• Title/Summary/Keyword: RFID applications

Search Result 321, Processing Time 0.024 seconds

Comprehensive Survey on Internet of Things, Architecture, Security Aspects, Applications, Related Technologies, Economic Perspective, and Future Directions

  • Gafurov, Khusanbek;Chung, Tai-Myoung
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.797-819
    • /
    • 2019
  • Internet of Things (IoT) is the paradigm of network of Internet-connected things as objects that constantly sense the physical world and share the data for further processing. At the core of IoT lies the early technology of radio frequency identification (RFID), which provides accurate location tracking of real-world objects. With its small size and convenience, RFID tags can be attached to everyday items such as books, clothes, furniture and the like as well as to animals, plants, and even humans. This phenomenon is the beginning of new applications and services for the industry and consumer market. IoT is regarded as a fourth industrial revolution because of its massive coverage of services around the world from smart homes to artificial intelligence-enabled smart driving cars, Internet-enabled medical equipment, etc. It is estimated that there will be several dozens of billions of IoT devices ready and operating until 2020 around the world. Despite the growing statistics, however, IoT has security vulnerabilities that must be addressed appropriately to avoid causing damage in the future. As such, we mention some fields of study as a future topic at the end of the survey. Consequently, in this comprehensive survey of IoT, we will cover the architecture of IoT with various layered models, security characteristics, potential applications, and related supporting technologies of IoT such as 5G, MEC, cloud, WSN, etc., including the economic perspective of IoT and its future directions.

Object Directive Manipulation Through RFID

  • Chong, Nak-Young;Tanie, Kazuo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2731-2736
    • /
    • 2003
  • In highly informative, perception-rich environments that we call Omniscient Spaces, robots interact with physical objects which in turn afford robots the information showing how the objects should be manipulated. Object manipulation is commonly believed one of the most basic tasks in robot applications. However, no approaches including visual servoing seem satisfactory in unstructured environments such as our everyday life. Thus, in Omniscient Spaces, the features of the environments embed themselves in every entity, allowing robots to easily identify and manipulate unknown objects. To achieve this end, we propose a new paradigm of the interaction through Radio Frequency Identification (RFID). The aim of this paper is to learn about RFID and investigate how it works in object manipulation. Specifically, as an innovative trial for autonomous, real-time manipulation, a likely mobile robot equipped with an RFID system is developed. Details on the experiments are described together with some preliminary results.

  • PDF

OFSA: Optimum Frame-Slotted Aloha for RFID Tag Collision Arbitration

  • Lee, Dong-Hwan;Choi, Ji-Hoon;Lee, Won-Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.1929-1945
    • /
    • 2011
  • RFID technologies have attracted a lot of attention in recent years because of their cost/time-effectiveness in large-scale logistics, supply chain management (SCM) and other various potential applications. One of the most important issues of the RFID-based systems is how quickly tags can be identified. Tag collision arbitration plays a more critical role in determining the system performance especially for passive tag-based ones where tag collisions are dealt with rather than prevented. We present a novel tag collision arbitration protocol called Optimum Frame-Slotted Aloha (OFSA). The protocol has been designed to achieve time-optimal efficiency in tag identification through an analytic study of tag identification delay and tag number estimation. Results from our analysis and extensive simulations demonstrate that OFSA outperforms other collision arbitration protocols. Also, unlike most prior anti-collision protocols, it does not require any modification to the current standards and architectures facilitating the rollout of RFID systems.

A Single-Feeding Port HF-UHF Dual-Band RFID Tag Antenna

  • Ha-Van, Nam;Seo, Chulhun
    • Journal of electromagnetic engineering and science
    • /
    • v.17 no.4
    • /
    • pp.233-237
    • /
    • 2017
  • In this paper, a dual-band high frequency (HF) and ultra-high frequency (UHF) radio-frequency identification (RFID) tag antenna is presented that operates in the 13.56 MHz band as well as in the 920 MHz band. A spiral coil along the edges of the antenna substrate is designed to handle the HF band, and a novel meander open complementary split ring resonator (MOCSRR) dipole antenna is utilized to generate the UHF band. The dual-band antenna is supported by a single-feeding port for mono-chip RFID applications. The antenna is fabricated using an FR4 substrate to verify theoretical and simulation designs, and it has compact dimensions of $80mm{\times}40mm{\times}0.8mm$. The proposed antenna also has an omnidirectional characteristic with a gain of approximately 1 dBi.

Model of dynamic clustering-based energy-efficient data filtering for mobile RFID networks

  • Vo, Viet Minh Nhat;Le, Van Hoa
    • ETRI Journal
    • /
    • v.43 no.3
    • /
    • pp.427-435
    • /
    • 2021
  • Data filtering is an essential task for improving the energy efficiency of radiofrequency identification (RFID) networks. Among various energy-efficient approaches, clustering-based data filtering is considered to be the most effective solution because data from cluster members can be filtered at cluster heads before being sent to base stations. However, this approach quickly depletes the energy of cluster heads. Furthermore, most previous studies have assumed that readers are fixed and interrogate mobile tags in a workspace. However, there are several applications in which readers are mobile and interrogate fixed tags in a specific area. This article proposes a model for dynamic clustering-based data filtering (DCDF) in mobile RFID networks, where mobile readers are re-clustered periodically and the cluster head role is rotated among the members of each cluster. Simulation results show that DCDF is effective in terms of balancing energy consumption among readers and prolonging the lifetime of the mobile RFID networks.

Improving Varying-Pseudonym-Based RFID Authentication Protocols to Resist Denial-of-Service Attacks

  • Chien, Hung-Yu;Wu, Tzong-Chen
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6B
    • /
    • pp.259-269
    • /
    • 2008
  • Applying Varying Pseudonym (VP) to design of Radio Frequency Identification (RFID) authentication protocol outperforms the other existing approaches in several respects. However, this approach is prone to the well-known denial-ofservice (DOS) attack. In this paper, we examine the de-synchronization problems of VP-based RFID authentication protocols, and propose effective solutions to eliminate such weaknesses. We shall show that the proposed solutions indeed improve the security for these protocols, and moreover, these solutions require 0(1) computational cost for identitying a tag and 0(1) key space on the tag. These excellent performances make them very attractive to many RFID applications.

An Efficient Evolutionary Algorithm for Optimal Arrangement of RFID Reader Antenna (RFID 리더기 안테나의 최적 배치를 위한 효율적인 진화 연산 알고리즘)

  • Soon, Nam-Soon;Yeo, Myung-Ho;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.10
    • /
    • pp.40-50
    • /
    • 2009
  • Incorrect deployment of RFID readers occurs reader-to-reader interferences in many applications using RFID technologies. Reader-to-reader interference occurs when a reader transmits a signal that interferes with the operation of another reader, thus preventing the second reader from communicating with tags in its interrogation zone. Interference detected by one reader and caused by another reader is referred to as a reader collision. In RFID systems, the reader collision problem is considered to be the bottleneck for the system throughput and reading efficiency. In this paper, we propose a novel RFID reader anti-collision algorithm based on evolutionary algorithm(EA). First, we analyze characteristics of RFID antennas and build database. Also, we propose EA encoding algorithm, fitness algorithm and genetic operators to deploy antennas efficiently. To show superiority of our proposed algorithm, we simulated our proposed algorithm. In the result, our proposed algorithm obtains 95.45% coverage rate and 10.29% interference rate after about 100 generations.

Design and Implementation of a RFID Reader Antenna Optimal Arrangement System (RFID 리더기 안테나 최적 배치 시스템의 설계 및 구현)

  • Soon, Nam-Soon;Yeo, Myung-Ho;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.10
    • /
    • pp.67-74
    • /
    • 2009
  • Incorrect deployment of RFID readers occurs reader-to-reader interferences in many applications using RFID technologies. Reader-to-reader interference occurs when a reader transmits a signal that interferes with the operation of another reader, thus preventing the second reader from communicating with tags in its interrogation zone. Interference detected by one reader and caused by another reader is referred to as a reader collision. In RFID systems, the reader collision problem is considered to be the bottleneck for the system throughput and reading efficiency. In this paper, we propose a novel RFID reader anti-collision algorithm based on evolutionary algorithm(EA). First, we analyze characteristics of RFID antennas and build database. Also, we propose EA encoding algorithm, fitness algorithm and genetic operators to deploy antennas efficiently. To show superiority of our proposed algorithm, we simulated our proposed algorithm. In the result, our proposed algorithm obtains 95.45% coverage rate and 10.29% interference rate after about 100 generations.

TPEG based RFID application service for terrestrial-DMB (지상파DMB를 위한 TPEG 기반 RFID 응용서비스)

  • Kim Hyun-Gon;Jeong Yong-Ho;Ahn Chung-Hyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.9 s.351
    • /
    • pp.14-24
    • /
    • 2006
  • The terrestrial-DMB (T-DMB) provides one-way broadcasting service in intial phase and two-way interactive data services through a return channel of mobile communications network are commercialized recently. The possible evolution of the T-DMB will be fully convergence between the T-DMB and other communication services such as telematics, RFID and so on. From this evolution point of view, a framework should be defined for supporting telematics and RFID applications on T-BMB platform. In this paper, we propose an integrated service model that could support RFID application services on the interactive T-DMB. To realize the model, we design a service scenario, a network reference model, functionalities of each entity, a data transmission mechanism messages, and coding rules. The service model could allow users to support the identical RFID application services over the T-DMB network even if T-DMB terminal doesn't have RFID reader capability. In addition, in the case for providing the interactive TTI(Traffic and Travel Information)service, users could utilize the current location based RFID application service using by the TPEG-Location application that forms the basis of user location referencing. The messages structure is designed by following TPEG standardization

An Efficient Cache Mechanism for Improving Response Times in Integrated RFID Middleware (통합 RFID 미들웨어의 응답시간 개선을 위한 효과적인 캐쉬 구조 설계)

  • Kim, Cheong-Ghil;Lee, Jun-Hwan;Park, Kyung-Lang;Kim, Shin-Dug
    • The KIPS Transactions:PartA
    • /
    • v.15A no.1
    • /
    • pp.17-26
    • /
    • 2008
  • This paper proposes an efficient caching mechanism appropriate for the integrated RFID middleware which can integrate wireless sensor networks (WSNs) and RFID (radio frequency identification) systems. The operating environment of the integrated RFID middleware is expected to face the situations of a significant amount of data reading from RFID readers, constant stream data input from large numbers of autonomous sensor nodes, and queries from various applications to history data sensed before and stored in distributed storages. Consequently, an efficient middleware layer equipping with caching mechanism is inevitably necessary for low latency of request-response while processing both data stream from sensor networks and history data from distributed database. For this purpose, the proposed caching mechanism includes two optimization methods to reduce the overhead of data processing in RFID middleware based on the classical cache implementation polices. One is data stream cache (DSC) and the other is history data cache (HDC), according to the structure of data request. We conduct a number of simulation experiments under different parameters and the results show that the proposed caching mechanism contributes considerably to fast request-response times.