By Topic

Integration of RFID readers into wireless mobile telecommunication networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Ramiro Samano-Robles ; Instituto de Telecomunicações, Polo de Aveiro, Portugal ; Atilio Gameiro

Over the last few years significant work has been done in defining interfaces, standards, reader protocols and middleware platforms for RFID (radio frequency identification) systems. However, current solutions are mainly dedicated to environments where readers or interrogators are located in the same premises that host the middleware and database servers, thus leaving unattended an accurate analysis of how efficiently to integrate them into wireless mobile telecommunication networks. This is particularly critical in cases where readers need to be placed in geographically distant and mobile locations, and where bandwidth limitations of the underlying public wireless networks might restrict the deployment of certain RFID applications. This paper aims at partially filling this gap by first proposing an approximate and heuristic theoretical model for the effects of the traffic generated by a mobile RFID reader upon the communication links to be used, and then by analyzing the possibilities of integrating readers into known mobile telecommunication technologies. Based on the proposed approximation, basic relationships between different RFID parameters such as reader complexity, tag reading rate and the total utilized bandwidth are here found and discussed. Although the models and assumptions used here still need to be validated and/or adjusted to real system scenarios, it is expected that this work will bring further research on the interesting problem of designing RFID systems, where not only variables from different layers of the OSI (open system interconnection) model interact with each other, but many others coming from privacy, security, business and regulatory fields must also be addressed.

Published in:

Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, 2009. Wireless VITAE 2009. 1st International Conference on

Date of Conference:

17-20 May 2009