scholarly journals The Issue of Data Exchange in the UHF Band RFID System with an Semi-Passive Transponder

2016 ◽  
Vol 62 (2) ◽  
pp. 141-146
Author(s):  
Marek Gotfryd ◽  
Wojciech Lichoń ◽  
Bartosz Pawłowicz

Abstract The article discusses the specifics of data exchange in the UHF band RFID systems using semi-passive transponders. In addition to the antenna and the RFID chip, there is also an additional source of energy (eg. battery) in the structure of such transponder. The battery may be used to implement additional functions such as the ability to measure physical quantities (eg. temperature, humidity). In this regard, particular attention was paid to the discussion of phases of communication between transponder and RWD associated with additional data (measurement results). An analysis of transmitted data frames has been presented. The preliminary results of the measurements have shown that the number of memory block transmitted from transponder has an impact on the effectiveness of RFID system.

Author(s):  
Yubao Hou ◽  
Hua Liang ◽  
Juan liu

In the traditional RFID (Radio Frequency IDentification) system, a secure wired channel communication is used between the reader and the server. The newly produced mobile RFID system is different from the traditional RFID system, the communication between the reader and the server is based on a wireless channel, and the authentication protocol is suitable for traditional RFID systems, but it cannot be used in mobile RFID systems. To solve this problem, a mutual authentication protocol MSB (Most Significant Bit) for super lightweight mobile radio frequency identification system is proposed based on bit replacement operation. MSB is a bitwise operation to encrypt information and reduce the computational load of communication entities. Label, readers, and servers authenticate first and then communicate, MSB may be used to resistant to common attacks. The security analysis of the protocol shows that the protocol has high security properties, the performance analysis of the protocol shows that the protocol has the characteristics of low computational complexity, the formal analysis of the protocol based on GNY logic Gong et al. (1990) provides a rigorous reasoning proof process for the protocol.


2019 ◽  
Vol 26 (1) ◽  
pp. 95-106 ◽  
Author(s):  
Krzysztof Bronk ◽  
Patryk Koncicki ◽  
Adam Lipka ◽  
Dominik Rutkowski ◽  
Błażej Wereszko

Abstract In the paper, the measurement and simulation results of the VDES (VHF Data Exchange System) terrestrial component are discussed. It is anticipated that VDES will be one of the major solutions for maritime communications in the VHF band and its performance will be sufficient to fulfill the requirements of the e-navigation applications. The process of the VDES standardization (ITU R, IALA) has not been officially completed yet, but substantial amount of technical information about the future system’s terrestrial component (VDE-TER) is already available. The paper is divided into three general parts: (a) theoretical presentation of the system’s physical layer and the radio channels applicable to VDES, (b) simulation results (BER, BLER, channel delay between two propagation paths and its influence on bit rates) and (c) measurement results (useful ranges, BER). It turned out that in real maritime conditions, the VDES system can offer ranges between 25 and 38 km for the configurations assumed during the measurement campaign. Those results are generally compliant with the theoretical data in the line-of-sight conditions. In the NLOS scenarios, where fading becomes the dominant phenomenon, the discrepancies between the measurements and the theoretical results were more significant. The obtained results confirmed that VDES provides a large coding gain, which significantly improves the performance of data transmission and increases the bit rate compared to the existing maritime radiocommunication solutions. It should be noted that the results presented in the article were used by the IALA while developing the current version of the VDES specification.


2013 ◽  
pp. 1667-1681 ◽  
Author(s):  
Morshed U. Chowdhury ◽  
Biplob R. Ray

Remote technologies are changing our way of life. The radio frequency identification (RFID) system is a new technology which uses the open air to transmit information. This information transmission needs to be protected to provide user safety and privacy. Business will look for a system that has fraud resilience to prevent the misuse of information to take dishonest advantage. The business and the user need to be assured that the transmitted information has no content which is capable of undertaking malicious activities. Public awareness of RFID security will help users and organizations to understand the need for security protection. Publishing a security guideline from the regulating body and monitoring implementation of that guideline in RFID systems will ensure that businesses and users are protected. This chapter explains the importance of security in a RFID system and will outline the protective measures. It also points out the research direction of RFID systems.


Author(s):  
Geoffrey Ramadan

An RFID system is an enabling technology encompassing both hardware and software. This chapter presents a software interface that integrates both middleware and enterprise software to automate the RFID system. The developed software is called Edgeware. The chapter presents an industrial perspective of complete implementation of an RFID system to automate the whole process of a big and complex business. In this chapter the definition, evaluation, value proposition, and implementation procedure of Edgeware are presented.


Author(s):  
Morshed U. Chowdhury ◽  
Biplob R. Ray

Remote technologies are changing our way of life. The radio frequency identification (RFID) system is a new technology which uses the open air to transmit information. This information transmission needs to be protected to provide user safety and privacy. Business will look for a system that has fraud resilience to prevent the misuse of information to take dishonest advantage. The business and the user need to be assured that the transmitted information has no content which is capable of undertaking malicious activities. Public awareness of RFID security will help users and organizations to understand the need for security protection. Publishing a security guideline from the regulating body and monitoring implementation of that guideline in RFID systems will ensure that businesses and users are protected. This chapter explains the importance of security in a RFID system and will outline the protective measures. It also points out the research direction of RFID systems.


Electronics ◽  
2019 ◽  
Vol 8 (8) ◽  
pp. 879 ◽  
Author(s):  
Francesca Venneri ◽  
Sandra Costanzo ◽  
Antonio Borgia

A fractal absorber based on a metamaterial configuration is proposed for dual-frequency operation within the UHF band. The miniaturization skills of the proposed fractal shape are used to design a dual-band metamaterial absorber cell with reduced size (<λ/2 at the two operating frequencies) and a very thin substrate thickness (≅λ/100). A metamaterial absorber panel is realized and experimentally validated. Good agreements between full-wave simulations and measurement results are demonstrated.


Author(s):  
Kiyotaka Fujisaki

Using electromagnetic coupling, an RFID tag can get power supplier by a reader and communicate with it for data exchange. Because the RFID system enables non-contact communication, various services and applications including the management of a library catalogue are possible. However, the system is affected easily by neighboring environment and the resonant frequency, thus the communication performance is degraded. In this paper, is used 13.56MHz RFID system for the management of the library. We evaluate the influence that papers or other RFID tags give to the resonant frequency of an RFID tag.


2007 ◽  
Vol 49 (9) ◽  
pp. 2154-2157 ◽  
Author(s):  
Hanphil Rhyu ◽  
Frances J. Harackiewicz ◽  
Byungje Lee

2016 ◽  
Vol 62 (2) ◽  
pp. 115-120 ◽  
Author(s):  
Piotr Jankowski-Mihułowicz ◽  
Damian Kawalec ◽  
Mariusz Węglarski

Abstract The interrogation zone IZ is the most important parameter when RFID systems are considered. Its predictability is determined by the construction and parameters of antenna built in a read/write device. The IZ should be of sufficient size and appropriate to requirements established for an application of object automated identification. The method of shaping an antenna radiation pattern provides effective yet unconventional opportunities in this area. The idea and practical solution of the phased antenna array dedicated to UHF read/write devices are presented in the paper. On the basis of tests carried out, the authors pointed out the possibility of using developed devices for the synthesis of a determined IZ in anti-collision RFID system.


Sign in / Sign up

Export Citation Format

Share Document