期刊文献+

RFID系统射频电路优化设计研究

Research on RF circuit optimization design of RFID system
下载PDF
导出
摘要 RFID是一种非接触的自动识别技术,其工作原理是通过射频信号进行目标识别,并能快速实现物品追踪和数据切换,并且该项技术可以在各种恶劣环境中使用。基于对RFID系统工作原理的研究,文章进行了RFID系统的射频电路设计,并在此基础上对射频电路进行优化,从而提升RFID系统的性能。 RFID is a non-contact automatic identifcation technology, whose work principle is to identify targets by RF signals, and can quickly realize the object tracking and data switching, and this technology can be used in all kinds of harsh environment. Based on the study of the working principle of RFID system, this paper designs the RF circuit of RFID system, and then optimizes the RF circuit to improve the performance of RFID system.
作者 王烁 Wang Shuo(Tianjin Kechang Huitong Information Technology Co.,Ltd.,Tianjin 300000,China)
出处 《无线互联科技》 2018年第19期12-13,共2页 Wireless Internet Technology
关键词 RFID系统 射频电路 电路优化 RFID system RF circuit circuit optimization
  • 相关文献

参考文献2

二级参考文献22

  • 1Ni L M, Liu Y, Lau Y C, et al. LANDMARC.. Indoor location sensing using active RFID. Wireless Networks, 2004, 10(6) .. 701-710.
  • 2Tian Y, Chen G, Li J. A new ultra-lightweight RFID authentication protocol with permutation. IEEE Communica- tions Letters, 2012, 16(5): 702-705.
  • 3Li Y, Ding X. Protecting RFID communications in supply chains//Proceedings of the 2nd ACM Symposium on Infor- mation, Computer and Communications Security. Singapore, 2007:234-241.
  • 4Chen M, Luo W, Mo Z, et al. An efficient tag search protocol in large-scale RFID systems//Proceedings of the 32nd IEEE International Conferenceon Computer Communications. Turin, Italy, 2013:899-907.
  • 5Kriplean T, Wclbourne E, Khoussainova N, et al. Physical access control for captured RFID data. IEEE Pervasive Computing, 2007, 6(4): 48-55.
  • 6Agudo I, Rios R, Lopez J. A privacy-aware continuous authentication scheme for proximity-based access control. Computers Security, 2013, 39(1) : 117-126.
  • 7Moriyama D, Matsuo S, Ohkubo M. Relations among notions of privacy for RFID authentication protocols. IEICE TRANSACTIONS on Fundamentals of Electronics, Commu- nications and Computer Sciences, 2014, 97(1): 225-235.
  • 8Alomair B, Clark A, Cuellar J, et al. Scalable RFID systems: A privacy-preserving protocol with constant-time identification. IEEE Transactions on Parallel and Distributed Systems, 2012, 23(8): 1536-1550.
  • 9Finkenzeller K. RFID Handbook: Fundamentals and Appli- cations in Contactless Smart Cards and Identification. 2nd Edition. John Wiley Sons Ltd, 2003.
  • 10Diffie W, Hellman M E. New directions in cryptography. IEEE Transactions on Information Theory, 1976, 22 (6) : 644-654.

共引文献37

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部