Keyword Search Result

[Keyword] RFID(120hit)

61-80hit(120hit)

  • Otedama: A Relocatable RFID Information Repository Architecture

    Shigeya SUZUKI  Rodney VAN METER  Osamu NAKAMURA  Jun MURAI  

     
    PAPER

      Vol:
    E93-D No:11
      Page(s):
    2922-2931

    We present a novel RFID middleware architecture, Otedama, which makes use of a unique property of RFID information to improve performance. RFID tags are bound to items. New information related to an RFID tag is generated at the site where the ID exists, and the entity most interested in the history and the item itself is in close proximity to the RFID tag. To exploit this property, we propose a scheme which bundles information related to a specific ID into one object and moves that bundle to a nearby server as the RFID tag moves from place to place. By using this scheme, information is always accessible by querying a system near the physical location of the tag, providing better query performance. Additionally, the volume of records that must be kept by a repository manager is reduced, because the relocation naturally migrates data away as physical objects move. We show the effectiveness of this architecture by analyzing data from a major retailer, finding that information retrieval performance will be six times better, and the cost of search is possibly several times cheaper.

  • A New Scheme to Avoid Null Zone for HF-Band RFID with Diversity Combining of Loop Antennas

    Hiroshi HIRAYAMA  Nobuyoshi KIKUMA  Kunio SAKAKIBARA  

     
    LETTER-Antennas

      Vol:
    E93-B No:10
      Page(s):
    2666-2669

    A new scheme to avoid null zone for HF-band RFID without expanding antenna size is proposed. At first, we demonstrate by FDTD simulation that the null zone occurs because of cancellation of magnetic fields over the loop surface. To prevent cancellation of magnetic fields, the loop antenna is split into four parts, which work as a planar array antenna. The outputs of antennas are gathered by using combining circuit. We have validated by FDTD simulation that the proposed scheme enlarges the worst received power by 13.1 dB.

  • A Key Establishment Protocol for RFID User in IPTV Environment

    Yoon-Su JEONG  Yong-Tae KIM  Jae-Min SOHN  Gil-Cheol PARK  Sang-Ho LEE  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E93-B No:9
      Page(s):
    2407-2415

    In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1 bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.

  • Indexing of Tagged Moving Objects over Localized Trajectory with Time Intervals in RFID Systems

    Jongwan KIM  Dukshin OH  Keecheon KIM  

     
    LETTER-Data Engineering, Web Information Systems

      Vol:
    E93-D No:9
      Page(s):
    2639-2642

    Since a radio frequency identification (RFID) transponder (tag) generates both location and time information when it enters and leaves a reader, the trajectory of a moving, tagged object can be traced. Due to the time intervals between entries to successive readers, during which tags are not tracked, accurate tracing of complete trajectories can be difficult. To overcome this problem, we propose a tag trajectory indexing scheme called TR-tree (R-tree-based tag trajectory index) that can trace tags by combining the local trajectories at each reader. In experiments, this scheme showed superior performance compared with other indices.

  • Population Estimation of RFID Tags Using Hadamard Footprints

    Joontae KIM  Seung-Ri JIN  Dong-Jo PARK  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E93-B No:9
      Page(s):
    2473-2476

    A novel method is proposed that can estimate the tag population in Radio Frequency Identification (RFID) systems by using a Hadamard code for the tag response. We formulate the maximum likelihood estimator for the tag population using the number of observed footprints. The lookup table of the estimation algorithm has low complexity. Simulation results show that the proposed estimator performs considerably better than the conventional schemes.

  • A Novel Communication Range Recognition (CRR) Scheme for Spatial Localization of Passive RFID Tags

    Tomotaka WADA  Norie UCHITOMI  Yuuki OTA  Toshihiro HORI  Kouichi MUTSUURA  Hiromi OKADA  

     
    PAPER-Mobile Information Network and Personal Communications

      Vol:
    E93-A No:9
      Page(s):
    1660-1669

    RFID (Radio Frequency Identification) technology is expected to be used as a localization tool. By the localization of RFID tags, a mobile robot equipped with an RFID reader can recognize the surrounding environment. In this paper, we propose a novel effective scheme called the communication range recognition (CRR) scheme for localizing RFID tags. In this scheme, an RFID reader determines the boundaries of the communication range when it is appropriately positioned by the robot. We evaluate the estimated position accuracy through numerous experiments. We show that the moving distance of the RFID reader in the proposed scheme is lower than that in conventional schemes.

