By Topic

RFID, 2009 IEEE International Conference on

Date 27-28 April 2009

Filter Results

Displaying Results 1 - 25 of 54
  • About IEEE RFID 2009

    Publication Year: 2009 , Page(s): 4
    Request Permissions | PDF file iconPDF (55 KB)  
    Freely Available from IEEE
  • Welcome to the 2009 IEEE International Conference on RFID

    Publication Year: 2009 , Page(s): 5 - 6
    Request Permissions | PDF file iconPDF (84 KB)  
    Freely Available from IEEE
  • Letter from General Vice Chair Peter Abell

    Publication Year: 2009 , Page(s): 7
    Request Permissions | PDF file iconPDF (77 KB)  
    Freely Available from IEEE
  • Letter from Technical Program Chair Dr. Christian Floerkemeier

    Publication Year: 2009 , Page(s): 8
    Request Permissions | PDF file iconPDF (86 KB)  
    Freely Available from IEEE
  • IEEE RFID 2009 Organizing Committee

    Publication Year: 2009 , Page(s): 9 - 12
    Request Permissions | PDF file iconPDF (226 KB)  
    Freely Available from IEEE
  • Our thanks

    Publication Year: 2009
    Request Permissions | PDF file iconPDF (71 KB)  
    Freely Available from IEEE
  • Technical program

    Publication Year: 2009 , Page(s): 14 - 26
    Request Permissions | PDF file iconPDF (277 KB)  
    Freely Available from IEEE
  • HB-MP++ protocol: An ultra light-weight authentication protocol for RFID system

    Publication Year: 2009 , Page(s): 186 - 191
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (534 KB) |  | HTML iconHTML  

    Since Hopper and Blum suggested the HB protocol which is based on the conjectured hardness of the LPN (Learning Parity in the Presence of Noise) problem in 2001, a family of light-weight authentication protocols has been developed for RFID (Radio Frequency Identification) system by many engineers. It was found that each algorithm had own weakness against new attacks so that more advanced protocols... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Load shedding based resource management techniques for RFID data

    Publication Year: 2009 , Page(s): 306 - 313
    Cited by:  Papers (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (545 KB) |  | HTML iconHTML  

    RFID based systems are enjoying widespread adoption in a variety of application scenarios. Item tracking in a supply chain environment is one such application. From an application perspective, there are two challenges: (a) the data rates for large deployments are growing significantly; (b) the demands placed on the system for query processing in real time are also on the rise. Meeting these challe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid ultrasound-RFID indoor positioning: Combining the best of both worlds

    Publication Year: 2009 , Page(s): 155 - 162
    Cited by:  Papers (7)  |  Patents (4)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (316 KB) |  | HTML iconHTML  

    Existing hybrid ultrasound/RF positioning systems usually measure ultrasonic time-of-flight. This operation requires a wide bandwidth and this makes it rather noise sensitive, limiting the useful range. Therefore a new system is proposed where only the room-indicating capability of ultrasound is utilized and combined with RF. A portable tag obtains the room location by receiving a narrow bandwidth... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Inference of product quality by using RFID-enabled traceability information a study on the US pharmaceutical supply chain

    Publication Year: 2009 , Page(s): 298 - 305
    Cited by:  Papers (3)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (387 KB) |  | HTML iconHTML  

    We present a stochastic model to infer a product quality index by using product traceability information. We propose a model by using Bayesian Network and apply it to the US pharmaceutical supply chain where regulations to mandate exchanging of traceability information for individual prescription drugs are being studied. In supply chains where traceability information of only a few products is ava... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security considerations in the design and peering of RFID Discovery Services

    Publication Year: 2009 , Page(s): 249 - 256
    Cited by:  Papers (3)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (345 KB) |  | HTML iconHTML  

    There is growing interest in discovery services for locating RFID and supply chain data between companies globally, to obtain product lifecycle information for individual objects. Discovery services are heralded as a means to find serial-level data from previously unknown parties, however more realistically they provide a means to reduce the communications load on the information services, the net... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile-phone-readable 2.45GHz passive digital sensor tag

    Publication Year: 2009 , Page(s): 88 - 94
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1453 KB) |  | HTML iconHTML  

    A 2.45 GHz passive RFID tag including a digital pressure sensor and its use in a mobile-phone-centric architecture for sensor networks are described. The combination of a low-cost remote-powered sensor tag and an open architecture makes possible a variety of ambient intelligence applications. The tag gathers power from the ISM band at 2.45 GHz and wireless pressure measurement is demonstrated at a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Demonstration of improved passive UHF RFID coverage using optically-fed distributed multi-antenna system

    Publication Year: 2009 , Page(s): 217 - 224
    Cited by:  Papers (7)  |  Patents (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (970 KB) |  | HTML iconHTML  

    Optically-fed distributed antenna system (DAS) technology is combined with passive ultra high frequency (UHF) radio frequency identification (RFID). It is shown that RFID signals can be carried on directly modulated radio over fiber links without impacting their performance. It is also shown that a multi-antenna DAS can greatly reduce the number of nulls experienced by RFID in a complex radio envi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • UHF RFID transponders antenna design for metal and wood surfaces

    Publication Year: 2009 , Page(s): 270 - 277
    Cited by:  Papers (4)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (2112 KB) |  | HTML iconHTML  

