As a kind of brand-new technology, radio frequency identification management, data control and acquisition. This paper introduced food safety system construction, analyzed the advantages and problems in dairy modem su...As a kind of brand-new technology, radio frequency identification management, data control and acquisition. This paper introduced food safety system construction, analyzed the advantages and problems in dairy modem suggestions for solution according to the practical situation. (RFID) plays an important role in dairy information tracing and culture function extension of managing breeding technology, and finally put forward some展开更多
In a passive ultra-high frequency(UHF)radio frequency identification(RFID)system,the recovery of collided tag signals on a physical layer can enhance identification efficiency.However,frequency drift is very common in...In a passive ultra-high frequency(UHF)radio frequency identification(RFID)system,the recovery of collided tag signals on a physical layer can enhance identification efficiency.However,frequency drift is very common in UHF RFID systems,and will have an influence on the recovery on the physical layer.To address the problem of recovery with the frequency drift,this paper adopts a radial basis function(RBF)network to separate the collision signals,and decode the signals via FM0 to recovery collided RFID tags.Numerical results show that the method in this paper has better performance of symbol error rate(SER)and separation efficiency compared to conventional methods when frequency drift occurs.展开更多
In order to construct a resource-saving and environmentfriendly society,the advantages of radio frequency identification(RFID) were considered.And it put forward the idea of introducing RFID in the recycling activitie...In order to construct a resource-saving and environmentfriendly society,the advantages of radio frequency identification(RFID) were considered.And it put forward the idea of introducing RFID in the recycling activities of waste products.Taking into account such elements as the technical level of RFID,cost saving from remanufacturing and the cost of RFID tags,both centralized and decentralized supply chain models with different participants in waste product collection were created,in order to determine the optimal pricing strategy and RFID technical level.In the end,sensitivity analyses were conducted to analyze the impacts of scaling parameter for additional increased recovery rate with RFID on pricing and RFID technology level,and impacts of cost saving on the profits of participants in different remanufacturing closed-loop supply chain models.展开更多
The existing active tag-based radio frequency identi-fication(RFID)localization techniques show low accuracy in practical applications.To address such problems,we propose a chaotic adaptive genetic algorithm to align ...The existing active tag-based radio frequency identi-fication(RFID)localization techniques show low accuracy in practical applications.To address such problems,we propose a chaotic adaptive genetic algorithm to align the passive tag ar-rays.We use chaotic sequences to generate the intersection points,the weakest single point intersection is used to ensure the convergence accuracy of the algorithm while avoiding the optimization jitter problem.Meanwhile,to avoid the problem of slow convergence and immature convergence of the algorithm caused by the weakening of individual competition at a later stage,we use adaptive rate of change to improve the optimiza-tion efficiency.In addition,to remove signal noise and outliers,we preprocess the data using Gaussian filtering.Experimental results demonstrate that the proposed algorithm achieves high-er localization accuracy and improves the convergence speed.展开更多
In RFID(Radio Frequency IDentification)system,when multiple tags are in the operating range of one reader and send their information to the reader simultaneously,the signals of these tags are superimposed in the air,w...In RFID(Radio Frequency IDentification)system,when multiple tags are in the operating range of one reader and send their information to the reader simultaneously,the signals of these tags are superimposed in the air,which results in a collision and leads to the degrading of tags identifying efficiency.To improve the multiple tags’identifying efficiency due to collision,a physical layer network coding based binary search tree algorithm(PNBA)is proposed in this paper.PNBA pushes the conflicting signal information of multiple tags into a stack,which is discarded by the traditional anti-collision algorithm.In addition,physical layer network coding is exploited by PNBA to obtain unread tag information through the decoding operation of physical layer network coding using the conflicting information in the stack.Therefore,PNBA reduces the number of interactions between reader and tags,and improves the tags identification efficiency.Theoretical analysis and simulation results using MATLAB demonstrate that PNBA reduces the number of readings,and improve RFID identification efficiency.Especially,when the number of tags to be identified is 100,the average needed reading number of PNBA is 83%lower than the basic binary search tree algorithm,43%lower than reverse binary search tree algorithm,and its reading efficiency reaches 0.93.展开更多
