scholarly journals A Radio Frequency Identification Technology- Based Positioning and Interference Suppression System for Library Books

2016 ◽  
Vol 12 (11) ◽  
pp. 40
Author(s):  
Xiaoguang Zhang ◽  
Yijie Zhao ◽  
Wei Zhao

Large scale path loss modeling plays a fundamental role in designing both fixed and mobile radio systems. Wireless system are complex systems, so that prediction of the radio coverage is not done in an exact manner. Therefore before setting the system we need to choose a proper model of predicting path loss and interference. These proper methods depend upon the system environment, desired radio coverage and system frequency. In this paper of predicting path loss and interference analysis of UHF-RFID, we try to eliminate the problems associated of positioning and interference suppression system of library books to RFID systems. Simulation results show that the proposed method can thus improve overall system performance substantially.

Author(s):  
Varun Bhogal ◽  
Zornitza Genova Prodanoff ◽  
Sanjay P. Ahuja ◽  
Kenneth Martin

RFID (radio frequency identification) technology has gained popularity in a number of applications. Decreased cost of hardware components along with wide adoption of international RFID standards have led to the rise of this technology. One of the major factors associated with the implementation of RFID infrastructure is the cost of tags. RFID tags operating in the low frequency spectrum are widely used because they are the least expensive, but have a small implementation range. This paper presents an analysis of RFID performance across low frequency (LF), high frequency (HF), and ultra-high frequency (UHF) environments. The authors' evaluation is theoretical, using a passive-tag BFSA based simulation model that assumes 10 to 1,500 tags per reader and is created with OPNET Modeler 17. Ceteris paribus, the authors' results indicate that total census delay is lowest for UHF tags, while network throughput performance of LF tags is highest for large scale implementations of hundreds of tags in reader's range. A statistical analysis has been conducted on the findings for the three different sets.


2012 ◽  
Vol 2012 ◽  
pp. 1-8 ◽  
Author(s):  
Lingfei Mo ◽  
Chunfang Qin

For the ultrahigh frequency radio frequency identification (UHF RFID) metal tag, it always has the difficulties of compact designing, especially for the conjugate impedance matching, low antenna gain, and fabrication or environmental detuning. In this paper, a tunable compact UHF RFID metal tag is designed based on CPW open stub feed PIFA antenna. By changing the length of the open stub, the impedance of the PIFA antenna could be tuned in a large scale for conjugate impedance matching. The open stub makes it easy to tune the resonant frequency to alleviate the fabrication detuning or the environmental detuning, even after the manufacture. Moreover, the CPW structure of the open stub feed can resist the effects of the metallic surface and increase the antenna gain for the compact PIFA antenna. Modeling analysis and simulation are in good agreement with the measurement results. It showed that the UHF RFID metal tag could be designed compact with good performance based on the CPW open stub feed PIFA antenna.


Sensor Review ◽  
2017 ◽  
Vol 37 (3) ◽  
pp. 338-345 ◽  
Author(s):  
Yawei Xu ◽  
Lihong Dong ◽  
Haidou Wang ◽  
Jiannong Jing ◽  
Yongxiang Lu

Purpose Radio frequency identification tags for passive sensing have attracted wide attention in the area of Internet of Things (IoT). Among them, some tags can sense the property change of objects without an integrated sensor, which is a new trend of passive sensing based on tag. The purpose of this paper is to review recent research on passive self-sensing tags (PSSTs). Design/methodology/approach The PSSTs reported in the past decade are classified in terms of sensing mode, composition and the ways of power supply. This paper presents operation principles of PSSTs and analyzes the characteristics of them. Moreover, the paper focuses on summarizing the latest sensing parameters of PSSTs and their matching equipment. Finally, some potential applications and challenges faced by this emerging technique are discussed. Findings PSST is suitable for long-term and large-scale monitoring compared to conventional sensors because it gets rid of the limitation of battery and has relatively low cost. Also, the static information of objects stored in different PSSTs can be identified by a single reader without touch. Originality/value This paper provides a detailed and timely review of the rapidly growing research in PSST.


