Passive active radio frequency identification tags

نویسندگان

  • Alex K. Jones
  • Swapna R. Dontharaju
  • Shen Chih Tung
  • Peter J. Hawrylak
  • Leonid Mats
  • Raymond R. Hoare
  • James T. Cain
  • Marlin H. Mickle
چکیده

This paper describes the Passive Active RFID Tag (PART). The first innovation is an automated method to generate RFID tag controllers based on high-level descriptions of a customised set of RFID primitives. We are capable of targeting microprocessor-based or custom hardware-based controllers. The second innovation is a passive burst switch front-end to the active tag. This switch reduces power consumption by allowing the active transceiver and controller to sleep when no reader is querying the tag. When RF energy is supplied by the reader, the burst switch ‘wakes-up’ the tag to process the primitive. A prototype burst switch is demonstrated using a Real-Time Spectrum Analyser (RTSA) from our RFID Center for Excellence. We demonstrate the customised RFID tag controller with 40 primitives using a Xilinx Coolrunner-II requiring 1.29 mW and 50 μW of power when active and asleep, respectively. We also present a PIC-microcontroller and hardwarebased Nano Tag at 2.7μW.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Custom RFID Location Simulator

Radio frequency identification (RFID), The real-time location of objects and ability to track motion provide a wide range of useful applications in areas such as safety, security and supply chain. In recent years, radio frequency identification technology has moved from obscurity into mainstream applications that help speed the handling of manufactured goods and materials. RFID enables identifi...

متن کامل

Secure and Lightweight Authentication Protocol for Mobile RFID Privacy

A mobile RFID system is a radio frequency identification technology that allows users to read the information on its tags. When this free reading function is combined with a mobile RFID system featuring radio frequency identification, it may violate an individuals privacy. This is because others may obtain personal information by reading the tags. In addition, user tracking can be a problem, be...

متن کامل

Building Radio frequency IDentification for the Global Environment Secure Semi-Passive RFID Tags – Prototype and Analysis

This report documents the results of task 4.2.2 “Secure Semi-Passive RFID Tags”. After a brief motivation for development of semi-passive tags in WP4 as prototype platform, the report shortly describes the three different platforms. A more detailed report about the development of the tags is available in D4.2.1. The following analysis section presents the results of the tests that were performe...

متن کامل

Evaluation of RFID Tags to Permanently Mark Trees in Natural Populations

Long-term ecological and genetic studies in natural populations of tree species require marking techniques so that individuals can be re-visited over time, even in difficult terrain. Both GPS coordinates and physical labels have disadvantages that can make re-finding trees difficult. We tested passive and semi-active radio frequency identification (RFID) tags and readers as a means to relocate ...

متن کامل

Parallel Singulations in Radio Frequency Identification

Tag collisions can impose a major delay in Radio Frequency IDentification (RFID) systems. Such collisions are hard to overcome with passive tags due to their limited capabilities. In this paper, we look into the problem of minimizing the time required to read a set of passive tags. We propose the novel concept of parallel singulation which, aided by the multiple antennas configuration, interrog...

متن کامل

Secure Symmetric Authentication for RFID Tags

The project ART proposes to enhance passive RFID (Radio Frequency Identification) tags with cryptographically secure authentication. Starting with a short introduction into common RFID systems with passive tags, we present a motivation why secure authentication with standardized symmetric crypto algorithms for RFID tags is necessary for many applications. We demonstrate vulnerabilities of curre...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IJRFITA

دوره 1  شماره 

صفحات  -

تاریخ انتشار 2006