scholarly journals Efficient DFSA Algorithm in RFID Systems for the Internet of Things

2015 ◽  
Vol 2015 ◽  
pp. 1-10 ◽  
Author(s):  
Hsing-Wen Wang

Radio Frequency IDentification (RFID) used in business applications and international business management fields can create and sustain the competitive advantage, which is also one of the wireless telecommunication techniques for recognizing objects to realize Internet of Things (IoT) technologies. In construction of IoT network, the RFID technologies play the role of the front-end data collection via tag identification, as the basis of IoT. Hence, the adoption of RFID technologies is spurring innovation and the development of the IoT. However, in RFID system, one of the most important challenges is the collision resolution between the tags when these tags transmit their data to the reader simultaneously. Hence, in this paper I develop an efficient scheme to estimate the number of unidentified tags for Dynamic Framed Slotted Aloha (DFSA) based RFID system, with the view of increasing system performance. In addition to theoretical analysis, simulations are conducted to evaluate the performance of proposed scheme. The simulation results reveal the proposed scheme works very well in providing a substantial performance improvement in RFID system. The proposed algorithm promotes business effectiveness and efficiency while applying the RFID technologies to IoT.

2021 ◽  
pp. 1-10
Author(s):  
Jintao Tang ◽  
Lvqing Yang ◽  
Jiangsheng Zhao ◽  
Yishu Qiu ◽  
Yihui Deng

With the development of the Internet of Things and Radio Frequency Identification (RFID), indoor positioning technology as an important part of positioning technology, has been attracting much attention in recent years. In order to solve the problems of low precision, high cost and signal collision between readers, a new indoor positioning algorithm based on a single RFID reader combined with a Double-order Gated Recurrent Unit (GRU) are proposed in this paper. Firstly, the reader is moved along the specified direction to collect the sequential tag data. Then, the tag’s coordinate is taken as the target value to train models and compare them with existing algorithms. Finally, the best Gated Recurrent Unit positioning model is used to estimate the position of the tags. Experiment results show that the proposed algorithm can effectively improve positioning accuracy, reduce the number of readers, cut down the cost and eliminate the collisions of reader signals.


2021 ◽  
Author(s):  
Mohamad Oubai Al-Rejleh

The Internet of Things (IoT) is a revolutionary concept that emerged in the late 21st century, whereby everyday objects such as household items, cars, and wearables, equipped with sensors and (Radio Frequency Identification) RFID chips, can communicate with the internet and to their physical surroundings. These chips allow the connected items to share information, and allow the user to collect information about his/her “quantified self”, measuring personal data such as habits of usage, lifestyle, and location through internet networks. IoT enabled devices are designed to collect, store, share, and analyze of highly personal data ubiquitously and in real time. However, with this new affordance of connectivity, comes a potential loss of privacy for users, as ever increasing sets of personal data are collected and tracked. As such, there is a pressing need for privacy considerations to be embedded within the early stages of design of connected devices and networks.


2022 ◽  
pp. 168-180
Author(s):  
Sasikumar Gurumoorthy ◽  
L. Venkateswara Reddy ◽  
Sudhakaran Periakaruppan

Art colonnades and museums all over the world are the first option for individuals to visit for the enhancement of the cultural life of people. To ensure their safety, museums have established numerous cultural security measures. Traditional strategies do not obstruct their pace entirely. They only use a computer in the museum to check individuals at the entrance and exit. Therefore, the authors proposed a gallery anti-stealing device created on the internet-of-things (IoT) technology that ensures security through passive readers/writers of RFID. Radio frequency identification (RFID) remains a system that practices isolated data storing and recovery and offers object tracking with a unique identity code. The system then sends sound and light warning information, while the photographic camera structure is triggered to capture a picture at the same time. The recognition of the accuracy in the hardware component of the device can be additionally enhanced by the use of this technology to increase the safety of museum equipment.


Author(s):  
Maurice Dawson

Secure computing is essential as environments continue to become intertwined and hyperconnected. As the Internet of Things (IoT), Web of Things (WoT), and the Internet of Everything (IoE) dominate the landscape of technological platforms, protection these complicated networks is important. The everyday person who wishes to have more devices that allow the ability to be connected needs to be aware of what threats they could be potentially exposing themselves to. Additionally, for the unknowing consumer of everyday products needs to be aware of what it means to have sensors, Radio Frequency IDentification (RFID), Bluetooth, and WiFi enabled products. This submission explores how Availability, Integrity, and Confidentiality (AIC) can be applied to IoT, WoT, and IoE with consideration for the application of these architectures in the defense sector.


Sensors ◽  
2020 ◽  
Vol 20 (4) ◽  
pp. 987
Author(s):  
Luciano Tarricone ◽  
Jasmin Grosinger

Radio frequency identification (RFID) is one of the crucial enabling technologies for the Internet of Things (IoT). This is leading to a continuous augmentation of RFID technologies, in terms of sensing capabilities, energetic autonomy, usability, and cost affordability, and this special issue proposes an overview on such a challenging scenario. The proposed results, in terms of cost reduction, miniaturization, and compatibility with complex systems and technologies, as well as the identification of the relevant criticalities, also pave the way to future steps being taken that go beyond the current IoT.


2018 ◽  
Vol 8 (8) ◽  
pp. 1282 ◽  
Author(s):  
Nikola Cmiljanic ◽  
Hugo Landaluce ◽  
Asier Perallos

Radio Frequency Identification (RFID) is a technology that uses radio frequency signals to identify objects. RFID is one of the key technologies used by the Internet of Things (IoT). This technology enables communication between the main devices used in RFID, the reader and the tags. The tags share a communication channel. Therefore, if several tags attempt to send information at the same time, the reader will be unable to distinguish these signals. This is called the tag collision problem. This results in an increased time necessary for system identification and energy consumption. To minimize tag collisions, RFID readers must use an anti-collision protocol. Different types of anti-collision protocols have been proposed in the literature in order to solve this problem. This paper provides an update including some of the most relevant anti-collision protocols.


2012 ◽  
Vol 263-266 ◽  
pp. 2834-2837
Author(s):  
Lei Sang ◽  
Duo Long

The Internet of things covers many aspects such as the electronic tag reader research, the Internet of things software research and the e-commerce research, etc. The SAVANT middleware is one of the key issues of the study. Based on electronic product code, radio frequency identification technology and system description middleware technology, this paper focuses on research and design of the Internet of things middleware system to solve the problem of data acquisition.


2013 ◽  
Vol 756-759 ◽  
pp. 4529-4532 ◽  
Author(s):  
Hao Zeng ◽  
Yan Hui Fu ◽  
Xu Chen

Traditional Radio Frequency Identification (RFID) Tag Equipment has some problems like these: it is difficult to realize if the tag is kept out, destroyed, or taken away abnormally. It cant accurately judge where the area the tag had moved to is. Besides, it is difficult to distinguish the right of the tag in the Tag Management. To solve these issues, this paper serves with a method which is based on the Internet of Things (IOT). It mainly includes as the following: the tag is activated in the Controlled Area, the judgment of the tag access the Controlled Area, whether the tag exists in the Controlled Area or not. These methods can reform the problems that the Traditional RFID Tag Equipment has.


Author(s):  
Kirti Kangra ◽  
Jaswinder Singh

The internet of things (IoT) model connects physical devices to the virtual world and enables them to interact. It enables smart devices to communicate with other devices to exchange information. To link a wireless network or cloud network, it takes the help of several technologies such as radio frequency identification (RFID), wireless sensor network (WSN), near field communication (NFC), ZigBee, and others. The IoT requires a standard architecture and protocol stack to establish links between the devices. This chapter provides a brief introduction, pillars, the evolution, architecture, application of IoT, and issues related to IoT implementation in real life.


2013 ◽  
Vol 416-417 ◽  
pp. 2055-2058
Author(s):  
Yuan Chen

We discuss the application of internet of things (IOT) in the management of urban infrastructure and study critical technology in IOT. As an important component and critical technology in IOT, radio frequency identification (RFID) system provides an effective method to detect, monitor or control the object and is composed of tag, reader and antenna. At last we design a compact microstrip antenna with low cost and small weight for a RFID system in IOT which can also be used in narrow-band wireless communication.


Sign in / Sign up

Export Citation Format

Share Document