An Energy-Saving Anti-Collision Algorithm for the Active RFID Systems by Decreasing the Overhearing Slots

2014 ◽  
Vol 1049-1050 ◽  
pp. 1722-1725
Author(s):  
Chu Liu ◽  
Jian Cheng Li ◽  
Li Ming Zheng ◽  
Qing Yang

Anti-collision algorithms for active RFID system which are based on the ALOHA always have a serious overhearing problem because of the random selection in the system. Although the active tag can avoid the overhearing problem to some extent by applying the tree-based deterministic anti-collision algorithm, the system will using more time on account of more reader queries. We propose a novel algorithm which based on the superiorities in the recalled protocols. Simulation results show that the algorithm effectively reduce excessive inventory listening and system delay.

2013 ◽  
Vol 325-326 ◽  
pp. 1774-1777
Author(s):  
Yi Jun Cui ◽  
Cheng Hua Wang ◽  
Chun Lin Chen

Active RFID systems are widely used in modern industries. Typical application of the active RFID system is the identification and the position tracking of warehouse and freight container. Traditional design methods of active RFID system need special RFID readers to read and write the active RFID tags. This paper presents a novel active RFID system that can be easily read by smart phones. This new active RFID system was based on Bluetooth Low Energy. In the system, any device equipped with Bluetooth 4.0 such as iPhone 4S or the android based smart phones can be used as the reader. It was easy to use and costs effective. In the paper, we describe the detailed design of the novel active RFID system and the performance evaluation of the system.


Author(s):  
Yubao Hou ◽  
Hua Liang ◽  
Juan liu

In the traditional RFID (Radio Frequency IDentification) system, a secure wired channel communication is used between the reader and the server. The newly produced mobile RFID system is different from the traditional RFID system, the communication between the reader and the server is based on a wireless channel, and the authentication protocol is suitable for traditional RFID systems, but it cannot be used in mobile RFID systems. To solve this problem, a mutual authentication protocol MSB (Most Significant Bit) for super lightweight mobile radio frequency identification system is proposed based on bit replacement operation. MSB is a bitwise operation to encrypt information and reduce the computational load of communication entities. Label, readers, and servers authenticate first and then communicate, MSB may be used to resistant to common attacks. The security analysis of the protocol shows that the protocol has high security properties, the performance analysis of the protocol shows that the protocol has the characteristics of low computational complexity, the formal analysis of the protocol based on GNY logic Gong et al. (1990) provides a rigorous reasoning proof process for the protocol.


Author(s):  
Yan Cai ◽  
Liang Ran ◽  
Jun Zhang ◽  
Hongbo Zhu

AbstractEdge offloading, including offloading to edge base stations (BS) via cellular links and to idle mobile users (MUs) via device-to-device (D2D) links, has played a vital role in achieving ultra-low latency characteristics in 5G wireless networks. This paper studies an offloading method of parallel communication and computation to minimize the delay in multi-user systems. Three different scenarios are explored, i.e., full offloading, partial offloading, and D2D-enabled partial offloading. In the full offloading scenario, we find a serving order for the MUs. Then, we jointly optimize the serving order and task segment in the partial offloading scenario. For the D2D-enabled partial offloading scenario, we decompose the problem into two subproblems and then find the sub-optimal solution based on the results of the two subproblems. Finally, the simulation results demonstrate that the offloading method of parallel communication and computing can significantly reduce the system delay, and the D2D-enabled partial offloading can further reduce the latency.


2017 ◽  
Vol 97 (3) ◽  
pp. 3811-3829 ◽  
Author(s):  
Noor Baha Aldin ◽  
Ergun Erçelebi ◽  
Mahmut Aykaç

2013 ◽  
pp. 1667-1681 ◽  
Author(s):  
Morshed U. Chowdhury ◽  
Biplob R. Ray

Remote technologies are changing our way of life. The radio frequency identification (RFID) system is a new technology which uses the open air to transmit information. This information transmission needs to be protected to provide user safety and privacy. Business will look for a system that has fraud resilience to prevent the misuse of information to take dishonest advantage. The business and the user need to be assured that the transmitted information has no content which is capable of undertaking malicious activities. Public awareness of RFID security will help users and organizations to understand the need for security protection. Publishing a security guideline from the regulating body and monitoring implementation of that guideline in RFID systems will ensure that businesses and users are protected. This chapter explains the importance of security in a RFID system and will outline the protective measures. It also points out the research direction of RFID systems.


Author(s):  
Geoffrey Ramadan

An RFID system is an enabling technology encompassing both hardware and software. This chapter presents a software interface that integrates both middleware and enterprise software to automate the RFID system. The developed software is called Edgeware. The chapter presents an industrial perspective of complete implementation of an RFID system to automate the whole process of a big and complex business. In this chapter the definition, evaluation, value proposition, and implementation procedure of Edgeware are presented.


Author(s):  
Morshed U. Chowdhury ◽  
Biplob R. Ray

Remote technologies are changing our way of life. The radio frequency identification (RFID) system is a new technology which uses the open air to transmit information. This information transmission needs to be protected to provide user safety and privacy. Business will look for a system that has fraud resilience to prevent the misuse of information to take dishonest advantage. The business and the user need to be assured that the transmitted information has no content which is capable of undertaking malicious activities. Public awareness of RFID security will help users and organizations to understand the need for security protection. Publishing a security guideline from the regulating body and monitoring implementation of that guideline in RFID systems will ensure that businesses and users are protected. This chapter explains the importance of security in a RFID system and will outline the protective measures. It also points out the research direction of RFID systems.


Sign in / Sign up

Export Citation Format

Share Document