• web of science banner
  • web of science banner
  • scopus banner
  • Engineering Information banner
  • Inspec Direct banner
  • Dialog banner
  • EBSCO banner
Subscription button Subscription button
ETRI J award winner banner
Article  <  Archive  <  Home
Streaming RFID: Robust Stream Transmission over Passive RFID
Seok Joong Hwang, Youngsun Han, Seon Wook Kim, and Jong-Ok Kim
vol. 33, no. 3, June. 2011, pp. 382-392.
http://dx.doi.org/10.4218/etrij.11.0110.0458
Keywords : Passive RFID, memory tag, multimedia streaming, wireless communication, protocol.
  • Abstract
    • Abstract.

      This paper proposes the streaming radio frequency identification (RFID) protocol to support robust data streaming in a passive communication, which is extended from the ISO18000-6 Type C RFID standard. By observing and modeling the unique bit error behavior through detailed analysis in this paper, we found that performance is significantly limited by inaccurate and unstable link frequencies as well as low SNR which are inevitable for passive devices. Based on the analysis, we propose a simple and efficient protocol to adaptively insert extra error control sequences in a packet for tolerating tough link condition while maximizing the throughput and preserving the minimal implementation cost. To evaluate effectiveness of our proposal in real-time streaming applications, we experimented on real-time H.264 video streaming and prototyped the system on FPGA. To our best knowledge, our paper is the first work to take analytical approach for maximizing the throughput and demonstrate the possibility of the real-time multimedia streaming transmission in the passive RFID system.
  • Authors
    • Authors

      Seok Joong Hwang
      Korea University
      nzthing@korea.ac.kr
      Youngsun Han
      Samsung Electronics
      ysun.han@samsung.com
      Seon Wook Kim
      Korea University
      seon@korea.ac.kr
      Jong-Ok Kim
      Korea University
      jokim@korea.ac.kr
  • References
    • References

      [1] ISO, "Information Technology–Radio Frequency Identification for Item Management–Part 6C: Parameters for Air Interface Communications at 860 MHz to 960 MHz," ISO/IEC 18000-6C Standard Document, International Organization for Standardization.
      [2] R. Want, "Enabling Ubiquitous Sensing with RFID," Computer, vol. 37, no. 4, Apr. 2004, pp. 84-86.
      [3] J.G. Lee et al., "Applying Passive RFID System to Wireless Headphones for Extreme Low Power Consumption," Proc. 45th Annual Design Autom.Conf., 2008, pp. 486-491.
      [4] J. McDonnell et al., "Memory Spot: A Labeling Technology," IEEE Pervasive Computing, vol. 9, no. 2, Apr.-June 2010, pp. 11-17.
      [5] ISO, "Information Technology–Telecommunications and Information Exchange between Systems–Near Field Communication Interface and Protocol," ISO/IEC 21481, International Organization for Standardization.
      [6] C. Wang et al., "Performance Analysis of RFID Generation-2 Protocol," IEEE Trans. Wireless Commun., vol. 8, no. 5, May 2009, pp. 2592-2601.
      [7] R.K. Ganti et al., "Datalink Streaming in Wireless Sensor Networks," Proc. Int. Conf. Embedded Networked Sensor Syst., 2006, pp. 209-222.
      [8] M. Chiani, A. Conti, and C. Fontana, "Improved Performance in TD-CDMA Mobile Radio System by Optimizing Energy Partition in Channel Estimation," IEEE Trans. Commun., vol. 51, no. 3, Mar. 2003, pp. 352-355.
      [9] S.D. Roemerman, "Radio Frequency Identification Interrogation Systems and Methods of Operating the Same," US Patent Pub., No. 20 07/0 035 383A1, 2007.
      [10] Y. Liu et al., "Digital Correlation Demodulator Design for RFID Reader Receiver," Proc. IEEE Wireless Commun. Networking Conf., Mar., 2007, pp. 1664-1668.
      [11] S.J. Hwang et al., "A Low-Power Baseband Modem Architecture for a Mobile RFID Reader," J. Embedded Computing, vol. 3, no. 2, May 2009, pp. 131-140.
      [12] F. Cilek et al., "Impact of the Local Oscillator on Baseband Processing in RFID Transponder," Proc. Int. Symp. Signals, Syst., Electron., 2007, pp. 231-234.
      [13] "JVT H.264/AVC Reference Software," Fraunhofer Heinrich Hertz Institute.
      [14] X. Fan et al., "Gen2-Based Tag Anti-collision Algorithms Using Chebyshev’s Inequality and Adjustable Frame Size," ETRI J., vol. 30, no. 5, Oct. 2008, pp. 653-662.
      [15] S.Y. Oh et al., "A Scheme to Increase Throughput in Framed-ALOHA-Based RFID Systems with Capture," ETRI J., vol. 30, no. 3, June 2008, pp. 486-488.
      [16] A. Mohsenian-Rad et al., "Distributed Channel Selection and Randomized Interrogation Algorithms for Large-Scale and Dense RFID Systems," IEEE Trans. Wireless Commun., vol. 9, no. 4, Apr. 2010, pp. 1402-1413.
      [17] P. Kitsos and Y. Zhang, RFID Security: Techniques, Protocols and System-on-Chip Design, New York: Springer, 2008.
  • Cited by
  • Metrics
    • Metrics

      Article Usage

      2736
      Downloaded
      2093
      Viewed

      Citations

      0
      3