Sensors ◽  
2018 ◽  
Vol 18 (10) ◽  
pp. 3584 ◽  
Author(s):  
Rania Baashirah ◽  
Abdelshakour Abuzneid

Radio Frequency Identification (RFID) is one of the leading technologies in the Internet of Things (IoT) to create an efficient and reliable system to securely identify objects in many environments such as business, health, and manufacturing areas. Recent RFID authentication protocols have been proposed to satisfy the security features of RFID communication. In this article, we identify and review some of the most recent and enhanced authentication protocols that mainly focus on the authentication between a reader and a tag. However, the scope of this survey includes only passive tags protocols, due to the large scale of the RFID framework. We examined some of the recent RFID protocols in term of security requirements, computation, and attack resistance. We conclude that only five protocols resist all of the major attacks, while only one protocol satisfies all of the security requirements of the RFID system.


2008 ◽  
pp. 1975-1993
Author(s):  
Katina Michael ◽  
Amelia Masters

Spurred by the recent escalation of terrorist attacks and their increasingly devastating outcomes, defense intelligence in the context of homeland security has been drawn into the spotlight. The challenge, at both national and global levels, of managing information in order to offensively resist attack or defensively keep citizens safe from further harm has never been greater. In meeting this challenge, the tools and strategies used by relevant defensive powers are a key factor in the success or failure of all activities, ranging from small-scale, homeland security administration through to large-scale, all-inclusive war. In all areas within this wide scope, the adoption of positioning technologies has played an important role. Of special significance are the global positioning system (GPS), second-generation (2G) and beyond mobile telephone networks (includingwireless data networks), radio-frequency identification (RFID) and geographic information systems (GIS). Since most positioning technology has been developed or released for use within the commercial sector, however, concerns beyond technological feasibility are raised when applications are harnessed solely for defense. The integration between commercial and military sectors and public and private needs must be considered and, primarily, this involves ensuring that the enforcement of homeland security does not compromise citizen rights.


2020 ◽  
Vol 63 (8) ◽  
pp. 1271-1271
Author(s):  
Qianqian Su ◽  
Rui Zhang ◽  
Rui Xue

Abstract Modular exponentiation, as a fundamental operation used in many public-key cryptosystems, has always be considered to be very time-consuming. It is difficult for some devices with limited computation capability, such as mobile devices and low-cost radio frequency identification (RFID) tags, to perform large-scale modular exponentiations. In cryptosystems, one typical case of modular exponentiation is that the modulus is a composite number. For instance, in RSA algorithm, the modulus is the product of two distinct prime numbers. In this paper, we investigate how to securely and efficiently outsource composite modular exponentiations and put forward two secure outsourcing algorithms for composite modular exponentiations based on single untrusted cloud. The first algorithm, named MCExp, is designed for outsourcing single composite modular exponentiation, i.e. $u^a$ mod $N$. The second algorithm, named SMCExp, is designed for outsourcing simultaneous composite modular exponentiation, i.e. $\prod ^{n}_{i=1}u^{a_i}_{i}$ mod $N$. Different from algorithms based on two untrusted servers, the proposed algorithms are very practical because they avoid the strong assumption that there must exist two servers without collusion. The proposed algorithms not only protect the privacy of the exponent and the base simultaneously, but also enable users to verify the correctness of the result returned by the cloud with high probability. Compared with using the square-and-multiply algorithm, the user can achieve higher efficiency by using the proposed algorithms. Besides, we prove the security of our algorithms and conduct several experiments to demonstrate the efficiency of the proposed algorithms. Finally, we show that the proposed algorithms can be used to construct the secure outsourcing algorithms for Shamir’s identity-based signature and identity-based multi-signature.


