Academic literature on the topic 'Gen2 RFID Tag'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Gen2 RFID Tag.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Gen2 RFID Tag"

1

Zhao, Lingyun, Lukun Wang, and Shan Du. "An Efficient Q -Algorithm for RFID Tag Anticollision." Wireless Communications and Mobile Computing 2021 (May 8, 2021): 1–7. http://dx.doi.org/10.1155/2021/9967739.

Full text
Abstract:
In large-scale Internet of Things (IoT) applications, tags are attached to items, and users use a radiofrequency identification (RFID) reader to quickly identify tags and obtain the corresponding item information. Since multiple tags share the same channel to communicate with the reader, when they respond simultaneously, tag collision will occur, and the reader cannot successfully obtain the information from the tag. To cope with the tag collision problem, ultrahigh frequency (UHF) RFID standard EPC G1 Gen2 specifies an anticollision protocol to identify a large number of RFID tags in an efficient way. The Q -algorithm has attracted much more attention as the efficiency of an EPC C1 Gen2-based RFID system can be significantly improved by only a slight adjustment to the algorithm. In this paper, we propose a novel Q -algorithm for RFID tag identification, namely, HTEQ, which optimizes the time efficiency of an EPC C1 Gen2-based RFID system to the utmost limit. Extensive simulations verify that our proposed HTEQ is exceptionally expeditious compared to other algorithms, which promises it to be competitive in large-scale IoT environments.
APA, Harvard, Vancouver, ISO, and other styles
2

Solic, Petar, Zoran Blazevic, Maja Skiljo, and Luigi Patrono. "Impact of Tag Responsiveness on Gen2 RFID Throughput." IEEE Communications Letters 20, no. 11 (2016): 2181–84. http://dx.doi.org/10.1109/lcomm.2016.2602199.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yu, Song Sen, Yun Peng, and Jia Jing Zhang. "A Lightweight RFID Mechanism Design." Advanced Materials Research 216 (March 2011): 120–23. http://dx.doi.org/10.4028/www.scientific.net/amr.216.120.

Full text
Abstract:
Based on the study of existing RFID security protocols and RFID anti-collision algorithms, this paper proposes a processing mechanism integrating lightweight random key double-authentication and dynamic slot-ALOHA protocol. The mechanism is simple, practical, and compatible with EPC Gen2 standards. Research shows that comparing with the other security protocols and anti-collision protocols, the new mechanism has a little complexity and tag-cost.
APA, Harvard, Vancouver, ISO, and other styles
4

Wei, Peng, Wenyi Che, Zhongyu Bi, et al. "High-Efficiency Differential RF Front-End for a Gen2 RFID Tag." IEEE Transactions on Circuits and Systems II: Express Briefs 58, no. 4 (2011): 189–94. http://dx.doi.org/10.1109/tcsii.2011.2124530.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yang, Tao, Junhui Xiang, Yu Wang, et al. "An Active Tag Using Carrier Recovery Circuit for EPC Gen2 Passive UHF RFID Systems." IEEE Transactions on Industrial Electronics 65, no. 11 (2018): 8925–35. http://dx.doi.org/10.1109/tie.2018.2816013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Saadi, Hadjer, Ahmed Rnnane, Rachida Touhami, and Mustapha C.E. Yagoub. "Behavioral Simulation of ISO 18000-6 Type-C Class 1 Gen2 Protocol for RFID UHF Transponder and its Application as Anti-collision Protocol in Interference Case." International Journal of Engineering & Technology 7, no. 2.28 (2018): 276. http://dx.doi.org/10.14419/ijet.v7i2.28.12944.

Full text
Abstract:
In RFID systems, the Transponder Protocol usually uses the standard ISO 18000-6 Type-C Class 1 Generation 2, originally developed to communicate with the reader. Since a typical RFID system could be used in a myriad of tasks from product identification to environmental sensing, behavioral software functionality and hardware cost constraints are extremely constricted, principally due to their ¶standard’s requirements.¶ Thus, in this paper, an advanced behavioral simulation of the Tag ID layer of ISO 18000-6 Type-C protocol is proposed with all its states, commands and functionality, a crucial step toward effective design and test. The approach was then successfully applied to collision issues in interference case.
APA, Harvard, Vancouver, ISO, and other styles
7

KIM, Sung-Jin, Minchang CHO, and SeongHwan CHO. "An Ultra Low Power and Variation Tolerant GEN2 RFID Tag Front-End with Novel Clock-Free Decoder." IEICE Transactions on Electronics E93-C, no. 6 (2010): 785–95. http://dx.doi.org/10.1587/transele.e93.c.785.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bhanushali, Kirti, Wenxu Zhao, W. Shepherd Pitts та Paul D. Franzon. "A 125 μm × 245 μm Mainly Digital UHF EPC Gen2 Compatible RFID Tag in 55 nm CMOS Process". IEEE Journal of Radio Frequency Identification 5, № 3 (2021): 317–23. http://dx.doi.org/10.1109/jrfid.2021.3087448.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

V. Sampangi, Raghav, and Srinivas Sampalli. "RFID Mutual Authentication Protocols based on Gene Mutation and Transfer." Journal of Communications Software and Systems 9, no. 1 (2013): 44. http://dx.doi.org/10.24138/jcomss.v9i1.157.

Full text
Abstract:
Radio Frequency Identification (RFID) is a technology that is very popular due to the simplicity in its technology and high adaptability in a variety of areas. The simplicity in the technology, however, comes with a caveat – RFID tags have severe resource restrictions, which make them vulnerable to a range of security attacks. Such vulnerability often results in the loss of privacy of the tag owner and other attacks on tags. Previous research in RFID security has mainly focused on authenticating entities such as readers / servers, which communicate with the tag. Any security mechanism is only as strong as the encryption keys used. Since RFID communication is wireless, critical messages such as key exchange messages are vulnerable to attacks. Therefore, we present a mutual authentication protocol that relies on independent generation and dynamic updates of encryption keys thereby removing the need for key exchange, which is based on the concept of gene mutation and transfer. We also present an enhanced version of this protocol, which improves the security offered by the first protocol. The novelty of the proposed protocols is in the independent generation, dynamic and continuous updates of encryption keys and the use of the concept of gene mutation / transfer to offer mutual authentication of the communicating entities. The proposed protocols are validated by simulation studies and security analysis.
APA, Harvard, Vancouver, ISO, and other styles
10

Yoon, Hee-Seok, Manar Mohaisen, Kyung-Hi Chang, Ji-Hoon Bae, and Gil-Young Choi. "Performance Analysis of Wireless Communications between Tag and Reader in EPCglobal Gen-2 RFID System." Journal of Korean Institute of Electromagnetic Engineering and Science 18, no. 9 (2007): 1047–56. http://dx.doi.org/10.5515/kjkiees.2007.18.9.1047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography