Please use this identifier to cite or link to this item:
標題: RFID系統之可靠性分析與改善可靠性之方法
Reliability Analysis and Improving Methods for RFID Systems
作者: 王俊賢 
Wang, Chun Hsien 
關鍵字: 可靠性
出版社: 資訊科學與工程學系所
引用: [1] Ahmad Rahmati, Lin Zhong, Matti Hiltunen, Rittwik Jana, Reliability Techniques for RFID-Based Object Tracking Applications, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN‘2007), pp.113 - 118, June 2007 [2] Sozo Inoue, Daisuke Hagiwara, Hiroto Yasuura, A System Approach For the Reliability of RFID system, Proceedings of the First International Conference on Availability Reliability and Security (ARES'06), vol. 2, pp.183 - 186, Nov 2004 [3] Vidyasagar Potdar, Pedram Hayati, Elizabeth Chang, Improving RFID Read Rate Reliability by a Systematic Error Detection Approach, Digital Object Identifier 10.1109/RFIDEURASIA.2007.4368118, pp.1 - 5, Sep 2007 [4] Inoue, S; Hagiwara, D; Yasuura, H, Systematic error detection for RFID reliability,Digital Object Identifier 10.1109/ARES.2006.128, pp.20 - 22, Apr 2006 [5] Murali Kodialam, Thyaga Nandagopal, Wing Cheong Lau, Anonymous Tracking using RFID tags, IEEE Communications Society subject matter experts for publication, pp.1 - 5, Jun 2007 [6] Leonid Bolotnyy, Gabriel Robins, The Case for Multi-Tag RFID Systems, pp.174-186, International Conference on Wireless Algorithms, Systems and Applications (WASA 2007), 2007 [7] Rao, K.V.S;Nikitin, P.V;Lam, S.F, Antenna Design for UHF RFID Tags:A Review and a Practical Application, Digital Object Identifier: 10.1109/TAP.2005.859919 [8] Griffin, J.D; Durgin, G.D, Multipath Fading Measurements for Multi-Antenna Backscatter RFID at 5.8 GHz , Digital Object Identifier: 10.1109/RFID.2009.4911197 [9] Pavel V. Nikitin, Theory and Measurement of Backscattering from RFID Tags, Digital Object Identifier: 10.1109/MAP.2006323323, pp.212 - 218, March 2007 [10] Griffin, J.D;Durgin, G.D; Gains For RF Tags Using Multiple Antennas, Digital Object Identifier: 10.1109/TAP.2007.915423, pp.563 - 570, Feb 2008 [11] Chawla, V; Dong Sam Ha, An overview of passive RFID, Digital Object Identifier: 10.1109/MCOM.2007.4342873, pp.11 - 17 2007 [12]Pathak, R;Joshi, S;Kotak, P, Multi Scale modeling and intricate study of MEMS based elements in RFID systems, Digital Object Identifier:10.1109/CITISIA.2009.5224196, pp.293 - 298 July 2009 [13] Marco Mamei; Renzo Quaglieri; Franco Zambonelli, Making tuple spaces physical with RFID tags, April 2006 [14] Trotter,M.S;Griffin,J.D, Power-optimized waveforms for improving the range and reliability of RFID systems, Digital Object Identifier:10.1109/ RFID.2009.4911196, pp.80 - 87 April 2009 [15] V Prabakar, Dr. BV Kumar, SV Subrahmanya, Management of RFID-centric business networks using Web Services, aict-iciw, pp.133, 2006 [16] Tieyan Li, Robert Deng, Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol, ares, pp.238 - 245, 2007 [17] Derakhshan, R;Orlowska, M.E;Xue Li, RFID Data Management: Challenges and Opportunities, pp.175 - 182, March 2007 [18] Kin Seong Leong; Mun Leng Ng; Cole, P.H, Positioning analysis of multiple antennas in a dense RFID reader environment; Digital Object Identifier: 10.1109/SAINT-W.2006.32, pp.4 - 59, Jan 2006 [19] Bolotnyy, Leonid; Robins, Gabriel, Physically unclonable function-based security and privacy in RFID systems, Digital Object Identifier: 10.1109/PERCOM.2007.26, pp.211 - 220, March 2007 [20] Jameela Al-Jaroodi, Junaid Aziz, Nader Mohamed, Middleware for RFID Systems: An Overview, compsac, vol. 2, pp.154 - 159, 2009 33rd Annual IEEE International Computer Software and Applications Conference, 2009 [21] Sheng, Q.Z.;Xue Li;Zeadally, S, Enabling Next-Generation RFID Applications: Solutions and Challenges, Digital Object Identifier: 10.1109/MC.2008.386, pp.21 - 28 Sept 2008 [22] Nikitin, P.V;Rao, K.V.S;Martinez, R;Lam, S.F, Sensitivity and Impedance Measurements of UHF RFID Chips, Digital Object Identifier: 10.1109/TMTT.2009.2017297, pp.1297 - 1302, May 2009 [23] Holm, S, Hybrid ultrasound-RFID indoor positioning: Combining the best of both worlds, pp.155 - 162, April 2009 [24] Lehtonen, M;Michahelles, F;Fleisch, E, How to detect cloned tags in a reliable way from incomplete RFID traces, Digital Object Identifier: 10.1109/RFID.2009.4911190, pp.257 - 264, April 2009 [25] M. Buettner and D. Wetherall, An empirical study of UHF RFID performance, In Proc. Mobicom (to appear), 2008 [26] Y. Bai, F. Wang, and P. Liu, Efficiently Filtering RFID Data Streams, CleanDB, 2006 [27] Martin Feldhofer and Christian Rechberger, A Case Against Currently Used Hash Functions in RFID Protocols, 2006 [28] Eun-Jun Yoon, Kee-Young Yoo, Two Security Problems of RFID Security Method with Ownership Transfer, npc, pp.68 - 73, 2008 IFIP International Conference on Network and Parallel Computing, 2008 [29] Bolotnyy, Leonid; Robins, PhysicallyUnclonable Function-Based Security and Privacy in RFID Systems, pp.211 - 220, March 2007 [30] Ritamaki, M, Ruhanen, A, Embedded passive UHF RFID seal tag for metallic returnable transit items, RFID, 2010 IEEE International Conference on, pp.152 - 157, April 2010
根據元件的重複性來增加RFID系統可靠性的原理,吾人認為在標籤上安裝兩根天線是可以增加系統之可靠性,並以具有相同極化的兩支天線,以互為垂直的方式擺放,使兩支天線獨立運作不受互相干擾, 經由實驗驗證確實可以增加可靠性,證實其的確能應用於RFID系統中。

The RFID system is unlike the Internet where there is a reliable transmission mechanism in the transport layer or in the link layer, So the discussion and analysis of the reliability of RFID is extraordinarily significant.
This thesis probes into the reliability of RFID, cautiously defines that the reliability of the system is the probability that the information on the object can be successfully identified when the whole object is within the reading range in a reader, and analyze that by what factors the reliability of the system will be influenced. The reliability will be divided into two parts: the influence from the component itself (reader and tag) and the influence from the whole transmission system.
According to the principle -- the redundancy of the component to increase the reliability of the RFID system, the reliability of the system can be increased by two antennas per tag. We use two antennas with the same polarization and put them in a mutually vertical way, which makes the two antennas work independently without interrupting each other. The experiments show that the reliability can be really increased and the method can be truly applied in the RFID system.
Appears in Collections:資訊科學與工程學系所

Show full item record

Google ScholarTM


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.