The search functionality is under construction.

Keyword Search Result

[Keyword] RFID(118hit)

41-60hit(118hit)

  • An Adaptive Multi-Range-Sensing Method for 3D Localization of Passive RFID Tags

    Tomotaka WADA  Toshihiro HORI  Manato FUJIMOTO  Kouichi MUTSUURA  Hiromi OKADA  

     
    PAPER-Mobile Information Network and Personal Communications

      Vol:
    E95-A No:6
      Page(s):
    1074-1083

    The RFID tag system has received a lot of attention for ubiquitous computing. An RFID tag is attached to an object. With the unique ID of the RFID tag, a user identifies the object provided with the RFID tag and derives appropriate information about the object. One important application in the RFID technology is localizing RFID tags, which can be very useful in acquiring the position information concerning the RFID tags. It can be applied to navigation systems and positional detection systems for mobile robots. This paper proposes a new adaptive multi-range-sensing method for 3D localization of passive RFID tags by using a probabilistic approach. In this method, a mobile object (human, robot, etc.) with an RFID reader estimates the positions of RFID tags with multiple communication ranges dynamically. The effectiveness of the proposed method was demonstrated in experiments.

  • A Reliable Tag Anti-Collision Algorithm for Mobile Tags

    Xiaodong DENG  Mengtian RONG  Tao LIU  

     
    LETTER-Information Network

      Vol:
    E95-D No:5
      Page(s):
    1527-1530

    As RFID technology is being more widely adopted, it is fairly common to read mobile tags using RFID systems, such as packages on conveyer belt and unit loads on pallet jack or forklift truck. In RFID systems, multiple tags use a shared medium for communicating with a reader. It is quite possible that tags will exit the reading area without being read, which results in tag leaking. In this letter, a reliable tag anti-collision algorithm for mobile tags is proposed. It reliably estimates the expectation of the number of tags arriving during a time slot when new tags continually enter the reader's reading area and no tag leaves without being read. In addition, it gives priority to tags that arrived early among read cycles and applies the expectation of the number of tags arriving during a time slot to the determination of the number of slots in the initial inventory round of the next read cycle. Simulation results show that the reliability of the proposed algorithm is close to that of DFSA algorithm when the expectation of the number of tags entering the reading area during a time slot is a given, and is better than that of DFSA algorithm when the number of time slots in the initial inventory round of next read cycle is set to 1 assuming that the number of tags arriving during a time slot follows Poisson distribution.

  • Novel Dynamic Framed-Slotted ALOHA Using Litmus Slots in RFID Systems

    Soon-Bin YIM  Jongho PARK  Tae-Jin LEE  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E95-B No:4
      Page(s):
    1375-1383

    Dynamic Framed Slotted ALOHA (DFSA) is one of the most popular protocols to resolve tag collisions in RFID systems. In DFSA, it is widely known that the optimal performance is achieved when the frame size is equal to the number of tags. So, a reader dynamically adjusts the next frame size according to the current number of tags. Thus it is important to estimate the number of tags exactly. In this paper, we propose a novel tag estimation and identification method using litmus (test) slots for DFSA. We compare the performance of the proposed method with those of existing methods by analysis. We conduct simulations and show that our scheme improves the speed of tag identification.

  • Survey of RFID and Its Application to International Ocean/Air Container Tracking Open Access

    Minoru KATAYAMA  Hiroshi NAKADA  Hitoshi HAYASHI  Masashi SHIMIZU  

     
    INVITED SURVEY PAPER

      Vol:
    E95-B No:3
      Page(s):
    773-793

    “Internet of Things” (IoT) requires information to be collected from “anything”, “anytime”, and “anywhere”. In order to achieve this, wireless devices are required that have (1) automatic data acquisition capability, (2) small size, (3) long life, and (4) long range communication capability. One way to meet these requirements is to adopt active Radio Frequency Identification (RFID) systems. Active RFID is more advantageous than passive RFID and enables higher data reading performance over longer distances. This paper surveys active RFID systems, the services they currently promise to provide, technical problems common to these services, and the direction in which research should head in the future. It also reports the results of EPCglobal (EPC: Electronic Product Code) pilot tests conducted on global logistics for tracking ocean/air container transportation using active RFID systems for which we developed several new types of active RFID tags. The test results confirm that our active RFID tags have sufficient capability and low power consumption to well support ocean/air transportation and logistics service.

