Fig 4 - uploaded by Sanjay E. Sarma
Content may be subject to copyright.
Sample radiation pattern of an RFID reader antenna.

Sample radiation pattern of an RFID reader antenna.

Source publication
Article
Full-text available
Radio-frequency identification (RFID) poses a number of research challenges, such as interference mitigation, throughput optimization and security over the RF channel. A number of new approaches to address these issues have been proposed recently, but due to the highly integrated nature of passive RFID tags, it is difficult to evaluate them in real...

Context in source publication

Context 1
... assumes directive reader antennas. The radiation pattern of the antenna can be specified as part of the configu- ration (cf. Fig. 4). The radiation pattern is used to compute the transmit and receive signal strength. In addition to the radiation pattern, the location and orientation of the RFID reader antenna also need to be ...

Similar publications

Thesis
Full-text available
This work deals with the development of a new standard for enhanced transmission rates for contactless smartcard systems according to ISO 14443. The aim is to achieve data rates that are significantly above today’s maximum of 848 kbit/s. Contactless smartcards are a form of chipcards that can be accessed over a radio frequency field. The communicat...

Citations

... It was based on a multi-processor hardware target, using a Texas Instruments TMS320C6416 digital signal processor. After a few years, RFIDSim [35] was proposed. It was an RFID simulation environment that facilitated the evaluation of RFID protocols in real-world applications by simulating signal propagation and RFID communication protocols. ...
Article
Full-text available
Radio Frequency Identification (RFID) technology is becoming very popular in the new era of Industry 4.0, especially for warehouse management, retails, and logistics. RFID systems can be used for objects identification, localization, and tracking, facilitating everyday operators’ efforts. However, the deployment of RFID tags and reader antennas in real-world application scenarios is crucial and takes time. Indeed, deciding where to place tags and/or readers’ requires examining many conditions. If some weaknesses appear in the design, the arrangement must be reconsidered. The proposed work presents a novel open-source RFID simulator that allows modeling environments and testing the deployment of RFID tags and antennas apriori. In such a way, validating the performance of the localization or tracking algorithms in simulation, possible weaknesses that could arise may be fixed before facilities are applied on the field. Any number of tags and antennas can be placed in any position in the created scenario, and the simulator provides the phase and the RSSI signals for each tag. Every reader antenna is parametrized so that different antennas of different vendors can be reproduced. The simulator is implemented as a plugin of Gazebo, a widely used robotic framework integrated with the Robot Operating System (ROS), to reach a broad audience. In order to validate the simulator, a warehouse scenario is modeled, and a tag localization algorithm that uses the phase unwrapping technique and hyperbolae intersection method employing a reader antenna mounted on a mobile robot is used to estimate the position of the tags deployed in the scenario. The outcomes of the experiments showed realistic results.
... The wireless channel in their simulator is modeled as the vector addition of various multipaths. Authors in [16], present an RFID simulation engine, called RFIDSim, which implements the ISO 18000-6C communication protocol [17] and supports path loss, fading, backscatter, capture, and tag mobility models. They show that RFIDsim can be used to simulate large populations featuring thousands of RFID tags. ...
Article
Full-text available
Simulation, robotics, and Radio Frequency Identification (RFID) technology have significant roles in the new industrial revolution, and their application are key aspects of making Industry 4.0 a reality. Developing efficient use cases in Industry 4.0 almost always requires accurate simulation tools to be used in the digital world. The problem of simulating RFID readers for robotics in environments where high populations of RFID tags exist is addressed in this paper. This paper will discuss the design of an RFID system plugin based on Robot Operating System (ROS) and Gazebo simulator and the probability-based model on which the plugin is based. To assess the performance of the proposed system model, the simulation results of the designed plugin are compared with experiments. We also prove that the proposed simulator is flexible enough to be used on any robot platform, including aerial and ground robots. We show initial results of the simulation of having an Unmanned Aerial Vehicle (UAV) and a Unmanned Ground Vehicle (UGV) equipped with an RFID reader, navigating in an environment in which RFID tags have been placed. The robots will be reading tags in different map layouts using RFID antennas, with different orientations. We compare the simulation and experimental results in terms of the total unique tag readings vs. time, for various map-layouts. Finally, we show how this plugin can be used in robotics research by using it to simulate a novel, RFID-based stigmergic navigation strategy. We illustrate, the accurate navigation of the UAV using the proposed plugin.
... The path loss is dependent on the wavelength λ of the RF signal, the reader-tag separation distance d and the multipath loss exponent n [13,18]. Thus, the power received by the tag is given by: ...
... (b) Antennae sensitivity model. of the antenna with a beamwidth θ is oriented at an angle φ with a major axis radius r m and a minor side-lobe radius r s located at a position (x r , y r ). The 2D shape of the directional patch antennae is well represented by the ellipse shape [18]. The model in 2a shows that the location of the directional antennae does not correspond to the centre of the ellipse. ...
Article
Full-text available
The Radio Frequency Identification (RFID) reader deployment problem (RDP) is a key challenge in the planning of RFID networks. The majority of the current research uses metaheuristic algorithms to solve the multi-objective RDP for unconstrained deployment of readers possessing omnidirectional antennae. The increasing adoption of the Internet-of-Things (IoT) technology and smart directional antennae will make the RDP even more challenging. The contributions of this work are: firstly, modelling a novel RDP formulation as a mixed-integer nonlinear program (MINLP); secondly, incorporating both directional and omnidirectional antenna models into the RDP; and, lastly, introducing an adapted Leaders and Followers (LaF) solution algorithm for the RDP. The proposed LaF algorithm results in reduced energy use and interference reduction in comparison to other popular metaheuristic algorithms. The proposed MINLP model is also used to demonstrate the advantage of deploying readers possessing diverse antennae coverage compared to the exclusive use of omnidirectional antennae.
... The process finishes when a number ν e of ending frames is empty. [48] chain Q Q Q is strongly stable. This form of stability guarantees finite average backlog and by Little's theorem finite average interrogation delay [45]. ...
... Correctly identified tags withdraw from the process, while the rest keep trying in the next FSA frame. The detailed configuration of the timing parameters is provided in [48]. Note that different configurations would result in different command durations. ...
Article
Full-text available
Queued Radio Frequency Identification (RFID) networks arise naturally in many applications, where tags are grouped into batches, and each batch must be processed before the next reading job starts. In these cases, the system must be able to handle all incoming jobs, keeping the queue backlogs bounded. This property is called stability. Besides, in RFID networks, it is common that some readers cannot operate at the same time, due to mutual interferences. This fact reduces the maximum traffic that readers can process since they have to share the channel. Synchronous networks share the channel using a TDMA approach. The goal of this work is to analytically determine whether a synchronous queued RFID network attains stable operation under a given incoming traffic. Stability depends on the service rate, which is characterized in this paper using an exact numerical method based on a recursive analytical approach, overcoming the limitations of previous works, which were based on simplifications. We also address different flow optimization problems, such as computing the maximum joint traffic that a network can process stably, selecting the minimal number of readers to process a given total load, or determining the optimal timeslot duration, which are novel in the RFID literature.
... For that, several proposals for simulating RFID networks are available in literature. These simulators use both programming languages as C.NET [5] or MATLAB [20] and discrete event simulators as NS2 [1] or JiST [9]. NS2 is one of the most used discrete event simulators. ...
Article
Full-text available
Radio Frequency Identification (RFID) technology has the potential to dramatically improve numerous industrial practices. However, it still faces many challenges, including tag collisions and reliability, which may limit its use in many application scenarios. In UHF RFID systems, many collisions happen due to the numerous tag responses generated by the inventory process. Also, given the low cost and low performance of UHF RFID tags combined with harsh environments, RFID communications must deal with high Bit-Error-Rate (BER). As a matter of fact, the extra identification delays added by these collisions and communication errors can bring to a waste of bandwidth and more time inventory. The efficiency of tag identification is related to the performance of the anti-collision algorithm. To evaluate this performance, an UHF RFID module has already been developed in the NS2 simulator. This NS2 RFID module implements an RFID system based on the anti-collision Q-Algorithm (Q-Algo) of the EPC Global Protocol Class-1 Generation-2 Standard. In this paper, first, we propose an optimization of this NS2 RFID module by implementing and validating a more realistic version of the Q-Algo. Secondly, we add to this module some fault injection capabilities to evaluate with NS2 the UHF RFID system robustness in presence of communication errors. Finally, we show how this NS2 UHF RFID module is much more realistic for the timing evaluation in presence of communication errors.
... In the literature we find studies that involve the creation of RFID simulators. Two good examples are: RFIDSim [30], a physical and logical layer engine for passive RFID simulation; and the PARIS Simulation Framework [31], an RFID simulation environment that focuses on the physical layer, particularly the UHF communication channel. Unfortunately, both models are computationally intensive and would require large resources to apply directly into our airport simulation environment. ...
... High-level simulations consider protocols, network and communication performance. RFIDSIM [9] is a more complete simulator that considers physical link and protocol. It provides a realistic physical layer and permits a multi-interface and multi-channel analysis. ...
Article
Full-text available
Active tags and sensor nodes are an important part of the devices involved in the Internet of Things and in some cases it is impossible to power them using standard power supply or even battery. In such a case, battery-less smart sensors are needed. Design this kind of smart system is not an easy task and many different considerations must be taken into account. To face autonomy problems, battery-less sensor is a serious alternative. Energy harvesting is one of the main issue and it is mandatory to simulate the behavior of the system before designing and manufacturing it. In this article, we present ContactLess Simulator (CLS). It is developed in order to simulate contactless powered smart systems such as Near Field Communication (NFC) devices. CLS has been written using visual C# and is thus very flexible and easily portable. More precisely, this article focuses on a battery-less electronic systems: an autonomous NFC smart sensor. To design such a system, the energy budget has to be explored as the central point. CLS was developed exactly for this goal and this article describes a realistic test case to demonstrate it. The test case corresponds to a battery-less sensor node: It is composed of a microcontroller unit, a temperature sensor and a NFC circuit for communication and energy harvesting.
... Various approaches were proposed for UHF RFID systems simulation [23]- [25]. In [23] a model written in Java using JiST simulator was proposed. ...
... Various approaches were proposed for UHF RFID systems simulation [23]- [25]. In [23] a model written in Java using JiST simulator was proposed. The paper observes the simulation model design, the model uses Java language and could be extended for various scenarios. ...
Article
In this paper the application of UHF RFID in automatic vehicles identification is studied by the means of a new simulation framework. The system under study consists of the stationary readers with antennas mounted over the road lanes and vehicles license plates equipped with passive EPC Class 1 Generation 2 UHF RFID tags. The simulation includes protocol settings, antennas parameters and propagation media conditions. Propagation analysis considers Doppler shift to compute the path loss of moving tags properly. The estimations of an inventory round duration, the number of rounds the tag participates in and the tag identification probability are provided. The paper presents vehicles identification probabilities computed for different protocol settings and movement speeds. In particular, it was shown that a vehicle could be identified with 0.9 probability by EPC values only when the vehicle speed is 120 km/h or even more. If the vehicle is identified with both EPC and TID banks values, the same 0.9 probability is achievable when the vehicle speed is under 90 km/h. The results of the simulation coincide with the experiment results involving the city buses.
... Channel knowledge is not only important for localization but also for system performance simulations. The channel model used and analyzed in this paper could be applied to RFID software simulators like [12], [13] with different levels of adaptation. The inclusion of the channel model in the network simulators ns-2 and ns-3 is more difficult since the focus of these simulators is on multiple access and routing protocols and usually no signal-level simulation is performed [14]. ...
... Equ. (13) shows that the backscatter K LOS factor is dominated by the smaller of the two individual factors and that for fully correlated individual channels, a 3 dB loss is expected compared to uncorrelated channels. In Fig. 3, this loss is only 2 dB because the assumption of fully uncorrelated channels does not hold true within this set-up. ...
Conference Paper
Full-text available
Positioning and ranging within UHF RFID are highly dependent on the channel characteristics. The accuracy of time-of-flight based ranging systems is fundamentally limited by the available bandwidth. This paper first analyzes the UHF RFID backscatter channel formed by convolution of the individual constituent channels. For this purpose, we present comprehensive wideband channel measurements in two representative scenarios and an analysis with respect to the Rician K-factor for the line-of-sight component, the root-mean-square delay spread, and the coherence distance, which all influence the potential positioning performance. Based on these measurements, we validate the Cramér Rao lower bound for time-of-flight based ranging under the influence of dense multipath and present two types of range estimators, a maximum likelihood and a matched filter approach. The resulting range estimates highlight the need for an increased bandwidth for UHF RFID systems with respect to time-of-flight based ranging.
... For instance, Rifidi [1] only tackles RFID system deployment issues; fault simulation with Rifidi would be unrealistic. RFIDSim [8] is a complete RFID simulator; nevertheless its main goal is to evaluate RFID protocols and tag hardware characteristics are not modelled. ...
... Consequently, analysis of these results can help producing a sharpened diagnosis and more accurately locate the likely causes of a failure. To this end, we applied the comparison of inventory results of several readers as it is done in the RF2ID middleware [8]. However, in our approach, comparisons are carried out among physical readers that read the same tag groups, providing inherent redundancy. ...