Student Seminars: Kickoff

Size: px
Start display at page:

Download "Student Seminars: Kickoff"

Transcription

1 Seminars Student Seminars: Kickoff Walid Saad Durham 447

2 Seminars Fall Logistics Weekly meetings in SEB 135 SEB 125 used 10/24, 11/07, and 12/05 Contacts: SaiDhiraj Amuru, Harpreet Dhillon, Walid Saad For the students, by the students So what am I doing here? Due to short notice, no student has stepped up Who will participate? The goal is to have most speakers be students Faculty will be attending sporadically 2

3 Seminars What are the goals of these seminars? Sleeping hour for grad students? A form of torture? Debate group : engaging discussions between groups Integrating new students by giving them insights on how to identify and formulate a research problem, how to choose a technique, etc. Practice prelims, defense, etc. Free pizza (outside)! 3

4 Additional Goals Have talks that discuss new directions in wireless or other areas we re engaged in Talks/tutorials that discuss how to use certain tools For example: how to program a USRP? How to use NS3 for wireless simulations? We will solicit such questions from the students Distinguished Speakers from inside and outside VT We will strive to get at least one distinguished speaker per year from outside VT Build a culture of research in our students community => Sustainable only via active students participation 4

5 Best Practices The purpose of these meetings is not to overly defend your research but rather get feedback from fellow students and explain to them what you re doing Strongly suggest to explain a basic problem you re working on, while clarifying methodology, assumptions made, etc. You know this but. use more figures and illustrations to clarify your ideas However, we need sufficient technical details in these seminars so that new students can learn from the rest 5

6 Best Practices Avoid overly texty slides Concise bullets preferred Avoid weird fonts And weird colors Make eye contact with your audience! Prepare for questions, if no questions, you can start the debate Be enthusiastic, not bored! 6

7 Today s Talk On the Physical Layer Security of Backscatter Systems

8 Outline Introduction to RFID systems and the backscatter Motivation and key features Backscatter communication System model Basic communication model What happens in the presence of eavesdroppers? Physical layer security of backscatter systems Introduction and motivation Basic model Main analysis Simulation results Conclusions and future outlook 8

9 RFID Systems A Radio Frequency Identification (RFID) system is composed of two key components RFID tag: electronic device that can store and transmit data to a reader in a contactless manner RFID reader: Transceiver that can read and communicate with RFID tags 9

10 RFID Systems Three types of RFID tags Passive: cheapest does not include any power source, harvests energy from the reader Semi-Passive: can include some basic sotrage elements as well as a possible small battery to power the circuitry (but not for TX) Active: has transmission capabilities basically a small sensor Two main technologies Near-field communication (NFC): operate at very short distances, e.g., few centimeters, over HF frequencies (i.e., MHz). Ultra high frequency (UHF) RFIDs: operate at UHF frequencies (typically 433 MHz), can be used at longer ranges (10 meters is common but recent research is looking at larger distances) Of interest in this talk 10

11 RFID Applications 11

12 Basic RFID Communication Interrogate and Power Tag Responds with data, by modulating the CW Reader transmits a continuous wave (CW) carrier signal Induces an RF voltage across the tag antenna that is converted to DC by a power harvesting circuit to power the tag s circuitry and demodulate the received command Tag transmits back its stored information by controlling the amount of backscatter of the impinging downlink signal by varying the impedance (mis)-match of the antenna front-end Role of the reader in energizing the tag 12

13 RFID Backscatter: Challenges Tags must remain cheap and passive tags must harvest energy Limitations on circuit design. Design of innovative RFIDs is a key challenge. The uplink tag-to-reader communication has a strictly limited bandwidth due to limited backscatter power and tag collisions How to improve the uplink communication? Crucial to allow higher distances, better rate, and new applications! Security is probably the most critical issue Fact: Classical cryptography hard to implement on RFID tags Current solutions (lightweight cryptography) are non-scalable Security solutions with little complexity => Physical layer security! 13

14 System Model Basic UHF RFID system with one reader and one tag The signal backscattered by a tag k toward the receive antenna of a reader i is given by (Griffin et al., IEEE Trans. Antenna and Propagation, Feb 2008): Noise Tagreader channel Readertag channel Reader s TX signal Tag s reflection coefficient (useful signal) 14

15 Presence of Eavesdroppers A nearby eavesdropper can tap into the communication Two main critics of PHY security But cryptography works fine in cellular systems! But not in RFID You assume eaves. location known RFIDs work on small distances! Does the backscatter constitute the ideal PHY security application? Let s see Tag Responds with data/id Interrogate and power Tag Passive tag requires the reader s continuous wave to power up! 15

16 Key Backscatter Features Eavesdropping in a backscatter system is mostly useful at close distances Due to low-power, low-cost nature of the system as well as the reliance on passive tags Eavesdroppers are mainly interested in the uplink signal/tag data So they must focus their effort on the tag, not the reader The downlink reader-tag signal is also received by the eavesdropper during backscatter A feature to exploit for PHY security 16

17 Signal at the Eavesdropper The signal backscattered by a tag toward the receive antenna of a reader as received at the eavesdropper Tag-eave channel Readertag channel Tag s reflection coefficient (useful signal) Reader continuous CW transmission, Reader-eave channel Noise In a classical system, the eavesdropper knows the CW x and, thus, the second term can be cancelled and does not hinder eavesdropping 17

18 Using Artificial Noise Observation: the backscatter channel provides a mean for reader-induced interference, due to the nature of the communication A random noise signal added to the CW transmitted by the readers will be detrimental to the eavesdroppers Can improve the physical layer security of the system While this has been used in PHY security for conventional systems, it often requires MIMO, in RFID, no need for MIMO! Easily implementable, with little changes at the tag 18

19 Using Artificial Noise Each reader transmits x+zwith z being a random narrowband artificial noise known to the reader With noise injection, the reader s signal becomes: And the eavesdropper s received signal: z and z are the same signal, but received by the eavesdropper over different paths and at possibly different time instants Power of the received noise from z will naturally be much larger than that of the backscattered noise 19

