WorldWideScience

Sample records for rfid sensor tags

  1. Extended-Range Passive RFID and Sensor Tags

    Science.gov (United States)

    Fink, Patrick W.; Kennedy, Timothy F.; Lin, Gregory Y.; Barton, Richard

    2012-01-01

    Extended-range passive radio-frequency identification (RFID) tags and related sensor tags are undergoing development. A tag of this type incorporates a retroreflective antenna array, so that it reflects significantly more signal power back toward an interrogating radio transceiver than does a comparable passive RFID tag of prior design, which does not incorporate a retroreflective antenna array. Therefore, for a given amount of power radiated by the transmitter in the interrogating transceiver, a tag of this type can be interrogated at a distance greater than that of the comparable passive RFID or sensor tag of prior design. The retroreflective antenna array is, more specifically, a Van Atta array, named after its inventor and first published in a patent issued in 1959. In its simplest form, a Van Atta array comprises two antenna elements connected by a transmission line so that the signal received by each antenna element is reradiated by the other antenna element (see Figure 1). The phase relationships among the received and reradiated signals are such as to produce constructive interference of the reradiated signals; that is, to concentrate the reradiated signal power in a direction back toward the source. Hence, an RFID tag equipped with a Van Atta antenna array automatically tracks the interrogating transceiver. The effective gain of a Van Atta array is the same as that of a traditional phased antenna array having the same number of antenna elements. Additional pairs of antenna elements connected by equal-length transmission lines can be incorporated into a Van Atta array to increase its directionality. Like some RFID tags here-to-fore commercially available, an RFID or sensor tag of the present developmental type includes one-port surface-acoustic-wave (SAW) devices. In simplified terms, the mode of operation of a basic one-port SAW device as used heretofore in an RFID device is the following: An interrogating radio signal is converted, at an input end, from

  2. RFID Tag as a Sensor - A Review on the Innovative Designs and Applications

    OpenAIRE

    Meng, Zhaozong; Li, Zhen

    2016-01-01

    The Radio Frequency Identification (RFID) technology has gained interests in both academia and industry since its invention. In addition to the applications in access control and supply chain, RFID is also a cost-efficient solution for Non-Destructive Testing (NDT) and pervasive monitoring. The battery free RFID tags are used as independent electromagnetic sensors or energy harvesting and data transmission interface of sensor modules for different measurement purposes. This review paper aims ...

  3. SAW passive wireless sensor-RFID tags with enhanced range, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — This proposal describes the development of passive wireless surface acoustic wave (SAW) RFID sensor-tags with enhanced range for remote monitoring of large groups of...

  4. Multi-use Passive RFID Sensor Tag System for NASA, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — This proposal will provide NASA with a family of UHF RFID sensor tags and system components supporting very reliable, robust, convenient and economical deployment...

  5. Secure optionally passive RFID tag or sensor with external power source and data logging

    Science.gov (United States)

    Nekoogar, Faranak; Reynolds, Matthew; Lefton, Scott; Dowla, Farid; Twogood, Richard

    2016-05-31

    A secure optionally passive RFID tag or sensor system comprises a passive RFID tag having means for receiving radio signals from at least one base station and for transmitting radio signals to at least one base station, where the tag is capable of being powered exclusively by received radio energy, and an external power and data logging device having at least one battery and electronic circuitry including a digital memory configured for storing and recalling data. The external power and data logging device has a means for powering the tag, and also has a means.

  6. A chipless sensor tag-based RFID technology for cyber-oriented environmental sensing applications

    Science.gov (United States)

    Shrestha, Sudhir; Agarwal, Mangilal; Phoha, Vir V.; Varahramyan, Kody

    2009-05-01

    A chipless sensor tag-based radio frequency identification (RFID) technology that allows wireless collection of information from the environment, and the monitoring and accessing of the given information through cyberspace is presented. The developed system consists of a cyber enabled RFID reader and passive chipless RFID sensor tags. The reader is comprised of an analog part that wirelessly communicates with the sensor tags, and a single board computer (SBC) part. Each passive chipless sensor tag consists of a microstrip antenna and a sensor. The sensor information is amplitude modulated in the backscattered signal of the tag. The analog reader part receives the backscattered signal and feeds it to the SBC, which computes the sensor information into a 96 bit serialized global trade item number (SGTIN-96) electronic product code (EPC). Moreover, the SBC makes the information available on a cyberspace-accessible secure user interface. The reported system has been applied for temperature sensing, where the change in temperature at the tag ranging from 27°C to 140°C resulted in a 28% amplitude change at the analog part of the reader. The temperature at the tag has been monitored by accessing the reader through cyberspace using a web-based user interfaces developed for the SBC.

  7. RFID Tag as a Sensor - A Review on the Innovative Designs and Applications

    Science.gov (United States)

    Meng, Zhaozong; Li, Zhen

    2016-12-01

    The Radio Frequency Identification (RFID) technology has gained interests in both academia and industry since its invention. In addition to the applications in access control and supply chain, RFID is also a cost-efficient solution for Non-Destructive Testing (NDT) and pervasive monitoring. The battery free RFID tags are used as independent electromagnetic sensors or energy harvesting and data transmission interface of sensor modules for different measurement purposes. This review paper aims to provide a comprehensive overview of the innovative designs and applications of RFID sensor technology with new insights, identify the technical challenges, and outline the future perspectives. With a brief introduction to the fundamentals of RFID measurement, the enabling technologies and recent technical progress are illustrated, followed by an extensive discussion of the novel designs and applications. Then, based on an in-depth analysis, the potential constraints are identified and the envisaged future directions are suggested, including printable/wearable RFID, System-on-Chip (SoC), ultra-low power, etc. The comprehensive discussion of RFID sensor technology will be inspirational and useful for academic and industrial communities in investigating, developing, and applying RFID for various measurement applications.

  8. RFID Tag as a Sensor - A Review on the Innovative Designs and Applications

    Directory of Open Access Journals (Sweden)

    Meng Zhaozong

    2016-12-01

    Full Text Available The Radio Frequency Identification (RFID technology has gained interests in both academia and industry since its invention. In addition to the applications in access control and supply chain, RFID is also a cost-efficient solution for Non-Destructive Testing (NDT and pervasive monitoring. The battery free RFID tags are used as independent electromagnetic sensors or energy harvesting and data transmission interface of sensor modules for different measurement purposes. This review paper aims to provide a comprehensive overview of the innovative designs and applications of RFID sensor technology with new insights, identify the technical challenges, and outline the future perspectives. With a brief introduction to the fundamentals of RFID measurement, the enabling technologies and recent technical progress are illustrated, followed by an extensive discussion of the novel designs and applications. Then, based on an in-depth analysis, the potential constraints are identified and the envisaged future directions are suggested, including printable/wearable RFID, System-on-Chip (SoC, ultra-low power, etc. The comprehensive discussion of RFID sensor technology will be inspirational and useful for academic and industrial communities in investigating, developing, and applying RFID for various measurement applications.

  9. Design and testing of RFID sensor tag fabricated using inkjet-printing and electrodeposition

    Science.gov (United States)

    Chien Dang, Mau; Son Nguyen, Dat; Dung Dang, Thi My; Tedjini, Smail; Fribourg-Blanc, Eric

    2014-06-01

    The passive RFID tag with an added sensing function is of interest to many applications. In particular, applications where RFID tagging is already considered to be the next step, such as food items, are a specific target. This paper demonstrates a flexible RFID tag sensor fabricated using a low cost technique with an added zero-cost sensing function. It is more specifically applied to the sensing of degradable food, in particular beef meat in our demonstrated example. To reach this, the antenna is designed in such a way to be sensitive to the variation of the dielectric permittivity of the meat over time. The design of the sensing tag as well as its fabrication process are described. The fabrication involves inkjet printing of a silver nanoparticle based ink on a commercial low cost PET film to create a seed layer. It is followed by a copper electrodeposition step on top of the silver pattern to complete the tag to obtain the desired thickness and conductivity of the tag antenna. The results of the electrical tests showed that with the inkjet printing-electrodeposition combination it is possible to produce flexible electrically conductive patterns for practical RFID applications. The tag was then tested in close-to-real-world conditions and it is demonstrated that it can provide a sensing function to detect the consumption limit of the packaged beef.

  10. RFID sensor-tags feeding a context-aware rule-based healthcare monitoring system.

    Science.gov (United States)

    Catarinucci, Luca; Colella, Riccardo; Esposito, Alessandra; Tarricone, Luciano; Zappatore, Marco

    2012-12-01

    Along with the growing of the aging population and the necessity of efficient wellness systems, there is a mounting demand for new technological solutions able to support remote and proactive healthcare. An answer to this need could be provided by the joint use of the emerging Radio Frequency Identification (RFID) technologies and advanced software choices. This paper presents a proposal for a context-aware infrastructure for ubiquitous and pervasive monitoring of heterogeneous healthcare-related scenarios, fed by RFID-based wireless sensors nodes. The software framework is based on a general purpose architecture exploiting three key implementation choices: ontology representation, multi-agent paradigm and rule-based logic. From the hardware point of view, the sensing and gathering of context-data is demanded to a new Enhanced RFID Sensor-Tag. This new device, de facto, makes possible the easy integration between RFID and generic sensors, guaranteeing flexibility and preserving the benefits in terms of simplicity of use and low cost of UHF RFID technology. The system is very efficient and versatile and its customization to new scenarios requires a very reduced effort, substantially limited to the update/extension of the ontology codification. Its effectiveness is demonstrated by reporting both customization effort and performance results obtained from validation in two different healthcare monitoring contexts.

  11. Novel Concrete Temperature Monitoring Method Based on an Embedded Passive RFID Sensor Tag.

    Science.gov (United States)

    Liu, Yongsheng; Deng, Fangming; He, Yigang; Li, Bing; Liang, Zhen; Zhou, Shuangxi

    2017-06-22

    This paper firstly introduces the importance of temperature control in concrete measurement, then a passive radio frequency identification (RFID) sensor tag embedded for concrete temperature monitoring is presented. In order to reduce the influences of concrete electromagnetic parameters during the drying process, a T-type antenna is proposed to measure the concrete temperature at the required depth. The proposed RFID sensor tag is based on the EPC generation-2 ultra-high frequency (UHF) communication protocol and operates in passive mode. The temperature sensor can convert the sensor signals to corresponding digital signals without an external reference clock due to the adoption of phase-locked loop (PLL)-based architecture. Laboratory experimentation and on-site testing demonstrate that our sensor tag embedded in concrete can provide reliable communication performance in passive mode. The maximum communicating distance between reader and tag is 7 m at the operating frequency of 915 MHz and the tested results show high consistency with the results tested by a thermocouple.

  12. Achievable Performance and Effective Interrogator Design for SAW RFID Sensor Tags

    Science.gov (United States)

    Barton Richard J.

    2012-01-01

    For many NASA missions, remote sensing is a critical application that supports activities such as environmental monitoring, planetary science, structural shape and health monitoring, non-destructive evaluation, etc. The utility of the remote sensing devices themselves is greatly increased if they are passive V that is, they do not require any on-board power supply such as batteries V and if they can be identified uniquely during the sensor interrogation process. Additional passive sensor characteristics that enable greater utilization in space applications are small size and weight, long read ranges with low interrogator power, ruggedness, and operability in extreme environments (vacuum, extreme high/low temperature, high radiation, etc.) In this paper, we consider one very promising passive sensor technology, called surface acoustic wave (SAW) radio-frequency identification (RFID), that satisfies all of these criteria. In general, RFID is a method of identifying items using radio waves to interrogate tags encoded with a unique identifier that are affixed to the items of interest. In the case of passive tags, only the interrogator, which transmits power to the tags in the form of radio-frequency electromagnetic radiation, requires access to a power supply. Passive RFID technologies are used today in many applications, including asset tracking and management, security and access control, and remote sensing. To date, most of the development and application in RFID technology has focused on either asset/inventory tracking and control or security and access control because these are the largest commercial application areas. Recently however, there has been growing interest in using passive RFID technology for remote sensing applications, and SAW devices are at the forefront of RFID sensing technology development. Although SAW RFID tags have great potential for use in numerous space-based remote sensing applications, the limited collision resolution capability of

  13. Detection, Identification, Location, and Remote Sensing Using SAW RFID Sensor Tags

    Science.gov (United States)

    Barton, Richard J.; Kennedy, Timothy F.; Williams, Robert M.; Fink, Patrick W.; Ngo, Phong H.

    2009-01-01

    The Electromagnetic Systems Branch (EV4) of the Avionic Systems Division at NASA Johnson Space Center in Houston, TX is studying the utility of surface acoustic wave (SAW) radiofrequency identification (RFID) tags for multiple wireless applications including detection, identification, tracking, and remote sensing of objects on the lunar surface, monitoring of environmental test facilities, structural shape and health monitoring, and nondestructive test and evaluation of assets. For all of these applications, it is anticipated that the system utilized to interrogate the SAW RFID tags may need to operate at fairly long range and in the presence of considerable multipath and multiple-access interference. Towards that end, EV4 is developing a prototype SAW RFID wireless interrogation system for use in such environments called the Passive Adaptive RFID Sensor Equipment (PARSED) system. The system utilizes a digitally beam-formed planar receiving antenna array to extend range and provide direction-of-arrival information coupled with an approximate maximum-likelihood signal processing algorithm to provide near-optimal estimation of both range and temperature. The system is capable of forming a large number of beams within the field of view and resolving the information from several tags within each beam. The combination of both spatial and waveform discrimination provides the capability to track and monitor telemetry from a large number of objects appearing simultaneously within the field of view of the receiving array. In this paper, we will consider the application of the PARSEQ system to the problem of simultaneous detection, identification, localization, and temperature estimation for multiple objects. We will summarize the overall design of the PARSEQ system and present a detailed description of the design and performance of the signal detection and estimation algorithms incorporated in the system. The system is currently configured only to measure temperature

  14. Design of an Embedded CMOS Temperature Sensor for Passive RFID Tag Chips.

    Science.gov (United States)

    Deng, Fangming; He, Yigang; Li, Bing; Zhang, Lihua; Wu, Xiang; Fu, Zhihui; Zuo, Lei

    2015-05-18

    This paper presents an ultra-low embedded power temperature sensor for passive RFID tags. The temperature sensor converts the temperature variation to a PTAT current, which is then transformed into a temperature-controlled frequency. A phase locked loop (PLL)-based sensor interface is employed to directly convert this temperature-controlled frequency into a corresponding digital output without an external reference clock. The fabricated sensor occupies an area of 0.021 mm2 using the TSMC 0.18 1P6M mixed-signal CMOS process. Measurement results of the embedded sensor within the tag system shows a 92 nW power dissipation under 1.0 V supply voltage at room temperature, with a sensing resolution of 0.15 °C/LSB and a sensing accuracy of -0.7/0.6 °C from -30 °C to 70 °C after 1-point calibration at 30 °C.

  15. Radio frequency identification and sensors from rfid to chipless RFID

    CERN Document Server

    Perret, Etienne

    2014-01-01

    This book deals with the field of identification and sensors, more precisely the possibility of collecting information remotely with RF waves (RFID). The book introduces the technology of chipless RFID starting from classical RFID and barcode, and explores the field of identification and sensors without wire, without batteries, without chip, and with tags that can even be printed on paper. A technique for automatic design of UHF RFID tags is presented , aiming at making the tags as insensitive as possible to the environment (with the ability to increase the reading range reliability), or, co

  16. Detection, Identification, Location, and Remote Sensing using SAW RFID Sensor Tags

    Science.gov (United States)

    Barton, Richard J.

    2009-01-01

    In this presentation, we will consider the problem of simultaneous detection, identification, location estimation, and remote sensing for multiple objects. In particular, we will describe the design and testing of a wireless system capable of simultaneously detecting the presence of multiple objects, identifying each object, and acquiring both a low-resolution estimate of location and a high-resolution estimate of temperature for each object based on wireless interrogation of passive surface acoustic wave (SAW) radiofrequency identification (RFID) sensor tags affixed to each object. The system is being studied for application on the lunar surface as well as for terrestrial remote sensing applications such as pre-launch monitoring and testing of spacecraft on the launch pad and monitoring of test facilities. The system utilizes a digitally beam-formed planar receiving antenna array to extend range and provide direction-of-arrival information coupled with an approximate maximum-likelihood signal processing algorithm to provide near-optimal estimation of both range and temperature. The system is capable of forming a large number of beams within the field of view and resolving the information from several tags within each beam. The combination of both spatial and waveform discrimination provides the capability to track and monitor telemetry from a large number of objects appearing simultaneously within the field of view of the receiving array. In the presentation, we will summarize the system design and illustrate several aspects of the operational characteristics and signal structure. We will examine the theoretical performance characteristics of the system and compare the theoretical results with results obtained from experiments in both controlled laboratory environments and in the field.

  17. RFID Torque Sensing Tag System for Fasteners

    Science.gov (United States)

    Fink, Patrick W. (Inventor); Lin, Gregory Y. (Inventor); Ngo, Phong H. (Inventor); Kennedy, Timothy F. (Inventor)

    2016-01-01

    The present invention provides an RFID-based torque sensor that can be used to quickly monitor off the shelf fasteners including fasteners that are used in expensive satellites or other uses where fastener failure can be very costly. In one embodiment, an antenna, RFID ring and spring comprise a sensor tag that can be interrogated with an interrogation signal produced by an interrogator device. When sufficient torque is applied to the fastener, an RFID circuit is connected, and produces a radio frequency (RF) signal that can be read by the interrogator. In one embodiment, the RFID circuit does not transmit when the spring member is not compressed, thereby indicating insufficient tensioning of the fastener. The present invention offers the ability to remotely, quickly, and inexpensively verify that any number of fasteners are torqued properly upon initial installation. Where applicable, the present invention allows low cost monitoring over the life of the fastener.

  18. Antenna for passive RFID tags

    Science.gov (United States)

    Schiopu, Paul; Manea, Adrian; Cristea, Ionica; Grosu, Neculai; Vladescu, Marian; Craciun, Anca-Ileana; Craciun, Alexandru

    2015-02-01

    Minuscule devices, called RFID tags are attached to objects and persons and emit information which positioned readers may capture wirelessly. Many methods of identification have been used, but that of most common is to use a unique serial number for identification of person or object. RFID tags can be characterized as either active or passive [1,2]. Traditional passive tags are typically in "sleep" state until awakened by the reader's emitted field. In passive tags, the reader's field acts to charge the capacitor that powers the badge and this can be a combination of antenna and barcodes obtained with SAW( Surface Acoustic Wave) devices [1,2,3] . The antenna in an RFID tag is a conductive element that permits the tag to exchange data with the reader. The paper contribution are targeted to antenna for passive RFID tags. The electromagnetic field generated by the reader is somehow oriented by the reader antenna and power is induced in the tag only if the orientation of the tag antenna is appropriate. A tag placed orthogonal to the reader yield field will not be read. This is the reason that guided manufacturers to build circular polarized antenna capable of propagating a field that is alternatively polarized on all planes passing on the diffusion axis. Passive RFID tags are operated at the UHF frequencies of 868MHz (Europe) and 915MHz (USA) and at the microwave frequencies of 2,45 GHz and 5,8 GHz . Because the tags are small dimensions, in paper, we present the possibility to use circular polarization microstrip antenna with fractal edge [2].

  19. Integration of RFID and Wireless Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    Miodrag; Bolic; Amiya; Nayak; Ivan; Stojmenovi.

    2007-01-01

    Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) are two important wireless technologies that have wide variety of applications and provide limitless future potentials. However,RFID and sensor networks almost are under development in parallel way. Integration of RFID and wireless sensor networks attracts little attention from research community. This paper first presents a brief introduction on RFID,and then investigates recent research works,new products/patents and applications that integrate RFID with sensor networks. Four types of integration are discussed. They are integrating tags with sensors,integrating tags with wireless sensor nodes,integrating readers with wireless sensor nodes and wire-less devices,and mix of RFID and sensors. New challenges and future works are discussed in the end.

  20. Compact RFID Enabled Moisture Sensor

    Directory of Open Access Journals (Sweden)

    U. H. Khan

    2016-09-01

    Full Text Available This research proposes a novel, low-cost RFID tag sensor antenna implemented using commercially available Kodak photo-paper. The aim of this paper is to investigate the possibility of stable, RFID centric communication under varying moisture levels. Variation in the frequency response of the RFID tag in presence of moisture is used to detect different moisture levels. Combination of unique jaw shaped contours and T-matching network is used for impedance matching which results in compact size and minimal ink consumption. Proposed tag is 1.4 × 9.4 cm2 in size and shows optimum results for various moisture levels upto 45% in FCC band with a bore sight read range of 12.1 m.

  1. Clone tag detection in distributed RFID systems

    Science.gov (United States)

    Kamaludin, Hazalila; Mahdin, Hairulnizam

    2018-01-01

    Although Radio Frequency Identification (RFID) is poised to displace barcodes, security vulnerabilities pose serious challenges for global adoption of the RFID technology. Specifically, RFID tags are prone to basic cloning and counterfeiting security attacks. A successful cloning of the RFID tags in many commercial applications can lead to many serious problems such as financial losses, brand damage, safety and health of the public. With many industries such as pharmaceutical and businesses deploying RFID technology with a variety of products, it is important to tackle RFID tag cloning problem and improve the resistance of the RFID systems. To this end, we propose an approach for detecting cloned RFID tags in RFID systems with high detection accuracy and minimal overhead thus overcoming practical challenges in existing approaches. The proposed approach is based on consistency of dual hash collisions and modified count-min sketch vector. We evaluated the proposed approach through extensive experiments and compared it with existing baseline approaches in terms of execution time and detection accuracy under varying RFID tag cloning ratio. The results of the experiments show that the proposed approach outperforms the baseline approaches in cloned RFID tag detection accuracy. PMID:29565982

  2. Clone tag detection in distributed RFID systems.

    Science.gov (United States)

    Kamaludin, Hazalila; Mahdin, Hairulnizam; Abawajy, Jemal H

    2018-01-01

    Although Radio Frequency Identification (RFID) is poised to displace barcodes, security vulnerabilities pose serious challenges for global adoption of the RFID technology. Specifically, RFID tags are prone to basic cloning and counterfeiting security attacks. A successful cloning of the RFID tags in many commercial applications can lead to many serious problems such as financial losses, brand damage, safety and health of the public. With many industries such as pharmaceutical and businesses deploying RFID technology with a variety of products, it is important to tackle RFID tag cloning problem and improve the resistance of the RFID systems. To this end, we propose an approach for detecting cloned RFID tags in RFID systems with high detection accuracy and minimal overhead thus overcoming practical challenges in existing approaches. The proposed approach is based on consistency of dual hash collisions and modified count-min sketch vector. We evaluated the proposed approach through extensive experiments and compared it with existing baseline approaches in terms of execution time and detection accuracy under varying RFID tag cloning ratio. The results of the experiments show that the proposed approach outperforms the baseline approaches in cloned RFID tag detection accuracy.

  3. Using Interference to Block RFID Tags

    DEFF Research Database (Denmark)

    Krigslund, Rasmus; Popovski, Petar; Pedersen, Gert Frølund

    We propose a novel method to block RFID tags from responding, using intentional interference. We focus on the experimental evaluation, where we impose interference on the download and uplink, respectively. The results are positive, where modulated CCI shows most effective to block a tag.......We propose a novel method to block RFID tags from responding, using intentional interference. We focus on the experimental evaluation, where we impose interference on the download and uplink, respectively. The results are positive, where modulated CCI shows most effective to block a tag....

  4. Secure passive RFID tag with seal

    Science.gov (United States)

    Nekoogar, Faranak; Reynolds, Matthew; Lefton, Scott; Dowla, Farid; Twogood, Richard

    2017-11-14

    A secure passive RFID tag system comprises at least one base station and at least one passive RFID tag. The tag includes a fiber optic cable with the cable ends sealed within the tag and the middle portion forming an external loop. The loop may be secured to at least portions of an object. The tag transmits and receives an optical signal through the fiber optic cable, and the cable is configured to be damaged or broken in response to removal or tampering attempts, wherein the optical signal is significantly altered if the cable is damaged or broken. The tag transmits the optical signal in response to receiving a radio signal from the base station and compares the transmitted optical signal to the received optical signal. If the transmitted optical signal and the received optical signal are identical, the tag transmits an affirmative radio signal to the base station.

  5. Passive UHF RFID Tag with Multiple Sensing Capabilities

    Directory of Open Access Journals (Sweden)

    José Fernández-Salmerón

    2015-10-01

    Full Text Available This work presents the design, fabrication, and characterization of a printed radio frequency identification tag in the ultra-high frequency band with multiple sensing capabilities. This passive tag is directly screen printed on a cardboard box with the aim of monitoring the packaging conditions during the different stages of the supply chain. This tag includes a commercial force sensor and a printed opening detector. Hence, the force applied to the package can be measured as well as the opening of the box can be detected. The architecture presented is a passive single-chip RFID tag. An electronic switch has been implemented to be able to measure both sensor magnitudes in the same access without including a microcontroller or battery. Moreover, the chip used here integrates a temperature sensor and, therefore, this tag provides three different parameters in every reading.

  6. A passive UHF RFID tag chip with a dual-resolution temperature sensor in a 0.18 μm standard CMOS process

    International Nuclear Information System (INIS)

    Feng Peng; Zhang Qi; Wu Nanjian

    2011-01-01

    This paper presents a passive EPC Gen-2 UHF RFID tag chip with a dual-resolution temperature sensor. The chip tag integrates a temperature sensor, an RF/analog front-end circuit, an NVM memory and a digital baseband in a standard CMOS process. The sensor with a low power sigma—delta (ΣΔ) ADC is designed to operate in low and high resolution modes. It can not only achieve the target accuracy but also reduce the power consumption and the sensing time. A CMOS-only RF rectifier and a single-poly non-volatile memory (NVM) are designed to realize a low cost tag chip. The 192-bit-NVM tag chip with an area of 1 mm 2 is implemented in a 0.18-μm standard CMOS process. The sensitivity of the tag is −10.7 dBm/−8.4 dBm when the sensor is disabled/enabled. It achieves a maximum reading/sensing distance of 4 m/3.1 m at 2 W EIRP. The inaccuracy of the sensor is −0.6 °C/0.5 °C (−1.0 °C/1.2 °C) in the operating range from 5 to 15 °C in high resolution mode (−30 to 50 °C in low resolution mode). The resolution of the sensor achieves 0.02 °C (0.18 °C) in high (low) resolution mode. (semiconductor integrated circuits)

  7. Fully Printed Flexible Single-Chip RFID Tag with Light Detection Capabilities

    Directory of Open Access Journals (Sweden)

    Aniello Falco

    2017-03-01

    Full Text Available A printed passive radiofrequency identification (RFID tag in the ultra-high frequency band for light and temperature monitoring is presented. The whole tag has been manufactured by printing techniques on a flexible substrate. Antenna and interconnects are realized with silver nanoparticles via inkjet printing. A sprayed photodetector performs the light monitoring, whereas temperature measurement comes from an in-built sensor in the silicon RFID chip. One of the advantages of this system is the digital read-out and transmission of the sensors information on the RFID tag that ensures reliability. Furthermore, the use of printing techniques allows large-scale manufacturing and the direct fabrication of the tag on the desired surface. This work proves for the first time the feasibility of the embedment of large-scale organic photodetectors onto inkjet printed RFID tags. Here, we solve the problem of integration of different manufacturing techniques to develop an optimal final sensor system.

  8. A Review of Implementing ADC in RFID Sensor

    Directory of Open Access Journals (Sweden)

    M. Zurita

    2016-01-01

    Full Text Available The general considerations to design a sensor interface for passive RFID tags are discussed. This way, power and timing constraints imposed by ISO/IEC 15693 and ISO/IEC 14443 standards to HF RFID tags are explored. A generic multisensor interface is proposed and a survey analysis on the most suitable analog-to-digital converters for passive RFID sensing applications is reported. The most appropriate converter type and architecture are suggested. At the end, a specific sensor interface for carbon nanotube gas sensors is proposed and a brief discussion about its implemented circuits and preliminary results is made.

  9. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    OpenAIRE

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an active mobile device to enforce centralized ACL-based access control policies. Selective RFID Jamming also solves a Differential Signal Analysis attack to which the RFID Blocker Tag is susceptible.

  10. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    NARCIS (Netherlands)

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an

  11. Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags

    NARCIS (Netherlands)

    Rieback, M.R.; Crispo, B.; Tanenbaum, A.S.

    2005-01-01

    This paper introduces an off-tag RFID access control mechanism called "Selective RFID Jamming". Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an

  12. Ethical implications of implantable radiofrequency identification (RFID) tags in humans.

    Science.gov (United States)

    Foster, Kenneth R; Jaeger, Jan

    2008-08-01

    This article reviews the use of implantable radiofrequency identification (RFID) tags in humans, focusing on the VeriChip (VeriChip Corporation, Delray Beach, FL) and the associated VeriMed patient identification system. In addition, various nonmedical applications for implanted RFID tags in humans have been proposed. The technology offers important health and nonhealth benefits, but raises ethical concerns, including privacy and the potential for coercive implantation of RFID tags in individuals. A national discussion is needed to identify the limits of acceptable use of implantable RFID tags in humans before their use becomes widespread and it becomes too late to prevent misuse of this useful but ethically problematic technology.

  13. Security in RFID and sensor networks

    CERN Document Server

    Kitsos, Paris

    2009-01-01

    Security in RFIDMulti-Tag RFID Systems, L. Bolotnyy and G. RobinsAttacking RFID Systems, P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. RibagordaRFID Relay Attacks: System Analysis,Modeling, and Implementation, A. Lima, A. Miri, and M. NevinsPhysical Privacy and Security in RFID Systems, L. Bolotnyy and G. RobinsAuthentication Protocols in RFID Systems, G. Pantelic, S. Bojanic, and V. TomaševicLightweight Cryptography for Low-Cost RFID Tags, P. Peris-Lopez, J.C.

  14. Managing RFID Sensors Networks with a General Purpose RFID Middleware

    Science.gov (United States)

    Abad, Ismael; Cerrada, Carlos; Cerrada, Jose A.; Heradio, Rubén; Valero, Enrique

    2012-01-01

    RFID middleware is anticipated to one of the main research areas in the field of RFID applications in the near future. The Data EPC Acquisition System (DEPCAS) is an original proposal designed by our group to transfer and apply fundamental ideas from System and Data Acquisition (SCADA) systems into the areas of RFID acquisition, processing and distribution systems. In this paper we focus on how to organize and manage generic RFID sensors (edge readers, readers, PLCs, etc…) inside the DEPCAS middleware. We denote by RFID Sensors Networks Management (RSNM) this part of DEPCAS, which is built on top of two new concepts introduced and developed in this work: MARC (Minimum Access Reader Command) and RRTL (RFID Reader Topology Language). MARC is an abstraction layer used to hide heterogeneous devices inside a homogeneous acquisition network. RRTL is a language to define RFID Reader networks and to describe the relationship between them (concentrator, peer to peer, master/submaster). PMID:22969370

  15. RFID Label Tag Design for Metallic Surface Environments

    Directory of Open Access Journals (Sweden)

    Ki Hwan Eom

    2011-01-01

    Full Text Available This paper describes a metal mount RFID tag that works reliably on metallic surfaces. The method proposes the use of commercial label type RFID tags with 2.5 mm thick Styrofoam103.7 with a relative permittivity of 1.03 attached on the back of the tag. In order to verify the performance of the proposed method, we performed experiments on an electric transformer supply chain system. The experimental results showed that the proposed tags can communicate with readers from a distance of 2 m. The recognition rates are comparable to those of commercial metallic mountable tags.

  16. Lightweight Cryptography for Passive RFID Tags

    DEFF Research Database (Denmark)

    David, Mathieu

    2012-01-01

    were mostly unsatisfactory. As a conclusion, a new branch of cryptography, commonly called Lightweight Cryptography, emerged to address the issues of these tiny ubiquitous devices. This Thesis presents a comprehensive engineering to lightweight cryptography, proposes a classification and explores its...... various ramifications by giving key examples in each of them. We select two of these branches, ultralightweight cryptography and symmetric-key cryptography, and propose a cryptographic primitive in each of them. In the case of symmetric-key cryptography, we propose a stream cipher that has a footprint...... of an integrator for a particular application. Finally, we conclude that the research for finding robust cryptographic primitive in the branch of lightweight cryptography still has some nice days ahead, and that providing a secure cryptosystem for printed electronics RFID tags remains an open research topic....

  17. Exploiting phase measurements of EPC Gen2 RFID tags

    NARCIS (Netherlands)

    Huiting, J.; Flisijn, Hubert; Kokkeler, Andre B.J.; Smit, Gerardus Johannes Maria

    2013-01-01

    This paper presents a 2d localization system for UHF RFID tags. By measuring the phase between the transmitted continuous wave and received backscatter from the tag at different frequencies, it is possible to estimate the distance between the reader and tag. By determining distance estimates to

  18. Low Cost Writeable RFID Tag With MRAM Memory

    National Research Council Canada - National Science Library

    Beech, Russell

    1998-01-01

    This program's goal was to develop a writeable RFID tag using an integrated, permeable core coil as the inductor/antenna for communication and power transfer and MRAM as the low write energy, nonvolatile memory...

  19. Improved Kalman Filter Method for Measurement Noise Reduction in Multi Sensor RFID Systems

    OpenAIRE

    Eom, Ki Hwan; Lee, Seung Joon; Kyung, Yeo Sun; Lee, Chang Won; Kim, Min Chul; Jung, Kyung Kwon

    2011-01-01

    Recently, the range of available Radio Frequency Identification (RFID) tags has been widened to include smart RFID tags which can monitor their varying surroundings. One of the most important factors for better performance of smart RFID system is accurate measurement from various sensors. In the multi-sensing environment, some noisy signals are obtained because of the changing surroundings. We propose in this paper an improved Kalman filter method to reduce noise and obtain correct data. Perf...

  20. Compact Public-Key Implementations for RFID and Sensor Nodes

    Science.gov (United States)

    Batina, Lejla; Sakiyama, Kazuo; Verbauwhede, Ingrid M. R.

    Embedded systems have become extremely important and new applications are taking a larger portion of the market every day. Radio frequency identification (RFID) tags and sensor nodes are recent and challenging examples and they imply very low budgets for the number of gates, power, bandwidth, etc. while they often require security solutions.

  1. Passive UHF RFID Tag for Multispectral Assessment

    Directory of Open Access Journals (Sweden)

    Pablo Escobedo

    2016-07-01

    Full Text Available This work presents the design, fabrication, and characterization of a passive printed radiofrequency identification tag in the ultra-high-frequency band with multiple optical sensing capabilities. This tag includes five photodiodes to cover a wide spectral range from near-infrared to visible and ultraviolet spectral regions. The tag antenna and circuit connections have been screen-printed on a flexible polymeric substrate. An ultra-low-power microcontroller-based switch has been included to measure the five magnitudes issuing from the optical sensors, providing a spectral fingerprint of the incident electromagnetic radiation from ultraviolet to infrared, without requiring energy from a battery. The normalization procedure has been designed applying illuminants, and the entire system was tested by measuring cards from a colour chart and sensing fruit ripening.

  2. Theory and experiments on Peano and Hilbert curve RFID tags

    Science.gov (United States)

    McVay, John; Hoorfar, Ahmad; Engheta, Nader

    2006-05-01

    Recently, there has been considerable interest in the area of Radio Frequency Identification (RFID) and Radio Frequency Tagging (RFTAG). This emerging area of interest can be applied for inventory control (commercial) as well as friend/foe identification (military) to name but a few. The current technology can be broken down into two main groups, namely passive and active RFID tags. Utilization of Space-Filling Curve (SFC) geometries, such as the Peano and Hilbert curves, has been recently investigated for use in completely passive RFID applications [1, 2]. In this work, we give an overview of our work on the space-filling curves and the potential for utilizing the electrically small, resonant characteristics of these curves for use in RFID technologies with an emphasis on the challenging issues involved when attempting to tag conductive objects. In particular, we investigate the possible use of these tags in conjunction with high impedance ground-planes made of Hilbert or Peano curve inclusions [3, 4] to develop electrically small RFID tags that may also radiate efficiently, within close proximity of large conductive objects [5].

  3. Managing RFID Sensors Networks with a General Purpose RFID Middleware

    Directory of Open Access Journals (Sweden)

    Enrique Valero

    2012-06-01

    Full Text Available RFID middleware is anticipated to one of the main research areas in the field of RFID applications in the near future. The Data EPC Acquisition System (DEPCAS is an original proposal designed by our group to transfer and apply fundamental ideas from System and Data Acquisition (SCADA systems into the areas of RFID acquisition, processing and distribution systems. In this paper we focus on how to organize and manage generic RFID sensors (edge readers, readers, PLCs, etc… inside the DEPCAS middleware. We denote by RFID Sensors Networks Management (RSNM this part of DEPCAS, which is built on top of two new concepts introduced and developed in this work: MARC (Minimum Access Reader Command and RRTL (RFID Reader Topology Language. MARC is an abstraction layer used to hide heterogeneous devices inside a homogeneous acquisition network. RRTL is a language to define RFID Reader networks and to describe the relationship between them (concentrator, peer to peer, master/submaster.

  4. Tag-to-Tag Interference Suppression Technique Based on Time Division for RFID

    Directory of Open Access Journals (Sweden)

    Grishma Khadka

    2017-01-01

    Full Text Available Radio-frequency identification (RFID is a tracking technology that enables immediate automatic object identification and rapid data sharing for a wide variety of modern applications using radio waves for data transmission from a tag to a reader. RFID is already well established in technical areas, and many companies have developed corresponding standards and measurement techniques. In the construction industry, effective monitoring of materials and equipment is an important task, and RFID helps to improve monitoring and controlling capabilities, in addition to enabling automation for construction projects. However, on construction sites, there are many tagged objects and multiple RFID tags that may interfere with each other’s communications. This reduces the reliability and efficiency of the RFID system. In this paper, we propose an anti-collision algorithm for communication between multiple tags and a reader. In order to suppress interference signals from multiple neighboring tags, the proposed algorithm employs the time-division (TD technique, where tags in the interrogation zone are assigned a specific time slot so that at every instance in time, a reader communicates with tags using the specific time slot. We present representative computer simulation examples to illustrate the performance of the proposed anti-collision technique for multiple RFID tags.

  5. Orientation Sensing Using Multiple Passive RFID Tags

    DEFF Research Database (Denmark)

    Krigslund, Rasmus; Popovski, Petar; Pedersen, Gert Frølund

    2012-01-01

    Knowing the inclination of an object can be valuable information in a supply chain application, e.g. when handling orientation sensitive objects. In this work we present a method for sensing the inclination using Radio Frequency IDentification (RFID) technology. The method requires standard RFID...

  6. Passively Powered and Programmable Sensor-RFID for ISHM Systems, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — To date there are several approaches for incorporating sensing capabilities into RFID. Active tags use batteries to power their communication circuitry, sensors, and...

  7. Passively Powered and Programmable Sensor-RFID for ISHM Systems, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — To date there are several approaches for incorporating sensing capabilities into RFID. Active tags use batteries to power their communication circuitry, sensors, and...

  8. 48 CFR 552.211-92 - Radio Frequency Identification (RFID) using passive tags.

    Science.gov (United States)

    2010-10-01

    ... Identification (RFID) using passive tags. 552.211-92 Section 552.211-92 Federal Acquisition Regulations System... Provisions and Clauses 552.211-92 Radio Frequency Identification (RFID) using passive tags. As prescribed in 511.204(b)(11), insert the following clause: Radio Frequency Identification (RFID) Using Passive Tags...

  9. Examining the Effectiveness of Hacked, Commercial, Self-Tuning RFID Tags to Passively Sense the Volumetric Water Content of Soil

    Science.gov (United States)

    Stoddard, B. S.; Udell, C.; Selker, J. S.

    2017-12-01

    Currently available soil volumetric water content (VWC) sensors have several drawbacks that pose certain challenges for implementation on large scale for farms. Such issues include cost, scalability, maintenance, wires running through fields, and single-spot resolution. The development of a passive soil moisture sensing system utilizing Radio Frequency Identification (RFID) would allay many of these issues. The type of passive RFID tags discussed in this paper currently cost between 8 to 15 cents retail per tag when purchased in bulk. An incredibly cheap, scalable, low-maintenance, wireless, high-resolution system for sensing soil moisture would be possible if such tags were introduced into the agricultural world. This paper discusses both the use cases as well as examines one implementation of the tags. In 2015, RFID tag manufacturer SmarTrac started selling RFID moisture sensing tags for use in the automotive industry to detect leaks during quality assurance. We place those tags in soil at a depth of 4 inches and compared the moisture levels sensed by the RFID tags with the relative permittivity (ɛr) of the soil as measured by an industry-standard probe. Using an equation derived by Topp et al, we converted to VWC. We tested this over a wide range of moisture conditions and found a statistically significant, correlational relationship between the sensor values from the RFID tags and the probe's measurement of ɛr. We also identified a possible function for mapping vales from the RFID tag to the probe bounded by a reasonable margin of error.

  10. A Privacy Model for RFID Tag Ownership Transfer

    Directory of Open Access Journals (Sweden)

    Xingchun Yang

    2017-01-01

    Full Text Available The ownership of RFID tag is often transferred from one owner to another in its life cycle. To address the privacy problem caused by tag ownership transfer, we propose a tag privacy model which captures the adversary’s abilities to get secret information inside readers, to corrupt tags, to authenticate tags, and to observe tag ownership transfer processes. This model gives formal definitions for tag forward privacy and backward privacy and can be used to measure the privacy property of tag ownership transfer scheme. We also present a tag ownership transfer scheme, which is privacy-preserving under the proposed model and satisfies the other common security requirements, in addition to achieving better performance.

  11. The Study on Using Passive RFID Tags for Indoor Positioning

    Directory of Open Access Journals (Sweden)

    S.L. Ting

    2011-02-01

    Full Text Available Radio frequency identification (RFID is the technology that put an RFID tag on objects or people, so that they can be identified, tracked, and managed automatically. With its wide application in the automobile assembly industry, warehouse management and the supply chain network, RFID has been recognized as the next promising technology in serving the positioning purpose. Existing positioning technologies such as GPS are not available indoors as the terminal cannot get the signal from satellites. To enhance the availability of the positioning systems for indoors, the development of RFID positioning system for locating objects or people have became a hot topic in recent research. Compared with conventional active and high‐cost solutions, this paper studied the feasibility of using passive RFID tags for indoor positioning and object location detection to provide real time information for tracking movement. Results of experiment show that readability of the passive RFID positioning system is satisfactory, and it is a more cost effective solution when compared with other positioning technologies.

  12. Gas Identification Using Passive UHF RFID Sensor Platform

    Directory of Open Access Journals (Sweden)

    Muhammad Ali AKBAR

    2015-11-01

    Full Text Available The concept of passive Radio Frequency Identification (RFID sensor tag is introduced to remove the dependency of current RFID platforms on battery life. In this paper, a gas identification system is presented using passive RFID sensor tag along with the processing unit. The RFID system is compliant to Electronics Product Code Generation 2 (EPC-Gen2 protocol in 902-928 MHz ISM band. Whereas the processing unit is implemented and analyzed in software and hardware platforms. The software platform uses MATLAB, whereas a High Level Synthesis (HLS tool is used to implement the processing unit on a Zynq platform. Moreover, two sets of different gases are used along with Principal Component Analysis (PCA and Linear Discriminant Analysis (LDA based feature reduction approaches to analyze in detail the best feature reduction approach for efficient classification of gas data. It is found that for the first set of gases, 90 % gases are identified using first three principal components, which is 7 % more efficient than LDA. However in terms of hardware overhead, LDA requires 50 % less hardware resources than PCA. The classification results for the second set of gases reveal that 91 % of gas classification is obtained using LDA and first four PCA, while LDA requires 52 % less hardware resources than PCA. The RFID tag used for transmission is implemented in 0.13 µm CMOS process, with simulated average power consumption of 2.6 µW from 1.2 V supply. ThingMagic M6e embedded reader is used for RFID platform implementation. It shows an output power of 31.5 dBm which allows a read range up to 9 meters.

  13. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications.

    Science.gov (United States)

    Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Suárez-Albela, Manuel; Castedo, Luis

    2016-12-24

    The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3) to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol.

  14. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications

    Directory of Open Access Journals (Sweden)

    Tiago M. Fernández-Caramés

    2016-12-01

    Full Text Available The Internet of Things (IoT is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification, which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3 to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol.

  15. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications

    Science.gov (United States)

    Fernández-Caramés, Tiago M.; Fraga-Lamas, Paula; Suárez-Albela, Manuel; Castedo, Luis

    2016-01-01

    The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3) to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol. PMID:28029119

  16. WebTag: Web browsing into sensor tags over NFC.

    Science.gov (United States)

    Echevarria, Juan Jose; Ruiz-de-Garibay, Jonathan; Legarda, Jon; Alvarez, Maite; Ayerbe, Ana; Vazquez, Juan Ignacio

    2012-01-01

    Information and Communication Technologies (ICTs) continue to overcome many of the challenges related to wireless sensor monitoring, such as for example the design of smarter embedded processors, the improvement of the network architectures, the development of efficient communication protocols or the maximization of the life cycle autonomy. This work tries to improve the communication link of the data transmission in wireless sensor monitoring. The upstream communication link is usually based on standard IP technologies, but the downstream side is always masked with the proprietary protocols used for the wireless link (like ZigBee, Bluetooth, RFID, etc.). This work presents a novel solution (WebTag) for a direct IP based access to a sensor tag over the Near Field Communication (NFC) technology for secure applications. WebTag allows a direct web access to the sensor tag by means of a standard web browser, it reads the sensor data, configures the sampling rate and implements IP based security policies. It is, definitely, a new step towards the evolution of the Internet of Things paradigm.

  17. RFID sensors as the common sensing platform for single-use biopharmaceutical manufacturing

    International Nuclear Information System (INIS)

    Potyrailo, Radislav A; Surman, Cheryl; Monk, David; Morris, William G; Wortley, Timothy; Vincent, Mark; Diana, Rafael; Pizzi, Vincent; Carter, Jeffrey; Gach, Gerard; Klensmeden, Staffan; Ehring, Hanno

    2011-01-01

    The lack of reliable single-use sensors prevents the biopharmaceutical industry from fully embracing single-use biomanufacturing processes. Sensors based on the same detection platform for all critical parameters in single-use bioprocess components would be highly desirable to significantly simplify their installation, calibration and operation. We review here our approach for passive radio-frequency identification (RFID)-based sensing that does not rely on costly proprietary RFID memory chips with an analog input but rather implements ubiquitous passive 13.56 MHz RFID tags as inductively coupled sensors with at least 16 bit resolution provided by a sensor reader. The developed RFID sensors combine several measured parameters from the resonant sensor antenna with multivariate data analysis and deliver unique capability of multiparameter sensing and rejection of environmental interferences with a single sensor. This general sensing approach provides an elegant solution for both analytical measurement and identification and documentation of the measured location. (topical review)

  18. Ultra Wide Band RFID Neutron Tags for Nuclear Materials Monitoring

    International Nuclear Information System (INIS)

    Nekoogar, F.; Dowla, F.; Wang, T.

    2010-01-01

    Recent advancements in the ultra-wide band Radio Frequency Identification (RFID) technology and solid state pillar type neutron detectors have enabled us to move forward in combining both technologies for advanced neutron monitoring. The LLNL RFID tag is totally passive and will operate indefinitely without the need for batteries. The tag is compact, can be directly mounted on metal, and has high performance in dense and cluttered environments. The LLNL coin-sized pillar solid state neutron detector has achieved a thermal neutron detection efficiency of 20% and neutron/gamma discrimination of 1E5. These performance values are comparable to a fieldable 3 He based detector. In this paper we will discuss features about the two technologies and some potential applications for the advanced safeguarding of nuclear materials.

  19. Bidirectional communication in an HF hybrid organic/solution-processed metal-oxide RFID tag

    NARCIS (Netherlands)

    Myny, K.; Rockelé, M.; Chasin, A.; Pham, D.V.; Steiger, J.; Botnaras, S.; Weber, D.; Herold, B.; Ficker, J.; Van Putten, B.D.; Gelinck, G.H.; Genoe, J.; Dehaene, W.; Heremans, P.

    2014-01-01

    A bidirectional communication protocol allows radio-frequency identification (RFID) tags to have readout of multiple tags in the RF field without collision of data. In this paper, we realized bidirectional communication between a reader system and thin-film RFID tag by introducing a novel protocol

  20. Locatable-body temperature monitoring based on semi-active UHF RFID tags.

    Science.gov (United States)

    Liu, Guangwei; Mao, Luhong; Chen, Liying; Xie, Sheng

    2014-03-26

    This paper presents the use of radio-frequency identification (RFID) technology for the real-time remote monitoring of body temperature, while an associated program can determine the location of the body carrying the respective sensor. The RFID chip's internal integrated temperature sensor is used for both the human-body temperature detection and as a measurement device, while using radio-frequency communication to broadcast the temperature information. The adopted RFID location technology makes use of reference tags together with a nearest neighbor localization algorithm and a multiple-antenna time-division multiplexing location system. A graphical user interface (GUI) was developed for collecting temperature and location data for the data fusion by using RFID protocols. With a puppy as test object, temperature detection and localization experiments were carried out. The measured results show that the applied method, when using a mercury thermometer for comparison in terms of measuring the temperature of the dog, has a good consistency, with an average temperature error of 0.283 °C. When using the associated program over the area of 12.25 m2, the average location error is of 0.461 m, which verifies the feasibility of the sensor-carrier location by using the proposed program.

  1. Locatable-Body Temperature Monitoring Based on Semi-Active UHF RFID Tags

    Directory of Open Access Journals (Sweden)

    Guangwei Liu

    2014-03-01

    Full Text Available This paper presents the use of radio-frequency identification (RFID technology for the real-time remote monitoring of body temperature, while an associated program can determine the location of the body carrying the respective sensor. The RFID chip’s internal integrated temperature sensor is used for both the human-body temperature detection and as a measurement device, while using radio-frequency communication to broadcast the temperature information. The adopted RFID location technology makes use of reference tags together with a nearest neighbor localization algorithm and a multiple-antenna time-division multiplexing location system. A graphical user interface (GUI was developed for collecting temperature and location data for the data fusion by using RFID protocols. With a puppy as test object, temperature detection and localization experiments were carried out. The measured results show that the applied method, when using a mercury thermometer for comparison in terms of measuring the temperature of the dog, has a good consistency, with an average temperature error of 0.283 °C. When using the associated program over the area of 12.25 m2, the average location error is of 0.461 m, which verifies the feasibility of the sensor-carrier location by using the proposed program.

  2. Design of an Elliptic Curve Cryptography processor for RFID tag chips.

    Science.gov (United States)

    Liu, Zilong; Liu, Dongsheng; Zou, Xuecheng; Lin, Hui; Cheng, Jian

    2014-09-26

    Radio Frequency Identification (RFID) is an important technique for wireless sensor networks and the Internet of Things. Recently, considerable research has been performed in the combination of public key cryptography and RFID. In this paper, an efficient architecture of Elliptic Curve Cryptography (ECC) Processor for RFID tag chip is presented. We adopt a new inversion algorithm which requires fewer registers to store variables than the traditional schemes. A new method for coordinate swapping is proposed, which can reduce the complexity of the controller and shorten the time of iterative calculation effectively. A modified circular shift register architecture is presented in this paper, which is an effective way to reduce the area of register files. Clock gating and asynchronous counter are exploited to reduce the power consumption. The simulation and synthesis results show that the time needed for one elliptic curve scalar point multiplication over GF(2163) is 176.7 K clock cycles and the gate area is 13.8 K with UMC 0.13 μm Complementary Metal Oxide Semiconductor (CMOS) technology. Moreover, the low power and low cost consumption make the Elliptic Curve Cryptography Processor (ECP) a prospective candidate for application in the RFID tag chip.

  3. Read Range Enhancement of a Sensing RFID Tag by Photovoltaic Panel

    Directory of Open Access Journals (Sweden)

    B. Molina-Farrugia

    2017-01-01

    Full Text Available An RFID tag with energy harvesting and sensing capabilities is presented in this paper. This RFID tag is based on an integrated circuit (SL900A that incorporates a sensor front-end interface capable of measuring voltages, currents, resistances, and capacitances. The aim of this work is to improve the communication distance from the reader to the tag using energy harvesting techniques. Once the energy source and harvester are chosen according to the environment of work, the conditioning circuit for energy management has to be appropriately designed with respect to the nature of the transductor. As a proof of concept, a photovoltaic panel is used in this work to collect the energy from the environment that is managed by a DC-DC converter and stored in a capacitor acting as battery. Such energy is used to support the power system of the tag, giving autonomy to the device and allowing data logging. In particular, the developed tag monitors the ambient temperature and the power voltage. It would be possible to add external sensors without changing the architecture. An increase in the read range of more than 200% is demonstrated. This feature is especially interesting in environments where the access could be difficult.

  4. Continuous Tracking of RFID Tagged Radioactive Sources

    International Nuclear Information System (INIS)

    Broide, A.; Marcus, E.; Gabay, Y.; Miron, E.; Seif, R.; Wengrowicz, U.; Kadmon, Y.; Tirosh, D.

    2008-01-01

    The prevention of radiation hazards due to radioisotopes is one of the concerns of the Atomic Energy Agency (IAEA). In a series of international conferences held in the last five years) this issue was discussed thoroughly. One of the conclusions was that strict management of radioactive sources is essential. The management of radioactive sources would help to prevent transference of radioactive materials to unauthorized personal. For this purpose, states should make a concerted effort to follow the principles of the Code of Conduct on the Security of Radioactive Sources(2). In this context, the identification of roles and responsibilities of governments, licensees and international organizations is vital(3). The referred activities are primarily related to control over radioactive sources and enhance the tracking ability of radiation sources . In this paper, a proposed Radioactive Sources Tracking System is presented. This system facilitates real time monitoring capability of fixed and mobile radiation sources. The system provides the location of the source and indication whether the source is inside or outside the shielding container. The information about the sources location and condition can be used to coordinate a fast response in case of any attempt to steal or tamper with a source. These goals are achieved by using GPS (Global Positioning System), RFID (Radio Frequency Identification) and control and management software

  5. Perancangan Sistem Pintu Gerbang dengan Sensor Radio Frequency Identification (RFID menggunakan Metode Waterfall

    Directory of Open Access Journals (Sweden)

    Heru Adi Prasetyo

    2013-11-01

    Full Text Available Sistem monitoring pada pintu gerbang merupakan bagian yang penting dalam meningkatkan sistem keamanan. Teknologi yang cocok untuk diaplikasikan dipintu gerbang adalah teknologi RFID (Radio Frequency Identification, karena komunikasi antar tag  dengan RFID reader tidak memerlukan kontak langsung, sehingga cocok digunakan pada sistem yang berjalan secara otomatis. Tag RFID dipasang di kendaraan penghuni sebagai kendaraan yang terdaftar di sistem monitoring, sedangkan kendaraan tamu tidak memiliki tag. Model pengembangan perangkat lunak yang dipakai adalah model waterfall, yang terdiri atas analisis kebutuhan sistem, spesifikasi kebutuhan perangkat lunak, desain perangkat lunak (use case, diagram activity, class diagram, danentity relationship diagram, implementasi perangkat lunak (berupa penulisan kode dan implementasi client server, dan pengujian (pengujian alat, pengujian client server, pengujian user requirement, dan pengujian aplikasi. Hasil akhir penelitian ini adalah sistem pintu gerbang yang menggunakan RFID sebagai sensor kendaraan untuk memonitor kendaraan yang keluar masuk. Data kendaraan yang keluar masuk dikelola secara client server dengan antarmuka pengguna berupa aplikasi client server berbasis JAVA

  6. Enhanced Codeset Passive Wireless SAW Sensor-Tags and System, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — The proposed project will develop a set of at least 100 passive wireless surface acoustic wave (SAW) RFID sensor-tags for near-simultaneous remote monitoring of...

  7. UHF RFID tag implementation on cork substrate for wine bottle monitoring

    OpenAIRE

    Rima Martí, Sergi; Georgiadis, Apostolos

    2013-01-01

    Wine industry is starting to deploy RFID technology for production control, logistics or innovative marketing. However, identifying wine bottles is difficult due to the unfavorable material content for the operation of the antennas. The thesis consists on the implementation of a UHF RFID tag placed on cork substrate in order to provide a feasible way of identifying wine packaged bottle. The proposed RFID tag consists on a meandered line dipole antenna, designed to be conformed so that it can ...

  8. Design of a covert RFID tag network for target discovery and target information routing.

    Science.gov (United States)

    Pan, Qihe; Narayanan, Ram M

    2011-01-01

    Radio frequency identification (RFID) tags are small electronic devices working in the radio frequency range. They use wireless radio communications to automatically identify objects or people without the need for line-of-sight or contact, and are widely used in inventory tracking, object location, environmental monitoring. This paper presents a design of a covert RFID tag network for target discovery and target information routing. In the design, a static or very slowly moving target in the field of RFID tags transmits a distinct pseudo-noise signal, and the RFID tags in the network collect the target information and route it to the command center. A map of each RFID tag's location is saved at command center, which can determine where a RFID tag is located based on each RFID tag's ID. We propose the target information collection method with target association and clustering, and we also propose the information routing algorithm within the RFID tag network. The design and operation of the proposed algorithms are illustrated through examples. Simulation results demonstrate the effectiveness of the design.

  9. Interference Helps to Equalize the Read Range and Reduce False Positives of Passive RFID Tags

    DEFF Research Database (Denmark)

    Krigslund, Rasmus; Popovski, Petar; Pedersen, Gert Frølund

    2012-01-01

    In various applications of RFID systems a reader should reliably get the ID of the tags that are within a bounded proximity region, termed the interrogation zone. This gives rise to two types of errors 1) False Negative Detections (FNDs), when tags within the intended interrogation zone cannot...... interference enables design of well-defined interrogation zones for passive RFID systems....