  • InP-Based Unipolar Heterostructure Diode for Vertical Integration, Level Shifting, and Small Signal Rectification

    Werner PROST  Dudu ZHANG  Benjamin MUNSTERMANN  Tobias FELDENGUT  Ralf GEITMANN  Artur POLOCZEK  Franz-Josef TEGUDE  

     
    PAPER-III-V Heterostructure Devices

      Vol:
    E93-C No:8
      Page(s):
    1309-1314

    A unipolar n-n heterostrucuture diode is developed in the InP material system. The electronic barrier is formed by a saw tooth type of conduction band bending which consists of a quaternary In0.52(AlyGa1-y)0.48As layer with 0 < y < ymax. This barrier is lattice matched for all y to InP and is embedded between two n+-InGaAs layers. By varying the maximum Al-content from ymax,1 = 0.7 to ymax,2 = 1 a variable barrier height is formed which enables a diode-type I-V characteristic by epitaxial design with an adjustable current density within 3 orders of magnitude. The high current density of the diode with the lower barrier height (ymax,1 = 0.7) makes it suitable for high frequency applications at low signal levels. RF measurements reveal a speed index of 52 ps/V at VD = 0.15 V. The device is investigated for RF-to-DC power conversion in UHF RFID transponders with low-amplitude RF signals.

  • An MLSE-Based Interrogator for EPC-Global Gen-II System

    Yung-Yi WANG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E93-B No:8
      Page(s):
    2199-2202

    Conventional RFID interrogators use symbol-by-symbol-based detectors such as the matched filter and the edge detector for signal detection which do not sufficiently exploit the structure of the data-encoded waveforms. In this paper we propose a Viterbi-based algorithm to detect the data sequence of the RFID systems using the EPC-Global Generation-2 standard. By decomposing the associated data-encoded waveform on a half-cycle basis, the proposed approach first transfer the representation of the data-encoding scheme to a trellis diagram and thus leads to the application of the Viterbi algorithm for data sequence estimation. Also, different from the traditional Viterbi algorithm using correlation coefficient as the branch metrics, the proposed algorithm uses the absolute correlation coefficient as our branch metric which can exactly save the computational complexity of the Viterbi algorithm up to 50 percent. As compared to conventional approaches, the proposed algorithm can significantly improve the system performance due to its full exploitation of the baseband signal structure.

  • Design of a Wideband UHF RFID Printed Tag Antenna Using the R2R Process

    Uisheon KIM  Gyubong JUNG  Jaehoon CHOI  

     
    PAPER-Antennas and Propagation

      Vol:
    E93-B No:8
      Page(s):
    2135-2141

    This paper proposes a printed tag antenna for the universal ultra-high frequency (UHF) radio frequency identification (RFID) band (860-960 MHz) using the R2R process. To widen impedance bandwidth, a π-shaped matching network is suggested. The overall dimension of the proposed tag antenna is 83.4 mm 30.2 mm and it has a gain of over 1 dBi for the entire UHF RFID band. The performances of the proposed tag antenna, printed with conductivity silver ink using an R2R process, are compared with those of a copper antenna.

  • Efficient Method of Achieving Agreements between Individuals and Organizations about RFID Privacy

    Shi-Cho CHA  

     
    PAPER-Information Network

      Vol:
    E93-D No:7
      Page(s):
    1866-1877

    This work presents novel technical and legal approaches that address privacy concerns for personal data in RFID systems. In recent years, to minimize the conflict between convenience and the privacy risk of RFID systems, organizations have been requested to disclose their policies regarding RFID activities, obtain customer consent, and adopt appropriate mechanisms to enforce these policies. However, current research on RFID typically focuses on enforcement mechanisms to protect personal data stored in RFID tags and prevent organizations from tracking user activity through information emitted by specific RFID tags. A missing piece is how organizations can obtain customers' consent efficiently and flexibly. This study recommends that organizations obtain licenses automatically or semi-automatically before collecting personal data via RFID technologies rather than deal with written consents. Such digitalized and standard licenses can be checked automatically to ensure that collection and use of personal data is based on user consent. While individuals can easily control who has licenses and license content, the proposed framework provides an efficient and flexible way to overcome the deficiencies in current privacy protection technologies for RFID systems.