Dynamic framed slotted Aloha algorithm is one of popular passive radio frequency identification(RFID) tag anticollision algorithms. In the algorithm, a frame length requires dynamical adjustment to achieve higher iden...Dynamic framed slotted Aloha algorithm is one of popular passive radio frequency identification(RFID) tag anticollision algorithms. In the algorithm, a frame length requires dynamical adjustment to achieve higher identification efficiency.Generally, the adjustment of the frame length is not only related to the number of tags, but also to the occurrence probability of capture effect. Existing algorithms could estimate both the number of tags and the probability of capture effect. Under large-scale RFID tag identification, however, the number of tags would be much larger than an initial frame length. In this scenario, the existing algorithm's estimation errors would substantially increase. In this paper, we propose a novel algorithm called capture-aware Bayesian estimate, which adopts Bayesian rules to accurately estimate the number and the probability simultaneously. From numerical results, the proposed algorithm adapts well to the large-scale RFID tag identification. It has lower estimation errors than the existing algorithms. Further,the identification efficiency from the proposed estimate is also higher than the existing algorithms.展开更多
To address security and privacy issues in radio frequency identification (RFID) traceability networks, a multi-layer privacy and security framework is proposed, which includes four facets: a security model, a communic...To address security and privacy issues in radio frequency identification (RFID) traceability networks, a multi-layer privacy and security framework is proposed, which includes four facets: a security model, a communication protocol, access permission and privacy preservation. According to the security requirements that are needed in an RFID system, a security model that incorporates security requirements that include privacy of tag data, privacy of ownership, and availability of tag identity is introduced. Using this model, a secure communication protocol that can be used for anti-counterfeiting, automatic identification and privacy preservation is then developed. In order to manage the number of parties, data records of items, and complicated transitions of access permissions in an item-level traceability context, a well-designed access control protocol is proposed to parties that can prove the physical possession of an item;meanwhile, to address the privacy issues during data sharing in an RFID network, a vision of database systems that take responsibility for the privacy of the data they manage is also presented.展开更多
Under industry 4.0, internet of things(IoT), especially radio frequency identification(RFID) technology, has been widely applied in manufacturing environment. This technology can bring convenience to production contro...Under industry 4.0, internet of things(IoT), especially radio frequency identification(RFID) technology, has been widely applied in manufacturing environment. This technology can bring convenience to production control and production transparency. Meanwhile, it generates increasing production data that are sometimes discrete, uncorrelated, and hard-to-use. Thus,an efficient analysis method is needed to utilize the invaluable data. This work provides an RFID-based production data analysis method for production control in Io T-enabled smart job-shops.The physical configuration and operation logic of Io T-enabled smart job-shop production are firstly described. Based on that,an RFID-based production data model is built to formalize and correlate the heterogeneous production data. Then, an eventdriven RFID-based production data analysis method is proposed to construct the RFID events and judge the process command execution. Furthermore, a near big data approach is used to excavate hidden information and knowledge from the historical production data. A demonstrative case is studied to verify the feasibility of the proposed model and methods. It is expected that our work will provide a different insight into the RFIDbased production data analysis.展开更多
In this work,an optimal Q algorithm based on a collision recovery scheme is presented. Tags use BIBD-( 16,4,1) codes instead of RN16 s. Therefore,readers can make a valid recognition even in collision slots. A way of ...In this work,an optimal Q algorithm based on a collision recovery scheme is presented. Tags use BIBD-( 16,4,1) codes instead of RN16 s. Therefore,readers can make a valid recognition even in collision slots. A way of getting the optimal slot-count parameter is studied and an optimal Q algorithm is proposed. The theoretical and simulation results show that the proposed algorithm can improve reading efficiency by 100% more than the conventional Q algorithm. Moreover,the proposed scheme changes little to the existing standard. Thus,it is easy to implement and compatible with ISO 18000-6C.展开更多
Radio frequency identification (RFID) system is a contactless automatic identification system, which uses small and low cost RFID tags. The primary problem of current security and privacy preserving schemes is that,...Radio frequency identification (RFID) system is a contactless automatic identification system, which uses small and low cost RFID tags. The primary problem of current security and privacy preserving schemes is that, in order to identify only one single tag, these schemes require a linear computational complexity on the server side. We propose an efficient mutual authentication protocol for passive RFID tags that provides confidentiality, untraceability, mutual authentication, and efficiency. The proposed protocol shifts the heavy burden of asymmetric encryption and decryption operations on the more powerful server side and only leaves lightweight hash operation on tag side. It is also efficient in terms of time complexity, space complexity, and communication cost, which are very important for practical large-scale RFID applications.展开更多
The radio frequency identification(RFID)technology has been widely used so far in industrial and commercial applications.To develop the RFID tags that support elliptic curve cryptography(ECC),we propose a scalable and...The radio frequency identification(RFID)technology has been widely used so far in industrial and commercial applications.To develop the RFID tags that support elliptic curve cryptography(ECC),we propose a scalable and mutual authentication protocol based on ECC.We also suggest a tag privacy model that provides adversaries exhibiting strong abilities to attack a tag’s privacy.We prove that the proposed protocol preserves privacy under the privacy model and that it meets general security requirements.Compared with other recent ECCbased RFID authentication protocols,our protocol provides tag privacy and performs the best under comprehensive evaluation of tag privacy,tag computation cost,and communications cost.展开更多
Globalization has opened practically every country in the globe to tourism and commerce today.In every region,the volume of vehicles traveling through border crossings has increased significantly.Smartcards and radio ...Globalization has opened practically every country in the globe to tourism and commerce today.In every region,the volume of vehicles traveling through border crossings has increased significantly.Smartcards and radio frequency identification(RFID)have been proposed as a new method of identifying and authenticating passengers,products,and vehicles.However,the usage of smartcards and RFID tag cards for vehicular border crossings continues to suffer security and flexibility challenges.Providing a vehicle’s driver a smartcard or RFID tag card may result in theft,loss,counterfeit,imitation,or vehicle transmutation.RFID sticker tags would replace RFID tags as vehicle border passes to solve the mentioned problem.The RFID sticker tag adheres to the windscreen,side screen,dash,hood,or door of the vehicle,or any other acceptable location.Any damage or stripping from the installed location may cause data corruption and cannot be reused.Overall,these sticker tags will make the border crossingsmore secure and efficient.This article focuses on designing a rectangular-shaped RFID sticker tag antenna made of graphene sheets as a possible solution for smart border crossings.The proposed antenna is mathematically designed and analyzed with CST software to determine the optimum parameters.The design parameters are then used to create an antenna on a prepared graphene sheet.The performance results are carried out with CST software and a network analyzer.The designed RFID antenna stick on a car windscreen offers approximately 900 MHz bandwidth over the frequency range from 1.8 GHz to 2.7 GHz with an average gain of 1.23 dBi at the frequency to be used of 2.4 GHz microwave RFID band.The radiation is an omnidirectional pattern.The proposed graphene-sheet rectangular-shape monopole antenna is compact,low-cost,and bendable to fit into the windscreen of a car while retaining excellent wave propagation capabilities.These findings illustrate the suggested antenna’s potential as an RFID tag antenna in a vehicular smart border pass system.展开更多
With the rapid development of vehicular ad hoc network( VANET) technology,VANET applications such as safe driving and emergency rescue demand high position accuracy,but traditional GPS is difficult to meet new accurac...With the rapid development of vehicular ad hoc network( VANET) technology,VANET applications such as safe driving and emergency rescue demand high position accuracy,but traditional GPS is difficult to meet new accuracy requirements. To overcome this limitation,a new vehicle positioning method based on radio frequency identification( RFID) is proposed. First RFID base stations are divided into three categories using fuzzy technology,and then Chan algorithm is used to calculate three vehicles' positions,which are weighed to acquire vehicles' accurate position. This method can effectively overcome the problem that vehicle positioning accuracy is not high resulting from the factors such as ambient noise and base distribution when Chan algorithm is used. Experimental results show that the performance of the proposed method is superior to Chan algorithm and 2-step algorithm based on averaging method,which can satisfy the requirements of vehicle positioning in VANETs.展开更多
In this paper two proposed methods of input impedance calculation for Bow-Tie antenna are introduced. The proposed methods show input impedance calculation with high accuracy. Also, design curves for input impedance v...In this paper two proposed methods of input impedance calculation for Bow-Tie antenna are introduced. The proposed methods show input impedance calculation with high accuracy. Also, design curves for input impedance values were developed depending on the geometry of antenna. The proposed design curves are used to design a Bow-Tie type RFID tag antenna. The input impedance of the tag antenna is calculated using proposed methods and compared with that obtained using CST studio suite 2014 and IE3D Zeland version 12.0 software packages. The results are investigated and discussed. The tag antenna is fabricated, measured and the obtained input impedance is compared with the simulation and the proposed methods. Good agreement among measured input impedance and that simulated by CST, IE3D or proposed methods is obtained.展开更多
Radio frequency identification (RFID) shall be a revolutionary technological innovation in recent years. Various solutions employing RFID technology have proved their functionality already in such industries as phar...Radio frequency identification (RFID) shall be a revolutionary technological innovation in recent years. Various solutions employing RFID technology have proved their functionality already in such industries as pharmaceuticals, express parcel carrying, and automotive manufacturing, and the increased efficiency and effectiveness has provided a good payback for the investments. But, up to now, fewer researches concentrate on applying REID to heavy-machinery manufacturing enterprises, which are a typical kind of enterprises in discrete manufacturing industry. The main objective of this case study is to extend our understanding of the potential for RFID to delivery of the heavy-machinery manufacturing enterprise, which involves one specific supply chain. A trial to automate the verification activities of delivery is designed and performed. Results show that the stops currently designed into the processes can be eliminated by employing RFID technology and that RFID should be a revolutionary technology as it redesigns the existing processes, eliminate some current inefficiency, improve the accuracy of delivering the products, increases information sharing between supply chain members.展开更多
Automatic robot navigation is being utilized in many industries for the purpose of high speed work delivery. Color follower, fix path follower robots are current solution to this activities but dynamic path configurat...Automatic robot navigation is being utilized in many industries for the purpose of high speed work delivery. Color follower, fix path follower robots are current solution to this activities but dynamic path configuration is not possible in these robots. Hence new system proposes effective and fully dynamic path follower robots using RFID and directional antenna. Radio Frequency Identification (RFID) system permits automatic identification of objects with RFID tags using radio waves which have been widely used in mobile robot navigation, localization and mapping both in indoor and outdoor environment. This article presents a navigation strategy for autonomous mobile robot using passive RFID system. Proposed robot system is provided with RFID tag functionality which will load tag number and direction instruction. At some turning point, user will put RF tag, this tag will be read by RF reader which is placed on robot. As per direction instruction robot will change the direction and reach to the destination. Also as per the movement, robot will send its GPS location to PC (Personal Computer) which will be displayed on PC. Hence main goal is to provide more reliable and low energy consumption based indoor positioning system which will be achieved using directional antenna.展开更多
A radio frequency identification (RFID) reader will fail to identify tags if a collision occurs. This paper proposes a bi-slotted binary tree algorithm (BSBTA) with stack for RFID tag anti-collision to improve the per...A radio frequency identification (RFID) reader will fail to identify tags if a collision occurs. This paper proposes a bi-slotted binary tree algorithm (BSBTA) with stack for RFID tag anti-collision to improve the performance of binary tree algorithm (BTA). In BSBTA, the reader detects collisions by Manchester code and stores colliding prefixes in a stack. The query is composed of a two-bit prefix and an index value. Following every reader query, there are two timeslots for tags whose pointers and identities (IDs) match the query to respond, one for the tag whose next bit is 0 and the other for the tag with 1 as its next bit. Performance analysis and evaluation are also given. The time complexity and the communication complexity of BTA and BSBTA are derived. The simulation results compare the performance of BSBTA with several related anti-collision algorithms. It is shown that BSBTA outperforms BTA in terms of the average number of responded bits and timeslots for one tag identification.展开更多
基金Supported by the Project of the National "948" (2006-Z12)
文摘As a kind of brand-new technology, radio frequency identification management, data control and acquisition. This paper introduced food safety system construction, analyzed the advantages and problems in dairy modem suggestions for solution according to the practical situation. (RFID) plays an important role in dairy information tracing and culture function extension of managing breeding technology, and finally put forward some
基金supported by the National Natural Science Foundation of China(61762093)the 17th Batches of Young and Middle-aged Leaders in Academic and Technical Reserved Talents Project of Yunnan Province(2014HB019)+1 种基金the Key Applied and Basic Research Foundation of Yunnan Province(2018FA036)the Program for Innovative Research Team(in Science and Technology)in University of Yunnan Province。
文摘In a passive ultra-high frequency(UHF)radio frequency identification(RFID)system,the recovery of collided tag signals on a physical layer can enhance identification efficiency.However,frequency drift is very common in UHF RFID systems,and will have an influence on the recovery on the physical layer.To address the problem of recovery with the frequency drift,this paper adopts a radial basis function(RBF)network to separate the collision signals,and decode the signals via FM0 to recovery collided RFID tags.Numerical results show that the method in this paper has better performance of symbol error rate(SER)and separation efficiency compared to conventional methods when frequency drift occurs.
基金National Natural Science Foundation of China(No.71301038)
文摘In order to construct a resource-saving and environmentfriendly society,the advantages of radio frequency identification(RFID) were considered.And it put forward the idea of introducing RFID in the recycling activities of waste products.Taking into account such elements as the technical level of RFID,cost saving from remanufacturing and the cost of RFID tags,both centralized and decentralized supply chain models with different participants in waste product collection were created,in order to determine the optimal pricing strategy and RFID technical level.In the end,sensitivity analyses were conducted to analyze the impacts of scaling parameter for additional increased recovery rate with RFID on pricing and RFID technology level,and impacts of cost saving on the profits of participants in different remanufacturing closed-loop supply chain models.
基金supported by the Aviation Science Foundation(ASFC-20181352009).
文摘The existing active tag-based radio frequency identi-fication(RFID)localization techniques show low accuracy in practical applications.To address such problems,we propose a chaotic adaptive genetic algorithm to align the passive tag ar-rays.We use chaotic sequences to generate the intersection points,the weakest single point intersection is used to ensure the convergence accuracy of the algorithm while avoiding the optimization jitter problem.Meanwhile,to avoid the problem of slow convergence and immature convergence of the algorithm caused by the weakening of individual competition at a later stage,we use adaptive rate of change to improve the optimiza-tion efficiency.In addition,to remove signal noise and outliers,we preprocess the data using Gaussian filtering.Experimental results demonstrate that the proposed algorithm achieves high-er localization accuracy and improves the convergence speed.
基金the National Natural Science Foundation of China under Grant 61502411Natural Science Foundation of Jiangsu Province under Grant BK20150432 and BK20151299+7 种基金Natural Science Research Project for Universities of Jiangsu Province under Grant 15KJB520034China Postdoctoral Science Foundation under Grant 2015M581843Jiangsu Provincial Qinglan ProjectTeachers Overseas Study Program of Yancheng Institute of TechnologyJiangsu Provincial Government Scholarship for Overseas StudiesTalents Project of Yancheng Institute of Technology under Grant KJC2014038“2311”Talent Project of Yancheng Institute of TechnologyOpen Fund of Modern Agricultural Resources Intelligent Management and Application Laboratory of Huzhou Normal University.