Sensors ◽  
2019 ◽  
Vol 19 (24) ◽  
pp. 5460 ◽  
Author(s):  
Franck Kimetya Byondi ◽  
Youchung Chung

This paper presents a passive cavity type Ultra High Frequency (UHF) Radio Frequency Identification (RFID) tag antenna having the longest read-range, and compares it with existing long-range UHF RFID tag antenna. The study also demonstrates mathematically and experimentally that our proposed longest-range UHF RFID cavity type tag antenna has a longer read-range than existing passive tag antennas. Our tag antenna was designed with 140 × 60 × 10 mm3 size, and reached 26 m measured read-range and 36.3 m mathematically calculated read-range. This UHF tag antenna can be applied to metal and non-metal objects. By adding a further sensing capability, it can have a great benefit for the Internet of Things (IoT) and wireless sensor networks (WSN).


2020 ◽  
pp. 004051752094890
Author(s):  
Yong Zhang ◽  
Jiyong Hu ◽  
Xiong Yan ◽  
Xudong Yang

This paper describes the design of a novel ultrahigh frequency radio frequency identification (UHF RFID) tag thread that mainly consisted of the common yarn and the normal mode helix dipole antenna. The linear dipole antenna for the UHF RFID tag thread was too long to miniaturize the tag. In order to maximize the read performance and miniaturize the size of the tag, the basic antenna structure parameters, such as the helical pitch and single arm length, were optimized by analyzing the radiation parameter S11 of the normal mode helix dipole antenna based on simulation experiments. The simulation experiments started with optimizing the single arm length to obtain the minimum of the S11 parameter at resonant frequency, then the helical pitch was further optimized to limit the resonant frequency to the UHF range. The simulation results showed the resonant frequency rises with an increase of helical pitch and declines with an increase of single arm length. Furthermore, a series of UHF RFID tag threads with good performance from the simulation cases were prepared, and the performance of the optimized tag was validated. Generally, the UHF RFID tag thread with optimized helix dipole antenna could reduce the axial length of the tag by 57% and improve the reading range by 500%, and its performance was greatly superior to that of the UHF RFID tag thread with the classical linear dipole antenna.


2013 ◽  
Vol 9 (1) ◽  
pp. 4 ◽  
Author(s):  
Luca Catarinucci ◽  
Luigi Patrono

The adoption of solutions based on Radio Frequency IDentification technology in a wide range of contexts is a matter of fact. In many situations, such as the tracking of small-size living animals, the straightforward use of commercial systems does not ensure adequate performance. Consequently, both the RFID hardware and the software control platform should be tailored for the particular application. In this work, the specific requirements of Near Field Ultra High Frequency RFID reader antennas suitable for small-size animal localization and tracking are identified and a control system in a LabVIEW environment is designed. Afterwards, both hardware and software solutions have been implemented and validated. In particular, an algorithm based on the measured Received Signal Strength Indication, in order to obtain precise localization data, was developed and validated. Finally, the set-up of a first working prototype involving built-in-lab reader antennas has been completed and tested. The achieved results prove the effectiveness of the proposed tracking system.


2017 ◽  
Vol 2017 ◽  
pp. 1-9 ◽  
Author(s):  
Ju-min Zhao ◽  
Ding Feng ◽  
Deng-ao Li ◽  
Wei Gong ◽  
Hao-xiang Liu ◽  
...  

Radio Frequency Identification (RFID) is an emerging technology for electronic labeling of objects for the purpose of automatically identifying, categorizing, locating, and tracking the objects. But in their current form RFID systems are susceptible to cloning attacks that seriously threaten RFID applications but are hard to prevent. Existing protocols aimed at detecting whether there are cloning attacks in single-reader RFID systems. In this paper, we investigate the cloning attacks identification in the multireader scenario and first propose a time-efficient protocol, called the time-efficient Cloning Attacks Identification Protocol (CAIP) to identify all cloned tags in multireaders RFID systems. We evaluate the performance of CAIP through extensive simulations. The results show that CAIP can identify all the cloned tags in large-scale RFID systems fairly fast with required accuracy.


Sign in / Sign up

Export Citation Format

Share Document