期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
基于RFID的高速公路雾区监控原理及概念设计 被引量:5
1
作者 王秀 《公路与汽运》 2007年第1期58-60,共3页
RFID(无线射频识别)技术是一种无线、非接触的自动识别技术,该技术在世界范围内正广泛应用于工业自动化、商业自动化和交通运输控制管理等众多领域。文中研究了高速公路雾区监控的必要性以及进行速度限制来预防交通事故的方法,介绍了RFI... RFID(无线射频识别)技术是一种无线、非接触的自动识别技术,该技术在世界范围内正广泛应用于工业自动化、商业自动化和交通运输控制管理等众多领域。文中研究了高速公路雾区监控的必要性以及进行速度限制来预防交通事故的方法,介绍了RFID识别技术的基本原理,并应用此技术完成了交通信号的检测与雾区监控系统的概念设计。 展开更多
关键词 公路 雾区 FRID( 线射频识别) ITS(智能运输系统) 三道防线理论 阅读器
下载PDF
技术改变图书馆:RFID在图书馆的应用
2
作者 宁圣红 《中小学图书情报世界》 2006年第6期61-63,共3页
RFID(无线射频识别技术)的应用,将极大地改变图书馆的状态,改变图书馆的工作方式, 促进图书馆智能化建设的进程。
关键词 RFID无 线射频识别 图书馆管理 技术应用
下载PDF
An analog front-end circuit for ISO/IEC 15693-compatible RFID transponder IC 被引量:4
3
作者 LIU Dong-sheng ZOU Xue-cheng +1 位作者 YANG Qiu-ping XIONG Ting-wen 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第10期1765-1771,共7页
The 13.56 MHz analog front-end circuit for ISO/IEC 15693-compatible radio frequency identification (RFID) trans- ponder IC presented in this paper converts RF power to DC and extracts clock and data from the interroga... The 13.56 MHz analog front-end circuit for ISO/IEC 15693-compatible radio frequency identification (RFID) trans- ponder IC presented in this paper converts RF power to DC and extracts clock and data from the interrogator by 10% or 100% ASK modulation. The transponder sends data back to the interrogator by load modulation technology. The electrostatic discharge (ESD) protection circuits function to limit RF voltage to a safe level. An inductive coupling simulation modelling for 13.56 MHz RFID system is presented, with simulation results showing that the transponder operates over a wide range of electromagnetic field strength from Hmin (150 mA/m) to Hmax (5 A/m). The transponder IC is implemented in SMIC 0.35-μm three-metal two-poly mixed signal CMOS technology with embedded EEPROM. 展开更多
关键词 Radio frequency identification (RFID) ISO/IEC 15693 Transponder IC Analog front-end
下载PDF
Study on RFID Authentication Protocol Theory 被引量:3
4
作者 齐勇 姚青松 +1 位作者 陈滢 钟虓 《China Communications》 SCIE CSCD 2011年第1期65-71,共7页
Secure and private authentication protocol is important in Radio Frequency Identification (RFID) technology.To date,researchers have proposed many RFID authentication protocols.However,these protocols have many flaws ... Secure and private authentication protocol is important in Radio Frequency Identification (RFID) technology.To date,researchers have proposed many RFID authentication protocols.However,these protocols have many flaws due to lack of theoretical support in designing these protocols.In this work,first we present the security and privacy requirements in RFID authentication protocols.Then we examine related works and point out problems in designing RFID authentication protocols.To solve these problems,we propose and briefly prove three theorems.We also give necessary examples for better understanding these theorems with concrete protocols.At last,we give our suggestions on designing secure and private authentication protocols.The security and privacy requirements,theorems,and suggestions will facilitate better understanding and designing of RFID authentication protocols in the future. 展开更多
关键词 RFID security and privacy authentica- tion protocol THEORY
下载PDF
ATTACKS AND IMPROVEMENTS ON THE RFID AUTHENTICATION PROTOCOLS BASED ON MATRIX 被引量:3
5
作者 Wang Shaohui Liu Sujuan 《Journal of Electronics(China)》 2013年第1期33-39,共7页
Most of the Radio Frequency IDentification (RFID) authentication protocols, proposed to preserve security and privacy, are analysed to show that they can not provide security against some passive or active attacks. In... Most of the Radio Frequency IDentification (RFID) authentication protocols, proposed to preserve security and privacy, are analysed to show that they can not provide security against some passive or active attacks. In this paper, the security of two matrix-based protocols, proposed by Karthikeyan and Nesterenko (KN protocol) and Ramachandra et al. (RRS protocol) that conform to Electronic Product Code Class-1 Generation-2 (EPC Class-1 Gen-2) standard, are investigated. Using the linear relationship of multiplication of matrix and vector, we point out that both protocols can not provide scalability, and they are vulnerable to passive impersonation attack. In addition, both protocols are totally insecure if the adversary can compromise one tag to extract the secrets. A modified lightweight matrix-based authentication protocol is presented, which can resist mainly common attacks on an RFID authentication system including eavesdropping, relay attack, desynchronization attack, impersonation attack and tag tracking attack. The new protocol also has the desirable scalability property and can keep secure under compromising attack. 展开更多
关键词 Radio Frequency IDentification (RFID) Mutual authentication Matrix-based Imper-sonation attack PRIVACY SCALABILITY
下载PDF
Localization of pallets in warehouses using passive RFID system 被引量:2