文摘In RFID(Radio Frequency IDentification)system,when multiple tags are in the operating range of one reader and send their information to the reader simultaneously,the signals of these tags are superimposed in the air,which results in a collision and leads to the degrading of tags identifying efficiency.To improve the multiple tags’identifying efficiency due to collision,a physical layer network coding based binary search tree algorithm(PNBA)is proposed in this paper.PNBA pushes the conflicting signal information of multiple tags into a stack,which is discarded by the traditional anti-collision algorithm.In addition,physical layer network coding is exploited by PNBA to obtain unread tag information through the decoding operation of physical layer network coding using the conflicting information in the stack.Therefore,PNBA reduces the number of interactions between reader and tags,and improves the tags identification efficiency.Theoretical analysis and simulation results using MATLAB demonstrate that PNBA reduces the number of readings,and improve RFID identification efficiency.Especially,when the number of tags to be identified is 100,the average needed reading number of PNBA is 83%lower than the basic binary search tree algorithm,43%lower than reverse binary search tree algorithm,and its reading efficiency reaches 0.93.
基金supported in part by the National Natural Science Foundation of China(61762093)the 17th Batch of Young and Middle-aged Leaders in Academic and Technical Reserved Talents Project of Yunnan Province(2014HB019)the Program for Innovative Research Team(in Science and Technology)in University of Yunnan Province
文摘Dynamic framed slotted Aloha algorithm is one of popular passive radio frequency identification(RFID) tag anticollision algorithms. In the algorithm, a frame length requires dynamical adjustment to achieve higher identification efficiency.Generally, the adjustment of the frame length is not only related to the number of tags, but also to the occurrence probability of capture effect. Existing algorithms could estimate both the number of tags and the probability of capture effect. Under large-scale RFID tag identification, however, the number of tags would be much larger than an initial frame length. In this scenario, the existing algorithm's estimation errors would substantially increase. In this paper, we propose a novel algorithm called capture-aware Bayesian estimate, which adopts Bayesian rules to accurately estimate the number and the probability simultaneously. From numerical results, the proposed algorithm adapts well to the large-scale RFID tag identification. It has lower estimation errors than the existing algorithms. Further,the identification efficiency from the proposed estimate is also higher than the existing algorithms.
基金Program for New Century Excellent Talents in University of Fujian Province (No.X04139)
文摘To address security and privacy issues in radio frequency identification (RFID) traceability networks, a multi-layer privacy and security framework is proposed, which includes four facets: a security model, a communication protocol, access permission and privacy preservation. According to the security requirements that are needed in an RFID system, a security model that incorporates security requirements that include privacy of tag data, privacy of ownership, and availability of tag identity is introduced. Using this model, a secure communication protocol that can be used for anti-counterfeiting, automatic identification and privacy preservation is then developed. In order to manage the number of parties, data records of items, and complicated transitions of access permissions in an item-level traceability context, a well-designed access control protocol is proposed to parties that can prove the physical possession of an item;meanwhile, to address the privacy issues during data sharing in an RFID network, a vision of database systems that take responsibility for the privacy of the data they manage is also presented.
基金supported by the National Natural Science Foundation of China(71571142,51275396)
文摘Under industry 4.0, internet of things(IoT), especially radio frequency identification(RFID) technology, has been widely applied in manufacturing environment. This technology can bring convenience to production control and production transparency. Meanwhile, it generates increasing production data that are sometimes discrete, uncorrelated, and hard-to-use. Thus,an efficient analysis method is needed to utilize the invaluable data. This work provides an RFID-based production data analysis method for production control in Io T-enabled smart job-shops.The physical configuration and operation logic of Io T-enabled smart job-shop production are firstly described. Based on that,an RFID-based production data model is built to formalize and correlate the heterogeneous production data. Then, an eventdriven RFID-based production data analysis method is proposed to construct the RFID events and judge the process command execution. Furthermore, a near big data approach is used to excavate hidden information and knowledge from the historical production data. A demonstrative case is studied to verify the feasibility of the proposed model and methods. It is expected that our work will provide a different insight into the RFIDbased production data analysis.