  10. Some Fundamental Limits on SAW RFID Tag Information Capacity and Collision Resolution

    Science.gov (United States)

    Barton, Richard J.

    2013-01-01

    In this paper, we apply results from multi-user information theory to study the limits of information capacity and collision resolution for SAW RFID tags. In particular, we derive bounds on the achievable data rate per tag as a function of fundamental parameters such as tag time-bandwidth product, tag signal-to-noise ratio (SNR), and number of tags in the environment. We also discuss the implications of these bounds for tag waveform design and tag interrogation efficiency

  11. A Novel RFID EMSICC-based Chipless Tag

    Directory of Open Access Journals (Sweden)

    S. Sakouhi

    2017-04-01

    Full Text Available A new Radio Frequency Identification (RFID chipless tag based on the Substrate Integrated Waveguide (SIW technology is proposed in this paper. The tag highlights the importance of using such technologies allowing a surface miniaturization, a high Q-factor and an original shape. Thus, the novel design consists of an Eight-Mode Substrate Integrated Circular Cavity (EMSICC associated to an Ultra Wideband (UWB bowtie-shaped antenna. The EMSICC is realized by bisecting the Quarter Mode Substrate Integrated Circular Cavity (QMSICC into two parts, while preserving the same resonant frequency and the original electric field distribution. Further, the operating frequency band is from 5 GHz to 8 GHz within a compact area of 4.97 × 1.05 cm2. The proposed design is experimentally validated in the frequency domain.

  12. Fast polymer nanorectifiers for inductively coupled RFID tags

    International Nuclear Information System (INIS)

    Majewski, L.A.; Balocco, C.; King, R.; Whitelegg, S.; Song, A.M.

    2008-01-01

    In this article, an alternative approach to high switching speed organic rectifiers based on a semiconducting polymer, poly(dialkylquarterthiophene) (PQT-12) is demonstrated. It is shown that by using a linear array of polymer nanowires with intentionally broken symmetry, nanodevices displaying diode-like I/V characteristics can be obtained. The so-called self-switching devices (SSDs) are single-layered planar structures that can be easily fabricated in a single step of nanolithography. In addition, since SSD arrays possess substantially lower parasitic capacitance between contacts than conventional vertical organic diodes (VODs) and organic thin-film transistors (OTFTs), very high switching speeds may be achieved. As the result of this combination of favourable properties, we have demonstrated polymer nanorectifiers operating with frequencies well in excess of 1 MHz that have the potential to pave the way towards ultra low-cost radio frequency identification (RFID) tags

  13. A novel power amplifier structure for RFID tag applications

    International Nuclear Information System (INIS)

    Deng Jianbao; Zhang Shilin; Li De; Zhang Yanzheng; Mao Luhong; Xie Sheng

    2011-01-01

    A novel matching method between the power amplifier (PA) and antenna of an active or semi-active RFID tag is presented. A PCB dipole antenna is used as the resonance inductor of a differential power amplifier. The total PA chip area is reduced greatly to only 240 × 70 μm 2 in a 0.18 μm CMOS process due to saving two on-chip integrated inductors. Operating in class AB with a 1.8 V supply voltage and 2.45 GHz input signal, the PA shows a measured output power of 8 dBm at the 1 dB compression point. (semiconductor integrated circuits)

  14. Fast Capture­-Recapture Approach for Mitigating the Problem of Missing RFID Tags

    DEFF Research Database (Denmark)

    Nielsen, Karsten Fyhn; Jacobsen, Rasmus; Popovski, Petar

    2012-01-01

    The technology of Radio Frequency IDentification (RFID) enables many applications that rely on passive, battery-less wireless devices. If a RFID reader needs to gather the ID from multiple tags in its range, then it needs to run an anticollision protocol. Due to errors on the wireless link...

  15. Measuring the Interference at an RFID Tag: Where Does It Have an Impact?

    DEFF Research Database (Denmark)

    Krigslund, Rasmus; Popovski, Petar; Pedersen, Gert Frølund

    2011-01-01

    In this paper we consider reader collisions in an RFID system, especially how interference impacts the ability of a passive UHF tag to respond. We propose two innovative applications for using interference: 1) Blocking a tag response, and 2) cooperative reading of a tag. In order to investigate...

  16. A Security Mechanism for library management system using low cost RFID tags

    Directory of Open Access Journals (Sweden)

    V. Nagalakshmi

    2007-02-01

    Full Text Available Radio Frequency Identification (RFID systems will become pervasive in our daily lives due to their low cost and easy to use characteristics[1]. This paper presents a methodology of using low cost RFID tags for a library management system to protect the books from unauthorized capturing and usage. Every object to be identified in the RFID system is physically labeled with a tag. In the proposed method a book or a magazine or a CD is identified with the RFID tag. Whenever a book is issued to any user of the library, the RFID reader will capture the information of that book and compares it with the related information of the book in the Online Public Access Catalogue (OPAC and issues the book to the user depending on his identity in the database. If any unauthorized person intends to take the book the RFID reader will immediately respond to that and make sure that it was not issued. If any body tries to remove the tag it can be traced with the help of location device. Keywords: RFID, OPAC, Unauthorized user, tag, Reader.

  17. Experimental Study on Inkjet-Printed Passive UHF RFID Tags on Versatile Paper-Based Substrates

    Directory of Open Access Journals (Sweden)

    Han He

    2016-01-01

    Full Text Available We present the possibilities and challenges of passive UHF RFID tag antennas manufactured by inkjet printing silver nanoparticle ink on versatile paper-based substrates. The most efficient manufacturing parameters, such as the pattern resolution, were determined and the optimal number of printed layers was evaluated for each substrate material. Next, inkjet-printed passive UHF RFID tags were fabricated on each substrate with the optimized parameters and number of layers. According to our measurements, the tags on different paper substrates showed peak read ranges of 4–6.5 meters and the tags on different cardboard substrates exhibited peak read ranges of 2–6 meters. Based on their wireless performance, these inkjet-printed paper-based passive UHF RFID tags are sufficient for many future wireless applications and comparable to tags fabricated on more traditional substrates, such as polyimide.

  18. Maximum Likelihood Approach for RFID Tag Set Cardinality Estimation with Detection Errors

    DEFF Research Database (Denmark)

    Nguyen, Chuyen T.; Hayashi, Kazunori; Kaneko, Megumi

    2013-01-01

    Abstract Estimation schemes of Radio Frequency IDentification (RFID) tag set cardinality are studied in this paper using Maximum Likelihood (ML) approach. We consider the estimation problem under the model of multiple independent reader sessions with detection errors due to unreliable radio...... is evaluated under dierent system parameters and compared with that of the conventional method via computer simulations assuming flat Rayleigh fading environments and framed-slotted ALOHA based protocol. Keywords RFID tag cardinality estimation maximum likelihood detection error...

  19. Evaluation of MRI issues for an access port with a radiofrequency identification (RFID) tag.

    Science.gov (United States)

    Titterington, Blake; Shellock, Frank G

    2013-10-01

    A medical implant that contains metal, such as an RFID tag, must undergo proper MRI testing to ensure patient safety and to determine that the function of the RFID tag is not compromised by exposure to MRI conditions. Therefore, the objective of this investigation was to assess MRI issues for a new access port that incorporates an RFID tag. Samples of the access port with an RFID tag (Medcomp Power Injectable Port with CertainID; Medcomp, Harleysville, PA) were evaluated using standard protocols to assess magnetic field interactions (translational attraction and torque; 3-T), MRI-related heating (3-T), artifacts (3-T), and functional changes associated with different MRI conditions (nine samples, exposed to different MRI conditions at 1.5-T and 3-T). Magnetic field interactions were not substantial and will pose no hazards to patients. MRI-related heating was minimal (highest temperature change, 1.7°C; background temperature rise, 1.6°C). Artifacts were moderate in size in relation to the device. Exposures to MRI conditions at 1.5-T and 3-T did not alter or damage the functional aspects of the RFID tag. Based on the findings of the test, this new access port with an RFID tag is acceptable (or, MR conditional, using current MRI labeling terminology) for patients undergoing MRI examinations at 1.5-T/64-MHz and 3-T/128-MHz. Copyright © 2013 Elsevier Inc. All rights reserved.

  20. Improved Kalman Filter Method for Measurement Noise Reduction in Multi Sensor RFID Systems

    Directory of Open Access Journals (Sweden)

    Min Chul Kim

    2011-10-01

    Full Text Available Recently, the range of available Radio Frequency Identification (RFID tags has been widened to include smart RFID tags which can monitor their varying surroundings. One of the most important factors for better performance of smart RFID system is accurate measurement from various sensors. In the multi-sensing environment, some noisy signals are obtained because of the changing surroundings. We propose in this paper an improved Kalman filter method to reduce noise and obtain correct data. Performance of Kalman filter is determined by a measurement and system noise covariance which are usually called the R and Q variables in the Kalman filter algorithm. Choosing a correct R and Q variable is one of the most important design factors for better performance of the Kalman filter. For this reason, we proposed an improved Kalman filter to advance an ability of noise reduction of the Kalman filter. The measurement noise covariance was only considered because the system architecture is simple and can be adjusted by the neural network. With this method, more accurate data can be obtained with smart RFID tags. In a simulation the proposed improved Kalman filter has 40.1%, 60.4% and 87.5% less Mean Squared Error (MSE than the conventional Kalman filter method for a temperature sensor, humidity sensor and oxygen sensor, respectively. The performance of the proposed method was also verified with some experiments.

  1. Improved Kalman filter method for measurement noise reduction in multi sensor RFID systems.

    Science.gov (United States)

    Eom, Ki Hwan; Lee, Seung Joon; Kyung, Yeo Sun; Lee, Chang Won; Kim, Min Chul; Jung, Kyung Kwon

    2011-01-01

    Recently, the range of available radio frequency identification (RFID) tags has been widened to include smart RFID tags which can monitor their varying surroundings. One of the most important factors for better performance of smart RFID system is accurate measurement from various sensors. In the multi-sensing environment, some noisy signals are obtained because of the changing surroundings. We propose in this paper an improved Kalman filter method to reduce noise and obtain correct data. Performance of Kalman filter is determined by a measurement and system noise covariance which are usually called the R and Q variables in the Kalman filter algorithm. Choosing a correct R and Q variable is one of the most important design factors for better performance of the Kalman filter. For this reason, we proposed an improved Kalman filter to advance an ability of noise reduction of the Kalman filter. The measurement noise covariance was only considered because the system architecture is simple and can be adjusted by the neural network. With this method, more accurate data can be obtained with smart RFID tags. In a simulation the proposed improved Kalman filter has 40.1%, 60.4% and 87.5% less mean squared error (MSE) than the conventional Kalman filter method for a temperature sensor, humidity sensor and oxygen sensor, respectively. The performance of the proposed method was also verified with some experiments.

  2. Wireless Hydrogen Smart Sensor Based on Pt/Graphene-Immobilized Radio-Frequency Identification Tag.

    Science.gov (United States)

    Lee, Jun Seop; Oh, Jungkyun; Jun, Jaemoon; Jang, Jyongsik

    2015-08-25

    Hydrogen, a clean-burning fuel, is of key importance to various industrial applications, including fuel cells and the aerospace and automotive industries. However, hydrogen gas is odorless, colorless, and highly flammable; thus, appropriate safety protocol implementation and monitoring are essential. Highly sensitive hydrogen-gas leak detection and surveillance systems are needed; additionally, the ability to monitor large areas (e.g., cities) via wireless networks is becoming increasingly important. In this report, we introduce a radio frequency identification (RFID)-based wireless smart-sensor system, composed of a Pt-decorated reduced graphene oxide (Pt_rGO)-immobilized RFID sensor tag and an RFID-reader antenna-connected network analyzer to detect hydrogen gas. The Pt_rGOs, produced using a simple chemical reduction process, were immobilized on an antenna pattern in the sensor tag through spin coating. The resulting Pt_rGO-based RFID sensor tag exhibited a high sensitivity to hydrogen gas at unprecedentedly low concentrations (1 ppm), with wireless communication between the sensor tag and RFID-reader antenna. The wireless sensor tag demonstrated flexibility and a long lifetime due to the strong immobilization of Pt_rGOs on the substrate and battery-independent operation during hydrogen sensing, respectively.

  3. Towards Washable Electrotextile UHF RFID Tags: Reliability Study of Epoxy-Coated Copper Fabric Antennas

    Directory of Open Access Journals (Sweden)

    Shiqi Wang

    2015-01-01

    Full Text Available We investigate the impact of washing on the performance of passive UHF RFID tags based on dipole antennas fabricated from copper fabric and coated with protective epoxy coating. Initially, the tags achieved read ranges of about 8 meters, under the European RFID emission regulation. To assess the impact of washing on the performance of the tags, they were washed repeatedly in a washing machine and measured after every washing cycle. Despite the reliability challenges related to mechanical stress, the used epoxy coating was found to be a promising coating for electrotextile tags in moist conditions.

  4. SAW RFID-Tags for Mass-Sensitive Detection of Humidity and Vapors

    Directory of Open Access Journals (Sweden)

    Gerhard Fischerauer

    2009-12-01

    Full Text Available One-port surface acoustic wave (SAW devices with defined reflector patterns give characteristic signal patterns in the time domain making them identifiable and leading to so-called RFID-Tags. Each sensor responds with a burst of signals, their timed positions giving the identification code, while the amplitudes can be related to the analyte concentration. This paper presents the first combination of such a transducer with chemically sensitive layer materials. These include crosslinked polyvinyl alcohol for determining relative humidity and tert-butylcalix[4]arene for detecting solvent vapors coated on the free space between the reflectors. In going from the time domain to the frequency domain by Fourier transformation, changes in frequency and phase lead to sensor responses. Hence, it is possible to measure the concentration of tetrachloroethene in air down to 50 ppm, as well as 1% changes in relative humidity.

  5. A Forward-secure Grouping-proof Protocol for Multiple RFID Tags

    Directory of Open Access Journals (Sweden)

    Liu Ya-li

    2012-09-01

    Full Text Available Designing secure and robust grouping-proof protocols based on RFID characteristics becomes a hotspot in the research of security in Internet of Things (IOT. The proposed grouping-proof protocols recently have security and/or privacy omission and these schemes afford order-dependence by relaying message among tags through an RFID reader. In consequence, aiming at enhancing the robustness, improving scalability, reducing the computation costs on resource-constrained devices, and meanwhile combing Computational Intelligence (CI with Secure Multi-party Communication (SMC, a Forward-Secure Grouping-Proof Protocol (FSGP for multiple RFID tags based on Shamir's (, secret sharing is proposed. In comparison with the previous grouping-proof protocols, FSGP has the characteristics of forward-security and order-independence addressing the scalability issue by avoiding relaying message. Our protocol provides security enhancement, performance improvement, and meanwhile controls the computation cost, which equilibrates both security and low cost requirements for RFID tags.

  6. Performance and Benchmarking of Multisurface UHF RFID Tags for Readability and Reliability

    Directory of Open Access Journals (Sweden)

    Joshua Bolton

    2017-01-01

    Full Text Available As the price of passive radio frequency identification (RFID tags continues to decrease, more and more companies are considering item-level tagging. Although the use of RFID is simple, its proper application should be studied to achieve maximum efficiency and utilization in the industry. This paper is intended to demonstrate the test results of various multisurface UHF tags from different manufacturers for their readability under varying conditions such as orientation of tags with respect to reader, distance of tag from the reader, and materials used for embedding tags. These conditions could affect the reliability of RFID systems used for varied applications. In this paper, we implement a Design for Six Sigma Research (DFSS-R methodology that allows for reliability testing of RFID systems. In this paper, we have showcased our results about the benchmarking of UHF RFID tags and have put forward an important observation about the blind spots observed at different distances and orientations along different surfaces, which is primarily due to the polarity of the antenna chosen.

  7. Experimental assessment of an RFID-based crack sensor for steel structures

    Science.gov (United States)

    E Martínez-Castro, R.; Jang, S.; Nicholas, J.; Bansal, R.

    2017-08-01

    The use of welded steel cover plates had been a common design practice to increase beam section capacity in regions of high moment for decades. Many steel girder bridges with cover plates are still in service. Steel girder bridges are subject to cyclic loading, which can initiate crack formation at the toe of the weld and reduce beam capacity. Thus, timely detection of fatigue cracks is of utmost importance in steel girder bridge monitoring. To date, crack monitoring methods using in-house radio frequency identification (RFID)-based sensors have been developed to complement visual inspection and provide quantitative information of damage level. Offering similar properties at a reduced cost, commercial ultra-high frequency (UHF) passive RFID tags have been identified as a more financially viable option for pervasive crack monitoring using a dense array of sensors. This paper presents a study on damage sensitivity of low-cost commercial UHF RFID tags for crack detection and monitoring on metallic structures. Using backscatter power as a parameter for damage identification, a crack sensing system has been developed for single and multiple tag configurations for increased sensing pervasiveness. The effect on backscatter power of the existence and stage of crack propagation has been successfully characterized. For further automation of crack detection, a damage index based on the variation of backscatter power has also been established. The tested commercial RFID-based crack sensor contributes to the usage of this technology on steel girder bridges.

  8. Design of a Humidity Sensor Tag for Passive Wireless Applications.

    Science.gov (United States)

    Wu, Xiang; Deng, Fangming; Hao, Yong; Fu, Zhihui; Zhang, Lihua

    2015-10-07

    This paper presents a wireless humidity sensor tag for low-cost and low-power applications. The proposed humidity sensor tag, based on radio frequency identification (RFID) technology, was fabricated in a standard 0.18 μm complementary metal oxide semiconductor (CMOS) process. The top metal layer was deposited to form the interdigitated electrodes, which were then filled with polyimide as the humidity sensing layer. A two-stage rectifier adopts a dynamic bias-voltage generator to boost the effective gate-source voltage of the switches in differential-drive architecture, resulting in a flat power conversion efficiency curve. The capacitive sensor interface, based on phase-locked loop (PLL) theory, employs a simple architecture and can work with 0.5 V supply voltage. The measurement results show that humidity sensor tag achieves excellent linearity, hysteresis and stability performance. The total power-dissipation of the sensor tag is 2.5 μW, resulting in a maximum operating distance of 23 m under 4 W of radiation power of the RFID reader.

  9. RFID tags as a direct tracer for water and sediment dynamics

    Science.gov (United States)

    Sommerer, Erik; Plate, Simon; Güntner, Andreas

    2014-05-01

    RFID (Radio Frequency IDentification) is a wireless automatic identification system to track objects with widespread application in industrial operations, but also selected applications in ecological research (animal tracking) and for hydro-sedimentological studies (sediment transport with RFID tags embedded in bedload material). In this study, for the first time, we test and apply RFID tags as a direct tracer to track water pathways, erosion patterns and sediment transport on the surface at the hillslope and headwater scale. The RFID system used here consists of tags with a size of 12 x 2 mm and a combination of mobile and stationary antennas. The transport pathways and velocities of the RFID tags can be individually assessed due to their unique identification numbers. The study area is a badland of easily erodible marls and carbonates located in the Villacarli catchment (42 km²) in the Central Spanish Pyrenees. The badlands have been identified as one of the main sediment sources for siltation of the downstream Barasona Reservoir. More than 700 tags were placed in different terrain units using three experimental setups, including lab experiments: (i) intensive feasibility tests ranging from laboratory flume experiments to tracer studies under natural channel and slope conditions to compare the transport of RFID tags relative to colored particles of the natural sediment; (ii) several transects across the badland to investigate sediment transfer characteristics on different morphological units (i.e. channel, rills, slopes); (iii) a raster of 99 RFID tags covering a slope flank with vegetated and unvegetated parts to reveal the influence of vegetation to erosion and transport processes. The detection of transported tags was carried out with a mobile antenna system to map the spatial distribution of tags after selected rainfall events and with two stationary antennas in channel cross-sections for time-continuous observation of tag passage. From the observations, we

  10. Optimal Detection Range of RFID Tag for RFID-based Positioning System Using the k-NN Algorithm

    Directory of Open Access Journals (Sweden)

    Joon Heo

    2009-06-01

    Full Text Available Positioning technology to track a moving object is an important and essential component of ubiquitous computing environments and applications. An RFID-based positioning system using the k-nearest neighbor (k-NN algorithm can determine the position of a moving reader from observed reference data. In this study, the optimal detection range of an RFID-based positioning system was determined on the principle that tag spacing can be derived from the detection range. It was assumed that reference tags without signal strength information are regularly distributed in 1-, 2- and 3-dimensional spaces. The optimal detection range was determined, through analytical and numerical approaches, to be 125% of the tag-spacing distance in 1-dimensional space. Through numerical approaches, the range was 134% in 2-dimensional space, 143% in 3-dimensional space.

  11. Integrated algorithms for RFID-based multi-sensor indoor/outdoor positioning solutions

    Science.gov (United States)

    Zhu, Mi.; Retscher, G.; Zhang, K.

    2011-12-01

    Position information is very important as people need it almost everywhere all the time. However, it is a challenging task to provide precise positions indoor/outdoor seamlessly. Outdoor positioning has been widely studied and accurate positions can usually be achieved by well developed GPS techniques but these techniques are difficult to be used indoors since GPS signal reception is limited. The alternative techniques that can be used for indoor positioning include, to name a few, Wireless Local Area Network (WLAN), bluetooth and Ultra Wideband (UWB) etc.. However, all of these have limitations. The main objectives of this paper are to investigate and develop algorithms for a low-cost and portable indoor personal positioning system using Radio Frequency Identification (RFID) and its integration with other positioning systems. An RFID system consists of three components, namely a control unit, an interrogator and a transponder that transmits data and communicates with the reader. An RFID tag can be incorporated into a product, animal or person for the purpose of identification and tracking using radio waves. In general, for RFID positioning in urban and indoor environments three different methods can be used, including cellular positioning, trilateration and location fingerprinting. In addition, the integration of RFID with other technologies is also discussed in this paper. A typical combination is to integrate RFID with relative positioning technologies such as MEMS INS to bridge the gaps between RFID tags for continuous positioning applications. Experiments are shown to demonstrate the improvements of integrating multiple sensors with RFID which can be employed successfully for personal positioning.

  12. MATLAB Simulation of RFID Communication Protocol for Sensor Data Acquisition

    Directory of Open Access Journals (Sweden)

    Soumen GHOSH

    2015-05-01

    Full Text Available Data acquisition processes the sampling and conditioning the signals that measure real world physical conditions such as temperature, pressure, flow etc. and convert the signal into in appropriate format for displaying and transmission to remote end. Now a days RFID i.e. Radio Frequency Identification plays a vital role in Data acquisition system. The present article proposes a smart DAS scheme containing RFID reader and Active tag. The data acquisition system is interfaced with tag through I2C bus. The reader communicates with tag following RFID communication protocol requesting to send the logged data which are refreshed and stored into tag memory periodically. The communication is simulated using MATLAB software successfully.

  13. RFID on the Road-Some Considerations About Passive Tag Antennas

    DEFF Research Database (Denmark)

    Franek, Ondrej; Kyritsi, Persefoni; Pedersen, Gert Frølund

    2011-01-01

    This paper presents an investigation of tag antenna performance in the scenario of a passive RFID tag placed on an asphalt road and inquired by readers in vehicles. Three types of antennas were chosen and their properties were studied for various dielectric properties of the asphalt paving. Water...

  14. Next Generation RFID-Based Medical Service Management System Architecture in Wireless Sensor Network

    Science.gov (United States)

    Tolentino, Randy S.; Lee, Kijeong; Kim, Yong-Tae; Park, Gil-Cheol

    Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) are two important wireless technologies that have wide variety of applications and provide unlimited future potentials most especially in healthcare systems. RFID is used to detect presence and location of objects while WSN is used to sense and monitor the environment. Integrating RFID with WSN not only provides identity and location of an object but also provides information regarding the condition of the object carrying the sensors enabled RFID tag. However, there isn't any flexible and robust communication infrastructure to integrate these devices into an emergency care setting. An efficient wireless communication substrate for medical devices that addresses ad hoc or fixed network formation, naming and discovery, transmission efficiency of data, data security and authentication, as well as filtration and aggregation of vital sign data need to be study and analyze. This paper proposed an efficient next generation architecture for RFID-based medical service management system in WSN that possesses the essential elements of each future medical application that are integrated with existing medical practices and technologies in real-time, remote monitoring, in giving medication, and patient status tracking assisted by embedded wearable wireless sensors which are integrated in wireless sensor network.

  15. RFID tag tester calibration%RFID标签专用测试系统的校准

    Institute of Scientific and Technical Information of China (English)

    邢荣欣

    2011-01-01

    目前,我国对RFID标签的应用非常广泛.然而,对于RFID测试设备/读卡器还没有成熟的校准方法,这不利于RFID标签的质量控制.以典型RFID测试系统MP300TCL1为例,介绍了RFID测试系统的校准方法,并对测量不确定度进行了分析.%RFID tags are widely used in China. However, there's no published calibration method for RFID testing equipments/card readers. This is a threat to the quality of RFID tags. Presents a calibration process for MP300TCL1,one of typical RFID testing equipment. Measurement uncertainties are also laid out.

  16. Fuzzy logic-based approach to detecting a passive RFID tag in an outpatient clinic.

    Science.gov (United States)

    Min, Daiki; Yih, Yuehwern

    2011-06-01

    This study is motivated by the observations on the data collected by radio frequency identification (RFID) readers in a pilot study, which was used to investigate the feasibility of implementing an RFID-based monitoring system in an outpatient eye clinic. The raw RFID data collected from RFID readers contain noise and missing reads, which prevent us from determining the tag location. In this paper, fuzzy logic-based algorithms are proposed to interpret the raw RFID data to extract accurate information. The proposed algorithms determine the location of an RFID tag by evaluating its possibility of presence and absence. To evaluate the performance of the proposed algorithms, numerical experiments are conducted using the data observed in the outpatient eye clinic. Experiments results showed that the proposed algorithms outperform existing static smoothing method in terms of minimizing both false positives and false negatives. Furthermore, the proposed algorithms are applied to a set of simulated data to show the robustness of the proposed algorithms at various levels of RFID reader reliability.

  17. Simulator for testing hardware and software of the office system with RFID tags

    Directory of Open Access Journals (Sweden)

    Nowicki Tadeusz

    2017-01-01

    Full Text Available This paper presents the method for examining the properties of the RFID-tagged document management system. The system is composed of computers, where the software for supporting processes of the RFID-tagged documents was installed. Furthermore, the system cooperates with many other elements of the office (cabinets, sluices, copiers, try rider, end so one. The examination of the properties of the RFID-tagged document management system is, in this case, complex due to the number of a possible examination scenarios. The simulator method for examining the system properties was design and implemented. It allows to conduct the examination of the properties in a short period of time for numerous testing scenarios.

  18. Software simulator for property investigation of document management system with RFID tags

    Directory of Open Access Journals (Sweden)

    Kiedrowicz Maciej

    2016-01-01

    Full Text Available The study outlines the method for examining the properties of the RFID-tagged document management system. The system is composed of computers, where the software for supporting processes of the RFID-tagged doc-uments was installed. Furthermore, the system cooperates with many other elements of the secret office (cabinets, sluices, photocopiers, desks. The examination of the properties of the RFID-tagged document management system is, in this case, complex due to the number of a possible examination scenarios. The simulation method for examining the system properties was proposed. It allows to conduct the examination of the properties in a short period of time for numerous testing scenarios.

  19. "Who Counterfeited My Viagra?" Probabilistic Item Removal Detection via RFID Tag Cooperation

    Directory of Open Access Journals (Sweden)

    Di Pietro Roberto

    2011-01-01

    Full Text Available We leverage RFID tag cooperation to enforce tampering detection. That is, we provide a set of probabilistic protocols that detect the absence of a tag from a system composed of a set of tags and a reader. Our proposals are able to detect which tag and for how long it has been taken away from the system. The grain of the detection can be tuned with respect to the resources available on the tags. Another merit of our solutions is to provide a proof-of-concept that a small level of cooperation among tags can further extend the range of applications RFID can support, possibly opening new veins of research. The proposed protocols fit the resource constraints of the several classes of RFID available on the market. In particular, the memory requirement ranges from few memory slots to a number of memory slots that is proportional to the number of rounds the presence of a tag is going to be checked. Computation is just one hash per round. This fully fledged set of protocols is thought to trade off the detection grain with the resources on the tag: the finer the item removal detection grain, the more resources a protocol requires. A thorough analysis for the removal detection probability is provided. Finally, extensive simulations support the analytical results, showing the viability of the proposed solutions.

  20. A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System.

    Science.gov (United States)

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi

    2015-08-01

    Radio Frequency Identification (RFID) based solutions are widely used for providing many healthcare applications include patient monitoring, object traceability, drug administration system and telecare medicine information system (TMIS) etc. In order to reduce malpractices and ensure patient privacy, in 2015, Srivastava et al. proposed a hash based RFID tag authentication protocol in TMIS. Their protocol uses lightweight hash operation and synchronized secret value shared between back-end server and tag, which is more secure and efficient than other related RFID authentication protocols. Unfortunately, in this paper, we demonstrate that Srivastava et al.'s tag authentication protocol has a serious security problem in that an adversary may use the stolen/lost reader to connect to the medical back-end server that store information associated with tagged objects and this privacy damage causing the adversary could reveal medical data obtained from stolen/lost readers in a malicious way. Therefore, we propose a secure and efficient RFID tag authentication protocol to overcome security flaws and improve the system efficiency. Compared with Srivastava et al.'s protocol, the proposed protocol not only inherits the advantages of Srivastava et al.'s authentication protocol for TMIS but also provides better security with high system efficiency.

  1. RF-Care: Device-Free Posture Recognition for Elderly People Using A Passive RFID Tag Array

    Directory of Open Access Journals (Sweden)

    Lina Yao

    2015-09-01

    Full Text Available Activity recognition is a fundamental research topic for a wide range of important applications such as fall detection for elderly people. Existing techniques mainly rely on wearable sensors, which may not be reliable and practical in real-world situations since people often forget to wear these sensors. For this reason, device-free activity recognition has gained the popularity in recent years. In this paper, we propose an RFID (radio frequency identification based, device-free posture recognition system. More specifically, we analyze Received Signal Strength Indicator (RSSI signal patterns from an RFID tag array, and systematically examine the impact of tag configuration on system performance. On top of selected optimal subset of tags, we study the challenges on posture recognition. Apart from exploring posture classification, we specially propose to infer posture transitions via Dirichlet Process Gaussian Mixture Model (DPGMM based Hidden Markov Model (HMM, which effectively captures the nature of uncertainty caused by signal strength varieties during posture transitions. We run a pilot study to evaluate our system with 12 orientation-sensitive postures and a series of posture change sequences. We conduct extensive experiments in both lab and real-life home environments. The results demonstrate that our system achieves high accuracy in both environments, which holds the potential to support assisted living of elderly people.

  2. Design and Optimization of Passive UHF RFID Tag Antenna for Mounting on or inside Material Layers

    Science.gov (United States)

    Shao, Shuai

    There is great desire to employ passive UHF RFID tags for inventory tracking and sensing in a diversity of applications and environments. Owing to its battery-free operation, non-line-of sight detection, low cost, long read range and small form factor, each year billions of RFID tags are being deployed in retail, logistics, manufacturing, biomedical inventories, among many other applications. However, the performance of these RFID systems has not met expectations. This is because a tag's performance deteriorates significantly when mounted on or inside arbitrary materials. The tag antenna is optimized only for a given type of material at a certain location of placement, and detuning takes place when attached to or embedded in materials with dielectric properties outside the design range. Thereby, different customized tags may be needed for identifying objects even within the same class of products. This increases the overall cost of the system. Furthermore, conventional copper foil-based RFID tag antennas are prone to metal fatigue and wear, and cannot survive hostile environments where antennas could be deformed by external forces and failures occur. Therefore, it is essential to understand the interaction between the antenna and the material in the vicinity of the tag, and design general purpose RFID tag antennas possessing excellent electrical performance as well as robust mechanical structure. A particularly challenging application addressed here is designing passive RFID tag antennas for automotive tires. Tires are composed of multiple layers of rubber with different dielectric properties and thicknesses. Furthermore, metallic plies are embedded in the sidewalls and steel belts lie beneath the tread to enforce mechanical integrity. To complicate matters even more, a typical tire experiences a 10% stretching during the construction process. This dissertation focuses on intuitively understanding the interaction between the antenna and the material in the

  3. A New Ultra-lightweight Authentication Protocol for Low Cost RFID Tags

    Directory of Open Access Journals (Sweden)

    Xin Wang

    2013-05-01

    Full Text Available The Radio Frequency Identification (RFID system has been widely used in almost every aspects of the society. At present, the problem of security and privacy become a key factor of severely blocking the widespread of its usage. However, due to restraints on RFID tag’s manufacturing cost, the traditional methods of encryption are not good candidate to defend the security of wireless communication channel between reader and tag. Designing lightweight or ultra-lightweight RFID authentication protocol has become a hot research topic recently. This paper proposes a new ultra-lightweight RFID authentication protocol with high robustness and execution efficiency. The proposed protocol requires only simple bit-wise operations, it has the characteristics of low storage requirement and communication cost. At the same time, through elaborate mechanism design, avoid the vulnerability of the existing ultra-lightweight authentication protocols.

  4. Method of remote powering and detecting multiple UWB passive tags in an RFID system

    Science.gov (United States)

    Dowla, Farid U [Castro Valley, CA; Nekoogar, Faranak [San Ramon, CA; Benzel, David M [Livermore, CA; Dallum, Gregory E [Livermore, CA; Spiridon, Alex [Palo Alto, CA

    2012-05-29

    A new Radio Frequency Identification (RFID), tracking, powering apparatus/system and method using coded Ultra-wideband (UWB) signaling is introduced. The proposed hardware and techniques disclosed herein utilize a plurality of passive UWB transponders in a field of an RFID-radar system. The radar system itself enables multiple passive tags to be remotely powered (activated) at about the same time frame via predetermined frequency UWB pulsed formats. Once such tags are in an activated state, an UWB radar transmits specific "interrogating codes" to put predetermined tags in an awakened status. Such predetermined tags can then communicate by a unique "response code" so as to be detected by an UWB system using radar methods.

  5. Application of metamaterial concepts to sensors and chipless RFID

    Science.gov (United States)

    Martín, F.; Herrojo, C.; Vélez, P.; Su, L.; Mata-Contreras, J.; Paredes, F.

    2018-02-01

    Several strategies for the implementation of microwave sensors based on the use of metamaterial-inspired resonators are pointed out, and examples of applications, including sensors for dielectric characterization and sensors for the measurement of spatial variables, are provided. It will be also shown that novel microwave encoders for chipless RFID systems with very high data capacity can be implemented. The fields of applications of the devices discussed in this talk include dielectric characterization of solids and liquids, angular velocity sensors for space applications, and near-field chipless RFID systems for secure paper applications, among others.

  6. Localisation and mapping in GPS-denied environments using RFID tags

    CSIR Research Space (South Africa)

    James, S

    2012-09-01

    Full Text Available features and no access to GPS or stationary towers, which are typically used for navigation in mobile robots. In addition, dust and debris may hinder optical methods for ranging. This study investigates using randomly distributed RFID tags to autonomously...

  7. The effects of single bit quantization on direction of arrival estimation of UHF RFID tags

    NARCIS (Netherlands)

    Huiting, J.; Kokkeler, Andre B.J.; Smit, Gerardus Johannes Maria

    2016-01-01

    Phased arrays can be used to estimate the direction-of-arrival (DOA) of UHF RFID tags. To save on energy consumption and hardware costs, in this paper we explore the possibility of using single bit analog-to-digital converters for our phased array setup. This setup consists of an off-the-shelf

  8. Experimental Study on Strain Reliability of Embroidered Passive UHF RFID Textile Tag Antennas and Interconnections

    Directory of Open Access Journals (Sweden)

    Xiaochen Chen

    2017-01-01

    Full Text Available We present embroidered antennas and interconnections in passive UHF RFID textile tags and test their strain reliability. Firstly, we fabricate tag antennas on two different stretchable fabric substrates by five different embroidery patterns and choose the most stretchable ones for testing. Next, the tag ICs are attached by sewing and gluing, and the tag reliability during repeated stretching cycles is evaluated through wireless measurements. Initially, the chosen tags achieve read ranges of 6–8 meters and can strain up to 140–150% of their original length. After 100 stretching cycles to 80% of their maximum strain, the read ranges of the tags with glued interconnections are similar to the initial values. In addition, also the read ranges of the tags with sewed interconnections are still more than 70%–85% of their initial values. However, some challenges with the reproducibility need to be solved next.

  9. Directly Printable Frequency Signature Chipless RFID Tag for IoT Applications

    Directory of Open Access Journals (Sweden)

    H. Anam

    2017-04-01

    Full Text Available This Paper proposes a low-cost, compact, flexible passive chipless RFID tag that has been designed and analyzed. The tag is a bowtie-shaped resonator based structure with 36 slots; where each patch is loaded with 18 slots. The tag is set in a way that each slot in a patch corresponds to a metal gap in the other patch. Hence there is no mutual interference, and high data capacity of 36 bits is achieved in such compact size. Each slot corresponds to a resonance frequency in the RCS curve, and each resonance corresponds to a bit. The tag has been realized for Taconic TLX-0, PET, and Kapton®HN (DuPontTM substrates with copper, aluminum, and silver nanoparticle-based ink (Cabot CCI-300 as conducting materials. The tag exhibits flexibility and well optimized while remaining in a compact size. The proposed tag yields 36 bits in a tag dimension of 24.5 x 25.5 mm^2. These 36 bits can tag 2^36 number of objects/items. The ultimate high capacity, compact size, flexible passive chipless RFID tag can be arrayed in various industrial and IoT-based applications.

  10. SCRMS: An RFID and Sensor Web-Enabled Smart Cultural Relics Management System.

    Science.gov (United States)

    Xiao, Changjiang; Chen, Nengcheng; Li, Dandan; Lv, You; Gong, Jianya

    2016-12-30

    Cultural relics represent national or even global resources of inestimable value. How to efficiently manage and preserve these cultural relics is a vitally important issue. To achieve this goal, this study proposed, designed, and implemented an RFID and Sensor Web-enabled smart cultural relics management system (SCRMS). In this system, active photovoltaic subtle energy-powered Radio Frequency Identification (RFID) is used for long-range contactless identification and lifecycle management of cultural relics during their storage and circulation. In addition, different types of ambient sensors are integrated with the RFID tags and deployed around cultural relics to monitor their environmental parameters, helping to ensure that they remain in good condition. An Android-based smart mobile application, as middleware, is used in collaboration with RFID readers to collect information and provide convenient management for the circulation of cultural relics. Moreover, multiple sensing techniques are taken advantage of simultaneously for preservation of cultural relics. The proposed system was successfully applied to a museum in the Yongding District, Fujian Province, China, demonstrating its feasibility and advantages for smart and efficient management and preservation of cultural relics.

  11. SCRMS: An RFID and Sensor Web-Enabled Smart Cultural Relics Management System

    Directory of Open Access Journals (Sweden)

    Changjiang Xiao

    2016-12-01

    Full Text Available Cultural relics represent national or even global resources of inestimable value. How to efficiently manage and preserve these cultural relics is a vitally important issue. To achieve this goal, this study proposed, designed, and implemented an RFID and Sensor Web–enabled smart cultural relics management system (SCRMS. In this system, active photovoltaic subtle energy-powered Radio Frequency Identification (RFID is used for long-range contactless identification and lifecycle management of cultural relics during their storage and circulation. In addition, different types of ambient sensors are integrated with the RFID tags and deployed around cultural relics to monitor their environmental parameters, helping to ensure that they remain in good condition. An Android-based smart mobile application, as middleware, is used in collaboration with RFID readers to collect information and provide convenient management for the circulation of cultural relics. Moreover, multiple sensing techniques are taken advantage of simultaneously for preservation of cultural relics. The proposed system was successfully applied to a museum in the Yongding District, Fujian Province, China, demonstrating its feasibility and advantages for smart and efficient management and preservation of cultural relics.

  12. Estimating the Effects of Radio Frequency Identification (RFID) Tagging Technologies on the Army's War-Time Logistics Network

    National Research Council Canada - National Science Library

    O'Brien, Kristina

    2004-01-01

    .... Implementing business practices on the battlefield seems like an easy answer to these problems, but the implementation of RFID tags mayor may not easily transition to a military of combat environment...

  13. An Design of HF-Band RFID System with Multiple Readers and Passive Tags for Indoor Mobile Robot Self-Localization

    Directory of Open Access Journals (Sweden)

    Jian Mi

    2016-07-01

    Full Text Available Radio frequency identification (RFID technology has already been explored for efficient self-localization of indoor mobile robots. A mobile robot equipped with RFID readers detects passive RFID tags installed on the floor in order to locate itself. The Monte-Carlo localization (MCL method enables the localization of a mobile robot equipped with an RFID system with reasonable accuracy, sufficient robustness and low computational cost. The arrangements of RFID readers and tags and the size of antennas are important design parameters for realizing accurate and robust self-localization using a low-cost RFID system. The design of a likelihood model of RFID tag detection is also crucial for the accurate self-localization. This paper presents a novel design and arrangement of RFID readers and tags for indoor mobile robot self-localization. First, by considering small-sized and large-sized antennas of an RFID reader, we show how the design of the likelihood model affects the accuracy of self-localization. We also design a novel likelihood model by taking into consideration the characteristics of the communication range of an RFID system with a large antenna. Second, we propose a novel arrangement of RFID tags with eight RFID readers, which results in the RFID system configuration requiring much fewer readers and tags while retaining reasonable accuracy of self-localization. We verify the performances of MCL-based self-localization realized using the high-frequency (HF-band RFID system with eight RFID readers and a lower density of RFID tags installed on the floor based on MCL in simulated and real environments. The results of simulations and real environment experiments demonstrate that our proposed low-cost HF-band RFID system realizes accurate and robust self-localization of an indoor mobile robot.

  14. Using RFID and PIT tags to Quantify Bedload Transport in the Oregon Coast Range

    Science.gov (United States)

    Sanfilippo, J.; Lancaster, S. T.

    2017-12-01

    Introducing the methods, issues, and data collection techniques and interpretation over one water year using RFID (radio frequency identification) and PIT (passive integrated transponder) tags in Oak Creek, near Corvallis Oregon. We constructed an RFID four-antenna array that runs off of a single radiofrequency reader via a multiplexer board. Using 4 grain sizes we tagged 990 individual rocks, roughly 250 in of each four size ranges (8-16mm, 16-32mm, 32-64mm, 64-128mm). Using 12 mm and 23 mm PIT tags during 1 water year the antennas logged 477 tracer passage events. To calculate bedload transport for each size range, at each antenna, interarrival times yield count rates when combined with grain size fractions of the bed and tracer concentrations, yield bedload transport for each size class. We calculated transport rates for five events of varying magnitude and found that PIT tag RFID method under predicts transport between 1 and 3 orders of magnitude.

  15. A Broadband UHF Tag Antenna For Near-Field and Far-Field RFID Communications

    Directory of Open Access Journals (Sweden)

    M. Dhaouadi

    2014-12-01

    Full Text Available The paper deals with the design of passive broadband tag antenna for Ultra-High Frequency (UHF band. The antenna is intended for both near and far fields Radio Frequency Identification (RFID applications. The meander dipole tag antenna geometry modification is designed for frequency bandwidth increasing. The measured bandwidth of the proposed broadband Tag antenna is more than 140 MHz (820–960 MHz, which can cover the entire UHF RFID band. A comparison between chip impedance of datasheet and the measured chip impedance has been used in our simulations. The proposed progressive meandered antenna structure, with an overall size of 77 mm × 14 mm × 0.787 mm, produces strong and uniform magnetic field distribution in the near-field zone. The antenna impedance is matched to common UHF chips in market simply by tuning its capacitive and inductive values since a perfect matching is required in the antenna design in order to enhance the near and the far field communications. Measurements confirm that the designed antenna exhibits good performance of Tag identification for both near-field and far-field UHF RFID applications.

  16. A touch probe method of operating an implantable RFID tag for orthopedic implant identification.

    Science.gov (United States)

    Liu, Xiaoyu; Berger, J Lee; Ogirala, Ajay; Mickle, Marlin H

    2013-06-01

    The major problem in operating an implantable radio-frequency identification (RFID) tag embedded on an orthopedic implant is low efficiency because of metallic interference. To improve the efficiency, this paper proposes a method of operating an implantable passive RFID tag using a touch probe at 13.56 MHz. This technology relies on the electric field interaction between two pairs of electrodes, one being a part of the touch probe placed on the surface of tissue and the other being a part of the tag installed under the tissue. Compared with using a conventional RFID antenna such as a loop antenna, this method has a better performance in the near field operation range to reduce interference with the orthopedic implant. Properly matching the touch probe and the tag to the tissue and the implant reduces signal attenuation and increases the overall system efficiency. The experiments have shown that this method has a great performance in the near field transcutaneous operation and can be used for orthopedic implant identification.

  17. Probabilistic Dynamic Framed Slotted ALOHA for RFID Tag Identification

    DEFF Research Database (Denmark)

    Nguyen, Chuyen T.; Hayashi, Kazunori; Kaneko, Megumi

    2013-01-01

    In this paper, we study radio frequency identification tag identification problems using framed slotted ALOHA protocol. Each tag will be assumed to participate in the contention with a certain probability. Then, the frame size and the probability will be dynamically controlled by the reader in ev...

  18. Analysis of Silver Ink Bow-Tie RFID Tag Antennas Printed on Paper Substrates

    Directory of Open Access Journals (Sweden)

    Sari Merilampi

    2007-01-01

    Full Text Available In this study, polymeric silver inks, paper substrates, and screen printing were used to produce prototype Bow-Tie tags. Because of increasing interest in applying passive UHF-RFID systems in paper industry, the Bow-Tie antenna used in this study was designed to work through paper. The maximum reliable read ranges of the tags were measured thorough stacked paper and also in air. The analysis and functioning of the antenna design are also discussed. All inks and paper substrates were suitable as antenna material and the prototype tag antennas had good reading performance. The maximum reliable read ranges were quite the same as for copper and aluminum tags studied elsewhere. This means that printed UHF tags are competitive solutions for the identification of simple mass products.

  19. A CMOS pressure sensor tag chip for passive wireless applications.

    Science.gov (United States)

    Deng, Fangming; He, Yigang; Li, Bing; Zuo, Lei; Wu, Xiang; Fu, Zhihui

    2015-03-23

    This paper presents a novel monolithic pressure sensor tag for passive wireless applications. The proposed pressure sensor tag is based on an ultra-high frequency RFID system. The pressure sensor element is implemented in the 0.18 µm CMOS process and the membrane gap is formed by sacrificial layer release, resulting in a sensitivity of 1.2 fF/kPa within the range from 0 to 600 kPa. A three-stage rectifier adopts a chain of auxiliary floating rectifier cells to boost the gate voltage of the switching transistors, resulting in a power conversion efficiency of 53% at the low input power of -20 dBm. The capacitive sensor interface, using phase-locked loop archietcture, employs fully-digital blocks, which results in a 7.4 bits resolution and 0.8 µW power dissipation at 0.8 V supply voltage. The proposed passive wireless pressure sensor tag costs a total 3.2 µW power dissipation.

  20. Design of a Child Localization System on RFID and Wireless Sensor Networks

    OpenAIRE

    Chen, Chao

    2010-01-01

    Radio Frequency Identification (RFID) and wireless sensor networks are wireless technologies that rapidly emerge and show great potential. Combining RFID and wireless sensor networks provides a cost-efficient way to expand the RFID system's range and to enable an RFID system in areas without a network infrastructure. These two technologies are employed to build a wireless localization system in a children's theme park. The main purpose of this child localization system is to track and locate ...

  1. Towards Washable Wearable Antennas: A Comparison of Coating Materials for Screen-Printed Textile-Based UHF RFID Tags

    Directory of Open Access Journals (Sweden)

    Tiiti Kellomäki

    2012-01-01

    Full Text Available (Radio frequency identification RFID tags integrated into clothing enable monitoring of people without their conscious effort. This requires tags to be an unnoticeable part of clothing and comfortable to wear. In this study, RFID antennas were screen printed on two different fabrics, six different coating materials for the (integrated circuits ICs were applied, and the reliability of these RFID tags was tested with moisture and laundry tests. Generally, glue-type coating materials were easier to handle and could be spread precisely. All the tags were operational immediately after the coatings were applied, and five of the coating materials were seen to protect the IC from detaching in the laundry. It was found that the uneven fabric surface caused discontinuities and breaks in narrow conductors, and thus hard coatings may also be needed to keep the tag from breaking in laundry.

  2. A review of tags anti-collision and localization protocols in RFID networks.

    Science.gov (United States)

    Ullah, S; Alsalih, W; Alsehaim, A; Alsadhan, N

    2012-12-01

    Radio Frequency IDentification (RFID) has allowed the realization of ubiquitous tracking and monitoring of physical objects wirelessly with minimum human interactions. It plays a key role in a wide range of applications including asset tracking, contactless payment, access control, transportation and logistics, and other industrial applications. On the other side, RFID systems face several technical challenges that need to be overcome in order to achieve their potential benefits; tags collisions and localization of tagged objects are two important challenges. Numerous anti-collision and localization protocols have been proposed to address these challenges. This paper reviews the state-of-art tags' anti-collision and localization protocols, and provides a deep insight into technical issues of these protocols. The probabilistic and deterministic anti-collision protocols are critically studied and compared in terms of different parameters. We further review distance estimation, scene analysis, and proximity localization schemes and provide useful suggestions. We also introduce a new hybrid direction that utilizes power control to spatially partition the interrogation range of a reader for more efficient anti-collision and localization. Finally, we present the applications of RFID systems in healthcare sectors.

  3. Passive UHF RFID Tags with Specific Printed Antennas for Dielectric and Metallic Objects Applications

    Directory of Open Access Journals (Sweden)

    K. Siakavara

    2017-09-01

    Full Text Available Design process and respective results for the synthesis of specific Radiofrequency Identification(RFID tag antennas, suitable for dielectric and metallic objects, are presented. The antennas were designed for the UHF(865MHz-869MHz band and their basic configuration is that of the printed spiral type. Six modification steps to the classical spiral layout are proposed and it was proved that they can lead to tags with high readability and reading distances up to 10m when designed for dielectric object and up to 7m in the case of metallic objects. The results of the measurements of the fabricated tags are explained via theoretical evaluations which take into account reflection phenomena, that are present in a real environment at which the tags are used.

  4. 3.56-bits/cm Compact Inkjet Printed and Application Specific Chipless RFID Tag

    KAUST Repository

    Khan, Munawar M.

    2015-10-26

    © 2002-2011 IEEE. In this letter, a 28.5-bit chipless RFID tag, based on paper substrate and realized using inkjet printing technique is presented. Operating within ultrawideband, the tag occupies a compact size of 2 × 4 cm2. Focusing on applications requiring time and date identification, a novel encoding technique is presented that allows efficient frequency band allocation based on the number of required instances of time and date variables. A figure of merit (FOM) relating coding capacity and tag dimensions coined as code density is also introduced. A systematic design process followed by simulations and verified through measurements reveal a high code density of 3.56 bits/cm2 for the presented chipless tag.

  5. Small Size and Low Cost UHF RFID Tag Antenna Mountable on Metallic Objects

    Directory of Open Access Journals (Sweden)

    Sergio López-Soriano

    2015-01-01

    Full Text Available Reducing tag size while maintaining good performance is one of the major challenges in radio-frequency identification applications (RFID, in particular when labeling metallic objects. In this contribution, a small size and low cost tag antenna for identifying metal objects in the European UHF band (865–868 MHz is presented. The antenna consists of a transmission line mounted on an inexpensive thin dielectric which is proximity-coupled to a short-ended patch mounted on FR4 substrate. The overall dimensions of the tag are 33.5 × 30 × 3.1 mm. Experimental results show that, for an EIRP of 3.2 W (European regulations, such a small and cheap tag attains read ranges of about 5 m when attached to a metallic object.

  6. Testing the effects of temperature and humidity on printed passive UHF RFID tags on paper substrate

    Science.gov (United States)

    Linnea Merilampi, Sari; Virkki, Johanna; Ukkonen, Leena; Sydänheimo, Lauri

    2014-05-01

    This article is an interesting substrate material for environmental-friendly printable electronics. In this study, screen-printed RFID tags on paper substrate are examined. Their reliability was tested with low temperature, high temperature, slow temperature cycling, high temperature and high humidity and water dipping test. Environmental stresses affect the tag antenna impedance, losses and radiation characteristics due to their impact on the ink film and paper substrate. Low temperature, temperature cycling and high humidity did not have a radical effect on the measured parameters: threshold power, backscattered signal power or read range of the tags. However, the frequency response and the losses of the tags were slightly affected. Exposure to high temperature was found to even improve the tag performance due to the positive effect of high temperature on the ink film. The combined high humidity and high temperature had the most severe effect on the tag performance. The threshold power increased, backscattered power decreased and the read range was shortened. On the whole, the results showed that field use of these tags in high, low and changing temperature conditions and high humidity conditions is possible. Use of these tags in combined high-humidity and high-temperature conditions should be carefully considered.

  7. Analysis and design of power efficient semi-passive RFID tag

    International Nuclear Information System (INIS)

    Che Wenyi; Guan Shuo; Wang Xiao; Xiong Tingwen; Xi Jingtian; Tan Xi; Yan Na; Min Hao

    2010-01-01

    The analysis and design of a semi-passive radio frequency identification (RFID) tag is presented. By studying the power transmission link of the backscatter RFID system and exploiting a power conversion efficiency model for a multi-stage AC-DC charge pump, the calculation method for semi-passive tag's read range is proposed. According to different read range limitation factors, an intuitive way to define the specifications of tag's power budget and backscatter modulation index is given. A test chip is implemented in SMIC 0.18 μm standard CMOS technology under the guidance of theoretical analysis. The main building blocks are the threshold compensated charge pump and low power wake-up circuit using the power triggering wake-up mode. The proposed semi-passive tag is fully compatible to EPC C1G2 standard. It has a compact chip size of 0.54 mm 2 , and is adaptable to batteries with a 1.2 to 2.4 V output voltage.

  8. Analysis and design of power efficient semi-passive RFID tag

    Energy Technology Data Exchange (ETDEWEB)

    Che Wenyi; Guan Shuo; Wang Xiao; Xiong Tingwen; Xi Jingtian; Tan Xi; Yan Na; Min Hao, E-mail: yanna@fudan.edu.c [State Key Laboratory of ASIC and System, Auto-ID Laboratory, Fudan University, Shanghai 201203 (China)

    2010-07-15

    The analysis and design of a semi-passive radio frequency identification (RFID) tag is presented. By studying the power transmission link of the backscatter RFID system and exploiting a power conversion efficiency model for a multi-stage AC-DC charge pump, the calculation method for semi-passive tag's read range is proposed. According to different read range limitation factors, an intuitive way to define the specifications of tag's power budget and backscatter modulation index is given. A test chip is implemented in SMIC 0.18 {mu}m standard CMOS technology under the guidance of theoretical analysis. The main building blocks are the threshold compensated charge pump and low power wake-up circuit using the power triggering wake-up mode. The proposed semi-passive tag is fully compatible to EPC C1G2 standard. It has a compact chip size of 0.54 mm{sup 2}, and is adaptable to batteries with a 1.2 to 2.4 V output voltage.

  9. An Analysis of the Effects of RFID Tags on Narrowband Navigation and Communication Receivers

    Science.gov (United States)

    LaBerge, E. F. Charles

    2007-01-01

    The simulated effects of the Radio Frequency Identification (RFID) tag emissions on ILS Localizer and ILS Glide Slope functions match the analytical models developed in support of DO-294B provided that the measured peak power levels are adjusted for 1) peak-to-average power ratio, 2) effective duty cycle, and 3) spectrum analyzer measurement bandwidth. When these adjustments are made, simulated and theoretical results are in extraordinarily good agreement. The relationships hold over a large range of potential interference-to-desired signal power ratios, provided that the adjusted interference power is significantly higher than the sum of the receiver noise floor and the noise-like contributions of all other interference sources. When the duty-factor adjusted power spectral densities are applied in the evaluation process described in Section 6 of DO-294B, most narrowband guidance and communications radios performance parameters are unaffected by moderate levels of RFID interference. Specific conclusions and recommendations are provided.

  10. On the optimal identification of tag sets in time-constrained RFID configurations.

    Science.gov (United States)

    Vales-Alonso, Javier; Bueno-Delgado, María Victoria; Egea-López, Esteban; Alcaraz, Juan José; Pérez-Mañogil, Juan Manuel

    2011-01-01

    In Radio Frequency Identification facilities the identification delay of a set of tags is mainly caused by the random access nature of the reading protocol, yielding a random identification time of the set of tags. In this paper, the cumulative distribution function of the identification time is evaluated using a discrete time Markov chain for single-set time-constrained passive RFID systems, namely those ones where a single group of tags is assumed to be in the reading area and only for a bounded time (sojourn time) before leaving. In these scenarios some tags in a set may leave the reader coverage area unidentified. The probability of this event is obtained from the cumulative distribution function of the identification time as a function of the sojourn time. This result provides a suitable criterion to minimize the probability of losing tags. Besides, an identification strategy based on splitting the set of tags in smaller subsets is also considered. Results demonstrate that there are optimal splitting configurations that reduce the overall identification time while keeping the same probability of losing tags.