6
作者 周俊儒 张宏建 周洪亮 《Journal of Central South University》 SCIE EI CAS CSCD 2015年第8期3017-3025,共9页
Warehouse operation has become a critical activity in supply chain. Position information of pallets is important in warehouse management which can enhance the efficiency of pallets picking and sortation. Radio frequen... Warehouse operation has become a critical activity in supply chain. Position information of pallets is important in warehouse management which can enhance the efficiency of pallets picking and sortation. Radio frequency identification(RFID) has been widely used in warehouse for item identifying. Meanwhile, RFID technology also has great potential for pallets localization which is underutilized in warehouse management. RFID-based checking-in and inventory systems have been applied in warehouse management by many enterprises. Localization approach is studied, which is compatible with existing RFID checking-in and inventory systems. A novel RFID localization approach is proposed for pallets checking-in. Phase variation of nearby tags was utilized to estimate the position of added pallets. A novel inventory localization approach combing angle of arrival(AOA) measurement and received signal strength(RSS) is also proposed for pallets inventory. Experiments were carried out using standard UHF passive RFID system. Experimental results show an acceptable localization accuracy which can satisfy the requirement of warehouse management. 展开更多
关键词 warehouse management radio frequency identification (RFID) LOCALIZATION tag phase
下载PDF
Clock generator and OOK modulator for RFID application
7
作者 张利 王振华 +3 位作者 李永明 张春 王志华 陈弘毅 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第10期1051-1054,共4页
The clock generator and OOK modulator for RFID (Radio Frequency Identification) presented in this paper consist of a current source and delay elements. The simple constant-gm structure is adopted in the current source... The clock generator and OOK modulator for RFID (Radio Frequency Identification) presented in this paper consist of a current source and delay elements. The simple constant-gm structure is adopted in the current source design and the current consumption of the current source is only about 2 μA. The delay elements, the clock generator and OOK modulator are introduced in detail in the paper. The designed circuits are fabricated by 0.6 μm CMOS process. The area of the core circuit is only about 400 μm×80 μm. The delay time of all three samples is in the range of 9 μs to 21 μs when the supply voltage varies from 2 V to 4 V. As the measured results satisfy the system requirements, these circuit structures are suitable for RFID application. 展开更多
关键词 RFID OOK CMOS Current source Delay elements
下载PDF
Design of Low-power Inspection Instrument Based on RF Technology
8
作者 WANG Min SU Li-hua WANG Jin-hai 《Semiconductor Photonics and Technology》 CAS 2009年第3期149-152,共4页
A design for low power consumption inspection instrument, in which the ATMega32L is used as the control core, is presented. The reader with wireless identification based on RF technology is researched and the low-cost... A design for low power consumption inspection instrument, in which the ATMega32L is used as the control core, is presented. The reader with wireless identification based on RF technology is researched and the low-cost power is studied particularly. This instrument can be used in industry fields to measure temperature, humidity, gas concentration and other specifications, so it has wide applications and is worth to be extended. 展开更多
关键词 RF address recognition status recognition intelligent inspection
下载PDF
Wireless location technology and its application 被引量:2
9
作者 Zhao Junhui Wang Dongming 《Engineering Sciences》 EI 2011年第4期32-37,共6页
Wireless location technology is used to locate,track and monitor the location of given target using devices such as the radio frequency identification(RFID) based on WiFi technology and the sensors. And such applicati... Wireless location technology is used to locate,track and monitor the location of given target using devices such as the radio frequency identification(RFID) based on WiFi technology and the sensors. And such applications as long term evolution(LTE) ,wireless local area networks(WLAN) ,RFID and location based service(LBS) are essential in today's wireless communications industry. In this paper,both wireless location technology and its application are proposed,where our experimental research results and theoretical innovation are included. 展开更多
关键词 wireless location technology APPLICATION LTE WLAN RFID LBS
下载PDF
A Modified Split⁃Ring Resonator Antenna for Radio Frequency Identification Tag 被引量:1
10
作者 CHEN Weikang NIU Zhenyi +2 位作者 LI Mengyuan XU Qian GU Changqing 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI CSCD 2021年第3期512-519,共8页