20 PHY Security: Basics C d 1 I can hear User 1! Notion of secrecy capacity C e 1 Maximum rate sent from a wireless node to its destination in the presence of eavesdroppers Here, secrecy capacity of user 1 : C 1 = (C d 1 -C e 1) + For RFID, we use the secrecy capacity as a theoretical performance metric to assess how artificial noise can improve secrecy Practical RFID-tailored notions is an interesting direction 20

21 RFID with Artificial Noise Approximation of secrecy capacity of the backscatter communication between reader and tag: The received powers follow the Friis model We assume worst-case scenario at eavesdropper, i.e., noise is 0, hereinafter. 21

22 Positive Secrecy Key question: For this basic model, what is the condition for positive secrecy? Let s look at two baseline cases Case 1: all terminals have omnidirectional antennas Positive secrecy is challenging with eaves. close to the tag. Case 2: any antennas at the eavesdropper Let s look at antenna impact numerically 22

23 Case 2 Even for highly directional antenna, positive secrecy is possible with reasonable noise power 23

24 Back to Case 1 Even for an eavesdropper placed at 10 cm of the tag, positive secrecy is possible with reasonable noise power 24

25 Optimal Power Allocation Reader has a finite transmit power budget that must be split between noise and main CW How to allocate the reader s finite power between noise and real signal? Analytical closed-form solution can be derived easily (simple optimization problem) 25

26 Simulation results (1) Positive secrecy Achievable even for small distances 26

27 Simulation results (2) Positive secrecy Achievable even for highly directive antennas 27

28 Simulation results (3) Only a small noise injection is sufficient for positive secrecy 28

29 The Multi-Reader Case What if we have multiple readers? Key tradeoff: more power for noise, worse SINR at eavesdroppers, but Less power for the useful signal Coupling in actions: It can lead the other readers to change their power allocation, due to the spreading interference New dimension to the problem Adding noise can protect against eavesdroppers but the power of each others noise will impact our performance We now have a problem where decisions between readers are interdependent 29

30 The Multi-Reader Case What are the techniques we can now use? We can still use an optimization problem for the entire system Advantage: ensure system-wide optimality Disadvantage: could require additional overhead and explicit control of all readers (may not be possible in practice) Game theory Why? Interdependence in decisions between the readers Advantage: allows individual optimization per reader (kind of like we did before) Disadvantage: could yield an inefficient point and may still require some form of information at each reader. 30

31 RFID Game Formulation What kind of game? Noncooperative, because we assume no explicit communication between readers We formulate the problem as a strategic, noncooperative game with The readers being the players The action of each reader being the fraction of power allotted to the noise and the useful signal The utility being the sum of secrecy rates at all tags, i.e., 31

32 Game Solution Definition: A Nash equilibrium is a strategy profile s* with the property that no player i can do better by choosing a strategy different from s*, given that every other player j i. For each player i with payoff function u i, we have: Does the Nash equilibrium exist? Not always, multiplicity, efficiency, algorithmic aspects Algorithmic solution via best response Not necessarily the best solution, but can give you insights on a problem 32

33 Best-Response Solution Initial State: -No artificial noise being used -- Discovery of neighboring readers Sequentially, Each reader decides on its optimal power distribution, under the currently observed network state Stage I Best Response Dynamics, until finding a Nash equilibrium - Readers send out the interrogate commands using the derived powers/secrecy - The tags respond using backscatter Stage II Actual data acquisition 33

34 Simulation results (1) Classical approach = Regular channel With no noise Case with 6 Eavesdroppers: Performance advantage particularly when the number Of eavesroppers > Number of readers 34

35 Simulation results (2) Reasonable Number of iterations 35

36 Summary The physical layer security of backscatter RFID systems is still a largely unchartered territory Most natural application for PHY security, due to infeasibility of cryptography and the need for cost-effective, practical solutions Our preliminary results show that a simple solution can lead to significant gains, at least theoretically Future work Advanced signal processing and information theoretic analysis More system-level analysis, multi-reader/tag/eavesdropper Theoretical analysis on performance of RFID PHY security Innovative optimization techniques, beyond basic artificial noise 36

37 Finally. Thank You Questions? 37

Politecnico di Milano Advanced Network Technologies Laboratory. Radio Frequency Identification

Politecnico di Milano Advanced Network Technologies Laboratory. Radio Frequency Identification Politecnico di Milano Advanced Network Technologies Laboratory Radio Frequency Identification RFID in Nutshell o To Enhance the concept of bar-codes for faster identification of assets (goods, people,

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Radio Frequency Identification

Politecnico di Milano Advanced Network Technologies Laboratory. Radio Frequency Identification Politecnico di Milano Advanced Network Technologies Laboratory Radio Frequency Identification 1 RFID in Nutshell o To Enhance the concept of bar-codes for faster identification of assets (goods, people,

More information

An Empirical Study of UHF RFID Performance. Michael Buettner and David Wetherall Presented by Qian (Steve) He CS Prof.

