2008
DOI: 10.1016/j.comcom.2008.08.023
|View full text |Cite
|
Sign up to set email alerts
|

Implementation and performance evaluation of an active RFID system for fast tag collection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 39 publications
(16 citation statements)
references
References 23 publications
0
16
0
Order By: Relevance
“…Besides, the proposal forces tags to calculate T proc , though they do not suggest any procedure to do it. Finally, [13] also suggests to use the variable window size mechanism proposed in [14]. However, as we demonstrate in [15], it is not efficient.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Besides, the proposal forces tags to calculate T proc , though they do not suggest any procedure to do it. Finally, [13] also suggests to use the variable window size mechanism proposed in [14]. However, as we demonstrate in [15], it is not efficient.…”
Section: Related Workmentioning
confidence: 99%
“…However, this procedure does not reduce the collisions. In [13] it is proposed to modify the content of the Collection commands to improve the performance. The reader, instead of sending the windows size value in the collection command, sends the values of T slot and K, previously calculated by it.…”
Section: Related Workmentioning
confidence: 99%
“…Different sizes of an antenna are available for readers, from pocket-sized to big antenna with special panel. The size of an antenna depends on a kind of tags that are used in RFID systems [10]. The third component of RFID system is back-end server.…”
Section: Rfid Architecturementioning
confidence: 99%
“… Location-based Attacks (Mafia Fraud/Terrorist Attacks): There messages from the attacker that will make the two honest side that are involved in protocol to believe that they are very close proximity [10] [23]. Dishonest party that involved in protocol was collaborating with the attacker, which is call terrorist attack [24].…”
Section:  Replay Attackmentioning
confidence: 99%
“…The automated vehicle maintenance monitoring system uses an active RFID tag [9] to exploit surrounding transmission frequency range within the car to inform the user by displaying the maintenance messages on the LCD inside the vehicle. Similarly, if appropriate tag readers are placed at facilities like road tolls can be utilized to interact with the base station system to send SMS messages to the car user.…”
Section: Design and Simulation Of Proposed Systemmentioning
confidence: 99%