69 research outputs found

    Data Gathering Solutions for Dense RFID Deployments

    Get PDF
    International audienceThe advent of RFID (Radio Frequency Identification) has allowed the development of numerous applications. Indeed, solutions such as tracking of goods in large areas or sensing in smart cities are now made possible. However, such solutions encounter two main issues, first is inherent to the technology itself which is readers collisions, the second one being the gathering of read data up to a base station, potentially in a multihop fashion. While the first one has been a main research subject in the late years, the next one has not been investigated for the sole purpose of RFID, but rather for wireless adhoc networks. This multihop tag information collection must be done in regards of the application requirements but it should also care for the deployment strategy of readers to take advantage of their relative positions, coverage, reading activity and deployment density to avoid interfering between tag reading and data forwarding. To the best of our knowledge, the issue for a joint scheduling between tag reading and forwarding has never been investigated so far in the literature, although important.In this paper, we propose two new distributed, crosslayer solutions meant for the reduction of collisions and better efficiency of the RFID system but also serve as a routing solution towards a base station. Simulations show high levels of throughput while not lowering on the fairness on medium access staying above 85% in the highest deployment density with up to 500 readers, also providing a 90% data rate

    An energy-efficient routing protocol for Hybrid-RFID Sensor Network

    Get PDF
    Radio Frequency Identification (RFID) systems facilitate detection and identification of objects that are not easily detectable or distinguishable. However, they do not provide information about the condition of the objects they detect. Wireless sensor networks (WSNs), on the other hand provide information about the condition of the objects as well as the environment. The integration of these two technologies results in a new type of smart network where RFID-based components are combined with sensors. This research proposes an integration technique that combines conventional wireless sensor nodes, sensor-tags, hybrid RFID-sensor nodes and a base station into a smart network named Hybrid RFID-Sensor Network (HRSN)

    Privacy & authentication in extreme low power wireless devices: RFID and ”-sensors

    Get PDF
    Authentication and Privacy are important concerns in current low power wireless devices like RFID and ”-sensors. ”-sensors are low power devices which have been identified as being useful in variety of domains including battlefield and perimeter defense etc. Radio-Frequency Identification (RFID) is a technology for automated identification of objects and people. An RFID device frequently called RFID tag is a small microchip device that holds limited amount of data and transmits the same over the various frequency ranges. An RFID tag is typically attached to an item and contain identification information like serial numbers unique to that item. RFID tags are recently being used in several application areas like inventory management, medicines and security systems etc. Since sensors are deployed in an unattended hostile environment, they are vulnerable to various kinds of attacks. An adversary can pose insider or outsider attacks into the network with the goal of both deceiving the base station and depleting the resources of the relaying nodes. Authentication schemes are implemented that will enable base station to detect any false data transmission. RFIDs, on the other hand pose two main security concerns for users: clandestine tracking and inventorying. RFID tags respond to reader interrogation without alerting their owners or bearers. Thus, where read range permits clandestine scanning of tags is a plausible threat. Security requirements in both of these low power devices are comprised of authentication, integrity, privacy and anti-playback. The recipient of the message needs to be able to unequivocally assure that the message came from its stated source. Similarly, the recipient needs to be assured that the message was not altered in transit and that it is not an earlier message being re-played in order to veil the current environment. Finally, all communications needs to be kept private such that eavesdroppers cannot intercept study and analyze, and devise countermeasures to circumvent the purposes of the sensor network. This thesis implements authentication schemes in ”-sensors that will detect false injection of data into the communication path of the base station and sensors. In addition to that this thesis focuses on an application of RFIDs deployed in library application. Discusses the privacy and authentication issues in RFID tags particularly in the library domain. Describes an authentication scheme implementation to handle these vulnerabilities

    Next Generation Auto-Identification and Traceability Technologies for Industry 5.0: A Methodology and Practical Use Case for the Shipbuilding Industry

    Get PDF
    [Abstract] Industry 5.0 follows the steps of the Industry 4.0 paradigm and seeks for revolutionizing the way industries operate. In fact, Industry 5.0 focuses on research and innovation to support industrial production sustainability and place the well-being of industrial workers at the center of the production process. Thus, Industry 5.0 relies on three pillars: it is human-centric, it encourages sustainability and it is aimed at developing resilience against disruptions. Such core aspects cannot be fully achieved without a transparent end-to-end human-centered traceability throughout the value chain. As a consequence, Auto-Identification (Auto-ID) technologies play a key role, since they are able to provide automated item recognition, positioning and tracking without human intervention or in cooperation with industrial operators. Although the most popular Auto-ID technologies provide a certain degree of security and productivity, there are still open challenges for future Industry 5.0 factories. This article analyzes and evaluates the Auto-ID landscape and delivers a holistic perspective and understanding of the most popular and the latest technologies, looking for solutions that cope with harsh, diverse and complex industrial scenarios. In addition, it describes a methodology for selecting Auto-ID technologies for Industry 5.0 factories. Such a methodology is applied to a specific use case of the shipbuilding industry that requires identifying the main components of a ship during its construction and repair. To validate the outcomes of the methodology, a practical evaluation of passive and active UHF RFID tags was performed in an Offshore Patrol Vessel (OPV) under construction, showing that a careful selection and evaluation of the tags enables product identification and tracking even in areas with a very high density of metallic objects. As a result, this article serves as a useful guide for industrial stakeholders, including future developers and managers that seek for deploying identification and traceability technologies in Industry 5.0 scenarios.This work was supported in part by the Auto-Identication for Intelligent Products Research Line of the Navantia-Universidade da Coruña Joint Research Unit under Grant IN853B-2018/02, and in part by the Centro de Investigación de Galicia ``CITIC,'' funded by Xunta de Galicia and the European Union (European Regional Development Fund-Galicia 2014_2020 Program) under Grant ED431G 2019/01Xunta de Galicia; IN853B-2018/02Xunta de Galicia; ED431G 2019/0

    Energy Management in RFID-Sensor Networks: Taxonomy and Challenges

    Get PDF
    Ubiquitous Computing is foreseen to play an important role for data production and network connectivity in the coming decades. The Internet of Things (IoT) research which has the capability to encapsulate identification potential and sensing capabilities, strives towards the objective of developing seamless, interoperable and securely integrated systems which can be achieved by connecting the Internet with computing devices. This gives way for the evolution of wireless energy harvesting and power transmission using computing devices. Radio Frequency (RF) based Energy Management (EM) has become the backbone for providing energy to wireless integrated systems. The two main techniques for EM in RFID Sensor Networks (RSN) are Energy Harvesting (EH) and Energy Transfer (ET). These techniques enable the dynamic energy level maintenance and optimisation as well as ensuring reliable communication which adheres to the goal of increased network performance and lifetime. In this paper, we present an overview of RSN, its types of integration and relative applications. We then provide the state-of-the-art EM techniques and strategies for RSN from August 2009 till date, thereby reviewing the existing EH and ET mechanisms designed for RSN. The taxonomy on various challenges for EM in RSN has also been articulated for open research directives

    Embedded System for Construction Material Tracking Using Combination of Radio Frequency and Ultrasound Signal

    Get PDF
    This study created a framework for integrating the latest innovations in wireless sensor network that automate tracking and monitoring construction assets, e.g. equipment, materials, and labor in construction sites. This research constitutes one of the few studies to incorporate emerging information and sensor network technologies with the construction industry, which has been slow to migrate away from legacy processes. The presented research works introduce a new prototype framework of an automated tracking system that will address the needed shift from the time-and labor-intensive legacy systems to sensor- and network-based collaboration and communication systems for construction processes. Software and hardware architecture for the new tracking system was developed using the combination of ultrasound and radio signals. By embedding the external ultrasound device with a MICAZ platform, enhancements to networking flexibility and wireless communication was observed over the previous technologies used in the construction material tracking systems. Feasibility study and testbed experiment on the position estimation were implemented to verify the localization algorithm presented in this dissertation. Cost benefit analysis based on quantitative approach implied that the presented framework can save the implementation cost of material tracking by up to 64 percent in a typical construction project. In addition to cost savings, the use of sensor-based tracking system can provide the intangible, comprehensive benefits in communication, labor utilization, document management, and resource management. It is hoped that the present work will describe a system that can effectively be used in a range of applications for tracking and monitoring purposes and will present a clear path that engineers can take to use existing wireless sensor technology in their particular applications. The cost of such hardware will decrease rapidly, thereby permitting large numbers of application scenarios to be possible in many construction sites with improved energy consumption, hardware performance, durability, and safety

    Decentralised Algorithms for Wireless Networks.

