Measurement of Backscattering from Rfid Tags
نویسندگان
چکیده
This paper presents a method for measuring signal backscattering from an RFID tag and calculating tag radar cross-section (RCS), which depends on the chip input impedance. We present a derivation of a theoretical formula for RFID tag radar cross-section and an experimental RCS measurement method using a network analyzer connected to an antenna in an anechoic chamber where the tag is also located. The return loss of the antenna measured with and without the tag present in the chamber allows one to calculate the power backscattered from the tag and find tag RCS. Measurements were performed in anechoic chamber using RFID tag operating in UHF band. Tag RCS was also calculated theoretically using tag impedance and gain obtained with electromagnetic simulation software. Theoretical results were found to be in good agreement with experimental measurements.
منابع مشابه
Design of Space-Filling Antennas for Passive UHF RFID Tags
Every year researchers and engineers are finding new and useful applications for Radio Frequency Identification (RFID) systems (Finkenzeller, 2003). Because of the growing use of RFID systems, many different areas of research have also been developed to improve the performance of such systems. A few of these areas of research include novel antenna designs (Rao et at., 2005; Calabrese & Marrocco...
متن کاملDesign Considerations for the Digital Core of a C1G2 RFID Tag
An EPC Class 1 Gen 2 (C1G2) RFID system is composed of a reader and one or several passive tags. Passive tags obtain the required energy from the radio frequency field emitted by the reader. The forward data link (reader to tag) is embedded in this radio frequency field. The backward data link (tag to reader) is achieved by means of backscattering. The RFID tag consists of several analog circui...
متن کاملافزایش سرعت شناسایی در سیستمهای RFID
Radio frequency identification (RFID) is a new generation of automatic identification systems, based on wireless communication technology. In these systems all the tags using one communication channel to communicate with the reader. When two or more tags transmit their data to the reader simultaneously, their transmitted signals will collide. Resolving this collision has a direct impact on the ...
متن کاملGame-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملRSPAE: RFID Search Protocol based on Authenticated Encryption
Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...
متن کامل