  • Heuristic Query Tree Protocol: Use of Known Tags for RFID Tag Anti-Collision

    Jongwoo SUNG  Daeyoung KIM  Taehong KIM  Jinhyuk CHOI  

     
    LETTER-Network

      Vol:
    E95-B No:2
      Page(s):
    603-606

    Existing query tree protocols deal with RFID tags in a blind manner. They query tags in a fixed bit order based on the assumption that the tag ID numbers are uniformly distributed throughout the range of the entire ID space because readers have no prior knowledge of the tags. This paper attempts to distinguish RFID applications where readers are already aware of all tags used by the application. We propose a heuristic query tree (H-QT) protocol that uses heuristic to select effective bits from known tags for the best queries in a divide and conquer approach. The performance evaluation shows that the proposed protocol is superior to original query tree protocols because it significantly reduces the number of tag collisions and no tag response.

  • Interim CRC: A Novel Method to Read Large-Size Data from Tags in RFID Systems

    Xiaodong DENG  Mengtian RONG  Tao LIU  

     
    PAPER-Network

      Vol:
    E95-B No:1
      Page(s):
    152-159

    Large capacity tags are becoming available to meet the demands of industry, but the UHF RFID protocol is unable to reliably and efficiently read large data sets from tags. First of all, large data sets are not well protected. The tag merely relies on 16-bit CRC for ensuring the validity of up to 4,096-bit user-specific data in EPCglobal C1G2 protocol. Furthermore, the reliability will be even worse if large capacity tags are implemented using semi-active technology which is likely to prevail among sensor-integrated RFID tags. Since semi-active tags greatly alleviate the performance limitation imposed by the turn-on power of the tag chip, backscattering signal of semi-active tags could be a serious challenge for most readers because it is much weaker than signals emitted by passive tags due to longer reading distance. In this paper, Interim CRC is presented to enhance transmission reliability and efficiency when the tag is backscattering a large data set. By taking advantage of Interim CRC, the large data set can be divided into several blocks, and 16-bit checksum is calculated over each block. The tag backscatters all blocks at the first time and only retransmits certain blocks if CRC error occurs in those blocks. The result of simulation shows that the reading error rate can be confined to a preset threshold and the accumulative total of transmitted data are greatly reduced if optimal block size and transmission times are complied with. The simulation also conclusively proves that semi-active tags derive even longer reading range from Interim CRC. In addition, Interim CRC is totally compliant with the EPCglobal C1G2 protocol. It fully makes use of CRC-16 encoder and does not involve any other data encoding schematics and hardware modifications.

  • Design and Optimization of a CDMA-Based Multi-Reader Passive UHF RFID System for Dense Scenarios

    Zhi ZHANG  Zhonghai LU  Qiang CHEN  Xiaolang YAN  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E95-B No:1
      Page(s):
    206-216

    In dense passive radio frequency identification (RFID) systems, code division multiple access (CDMA) techniques can be used to alleviate severe collisions and thus enhance the system performance. However, conventional CDMA techniques are challenging to implement, especially for passive tags due to cost and power constraints. In this paper, we design a CDMA-based multi-reader passive ultra high frequency (UHF) RFID system in which a reader detects only the strongest tag signal and a tag uses Gold codes only on the preamble and the data bits of RN16 without increasing its clock frequency. We present a new communication procedure based on dynamic framed slotted ALOHA (DFSA). In order to optimize the system, we theoretically analyze the system performance in terms of slot capacity and identification rate, and formally show how the code length and the number of readers affect the identification rate. Furthermore, we propose an effective method for tag estimation and frame size adjustment, and validate it via simulations. Through an example, we demonstrate how the analysis-based technique can be used to optimize the system configurations with respect to the number of readers and the number and length of Gold codes.

  • A Survey on Privacy Frameworks for RFID Authentication Open Access

    Chunhua SU  Yingjiu LI  Yunlei ZHAO  Robert H. DENG  Yiming ZHAO  Jianying ZHOU  

     
    INVITED PAPER

      Vol:
    E95-D No:1
      Page(s):
    2-11

    Due to rapid growth of RFID system applications, the security and privacy problems become more and more important to guarantee the validity of RFID systems. Without introducing proper privacy protection mechanisms, widespread deployment of RFID could raise privacy concerns to both companies and individuals. As a fundamental issue for the design and analysis of secure RFID systems, some formal RFID privacy frameworks were proposed in recent years to give the principles for evaluating the security and privacy in RFID system. However, readers can be confused with so many proposed frameworks. In this paper, we make a comparative and survey study on the proposed RFID privacy frameworks. We mainly divide the existing models into three categories, the four-oracle framework, eight-oracle framework and Universal Composability framework. We give a brief review on the existing models and describe their abilities to model the adversarial behavior in RFID systems. We then analyze relations among those existing RFID privacy models and make some comparisons among their properties.

  • Multi-Dimensional Channel Management Mechanism to Avoid Reader Collision in Dense RFID Networks

    Haoru SU  Sunshin AN  

     
    LETTER-Information Network

      Vol:
    E94-D No:11
      Page(s):
    2280-2283

    To solve the RFID reader collision problem, a Multi-dimensional Channel Management (MCM) mechanism is proposed. A reader selects an idle channel which has the maximum distance with the used channels. A backoff scheme is used before channel acquisition. The simulation results show MCM has better performance than other mechanisms.

  • 950 MHz, -60 dB TX-Cancellation Active Directional Couplers for UHF RFID Application

    Fumi MORITSUKA  Hidenori OKUNI  Toshiyuki UMEDA  

     
    PAPER-Active Devices and Circuits

      Vol:
    E94-C No:10
      Page(s):
    1539-1547

    We propose two types of active directional couplers to assure high TX cancellation: an asymmetric type and a symmetric type. For attaining low receiving through loss, coupling capacitors used in conventional couplers are replaced by amplifiers in the proposed active directional couplers. The asymmetric active directional coupler is composed of a small number of components and simple structure. The symmetric active directional coupler has wide-bandwidth TX cancellation. Measurement results show that receiving through loss of -5.3 dB and the TX cancellation of -67.6 dB are obtained in the asymmetric active directional coupler, and receiving through loss of -6.7 dB and the TX cancellation of -66.4 dB are obtained in the symmetric active directional coupler. Compared to the asymmetric active directional coupler, the symmetric active directional coupler has advantage of wider bandwidth of 1.25 MHz to reduce TX leakage of less than -55 dB. Both the proposed active directional couplers achieve high TX cancellation, and the symmetric active directional coupler can be applied in a UHF RFID system with 10-m communication range.

  • Performance Improvement of Tag Collection in Active RFID Systems Based on ISO/IEC 18000-7

    Won-Ju YOON  Sang-Hwa CHUNG  Dong-Chul SHIN  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E94-B No:7
      Page(s):
    2062-2073

    The tag collection algorithm in ISO/IEC 18000-7 has difficulty in collecting data from massive numbers of active RFID tags in a timely manner, so it should be improved to allow successful application in a wide variety of industrial fields. We propose two novel methods, a reduced-message method to improve the performance of data-tag collection and an efficient-sleep method to improve the performance of ID-tag collection. The reduced-message method decreases the slot size for a tag response by reducing the response size from the tag and reduces the number of commands issued from the reader. The efficient-sleep method utilizes redundant empty slots within the frame period to transmit sleep commands to the tags collected previously. We evaluated the performance improvement of tag collection by the proposed methods experimentally using an active RFID reader and 60 tags that we prepared for this study. The experimental results showed that the reduced-message method and the efficient-sleep method decreased the average tag collection time by 16.7% for data-tag collection and 9.3% for ID-tag collection compared with the standard tag collection. We also developed a simulation model for the active RFID system, reflecting the capture effect in wireless communication, and performed simulations to evaluate the proposed methods with a massive number of tags. The simulation results with up to 300 tags confirmed that the proposed methods could improve the tag collection performance, confirming the experimental results, even with larger numbers of tags.

  • Location Recognition in RFID Bookshelves

    Sozo INOUE  Yasunobu NOHARA  Masaki TAKEMORI  Kozo SAKURAGAWA  

     
    PAPER

      Vol:
    E94-D No:6
      Page(s):
    1147-1152

    We consider RFID bookshelves, which detect the location of books using RFID. An RFID bookshelf has the antennas of RFID readers in the boards, and detects the location of an RFID tag attached to a book. However, the accuracy is not good with the experience of the existing system, and sometimes reads the tag of the next or even further area. In this paper, we propose a method to improve the location detection using naive Bayes classifer, and show the experimental result. We obtained 78.6% of F-measure for total 12658 instances, and show the advantage against the straightforward approach of calculating the center of gravity of the read readers. More importantly, we show the performance is less dependent of a change of layouts and a difference of books by leave-1-layout/book-out cross validation. This is favorable for the feasibility in library operation.

  • Performance Analysis of RFID Tag Anti-Collision Protocols with Channel Error

    Jun-Bong EOM  Tae-Jin LEE  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E94-B No:6
      Page(s):
    1761-1764

    Channel errors may exist in Radio Frequency IDentification (RFID) systems due to low power backscattering of tags. These errors prevent the rapid identification of tags, and reducing this deterioration is an important issue. This paper presents performance analysis of various tag anti-collision algorithms and shows that the performances of RFID systems can be improved by applying a proposed robust algorithm in error-prone environments.

  • A 1-Mbps 1.6-µA Active-RFID CMOS LSI for the 300-MHz Frequency Band with an All-Digital RF Transmitting Scheme

    Kenji SUZUKI  Mamoru UGAJIN  Mitsuru HARADA  

     
    PAPER-Microwaves, Millimeter-Waves

      Vol:
    E94-C No:6
      Page(s):
    1084-1090

    A micro-power active-RFID LSI with an all-digital RF-transmitting scheme achieves experimental 10-m-distance communication with a 1-Mbps data rate in the 300-MHz frequency band. The IC consists of an RF transmitter and a power supply circuit. The RF transmitter generates wireless signals without a crystal. The power supply circuit controls the energy flow from the battery to the IC and offers intermittent operation of the RF transmitter. The IC draws 1.6 µA from a 3.4-V supply and is implemented in a 0.2-µm CMOS process in an area of 1 mm2. The estimated lifetime of the IC is over ten years with a coin-size battery.

  • Adaptive Array Antenna Using On-Off and CMA Algorithms for Microwave RFID Readers Open Access

    Tanawut TANTISOPHARAK  Akkarat BOONPOONGA  Chuwong PHONGCHAROENPANICH  Phaophak SIRISUK  Monai KRAIRIKSH  

     
    INVITED PAPER

      Vol:
    E94-B No:5
      Page(s):
    1153-1160

    This paper proposes an adaptive antenna using a combination of on-off and CMA algorithms. With the proposed technique, the on-off algorithm is first employed to search for a desired signal direction in which maximum received power is achieved. Then, interference is suppressed by performing CMA. Simulations are conducted according to the potential application of the proposed adaptive antenna. The simulation results show the SINR improvement implying that the proposed adaptive antenna can be applied to microwave RFID systems in order to resolve reader collision. Furthermore, the proposed adaptive antenna is implemented and then experimented. The experimental results verify that the proposed adaptive antenna can reduce interference resulting in the collision problem.

  • A Fault Analytic Method against HB+

    José CARRIJO  Rafael TONICELLI  Anderson C.A. NASCIMENTO  

     
    LETTER-Cryptography and Information Security

      Vol:
    E94-A No:2
      Page(s):
    855-859

    The search for lightweight authentication protocols suitable for low-cost RFID tags constitutes an active and challenging research area. In this context, a family of protocols based on the LPN problem has been proposed: the so-called HB-family. Despite the rich literature regarding the cryptanalysis of these protocols, there are no published results about the impact of fault analysis over them. The purpose of this paper is to fill this gap by presenting fault analytic methods against a prominent member of the HB-family: HB+ protocol. We demonstrate that the fault analysis model can lead to a flexible and effective attack against HB-like protocols, posing a serious threat over them.

