2017 ◽  
Vol 2017 ◽  
pp. 1-7 ◽  
Author(s):  
Sun-Woong Kim ◽  
Guen-Sik Kim ◽  
Dong-You Choi

We propose a wide bandwidth antenna with a circular polarization for universal Ultra High Frequency (UHF) radio-frequency identification (RFID) reader applications. To achieve a wide 3 dB axial ratio (AR) bandwidth, three T-shaped microstrip lines are inserted into the ground plane. The measured impedance bandwidth of the proposed antenna is 480 MHz and extends from 660 to 1080 MHz, and the 3 dB AR bandwidth is 350 MHz and extends from 800 to 1155 MHz. The radiation pattern is a bidirectional pattern with a maximum antenna gain of 3.67 dBi. The overall size of the proposed antenna is 114 × 114 × 0.8 mm3.


Sensor Review ◽  
2017 ◽  
Vol 37 (3) ◽  
pp. 338-345 ◽  
Author(s):  
Yawei Xu ◽  
Lihong Dong ◽  
Haidou Wang ◽  
Jiannong Jing ◽  
Yongxiang Lu

Purpose Radio frequency identification tags for passive sensing have attracted wide attention in the area of Internet of Things (IoT). Among them, some tags can sense the property change of objects without an integrated sensor, which is a new trend of passive sensing based on tag. The purpose of this paper is to review recent research on passive self-sensing tags (PSSTs). Design/methodology/approach The PSSTs reported in the past decade are classified in terms of sensing mode, composition and the ways of power supply. This paper presents operation principles of PSSTs and analyzes the characteristics of them. Moreover, the paper focuses on summarizing the latest sensing parameters of PSSTs and their matching equipment. Finally, some potential applications and challenges faced by this emerging technique are discussed. Findings PSST is suitable for long-term and large-scale monitoring compared to conventional sensors because it gets rid of the limitation of battery and has relatively low cost. Also, the static information of objects stored in different PSSTs can be identified by a single reader without touch. Originality/value This paper provides a detailed and timely review of the rapidly growing research in PSST.


Sensors ◽  
2018 ◽  
Vol 18 (10) ◽  
pp. 3584 ◽  
Author(s):  
Rania Baashirah ◽  
Abdelshakour Abuzneid

Radio Frequency Identification (RFID) is one of the leading technologies in the Internet of Things (IoT) to create an efficient and reliable system to securely identify objects in many environments such as business, health, and manufacturing areas. Recent RFID authentication protocols have been proposed to satisfy the security features of RFID communication. In this article, we identify and review some of the most recent and enhanced authentication protocols that mainly focus on the authentication between a reader and a tag. However, the scope of this survey includes only passive tags protocols, due to the large scale of the RFID framework. We examined some of the recent RFID protocols in term of security requirements, computation, and attack resistance. We conclude that only five protocols resist all of the major attacks, while only one protocol satisfies all of the security requirements of the RFID system.


2008 ◽  
pp. 1975-1993
Author(s):  
Katina Michael ◽  
Amelia Masters

Spurred by the recent escalation of terrorist attacks and their increasingly devastating outcomes, defense intelligence in the context of homeland security has been drawn into the spotlight. The challenge, at both national and global levels, of managing information in order to offensively resist attack or defensively keep citizens safe from further harm has never been greater. In meeting this challenge, the tools and strategies used by relevant defensive powers are a key factor in the success or failure of all activities, ranging from small-scale, homeland security administration through to large-scale, all-inclusive war. In all areas within this wide scope, the adoption of positioning technologies has played an important role. Of special significance are the global positioning system (GPS), second-generation (2G) and beyond mobile telephone networks (includingwireless data networks), radio-frequency identification (RFID) and geographic information systems (GIS). Since most positioning technology has been developed or released for use within the commercial sector, however, concerns beyond technological feasibility are raised when applications are harnessed solely for defense. The integration between commercial and military sectors and public and private needs must be considered and, primarily, this involves ensuring that the enforcement of homeland security does not compromise citizen rights.


2011 ◽  
Vol 324 ◽  
pp. 434-436
Author(s):  
R. Abi Saad ◽  
Zeina Melhem ◽  
Chadi Nader ◽  
Youssef Zaatar ◽  
Doumit Zaouk

in this paper, we propose a new multi-band patch antenna structure for embedded RFID (Radio Frequency Identification) readers and wireless communications. The proposed antenna is a dual band microstrip patch antenna using U-slot geometry. The operating frequencies of the proposed antenna are chosen as 2.4 and 0.9 (GHz), obtained by optimizing the physical dimensions of the U-slot. Several parameters have been investigated using Ansoft Designer software. The antenna is fed through a quarter wavelength transformer for impedance matching. An additional layer of alumina is added above the surface of the conductors to increase the performance of the antenna.


2020 ◽  
Vol 63 (8) ◽  
pp. 1271-1271
Author(s):  
Qianqian Su ◽  
Rui Zhang ◽  
Rui Xue

Abstract Modular exponentiation, as a fundamental operation used in many public-key cryptosystems, has always be considered to be very time-consuming. It is difficult for some devices with limited computation capability, such as mobile devices and low-cost radio frequency identification (RFID) tags, to perform large-scale modular exponentiations. In cryptosystems, one typical case of modular exponentiation is that the modulus is a composite number. For instance, in RSA algorithm, the modulus is the product of two distinct prime numbers. In this paper, we investigate how to securely and efficiently outsource composite modular exponentiations and put forward two secure outsourcing algorithms for composite modular exponentiations based on single untrusted cloud. The first algorithm, named MCExp, is designed for outsourcing single composite modular exponentiation, i.e. $u^a$ mod $N$. The second algorithm, named SMCExp, is designed for outsourcing simultaneous composite modular exponentiation, i.e. $\prod ^{n}_{i=1}u^{a_i}_{i}$ mod $N$. Different from algorithms based on two untrusted servers, the proposed algorithms are very practical because they avoid the strong assumption that there must exist two servers without collusion. The proposed algorithms not only protect the privacy of the exponent and the base simultaneously, but also enable users to verify the correctness of the result returned by the cloud with high probability. Compared with using the square-and-multiply algorithm, the user can achieve higher efficiency by using the proposed algorithms. Besides, we prove the security of our algorithms and conduct several experiments to demonstrate the efficiency of the proposed algorithms. Finally, we show that the proposed algorithms can be used to construct the secure outsourcing algorithms for Shamir’s identity-based signature and identity-based multi-signature.


Sign in / Sign up

Export Citation Format

Share Document