scholarly journals Experimental Results and Performance Analysis of a 1 × 2 × 1 UHF MIMO Passive RFID System

Sensors ◽  
2021 ◽  
Vol 21 (18) ◽  
pp. 6308
Author(s):  
Helio Augusto Muzamane ◽  
Hsin-Chin Liu

Ultra-high frequency (UHF) multiple input multiple output (MIMO) passive radio frequency identification (RFID) systems have attracted the attention of many researchers in the last few years. The system modeling and theoretical performance analysis of these systems have been well investigated and revealed in many studies, yet the system prototype and the corresponding experimental results are scarce. In this study, measurements of a 1 × 2 × 1 UHF passive RFID system, including a MIMO UHF passive RFID tag prototype and its corresponding software-defined radio-based reader, taken in a microwave anechoic chamber, are presented. The experimental results are compared with theoretical values and computer simulations. The overall results demonstrate the consistency and the feasibility of UHF MIMO passive RFID systems.

Author(s):  
Yubao Hou ◽  
Hua Liang ◽  
Juan liu

In the traditional RFID (Radio Frequency IDentification) system, a secure wired channel communication is used between the reader and the server. The newly produced mobile RFID system is different from the traditional RFID system, the communication between the reader and the server is based on a wireless channel, and the authentication protocol is suitable for traditional RFID systems, but it cannot be used in mobile RFID systems. To solve this problem, a mutual authentication protocol MSB (Most Significant Bit) for super lightweight mobile radio frequency identification system is proposed based on bit replacement operation. MSB is a bitwise operation to encrypt information and reduce the computational load of communication entities. Label, readers, and servers authenticate first and then communicate, MSB may be used to resistant to common attacks. The security analysis of the protocol shows that the protocol has high security properties, the performance analysis of the protocol shows that the protocol has the characteristics of low computational complexity, the formal analysis of the protocol based on GNY logic Gong et al. (1990) provides a rigorous reasoning proof process for the protocol.


2013 ◽  
pp. 1667-1681 ◽  
Author(s):  
Morshed U. Chowdhury ◽  
Biplob R. Ray

Remote technologies are changing our way of life. The radio frequency identification (RFID) system is a new technology which uses the open air to transmit information. This information transmission needs to be protected to provide user safety and privacy. Business will look for a system that has fraud resilience to prevent the misuse of information to take dishonest advantage. The business and the user need to be assured that the transmitted information has no content which is capable of undertaking malicious activities. Public awareness of RFID security will help users and organizations to understand the need for security protection. Publishing a security guideline from the regulating body and monitoring implementation of that guideline in RFID systems will ensure that businesses and users are protected. This chapter explains the importance of security in a RFID system and will outline the protective measures. It also points out the research direction of RFID systems.


Author(s):  
Morshed U. Chowdhury ◽  
Biplob R. Ray

Remote technologies are changing our way of life. The radio frequency identification (RFID) system is a new technology which uses the open air to transmit information. This information transmission needs to be protected to provide user safety and privacy. Business will look for a system that has fraud resilience to prevent the misuse of information to take dishonest advantage. The business and the user need to be assured that the transmitted information has no content which is capable of undertaking malicious activities. Public awareness of RFID security will help users and organizations to understand the need for security protection. Publishing a security guideline from the regulating body and monitoring implementation of that guideline in RFID systems will ensure that businesses and users are protected. This chapter explains the importance of security in a RFID system and will outline the protective measures. It also points out the research direction of RFID systems.


2017 ◽  
Vol 2017 ◽  
pp. 1-10 ◽  
Author(s):  
Hugo Landaluce ◽  
Laura Arjona ◽  
Asier Perallos ◽  
Lars Bengtsson ◽  
Nikola Cmiljanic

One of the main existing problems in Radio Frequency Identification (RFID) technology is the tag collision problem. When several tags try to respond to the reader under the coverage of the same reader antenna their messages collide, degrading bandwidth and increasing the number of transmitted bits. An anticollision protocol, based on the classical Binary Tree (BT) protocol, with the ability to decrease the number of bits transmitted by the reader and the tags, is proposed here. Simulations results show that the proposed protocol increases the throughput with respect to other recent state-of-the-art protocols while keeping a low energy consumption of a passive RFID system.


2020 ◽  
Vol 8 (5) ◽  
pp. 1230-1235

Radio Frequency Identification (RFID) is a contact less technology that has multiple application in the modern era. RFID is used in passport identification at airport to match and identify the multi user .A Multiple Input Multiple Output (MIMO) is used in RFID to identify the multi user simultaneously. The information is transmitted from multiple transmitter and receiver of RFID system simultaneously so there is a change of interference also if the RFID system is used in different environmental or in different height then there is chance of path loss during the signal transmission from the transmitter to receiver .Successive interference technology and optimal value of frequency with distance is maintained to minimize path loss.


2019 ◽  
Vol 142 (4) ◽  
Author(s):  
Dengji Zhou ◽  
Tingting Wei ◽  
Shixi Ma ◽  
Huisheng Zhang ◽  
Di Huang ◽  
...  

Abstract Digital power plant is the theory and method to improve the operating quality of power plant by quantifying, analyzing, controlling, and deciding the physical and working objects of power plants in the whole life cycle. And the foundation of digital power plant is system modeling and performance analysis. However, there are some problems in the process of modeling establishment and performance analysis. For instance, each component has different dimensions and different types of mathematical description, and the data or information used for modeling are defined differently and belong to different enterprises, who do not want to share their information. Meta-modeling is a potential method to solve these problems. It defines the specification to describe different kinds of elements and the relationship between different elements. In this paper, the collaborative modeling and simulation platform for digital power plant has been established based on the meta-modeling method and the performance of the target power plant has been analyzed from different aspects via field data. The meta-modeling method consists of three parts: syntax definition, model development, and algorithm definition. In the comparative study between the meta-model and the traditional model, maximum average errors of the two methods are 8.72% and 4.74%, which reveals the high accuracy of the meta-modeling-based model. The result shows that the modeling and simulation platform for power plants can be used to reduce costs, decrease equipment failure rate, and improve plant output, so as to guarantee the safety and increase economics.


Author(s):  
Dennis M.L. Wong ◽  
Raphael C.W. Phan

In this chapter, we discuss the business implications, as well as security and privacy issues, of the widespread deployment of radio frequency identification (RFID) systems. We first describe, in more detail, the components that make up an RFID system to facilitate better understanding of the implications of each, and then review the commercial applications of the RFID. We then discuss the security and privacy issues for RFID systems and what mechanisms have been proposed to safeguard these. The topics discussed in this chapter highlight the benefits of using RFIDs for user convenience in ubiquitous and pervasive commercial services and e-businesses, while maintaining the integrity of such systems against malicious attacks on the users’ security and privacy. This is vital for a business establishment to coexist with peers and remain competitively attractive to customers.


Sign in / Sign up

Export Citation Format

Share Document