Collision Recovery Receivers for RFIDs

نویسندگان

  • Markus Rupp
  • Javier Vales Alonso
چکیده

Radio Frequency Identification (RFID) is a very fast emerging technology that wirelessly transmits the identity of a tag attached to an object or a person. It usually operates in a dense tag environment. My work is focused on passive Ultra High Frequency (UHF) tags whose transmission on the Medium Access Control (MAC) layer is scheduled by Framed Slotted Aloha (FSA). In this thesis, I propose the use of multiple antennas at the reader side in order to recover from collision. By exploiting the fact that a tag signal is real-valued while all other components of a received signal are complexed-valued, I have separated real and imaginary part and in that way I have achieved a recovery from a collision that contains a two times higher number of tags than the number of the receive antennas at the reader, under perfect channel knowledge. Furthermore, I have recommended a modification of a tag signal by an additional part that is specially designed to facilitate channel estimation. The recommended method provides excellent results in comparison to perfect channel knowledge. However, due to the constrained set of the designed sequences, a new issue arised. I have investigated the distribution of the additional sequence set within a tag population and depending on that, I have studied different collision scenarios. I have proposed a two phase collision recovery method that takes out all tags with a unique sequence per slot and if there is just one pair of tags with a common sequence left, such collision is resolved by projecting the signal constellation into the orthogonal subspace of the interference. The proposed method improves collision recovery and further increases the system throughput. Moreover, in this thesis I have studied the influence of several parameters on the system throughput, and I have found the maxima of the theoretically expected throughput for receivers with different collision recovery factors and for different receiver architectures. Furthermore, in order to approach to the theoretical maxima, I have proposed spatial filtering in postprocessing. The main intention is to focus separately on different groups of tags by applying different weights within sector postprocessing. In that way tag signals are attenuated or amplified depending on the angle of arrival. I have designed a simple beamformer with the weights modelled by an FFT algorithm and a more complex beamformer with an eigenfilter design. The obtained results show that the reader has become more robust. Additionally, I have derived a semi-analytical formula for calculating the optimal frame size. This formula incorporates properties of the spatial filter and throughput characteristics. In this way, further optimization of frame lengths is achieved. Furthermore,

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A smart collision recovery receiver for RFIDs

In this work, we focus on framed slotted Aloha (FSA) and passive ultra high-frequency radio frequency identification multi-antenna systems with physical layer collision recovery. We modify the tags slightly by adding a so-called ‘postpreamble’ that facilitates channel estimation. Furthermore, we investigate the throughput performance of advanced receiver structures in collision scenarios. More ...

متن کامل

RAC-Multi: Reader Anti-Collision Algorithm for Multichannel Mobile RFID Networks

At present, RFID is installed on mobile devices such as mobile phones or PDAs and provides a means to obtain information about objects equipped with an RFID tag over a multi-channeled telecommunication networks. To use mobile RFIDs, reader collision problems should be addressed given that readers are continuously moving. Moreover, in a multichannel environment for mobile RFIDs, interference bet...

متن کامل

Securing Deployed RFIDs by Randomizing the Modulation and the Channel

RFID cards are widely used today in sensitive applications such as access control, payment systems, and asset tracking. Past work shows that an eavesdropper snooping on the communication between a card and its legitimate reader can break their cryptographic protocol and obtain their secret keys. One solution for this problem is to install stronger cryptographic protocols on the cards. However, ...

متن کامل

Group-based Relay for Reliable Multicast Service in Error-prone IEEE 802.11e WLANs

With the explosive growth of Internet, multicast service has been applied extensively and seriously. The IEEE 802.11 Wireless LAN has been deployed increasingly due to the demand for ubiquitous wireless data services. Because of the requirement of providing differentiated channel access to data traffic with different priority, the IEEE 802.11e has been proposed. However, the IEEE 802.11e does n...

متن کامل

Secret Searching in Wireless Sensor Networks with RFIDs

In this paper, we propose a network architecture with RFIDs and sensor nodes (ARIES), a mutual authentication protocol (AMULET), and a secret search protocol (ASSART). In ARIES, the distance limitation can be relieved with the help of widely deployed RFID-aware sensor nodes. AMULET can perform mutual authentication and reduce the cost for re-authentication. ASSART solves the privacy problem by ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015