  11. Design of a passive UHF RFID tag for the ISO18000-6C protocol

    International Nuclear Information System (INIS)

    Wang Yao; Wen Guangjun; Mao Wei; He Yanli; Zhu Xueyong

    2011-01-01

    This paper presents a new fully integrated wide-range UHF passive RFID tag chip design that is compatible with the ISO18000-6C protocol. In order to reduce the die area, an ultra-low power CMOS voltage regulator without resistors and an area-efficient amplitude shift keying demodulator with a novel adaptive average generator are both adopted. A low power clock generator is designed to guarantee the accuracy of the clock under ±4%. As the clock gating technology is employed to reduce the power consumption of the baseband processor, the total power consumption of the tag is about 14 μW with a sensitivity of -9.5 dBm. The detection distance can reach about 5 m under 4 W effective isotropic radiated power. The whole tag is fabricated in TSMC 0.18 μm CMOS technology and the chip size is 880 x 880 μm 2 . (semiconductor integrated circuits)

  12. Design of a passive UHF RFID tag for the ISO18000-6C protocol

    Energy Technology Data Exchange (ETDEWEB)

    Wang Yao; Wen Guangjun; Mao Wei; He Yanli; Zhu Xueyong, E-mail: wangyao220597@yahoo.com.cn [RFIC Laboratory CICS, School of Communication and Information Engineering, University of Electronic Science and Technology of China, Chengdu 611731 (China)

    2011-05-15

    This paper presents a new fully integrated wide-range UHF passive RFID tag chip design that is compatible with the ISO18000-6C protocol. In order to reduce the die area, an ultra-low power CMOS voltage regulator without resistors and an area-efficient amplitude shift keying demodulator with a novel adaptive average generator are both adopted. A low power clock generator is designed to guarantee the accuracy of the clock under {+-}4%. As the clock gating technology is employed to reduce the power consumption of the baseband processor, the total power consumption of the tag is about 14 {mu}W with a sensitivity of -9.5 dBm. The detection distance can reach about 5 m under 4 W effective isotropic radiated power. The whole tag is fabricated in TSMC 0.18 {mu}m CMOS technology and the chip size is 880 x 880 {mu}m{sup 2}. (semiconductor integrated circuits)

  13. Sensor-based material tagging system

    International Nuclear Information System (INIS)

    Vercellotti, L.C.; Cox, R.W.; Ravas, R.J.; Schlotterer, J.C.

    1991-01-01

    Electronic identification tags are being developed for tracking material and personnel. In applying electronic identification tags to radioactive materials safeguards, it is important to measure attributes of the material to ensure that the tag remains with the material. The addition of a microcontroller with an on-board analog-to-digital converter to an electronic identification tag application-specific integrated-circuit has been demonstrated as means to provide the tag with sensor data. Each tag is assembled into a housing, which serves as a scale for measuring the weight of a paint-can-sized container and its contents. Temperature rise of the can above ambient is also measured, and a piezoelectric detector detects disturbances and immediately puts the tag into its alarm and beacon mode. Radiation measurement was also considered, but the background from nearby containers was found to be excessive. The sensor-based tagging system allows tracking of the material in cans as it is stored in vaults or is moved through the manufacturing process. The paper presents details of the sensor-based material tagging system and describes a demonstration system

  14. Research on and design of key circuits in RFID tag chip for container management

    Directory of Open Access Journals (Sweden)

    Wang Wenjie

    2016-01-01

    Full Text Available This paper introduces the design of semi-passive RFID tag chip capable of monitoring container safety. A system framework complying with requirements by ISO/IEC 18000-6C is firstly presented, and then differences from the key units of common passive chip, such as switch-state monitoring circuit, power management unit and anti-shake design in baseband processor, are elaborated. The main function of such a chip is to record the container opening frequency during transportation. Finally, the realizations of each unit’s function are simulated.

  15. Very Low-Cost 80-Bit Chipless-RFID Tags Inkjet Printed on Ordinary Paper

    Directory of Open Access Journals (Sweden)

    Cristian Herrojo

    2018-05-01

    Full Text Available This paper presents a time-domain, chipless-RFID system with 80-bit tags inkjet-printed on ordinary DIN A4 paper. The tags, consisting of a linear chain of resonant elements (with as many resonators as the number of identification bits plus header bits, are read sequentially and by proximity (through near-field coupling. To this end, a transmission line, fed by a harmonic (interrogation signal tuned to the resonance frequency of the tag resonators (or close to it, is used as a reader. Thus, during reader operation, the tag chain is mechanically shifted over the transmission line so that the coupling between the line and the functional resonant elements of the tag chain is favored. Logic states that ‘1’ and ‘0’ are determined by the functionality and non-functionality (resonator detuning, respectively, of the resonant elements of the chain. Through near-field coupling, the transmission coefficient of the line is modulated and, as a result, the output signal is modulated in amplitude (AM, which is the identification code contained in the envelope function. As long as the tags are inkjet-printed on ordinary DIN A4 paper, the cost is minimal. Moreover, such tags can be easily programmed and erased, so that identical tags can be fabricated on a large scale (and programmed at a later stage, further reducing the cost of manufacture. The reported prototype tags, with 80 bits of information plus four header bits, demonstrate the potential of this approach, which is of particular interest to secure paper applications.

  16. A CMOS Humidity Sensor for Passive RFID Sensing Applications

    Science.gov (United States)

    Deng, Fangming; He, Yigang; Zhang, Chaolong; Feng, Wei

    2014-01-01

    This paper presents a low-cost low-power CMOS humidity sensor for passive RFID sensing applications. The humidity sensing element is implemented in standard CMOS technology without any further post-processing, which results in low fabrication costs. The interface of this humidity sensor employs a PLL-based architecture transferring sensor signal processing from the voltage domain to the frequency domain. Therefore this architecture allows the use of a fully digital circuit, which can operate on ultra-low supply voltage and thus achieves low-power consumption. The proposed humidity sensor has been fabricated in the TSMC 0.18 μm CMOS process. The measurements show this humidity sensor exhibits excellent linearity and stability within the relative humidity range. The sensor interface circuit consumes only 1.05 μW at 0.5 V supply voltage and reduces it at least by an order of magnitude compared to previous designs. PMID:24841250

  17. A CMOS Humidity Sensor for Passive RFID Sensing Applications

    Directory of Open Access Journals (Sweden)

    Fangming Deng

    2014-05-01

    Full Text Available This paper presents a low-cost low-power CMOS humidity sensor for passive RFID sensing applications. The humidity sensing element is implemented in standard CMOS technology without any further post-processing, which results in low fabrication costs. The interface of this humidity sensor employs a PLL-based architecture transferring sensor signal processing from the voltage domain to the frequency domain. Therefore this architecture allows the use of a fully digital circuit, which can operate on ultra-low supply voltage and thus achieves low-power consumption. The proposed humidity sensor has been fabricated in the TSMC 0.18 μm CMOS process. The measurements show this humidity sensor exhibits excellent linearity and stability within the relative humidity range. The sensor interface circuit consumes only 1.05 µW at 0.5 V supply voltage and reduces it at least by an order of magnitude compared to previous designs.

  18. A CMOS humidity sensor for passive RFID sensing applications.

    Science.gov (United States)

    Deng, Fangming; He, Yigang; Zhang, Chaolong; Feng, Wei

    2014-05-16

    This paper presents a low-cost low-power CMOS humidity sensor for passive RFID sensing applications. The humidity sensing element is implemented in standard CMOS technology without any further post-processing, which results in low fabrication costs. The interface of this humidity sensor employs a PLL-based architecture transferring sensor signal processing from the voltage domain to the frequency domain. Therefore this architecture allows the use of a fully digital circuit, which can operate on ultra-low supply voltage and thus achieves low-power consumption. The proposed humidity sensor has been fabricated in the TSMC 0.18 μm CMOS process. The measurements show this humidity sensor exhibits excellent linearity and stability within the relative humidity range. The sensor interface circuit consumes only 1.05 µW at 0.5 V supply voltage and reduces it at least by an order of magnitude compared to previous designs.

  19. A passive UHF RFID tag with a dynamic-Vth-cancellation rectifier

    International Nuclear Information System (INIS)

    Shen Jinpeng; Wang Bo; Liu Shan; Wang Xin'an; Ruan Zhengkun; Li Shoucheng

    2013-01-01

    This paper presents a passive UHF RFID tag with a dynamic-V th -cancellation (DVC) rectifier. In the rectifier, the threshold voltages of MOSFETs are cancelled by applying gate bias voltages, which are dynamically changed according to the states of the MOSFETs. The DVC rectifier enables both low ON-resistance and small reverse leakage of the MOSFETs, resulting in high power conversion efficiency (PCE). An area-efficient demodulator with a novel average detector is also designed, which takes advantage of the rectifier's first stage as the envelope detector. The whole tag chip is implemented in a 0.18 μm CMOS process with a die size of 880 × 950 μm 2 . Measurement results show that the rectifier achieves a maximum PCE of 53.7% with 80 kΩ resistor load. (semiconductor integrated circuits)

  20. A novel method for inferring RFID tag reader recordings into clinical events.

    Science.gov (United States)

    Chang, Yung-Ting; Syed-Abdul, Shabbir; Tsai, Chung-You; Li, Yu-Chuan

    2011-12-01

    Nosocomial infections (NIs) are among the important indicators used for evaluating patients' safety and hospital performance during accreditation of hospitals. NI rate is higher in Intensive Care Units (ICUs) than in the general wards because patients require intense care involving both invasive and non-invasive clinical procedures. The emergence of Superbugs is motivating health providers to enhance infection control measures. Contact behavior between health caregivers and patients is one of the main causes of cross infections. In this technology driven era remote monitoring of patients and caregivers in the hospital setting can be performed reliably, and thus is in demand. Proximity sensing using radio frequency identification (RFID) technology can be helpful in capturing and keeping track on all contact history between health caregivers and patients for example. This study intended to extend the use of proximity sensing of radio frequency identification technology by proposing a model for inferring RFID tag reader recordings into clinical events. The aims of the study are twofold. The first aim is to set up a Contact History Inferential Model (CHIM) between health caregivers and patients. The second is to verify CHIM with real-time observation done at the ICU ward. A pre-study was conducted followed by two study phases. During the pre-study proximity sensing of RFID was tested, and deployment of the RFID in the Clinical Skill Center in one of the medical centers in Taiwan was done. We simulated clinical events and developed CHIM using variables such as duration of time, frequency, and identity (tag) numbers assigned to caregivers. All clinical proximity events are classified into close-in events, contact events and invasive events. During the first phase three observers were recruited to do real time recordings of all clinical events in the Clinical Skill Center with the deployed automated RFID interaction recording system. The observations were used to verify

  1. Design and implementation of an ultra-low power passive UHF RFID tag

    International Nuclear Information System (INIS)

    Shen Jinpeng; Wang Xin'an; Liu Shan; Zong Hongqiang; Huang Jinfeng; Yang Xin; Feng Xiaoxing; Ge Binjie

    2012-01-01

    This paper presents a fully integrated passive UHF RFID tag chip complying with the ISO18000-6B protocol. The tag chip includes an RF/analog front-end, a baseband processor, and a 512-bit EEPROM memory. To improve power conversion efficiency, a Schottky barrier diode based rectifier is adopted. A novel voltage reference using the peaking current source is discussed in detail, which can meet the low-power, low-voltage requirement while retaining circuit simplicity. Most of the analog blocks are designed to work under sub-1 V to reduce power consumption, and several practical methods are used to further reduce the power consumption of the baseband processor. The whole tag chip is implemented in a TSMC 0.18 μm CMOS process with a die size of 800 × 800 μm 2 . Measurement results show that the total power consumption of the tag chip is only 7.4 μW with a sensitivity of −12 dBm. (semiconductor integrated circuits)

  2. Scanning for PIT-tagged flatfish in a coastal area using a sledge equipped with an RFID antenna

    DEFF Research Database (Denmark)

    Sparrevohn, Claus Reedtz; Aarestrup, Kim; Stenberg, Claus

    2014-01-01

    A radio frequency identification (RFID) antenna system, build into a sledge that can be towed behind a vessel like a trawl and thereby has the potential to detect the position of a passive inductor technology (PIT)-tagged fish in a wide variety of habitats, is presented. By scanning for hatchery...

  3. Inkjet printed paper based frequency selective surfaces and skin mounted RFID tags : the interrelation between silver nanoparticle ink, paper substrate and low temperature sintering technique

    NARCIS (Netherlands)

    Sanchez-Romaquera, V.; Wïnscher, S.; Turki, B.M.; Abbel, R.J.; Barbosa, S.; Tate, D.J.; Oyeka, D.; Batchelor, J.C.; Parker, E.A.; Schubert, U.S.; Yeates, S.G.

    2015-01-01

    Inkjet printing of functional frequency selective surfaces (FSS) and radio frequency identification (RFID) tags on commercial paper substrates using silver nanoparticle inks sintered using low temperature thermal, plasma and photonic techniques is reported. Printed and sintered FSS devices

  4. An Ultra-Low-Power RFID/NFC Frontend IC Using 0.18 μm CMOS Technology for Passive Tag Applications

    Directory of Open Access Journals (Sweden)

    Mayukh Bhattacharyya

    2018-05-01

    Full Text Available Battery-less passive sensor tags based on RFID or NFC technology have achieved much popularity in recent times. Passive tags are widely used for various applications like inventory control or in biotelemetry. In this paper, we present a new RFID/NFC frontend IC (integrated circuit for 13.56 MHz passive tag applications. The design of the frontend IC is compatible with the standard ISO 15693/NFC 5. The paper discusses the analog design part in details with a brief overview of the digital interface and some of the critical measured parameters. A novel approach is adopted for the demodulator design, to demodulate the 10% ASK (amplitude shift keying signal. The demodulator circuit consists of a comparator designed with a preset offset voltage. The comparator circuit design is discussed in detail. The power consumption of the bandgap reference circuit is used as the load for the envelope detection of the ASK modulated signal. The sub-threshold operation and low-supply-voltage are used extensively in the analog design—to keep the power consumption low. The IC was fabricated using 0.18 μ m CMOS technology in a die area of 1.5 mm × 1.5 mm and an effective area of 0.7 m m 2 . The minimum supply voltage desired is 1.2 V, for which the total power consumption is 107 μ W. The analog part of the design consumes only 36 μ W, which is low in comparison to other contemporary passive tags ICs. Eventually, a passive tag is developed using the frontend IC, a microcontroller, a temperature and a pressure sensor. A smart NFC device is used to readout the sensor data from the tag employing an Android-based application software. The measurement results demonstrate the full passive operational capability. The IC is suitable for low-power and low-cost industrial or biomedical battery-less sensor applications. A figure-of-merit (FOM is proposed in this paper which is taken as a reference for comparison with other related state-of-the-art researches.

  5. An Ultra-Low-Power RFID/NFC Frontend IC Using 0.18 μm CMOS Technology for Passive Tag Applications.

    Science.gov (United States)

    Bhattacharyya, Mayukh; Gruenwald, Waldemar; Jansen, Dirk; Reindl, Leonhard; Aghassi-Hagmann, Jasmin

    2018-05-07

    Battery-less passive sensor tags based on RFID or NFC technology have achieved much popularity in recent times. Passive tags are widely used for various applications like inventory control or in biotelemetry. In this paper, we present a new RFID/NFC frontend IC (integrated circuit) for 13.56 MHz passive tag applications. The design of the frontend IC is compatible with the standard ISO 15693/NFC 5. The paper discusses the analog design part in details with a brief overview of the digital interface and some of the critical measured parameters. A novel approach is adopted for the demodulator design, to demodulate the 10% ASK (amplitude shift keying) signal. The demodulator circuit consists of a comparator designed with a preset offset voltage. The comparator circuit design is discussed in detail. The power consumption of the bandgap reference circuit is used as the load for the envelope detection of the ASK modulated signal. The sub-threshold operation and low-supply-voltage are used extensively in the analog design—to keep the power consumption low. The IC was fabricated using 0.18 μ m CMOS technology in a die area of 1.5 mm × 1.5 mm and an effective area of 0.7 m m 2 . The minimum supply voltage desired is 1.2 V, for which the total power consumption is 107 μ W. The analog part of the design consumes only 36 μ W, which is low in comparison to other contemporary passive tags ICs. Eventually, a passive tag is developed using the frontend IC, a microcontroller, a temperature and a pressure sensor. A smart NFC device is used to readout the sensor data from the tag employing an Android-based application software. The measurement results demonstrate the full passive operational capability. The IC is suitable for low-power and low-cost industrial or biomedical battery-less sensor applications. A figure-of-merit (FOM) is proposed in this paper which is taken as a reference for comparison with other related state-of-the-art researches.

  6. Wirelessly powered sensor networks and computational RFID

    CERN Document Server

    2013-01-01

    The Wireless Identification and Sensing Platform (WISP) is the first of a new class of RF-powered sensing and computing systems.  Rather than being powered by batteries, these sensor systems are powered by radio waves that are either deliberately broadcast or ambient.  Enabled by ongoing exponential improvements in the energy efficiency of microelectronics, RF-powered sensing and computing is rapidly moving along a trajectory from impossible (in the recent past), to feasible (today), toward practical and commonplace (in the near future). This book is a collection of key papers on RF-powered sensing and computing systems including the WISP.  Several of the papers grew out of the WISP Challenge, a program in which Intel Corporation donated WISPs to academic applicants who proposed compelling WISP-based projects.  The book also includes papers presented at the first WISP Summit, a workshop held in Berkeley, CA in association with the ACM Sensys conference, as well as other relevant papers. The book provides ...

  7. Swarm size and iteration number effects to the performance of PSO algorithm in RFID tag coverage optimization

    Science.gov (United States)

    Prathabrao, M.; Nawawi, Azli; Sidek, Noor Azizah

    2017-04-01

    Radio Frequency Identification (RFID) system has multiple benefits which can improve the operational efficiency of the organization. The advantages are the ability to record data systematically and quickly, reducing human errors and system errors, update the database automatically and efficiently. It is often more readers (reader) is needed for the installation purposes in RFID system. Thus, it makes the system more complex. As a result, RFID network planning process is needed to ensure the RFID system works perfectly. The planning process is also considered as an optimization process and power adjustment because the coordinates of each RFID reader to be determined. Therefore, algorithms inspired by the environment (Algorithm Inspired by Nature) is often used. In the study, PSO algorithm is used because it has few number of parameters, the simulation time is fast, easy to use and also very practical. However, PSO parameters must be adjusted correctly, for robust and efficient usage of PSO. Failure to do so may result in disruption of performance and results of PSO optimization of the system will be less good. To ensure the efficiency of PSO, this study will examine the effects of two parameters on the performance of PSO Algorithm in RFID tag coverage optimization. The parameters to be studied are the swarm size and iteration number. In addition to that, the study will also recommend the most optimal adjustment for both parameters that is, 200 for the no. iterations and 800 for the no. of swarms. Finally, the results of this study will enable PSO to operate more efficiently in order to optimize RFID network planning system.

  8. Investigation of a Biocompatible Polyurethane-Based Isotropically Conductive Adhesive for UHF RFID Tag Antennas

    Science.gov (United States)

    Yang, Cheng; Yuen, Matthew M. F.; Gao, Bo; Ma, Yuhui; Wong, C. P.

    2011-01-01

    As a candidate dispersant for silver-based isotropically conductive adhesives (ICAs), polyurethane (PU) is an environmentally benign material that can withstand a high deformation rate and that exhibits excellent reliability. In this work we investigated methyl ethyl ketoxime (MEKO) blocked isophorone diisocyanate (IPDI) and MEKO blocked hexamethylene diisocyanate (HDI) as dispersant materials, and we characterize the electrical conductivity, mechanical properties, and reliability of these PU-based ICAs with silver-flake filler content ranging from 30 wt.% to 75 wt.%. Results of temperature-humidity testing (THT) at 85°C and 85% relative humidity (RH) and thermal cycling testing (TCT) at -40°C to 125°C show that these ICAs have excellent reliability. Our experimental results suggest that the MEKO blocked PU dispersants are suitable for preparing ultralow-cost, flexible, high-performance ICAs for printing antennas for ultrahigh-frequency radiofrequency identification (RFID) tags. These tags can potentially be used for identifying washable items and food packaging.

  9. Coplanar UHF RFID tag antenna with U-shaped inductively coupled feed for metallic applications.

    Directory of Open Access Journals (Sweden)

    Karrar Naji Salman

    Full Text Available In this paper, we present a novel compact, coplanar, tag antenna design for metallic objects. Electrically small antenna has designed for a UHF RFID (860-960 MHz based on a proximity-coupled feed through. Furthermore, two symmetrical Via-loaded coplanar grounds fed by a U-shaped inductively coupled feed through an embedded transmission line. This configuration results in an antenna with dimensions of 31 × 19.5 × 3.065 mm3 at 915 MHz, and the total gain for the antenna is 0.12 dBi. The Via-loaded coplanar and U-shaped inductively coupled feeds allow the antenna to provide flexible tuning in terms of antenna impedance. In addition, a figure of merit is applied for the proposed tag antenna, and the results are presented. The read range is measured to be 4.2 m, which is very close to simulated values. This antenna measurement shows very good agreement with simulations.

  10. Design and implementation of a high sensitivity fully integrated passive UHF RFID tag

    International Nuclear Information System (INIS)

    Li Shoucheng; Wang Xin'an; Lin Ke; Shen Jinpeng; Zhang Jinhai

    2014-01-01

    A fully integrated passive UHF RFID tag complying with the ISO18000-6B protocol is presented, which includes an analog front-end, a baseband processor, and an EEPROM memory. To extend the communication range, a high efficiency differential-drive CMOS rectifier is adopted. A novel high performance voltage limiter is used to provide a stable limiting voltage, with a 172 mV voltage variation against temperature variation and process dispersion. The dynamic band-enhancement technique is used in the regulator circuit to improve the regulating capacity. A rail-to-rail hysteresis comparator is adopted to demodulate the signal correctly in any condition. The whole transponder chip is implemented in a 0.18 μm CMOS process, with a die size of 900 × 800 μm 2 . Our measurement results show that the total power consumption of the tag chip is only 6.8 μW, with a sensitivity of −13.5 dBm (semiconductor integrated circuits)

  11. DEVELOPING A WIRELESS SENSOR NETWORD WITH RFID CAPABILITIES

    Directory of Open Access Journals (Sweden)

    Dan LICA

    2016-05-01

    Full Text Available The concept underlying the pervasive communications systems is Internet of Objects, defined as a global network of smart objects, resulting in "attachment" of communication functions, data acquisition, data processing objects we interact with daily. Internet of Objects will be based on 4th generation of Internet systems. In such systems, each intelligent networked device must offer its users a number of services, which constitute a development of the current model of Web services. Such services will result from aggregation of micro services offered by each pervasive device connected to the Internet. Aggregating these micro services requires that each node in the network has the opportunity to present / expose its capabilities (so-called "advertising" in a standard way for client applications to be integrated into complex services. Therefore there appears the need to introduce a coding scheme to identity the nodes in the network, enabling the identification of their capabilities. An alternative to implementing such a system of encoding / identifying characteristics of network nodes is active RFID technology. The aim of this chapter is to develop a method to ensure the convergence of wireless sensor networks with active RFID systems within a pervasive hybrid network based on the IEEE 802.15.4 standard, which satisfies the Internet of Objects network.

  12. Wearable Passive E-Textile UHF RFID Tag Based on a Slotted Patch Antenna with Sewn Ground and Microchip Interconnections

    Directory of Open Access Journals (Sweden)

    Johanna Virkki

    2017-01-01

    Full Text Available We present a wearable passive UHF RFID tag based on a slotted patch antenna comprising only textile materials (e-textile, textile substrate, and conductive yearn. As a novel manufacturing approach, we realize the patch-to-ground and antenna-to-IC interfaces using only conductive thread and a sewing machine. We outline the electromagnetic optimization of the antenna for body-worn operation through simulations and present a performance comparison between the e-textile tag and a tag produced using regular electronics materials and methods. The measured results show that the textile tag achieves the electrical performance required in practical applications and that the slotted patch type antenna provides stable electromagnetic performance in different body-worn configurations.

  13. Energy Efficient In-network RFID Data Filtering Scheme in Wireless Sensor Networks

    Science.gov (United States)

    Bashir, Ali Kashif; Lim, Se-Jung; Hussain, Chauhdary Sajjad; Park, Myong-Soon

    2011-01-01

    RFID (Radio frequency identification) and wireless sensor networks are backbone technologies for pervasive environments. In integration of RFID and WSN, RFID data uses WSN protocols for multi-hop communications. Energy is a critical issue in WSNs; however, RFID data contains a lot of duplication. These duplications can be eliminated at the base station, but unnecessary transmissions of duplicate data within the network still occurs, which consumes nodes’ energy and affects network lifetime. In this paper, we propose an in-network RFID data filtering scheme that efficiently eliminates the duplicate data. For this we use a clustering mechanism where cluster heads eliminate duplicate data and forward filtered data towards the base station. Simulation results prove that our approach saves considerable amounts of energy in terms of communication and computational cost, compared to existing filtering schemes. PMID:22163999

  14. Energy Efficient In-network RFID Data Filtering Scheme in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Myong-Soon Park

    2011-07-01

    Full Text Available RFID (Radio frequency identification and wireless sensor networks are backbone technologies for pervasive environments. In integration of RFID and WSN, RFID data uses WSN protocols for multi-hop communications. Energy is a critical issue in WSNs; however, RFID data contains a lot of duplication. These duplications can be eliminated at the base station, but unnecessary transmissions of duplicate data within the network still occurs, which consumes nodes’ energy and affects network lifetime. In this paper, we propose an in-network RFID data filtering scheme that efficiently eliminates the duplicate data. For this we use a clustering mechanism where cluster heads eliminate duplicate data and forward filtered data towards the base station. Simulation results prove that our approach saves considerable amounts of energy in terms of communication and computational cost, compared to existing filtering schemes.

  15. Energy-Aware RFID Anti-Collision Protocol.

    Science.gov (United States)

    Arjona, Laura; Simon, Hugo Landaluce; Ruiz, Asier Perallos

    2018-06-11

    The growing interest in mobile devices is transforming wireless identification technologies. Mobile and battery-powered Radio Frequency Identification (RFID) readers, such as hand readers and smart phones, are are becoming increasingly attractive. These RFID readers require energy-efficient anti-collision protocols to minimize the tag collisions and to expand the reader's battery life. Furthermore, there is an increasing interest in RFID sensor networks with a growing number of RFID sensor tags. Thus, RFID application developers must be mindful of tag anti-collision protocols. Energy-efficient protocols involve a low reader energy consumption per tag. This work presents a thorough study of the reader energy consumption per tag and analyzes the main factor that affects this metric: the frame size update strategy. Using the conclusion of this analysis, the anti-collision protocol Energy-Aware Slotted Aloha (EASA) is presented to decrease the energy consumption per tag. The frame size update strategy of EASA is configured to minimize the energy consumption per tag. As a result, EASA presents an energy-aware frame. The performance of the proposed protocol is evaluated and compared with several state of the art Aloha-based anti-collision protocols based on the current RFID standard. Simulation results show that EASA, with an average of 15 mJ consumed per tag identified, achieves a 6% average improvement in the energy consumption per tag in relation to the strategies of the comparison.

  16. Experimental Assessment of Orientation Sensing and Constructive Interference in Passive RFID Systems

    DEFF Research Database (Denmark)

    Krigslund, Rasmus

    2012-01-01

    This thesis focus on passive Radio Frequency IDentication (RFID), a tech- nology designed for automated identication of tagged objects. The tags are small passive devices powered by the wireless signal from the reader. Their simple operation thus solely allows them to reply with their unique ID...... when requested by the reader, which is a high power handheld or stationary transceiver. The RFID technology has matured over the past two decades, but still there exist ambiguities regarding the reading, or interrogation, of tags. Due to the passive nature of the tags, they are severely aected...... experience. Moreover, this thesis proposes to use passive RFID tags as orientation sensors. This is an innovative application for RFID technology in itself, but orientation sensing can also help existing RFID applications that relies on the Received Signal Strength (RSS) in the tag reply. Many Ultra High...

  17. Sequence Learning with Passive RFID Sensors for Real-Time Bed-Egress Recognition in Older People.

    Science.gov (United States)

    Wickramasinghe, Asanga; Ranasinghe, Damith C; Fumeaux, Christophe; Hill, Keith D; Visvanathan, Renuka

    2017-07-01

    Getting out of bed and ambulating without supervision is identified as one of the major causes of patient falls in hospitals and nursing homes. Therefore, increased supervision is proposed as a key strategy toward falls prevention. An emerging generation of batteryless, lightweight, and wearable sensors are creating new possibilities for ambulatory monitoring, where the unobtrusive nature of such sensors makes them particularly adapted for monitoring older people. In this study, we investigate the use of a batteryless radio-frequency identification (RFID) tag response to analyze bed-egress movements. We propose a bed-egress movement detection framework that includes a novel sequence learning classifier with a set of features derived from bed-egress motion analysis. We analyzed data from 14 healthy older people (66-86 years old) who wore a wearable embodiment of a batteryless accelerometer integrated RFID sensor platform loosely attached over their clothes at sternum level, and undertook a series of activities including bed-egress in two clinical room settings. The promising results indicate the efficacy of our batteryless bed-egress monitoring framework.

  18. A hybrid positioning strategy for vehicles in a tunnel based on RFID and in-vehicle sensors.

    Science.gov (United States)

    Song, Xiang; Li, Xu; Tang, Wencheng; Zhang, Weigong; Li, Bin

    2014-12-05

    Many intelligent transportation system applications require accurate, reliable, and continuous vehicle positioning. How to achieve such positioning performance in extended GPS-denied environments such as tunnels is the main challenge for land vehicles. This paper proposes a hybrid multi-sensor fusion strategy for vehicle positioning in tunnels. First, the preliminary positioning algorithm is developed. The Radio Frequency Identification (RFID) technology is introduced to achieve preliminary positioning in the tunnel. The received signal strength (RSS) is used as an indicator to calculate the distances between the RFID tags and reader, and then a Least Mean Square (LMS) federated filter is designed to provide the preliminary position information for subsequent global fusion. Further, to improve the positioning performance in the tunnel, an interactive multiple model (IMM)-based global fusion algorithm is developed to fuse the data from preliminary positioning results and low-cost in-vehicle sensors, such as electronic compasses and wheel speed sensors. In the actual implementation of IMM, the strong tracking extended Kalman filter (STEKF) algorithm is designed to replace the conventional extended Kalman filter (EKF) to achieve model individual filtering. Finally, the proposed strategy is evaluated through experiments. The results validate the feasibility and effectiveness of the proposed strategy.

  19. A Hybrid Positioning Strategy for Vehicles in a Tunnel Based on RFID and In-Vehicle Sensors

    Directory of Open Access Journals (Sweden)

    Xiang Song

    2014-12-01

    Full Text Available Many intelligent transportation system applications require accurate, reliable, and continuous vehicle positioning. How to achieve such positioning performance in extended GPS-denied environments such as tunnels is the main challenge for land vehicles. This paper proposes a hybrid multi-sensor fusion strategy for vehicle positioning in tunnels. First, the preliminary positioning algorithm is developed. The Radio Frequency Identification (RFID technology is introduced to achieve preliminary positioning in the tunnel. The received signal strength (RSS is used as an indicator to calculate the distances between the RFID tags and reader, and then a Least Mean Square (LMS federated filter is designed to provide the preliminary position information for subsequent global fusion. Further, to improve the positioning performance in the tunnel, an interactive multiple model (IMM-based global fusion algorithm is developed to fuse the data from preliminary positioning results and low-cost in-vehicle sensors, such as electronic compasses and wheel speed sensors. In the actual implementation of IMM, the strong tracking extended Kalman filter (STEKF algorithm is designed to replace the conventional extended Kalman filter (EKF to achieve model individual filtering. Finally, the proposed strategy is evaluated through experiments. The results validate the feasibility and effectiveness of the proposed strategy.

  20. A dual-mode secure UHF RFID tag with a crypto engine in 0.13-μm CMOS

    Science.gov (United States)

    Tao, Yang; Linghao, Zhu; Xi, Tan; Junyu, Wang; Lirong, Zheng; Hao, Min

    2016-07-01

    An ultra-high-frequency (UHF) radio frequency identification (RFID) secure tag chip with a non-crypto mode and a crypto mode is presented. During the supply chain management, the tag works in the non-crypto mode in which the on-chip crypto engine is not enabled and the tag chip has a sensitivity of -12.8 dBm for long range communication. At the point of sales (POS), the tag will be switched to the crypto mode in order to protect the privacy of customers. In the crypto mode, an advanced encryption standard (AES) crypto engine is enabled and the sensitivity of the tag chip is switched to +2 dBm for short range communication, which is a method of physical protection. The tag chip is implemented and verified in a standard 0.13-μm CMOS process. Project supported by the National Science & Technology Pillar Program of China (No. 2015BAK36B01).

  1. A hash based mutual RFID tag authentication protocol in telecare medicine information system.

    Science.gov (United States)

    Srivastava, Keerti; Awasthi, Amit K; Kaul, Sonam D; Mittal, R C

    2015-01-01

    Radio Frequency Identification (RFID) is a technology which has multidimensional applications to reduce the complexity of today life. Everywhere, like access control, transportation, real-time inventory, asset management and automated payment systems etc., RFID has its enormous use. Recently, this technology is opening its wings in healthcare environments, where potential applications include patient monitoring, object traceability and drug administration systems etc. In this paper, we propose a secure RFID-based protocol for the medical sector. This protocol is based on hash operation with synchronized secret. The protocol is safe against active and passive attacks such as forgery, traceability, replay and de-synchronization attack.

  2. Investigation of RFID Based Sensors for Sustainable Transportation Applications

    Science.gov (United States)

    2011-01-21

    Through support of a University Transportation Research Center Faculty Development Minigrant an investigation was made into the use of RFID based sensing technologies for transportation purposes. Transportation applications would potentially include ...

  3. High data density and capacity in chipless radiofrequency identification (chipless-RFID) tags based on double-chains of S-shaped split ring resonators (S-SRRs)

    Science.gov (United States)

    Herrojo, Cristian; Mata-Contreras, Javier; Paredes, Ferran; Martín, Ferran

    2017-11-01

    The data density per surface (DPS) is a figure of merit in chipless radiofrequency identification (chipless-RFID) tags. In this paper, it is demonstrated that chipless-RFID tags with high DPS can be implemented by using double-chains of S-shaped split ring resonators (S-SRRs). Tag reading is achieved by near-field coupling between the tag and the reader, a CPW transmission line fed by a harmonic signal tuned to the resonance frequency of the S-SRRs. By transversally displacing the tag over the CPW, the transmission coefficient of the line is modulated by tag motion. This effectively modulates the amplitude of the injected (carrier) signal at the output port of the line, and the identification (ID) code, determined by the presence or absence of S-SRRs at predefined and equidistant positions in the chains, is contained in the envelope function. The DPS is determined by S-SRR dimensions and by the distance between S-SRRs in the chains. However, by using two chains of S-SRRs, the number of bits per unit length that can be accommodated is very high. This chipless-RFID system is of special interest in applications where the reading distance can be sacrificed in favor of data capacity (e.g., security and authentication). Encoding of corporate documents, ballots, exams, etc., by directly printing the proposed tags on the item product to prevent counterfeiting is envisaged.

  4. Brush-Painting and Photonic Sintering of Copper Oxide and Silver Inks on Wood and Cardboard Substrates to Form Antennas for UHF RFID Tags

    Directory of Open Access Journals (Sweden)

    Erja Sipilä

    2016-01-01

    Full Text Available Additive deposition of inks with metallic inclusions provides compelling means to embed electronics into versatile structures. The need to integrate electronics into environmentally friendly components and structures increases dramatically together with the increasing popularity of the Internet of Things. We demonstrate a novel brush-painting method for depositing copper oxide and silver inks directly on wood and cardboard substrates and discuss the optimization of the photonic sintering process parameters for both materials. The optimized parameters were utilized to manufacture passive ultra high frequency (UHF radio frequency identification (RFID tag antennas. The results from wireless testing show that the RFID tags based on the copper oxide and silver ink antennas on wood substrate are readable from ranges of 8.5 and 11 meters, respectively, and on cardboard substrate from read ranges of 8.5 and 12 meters, respectively. These results are well sufficient for many future wireless applications requiring remote identification with RFID.

  5. A Novel Technology for Motion Capture Using Passive UHF RFID Tags

    DEFF Research Database (Denmark)

    Krigslund, Rasmus; Popovski, Petar; Pedersen, Gert Frølund

    2013-01-01

    Although there are several existing methods for human motion capture, they all have important limitations and hence there is the need to explore fundamentally new approaches. Here we present a method based on a Radio Frequency IDentification (RFID) system with passive Ultra High Frequency (UHF...... walking. The reference joint angles for the validation were obtained by an optoelectronic system. Although the method is in its initial phase of development, the results of the validation are promising and show that the movement information can be extracted from the RFID response signals....

  6. Signal and array processing techniques for RFID readers

    Science.gov (United States)

    Wang, Jing; Amin, Moeness; Zhang, Yimin

    2006-05-01

    Radio Frequency Identification (RFID) has recently attracted much attention in both the technical and business communities. It has found wide applications in, for example, toll collection, supply-chain management, access control, localization tracking, real-time monitoring, and object identification. Situations may arise where the movement directions of the tagged RFID items through a portal is of interest and must be determined. Doppler estimation may prove complicated or impractical to perform by RFID readers. Several alternative approaches, including the use of an array of sensors with arbitrary geometry, can be applied. In this paper, we consider direction-of-arrival (DOA) estimation techniques for application to near-field narrowband RFID problems. Particularly, we examine the use of a pair of RFID antennas to track moving RFID tagged items through a portal. With two antennas, the near-field DOA estimation problem can be simplified to a far-field problem, yielding a simple way for identifying the direction of the tag movement, where only one parameter, the angle, needs to be considered. In this case, tracking of the moving direction of the tag simply amounts to computing the spatial cross-correlation between the data samples received at the two antennas. It is pointed out that the radiation patterns of the reader and tag antennas, particularly their phase characteristics, have a significant effect on the performance of DOA estimation. Indoor experiments are conducted in the Radar Imaging and RFID Labs at Villanova University for validating the proposed technique for target movement direction estimations.

  7. A wireless sensor tag platform for container security and integrity

    Science.gov (United States)

    Amaya, Ivan A.; Cree, Johnathan V.; Mauss, Fredrick J.

    2011-04-01

    Cargo containers onboard ships are widely used in the global supply chain. The need for container security is evidenced by the Container Security Initiative launched by the U.S. Bureau of Customs and Border Protection (CBP). One method of monitoring cargo containers is using low power wireless sensor tags. The wireless sensor tags are used to set up a network that is comprised of tags internal to the container and a central device. The sensor network reports alarms and other anomalies to a central device, which then relays the message to an outside network upon arrival at the destination port. This allows the port authorities to have knowledge of potential security or integrity issues before physically examining the container. Challenges of using wireless sensor tag networks for container security include battery life, size, environmental conditions, information security, and cost among others. PNNL developed an active wireless sensor tag platform capable of reporting data wirelessly to a central node as well as logging data to nonvolatile memory. The tags, operate at 2.4 GHz over an IEEE 802.15.4 protocol, and were designed to be distributed throughout the inside of a shipping container in the upper support frame. The tags are mounted in a housing that allows for simple and efficient installation or removal prior to, during, or after shipment. The distributed tags monitor the entire container volume. The sensor tag platform utilizes low power electronics and provides an extensible sensor interface for incorporating a wide range of sensors including chemical, biological, and environmental sensors.

  8. Employing RFID for an Equipment Management System via Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Jui-Ho Chen

    2014-01-01

    Full Text Available This paper is mainly in combination with RFID to construct a set of power system equipment remote control, used first on the reader tags received after the use of Visual Basic in order to determine the signal and then transmits the signal via the RS232 cable to control circuit 8051 to control the instrument power switch. The topic is written in the Visual Basic RFID and uses features, such as personnel control systems, and access control systems, which are derived from the time of access control systems, several instrument control systems, and uses records stored in the form of functions, where the other circuit transmits signals to Visual Basic 8051, and then, by 8051, controls the instrument power switch.

  9. Improving RF Transmit Power and Received Signal Strength in 2.4 GHz ZigBee Based Active RFID System with Embedded Method

    Science.gov (United States)

    Po'ad, F. A.; Ismail, W.; Jusoh, J. F.

    2017-08-01

    This paper describes the experiments and analysis conducted on 2.4 GHz embedded active Radio Frequency Identification (RFID) - Wireless Sensor Network (WSN) based system that has been developed for the purposes of location tracking and monitoring in indoor and outdoor environments. Several experiments are conducted to test the effectiveness and performance of the developed system and two of them is by measuring the Radio Frequency (RF) transmitting power and Received Signal Strength (RSS) to prove that the embedded active RFID tag is capable to generate higher transmit power during data transmission and able to provide better RSS reading compared to standalone RFID tag. Experiments are carried out on two RFID tags which are active RFID tag embedded with GPS and GSM (ER2G); and standalone RFID tag communicating with the same active RFID reader. The developed ER2G contributes 12.26 % transmit power and 6.47 % RSS reading higher than standalone RFID tag. The results conclude that the ER2G gives better performance compared to standalone RFID tag and can be used as guidelines for future design improvements.

  10. A Platform for RFID Security and Privacy Administration

    NARCIS (Netherlands)

    Rieback, M.R.; Gaydadjiev, G.N.; Crispo, B.; Hofman, R.F.H.; Tanenbaum, A.S.

    2006-01-01

    This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an ``RFID firewall,'' that monitors and controls access to RFID tags by combining a standard-issue RFID

  11. Risk Assessment along Supply Chain: A RFID and Wireless Sensor Network Integration Approach

    OpenAIRE

    Laurent GOMEZ; Maryline LAURENT; Ethmane EL MOUSTAINE

    2012-01-01

    Wireless Sensor Networks together with Radio Frequency Identification are promising technologies for supply chain management systems. They both provide supply chain players with goods tracking and monitoring functions along the chain. Whereas RFIDs are rather focusing on identification of goods (e.g., identification, classification), WSNs are meant to monitor and control the supply chain environment. Nevertheless, despite the interest for the supply chain management systems, their integration...

  12. Low-cost low-power UHF RFID tag with on-chip antenna

    Energy Technology Data Exchange (ETDEWEB)

    Xi Jingtian; Yan Na; Che Wenyi; Xu Conghui; Wang Xiao; Yang Yuqing; Jian Hongyan; Min Hao, E-mail: jtxi@fudan.edu.c [State Key Laboratory of ASIC and System, Auto-ID Laboratory, Fudan University, Shanghai 201203 (China)

    2009-07-15

    This paper presents an EPC Class 1 Generation 2 compatible tag with on-chip antenna implemented in the SMIC 0.18 {mu}m standard CMOS process. The UHF tag chip includes an RF/analog front-end, a digital baseband, and a 640-bit EEPROM memory. The on-chip antenna is optimized based on a novel parasitic-aware model. The rectifier is optimized to achieve a power conversion efficiency up to 40% by applying a self-bias feedback and threshold compensation techniques. A good match between the tag circuits and the on-chip antenna is realized by adjusting the rectifier input impedance. Measurements show that the presented tag can achieve a communication range of 1 cm with 1 W reader output power using a 1 x 1 cm{sup 2} single-turn loop reader antenna.

  13. Development of corrosion condition sensing and monitoring system using radio-frequency identification devices (RFID)

    Energy Technology Data Exchange (ETDEWEB)

    Gu, G.P.; Zheng, W. [Natural Resources Canada, Ottawa, ON (Canada). CANMET Materials Technology Laboratory

    2008-05-15

    This study discussed the development of a corrosion sensing and monitoring system for military land vehicles. Radio-frequency identification device (RFID) technology uses radio waves to identify individual masses with RFID tags attached. A corrosion-sensing element was integrated with the RFID technology, which incorporated a galvanic corrosion cell designed to trigger RFID tags. Corrosion severity was then related to the galvanic current. The tag recorded the sensor reading and transmitted the data to an RFID reader. The tags consisted of a microchip and an antenna. A software development kit has also been developed to interface RFID data with existing applications. While it is currently not possible to modify the RFID tags to prevent security risks, further research is being conducted to assemble a data-logger system with corrosion probes to measure humidity, electrical resistance, and linear polarization resistance. Studies will also be conducted to assemble an active tag reader system and investigate potential modifications. 4 refs., 1 fig., 1 appendix.

  14. Passive RFID Localisation Framework in Smart Homes Healthcare Settings.

    Science.gov (United States)

    Alsinglawi, Belal; Liu, Tony; Nguyen, Quang Vinh; Gunawardana, Upul; Maeder, Anthony; Simoff, Simeon

    2016-01-01

    In recent years, Smart Homes have become a solution to benefit impaired individuals and elderly in their daily life settings. In healthcare applications, pervasive technologies have enabled the practicality of personal monitoring using Indoor positioning technologies. Radio-Frequency Identification (RFID) is a promising technology, which is useful for non-invasive tracking of activities of daily living. Many implementations have focused on using battery-enabled tags like in RFID active tags, which require frequent maintenance and they are costly. Other systems can use wearable sensors requiring individuals to wear tags which may be inappropriate for elders. Successful implementations of a tracking system are dependent on multiple considerations beyond the physical performance of the solution, such as affordability and human acceptance. This paper presents a localisation framework using passive RFID sensors. It aims to provide a low cost solution for subject location in Smart Homes healthcare.

  15. Chipless RFID reader architecture

    CERN Document Server

    Karmakar, Nemai Chandra; Kalansuriya, Prasanna

    2013-01-01

    In the era of information communication technology (ICT), radio frequency identification (RFID) has been going through tremendous development. RFID technology has the potential of replacing barcodes due to its large information carrying capacity, flexibility in operations, and applications. The deployment of RFID has been hindered by its cost. However, with the advent of low powered ICs, energy scavenging techniques, and low-cost chipless tags, RFID technology has achieved significant development. This book addresses the new reader architecture, presents fundamentals of chipless RFID systems,

  16. A UHF RFID system with on-chip-antenna tag for short range communication

    International Nuclear Information System (INIS)

    Peng Qi; Zhang Chun; Zhao Xijin; Wang Zhihua

    2015-01-01

    A UHF RF identification system based on the 0.18 μm CMOS process has been developed for short range and harsh size requirement applications, which is composed of a fully integrated tag and a special reader. The whole tag chip with the antenna takes up an area of 0.36 mm 2 , which is smaller than other reported tags with an on-chip antenna (OCA) using the standard CMOS process. A self-defined protocol is proposed to reduce the power consumption, and minimize the size of the tag. The specialized SOC reader system consists of the RF transceiver, digital baseband, MCU and host interface. Its power consumption is about 500 mW. Measurement results show that the system's reading range is 2 mm with 20 dBm reader output power. With an inductive antenna printed on a paper substrate around the OCA tag, the reading range can be extended from several centimeters to meters, depending on the shape and size of the inductive antenna. (paper)

  17. An ultra-low-power CMOS temperature sensor for RFID applications

    International Nuclear Information System (INIS)

    Xu Conghui; Gao Peijun; Che Wenyi; Tan Xi; Yan Na; Min Hao

    2009-01-01

    An ultra-low-power CMOS temperature sensor with analog-to-digital readout circuitry for RFID applications was implemented in a 0.18-μm CMOS process. To achieve ultra-low power consumption, an error model is proposed and the corresponding novel temperature sensor front-end with a new double-measure method is presented. Analog-to-digital conversion is accomplished by a sigma-delta converter. The complete system consumes only 26 μA and 1.8 V for continuous operation and achieves an accuracy of ±0.65 deg. C from -20 to 120 deg. C after calibration at one temperature.

  18. An ultra-low-power CMOS temperature sensor for RFID applications

    Energy Technology Data Exchange (ETDEWEB)

    Xu Conghui; Gao Peijun; Che Wenyi; Tan Xi; Yan Na; Min Hao, E-mail: yanna@fudan.edu.c [State Key Laboratory of ASIC and System, Fudan University, Shanghai 201203 (China)

    2009-04-15

    An ultra-low-power CMOS temperature sensor with analog-to-digital readout circuitry for RFID applications was implemented in a 0.18-mum CMOS process. To achieve ultra-low power consumption, an error model is proposed and the corresponding novel temperature sensor front-end with a new double-measure method is presented. Analog-to-digital conversion is accomplished by a sigma-delta converter. The complete system consumes only 26 muA and 1.8 V for continuous operation and achieves an accuracy of +-0.65 deg. C from -20 to 120 deg. C after calibration at one temperature.

  19. A Qualitative Approach to Mobile Robot Navigation Using RFID

    International Nuclear Information System (INIS)

    Hossain, M; Rashid, M M; Bhuiyan, M M I; Ahmed, S; Akhtaruzzaman, M

    2013-01-01

    Radio Frequency Identification (RFID) system allows automatic identification of items with RFID tags using radio-waves. As the RFID tag has its unique identification number, it is also possible to detect a specific region where the RFID tag lies in. Recently it is widely been used in mobile robot navigation, localization, and mapping both in indoor and outdoor environment. This paper represents a navigation strategy for autonomous mobile robot using passive RFID system. Conventional approaches, such as landmark or dead-reckoning with excessive number of sensors, have complexities in establishing the navigation and localization process. The proposed method satisfies less complexity in navigation strategy as well as estimation of not only the position but also the orientation of the autonomous robot. In this research, polar coordinate system is adopted on the navigation surface where RFID tags are places in a grid with constant displacements. This paper also presents the performance comparisons among various grid architectures through simulation to establish a better solution of the navigation system. In addition, some stationary obstacles are introduced in the navigation environment to satisfy the viability of the navigation process of the autonomous mobile robot

  20. A 60-GHz rectenna for monolithic wireless sensor tags

    NARCIS (Netherlands)

    Gao, H.; Johannsen, U.; Matters - Kammerer, M.; Milosevic, D.; Smolders, A.B.; Roermund, van A.H.M.; Baltus, P.G.M.

    2013-01-01

    This paper presents the design of a 60-GHz rectenna with an on-chip antenna and rectifier in 65nm CMOS technology. The rectenna is often the bottleneck in realizing a fully-integrated monolithic wireless sensor tag. In this paper, problems of the mm-wave rectifier are discussed, and the

  1. Documentation package for the RFID temperature monitoring system (Model 9977 packages at NTS)

    International Nuclear Information System (INIS)

    Chen, K.; Tsai, H.

    2009-01-01

    The technical basis for extending the Model 9977 shipping package periodic maintenance beyond the one-year interval to a maximum of five years is based on the performance of the O-ring seals and the environmental conditions. The DOE Packaging Certification Program (PCP) has tasked Argonne National Laboratory to develop a Radio-Frequency Identification (RFID) temperature monitoring system for use by the facility personnel at DAF/NTS. The RFID temperature monitoring system, depicted in the figure below, consists of the Mk-1 RFId tags, a reader, and a control computer mounted on a mobile platform that can operate as a stand-alone system, or it can be connected to the local IT network. As part of the Conditions of Approval of the CoC, the user must complete the prescribed training to become qualified and be certified for operation of the RFID temperature monitoring system. The training course will be administered by Argonne National Laboratory on behalf of the Headquarters Certifying Official. This is a complete documentation package for the RFID temperature monitoring system of the Model 9977 packagings at NTS. The documentation package will be used for training and certification. The table of contents are: Acceptance Testing Procedure of MK-1 RFID Tags for DOE/EM Nuclear Materials Management Applications; Acceptance Testing Result of MK-1 RFID Tags for DOE/EM Nuclear Materials Management Applications; Performance Test of the Single Bolt Seal Sensor for the Model 9977 Packaging; Calibration of Built-in Thermistors in RFID Tags for Nevada Test Site; Results of Calibration of Built-in Thermistors in RFID Tags; Results of Thermal Calibration of Second Batch of MK-I RFID Tags; Procedure for Installing and Removing MK-1 RFID Tag on Model 9977 Drum; User Guide for RFID Reader and Software for Temperature Monitoring of Model 9977 Drums at NTS; Software Quality Assurance Plan (SQAP) for the ARG-US System; Quality Category for the RFID Temperature Monitoring System; The

  2. Documentation pckage for the RFID temperature monitoring system (Of Model 9977 packages at NTS).

    Energy Technology Data Exchange (ETDEWEB)

    Chen, K.; Tsai, H.; Decision and Information Sciences

    2009-02-20

    The technical basis for extending the Model 9977 shipping package periodic maintenance beyond the one-year interval to a maximum of five years is based on the performance of the O-ring seals and the environmental conditions. The DOE Packaging Certification Program (PCP) has tasked Argonne National Laboratory to develop a Radio-Frequency Identification (RFID) temperature monitoring system for use by the facility personnel at DAF/NTS. The RFID temperature monitoring system, depicted in the figure below, consists of the Mk-1 RFId tags, a reader, and a control computer mounted on a mobile platform that can operate as a stand-alone system, or it can be connected to the local IT network. As part of the Conditions of Approval of the CoC, the user must complete the prescribed training to become qualified and be certified for operation of the RFID temperature monitoring system. The training course will be administered by Argonne National Laboratory on behalf of the Headquarters Certifying Official. This is a complete documentation package for the RFID temperature monitoring system of the Model 9977 packagings at NTS. The documentation package will be used for training and certification. The table of contents are: Acceptance Testing Procedure of MK-1 RFID Tags for DOE/EM Nuclear Materials Management Applications; Acceptance Testing Result of MK-1 RFID Tags for DOE/EM Nuclear Materials Management Applications; Performance Test of the Single Bolt Seal Sensor for the Model 9977 Packaging; Calibration of Built-in Thermistors in RFID Tags for Nevada Test Site; Results of Calibration of Built-in Thermistors in RFID Tags; Results of Thermal Calibration of Second Batch of MK-I RFID Tags; Procedure for Installing and Removing MK-1 RFID Tag on Model 9977 Drum; User Guide for RFID Reader and Software for Temperature Monitoring of Model 9977 Drums at NTS; Software Quality Assurance Plan (SQAP) for the ARG-US System; Quality Category for the RFID Temperature Monitoring System; The

  3. Energy storage management system with distributed wireless sensors

    Science.gov (United States)

    Farmer, Joseph C.; Bandhauer, Todd M.

    2015-12-08

    An energy storage system having a multiple different types of energy storage and conversion devices. Each device is equipped with one or more sensors and RFID tags to communicate sensor information wirelessly to a central electronic management system, which is used to control the operation of each device. Each device can have multiple RFID tags and sensor types. Several energy storage and conversion devices can be combined.

  4. Design of an ultra-low-power digital processor for passive UHF RFID tags

    Energy Technology Data Exchange (ETDEWEB)

    Shi Wanggen; Zhuang Yiqi; Li Xiaoming; Wang Xianghua; Jin Zhao; Wang Dan, E-mail: wanggen_shi@163.co [Key Laboratory of the Ministry of Education for Wide Band-Gap Semiconductor Materials and Devices, Institute of Microelectronics, Xidian University, Xi' an 710071 (China)

    2009-04-15

    A new architecture of digital processors for passive UHF radio-frequency identification tags is proposed. This architecture is based on ISO/IEC 18000-6C and targeted at ultra-low power consumption. By applying methods like system-level power management, global clock gating and low voltage implementation, the total power of the design is reduced to a few microwatts. In addition, an innovative way for the design of a true RNG is presented, which contributes to both low power and secure data transaction. The digital processor is verified by an integrated FPGA platform and implemented by the Synopsys design kit for ASIC flows. The design fits different CMOS technologies and has been taped out using the 2P4M 0.35 mum process of Chartered Semiconductor.

  5. Design of an ultra-low-power digital processor for passive UHF RFID tags

    International Nuclear Information System (INIS)

    Shi Wanggen; Zhuang Yiqi; Li Xiaoming; Wang Xianghua; Jin Zhao; Wang Dan

    2009-01-01

    A new architecture of digital processors for passive UHF radio-frequency identification tags is proposed. This architecture is based on ISO/IEC 18000-6C and targeted at ultra-low power consumption. By applying methods like system-level power management, global clock gating and low voltage implementation, the total power of the design is reduced to a few microwatts. In addition, an innovative way for the design of a true RNG is presented, which contributes to both low power and secure data transaction. The digital processor is verified by an integrated FPGA platform and implemented by the Synopsys design kit for ASIC flows. The design fits different CMOS technologies and has been taped out using the 2P4M 0.35 μm process of Chartered Semiconductor.

  6. Raft and floating radio frequency identification (RFID) antenna systems for detecting and estimating abundance of PIT-tagged fish in rivers

    Science.gov (United States)

    Fetherman, Eric R.; Avila, Brian W.; Winkelman, Dana L.

    2016-01-01

    Portable radio frequency identification (RFID) PIT tag antenna systems are increasingly being used in studies examining aquatic animal movement, survival, and habitat use, and their design flexibility permits application in a wide variety of settings. We describe the construction, use, and performance of two portable floating RFID PIT tag antenna systems designed to detect fish that were unavailable for recapture using stationary antennas or electrofishing. A raft antenna system was designed to detect and locate PIT-tagged fish in relatively long (i.e., ≥10 km) river reaches, and consisted of two antennas: (1) a horizontal antenna (4 × 1.2 m) installed on the bottom of the raft and used to detect fish in shallower river reaches (raft antenna system, which covered 21% of the wetted area, was 0.14 ± 0.14. A shore-deployed floating antenna (14.6 × 0.6 m), which covered 100% of the wetted area, was designed for use by two operators for detecting and locating PIT-tagged fish in shorter (i.e., <2 km) river reaches. Detection distances of the shore-deployed floating antenna were between 0.7 and 0.8 m, and detection probabilities during field deployment in the St. Vrain River exceeded 0.52. The shore-deployed floating antenna was also used to estimate abundance of PIT-tagged fish. Results suggest that the shore-deployed floating antenna could be used as an alternative to estimating abundance using traditional sampling methods such as electrofishing.

