共查询到20条相似文献,搜索用时 78 毫秒
1.
2.
标签碰撞是射频识别(RFID)技术的常见问题,该问题影响了RFID系统通信过程中数据传输的完整性.在分析已有防碰撞方法的基础上,根据帧时隙分组ALOHA算法,结合码分多址技术,提出了新型的标签防碰撞算法.该算法能够有效减小标签之间的碰撞概率,缩短读写器操作时间,提高吞吐率,很适合应用于具有较大数量标签的RFID系统中. 相似文献
3.
为满足市场需求,提高读写器读写效率,降低成本,提出了一种基于ISO/IEC 18000-6C的射频身份识别(RFID)读写器方案.该读写器适用于超高频段,支持跳频,发送通路来用射频发送芯片,接收回路采用相关解调,用分离元件搭建,成本较低,结构简单,易于实现.采用随机槽时隙陈计数器算法进行防碰撞设计,在多标签环境下能够识别标签,并与其成功通信.相对于采用传统随机碰撞算法的读写器,此读写器能够在多标签环境下顺利读取标签,防碰撞性能具有一定提高. 相似文献
4.
5.
针对物联网RFID多标签防碰撞方法中数据采集量较少,导致数据采集效率低等问题,本文引用激光控制技术研究了一种新的激光全息RFID多标签防碰撞方法。依据标签的输出功率大小,计算多标签路径长度;根据需求将多标签路径长度按范围分类,小范围内计算每个标签极限路径长度,剔除相同路径长度的多标签;识别读写器的响应请求,根据自身信号波进行对应需求的扩频处理,初次发出一个帧长度的通信请求,读写器确认后,标签根据初次信号波进行通信。通过单片机、三极管以及激光驱动器完成标签响应电流控制,实现激光全息RFID多标签防碰撞。实验结果表明,本文设计激光全息RFID多标签防碰撞方法能够有效提高数据采集量,提升数据采集效率。 相似文献
6.
7.
8.
多标签碰撞问题严重影响射频识别RFID系统的识别效率.在研究子帧观测机制的基础上,针对常规动态帧时隙Aloha多标签防碰撞算法存在的复杂度高、时间效率低等问题,提出了一种基于子帧的动态帧时隙Aloha算法,其在识别过程中采取设定的子帧观测,运用空闲与碰撞时隙数的关系估计剩余标签数,再依据预估的结果优化设置新的帧长,显著提升了大容量多标签RFID系统的识别效率.该算法的运算复杂度低、计算量小,易于在常规RFID读写器中实现,工程应用前景广阔.仿真结果表明:同传统的Aloha类防碰撞算法相比,提出的算法具有复杂度低、稳定好、识别效率高等优势. 相似文献
9.
10.
RFID作为物联网的感知与识别技术处于体系结构中的感知层,被誉为21世纪最有前途的技术之一。由于RFID技术在应用中不可避免地存储标签数据碰撞问题,造成了读写器数据读取的不可靠和不正确,导致RFID防碰撞算法成为系统开发的核心问题。经过实验得出结论,基于二进制树的防碰撞算法是常用的解决方法,有效地解决了冲突问题。 相似文献
11.
Mobile RFID的安全和隐私问题研究 总被引:1,自引:1,他引:1
射频识别技术被广泛应用于物体的自动识别,广泛地部署射频识别的标签会给用户的隐私带来新的安全威胁。目前,射频识别出现一种融合的趋势,阅读器被集成到移动电话中。移动射频识别主要应用于普通终端用户,用户的安全和隐私是最优考虑的问题。论文描述了移动RFID的应用场景和安全及隐私威胁,重点描述了移动环境下特殊的安全和隐私危险及解决移动RFID安全和隐私问题的安全体系构架方案。 相似文献
12.
UHF频段RFID设备的技术要求及测试 总被引:3,自引:0,他引:3
旨在介绍超高频段(UHF)射频识别(RFID)设备的技术要求及测试,涵盖了政府强制性测试、一致性测试和性能测试三个方面。同时也简要介绍了EPC第二代UHF空中接口标准EPCglobalGen2和新兴的手机RFID技术,以及国家通信计量站在RFID领域的检测能力,并对我国UHF频段RFID的发展做出了展望。 相似文献
13.
One of the ubiquitous technology fields that have received the most attention recently from technology communities worldwide is mobile radio frequency identification (RFID). Mobile handsets loaded with RFID readers enable the identification and retrieval of information on RFID tagged objects. In Korea, a variety of mobile RFID services are currently being piloted, and their commercial roll‐out looks imminent. The goal of this study is to propose, ahead of the commercial launch of mobile RFID services, a customer satisfaction index (CSI) model for this service category and to then measure the CSI to derive practical implications for their providers and pointers related to the improvement of service. A web survey was conducted on Korean mobile phone subscribers who had participated in a mobile RFID pilot program. Using the results of this survey, we tested the CSI model and its hypotheses by employing a partial least‐squares‐based structural equation model analysis and calculated the index. We further conducted an importance‐performance analysis in order to provide insights that may be useful for improving the quality of mobile RFID services. 相似文献
14.
随着EPC的UHF电子标签的核心标准被确认为正式的国际标准,欧美日等发达国家迈入了RFID的普及阶段。我国在这种情况下,最主要的工作就是创新RFID的商业模式,拓展RFID的应用领域。本文首先分析了RFID行业的发展瓶颈之首是商业模式,明确指出我国中低频段的应用模式已经较为成熟,但是超高频的应用模式需要创新。本文还具体的分析了零售业、通信业、移动通信业等行业在RFID应用上的发展潜力和创新点。最后还强调了RFID的成功应用需要达到数据、报文和流程的三大标准化。 相似文献
15.
针对物联网移动RFID系统标签隐私信息的访问控制以及用户身份隐私保护问题,本文采用身份加密和属性加密相结合的方法,建立了IB-AB-eCK安全模型,设计了基于身份及属性的认证密钥交换协议IB-AB-AKE。基于IB-AB-AKE协议,提出了移动RFID手机与信息服务器之间认证密钥交换协议,实现了在保护移动RFID手机用户身份隐私的同时,根据标签所有者定制的访问控制策略进行标签信息的访问控制认证和会话密钥交换,防止了隐私信息被非法访问。分析表明,IB-AB-AKE协议在IB-AB-eCK模型下是安全的,且在通信次数、通信量及计算量方面具有优势。 相似文献
16.
Nowadays, many people perform their commercial activities, such as electronic payment and electronic banking, through their mobile phones. Mobile commerce (m‐commerce) refers to manipulating electronic commerce (e‐commerce) by using mobile devices and wireless networks. Radio‐frequency identification (RFID) is a technology which can be employed to complete payment functions on m‐commerce. As an RFID subsystem is applied in m‐commerce and supply chains, the related security concerns are very important. Recently, Fan et al. have proposed an ultra‐lightweight RFID authentication scheme for m‐commerce (ULRAS) and claimed that their protocol is efficient enough and provides a high level of security. In this paper, we show that their protocol is vulnerable to secret disclosure and reader impersonation attacks. Finally, we improve it to a protocol that is resistant to the attacks presented in this paper and the other known attacks in the context of RFID authentication. We further analyze the security of the improved protocol through the Burrows–Abadi–Needham logic (BAN‐logic). Moreover, our proposed improvement does not impose any additional workload on the RFID tag. 相似文献
17.
Location awareness in an indoor environment and wireless access to Internet applications are major research areas towards the overwhelming success of wireless and mobile communications. However, the unpredictable indoor radio propagation and handover latency due to node mobility are the main challenging issues that need to be addressed. For tackling efficiently both problems of indoor localization and handover management, we propose combining key benefits of two outstanding wireless technologies, i.e. radio frequency identification (RFID) and a wireless local area network (WLAN) infrastructure. WLANs, such as IEEE 802.11 (WiFi), are now very common in many indoor environments for providing wireless communication among WiFi-enabled devices by accessing an Access Point (infrastructure mode) or through peer to peer connections (ad hoc mode). However, the small cell size of the Access Points (APs) in a WiFi-based network drives the need for frequent handovers leading to increased latency. RFID is an emerging technology consisting of two basic components, a tag and a reader, and its main purpose is the automatic identification of tagged objects by a reader. However, in the presence of multiple readers, RFID suffers from the so-called reader collision problem, mainly due to the inability for direct communication among them. In this paper, we propose a hybrid RFID and WLAN system; the RFID technology is employed for collecting information that is used for both localization and handover management within the WLAN, whereas the WLAN itself is utilized for controlling and coordinating the RFID reading process. In our system architecture, tag IDs of a RFID tag deployment are correlated with both location and topology information in order to determine the position and predict the next subnetwork of a Mobile Node (MN) with a reader attached to its mobile device. The role of the WLAN is to coordinate the readers when accessing the RFID channel for retrieving tags?? IDs, hence compensating the persisting RFID collision problem among multiple readers. Numerical results based on extensive simulations validate the efficiency of the proposed hybrid system in providing accurate and time efficient localization and reducing the IP handover latency. 相似文献
18.
19.
为了推动粤港物流信息化建设和RFID的规模化应用,广东省相关部门在香港与相关对接单位进行了调研考察和项目洽谈工作。结果表明,RFID在粤港物流中的应用中已经有了系统的产业基础,不少企业已经开展了卓有成效的工作.双方都希望通过RFID技术的应用为粤港经济持续繁荣注入竞争活力。粤港政府高度重视联合行动来推动RFID技术的应用,并将组建RFID推进工作小组,加强RFID的推广力度。 相似文献