scholarly journals Design and Implementation of RFID Controller using Verilog HDL

Author(s):  
J. Balakrishna

Manual monitoring consumes more time, man power and shows inaccurate results. So, automation is the solution to cover the problems stated. Barcode and RFID are two different forms of automated technology that are used for reading and collecting data. The RFID (Radio Frequency Identification) technology is a well-known wireless application for traceability, logistics and access control. The RFID controller is constructed in to demonstrate access control through the use of low-frequency RFID tags. These tags contain identification number which is read by the reader, sent to a database where it is compared with stored values. It works on the principle that If the tag’s identification number is in the system database, it gives access. If the data is not in the system database, it doesn’t give access. To implement these various blocks, include RFID transmitter, RFID receiver, Baud clock generator, Database are designed. The RFID Controller is designed using Verilog HDL in Xilinx ISE tool.

2015 ◽  
Vol 8 (1) ◽  
pp. 293-296
Author(s):  
Wei-Ning Ni ◽  
Ji-Bo Li ◽  
Shan-Guo Li ◽  
Wei Zhang

Downhole data transmission methods based on mud-pulse and low-frequency electromagnetic waves can’t satisfy the need of large amount and high speed data uploading during drilling. In this paper, a novel data transmission technique based on releasing RFID tags by LWD tools is designed and validated. As the memory and transmission media, RFID tags are pre-mounted tactfully in cavities of the downhole releasing tool which can transmits/write LWD data to these tags. By releasing regularly or irregularly into the annulus fluids, RFID tags can be carried to the surface by mud circulation. To finish data transportation function, LWD data can be read out on the surface. Wireless charging high capacity (1Mbits) RFID tags are designed, which contains microprocessor and memory, to expand the storage capacity of RFID tags. The power supply for microprocessor and memory in the tag is electromagnetic waves from RF Reader/Writer module. The equivalent data transmission speed of this system can be up to 278 bit/s (1 tag/h is assumed), which is more much faster than the traditional mud pulser (<10 bit/s).


Author(s):  
Varun Bhogal ◽  
Zornitza Genova Prodanoff ◽  
Sanjay P. Ahuja ◽  
Kenneth Martin

RFID (radio frequency identification) technology has gained popularity in a number of applications. Decreased cost of hardware components along with wide adoption of international RFID standards have led to the rise of this technology. One of the major factors associated with the implementation of RFID infrastructure is the cost of tags. RFID tags operating in the low frequency spectrum are widely used because they are the least expensive, but have a small implementation range. This paper presents an analysis of RFID performance across low frequency (LF), high frequency (HF), and ultra-high frequency (UHF) environments. The authors' evaluation is theoretical, using a passive-tag BFSA based simulation model that assumes 10 to 1,500 tags per reader and is created with OPNET Modeler 17. Ceteris paribus, the authors' results indicate that total census delay is lowest for UHF tags, while network throughput performance of LF tags is highest for large scale implementations of hundreds of tags in reader's range. A statistical analysis has been conducted on the findings for the three different sets.


Author(s):  
Jordan Frith

The phrase the Internet of things was originally coined in a 1999 presentation about attaching radio frequency identification (RFID) tags to individual objects. These tags would make the objects machine-readable, uniquely identifiable, and, most importantly, wirelessly communicative with infrastructure. This chapter evaluates RFID as a piece of mobile communicative infrastructure, and it examines two emerging forms: near-field communication (NFC) and Bluetooth low-energy beacons. The chapter shows how NFC and Bluetooth low-energy beacons may soon move some types of RFID to smartphones, in this way evolving the use of RFID in payment and transportation and enabling new practices of post-purchasing behaviors.


2021 ◽  
Vol 13 (7) ◽  
pp. 3684
Author(s):  
Bibiana Bukova ◽  
Jiri Tengler ◽  
Eva Brumercikova

The paper focuses on the environmental burden created by Radio Frequency Identification (RFID) tags in the Slovak Republic (SR). In order to determine the burden there, a model example was created to calculate electronic waste produced by households in the SR by placing RFID tags into municipal waste. The paper presents a legislative regulatory approach towards the environmental impacts from using RFID tags in the SR, as well as an analysis of the environmental burden of using RFID tags throughout the world. The core of the paper is focused on the research conducted in order to calculate the environmental burden of a model household in the SR, where the number of used RFID tags per year was observed; then, the volume of e-waste produced by households of the Slovak Republic per year was determined. In the conclusion, we provide the results of the research presented and discuss including our own proposal for solving the problems connected with the environmental burden of RFID technology.


2010 ◽  
Vol 88 (7) ◽  
pp. 2514-2522 ◽  
Author(s):  
S. E. Ryan ◽  
D. A. Blasi ◽  
C. O. Anglin ◽  
A. M. Bryant ◽  
B. A. Rickard ◽  
...  

2013 ◽  
Vol 9 (1) ◽  
pp. 44 ◽  
Author(s):  
Raghav V. Sampangi ◽  
Srinivas Sampalli

Radio Frequency Identification (RFID) is a technology that is very popular due to the simplicity in its technology and high adaptability in a variety of areas. The simplicity in the technology, however, comes with a caveat – RFID tags have severe resource restrictions, which make them vulnerable to a range of security attacks. Such vulnerability often results in the loss of privacy of the tag owner and other attacks on tags. Previous research in RFID security has mainly focused on authenticating entities such as readers / servers, which communicate with the tag. Any security mechanism is only as strong as the encryption keys used. Since RFID communication is wireless, critical messages such as key exchange messages are vulnerable to attacks. Therefore, we present a mutual authentication protocol that relies on independent generation and dynamic updates of encryption keys thereby removing the need for key exchange, which is based on the concept of gene mutation and transfer. We also present an enhanced version of this protocol, which improves the security offered by the first protocol. The novelty of the proposed protocols is in the independent generation, dynamic and continuous updates of encryption keys and the use of the concept of gene mutation / transfer to offer mutual authentication of the communicating entities. The proposed protocols are validated by simulation studies and security analysis.


Author(s):  
M. Zaki Zakaria ◽  
Sofianita Mutalib ◽  
Shuzlina Abdul Rahman ◽  
Shamsul J Elias ◽  
A Zambri Shahuddin

Radio Frequency Identification (RFID) is a one of the fastest growing and most beneficial technologies being adopted by businesses today. One of the important issues is localization of items in a warehouse or business premise and to keep track of the said items, it requires devices which are costly to deploy. This is because many readers need to be placed in a search space. In detecting an object, a reader will only report the signal strength of the tag detected. Once the signal strength report is obtained, the system will compute the coordinates of the RFID tags based on each data grouping. In this paper, algorithms using genetic algorithm, particle swarm, ant colony optimization are proposed to achieve the shortest path for an RFID mobile reader, while covering full search area. In comparison, for path optimization, the mobile reader traverses from one node to the next, moving around encountered obstacles in its path.  The tag reading process is iterative, in which the reader arrives at its start point at the end of each round. Based on the shortest path, an algorithm that computes the location of items in the search area is used. The simulation results show that the ACO method works more effectively and efficiently compare to others when solving shortest path problems.


Sign in / Sign up

Export Citation Format

Share Document