Design and Implementation of an Active RFID System Based on Bluetooth Low Energy

2013 ◽  
Vol 325-326 ◽  
pp. 1774-1777
Author(s):  
Yi Jun Cui ◽  
Cheng Hua Wang ◽  
Chun Lin Chen

Active RFID systems are widely used in modern industries. Typical application of the active RFID system is the identification and the position tracking of warehouse and freight container. Traditional design methods of active RFID system need special RFID readers to read and write the active RFID tags. This paper presents a novel active RFID system that can be easily read by smart phones. This new active RFID system was based on Bluetooth Low Energy. In the system, any device equipped with Bluetooth 4.0 such as iPhone 4S or the android based smart phones can be used as the reader. It was easy to use and costs effective. In the paper, we describe the detailed design of the novel active RFID system and the performance evaluation of the system.

Author(s):  
Jordan Frith

The phrase the Internet of things was originally coined in a 1999 presentation about attaching radio frequency identification (RFID) tags to individual objects. These tags would make the objects machine-readable, uniquely identifiable, and, most importantly, wirelessly communicative with infrastructure. This chapter evaluates RFID as a piece of mobile communicative infrastructure, and it examines two emerging forms: near-field communication (NFC) and Bluetooth low-energy beacons. The chapter shows how NFC and Bluetooth low-energy beacons may soon move some types of RFID to smartphones, in this way evolving the use of RFID in payment and transportation and enabling new practices of post-purchasing behaviors.


Sensors ◽  
2020 ◽  
Vol 20 (21) ◽  
pp. 6371
Author(s):  
Maciej Nikodem ◽  
Mariusz Slabicki ◽  
Marek Bawiec

The use of Bluetooth Low Energy (BLE) in the Internet-of-Things (IoT) applications has become widespread and popular. This has resulted in the increased number of deployed BLE devices. To ensure energy efficiency, applications use connectionless communication where nodes broadcast information using advertisement messages. As the BLE devices compete for access to spectrum, collisions are inevitable and methods that improve device coexistence are required. This paper proposes a connectionless communication scheme for BLE that improves communication efficiency in IoT applications where a large number of BLE nodes operate in the same area and communicate simultaneously to a central server. The proposed scheme is based on an active scanning mode and is compared with a typical application where passive scanning mode is used. The evaluation is based on numerical simulations and real-life evaluation of a network containing 150 devices. The presented scheme significantly reduces the number of messages transmitted by each node and decreases packet loss ratio. It also improves the energy efficiency and preserves the battery of BLE nodes as they transmit fewer radio messages and effectively spent less time actively communicating. The proposed connectionless BLE communication scheme can be applied to a large variety of IoT applications improving their performance and coexistence with other devices operating in the 2.4 GHz band. Additionally, the implementation complexity and costs of the proposed communication scheme are negligible.


Author(s):  
Behzad Malek

In this chapter, the author briefly reviews the various attacks on existing identification and authentication schemes and describes the challenges in their design for RFID systems. The chapter categorizes the RFID identification and authentication schemes into two general categories: cryptographic and non-cryptographic solutions. Cryptographic solutions are based on symmetric or asymmetric cryptography systems. Depending on the resources available on the RFID tags, algorithms based on standard cryptography cannot be utilized in an RFID system and new cryptographic algorithms must be designed. However, there remain security challenges in protecting the RFID systems that cannot be solved solely by relying on cryptographic solutions. The chapter also reviews these challenges and looks at the countermeasures based on non-cryptographic solutions that would further protect RFID systems.


2014 ◽  
Vol 1049-1050 ◽  
pp. 1722-1725
Author(s):  
Chu Liu ◽  
Jian Cheng Li ◽  
Li Ming Zheng ◽  
Qing Yang

Anti-collision algorithms for active RFID system which are based on the ALOHA always have a serious overhearing problem because of the random selection in the system. Although the active tag can avoid the overhearing problem to some extent by applying the tree-based deterministic anti-collision algorithm, the system will using more time on account of more reader queries. We propose a novel algorithm which based on the superiorities in the recalled protocols. Simulation results show that the algorithm effectively reduce excessive inventory listening and system delay.


