Advertisement

Improvements in RFID Physical Layer Using Ultra-wideband Signals

  • Faranak Nekoogar
  • Farid Dowla
Chapter

Abstract

Even though narrowband RFID systems are currently quite mature and effective in many applications, the limitations posed by narrowband signal characteristics (discussed in Chap. 2) makes them somewhat unreliable for use in certain practical environments [1].

Keywords

Federal Communication Commission Pulse Amplitude Modulation Pulse Position Modulation Metallic Object Spiral Antenna 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    M. Hori, Y. Kawakubo and M. Mizui “Feasibility of using RFID in the material accountancy and safeguards verification in the nuclear cycle facilities,” Presented in the 31th ESARDA meeting, Vilnius, Lithuania, 26–28 May, 2009.Google Scholar
  2. 2.
  3. 3.
  4. 4.
    “Ultra-Wideband Communications – Fundamentals and Applications”, F. Nekoogar, Prentice Hall PTR, Aug. 2005. ISBN: 0131463268.Google Scholar
  5. 5.
    D. S. Filipovic and T. T. Cencich, “Frequency-independent antennas,” in: Antenna Engineering Handbook, ed. by J. Volakis, 4th edition, McGraw Hill, 2007. pp. 13–1 to 13–67.Google Scholar
  6. 6.
    T. Milligan, Modern Antenna Design, Wiley, New York, 2005, 2nd Ed., pp. 521–550 and pp. 569–572.Google Scholar
  7. 7.
    W. Ismail, JS Mandeep, M. S. Jawad, “Secure Multi-access Channel Using UWB For Next Generation RFID Systems”, microwave journal, Vol. 51 | No. 9 | September 2008.Google Scholar
  8. 8.
    P. Schaumont, D. Ha, E. Simpson, P. Yu, “Securing RFID using Ultra-Wideband Modulation”, Workshop on RFID Security, July 2006, Graz, Austria.Google Scholar
  9. 9.
    D.S. Ha, P.R. Schaumont, “Replacing cryptography using ultra-wideband modulation”, IEEE International Conference on RFID, 2007.Google Scholar
  10. 10.
    C. Le, T. Dogaru, N. Lam M.A. Ressler, “Ultrawideband (UWB) Radar Imaging of Building Interior: Measurements and Predictions”, IEEE Transactions on Geoscience and Remote Sensing, May 2009.Google Scholar
  11. 11.
    F. Nekoogar, A. Dougan, A. Bordetsky, “Network-Centric Maritime Radiation Awareness and Interdiction Experiments”, 11TH ICCRTS, Cambridge, UK Jan. 2006.Google Scholar
  12. 12.
    R. Fontana, S. Gunderson, “Ultra-wideband Percision Asset Location System”, IEEE Confernece on Ultra-wideband Systems and Technologies, Baltimore, USA, 2002.Google Scholar
  13. 13.
    C. Kent, F. Dowla, “Position Estimation of Transceivers in Communication Networks”, US Patent, US7383053 B2.Google Scholar
  14. 14.
    V. Kazimirchik, V. Nelayev, V. Sjakerskii, “Simulation of Schottky diode technology and performances for RFID application” CADSM’2009, 24–28 February, 2009, Polyana-Svalyava (Zakarpattya), UKRAINE.Google Scholar
  15. 15.
    D. Yee, “RFID - moving beyond compliance…”, RFID Summit Singapore (2004).Google Scholar
  16. 16.
    D. Brown, “RFID Implementation”, ISBN-13: 978–0072263244.Google Scholar
  17. 17.
    F. Dowla, F. Nekoogar, and A. Spiridon, “Interference mitigation in transmitted-reference ultrawideband(uwb) receivers,” IEEE International Symposium on Antennas and Propagation, 2004, vol. 2, pp.1307–1310.Google Scholar
  18. 18.
    Sablatash M, Sellathurai M. “Methods for interference mitigation by and into UWB communication systems, including techniques based on multi-band techniques and on wavelets.” In: Proceedings of the 22nd biennial symposium on communications, Kingston, Canada, May 2004.Google Scholar
  19. 19.
    H. T. Nguyen, J. B. Andersen, and G. F. Pedersen, “The potential use of time reversal techniques in multiple element antenna systems DOI:dx.doi.org,” IEEE Communications Letters, vol. 9, no. 1, pp. 40–42, 2005.CrossRefGoogle Scholar
  20. 20.
    T. Strohmer, M. Emami, J. Hansen, G. Papanicolaou, and A. J. Paulraj, “Application of time-reversal with MMSE equalizer to UWB communications,” in Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM ‘04), vol. 5, pp. 3123–3127, Dallas, Tex, USA, November-December 2004.Google Scholar
  21. 21.
    A. Khaleghi and G. El Zein, “Signal frequency and bandwidth DOI:dx.doi.org,” in Proceedings of the Loughborough Antennas and Propagation Conference (LAPC ‘07), pp. 97–100, Loughborough, UK, April 2007.Google Scholar
  22. 22.
    A. Khaleghi, G. El Zein, and I. H. Naqvi, “Demonstration of time-reversal in indoor ultra-wideband DOI:dx.doi.org,” in Proceedings of the 4th IEEE Internatilonal Symposium on Wireless Communication Systems (ISWCS ‘07), pp. 465–468, Trondheim, Norway, October 2007.Google Scholar
  23. 23.
    I. H. Naqvi, A. Khaleghi, and G. Elzein, “Performance enhancement of multiuser time reversal UWB communication system DOI:dx.doi.org,” in Proceedings of the 4th IEEE Internatilonal Symposium on Wireless Communication Systems (ISWCS ‘07), pp. 567–571, Trondheim, Norway, October 2007.Google Scholar
  24. 24.
    M. Fink, “Time-reversed acoustic,” Scientific American, pp. 67–73, November 1999.Google Scholar
  25. 25.
    A. Derode, A. Tourin, J. De Rosny, M. Tanter, S. Yon, and M. Fink, “Taking advantage of multiple scattering to communicate with time-reversal antennas,” Physical Review Letters, vol. 90, no. 1, Article ID 014301, 4 pages, 2003.CrossRefGoogle Scholar

