نتایج جستجو برای: reader to tag collision
تعداد نتایج: 10630264 فیلتر نتایج به سال:
In radio-frequency identification (RFID) systems, tag collision resolution is a significant issue for fast tag identification. Dynamic framed slotted ALOHA (DFSA) is one of the most widely used algorithms to resolve tag collision. Collision detection (CD) plays an important role in determining the efficiency of DFSA-based algorithms because most DFSA-based algorithms determine the next frame si...
DCSK modulation in chaos communication is a robust non-coherent modulation scheme. In this paper, the multiple-access DCSK scheme based on the OVSF code is proposed. Using the multiple-access DCSK scheme in RFID system, a DCSK-RFID system is presented. In the presented DCSK-RFID system, we use the DCSK for tag modulation for its low complexity and the simple receiver of the DCSK scheme is appli...
RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Among them mafia fraud attack is the most serious since this attack can be mounted without the notice of both the reader and the tag. An adversary performs a kind of man-in-the-middle attack between the reader and the tag. It is very difficult to prevent this attack since t...
<span>The radio frequency identification (RFID), is a wireless technology system that used for identifying an individual or objects through the means of waves transfer information from electronic tag, called RFID tag. consists two main components interrogator and transponder. The Interrogator, which reader, usually transmits receives signal while transponder attached to object. In system,...
Radio frequency identification (RFID) is a means of automatic identification that uses radio waves to detect, track, identify, and thus manage a variety of objects. The purpose of an RFID system is transmitting data from a portable device, called a tag, to an RFID reader to execute a particular application based on the tag provided identification or location information (Graafstra, 2006; O' Bri...
Due to the very limited computing resource, storing space and electric power supply of tag, it is a great challenge for us to design a practical RFID protocol which is security, efficient and can be used in the low-cost tag. In 2007, He et al. proposed an authentication and key agreement protocol which is used in the process of communication between the low-cost tag and reader. They also proved...
The “Gen2” specification for UHF passive RFID systems released by EPCglobal has become an intense research interest. A Gen2 tag derives its power from the RF wave emitted by a Gen2 RFID reader and responds its modulated backscatter signals to the reader. Due to the large propagation loss, the accessible range of a Gen2 tag is hence limited. Moreover, the readability of a Gen2 tag is often influ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید