Pub Date : 2011-04-12DOI: 10.1109/RFID.2011.5764624
Leonardo A. Amaral, Fabiano Hessel, J. C. Corrêa
Through an organizational perspective, an RFID system must provide services for intelligent data management and business events integration among organizations. The widely adopted EPC Network fails to adequately support application services for event stream capture and lacks event communication methods to provide indirect exchange of events in distributed activities of complex event detection. This work presents an RFID software framework whose purpose is to raise the inter-organizational integration of an RFID middleware through cooperative complex event processing (CEP) mechanisms based on event notification services. Experimental results show that the framework improves activities of design and development of RFID applications and adds new features for integrating, managing and sharing RFID event data.
{"title":"Cooperative CEP-based RFID framework: A notification approach for sharing complex business events among organizations","authors":"Leonardo A. Amaral, Fabiano Hessel, J. C. Corrêa","doi":"10.1109/RFID.2011.5764624","DOIUrl":"https://doi.org/10.1109/RFID.2011.5764624","url":null,"abstract":"Through an organizational perspective, an RFID system must provide services for intelligent data management and business events integration among organizations. The widely adopted EPC Network fails to adequately support application services for event stream capture and lacks event communication methods to provide indirect exchange of events in distributed activities of complex event detection. This work presents an RFID software framework whose purpose is to raise the inter-organizational integration of an RFID middleware through cooperative complex event processing (CEP) mechanisms based on event notification services. Experimental results show that the framework improves activities of design and development of RFID applications and adds new features for integrating, managing and sharing RFID event data.","PeriodicalId":222446,"journal":{"name":"2011 IEEE International Conference on RFID","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129341054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-12DOI: 10.1109/RFID.2011.5764629
M. Marroncelli, D. Trinchero, V. Lakafosis, M. Tentzeris
Paper-based, inkjet-printed antennas are proposed in this paper as replacement for the typical antennas used on the WISP RFID tag. These antennas are designed to be as concealable as possible. The designs presented exploit meandered techniques in order to achieve significantly reduced dimensions. In particularly, text-based meandered line techniques are applied to obtain both decreased size and concealment. The inkjet printing has been chosen to provide a substrate, which suits the aim of concealment for the final device. Moreover, this paper shows how the inkjet printing techniques perfectly match the text-based design proposed in terms of high applicability. A comparison with the normal antennas mounted on the WISP is performed.
{"title":"Concealable, low-cost paper-printed antennas for WISP-based RFIDs","authors":"M. Marroncelli, D. Trinchero, V. Lakafosis, M. Tentzeris","doi":"10.1109/RFID.2011.5764629","DOIUrl":"https://doi.org/10.1109/RFID.2011.5764629","url":null,"abstract":"Paper-based, inkjet-printed antennas are proposed in this paper as replacement for the typical antennas used on the WISP RFID tag. These antennas are designed to be as concealable as possible. The designs presented exploit meandered techniques in order to achieve significantly reduced dimensions. In particularly, text-based meandered line techniques are applied to obtain both decreased size and concealment. The inkjet printing has been chosen to provide a substrate, which suits the aim of concealment for the final device. Moreover, this paper shows how the inkjet printing techniques perfectly match the text-based design proposed in terms of high applicability. A comparison with the normal antennas mounted on the WISP is performed.","PeriodicalId":222446,"journal":{"name":"2011 IEEE International Conference on RFID","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133605421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-12DOI: 10.1109/RFID.2011.5764621
J. King, Aylin Selcukoglu
Radio frequency identification (RFID) technology is increasingly being incorporated into everyday objects. This case study examines three examples — credit cards, transit cards, and the U.S. e-Passport — given ubiquitous computing power through the addition of RFID. We explored user comprehension of RFID technology generally and these implementations specifically to understand if and how the addition of this technology transformed subjects' experiences with these objects. By exploring whether or not the new implementations preserved prior expectations of use, we sought to understand what experiences subjects drew upon to create new mental models for engaging with them. As all three of the objects we examine stored personal or financial information, we were specifically interested to understand how individuals dealt with the novel privacy risks introduced by RFID. We distill our findings into general recommendations for designers contemplating embedding ubiquitous computing into everyday objects, particularly those that manage personal or financial information.
{"title":"Where's the beep? A case study of user misunderstandings of RFID","authors":"J. King, Aylin Selcukoglu","doi":"10.1109/RFID.2011.5764621","DOIUrl":"https://doi.org/10.1109/RFID.2011.5764621","url":null,"abstract":"Radio frequency identification (RFID) technology is increasingly being incorporated into everyday objects. This case study examines three examples — credit cards, transit cards, and the U.S. e-Passport — given ubiquitous computing power through the addition of RFID. We explored user comprehension of RFID technology generally and these implementations specifically to understand if and how the addition of this technology transformed subjects' experiences with these objects. By exploring whether or not the new implementations preserved prior expectations of use, we sought to understand what experiences subjects drew upon to create new mental models for engaging with them. As all three of the objects we examine stored personal or financial information, we were specifically interested to understand how individuals dealt with the novel privacy risks introduced by RFID. We distill our findings into general recommendations for designers contemplating embedding ubiquitous computing into everyday objects, particularly those that manage personal or financial information.","PeriodicalId":222446,"journal":{"name":"2011 IEEE International Conference on RFID","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124937540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-12DOI: 10.1109/RFID.2011.5764622
Yuki Sato, J. Mitsugi, Osamu Nakamura, J. Murai
RFID is an essential technology to uniquely identify physical objects. In many practical business processes using RFID, we check not only individual objects but also check if there is no missing objects and no extra objects in a group of objects. While individual objects identifications are done by using RFID, group verifications are usually done by looking up a shipping list or corresponding EDI data which require a network connection. In this paper, we propose “group coding of RF tags” by which we can verify the integrity of a group of objects just by writing additional data in RF tags' memory. The additional data is computed from unique IDs of objects that belong to the group. We propose fundamental and general group codings. With the fundamental group coding, we can check if the integrity of a group of objects is preserved or not. It is a parity check of hashes of unique IDs in a group. We also propose general group coding by extending the fundamental group coding. With the general group coding, we can estimate the number of missing objects if the integrity of a group is not verified. The strength of the missing number estimation can be controlled by the size of data written to RF tags. It can be considered as a Low Density Parity Check (LDPC) in physical objects. The theory of group coding is confirmed by a numerical simulation and an experiment. It is shown by the simulation and experiment that we can detect 10 missing RF tags out of 20 RF tags with 99.5% reliability by writing 96-bit data into each RF tags besides its 96-bit unique ID.
{"title":"Group coding of RF tags to verify the integrity of group of objects","authors":"Yuki Sato, J. Mitsugi, Osamu Nakamura, J. Murai","doi":"10.1109/RFID.2011.5764622","DOIUrl":"https://doi.org/10.1109/RFID.2011.5764622","url":null,"abstract":"RFID is an essential technology to uniquely identify physical objects. In many practical business processes using RFID, we check not only individual objects but also check if there is no missing objects and no extra objects in a group of objects. While individual objects identifications are done by using RFID, group verifications are usually done by looking up a shipping list or corresponding EDI data which require a network connection. In this paper, we propose “group coding of RF tags” by which we can verify the integrity of a group of objects just by writing additional data in RF tags' memory. The additional data is computed from unique IDs of objects that belong to the group. We propose fundamental and general group codings. With the fundamental group coding, we can check if the integrity of a group of objects is preserved or not. It is a parity check of hashes of unique IDs in a group. We also propose general group coding by extending the fundamental group coding. With the general group coding, we can estimate the number of missing objects if the integrity of a group is not verified. The strength of the missing number estimation can be controlled by the size of data written to RF tags. It can be considered as a Low Density Parity Check (LDPC) in physical objects. The theory of group coding is confirmed by a numerical simulation and an experiment. It is shown by the simulation and experiment that we can detect 10 missing RF tags out of 20 RF tags with 99.5% reliability by writing 96-bit data into each RF tags besides its 96-bit unique ID.","PeriodicalId":222446,"journal":{"name":"2011 IEEE International Conference on RFID","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130436699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-12DOI: 10.1109/RFID.2011.5764637
G. Lasser, R. Langwieser, Florian Xaver, C. Mecklenbrauker
In this contribution we analyse the read probability enhancement using two simple dual-antenna techniques for passive RFID tags for Tyre Pressure Monitoring applications. Our analysis is based on real-world channel measurements carried out with a full vehicle body for different antenna and steering angle configurations. Two frequency ranges were analysed: European UHF band at about 866 MHz and 2.45GHz ISM band. Two antenna combining methods were investigated: Antenna selection and power combining. With the latter a read probability enhancement from 49% to 75% is achievable.
{"title":"Dual-band channel gain statistics for dual-antenna tyre pressure monitoring RFID tags","authors":"G. Lasser, R. Langwieser, Florian Xaver, C. Mecklenbrauker","doi":"10.1109/RFID.2011.5764637","DOIUrl":"https://doi.org/10.1109/RFID.2011.5764637","url":null,"abstract":"In this contribution we analyse the read probability enhancement using two simple dual-antenna techniques for passive RFID tags for Tyre Pressure Monitoring applications. Our analysis is based on real-world channel measurements carried out with a full vehicle body for different antenna and steering angle configurations. Two frequency ranges were analysed: European UHF band at about 866 MHz and 2.45GHz ISM band. Two antenna combining methods were investigated: Antenna selection and power combining. With the latter a read probability enhancement from 49% to 75% is achievable.","PeriodicalId":222446,"journal":{"name":"2011 IEEE International Conference on RFID","volume":"209 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132820937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-12DOI: 10.1109/RFID.2011.5764631
Gang Li, D. Arnitz, R. Ebelt, U. Muehlmann, K. Witrisal, M. Vossiek
In this paper the impact of the signal bandwidth on the performance of frequency modulated continuous wave (FMCW) radar based ranging to ultra high frequency (UHF) radio frequency identification (RFID) tags is investigated. The analyses are based on ultra-wideband (UWB) channel measurements performed in a warehouse portal, which is a severe multipath environment. It is illustrated that the available bandwidth of the usual ISM bands at 900 MHz, 2.5 GHz and 5.8 GHz is only sufficient for a precise RFID tag localization if moderate or low multipath conditions are given. However, in severe multipath channels the ISM bands are unsuited and UWB signals are needed. The results can be considered a lower bound for signal time of flight (TOF) based localization approaches that utilize Fourier or correlation methods for the signal travel time estimation.
{"title":"Bandwidth dependence of CW ranging to UHF RFID tags in severe multipath environments","authors":"Gang Li, D. Arnitz, R. Ebelt, U. Muehlmann, K. Witrisal, M. Vossiek","doi":"10.1109/RFID.2011.5764631","DOIUrl":"https://doi.org/10.1109/RFID.2011.5764631","url":null,"abstract":"In this paper the impact of the signal bandwidth on the performance of frequency modulated continuous wave (FMCW) radar based ranging to ultra high frequency (UHF) radio frequency identification (RFID) tags is investigated. The analyses are based on ultra-wideband (UWB) channel measurements performed in a warehouse portal, which is a severe multipath environment. It is illustrated that the available bandwidth of the usual ISM bands at 900 MHz, 2.5 GHz and 5.8 GHz is only sufficient for a precise RFID tag localization if moderate or low multipath conditions are given. However, in severe multipath channels the ISM bands are unsuited and UWB signals are needed. The results can be considered a lower bound for signal time of flight (TOF) based localization approaches that utilize Fourier or correlation methods for the signal travel time estimation.","PeriodicalId":222446,"journal":{"name":"2011 IEEE International Conference on RFID","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134490907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-12DOI: 10.1109/RFID.2011.5764623
V. Lakafosis, A. Traille, Hoseon Lee, E. Gebara, M. Tentzeris, G. DeJean, D. Kirovski
The inadequacy of the traditional, digitally encoded RFID tags in combating counterfeiting prompts us to investigate new hardware-enabled technologies that can complement the remote identification functionality of typical RFIDs in an effective and very low cost way. In this paper, we present RFID-CoA; a system that aims to render typical RFID tags physically unique and hard to near-exactly replicate by complementing them with random 3D scattering structures, which serve as certificates of authenticity (CoA). The unique near-field response, or “fingerprint”, of the CoAs is extracted as a set of S21 curves by our reader prototype, the design and development details of which are discussed. The results of our performance analysis show that the intersection probability of the false positive and false negative error probability curves is inconceivably small (<10−200). The RFID-CoA tag's lifecycle from fabrication site to store is presented, and a strategy to block potential attacks is discussed. Our system bridges the world of RFID with a large array of anti-counterfeiting applications by exploiting “hardware-enabled”, modified-material scattering characteristics in the near-field. Based on our multifaceted analysis, we firmly believe that the demonstrated RFID-CoA technology can prove a valuable tool for the low-cost ubiquitous applicability of RFID technology against counterfeiting.
{"title":"RFID-CoA: The RFID tags as certificates of authenticity","authors":"V. Lakafosis, A. Traille, Hoseon Lee, E. Gebara, M. Tentzeris, G. DeJean, D. Kirovski","doi":"10.1109/RFID.2011.5764623","DOIUrl":"https://doi.org/10.1109/RFID.2011.5764623","url":null,"abstract":"The inadequacy of the traditional, digitally encoded RFID tags in combating counterfeiting prompts us to investigate new hardware-enabled technologies that can complement the remote identification functionality of typical RFIDs in an effective and very low cost way. In this paper, we present RFID-CoA; a system that aims to render typical RFID tags physically unique and hard to near-exactly replicate by complementing them with random 3D scattering structures, which serve as certificates of authenticity (CoA). The unique near-field response, or “fingerprint”, of the CoAs is extracted as a set of S21 curves by our reader prototype, the design and development details of which are discussed. The results of our performance analysis show that the intersection probability of the false positive and false negative error probability curves is inconceivably small (<10−200). The RFID-CoA tag's lifecycle from fabrication site to store is presented, and a strategy to block potential attacks is discussed. Our system bridges the world of RFID with a large array of anti-counterfeiting applications by exploiting “hardware-enabled”, modified-material scattering characteristics in the near-field. Based on our multifaceted analysis, we firmly believe that the demonstrated RFID-CoA technology can prove a valuable tool for the low-cost ubiquitous applicability of RFID technology against counterfeiting.","PeriodicalId":222446,"journal":{"name":"2011 IEEE International Conference on RFID","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123948560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-12DOI: 10.1109/RFID.2011.5764619
Mathieu David, D. Ranasinghe, T. Larsen
The design of hardware-oriented ciphers has an increasingly important role to play with emerging ubiquitous and pervasive computing devices, such as low cost passive Radio Frequency Identification (RFID) tags. The importance of such ciphers are further highlighted by novel manufacturing technologies, such as printed ink to develop extremely low cost RFID tags. Such developments bring new challenges, especially in terms of providing security, both to protect privacy as well as to enable applications dependent on security, such as e-tickets. In this paper we present a new stream cipher, A2U2, which uses principles of stream cipher design and approaches from block cipher design. Our lightweight cryptographic primitive has taken into consideration the extremely resource limited environment of printed ink tags, to develop a cipher that can be implemented with less than 300 gates, with the added benefit of high throughput provided by stream ciphers.
{"title":"A2U2: A stream cipher for printed electronics RFID tags","authors":"Mathieu David, D. Ranasinghe, T. Larsen","doi":"10.1109/RFID.2011.5764619","DOIUrl":"https://doi.org/10.1109/RFID.2011.5764619","url":null,"abstract":"The design of hardware-oriented ciphers has an increasingly important role to play with emerging ubiquitous and pervasive computing devices, such as low cost passive Radio Frequency Identification (RFID) tags. The importance of such ciphers are further highlighted by novel manufacturing technologies, such as printed ink to develop extremely low cost RFID tags. Such developments bring new challenges, especially in terms of providing security, both to protect privacy as well as to enable applications dependent on security, such as e-tickets. In this paper we present a new stream cipher, A2U2, which uses principles of stream cipher design and approaches from block cipher design. Our lightweight cryptographic primitive has taken into consideration the extremely resource limited environment of printed ink tags, to develop a cipher that can be implemented with less than 300 gates, with the added benefit of high throughput provided by stream ciphers.","PeriodicalId":222446,"journal":{"name":"2011 IEEE International Conference on RFID","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114216204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-12DOI: 10.1109/RFID.2011.5764606
Stewart J. Thomas, J. Teizer, M. Reynolds
In many safety-critical applications, battery performance is a significant limiting factor that affects the feasibility of electronic safety devices intended to alert workers to hazardous situations. In particular, battery capacity and lifetime are difficult to predict when safety devices are exposed to extremes of temperature, humidity, shock, and vibration that are common in construction, excavation, drill rigs, and mining work sites. Because battery failure is unacceptable in safety devices, periodic preventative maintenance is required, adding to device cost and labor cost and reducing acceptance of electronic safety devices. Energy harvesting and communications techniques based on passive UHF RFID technology may offer an alternative to battery power for some types of safety alert devices, particularly where hazardous conditions are created by powered heavy equipment. We present a worker safety device designed around a passive UHF RFID platform that derives its operating power from specialized interrogators mounted on heavy equipment. This device is designed to be integrated with plastic hard hats that are commonly used in the construction industry to yield an intelligent hard hat, called a “SmartHat”, that delivers an audible alert directly to workers in proximity to a particular piece of equipment. It is addressible using an ASK interrogator-to-tag link, and backscatters confirmation that an alert has been delivered to the worker. We present the design of the SmartHat tag, including a compact printed-circuit vee style antenna, an RF-to-DC power harvesting circuit, and a microprocessor-driven alert speaker. The tag's average operating power while delivering a pulsed alert is 1.8V at 61μA, or 110μW (−9.6 dBm). Its power-up threshold when not delivering an alert is 1.8 V at ≈ 10μA. We also present a specialized interrogator device operating under FCC Part 18 rules in the 902–928 MHz band that is mounted to a piece of construction equipment to power and communicate with nearby SmartHats. In outdoor testing of the SmartHat tag and its companion interrogator device, +35 dBm transmitter output power feeding a 9dBi Yagi antenna (+44 dBm EIRP) allows for safety alerts to be delivered at distances of up to 16.46 m.