Bibliography

  1. 26.
    S. Sarma, S. Weis, and D. Engels, “RFID systems and security and privacy implications,” Proceedings of the 2002 Cryptographic Hardware and Embedded Systems Workshop (CHES02), LNCS 2523, pp. 454–469, Springer, 2002.Google Scholar
  2. 27.
    F. Nekoogar, “Digital Cryptography: Rijndael Encryption and AES Applications”, TechOnLine, October 11, 2001.Google Scholar
  3. 28.
    M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, “Strong authentication of RFID systems using the AES Algorithm,” Proc. of the 2004 Cryptographic Hardware and Embedded Systems workshop (CHES 2004), LNCS 3156, p 357–370, 2004.Google Scholar
  4. 29.
    T. Lohmann, M. Schneider, C. Ruland, “Analysis of Power Constraints for Cryptographic Algorithms in Mid-Cost RFID Tags,” Seventh Smart Card Research and Advanced Application IFIP Conference (CARDIS 2006), LNCS 3928, p 278–288, 2006.CrossRefGoogle Scholar
  5. 30.
    Gene Tsudik, “YA-TRAP: Yet Another Trivial RFID Authentication Protocol,” Proceedings of the International Conference on Pervasive Computing and Communications, PerCom 2006.Google Scholar
  6. 31.
    Y. Oren, A. Shamir, “Power analysis of RFID tags,” online at http://www.wisdom.weizmann.ac.il/~yossio/rfid/.
  7. 32.
    J. Ryckaert, C. Desset, A. Fort, M. Badaroglu, V. De Heyn, P. Wambacq, G. Van der Plas, S. Donnay, B. Van Poucky, B. Gyselinckx, “Ultra-wideband Transmitter for Low-power Wireless Body Area Networks: Design and Evaluation,” IEEE Trans on Circuits and Systems-I:Regular Papers, 52(12):2515–2525, December 2005.CrossRefGoogle Scholar
  8. 33.
    R. C. Qiu, C. Zhou, N. Guo, and J. Q. Zhang, “Time reversal with miso for ultra-wideband communications: experimental results,” in Proceedings of the IEEE Radio and Wireless Propagation Letters Symposium, pp. 499–502, San Diego, Calif, USA, January 2006.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2011

Authors and Affiliations

  1. 1.Lawrence Livermore National LaboratoryLivermoreUSA

Personalised recommendations