共查询到20条相似文献,搜索用时 15 毫秒
1.
Passive RFID systems with several reader stations densely allocated close to each other are susceptible to reader collision problems. They are characterized by reader-to-tag and reader-to-reader interferences. Both degrade the system performance, decreasing the number of tags identified per time unit. Although some proposals have been suggested to avoid/handle these collisions, most of them require extra hardware, do not make an efficient use of the network resources and are not compatible with the current standards and regulations. This paper proposes a centralized and aligned scheduler that optimizes the distribution of network resources (frequencies and time slots) among the readers in the network. Those readers with unidentified tags in their target region will have higher priority for receiving resources. The optimization problem is formulated as a Mixture Integer Programming problem. Results show that the method proposed provides higher network throughput and fairness than the EPCglobal Class-1 Gen-2 standard for dense reader environments. In addition, unlike previous works, the scheduling algorithm presented is compatible with EPCglobal standard and the European regulation, and can be implemented in real RFID systems with fixed and mobile readers. 相似文献
2.
针对无线射频识别(RFID)单元的分布情况可能会导致出现多种类型的冲突以及现存算法的系统成本较高等问题,提出多个数据通道完成阅读器和标签之间的通信,是一种分布式算法。在接受问询流程中,阅读器首先等待一个伪随机时间,然后检测两个序列,如果这两个条件都不满足,阅读器将会等待伪随机时间后再次尝试。在接受过程中,如果存在任何可利用的数据通道,阅读器就会选取不同的数据通道。该设置可以确保避免发生隐藏和暴露终端问题。实验利用范围传播损耗模型和NS3的802.11 Wifi模型在网络模拟器NS3中对算法进行整合。与邻域友好型防冲突算法(NFRA)、多通道MAC协议(MCMAC)算法和冲突避免(Dica)的分布式算法相比,实验结果显示提出的算法降低了标签识别过程中花费的时间,而且集中控制过程额外的空间成本更低,因此在最小化网络开销的情况下增加了成功询问的比例。 相似文献
3.
Radio frequency identification (RFID) system is a contactless automatic identification system, which uses small and low cost RFID tags. The primary problem of current security and privacy preserving schemes is that, in order to identify only one single tag, these schemes require a linear computational complexity on the server side. We propose an efficient mutual authentication protocol for passive RFID tags that provides confidentiality, untraceability, mutual authentication, and efficiency. The proposed protocol shifts the heavy burden of asymmetric encryption and decryption operations on the more powerful server side and only leaves lightweight hash operation on tag side. It is also efficient in terms of time complexity, space complexity, and communication cost, which are very important for practical large-scale RFID applications. 相似文献
4.
5.
基于ISO18000-6C协议标准的RFID阅读器设计 总被引:1,自引:2,他引:1
为了满足市场需求,提高阅读器读写效率,提出一种基于ISO18000-6C协议标准的RFID阅读器设计方案。该阅读器基带处理部分采用ARM+FPGA组合实现,利用FPGA编解码速度快的特点并结合ARM的控制优势,使得该阅读器具有识别速度快、识别率高的特点;阅读器的射频发射电路采用两级功率放大,具备能很好地抑制噪声、保持很好的线性度、辐射功率满足要求、识别距离远的特点;阅读器的接收回路采用四路解调,可以很好地解决接收"模糊点"。 相似文献
6.
The Journal of Supercomputing - RFID is a core technology enabling a ubiquitous environment. Its various applications have shown great progress in our daily life in fields such as distribution... 相似文献
7.
The tag detection ability of Passive Radio Frequency Identification (RFID) systems are critically challenged by the collision occurrence due to simultaneous responding tags during the identification process. The dynamic scheduling of the frame size governed by Dynamic Frame Size ALOHA(DFSA) process, by adjusting the frame lengths according to the size of tag population can avoid the collisions during the identification. However, the performance of DFSA majorly depends on the frame size selection policy which in previous studies was adopted to achieve the target of throughput maximization during a frame. This condition is obtained at the cost of equating the frame size up to the number of estimated tags responding during the time frame. This approximation enhances the throughput value but contributes to massive energy wastages as the frame lengths approach to a very large value in large tag population size. Therefore, it is essential to develop the new frame size estimation policy for DFSA achieving the aim of optimization between throughput and energy for improved time and energy performance. In this paper, we have proposed an EPC C1G2 standards based Novel-Q DFSA algorithm which optimizes the frame size accounting both the energy and the throughput. The combined throughput and energy trade-offs are measured through Energy–Time-Delay (ET) cost which is minimum for our proposed algorithm compared to the existing solutions. Furthermore, the Throughput-Time Delay product approves the stability in large population size making it suitable for numerous identification applications. 相似文献
8.
A novel CMOS transmitter with low TX noise and high linearity is implemented in a 0.18μm 1P6M standard CMOS process for Mobile UHF RFID reader.Adopting double-sideband amplitude-shift-keying(DSBASK)as the only modulation is supported,this transmitter has very low power consumption.A novel analog baseband circuit is proposed to reduce the transmitter noise.With a G′′m–cancellation technology,a highly linear up-conversion active mixer and a power amplifier driver are designed.The transmitter has a measured output1 dB compression point of 13.4 dBm.Occupying a silicon area of about 1 mm2and consuming 144 mW from a1.8 V voltage supply,the transmitter makes the Mobile UHF RFID reader communicate with a transponder in a distance of 1 m conveniently. 相似文献
9.
在分析了几种现有的典型RFID安全协议的特点和缺陷的基础上,提出了一种轻量级的RFID安全协议,该协议将一次性密码本与询问一应答机制相结合,实现了安全高效的读取访问控制,最后建立该协议的理想化模型,利用BAN逻辑对该协议进行了形式化分析,在理论上证明其安全性. 相似文献
10.
11.
A framework for multiuser distributed virtual environments 总被引:2,自引:0,他引:2
Matijasevic M. Gracanin D. Valavanis K.P. Lovrek I. 《IEEE transactions on systems, man, and cybernetics. Part B, Cybernetics》2002,32(4):416-429
A framework for multi-user distributed virtual environments (DVEs) has been proposed. The proposed framework, incorporating two models (the functional model and the interconnection model), attempts to represent the common functionality, communication issues and requirements found in multi-user DVEs. The functional model concentrates on the DVE's functionality, while the interconnection model concentrates on how the components are interconnected to realize the required functionality. The models have been specified using the Unified Modeling Language (UML). An experimental case study demonstrates the applicability and generality of the proposed approach. 相似文献
12.
Network synchronization plays a significant role
in transmitting multimedia objects over computer networks.
Even packets from a single channel must be synchronized due to
the problems in a packet switching environment, such as
network jitter, frequency, and time offsets. We present an
algorithm that determines the set of packets generated
periodically by various participants arriving at a node. The basic
advantage of the proposed algorithm is that the receiver
estimates the reference times (expected arrival times of the
packets) and achieves synchronization, without knowledge of the
packet delays.
The
accuracy is improved and the complexity is reduced by
predicting the time/frequency offsets between the clocks at the
source and the mixer. The error is calculated by the Chernoff
bound, demonstrated by simulation, and shown to be acceptable
in practical applications. 相似文献
13.
14.
A novel direct conversion receiver with low cost and low power is implemented in a 0.18 μm 1P6M standard CMOS process for a Mobile UHF RFID reader.A highly linear active mixer with low flicker noise and low noise active load is proposed.An efficient and low cost on-chip DC offset voltage canceling scheme is adopted with a high-input-impedance four-input OPAMP to buffer the output of the DC offset canceller(DCOC) block.The receiver has a measured input 1 dB compression point of 2 dBm and a sensitivity of 72 dBm in the presence of the large leakage signal from the transmitter.Only occupying a silicon area of 2.5 mm 2 and consuming 21 mA from a 1.8 V supply,the receiver makes the mobile UHF RFID reader to communicate with a transponder in a distance of 1 m conveniently. 相似文献
15.
Radio frequency identification (RFID) technology has been widely used in ubiquitous infrastructures. However, resource constraint
in the low-cost RFID systems has posed potential risks such as privacy and security problems, becoming adoption barrier for
RFID-based applications. In this paper, current security issues in RFID are introduced firstly. Then, we propose a lightweight
Anti-desynchronization privacy preserving RFID authentication protocol. It is particularly suitable for the low-cost RFID
environment for only the capacity of one-way hash function and XOR operation is needed. In this lightweight Anti-desynchronization
RFID authentication protocol, the back-end server keeps the history of the random key update to prevent the active attackers
from de-synchronizing the shared secret between the tag and the back-end server. The security and the performance of the proposed
protocol are analyzed as well. 相似文献
16.
《Computer Networks》2007,51(9):2268-2279
The fast growth of Radio Frequency IDentification (RFID) implies a deployment challenge, namely how to keep this technology scalable without renouncing security and privacy features. This paper focuses on combining tag privacy and scalability using the hash locks mechanism. Our contribution is twofold: (i) a cell-based architecture is proposed in which the readers co-operate in order to conduct tag identification in a private and scalable way; (ii) a communication protocol for the proposed architecture is defined and assessed. The proposed architecture and protocol solve the scalability shortcomings of private RFID identification pointed out by Juels and Weis. 相似文献
17.
18.
Ramon S. Schwartz Rafael R. R. Barbosa Nirvana Meratnia Geert Heijenk Hans Scholten 《Computer Communications》2011,34(17):2057-2071
This paper presents a simple and robust dissemination protocol that efficiently deals with data dissemination in both dense and sparse vehicular networks. Our goal is to address highway scenarios where vehicles equipped with sensors detect an event, e.g., a hazard and broadcast an event message to a specific direction of interest. In order to deal with broadcast communication under diverse network densities, we design a dissemination protocol in such a way that: (i) it prevents the so-called broadcast storm problem in dense networks by employing an optimized broadcast suppression technique; and (ii) it efficiently deals with disconnected networks by relying on the store-carry-forward communication model. The novelty of the protocol lies in its simplicity and robustness. Simplicity is achieved by only considering two states (i.e., cluster tail and non-tail) for vehicles. Furthermore, vehicles in both directions help disseminating messages in a seamlessly manner, without resorting to different operation modes for each direction. Robustness is achieved by assigning message delivery responsibility to multiple vehicles in sparse networks. Our simulation results show that our protocol achieves higher delivery ratio and higher robustness when compared with DV-CAST under diverse road scenarios. 相似文献
19.
《电子技术应用》2017,(11):82-85
电力设备在长期运行中,受环境影响,可能会发生失压、形变现象。针对这种现象,设计了一种基于UHF RFID的无线无源压力传感器,能够在不接触电力设备的情况下获得设备的表面压力信息。基于UHF RFID的压力传感器标签主要由阻抗自适应RFID芯片、UHF频段RFID偶极子天线、金属极板和支撑弹簧构成。电力设备的形变会导致安装在设备上的金属极板与偶极子天线的相对位置变化,导致RFID天线的阻抗变化,RFID芯片内部会通过自动调节输入阻抗电容以匹配RFID天线阻抗的变换。通过检测RFID芯片内部匹配阻抗的电容值,可以推出电力设备的形变情况,形成一一对应的关系,从而实现无线无源压力传感功能。 相似文献
20.
提出一种应用于RFID芯片的低功耗、可校准基准源电路。设计采用了全MOS管以及电阻来实现,大部分管子都工作在亚阈值状态,同时可以产生基准电压和基准电流。该基准源采用了GSMC 0.13 μm 1P5M工艺来实现,其最大工作电流不超过350 nA,供电电压为1.2 V,并且在0.9 V~2.5 V电压下均可工作。在-45℃~65℃的工作温度下,电压基准源的温度系数为30.3 ppm/℃,电流基准源的温度系数为20.7 ppm/℃。 相似文献