A compact antenna formed by three concentric split rings for ultra-high frequency(UHF)radio frequency identification(RFID)tag is proposed in this paper.The antenna is composed of two parts,an outer short-circuited rin... A compact antenna formed by three concentric split rings for ultra-high frequency(UHF)radio frequency identification(RFID)tag is proposed in this paper.The antenna is composed of two parts,an outer short-circuited ring modified from a traditional split-ring resonator(SRR)antenna and an inner SRR load,so the antenna can be regarded as a short-circuited ring loaded with SRR.According to the transmission line theory,to conjugate match with the capacitive input-impedance of a tag chip,the length of the short-circuited ring isλg/4 shorter than that of an open-circuited dipole of a traditional SRR antenna,whereλg is the wavelengh of the operating frequency.Hence,the size of the proposed antenna is more compact than that of the traditional SRR antenna.Thereafter,the proposed antenna is simulated and optimized by ANSYS high-frequency structure simulator(HFSS).The impedance,efficiency,and mutual coupling of the fabricated antenna are tested in a reverberation chamber(RC).The results show that the size of the presented antenna is 83%smaller than that of the traditional SRR antenna and the proposed antenna can cover the whole UHF RFID operating frequency band worldwide(840—960 MHz).The measured read range of the tag exhibits maximum values of 45 cm in free space and 37 cm under dense tag environment. 展开更多
关键词 radio frequency identification(RFID) compact antenna split-ring resonator(SRR) reverberation chamber(RC) dense tag environment
下载PDF
Execution Time Analysis of a Gen-2 Remote Computer
11
作者 Ajay Ogirala Archana Murari +1 位作者 Peter Hawrylak Marlin Mickle 《Computer Technology and Application》 2011年第2期94-101,共8页
The communication in the physical layer between an interrogator and a tag of a passive Radio Frequency Identification (RFID) system operating between 860-960 MHz is defined by the Gen 2 protocol. The tag can be cons... The communication in the physical layer between an interrogator and a tag of a passive Radio Frequency Identification (RFID) system operating between 860-960 MHz is defined by the Gen 2 protocol. The tag can be considered a remote executing unit or a computer that executes instructions from the Gen 2 protocol. The selection of the parameter and command configuration within the protocol limitations is critical especially if the time available for the memory operations in a passive RFID system is limited. An effort is made to map the operation of the tag not in its states of operation as elaborately explained in the protocol but rather in its elementary format. The research reported in this article identifies all the parameters that affect the dynamic operation of the tag. The operation is further divided into singulation, read and write; identifying the significant parameters in each case. The choices of the different commands that can be adopted to perform identical operations on the tag are analyzed. The elements to consider in selecting the optimum command configuration are described. The impact of the different parameter and command configuration on the singulation, read and write time is calculated and recorded using a tested Gen 2 simulator program. 展开更多
关键词 Radio Frequency Identification (RFID) Gen 2 Gen 2 simulator Gen 2 parameter configuration Gen 2 commandconfiguration.
下载PDF
Design and simulation of self-powered radio frequency identification (RFID) tags for mobile temperature monitoring 被引量:6
12
作者 CHU HeQun WU GuangMin +3 位作者 CHEN JianMing FEI Fei MAI John D LI Wen J 《Science China(Technological Sciences)》 SCIE EI CAS 2013年第1期1-7,共7页
This paper presents a design for a self-powered radio frequency identification (RFID) tag with a thin film bulk acoustic reso- nating piezoelectric power supply (PPS), which can be used for portable remote temperature... This paper presents a design for a self-powered radio frequency identification (RFID) tag with a thin film bulk acoustic reso- nating piezoelectric power supply (PPS), which can be used for portable remote temperature monitoring. We call this system a PPS-RFID for short. The RFID systems have been found to have many applications in the internet of things (IOT) in the past decade. But semi-active RFID tags require an onboard battery which limits their applications in many fields. For these reasons, our research focuses on power sources for the RFID tags. This paper emphasizes the circuit design and simulation of PPS. In our tests, 0.283 mW was generated by PPS at 1 Hz vibration by a 650 N impact force. The results showed that the integrated PPS could supply sufficient power for the designed PPS-RFID tag. The PPS-RFID tag can be widely used for temperature monitoring during mobile transport of perishable items such as medicines or food. 展开更多
关键词 self-powered radio frequency identification (RFID) PIEZOELECTRIC temperature monitoring energy harvesting internet of things
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部