Smartphones as Wireless Reflector Tags ? - A Feasibility Study

نویسندگان

  • Henrik Eriksson
  • Lars Strandén
  • Daniel Skarin
  • Ragne Emardson
  • Per Jarlemark
  • Åse Svensson
چکیده

This report investigates the feasibility of using smartphones as wireless reflector tags. A smartphone communicates its GNSS positioning data via peer-to-peer connections to nearby road users to notify its presence. Appropriate use cases are studied based on accident data. Different communication protocols and a pseudo differencing positioning technique are evaluated. Possibilities and obstacles are presented.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis of Smartphone User Mobility Traces for Opportunistic Data Collection

Considering that smartphones are tightly-coupled with their users, the interaction between smartphones and wireless sensor networks will play a very important role in pervasive computing for improving our daily life. Instead of using smartphones to access the services provided by various wireless sensor networks, we focus on using smartphones to collect data from sensor nodes opportunistically....

متن کامل

Feasibility of using smartphones in the reconstruction of the interior architecture of the building without using interior control points

The limitation of land in big cities has caused the vertical growth of cities; for example, high-rise buildings on the ground and underground urban facilities can be mentioned. This restriction has increased the value of land in cities, and on the other hand, it has created some new and complicated technical and legal aspects in the cadastral issues. To respond to these new technical and legal ...

متن کامل

Trojan of Things: Embedding Malicious NFC Tags into Common Objects

We present a novel proof-of-concept attack named Trojan of Things (ToT), which aims to attack NFCenabled mobile devices such as smartphones. The key idea of ToT attacks is to covertly embed maliciously programmed NFC tags into common objects routinely encountered in daily life such as banknotes, clothing, or furniture, which are not considered as NFC touchpoints. To fully explore the threat of ...

متن کامل

Recharging RFID Tags for Environmental Monitoring Using UAVs: A Feasibility Analysis

RFID tags are used for different purposes. One of the major problems to be addressed, particularly for monitoring purposes, is their limited power autonomy. Tags must perform different tasks with limited power consumption and their batteries capacities are often too low, even if low power consumption techniques are implemented. In these operational situations tags should be kept in operation fo...

متن کامل

افزایش سرعت شناسایی در سیستم‌های RFID

Radio frequency identification (RFID) is a new generation of automatic identification systems, based on wireless communication technology. In these systems all the tags using one communication channel to communicate with the reader. When two or more tags transmit their data to the reader simultaneously, their transmitted signals will collide. Resolving this collision has a direct impact on the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014