703 research outputs found

    RFID SIMULATION IN MATLAB I SIMULINK

    Get PDF
    Nowadays, Radio Frequency Identification (RFID) applications are widely used in daily application and also in industries. RFID is an automatic identifications method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. The RFID tag is an object that can be placed into a product or person for the purpose of identification using radio waves. RFID uses wireless communication technique, found application in many areas such as attendance tracking system in campus or in a big factory and also for inventory tracking and management. In this project, the work of Yifen Han, Qiang Li and Hao Min from Auto-ID Labs at Fudan University, Shanghai, China will be reproduced so that further simulation result can be generated. Special attention is emphasized on the development of transmitter, receiver, wireless channel and tag for the system simulation environment because these four elements are the most important subsystems to produce an RFID simulation environment. This project will evaluate the system performance by changing the coding method and operation distance. At this point, half of transmitter subsystems have been done. The subsystems developed so far are source coding, raised cosine Hilbert and digital to analog converter

    PERFORMANCE ANALYSIS OF SECURITY MEASURES IN NEAR FIELD COMMUNICATION

    Get PDF
    Nowadays near field communication are largely used in so many different applications for the convenience and ease of use they provide. They store and exchange many personal data, some of them requires more security than others, due to the value they poses, such as banking information and personal identification. And maintaining high level of security is task of the utmost priority. The main focus of this thesis is establishing a knowledge base for different NFC/RFID devices. Evaluating the different encryption algorithms used currently, based on their encryption/decryption time, their immunity to brute force attack, and the amount of power needed to execute them. The encryption algorithms will be implemented using Python programing language and tested on a windows computer in order to test their immunity against brute force attack. Encryption/decryption time and the power usage will be tested on a Raspberry Pi, for the similarities it has with modern mobile devices.fi=Opinnäytetyö kokotekstinä PDF-muodossa.|en=Thesis fulltext in PDF format.|sv=Lärdomsprov tillgängligt som fulltext i PDF-format

    Energy Management in RFID-Sensor Networks: Taxonomy and Challenges

    Get PDF
    Ubiquitous Computing is foreseen to play an important role for data production and network connectivity in the coming decades. The Internet of Things (IoT) research which has the capability to encapsulate identification potential and sensing capabilities, strives towards the objective of developing seamless, interoperable and securely integrated systems which can be achieved by connecting the Internet with computing devices. This gives way for the evolution of wireless energy harvesting and power transmission using computing devices. Radio Frequency (RF) based Energy Management (EM) has become the backbone for providing energy to wireless integrated systems. The two main techniques for EM in RFID Sensor Networks (RSN) are Energy Harvesting (EH) and Energy Transfer (ET). These techniques enable the dynamic energy level maintenance and optimisation as well as ensuring reliable communication which adheres to the goal of increased network performance and lifetime. In this paper, we present an overview of RSN, its types of integration and relative applications. We then provide the state-of-the-art EM techniques and strategies for RSN from August 2009 till date, thereby reviewing the existing EH and ET mechanisms designed for RSN. The taxonomy on various challenges for EM in RSN has also been articulated for open research directives

    Efficient Ambient LoRa Backscatter with On-Off Keying Modulation

    Full text link
    Backscatter communication holds potential for ubiquitous and low-cost connectivity among low-power IoT devices. To avoid interference between the carrier signal and the backscatter signal, recent works propose a frequency-shifting technique to separate these two signals in the frequency domain. Such proposals, however, have to occupy the precious wireless spectrum that is already overcrowded, and increase the power, cost, and complexity of the backscatter tag. In this paper, we revisit the classic ON-OFF Keying (OOK) modulation and propose Aloba, a backscatter system that takes the ambient LoRa transmissions as the excitation and piggybacks the in-band OOK modulated signals over the LoRa transmissions. Our design enables the backsactter signal to work in the same frequency band of the carrier signal, meanwhile achieving flexible data rate at different transmission range. The key contributions of Aloba include: (1) the design of a low-power backscatter tag that can pick up the ambient LoRa signals from other signals. (2) a novel decoding algorithm to demodulate both the carrier signal and the backscatter signal from their superposition. We further adopt link coding mechanism and interleave operation to enhance the reliability of backscatter signal decoding. We implement Aloba and conduct head-to-head comparison with the state-of-the-art LoRa backscatter system PLoRa in various settings. The experiment results show Aloba can achieve 199.4 Kbps data rate at various distances, 52.4 times higher than PLoRa
    corecore