基金Supported by the National Natural Science Foundation of China(No.61340005)Beijing Natural Science Foundation(No.4132012)+2 种基金Beijing Education Committee Science and Technology Development Plan(No.KM201411232011)Beijing Outstanding Personnel Training Project(No.2013D005007000006)Scientific Research Improving Project-Intelligent Sense and Information Processing(No.5211524100)
文摘In this work,an optimal Q algorithm based on a collision recovery scheme is presented. Tags use BIBD-( 16,4,1) codes instead of RN16 s. Therefore,readers can make a valid recognition even in collision slots. A way of getting the optimal slot-count parameter is studied and an optimal Q algorithm is proposed. The theoretical and simulation results show that the proposed algorithm can improve reading efficiency by 100% more than the conventional Q algorithm. Moreover,the proposed scheme changes little to the existing standard. Thus,it is easy to implement and compatible with ISO 18000-6C.
基金supported by Fundamental Research Funds for the Central Universities of China (No.N100323001)Scientific Research Foundation of the Higher Education Institutions of Hebei Province of China (No.Z2010215)
文摘Radio frequency identification (RFID) system is a contactless automatic identification system, which uses small and low cost RFID tags. The primary problem of current security and privacy preserving schemes is that, in order to identify only one single tag, these schemes require a linear computational complexity on the server side. We propose an efficient mutual authentication protocol for passive RFID tags that provides confidentiality, untraceability, mutual authentication, and efficiency. The proposed protocol shifts the heavy burden of asymmetric encryption and decryption operations on the more powerful server side and only leaves lightweight hash operation on tag side. It is also efficient in terms of time complexity, space complexity, and communication cost, which are very important for practical large-scale RFID applications.
基金partially supported by the National Natural Science Foundation of China under Grant No.61370203the China Postdoctoral Science Foundation under Grant No.2016M602675the Foundation of the Central Universities in China under Grant No.ZYGX2016J123。
文摘The radio frequency identification(RFID)technology has been widely used so far in industrial and commercial applications.To develop the RFID tags that support elliptic curve cryptography(ECC),we propose a scalable and mutual authentication protocol based on ECC.We also suggest a tag privacy model that provides adversaries exhibiting strong abilities to attack a tag’s privacy.We prove that the proposed protocol preserves privacy under the privacy model and that it meets general security requirements.Compared with other recent ECCbased RFID authentication protocols,our protocol provides tag privacy and performs the best under comprehensive evaluation of tag privacy,tag computation cost,and communications cost.
文摘Globalization has opened practically every country in the globe to tourism and commerce today.In every region,the volume of vehicles traveling through border crossings has increased significantly.Smartcards and radio frequency identification(RFID)have been proposed as a new method of identifying and authenticating passengers,products,and vehicles.However,the usage of smartcards and RFID tag cards for vehicular border crossings continues to suffer security and flexibility challenges.Providing a vehicle’s driver a smartcard or RFID tag card may result in theft,loss,counterfeit,imitation,or vehicle transmutation.RFID sticker tags would replace RFID tags as vehicle border passes to solve the mentioned problem.The RFID sticker tag adheres to the windscreen,side screen,dash,hood,or door of the vehicle,or any other acceptable location.Any damage or stripping from the installed location may cause data corruption and cannot be reused.Overall,these sticker tags will make the border crossingsmore secure and efficient.This article focuses on designing a rectangular-shaped RFID sticker tag antenna made of graphene sheets as a possible solution for smart border crossings.The proposed antenna is mathematically designed and analyzed with CST software to determine the optimum parameters.The design parameters are then used to create an antenna on a prepared graphene sheet.The performance results are carried out with CST software and a network analyzer.The designed RFID antenna stick on a car windscreen offers approximately 900 MHz bandwidth over the frequency range from 1.8 GHz to 2.7 GHz with an average gain of 1.23 dBi at the frequency to be used of 2.4 GHz microwave RFID band.The radiation is an omnidirectional pattern.The proposed graphene-sheet rectangular-shape monopole antenna is compact,low-cost,and bendable to fit into the windscreen of a car while retaining excellent wave propagation capabilities.These findings illustrate the suggested antenna’s potential as an RFID tag antenna in a vehicular smart border pass system.
