703 research outputs found
RFID SIMULATION IN MATLAB I SIMULINK
Nowadays, Radio Frequency Identification (RFID) applications are widely
used in daily application and also in industries. RFID is an automatic identifications
method, relying on storing and remotely retrieving data using devices called RFID
tags or transponders. The RFID tag is an object that can be placed into a product or
person for the purpose of identification using radio waves. RFID uses wireless
communication technique, found application in many areas such as attendance
tracking system in campus or in a big factory and also for inventory tracking and
management. In this project, the work of Yifen Han, Qiang Li and Hao Min from
Auto-ID Labs at Fudan University, Shanghai, China will be reproduced so that further
simulation result can be generated. Special attention is emphasized on the
development of transmitter, receiver, wireless channel and tag for the system
simulation environment because these four elements are the most important
subsystems to produce an RFID simulation environment. This project will evaluate the
system performance by changing the coding method and operation distance. At this
point, half of transmitter subsystems have been done. The subsystems developed so far
are source coding, raised cosine Hilbert and digital to analog converter
PERFORMANCE ANALYSIS OF SECURITY MEASURES IN NEAR FIELD COMMUNICATION
Nowadays near field communication are largely used in so many different applications for the convenience and ease of use they provide. They store and exchange many personal data, some of them requires more security than others, due to the value they poses, such as banking information and personal identification. And maintaining high level of security is task of the utmost priority.
The main focus of this thesis is establishing a knowledge base for different NFC/RFID devices. Evaluating the different encryption algorithms used currently, based on their encryption/decryption time, their immunity to brute force attack, and the amount of power needed to execute them.
The encryption algorithms will be implemented using Python programing language and tested on a windows computer in order to test their immunity against brute force attack. Encryption/decryption time and the power usage will be tested on a Raspberry Pi, for the similarities it has with modern mobile devices.fi=Opinnäytetyö kokotekstinä PDF-muodossa.|en=Thesis fulltext in PDF format.|sv=Lärdomsprov tillgängligt som fulltext i PDF-format
Energy Management in RFID-Sensor Networks: Taxonomy and Challenges
Ubiquitous Computing is foreseen to play an important role for data production and network connectivity in the coming decades. The Internet of Things (IoT) research which has the capability to encapsulate identification potential and sensing capabilities, strives towards the objective of developing seamless, interoperable and securely integrated systems which can be achieved by connecting the Internet with computing devices. This gives way for the evolution of wireless energy harvesting and power transmission using computing devices. Radio Frequency (RF) based Energy Management (EM) has become the backbone for providing energy to wireless integrated systems. The two main techniques for EM in RFID Sensor Networks (RSN) are Energy Harvesting (EH) and Energy Transfer (ET). These techniques enable the dynamic energy level maintenance and optimisation as well as ensuring reliable communication which adheres to the goal of increased network performance and lifetime. In this paper, we present an overview of RSN, its types of integration and relative applications. We then provide the state-of-the-art EM techniques and strategies for RSN from August 2009 till date, thereby reviewing the existing EH and ET mechanisms designed for RSN. The taxonomy on various challenges for EM in RSN has also been articulated for open research directives
Efficient Ambient LoRa Backscatter with On-Off Keying Modulation
Backscatter communication holds potential for ubiquitous and low-cost
connectivity among low-power IoT devices. To avoid interference between the
carrier signal and the backscatter signal, recent works propose a
frequency-shifting technique to separate these two signals in the frequency
domain. Such proposals, however, have to occupy the precious wireless spectrum
that is already overcrowded, and increase the power, cost, and complexity of
the backscatter tag. In this paper, we revisit the classic ON-OFF Keying (OOK)
modulation and propose Aloba, a backscatter system that takes the ambient LoRa
transmissions as the excitation and piggybacks the in-band OOK modulated
signals over the LoRa transmissions. Our design enables the backsactter signal
to work in the same frequency band of the carrier signal, meanwhile achieving
flexible data rate at different transmission range. The key contributions of
Aloba include: (1) the design of a low-power backscatter tag that can pick up
the ambient LoRa signals from other signals. (2) a novel decoding algorithm to
demodulate both the carrier signal and the backscatter signal from their
superposition. We further adopt link coding mechanism and interleave operation
to enhance the reliability of backscatter signal decoding. We implement Aloba
and conduct head-to-head comparison with the state-of-the-art LoRa backscatter
system PLoRa in various settings. The experiment results show Aloba can achieve
199.4 Kbps data rate at various distances, 52.4 times higher than PLoRa
- …