2010 IEEE International Conference on RFID-Technology and Applications 2010
DOI: 10.1109/rfid-ta.2010.5529866
|View full text |Cite
|
Sign up to set email alerts
|

An active backscatter wake-up and tag identification extraction protocol for low cost and low power active RFID

Abstract: In this paper we present a Radio Frequency Identification (RFID) protocol used to wake up and extract the ID of every tag (or a subset thereof) within reach of a reader in an active backscatter RFID system. We also study the effect on tag energy cost and read-out delay incurred when using the protocol, which is based on a frequency binary tree. Simulations show that, when using the 2.45 GHz ISM band, more than 1500 tags can be read per second. With a population of 1000 tags, the average read-out delay is 319 m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2010
2010
2013
2013

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 18 publications
(8 reference statements)
0
5
0
Order By: Relevance
“…Further, the clock has to be stable over temperature and time, or it has to periodically perform costly calibration sequences [12], [13]. Different medium access control (MAC) protocols have also been proposed in cross-level design efforts to relax clock accuracy requirements and improve overall network efficiency, and thereby increase network lifetime [14], [15].…”
mentioning
confidence: 99%
“…Further, the clock has to be stable over temperature and time, or it has to periodically perform costly calibration sequences [12], [13]. Different medium access control (MAC) protocols have also been proposed in cross-level design efforts to relax clock accuracy requirements and improve overall network efficiency, and thereby increase network lifetime [14], [15].…”
mentioning
confidence: 99%
“…The protocol for communication between the tag and reader is described in [11] and is of the binary tree type [12] [13][14], meaning that the ID is extracted bit by bit when…”
Section: Communication Protocolmentioning
confidence: 99%
“…The system performance is deduced from calculations and simulations in [11] and is presented as 1) readout delay, the time it takes in average to read a tag ID 2) the tag life time when draining the tag battery. 3) Operating range of the system.…”
Section: System Performancementioning
confidence: 99%
“…The tags in the vicinity of the reader are first awakened by a beacon different frequencies, where every frequency corresponds to a two-bit combination in the ID. A detailed description is found in [13]. This paper is organized as follows; II) Description of the receiver design.…”
Section: A New Cmos Radio For Low Power Rfid Applicationsmentioning
confidence: 99%
“…As an example; we will use frequency hopping technique, where each hop has the potential to trig the receiver oscillations [13]. It follows that it is important to minimize the number of frequency hops used for addressing each single tag.…”
Section: ) Power Consumption and Self Calibrationmentioning
confidence: 99%