Revisiting Smart Dust with RFID Sensor Networks
@inproceedings{Pplications2008RevisitingSD, title={Revisiting Smart Dust with RFID Sensor Networks}, author={E Xample A Pplications}, year={2008} }
We argue that sensing and computation platforms that leverage RFID technology can realize “smart-dust” applications that have eluded the sensor network community. RFID sensor networks (RSNs), which consist of RFID readers and RFID sensor nodes (WISPs), extend RFID to include sensing and bring the advantages of small, inexpensive and long-lived RFID tags to wireless sensor networks. We describe sample applications suited to the space between existing sensor networks and RFID. We highlight the…
50 Citations
Understanding energy consumption of UHF RFID readers for mobile phone sensing applications
- BusinessWiNTECH '12
- 2012
It is shown that a typical operation using a compact UHF RFID reader consumes much less energy compared to sensors commonly present in mobile phones such as GPS, thereby supporting the case for UHFRFID reader integration with mobile phones.
Flit: a bulk transmission protocol for RFID-scale sensors
- Computer ScienceMobiSys '12
- 2012
This paper designs a coordinated bulk transfer protocol for RFID-scale sensors that maximizes channel utilization and minimizes energy lost due to idle listening while also minimizing collisions, and presents an implementation of the protocol for the Intel WISP.
Wildlife and environmental monitoring using RFID and WSN technology
- Computer ScienceSenSys '09
- 2009
Two efficient ways of extending the lifetime of wireless sensor systems by using an adaptive duty cycling protocol and an adaptive data management protocol are presented.
A New Vision for Smart Objects and the Internet of Things: Mobile Robots and Long-Range UHF RFID Sensor Tags
- Computer ScienceArXiv
- 2015
This work uses a pair of autonomous mobile robots outfitted with UHF RFID readers to explore several potential applications where mobile robots interact with sensor tags to perform tasks such as: soil moisture sensing, remote crop monitoring, infrastructure monitoring, water quality monitoring, and remote sensor deployment.
A Battery-Assisted Sensor-Enhanced RFID Tag Enabling Heterogeneous Wireless Sensor Networks
- Computer ScienceIEEE Sensors Journal
- 2014
This paper presents the design, realization, and experimental validation of a battery-assisted radio frequency identification (RFID) tag with sensing and computing capabilities conceived to explore…
RFID: A Communication System Perspective
- Business, Computer Science
- 2014
This dissertation proposes new coded modulation schemes based on unequal error protection, which improves both the spectral efficiency and the backscatter power efficiency loss metric and considers a protocol that uses HARQ algorithms without requiring major changes to the Gen2 protocol.
Radio Frequency Identification and Internet of Things: A Fruitful Synergy
- Computer Science
- 2016
An overview of the possible synergy between RFID and IoT as it promises to expand the Internet and networks to places such as home, manufacturing floors, energy grids, healthcare facilities, agricultural farms and plantations, transportation, etc is presented.
A software radio-based UHF RFID reader for PHY/MAC experimentation
- Computer Science2011 IEEE International Conference on RFID
- 2011
The design and evaluation of a flexible UHF RFID reader that enables new PHY/MAC designs to be prototyped and evaluated is presented and it is believed that it is the first inexpensive tool that readily enables changes to the physical and MAC layer of RFID systems.
Minimalist security and privacy schemes based on enhanced AES for integrated WISP sensor networks
- Computer ScienceInt. J. Commun. Networks Distributed Syst.
- 2013
A minimalist approach to securely encrypt, authenticate and exchange secret keys with a minimal instruction set computer MISC processor based on the AES algorithm, termed the enhanced AES NAES processor.
Ensuring application specific security, privacy and performance goals in rfid system
- Computer Science
- 2013
This dissertation proposes four different authentication techniques for RFID technologies, providing solutions to the following research issues: 1) detecting counterfeit as well as ensuring low response time in large scale RFID systems, 2) preserving privacy and maintaining scalability in RFID based healthcare systems, 3) ensuring security and survivability of Computational RFID (CRFID) networks, and 4) detecting missing WISP tags efficiently to ensure reliability of CRFID based system's decision.
References
SHOWING 1-10 OF 22 REFERENCES
Wirelessly-Charged UHF Tags for Sensor Data Collection
- Computer Science2008 IEEE International Conference on RFID
- 2008
The design and implementation of a prototype WISP-PDL is described, and results from a short demonstration study that shows it can monitor the temperature and fullness of a milk carton as it is used over the course of a day.
Design of an RFID-Based Battery-Free Programmable Sensing Platform
- Computer ScienceIEEE Transactions on Instrumentation and Measurement
- 2008
To the authors' knowledge, WISP is the first fully programmable computing platform that can operate using power transmitted from a long-range (UHF) RFID reader and communicate arbitrary multibit data in a single response packet.
A Wirelessly-Powered Platform for Sensing and Computation
- Computer ScienceUbiComp
- 2006
This paper reports the first fully programmable computing platform that can operate using power transmitted from a long-range (UHF) RFID Reader and communicate arbitrary, multi-bit data in response to a single RFID reader poll event.
An empirical study of UHF RFID performance
- BusinessMobiCom '08
- 2008
It is shown that tuning physical layer operating parameters can increase the read rate for a set of tags by more than a third, and that tighter integration of the physical and MAC layers has the potential for even greater improvements.
Emerging challenges: Mobile networking for “Smart Dust”
- Computer ScienceJournal of Communications and Networks
- 2000
This work reviews the key elements of the emergent technology of “Smart Dust” and outlines the research challenges they present to the mobile networking and systems community, which must provide coherent connectivity to large numbers of mobile network nodes co-located within a small volume.
TAG: a Tiny AGgregation service for ad-hoc sensor networks
- Computer ScienceOPSR
- 2002
This work presents the Tiny AGgregation (TAG) service for aggregation in low-power, distributed, wireless environments, and discusses a variety of optimizations for improving the performance and fault tolerance of the basic solution.
A 5.1-/spl mu/W UHF RFID tag chip integrated with sensors for wireless environmental monitoring
- EngineeringProceedings of the 31st European Solid-State Circuits Conference, 2005. ESSCIRC 2005.
- 2005
An RF-powered transponder with temperature and photo sensors is designed and fabricated for environmental monitoring. The transponder gathers power from external ISM (860-960MHz) band RF signal and…
A Remote Code Update Mechanism for Wireless Sensor Networks
- Computer Science
- 2003
This paper presents Multihop Over-the-Air Programming (MOAP), a code distribution mechanism specifically targeted for Mica-2 Motes and shows that a very simple windowed retransmission tracking scheme is nearly as effective as arbitrary repairs and yet is much better suited to energy and memory constrained embedded systems.
Versatile low power media access for wireless sensor networks
- Computer ScienceSenSys '04
- 2004
B-MAC's flexibility results in better packet delivery rates, throughput, latency, and energy consumption than S-MAC, and the need for flexible protocols to effectively realize energy efficient sensor network applications is illustrated.
FireWxNet: a multi-tiered portable wireless system for monitoring weather conditions in wildland fire environments
- Environmental Science, Computer ScienceMobiSys '06
- 2006
This paper describes a week long full system deployment utilizing 3 sensor networks and 2 web-cams in the Selway-Salmon Complex Fires of 2005 and performs an analysis of system performance and present observations and lessons gained from the deployment.