2,746 research outputs found

    RFID Localisation For Internet Of Things Smart Homes: A Survey

    Full text link
    The Internet of Things (IoT) enables numerous business opportunities in fields as diverse as e-health, smart cities, smart homes, among many others. The IoT incorporates multiple long-range, short-range, and personal area wireless networks and technologies into the designs of IoT applications. Localisation in indoor positioning systems plays an important role in the IoT. Location Based IoT applications range from tracking objects and people in real-time, assets management, agriculture, assisted monitoring technologies for healthcare, and smart homes, to name a few. Radio Frequency based systems for indoor positioning such as Radio Frequency Identification (RFID) is a key enabler technology for the IoT due to its costeffective, high readability rates, automatic identification and, importantly, its energy efficiency characteristic. This paper reviews the state-of-the-art RFID technologies in IoT Smart Homes applications. It presents several comparable studies of RFID based projects in smart homes and discusses the applications, techniques, algorithms, and challenges of adopting RFID technologies in IoT smart home systems.Comment: 18 pages, 2 figures, 3 table

    Radio Frequency Identification: Supply Chain Impact and Implementation Challenges

    Get PDF
    Radio Frequency Identification (RFID) technology has received considerable attention from practitioners, driven by mandates from major retailers and the United States Department of Defense. RFID technology promises numerous benefits in the supply chain, such as increased visibility, security and efficiency. Despite such attentions and the anticipated benefits, RFID is not well-understood and many problems exist in the adoption and implementation of RFID. The purpose of this paper is to introduce RFID technology to practitioners and academicians by systematically reviewing the relevant literature, discussing how RFID systems work, their advantages, supply chain impacts, and the implementation challenges and the corresponding strategies, in the hope of providing guidance for practitioners in the implementation of RFID technology and offering a springboard for academicians to conduct future research in this area

    Sum Throughput Maximization in Multi-Tag Backscattering to Multiantenna Reader

    Full text link
    Backscatter communication (BSC) is being realized as the core technology for pervasive sustainable Internet-of-Things applications. However, owing to the resource-limitations of passive tags, the efficient usage of multiple antennas at the reader is essential for both downlink excitation and uplink detection. This work targets at maximizing the achievable sum-backscattered-throughput by jointly optimizing the transceiver (TRX) design at the reader and backscattering coefficients (BC) at the tags. Since, this joint problem is nonconvex, we first present individually-optimal designs for the TRX and BC. We show that with precoder and {combiner} designs at the reader respectively targeting downlink energy beamforming and uplink Wiener filtering operations, the BC optimization at tags can be reduced to a binary power control problem. Next, the asymptotically-optimal joint-TRX-BC designs are proposed for both low and high signal-to-noise-ratio regimes. Based on these developments, an iterative low-complexity algorithm is proposed to yield an efficient jointly-suboptimal design. Thereafter, we discuss the practical utility of the proposed designs to other application settings like wireless powered communication networks and BSC with imperfect channel state information. Lastly, selected numerical results, validating the analysis and shedding novel insights, demonstrate that the proposed designs can yield significant enhancement in the sum-backscattered throughput over existing benchmarks.Comment: 17 pages, 5 figures, accepted for publication in IEEE Transactions on Communication

    Ensuring Application Specific Security, Privacy and Performance Goals in RFID Systems

    Get PDF
    Radio Frequency IDentification (RFID) is an automatic identification technology that uses radio frequency to identify objects. Securing RFID systems and providing privacy in RFID applications has been the focus of much academic work lately. To ensure universal acceptance of RFID technology, security and privacy issued must be addressed into the design of any RFID application. Due to the constraints on memory, power, storage capacity, and amount of logic on RFID devices, traditional public key based strong security mechanisms are unsuitable for them. Usually, low cost general authentication protocols are used to secure RFID systems. However, the generic authentication protocols provide relatively low performance for different types of RFID applications. We identified that each RFID application has unique research challenges and different performance bottlenecks based on the characteristics of the system. One strategy is to devise security protocols such that application specific goals are met and system specific performance requirements are maximized. This dissertation aims to address the problem of devising application specific security protocols for current and next generation RFID systems so that in each application area maximum performance can be achieved and system specific goals are met. In this dissertation, we propose four different authentication techniques for RFID technologies, providing solutions to the following research issues: 1) detecting counterfeit as well as ensuring low response time in large scale RFID systems, 2) preserving privacy and maintaining scalability in RFID based healthcare systems, 3) ensuring security and survivability of Computational RFID (CRFID) networks, and 4) detecting missing WISP tags efficiently to ensure reliability of CRFID based system\u27s decision. The techniques presented in this dissertation achieve good levels of privacy, provide security, scale to large systems, and can be implemented on resource-constrained RFID devices

    Efficient unknown tag identification protocols in large-scale RFID systems

    Get PDF
    PublishedJournal ArticleOwing to its attractive features such as fast identification and relatively long interrogating range over the classical barcode systems, radio-frequency identification (RFID) technology possesses a promising prospect in many practical applications such as inventory control and supply chain management. However, unknown tags appear in RFID systems when the tagged objects are misplaced or unregistered tagged objects are moved in, which often causes huge economic losses. This paper addresses an important and challenging problem of unknown tag identification in large-scale RFID systems. The existing protocols leverage the Aloha-like schemes to distinguish the unknown tags from known tags at the slot level, which are of low time-efficiency, and thus can hardly satisfy the delay-sensitive applications. To fill in this gap, two filtering-based protocols (at the bit level) are proposed in this paper to address the problem of unknown tag identification efficiently. Theoretical analysis of the protocol parameters is performed to minimize the execution time of the proposed protocols. Extensive simulation experiments are conducted to evaluate the performance of the protocols. The results demonstrate that the proposed protocols significantly outperform the currently most promising protocols.This work was supported by NSFC (Grant Nos. 60973117, 61173160, 61173162, and 60903154), New Century Excellent Talents in University (NCET) of Ministry of Education of China, The Research Fund for the Doctoral Program of Higher Education (Program No. 20130041110019) and the National Science Foundation for Distinguished Young Scholars of China (Grant No. 61225010)

    The Challenges and Issues Facing the Deployment of RFID Technology

    Get PDF
    Griffith Sciences, School of Information and Communication TechnologyFull Tex

    Design of Tracking System for Alzheimer Patients

    Get PDF
    This patient monitoring system project is based on detection using radio frequency identification (RFID). The scope of this project is to improve hospital system using Radio Frequency Identification (RFID). RFID is a technology that uses radio frequency to uniquely identify people and items by assigning to them a personal ID that is identifiable and detectable remotely. The searching system combines both hardware and software to complete. The hardware used are the Activewave’s standard reader and tag. As for the system’s software, it comprises of the Patient Searching List Database, Programming Station and the Patients Register Program. Troubleshoot and class test are made for the system to determine its functionality and efficiency, and to meet the design objectives. The whole system will be simulated and run by using VB software. Finally this design model will be used to monitor Alzheimer patients at various location and operational conditions. In conclusion, the study of how RFID works and hardware selections are crucial as it affects the system performanc
    • …
    corecore