  • An Efficient Authentication for Lightweight Devices by Perfecting Zero-Knowledgeness

    Bagus SANTOSO  Kazuo OHTA  Kazuo SAKIYAMA  Goichiro HANAOKA  

     
    PAPER-Identification

      Vol:
    E94-A No:1
      Page(s):
    92-103

    We present a new methodology for constructing an efficient identification scheme, and based on it, we propose a lightweight identification scheme whose computational and storage costs are sufficiently low even for cheap devices such as RFID tags. First, we point out that the efficiency of a scheme with statistical zero-knowledgeness can be significantly improved by enhancing its zero-knowledgeness to perfect zero-knowledge. Then, we apply this technique to the Girault-Poupard-Stern (GPS) scheme which has been standardized by ISO/IEC. The resulting scheme shows a perfect balance between communication cost, storage cost, and circuit size (computational cost), which are crucial factors for implementation on RFID tags. Compared to GPS, the communication and storage costs are reduced, while the computational cost is kept sufficiently low so that it is implementable on a circuit nearly as small as GPS. Under standard parameters, the prover's response is shortened 80 bits from 275 bits to 195 bits and in application using coupons, storage for one coupon is also reduced 80 bits, whereas the circuit size is estimated to be larger by only 335 gates. Hence, we believe that the new scheme is a perfect solution for fast authentication of RFID tags.

  • The Jiggle-Viterbi Algorithm for the RFID Reader Using Structured Data-Encoded Waveforms

    Yung-Yi WANG  Jiunn-Tsair CHEN  

     
    PAPER

      Vol:
    E93-A No:11
      Page(s):
    2108-2114

    Signals received at the interrogator of an RFID system always suffer from various kinds of channel deformation factors, such as the path loss of the wireless channel, insufficient channel bandwidth resulted from the multipath propagation, and the carrier frequency offset between tags and interrogators. In this paper we proposed a novel Viterbi-based algorithm for joint detection of data sequence and compensation of distorted signal waveform. With the assumption that the transmission clock is exactly synchronized at the reader, the proposed algorithm takes advantage of the structured data-encoded waveform to represent the modulation scheme of the RFID system as a trellis diagram and then the Viterbi algorithm is applicable to perform data sequence estimation. Furthermore, to compensate the distorted symbol waveform, the proposed Jiggle-Viterbi algorithm generates two substates, each corresponding to a variant structure waveform with adjustable temporal support, so that the symbol waveform deformation can be compensated and therefore yield a significant better performance in terms of bit error rate. Computer simulations shows that even in the presence of a moderate carrier frequency offset, the proposed approach can work out with an acceptable accuracy on data sequence detection.

  • Otedama: A Relocatable RFID Information Repository Architecture

    Shigeya SUZUKI  Rodney VAN METER  Osamu NAKAMURA  Jun MURAI  

     
    PAPER

      Vol:
    E93-D No:11
      Page(s):
    2922-2931

    We present a novel RFID middleware architecture, Otedama, which makes use of a unique property of RFID information to improve performance. RFID tags are bound to items. New information related to an RFID tag is generated at the site where the ID exists, and the entity most interested in the history and the item itself is in close proximity to the RFID tag. To exploit this property, we propose a scheme which bundles information related to a specific ID into one object and moves that bundle to a nearby server as the RFID tag moves from place to place. By using this scheme, information is always accessible by querying a system near the physical location of the tag, providing better query performance. Additionally, the volume of records that must be kept by a repository manager is reduced, because the relocation naturally migrates data away as physical objects move. We show the effectiveness of this architecture by analyzing data from a major retailer, finding that information retrieval performance will be six times better, and the cost of search is possibly several times cheaper.

  • A New Scheme to Avoid Null Zone for HF-Band RFID with Diversity Combining of Loop Antennas

    Hiroshi HIRAYAMA  Nobuyoshi KIKUMA  Kunio SAKAKIBARA  

     
    LETTER-Antennas

      Vol:
    E93-B No:10
      Page(s):
    2666-2669

    A new scheme to avoid null zone for HF-band RFID without expanding antenna size is proposed. At first, we demonstrate by FDTD simulation that the null zone occurs because of cancellation of magnetic fields over the loop surface. To prevent cancellation of magnetic fields, the loop antenna is split into four parts, which work as a planar array antenna. The outputs of antennas are gathered by using combining circuit. We have validated by FDTD simulation that the proposed scheme enlarges the worst received power by 13.1 dB.

41-60hit(118hit)