    Get PDF
    Designing and managing wireless networks is challenging for many reasons. Two of the most crucial in 802.11 wireless networks are: (a) variable per-user channel quality and (b) unplanned, ad-hoc deployment of the Access Points (APs). Regarding (a), a typical consequence is the selection, for each user, of a different bit-rate, based on the channel quality. This in turn causes the so-called performance “anomaly”, where the users with lower bit-rate transmit for most of the time, causing the higher bit-rate users to receive less time for transmission (air time). Regarding (b), an important issue is managing interference. This can be mitigated by selecting different channels for neighbouring APs, but needs to be carried out in a decentralised way because often APs belong to different administrative domains, or communication between APs is unfeasible. Tools for managing unplanned deployment are also becoming important for other small cell networks, such as femtocell networks, where decentralised allocation of scrambling codes is a key task

    Study of Reliable Data Communication in Wireless Sensor Networks

    Get PDF
    A distributed wireless sensor network consists of numerous tiny autonomous sensing nodes deployed across a wide geographical area. These sensor nodes self organize and establish radio communication links with the neighboring nodes to form multi-hop routing paths to the central base station. The dynamic and lossy nature of wireless communication poses several challenges in reliable transfer of data from the sensor nodes to the sink. There are several applications of sensor networks wherein the data collected by the sensors in the network are critical and hence have to be reliably transported to the sink. An example of such an application is sensors with RFID readers mounted on them to read tag information from the objects in a factory warehouse. Here, the tag information recorded by the RFID reader is a critical piece of information which may not be available at a later point of time and hence has to be reliably transported to the sink. We study the various issues and analyze the design choices proposed in literature in addressing the challenge of sensors-to-sink reliable data communication in such applications. A cross-layer based protocol with MAC layer retransmissions and NACK (Negative Acknowledgment) based rerouting of data packets is developed to overcome link failures and provide reliability. The protocol is implemented on TinyOS and the performance of NACK based rerouting protocol in terms of percentage successful message reception is compared with NACK based retransmission protocol by running simulations on TOSSIM. The NACK based rerouting protocol provides greater reliability under different metrics like varying network size, network traffic and percentage of failed links in the network

    Design, Analysis and Computation in Wireless and Optical Networks

    Get PDF
    abstract: In the realm of network science, many topics can be abstracted as graph problems, such as routing, connectivity enhancement, resource/frequency allocation and so on. Though most of them are NP-hard to solve, heuristics as well as approximation algorithms are proposed to achieve reasonably good results. Accordingly, this dissertation studies graph related problems encountered in real applications. Two problems studied in this dissertation are derived from wireless network, two more problems studied are under scenarios of FIWI and optical network, one more problem is in Radio- Frequency Identification (RFID) domain and the last problem is inspired by satellite deployment. The objective of most of relay nodes placement problems, is to place the fewest number of relay nodes in the deployment area so that the network, formed by the sensors and the relay nodes, is connected. Under the fixed budget scenario, the expense involved in procuring the minimum number of relay nodes to make the network connected, may exceed the budget. In this dissertation, we study a family of problems whose goal is to design a network with “maximal connectedness” or “minimal disconnectedness”, subject to a fixed budget constraint. Apart from “connectivity”, we also study relay node problem in which degree constraint is considered. The balance of reducing the degree of the network while maximizing communication forms the basis of our d-degree minimum arrangement(d-MA) problem. In this dissertation, we look at several approaches to solving the generalized d-MA problem where we embed a graph onto a subgraph of a given degree. In recent years, considerable research has been conducted on optical and FIWI networks. Utilizing a recently proposed concept “candidate trees” in optical network, this dissertation studies counting problem on complete graphs. Closed form expressions are given for certain cases and a polynomial counting algorithm for general cases is also presented. Routing plays a major role in FiWi networks. Accordingly to a novel path length metric which emphasizes on “heaviest edge”, this dissertation proposes a polynomial algorithm on single path computation. NP-completeness proof as well as approximation algorithm are presented for multi-path routing. Radio-frequency identification (RFID) technology is extensively used at present for identification and tracking of a multitude of objects. In many configurations, simultaneous activation of two readers may cause a “reader collision” when tags are present in the intersection of the sensing ranges of both readers. This dissertation ad- dresses slotted time access for Readers and tries to provide a collision-free scheduling scheme while minimizing total reading time. Finally, this dissertation studies a monitoring problem on the surface of the earth for significant environmental, social/political and extreme events using satellites as sensors. It is assumed that the impact of a significant event spills into neighboring regions and there will be corresponding indicators. Careful deployment of sensors, utilizing “Identifying Codes”, can ensure that even though the number of deployed sensors is fewer than the number of regions, it may be possible to uniquely identify the region where the event has taken place.Dissertation/ThesisDoctoral Dissertation Computer Science 201
    • 

    corecore