  7. A CMOS pressure sensor with integrated interface for passive RFID applications

    International Nuclear Information System (INIS)

    Deng, Fangming; He, Yigang; Wu, Xiang; Fu, Zhihui

    2014-01-01

    This paper presents a CMOS pressure sensor with integrated interface for passive RFID sensing applications. The pressure sensor consists of three parts: top electrode, dielectric layer and bottom electrode. The dielectric layer consists of silicon oxide and an air gap. The bottom electrode is made of polysilicon. The gap is formed by sacrificial layer release and the Al vapor process is used to seal the gap and form the top electrode. The sensor interface is based on phase-locked architecture, which allows the use of fully digital blocks. The proposed pressure sensor and interface is fabricated in a 0.18 μm CMOS process. The measurement results show the pressure sensor achieves excellent linearity with a sensitivity of 1.2 fF kPa −1 . The sensor interface consumes only 1.1 µW of power at 0.5 V voltage supply, which is at least an order of magnitude better than state-of-the-art designs. (paper)

  8. RFID vs.Wi-Fi ID

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Wireless networks and Radio Frequency Identification(RFID) have always been closely linked.One of Wi-Fi’s first applications was transferring data from portable RFID readers.But the popularity of RFID has led some to envision whole networks of readers embed- ded throughout a building’s infrastructure.Reva Systems had an- nounced what it calls a Tag Acquisition Network(TAN),an array of RFID readers that work with passive,batteryless tags.Meanwhile,

  9. Novel wireless health monitor with acupuncture bio-potentials obtained by using a replaceable salt-water-wetted foam-rubber cushions on RFID-tag.

    Science.gov (United States)

    Lin, Jium-Ming; Lu, Hung-Han; Lin, Cheng-Hung

    2014-01-01

    This paper proposes a bio-potential measurement apparatus including a wireless device for transmitting acupuncture bio-potential information to a remote control station for health conditions analysis and monitor. The key technology of this system is to make replaceable foam-rubber cushions, double-side conducting tapes, chip and antenna on the radio frequency identification (RFID) tag. The foam-rubber cushions can be wetted with salt-water and contact with the acupuncture points to reduce contact resistance. Besides, the double-side conducting tapes are applied to fix foam-rubber cushions. Thus, one can peel the used cushions or tapes away and supply new ones quickly. Since the tag is a flexible plastic substrate, it is easy to deploy on the skin. Besides, the amplifier made by CMOS technology on RFID chip could amplify the signals to improve S/N ratio and impedance matching. Thus, cloud server can wirelessly monitor the health conditions. An example shows that the proposed system can be used as a wireless health condition monitor, the numerical method and the criteria are given to analyze eleven bio-potentials for the important acupunctures of eleven meridians on a person's hands and legs. Then a professional doctor can know the performance of an individual and the cross-linking effects of the organs.

  10. Miniaturizing RFID for magnamosis.

    Science.gov (United States)

    Jiang, Hao; Chen, Shijie; Kish, Shad; Loh, Lokkee; Zhang, Junmin; Zhang, Xiaorong; Kwiat, Dillon; Harrison, Michael; Roy, Shuvo

    2014-01-01

    Anastomosis is a common surgical procedure using staples or sutures in an open or laparoscopic surgery. A more effective and much less invasive alternative is to apply the mechanical pressure on the tissue over a few days [1]. Since the pressure is produced by the attractive force between two permanent magnets, the procedure is called magnamosis[1]. To ensure the two magnets are perfectly aligned during the surgery, a miniaturized batteryless Radio Frequency IDentification (RFID) tag is developed to wirelessly telemeter the status of a pressure sensitive mechanical switch. Using the multi-layer circular spiral coil design, the diameter of the RFID tag is shrunk to 10, 15, 19 and 27 mm to support the magnamosis for children as well as adults. With the impedance matching network, the operating distance of these four RFID tags are longer than 10 cm in a 20 × 22 cm(2) area, even when the tag's normal direction is 45° off the antenna's normal direction. Measurement results also indicate that there is no noticeable degradation on the operating distance when the tag is immersed in saline or placed next to the rare-earth magnet. The miniaturized RFID tag presented in this paper is able to support the magnamosis and other medical applications that require the miniaturized RFID tag.

  11. Raft and floating radio frequency identification (RFID) antenna systems for detecting and estimating abundance of PIT-tagged fish in rivers

    Science.gov (United States)

    Fetherman, Eric R.; Avila, Brian W.; Winkelman, Dana L.

    2016-01-01

    Portable radio frequency identification (RFID) PIT tag antenna systems are increasingly being used in studies examining aquatic animal movement, survival, and habitat use, and their design flexibility permits application in a wide variety of settings. We describe the construction, use, and performance of two portable floating RFID PIT tag antenna systems designed to detect fish that were unavailable for recapture using stationary antennas or electrofishing. A raft antenna system was designed to detect and locate PIT-tagged fish in relatively long (i.e., ≥10 km) river reaches, and consisted of two antennas: (1) a horizontal antenna (4 × 1.2 m) installed on the bottom of the raft and used to detect fish in shallower river reaches (<1 m), and (2) a vertical antenna (2.7 × 1.2 m) for detecting fish in deeper pools (≥1 m). Detection distances of the horizontal antenna were between 0.7 and 1.0 m, and detection probability was 0.32 ± 0.02 (mean ± SE) in a field test using rocks marked with 32-mm PIT tags. Detection probability of PIT-tagged fish in the Cache la Poudre River, Colorado, using the raft antenna system, which covered 21% of the wetted area, was 0.14 ± 0.14. A shore-deployed floating antenna (14.6 × 0.6 m), which covered 100% of the wetted area, was designed for use by two operators for detecting and locating PIT-tagged fish in shorter (i.e., <2 km) river reaches. Detection distances of the shore-deployed floating antenna were between 0.7 and 0.8 m, and detection probabilities during field deployment in the St. Vrain River exceeded 0.52. The shore-deployed floating antenna was also used to estimate abundance of PIT-tagged fish. Results suggest that the shore-deployed floating antenna could be used as an alternative to estimating abundance using traditional sampling methods such as electrofishing.

  12. Cattle behaviour classification from collar, halter, and ear tag sensors

    Directory of Open Access Journals (Sweden)

    A. Rahman

    2018-03-01

    Full Text Available In this paper, we summarise the outcome of a set of experiments aimed at classifying cattle behaviour based on sensor data. Each animal carried sensors generating time series accelerometer data placed on a collar on the neck at the back of the head, on a halter positioned at the side of the head behind the mouth, or on the ear using a tag. The purpose of the study was to determine how sensor data from different placement can classify a range of typical cattle behaviours. Data were collected and animal behaviours (grazing, standing or ruminating were observed over a common time frame. Statistical features were computed from the sensor data and machine learning algorithms were trained to classify each behaviour. Classification accuracies were computed on separate independent test sets. The analysis based on behaviour classification experiments revealed that different sensor placement can achieve good classification accuracy if the feature space (representing motion patterns between the training and test animal is similar. The paper will discuss these analyses in detail and can act as a guide for future studies.

  13. Theory and application on RFID

    International Nuclear Information System (INIS)

    Cho, Dae Jin

    2005-02-01

    This book tells of definition, system, operation method and classification of RFID, prospect of market, tag such as types, making process of tag, operation way and structure of tag, store of tag data and tag price, chip less tag like leader, antenna ; EPC global such as appearance of Auto-ID center, introduction of EPC system, middle ware, ONS, EPC IS and PML, a manufacturer, standardization, frequency, application cases abroad home, problems and labeling.

  14. Theory and application on RFID

    Energy Technology Data Exchange (ETDEWEB)

    Cho, Dae Jin

    2005-02-15

    This book tells of definition, system, operation method and classification of RFID, prospect of market, tag such as types, making process of tag, operation way and structure of tag, store of tag data and tag price, chip less tag like leader, antenna ; EPC global such as appearance of Auto-ID center, introduction of EPC system, middle ware, ONS, EPC IS and PML, a manufacturer, standardization, frequency, application cases abroad home, problems and labeling.

  15. Onisciente: um modelo de geração de contexto baseado em RFID e sensores

    Directory of Open Access Journals (Sweden)

    Felipe da Costa Noguez

    2015-04-01

    Full Text Available O monitoramento de entidades para determinar uma situação é uma aplicação interessante para diversas áreas. Pode-se utilizar dados obtidos de sensores, disponíveis em um ambiente, para descrever o contexto dos elementos presentes. Nesse âmbito, o presente trabalho tem como finalidade apresentar o Onisciente, um modelo que utiliza a informação de um conjunto de sensores que estejam monitorando um mesmo elemento para determinar o seu contexto e obter conhecimento sobre suas condições. Para isso, o Onisciente realiza a identificação dessas entidades, com o auxílio de uma leitora RFID acrescida de alguns sensores. No modelo, um contexto representa uma imagem de momento preciso no tempo, na qual se pode verificar fatos que estejam ocorrendo e, com isso, tomar decisões. Essas decisões envolvem classificar os contextos gerados e, conforme a classificação obtida, informar eventuais situações desfavoráveis às entidades monitoradas. Para determinar um contexto e realizar a classificação do significado que ele representa, são empregadas ontologias, computação sensível ao contexto e modelagem de contexto. Um protótipo foi desenvolvido para avaliar o modelo, mostrando a viabilidade do modelo proposto.

  16. Sensor-based supporting mobile system Parkinson disease clinical tests utilising biomedical and RFID technologies

    Directory of Open Access Journals (Sweden)

    Chmielewski Mariusz

    2017-01-01

    Full Text Available This paper discusses method and tool for assisting clinical tests of pharmaceutical drugs utilising sensors and mobile technologies. Emerging sensor and mobile technologies deliver new opportunities to gather and process medical data. Presented analytical approach implements such observations and delivers new, convenient means for remote patient monitoring. Clinical tests are highly specialised process requiring methodology and tools to support such research. Currently available methods rely mostly on analogue approach (booklets, requiring the clinical test participant to fill in health state daily. Such approach often can be biased by unpunctual, not precise reporting. The mobile device can support this process by automatic scheduling and recording an actual time of reports and most of all it can record the inertial and biometric sensor data during the survey process. Presented analytical method (tremors recognition and mobile tool offers consistent approach to clinical test assistance transforming and Android smartphone into remote reporting and notification tool. The tool offers additionally features for sensor based diagnostics support for PD tremor recognition as well as specific clonic and tonic symptoms (dedicated for further system extensions towards epilepsy. Capabilities of the system delivers also RFID mechanisms for efficient on-site clinical test authorisation and configuration. This feature simplifies application installation and automatic set-up considering the participant, clinical test configuration, schedule, smartphone and sensor data. Such a composition delivers convenient and reliable tool which can assist patients and medical staff during the process objectifying the clinical tests results and helping to ensure good quality of the data, quickly available and easily accessible.

  17. RFID solution benefits Cambridge hospital.

    Science.gov (United States)

    James, Andrew

    2013-10-01

    Keeping track of thousands of pieces of equipment in a busy hospital environment is a considerable challenge, but, according to RFID tagging and asset tracking specialist, Harland Simon, RFID technology can make the task considerably simpler. Here Andrew James, the company's RFID sales manager, describes the positive benefits the technology has brought the Medical Equipment Library (MEL) at Addenbrooke's Hospital, one of the world's most famous teaching hospitals.

  18. Long range ultra-high frequency (UHF) radio frequency identification (RFID) antenna design

    Science.gov (United States)

    Reynolds, Nathan D.

    There is an ever-increasing demand for radio frequency identification (RFID) tags that are passive, long range, and mountable on multiple surfaces. Currently, RFID technology is utilized in numerous applications such as supply chain management, access control, and public transportation. With the combination of sensory systems in recent years, the applications of RFID technology have been extended beyond tracking and identifying. This extension includes applications such as environmental monitoring and healthcare applications. The available sensory systems usually operate in the medium or high frequency bands and have a low read range. However, the range limitations of these systems are being overcome by the development of RFID sensors focused on utilizing tags in the ultra-high frequency (UHF) band. Generally, RFID tags have to be mounted to the object that is being identified. Often the objects requiring identification are metallic. The inherent properties of metallic objects have substantial effects on nearby electromagnetic radiation; therefore, the operation of the tag antenna is affected when mounted on a metallic surface. This outlines one of the most challenging problems for RFID systems today: the optimization of tag antenna performance in a complex environment. In this research, a novel UHF RFID tag antenna, which has a low profile, long range, and is mountable on metallic surfaces, is designed analytically and simulated using a 3-D electromagnetic simulator, ANSYS HFSS. A microstrip patch antenna is selected as the antenna structure, as patch antennas are low profile and suitable for mounting on metallic surfaces. Matching and theoretical models of the microstrip patch antenna are investigated. Once matching and theory of a microstrip patch antenna is thoroughly understood, a unique design technique using electromagnetic band gap (EBG) structures is explored. This research shows that the utilization of an EBG structure in the patch antenna design yields

  19. Creating TUIs Using RFID Sensors--A Case Study Based on the Literacy Process of Children with Down Syndrome.

    Science.gov (United States)

    Jadán-Guerrero, Janio; Guerrero, Luis; López, Gustavo; Cáliz, Doris; Bravo, José

    2015-06-24

    Teaching children with intellectual disabilities is a big challenge for most parents and educators. Special education teachers use learning strategies to develop and enhance motivation for complex learning tasks. Literacy acquisition is an essential and life-long skill for a child with intellectual disabilities. In this context, technology can support specific strategies that will help children learn to read. This paper introduces a Tangible User Interface (TUI) system based on Radio Frequency Identification (RFID) technology to support literacy for children with Down syndrome. Our proposed system focuses on the integration of RFID tags in 3D printed objects and low cost toys. The paper describes the experience of using some materials covering the tags and the different problems related to the material and distance of radio wave propagation. The results of a preliminary evaluation in a special education institution showed that the system helps to improve the interaction between teachers and children. The use of a TUI seems to give a physical sensory experience to develop literacy skills in children with Down syndrome.

  20. A Computational Architecture Based on RFID Sensors for Traceability in Smart Cities

    Science.gov (United States)

    Mora-Mora, Higinio; Gilart-Iglesias, Virgilio; Gil, David; Sirvent-Llamas, Alejandro

    2015-01-01

    Information Technology and Communications (ICT) is presented as the main element in order to achieve more efficient and sustainable city resource management, while making sure that the needs of the citizens to improve their quality of life are satisfied. A key element will be the creation of new systems that allow the acquisition of context information, automatically and transparently, in order to provide it to decision support systems. In this paper, we present a novel distributed system for obtaining, representing and providing the flow and movement of people in densely populated geographical areas. In order to accomplish these tasks, we propose the design of a smart sensor network based on RFID communication technologies, reliability patterns and integration techniques. Contrary to other proposals, this system represents a comprehensive solution that permits the acquisition of user information in a transparent and reliable way in a non-controlled and heterogeneous environment. This knowledge will be useful in moving towards the design of smart cities in which decision support on transport strategies, business evaluation or initiatives in the tourism sector will be supported by real relevant information. As a final result, a case study will be presented which will allow the validation of the proposal. PMID:26067195

  1. A low-power CMOS smart temperature sensor for RFID application

    International Nuclear Information System (INIS)

    Xie Liangbo; Liu Jiaxin; Wang Yao; Wen Guangjun

    2014-01-01

    This paper presents the design and implement of a CMOS smart temperature sensor, which consists of a low power analog front-end and a 12-bit low-power successive approximation register (SAR) analog-to-digital converter (ADC). The analog front-end generates a proportional-to-absolute-temperature (PTAT) voltage with MOSFET circuits operating in the sub-threshold region. A reference voltage is also generated and optimized in order to minimize the temperature error and the 12-bit SAR ADC is used to digitize the PTAT voltage. Using 0.18 μm CMOS technology, measurement results show that the temperature error is −0.69/+0.85 °C after one-point calibration over a temperature range of −40 to 100 °C. Under a conversion speed of 1K samples/s, the power consumption is only 2.02 μW while the chip area is 230 × 225 μm 2 , and it is suitable for RFID application. (semiconductor integrated circuits)

  2. A Computational Architecture Based on RFID Sensors for Traceability in Smart Cities

    Directory of Open Access Journals (Sweden)

    Higinio Mora-Mora

    2015-06-01

    Full Text Available Information Technology and Communications (ICT is presented as the main element in order to achieve more efficient and sustainable city resource management, while making sure that the needs of the citizens to improve their quality of life are satisfied. A key element will be the creation of new systems that allow the acquisition of context information, automatically and transparently, in order to provide it to decision support systems. In this paper, we present a novel distributed system for obtaining, representing and providing the flow and movement of people in densely populated geographical areas. In order to accomplish these tasks, we propose the design of a smart sensor network based on RFID communication technologies, reliability patterns and integration techniques. Contrary to other proposals, this system represents a comprehensive solution that permits the acquisition of user information in a transparent and reliable way in a non-controlled and heterogeneous environment. This knowledge will be useful in moving towards the design of smart cities in which decision support on transport strategies, business evaluation or initiatives in the tourism sector will be supported by real relevant information. As a final result, a case study will be presented which will allow the validation of the proposal.

  3. A Computational Architecture Based on RFID Sensors for Traceability in Smart Cities.

    Science.gov (United States)

    Mora-Mora, Higinio; Gilart-Iglesias, Virgilio; Gil, David; Sirvent-Llamas, Alejandro

    2015-06-10

    Information Technology and Communications (ICT) is presented as the main element in order to achieve more efficient and sustainable city resource management, while making sure that the needs of the citizens to improve their quality of life are satisfied. A key element will be the creation of new systems that allow the acquisition of context information, automatically and transparently, in order to provide it to decision support systems. In this paper, we present a novel distributed system for obtaining, representing and providing the flow and movement of people in densely populated geographical areas. In order to accomplish these tasks, we propose the design of a smart sensor network based on RFID communication technologies, reliability patterns and integration techniques. Contrary to other proposals, this system represents a comprehensive solution that permits the acquisition of user information in a transparent and reliable way in a non-controlled and heterogeneous environment. This knowledge will be useful in moving towards the design of smart cities in which decision support on transport strategies, business evaluation or initiatives in the tourism sector will be supported by real relevant information. As a final result, a case study will be presented which will allow the validation of the proposal.

  4. Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader

    Directory of Open Access Journals (Sweden)

    Khaing Mar Htwe

    2015-07-01

    Full Text Available Abstract The main goal of this system is to design a locker security system using RFID and Fingerprint. In this system only authenticated person can open the door. A security system is implemented containing door locking system using passive type of RFID which can activate authenticate and validate the user and unlock the door in real time for secure access. The advantage of using passive RFID is that it functions without a battery and passive tags are lighter and are less expensive than the active tags. This system consists of fingerprint reader microcontroller RFID reader and PC. The RFID reader reads the id number from passive. The fingerprint sensor will check incoming image with enrolled data and it will send confirming signal for C program. If both RFID check and fingerprint image confirmation are matched the microcontroller will drive door motor according to sensors at door edges. This system is more secure than other systems because two codes protection method used.

  5. Design of the RFID for Storage of Biological Information

    Directory of Open Access Journals (Sweden)

    Sang-Hee Son

    2009-02-01

    Full Text Available Recent advances in RFID (radio frequency identification technology promises to create a wireless circuitry capable of interfacing with biological systems for acquisition, identification and processing of biological data based on radio frequency interaction. Thus, the RFID tag can be attached not only to consumer products and form part of the supply chain, but also to animals, plants and in particular human body. This paper describes the strategy for the design of a novel RFID tag, which stores vital biological information such as body temperature and blood pressure and heartbeat in accordance with the EPC global Class-1 standard. Biological data is obtained from a sensor technology that is based on resistance deviation-to-pulse width converter. The integrated chip consists of an analog front end, command interpreter, collision avoidance block, data storage, sensors, and interface circuitry. The system is capable of supporting heartbeats in the range of 40~200 beats per a minute and blood pressure 0~300mmHg. The proposed system employs collision free algorithm that supports access to single tag within a multiple tag environment. The approach facilitates intelligent management of patients in hospitals as part of an integrated healthcare management system.

  6. An RFID-Enabled Sensor Interface for the EV Modular Instrumentation System

    Data.gov (United States)

    National Aeronautics and Space Administration — Development of a passive radio-frequency identification (RFID) communication module, compliant with the EPCglobal class1, generation 2 air-interface standard, that...

  7. Long Reach RFID-over-Fiber Distribution and Collection Network

    DEFF Research Database (Denmark)

    Madsen, Peter; Suhr, Lau Frejstrup; Vegas Olmos, Juan José

    This paper presents an RFID-over-Fiber wireless track and trace system using active RFID tags. This paper demonstrates a system, operating over distances up to 30km of optical fiber and 50m of wireless readability.......This paper presents an RFID-over-Fiber wireless track and trace system using active RFID tags. This paper demonstrates a system, operating over distances up to 30km of optical fiber and 50m of wireless readability....

  8. Effects of RFID Technology on the Logistics Innovation

    OpenAIRE

    金, 双鴿; Shuangge, JIN

    2010-01-01

    An advanced automatic identification technology based on the Radio Frequency Identification (RFID) technology has significant value for inventory systems. RFID tag is a microchip combined with an antenna in a compact package and is called also IC tag. Other benefits of using RFID include the reduction of labor costs, the simplification of business processes, and the reduction of inventory inaccuracies. This paper aims to analyse the effects of RFID technology on the logistics innovation.

  9. Tunable Platform Tolerant Antenna Design for RFID and IoT Applications Using Characteristic Mode Analysis

    OpenAIRE

    Sharif, Abubakar; Ouyang, Jun; Yang, Feng; Long, Rui; Ishfaq, Muhammad Kamran

    2018-01-01

    Radio frequency identification (RFID) is a key technology to realize IoT (Internet of Things) dreams. RFID technology has been emerging in sensing, identification, tracking, and localization of goods. In order to tag a huge number of things, it is cost-effective to use one RFID antenna for tagging different things. Therefore, in this paper a platform tolerant RFID tag antenna with tunable capability is proposed. The proposed tag antenna is designed and optimized using characteristic mode anal...

  10. Visual RFID solution optimizes maintenance process; Visuelle RFID-Label. Optimierung des Instandhaltungsprozesses

    Energy Technology Data Exchange (ETDEWEB)

    Stephan, Martin [Evonik Energy Services GmbH, Essen (Germany)

    2010-09-06

    Evonik Energy Services GmbH has combined the established technology of RFID labels without battery (passive transponders) with bistable displays (based on e-paper technology), to a passive V-RFID label (visual RFID). Thus, the information which is stored invisible on conventional RFID tags will become readable for everybody. Both, the advantages as well as the chances of this innovative technology for prospective applications become obvious in an example application. (orig.)

  11. Technologie RFID

    OpenAIRE

    Černý, Tomáš

    2007-01-01

    Práce poskytuje přehled o problematice RFID technologií. Analyzuje historický vývoj RFID technologií, popisuje základní komponenty RFID systémů, normy spojené s RFID, bezpečnost RFID a trh RFID technologií. Dále se práce věnuje možnostem využití RFID technologií v různých oborech, zařazení RFID systémů do rámce podnikové informatiky a hodnotí efekty, které RFID technologie přináší. Práce také definuje doporučený postup pro zavádění RFID technologií do firmy....

  12. Development of the RFID System for nuclear materials management

    International Nuclear Information System (INIS)

    Chen, K.; Tsai, H.; Liu, Y.Y.

    2008-01-01

    Radio frequency identification (RFID) is one of today's most rapidly growing technologies in the automatic data collection industry. Although commercial applications are already widespread, the use of this technology for managing nuclear materials is only in its infancy. Employing an RFID system has the potential to offer an immense payback: enhanced safety and security, reduced need for manned surveillance, real-time access to status and event history data, and overall cost-effectiveness. The Packaging Certification Program (PCP) in the U.S. Department of Energy's (DOE's) Office of Environmental Management (EM), Office of Packaging and Transportation (EM-63), is developing an RFID system for nuclear materials management. The system consists of battery-powered RFID tags with onboard sensors and memories, a reader network, application software, a database server and web pages. The tags monitor and record critical parameters, including the status of seals, movement of objects, and environmental conditions of the nuclear material packages in real time. They also provide instant warnings or alarms when preset thresholds for the sensors are exceeded. The information collected by the readers is transmitted to a dedicated central database server that can be accessed by authorized users across the DOE complex via a secured network. The onboard memory of the tags allows the materials manifest and event history data to reside with the packages throughout their life cycles in storage, transportation, and disposal. Data security is currently based on Advanced Encryption Standard-256. The software provides easy-to-use graphical interfaces that allow access to all vital information once the security and privilege requirements are met. An innovative scheme has been developed for managing batteries in service for more than 10 years without needing to be changed. A miniature onboard dosimeter is being developed for applications that require radiation surveillance. A field

  13. An RFID-Based Smart Nest Box: An Experimental Study of Laying Performance and Behavior of Individual Hens

    Directory of Open Access Journals (Sweden)

    Ying-Ren Chien

    2018-03-01

    Full Text Available This study designed a radio-frequency identification (RFID-based Internet of Things (IoT platform to create the core of a smart nest box. At the sensing level, we have deployed RFID-based sensors and egg detection sensors. A low-frequency RFID reader is installed in the bottom of the nest box and a foot ring RFID tag is worn on the leg of individual hens. The RFID-based sensors detect when a hen enters or exits the nest box. The egg-detection sensors are implemented with a resistance strain gauge pressure sensor, which weights the egg in the egg-collection tube. Thus, the smart nest box makes it possible to analyze the laying performance and behavior of individual hens. An evaluative experiment was performed using an enriched cage, a smart nest box, web camera, and monitoring console. The hens were allowed 14 days to become accustomed to the experimental environment before monitoring began. The proposed IoT platform makes it possible to analyze the egg yield of individual hens in real time, thereby enabling the replacement of hens with egg yield below a pre-defined level in order to meet the overall target egg yield rate. The results of this experiment demonstrate the efficacy of the proposed RFID-based smart nest box in monitoring the egg yield and laying behavior of individual hens.

  14. Introduction of circuit design on RFID system

    International Nuclear Information System (INIS)

    Pak, Sunho

    2007-06-01

    This is a case of research of Fujitsu company and design of basic circuit of electronic technique. It is composed of two parts. The first part deals with introduction of RFID system design, which lists basic knowledge of ubiquitous, glossary of high frequency, design of impedance matching circuit, RFID system, sorts and design of filter, modulator and a transmission and RFID system design. The second part deals with research and development of Fujitsu company, including RFID middle ware RFID CONNECT of Fujitsu, sensor network of Fujitsu and high handing technique of RFID system.

  15. Introduction of circuit design on RFID system

    Energy Technology Data Exchange (ETDEWEB)

    Pak, Sunho

    2007-06-15

    This is a case of research of Fujitsu company and design of basic circuit of electronic technique. It is composed of two parts. The first part deals with introduction of RFID system design, which lists basic knowledge of ubiquitous, glossary of high frequency, design of impedance matching circuit, RFID system, sorts and design of filter, modulator and a transmission and RFID system design. The second part deals with research and development of Fujitsu company, including RFID middle ware RFID CONNECT of Fujitsu, sensor network of Fujitsu and high handing technique of RFID system.

  16. Behavior-based cleaning for unreliable RFID data sets.

    Science.gov (United States)

    Fan, Hua; Wu, Quanyuan; Lin, Yisong

    2012-01-01

    Radio Frequency IDentification (RFID) technology promises to revolutionize the way we track items and assets, but in RFID systems, missreading is a common phenomenon and it poses an enormous challenge to RFID data management, so accurate data cleaning becomes an essential task for the successful deployment of systems. In this paper, we present the design and development of a RFID data cleaning system, the first declarative, behavior-based unreliable RFID data smoothing system. We take advantage of kinematic characteristics of tags to assist in RFID data cleaning. In order to establish the conversion relationship between RFID data and kinematic parameters of the tags, we propose a movement behavior detection model. Moreover, a Reverse Order Filling Mechanism is proposed to ensure a more complete access to get the movement behavior characteristics of tag. Finally, we validate our solution with a common RFID application and demonstrate the advantages of our approach through extensive simulations.

  17. A split-path schema-based RFID data storage model in supply chain management.

    Science.gov (United States)

    Fan, Hua; Wu, Quanyuan; Lin, Yisong; Zhang, Jianfeng

    2013-05-03

    In modern supply chain management systems, Radio Frequency IDentification (RFID) technology has become an indispensable sensor technology and massive RFID data sets are expected to become commonplace. More and more space and time are needed to store and process such huge amounts of RFID data, and there is an increasing realization that the existing approaches cannot satisfy the requirements of RFID data management. In this paper, we present a split-path schema-based RFID data storage model. With a data separation mechanism, the massive RFID data produced in supply chain management systems can be stored and processed more efficiently. Then a tree structure-based path splitting approach is proposed to intelligently and automatically split the movement paths of products . Furthermore, based on the proposed new storage model, we design the relational schema to store the path information and time information of tags, and some typical query templates and SQL statements are defined. Finally, we conduct various experiments to measure the effect and performance of our model and demonstrate that it performs significantly better than the baseline approach in both the data expression and path-oriented RFID data query performance.

  18. A Split-Path Schema-Based RFID Data Storage Model in Supply Chain Management

    Directory of Open Access Journals (Sweden)

    Jianfeng Zhang

    2013-05-01

    Full Text Available In modern supply chain management systems, Radio Frequency IDentification (RFID technology has become an indispensable sensor technology and massive RFID data sets are expected to become commonplace. More and more space and time are needed to store and process such huge amounts of RFID data, and there is an increasing realization that the existing approaches cannot satisfy the requirements of RFID data management. In this paper, we present a split-path schema-based RFID data storage model. With a data separation mechanism, the massive RFID data produced in supply chain management systems can be stored and processed more efficiently. Then a tree structure-based path splitting approach is proposed to intelligently and automatically split the movement paths of products . Furthermore, based on the proposed new storage model, we design the relational schema to store the path information and time information of tags, and some typical query templates and SQL statements are defined. Finally, we conduct various experiments to measure the effect and performance of our model and demonstrate that it performs significantly better than the baseline approach in both the data expression and path-oriented RFID data query performance.

  19. Development of corrosion condition sensing and monitoring system using radio-frequency identification devices (RFID) : progress report 2

    Energy Technology Data Exchange (ETDEWEB)

    Gu, G.P.; Li, J.; Liu, P.; Bibby, D.; Zheng, W.; Lo, J. [Natural Resources Canada, Ottawa, ON (Canada). CANMET Materials Technology Laboratory

    2008-12-15

    The development of a corrosion severity monitoring system that used radio-frequency identification device (RIFD) technology was discussed. A corrosion monitoring sensor was integrated with a tag modified to partially block the radio frequency signal. The metallic coating caused a frequency shift of the device's reader antenna in order to allow for the accurate characterization of metal coatings. Communications between the tag and the reader were re-established as the corrosion process gradually deteriorated the coating. The method was tested experimentally with 3 RFID systems using both active and passive tags were assembled. A passive tag was covered in aluminum foil. Results of the experiment showed that the metallic coating interfered with RFID signals. A cold-spray technology was used to coat tags with metal alloys. The surface morphology of the coatings was tested to determine optimum coating parameters. Further studies are being conducted to develop software for the technology. 4 refs., 11 figs.

  20. Improvement of Supply Chain Performances Using RFID Technology

    OpenAIRE

    Turcu, Cornel; Turcu, Cristina; Graur, Adrian

    2009-01-01

    This chapter helps to improve readers understanding of the RFID and EPC potential for business processes. RFID technology is classified as a wireless AIDC technology that uses digital data encoded into a radio tag embedding a microchip with an antenna. The data stored on the tag is collected by a reader using radio waves. There are a large variety of RFID tags designs; they also have many different functional characteristics such as power source, carrier frequency, read range, data storage ca...

  1. Secure RFID tag or sensor with self-destruction mechanism upon tampering

    Energy Technology Data Exchange (ETDEWEB)

    Nekoogar, Faranak; Dowla, Farid; Twogood, Richard; Lefton, Scott

    2016-12-27

    A circuit board anti-tamper mechanism comprises a circuit board having a frangible portion, a trigger having a trigger spring, a trigger arming mechanism actuated by the trigger wherein the trigger arming mechanism is initially non-actuated, a force producing mechanism, a latch providing mechanical communication between the trigger arming mechanism and the force producing mechanism, wherein the latch initially retains the force producing mechanism in a refracted position. Arming pressure applied to the trigger sufficient to overcome the trigger spring force will actuate the trigger arming mechanism, causing the anti-tamper mechanism to be armed. Subsequent tampering with the anti-tamper mechanism results in a decrease of pressure on the trigger below the trigger spring force, thereby causing the trigger arming mechanism to actuate the latch, thereby releasing the force producing mechanism to apply force to the frangible portion of the circuit board, thereby breaking the circuit board.

  2. Monitoring System for Slope Stability under Rainfall by using MEMS Acceleration Sensor IC tags

    International Nuclear Information System (INIS)

    Murakami, S; Dairaku, A; Komine, H; Saito, O; Sakai, N; Isizawa, T; Maruyama, I

    2013-01-01

    Real-time warning system for slope failure under rainfall is available to disaster prevention and mitigation. Monitoring of multi-point and wireless measurements is effective because it is difficult to conclude the most dangerous part in a slope. The purpose of this study is to propose a method of monitoring system with multi-point and wireless measurements for a slope stability using MEMS acceleration sensor IC tags. MEMS acceleration sensor IC tag is an acceleration sensor microminiaturized by a technology of Micro Electro Mechanical Systems on board IC tag. Especially, low cost of the sensor will yield to the realization of the system. In order to investigate the applicability of the proposed system, a large-scale model test of artificial slope subjected to rainfall has been performed. MEMS acceleration sensor IC tags has been located on the slope and ground acceleration caused by forced vibration has been measured until the model slope collapses. The experimental results show that the MEMS acceleration sensor IC tag is comfortably available under rainfall, the characteristics of ground accelerations varies with changing the condition of the slope subjected to rainfall, and the proposed method can be applied to a real-time monitoring system for slope failure under rainfall.

  3. RFID for libraries a practical guide

    CERN Document Server

    Pandian, M Paul

    2010-01-01

    Many modern technologies give the impression that they somehow work by magic, particularly when they operate automatically and their mechanisms are invisible. A technology called RFID (Radio Frequency Identification), which is relatively new, has exactly this characteristic. Librarians everywhere are closely watching RFID technology. Advances over using bar codes on library materials, RFID tags are being touted as a way to radically redesign how library materials are handled. But it is expensive. The tags are vulnerable to wear and tear and the technology is not fully developed. It's unclear what sort of return on investment (ROI) it provides. While it is common for libraries to now have information technology expertise within their organizations, RFID may appear unfamiliar. RFID for Libraries: A practical guide examines what RFID technology is and how it works. The book reviews the development of computer technology and its effects on library operations over the last couple of decades. Further examination fe...

  4. Pemanfaatan Sistem RFID sebagai Pembatas Akses Ruangan

    Directory of Open Access Journals (Sweden)

    HENDI HANDIAN RACHMAT

    2016-02-01

    Full Text Available ABSTRAK Pada penelitian ini, sistem RFID (Radio Frequency Identification dimanfaatkan sebagai kartu identifikasi personal pada sistem akses ruangan. Keberadaan sistem ini ditujukan untuk menjaga keamanan dan privasi ruangan dari seseorang yang tidak memiliki otoritas untuk memasuki ruangan tersebut. Melalui perancangan dan implementasi sistem akses ruangan ini, dilakukan evaluasi sistem kerja kunci elektrik berbasis komponen solenoid serta jarak dan posisi optimal pembacaan RFID tag guna memberikan kenyamanan pada pengguna ketika mengakses ruangan. RFID tag yang dipergunakan dalam sistem ini berbentuk kartu tipe EM4001 dan menyimpan kode unik yang digunakan sebagai identifikasi personal. Kode ini dibaca oleh RFID reader tipe ID-12 dan divalidasi otoritasnya dengan mikrokontroler ATMega32 untuk mengatur sistem kerja kunci elektrik yang dirancang sendiri menggunakan solenoid. Sistem ini dilengkapi pula dengan sistem database untuk pencatatan pengguna yang mengakses ruangan. Dari hasil pengujian, seluruh (100% RFID tag dapat dikenali oleh RFID reader dalam tiga posisi berbeda dengan jarak optimal sejauh 5 cm (vertikal dan 2 cm (horisontal. Keseluruhan (100% aktifitas pengguna yang mengakses ruangan dapat tercatat dalam sistem database. Hasil penelitian ini dapat disimpulkan bahwa teknologi RFID dapat digunakan secara nyaman dan aman sebagai alternatif sistem identifikasi personal untuk sistem akses ruangan. Kata Kunci : kunci elektrik, RFID, sistem akses ruangan, sistem database, solenoid. ABSTRACT In this research, RFID system was utilized as a personal identification security card in access room system. This system was aimed to secure a room and to have privacy from unauthorized person to enter the room. By designing and implementing the system, a solenoid based electric key system as well as an optimal distance and position of RFID tag were evaluated to know the most convenience condition for all users during accessing the room. RFID tag used in

  5. Making the most of RFID in libraries

    CERN Document Server

    Palmer, Martin

    2009-01-01

    The advantage of radio frequency identification (RFID) over other technologies used in libraries is usually seen to be its ability to combine the functions of the barcode and the security tag, but with the added advantage of not needing line of sight. This book considers the benefits of installing RFID technology; and work with vendors.

  6. RFID in Retail: New approaches, new viewpoints

    NARCIS (Netherlands)

    Sander de Ridder; Jan Kroon; drs. Frans van den Reep; Christian Vrijlandt

    2008-01-01

    RFID technology is a promising technology currently finding its way into the field of customer interaction strategy, supply chain accuracy and inventory management. Primarily, RFID tags are seen as substitutes of traditional barcodes, yet they can add a lot of value and functionality. Where barcodes

  7. Efficient Key Management System for Large-scale Smart RFID Applications

    Directory of Open Access Journals (Sweden)

    Mohammad Fal Sadikin

    2015-08-01

    Full Text Available Due to low-cost and its practical solution, the integration of RFID tag to the sensor node called smart RFID has become prominent solution in various fields including industrial applications. Nevertheless, the constrained nature of smart RFID system introduces tremendous security and privacy problem. One of them is the problem in key management system. Indeed, it is not feasible to recall all RFID tags in order to update their security properties (e.g. update their private keys. On the other hand, using common key management solution like standard TLS/SSL is too heavy-weight that can drain and overload the limited resources. Furthermore, most of existing solutions are highly susceptible to various threats reaching from privacy threats, physical attacks to various technics of Man-in-the-Middle attacks. This paper introduces novel key management system, tailored to the limited resources of smart RFID system. It proposes light-weight mutual authentication and identity protection to mitigate the existing threats.

  8. Non-foster matching of an RFID antenna

    KAUST Repository

    Mohamed Hassan Salem, Nedime Pelin; Niver, Edip

    2011-01-01

    Novel designs of radio-frequency identification (RFID) tag antennas with better matching characteristics to achieve extended range for passive tags are investigated in ultra-high frequency (UHF) band. A microstrip dipole antenna with or without

  9. Privacy Protection Research of Mobile RFID

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Radio Frequency Identification is one of the most controversial technologies at present.It is very difficult to detect who reads a tag incorporated into products owned by a person,a significant concern to privacy threats in RFID system arises from this reason.User privacy problem is prior considersion for mobile RFID service,because most mobile RFID service based on end-user service.Propose a solution for user privacy protection,which is a modification of EPC Class 1 Generation 2 protocol,and introduce a privacy protection scenario for mobile RFID service using this method.

  10. Design of the RFID for Storage of Biological Information

    OpenAIRE

    Sang-Hee Son; Seok-Man Kim; Yu-Lee Choi; Kyoung-Rok Cho

    2009-01-01

    Recent advances in RFID (radio frequency identification) technology promises to create a wireless circuitry capable of interfacing with biological systems for acquisition, identification and processing of biological data based on radio frequency interaction. Thus, the RFID tag can be attached not only to consumer products and form part of the supply chain, but also to animals, plants and in particular human body. This paper describes the strategy for the design of a novel RFID tag, which stor...

  11. Energy-balanced algorithm for RFID estimation

    Science.gov (United States)

    Zhao, Jumin; Wang, Fangyuan; Li, Dengao; Yan, Lijuan

    2016-10-01

    RFID has been widely used in various commercial applications, ranging from inventory control, supply chain management to object tracking. It is necessary for us to estimate the number of RFID tags deployed in a large area periodically and automatically. Most of the prior works use passive tags to estimate and focus on designing time-efficient algorithms that can estimate tens of thousands of tags in seconds. But for a RFID reader to access tags in a large area, active tags are likely to be used due to their longer operational ranges. But these tags use their own battery as energy supplier. Hence, conserving energy for active tags becomes critical. Some prior works have studied how to reduce energy expenditure of a RFID reader when it reads tags IDs. In this paper, we study how to reduce the amount of energy consumed by active tags during the process of estimating the number of tags in a system and make the energy every tag consumed balanced approximately. We design energy-balanced estimation algorithm that can achieve our goal we mentioned above.

  12. Robust Sensor-Orientation-Independent Feature Selection for Animal Activity Recognition on Collar Tags

    NARCIS (Netherlands)

    Kamminga, Jacob Wilhelm; Le Viet Duc, Duc Viet; Meijers, Jan Pieter; Bisby, Helena C.; Meratnia, Nirvana; Havinga, Paul J.M.

    2018-01-01

    Fundamental challenges faced by real-time animal activity recognition include variation in motion data due to changing sensor orientations, numerous features, and energy and processing constraints of animal tags. This paper aims at finding small optimal feature sets that are lightweight and robust

  13. Temporal and Location Based RFID Event Data Management and Processing

    Science.gov (United States)

    Wang, Fusheng; Liu, Peiya

    Advance of sensor and RFID technology provides significant new power for humans to sense, understand and manage the world. RFID provides fast data collection with precise identification of objects with unique IDs without line of sight, thus it can be used for identifying, locating, tracking and monitoring physical objects. Despite these benefits, RFID poses many challenges for data processing and management. RFID data are temporal and history oriented, multi-dimensional, and carrying implicit semantics. Moreover, RFID applications are heterogeneous. RFID data management or data warehouse systems need to support generic and expressive data modeling for tracking and monitoring physical objects, and provide automated data interpretation and processing. We develop a powerful temporal and location oriented data model for modeling and queryingRFID data, and a declarative event and rule based framework for automated complex RFID event processing. The approach is general and can be easily adapted for different RFID-enabled applications, thus significantly reduces the cost of RFID data integration.

  14. RFID Data Cleaning for Shop Floor Applications

    Science.gov (United States)

    Ziekow, Holger; Ivantysynova, Lenka; Günter, Oliver

    In several case studies we found that shop-floor applications in manufacturing pose special challenges to cleaning RFID data. The underlying problem in many scenarios is the uncertainty about the exact location of observed RFID tags. Simple filter s provided in common middleware solutions do not cope well with these challenges. Therefore we have developed an approach based on maximum-likelihood estimation to infer a tag's location within the reader range. This enables improved RFID data cleaning in a number of application scenarios. We stress the benefits of our approach along exemplary application scenarios that we found in manufacturing. In simulations and experiments with real world data we show that our approach outperforms existing solutions. Our approach can extend RFID middleware or reader firmware, to improve the use of RFID in a range of shop-floor applications.

  15. RFID for libraries a practical guide

    CERN Document Server

    Pandian, M

    2010-01-01

    Many modern technologies give the impression that they somehow work by magic, particularly when they operate automatically and their mechanisms are invisible. A technology called RFID (Radio Frequency Identification), which is relatively new, has exactly this characteristic. Librarians everywhere are closely watching RFID technology. Advances over using bar codes on library materials, RFID tags are being touted as a way to radically redesign how library materials are handled. But it is expensive. The tags are vulnerable to wear and tear and the technology is not fully developed. It's unclear w

  16. Two Solutions of Soil Moisture Sensing with RFID for Landslide Monitoring

    Directory of Open Access Journals (Sweden)

    Sérgio Francisco Pichorim

    2018-02-01

    Full Text Available Two solutions for UHF RFID tags for soil moisture sensing were designed and are described in this paper. In the first, two conventional tags (standard transponders are employed: one, placed close to the soil surface, is the sensor tag, while the other, separated from the soil, is the reference for system calibration. By transmission power ramps, the tag’s turn-on power levels are measured and correlated with soil condition (dry or wet. In the second solution, the SL900A chip, which supports up to two external sensors and an internal temperature sensor, is used. An interdigital capacitive sensor was connected to the transponder chip and used for soil moisture measurement. In a novel design for an UHF RFID tag the sensor is placed below the soil surface, while the transponder and antenna are above the soil to improve communication. Both solutions are evaluated practically and results show the presence of water in soil can be remotely detected allowing for their application in landslide monitoring.

  17. Development of novel wireless sensor for food quality detection

    International Nuclear Information System (INIS)

    Son Nguyen, Dat; Le, Nguyen Ngan; Lam, Tan Phat; Fribourg-Blanc, Eric; Dang, Mau Chien; Tedjini, Smail

    2015-01-01

    In this paper we present a wireless sensor for the monitoring of food quality. We integrate sensing capability into ultrahigh frequency (UHF) radio-frequency identification (RFID) tags through the relationship between the physical read-range and permittivity of the object we label with the RFID tags. Using the known variations of food permittivity as a function of time, we can detect the contamination time at which a food product becomes unacceptable for consumption based on the measurement of read-range with the as-designed sensing tags. This low-cost UHF RFID passive sensor was designed and experimentally tested on beef, pork, and cheese with the same storage conditions as in supermarkets. The agreement between the experimental and simulation results show the potential of this technique for practical application in food-quality tracking. (paper)

  18. Chipless RFID design procedure and detection techniques

    CERN Document Server

    Rezaiesarlak, Reza

    2015-01-01

    This book examines the design of chipless RFID systems. The authors begin with the historical development of wireless identification systems and finally arrive at a representation of the chipless RFID system as a block diagram illustration. Chapter 2 is devoted to the theoretical bases for the design of chipless RFID tags and detection techniques in the reader. A rigorous mathematical formulation is presented based on the singularity expansion method (SEM) and characteristic mode theory (CMT) in order to study the scattered fields from an object in a general form. Th e authors attempt to explain some physical concepts behind the mathematical descriptions of the theories in this chapter. In Chapter 3, two design procedures based on complex natural resonance and CMT are presented for the design of the chipless RFID tag. By studying the effects of structural parameters on radiation and resonant behaviors of the tag, some design conclusions are presented in this chapter. Chapter 4 is dedicated to the time-frequen...

  19. Assessment of RFID Read Accuracy for ISS Water Kit

    Science.gov (United States)

    Chu, Andrew

    2011-01-01

    The Space Life Sciences Directorate/Medical Informatics and Health Care Systems Branch (SD4) is assessing the benefits Radio Frequency Identification (RFID) technology for tracking items flown onboard the International Space Station (ISS). As an initial study, the Avionic Systems Division Electromagnetic Systems Branch (EV4) is collaborating with SD4 to affix RFID tags to a water kit supplied by SD4 and studying the read success rate of the tagged items. The tagged water kit inside a Cargo Transfer Bag (CTB) was inventoried using three different RFID technologies, including the Johnson Space Center Building 14 Wireless Habitat Test Bed RFID portal, an RFID hand-held reader being targeted for use on board the ISS, and an RFID enclosure designed and prototyped by EV4.

  20. Tunable Platform Tolerant Antenna Design for RFID and IoT Applications Using Characteristic Mode Analysis

    Directory of Open Access Journals (Sweden)

    Abubakar Sharif

    2018-01-01

    Full Text Available Radio frequency identification (RFID is a key technology to realize IoT (Internet of Things dreams. RFID technology has been emerging in sensing, identification, tracking, and localization of goods. In order to tag a huge number of things, it is cost-effective to use one RFID antenna for tagging different things. Therefore, in this paper a platform tolerant RFID tag antenna with tunable capability is proposed. The proposed tag antenna is designed and optimized using characteristic mode analysis (CMA. Moreover, this tag antenna consists of a folded patch wrapped around FR 4 substrate and a feeding loop element printed on a paper substrate. The inductive feeding loop is stacked over folded patch and it provides impedance match with RFID chip. Because of separate radiating and feeding element, this tag antenna has a versatility of impedance matching with any RFID chip. Furthermore, this tag is able to cover American RFID band (902–928 MHz and can be tuned to European RFID band (865–868 MHz by adding tunable strips. In order to demonstrate platform tolerant operation, the read range of RFID tag is measured by mounting it on different materials. The maximum read range of RFID tag is 4.5 m in free space or on dielectrics and 6.5 m above 200 × 200 mm2 metal plate, respectively.

  1. Energy harvesting for autonomous wireless sensor networks

    NARCIS (Netherlands)

    Vullers, R.J.M.; van Schaijk, R.T.F.; Visser, H.J.; Penders, J.; Van Hoof, C.

    2010-01-01

    Wireless sensor nodes (WSNs) are employed today in many different application areas, ranging from health and lifestyle to automotive, smart building, predictive maintenance (e.g., of machines and infrastructure), and active RFID tags. Currently these devices have limited lifetimes, however, since

  2. RFID technology for environmental remediation and radioactive waste management

    International Nuclear Information System (INIS)

    Tsai, Hanchung; Liu, Yung Y.; Shuler, James

    2011-01-01

    An advanced Radio Frequency Identification (RFID) system capable of tracking and monitoring a wide range of materials and components - from fissionable stocks to radioactive wastes - has been developed. The system offers a number of advantages, including enhanced safety, security and safeguards, reduced personnel exposure to radiation, and improved inventory control and cost-effectiveness. Using sensors, RFID tags can monitor the state of health of the tracked items and trigger alarms instantly when the normal ranges are violated. Nonvolatile memories in the tags can store sensor data, event records, as well as a contents manifest. Gamma irradiation tests showed that the tag components possess significant radiation resistance. Long-life batteries and smart management circuitries permit the tags to operate for up to 10 years without battery replacement. The tags have a near universal form factor, i.e., they can fit different package types. The read range is up to >100 m with no line-of-sight required. With careful implementation, even a large-size processing or storage facility with a complex configuration can be monitored with a handful of readers in a network. In transportation, by incorporating Global Positioning System (GPS), satellite/cellular communication technology, and secure Internet, situation awareness is assured continuously. The RFID system, when integrated with Geographic Information System (GIS) technology, can promptly provide content- and event-specific information to first responders and emergency management teams in case of incidents. In stand-alone applications, the monitoring and tracking data are contained within the local computer. With a secure Internet, information can be shared within the complex or even globally in real time. As with the deployment of any new technology, overcoming the cultural resistance is part of the developmental process. With a strong institutional support and multiple successful live demonstrations, the cultural

  3. NAVIGATION IN LARGE-FORMAT BUILDINGS BASED ON RFID SENSORS AND QR AND AR MARKERS

    Directory of Open Access Journals (Sweden)

    Tomasz Szymczyk

    2016-09-01

    Full Text Available The authors address the problem of passive navigation in large buildings. Based on the example of several interconnected buildings housing departments of the Lublin University of Technology, as well as the conceptual navigation system, the paper presents one of the possible ways of leading the user from the entrance of the building to a particular room. An analysis of different types of users is made and different (best for them ways of navigating the intricate corridors are proposed. Three ways of user localisation are suggested: RFID, AR and QR markers. A graph of connections between specific rooms was made and weights proposed, representing “the difficulty of covering a given distance”. In the process of navigation Dijkstra’s algorithm was used. The road is indicated as multimedia information: a voice-over or animated arrow showing the direction displayed on the smart phone screen with proprietary software installed. It is also possible to inform the user of the position of the location in which he currently is, based on the static information stored in the QR code.

  4. Applications of RFID into Nuclear Power Plant Maintenance System

    International Nuclear Information System (INIS)

    Lee, Seung Min; Seong, Poong Hyun

    2008-01-01

    RFID (Radio Frequency Identification) system, one of the most anticipated ubiquitous technologies is an automatic identification method using devices called RFID tags. RFID antenna detects each approach of RFID tags and recognizes the tags' ID and transfer to reader to do information processing. Since first introduced in the logistics industry, production management and maintenance organization in various fields of domestic and foreign enterprises introduce the RFID. Nuclear power plants are also using RFID to manage materials lately. However, the current status on the use of RFID is just a little more advanced on the use of bar code. Therefore, it seems that the important characteristic of RFID is not enough actualized to keep seeing. In point of Maintenance Information Field based on ubiquitous technology, the most important concept is real-time information processing. And RFID is quite proper to develop this information field system because it satisfies for the matter of that concept. The leading content in ubiquitous maintenance system is that maintenance personnel can get information what he needs and he can also transfer information what he gets whenever and wherever he is. In this paper, some examples of applying RFID in development of ubiquitous maintenance system are suggested

  5. RFID security : cryptography and physics perspectives

    NARCIS (Netherlands)

    Guajardo, J.; Tuyls, P.T.; Bird, N.; Conrado, C.; Maubach, S.; Schrijen, G.J.; Skoric, B.; Tombeur, A.M.H.; Thueringer, P.; Kitsos, P.; Zhang, Y.

    2008-01-01

    In this chapter, we provide an overview of mechanisms that are cheap to implement or integrate into RFID tags and that at the same time enhance their security and privacy properties. We emphasize solutions that make use of existing (or expected) functionality on the tag or that are inherently cheap

  6. Miniaturised wireless smart tag for optical chemical analysis applications.

    Science.gov (United States)

    Steinberg, Matthew D; Kassal, Petar; Tkalčec, Biserka; Murković Steinberg, Ivana

    2014-01-01

    A novel miniaturised photometer has been developed as an ultra-portable and mobile analytical chemical instrument. The low-cost photometer presents a paradigm shift in mobile chemical sensor instrumentation because it is built around a contactless smart card format. The photometer tag is based on the radio-frequency identification (RFID) smart card system, which provides short-range wireless data and power transfer between the photometer and a proximal reader, and which allows the reader to also energise the photometer by near field electromagnetic induction. RFID is set to become a key enabling technology of the Internet-of-Things (IoT), hence devices such as the photometer described here will enable numerous mobile, wearable and vanguard chemical sensing applications in the emerging connected world. In the work presented here, we demonstrate the characterisation of a low-power RFID wireless sensor tag with an LED/photodiode-based photometric input. The performance of the wireless photometer has been tested through two different model analytical applications. The first is photometry in solution, where colour intensity as a function of dye concentration was measured. The second is an ion-selective optode system in which potassium ion concentrations were determined by using previously well characterised bulk optode membranes. The analytical performance of the wireless photometer smart tag is clearly demonstrated by these optical absorption-based analytical experiments, with excellent data agreement to a reference laboratory instrument. © 2013 Elsevier B.V. All rights reserved.

  7. An Exploratory Study of RFID Adoption in the Paperboard Packaging Industry

    Directory of Open Access Journals (Sweden)

    Bindiganavale Vijayaraman

    2008-12-01

    Full Text Available Some experts predict RFID will be the next big technology to revolutionize supply chain management. The RFID mandates by the Department of Defense (DOD, Federal Drug Administration (FDA, and retail companies have required organizations to implement RFID technology. Other companies are evaluating the potential costs and benefits of such adoption. In order to establish benchmark on RFID adoption, this study surveyed readers of Paperboard Packaging magazine and members of the European Federation of Corrugated Board Manufacturers (FEFCO to see if they are implementing RFID technology and challenges they may face. The results indicate about 52% of responding companies are not currently considering RFID technology because of the cost concerns. Companies that are implementing or considering RFID are doing it because of their customer requirements although they are concerned about the cost of RFID tags and cost of implementation. Companies that are implementing RFID are somewhat satisfied with RFID implementation.

  8. Dynamics of person-to-person interactions from distributed RFID sensor networks.

    Directory of Open Access Journals (Sweden)

    Ciro Cattuto

    Full Text Available BACKGROUND: Digital networks, mobile devices, and the possibility of mining the ever-increasing amount of digital traces that we leave behind in our daily activities are changing the way we can approach the study of human and social interactions. Large-scale datasets, however, are mostly available for collective and statistical behaviors, at coarse granularities, while high-resolution data on person-to-person interactions are generally limited to relatively small groups of individuals. Here we present a scalable experimental framework for gathering real-time data resolving face-to-face social interactions with tunable spatial and temporal granularities. METHODS AND FINDINGS: We use active Radio Frequency Identification (RFID devices that assess mutual proximity in a distributed fashion by exchanging low-power radio packets. We analyze the dynamics of person-to-person interaction networks obtained in three high-resolution experiments carried out at different orders of magnitude in community size. The data sets exhibit common statistical properties and lack of a characteristic time scale from 20 seconds to several hours. The association between the number of connections and their duration shows an interesting super-linear behavior, which indicates the possibility of defining super-connectors both in the number and intensity of connections. CONCLUSIONS: Taking advantage of scalability and resolution, this experimental framework allows the monitoring of social interactions, uncovering similarities in the way individuals interact in different contexts, and identifying patterns of super-connector behavior in the community. These results could impact our understanding of all phenomena driven by face-to-face interactions, such as the spreading of transmissible infectious diseases and information.

  9. Smart Idlers : RFID in conveyor belt monitoring

    NARCIS (Netherlands)

    Pang, Y.

    2012-01-01

    Radio Frequency Identifi cation (RFID) is a technology that offers unique identifi cation of objects and processes. It can actively or passively communicate and, in combination with sensors, it can capture more detailed physical information. RFID technology has been integrated into our daily life.

  10. Securing the Use of RFID-Enabled Banknotes

    Science.gov (United States)

    Martínez, Santi; Roig, Concepció; Valls, Magda

    The use of RFID tags (radio-frequency identification tags) in banknotes presents a main challenge that may discourage their usage: how to avoid a possible attacker to count the amount of tags. Such a drawback is faced in this paper by designing an appropriate Medium Access Control (MAC) for this scenario. A MAC is the set of mechanisms and protocols that allows devices to share the communication channel. In a RFID system, a MAC protocol makes it possible for several tags to communicate within a common environment with the RFID reader. In this paper, we present a new MAC protocol that is suitable for ensuring security in the use of RFID-enabled banknotes. It also guarantees privacy and fits scalability requirements when the number of tags is increasing.