  • An Ultra Low Power and Variation Tolerant GEN2 RFID Tag Front-End with Novel Clock-Free Decoder

    Sung-Jin KIM  Minchang CHO  SeongHwan CHO  

     
    PAPER

      Vol:
    E93-C No:6
      Page(s):
    785-795

    In this paper, an ultra low power analog front-end for EPCglobal Class 1 Generation 2 RFID tag is presented. The proposed RFID tag removes the need for high frequency clock and counters used in conventional tags, which are the most power hungry blocks. The proposed clock-free decoder employs an analog integrator with an adaptive current source that provides a uniform decoding margin regardless of the data rate and a link frequency extractor based on a relaxation oscillator that generates frequency used for backscattering. A dual supply voltage scheme is also employed to increase the power efficiency of the tag. In order to improve the tolerance of the proposed circuit to environmental variations, a self-calibration circuit is proposed. The proposed RFID analog front-end circuit is designed and simulated in 0.25 µm CMOS, which shows that the power consumption is reduced by an order magnitude compared to the conventional RFID tags, without losing immunity to environmental variations.

  • Load Balancing for a Multi-Channel Multi-Interface 2.4 GHz Active RFID Reader

    Hyun-Sung PARK  Dong-Hyun KIM  Jong-Doek KIM  

     
    PAPER-Network Management/Operation

      Vol:
    E93-B No:5
      Page(s):
    1205-1215

    ISO/IEC 18000-7 Active RFID standard, a single channel system operating at 433 MHz, faces technical difficulties in supporting some recently introduced application demands because of its low transmission rates and vulnerability to radio interference between the readers. We propose a new multi-channel active RFID system operating at the 2.4 GHz band. The special feature of the proposed system is that a reader makes use of multiple interfaces to improve its performance. However, if only a small part of the interfaces is actually used, the performance improvement would not meet expectations. To overcome this problem, a multi-channel multi-interface active RFID protocol that balances the loads among all available interfaces is necessary. Three protocols, "Aggregated," "LP-Combined" and "AP-Balanced" are proposed in this paper. We carry out simulations to compare them under various conditions by changing numbers of tags, numbers of interfaces and tag data size. The AP-Balanced shows the best and the most stable performance and its performance increases almost linearly in proportion to the number of interfaces, which meets our expectation.

  • Autonomous Navigation System for Mobile Robot Using Randomly Distributed Passive RFID Tags

    Sunhong PARK  Shuji HASHIMOTO  

     
    PAPER

      Vol:
    E93-A No:4
      Page(s):
    711-719

    This paper presents an autonomous navigation system for a mobile robot using randomly distributed passive RFID tags. In the case of randomly distributed RFID tags, it is difficult to provide the precise location of the robot especially in the area of sparse RFID tag distribution. This, combined with the wide turning radius of the robot, can cause the robot to enter a zigzag exploration path and miss the goal. In RFID-based navigation, the key is to reduce both the number of RFID tags and the localization error for practical use in a large space. To cope with these, we utilized the Read time, which measures the reading time of each RFID tag. With this, we could estimate accurately the localization and orientation without using any external sensors or increasing the RFID tags. The average estimation errors of 7.8 cm in localization and 11 degrees in orientation were achieved with 102 RFID tags in the area of 4.2 m by 6.2 m. Our proposed method is verified with the path trajectories produced during navigation compared with conventional approaches.

  • Design and Implementation of Context-Aware Musuem Guide Agents

    Ichiro SATOH  

     
    PAPER-Agent-based System

      Vol:
    E93-D No:4
      Page(s):
    789-799

    This paper presents an agent-based system for building and operating context-aware services in public spaces, including museums. The system provides users with agents and detects the locations of users and deploys location-aware user-assistant agents at computers near the their current locations by using active RFID-tags. When a visitor moves between exhibits in a museum, this dynamically deploys his/her agent at the computers close to the exhibits by using mobile agent technology. It annotates the exhibits in his/her personalized form and navigate him/her user to the next exhibits along his/her routes. It also introduces user movement as a natural approach to interacting between users and agents. To demonstrate the utility and effectiveness of the system, we constructed location/user-aware visitor-guide services and experimented them for two weeks in a public museum.

  • Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard

    Pedro PERIS-LOPEZ  Tieyan LI  Julio C. HERNANDEZ-CASTRO  

     
    PAPER

      Vol:
    E93-D No:3
      Page(s):
    518-527

    In 2006 EPCglobal and the International Organization for Standards (ISO) ratified the EPC Class-1 Generation-2 (Gen-2) and the ISO 18000-6C standards , respectively. These efforts represented major advancements in the direction of universal standardization for low-cost RFID tags. However, a cause for concern is that security issues do not seem to be properly addressed. In this paper, we propose a new lightweight RFID tag-reader mutual authentication scheme for use under the EPCglobal framework. The scheme is based on previous work by Konidala and Kim . We attempt to mitigate the weaknesses observed in the original scheme and, at the same time, consider other possible adversarial threats as well as constraints on low-cost RFID tags requirements.

  • An Inference Algorithm with Efficient Slot Allocation for RFID Tag Identification

    Sungsoo KIM  Yonghwan KIM  Kwangseon AHN  

     
    LETTER-Network

      Vol:
    E93-B No:1
      Page(s):
    170-173

    This letter proposes the Inference Algorithm through Effective Slot Allocation (ESA-IA). In ESA-IA, the tags which match the prefix of the reader's request-respond in the corresponding slot; the group of tags with an even number of 1's responds in slot 0, while the group with an odd number of 1's responds in slot 1. The proposed algorithm infers '00' and '11' if there are two collided bits in slot 0, while inferring '01' and '10' if there are two collided bits in slot 1. The ESA-IA decreases the time consumption for tag identification by reducing the overall number of queries.

  • Efficient Frequency Sharing of Baseband and Subcarrier Coding UHF RFID Systems

    Jin MITSUGI  Yuusuke KAWAKITA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E92-B No:12
      Page(s):
    3794-3802

    UHF band passive RFID systems are being steadily adopted by industries because of their capability of long range automatic identification with passive tags. For an application which demands a large number of readers located in a limited geographical area, referred to as dense reader mode, interference rejection among readers is important. The coding method, baseband or subcarrier coding, in the tag-to-reader communication link results in a significant influence on the interference rejection performance. This paper examines the frequency sharing of baseband and subcarrier coding UHF RFID systems from the perspective of their transmission delay using a media access control (MAC) simulator. The validity of the numerical simulation was verified by an experiment. It is revealed that, in a mixed operation of baseband and subcarrier systems, assigning as many channels as possible to baseband system unless they do not exploit the subcarrier channels is the general principle for efficient frequency sharing. This frequency sharing principle is effective both to baseband and subcarrier coding systems. Otherwise, mixed operation fundamentally increases the transmission delay in subcarrier coding systems.

  • Reading Technique of 2.45 GHz Band Small RFID Tags with an Adapter

    Peng WANG  Hiroyuki KOGA  Sho YAMADA  Shigeki OBOTE  Kenichi KAGOSHIMA  Kenji ARAKI  

     
    PAPER-Communication Theory and Systems

      Vol:
    E92-A No:11
      Page(s):
    2851-2857

    A 2.45-GHz-band small passive radio-frequency identification (RFID) tag consists of a small loop antenna and chip, and its size is several millimeters. Because of the tag's poor impedance-matching characteristic and radiation efficiency, an ordinary reader has difficulty reading it. We propose a new technique for reading the tag that involves installing a square half-wavelength meander-line conductor on the reader as an adapter and placing the adapter in the vicinity of the tag, and verify the effectiveness of the technique by simulation and experiment. Moreover, characteristics of simultaneous read of the small RFID tags by the proposed reading technique are revealed by simulation and experimental results.

  • A Multi-Sensing-Range Method for Efficient Position Estimation by Passive RFID Technology

    Toshihiro HORI  Tomotaka WADA  Norie UCHITOMI  Kouichi MUTSUURA  Hiromi OKADA  

     
    PAPER-Mobile Information Network and Personal Communications

      Vol:
    E92-A No:10
      Page(s):
    2609-2617

    The RFID tag system has received attention as an identification source. Each RFID tag is attached to some object. With the unique ID of the RFID tag, a user identifies the object provided with the RFID tag, and derives appropriate information about the object. One of important applications of the RFID technology is the position estimation of RFID tags. It can be very useful to acquire the location information concerning the RFID tags. It can be applied to navigation systems and positional detection systems for robots etc. In this paper, we propose a new position estimation method of RFID tags by using a probabilistic approach. In this method, mobile objects (person and robot, etc.) with RFID readers estimate the positions of RFID tags with multiple communication ranges. We show the effectiveness of the proposed method by computer simulations.

  • Ultra-Small Reader/Writer with Multiple Contactless Interfaces on a Flexible Circuit Board

    Hideaki YAMAMOTO  Minoru IKEDA  Yasuhiro HOSODA  

     
    LETTER-Integrated Systems for Communications

      Vol:
    E92-B No:9
      Page(s):
    2992-2995

    In order to incorporate the reader/writers (RWs) into mobile electronic devices, miniaturization and flexibility are required. To meet these requirements, we fabricate an ultra-small RW with multiple contactless interfaces by mounting main unit circuits inside the antenna coil and using flexible multi-layer circuit board.

61-80hit(120hit)

FlyerIEICE has prepared a flyer regarding multilingual services. Please use the one in your native language.