An Empirical Study of UHF RFID Performance. Michael Buettner and David Wetherall Presented by Qian (Steve) He CS Prof. An Empirical Study of UHF RFID Performance Michael Buettner and David Wetherall Presented by Qian (Steve) He CS 577 - Prof. Bob Kinicki Overview Introduction Background Knowledge Methodology and Tools

More information

Low-Complexity Beam Allocation for Switched-Beam Based Multiuser Massive MIMO Systems

Low-Complexity Beam Allocation for Switched-Beam Based Multiuser Massive MIMO Systems Low-Complexity Beam Allocation for Switched-Beam Based Multiuser Massive MIMO Systems Jiangzhou Wang University of Kent 1 / 31 Best Wishes to Professor Fumiyuki Adachi, Father of Wideband CDMA [1]. [1]

More information

Multiple Antenna Processing for WiMAX

Multiple Antenna Processing for WiMAX Multiple Antenna Processing for WiMAX Overview Wireless operators face a myriad of obstacles, but fundamental to the performance of any system are the propagation characteristics that restrict delivery

More information

Reliable and Efficient RFID Networks

Reliable and Efficient RFID Networks Reliable and Efficient RFID Networks Jue Wang with Haitham Hassanieh, Dina Katabi, Piotr Indyk Machine Generated Data RFID will be a major source of such traffic In Oil & Gas about 30% annual growth rate

More information

Wireless Keyboard Without Need For Battery

Wireless Keyboard Without Need For Battery Technical Disclosure Commons Defensive Publications Series April 29, 2015 Wireless Keyboard Without Need For Battery Vijay Asrani James Tanner Follow this and additional works at: http://www.tdcommons.org/dpubs_series

More information

Pareto Optimization for Uplink NOMA Power Control

Pareto Optimization for Uplink NOMA Power Control Pareto Optimization for Uplink NOMA Power Control Eren Balevi, Member, IEEE, and Richard D. Gitlin, Life Fellow, IEEE Department of Electrical Engineering, University of South Florida Tampa, Florida 33620,

More information

RFID/NFC TECHNOLOGY. With emphasis on physical layer. Ali Zaher Oslo

RFID/NFC TECHNOLOGY. With emphasis on physical layer. Ali Zaher Oslo RFID/NFC TECHNOLOGY With emphasis on physical layer Ali Zaher Oslo 28.09.2012 CONTENTS List of abbreviations. RFID Definition. RFID Coupling. NFC. RFID Physical Model. NFC Physical Model. My work. 2 LIST

More information

Interference management Within 3GPP LTE advanced

Interference management Within 3GPP LTE advanced Interference management Within 3GPP LTE advanced Konstantinos Dimou, PhD Senior Research Engineer, Wireless Access Networks, Ericsson research konstantinos.dimou@ericsson.com 2013-02-20 Outline Introduction

More information

RFID - a basic introduction

RFID - a basic introduction RFID - a basic introduction Sophie Bruce Supervisor: Jerzy Dabrowski May 10, 2016 Contents 1 Introduction 1 2 What is RFID? 2 2.1 Transponders................................. 2 2.1.1 Physical principles

More information

Ad hoc and Sensor Networks Chapter 4: Physical layer. Holger Karl

Ad hoc and Sensor Networks Chapter 4: Physical layer. Holger Karl Ad hoc and Sensor Networks Chapter 4: Physical layer Holger Karl Goals of this chapter Get an understanding of the peculiarities of wireless communication Wireless channel as abstraction of these properties

More information

M2M massive wireless access: challenges, research issues, and ways forward

M2M massive wireless access: challenges, research issues, and ways forward M2M massive wireless access: challenges, research issues, and ways forward Petar Popovski Aalborg University Andrea Zanella, Michele Zorzi André D. F. Santos Uni Padova Alcatel Lucent Nuno Pratas, Cedomir

More information

Performance review of Pico base station in Indoor Environments

Performance review of Pico base station in Indoor Environments Aalto University School of Electrical Engineering Performance review of Pico base station in Indoor Environments Inam Ullah, Edward Mutafungwa, Professor Jyri Hämäläinen Outline Motivation Simulator Development

More information

Feasibility and Benefits of Passive RFID Wake-up Radios for Wireless Sensor Networks

Feasibility and Benefits of Passive RFID Wake-up Radios for Wireless Sensor Networks Feasibility and Benefits of Passive RFID Wake-up Radios for Wireless Sensor Networks He Ba, Ilker Demirkol, and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester

More information

MIMO in 4G Wireless. Presenter: Iqbal Singh Josan, P.E., PMP Director & Consulting Engineer USPurtek LLC

MIMO in 4G Wireless. Presenter: Iqbal Singh Josan, P.E., PMP Director & Consulting Engineer USPurtek LLC MIMO in 4G Wireless Presenter: Iqbal Singh Josan, P.E., PMP Director & Consulting Engineer USPurtek LLC About the presenter: Iqbal is the founder of training and consulting firm USPurtek LLC, which specializes

More information

Contactless snooping: Assessing the real threats

Contactless snooping: Assessing the real threats Thomas P. Diakos 1 Johann A. Briffa 1 Tim W. C. Brown 2 Stephan Wesemeyer 1 1 Department of Computing,, Guildford 2 Centre for Communication Systems Research,, Guildford Tomorrow s Transactions forum,

More information

RFID at mm-waves Michael E. Gadringer

RFID at mm-waves Michael E. Gadringer RFID at mm-waves Michael E. Gadringer, Philipp F. Freidl, Wolfgang Bösch Institute of Microwave and Photonic Engineering Graz University of Technology www.tugraz.at 2 Agenda Introduction Into mm-wave RFID

More information

Backscatter and Ambient Communication. Yifei Liu

Backscatter and Ambient Communication. Yifei Liu Backscatter and Ambient Communication Yifei Liu Outline 1. Introduction 2. Ambient Backscatter 3. WiFi Backscatter 4. Passive WiFi Backscatter Outline 1. Introduction 2. Ambient Backscatter 3. WiFi Backscatter

More information

Basics of RFID technology Thomas Holtstiege Technical Manager EECC. October 2009

Basics of RFID technology Thomas Holtstiege Technical Manager EECC. October 2009 Basics of RFID technology Thomas Holtstiege Technical Manager EECC October 2009 About the European EPC Competence Center (EECC) First European EPCglobal accredited performance test center Active since

More information

Building versatile network upon new waveforms

Building versatile network upon new waveforms Security Level: Building versatile network upon new waveforms Chan Zhou, Malte Schellmann, Egon Schulz, Alexandros Kaloxylos Huawei Technologies Duesseldorf GmbH 5G networks: A complex ecosystem 5G service

More information

NEAR FIELD COMMUNICATION (NFC) A TECHNICAL OVERVIEW

NEAR FIELD COMMUNICATION (NFC) A TECHNICAL OVERVIEW UNIVERSITY OF VAASA FACULTY OF TECHNOLOGY TELECOMMUNICATION ENGINEERING Naser Hossein Motlagh NEAR FIELD COMMUNICATION (NFC) A TECHNICAL OVERVIEW Master s thesis for the degree of Master of Science in

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #5 Jamming, Physical Layer Security 2015 Patrick Tague 1 Class #5 Jamming attacks and defenses Secrecy using physical layer properties Authentication

More information

Instantaneous Inventory. Gain ICs

Instantaneous Inventory. Gain ICs Instantaneous Inventory Gain ICs INSTANTANEOUS WIRELESS Perhaps the most succinct figure of merit for summation of all efficiencies in wireless transmission is the ratio of carrier frequency to bitrate,

More information

Course Project. Project team forming deadline has passed Project teams will be announced soon Next step: project proposal presentation

Course Project. Project team forming deadline has passed Project teams will be announced soon Next step: project proposal presentation Course Project Project team forming deadline has passed Project teams will be announced soon Next step: project proposal presentation Presentation slides and one-page proposal document are due on Jan 30

More information

Tag Localization in Passive UHF RFID

Tag Localization in Passive UHF RFID Tag Localization in Passive UHF RFID Daniel Arnitz, Ulrich Muehlmann, Klaus Witrisal Graz University of Technology, Austria NXP Semiconductors, Austria This work has been funded by NXP Semiconductors and

More information

Design of UHF RFID Emulators with Applications to RFID Testing and Data Transport

Design of UHF RFID Emulators with Applications to RFID Testing and Data Transport Design of UHF RFID Emulators with Applications to RFID Testing and Data Transport Rich Redemske MIT AutoID Lab Cambridge, MA, USA redemske@mit.edu Rich Fletcher TagSense, Inc. Cambridge, MA, USA rf@tagsense.com

More information

Wireless Powered Communication Networks: An Overview

Wireless Powered Communication Networks: An Overview Wireless Powered Communication Networks: An Overview Rui Zhang (e-mail: elezhang@nus.edu.sg) ECE Department, National University of Singapore (NUS) WCNC Doha, April 3 2016 Introduction Wireless Communication

More information

DATE: 17/08/2006 Issue No 2 e-plate Operation Overview

DATE: 17/08/2006 Issue No 2 e-plate Operation Overview Page 1 of 7 Fundamentals Introduction e-pate technology is the next generation of long range RFID (Radio Frequency IDentification). The objective is wireless and automated data collection of vehicles and

More information

Beamforming on mobile devices: A first study

Beamforming on mobile devices: A first study Beamforming on mobile devices: A first study Hang Yu, Lin Zhong, Ashutosh Sabharwal, David Kao http://www.recg.org Two invariants for wireless Spectrum is scarce Hardware is cheap and getting cheaper 2

More information

Chapter 2 Overview. Duplexing, Multiple Access - 1 -

Chapter 2 Overview. Duplexing, Multiple Access - 1 - Chapter 2 Overview Part 1 (2 weeks ago) Digital Transmission System Frequencies, Spectrum Allocation Radio Propagation and Radio Channels Part 2 (last week) Modulation, Coding, Error Correction Part 3

More information

The sensitivity test of 2.45GHz RFID active tag

The sensitivity test of 2.45GHz RFID active tag Journal of Physics: Conference Series PAPER OPEN ACCESS The sensitivity test of 2.45GHz RFID active tag To cite this article: Xiaoli Shi et al 208 J. Phys.: Conf. Ser. 087 052034 View the article online

More information

Analysis and Simulation of UHF RFID System

Analysis and Simulation of UHF RFID System ICSP006 Proceedings Analysis and Simulation of UHF RFID System Jin Li, Cheng Tao Modern Telecommunication Institute, Beijing Jiaotong University, Beijing 00044, P. R. China Email: lijin3@63.com Abstract

More information

ECS455: Chapter 4 Multiple Access

ECS455: Chapter 4 Multiple Access ECS455: Chapter 4 Multiple Access Asst. Prof. Dr. Prapun Suksompong prapun@siit.tu.ac.th 1 Office Hours: BKD 3601-7 Tuesday 9:30-10:30 Tuesday 13:30-14:30 Thursday 13:30-14:30 ECS455: Chapter 4 Multiple

More information

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /VETECF.2011.

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /VETECF.2011. Vatsikas, S., Armour, SMD., De Vos, M., & Lewis, T. (2011). A fast and fair algorithm for distributed subcarrier allocation using coalitions and the Nash bargaining solution. In IEEE Vehicular Technology

More information

Lesson Title: Electromagnetics and Antenna Overview

Lesson Title: Electromagnetics and Antenna Overview Page 1 of 5 Lesson Title: Electromagnetics and Antenna Overview 6/26/09 Copyright 2008, 2009 by Dale R. Thompson {d.r.thompson@ieee.org} Rationale Why is this lesson important? Why does the student need

More information

A Novel UHF RFID Dual-Band Tag Antenna with Inductively Coupled Feed Structure

A Novel UHF RFID Dual-Band Tag Antenna with Inductively Coupled Feed Structure 2013 IEEE Wireless Communications and Networking Conference (WCNC): PHY A Novel UHF RFID Dual-Band Tag Antenna with Inductively Coupled Feed Structure Yejun He and Bing Zhao Shenzhen Key Lab of Advanced

More information

Panda: Neighbor Discovery on a Power Harvesting Budget. Robert Margolies, Guy Grebla, Tingjun Chen, Dan Rubenstein, Gil Zussman

Panda: Neighbor Discovery on a Power Harvesting Budget. Robert Margolies, Guy Grebla, Tingjun Chen, Dan Rubenstein, Gil Zussman Panda: Neighbor Discovery on a Power Harvesting Budget Robert Margolies, Guy Grebla, Tingjun Chen, Dan Rubenstein, Gil Zussman The Internet of Tags Small energetically self-reliant tags Enabling technologies