Author(s):  
Kassy M. Lum ◽  
Donnie Proffitt ◽  
Ann Whitney ◽  
Johné M. Parker

Radio Frequency Identification (RFID) is a disruptive technology that uses radio waves to uniquely identify objects. As such, it has the potential to bring significant benefits to numerous government and private sector initiatives. However, significant technical challenges remain. A key area of study is in system performance: while the major hardware components in an RFID system (i.e., tags, readers and middleware) have been and continue to be studied extensively, there has been little research, comparatively, in characterizing RFID system performance. The research presented in this paper was inspired, in part, by a laser printer RFID solution; i.e., one in which the printer simultaneously prints and programs ultra-high frequency (UHF) tags embedded in print media. In this paper, we have conducted a detailed experimental investigation of the primary factors influencing the performance of RFID systems similar to the print solution. This study aims to provide a systematic experimental process for investigating key factors — e.g., the air gap between reader antenna and tag, in-plane orientation of the tag with respect to the reader antenna, and power level output of the reader — which affect the programmability of UHF RFID tags. Results provide a baseline evaluation of the functionality of RFID systems of similar designs and provide a basis for a detailed exploration of the primary factors which affect RFID UHF passive tag dynamic programming capabilities. By understanding which factors significantly affect the readability and programming of RFID tags, this research suggests optimal designs for system functionality and provides data needed in order to advance such designs. Additionally, a key obstacle for RFID implementation is tag selection. Effectively matching tags to applications requires numerous economic and technical considerations; these considerations generate different implementation constraints. This paper lays the foundation for a multi-objective optimization algorithm to help determine optimal tag selection for a given application, based upon tag performance and cost.


Author(s):  
Eisuke Hanada

RFID have been used for decades. There are a variety of systems and several standards for RFID tags. RFID systems have long been utilized in industry, but their use in hospitals is not widespread. RFID tag systems with specific applications to hospital needs have the potential for great benefit, both clinically and economically. In the first part of this chapter, typical uses of RFID in hospitals are shown, after which practical RFID systems are introduced, including the use of newly developed active RFID tags. Finally, possible future medical uses of RFID tags and tag systems are discussed.


Author(s):  
Imad Belkacem ◽  
Safia Nait Bahloul ◽  
Oum-El-Kheir Aktouf

Dependability issues become more and more significant in RFID (Radio Frequency Identification) development and especially in critical domains. However, Operations of reading, detection of readers, and measurements of sensors in a RFID system are inevitably subjected to errors. These factors degrade the overall dependability of RFID systems. The authors study the Fault Tolerance in RFID systems as a means to ensure the dependability. The authors propose to perform a statistical analysis on the RFID tags data, using a confidence interval, at the level of the middleware enabling the detection of erroneous readers and sensors.


2013 ◽  
pp. 1682-1704 ◽  
Author(s):  
Behzad Malek ◽  
Ali Miri

In this chapter, the author briefly reviews the various attacks on existing identification and authentication schemes and describes the challenges in their design for RFID systems. The chapter categorizes the RFID identification and authentication schemes into two general categories: cryptographic and non-cryptographic solutions. Cryptographic solutions are based on symmetric or asymmetric cryptography systems. Depending on the resources available on the RFID tags, algorithms based on standard cryptography cannot be utilized in an RFID system and new cryptographic algorithms must be designed. However, there remain security challenges in protecting the RFID systems that cannot be solved solely by relying on cryptographic solutions. The chapter also reviews these challenges and looks at the countermeasures based on non-cryptographic solutions that would further protect RFID systems.


Sign in / Sign up

Export Citation Format

Share Document