120 research outputs found

    Energy efficient anti-collision algorithm for the RFID networks

    Get PDF
    Energy efficiency is crucial for radio frequency identification (RFID) systems as the readers are often battery operated. The main source of the energy wastage is the collision which happens when tags access the communication medium at the same time. Thus, an efficient anti-collision protocol could minimize the energy wastage and prolong the lifetime of the RFID systems. In this regard, EPCGlobal-Class1-Generation2 (EPC-C1G2) protocol is currently being used in the commercial RFID readers to provide fast tag identification through efficient collision arbitration using the Q algorithm. However, this protocol requires a lot of control message overheads for its operation. Thus, a reinforcement learning based anti-collision protocol (RL-DFSA) is proposed to provide better time system efficiency while being energy efficient through the minimization of control message overheads. The proposed RL-DFSA was evaluated through extensive simulations and compared with the variants of EPC-Class 1 Generation 2 algorithms that are currently being used in the commercial readers. The results show conclusively that the proposed RL-DFSA performs identically to the very efficient EPC-C1G2 protocol in terms of time system efficiency but readily outperforms the compared protocol in the number of control message overhead required for the operation

    The Challenges and Issues Facing the Deployment of RFID Technology

    Get PDF
    Griffith Sciences, School of Information and Communication TechnologyFull Tex

    Mobile Tag Reading in a Multi-reader Rfid Environment

    Get PDF
    Radio Frequency Identification (RFID) refers to an emerging technology that intends, but not limited to replace barcode technology. RFID system assures to provide an effective inventorying, tracking and monitoring of any sorts of products in any field of applications. Recently, the large scale deployment of RFID system in supply chain management has necessities the use of multiple readers. Unfortunately, multi-reader RFID system suffers from reader collision problems that severely affect the system performance. Hence, this thesis aims to propose a novel framework for multi-reader RFID system based on Framed Slotted ALOHA protocol. The proposed framework is specific to a scenario in supply chain where a tag affixed to an item is in motion that moves on a conveyor belt and multiple readers which are fixed around the conveyor belt are supposed to read all the items. This work also determines the best pattern for the distribution of the tags on the conveyor belt.Computer Science Departmen

    Survey on Lightweight Primitives and Protocols for RFID in Wireless Sensor Networks

    Get PDF
    The use of radio frequency identification (RFID) technologies is becoming widespread in all kind of wireless network-based applications. As expected, applications based on sensor networks, ad-hoc or mobile ad hoc networks (MANETs) can be highly benefited from the adoption of RFID solutions. There is a strong need to employ lightweight cryptographic primitives for many security applications because of the tight cost and constrained resource requirement of sensor based networks. This paper mainly focuses on the security analysis of lightweight protocols and algorithms proposed for the security of RFID systems. A large number of research solutions have been proposed to implement lightweight cryptographic primitives and protocols in sensor and RFID integration based resource constraint networks. In this work, an overview of the currently discussed lightweight primitives and their attributes has been done. These primitives and protocols have been compared based on gate equivalents (GEs), power, technology, strengths, weaknesses and attacks. Further, an integration of primitives and protocols is compared with the possibilities of their applications in practical scenarios

    Global traceability

    Get PDF
    The use of Ultra High Frequency (UHF) Radio Frequency Identification (RFID) in supply chain management (SCM) systems was a big source for optimism. However, the expected rapid industry adoption of RFID did not take place. This research explores some of the existing challenges and obstacles to RFID adoption, such as the lack of consistent UHF spectrum regulations for RFID or the absence of standards that promote integration with Automatic Identification and Data Capture (AIDC) media. As a conclusion, in this project we suggest some solutions to these challenges in the use of multi-frequency RFID tags that can be read at more that one frequency or novel migration strategies and standards that would help expand the industry.Outgoin

    Anti-collision techniques for RFID systems.

    Get PDF
    Chiang Kong Wa.Thesis (M.Phil.)--Chinese University of Hong Kong, 2006.Includes bibliographical references (leaves 74-79).Abstracts in English and Chinese.Chapter 1 --- Introduction --- p.1Chapter 2 --- Technology Overview --- p.4Chapter 2.1 --- Components of RFID Systems --- p.5Chapter 2.1.1 --- Tag --- p.6Chapter 2.1.2 --- Reader --- p.9Chapter 2.1.3 --- Software systems --- p.10Chapter 2.1.4 --- Communication infrastructure --- p.11Chapter 2.2 --- Frequency Regulations and Standards --- p.11Chapter 2.2.1 --- RFID frequency bands --- p.11Chapter 2.2.2 --- Standards --- p.12Chapter 2.3 --- Advantages and Limitations of RFID Technology --- p.14Chapter 2.4 --- Applications --- p.17Chapter 3 --- Background of Research --- p.20Chapter 3.1 --- Anti-collision methods for RFID systems --- p.22Chapter 3.1.1 --- Stochastic Anti-collision Protocols --- p.25Chapter 3.1.2 --- Deterministic Anti-collision Protocols --- p.27Chapter 4 --- Even-Odd Binary Tree Protocol --- p.30Chapter 4.1 --- Protocol Description --- p.31Chapter 4.2 --- Time Complexity Analysis --- p.34Chapter 4.3 --- Performance Evaluation --- p.37Chapter 4.4 --- Summary --- p.41Chapter 5 --- Prefix-Randomized Query-Tree Protocol --- p.44Chapter 5.1 --- Tag Identification - Known Tag Set Size --- p.45Chapter 5.1.1 --- Protocol Description --- p.45Chapter 5.1.2 --- Time Complexity Analysis --- p.47Chapter 5.1.3 --- Optimal Initial Prefix Length --- p.50Chapter 5.1.4 --- Optimal Number of Level-1 Nodes --- p.52Chapter 5.2 --- Tag Identification - Unknown Tag Set Size --- p.53Chapter 5.2.1 --- Initial Prefix Length Adaptation Algorithm --- p.54Chapter 5.2.2 --- Computing r*Δ(l) --- p.55Chapter 5.2.3 --- Optimal Choice of Step Size Δ --- p.56Chapter 5.3 --- Performance Evaluation --- p.59Chapter 5.4 --- Summary --- p.64Chapter 6 --- Conclusion and Future Work --- p.68Chapter 6.1 --- Conclusion --- p.68Chapter 6.2 --- Future Work --- p.70Bibliography --- p.7

    Clone tag detection in distributed RFID systems

    Get PDF
    Although Radio Frequency Identification (RFID) is poised to displace barcodes, security vulnerabilities pose serious challenges for global adoption of the RFID technology. Specifically, RFID tags are prone to basic cloning and counterfeiting security attacks. A successful cloning of the RFID tags in many commercial applications can lead to many serious problems such as financial losses, brand damage, safety and health of the public. With many industries such as pharmaceutical and businesses deploying RFID technology with a variety of products, it is important to tackle RFID tag cloning problem and improve the resistance of the RFID systems. To this end, we propose an approach for detecting cloned RFID tags in RFID systems with high detection accuracy and minimal overhead thus overcoming practical challenges in existing approaches. The proposed approach is based on consistency of dual hash collisions and modified count-min sketch vector. We evaluated the proposed approach through extensive experiments and compared it with existing baseline approaches in terms of execution time and detection accuracy under varying RFID tag cloning ratio. The results of the experiments show that the proposed approach outperforms the baseline approaches in cloned RFID tag detection accuracy
    corecore