The 13.56 MHz analog front-end circuit for ISO/IEC 15693-compatible radio frequency identification (RFID) trans- ponder IC presented in this paper converts RF power to DC and extracts clock and data from the interroga...The 13.56 MHz analog front-end circuit for ISO/IEC 15693-compatible radio frequency identification (RFID) trans- ponder IC presented in this paper converts RF power to DC and extracts clock and data from the interrogator by 10% or 100% ASK modulation. The transponder sends data back to the interrogator by load modulation technology. The electrostatic discharge (ESD) protection circuits function to limit RF voltage to a safe level. An inductive coupling simulation modelling for 13.56 MHz RFID system is presented, with simulation results showing that the transponder operates over a wide range of electromagnetic field strength from Hmin (150 mA/m) to Hmax (5 A/m). The transponder IC is implemented in SMIC 0.35-μm three-metal two-poly mixed signal CMOS technology with embedded EEPROM.展开更多
Secure and private authentication protocol is important in Radio Frequency Identification (RFID) technology.To date,researchers have proposed many RFID authentication protocols.However,these protocols have many flaws ...Secure and private authentication protocol is important in Radio Frequency Identification (RFID) technology.To date,researchers have proposed many RFID authentication protocols.However,these protocols have many flaws due to lack of theoretical support in designing these protocols.In this work,first we present the security and privacy requirements in RFID authentication protocols.Then we examine related works and point out problems in designing RFID authentication protocols.To solve these problems,we propose and briefly prove three theorems.We also give necessary examples for better understanding these theorems with concrete protocols.At last,we give our suggestions on designing secure and private authentication protocols.The security and privacy requirements,theorems,and suggestions will facilitate better understanding and designing of RFID authentication protocols in the future.展开更多
Most of the Radio Frequency IDentification (RFID) authentication protocols, proposed to preserve security and privacy, are analysed to show that they can not provide security against some passive or active attacks. In...Most of the Radio Frequency IDentification (RFID) authentication protocols, proposed to preserve security and privacy, are analysed to show that they can not provide security against some passive or active attacks. In this paper, the security of two matrix-based protocols, proposed by Karthikeyan and Nesterenko (KN protocol) and Ramachandra et al. (RRS protocol) that conform to Electronic Product Code Class-1 Generation-2 (EPC Class-1 Gen-2) standard, are investigated. Using the linear relationship of multiplication of matrix and vector, we point out that both protocols can not provide scalability, and they are vulnerable to passive impersonation attack. In addition, both protocols are totally insecure if the adversary can compromise one tag to extract the secrets. A modified lightweight matrix-based authentication protocol is presented, which can resist mainly common attacks on an RFID authentication system including eavesdropping, relay attack, desynchronization attack, impersonation attack and tag tracking attack. The new protocol also has the desirable scalability property and can keep secure under compromising attack.展开更多
Warehouse operation has become a critical activity in supply chain. Position information of pallets is important in warehouse management which can enhance the efficiency of pallets picking and sortation. Radio frequen...Warehouse operation has become a critical activity in supply chain. Position information of pallets is important in warehouse management which can enhance the efficiency of pallets picking and sortation. Radio frequency identification(RFID) has been widely used in warehouse for item identifying. Meanwhile, RFID technology also has great potential for pallets localization which is underutilized in warehouse management. RFID-based checking-in and inventory systems have been applied in warehouse management by many enterprises. Localization approach is studied, which is compatible with existing RFID checking-in and inventory systems. A novel RFID localization approach is proposed for pallets checking-in. Phase variation of nearby tags was utilized to estimate the position of added pallets. A novel inventory localization approach combing angle of arrival(AOA) measurement and received signal strength(RSS) is also proposed for pallets inventory. Experiments were carried out using standard UHF passive RFID system. Experimental results show an acceptable localization accuracy which can satisfy the requirement of warehouse management.展开更多
The clock generator and OOK modulator for RFID (Radio Frequency Identification) presented in this paper consist of a current source and delay elements. The simple constant-gm structure is adopted in the current source...The clock generator and OOK modulator for RFID (Radio Frequency Identification) presented in this paper consist of a current source and delay elements. The simple constant-gm structure is adopted in the current source design and the current consumption of the current source is only about 2 μA. The delay elements, the clock generator and OOK modulator are introduced in detail in the paper. The designed circuits are fabricated by 0.6 μm CMOS process. The area of the core circuit is only about 400 μm×80 μm. The delay time of all three samples is in the range of 9 μs to 21 μs when the supply voltage varies from 2 V to 4 V. As the measured results satisfy the system requirements, these circuit structures are suitable for RFID application.展开更多
A design for low power consumption inspection instrument, in which the ATMega32L is used as the control core, is presented. The reader with wireless identification based on RF technology is researched and the low-cost...A design for low power consumption inspection instrument, in which the ATMega32L is used as the control core, is presented. The reader with wireless identification based on RF technology is researched and the low-cost power is studied particularly. This instrument can be used in industry fields to measure temperature, humidity, gas concentration and other specifications, so it has wide applications and is worth to be extended.展开更多
Wireless location technology is used to locate,track and monitor the location of given target using devices such as the radio frequency identification(RFID) based on WiFi technology and the sensors. And such applicati...Wireless location technology is used to locate,track and monitor the location of given target using devices such as the radio frequency identification(RFID) based on WiFi technology and the sensors. And such applications as long term evolution(LTE) ,wireless local area networks(WLAN) ,RFID and location based service(LBS) are essential in today's wireless communications industry. In this paper,both wireless location technology and its application are proposed,where our experimental research results and theoretical innovation are included.展开更多
A compact antenna formed by three concentric split rings for ultra-high frequency(UHF)radio frequency identification(RFID)tag is proposed in this paper.The antenna is composed of two parts,an outer short-circuited rin...A compact antenna formed by three concentric split rings for ultra-high frequency(UHF)radio frequency identification(RFID)tag is proposed in this paper.The antenna is composed of two parts,an outer short-circuited ring modified from a traditional split-ring resonator(SRR)antenna and an inner SRR load,so the antenna can be regarded as a short-circuited ring loaded with SRR.According to the transmission line theory,to conjugate match with the capacitive input-impedance of a tag chip,the length of the short-circuited ring isλg/4 shorter than that of an open-circuited dipole of a traditional SRR antenna,whereλg is the wavelengh of the operating frequency.Hence,the size of the proposed antenna is more compact than that of the traditional SRR antenna.Thereafter,the proposed antenna is simulated and optimized by ANSYS high-frequency structure simulator(HFSS).The impedance,efficiency,and mutual coupling of the fabricated antenna are tested in a reverberation chamber(RC).The results show that the size of the presented antenna is 83%smaller than that of the traditional SRR antenna and the proposed antenna can cover the whole UHF RFID operating frequency band worldwide(840—960 MHz).The measured read range of the tag exhibits maximum values of 45 cm in free space and 37 cm under dense tag environment.展开更多
The communication in the physical layer between an interrogator and a tag of a passive Radio Frequency Identification (RFID) system operating between 860-960 MHz is defined by the Gen 2 protocol. The tag can be cons...The communication in the physical layer between an interrogator and a tag of a passive Radio Frequency Identification (RFID) system operating between 860-960 MHz is defined by the Gen 2 protocol. The tag can be considered a remote executing unit or a computer that executes instructions from the Gen 2 protocol. The selection of the parameter and command configuration within the protocol limitations is critical especially if the time available for the memory operations in a passive RFID system is limited. An effort is made to map the operation of the tag not in its states of operation as elaborately explained in the protocol but rather in its elementary format. The research reported in this article identifies all the parameters that affect the dynamic operation of the tag. The operation is further divided into singulation, read and write; identifying the significant parameters in each case. The choices of the different commands that can be adopted to perform identical operations on the tag are analyzed. The elements to consider in selecting the optimum command configuration are described. The impact of the different parameter and command configuration on the singulation, read and write time is calculated and recorded using a tested Gen 2 simulator program.展开更多
This paper presents a design for a self-powered radio frequency identification (RFID) tag with a thin film bulk acoustic reso- nating piezoelectric power supply (PPS), which can be used for portable remote temperature...This paper presents a design for a self-powered radio frequency identification (RFID) tag with a thin film bulk acoustic reso- nating piezoelectric power supply (PPS), which can be used for portable remote temperature monitoring. We call this system a PPS-RFID for short. The RFID systems have been found to have many applications in the internet of things (IOT) in the past decade. But semi-active RFID tags require an onboard battery which limits their applications in many fields. For these reasons, our research focuses on power sources for the RFID tags. This paper emphasizes the circuit design and simulation of PPS. In our tests, 0.283 mW was generated by PPS at 1 Hz vibration by a 650 N impact force. The results showed that the integrated PPS could supply sufficient power for the designed PPS-RFID tag. The PPS-RFID tag can be widely used for temperature monitoring during mobile transport of perishable items such as medicines or food.展开更多
文摘The 13.56 MHz analog front-end circuit for ISO/IEC 15693-compatible radio frequency identification (RFID) trans- ponder IC presented in this paper converts RF power to DC and extracts clock and data from the interrogator by 10% or 100% ASK modulation. The transponder sends data back to the interrogator by load modulation technology. The electrostatic discharge (ESD) protection circuits function to limit RF voltage to a safe level. An inductive coupling simulation modelling for 13.56 MHz RFID system is presented, with simulation results showing that the transponder operates over a wide range of electromagnetic field strength from Hmin (150 mA/m) to Hmax (5 A/m). The transponder IC is implemented in SMIC 0.35-μm three-metal two-poly mixed signal CMOS technology with embedded EEPROM.
基金supported in part by the Natioual Natural Science Foundation of China(Grant No.60933003)the High Technical Research and Development Program of China(Grant No.2006AA01Z101)+1 种基金Shaanxi ISTC(Grant No.2008KW-02)IBM Joint Project
文摘Secure and private authentication protocol is important in Radio Frequency Identification (RFID) technology.To date,researchers have proposed many RFID authentication protocols.However,these protocols have many flaws due to lack of theoretical support in designing these protocols.In this work,first we present the security and privacy requirements in RFID authentication protocols.Then we examine related works and point out problems in designing RFID authentication protocols.To solve these problems,we propose and briefly prove three theorems.We also give necessary examples for better understanding these theorems with concrete protocols.At last,we give our suggestions on designing secure and private authentication protocols.The security and privacy requirements,theorems,and suggestions will facilitate better understanding and designing of RFID authentication protocols in the future.
基金Supported by the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD)the National Natural Science Foundation of China (No.60903181)Nanjing University of Posts and Telecommunications Funds (No.NY208072)
文摘Most of the Radio Frequency IDentification (RFID) authentication protocols, proposed to preserve security and privacy, are analysed to show that they can not provide security against some passive or active attacks. In this paper, the security of two matrix-based protocols, proposed by Karthikeyan and Nesterenko (KN protocol) and Ramachandra et al. (RRS protocol) that conform to Electronic Product Code Class-1 Generation-2 (EPC Class-1 Gen-2) standard, are investigated. Using the linear relationship of multiplication of matrix and vector, we point out that both protocols can not provide scalability, and they are vulnerable to passive impersonation attack. In addition, both protocols are totally insecure if the adversary can compromise one tag to extract the secrets. A modified lightweight matrix-based authentication protocol is presented, which can resist mainly common attacks on an RFID authentication system including eavesdropping, relay attack, desynchronization attack, impersonation attack and tag tracking attack. The new protocol also has the desirable scalability property and can keep secure under compromising attack.
基金Project(2009BADB9B09)supported by the National Key Technologies R&D Program of China
文摘Warehouse operation has become a critical activity in supply chain. Position information of pallets is important in warehouse management which can enhance the efficiency of pallets picking and sortation. Radio frequency identification(RFID) has been widely used in warehouse for item identifying. Meanwhile, RFID technology also has great potential for pallets localization which is underutilized in warehouse management. RFID-based checking-in and inventory systems have been applied in warehouse management by many enterprises. Localization approach is studied, which is compatible with existing RFID checking-in and inventory systems. A novel RFID localization approach is proposed for pallets checking-in. Phase variation of nearby tags was utilized to estimate the position of added pallets. A novel inventory localization approach combing angle of arrival(AOA) measurement and received signal strength(RSS) is also proposed for pallets inventory. Experiments were carried out using standard UHF passive RFID system. Experimental results show an acceptable localization accuracy which can satisfy the requirement of warehouse management.
文摘The clock generator and OOK modulator for RFID (Radio Frequency Identification) presented in this paper consist of a current source and delay elements. The simple constant-gm structure is adopted in the current source design and the current consumption of the current source is only about 2 μA. The delay elements, the clock generator and OOK modulator are introduced in detail in the paper. The designed circuits are fabricated by 0.6 μm CMOS process. The area of the core circuit is only about 400 μm×80 μm. The delay time of all three samples is in the range of 9 μs to 21 μs when the supply voltage varies from 2 V to 4 V. As the measured results satisfy the system requirements, these circuit structures are suitable for RFID application.
基金National Natural Science Foundation of Tianjin(08JCYBJC14700)
文摘A design for low power consumption inspection instrument, in which the ATMega32L is used as the control core, is presented. The reader with wireless identification based on RF technology is researched and the low-cost power is studied particularly. This instrument can be used in industry fields to measure temperature, humidity, gas concentration and other specifications, so it has wide applications and is worth to be extended.
基金National Natural Science Foundation of China ( No.61172073)Open Research Fund of National Mobile Communications Research Laboratory,Southeast University( No.W200906)Fundamental Research Funds for the Central Universities,Beijing Jiaotong University
文摘Wireless location technology is used to locate,track and monitor the location of given target using devices such as the radio frequency identification(RFID) based on WiFi technology and the sensors. And such applications as long term evolution(LTE) ,wireless local area networks(WLAN) ,RFID and location based service(LBS) are essential in today's wireless communications industry. In this paper,both wireless location technology and its application are proposed,where our experimental research results and theoretical innovation are included.
文摘A compact antenna formed by three concentric split rings for ultra-high frequency(UHF)radio frequency identification(RFID)tag is proposed in this paper.The antenna is composed of two parts,an outer short-circuited ring modified from a traditional split-ring resonator(SRR)antenna and an inner SRR load,so the antenna can be regarded as a short-circuited ring loaded with SRR.According to the transmission line theory,to conjugate match with the capacitive input-impedance of a tag chip,the length of the short-circuited ring isλg/4 shorter than that of an open-circuited dipole of a traditional SRR antenna,whereλg is the wavelengh of the operating frequency.Hence,the size of the proposed antenna is more compact than that of the traditional SRR antenna.Thereafter,the proposed antenna is simulated and optimized by ANSYS high-frequency structure simulator(HFSS).The impedance,efficiency,and mutual coupling of the fabricated antenna are tested in a reverberation chamber(RC).The results show that the size of the presented antenna is 83%smaller than that of the traditional SRR antenna and the proposed antenna can cover the whole UHF RFID operating frequency band worldwide(840—960 MHz).The measured read range of the tag exhibits maximum values of 45 cm in free space and 37 cm under dense tag environment.
文摘The communication in the physical layer between an interrogator and a tag of a passive Radio Frequency Identification (RFID) system operating between 860-960 MHz is defined by the Gen 2 protocol. The tag can be considered a remote executing unit or a computer that executes instructions from the Gen 2 protocol. The selection of the parameter and command configuration within the protocol limitations is critical especially if the time available for the memory operations in a passive RFID system is limited. An effort is made to map the operation of the tag not in its states of operation as elaborately explained in the protocol but rather in its elementary format. The research reported in this article identifies all the parameters that affect the dynamic operation of the tag. The operation is further divided into singulation, read and write; identifying the significant parameters in each case. The choices of the different commands that can be adopted to perform identical operations on the tag are analyzed. The elements to consider in selecting the optimum command configuration are described. The impact of the different parameter and command configuration on the singulation, read and write time is calculated and recorded using a tested Gen 2 simulator program.
基金supported by the MEMS subject construction fund of the Kunming University of Science and Technology (Grant No. 14078024)
文摘This paper presents a design for a self-powered radio frequency identification (RFID) tag with a thin film bulk acoustic reso- nating piezoelectric power supply (PPS), which can be used for portable remote temperature monitoring. We call this system a PPS-RFID for short. The RFID systems have been found to have many applications in the internet of things (IOT) in the past decade. But semi-active RFID tags require an onboard battery which limits their applications in many fields. For these reasons, our research focuses on power sources for the RFID tags. This paper emphasizes the circuit design and simulation of PPS. In our tests, 0.283 mW was generated by PPS at 1 Hz vibration by a 650 N impact force. The results showed that the integrated PPS could supply sufficient power for the designed PPS-RFID tag. The PPS-RFID tag can be widely used for temperature monitoring during mobile transport of perishable items such as medicines or food.