More information

Pseudo-random Aloha for Enhanced. Collision-recovery in RFID

Pseudo-random Aloha for Enhanced. Collision-recovery in RFID Pseudo-random Aloha for Enhanced 1 Collision-recovery in RFID Fabio Ricciato, Paolo Castiglione Università del Salento, Lecce, Italy Telecommunications Research Center Vienna (FTW), Vienna, Austria arxiv:1209.4763v1

More information

RADIO FREQUENCY ENERGY HAVRESTING 4TH YEAR PROJECT

RADIO FREQUENCY ENERGY HAVRESTING 4TH YEAR PROJECT RADIO FREQUENCY ENERGY HAVRESTING 4TH YEAR PROJECT CUESEF Funding Request CARLETON UNIVERSITY February 7, 2014 Table of Contents Abstract... 2 Group Introduction... 3 Faculty Contact... 3 Overview of Project...

More information

Collision Avoidance in a Dense RFID Network

Collision Avoidance in a Dense RFID Network Collision Avoidance in a Dense RFID Network Shweta Jain Computer Science Department Stony Brook University Stony Brook, NY shweta@cs.sunysb.edu Samir R. Das Computer Science Department Stony Brook University

More information

Physics of RFID. Pawel Waszczur McMaster RFID Applications Lab McMaster University

Physics of RFID. Pawel Waszczur McMaster RFID Applications Lab McMaster University 1 Physics of RFID Pawel Waszczur McMaster RFID Applications Lab McMaster University 2 Agenda Radio Waves Active vs. Passive Near field vs. Far field Behavior of UHF fields Modulation & Signal Coding 3

More information

Long Range and Low Powered RFID Tags with Tunnel Diode

Long Range and Low Powered RFID Tags with Tunnel Diode Long Range and Low Powered RFID Tags with Tunnel Diode Francesco Amato, Christopher W. Peterson, Muhammad B. Akbar and Gregory D. Durgin School of Electrical and Computer Engineering Georgia Institute

More information

RFID Integrated Teacher Monitoring

RFID Integrated Teacher Monitoring RFID Integrated Teacher Monitoring Introduction Article by Adewopo Adeniyi M.Sc, Texila American University, Nigeria Email: preciousadewopon@yahoo.com Radio Frequency Identification (RFID) is a generic

More information

User Guide for the Calculators Version 0.9

User Guide for the Calculators Version 0.9 User Guide for the Calculators Version 0.9 Last Update: Nov 2 nd 2008 By: Shahin Farahani Copyright 2008, Shahin Farahani. All rights reserved. You may download a copy of this calculator for your personal

More information

RFID sensor systems embedded in concrete systematical investigation of the transmission characteristics

RFID sensor systems embedded in concrete systematical investigation of the transmission characteristics RFID sensor systems embedded in concrete systematical investigation of the transmission characteristics More info about this article: http://www.ndt.net/?id=19850 M. Bartholmai, S. Johann, M. Kammermeier,

More information

Optimizing Multi-Cell Massive MIMO for Spectral Efficiency

Optimizing Multi-Cell Massive MIMO for Spectral Efficiency Optimizing Multi-Cell Massive MIMO for Spectral Efficiency How Many Users Should Be Scheduled? Emil Björnson 1, Erik G. Larsson 1, Mérouane Debbah 2 1 Linköping University, Linköping, Sweden 2 Supélec,

More information

Modulated Backscattering Coverage in Wireless Passive Sensor Networks

Modulated Backscattering Coverage in Wireless Passive Sensor Networks Modulated Backscattering Coverage in Wireless Passive Sensor Networks Anusha Chitneni 1, Karunakar Pothuganti 1 Department of Electronics and Communication Engineering, Sree Indhu College of Engineering

More information

CHAPTER 10 CONCLUSIONS AND FUTURE WORK 10.1 Conclusions

CHAPTER 10 CONCLUSIONS AND FUTURE WORK 10.1 Conclusions CHAPTER 10 CONCLUSIONS AND FUTURE WORK 10.1 Conclusions This dissertation reported results of an investigation into the performance of antenna arrays that can be mounted on handheld radios. Handheld arrays

More information

Securing Deployed RFIDs by Randomizing the Modulation and the Channel Jue Wang, Haitham Hassanieh, Dina Katabi, and Tadayoshi Kohno

Securing Deployed RFIDs by Randomizing the Modulation and the Channel Jue Wang, Haitham Hassanieh, Dina Katabi, and Tadayoshi Kohno Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TR-23- January 2, 23 Securing Deployed RFIDs by Randomizing the Modulation and the Channel Jue Wang, Haitham Hassanieh,

More information

School of Electrical Engineering and Telecommunications

School of Electrical Engineering and Telecommunications School of Electrical Engineering and Telecommunications SECURED COMMUNICATION IN SWIPT NETWORKS Surabattuni Ramakrishna Supervisor: Dr Derrick Wing Kwan Ng A Thesis Submitted to University of New South

More information

Fictitious Play applied on a simplified poker game

Fictitious Play applied on a simplified poker game Fictitious Play applied on a simplified poker game Ioannis Papadopoulos June 26, 2015 Abstract This paper investigates the application of fictitious play on a simplified 2-player poker game with the goal

More information

Energy Harvested and Achievable Rate of Massive MIMO under Channel Reciprocity Error

Energy Harvested and Achievable Rate of Massive MIMO under Channel Reciprocity Error Energy Harvested and Achievable Rate of Massive MIMO under Channel Reciprocity Error Abhishek Thakur 1 1Student, Dept. of Electronics & Communication Engineering, IIIT Manipur ---------------------------------------------------------------------***---------------------------------------------------------------------