{"title":"SmartHat: A battery-free worker safety device employing passive UHF RFID technology","authors":"Stewart J. Thomas, J. Teizer, M. Reynolds","doi":"10.1109/RFID.2011.5764606","DOIUrl":"https://doi.org/10.1109/RFID.2011.5764606","url":null,"abstract":"In many safety-critical applications, battery performance is a significant limiting factor that affects the feasibility of electronic safety devices intended to alert workers to hazardous situations. In particular, battery capacity and lifetime are difficult to predict when safety devices are exposed to extremes of temperature, humidity, shock, and vibration that are common in construction, excavation, drill rigs, and mining work sites. Because battery failure is unacceptable in safety devices, periodic preventative maintenance is required, adding to device cost and labor cost and reducing acceptance of electronic safety devices. Energy harvesting and communications techniques based on passive UHF RFID technology may offer an alternative to battery power for some types of safety alert devices, particularly where hazardous conditions are created by powered heavy equipment. We present a worker safety device designed around a passive UHF RFID platform that derives its operating power from specialized interrogators mounted on heavy equipment. This device is designed to be integrated with plastic hard hats that are commonly used in the construction industry to yield an intelligent hard hat, called a “SmartHat”, that delivers an audible alert directly to workers in proximity to a particular piece of equipment. It is addressible using an ASK interrogator-to-tag link, and backscatters confirmation that an alert has been delivered to the worker. We present the design of the SmartHat tag, including a compact printed-circuit vee style antenna, an RF-to-DC power harvesting circuit, and a microprocessor-driven alert speaker. The tag's average operating power while delivering a pulsed alert is 1.8V at 61μA, or 110μW (−9.6 dBm). Its power-up threshold when not delivering an alert is 1.8 V at ≈ 10μA. We also present a specialized interrogator device operating under FCC Part 18 rules in the 902–928 MHz band that is mounted to a piece of construction equipment to power and communicate with nearby SmartHats. In outdoor testing of the SmartHat tag and its companion interrogator device, +35 dBm transmitter output power feeding a 9dBi Yagi antenna (+44 dBm EIRP) allows for safety alerts to be delivered at distances of up to 16.46 m.","PeriodicalId":222446,"journal":{"name":"2011 IEEE International Conference on RFID","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127720899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-12DOI: 10.1109/RFID.2011.5764636
Shan Jiang, S. Georgakopoulos
Wireless embedded sensors are ideally suitable for monitoring concrete structures because of their small size and ability to measure various quantities inside concrete. Wireless power transmission for such sensors embedded in plain/reinforced concrete slab is studied here. The return loss and transmission loss of dipole and patch antennas are studied at typical RFID frequencies. Also, the antennas' performance is investigated for free-space, dry concrete, saturated concrete and reinforced concrete. Our results lead to the determination of the optimum operating frequency as well as the suitable antenna type for wireless powering. Finally, a matched rectification circuit is designed, and typical battery charging times are calculated.
{"title":"Optimum wireless power transmission through reinforced concrete structure","authors":"Shan Jiang, S. Georgakopoulos","doi":"10.1109/RFID.2011.5764636","DOIUrl":"https://doi.org/10.1109/RFID.2011.5764636","url":null,"abstract":"Wireless embedded sensors are ideally suitable for monitoring concrete structures because of their small size and ability to measure various quantities inside concrete. Wireless power transmission for such sensors embedded in plain/reinforced concrete slab is studied here. The return loss and transmission loss of dipole and patch antennas are studied at typical RFID frequencies. Also, the antennas' performance is investigated for free-space, dry concrete, saturated concrete and reinforced concrete. Our results lead to the determination of the optimum operating frequency as well as the suitable antenna type for wireless powering. Finally, a matched rectification circuit is designed, and typical battery charging times are calculated.","PeriodicalId":222446,"journal":{"name":"2011 IEEE International Conference on RFID","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133864205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}