  11. Study of Development for RFID System to Hospital Environment.

    Science.gov (United States)

    Hong, Seung Kwon; Sung, Myung-Whun

    2015-01-01

    RFID/USN develops information systems for anytime, anywhere to anybody access Electronic Medical Records (EMR). The goal of the present study is to develop a RFID/USN-based information system for the hospital environment. First, unable to recognize, second, able to recognize as a pursuit of place and suppose the time of medical examination. A retrospective analysis of 235 RFID monitoring results, from four ENT ambulatory clinics of Seoul National University Hospital were extracted by a reader program and monitoring of RFID tag (2006.11.16~2006.12.16). RFID detection for sensing reader of this study has been put into representing "place" and "spending time" of patients for medical history taking and examination. Through the RFID of detection for specific place and spending time of medical examination, RFID/USN develops information system progressing in the EMR of hospital system.

  12. USE OF RFID AT LARGE-SCALE EVENTS

    Directory of Open Access Journals (Sweden)

    Yuusuke KAWAKITA

    2005-01-01

    Full Text Available Radio Frequency Identification (RFID devices and related technologies have received a great deal of attention for their ability to perform non-contact object identification. Systems incorporating RFID have been evaluated from a variety of perspectives. The authors constructed a networked RFID system to support event management at NetWorld+Interop 2004 Tokyo, an event that received 150,000 visitors. The system used multiple RFID readers installed at the venue and RFID tags carried by each visitor to provide a platform for running various management and visitor support applications. This paper presents the results of this field trial of RFID readability rates. It further addresses the applicability of RFID systems to visitor management, a problematic aspect of large-scale events.

  13. Evaluation of Efficiency Improvement in Vital Documentation Using RFID Devices.

    Science.gov (United States)

    Kimura, Eizen; Nakai, Miho; Ishihara, Ken

    2016-01-01

    We introduced medical devices with RFID tags and the terminal with RFID reader in our hospital. Time study was conducted in two phases. In phase I, nurses round as usual, and in phase II, the nurse round the ward with a terminal installed on a cart. This study concluded that RFID system shortens the time for vital sign documentation. However, deploying the terminals at every bedside did not contribute the more time reduction.

  14. USING OF RFID TECHNOLOGY IN MAINTENANCE MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Michal Balog

    2015-06-01

    Full Text Available Automated data collection helps to improve the precision of decision-making processes. Currently, the radio frequency identification technology belongs to the most common application in the field of identification technology. In the world, the implementation of RFID technology is used in almost all areas of industry. RFID tags allow to use of the different products and materials applications. The article provides an overview of using this technology to record and register maintenance intervals of railway wagons. The application of RFID technology helps to avoid huge disasters and accidents caused by lack of information about the technical state of rail freight wagons.

  15. Increased operational range for implantable UHF RFID antennas

    NARCIS (Netherlands)

    Dubok, A.; Smolders, A.B.

    2014-01-01

    This paper discusses the main design challenges of implantable UHF RFID antennas in lossy environments. A novel cylindrical implantable antenna concept is presented. The proposed antenna shows good performance inside lossy environments, like a human body. The RFID tag is able to work in a range up

  16. Potential of RFID Systems to Detect Object Orientation

    DEFF Research Database (Denmark)

    Krigslund, Rasmus; Popovski, Petar; Pedersen, Gert Frølund

    2011-01-01

    In this paper we present a novel method for estimating the inclination of passive UHF RFID tags, for use in supply chains to monitor the handling of tagged items. Based on observations of the polarization, a Bayesian estimator of the tag inclination is constructed. The Bayesian estimator has been...

  17. Novel “Enhanced-Cognition” RFID Architectures on Organic/Paper Low-Cost Substrates Utilizing Inkjet Technologies

    Directory of Open Access Journals (Sweden)

    Li Yang

    2007-01-01

    Full Text Available The purpose of this paper is to present an overview of novel design and integration approaches for improved performance “enhanced-cognition” UHF passive and active radio frequency identification (RFID tags. Antenna design rules are explained for a variety of applications. A strategy that is currently under development for embedding power sources and integration of sensors and integrated circuits (ICs on low-cost organic substrates, such as liquid crystal polymer (LCP and paper, enabling the use of inkjet-printing capability for the UHF frequency band, is discussed in the paper. The proposed technologies could potentially revolutionize RFID tags allowing for integrated sensing capabilities for various applications such as security, military, logistics, automotion, and pharmaceutics.

  18. RFID in libraries a step toward interoperability

    CERN Document Server

    Ayre, Lori Bowen

    2012-01-01

    The approval by The National Information Standards Organization (NISO) of a new standard for RFID in libraries is a big step toward interoperability among libraries and vendors. By following this set of practices and procedures, libraries can ensure that an RFID tag in one library can be used seamlessly by another, assuming both comply, even if they have different suppliers for tags, hardware, and software. In this issue of Library Technology Reports, Lori Bowen Ayre, an experienced implementer of automated materials handling systems, Provides background on the evolution of the standard

  19. Passive RFID Rotation Dimension Reduction via Aggregation

    Science.gov (United States)

    Matthews, Eric

    Radio Frequency IDentification (RFID) has applications in object identification, position, and orientation tracking. RFID technology can be applied in hospitals for patient and equipment tracking, stores and warehouses for product tracking, robots for self-localisation, tracking hazardous materials, or locating any other desired object. Efficient and accurate algorithms that perform localisation are required to extract meaningful data beyond simple identification. A Received Signal Strength Indicator (RSSI) is the strength of a received radio frequency signal used to localise passive and active RFID tags. Many factors affect RSSI such as reflections, tag rotation in 3D space, and obstacles blocking line-of-sight. LANDMARC is a statistical method for estimating tag location based on a target tag's similarity to surrounding reference tags. LANDMARC does not take into account the rotation of the target tag. By either aggregating multiple reference tag positions at various rotations, or by determining a rotation value for a newly read tag, we can perform an expected value calculation based on a comparison to the k-most similar training samples via an algorithm called K-Nearest Neighbours (KNN) more accurately. By choosing the average as the aggregation function, we improve the relative accuracy of single-rotation LANDMARC localisation by 10%, and any-rotation localisation by 20%.

  20. Non-foster matching of an RFID antenna

    KAUST Repository

    Mohamed Hassan Salem, Nedime Pelin

    2011-07-01

    Novel designs of radio-frequency identification (RFID) tag antennas with better matching characteristics to achieve extended range for passive tags are investigated in ultra-high frequency (UHF) band. A microstrip dipole antenna with or without an integrated negative impedance converter designed to cancel out the antenna\\'s input capacitance at resonance frequency was designed, simulated, constructed and measured for implementation in RFID applications. © 2011 IEEE.

  1. RFID and Auto-ID in planning and logistics

    CERN Document Server

    Jones, Erick C

    2011-01-01

    As RFID technology is becoming increasingly popular, the need has arisen to address the challenges and approaches to successful implementation. RFID and Auto-ID in Planning and Logistics: A Practical Guide for Military UID Applications presents the concepts for students, military personnel and contractors, and corporate managers to learn about RFID and other automatic information capture technologies, and their integration into planning and logistics functions. The text includes comparisons of RFID with technologies such as bar codes, satellite tags, and global positioning systems and provides

  2. Review on security issues in RFID systems

    Directory of Open Access Journals (Sweden)

    Mohamed El Beqqal

    2017-12-01

    Full Text Available Radio frequency Identification (RFID is currently considered as one of the most used technologies for an automatic identification of objects or people. Based on a combination of tags and readers, RFID technology has widely been applied in various areas including supply chain, production and traffic control systems. However, despite of its numerous advantages, the technology brings out many challenges and concerns still not being attracting more and more researchers especially the security and privacy issues. In this paper, we review some of the recent research works using RFID solutions and dealing with security and privacy issues, we define our specific parameters and requirements allowing us to classify for each work which part of the RFID system is being secured, the solutions and the techniques used besides the conformity to RFID standards. Finally, we present briefly a solution that consists of combining RFID with smartcard based biometric to enhance security especially in access control scenarios. Hence the result of our study aims to give a clear vision of available solutions and techniques used to prevent and secure the RFID system from specific threats and attacks.

  3. An ultra-low-power area-efficient non-volatile memory in a 0.18 μm single-poly CMOS process for passive RFID tags

    International Nuclear Information System (INIS)

    Jia Xiaoyun; Feng Peng; Zhang Shengguang; Wu Nanjian; Zhao Baiqin; Liu Su

    2013-01-01

    This paper presents an ultra-low-power area-efficient non-volatile memory (NVM) in a 0.18 μm single-poly standard CMOS process for passive radio frequency identification (RFID) tags. In the memory cell, a novel low-power operation method is proposed to realize bi-directional Fowler—Nordheim tunneling during write operation. Furthermore, the cell is designed with PMOS transistors and coupling capacitors to minimize its area. In order to improve its reliability, the cell consists of double floating gates to store the data, and the 1 kbit NVM was implemented in a 0.18 μm single-poly standard CMOS process. The area of the memory cell and 1 kbit memory array is 96 μm 2 and 0.12 mm 2 , respectively. The measured results indicate that the program/erase voltage ranges from 5 to 6 V The power consumption of the read/write operation is 0.19 μW/0.69 μW at a read/write rate of (268 kb/s)/(3.0 kb/s). (semiconductor integrated circuits)

  4. KNOWLEDGE AND ACCEPTANCE OF RFID TRACEABILITY SOLUTIONS

    Directory of Open Access Journals (Sweden)

    Zoltan KATO

    2014-06-01

    Full Text Available In recent years the food market has become highly dynamic. Food crises in the early 90's, or those of the recent years, such as avian flu pandemic, swine flu, the cucumber or horse meat crises all had a negative impact on the Romanian food industry. Food deficiencies have led not only to contamination but also to the illness or death of some consumers. The products traceability is a prerequisite for success in the food industry. As a modern solution, RFID technology can be useful for traceability applications made with rewritable passive RFID tags. This paper aims to examine how RFID technology can be useful for traceability applications and will submit a diligent search regarding the degree of knowledge of RFID technology and the acceptance of an empirical model by the employees of Romanian companies.

  5. An RFID Based Smart Feeder for Hummingbirds.

    Science.gov (United States)

    Ibarra, Vicente; Araya-Salas, Marcelo; Tang, Yu-ping; Park, Charlie; Hyde, Anthony; Wright, Timothy F; Tang, Wei

    2015-12-16

    We present an interdisciplinary effort to record feeding behaviors and control the diet of a hummingbird species (Phaethornis longirostris, the long-billed hermit or LBH) by developing a Radio Frequency Identification (RFID) based smart feeder. The system contains an RFID reader, a microcontroller, and a servo-controlled hummingbird feeder opener; the system is presented as a tool for studying the cognitive ability of the LBH species. When equipped with glass capsule RFID tags (which are mounted on the hummingbird), the smart feeder can provide specific diets for predetermined sets of hummingbirds at the discretion of biologists. This is done by reading the unique RFID tag on the hummingbirds and comparing the ID number with the pre-programmed ID numbers stored in the smart feeder. The smart feeder records the time and ID of each hummingbird visit. The system data is stored in a readily available SD card and is powered by two 9 V batteries. The detection range of the system is approximately 9-11 cm. Using this system, biologists can assign the wild hummingbirds to different experimental groups and monitor their diets to determine if they develop a preference to any of the available nectars. During field testing, the smart feeder system has demonstrated consistent detection (when compared to detections observed by video-recordings) of RFID tags on hummingbirds and provides pre-designed nectars varying water and sugar concentrations to target individuals. The smart feeder can be applied to other biological and environmental studies in the future.

  6. Enhancing Business Process Automation by Integrating RFID Data and Events

    Science.gov (United States)

    Zhao, Xiaohui; Liu, Chengfei; Lin, Tao

    Business process automation is one of the major benefits for utilising Radio Frequency Identification (RFID) technology. Through readers to RFID middleware systems, the information and the movements of tagged objects can be used to trigger business transactions. These features change the way of business applications for dealing with the physical world from mostly quantity-based to object-based. Aiming to facilitate business process automation, this paper introduces a new method to model and incorporate business logics into RFID edge systems from an object-oriented perspective with emphasises on RFID's event-driven characteristics. A framework covering business rule modelling, event handling and system operation invocations is presented on the basis of the event calculus. In regard to the identified delayed effects in RFID-enabled applications, a two-block buffering mechanism is proposed to improve RFID query efficiency within the framework. The performance improvements are analysed with related experiments.

  7. RFID - based Staff Control System (SCS) in Kazakhstan

    Science.gov (United States)

    Saparkhojayev, N.

    2015-06-01

    RFID - based Staff Control System (SCS) will allow complete hands-free access control, monitoring the whereabouts of employee and record the attendance of the employee as well. Moreover, with a help of this system, it is possible to have a nice report at the end of the month and based on the total number of worked hours, the salary will be allocated to each personnel. The access tag can be read up to 10 centimeters from the RFID reader. The proposed system is based on UHF RFID readers, supported with antennas at gate and transaction sections, and employee identification cards containing RFID-transponders which are able to electronically store information that can be read / written even without the physical contact with the help of radio medium. This system is an innovative system, which describes the benefits of applying RFID- technology in the Education System process of Republic of Kazakhstan. This paper presents the experiments conducted to set up RFID based SCS.

  8. A Framework for RFID Survivability Requirement Analysis and Specification

    Science.gov (United States)

    Zuo, Yanjun; Pimple, Malvika; Lande, Suhas

    Many industries are becoming dependent on Radio Frequency Identification (RFID) technology for inventory management and asset tracking. The data collected about tagged objects though RFID is used in various high level business operations. The RFID system should hence be highly available, reliable, and dependable and secure. In addition, this system should be able to resist attacks and perform recovery in case of security incidents. Together these requirements give rise to the notion of a survivable RFID system. The main goal of this paper is to analyze and specify the requirements for an RFID system to become survivable. These requirements, if utilized, can assist the system in resisting against devastating attacks and recovering quickly from damages. This paper proposes the techniques and approaches for RFID survivability requirements analysis and specification. From the perspective of system acquisition and engineering, survivability requirement is the important first step in survivability specification, compliance formulation, and proof verification.

  9. Target tracking and surveillance by fusing stereo and RFID information

    Science.gov (United States)

    Raza, Rana H.; Stockman, George C.

    2012-06-01

    Ensuring security in high risk areas such as an airport is an important but complex problem. Effectively tracking personnel, containers, and machines is a crucial task. Moreover, security and safety require understanding the interaction of persons and objects. Computer vision (CV) has been a classic tool; however, variable lighting, imaging, and random occlusions present difficulties for real-time surveillance, resulting in erroneous object detection and trajectories. Determining object ID via CV at any instance of time in a crowded area is computationally prohibitive, yet the trajectories of personnel and objects should be known in real time. Radio Frequency Identification (RFID) can be used to reliably identify target objects and can even locate targets at coarse spatial resolution, while CV provides fuzzy features for target ID at finer resolution. Our research demonstrates benefits obtained when most objects are "cooperative" by being RFID tagged. Fusion provides a method to simplify the correspondence problem in 3D space. A surveillance system can query for unique object ID as well as tag ID information, such as target height, texture, shape and color, which can greatly enhance scene analysis. We extend geometry-based tracking so that intermittent information on ID and location can be used in determining a set of trajectories of N targets over T time steps. We show that partial-targetinformation obtained through RFID can reduce computation time (by 99.9% in some cases) and also increase the likelihood of producing correct trajectories. We conclude that real-time decision-making should be possible if the surveillance system can integrate information effectively between the sensor level and activity understanding level.

  10. Modifying the ECC-based grouping-proof RFID system to increase inpatient medication safety.

    Science.gov (United States)

    Ko, Wen-Tsai; Chiou, Shin-Yan; Lu, Erl-Huei; Chang, Henry Ker-Chang

    2014-09-01

    RFID technology is increasingly used in applications that require tracking, identification, and authentication. It attaches RFID-readable tags to objects for identification and execution of specific RFID-enabled applications. Recently, research has focused on the use of grouping-proofs for preserving privacy in RFID applications, wherein a proof of two or more tags must be simultaneously scanned. In 2010, a privacy-preserving grouping proof protocol for RFID based on ECC in public-key cryptosystem was proposed but was shown to be vulnerable to tracking attacks. A proposed enhancement protocol was also shown to have defects which prevented proper execution. In 2012, Lin et al. proposed a more efficient RFID ECC-based grouping proof protocol to promote inpatient medication safety. However, we found this protocol is also vulnerable to tracking and impersonation attacks. We then propose a secure privacy-preserving RFID grouping proof protocol for inpatient medication safety and demonstrate its resistance to such attacks.

  11. Semantic-Based RFID Data Management

    Science.gov (United States)

    de Virgilio, Roberto; di Sciascio, Eugenio; Ruta, Michele; Scioscia, Floriano; Torlone, Riccardo

    Traditional Radio-Frequency IDentification (RFID) applications have been focused on replacing bar codes in supply chain management. Leveraging a ubiquitous computing architecture, the chapter presents a framework allowing both quick decentralized on-line item discovery and centralized off-line massive business logic analysis, according to needs and requirements of supply chain actors. A semantic-based environment, where tagged objects become resources exposing to an RFID reader not a trivial identification code but a semantic annotation, enables tagged objects to describe themselves on the fly without depending on a centralized infrastructure. On the other hand, facing on data management issues, a proposal is formulated for an effective off-line multidimensional analysis of huge amounts of RFID data generated and stored along the supply chain.

  12. Degenerate RFID Channel Modeling for Positioning Applications

    Directory of Open Access Journals (Sweden)

    A. Povalac

    2012-12-01

    Full Text Available This paper introduces the theory of channel modeling for positioning applications in UHF RFID. It explains basic parameters for channel characterization from both the narrowband and wideband point of view. More details are given about ranging and direction finding. Finally, several positioning scenarios are analyzed with developed channel models. All the described models use a degenerate channel, i.e. combined signal propagation from the transmitter to the tag and from the tag to the receiver.

  13. RFID explained a primer on radio frequency identification technologies

    CERN Document Server

    Want, Roy

    2006-01-01

    This lecture provides an introduction to Radio Frequency Identification (RFID), a technology enabling automatic identification of objects at a distance without requiring line-of-sight. Electronic tagging can be divided into technologies that have a power source (active tags), and those that are powered by the tag interrogation signal (passive tags); the focus here is on passive tags. An overview of the principles of the technology divides passive tags into devices that use either near field or far field coupling to communicate with a tag reader. The strengths and weaknesses of the approaches a

  14. System and Method for RFID-Enabled Information Collection

    Science.gov (United States)

    Fink, Patrick W. (Inventor); Lin, Gregory Y. (Inventor); Kennedy, Timothy F. (Inventor); Ngo, Phong H. (Inventor); Byerly, Diane (Inventor)

    2016-01-01

    Methods, apparatuses and systems for radio frequency identification (RFID)-enabled information collection are disclosed, including an enclosure, a collector coupled to the enclosure, an interrogator, a processor, and one or more RFID field sensors, each having an individual identification, disposed within the enclosure. In operation, the interrogator transmits an incident signal to the collector, causing the collector to generate an electromagnetic field within the enclosure. The electromagnetic field is affected by one or more influences. RFID sensors respond to the electromagnetic field by transmitting reflected signals containing the individual identifications of the responding RFID sensors to the interrogator. The interrogator receives the reflected signals, measures one or more returned signal strength indications ("RSSI") of the reflected signals and sends the RSSI measurements and identification of the responding RFID sensors to the processor to determine one or more facts about the influences. Other embodiments are also described.

  15. Systems and Methods for RFID-Enabled Dispenser

    Science.gov (United States)

    Fink, Patrick W. (Inventor); Lin, Gregory Y. (Inventor); Kennedy, Timothy F. (Inventor); Ngo, Phong H. (Inventor); Byerly, Diane (Inventor)

    2015-01-01

    Methods, apparatuses and systems for radio frequency identification (RFID)-enabled information collection are disclosed, including an enclosure, a collector coupled to the enclosure, an interrogator, a processor, and one or more RFID field sensors, each having an individual identification, disposed within the enclosure. In operation, the interrogator transmits an incident signal to the collector, causing the collector to generate an electromagnetic field within the enclosure. The electromagnetic field is affected by one or more influences. RFID sensors respond to the electromagnetic field by transmitting reflected signals containing the individual identifications of the responding RFID sensors to the interrogator. The interrogator receives the reflected signals, measures one or more returned signal strength indications ("RSSI") of the reflected signals and sends the RSSI measurements and identification of the responding RFID sensors to the processor to determine one or more facts about the influences. Other embodiments are also described.

  16. Architecture and Protocol of a Semantic System Designed for Video Tagging with Sensor Data in Mobile Devices

    Directory of Open Access Journals (Sweden)

    Alvaro Suarez

    2012-02-01

    Full Text Available Current mobile phones come with several sensors and powerful video cameras. These video cameras can be used to capture good quality scenes, which can be complemented with the information gathered by the sensors also embedded in the phones. For example, the surroundings of a beach recorded by the camera of the mobile phone, jointly with the temperature of the site can let users know via the Internet if the weather is nice enough to swim. In this paper, we present a system that tags the video frames of the video recorded from mobile phones with the data collected by the embedded sensors. The tagged video is uploaded to a video server, which is placed on the Internet and is accessible by any user. The proposed system uses a semantic approach with the stored information in order to make easy and efficient video searches. Our experimental results show that it is possible to tag video frames in real time and send the tagged video to the server with very low packet delay variations. As far as we know there is not any other application developed as the one presented in this paper.

  17. Architecture and Protocol of a Semantic System Designed for Video Tagging with Sensor Data in Mobile Devices

    Science.gov (United States)

    Macias, Elsa; Lloret, Jaime; Suarez, Alvaro; Garcia, Miguel

    2012-01-01

    Current mobile phones come with several sensors and powerful video cameras. These video cameras can be used to capture good quality scenes, which can be complemented with the information gathered by the sensors also embedded in the phones. For example, the surroundings of a beach recorded by the camera of the mobile phone, jointly with the temperature of the site can let users know via the Internet if the weather is nice enough to swim. In this paper, we present a system that tags the video frames of the video recorded from mobile phones with the data collected by the embedded sensors. The tagged video is uploaded to a video server, which is placed on the Internet and is accessible by any user. The proposed system uses a semantic approach with the stored information in order to make easy and efficient video searches. Our experimental results show that it is possible to tag video frames in real time and send the tagged video to the server with very low packet delay variations. As far as we know there is not any other application developed as the one presented in this paper. PMID:22438753

  18. Architecture and protocol of a semantic system designed for video tagging with sensor data in mobile devices.

    Science.gov (United States)

    Macias, Elsa; Lloret, Jaime; Suarez, Alvaro; Garcia, Miguel

    2012-01-01

    Current mobile phones come with several sensors and powerful video cameras. These video cameras can be used to capture good quality scenes, which can be complemented with the information gathered by the sensors also embedded in the phones. For example, the surroundings of a beach recorded by the camera of the mobile phone, jointly with the temperature of the site can let users know via the Internet if the weather is nice enough to swim. In this paper, we present a system that tags the video frames of the video recorded from mobile phones with the data collected by the embedded sensors. The tagged video is uploaded to a video server, which is placed on the Internet and is accessible by any user. The proposed system uses a semantic approach with the stored information in order to make easy and efficient video searches. Our experimental results show that it is possible to tag video frames in real time and send the tagged video to the server with very low packet delay variations. As far as we know there is not any other application developed as the one presented in this paper.

  19. RFID-Based Vehicle Positioning and Its Applications in Connected Vehicles

    Science.gov (United States)

    Wang, Jianqiang; Ni, Daiheng; Li, Keqiang

    2014-01-01

    This paper proposed an RFID-based vehicle positioning approach to facilitate connected vehicles applications. When a vehicle passes over an RFID tag, the vehicle position is given by the accurate position stored in the tag. At locations without RFID coverage, the vehicle position is estimated from the most recent tag location using a kinematics integration algorithm till updates from the next tag. The accuracy of RFID positioning is verified empirically in two independent ways with one using radar and the other a photoelectric switch. The former is designed to verify whether the dynamic position obtained from RFID tags matches the position measured by radar that is regarded as accurate. The latter aims to verify whether the position estimated from the kinematics integration matches the position obtained from RFID tags. Both means supports the accuracy of RFID-based positioning. As a supplement to GPS which suffers from issues such as inaccuracy and loss of signal, RFID positioning is promising in facilitating connected vehicles applications. Two conceptual applications are provided here with one in vehicle operational control and the other in Level IV intersection control. PMID:24599188

  20. RFID-Based Vehicle Positioning and Its Applications in Connected Vehicles

    Directory of Open Access Journals (Sweden)

    Jianqiang Wang

    2014-03-01

    Full Text Available This paper proposed an RFID-based vehicle positioning approach to facilitate connected vehicles applications. When a vehicle passes over an RFID tag, the vehicle position is given by the accurate position stored in the tag. At locations without RFID coverage, the vehicle position is estimated from the most recent tag location using a kinematics integration algorithm till updates from the next tag. The accuracy of RFID positioning is verified empirically in two independent ways with one using radar and the other a photoelectric switch. The former is designed to verify whether the dynamic position obtained from RFID tags matches the position measured by radar that is regarded as accurate. The latter aims to verify whether the position estimated from the kinematics integration matches the position obtained from RFID tags. Both means supports the accuracy of RFID-based positioning. As a supplement to GPS which suffers from issues such as inaccuracy and loss of signal, RFID positioning is promising in facilitating connected vehicles applications. Two conceptual applications are provided here with one in vehicle operational control and the other in Level IV intersection control.

  1. RFID-based vehicle positioning and its applications in connected vehicles.

    Science.gov (United States)

    Wang, Jianqiang; Ni, Daiheng; Li, Keqiang

    2014-03-04

    This paper proposed an RFID-based vehicle positioning approach to facilitate connected vehicles applications. When a vehicle passes over an RFID tag, the vehicle position is given by the accurate position stored in the tag. At locations without RFID coverage, the vehicle position is estimated from the most recent tag location using a kinematics integration algorithm till updates from the next tag. The accuracy of RFID positioning is verified empirically in two independent ways with one using radar and the other a photoelectric switch. The former is designed to verify whether the dynamic position obtained from RFID tags matches the position measured by radar that is regarded as accurate. The latter aims to verify whether the position estimated from the kinematics integration matches the position obtained from RFID tags. Both means supports the accuracy of RFID-based positioning. As a supplement to GPS which suffers from issues such as inaccuracy and loss of signal, RFID positioning is promising in facilitating connected vehicles applications. Two conceptual applications are provided here with one in vehicle operational control and the other in Level IV intersection control.

  2. Applying radio-frequency identification (RFID) technology in transfusion medicine.

    Science.gov (United States)

    Hohberger, Clive; Davis, Rodeina; Briggs, Lynne; Gutierrez, Alfonso; Veeramani, Dhamaraj

    2012-05-01

    ISO/IEC 18000-3 mode 1 standard 13.56 MHz RFID tags have been accepted by the International Society for Blood Transfusion (ISBT) and the United States Food and Drug Administration (FDA) as data carriers to integrate with and augment ISBT 128 barcode data carried on blood products. The use of 13.56 MHz RFID carrying ISBT 128 data structures allows the global deployment and use of RFID, supporting both international transfer of blood and international disaster relief. The deployment in process at the BloodCenter of Wisconsin and testing at the University of Iowa Health Center is the first FDA-permitted implementation of RFID throughout in all phases of blood banking, donation through transfusion. RFID technology and equipment selection will be discussed along with FDA-required RF safety testing; integration with the blood enterprise computing system and required RFID tag performance. Tag design and survivability is an issue due to blood bag centrifugation and irradiation. Deployment issues will be discussed. Use of RFID results in significant return on investment over the use of barcodes in the blood center operations through labor savings and error reduction. Copyright © 2011 The International Alliance for Biological Standardization. Published by Elsevier Ltd. All rights reserved.

  3. Privacy-by-Design(PbD IoT Framework : A Case of Location Privacy Mitigation Strategies for Near Field Communication (NFC Tag Sensor

    Directory of Open Access Journals (Sweden)

    V.Ragunatha Nadarajah

    2017-01-01

    Full Text Available Near Field Communication (NFC technology is a short range (range about 10cm standard extended from the core standard Radio Frequency Identifier (RFID. These technologies are a portion of wireless communication technology. Even though NFC technologies benefit in various field, but it’s still exposed to multiple type of privacy attacks and threat as well since the communication occur in an open environment. The filtering technique been perform on the tag in order to get access to the embedded information. As solution based on tag filtering techniques, existing NFC filtering, Intent filtering has merged together with Bloom filtering from RFID technology. This help in term of elimination the duplicate tag and verify the receiving tag. Meanwhile, as a content protection to NFC Data Exchange Format (NDEF message been transmitted through the communication channel, Advance Encryption Standard (AES 128bit has been implemented on the NDEF message. AES provide solution to encrypt the NDEF message which has been communicated. Bloom filtering performed the hashing operation using MD5 technique as a verification of registered user to the NFC system. While the default Intent filtering direct the user to the selected invocation as registered on the tag after the Bloom filtering verification. Besides that, implementation of AES cryptographic in NDEF message, took approximately about 80 trillion years++ to crack the key using brute force attack. Communication of two legitimate entities is secured with AES encryption. Hence, secured user validation or filtering with encrypted message, prevent the possibility for MITM attacker to retrieve sensitive or personal information. The overall framework provide a better security solution compare to the existing framework.

  4. Group-ID based RFID Mutual Authentication

    Directory of Open Access Journals (Sweden)

    LEE, Y.

    2013-11-01

    Full Text Available For passive type RFID tags, EPCglobal Class 1 Generation-2 Revision is used widely as a de facto standard. As it was designed for low cost, it is quite vulnerable to security issues, such as privacy concerns. This paper presents a new RFID mutual authentication protocol, which is designed to be configured on EPC Gen2 platform and to meet various security requirements while providing efficiency using PRNG (Pseudo Random Number Generator. Group-ID is used to minimize the authentication time. Security analysis of the proposed protocol is discussed.

  5. UHF RFID technologies for identification and traceability

    CERN Document Server

    Laheurte, Jean-Marc; Paret, Dominique; Loussert, Christophe

    2014-01-01

    UHF Radio Frequency Identification (RFID) is an electronic tagging technology that allows an object, place or person to be automatically identified at a distance without a direct line-of-sight using a radio wave exchange. Applications include inventory tracking, prescription medication tracking and authentication, secure automobile keys, and access control for secure facilities. This book begins with an overview of UHF RFID challenges describing the applications, markets, trades and basic technologies. It follows this by highlighting the main features distinguishing UHF (860MHz-960MHz) and HF

  6. A wireless sensor enabled by wireless power.

    Science.gov (United States)

    Lee, Da-Sheng; Liu, Yu-Hong; Lin, Chii-Ruey

    2012-11-22

    Through harvesting energy by wireless charging and delivering data by wireless communication, this study proposes the concept of a wireless sensor enabled by wireless power (WPWS) and reports the fabrication of a prototype for functional tests. One WPWS node consists of wireless power module and sensor module with different chip-type sensors. Its main feature is the dual antenna structure. Following RFID system architecture, a power harvesting antenna was designed to gather power from a standard reader working in the 915 MHz band. Referring to the Modbus protocol, the other wireless communication antenna was integrated on a node to send sensor data in parallel. The dual antenna structure integrates both the advantages of an RFID system and a wireless sensor. Using a standard UHF RFID reader, WPWS can be enabled in a distributed area with a diameter up to 4 m. Working status is similar to that of a passive tag, except that a tag can only be queried statically, while the WPWS can send dynamic data from the sensors. The function is the same as a wireless sensor node. Different WPWSs equipped with temperature and humidity, optical and airflow velocity sensors are tested in this study. All sensors can send back detection data within 8 s. The accuracy is within 8% deviation compared with laboratory equipment. A wireless sensor network enabled by wireless power should be a totally wireless sensor network using WPWS. However, distributed WPWSs only can form a star topology, the simplest topology for constructing a sensor network. Because of shielding effects, it is difficult to apply other complex topologies. Despite this limitation, WPWS still can be used to extend sensor network applications in hazardous environments. Further research is needed to improve WPWS to realize a totally wireless sensor network.

  7. Preliminary Study of RFID System for the LILW Transportation

    International Nuclear Information System (INIS)

    Kim, Dohyung; Lee, Unjang; Choi, Kyusup

    2008-01-01

    Radio-Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. In Korea, Low-to-Intermediate Level Radioactive Wastes (LILW) are planed to be disposed at Kyeonju disposal repository, and 100,000 LILW drums will be disposed for the first 10 years of disposal. Tracking of these LILW drums is one of the important parts for safe transportation. To track the LILW drums during the transport as well as storage and disposal, RFID can be the prospective method for tracking the LILW drums. In this report, RFID system is introduced to the LILW transport from the generation site to disposal site, and one possible RFID system is suggested as a preliminary study

  8. Applying RFID technology in nuclear materials management

    International Nuclear Information System (INIS)

    Tsai, H.; Chen, K.; Liu, Y.; Norair, J.P.; Bellamy, S.; Shuler, J.

    2008-01-01

    The Packaging Certification Program (PCP) of US Department of Energy (DOE) Environmental Management (EM), Office of Safety Management and Operations (EM-60), has developed a radio frequency identification (RFID) system for the management of nuclear materials. Argonne National Laboratory, a PCP supporting laboratory, and Savi Technology, a Lockheed Martin Company, are collaborating in the development of the RFID system, a process that involves hardware modification (form factor, seal sensor and batteries), software development and irradiation experiments. Savannah River National Laboratory and Argonne will soon field test the active RFID system on Model 9975 drums, which are used for storage and transportation of fissile and radioactive materials. Potential benefits of the RFID system are enhanced safety and security, reduced need for manned surveillance, real time access of status and history data, and overall cost effectiveness

  9. RFID Guardian: A Battery-powered Mobile Device for RFID Privacy Management

    NARCIS (Netherlands)

    Rieback, M.R.; Crispo, B.; Tanenbaum, A.S.

    2005-01-01

    RFID tags are tiny, inexpensive, inductively powered computers that are going to replace bar codes on many products, but which have many other uses as well. For example, they will allow smart washing machines to check for incompatible clothes (e.g., white shirts and red socks) and smart

  10. Time-Efficient Cloning Attacks Identification in Large-Scale RFID Systems

    Directory of Open Access Journals (Sweden)

    Ju-min Zhao

    2017-01-01

    Full Text Available Radio Frequency Identification (RFID is an emerging technology for electronic labeling of objects for the purpose of automatically identifying, categorizing, locating, and tracking the objects. But in their current form RFID systems are susceptible to cloning attacks that seriously threaten RFID applications but are hard to prevent. Existing protocols aimed at detecting whether there are cloning attacks in single-reader RFID systems. In this paper, we investigate the cloning attacks identification in the multireader scenario and first propose a time-efficient protocol, called the time-efficient Cloning Attacks Identification Protocol (CAIP to identify all cloned tags in multireaders RFID systems. We evaluate the performance of CAIP through extensive simulations. The results show that CAIP can identify all the cloned tags in large-scale RFID systems fairly fast with required accuracy.

  11. Overview of RFID technology and its applications in the food industry.

    Science.gov (United States)

    Kumar, P; Reinitz, H W; Simunovic, J; Sandeep, K P; Franzon, P D

    2009-10-01

    Radio frequency identification (RFID) is an alternative technology with a potential to replace traditional universal product code (UPC) barcodes. RFID enables identification of an object from a distance without requiring a line of sight. RFID tags can also incorporate additional data such as details of product and manufacturer and can transmit measured environmental factors such as temperature and relative humidity. This article presents key concepts and terminology related to RFID technology and its applications in the food industry. Components and working principles of an RFID system are described. Numerous applications of RFID technology in the food industry (supply chain management, temperature monitoring of foods, and ensuring food safety) are discussed. Challenges in implementation of RFID technology are also discussed in terms of read range, read accuracy, nonuniform standards, cost, recycling issues, privacy, and security concerns.

  12. A Study on Watt-hour Meter Data Acquisition Method Based on RFID Technology

    Science.gov (United States)

    Chen, Xiangqun; Huang, Rui; Shen, Liman; Chen, Hao; Xiong, Dezhi; Xiao, Xiangqi; Liu, Mouhai; Xu, Renheng

    2018-03-01

    Considering that traditional watt-hour meter data acquisition was subjected to the influence of distance and occlusion, a watt-hour meter data acquisition method based on RFID technology was proposed in this paper. In detail, RFID electronic tag was embedded in the watt-hour meter to identify the meter and record electric energy information, which made RFID based wireless data acquisition for watt-hour meter come true. Eventually, overall lifecycle management of watt-hour meter is realized.

  13. An RFID Based Smart Feeder for Hummingbirds

    Directory of Open Access Journals (Sweden)

    Vicente Ibarra

    2015-12-01

    Full Text Available We present an interdisciplinary effort to record feeding behaviors and control the diet of a hummingbird species (Phaethornis longirostris, the long-billed hermit or LBH by developing a Radio Frequency Identification (RFID based smart feeder. The system contains an RFID reader, a microcontroller, and a servo-controlled hummingbird feeder opener; the system is presented as a tool for studying the cognitive ability of the LBH species. When equipped with glass capsule RFID tags (which are mounted on the hummingbird, the smart feeder can provide specific diets for predetermined sets of hummingbirds at the discretion of biologists. This is done by reading the unique RFID tag on the hummingbirds and comparing the ID number with the pre-programmed ID numbers stored in the smart feeder. The smart feeder records the time and ID of each hummingbird visit. The system data is stored in a readily available SD card and is powered by two 9 V batteries. The detection range of the system is approximately 9–11 cm. Using this system, biologists can assign the wild hummingbirds to different experimental groups and monitor their diets to determine if they develop a preference to any of the available nectars. During field testing, the smart feeder system has demonstrated consistent detection (when compared to detections observed by video-recordings of RFID tags on hummingbirds and provides pre-designed nectars varying water and sugar concentrations to target individuals. The smart feeder can be applied to other biological and environmental studies in the future.

  14. RFID: A key technology for Humanity

    Science.gov (United States)

    Duroc, Yvan; Tedjini, Smail

    2018-01-01

    The RFID (Radio Frequency IDentification) technology is a well-known wireless application for traceability, logistics, and access control. It became ubiquitous in industry and our daily life (ticketing, payment, passports, car keys, etc.). RFID is nowadays a standardized technology; its inherent advantages, which are unitary, identification, wireless communication, and low cost of tags, provide it with decisive practical benefits that drive new developments in terms of concepts and applications. This trend is largely confirmed by the market forecast, but also by its implementation in the area of health (smart hospital), assistance to persons, anti-counterfeiting, as well as by its perspective in terms of new paradigms for distributed ambient intelligence and the Internet of Things. The first part of this paper briefly reviews the fundamental concepts of the RFID technology, and shows its link with the radio science. A state of the art including the presentation of current performance and developments is also summarized. The second part illustrates the impact of RFID to the service of our society with a focus of applications in the field of autonomy and handicap. Finally, the last part highlights a panorama of perspectives and the future directions of RFID applications dedicated to the service of Humanity. xml:lang="fr"

  15. Applied patent RFID systems for building reacting HEPA air ventilation system in hospital operation rooms.

    Science.gov (United States)

    Lin, Jesun; Pai, Jar-Yuan; Chen, Chih-Cheng

    2012-12-01

    RFID technology, an automatic identification and data capture technology to provide identification, tracing, security and so on, was widely applied to healthcare industry in these years. Employing HEPA ventilation system in hospital is a way to ensure healthful indoor air quality to protect patients and healthcare workers against hospital-acquired infections. However, the system consumes lots of electricity which cost a lot. This study aims to apply the RFID technology to offer a unique medical staff and patient identification, and reacting HEPA air ventilation system in order to reduce the cost, save energy and prevent the prevalence of hospital-acquired infection. The system, reacting HEPA air ventilation system, contains RFID tags (for medical staffs and patients), sensor, and reacting system which receives the information regarding the number of medical staff and the status of the surgery, and controls the air volume of the HEPA air ventilation system accordingly. A pilot program was carried out in a unit of operation rooms of a medical center with 1,500 beds located in central Taiwan from Jan to Aug 2010. The results found the air ventilation system was able to function much more efficiently with less energy consumed. Furthermore, the indoor air quality could still keep qualified and hospital-acquired infection or other occupational diseases could be prevented.

  16. Precise RFID localization in impaired environment through sparse signal recovery

    Science.gov (United States)

    Subedi, Saurav; Zhang, Yimin D.; Amin, Moeness G.

    2013-05-01

    Radio frequency identification (RFID) is a rapidly developing wireless communication technology for electronically identifying, locating, and tracking products, assets, and personnel. RFID has become one of the most important means to construct real-time locating systems (RTLS) that track and identify the location of objects in real time using simple, inexpensive tags and readers. The applicability and usefulness of RTLS techniques depend on their achievable accuracy. In particular, when multilateration-based localization techniques are exploited, the achievable accuracy primarily relies on the precision of the range estimates between a reader and the tags. Such range information can be obtained by using the received signal strength indicator (RSSI) and/or the phase difference of arrival (PDOA). In both cases, however, the accuracy is significantly compromised when the operation environment is impaired. In particular, multipath propagation significantly affects the measurement accuracy of both RSSI and phase information. In addition, because RFID systems are typically operated in short distances, RSSI and phase measurements are also coupled with the reader and tag antenna patterns, making accurate RFID localization very complicated and challenging. In this paper, we develop new methods to localize RFID tags or readers by exploiting sparse signal recovery techniques. The proposed method allows the channel environment and antenna patterns to be taken into account and be properly compensated at a low computational cost. As such, the proposed technique yields superior performance in challenging operation environments with the above-mentioned impairments.

  17. Reducing False Negative Reads in RFID Data Streams Using an Adaptive Sliding-Window Approach

    Directory of Open Access Journals (Sweden)

    Herman Vermaak

    2012-03-01

    Full Text Available Unreliability of the data streams generated by RFID readers is among the primary factors which limit the widespread adoption of the RFID technology. RFID data cleaning is, therefore, an essential task in the RFID middleware systems in order to reduce reading errors, and to allow these data streams to be used to make a correct interpretation and analysis of the physical world they are representing. In this paper we propose an adaptive sliding-window based approach called WSTD which is capable of efficiently coping with both environmental variation and tag dynamics. Our experimental results demonstrate the efficacy of the proposed approach.

  18. Exploring the Limitations on RFID Technology in Traceability Systems at Beverage Factories

    Directory of Open Access Journals (Sweden)

    Isabel Expósito

    2013-01-01

    Full Text Available The application of RFID in traceability of products in beverage factories is analyzed in terms of the electromagnetic conditions defined by the massive presence of metallic elements and liquids. Various experiments are reported to determine the maximum reading range from RFID tags installed on tanks or to read RFID information around bottles, both empty and full of wine, trying to put in context the possible problems that could appear when installing an RFID-based traceability system within a winery, a brewery, or any other beverage factory.

  19. Report on a 2009 mini-demonstration of the ARG-US Radio Frequency Identification (RFID) system in transportation

    International Nuclear Information System (INIS)

    Tsai, H.; Chen, K.; Jusko, M.; Craig, B.; Liu, Y.

    2009-01-01

    The Packaging Certification Program (PCP) of the U.S. Department of Energy (DOE) Environmental Management (EM), Office of Packaging and Transportation (EM-14), has developed a radio frequency identification (RFID) tracking and monitoring system for the management of nuclear materials during storage and transportation. The system, developed by the PCP team at Argonne National Laboratory, consists of hardware (Mk-series sensor tags, fixed and handheld readers, form factor for multiple drum types, seal integrity sensors, and enhanced battery management), software (application programming interface, ARG-US software for local and remote/web applications, secure server and database management), and cellular/satellite communication interfaces for vehicle tracking and item monitoring during transport. The ability of the above system to provide accurate, real-time tracking and monitoring of the status of multiple, certified containers of nuclear materials has been successfully demonstrated in a week-long, 1,700-mile DEMO performed in April 2008. While the feedback from the approximately fifty (50) stakeholders who participated in and/or observed the DEMO progression were very positive and encouraging, two major areas of further improvements - system integration and web application enhancement - were identified in the post-DEMO evaluation. The principal purpose of the MiniDemo described in this report was to verify these two specific improvements. The MiniDemo was conducted on August 28, 2009. In terms of system integration, a hybrid communication interface - combining the RFID item-monitoring features and a commercial vehicle tracking system by Qualcomm - was developed and implemented. In the MiniDemo, the new integrated system worked well in reporting tag status and vehicle location accurately and promptly. There was no incompatibility of components. The robust commercial communication gear, as expected, helped improve system reliability. The MiniDemo confirmed that system

  20. Report on a 2009 mini-demonstration of the ARG-US Radio Frequency Identification (RFID) system in transportation.

    Energy Technology Data Exchange (ETDEWEB)

    Tsai, H.; Chen, K.; Jusko, M.; Craig, B.; Liu, Y.; Decision and Information Sciences

    2009-11-23

    The Packaging Certification Program (PCP) of the U.S. Department of Energy (DOE) Environmental Management (EM), Office of Packaging and Transportation (EM-14), has developed a radio frequency identification (RFID) tracking and monitoring system for the management of nuclear materials during storage and transportation. The system, developed by the PCP team at Argonne National Laboratory, consists of hardware (Mk-series sensor tags, fixed and handheld readers, form factor for multiple drum types, seal integrity sensors, and enhanced battery management), software (application programming interface, ARG-US software for local and remote/web applications, secure server and database management), and cellular/satellite communication interfaces for vehicle tracking and item monitoring during transport. The ability of the above system to provide accurate, real-time tracking and monitoring of the status of multiple, certified containers of nuclear materials has been successfully demonstrated in a week-long, 1,700-mile DEMO performed in April 2008. While the feedback from the approximately fifty (50) stakeholders who participated in and/or observed the DEMO progression were very positive and encouraging, two major areas of further improvements - system integration and web application enhancement - were identified in the post-DEMO evaluation. The principal purpose of the MiniDemo described in this report was to verify these two specific improvements. The MiniDemo was conducted on August 28, 2009. In terms of system integration, a hybrid communication interface - combining the RFID item-monitoring features and a commercial vehicle tracking system by Qualcomm - was developed and implemented. In the MiniDemo, the new integrated system worked well in reporting tag status and vehicle location accurately and promptly. There was no incompatibility of components. The robust commercial communication gear, as expected, helped improve system reliability. The MiniDemo confirmed that system

  1. Underground navigation and localisation using RFID tags

    CSIR Research Space (South Africa)

    James, S

    2012-10-01

    Full Text Available Shahdi and Deon Sabatta, currently at the CSIR. Lastly, I extend my gratitude to the University of Cape Town (UCT) and specifically my supervisor, Robyn Verrinder, for all of her support. Inspecting a mine after blasting is the most dangerous stage...

  2. Efficiency and Privacy Enhancement for a Track and Trace System of RFID-Based Supply Chains

    Directory of Open Access Journals (Sweden)

    Xunjun Chen

    2015-06-01

    Full Text Available One of the major applications of Radio Frequency Identification (RFID technology is in supply chain management as it promises to provide real-time visibility based on the function of track and trace. However, such an RFID-based track and trace system raises new security and privacy challenges due to the restricted resource of tags. In this paper, we refine three privacy related models (i.e., the privacy, path unlinkability, and tag unlinkability of RFID-based track and trace systems, and clarify the relations among these privacy models. Specifically, we have proven that privacy is equivalent to path unlinkability and tag unlinkability implies privacy. Our results simplify the privacy concept and protocol design for RFID-based track and trace systems. Furthermore, we propose an efficient track and trace scheme, Tracker+, which allows for authentic and private identification of RFID-tagged objects in supply chains. In the Tracker+, no computational ability is required for tags, but only a few bytes of storage (such as EPC Class 1 Gen 2 tags are needed to store the tag state. Indeed, Tracker+ reduces the memory requirements for each tag by one group element compared to the Tracker presented in other literature. Moreover, Tracker+ provides privacy against supply chain inside attacks.

  3. Event Management of RFID Data Streams: Fast Moving Consumer Goods Supply Chains

    Science.gov (United States)

    Mo, John P. T.; Li, Xue

    Radio Frequency Identification (RFID) is a wireless communication technology that uses radio-frequency waves to transfer information between tagged objects and readers without line of sight. This creates tremendous opportunities for linking real world objects into a world of "Internet of things". Application of RFID to Fast Moving Consumer Goods sector will introduce billions of RFID tags in the world. Almost everything is tagged for tracking and identification purposes. This phenomenon will impose a new challenge not only to the network capacity but also to the scalability of processing of RFID events and data. This chapter uses two national demonstrator projects in Australia as case studies to introduce an event managementframework to process high volume RFID data streams in real time and automatically transform physical RFID observations into business-level events. The model handles various temporal event patterns, both simple and complex, with temporal constraints. The model can be implemented in a data management architecture that allows global RFID item tracking and enables fast, large-scale RFID deployment.

  4. Development and evaluation of a boat-mounted RFID antenna for monitoring freshwater mussels

    Science.gov (United States)

    Fischer, Jesse R.; Neebling, Travis E.; Quist, Michael C.

    2012-01-01

    Development of radio frequency identification (RFID) technology and passive integrated transponder (PIT) tags has substantially increased the ability of researchers and managers to monitor populations of aquatic organisms. However, use of transportable RFID antenna systems (i.e., backpack-mounted) is currently limited to wadeable aquatic environments (RFID antenna to detect individually PIT-tagged benthic aquatic organisms (mussels). We evaluated the effects of tag orientation on detection distances in water with a 32-mm half-duplex PIT tag. Detection distances up to 50 cm from the antenna coils were obtained, but detection distance was dependent on tag orientation. We also evaluated detection distance of PIT tags beneath the sediment to simulate detection of burrowing mussels with 23- and 32-mm tags. In sand substrate, the maximum detection distance varied from 3.5 cm and 4.5 cm (vertical tag orientation) to 24.7 cm and 39.4 cm (45° tag orientation) for the 23- and 32-mm PIT tags, respectively. Our results suggest a 1.4-m total detection width for tagged mussels on the substrate surface by the boat-mounted antenna system regardless of tag orientation. However, burrowed mussels may require multiple passes to increase detection that would be influenced by depth, tag orientation, and tag size. Construction of the boat-mounted antenna was relatively low in cost (<500 USD) and had several advantages (less labor and time intensive, increased safety) over traditional mussel sampling techniques (diving, snorkeling) in nonwadeable habitats.

  5. RFID design principles

    CERN Document Server

    Lehpamer, Harvey

    2012-01-01

    This revised edition of the Artech House bestseller, RFID Design Principles, serves as an up-to-date and comprehensive introduction to the subject. The second edition features numerous updates and brand new and expanded material on emerging topics such as the medical applications of RFID and new ethical challenges in the field. This practical book offers you a detailed understanding of RFID design essentials, key applications, and important management issues. The book explores the role of RFID technology in supply chain management, intelligent building design, transportation systems, military

  6. Demonstration (DEMO) of Radio Frequency Identification (RFID) system for tracking and monitoring of nuclear materials.

    Energy Technology Data Exchange (ETDEWEB)

    Tsai, H. C.; Chen, K.; Liu, Y. Y.; Shuler, J. (Decision and Information Sciences); (USDOE)

    2010-01-01

    The US Department of Energy (DOE) [Environmental Management (EM), Office of Packaging and Transportation (EM-45)] Packaging Certification Program (PCP) has developed a radiofrequency identification (RFID) tracking and monitoring system for the management of nuclear materials packages during storage and transportation. The system, developed by the PCP team at Argonne National Laboratory, involves hardware modification, application software development, secured database and web server development, and irradiation experiments. In April 2008, Argonne tested key features of the RFID tracking and monitoring system in a weeklong, 1700 mile (2736 km) demonstration employing 14 empty type B fissile material drums of three designs (models 9975, 9977 and ES-3100) that have been certified for shipment by the DOE and the US Nuclear Regulatory Commission. The demonstration successfully integrated global positioning system (GPS) technology for vehicle tracking, satellite/cellular (general packet radio service, or GPRS) technologies for wireless communication, and active RFID tags with multiple sensors (seal integrity, shock, temperature, humidity and battery status) on drums. In addition, the demonstration integrated geographic information system (GIS) technology with automatic alarm notifications of incidents and generated buffer zone reports for emergency response and management of staged incidents. The demonstration was sponsored by EM and the US National Nuclear Security Administration, with the participation of Argonne, Savannah River and Oak Ridge National Laboratories. Over 50 authorised stakeholders across the country observed the demonstration via secured Internet access. The DOE PCP and national laboratories are working on several RFID system implementation projects at selected DOE sites, as well as continuing device and systems development and widening applications beyond DOE sites and possibly beyond nuclear materials to include other radioactive materials.

  7. Demonstration (DEMO) of Radio Frequency Identification (RFID) system for tracking and monitoring of nuclear materials

    International Nuclear Information System (INIS)

    Tsai, H.C.; Chen, K.; Liu, Y.Y.; Shuler, J.

    2010-01-01

    The US Department of Energy (DOE) (Environmental Management (EM), Office of Packaging and Transportation (EM-45)) Packaging Certification Program (PCP) has developed a radiofrequency identification (RFID) tracking and monitoring system for the management of nuclear materials packages during storage and transportation. The system, developed by the PCP team at Argonne National Laboratory, involves hardware modification, application software development, secured database and web server development, and irradiation experiments. In April 2008, Argonne tested key features of the RFID tracking and monitoring system in a weeklong, 1700 mile (2736 km) demonstration employing 14 empty type B fissile material drums of three designs (models 9975, 9977 and ES-3100) that have been certified for shipment by the DOE and the US Nuclear Regulatory Commission. The demonstration successfully integrated global positioning system (GPS) technology for vehicle tracking, satellite/cellular (general packet radio service, or GPRS) technologies for wireless communication, and active RFID tags with multiple sensors (seal integrity, shock, temperature, humidity and battery status) on drums. In addition, the demonstration integrated geographic information system (GIS) technology with automatic alarm notifications of incidents and generated buffer zone reports for emergency response and management of staged incidents. The demonstration was sponsored by EM and the US National Nuclear Security Administration, with the participation of Argonne, Savannah River and Oak Ridge National Laboratories. Over 50 authorised stakeholders across the country observed the demonstration via secured Internet access. The DOE PCP and national laboratories are working on several RFID system implementation projects at selected DOE sites, as well as continuing device and systems development and widening applications beyond DOE sites and possibly beyond nuclear materials to include other radioactive materials.

  8. Development and evaluation of a boat-mounted RFID antenna for monitoring freshwater mussels

    Science.gov (United States)

    Fischer, Jesse R.; Neebling, Travis E.; Quist, Michael C.

    2012-01-01

    Development of radio frequency identification (RFID) technology and passive integrated transponder (PIT) tags has substantially increased the ability of researchers and managers to monitor populations of aquatic organisms. However, use of transportable RFID antenna systems (i.e., backpack-mounted) is currently limited to wadeable aquatic environments (system regardless of tag orientation. However, burrowed mussels may require multiple passes to increase detection that would be influenced by depth, tag orientation, and tag size. Construction of the boat-mounted antenna was relatively low in cost (traditional mussel sampling techniques (diving, snorkeling) in nonwadeable habitats.

  9. Research and design on system of asset management based on RFID

    Science.gov (United States)

    Guan, Peng; Du, HuaiChang; Jing, Hua; Zhang, MengYue; Zhang, Meng; Xu, GuiXian

    2011-10-01

    By analyzing the problems in the current assets management, this thesis proposing RFID technology will be applied to asset management in order to improve the management level of automation and information. This paper designed the equipment identification based on 433MHz RFID tag and reader which was deeply studied on the basis of RFID tag and card reader circuits, and this paper also illustrates the system of asset management. The RS232 converts Ethernet is a innovative technology to transfer data to PC monitor software, and implement system of asset management based on WEB techniques (PHP and MySQL).

  10. A secure RFID mutual authentication protocol for healthcare environments using elliptic curve cryptography.

    Science.gov (United States)

    Jin, Chunhua; Xu, Chunxiang; Zhang, Xiaojun; Zhao, Jining

    2015-03-01

    Radio Frequency Identification(RFID) is an automatic identification technology, which can be widely used in healthcare environments to locate and track staff, equipment and patients. However, potential security and privacy problems in RFID system remain a challenge. In this paper, we design a mutual authentication protocol for RFID based on elliptic curve cryptography(ECC). We use pre-computing method within tag's communication, so that our protocol can get better efficiency. In terms of security, our protocol can achieve confidentiality, unforgeability, mutual authentication, tag's anonymity, availability and forward security. Our protocol also can overcome the weakness in the existing protocols. Therefore, our protocol is suitable for healthcare environments.

  11. Efficient DFSA Algorithm in RFID Systems for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Hsing-Wen Wang

    2015-01-01

    Full Text Available Radio Frequency IDentification (RFID used in business applications and international business management fields can create and sustain the competitive advantage, which is also one of the wireless telecommunication techniques for recognizing objects to realize Internet of Things (IoT technologies. In construction of IoT network, the RFID technologies play the role of the front-end data collection via tag identification, as the basis of IoT. Hence, the adoption of RFID technologies is spurring innovation and the development of the IoT. However, in RFID system, one of the most important challenges is the collision resolution between the tags when these tags transmit their data to the reader simultaneously. Hence, in this paper I develop an efficient scheme to estimate the number of unidentified tags for Dynamic Framed Slotted Aloha (DFSA based RFID system, with the view of increasing system performance. In addition to theoretical analysis, simulations are conducted to evaluate the performance of proposed scheme. The simulation results reveal the proposed scheme works very well in providing a substantial performance improvement in RFID system. The proposed algorithm promotes business effectiveness and efficiency while applying the RFID technologies to IoT.