    In this paper, metal and wood support effect on UHF RFID transponders are investigated. New antennas designed for passive UHF RFID transponders mounted on metal and wood surfaces are described. Simulation results are presented which are in good agreement with measurement data. The transponder reading distance measurement shows good performance. In particular the reading distance obtained with the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Low-power energy supply circuit for passive RFID transponder

    Publication Year: 2009 , Page(s): 1 - 6
    Request Permissions | Click to expandAbstract | PDF file iconPDF (408 KB) |  | HTML iconHTML  

    This paper addresses low power design approaches for passive RFID transponder. It proposes a novel low power energy supply circuit, which includes amplitude limiter, rectifier circuit, analog power supply circuit, digital power supply circuit and high voltage power supply circuit. The simulation and measurement results show that proposed voltage rectifier, amplitude limiter and power supply circui... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the measurement of the delta Radar Cross Section (ΔRCS) for UHF tags

    Publication Year: 2009 , Page(s): 346 - 351
    Cited by:  Papers (10)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (946 KB) |  | HTML iconHTML  

    This paper presents a methodology for the practical measurement of the variation of the radar cross section for the RFID UHF tags. This is a very critical parameter, and will govern the tag performance. It also influences both the reading distance as well as the sensitivity of UHF tag. The paper includes the analysis procedure and the experimental setup. The later is based on standard equipments s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A low-power dual-clock strategy for digital circuits of EPC Gen2 RFID tag

    Publication Year: 2009 , Page(s): 7 - 14
    Request Permissions | Click to expandAbstract | PDF file iconPDF (641 KB) |  | HTML iconHTML  

    Power consumption is critical to the performance of EPC Gen2 RFID tags. System clock frequency of tags should be as low as possible to reduce the power consumption and still conform to the protocol. This paper analyses the impact of different clock strategies on digital circuits of EPC Gen2 tag. An error shift approach is proposed to reduce the backscatter link frequency (BLF) errors. A dual-clock... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effect of Gen2 protocol parameters on RFID tag performance

    Publication Year: 2009 , Page(s): 117 - 122
    Cited by:  Papers (12)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1252 KB) |  | HTML iconHTML  

    In this paper, we analyze the effect of Gen2 protocol parameters on RFID tag performance (tag sensitivity and backscatter efficiency). We describe our measurement methodology and perform characterization of several tags with different latest Gen2 ICs available on the market (Monza, UCODE, and Higgs families). To confirm our findings, we repeat measurements using conducted tag setup. We analyze dat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Untraceable RFID authentication protocols: Revision of EC-RAC

    Publication Year: 2009 , Page(s): 178 - 185
    Cited by:  Papers (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (376 KB) |  | HTML iconHTML  

    Radio Frequency IDentiflcation (RFID) systems are steadily becoming paramount due to their vast applications such as supply chains, inventory, tolling, baggage management, access control etc. While they have potentials to improve our lives, they also present a privacy risk. Privacy is often overlooked in many applications, but due to pervasiveness of RFIDs the issue has to be taken into account. H... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ALOHA algorithm considering the slot duration difference in RFID system

    Publication Year: 2009 , Page(s): 56 - 63
    Cited by:  Papers (10)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (536 KB) |  | HTML iconHTML  

    when multiple RFID tag identification is becoming a commonplace, the anti-collision technology for multiple RFID tag environment has drawn mounting research interest in the RFID domain. Many published Aloha-based algorithms, assuming that all the slots have the same duration, tend to increase the number of successful slots by tag estimation and dynamic frame scheduling, and thus improve the system... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measurement methods for power requirements of high performance UHF RFID tags

    Publication Year: 2009 , Page(s): 20 - 27
    Cited by:  Papers (5)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (463 KB) |  | HTML iconHTML  

    The sensitivity parameter is one of the most important parameters characterizing UHF RFID tags. This paper presents methods for measuring this parameter. It focuses on the use of non-expensive laboratory equipment. Nevertheless, the proposed methods provide accurate results. Losses and behavior of the setup are calculated and described in detail. Single-ended and differential structures are distin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptography is feasible on 4-Bit microcontrollers - A proof of concept

    Publication Year: 2009 , Page(s): 241 - 248
    Cited by:  Papers (4)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (677 KB) |  | HTML iconHTML  

    The RFID technology in combination with cryptographic algorithms and protocols is discussed widely as a promising solution against product counterfeiting. Usually the discussion is focussed on passive low-cost RFID-tags, which have harsh power constraints. 4-Bit microcontrollers have very low-power characteristics (5-60 muA) and are therefore an interesting platform for active and passive low-cost... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Serialized TID numbers - A headache or a blessing for RFID crackers?

    Publication Year: 2009 , Page(s): 233 - 240
    Cited by:  Papers (4)  |  Patents (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (657 KB) |  | HTML iconHTML  

    Though transponder ID (TID) numbers of RFID tags were originally introduced to identify the chip model, serialized TID numbers are currently advertised as security features of UHF chips. Serialized TID numbers do not provide any cryptographic protection, but they do introduce a practical hurdle against adversaries who want to clone RFID tags today. Furthermore, serialized TID numbers are important... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preserving RFID data privacy

    Publication Year: 2009 , Page(s): 200 - 207
    Cited by:  Papers (5)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (790 KB) |  | HTML iconHTML  

    Radio frequency identification (RFID), a technology for automatic object identification, has wide applications in many areas including manufacturing, healthcare, and transportation. Yet, the uniquely identifiable objects pose a privacy threat to individuals carrying the objects. Most previous work on privacy-preserving RFID technology, such as EPC re-encryption and killing tags, focused on the thr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.