基金Chinese National High Technology Research and Development Program(No.2014BAG03B03)
文摘With the rapid development of vehicular ad hoc network( VANET) technology,VANET applications such as safe driving and emergency rescue demand high position accuracy,but traditional GPS is difficult to meet new accuracy requirements. To overcome this limitation,a new vehicle positioning method based on radio frequency identification( RFID) is proposed. First RFID base stations are divided into three categories using fuzzy technology,and then Chan algorithm is used to calculate three vehicles' positions,which are weighed to acquire vehicles' accurate position. This method can effectively overcome the problem that vehicle positioning accuracy is not high resulting from the factors such as ambient noise and base distribution when Chan algorithm is used. Experimental results show that the performance of the proposed method is superior to Chan algorithm and 2-step algorithm based on averaging method,which can satisfy the requirements of vehicle positioning in VANETs.
文摘In this paper two proposed methods of input impedance calculation for Bow-Tie antenna are introduced. The proposed methods show input impedance calculation with high accuracy. Also, design curves for input impedance values were developed depending on the geometry of antenna. The proposed design curves are used to design a Bow-Tie type RFID tag antenna. The input impedance of the tag antenna is calculated using proposed methods and compared with that obtained using CST studio suite 2014 and IE3D Zeland version 12.0 software packages. The results are investigated and discussed. The tag antenna is fabricated, measured and the obtained input impedance is compared with the simulation and the proposed methods. Good agreement among measured input impedance and that simulated by CST, IE3D or proposed methods is obtained.
文摘Radio frequency identification (RFID) shall be a revolutionary technological innovation in recent years. Various solutions employing RFID technology have proved their functionality already in such industries as pharmaceuticals, express parcel carrying, and automotive manufacturing, and the increased efficiency and effectiveness has provided a good payback for the investments. But, up to now, fewer researches concentrate on applying REID to heavy-machinery manufacturing enterprises, which are a typical kind of enterprises in discrete manufacturing industry. The main objective of this case study is to extend our understanding of the potential for RFID to delivery of the heavy-machinery manufacturing enterprise, which involves one specific supply chain. A trial to automate the verification activities of delivery is designed and performed. Results show that the stops currently designed into the processes can be eliminated by employing RFID technology and that RFID should be a revolutionary technology as it redesigns the existing processes, eliminate some current inefficiency, improve the accuracy of delivering the products, increases information sharing between supply chain members.
文摘Automatic robot navigation is being utilized in many industries for the purpose of high speed work delivery. Color follower, fix path follower robots are current solution to this activities but dynamic path configuration is not possible in these robots. Hence new system proposes effective and fully dynamic path follower robots using RFID and directional antenna. Radio Frequency Identification (RFID) system permits automatic identification of objects with RFID tags using radio waves which have been widely used in mobile robot navigation, localization and mapping both in indoor and outdoor environment. This article presents a navigation strategy for autonomous mobile robot using passive RFID system. Proposed robot system is provided with RFID tag functionality which will load tag number and direction instruction. At some turning point, user will put RF tag, this tag will be read by RF reader which is placed on robot. As per direction instruction robot will change the direction and reach to the destination. Also as per the movement, robot will send its GPS location to PC (Personal Computer) which will be displayed on PC. Hence main goal is to provide more reliable and low energy consumption based indoor positioning system which will be achieved using directional antenna.
基金the National Natural Science Foundation of China (No. 61071078)
文摘A radio frequency identification (RFID) reader will fail to identify tags if a collision occurs. This paper proposes a bi-slotted binary tree algorithm (BSBTA) with stack for RFID tag anti-collision to improve the performance of binary tree algorithm (BTA). In BSBTA, the reader detects collisions by Manchester code and stores colliding prefixes in a stack. The query is composed of a two-bit prefix and an index value. Following every reader query, there are two timeslots for tags whose pointers and identities (IDs) match the query to respond, one for the tag whose next bit is 0 and the other for the tag with 1 as its next bit. Performance analysis and evaluation are also given. The time complexity and the communication complexity of BTA and BSBTA are derived. The simulation results compare the performance of BSBTA with several related anti-collision algorithms. It is shown that BSBTA outperforms BTA in terms of the average number of responded bits and timeslots for one tag identification.