  12. An Effective Scheduling-Based RFID Reader Collision Avoidance Model and Its Resource Allocation via Artificial Immune Network

    OpenAIRE

    Wang, Shanjin; Li, Zhonghua; He, Chunhui; Li, Jianming

    2016-01-01

    Radio frequency identification, that is, RFID, is one of important technologies in Internet of Things. Reader collision does impair the tag identification efficiency of an RFID system. Many developed methods, for example, the scheduling-based series, that are used to avoid RFID reader collision, have been developed. For scheduling-based methods, communication resources, that is, time slots, channels, and power, are optimally assigned to readers. In this case, reader collision avoidance is equ...

  13. Teaching RFID Information Systems Security

    Science.gov (United States)

    Thompson, Dale R.; Di, Jia; Daugherty, Michael K.

    2014-01-01

    The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…

  14. RFID Malware: Truth vs. Myth

    NARCIS (Netherlands)

    Rieback, M.R.; Crispo, B.; Tanenbaum, A.S.

    The issues related to RFID malware along with proof-of-concept RFID virus are discussed. RFID exploits are traditionally hacking attacks that are identical to those found on Internet, such as buffer overflow, code insertion, and SQL injection attack. RFID warms copy the original exploit code to

  15. Reverse engineering of RFID devices

    NARCIS (Netherlands)

    Bokslag, W.

    2015-01-01

    This paper discusses the relevance and potential impact of both RFID and reverse engineering of RFID technology, followed by a discussion of common protocols and internals of RFID technology. The focus of the paper is on providing an overview of the different approaches to reverse engineering RFID

  16. Analisis dan Perancangan Aplikasi Inventori Berbasiskan Rfid Pada PT. ABC

    Directory of Open Access Journals (Sweden)

    Herwin Herwin

    2010-12-01

    Full Text Available The purpose of this research is to reduce the damaged material, applying the concept of FIFO for retrieval of row materials, and accelerate the search and also to simplify the detection of raw materials. Software development method used involves three main parts namely the method of analysis, design and literature. Analysis methods including survey of the running system, an analysis of survey findings, identify information needs, identify system requirenments. The design method approach to Unified Modelling Language (UML. The results is an inventory application that uses Radio Frequency Identification (RFID tags as a replacement label where RFID tags can store data. Conslusions from this research is minimizing the company’s financial losses due to storage of raw materials and minimizing time to search raw materials using RFID that also can provide actual and accurate information for the company. 

  17. RFID Location Algorithm

    Directory of Open Access Journals (Sweden)

    Wang Zi Min

    2016-01-01

    Full Text Available With the development of social services, people’s living standards improve further requirements, there is an urgent need for a way to adapt to the complex situation of the new positioning technology. In recent years, RFID technology have a wide range of applications in all aspects of life and production, such as logistics tracking, car alarm, security and other items. The use of RFID technology to locate, it is a new direction in the eyes of the various research institutions and scholars. RFID positioning technology system stability, the error is small and low-cost advantages of its location algorithm is the focus of this study.This article analyzes the layers of RFID technology targeting methods and algorithms. First, RFID common several basic methods are introduced; Secondly, higher accuracy to political network location method; Finally, LANDMARC algorithm will be described. Through this it can be seen that advanced and efficient algorithms play an important role in increasing RFID positioning accuracy aspects.Finally, the algorithm of RFID location technology are summarized, pointing out the deficiencies in the algorithm, and put forward a follow-up study of the requirements, the vision of a better future RFID positioning technology.

  18. UTag: Long-range Ultra-wideband Passive Radio Frequency Tags

    Energy Technology Data Exchange (ETDEWEB)

    Dowla, F

    2007-03-14

    Long-range, ultra-wideband (UWB), passive radio frequency (RF) tags are key components in Radio Frequency IDentification (RFID) system that will revolutionize inventory control and tracking applications. Unlike conventional, battery-operated (active) RFID tags, LLNL's small UWB tags, called 'UTag', operate at long range (up to 20 meters) in harsh, cluttered environments. Because they are battery-less (that is, passive), they have practically infinite lifetimes without human intervention, and they are lower in cost to manufacture and maintain than active RFID tags. These robust, energy-efficient passive tags are remotely powered by UWB radio signals, which are much more difficult to detect, intercept, and jam than conventional narrowband frequencies. The features of long range, battery-less, and low cost give UTag significant advantage over other existing RFID tags.

  19. A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function.

    Science.gov (United States)

    Xu, He; Ding, Jie; Li, Peng; Zhu, Feng; Wang, Ruchuan

    2018-03-02

    With the fast development of the Internet of Things, Radio Frequency Identification (RFID) has been widely applied into many areas. Nevertheless, security problems of the RFID technology are also gradually exposed, when it provides life convenience. In particular, the appearance of a large number of fake and counterfeit goods has caused massive loss for both producers and customers, for which the clone tag is a serious security threat. If attackers acquire the complete information of a tag, they can then obtain the unique identifier of the tag by some technological means. In general, because there is no extra identifier of a tag, it is difficult to distinguish an original tag and its clone one. Once the legal tag data is obtained, attackers can be able to clone this tag. Therefore, this paper shows an efficient RFID mutual verification protocol. This protocol is based on the Physical Unclonable Function (PUF) and the lightweight cryptography to achieve efficient verification of a single tag. The protocol includes three process: tag recognition, mutual verification and update. The tag recognition is that the reader recognizes the tag; mutual verification is that the reader and tag mutually verify the authenticity of each other; update is supposed to maintain the latest secret key for the following verification. Analysis results show that this protocol has a good balance between performance and security.

  20. Inferring spatial and temporal behavioral patterns of free-ranging manatees using saltwater sensors of telemetry tags

    Science.gov (United States)

    Castelblanco-Martínez, Delma Nataly; Morales-Vela, Benjamin; Slone, Daniel H.; Padilla-Saldívar, Janneth Adriana; Reid, James P.; Hernández-Arana, Héctor Abuid

    2015-01-01

    Diving or respiratory behavior in aquatic mammals can be used as an indicator of physiological activity and consequently, to infer behavioral patterns. Five Antillean manatees, Trichechus manatus manatus, were captured in Chetumal Bay and tagged with GPS tracking devices. The radios were equipped with a micropower saltwater sensor (SWS), which records the times when the tag assembly was submerged. The information was analyzed to establish individual fine-scale behaviors. For each fix, we established the following variables: distance (D), sampling interval (T), movement rate (D/T), number of dives (N), and total diving duration (TDD). We used logic criteria and simple scatterplots to distinguish between behavioral categories: ‘Travelling’ (D/T ≥ 3 km/h), ‘Surface’ (↓TDD, ↓N), ‘Bottom feeding’ (↑TDD, ↑N) and ‘Bottom resting’ (↑TDD, ↓N). Habitat categories were qualitatively assigned: Lagoon, Channels, Caye shore, City shore, Channel edge, and Open areas. The instrumented individuals displayed a daily rhythm of bottom activities, with surfacing activities more frequent during the night and early in the morning. More investigation into those cycles and other individual fine-scale behaviors related to their proximity to concentrations of human activity would be informative

  1. Efficient Method of Achieving Agreements between Individuals and Organizations about RFID Privacy

    Science.gov (United States)

    Cha, Shi-Cho

    This work presents novel technical and legal approaches that address privacy concerns for personal data in RFID systems. In recent years, to minimize the conflict between convenience and the privacy risk of RFID systems, organizations have been requested to disclose their policies regarding RFID activities, obtain customer consent, and adopt appropriate mechanisms to enforce these policies. However, current research on RFID typically focuses on enforcement mechanisms to protect personal data stored in RFID tags and prevent organizations from tracking user activity through information emitted by specific RFID tags. A missing piece is how organizations can obtain customers' consent efficiently and flexibly. This study recommends that organizations obtain licenses automatically or semi-automatically before collecting personal data via RFID technologies rather than deal with written consents. Such digitalized and standard licenses can be checked automatically to ensure that collection and use of personal data is based on user consent. While individuals can easily control who has licenses and license content, the proposed framework provides an efficient and flexible way to overcome the deficiencies in current privacy protection technologies for RFID systems.

  2. Implementation of Asset Management System Based on Wireless Sensor Technology

    Directory of Open Access Journals (Sweden)

    Nan WANG

    2014-02-01

    Full Text Available RFID technology is regarded as one of the top ten key technologies in the 21st century, which has extensive application prospect in various fields, including asset management, public safety and so on. Through analyzing the current problems existing in asset management, this paper proposes to apply RFID technology in device management to effectively improve the level of automation and informatization of device management, and designs the scheme of equipment monitoring system based on 433 MHz RFID electronic tag and reader. The hardware part of monitoring system consists of the RFID sensor terminals attached in the device and the readers distributed in each monitoring site. The reader uploads the information collected by tag to the backend server and the management system, so as to allow managers and decision makers to understand the usage rate and location of the experimental instruments and to provide managers with a scientific basis for decision making, which effectively solves the relatively backward status quo of current device management level.

  3. RFID Malware: Design Principles and Examples

    NARCIS (Netherlands)

    Rieback, M.R.; Simpson, P.N.D.; Crispo, B.; Tanenbaum, A.S.

    2006-01-01

    This paper explores the concept of malware for Radio Frequency Identification (RFID) systems - including RFID exploits, RFID worms, and RFID viruses. We present RFID malware design principles together with concrete examples; the highlight is a fully illustrated example of a self-replicating RFID

  4. An Advanced Encryption Standard Powered Mutual Authentication Protocol Based on Elliptic Curve Cryptography for RFID, Proven on WISP

    Directory of Open Access Journals (Sweden)

    Alaauldin Ibrahim

    2017-01-01

    Full Text Available Information in patients’ medical histories is subject to various security and privacy concerns. Meanwhile, any modification or error in a patient’s medical data may cause serious or even fatal harm. To protect and transfer this valuable and sensitive information in a secure manner, radio-frequency identification (RFID technology has been widely adopted in healthcare systems and is being deployed in many hospitals. In this paper, we propose a mutual authentication protocol for RFID tags based on elliptic curve cryptography and advanced encryption standard. Unlike existing authentication protocols, which only send the tag ID securely, the proposed protocol could also send the valuable data stored in the tag in an encrypted pattern. The proposed protocol is not simply a theoretical construct; it has been coded and tested on an experimental RFID tag. The proposed scheme achieves mutual authentication in just two steps and satisfies all the essential security requirements of RFID-based healthcare systems.

  5. Wireless sensors and sensor networks for homeland security applications.

    Science.gov (United States)

    Potyrailo, Radislav A; Nagraj, Nandini; Surman, Cheryl; Boudries, Hacene; Lai, Hanh; Slocik, Joseph M; Kelley-Loughnane, Nancy; Naik, Rajesh R

    2012-11-01

    New sensor technologies for homeland security applications must meet the key requirements of sensitivity to detect agents below risk levels, selectivity to provide minimal false-alarm rates, and response speed to operate in high throughput environments, such as airports, sea ports, and other public places. Chemical detection using existing sensor systems is facing a major challenge of selectivity. In this review, we provide a brief summary of chemical threats of homeland security importance; focus in detail on modern concepts in chemical sensing; examine the origins of the most significant unmet needs in existing chemical sensors; and, analyze opportunities, specific requirements, and challenges for wireless chemical sensors and wireless sensor networks (WSNs). We further review a new approach for selective chemical sensing that involves the combination of a sensing material that has different response mechanisms to different species of interest, with a transducer that has a multi-variable signal-transduction ability. This new selective chemical-sensing approach was realized using an attractive ubiquitous platform of battery-free passive radio-frequency identification (RFID) tags adapted for chemical sensing. We illustrate the performance of RFID sensors developed in measurements of toxic industrial materials, humidity-independent detection of toxic vapors, and detection of chemical-agent simulants, explosives, and strong oxidizers.

  6. RFID - based Staff Control System (SCS) in Kazakhstan

    International Nuclear Information System (INIS)

    Saparkhojayev, N

    2015-01-01

    RFID - based Staff Control System (SCS) will allow complete hands-free access control, monitoring the whereabouts of employee and record the attendance of the employee as well. Moreover, with a help of this system, it is possible to have a nice report at the end of the month and based on the total number of worked hours, the salary will be allocated to each personnel. The access tag can be read up to 10 centimeters from the RFID reader. The proposed system is based on UHF RFID readers, supported with antennas at gate and transaction sections, and employee identification cards containing RFID-transponders which are able to electronically store information that can be read / written even without the physical contact with the help of radio medium. This system is an innovative system, which describes the benefits of applying RFID- technology in the Education System process of Republic of Kazakhstan. This paper presents the experiments conducted to set up RFID based SCS. (paper)

  7. Providing strong Security and high privacy in low-cost RFID networks

    DEFF Research Database (Denmark)

    David, Mathieu; Prasad, Neeli R.

    2009-01-01

    Since the dissemination of Radio Frequency IDentification (RFID) tags is getting larger and larger, the requirement for strong security and privacy is also increasing. Low-cost and ultra-low-cost tags are being implemented on everyday products, and their limited resources constraints the security...

  8. RFID-over-Fiber system for agricultural exploitations - Wireless track and trace with range extension using optical fiber

    DEFF Research Database (Denmark)

    Madsen, Peter; Suhr, Lau Frejstrup; Cavalcante, Lucas Costa Pereira

    2015-01-01

    This paper proposes and demonstrates an RFIDover-Fiber wireless track and trace system using active RFID tags and operating over distances up to 30 km of optical fiber and 35 meters of wireless readability......This paper proposes and demonstrates an RFIDover-Fiber wireless track and trace system using active RFID tags and operating over distances up to 30 km of optical fiber and 35 meters of wireless readability...

  9. An Energy and Application Scenario Aware Active RFID Protocol

    Directory of Open Access Journals (Sweden)

    Nilsson Björn

    2010-01-01

    Full Text Available The communication protocol used is a key issue in order to make the most of the advantages of active RFID technologies. In this paper we introduce a carrier sense medium access data communication protocol that dynamically adjusts its back-off algorithm to best suit the actual application at hand. Based on a simulation study of the effect on tag energy cost, read-out delay, and message throughput incurred by some typical back-off algorithms in a CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance active RFID protocol, we conclude that by dynamic tuning of the initial contention window size and back-off interval coefficient, tag energy consumption and read-out delay can be significantly lowered. We show that it is possible to decrease the energy consumption per tag payload delivery with more than 10 times, resulting in a 50% increase in tag battery lifetime. We also discuss the advantage of being able to predict the number of tags present at the RFID-reader as well as ways of doing it.

  10. A RFID grouping proof protocol for medication safety of inpatient.

    Science.gov (United States)

    Huang, Hsieh-Hong; Ku, Cheng-Yuan

    2009-12-01

    In order to provide enhanced medication safety for inpatients, the medical mechanism which adopts the modified grouping proof protocol is proposed in this paper. By using the grouping proof protocol, the medical staffs could confirm the authentication and integrity of a group of Radio-Frequency Identification (RFID) tags which are embedded on inpatient bracelets and the containers of drugs. This mechanism is designed to be compatible with EPCglobal Class-1 Generation-2 standard which is the most popular specification of RFID tags. Due to the light-weight computational capacity of passive tags, only the pseudo-random number generator (PRNG) and cyclic redundancy code (CRC) are allowed to be used in the communication protocol. Furthermore, a practical scenario of using this proposed mechanism in hospital to examine the medication safety is also presented.

  11. Research on Positioning Algorithm of Forklift-mounted RFID Reader

    Directory of Open Access Journals (Sweden)

    Hongjin Wang

    2014-07-01

    Full Text Available To conduct real-time and accurate positioning of the forklifts (people and goods in the warehouse is an effective means for improving warehouse management efficiency. To this end, this article puts forward the active positioning system with the forklift installed with RFID reader and the ground passageway embedded with RFID tag. In the running process, the position of forklift can be determined through recognition of the reference tags which are embedded at both sides of the passageway based on the three-side layout at right angle principle and their RSSI value. The positional accuracy can be improved by adjusting the layout distance of those reference tags. The experimental results show that this system can realize the positioning function of forklift, and it can be used in practical situations.

  12. Research on pipe welding information management system basedon RFID

    Directory of Open Access Journals (Sweden)

    Liu Xun

    2016-01-01

    Full Text Available This paper introduces the construction background, construction target and construction principle of the pipe welding management system based on RFID. Then, describes the specific requirements of the system. The basic principle and key technology of the system are introduced. The structure of the system (including the system design, the selections of handheld devices and high frequency passive RFID tags is described .Then the system management software designs (including software structure, the main functions of the management center system and the main functions of the handheld detection system are described in detail. Finally, the management system is implemented, and it is deployed to several Gas Co, which has chieved good results.

  13. Optimization of the Document Placement in the RFID Cabinet

    Directory of Open Access Journals (Sweden)

    Kiedrowicz Maciej

    2016-01-01

    Full Text Available The study is devoted to the issue of optimization of the document placement in a single RFID cabinet. It has been assumed that the optimization problem means the reduction of archivization time with respect to the information on all documents with RFID tags. Since the explicit form of the criterion function remains unknown, for the purpose of its approximation, the regression analysis method has been used. The method uses data from a computer simulation of the process of archiving data about documents. To solve the optimization problem, the modified gradient projection method has been used.

  14. Cluster-Based Multipolling Sequencing Algorithm for Collecting RFID Data in Wireless LANs

    Science.gov (United States)

    Choi, Woo-Yong; Chatterjee, Mainak

    2015-03-01

    With the growing use of RFID (Radio Frequency Identification), it is becoming important to devise ways to read RFID tags in real time. Access points (APs) of IEEE 802.11-based wireless Local Area Networks (LANs) are being integrated with RFID networks that can efficiently collect real-time RFID data. Several schemes, such as multipolling methods based on the dynamic search algorithm and random sequencing, have been proposed. However, as the number of RFID readers associated with an AP increases, it becomes difficult for the dynamic search algorithm to derive the multipolling sequence in real time. Though multipolling methods can eliminate the polling overhead, we still need to enhance the performance of the multipolling methods based on random sequencing. To that extent, we propose a real-time cluster-based multipolling sequencing algorithm that drastically eliminates more than 90% of the polling overhead, particularly so when the dynamic search algorithm fails to derive the multipolling sequence in real time.

  15. RFID-Based Monitoring And Access Control System For Parliamentary Campus

    Directory of Open Access Journals (Sweden)

    Sai Thu Rein Htun

    2015-08-01

    Full Text Available This paper is to implement monitoring and access control system based on RFID and Zigbee technology which can be used at Parliamentary Campus. Nowadays RFID technology is widely used for access control system because it is cheap waterproof and easy to use as well as it contains unique EPC electronic protect code .In addition Zigbee wireless module is cost-effective and can be reliable for security. Sothis system consists of RFID tag RFID reader Arduino Uno and Zigbee. This system can also be used for industrial amp commercial and security HVAC closures. This paper describes the results of point-to-point connection and point-to-multipoint connection using Zigbee and RFID technology.

  16. The Evolution of RFID Security

    NARCIS (Netherlands)

    Rieback, M.R.; Crispo, B.; Tanenbaum, A.S.

    The advantages and drawbacks associated with the use of RFID technology, are discussed. The RFID functions as a medium for numerous tasks including managing supply chains, tracking livestock, preventing counterfeiting, controlling building access, supporting automated checkout, developing smart home

  17. Controlled Delegation Protocol in Mobile RFID Networks

    Directory of Open Access Journals (Sweden)

    Yang MingHour

    2010-01-01

    Full Text Available To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is to say, reader-tag mutual authentication can be performed without readers being connected to back-end server. Readers are also allowed off-line access to tags' data. Compared with other delegation protocols, our scheme uniquely enables back-end server to limit each reader's reading times during delegation. Even in a multireader situation, our protocol can limit reading times and reading time periods for each of them and therefore makes back-end server's delegation more flexible. Besides, our protocol can prevent authorized readers from transferring their authority to the unauthorized, declining invalid access to tags. Our scheme is proved viable and secure with GNY logic; it is against certain security threats, such as replay attacks, denial of service (DoS attacks, Man-in-the-Middle attacks, counterfeit tags, and breaches of location and data privacy. Also, the performance analysis of our protocol proves that current tags can afford the computation load required in this scheme.

  18. Low-cost RFID-based palm oil monitoring system (PMS): First prototype

    International Nuclear Information System (INIS)

    Kiama, J W; Patrick, T H H; Raman, V

    2014-01-01

    Under collaboration with our local oil palm plantation enterprise, our research focuses on producing proof-of-concept by using RFID technology to monitor palm oil productivity. Passive RFID tags are used in the plantation field to uniquely identify each palm oil tree and their Fresh Fruit Bunches (FFB) production is collected and monitored by scanning the passive RFID tags using high frequency RFID scanners. This technology aims to convert the harvest data into digital information which can be processed and analyzed by PMS system and presented as informative outputs such as dynamic charts. This analyzed information is further used as input to a proprietary GIS system where it is mapped as color-coded spatial data which enables an accurate evaluation and monitoring of the overall plantation productivity

  19. Low Access Delay Anti-Collision Algorithm for Reader in RFID systems

    DEFF Research Database (Denmark)

    Galiotto, Carlo; Marchetti, Nicola; Prasad, Neeli R.

    2010-01-01

    Radio Frequency Identification (RFID) is a technology which is spreading more and more as a medium to identify, locate and track assets through the productive chain. As all the wireless communication devices sharing the same transmission channel, RFID readers and tags experience collisions whenever...... deployed over the same area. In this work, the RFID reader collision problem is studied and a centralized scheduling-based algorithm is proposed as possible candidate solution, especially for those scenarios involving static or low mobility readers. Taking into account the circuitry limitations of the tags......, which do not allow to use frequency or code division multiple access schemes in the RFID systems, this paper proposes an algorithm aiming to prevent the readers collisions, while keeping the access delay of the readers to the channel possibly low. The simulation results show that this algorithm performs...

  20. An Innovative RFID-Based Solution to Secure Parking Spots for Physically Challenged

    Directory of Open Access Journals (Sweden)

    Sami Miniaoui

    2016-05-01

    Full Text Available Using RFID Technology is increasingly integrated in our daily life. We are presenting in this paper the secured parking spots for physically challenged -SPSPC- system implementing the RFID technology for managing parking slots of physically challenged. We demonstrated using scenarios (car with tag, car with expired date tag, car without tag that the -SPSPC- system is able to recognize not only cars equipped with tag -then send accordingly welcoming SMS -but also cars without tags by checking with a step tag fixed in the wall. Operational mode of the -SPSPC- system is illustrated as well as main components, methods, snippets of code and interfaces are presented and commented. In addition, we demonstrated how the -SPSPC- system is providing the tracking of people committing repetitively these violations -by reporting them to the authorities- and generating statistics on parking occupancy rates helping in providing sufficient slots.

  1. Survey of RFID and Its Application to International Ocean/Air Container Tracking

    Science.gov (United States)

    Katayama, Minoru; Nakada, Hiroshi; Hayashi, Hitoshi; Shimizu, Masashi

    “Internet of Things” (IoT) requires information to be collected from “anything”, “anytime”, and “anywhere”. In order to achieve this, wireless devices are required that have (1) automatic data acquisition capability, (2) small size, (3) long life, and (4) long range communication capability. One way to meet these requirements is to adopt active Radio Frequency Identification (RFID) systems. Active RFID is more advantageous than passive RFID and enables higher data reading performance over longer distances. This paper surveys active RFID systems, the services they currently promise to provide, technical problems common to these services, and the direction in which research should head in the future. It also reports the results of EPCglobal (EPC: Electronic Product Code) pilot tests conducted on global logistics for tracking ocean/air container transportation using active RFID systems for which we developed several new types of active RFID tags. The test results confirm that our active RFID tags have sufficient capability and low power consumption to well support ocean/air transportation and logistics service.

  2. Security enhancement mechanism based on contextual authentication and role analysis for 2G-RFID systems.

    Science.gov (United States)

    Tang, Wan; Chen, Min; Ni, Jin; Yang, Ximin

    2011-01-01

    The traditional Radio Frequency Identification (RFID) system, in which the information maintained in tags is passive and static, has no intelligent decision-making ability to suit application and environment dynamics. The Second-Generation RFID (2G-RFID) system, referred as 2G-RFID-sys, is an evolution of the traditional RFID system to ensure better quality of service in future networks. Due to the openness of the active mobile codes in the 2G-RFID system, the realization of conveying intelligence brings a critical issue: how can we make sure the backend system will interpret and execute mobile codes in the right way without misuse so as to avoid malicious attacks? To address this issue, this paper expands the concept of Role-Based Access Control (RBAC) by introducing context-aware computing, and then designs a secure middleware for backend systems, named Two-Level Security Enhancement Mechanism or 2L-SEM, in order to ensure the usability and validity of the mobile code through contextual authentication and role analysis. According to the given contextual restrictions, 2L-SEM can filtrate the illegal and invalid mobile codes contained in tags. Finally, a reference architecture and its typical application are given to illustrate the implementation of 2L-SEM in a 2G-RFID system, along with the simulation results to evaluate how the proposed mechanism can guarantee secure execution of mobile codes for the system.

  3. Security Enhancement Mechanism Based on Contextual Authentication and Role Analysis for 2G-RFID Systems

    Directory of Open Access Journals (Sweden)

    Ximin Yang

    2011-06-01

    Full Text Available The traditional Radio Frequency Identification (RFID system, in which the information maintained in tags is passive and static, has no intelligent decision-making ability to suit application and environment dynamics. The Second-Generation RFID (2G-RFID system, referred as 2G-RFID-sys, is an evolution of the traditional RFID system to ensure better quality of service in future networks. Due to the openness of the active mobile codes in the 2G-RFID system, the realization of conveying intelligence brings a critical issue: how can we make sure the backend system will interpret and execute mobile codes in the right way without misuse so as to avoid malicious attacks? To address this issue, this paper expands the concept of Role-Based Access Control (RBAC by introducing context-aware computing, and then designs a secure middleware for backend systems, named Two-Level Security Enhancement Mechanism or 2L-SEM, in order to ensure the usability and validity of the mobile code through contextual authentication and role analysis. According to the given contextual restrictions, 2L-SEM can filtrate the illegal and invalid mobile codes contained in tags. Finally, a reference architecture and its typical application are given to illustrate the implementation of 2L-SEM in a 2G-RFID system, along with the simulation results to evaluate how the proposed mechanism can guarantee secure execution of mobile codes for the system.

  4. Miniaturized Blood Pressure Telemetry System with RFID Interface

    Directory of Open Access Journals (Sweden)

    Michele Caldara

    2016-08-01

    Full Text Available This work deals with the development and characterization of a potentially implantable blood pressure telemetry system, based on an active Radio-Frequency IDentification (RFID tag, International Organization for Standardization (ISO 15693 compliant. This approach aims to continuously measure the average, systolic and diastolic blood pressure of the small/medium animals. The measured pressure wave undergoes embedded processing and results are stored onboard in a non-volatile memory, providing the data under interrogation by an external RFID reader. In order to extend battery lifetime, RFID energy harvesting has been investigated. The paper presents the experimental characterization in a laboratory and preliminary in-vivo tests. The device is a prototype mainly intended, in a future engineered version, for monitoring freely moving test animals for pharmaceutical research and drug safety assessment purposes, but it could have multiple uses in environmental and industrial applications.

  5. A transportation security system applying RFID and GPS

    Directory of Open Access Journals (Sweden)

    Ruijian Zhang

    2013-03-01

    Full Text Available Purpose: This paper is about developing a centralized, internet based security tool which utilizes RFID and GPS technology to identify drivers and track the load integrity. Design/methodology/approach: The system will accomplish the security testing in real-time using the internet and the U.S. Customs’ database (ACE. A central database and the interfaces and communication between the database and ACE will be established. After the vehicle is loaded, all openings of the tanker are sealed with disposable RFID tag seals. Findings/value: An RFID reader and GPS tracker wirelessly connected with the databases will serve as testing grounds for the implementation of security measures that can help prevent future terrorist attacks and help in ensuring that the goods and products are not compromised while in transit. The system will also reduce the labor work of security check to its minimum. 

  6. Access Control with RFID in the Internet of Things

    DEFF Research Database (Denmark)

    Jensen, Steffen Elstrøm Holst; Jacobsen, Rune Hylsberg

    2013-01-01

    , to the Internet is suggested. The solution uses virtual representations of objects by using low-cost, passive RFID tags to give objects identities on the Internet. A prototype that maps an RFID identity into an IPv6 address is constructed. It is illustrated how this approach can be used in access control systems......Future Internet research is needed to bring the Internet and the Things closer to each other to form the Internet of Things. As objects in our daily life gradually become smarter, there is an increasing benefit of networking these objects. In this article, a method to couple objects, the Things...... based on open network protocols and packet filtering. The solution includes a novel RFID reader architecture that supports the internetworking of components of a future access control system based on network layer technology....

  7. An Authentication Protocol for Mobile IPTV Users Based on an RFID-USB Convergence Technique

    Science.gov (United States)

    Jeong, Yoon-Su; Kim, Yong-Tae

    With the growing trend towards convergence in broadcast and communications media, Internet Protocol television (IPTV) that delivers real-time multimedia content over diverse types of communications networks (e.g., broadband Internet, cable TV, and satellite TV) has become a mainstream technology. Authenticating mobile IPTV subscribers who are continuously on the move is a challenge. A complex authentication process often impairs conditional access security or service quality as increasing illegal users and delaying service. This paper proposes an RFID-USB authentication protocol, for mobile IPTV users, combined with USIM-based personalized authentication and lightweight authentication that utilizes the RFID-USB technology with an implanted agent module (called an "agent tag") which temporarily enhanced user status information. The proposed authentication protocol adopts a plug-and-play security agent module that is placed in both an RFID tag and an RFID-USB. The implanted security agents cooperate in such a way that multiple RFID tags are connected seamlessly to an RFID-USB.

  8. Motion direction estimation based on active RFID with changing environment

    Science.gov (United States)

    Jie, Wu; Minghua, Zhu; Wei, He

    2018-05-01

    The gate system is used to estimate the direction of RFID tags carriers when they are going through the gate. Normally, it is difficult to achieve and keep a high accuracy in estimating motion direction of RFID tags because the received signal strength of tag changes sharply according to the changing electromagnetic environment. In this paper, a method of motion direction estimation for RFID tags is presented. To improve estimation accuracy, the machine leaning algorithm is used to get the fitting function of the received data by readers which are deployed inside and outside gate respectively. Then the fitted data are sampled to get the standard vector. We compare the stand vector with template vectors to get the motion direction estimation result. Then the corresponding template vector is updated according to the surrounding environment. We conducted the simulation and implement of the proposed method and the result shows that the proposed method in this work can improve and keep a high accuracy under the condition of the constantly changing environment.

  9. A study on RFID adoption for vehicle tracking in container terminal

    Directory of Open Access Journals (Sweden)

    S.L. Ting

    2012-06-01

    Full Text Available Purpose: Numerous studies discuss that Radio Frequency Identification (RFID technology can provide better container handling efficiency; however, relative lack of research concerns the tracking and monitoring the movement of vehicle in the container terminal environment. Thus, this study aims at discussing the feasibility of applying RFID for vehicle tracking purpose in a container terminal. Design/methodology/approach: This study makes use of a series of experiments in a container terminal to discuss the factors that affect the use of RFID in the terminal. The possibility and accuracy of using RFID in such challenging environment is also investigated. These propositions are investigated by a case study. Findings: The experimental results indicate that the RFID communication is good at the containers area which occupies nearly all the area in the container terminal. However, in other area such as sea side and free area, the performance is not good and 100% readability only achieved in 5m and 10m in free area and sea side respectively. Originality/value: The container terminal environment, which consists of different transport vehicles for onward transportation, will affect the performance of RFID readability. Poor setup of the RFID reader and tag will lower the feasibility of RFID adoption as well as increase the cost. In order to address the challenges of implementing RFID in the container terminal environment, this paper provides a series of real site testing experiments to study the RFID performance in the container terminal environment. This represents an original contribution of value to future research and practice in the RFID adoptions in container terminal environment.

  10. RFID design fundamentals and applications

    CERN Document Server

    Lozano-Nieto, Albert

    2010-01-01

    RFID is an increasingly pervasive tool that is now used in a wide range of fields. It is employed to substantiate adherence to food preservation and safety standards, combat the circulation of counterfeit pharmaceuticals, and verify authenticity and history of critical parts used in aircraft and other machinery-and these are just a few of its uses. Goes beyond deployment, focusing on exactly how RFID actually worksRFID Design Fundamentals and Applications systematically explores the fundamental principles involved in the design and characterization of RFID technologies. The RFID market is expl

  11. The emergence of radiofrequency identification tags: applications in surgery.

    Science.gov (United States)

    Schwaitzberg, S D

    2006-08-01

    Radiofrequency identification (RFID) is a wireless method of automatic identification. Currently, RFID tags are emerging into our environment in many aspects of our lives. Applications are being developed in a variety of fields, including health care. Aspects of surgical care will lend themselves to this approach. This technology could provide large amounts of data that not only carry the promise of improving health care, but also may have an impact on personal aspects of our daily lives. Each of us must become familiar with the risks and benefits of RFID use.

  12. ISS Asset Tracking Using SAW RFID Technology

    Science.gov (United States)

    Schellhase, Amy; Powers, Annie

    2004-01-01

    A team at the NASA Johnson Space Center (JSC) is undergoing final preparations to test Surface Acoustic Wave (SAW) Radio Frequency Identification (RFID) technology to track assets aboard the International Space Station (ISS). Currently, almost 10,000 U.S. items onboard the ISS are tracked within a database maintained by both the JSC ground teams and crew onboard the ISS. This barcode-based inventory management system has successfully tracked the location of 97% of the items onboard, but its accuracy is dependant on the crew to report hardware movements, taking valuable time away from science and other activities. With the addition of future modules, the volume of inventory to be tracked is expected to increase significantly. The first test of RFID technology on ISS, which will be conducted by the Expedition 16 crew later this year, will evaluate the ability of RFID technology to track consumable items. These consumables, which include office supplies and clothing, are regularly supplied to ISS and can be tagged on the ground. Automation will eliminate line-of-sight auditing requirements, directly saving crew time. This first step in automating an inventory tracking system will pave the way for future uses of RFID for inventory tracking in space. Not only are there immediate benefits for ISS applications, it is a crucial step to ensure efficient logistics support for future vehicles and exploration missions where resupplies are not readily available. Following a successful initial test, the team plans to execute additional tests for new technology, expanded operations concepts, and increased automation.

  13. RFID added value sensing capabilities

    DEFF Research Database (Denmark)

    Anggorjati, B.; Çetin, K.; Mihovska, A.

    2010-01-01

    Radio frequency identification (RFID) is a key technology for Europe. Since the initial emergence of the technology, there has been a noticeable shift away from RFID pilot projects of the early days, towards a broad deployment of RFID in order to increase the efficiency and innovation of processes....... Even though Europe is a leading player in the world of RFID technology, several challenges need to be addressed in order for RFID to reach its full potential. The funded under FP7 ICT project ASPIRE is one of the coordinated European efforts to further the advancement of this technology, in the areas...... of enabling technology development for RFID. In particular, the focus of ASPIRE is on design, development and adoption of an innovative, programmable, royalty-free, lightweight and privacy friendly RFID middleware....

  14. Location Privacy in RFID Applications

    Science.gov (United States)

    Sadeghi, Ahmad-Reza; Visconti, Ivan; Wachsmann, Christian

    RFID-enabled systems allow fully automatic wireless identification of objects and are rapidly becoming a pervasive technology with various applications. However, despite their benefits, RFID-based systems also pose challenging risks, in particular concerning user privacy. Indeed, improvident use of RFID can disclose sensitive information about users and their locations allowing detailed user profiles. Hence, it is crucial to identify and to enforce appropriate security and privacy requirements of RFID applications (that are also compliant to legislation). This chapter first discusses security and privacy requirements for RFID-enabled systems, focusing in particular on location privacy issues. Then it explores the advances in RFID applications, stressing the security and privacy shortcomings of existing proposals. Finally, it presents new promising directions for privacy-preserving RFID systems, where as a case study we focus electronic tickets (e-tickets) for public transportation.

  15. VSMURF: A Novel Sliding Window Cleaning Algorithm for RFID Networks

    Directory of Open Access Journals (Sweden)

    He Xu

    2017-01-01

    Full Text Available Radio Frequency Identification (RFID is one of the key technologies of the Internet of Things (IoT and is used in many areas, such as mobile payments, public transportation, smart lock, and environment protection. However, the performance of RFID equipment can be easily affected by the surrounding environment, such as electronic productions and metal appliances. These can impose an impact on the RF signal, which makes the collection of RFID data unreliable. Usually, the unreliability of RFID source data includes three aspects: false negatives, false positives, and dirty data. False negatives are the key problem, as the probability of false positives and dirty data occurrence is relatively small. This paper proposes a novel sliding window cleaning algorithm called VSMURF, which is based on the traditional SMURF algorithm which combines the dynamic change of tags and the value analysis of confidence. Experimental results show that VSMURF algorithm performs better in most conditions and when the tag’s speed is low or high. In particular, if the velocity parameter is set to 2 m/epoch, our proposed VSMURF algorithm performs better than SMURF. The results also show that VSMURF algorithm has better performance than other algorithms in solving the problem of false negatives for RFID networks.

  16. A new platform for RFID research in Vietnam

    International Nuclear Information System (INIS)

    Tran, Ai Nhan; Nguyen, Son Dat; Thai Pham, Duc Hoang; Nguyen, Thuat Tran; Dang, Chien Mau; Fribourg-Blanc, Eric

    2010-01-01

    Radio-Frequency IDentification (RFID) is a technology that has been emerging for less than a decade as the primary choice to exchange information between objects and their environment. Most of the challenges arise due to the passive nature of the tags placed on objects. The absence of a local power source implies that power management is critical for efficient work of the data exchange link. This paper presents the platform under development at the Laboratory for Nanotechnology to study these challenges. The primary goal of the platform is to implement the complete chain from design and simulation of tags to antenna measurements and field tests of tags through fabrication of real tags on flexible substrates. This structure allows for fundamental and practical studies of new concepts in sensing and wireless networks based on passive tags. A description of the actual achievements is also included

  17. Multiresonator-Based Chipless RFID Barcode of the Future

    CERN Document Server

    Preradovic, Stevan

    2012-01-01

    This vital new resource offers engineers and researchers a window on important new technology that will supersede the barcode and is destined to change the face of logistics and product data handling. In the last two decades, radio-frequency identification has grown fast, with accelerated take-up of RFID into the mainstream through its adoption by key users such as Wal-Mart, K-Mart and the US Department of Defense. RFID has many potential applications due to its flexibility, capability to operate out of line of sight, and its high data-carrying capacity. Yet despite optimistic projections of a market worth $25 billion by 2018, potential users are concerned about costs and investment returns. Clearly demonstrating the need for a fully printable chipless RFID tag as well as a powerful and efficient reader to assimilate the tag’s data, this book moves on to describe both. Introducing the general concepts in the field including technical data, it then describes how a chipless RFID tag can be made using a planar...

  18. A Lightweight RFID Grouping-Proof Protocol Based on Parallel Mode and DHCP Mechanism

    Directory of Open Access Journals (Sweden)

    Zhicai Shi

    2017-07-01

    Full Text Available A Radio Frequency Identification (RFID grouping-proof protocol is to generate an evidence of the simultaneous existence of a group of tags and it has been applied to many different fields. For current grouping-proof protocols, there still exist some flaws such as low grouping-proof efficiency, being vulnerable to trace attack and information leakage. To improve the secure performance and efficiency, we propose a lightweight RFID grouping-proof protocol based on parallel mode and DHCP (Dynamic Host Configuration Protocol mechanism. Our protocol involves multiple readers and multiple tag groups. During the grouping-proof period, one reader and one tag group are chosen by the verifier by means of DHCP mechanism. When only a part of the tags of the chosen group exist, the protocol can also give the evidence of their co-existence. Our protocol utilizes parallel communication mode between reader and tags so as to ensure its grouping-proof efficiency. It only uses Hash function to complete the mutual authentication among verifier, readers and tags. It can preserve the privacy of the RFID system and resist the attacks such as eavesdropping, replay, trace and impersonation. Therefore the protocol is secure, flexible and efficient. It only uses some lightweight operations such as Hash function and a pseudorandom number generator. Therefore it is very suitable to some low-cost RFID systems.

  19. Billfish Tagging

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The SWFSC's constituent-based Billfish Tagging Program began in 1963 and since that time has provided conventional spaghetti type tags and tagging supplies to...

  20. Application to the conservation of RF tags in the radiation environment

    International Nuclear Information System (INIS)

    Teraura, Nobuyuki; Ito, Kunio; Takahashi, Naoki; Sakurai, Kouichi

    2011-01-01

    RF tags that are implemented RFID technology as tag has been used in various fields. Tags have been developed, such as resistance to chemicals and high temperature resistant RF tags are also used in specialized fields. The RF tag apply to the existing nuclear field, had been concerned about the effects of radiation to the RF tags. Now, since the RF tag with a goal to develop radiation-proof, we have examined, such as applying for maintenance of nuclear facilities under radiation environment. We report the results and RF tags to be radiation resistant. (author)

  1. Smartphone-Based Cooperative Indoor Localization with RFID Technology

    Directory of Open Access Journals (Sweden)

    Fernando Seco

    2018-01-01

    Full Text Available In GPS-denied indoor environments, localization and tracking of people can be achieved with a mobile device such as a smartphone by processing the received signal strength (RSS of RF signals emitted from known location beacons (anchor nodes, combined with Pedestrian Dead Reckoning (PDR estimates of the user motion. An enhacement of this localization technique is feasible if the users themselves carry additional RF emitters (mobile nodes, and the cooperative position estimates of a group of persons incorporate the RSS measurements exchanged between users. We propose a centralized cooperative particle filter (PF formulation over the joint state of all users that permits to process RSS measurements from both anchor and mobile emitters, as well as PDR motion estimates and map information (if available to increase the overall positioning accuracy, particularly in regions with low density of anchor nodes. Smartphones are used as a convenient mobile platform for sensor measurements acquisition, low-level processing, and data transmission to a central unit, where cooperative localization processing takes place. The cooperative method is experimentally demonstrated with four users moving in an area of 1600 m 2 , with 7 anchor nodes comprised of active RFID (radio frequency identification tags, and additional mobile tags carried by each user. Due to the limited coverage provided by the anchor beacons, RSS-based individual localization is inaccurate (6.1 m median error, but this improves to 4.9 m median error with the cooperative PF. Further gains are produced if the PDR information is added to the filter: median error of 3.1 m (individual and 2.6 m (cooperative; and if map information is also considered, the results are 1.8 m (individual and 1.6 m (cooperative. Thus, for each version of the particle filter, cooperative localization outperforms individual localization in terms of positioning accuracy.

  2. Tag questions Tag questions

    Directory of Open Access Journals (Sweden)

    David Brazil

    2008-04-01

    Full Text Available The so-called 'tag' structures of English have received a lot of attention in language teaching programmes, attention that is not hard to justify when one considers the problems and anxiety they can occasion for many foreign learners. Most teachers one speaks to seem fairly willing to agree, however, that traditional treatments of the topic leave much to be desired. It happens, also, that, when considered collectively, the tags and some related phenomena have a special heoretical interest. For they constitute a field in which it seems essential to bring together insights that derive from the study of several aspects of linguistic organisation, aspects which in some recent work have been held to need distinctive kinds of descriptive category to handle. Traditional treatments have found it necessary to recognise different syntactic types (e.g. 'same polarity' and 'reversed polarity' tags and ifferent intonational treatments ("falling'and 'rising' tag; while the way the communicative significance of the various permutations is described normally requires reference to the expectations they signal regarding the immediately following behaviour of the other party (in the common phrase, 'What kind of answer they expect'. This last consideration places the matter squarely in the arena of recent work on the analysis of interactive discourse. The so-called 'tag' structures of English have received a lot of attention in language teaching programmes, attention that is not hard to justify when one considers the problems and anxiety they can occasion for many foreign learners. Most teachers one speaks to seem fairly willing to agree, however, that traditional treatments of the topic leave much to be desired. It happens, also, that, when considered collectively, the tags and some related phenomena have a special heoretical interest. For they constitute a field in which it seems essential to bring together insights that derive from the study of several aspects

  3. RFID-Enabled Navigation and Communication Networks for Long-Duration Space Missions, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Virtual EM Inc. proposes a system that employs semi-passive RFID sensors with carbon nanotube inkjet-printed antenna and solar powered mesh-networked beacons. The...

  4. Hogthrob: Towards a Sensor Network Infrastructure for Sow Monitoring (wireless sensor network special day)

    DEFF Research Database (Denmark)

    Bonnet, Philippe; Leopold, Martin; Madsen, K

    2006-01-01

    We aim at developing a next-generation system for sow monitoring. Today, farmers use RFID based solutions with an ear tag on the sows and a reader located inside the feeding station. This does not allow the farmers to locate a sow in a large pen, or to monitor the life cycle of the sow (detect he...... period, detect injury...). Our goal is to explore the design of a sensor network that supports such functionalities and meets the constraints of this industry in terms of price, energy consumption and availability....

  5. Miniaturization design and implementation of magnetic field coupled RFID antenna

    Science.gov (United States)

    Hu, Tiling

    2013-03-01

    The development of internet of things has brought new opportunities and challenges to the application of RFID tags. Moreover, the Miniaturization application trend of tags at present has become the mainstream of development. In this paper, the double-layer design is to reduce the size of HF antenna, and the magnetic null point of magnetic reconnection region between the RLC resonant circuit and the reader provides sufficient energy to the miniaturization of antenna. The calculated and experimental results show that the miniaturization of HF antennas can meet the reading and writing requirement of the international standard ISO/IEC14443 standard. The results of this paper may make a positive contribution to the applications of RFID technology.

  6. RFID Data Loggers in Fish Supply Chain Traceability

    Directory of Open Access Journals (Sweden)

    Mira Trebar

    2013-01-01

    Full Text Available Radio frequency identification (RFID is an innovative and well-recognized technology that supports all kinds of traceability systems in many areas. It becomes very important in the food industry where the electronic systems are used to capture the data in the supply chain. Additionally, RFID data loggers with sensors are available to perform a cold chain optimization for perishable foods. This paper presents the temperature monitoring solution at the box level in the fish supply chain as part of the traceability system implemented with RFID technology. RFID data loggers are placed inside the box to measure the temperature of the product and on the box for measuring ambient temperature. The results show that the system is very helpful during the phases of storage and transportation of fish to provide the quality control. The sensor data is available immediately at the delivery to be checked on the mobile RFID reader and afterwards stored in the traceability systems database to be presented on a web to stakeholders and private consumers.

  7. Application of wireless sensor network technology in logistics information system

    Science.gov (United States)

    Xu, Tao; Gong, Lina; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-04-01

    This paper introduces the basic concepts of active RFID (WSN-ARFID) based on wireless sensor networks and analyzes the shortcomings of the existing RFID-based logistics monitoring system. Integrated wireless sensor network technology and the scrambling point of RFID technology. A new real-time logistics detection system based on WSN and RFID, a model of logistics system based on WSN-ARFID is proposed, and the feasibility of this technology applied to logistics field is analyzed.

  8. Measuring the drinking behaviour of individual pigs housed in group using radio frequency identification (RFID).

    Science.gov (United States)

    Maselyne, J; Adriaens, I; Huybrechts, T; De Ketelaere, B; Millet, S; Vangeyte, J; Van Nuffel, A; Saeys, W

    2016-09-01

    Changes in the drinking behaviour of pigs may indicate health, welfare or productivity problems. Automated monitoring and analysis of drinking behaviour could allow problems to be detected, thus improving farm productivity. A high frequency radio frequency identification (HF RFID) system was designed to register the drinking behaviour of individual pigs. HF RFID antennas were placed around four nipple drinkers and connected to a reader via a multiplexer. A total of 55 growing-finishing pigs were fitted with radio frequency identification (RFID) ear tags, one in each ear. RFID-based drinking visits were created from the RFID registrations using a bout criterion and a minimum and maximum duration criterion. The HF RFID system was successfully validated by comparing RFID-based visits with visual observations and flow meter measurements based on visit overlap. Sensitivity was at least 92%, specificity 93%, precision 90% and accuracy 93%. RFID-based drinking duration had a high correlation with observed drinking duration (R 2=0.88) and water usage (R 2=0.71). The number of registrations after applying the visit criteria had an even higher correlation with the same two variables (R 2=0.90 and 0.75, respectively). There was also a correlation between number of RFID visits and number of observed visits (R 2=0.84). The system provides good quality information about the drinking behaviour of individual pigs. As health or other problems affect the pigs' drinking behaviour, analysis of the RFID data could allow problems to be detected and signalled to the farmer. This information can help to improve the productivity and economics of the farm as well as the health and welfare of the pigs.

  9. RAC-Multi: Reader Anti-Collision Algorithm for Multichannel Mobile RFID Networks

    Directory of Open Access Journals (Sweden)

    Kwangcheol Shin

    2009-12-01

    Full Text Available At present, RFID is installed on mobile devices such as mobile phones or PDAs and provides a means to obtain information about objects equipped with an RFID tag over a multi-channeled telecommunication networks. To use mobile RFIDs, reader collision problems should be addressed given that readers are continuously moving. Moreover, in a multichannel environment for mobile RFIDs, interference between adjacent channels should be considered. This work first defines a new concept of a reader collision problem between adjacent channels and then suggests a novel reader anti-collision algorithm for RFID readers that use multiple channels. To avoid interference with adjacent channels, the suggested algorithm separates data channels into odd and even numbered channels and allocates odd-numbered channels first to readers. It also sets an unused channel between the control channel and data channels to ensure that control messages and the signal of the adjacent channel experience no interference. Experimental results show that suggested algorithm shows throughput improvements ranging from 29% to 46% for tag identifications compared to the GENTLE reader anti-collision algorithm for multichannel RFID networks.

  10. Radio frequency identification (RFID) of dentures in long-term care facilities.

    Science.gov (United States)

    Madrid, Carlos; Korsvold, Tové; Rochat, Aline; Abarca, Marcelo

    2012-03-01

    The difficulty of identifying the ownership of lost dentures when found is a common and expensive problem in long term care facilities (LTCFs) and hospitals. The purpose of this study was to evaluate the reliability of using radiofrequency identification (RFID) in the identification of dentures for LTCF residents after 3 and 6 months. Thirty-eight residents of 2 LTCFs in Switzerland agreed to participate after providing informed consent. The tag was programmed with the family and first names of the participants and then inserted in the dentures. After placement of the tag, the information was read. A second and third assessment to review the functioning of the tag occurred at 3 and 6 months, and defective tags (if present) were reported and replaced. The data were analyzed with descriptive statistics. At the 3-month assessment of 34 residents (63 tags) 1 tag was unreadable and 62 tags (98.2%) were operational. At 6 months, the tags of 27 of the enrolled residents (50 tags) were available for review. No examined tag was defective at this time period. Within the limits of this study (number of patients, 6-month time span) RFID appears to be a reliable method of tracking and identifying dentures, with only 1 of 65 devices being unreadable at 3 months and 100% of 50 initially placed tags being readable at the end of the trial. Copyright © 2012 The Editorial Council of the Journal of Prosthetic Dentistry. Published by Mosby, Inc. All rights reserved.

  11. ISO 15693-compatible high frequency passive RFID transponder with mixed-signal ESD protection circuit

    International Nuclear Information System (INIS)

    Khaw, M.K.; Mohd-Yasin, F.; Reaz, M.B.I.

    2009-06-01

    Radio Frequency Identification (RFID) tags have long been in existence since the 1950's. But not until two decades ago have they found important usage in areas where the need for enhanced and secured data handling is highly concerned. For example, RFID tags are embedded with passports in countries like US and Malaysia since the September 11th incident. RFID tag used in smart card such as passport is constantly exposed to a lot of human touches, thus requiring a very good Electrostatic Discharge (ESD) protection. Normally the protection is done at the pad level, but the protection is usually small dimensioned to reduce input capacitance. Therefore, in advanced process with thinner gate oxide, internal protection is necessary. This work presents the design of an ISO 15693-compatible 13.56 MHz passive RFID tag with internal ESD protection. VDD-to-ground ESD clamp circuits are strategically placed in the chip architecture. Each clamp has a capability to sustain 2-KV Human Body Model (HBM) positive mode ESD voltage, to produce robust tag. The protection circuit adds 15.12nW to the total power consumption, which is very minimal. (author)

  12. Peak radiated power measurement of the DOE Mark II container tag with integrated ST-676 sensor radio frequency identification device.

    Energy Technology Data Exchange (ETDEWEB)

    Jursich, Mark

    2010-04-01

    The total peak radiated power of the Department of Energy Mark II container tag was measured in the electromagnetic reverberation chamber facility at Sandia National Laboratories. The tag's radio frequency content was also evaluated for possible emissions outside the intentional transmit frequency band. No spurious emissions of any significance were found, and the radiated power conformed to the manufacturer's specifications.

  13. An RFID-based luggage and passenger tracking system for airport security control applications

    Science.gov (United States)

    Vastianos, George E.; Kyriazanos, Dimitris M.; Kountouriotis, Vassilios I.; Thomopoulos, Stelios C. A.

    2014-06-01

    Market analysis studies of recent years have shown a steady and significant increase in the usage of RFID technology. Key factors for this growth were the decreased costs of passive RFIDs and their improved performance compared to the other identification technologies. Besides the benefits of RFID technologies into the supply chains, warehousing, traditional inventory and asset management applications, RFID has proven itself worth exploiting on experimental, as well as on commercial level in other sectors, such as healthcare, transport and security. In security sector, airport security is one of the biggest challenges. Airports are extremely busy public places and thus prime targets for terrorism, with aircraft, passengers, crew and airport infrastructure all subject to terrorist attacks. Inside this labyrinth of security challenges, the long range detection capability of the UHF passive RFID technology can be turned into a very important tracking tool that may outperform all the limitations of the barcode tracking inside the current airport security control chain. The Integrated Systems Lab of NCSR Demokritos has developed an RFID based Luggage and Passenger tracking system within the TASS (FP7-SEC-2010-241905) EU research project. This paper describes application scenarios of the system categorized according to the structured nature of the environment, the system architecture and presents evaluation results extracted from measurements with a group of different massive production GEN2 UHF RFID tags that are widely available in the world market.

  14. A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety.

    Science.gov (United States)

    Jin, Chunhua; Xu, Chunxiang; Zhang, Xiaojun; Li, Fagen

    2016-01-01

    Patient medication safety is an important issue in patient medication systems. In order to prevent medication errors, integrating Radio Frequency Identification (RFID) technology into automated patient medication systems is required in hospitals. Based on RFID technology, such systems can provide medical evidence for patients' prescriptions and medicine doses, etc. Due to the mutual authentication between the medication server and the tag, RFID authentication scheme is the best choice for automated patient medication systems. In this paper, we present a RFID mutual authentication scheme based on elliptic curve cryptography (ECC) to enhance patient medication safety. Our scheme can achieve security requirements and overcome various attacks existing in other schemes. In addition, our scheme has better performance in terms of computational cost and communication overhead. Therefore, the proposed scheme is well suitable for patient medication systems.

  15. A Low-Cost Collaborative Location Scheme with GNSS and RFID for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Changfeng Jing

    2018-05-01

    Full Text Available The emergence and development of the Internet of Things (IoT has attracted growing attention to low-cost location systems when facing the dramatically increased number of public infrastructure assets in smart cities. Various radio frequency identification (RFID-based locating systems have been developed. However, most of them are impractical for infrastructure asset inspection and management on a large scale due to their high cost, inefficient deployment, and complex environments such as emergencies or high-rise buildings. In this paper, we proposed a novel locating system by combing the Global Navigation Satellite System (GNSS with RFID, in which a target tag was located with one RFID reader and one GNSS receiver with sufficient accuracy for infrastructure asset management. To overcome the cost challenge, one mobile RFID reader-mounted GNSS receiver is used to simulate multiple location known reference tags. A vast number of reference tags are necessary for current RFID-based locating systems, which means higher cost. To achieve fine-grained location accuracy, we utilize a distance-based power law weight algorithm to estimate the exact coordinates. Our experiment demonstrates the effectiveness and advantages of the proposed scheme with sufficient accuracy, low cost and easy deployment on a large scale. The proposed scheme has potential applications for location-based services in smart cities.

  16. Misplaced Inventory and Lead-Time in the Supply Chain: Analysis of Decision-Making on RFID Investment with Service Level

    Directory of Open Access Journals (Sweden)

    Li-Hao Zhang

    2014-01-01

    Full Text Available Radio-frequency identification (RFID, as the key technology of Internet of Things (IoT, has been hailed as a major innovation to solve misplaced inventory and reduce lead-time. Many retailers have been pushing their suppliers to invest this technology. However, its associated costs seem to prohibit its widespread application. This paper analyzes the situation of service level in a retail supply chain, which has resulted from misplaced inventory and lead-time. By newsvendor model, we analyze the difference between with- and without-RFID technologies in service level of centralized and decentralized supply chains, respectively. Then with different service levels, we determine the tag cost thresholds at which RFID technology investment becomes profitable in centralized and decentralized supply chains, respectively. Furthermore, we apply a linear transfer payment coefficient strategy to coordinate with the decentralized supply chain. It is found that whether the adoption of RFID technology improves the service level depends on the cost of RFID tag in the centralized system, but it improves the service level in the decentralized system when only the supplier bears the cost of RFID tag. Moreover, the same cost thresholds of RFID tag with different service levels exist in both the centralized and the decentralized cases.

  17. Track star : Merrick's RFID system tracks oilpatch equipment

    International Nuclear Information System (INIS)

    Louie, J.