More information

MIMO-aware Cooperative Cognitive Radio Networks. Hang Liu

MIMO-aware Cooperative Cognitive Radio Networks. Hang Liu MIMO-aware Cooperative Cognitive Radio Networks Hang Liu Outline Motivation and Industrial Relevance Project Objectives Approach and Previous Results Future Work Outcome and Impact [2] Motivation & Relevance

More information

Unit 3 - Wireless Propagation and Cellular Concepts

Unit 3 - Wireless Propagation and Cellular Concepts X Courses» Introduction to Wireless and Cellular Communications Unit 3 - Wireless Propagation and Cellular Concepts Course outline How to access the portal Assignment 2. Overview of Cellular Evolution

More information

Living with Interference in Unmanaged Wireless. Environments. Intel Research & University of Washington

Living with Interference in Unmanaged Wireless. Environments. Intel Research & University of Washington Living with Interference in Unmanaged Wireless Environments David Wetherall, Daniel Halperin and Tom Anderson Intel Research & University of Washington This talk 1. The problem: inefficient spectrum scheduling

More information

Beamforming and Binary Power Based Resource Allocation Strategies for Cognitive Radio Networks

Beamforming and Binary Power Based Resource Allocation Strategies for Cognitive Radio Networks 1 Beamforming and Binary Power Based Resource Allocation Strategies for Cognitive Radio Networks UWB Walter project Workshop, ETSI October 6th 2009, Sophia Antipolis A. Hayar EURÉCOM Institute, Mobile

More information

RFID Systems, an Introduction Sistemi Wireless, a.a. 2013/2014

RFID Systems, an Introduction Sistemi Wireless, a.a. 2013/2014 RFID Systems, an Introduction Sistemi Wireless, a.a. 2013/2014 Un. of Rome La Sapienza Chiara Petrioli, Gaia Maselli Department of Computer Science University of Rome Sapienza Italy RFID Technology Ø RFID

More information

MOBILE COMPUTING 2/25/17. What is RFID? RFID. CSE 40814/60814 Spring Radio Frequency IDentification

MOBILE COMPUTING 2/25/17. What is RFID? RFID. CSE 40814/60814 Spring Radio Frequency IDentification MOBILE COMPUTING CSE 40814/60814 Spring 2017 What is RFID? Radio Frequency IDentification Who Are You? I am Product X RFID ADC (automated data collection) technology that uses radio-frequency waves to

More information

Project: IEEE P Working Group for Wireless Personal Area Networks N. WPANs) (WPANs( January doc.: IEEE 802.

Project: IEEE P Working Group for Wireless Personal Area Networks N. WPANs) (WPANs( January doc.: IEEE 802. Slide Project: IEEE P82.5 Working Group for Wireless Personal Area Networks N (WPANs( WPANs) Title: [Impulsive Direct-Sequence UWB Wireless Networks with Node Cooperation Relaying ] Date Submitted: [January,

More information

WiMAX Basestation: Software Reuse Using a Resource Pool. Arnon Friedmann SW Product Manager

WiMAX Basestation: Software Reuse Using a Resource Pool. Arnon Friedmann SW Product Manager WiMAX Basestation: Software Reuse Using a Resource Pool Cory Modlin Wireless Systems Architect cmodlin@ti.com L. N. Reddy Wireless Software Manager lnreddy@tataelxsi.co.in Arnon Friedmann SW Product Manager

More information

Application Note: IQ Filtering in an RFID Reader Using Anadigm Integrated circuits,

Application Note: IQ Filtering in an RFID Reader Using Anadigm Integrated circuits, Application Note: IQ Filtering in an RFID Reader Using Anadigm Integrated circuits, Rev: 1.0.3 Date: 3 rd April 2006 We call this multi-chip circuit solution RangeMaster3, It uses Anadigm s. RangeMaster2

More information

Antenna efficiency calculations for electrically small, RFID antennas

Antenna efficiency calculations for electrically small, RFID antennas Antenna efficiency calculations for electrically small, RFID antennas Author Mohammadzadeh Galehdar, Amir, Thiel, David, O'Keefe, Steven Published 2007 Journal Title IEEE Antenna and Wireless Propagation

More information

Detection Performance of Spread Spectrum Signatures for Passive, Chipless RFID

Detection Performance of Spread Spectrum Signatures for Passive, Chipless RFID Detection Performance of Spread Spectrum Signatures for Passive, Chipless RFID Ryan Measel, Christopher S. Lester, Yifei Xu, Richard Primerano, and Moshe Kam Department of Electrical and Computer Engineering

More information

Becker Mining Systems

Becker Mining Systems Becker Mining Systems Tagging and Tracking in Underground Mining BECKERTAG System Principle FUNCTIONAL FEATURES Vehicle, Beacon, Personnel Tags Pseudo Random Transmission Unique ID Number Battery Status

More information

Fiber Distributed Data Interface

Fiber Distributed Data Interface Fiber istributed ata Interface FI: is a 100 Mbps fiber optic timed token ring LAN Standard, over distance up to 200 km with up to 1000 stations connected, and is useful as backbone Token bus ridge FI uses

More information

Lecture LTE (4G) -Technologies used in 4G and 5G. Spread Spectrum Communications

Lecture LTE (4G) -Technologies used in 4G and 5G. Spread Spectrum Communications COMM 907: Spread Spectrum Communications Lecture 10 - LTE (4G) -Technologies used in 4G and 5G The Need for LTE Long Term Evolution (LTE) With the growth of mobile data and mobile users, it becomes essential

More information

MIMO Systems and Applications

MIMO Systems and Applications MIMO Systems and Applications Mário Marques da Silva marques.silva@ieee.org 1 Outline Introduction System Characterization for MIMO types Space-Time Block Coding (open loop) Selective Transmit Diversity

More information

LTE-A Carrier Aggregation Enhancements in Release 11

LTE-A Carrier Aggregation Enhancements in Release 11 LTE-A Carrier Aggregation Enhancements in Release 11 Eiko Seidel, Chief Technical Officer NOMOR Research GmbH, Munich, Germany August, 2012 Summary LTE-Advanced standardisation in Release 10 was completed

More information

EFFICIENT BIT ENCODING IN BACKSCATTER WIRELESS SYSTEMS

EFFICIENT BIT ENCODING IN BACKSCATTER WIRELESS SYSTEMS EFFICIENT BIT ENCODING IN BACKSCATTER WIRELESS SYSTEMS A Thesis Presented to the Academic Faculty By Patrick A. Graf In Partial Fulfillment Of the Requirements for the Degree Master of Science in Electrical

More information

A Remote-Powered RFID Tag with 10Mb/s UWB Uplink and -18.5dBm-Sensitivity UHF Downlink in 0.18μm CMOS

A Remote-Powered RFID Tag with 10Mb/s UWB Uplink and -18.5dBm-Sensitivity UHF Downlink in 0.18μm CMOS A Remote-Powered RFID Tag with 10Mb/s UWB Uplink and -18.5dBm-Sensitivity UHF Downlink in 0.18μm CMOS Majid Baghaei-Nejad 1, David S. Mendoza 1, Zhuo Zou 1, Soheil Radiom 2, Georges Gielen 2, Li-Rong Zheng

More information

Designing Energy Efficient 5G Networks: When Massive Meets Small

Designing Energy Efficient 5G Networks: When Massive Meets Small Designing Energy Efficient 5G Networks: When Massive Meets Small Associate Professor Emil Björnson Department of Electrical Engineering (ISY) Linköping University Sweden Dr. Emil Björnson Associate professor

More information

CROSS-LAYER DESIGN FOR QoS WIRELESS COMMUNICATIONS

CROSS-LAYER DESIGN FOR QoS WIRELESS COMMUNICATIONS CROSS-LAYER DESIGN FOR QoS WIRELESS COMMUNICATIONS Jie Chen, Tiejun Lv and Haitao Zheng Prepared by Cenker Demir The purpose of the authors To propose a Joint cross-layer design between MAC layer and Physical

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #5 Jamming (cont'd); Physical Layer Security 2016 Patrick Tague 1 Class #5 Anti-jamming Physical layer security Secrecy using physical layer properties

More information

RFID-ECE4803 Lecture 2. Prof. Manos M. Tentzeris

RFID-ECE4803 Lecture 2. Prof. Manos M. Tentzeris RFID-ECE4803 Lecture 2 Prof. Manos M. Tentzeris (etentze@ece.gatech.edu) Data Rate bit/sec 1G 100M 10M 1M Communication by Applications 802.15.3c mm-wave 802.15.3 UWB WPAN 802.15.1 Bluetooth 802.15.4 ZigBee

More information

Ultra Wideband Radio Propagation Measurement, Characterization and Modeling

Ultra Wideband Radio Propagation Measurement, Characterization and Modeling Ultra Wideband Radio Propagation Measurement, Characterization and Modeling Rachid Saadane rachid.saadane@gmail.com GSCM LRIT April 14, 2007 achid Saadane rachid.saadane@gmail.com ( GSCM Ultra Wideband

More information

Hybrid RFID-Based System Using Active Two- Way Tags

Hybrid RFID-Based System Using Active Two- Way Tags San Jose State University SJSU ScholarWorks Master's Theses Master's Theses and Graduate Research Fall 2010 Hybrid RFID-Based System Using Active Two- Way Tags Girish N. Jadhav San Jose State University

More information

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background

More information

H. Kimouche * and H. Zemmour Microwaves and Radar Laboratory, Ecole Militaire Polytechnique, Bordj El Bahri, Algeria

H. Kimouche * and H. Zemmour Microwaves and Radar Laboratory, Ecole Militaire Polytechnique, Bordj El Bahri, Algeria Progress In Electromagnetics Research Letters, Vol. 26, 105 114, 2011 A COMPACT FRACTAL DIPOLE ANTENNA FOR 915 MHz AND 2.4 GHz RFID TAG APPLICATIONS H. Kimouche * and H. Zemmour Microwaves and Radar Laboratory,

More information

On Practical Selective Jamming of Bluetooth Low Energy Advertising

On Practical Selective Jamming of Bluetooth Low Energy Advertising On Practical Selective Jamming of Bluetooth Low Energy Advertising S. Brauer, A. Zubow, S. Zehl, M. Roshandel, S. M. Sohi Technical University Berlin & Deutsche Telekom Labs Germany Outline Motivation,

More information

NFC OpenSense & NFC SpeedTap 128- & 256-bit NFC Tags

NFC OpenSense & NFC SpeedTap 128- & 256-bit NFC Tags NFC OpenSense & NFC SpeedTap 128- & 256-bit NFC Tags previously known as Kovio NFC Barcode Functional Specification Product Features Passive 13.56MHz 128- or 256-bit Read-Only Memory (ROM) 106 Kb/s Data

More information

System Performance of Cooperative Massive MIMO Downlink 5G Cellular Systems

System Performance of Cooperative Massive MIMO Downlink 5G Cellular Systems IEEE WAMICON 2016 April 11-13, 2016 Clearwater Beach, FL System Performance of Massive MIMO Downlink 5G Cellular Systems Chao He and Richard D. Gitlin Department of Electrical Engineering University of

More information

RFID Multi-hop Relay Algorithms with Active Relay Tags in Tag-Talks-First Mode

RFID Multi-hop Relay Algorithms with Active Relay Tags in Tag-Talks-First Mode International Journal of Networking and Computing www.ijnc.org ISSN 2185-2839 (print) ISSN 2185-2847 (online) Volume 4, Number 2, pages 355 368, July 2014 RFID Multi-hop Relay Algorithms with Active Relay

More information

Final Report for AOARD Grant FA Indoor Localization and Positioning through Signal of Opportunities. Date: 14 th June 2013