    2006-01-01

    Designed by Merrick Systems, the new Rig-Hand system uses radio frequency identification (RFID) in conjunction with downhole components to manage both surface and downhole equipment. The Rig-Hand system consists of RFID tags which can either be installed to new pipe or retrofitted to existing components; handheld or fixed RFID tag readers; and, software modules. The tags can be mounted to a wide range of surface and downhole components. The system can be used by rig personnel to scan tags with handheld computers, or can be used by a designated reader for greater automation and efficiency. The software modules have been designed for typical rig, pipeyard and service company users. The system provides essential drillstring information that helps to reduce pipe failures, fishing costs and downtime. Component tracking may also impact on both personnel safety and operational risks, as a recent survey has suggested that 14 per cent of catastrophic drillstring failures are due to pipe fatigue. When drilling deviated wells, operators typically have difficulty tracking which pipe may have become fatigued. It is anticipated that the system will also allow for improved logistics management, as it is currently estimated that 70 per cent of casing returned from the wellsite to a pipe yard goes to rust. The tagged components will also demand a higher resale or salvage value than untagged components with limited traceability. The system has gone through extensive testing, and to date has provided extensive savings in both onshore and offshore rigs. Commercialization is expected by the end of 2006. 1 fig

  18. Track star : Merrick's RFID system tracks oilpatch equipment

    Energy Technology Data Exchange (ETDEWEB)

    Louie, J

    2006-10-15

    Designed by Merrick Systems, the new Rig-Hand system uses radio frequency identification (RFID) in conjunction with downhole components to manage both surface and downhole equipment. The Rig-Hand system consists of RFID tags which can either be installed to new pipe or retrofitted to existing components; handheld or fixed RFID tag readers; and, software modules. The tags can be mounted to a wide range of surface and downhole components. The system can be used by rig personnel to scan tags with handheld computers, or can be used by a designated reader for greater automation and efficiency. The software modules have been designed for typical rig, pipeyard and service company users. The system provides essential drillstring information that helps to reduce pipe failures, fishing costs and downtime. Component tracking may also impact on both personnel safety and operational risks, as a recent survey has suggested that 14 per cent of catastrophic drillstring failures are due to pipe fatigue. When drilling deviated wells, operators typically have difficulty tracking which pipe may have become fatigued. It is anticipated that the system will also allow for improved logistics management, as it is currently estimated that 70 per cent of casing returned from the wellsite to a pipe yard goes to rust. The tagged components will also demand a higher resale or salvage value than untagged components with limited traceability. The system has gone through extensive testing, and to date has provided extensive savings in both onshore and offshore rigs. Commercialization is expected by the end of 2006. 1 fig.

  19. Advanced hybrid query tree algorithm based on slotted backoff mechanism in RFID

    Directory of Open Access Journals (Sweden)

    XIE Xiaohui

    2013-12-01

    Full Text Available The merits of performance quality for a RFID system are determined by the effectiveness of tag anti-collision algorithm.Many algorithms for RFID system of tag identification have been proposed,but they all have obvious weaknesses,such as slow speed of identification,unstable and so on.The existing algorithms can be divided into two groups,one is based on ALOHA and another is based on query tree.This article is based on the hybrid query tree algorithm,combined with a slotted backoff mechanism and a specific encoding (Manchester encoding.The number of value“1” in every three consecutive bits of tags is used to determine the tag response time slots,which will greatly reduce the time slot of the collision and improve the recognition efficiency.

  20. Research Algorithm on Building Intelligent Transportation System based on RFID Technology

    Directory of Open Access Journals (Sweden)

    Chuanqi Chen

    2013-05-01

    Full Text Available Intelligent transportation system to all aspects of organic integration of human, vehicle, road and environment of the transport system, so that the operation of functional integration and intelligent vehicle, road. Intelligent transportation system (ITS to improve the efficiency of traffic system by increasing the effective use and management of traffic information is mainly composed of information collection and input, output, control strategy, implementation of the subsystems of data transmission and communication subsystem. The RFID reader to wireless communication through the antenna and RFID tag can achieve a write operation on the tag identification codes and memory read data. The paper proposes research on building intelligent transportation system based on RFID technology. Experimental results show that ITS system can effectively improve the traffic situation, improve the utilization rate of the existing road resource and save social cost.

  1. On the move with RFID

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Scanology is an independent automatic identification specialist providing state of the art barcode and RFID solutions to our European customer base. Our knowledge of the present and what is yet to come allows us to provide honest, practical advice to clients transitioning from barcode to RFID. Scanology designs, builds, installs and services end-to-end sup-

  2. Students Attendance Management System Based On RFID And Fingerprint Reader

    Directory of Open Access Journals (Sweden)

    Moth Moth Myint Thein

    2015-07-01

    Full Text Available Abstract Today students class attendance is become more important part for any organizationsinstitutions. The conventional method of taking attendance by calling names or signing on paper is very time consuming and insecure hence inefficient. This paper presents the manual students attendance management into computerized system for convenience or data reliability. So the system is developed by the integration of ubiquitous computing systems into classroom for managing the students attendance using RFID and fingerprint reader. The system is designed to implement an attendance management system based on RFID and fingerprint reader which students need to use their student identification card ID and their finger ID to success the attendance where only authentic student can be recorded the attendance during the class. In this system passive RFID tag and reader pairs are used to register the student ID cards individually and fingerprint reader is used for attendance. This system takes attendance electronically with the help of the RFID and finger print device and the records of the attendance are stored in a database. Students roll call percentages and their details are easily seenvia Graphical User Interface GUI. This system will have the required databases for students attendance teachers subjects and students details. This application is implemented by Microsoft Visual Studio and Microsoft SQL Server as IDE. C language is used to implement this system.

  3. Un sistema RFID in banda UHF per l'autoprestito in Biblioteca

    OpenAIRE

    Ricci, Franco; Crisanti, Andrea

    2009-01-01

    Department of Physics and CASPUR have been starting, in the past 2 years, a collaborationin order to develop a new RFID (Radio Frequency IDentification) system for automaticlibrary loan procedures. These systems (generally known as self-checkequipments) uses radio signals in the UHF frequency range to interact with antennas(passive tags) used to identify books. Users identification is made through special cardswith an embedded tag. The entire loan process is completely managed by users throug...

  4. RFID security a lightweight paradigm

    CERN Document Server

    Khattab, Ahmed; Amini, Esmaeil; Bayoumi, Magdy

    2017-01-01

    This book provides a comprehensive treatment of security in the widely adopted, Radio Frequency Identification (RFID) technology. The authors present the fundamental principles of RFID cryptography in a manner accessible to a broad range of readers, enabling them to improve their RFID security design. This book also offers the reader a range of interesting topics portraying the current state-of-the-art in RFID technology and how it can be integrated with today’s Internet of Things (IoT) vision. The authors describe a first-of-its-kind, lightweight symmetric authenticated encryption cipher called Redundant Bit Security (RBS), which enables significant, multi-faceted performance improvements compared to existing cryptosystems. This book is a must-read for anyone aiming to overcome the constraints of practical implementation in RFID security technologies.

  5. Wi-Fi Tags for the Remote and Virtual Laboratory

    Directory of Open Access Journals (Sweden)

    D. Ursutiu

    2008-04-01

    Full Text Available With the advancement of computer technologiesto faster processors and more memory, the WorldWideWeb,wireless communication, and miniaturization of sensortechnology, it is now possible to simulate and executeengineering and science laboratory projects on a remotecomputer. With Internet connection, students have access to"virtual laboratories" via the www, experiment-orientedproblems can be now offered without the overhead incurredwhen maintaining a full laboratory. This paper investigatesthe opportunity that a new wireless sensor technologybrings to remote laboratories.G2 Microsystems of Campbell, California, USA, released in2007 the first ever ultra-low power Wi-Fi System on a Chip(SoC named G2C501. This SoC includes a 32-bit CPU,crypto accelerator, real-time clock and a versatile sensorinterface that can serve as a standalone host subsystem. TheG2C501 goes beyond today’s basic radio frequencyidentification (RFID technology to offer intelligent trackingand sensor capabilities that leverage IEEE 802.11 (Wi-Finetworks. Due to its support for multiple locationtechnologies, small form factor and ultra-low powerconsumption, the G2C502 SoC can be integrated into Wi-Fisensor tags that lower cost of ownership and meet the needsof a variety of industries including consumer electronics,pharmaceuticals, chemical manufacturing, cold chain andmore.A battery powered, small size ultra low-power Wi-Fiwireless measurement node name IP Sensor has been builtusing the G2C501 SoC. Sensors for measurement oftemperature, humidity, light, and vibration or motion arecurrently mounted on the IP Sensor board. The node is ableto read a sensor and send data to the network by using anIP-based application protocol such as UDP.This paper describes the new IP Sensor

  6. Improved Nondestructive Disassembly Process using Augmented Reality and RFID Product/Part Tracking

    Directory of Open Access Journals (Sweden)

    Ile Mircheski

    2017-11-01

    Full Text Available The waste from electric and electronic equipment and discarded automobiles in the past grew rapidly and resulted with waste in billions of tones. The aim of this paper is to present an improved non-destructive disassembly process of electromechanical products using augmented reality based devices, such as glasses, tablets or mobile phones, and RFID technology for valuable product/part tracking. The proposed method includes tagging of components of interest in the product assembly by using a RFID tag. The valuable product is marked with specific ID number written in the RFID tag, in order to declare the product. The relevant data such as material and weight of components, guidelines for non-destructive disassembly for the valuable product and removing of component of interest will be obtained with the assistance of RFID tag and a centralized database. This modular system offers guidelines for the non-destructive disassembly process for obtaining valuable component of interest intended for easy repairs, remanufacture, reuse or recycling. The guidelines are in video presentation format using augmented reality for easy visualization of non-destructive disassembly process. The benefits of proposed modular system includes biggest percentage of reuse of the valuable components, easy maintaining, improved material recycling, environmental protection and greater total return form end of life products.

  7. Season: Shelving Interference and Joint Identification in Large-scale RFID Systems

    DEFF Research Database (Denmark)

    Yang, Lei; Han, Jinsong; Qi, Yong

    2011-01-01

    Prior work on anti-collision for Radio Frequency IDentification (RFID) systems usually schedule adjacent readers to exclusively interrogate tags for avoiding reader collisions. Although such a pattern can effectively deal with collisions, the lack of readers’ collaboration wastes numerous time...

  8. A break-even analysis of RFID technology for inventory sensitive to shrinkage

    NARCIS (Netherlands)

    Kok, de A.G.; Donselaar, van K.H.; Woensel, van T.

    2008-01-01

    By embedding RFID tags onto their products, both manufacturers and retailers try to control for shrinkage (e.g. due to theft). Current inventory control systems do not take into account the disappearing inventory due to this shrinkage. As a response, corrective actions are made by performing costly

  9. USING RFID AND GIS TECHNOLOGIES FOR ADVANCED LUGGAGE TRACKING

    Directory of Open Access Journals (Sweden)

    Zoltan KATO

    2015-06-01

    Full Text Available By purchasing a plane ticket or a cargo service, the passenger or the customer signs a contract with the airline company. From that moment on the airline company is responsible for all aspects of air travel, including the passenger' luggage (recording, handling to / from the aircraft etc.. Safe transport of passengers' luggage or cargo packages on airlines raises numerous problems for airlines and requires flexible, efficient solutions, appropriate to the specific requirements of each client. Annually millions of luggages get lost in airports around the world. This causes inconvenience to passengers and loss of resources and additional costs for the airlines. The aim of this paper is to examine how RFID(Radio Frequency Identification technology could be useful for advanced shipment tracking (Track and Trace in the airlines industry, by using rewritable passive RFID tags.

  10. Technical note: Validation of an ear-tag accelerometer sensor to determine rumination, eating, and activity behaviors of grazing dairy cattle.

    Science.gov (United States)

    Pereira, G M; Heins, B J; Endres, M I

    2018-03-01

    The objective of this study was to validate an ear-tag accelerometer sensor (CowManager SensOor, Agis Automatisering BV, Harmelen, the Netherlands) using direct visual observations in a grazing dairy herd. Lactating crossbred cows (n = 24) were used for this experiment at the University of Minnesota West Central Research and Outreach Center grazing dairy (Morris, MN) during the summer of 2016. A single trained observer recorded behavior every minute for 6 h for each cow (24 cows × 6 h = 144 h of observation total). Direct visual observation was compared with sensor data during August and September 2016. The sensor detected and identified ear and head movements, and through algorithms the sensor classified each minute as one of the following behaviors: rumination, eating, not active, active, and high active. A 2-sided t-test was conducted with PROC TTEST of SAS (SAS Institute Inc., Cary, NC) to compare the percentage of time each cow's behavior was recorded by direct visual observation and sensor data. For total recorded time, the percentage of time of direct visual observation compared with sensor data was 17.9 and 19.1% for rumination, 52.8 and 51.9% for eating, 17.4 and 11.9% for not active, and 7.9 and 21.1% for active. Pearson correlations (PROC CORR of SAS) were used to evaluate associations between direct visual observations and sensor data. Furthermore, concordance correlation coefficient (CCC), bias correction factors, location shift, and scale shift (epiR package of R version 3.3.1; R Foundation for Statistical Computing, Vienna, Austria) were calculated to provide a measure of accuracy and precision. Correlations between visual observations for all 4 behaviors were highly to weakly correlated (rumination: r = 0.72, CCC = 0.71; eating: r = 0.88, CCC = 0.88; not active: r = 0.65, CCC = 0.52; and active: r = 0.20, CCC = 0.19) compared with sensor data. The results suggest that the sensor accurately monitors rumination and eating behavior of grazing dairy

  11. The use of external electronic tags on fish: an evaluation of tag retention and tagging effects

    DEFF Research Database (Denmark)

    Jepsen, Niels; Thorstad, Eva B.; Havn, Torgeir

    2015-01-01

    External tagging of fish with electronic tags has been used for decades for a wide range of marine and freshwater species. In the early years of fish telemetry research, it was the most commonly used attachment method, but later internal implants became preferred. Recently, the number of telemetry...... unsuitable for surgical implantation, or when using tags with sensors recording the external environment. The most commonly reported problems with external tags are tissue damage, premature tag loss, and decreased swimming capacity, but the effects are highly context dependent and species specific. Reduced......, but particularly there are few studies on predation risk, social interactions, and studies distinguishing capture and handling effects from tagging effects. For PSATs, especially those that are large relative to fish size, there are particular problems with a high proportion of premature tag losses, reduced...

  12. RFID Ownership Transfer with Positive Secrecy Capacity Channels

    Directory of Open Access Journals (Sweden)

    Jorge Munilla

    2016-12-01

    Full Text Available RFID ownership transfer protocols (OTPs transfer tag ownership rights. Recently, there has been considerable interest in such protocols; however, guaranteeing privacy for symmetric-key settings without trusted third parties (TTPs is a challenge still unresolved. In this paper, we address this issue and show that it can be solved by using channels with positive secrecy capacity. We implement these channels with noisy tags and provide practical values, thus proving that perfect secrecy is theoretically possible. We then define a communication model that captures spatiotemporal events and describe a first example of symmetric-key based OTP that: (i is formally secure in the proposed communication model and (ii achieves privacy with a noisy tag wiretap channel without TTPs.

  13. A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem.

    Science.gov (United States)

    Zhao, Zhenguo

    2014-05-01

    With the fast advancement of the wireless communication technology and the widespread use of medical systems, the radio frequency identification (RFID) technology has been widely used in healthcare environments. As the first important protocol for ensuring secure communication in healthcare environment, the RFID authentication protocols derive more and more attentions. Most of RFID authentication protocols are based on hash function or symmetric cryptography. To get more security properties, elliptic curve cryptosystem (ECC) has been used in the design of RFID authentication protocol. Recently, Liao and Hsiao proposed a new RFID authentication protocol using ECC and claimed their protocol could withstand various attacks. In this paper, we will show that their protocol suffers from the key compromise problem, i.e. an adversary could get the private key stored in the tag. To enhance the security, we propose a new RFID authentication protocol using ECC. Detailed analysis shows the proposed protocol not only could overcome weaknesses in Liao and Hsiao's protocol but also has the same performance. Therefore, it is more suitable for healthcare environments.

  14. EVALUATION OF RFID APPLICATION IN APPAREL RETAIL IN SUPPLIER AND CUSTOMER CHAINS

    Directory of Open Access Journals (Sweden)

    Ribeiro, P. C. C.

    2015-12-01

    Full Text Available This article aims to evaluate the application of RFID in retail apparel stock. The use of RFID in Brazil has been limited to large enterprises and supply operations, not in the retail supply chain link. Therefore, this article brings interesting findings about RFID and its application in retail. The case study was used such as qualitative research approach and semi-structured interview. For this method, a roadmap of open and closed questions was used. Data were analyzed by checking all the points of the questionnaires from the literature review, which were organized with field research to complete the discussion of the case. Both interviewers agreed as to the advantages of RFID: an average return; new opportunities; high contribution to the company; reduction of time taken for inventory. With regard to disadvantages, the first interviewer noted the interference of RFID tag, and the second interviewer disagreed. The research revealed that RFID takes greater accuracy and better inventory management; fewer out-of-stock events; timely replenishment; maintenance costs reduction of inventory; level of high customer service; agility of payment in cashiers; best shopping experience; and better prevention of losses. One of the problems identified was the registration of products on the client.

  15. Tracking and Monitoring with Dosimeter-Enabled ARG-US RFID System - 12009

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, J.; Lee, H.; De Lurgio, P.; Kearney, C.M.; Craig, B.; Soos, I.H.; Tsai, H.; Liu, Y. [Argonne National Laboratory, Argonne, IL 60439 (United States); Shuler, J. [U.S. Department of Energy, Washington, D.C. 20585 (United States)

    2012-07-01

    Automated monitoring and tracking of materials with radio frequency identification (RFID) technology can significantly improve both the operating efficiency of radiological facilities and the application of the ALARA (as low as reasonably achievable) principle in them. One such system, called ARG-US, has been developed by Argonne National Laboratory for the U.S. Department of Energy (DOE) Packaging and Certification Program to use in managing sensitive nuclear and radioactive materials. Several ARG-US systems are in various stages of deployment and advanced testing across DOE sites. ARG-US utilizes sensors in the tags to continuously monitor the state of health of the packaging and promptly disseminates alarms to authorized users. In conjunction with global positioning system (GPS) tracking provided by TRANSCOM, the system can also monitor and track packages during transport. A compact dosimeter has been incorporated in the ARG-US tags via an onboard universal asynchronous receiver/transmitter interface. The detector has a wide measurement range for gamma radiation - from 0.1 mSv/h to 8 Sv/h. The detector is able to generate alarms for both high and low radiation and for a high cumulative dose. In a large installation, strategically located dosimeter-enabled tags can yield an accurate, real-time, 2D or 3D dose field map that can be used to enhance facility safety, security, and safeguards. This implementation can also lead to a reduced need for manned surveillance and reduced exposure of personnel to radiation, consistent with the ALARA principle at workplaces. (authors)

  16. Potentials of RFID Application in Retailing

    DEFF Research Database (Denmark)

    Foscht, Thomas; Kotzab, Herbert; Maloles III, Cesar

    2008-01-01

    The willingness of retailers to adopt RFID systems, as well as finding optimal RFID applications has yet not been investigated. This paper examines the issues associated with the RFID adoption based on the results of a conjoint analysis. The conjoint measurement looked at the trade-off decisions...... among different possible set-ups of RFID applications in retailing companies. Considerable willingness to adopt, but low diffusion and a structure of preferences with respect to RFID features was shown throughout the examined retailing companies. Furthermore, differences were shown among different types...... of retailers in their preferences for RFID system features and clusters were implied....

  17. User Privacy in RFID Networks

    Science.gov (United States)

    Singelée, Dave; Seys, Stefaan

    Wireless RFID networks are getting deployed at a rapid pace and have already entered the public space on a massive scale: public transport cards, the biometric passport, office ID tokens, customer loyalty cards, etc. Although RFID technology offers interesting services to customers and retailers, it could also endanger the privacy of the end-users. The lack of protection mechanisms being deployed could potentially result in a privacy leakage of personal data. Furthermore, there is the emerging threat of location privacy. In this paper, we will show some practical attack scenarios and illustrates some of them with cases that have received press coverage. We will present the main challenges of enhancing privacy in RFID networks and evaluate some solutions proposed in literature. The main advantages and shortcomings will be briefly discussed. Finally, we will give an overview of some academic and industrial research initiatives on RFID privacy.

  18. ASAP: A MAC Protocol for Dense and Time-Constrained RFID Systems

    Directory of Open Access Journals (Sweden)

    Kyounghwan Lee

    2007-08-01

    Full Text Available We introduce a novel medium access control (MAC protocol for radio frequency identification (RFID systems which exploits the statistical information collected at the reader. The protocol, termed adaptive slotted ALOHA protocol (ASAP, is motivated by the need to significantly improve the total read time performance of the currently suggested MAC protocols for RFID systems. In order to accomplish this task, ASAP estimates the dynamic tag population and adapts the frame size in the subsequent round via a simple policy that maximizes an appropriately defined efficiency function. We demonstrate that ASAP provides significant improvement in total read time performance over the current RFID MAC protocols. We next extend the design to accomplish reliable performance of ASAP in realistic scenarios such as the existence of constraints on frame size, and mobile RFID systems where tags move at constant velocity in the reader's field. We also consider the case where tags may fail to respond because of a physical breakdown or a temporary malfunction, and show the robustness in those scenarios as well.

  19. RFID-Enabled Smart Government

    OpenAIRE

    Fatima Al Shamsi; Noura Al Shamsi; Al Anoud Al Kendi; Latifa Al Darmaki; Al Yazia Aldhaheri; Dr. Muhammad Khan

    2015-01-01

    Abstract Radio frequency identification is a technology that allows user to identify people. In this research work you will understand the concept of RFID and E-wallet. To know the advantages and disadvantage of Emirates ID connected with the E-wallet. In This Research we will identify the problems and risks of connecting RFID E-wallet with Emirates ID. Also recognize and recommend the possible solutions.

  20. RFID-Enabled Smart Government

    Directory of Open Access Journals (Sweden)

    Fatima Al Shamsi

    2015-08-01

    Full Text Available Abstract Radio frequency identification is a technology that allows user to identify people. In this research work you will understand the concept of RFID and E-wallet. To know the advantages and disadvantage of Emirates ID connected with the E-wallet. In This Research we will identify the problems and risks of connecting RFID E-wallet with Emirates ID. Also recognize and recommend the possible solutions.

  1. Wireless Smart Systems Beyond RFID

    OpenAIRE

    Vermesan, Ovidiu

    2008-01-01

    It is expected that in the coming 20 years the IoT will be pervasive, and ubiquitous: smart devices, embedded in smart materials, will work in synergy to improve the quality of our lives. In this context wireless smart systems will play an essential role that is far beyond the ID information that is part of RFID devices today. Wireless Smart Systems Beyond RFID

  2. Performance Analysis of Binary Search Algorithm in RFID

    Directory of Open Access Journals (Sweden)

    Xiangmei SONG

    2014-12-01

    Full Text Available Binary search algorithm (BS is a kind of important anti-collision algorithm in the Radio Frequency Identification (RFID, is also one of the key technologies which determine whether the information in the tag is identified by the reader-writer fast and reliably. The performance of BS directly affects the quality of service in Internet of Things. This paper adopts an automated formal technology: probabilistic model checking to analyze the performance of BS algorithm formally. Firstly, according to the working principle of BS algorithm, its dynamic behavior is abstracted into a Discrete Time Markov Chains which can describe deterministic, discrete time and the probability selection. And then on the model we calculate the probability of the data sent successfully and the expected time of tags completing the data transmission. Compared to the another typical anti-collision protocol S-ALOHA in RFID, experimental results show that with an increase in the number of tags the BS algorithm has a less space and time consumption, the average number of conflicts increases slower than the S-ALOHA protocol standard, BS algorithm needs fewer expected time to complete the data transmission, and the average speed of the data transmission in BS is as 1.6 times as the S-ALOHA protocol.

  3. Bit Level Synchronized MAC Protocol for Multireader RFID Networks

    Directory of Open Access Journals (Sweden)

    Namboodiri Vinod

    2010-01-01

    Full Text Available The operation of multiple RFID readers in close proximity results in interference between the readers. This issue is termed the reader collision problem and cannot always be solved by assigning them to different frequency channels due to technical and regulatory limitations. The typical solution is to separate the operation of such readers across time. This sequential operation, however, results in a long delay to identify all tags. We present a bit level synchronized (BLSync MAC protocol for multi-reader RFID networks that allows multiple readers to operate simultaneously on the same frequency channel. The BLSync protocol solves the reader collision problem by allowing all readers to transmit the same query at the same time. We analyze the performance of using the BLSync protocol and demonstrate benefits of 40%–50% in terms of tag reading delay for most settings. The benefits of BLSync, first demonstrated through analysis, are then validated and quantified through simulations on realistic reader-tag layouts.

  4. Functional screen printed radio frequency identification tags on flexible substrates, facilitating low-cost and integrated point-of-care diagnostics

    CSIR Research Space (South Africa)

    Smith, Suzanne

    2018-05-01

    Full Text Available This work explores the practical functionality of ultra-high frequency (UHF) radio frequency identification (RFID) tags screen printed onto various low-cost, flexible substrates. The need for integrated and automated low-cost point...

  5. A survey on barcode RFID and NFC

    Science.gov (United States)

    Thanapal, P.; Prabhu, J.; Jakhar, Mridula

    2017-11-01

    Over the recent years, many industries have started implementing new technologies for tracing and tracking their products. These technologies are a kind of blessing to their management system. The technology and management system has to work in parallel to avoid loopholes in the system. We can see so many technologies around us and the most difficult and important part is to choose best out of all these new technologies. The important point which we need to take care while choosing a technology for the system is to make sure the technology can integrate properly with the other parameters in the management system. The industry management system consists of many levels such as initial level, intermediate level, final level and tracking. Nowadays tracking a product from its initial stage is becoming a trend. To cope up with this upcoming trend and also with the company demand, integrating the product with Barcode, RFID tags, NFC tag or any other traceable technology. Many supply chain Management system are also adopting this techniques.

  6. Small Form Factor RFID Applicator, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — The proposed development of a small form factor Astrobee dedicated RFID label applicator will allow current and future free flying vehicles to place RFID labels...

  7. RFID and medication care.

    Science.gov (United States)

    Lahtela, Antti; Saranto, Kaija

    2009-01-01

    Dynamic healthcare needs new IT innovations and applications to be able to treat the rapidly growing number of patients effectively and safely. The information technology has to support healthcare in developing practices and nursing patients without confronting any complications or errors. One critical and important part of healthcare is medication care, which is very vulnerable for different kind of errors, even on fatal errors. Thus, medication care needs new methods for avoiding errors in different situations during medication administration. This poster represents an RFID-based automated identification system for medication care in a hospital environment. This work is a part of the research project MaISSI (Managing IT Services and Service Implementation) at the University of Kuopio, Department of Computer Science, Finland.

  8. Monitoring and localization of buried plastic natural gas pipes using passive RF tags

    Science.gov (United States)

    Mondal, Saikat; Kumar, Deepak; Ghazali, Mohd. Ifwat; Chahal, Prem; Udpa, Lalita; Deng, Yiming

    2018-04-01

    A passive harmonic radio frequency (RF) tag on the pipe with added sensing capabilities is proposed in this paper. Radio frequency identification (RFID) based tagging has already emerged as a potential solution for chemical sensing, location detection, animal tagging, etc. Harmonic transponders are already quite popular compared to conventional RFIDs due to their improved signal to noise ratio (SNR). However, the operating frequency, transmitted power and tag efficiency become critical issues for underground RFIDs. In this paper, a comprehensive on-tag sensing, power budget and frequency analyses is performed for buried harmonic tag design. Accurate tracking of infrastructure burial depth is proposed to reduce the probability of failure of underground pipelines. Burial depth is estimated using phase information of received signals at different frequencies calculated using genetic algorithm (GA) based optimization for post processing. Suitable frequency range is determined for a variety of soil with different moisture content for small tag-antenna size. Different types of harmonic tags such as 1) Schottky diode, 2) Non-linear Transmission Line (NLTL) were compared for underground applications. In this study, the power, frequency and tag design have been optimized to achieve small antenna size, minimum signal loss and simple reader circuit for underground detection at up to 5 feet depth in different soil medium and moisture contents.

  9. Rancang Bangun Keanggotaan Perpustakaan STT Telematika Telkom Menggunakan RFID Berbasis Java 2 Standard Edition Dengan Konsep Client Server

    Directory of Open Access Journals (Sweden)

    Yana Yuniarsyah

    2013-05-01

    Full Text Available RFID technology is a new technology that hasn’t been widely applied. The existence of this technology can reduce the disadvantages of barcode technology. One application of RFID technology is used for a library card. STT Telematika Library is a library that uses a membership card to borrow and return transactions only. The existence of RFID technology in the card member can create a multifunctional card, in addition to borrow and return books transactions, membership cards can be used for visitor attendance too. Distribution of visitor attendance and report library using client-server concept, thus make it easier for librarians in data management. The programming language used in the design of Library Information System is a Java 2 Standard Edition (J2SE using NetBeans 7.0 as IDE. Storage Library using the MySQL database. Software design method using waterfall or linear sequential models. Model design to make information sistem using Unified Modeling Language (UML like usecase diagram, activity diagram, and class diagram. Database design model using Entity Relationship Diagram (ERD for development information library system. Testing library information system have form with testing user requirements, test the program using blacbox testing, and testing the user. RFID used for library information systems have form such as RFID reader which used to read the information carried by the RFID tag and RFID tag used to transmit information to the RFID reader. The success of the client-server concept comes from the success of visitor attendance and show a report from the client, and the success of server to store visitor attendance data.

  10. Device-free object tracking using passive tags

    CERN Document Server

    Han, Jinsong; Zhao, Kun; Jiang, Zhiping

    2014-01-01

    This SpringerBrief examines the use of cheap commercial passive RFID tags to achieve accurate device-free object-tracking. It presents a sensitive detector, named Twins, which uses a pair of adjacent passive tags to detect uncooperative targets (such as intruders). Twins leverages a newly observed phenomenon called critical state that is caused by interference among passive tags.The author expands on the previous object tracking methods, which are mostly device-based, and reveals a new interference model and their extensive experiments for validation. A prototype implementation of the Twins-ba

  11. The Development of Reusable Luggage Tag with the Internet of Things for Mobile Tracking and Environmental Sustainability

    Directory of Open Access Journals (Sweden)

    Eugene Y. C. Wong

    2016-12-01

    Full Text Available With more than two billion passengers worldwide travelling by air each year, vast amounts of lost luggage and disposable paper adhesive luggage tags are pushing the aviation industry to improve luggage tracking and reduce the one-off adhesive luggage paper tags. This paper reviews the current application of Radio Frequency Identification (RFID in the luggage handling system and proposes the Internet of Things’ (IoT development of the reusable luggage tag to facilitate aviation luggage handling, the tracking process and environmental conservation. A framework of IoT and its RFID components for the proposed reusable tag are presented. An integrated cyber-physical system, including a database management system and mobile app, for the reusable luggage tag is developed. Future studies will enhance the methodology of integrating the retail system, luggage tag, airport check-in counter, luggage handling system, aircraft, and the destination airport through the use of the tag, readers, antenna, and mobile devices.

  12. A Novel L-Shape Ultra Wideband Chipless Radio-Frequency Identification Tag

    Directory of Open Access Journals (Sweden)

    Khaled Issa

    2017-01-01

    Full Text Available A novel compact dual-polarized-spectral-signature-based chipless radio-frequency identification (RFID tag is presented. Specifically, an L-shape resonator-based structure is optimized to have different spectral signatures in both horizontal and vertical polarizations, in order to double the encoding capacity. Resonators’ slot width and the space between closely placed resonators are also optimized to enhance the mutual coupling, thereby helping in achieving high-data encoding density. The proposed RFID tag operates over 5 GHz to 10 GHz frequency band. As a proof of concept, three different 18-bit dual-polarized RFID tags are simulated, fabricated, and tested in an anechoic chamber environment. The measurement data show reasonable agreement with the simulation results, with respect to resonators’ frequency positions, null depth, and their bandwidth over the operational spectrum.

  13. An efficient RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography.

    Science.gov (United States)

    Zhang, Zezhong; Qi, Qingqing

    2014-05-01

    Medication errors are very dangerous even fatal since it could cause serious even fatal harm to patients. In order to reduce medication errors, automated patient medication systems using the Radio Frequency Identification (RFID) technology have been used in many hospitals. The data transmitted in those medication systems is very important and sensitive. In the past decade, many security protocols have been proposed to ensure its secure transition attracted wide attention. Due to providing mutual authentication between the medication server and the tag, the RFID authentication protocol is considered as the most important security protocols in those systems. In this paper, we propose a RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography (ECC). The analysis shows the proposed protocol could overcome security weaknesses in previous protocols and has better performance. Therefore, the proposed protocol is very suitable for automated patient medication systems.

  14. The Anti-RFI Design of Intelligent Electric Energy Meters with UHF RFID

    Science.gov (United States)

    Chen, Xiangqun; Huang, Rui; Shen, Liman; chen, Hao; Xiong, Dezhi; Xiao, Xiangqi; Liu, Mouhai; Xu, Renheng

    2018-03-01

    In order to solve the existing artificial meter reading watt-hour meter industry is still slow and inventory of common problems, using the uhf radio frequency identification (RFID) technology and intelligent watt-hour meter depth fusion, which has a one-time read multiple tags, identification distance, high transmission rate, high reliability, etc, while retaining the original asset management functions, in order to ensure the uhf RFID and minimum impact on the operation of the intelligent watt-hour meter, proposed to improve the stability of the electric meter system while working at the same time, this paper designs the uhf RFID intelligent watt-hour meter radio frequency interference resistance, put forward to improve intelligent watt-hour meter electromagnetic compatibility design train of thought, and introduced its power and the hardware circuit design of printed circuit board, etc.

  15. Radio Frequency Identification (RFID) Based Employee Attendance Management System

    Science.gov (United States)

    Maramis, G. D. P.; Rompas, P. T. D.

    2018-02-01

    Manually recorded attendance of all the employees has produced some problems such as the data accuracy and staff performance efficiency. The objective of this research is to design and develop a software of RFID attendance system which is integrated with database system. This RFID attendance system was developed using several main components such as tags that will be used as a replacement of ID cards and a reader device that will read the information related to the employee attendance. The result of this project is a software of RFID attendance system that is integrated with the database and has a function to store the data or information of every single employee. This system has a maximum reading range of 2 cm with success probability of 1 and requires a minimum interval between readings of 2 seconds in order to achieve an optimal functionality. By using the system, the discipline attitude of the employees and also the performance of the staff will be improved instantly.

  16. Printed wireless devices for low-cost, connected sensors for point-of-care applications

    CSIR Research Space (South Africa)

    Smith, Suzanne

    2017-11-01

    Full Text Available reading ranges, faster data transfer, and multiple, simultaneous tag reading. Passive RFID tags draw energy from the electromagnetic field radiating from the reader when the tags are within the reader range, a favourable implementation that does... read-out and communication of a test result is required. This work explores these aspects towards the long-term goal of a fully integrated POC diagnostic solution. Different RFID categories are suited to different POC diagnostic applications. NFC can...

  17. The Application of RFID Technologies in Construction

    Institute of Scientific and Technical Information of China (English)

    LIAN Meng

    2009-01-01

    RFID technologies have advanced greatly and deployed successfully in many industry sectors in recent years. Construction industry could benefit from the applications of RFID technologies but as yet has not found sufficient application areas. This project gives a comprehensive awareness of the RFID technologies, which focus on the investigation on the UK construction industry. The current status of RFID in construction and its potentials are specified in the analysis of questionnaires and case studies. Finally, basing on the investigations, some further tasks in developing RFID technologies are carried, including some recommendations, for the construction industry.

  18. Decommissioning support system, using RFID and USN

    Energy Technology Data Exchange (ETDEWEB)

    Cho, W. H.; Park, S. K.; Choi, Y. D.; Lee, K. I.; Moon, J. K. [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2012-05-15

    RFID and USN are key technology in the ubiquitous computing systems. Actual physical environmental information can be used to remote control systems and management using various sensor technology and wireless network. These are used to managing physical distribution systems, complex monitoring environments such as fire detecting and various environments in the field of u-healthcare. Recently, decontamination and dismantling for nuclear plant have increasing interest after Fucushima nuclear accident. In this paper, a decommissioning support system is suggested for an effective management and control of work efficiency and of worker's status. This system makes effective real-time monitoring worker's location, work status and radiation exposure and effective response for worker's safety and emergency situation

  19. Decommissioning support system, using RFID and USN

    International Nuclear Information System (INIS)

    Cho, W. H.; Park, S. K.; Choi, Y. D.; Lee, K. I.; Moon, J. K.

    2012-01-01

    RFID and USN are key technology in the ubiquitous computing systems. Actual physical environmental information can be used to remote control systems and management using various sensor technology and wireless network. These are used to managing physical distribution systems, complex monitoring environments such as fire detecting and various environments in the field of u-healthcare. Recently, decontamination and dismantling for nuclear plant have increasing interest after Fucushima nuclear accident. In this paper, a decommissioning support system is suggested for an effective management and control of work efficiency and of worker's status. This system makes effective real-time monitoring worker's location, work status and radiation exposure and effective response for worker's safety and emergency situation

  20. A note on the security of IS-RFID, an inpatient medication safety.

    Science.gov (United States)

    Safkhani, Masoumeh; Bagheri, Nasour; Naderi, Majid

    2014-01-01

    In this paper we investigate the security level of a comprehensive RFID solution to enhance inpatient medication safety, named IS-RFID, which has been recently proposed by Peris-Lopez et al. We analyses the security of the protocol against the known attacks in the context. The main target of this paper is to determine whether the new protocol provides the confidentiality property, which is expected to be provided by such a protocol. It was found that IS-RFID has critical weaknesses. The presented security investigations show that a passive adversary can retrieve secret parameters of patient's tag in cost of O(2(16)) off-line PRNG evaluations. Given the tag's secret parameters, any security claims are ruined. In this paper we presented an efficient passive secret disclosure attack which retrieves the main secret parameters related to the patient which shows that IS-RFID may put the patient safety on risk. The proposed attacking technique is in light of two vulnerabilities of the protocol: (1) the short length of the used PRNG, which is urged by the target technology, EPC C1 Gen2 ; (2) the message-generating mechanism utilizing PRNG was not carefully scrutinized. While the later point can be fixed by careful designing of the transferred messages between the protocol's party, the earlier point, i.e., the short length of the available PRNG for EPC C1 Gen2 tags, is a limitation which is forced by the technology. In addition, over the last years, schemes based solely on using simple operations or short PRNG (such as IS-RFID) have been shown to offer very low or no security at all. Recent advances in lightweight ciphers, such as PRESENT or Grain , seem a much more appropriate solution rather than relying on short PRNGs. However, such solutions breaks the EPC C1 Gen2 compatibility. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  1. Near Field UHF RFID Antenna System Enabling the Tracking of Small Laboratory Animals

    Directory of Open Access Journals (Sweden)

    Luca Catarinucci

    2013-01-01

    Full Text Available Radio frequency identification (RFID technology is more and more adopted in a wide range of applicative scenarios. In many cases, such as the tracking of small-size living animals for behaviour analysis purposes, the straightforward use of commercial solutions does not ensure adequate performance. Consequently, both RFID hardware and the control software should be tailored for the particular application. In this work, a novel RFID-based approach enabling an effective localization and tracking of small-sized laboratory animals is proposed. It is mainly based on a UHF Near Field RFID multiantenna system, to be placed under the animals’ cage, and able to rigorously identify the NF RFID tags implanted in laboratory animals (e.g., mice. Once the requirements of the reader antenna have been individuated, the antenna system has been designed and realized. Moreover, an algorithm based on the measured Received Signal Strength Indication (RSSI aiming at removing potential ambiguities in data captured by the multiantenna system has been developed and integrated. The animal tracking system has been largely tested on phantom mice in order to verify its ability to precisely localize each subject and to reconstruct its path. The achieved and discussed results demonstrate the effectiveness of the proposed tracking system.

  2. Unclonable RFID-based tag-seal for storage containers

    Energy Technology Data Exchange (ETDEWEB)

    Bauer, Todd [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hamlet, Jason [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Martin, Mitchell Tyler [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-10-01

    We are using the DoD MIL-STD as our guide for microelectronics aging (MIL-STD 883J, Method 1016.2: Life/Reliability Characterization Tests). In that document they recommend aging at 3 temperatures between 200-300C, separated by at least 25C, with the supply voltage at the maximum recommended voltage for the devices at 125C (3.6V in our case). If that voltage causes excessive current or power then it can be reduced and the duration of the tests extended. The MIL-STD also recommends current limiting resistors in series with the supply. Since we don’t have much time and we may not have enough ovens and other equipment, two temperatures separated by at least 50C would be an acceptable backup plan. To ensure a safe range of conditions is used, we are executing 24-hour step tests. For these, we will apply the stress for 24 hours and then measure the device to make sure it wasn’t damaged. During the stress the PUFs should be exercised, but we don’t need to measure their response. Rather, at set intervals our devices should be returned to nominal temperature (under bias), and then measured. The MIL-STD puts these intervals at 4, 8, 16, 32, 64, 128, 256, 512 and 1000 hours, although the test can be stopped early if 75% of the devices have failed. A final recommendation per the MIL-STD is that at least 40 devices should be measured under each condition. Since we only have 25 parts, we will place 10 devices in each of two stress conditions.

  3. RFID tag modification for full depth backscatter modulation

    Science.gov (United States)

    Scott, Jeffrey Wayne [Pasco, WA; Pratt, Richard M [Richland, WA

    2010-07-20

    A modulated backscatter radio frequency identification device includes a diode detector configured to selectively modulate a reply signal onto an incoming continuous wave; communications circuitry configured to provide a modulation control signal to the diode detector, the diode detector being configured to modulate the reply signal in response to be modulation control signal; and circuitry configured to increase impedance change at the diode detector which would otherwise not occur because the diode detector rectifies the incoming continuous wave while modulating the reply signal, whereby reducing the rectified signal increases modulation depth by removing the reverse bias effects on impedance changes. Methods of improving depth of modulation in a modulated backscatter radio frequency identification device are also provided.

  4. Monitorización de la Condición Física de Personas en Espacios Confinados Mediante Etiquetas RFID con Sensores y Redes Inalámbricas Eficientes

    Directory of Open Access Journals (Sweden)

    Javier G. -Escribano

    2011-10-01

    Full Text Available Resumen: La situación y la condición física de los trabajadores que realizan su labor en el interior de ciertos espacios confinados o peligrosos es una información muy importante. Las empresas de seguridad laboral consideran crucial obtener tal información para poder observar y determinar los riesgos potenciales a los que el personal puede estar sometido. Los sistemas que se han venido utilizando no incluyen en la mayoría de los casos la monitorización personalizada de cada individuo. En este trabajo se ha diseñado un sistema basado en “Wireless Sensor Networks” energéticamente eficientes y RFID para conseguir el posicionamiento y la monitorización de personas que trabajan en el interior de espacios confinados potencialmente peligrosos. El sistema diseñado es capaz de identificar a cada trabajador, localizarlo y enviar datos relativos a su situación física tanto si éste se encuentra en un espacio libre como cerrado. Además, en situaciones de emergencia como caídas libres o pérdidas del conocimiento, el sistema envía una alarma. Los resultados demuestran que la utilización de este sistema permite conocer en tiempo real, y de forma energéticamente eficiente, la posición de cada trabajador, y analizar el riesgo potencial al que el mismo se expone en cada momento. Al mismo tiempo, en caso de emergencia, el sistema permite una mayor rapidez en la intervención ya que por un lado, se sabe dónde y porqué se ha producido la alarma; y por otro, se conocen las condiciones físicas del trabajador en ese momento. Palabras clave: Acelerómetros, Sistemas de Emergencia, Control Automático, Redes, Ingeniería de Sistemas, Algoritmos de Enrutamiento, Transceptores, Telecomunicaciones

  5. Copper thin film for RFID UHF antenna on flexible substrate

    International Nuclear Information System (INIS)

    Tran, Nhan Ai; Tran, Huy Nam; Dang, Mau Chien; Fribourg-Blanc, Eric

    2010-01-01

    A process flow using photolithography and sputtering was studied for copper antenna fabrication on thin poly(ethylene terephthalate) (PET) substrate. The lift-off route was chosen for its flexibility at laboratory scale. It was clarified that the cleaning of PET is an important step that necessitates mild oxygen plasma etching. Then copper is sputter deposited after photolithographic definition of the antenna. Care is necessary since PET, as a very flexible substrate, is temperature sensitive. The temperature increase generated by the impact of deposited copper should be maintained below the glass transition temperature of the polymer to avoid detrimental deformation. dc power of 40 to 50 W was found to be the maximum possible sputtering power for commercial PET. It was found that the resistivity of the thin film is below two times the bulk resistivity of copper for a deposition pressure below 4×10 −3  mbar and thickness above 450 nm. These results enable the reliable fabrication of copper RFID UHF antennae on a PET substrate for further testing of new tag designs. The present paper summarizes the effort to test new designs of antennae for RadioFrequency IDentification (RFID) Ultra High Frequency (UHF) tags, for use in various applications (e.g. object tracking and environment monitoring) in Vietnam

  6. A Key Establishment Protocol for RFID User in IPTV Environment

    Science.gov (United States)

    Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho

    In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.

  7. Zeroth order resonator (ZOR) based RFID antenna design

    Science.gov (United States)

    Masud, Muhammad Mubeen

    Meander-line and multi-layer antennas have been used extensively to design compact UHF radio frequency identification (RFID) tags; however the overall size reduction of meander-line antennas is limited by the amount of parasitic inductance that can be introduced by each meander-line segment, and multi-layer antennas can be too costly. In this study, a new compact antenna topology for passive UHF RFID tags based on zeroth order resonant (ZOR) design techniques is presented. The antenna consists of lossy coplanar conductors and either inter-connected inter-digital capacitor (IDC) or shunt inductor unit-cells with a ZOR frequency near the operating frequency of the antenna. Setting the ZOR frequency near the operating frequency is a key component in the design process because the unit-cells chosen for the design are inductive at the operating frequency. This makes the unit-cells very useful for antenna miniaturization. These new designs in this work have several benefits: the coplanar layout can be printed on a single layer, matching inductive loops that reduce antenna efficiency are not required and ZOR analysis can be used for the design. Finally, for validation, prototype antennas are designed, fabricated and tested.

  8. Fully Roll-to-Roll Gravure Printable Wireless (13.56 MHz) Sensor-Signage Tags for Smart Packaging

    Science.gov (United States)

    Kang, Hwiwon; Park, Hyejin; Park, Yongsu; Jung, Minhoon; Kim, Byung Chul; Wallace, Gordon; Cho, Gyoujin

    2014-06-01

    Integration of sensing capabilities with an interactive signage through wireless communication is enabling the development of smart packaging wherein wireless (13.56 MHz) power transmission is used to interlock the smart packaging with a wireless (13.56 MHz) reader or a smart phone. Assembly of the necessary componentry for smart packaging on plastic or paper foils is limited by the manufacturing costs involved with Si based technologies. Here, the issue of manufacturing cost for smart packaging has been obviated by materials that allow R2R (roll-to-roll) gravure in combination with R2R coating processes to be employed. R2R gravure was used to print the wireless power transmission device, called rectenna (antenna, diode and capacitor), and humidity sensor on poly(ethylene terephtalate) (PET) films while electrochromic signage units were fabricated by R2R coating. The signage units were laminated with the R2R gravure printed rectenna and sensor to complete the prototype smart packaging.

  9. Implementasi Sistem Perparkiran Otomatis dengan Menentukan Posisi Parkir Berbasis RFId

    Directory of Open Access Journals (Sweden)

    FREEON ALKAPON IMBIRI

    2016-02-01

    Full Text Available ABSTRAK Apartemen merupakan salah satu tempat tinggal yang ideal di kota metropolitan yang menyediakan banyak fasilitas bagi penghuninya. Salah satu fasilitas tersebut adalah tersedianya area parkir yang memadai dan nyaman bagi penghuni yang memiliki kendaraan, pada kenyataannya saat ini sistem perparkiran yang digunakan masih bermasalah. Masalah yang ditimbulkan dalam sistem perparkiran adalah kurangnya informasi mengenai lahan parkir yang kosong serta penempatan kendaraan yang tidak sesuai sehingga sering kali pemilik kendaraan membutuhkan waktu yang lama untuk sekedar menemukan tempat parkir yang kosong. Berdasarkan hal itu diperlukan sebuah sistem monitoring parkir yang memudahkan pengendara kendaraan yang hendak parkir. Tujuan penelitian ini adalah merancang dan merealisasikan model sistem monitoring perparkiran dengan fasilitas pemilihan area parkir menggunakan Teknologi RFId. Perangkat lunak yang digunakan pada sistem ini dirancang dengan menggunakan bahasa C#. Pada sistem ini proses pengambilan data secara kontinyu menggunakan mikrokontroler Atmega16 sebagai komponen kendali utamanya. Pengujian dilakukan secara simulasi pada miniatur perparkiran. Hasil pengujian model sistem perparkiran dapat menampilkan kondisi dari masing-masing area parkir yang ditampilkan pada display. Sistem pengambilan data secara kontinyu menggunakan kartu RFId sistem ini dapat menggantikan operator. Sensor cahaya (LED dan LDR akan berlogika 1 jika ada mobil yang lewat. Kata kunci: Parkir, RFId, LED, LDR, Mikrokontroler, Atmega16, Microsoft Acess, C#. ABSTRACT Apartment is an ideal place of living in a big city ,it provides a lot of facilities .One of apartment facilities is a parking lot that are adequate and comfortable for its occupants who have vehicles . Problems caused in the parking system is the lack of information regarding the parking lot is empty and the placement of the vehicle that is not in accordance with the wishes so that often the owner of the

  10. RFID Electronic Label of Internet of Things Based on Logistics Management System%基于RFID电子标签的物联网物流管理系统

    Institute of Scientific and Technical Information of China (English)

    邓超

    2014-01-01

    该文首先对基于RFID电子标签进行分析,重点介绍了RFID技术和基于RFID电子标签;再根据不同的分类标准,介绍不同类型的RFID电子标签;指出RFID电子标签和传统条形码的区别,总结RFID电子标签的优点。然后,该文在重点介绍基于RFID电子标签物联网物流管理的工作流程,分析物联网物流管理系统功能及应用。%This paper first carries on the analysis to the RFID tag based, focusing on the introduction of RFID technology and RFID based electronic label; then according to different classification criteria, RFID electronic label of different types; pointed out the difference between RFID and the traditional bar code tag, summarize the advantages of RFID electronic label. Then, the RFID electronic tag IOT logistics management work flow based on the analysis of Internet of things in the emphasis on logistics management system function and application.

  11. A warning system based on the RFID technology for running-out of injection fluid.

    Science.gov (United States)

    Huang, Chi-Fang; Lin, Jen-Hung

    2011-01-01

    For providing an automatic warning system of running-out of injection fluid, RFID technology is applied in this work to propose an infrastructure with low cost to help nurses and patient's company. Specially, a RFID tag is designed and attached on a bag of intravenous drip to demonstrate the benefits in the present system. The main idea of this system is that, tag is disabled when the bag is not empty because of the EM loading due to the liquid contained. The bag can be any kind in the current market and be without any electronic attachment or modification. LAN (Local Area Network) is also applied as a part of this infrastructure for data transmission.

  12. CAcTμS: High-Voltage CMOS Monolithic Active Pixel Sensor for tracking and time tagging of charged particles

    CERN Document Server

    Guilloux, F.; Degerli, Y.; Elhosni, M.; Guyot, C.; Hemperek, T.; Lachkar, M.; Meyer, JP.; Ouraou, A.; Schwemling, P.; Vandenbroucke, M.

    2018-01-01

    The increase of luminosity foreseen for the Phase-II HL-LHC upgrades calls for new solutions to fight against the expected pile-up effects. One approach is to measure very accurately the time of arrival of the particles with a resolution of a few tens of picoseconds. In addition, a spatial granularity better than a few millimeter will be needed to obtain a fake jet rejection rate acceptable for physics analysis. These goals could be achieved by using the intrinsic benefits of a standard High-Voltage CMOS technology – in conjunction with a high-resistivity detector material – leading to a fast, integrated, rad-hard, fully depleted monolithic active pixel sensor ASIC.

  13. An intelligent IoT emergency vehicle warning system using RFID and Wi-Fi technologies for emergency medical services.

    Science.gov (United States)

    Lai, Yeong-Lin; Chou, Yung-Hua; Chang, Li-Chih

    2018-01-01

    Collisions between emergency vehicles for emergency medical services (EMS) and public road users have been a serious problem, impacting on the safety of road users, emergency medical technicians (EMTs), and the patients on board. The aim of this study is to develop a novel intelligent emergency vehicle warning system for EMS applications. The intelligent emergency vehicle warning system is developed by Internet of Things (IoT), radio-frequency identification (RFID), and Wi-Fi technologies. The system consists of three major parts: a system trigger tag, an RFID system in an emergency vehicle, and an RFID system at an intersection. The RFID system either in an emergency vehicle or at an intersection contains a controller, an ultrahigh-frequency (UHF) RFID reader module, a Wi-Fi module, and a 2.4-GHz antenna. In addition, a UHF ID antenna is especially designed for the RFID system in an emergency vehicle. The IoT system provides real-time visual warning at an intersection and siren warning from an emergency vehicle in order to effectively inform road users about an emergency vehicle approaching. The developed intelligent IoT emergency vehicle warning system demonstrates the capabilities of real-time visual and siren warnings for EMS safety.

  14. An Operator Perspective from a Facility Evaluation of an RFID-Based UF6 Cylinder Accounting and Tracking System

    International Nuclear Information System (INIS)

    Martyn, Rose; Fitzgerald, Peter; Stehle, Nicholas D.; Rowe, Nathan C.; Younkin, James R.

    2011-01-01

    An operational field test of a Radio-Frequency Identification (RFID) system for tracking and accounting UF6 cylinders was conducted at the Global Nuclear Fuel Americas (GNF) fuel fabrication plant in 2009. The Cylinder Accountability and Tracking System (CATS) was designed and deployed by Oak Ridge National Laboratory (ORNL) and evaluated in cooperation with GNF. The system required that passive RFID be attached to several UF6 30B cylinders as they were received at the site; then the cylinders were tracked as they proceeded to interim storage, to processing in an autoclave, and eventually to disposition from the site. This CATS deployment also provided a direct integration of scale data from the site accountability scales. The integration of this information into the tracking data provided an attribute for additional safeguards for evaluation. The field test provided insight into the advantages and challenges of using RFID at an operating nuclear facility. The RFID system allowed operators to interact with the technology and demonstrated the survivability of the tags and reader equipment in the process environment. This paper will provide the operator perspective on utilizing RFID technology for locating cylinders within the facility, thereby tracking the cylinders for process and for Material Control and Accounting functions. The paper also will present the operator viewpoint on RFID implemented as an independent safeguards system.

  15. RFID/RTLS Application to Remanufacturing Operations in the US Department of Defense

    OpenAIRE

    Ferrer, Geraldo; Dew, Nicholas

    2008-01-01

    Sponsored Report (for Acquisition Research Program) The most efficient use of the DoD''s network of remanufacturing depots is an important concern because of the extensive requirement to recapitalize the military equipment used in Iraq and Afghanistan through product recovery. In this report, we consider the use of radio frequency identification (RFID) technology in improving remanufacturing efficiency. We first provide a framework for understanding the choice between permanently tagging...

  16. Classifying RFID attacks and defenses

    NARCIS (Netherlands)

    Mitrokotsa, A.; Rieback, M.R.; Tanenbaum, A.S.

    2009-01-01

    RFID (Radio Frequency Identification) systems are one of the most pervasive computing technologies with technical potential and profitable opportunities in a diverse area of applications. Among their advantages is included their low cost and their broad applicability. However, they also present a

  17. The Potential and Beneficial Use of Weigh-In-Motion (WIM) Systems Integrated with Radio Frequency Identification (RFID) Systems for Characterizing Disposal of Waste Debris to Optimize the Waste Shipping Process

    International Nuclear Information System (INIS)

    Abercrombie, Robert K.; Buckner, Dooley Jr.; Newton, David D.

    2010-01-01

    The Oak Ridge National Laboratory (ORNL) Weigh-In-Motion (WIM) system provides a portable and/or semi-portable means of accurately weighing vehicles and its cargo as each vehicle crosses the scales (while in motion), and determining (1) axle weights and (2) axle spacing for vehicles (for determination of Bridge Formula compliance), (3) total vehicle/cargo weight and (4) longitudinal center of gravity (for safety considerations). The WIM system can also weigh the above statically. Because of the automated nature of the WIM system, it eliminates the introduction of human errors caused by manual computations and data entry, adverse weather conditions, and stress. Individual vehicles can be weighed continuously at low speeds (approximately 3-10 mph) and at intervals of less than one minute. The ORNL WIM system operates and is integrated into the Bethel Jacobs Company Transportation Management and Information System (TMIS, a Radio-Frequency Identification (RFID) enabled information system). The integrated process is as follows: Truck Identification Number and Tare Weight are programmed into a RFID Tag. Handheld RFID devices interact with the RFID Tag, and Electronic Shipping Document is written to the RFID Tag. The RFID tag read by an RFID tower identifies the vehicle and its associated cargo, the specific manifest of radioactive debris for the uniquely identified vehicle. The weight of the cargo (in this case waste debris) is calculated from total vehicle weight information supplied from WIM to TMIS and is further processed into the Information System and kept for historical and archival purposes. The assembled data is the further process in downstream information systems where waste coordination activities at the Y-12 Environmental Management Waste Management Facility (EMWMF) are written to RFID Tag. All cycle time information is monitored by Transportation Operations and Security personnel.

  18. A novel method of robot location using RFID and stereo vision

    Science.gov (United States)

    Chen, Diansheng; Zhang, Guanxin; Li, Zhen

    2012-04-01

    This paper proposed a new global localization method for mobile robot based on RFID (Radio Frequency Identification Devices) and stereo vision, which makes the robot obtain global coordinates with good accuracy when quickly adapting to unfamiliar and new environment. This method uses RFID tags as artificial landmarks, the 3D coordinate of the tags under the global coordinate system is written in the IC memory. The robot can read it through RFID reader; meanwhile, using stereo vision, the 3D coordinate of the tags under the robot coordinate system is measured. Combined with the robot's attitude coordinate system transformation matrix from the pose measuring system, the translation of the robot coordinate system to the global coordinate system is obtained, which is also the coordinate of the robot's current location under the global coordinate system. The average error of our method is 0.11m in experience conducted in a 7m×7m lobby, the result is much more accurate than other location method.

  19. RFID-Based Human Behavior Modeling and Anomaly Detection for Elderly Care

    Directory of Open Access Journals (Sweden)

    Hui-Huang Hsu

    2010-01-01

    Full Text Available This research aimed at building an intelligent system that can detect abnormal behavior for the elderly at home. Active RFID tags can be deployed at home to help collect daily movement data of the elderly who carries an RFID reader. When the reader detects the signals from the tags, RSSI values that represent signal strength are obtained. The RSSI values are reversely related to the distance between the tags and the reader and they are recorded following the movement of the user. The movement patterns, not the exact locations, of the user are the major concern. With the movement data (RSSI values, the clustering technique is then used to build a personalized model of normal behavior. After the model is built, any incoming datum outside the model can be viewed as abnormal and an alarm can be raised by the system. In this paper, we present the system architecture for RFID data collection and preprocessing, clustering for anomaly detection, and experimental results. The results show that this novel approach is promising.

  20. Estimating Human Physical States from Chronological Gait Features Acquired with RFID Technology

    Directory of Open Access Journals (Sweden)

    Yoshihiro UEMURA

    2015-11-01

    Full Text Available This paper proposes a method to estimate the state of the user to provide proactive hospitality from features of their gait pattern acquired with a Radio Frequency Identifier (RFID system. This method uses RFID readers on each shoe, as well as RFID tags installed on the floor. The ID of each tag is organized as a map, to show the precise position of the user. The reader and tags communicate while the user is walking. We extract feature components which represents gait patterns. Two-way ANOVA test and correlation analysis are conducted to find significant features. We classify the state of the user from these components with the Naȉve Bayes, the Support Vector Machine, and the Random Forest. Compared with each combination of the analysis and the machine learning method, the most efficient way is found to identify the state of the user. The experimental results show that different state of users can be classified appropriately. Finally, variable importance and the feasibility of proposed method are discussed to show potential implications of the proposed approach.

  1. Notes on SAW Tag Interrogation Techniques

    Science.gov (United States)

    Barton, Richard J.

    2010-01-01

    We consider the problem of interrogating a single SAW RFID tag with a known ID and known range in the presence of multiple interfering tags under the following assumptions: (1) The RF propagation environment is well approximated as a simple delay channel with geometric power-decay constant alpha >/= 2. (2) The interfering tag IDs are unknown but well approximated as independent, identically distributed random samples from a probability distribution of tag ID waveforms with known second-order properties, and the tag of interest is drawn independently from the same distribution. (3) The ranges of the interfering tags are unknown but well approximated as independent, identically distributed realizations of a random variable rho with a known probability distribution f(sub rho) , and the tag ranges are independent of the tag ID waveforms. In particular, we model the tag waveforms as random impulse responses from a wide-sense-stationary, uncorrelated-scattering (WSSUS) fading channel with known bandwidth and scattering function. A brief discussion of the properties of such channels and the notation used to describe them in this document is given in the Appendix. Under these assumptions, we derive the expression for the output signal-to-noise ratio (SNR) for an arbitrary combination of transmitted interrogation signal and linear receiver filter. Based on this expression, we derive the optimal interrogator configuration (i.e., transmitted signal/receiver filter combination) in the two extreme noise/interference regimes, i.e., noise-limited and interference-limited, under the additional assumption that the coherence bandwidth of the tags is much smaller than the total tag bandwidth. Finally, we evaluate the performance of both optimal interrogators over a broad range of operating scenarios using both numerical simulation based on the assumed model and Monte Carlo simulation based on a small sample of measured tag waveforms. The performance evaluation results not only

  2. The Design of a Lightweight RFID Middleware

    Directory of Open Access Journals (Sweden)

    Fengqun Lin

    2009-10-01

    Full Text Available Radio Frequency Identification (RFID middleware is often regarded as the central nervous system of RFID systems. In this paper, a lightweight RFID middleware is designed and implemented without the need of an Application Level Events (ALE structure, and its implementation process is described using a typical commerical enterprise. A short review of the current RFID middleware research and development is also included. The characteristics of RFID middleware are presented with a two-centric framework. The senarios of RFID data integration based on the simplified structure are provided to illuminats the design and implementation of the lightweight middleware structure and its development process. The lightweight middleware is easy to maintain and extend because of the simplified and streamlined structure and the short development cycle.

  3. RFID Applications: An Introductory and Exploratory Study

    OpenAIRE

    Hanifa Shah; Kamran Ahsan; Paul Kingston

    2010-01-01

    RFID is not a new technology and has passed through many decades of use in military, airline, library, security, healthcare, sports, animal farms and other areas. Industries use RFID for various applications such as personal/vehicle access control, departmental store security, equipment tracking, baggage, fast food establishments, logistics, etc. The enhancement in RFID technology has brought advantages that are related to resource optimization, increased efficiency within business processes,...

  4. Nanoantenna harmonic sensor: theoretical analysis of contactless detection of molecules with light

    KAUST Repository

    Farhat, Mohamed; Cheng, Mark M C; Le, Khai Q; Chen, Pai-Yen

    2015-01-01

    The nonlinear harmonic sensor is a popular wireless sensor and radiofrequency identification (RFID) technique, which allows high-performance sensing in a severe interference/clutter background by transmitting a radio wave and detecting its modulated higher-order harmonics. Here we introduce the concept and design of optical harmonic tags based on nonlinear nanoantennas that can contactlessly detect electronic (e.g. electron affinity) and optical (e.g. relative permittivity) characteristics of molecules. By using a dual-resonance gold-molecule–silver nanodipole antenna within the quantum mechanical realm, the spectral form of the second-harmonic scattering can sensitively reveal the physical properties of molecules, paving a new route towards optical molecular sensors and optical identification (OPID) of biological, genetic, and medical events for the 'Internet of Nano-Things'.

  5. Nanoantenna harmonic sensor: theoretical analysis of contactless detection of molecules with light

    KAUST Repository

    Farhat, Mohamed

    2015-09-25

    The nonlinear harmonic sensor is a popular wireless sensor and radiofrequency identification (RFID) technique, which allows high-performance sensing in a severe interference/clutter background by transmitting a radio wave and detecting its modulated higher-order harmonics. Here we introduce the concept and design of optical harmonic tags based on nonlinear nanoantennas that can contactlessly detect electronic (e.g. electron affinity) and optical (e.g. relative permittivity) characteristics of molecules. By using a dual-resonance gold-molecule–silver nanodipole antenna within the quantum mechanical realm, the spectral form of the second-harmonic scattering can sensitively reveal the physical properties of molecules, paving a new route towards optical molecular sensors and optical identification (OPID) of biological, genetic, and medical events for the \\'Internet of Nano-Things\\'.

  6. Nanoantenna harmonic sensor: theoretical analysis of contactless detection of molecules with light

    International Nuclear Information System (INIS)

    Farhat, Mohamed; Cheng, Mark M C; Chen, Pai-Yen; Le, Khai Q

    2015-01-01

    The nonlinear harmonic sensor is a popular wireless sensor and radiofrequency identification (RFID) technique, which allows high-performance sensing in a severe interference/clutter background by transmitting a radio wave and detecting its modulated higher-order harmonics. Here we introduce the concept and design of optical harmonic tags based on nonlinear nanoantennas that can contactlessly detect electronic (e.g. electron affinity) and optical (e.g. relative permittivity) characteristics of molecules. By using a dual-resonance gold-molecule–silver nanodipole antenna within the quantum mechanical realm, the spectral form of the second-harmonic scattering can sensitively reveal the physical properties of molecules, paving a new route towards optical molecular sensors and optical identification (OPID) of biological, genetic, and medical events for the ‘Internet of Nano-Things’. (paper)

  7. Handbook of smart antennas for RFID systems

    CERN Document Server

    2010-01-01

    The Handbook of Smart Antennas for RFID Systems is a single comprehensive reference on the smart antenna technologies applied to RFID. This book will provide a timely reference book for researchers and students in the areas of both smart antennas and RFID technologies. It is the first book to combine two of the most important wireless technologies together in one book. The handbook will feature chapters by leading experts in both academia and industry offering an in-depth description of terminologies and concepts related to smart antennas in various RFID systems applications.

  8. TRACKING AND MONITORING OF TAGGED OBJECTS EMPLOYING PARTICLE SWARM OPTIMIZATION ALGORITHM IN A DEPARTMENTAL STORE

    Directory of Open Access Journals (Sweden)

    Indrajit Bhattacharya

    2011-05-01

    Full Text Available The present paper proposes a departmental store automation system based on Radio Frequency Identification (RFID technology and Particle Swarm Optimization (PSO algorithm. The items in the departmental store spanned over different sections and in multiple floors, are tagged with passive RFID tags. The floor is divided into number of zones depending on different types of items that are placed in their respective racks. Each of the zones is placed with one RFID reader, which constantly monitors the items in their zone and periodically sends that information to the application. The problem of systematic periodic monitoring of the store is addressed in this application so that the locations, distributions and demands of every item in the store can be invigilated with intelligence. The proposed application is successfully demonstrated on a simulated case study.

  9. Optimization of RFID network planning using Zigbee and WSN

    Science.gov (United States)

    Hasnan, Khalid; Ahmed, Aftab; Badrul-aisham, Bakhsh, Qadir

    2015-05-01

    Everyone wants to be ease in their life. Radio frequency identification (RFID) wireless technology is used to make our life easier. RFID technology increases productivity, accuracy and convenience in delivery of service in supply chain. It is used for various applications such as preventing theft of automobiles, tolls collection without stopping, no checkout lines at grocery stores, managing traffic, hospital management, corporate campuses and airports, mobile asset tracking, warehousing, tracking library books, and to track a wealth of assets in supply chain management. Efficiency of RFID can be enhanced by integrating with wireless sensor network (WSN), zigbee mesh network and internet of things (IOT). The proposed system is used for identifying, sensing and real-time locating system (RTLS) of items in an indoor heterogeneous region. The system gives real-time richer information of object's characteristics, location and their environmental parameters like temperature, noise and humidity etc. RTLS reduce human error, optimize inventory management, increase productivity and information accuracy at indoor heterogeneous network. The power consumption and the data transmission rate of the system can be minimized by using low power hardware design.

  10. 77 FR 51761 - Proposed Information Collection; Comment Request; Groundfish Tagging Program

    Science.gov (United States)

    2012-08-27

    ... required by the Paperwork Reduction Act of 1995. DATES: Written comments must be submitted on or before... are two general categories of tags. Simple plastic tags (spaghetti tags) are external tags... fish. Archival tags are microchips with sensors encased in plastic cylinders that record the depth...

  11. Optimalization of selected RFID systems Parameters

    Directory of Open Access Journals (Sweden)

    Peter Vestenicky

    2004-01-01

    Full Text Available This paper describes procedure for maximization of RFID transponder read range. This is done by optimalization of magnetics field intensity at transponder place and by optimalization of antenna and transponder coils coupling factor. Results of this paper can be used for RFID with inductive loop, i.e. system working in near electromagnetic field.

  12. RFID Technologies : emerging issues and challenges

    NARCIS (Netherlands)

    Lieshout, M.J. van; Kool, L.

    2007-01-01

    In this paper we will present the results of a technology and policy assessment we have performed on emerging issues and policy challenges of RFID technologies. RFID is a basic component of the future internet of things. A balanced view on opportunities and threats, on drivers and barriers is needed

  13. An Assessment of RFID Applications in Manufacturing Companies

    Directory of Open Access Journals (Sweden)

    Gładysz Bartłomiej

    2015-12-01

    Full Text Available The meaning of Cyber Physical Systems and an Internet of Things with indication of RFID position in those concepts was outlined. Research program related to assessment of RFID technology was presented. Author deducted on problems related to RFID implementations and RFID essentially for logistics of manufacturing companies. Research goals and problems were formulated. Tools, techniques, models and methods that could be utilized were proposed and discussed. Research was focused on design of a new method to support early decision making phases for RFID application in logistics of manufacturing companies. Author stated that literature and practice lacks of complex method to answer if RFID is strategically important for the company, which processes should be RFID-supported, how RFID-supported processes should be designed and if RFID-support is rational. Framework for assessment of RFID technology with illustrative example was discussed.

  14. RTLS vs RFID partnership or competition?

    Directory of Open Access Journals (Sweden)

    2011-09-01

    Full Text Available The constant technological development entails increasing needs of a precise identification and location of objects. A natural and proved way of fulfilling identification needs is using Optical Character Recognition (OMR, mostly bar codes or Radio Frequency Identification (RFID. However, applying RFID to locate objects is a big challenge. In applications, which require both identification and location of objects, RTLS (Real-Time Location Systems can be very helpful. Apart from the identification, RTLS ensures also the real-time objects' location. A range of possible RTLS applications coincides with the ones of RFID. Does that mean that RTLS is a next stage of RFID development? In the following paper, the authors are pursuing to answer a question, if RTLS is complementary or competitive towards RFID?

  15. Radioactive source monitoring system based on RFID and GPRS

    International Nuclear Information System (INIS)

    He Haiyang; Zhou Hongliang; Zhang Hongjian; Zhang Sheng; Zhou Junru; Weng Guojie

    2011-01-01

    Nuclear radiation produced by radioactive source is harmful to the health of human body, and the lost and theft of radioactive source will cause environmental pollution and social panic. In order to solve the abnormal leaks, accidental loss, theft and other problems of the radioactive source, a radioactive source monitoring system based on RFID, GPS, GPRS and GSM technology is put forward. Radiation dose detector and GPS wireless location module are used to obtain the information of radiation dose and location respectively, RFID reader reads the status of a tag fixed on the bottom of the radioactive source. All information is transmitted to the remote monitoring center via GPRS wireless transmission. There will be an audible and visual alarm when radiation dose is out of limits or the state of radioactive source is abnormal, and the monitoring center will send alarming text messages to the managers through GSM Modem at the same time. Thus, the functions of monitoring and alarming are achieved. The system has already been put into operation and is being kept in functional order. It can provide stable statistics as well as accurate alarm, improving the supervision of radioactive source effectively. (authors)

  16. PENGADOPSIAN TEKNOLOGI RFID DI RUMAH SAKIT INDONESIA, MANFAAT DAN HAMBATANNYA

    OpenAIRE

    Iwan Vanany; Awaluddin Bin Mohamed Shaharoun

    2009-01-01

    This paper explores the benefit and barriers of RFID (Radio Frequency Identification) technology adoption in Indonesian hospitals context. The investigation methods of this research used interview and semi-structured questionnaire on RFID consultants, RFID researchers, and big hospital managers in Java Island. The benefits and barriers of RFID technology adoption are identified from literature review. The barriers of RFID technology adoption are divided into two aspects, i.e., as business and...

  17. Using Kalman Filters to Reduce Noise from RFID Location System

    Science.gov (United States)

    Xavier, José; Reis, Luís Paulo; Petry, Marcelo

    2014-01-01

    Nowadays, there are many technologies that support location systems involving intrusive and nonintrusive equipment and also varying in terms of precision, range, and cost. However, the developers some time neglect the noise introduced by these systems, which prevents these systems from reaching their full potential. Focused on this problem, in this research work a comparison study between three different filters was performed in order to reduce the noise introduced by a location system based on RFID UWB technology with an associated error of approximately 18 cm. To achieve this goal, a set of experiments was devised and executed using a miniature train moving at constant velocity in a scenario with two distinct shapes—linear and oval. Also, this train was equipped with a varying number of active tags. The obtained results proved that the Kalman Filter achieved better results when compared to the other two filters. Also, this filter increases the performance of the location system by 15% and 12% for the linear and oval paths respectively, when using one tag. For a multiple tags and oval shape similar results were obtained (11–13% of improvement). PMID:24592186

  18. New IoT proximity service based heterogeneous RFID readers collision control

    Directory of Open Access Journals (Sweden)

    Jose Ignacio Tamayo Segarra

    2017-08-01

    Full Text Available Purpose – Internet of Things’ (IoT’s first wave started with tracking services for better inventory management mainly using radio frequency identification (RFID technology. Later on, monitoring services became one of the major interests, including sensing technologies, and then more actuation for remote control-type of IoT applications such as smart homes, smart cities and Industry 4.0. In this paper, the authors focus on the RFID technology impairment. They propose to take advantage of the mature IoT technologies that offer native service discovery such as blutooth or LTE D2D ProSe or Wifi Direct. Using the automatic service discovery in the new framework will make heterogeneous readers aware of the presence of other readers and this will be used by the proposed distributed algorithm to better control the multiple RFID reader interference problem. The author clearly considers emerging Industry 4.0 use case, where RFID technology is of major interest for both identification and tracking. To enhance the RFID tag reading performance, collisions in the RFID frequency should be minimized with reader-to-reader coordination protocols. In this paper, the author proposes a simple distributed reader anti-collision protocol named DiSim that makes use of proximity services of IoT network and is compliant with the current RFID standards. The author evaluates the efficiency of the proposal via simulation. Design/methodology/approach – In this paper, the author proposes a simple distributed reader anti-collision protocol named DiSim that makes use of proximity services of IoT network and is compliant with the current RFID standards. The author evaluates the efficiency of the proposal via simulation to study its behavior in very dense and heterogeneous RFID environments. Specifically, the author explores the coexistence of powerful static readers and small mobile readers, comparing the proposal with a standard ETSI CSMA method. The proposal reduces

  19. Modeling of RFID-Enabled Real-Time Manufacturing Execution System in Mixed-Model Assembly Lines

    Directory of Open Access Journals (Sweden)

    Zhixin Yang

    2015-01-01

    Full Text Available To quickly respond to the diverse product demands, mixed-model assembly lines are well adopted in discrete manufacturing industries. Besides the complexity in material distribution, mixed-model assembly involves a variety of components, different process plans and fast production changes, which greatly increase the difficulty for agile production management. Aiming at breaking through the bottlenecks in existing production management, a novel RFID-enabled manufacturing execution system (MES, which is featured with real-time and wireless information interaction capability, is proposed to identify various manufacturing objects including WIPs, tools, and operators, etc., and to trace their movements throughout the production processes. However, being subject to the constraints in terms of safety stock, machine assignment, setup, and scheduling requirements, the optimization of RFID-enabled MES model for production planning and scheduling issues is a NP-hard problem. A new heuristical generalized Lagrangian decomposition approach has been proposed for model optimization, which decomposes the model into three subproblems: computation of optimal configuration of RFID senor networks, optimization of production planning subjected to machine setup cost and safety stock constraints, and optimization of scheduling for minimized overtime. RFID signal processing methods that could solve unreliable, redundant, and missing tag events are also described in detail. The model validity is discussed through algorithm analysis and verified through numerical simulation. The proposed design scheme has important reference value for the applications of RFID in multiple manufacturing fields, and also lays a vital research foundation to leverage digital and networked manufacturing system towards intelligence.

  20. Enhanced TDMA Based Anti-Collision Algorithm with a Dynamic Frame Size Adjustment Strategy for Mobile RFID Readers

    Directory of Open Access Journals (Sweden)

    Kwang Cheol Shin

    2009-02-01

    Full Text Available In the fields of production, manufacturing and supply chain management, Radio Frequency Identification (RFID is regarded as one of the most important technologies. Nowadays, Mobile RFID, which is often installed in carts or forklift trucks, is increasingly being applied to the search for and checkout of items in warehouses, supermarkets, libraries and other industrial fields. In using Mobile RFID, since the readers are continuously moving, they can interfere with each other when they attempt to read the tags. In this study, we suggest a Time Division Multiple Access (TDMA based anti-collision algorithm for Mobile RFID readers. Our algorithm automatically adjusts the frame size of each reader without using manual parameters by adopting the dynamic frame size adjustment strategy when collisions occur at a reader. Through experiments on a simulated environment for Mobile RFID readers, we show that the proposed method improves the number of successful transmissions by about 228% on average, compared with Colorwave, a representative TDMA based anti-collision algorithm.

  1. Enhanced TDMA Based Anti-Collision Algorithm with a Dynamic Frame Size Adjustment Strategy for Mobile RFID Readers.

    Science.gov (United States)

    Shin, Kwang Cheol; Park, Seung Bo; Jo, Geun Sik

    2009-01-01

    In the fields of production, manufacturing and supply chain management, Radio Frequency Identification (RFID) is regarded as one of the most important technologies. Nowadays, Mobile RFID, which is often installed in carts or forklift trucks, is increasingly being applied to the search for and checkout of items in warehouses, supermarkets, libraries and other industrial fields. In using Mobile RFID, since the readers are continuously moving, they can interfere with each other when they attempt to read the tags. In this study, we suggest a Time Division Multiple Access (TDMA) based anti-collision algorithm for Mobile RFID readers. Our algorithm automatically adjusts the frame size of each reader without using manual parameters by adopting the dynamic frame size adjustment strategy when collisions occur at a reader. Through experiments on a simulated environment for Mobile RFID readers, we show that the proposed method improves the number of successful transmissions by about 228% on average, compared with Colorwave, a representative TDMA based anti-collision algorithm.

  2. Thermal characterization of screen printed conductive pastes for RFID antennas

    Energy Technology Data Exchange (ETDEWEB)

    Janeczek, Kamil, E-mail: kamil.janeczek@itr.org.pl [Tele and Radio Research Institute, 11 Ratuszowa Street, 03-450 Warsaw (Poland); Jakubowska, Malgorzata [Institute of Electronic Materials Technology, 133 Wolczynska Street, 01-919 Warsaw (Poland); Warsaw University of Technology, Institute of Metrology and Biomedical Engineering, 8 Sankt Andrzej Bobola Street, 02-525 Warsaw (Poland); Mlozniak, Anna [Institute of Electronic Materials Technology, 133 Wolczynska Street, 01-919 Warsaw (Poland); Koziol, Grazyna [Tele and Radio Research Institute, 11 Ratuszowa Street, 03-450 Warsaw (Poland)

    2012-09-01

    Thermal resistance is an essential aspect of electronic circuits designing. It leads to unexpected changes in electronic components during their work. In this study, new materials for screen printed RFID tag's antennas were characterized in terms of their resistance to thermal exposure. Polymer materials containing silver flakes, silver nanopowder, carbon nanotubes or conductive polymer PEDOT:PSS were elaborated and used for antenna printing on flexible materials. In order to verify their long term susceptibility to damages caused by the changing environmental conditions, the temperature cycling test was used in three different temperature ranges: +65 Degree-Sign C, -12 Degree-Sign C, -40 Degree-Sign C/+85 Degree-Sign C (3 h in each temp., dwell time 1 h). The highest durability to thermal exposure exhibited the paste with carbon nanotubes dispersed in poly(methyl methacrylate) PMMA and the lowest one - the paste with conductive polymer PEDOT:PSS.

  3. Thermal characterization of screen printed conductive pastes for RFID antennas

    International Nuclear Information System (INIS)

    Janeczek, Kamil; Jakubowska, Małgorzata; Młożniak, Anna; Kozioł, Grażyna

    2012-01-01

    Thermal resistance is an essential aspect of electronic circuits designing. It leads to unexpected changes in electronic components during their work. In this study, new materials for screen printed RFID tag's antennas were characterized in terms of their resistance to thermal exposure. Polymer materials containing silver flakes, silver nanopowder, carbon nanotubes or conductive polymer PEDOT:PSS were elaborated and used for antenna printing on flexible materials. In order to verify their long term susceptibility to damages caused by the changing environmental conditions, the temperature cycling test was used in three different temperature ranges: +65 °C, −12 °C, −40 °C/+85 °C (3 h in each temp., dwell time 1 h). The highest durability to thermal exposure exhibited the paste with carbon nanotubes dispersed in poly(methyl methacrylate) PMMA and the lowest one – the paste with conductive polymer PEDOT:PSS.

  4. Ultra-secure RF Tags for Safeguards and Security - SBIR Phase II Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Twogood, Richard E [Dirac Solutions Inc., Pleasanton, CA (United States)

    2015-01-27

    This is the Final Report for the DOE Phase II SBIR project “Ultra-secure RF Tags for Safeguards and Security.” The topics covered herein include technical progress made, progress against the planned milestones and deliverables, project outcomes (results, collaborations, intellectual property, etc.), and a discussion on future expectations of deployment and impacts of the results of this work. In brief, all planned work for the project was successfully completed, on or ahead of schedule and on budget. The major accomplishment was the successful development of a very advanced passive ultra-secure RFID tag system with combined security features unmatched by any commercially available ones. These tags have high-level dynamic encrypted authentication, a novel tamper-proofing mechanism, system software including graphical user interfaces and networking, and integration with a fiber-optic seal mechanism. This is all accomplished passively (with no battery) by incorporating sophisticated hardware in the tag which harvests the energy from the RFID readers that are interrogating the tag. Based on initial feedback (and deployments) at DOE’s Lawrence Livermore National Laboratory (LLNL), it is anticipated these tags and their offspring will meet DOE and international community needs for highly secure RFID systems. Beyond the accomplishment of those original objectives for the ultra-secure RF tags, major new spin-off thrusts from the original work were identified and successfully pursued with the cognizance of the DOE sponsor office. In particular, new classes of less sophisticated RFID tags were developed whose lineage derives from the core R&D thrusts of this SBIR. These RF “tag variants” have some, but not necessarily all, of the advanced characteristics described above and can therefore be less expensive and meet far wider markets. With customer pull from the DOE and its national laboratories, new RFID tags and systems (including custom readers and software) for

  5. Characterization of inkjet-printing HF and UHF antennas for RFID applications

    Science.gov (United States)

    Tarapata, Grzegorz; Paczesny, Daniel; Kawecki, Krzysztof

    2013-10-01

    The aim of this work was to perform a set of RFID antennas on flexible plastic substrates designed for range of HF and UHF band. The samples was fabricated using inkjet printing technology and conductive material base on silver nanopartilces ink. Fabricated antennas have been characterized, and the results were compared with the parameters of antennas made with usage of classical PCB technology on FR4 laminate with copper metallization. The paper presents studies on the impact of elastic substrates and conductive materials on antennas electrical parameters, as well as the communication range of the resulting RFID tags. During the experiment two patterns of HF and three patterns of UHF antennas was examined and the antennas was realized on different types of substrates, such as PET, Kapton® and FR4.

  6. The Application of RFID in Brazilian Harvest Facilities: Two Case Studies

    Directory of Open Access Journals (Sweden)

    Priscilla Cristina Cabral Ribeiro

    2011-02-01

    Full Text Available Using the two case studies presented in this work, this article aims to evaluate identification technology used in the Brazilian cattle market. Although Brazil possesses large companies in this sector (one of which is the largest exporter of meat in the world some of them have yet to implement information technology (IT for cattle identification purposes. Radio Frequency Identification (RFID is an IT that identifies cattle using electronic ear tags. This particular form of technology is especially accurate and dependable as it can be used to trace a product from the origin of conception to the consumer. This paper utilizes a qualitative approach – two case studies – which were created with the application of a questionnaire (open and closed questions. Using RFID for internal control purposes only, each of the sample companies has limited use of the technology. Instead, these companies use barcode systems to trace and identify cattle and to send important information to their supply chain partners.

  7. INSIGHT: RFID and Bluetooth enabled automated space for the blind and visually impaired.

    Science.gov (United States)

    Ganz, Aura; Gandhi, Siddhesh Rajan; Wilson, Carole; Mullett, Gary

    2010-01-01

    In this paper we introduce INSIGHT, an indoor location tracking and navigation system to help the blind and visually impaired to easily navigate to their chosen destination in a public building. INSIGHT makes use of RFID and Bluetooth technology deployed within the building to locate and track the users. The PDA based user device interacts with INSIGHT server and provides the user navigation instructions in an audio form. The proposed system provides multi-resolution localization of the users, facilitating the provision of accurate navigation instructions when the user is in the vicinity of the RFID tags as well as accommodating a PANIC button which provides navigation instructions when the user is anywhere in the building. Moreover, the system will continuously monitor the zone in which the user walks. This will enable the system to identify if the user is located in the wrong zone of the building which may not lead to the desired destination.

  8. J3Gen: A PRNG for Low-Cost Passive RFID

    Directory of Open Access Journals (Sweden)

    Jordi Herrera-Joancomartí

    2013-03-01

    Full Text Available Pseudorandom number generation (PRNG is the main security tool in low-cost passive radio-frequency identification (RFID technologies, such as EPC Gen2. We present a lightweight PRNG design for low-cost passive RFID tags, named J3Gen. J3Gen is based on a linear feedback shift register (LFSR configured with multiple feedback polynomials. The polynomials are alternated during the generation of sequences via a physical source of randomness. J3Gen successfully handles the inherent linearity of LFSR based PRNGs and satisfies the statistical requirements imposed by the EPC Gen2 standard. A hardware implementation of J3Gen is presented and evaluated with regard to different design parameters, defining the key-equivalence security and nonlinearity of the design. The results of a SPICE simulation confirm the power-consumption suitability of the proposal.

  9. Yellowtail Tagging Data (MRDBS)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Yellowtail Flounder Tagging Program began in 2003 and works with commercial fishermen to tag and release yellowtaiI flounder with pink and yellow disc tags or...

  10. RFID-BASED Prepaid Power Meter

    OpenAIRE

    Teymourzadeh, Rozita

    2013-01-01

    An Electric power meter is an important component in electric energy service. In the past, many consumers have complained about reading inaccurate of the electric meter. This research presents the development of an electrical power meter equipped with RFID reader. The RFID reader reads a valid RFID card and activates the power meter so that it can supply electricity. When the credit is about low or before the electricity is auto cut off, an SMS message will be sent to the user’s handphone to ...

  11. UHF-RFID solutions for logistics units management in the food supply chain

    Directory of Open Access Journals (Sweden)

    Paolo Barge

    2013-09-01

    Full Text Available The availability of systems for automatic and simultaneous identification of several items belonging to a logistics unit during production, warehousing and delivering can improve supply chain management and speed traceability controls. Radio frequency identification (RFID is a powerful technique that potentially permits to reach this goal, but some aspects as, for instance, food product composition (e.g. moisture content, salt or sugar content and some peculiarities of the production environment (high moisture, high/low temperatures, metallic structures have prevented, so far, its application in food sector. In the food industry, composition and shape of items are much less regular than in other commodities sectors. In addition, a wide variety of packaging, composed by different materials, is employed. As material, size and shape of items to which the tag should be attached strongly influence the minimum power requested for tag functioning, performance improvements can be achieved only selecting suitable RF identifier for the specific combination of food product and packaging. When dealing with logistics units, the dynamic reading of a vast number of tags originates simultaneous broadcasting of signals (tag-to-tag collisions that could affect reading rates and the overall reliability of the identification procedure. This paper reports the results of an extensive analysis of the reading performance of UHF RFID systems for multiple dynamic electronic identification of food packed products in controlled conditions. Products were considered singularly or arranged on a logistics pallet. The effects on reading rate and reading zone of different factors, among which the type of product, the number and position of antennas, the field polarization, the reader RF power output, the interrogation protocol configuration as well as the transit speed, the number of tags and their interactions were analysed and compared.

  12. A Research on Issues Related to RFID Security and Privacy

    Science.gov (United States)

    Kim, Jongki; Yang, Chao; Jeon, Jinhwan

    Radio Frequency Identification (RFID) is a technology for automated identification of objects and people. RFID systems have been gaining more popularity in areas especially in supply chain management and automated identification systems. However, there are many existing and potential problems in the RFID systems which could threat the technology's future. To successfully adopt RFID technology in various applications, we need to develop the solutions to protect the RFID system's data information. This study investigates important issues related to privacy and security of RFID based on the recent literature and suggests solutions to cope with the problem.

  13. Design of books inventory with RFID antenna in library management system

    Directory of Open Access Journals (Sweden)

    Cheng Ching-Chien

    2017-01-01

    Full Text Available A 915 MHz printed radio-frequency-identification (RFID antennas with the characteristics of good gain and omnidirectional beam wave is constructed and evaluated in this study. The objective is to find out their best reading rates for providing effective wireless communications among RFID antenna during the library book inventory process. And an optimal library inventory system which is based on electromagnetic identification (EMID technology is proposed, which is constructed to find the optimal tag location for a book, test the tag readability for bookshelves, and connect a couple of multi-layer bookshelves with multiplexers and updat the tag reading status in the database of the computer terminal. The fabricated antenna reader and the proposed system are embedded into different locations of bookshelves and tested at the library of Cheng Shiu University in Taiwan. According to the experimental results, the designed prototype of the antenna reader has the characteristics of the directional radiation pattern, good gain, simple shape, low cost and is easy to be integrated into the bookshelf. And the designed library inventory system can authenticate the location of a book automatically. They can benefit administrating librarians with the capabilities of decreasing the library inventory processing time and reducing the possibility of the books being misplaced.

  14. Reverse Logistics: RFID the key to optimality

    Directory of Open Access Journals (Sweden)

    Rezwan Asif

    2011-07-01

    Full Text Available Purpose: The purpose of this paper is to find ways to reduce uncertainties in Reverse logistic supply chain (RLSC through the use of Radio-frequency identification (RFID technology.Design/methodology/approach: This paper reviews literature and builds model to relate RFID with uncertainties in order to optimize Reverse Logistics. Findings: RFID is really efficient to determine and detect quantity, variety and cycle times of returns; however it's not as convenient to determine quality of the returns. The collected information from RFID can be used to standardize the RLSC.Research limitations: Though it’s several and unique advantages some limitations of RFID have been identified in quality and processing sequence, collecting points and different standards, and in global usage.Originality/value: Previous studies in the area of Reverse Logistics and RFID don’t cover all impacts of this technology on RLSC. This review paper has investigated these impacts and offers a model for optimizing the Reverse Logistics Supply Chain.

  15. Delivering an Intelligent Foundation for RFID: Maximizing Network Efficiency with Cisco RFID Solutions

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Radio frequency identification (RFID) is one of today s most anticipated technologies for a broad range of enterprises. Based on the promise of lower operating costs combined with more accurate product and asset information, organizations .Rfrom manufacturers to government agencies, retailers to healthcare providers , Rare introducing RFID technologies in the supply chain, for asset tracking and management, and for security and regulatory purposes.

  16. MEMS-based sensors for post-earthquake damage assessment

    Energy Technology Data Exchange (ETDEWEB)

    Pozzi, M; Zonta, D; Trapani, D [DIMS, University of Trento, Via Mesiano 77, 38123, Trento (Italy); Athanasopoulos, N; Garetsos, A; Stratakos, Y E [Advanced Microwave Systems Ltd, 2, 25th Martiou Street, 17778 Athens (Greece); Amditis, A J; Bimpas, M [ICCS, National Technical University of Athens, 9 Iroon Polytechniou Street, 15773 Zografou (Greece); Ulieru, D, E-mail: daniele.zonta@unitn.it [SITEX 45 SRL, 114 Ghica Tei Blvd, 72235 Bucharest (Romania)

    2011-07-19

    The evaluation of seismic damage is today almost exclusively based on visual inspection, as building owners are generally reluctant to install permanent sensing systems, due to their high installation, management and maintenance costs. To overcome this limitation, the EU-funded MEMSCON project aims to produce small size sensing nodes for measurement of strain and acceleration, integrating Micro-Electro-Mechanical Systems (MEMS) based sensors and Radio Frequency Identification (RFID) tags in a single package that will be attached to reinforced concrete buildings and will transmit data using a wireless interface. During the first phase of the project completed so far, sensor prototypes were produced by assembling preexisting components. This paper outlines the device operating principles, production scheme and operation at both unit and network levels. It also reports on validation campaigns conducted in the laboratory to assess system performance. Accelerometer sensors were tested on a reduced scale metal frame mounted on a shaking table, while strain sensors were embedded in both reduced and full-scale reinforced concrete specimens undergoing increasing deformation cycles up to extensive damage and collapse. The performance of the sensors developed for the project and their applicability to long-term seismic monitoring are discussed.

  17. RFID applications in transportation operation and intelligent transportation systems (ITS).

    Science.gov (United States)

    2009-06-01

    Radio frequency identification (RFID) transmits the identity of an object or a person wirelessly. It is grouped under : the broad category of automatic identification technologies with corresponding standards and established protocols. : RFID is suit...

  18. Pseudo-random Aloha for inter-frame soft combining in RFID systems

    DEFF Research Database (Denmark)

    Castiglione, Paolo; Ricciato, Fabio; Popovski, Petar

    2013-01-01

    In this work we consider a recently proposed variant of the classical Framed Slotted-ALOHA where slot selection is based on a pseudo-random function of the message to be transmitted and of the frame index. We couple this feature with convolutional encoding, that allows to perform Inter-frame Soft...... cancellation (instead of combining). Numerical simulation results show that the ISoC scheme brings a noticeable throughput gain over traditional schemes in a dense RFID scenario with multiple concurrent Tag transmissions....

  19. PENGADOPSIAN TEKNOLOGI RFID DI RUMAH SAKIT INDONESIA, MANFAAT DAN HAMBATANNYA

    Directory of Open Access Journals (Sweden)

    Iwan Vanany

    2009-01-01

    Full Text Available This paper explores the benefit and barriers of RFID (Radio Frequency Identification technology adoption in Indonesian hospitals context. The investigation methods of this research used interview and semi-structured questionnaire on RFID consultants, RFID researchers, and big hospital managers in Java Island. The benefits and barriers of RFID technology adoption are identified from literature review. The barriers of RFID technology adoption are divided into two aspects, i.e., as business and technology aspects. The results of this study suggest that the benefits of RFID technology adoption are dominated of intangible benefit. Most of the respondents believed that the main barriers of RFID technology adoption are (1 the complexity of RFID technology (2 the lack of complete and valid information, and (3 there is no sufficient budget available. The detail of the outcomes and the implications of this reasarch are also discussed. Abstract in Bahasa Indonesia: Makalah ini berupaya mengeksplorasi manfaat dan hambatan dari pengadopsian teknologi RFID (Radio Frequency Identification dalam konteks rumah sakit di Indonesia. Metode investigasi dari penelitian ini menggunakan wawancara dan kuesioner semi-struktur untuk konsultan, peneliti teknologi RFID dan manajer rumah sakit berkatagori besar di Pulau Jawa. Manfaat-manfaat dan hambatan-hambatan dari pengadopsian teknologi RFID telah diidentifikasi dari studi literatur. Hambatan dari pengadopsian teknologi RFID dibagi menjadi dua (2 aspek yaitu hambatan dari aspek bisnis dan teknologi. Temuan dari studi ini meyakini bahwa manfaat dari pengadopsian teknologi RFID didominasi oleh manfaat yang bersifat intangible. Sebagian besar responden meyakini bahwa hambatan utama dari pengadopsian teknologi RFID adalah: (1 kompleksnya teknologi RFID, (2 ketiadaan informasi yang lengkap dan valid, (3 tidak tersedianya anggaran yang cukup. Detail dari hasil studi dan implikasinya akan didiskusikan selanjutnya. Kata kunci

  20. Development of Wireless RFID Glove for Various Applications

    Science.gov (United States)

    Lee, Changwon; Kim, Minchul; Park, Jinwoo; Oh, Jeonghoon; Eom, Kihwan

    Radio Frequency Identification is increasingly popular technology with many applications. The majority of applications of RFID are supply-chain management. In this paper, we proposed the development of wireless RFID Glove for various applications in real life. Proposed wireless RFID glove is composed of RFID reader of 13.56 MHz and RF wireless module. Proposed Gloves were applied to two applications. First is the interactive leaning and second is Meal aid system for blind people. The experimental results confirmed good performances.

  1. Uniting Legislation with RFID Privacy-Enhancing Technologies

    NARCIS (Netherlands)

    Rieback, M.R.; Crispo, B.; Tanenbaum, A.S.

    2005-01-01

    RFID is a popular identification and automation technology with serious security and privacy threats. Legislation expounds upon the actual security and privacy needs of people in RFID-enabled environments, while technology helps to ensure legal compliance. This paper examines the main aims of RFID

  2. SISTEM PENCATATAN KEHADIRAN MAHASISWA DAN DOSEN SERTA PERHITUNGAN KOMPENSASI DI PROGRAM STUDI TEKNIK TELEKOMUNIKASI POLITEKNIK NEGERI SEMARANG MENGGUNAKAN RFID DAN DIKIRIM MELALUI SMS GATEWAY

    Directory of Open Access Journals (Sweden)

    Adiba Kamalia Putri

    2016-04-01

    Full Text Available Penelitian ini bertujuan untuk mengembangkan sistem absensi mahasiswa menggunakan RFID reader dan RFID tag dengan menambahkan perhitungan sanksi kompensasi ketika mahasiswa terlambat atau tidak hadir dalam perkuliahan dan adanya absensi dosen. Setiap RFID reader memiliki IP Address yang berbeda namun masih dalam satu class yang sama. Pengembangan juga dilakukan dengan menambahkan informasi kepada orang tua ketika jumlah ketidakhadiran mahasiswa sudah melampaui batas yang ditentukan sehingga dapat dikenai surat peringatan 1, 2, dan 3. Mahasiswa juga akan mendapat pemberitahuan jika jumlah ketidakhadirannya sudah melampaui batas yang ditentukan. Semua pemberitahuan tersebut dikirimkan melalui SMS Gateway secara realtime. Untuk pemberitahuan jika jumlah ketidakhadirannya sudah melampaui batas juga dikirimkan melalui email kepada mahasiswa dan kaprodi. Metode pengembangan dengan menambahkan aturan perhitungan kompensasi pada program RTEvent yang digunakan. Hasil dari pembuatan sistem ini adalah tersusunnya sistem pencatatan kehadiran mahasiswa dan dosen yang sudah dilengkapi dengan perhitungan kompensasi dan adanya pemberitahuan informasi kegitan belajar mengajar kepada orang tua dan kaprodi.

  3. Economic assessment of RFID coupled with open source technologies for wood traceability in Calabria

    Directory of Open Access Journals (Sweden)

    Sperandio G

    2017-04-01

    Full Text Available The aim of this work was to assess the economic sustainability of the implementation of a wood traceability system in Calabria based on RFID and open source technologies. We identified a break-even point in its implementation under different scenarios in order to highlight the economic sustainability limits, expressed in terms of m3 or tons of processed product. The results showed that the use of RFID technology along the supply chain could lead to an effective operational simplification and to a more efficient use of resources. Based on the average market prices for timber (80-120 € / m3, the implementation of RFID technology led to an increase in timber price by 8% under the worst scenarios. This suggests that the use of open source technologies for wood traceability is already feasible and economically sustainable, as 40% of private companies stated their willingness to pay a premium price (on average 3.25% higher for purchasing certified local wood products in Calabria. Moreover, we expect a further reduction of tags and hardware costs in the next future, up to half the costs estimated in this work, thus making the application of such technology to timber traceability even more affordable.

  4. Observance and development of salient quality overprint for tablecloths embroidery with use of RFID technology

    Directory of Open Access Journals (Sweden)

    Jana Strauszová

    2011-04-01

    Full Text Available Mission of this paper is to enable those interested in observance and development quality embroidery typical of the region use with RFID technologies for designing, implementing and providing overprint for tablecloths embroidery. The starting point is present situation and method of observance and development of overprint embroidery. The solution is in scanning of patterns and their saving into database of industrial patterns with implemented RFID tag. This will allow indentifying, evaluating and using overprint for tablecloths embroidery. RFID technology can be applied for observance and development of salient quality any products of individual, organizations and their protected pattern and support creative and innovative acting of individuals and organizations in region. The paper is intended especially for specialists, who are interested in issue observance salient quality in sense of cultural heritage of regions. The paper has been compiled in connection with resolving project KEGA 3/6411/08 Transformation of the already existing study programme Management of production quality to a university-wide bilingual study programme.

  5. OBSERVANCE AND DEVELOPMENT OF SALIENT QUALITY OVERPRINT FOR TABLECLOTHS EMBROIDERY WITH USE OF RFID TECHNOLOGY

    Directory of Open Access Journals (Sweden)

    KRISTÍNA ZGODAVOVÁ

    2010-12-01

    Full Text Available Mission of this paper is to enable those interested in observance and development quality embroidery typical of the region use with RFID technologies for designing, implementing and providing overprint for tablecloths embroidery. The starting point is present situation and method of observance and development of overprint embroidery. The solution is in scanning of patterns and their saving into database of industrial patterns with implemented RFID tag. This will allow indentifying, evaluating and using overprint for tablecloths embroidery. RFID technology can be applied for observance and development of salient quality any products of individual, organizations and their protected pattern and support creative and innovative acting of individuals and organizations in region. The paper is intended especially for specialists, who are interested in issue observance salient quality in sense of cultural heritage of regions. The paper has been compiled in connection with resolving project KEGA 3/6411/08 Transformation of the already existing study programme Management of production quality to a university-wide bilingual study programme.

  6. Gen2 RFID-Based System Framework for Resource Circulation in Closed-Loop Supply Chains

    Directory of Open Access Journals (Sweden)

    Young-woo Kim

    2017-10-01

    Full Text Available Product recycling has become a mandatory activity under extended producer responsibility. Therefore, it is important to operate a closed-loop supply chain that integrates sourcing, production, delivery, and recycling to achieve not only environmental sustainability, but also economic benefits. However, this goal is affected by chronic problems caused by uncertainties relating to the return timing, quantity, and quality of returned items. Many studies proved that information visibility could solve these problems. In this context, a system framework for closed-loop supply chain management is proposed that gathers real-time information within a supply chain and product lifecycle by using the Internet-of-Things, including radio frequency identification (RFID. Specifically, the most recent Gen2 RFID protocol, which provides new features to create new positive effects, is considered. Additionally, an information system is designed, including RFID tag encoding, which supports the operation of the proposed system. Finally, the lifecycle benefits are examined, such as counterfeit prevention, real-time monitoring and maintenance in the middle-of-life phase, and reverse process streamlining. The ultimate aim is to design a system that facilitates the profitable and environmentally friendly operation of the closed-loop supply chain.

  7. RFID and Memory Devices Fabricated Integrally on Substrates

    Science.gov (United States)

    Schramm, Harry F.

    2004-01-01

    Electronic identification devices containing radio-frequency identification (RFID) circuits and antennas would be fabricated integrally with the objects to be identified, according to a proposal. That is to say, the objects to be identified would serve as substrates for the deposition and patterning of the materials of the devices used to identify them, and each identification device would be bonded to the identified object at the molecular level. Vacuum arc vapor deposition (VAVD) is the NASA derived process for depositing layers of material on the substrate. This proposal stands in contrast to the current practice of fabricating RFID and/or memory devices as wafer-based, self-contained integrated-circuit chips that are subsequently embedded in or attached to plastic cards to make smart account-information cards and identification badges. If one relies on such a chip to store data on the history of an object to be tracked and the chip falls off or out of the object, then one loses both the historical data and the means to track the object and verify its identity electronically. Also, in contrast is the manufacturing philosophy in use today to make many memory devices. Today s methods involve many subtractive processes such as etching. This proposal only uses additive methods, building RFID and memory devices from the substrate up in thin layers. VAVD is capable of spraying silicon, copper, and other materials commonly used in electronic devices. The VAVD process sprays most metals and some ceramics. The material being sprayed has a very strong bond with the substrate, whether that substrate is metal, ceramic, or even wood, rock, glass, PVC, or paper. An object to be tagged with an identification device according to the proposal must be compatible with a vacuum deposition process. Temperature is seldom an issue as the substrate rarely reaches 150 F (66 C) during the deposition process. A portion of the surface of the object would be designated as a substrate for

  8. HF RFID versus UHF RFID--Technology for Library Service Transformation at City University of Hong Kong

    Science.gov (United States)

    Ching, Steve H.; Tai, Alice

    2009-01-01

    Since libraries first used RFID systems in the late 1990s, more and more libraries have identified the advantages of the technology. With advances in HF and UHF RFID, both alternatives are now viable in library applications. While some librarians are still skeptical towards UHF RFID as unproven in the library arena, the City University of Hong…

  9. Could the Pharmaceutical Industry Benefit from Full-Scale Adoption of Radio-Frequency Identification (RFID) Technology with New Regulations?

    Science.gov (United States)

    Coustasse, Alberto; Kimble, Craig A; Stanton, Robert B; Naylor, Mariah

    2016-01-01

    Healthcare regulators are directing attention to the pharmaceutical supply chain with the passage of the Drug Quality and Security Act (DQSA) and the Drug Supply Chain Security Act (DSCSA). Adoption of Radio-Frequency Identification (RFID) technology has the ability to improve compliance, reduce costs, and improve safety in the supply chain but its implementation has been limited; primarily because of hardware and tag costs. The purpose of this research study was to analyze the benefits to the pharmaceutical industry and healthcare system of the adoption of RFID technology as a result of newly implemented supply chain regulations. The methodology was a review following the steps of a systematic review with a total of 96 sources used. With the DSCSA, pharmaceutical companies must track and trace prescription drugs across the supply chain, and RFID can resolve many track-and-trace issues with manufacturer control of data. The practical implication of this study is that pharmaceutical companies must continue to have the potential to increase revenues, decrease associated costs, and increase compliance with new FDA regulations with RFID. Still, challenges related to regulatory statute wording, implementation of two-dimensional barcode technology, and the variety of interfaces within the pharmaceutical supply chain have delayed adoption and its full implementation.

  10. Filtering Redundant Data from RFID Data Streams

    Directory of Open Access Journals (Sweden)

    Hazalila Kamaludin

    2016-01-01

    Full Text Available Radio Frequency Identification (RFID enabled systems are evolving in many applications that need to know the physical location of objects such as supply chain management. Naturally, RFID systems create large volumes of duplicate data. As the duplicate data wastes communication, processing, and storage resources as well as delaying decision-making, filtering duplicate data from RFID data stream is an important and challenging problem. Existing Bloom Filter-based approaches for filtering duplicate RFID data streams are complex and slow as they use multiple hash functions. In this paper, we propose an approach for filtering duplicate data from RFID data streams. The proposed approach is based on modified Bloom Filter and uses only a single hash function. We performed extensive empirical study of the proposed approach and compared it against the Bloom Filter, d-Left Time Bloom Filter, and the Count Bloom Filter approaches. The results show that the proposed approach outperforms the baseline approaches in terms of false positive rate, execution time, and true positive rate.

  11. The Value of RFID Benefits vs Costs

    CERN Document Server

    2013-01-01

    RFID technology presents a great potential for creating competitive advantage. By automating and simplifying data collection, it lets users more accurately track assets and monitor key indicators, which in turn gives greater visibility to the operations. However, the benefits received from this technology will be determined by how well it is integrated with the business processes and overall information flow. Because of the fact that the decision to deploy RFID technology in an enterprise is a business decision instead of a technology decision, cost-benefit analysis is a key component of this decision. If an RFID deployment cannot be justified in terms of its economic value to the company, it is not likely to help the company; and consequently, it is not likely to remain a viable deployment over the long term.   The Value of RFID describes the business value of RFID and explains the costs and benefits of this technology comprehensively. Different investment evaluation models are proposed to use in various ap...

  12. An Approach for Removing Redundant Data from RFID Data Streams

    Science.gov (United States)

    Mahdin, Hairulnizam; Abawajy, Jemal

    2011-01-01

    Radio frequency identification (RFID) systems are emerging as the primary object identification mechanism, especially in supply chain management. However, RFID naturally generates a large amount of duplicate readings. Removing these duplicates from the RFID data stream is paramount as it does not contribute new information to the system and wastes system resources. Existing approaches to deal with this problem cannot fulfill the real time demands to process the massive RFID data stream. We propose a data filtering approach that efficiently detects and removes duplicate readings from RFID data streams. Experimental results show that the proposed approach offers a significant improvement as compared to the existing approaches. PMID:22163730

  13. An Approach for Removing Redundant Data from RFID Data Streams

    Directory of Open Access Journals (Sweden)

    Hairulnizam Mahdin

    2011-10-01

    Full Text Available Radio frequency identification (RFID systems are emerging as the primary object identification mechanism, especially in supply chain management. However, RFID naturally generates a large amount of duplicate readings. Removing these duplicates from the RFID data stream is paramount as it does not contribute new information to the system and wastes system resources. Existing approaches to deal with this problem cannot fulfill the real time demands to process the massive RFID data stream. We propose a data filtering approach that efficiently detects and removes duplicate readings from RFID data streams. Experimental results show that the proposed approach offers a significant improvement as compared to the existing approaches.

  14. Optimal Placement Method of RFID Readers in Industrial Rail Transport for Uneven Rail Traflc Volume Management

    Science.gov (United States)

    Rakhmangulov, Aleksandr; Muravev, Dmitri; Mishkurov, Pavel

    2016-11-01

    The issue of operative data reception on location and movement of railcars is significant the constantly growing requirements of the provision of timely and safe transportation. The technical solution for efficiency improvement of data collection on rail rolling stock is the implementation of an identification system. Nowadays, there are several such systems, distinguished in working principle. In the authors' opinion, the most promising for rail transportation is the RFID technology, proposing the equipping of the railway tracks by the stationary points of data reading (RFID readers) from the onboard sensors on the railcars. However, regardless of a specific type and manufacturer of these systems, their implementation is affiliated with the significant financing costs for large, industrial, rail transport systems, owning the extensive network of special railway tracks with a large number of stations and loading areas. To reduce the investment costs for creation, the identification system of rolling stock on the special railway tracks of industrial enterprises has developed the method based on the idea of priority installation of the RFID readers on railway hauls, where rail traffic volumes are uneven in structure and power, parameters of which is difficult or impossible to predict on the basis of existing data in an information system. To select the optimal locations of RFID readers, the mathematical model of the staged installation of such readers has developed depending on the non-uniformity value of rail traffic volumes, passing through the specific railway hauls. As a result of that approach, installation of the numerous RFID readers at all station tracks and loading areas of industrial railway stations might be not necessary,which reduces the total cost of the rolling stock identification and the implementation of the method for optimal management of transportation process.

  15. Gillnet Tag Program

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Certain fishery management programs require vessels to obtain gillnet tags to be used with their gillnet gear. Gillnet tag data is a collection of requests and...

  16. Cooperative Tagging Center (CTC)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Cooperative Tagging Center (CTC) began as the Cooperative Game Fish Tagging Program (GTP) at Woods Hole Oceanographic Institute (WHOI) in 1954. The GTP was...

  17. North Pacific Albacore Tagging

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Conventional tagging data are available from 1971 to 1996. Electronic tagging data are available from 2000 to present. The data are managed by SWFSC in Access...

  18. Predicting floods with Flickr tags.

    Science.gov (United States)

    Tkachenko, Nataliya; Jarvis, Stephen; Procter, Rob

    2017-01-01

    Increasingly, user generated content (UGC) in social media postings and their associated metadata such as time and location stamps are being used to provide useful operational information during natural hazard events such as hurricanes, storms and floods. The main advantage of these new sources of data are twofold. First, in a purely additive sense, they can provide much denser geographical coverage of the hazard as compared to traditional sensor networks. Second, they provide what physical sensors are not able to do: By documenting personal observations and experiences, they directly record the impact of a hazard on the human environment. For this reason interpretation of the content (e.g., hashtags, images, text, emojis, etc) and metadata (e.g., keywords, tags, geolocation) have been a focus of much research into social media analytics. However, as choices of semantic tags in the current methods are usually reduced to the exact name or type of the event (e.g., hashtags '#Sandy' or '#flooding'), the main limitation of such approaches remains their mere nowcasting capacity. In this study we make use of polysemous tags of images posted during several recent flood events and demonstrate how such volunteered geographic data can be used to provide early warning of an event before its outbreak.

  19. Increased situation awareness in major incidents-radio frequency identification (RFID) technique: a promising tool.

    Science.gov (United States)

    Jokela, Jorma; Rådestad, Monica; Gryth, Dan; Nilsson, Helené; Rüter, Anders; Svensson, Leif; Harkke, Ville; Luoto, Markku; Castrén, Maaret

    2012-02-01

    In mass-casualty situations, communications and information management to improve situational awareness is a major challenge for responders. In this study, the feasibility of a prototype system that utilizes commercially available, low-cost components, including Radio Frequency Identification (RFID) and mobile phone technology, was tested in two simulated mass-casualty incidents. The feasibility and the direct benefits of the system were evaluated in two simulated mass-casualty situations: one in Finland involving a passenger ship accident resulting in multiple drowning/hypothermia patients, and another at a major airport in Sweden using an aircraft crash scenario. Both simulations involved multiple agencies and functioned as test settings for comparing the disaster management's situational awareness with and without using the RFID-based system. Triage documentation was done using both an RFID-based system, which automatically sent the data to the Medical Command, and a traditional method using paper triage tags. The situational awareness was measured by comparing the availability of up-to date information at different points in the care chain using both systems. Information regarding the numbers and status or triage classification of the casualties was available approximately one hour earlier using the RFID system compared to the data obtained using the traditional method. The tested prototype system was quick, stable, and easy to use, and proved to work seamlessly even in harsh field conditions. It surpassed the paper-based system in all respects except simplicity of use. It also improved the general view of the mass-casualty situations, and enhanced medical emergency readiness in a multi-organizational medical setting. The tested technology is feasible in a mass-casualty incident; further development and testing should take place.

  20. Tagging vs. Controlled Vocabulary

    DEFF Research Database (Denmark)

    Bogers, Toine; Petras, Vivien

    2015-01-01

    The popularity of social tagging has sparked a great deal of debate on whether tags could replace or improve upon professional metadata as descriptors of books and other information objects. In this paper we present a large-scale empirical comparison of the contributions of individual information...... that tags and controlled vocabulary terms do not actually outperform each other consistently, but seem to provide complementary contributions: some information needs are best addressed using controlled vocabulary terms whereas other are best addressed using tags....