Final Report for AOARD Grant FA Indoor Localization and Positioning through Signal of Opportunities. Date: 14 th June 2013 Final Report for AOARD Grant FA2386-11-1-4117 Indoor Localization and Positioning through Signal of Opportunities Date: 14 th June 2013 Name of Principal Investigators (PI and Co-PIs): Dr Law Choi Look

More information

Final Project Introduction to RFID (Radio Frequency IDentification) Andreas G. Andreou

Final Project Introduction to RFID (Radio Frequency IDentification) Andreas G. Andreou Final Project Introduction to RFID (Radio Frequency IDentification) Andreas G. Andreou Radio Frequency IDentification Frequency Distance LF 125khz Few cm HF 13.56Mhz 1m Example Application Auto- Immobilizer

More information

Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents

Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents Walid Saad, Zhu Han, Tamer Basar, Me rouane Debbah, and Are Hjørungnes. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10,

More information

RFID. Contents and form. Petr Bureš, Faculty of transportation sciences Czech technical university in Prague

RFID. Contents and form. Petr Bureš, Faculty of transportation sciences Czech technical university in Prague RFID Contents and form Petr Bureš, bures@fd.cvut.cz Faculty of transportation sciences Czech technical university in Prague RFID considerations Critical performance variables in an RFID system are the

More information

Opportunistic Communication in Wireless Networks

Opportunistic Communication in Wireless Networks Opportunistic Communication in Wireless Networks David Tse Department of EECS, U.C. Berkeley October 10, 2001 Networking, Communications and DSP Seminar Communication over Wireless Channels Fundamental

More information

Resource Allocation Challenges in Future Wireless Networks

Resource Allocation Challenges in Future Wireless Networks Resource Allocation Challenges in Future Wireless Networks Mohamad Assaad Dept of Telecommunications, Supelec - France Mar. 2014 Outline 1 General Introduction 2 Fully Decentralized Allocation 3 Future

More information

Design Criteria for the RF Section of UHF and Microwave Passive RFID Transponders

Design Criteria for the RF Section of UHF and Microwave Passive RFID Transponders Università di Pisa Design Criteria for the RF Section of UHF and Microwave Passive RFID Transponders #$%&'((')*')+$,-) $';)1('E%,(.#8'#+,F%F,%1')#8%GGH+,I.1E)J'.,%K#/G%((1.,'-)*#+,I.1E)('-)*#0%G%-.E:,'-)J'.,'*#

More information

Passive Sensors Technical Guide

Passive Sensors Technical Guide Application Note Version 1.0 10/17/2016 This document is a technical user guide to the working principles and usage of Smartrac passive sensor products using RF Micron Magnus S2 and S3 ICs. 1. INTRODUCTION...

More information

2015 The MathWorks, Inc. 1

2015 The MathWorks, Inc. 1 2015 The MathWorks, Inc. 1 What s Behind 5G Wireless Communications? 서기환과장 2015 The MathWorks, Inc. 2 Agenda 5G goals and requirements Modeling and simulating key 5G technologies Release 15: Enhanced Mobile

More information

Electromagnetic Modelling of UHF RFID Tags*

Electromagnetic Modelling of UHF RFID Tags* SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 8, No. 1, February 2011, 1-7 UDK: 621.396.029:537.531 Electromagnetic Modelling of UHF RFID Tags* Nemanja Milošević 1, Branko Kolundžija 1 Abstract: Paper

More information

A Wireless Communication System using Multicasting with an Acknowledgement Mark

A Wireless Communication System using Multicasting with an Acknowledgement Mark IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 07, Issue 10 (October. 2017), V2 PP 01-06 www.iosrjen.org A Wireless Communication System using Multicasting with an

More information

Joint Rate and Power Control Using Game Theory

Joint Rate and Power Control Using Game Theory This full text paper was peer reviewed at the direction of IEEE Communications Society subect matter experts for publication in the IEEE CCNC 2006 proceedings Joint Rate and Power Control Using Game Theory

More information

Exam 3 is two weeks from today. Today s is the final lecture that will be included on the exam.

Exam 3 is two weeks from today. Today s is the final lecture that will be included on the exam. ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2010 Lecture 19 Today: (1) Diversity Exam 3 is two weeks from today. Today s is the final lecture that will be included on the exam.

More information

Full-duplex Wireless: From Experiments to Theory

Full-duplex Wireless: From Experiments to Theory Full-duplex Wireless: From Experiments to Theory Achaleshwar Sahai, Melissa Duarte #, Evan Everett, Jingwen Bai, Gaurav Patel, Chris Dick* and Ashu Sabharwal Department of ECE Rice University # Now at

More information

Chapter 1: Telecommunication Fundamentals

Chapter 1: Telecommunication Fundamentals Chapter 1: Telecommunication Fundamentals Block Diagram of a communication system Noise n(t) m(t) Information (base-band signal) Signal Processing Carrier Circuits s(t) Transmission Medium r(t) Signal

More information

Eavesdropping Near Field Contactless Payments: A Quantitative Analysis

Eavesdropping Near Field Contactless Payments: A Quantitative Analysis Eavesdropping Near Field Contactless Payments: A Quantitative Analysis Thomas P. Diakos 1 Johann A. Bri a 1 Tim W. C. Brown 2 Stephan Wesemeyer 1 1 Department of Computing,, Guildford 2 Centre for Communication

More information

SPREAD SPECTRUM COMMUNICATIONS. historical and technical overview. Bryan Bergeron, NUlN 27 Stearns Road, Suite 8 Brookline. Massachusetts

SPREAD SPECTRUM COMMUNICATIONS. historical and technical overview. Bryan Bergeron, NUlN 27 Stearns Road, Suite 8 Brookline. Massachusetts Bryan Bergeron, NUlN 27 Stearns Road, Suite 8 Brookline. Massachusetts 02 146 SPREAD SPECTRUM COMMUNICATIONS historical and technical overview A s we all know, the RF spectrum is a finite and exceedingly

More information