
Digital Signal Processing for RFID
Beschreibung
Weitere Details
Weitere Ausgaben
Personen
Feng Zheng received his Ph.D. degree from Beijing University of Aeronautics and Astronautics in 1993. He held an Alexander-von-Humboldt Research Fellowship at University of Duisburg and was an Associate Professor in Chinese Academy of Sciences.
Dr Thomas Kaiser, University of Duisburg-Essen, Germany
Thomas Kaiser received the Ph.D. degree in 1995 with distinction and the German habilitation degree in 2000, both from Gerhard-Mercator-University, Duisburg, and in electrical engineering.
Inhalt
Preface xi
Acknowledgements xiii
Abbreviations xv
1 Introduction 1
1.1 What is RFID? 1
1.2 A Brief History of RFID 2
1.3 Motivation and Scope of this Book 2
1.4 Notations 5
References 5
2 Fundamentals of RFID Systems 6
2.1 Operating Principles 6
2.2 Passive, Semi-Passive/Semi-Active and Active RFID 8
2.3 Analogue Circuits for RFID 10
2.4 Circuit Analysis for Signal Transfer in RFID 11
2.4.1 Equivalent Circuit of Antennas in Generic Communication Links 12
2.4.2 Load Modulation 13
2.4.3 Backscattering Modulation 15
2.5 Signal Analysis of RFID Systems 17
2.5.1 Qualitative Analysis 17
2.5.2 Quantitative Analysis 19
2.6 Statistical Channel Models 21
2.6.1 Backgrounds of Rayleigh, Ricean and Nakagami Fading 21
2.6.2 Statistical Channel Models of RFID Systems 26
2.6.3 Large Scale Path Loss 27
2.7 A Review of RFID Protocol 28
2.7.1 Physical Layer 29
2.7.2 MAC Layer 32
2.8 Challenges in RFID 36
2.9 Summary 36
Appendix 2.A Modified Bessel Function of the First Kind 37
References 38
3 Basic Signal Processing for RFID 40
3.1 Bandpass Filters and their Applications to RFID 40
3.1.1 Lowpass Filter Performance Specification 40
3.1.2 Lowpass Filter Design 42
3.1.3 Bandpass Filter Design 47
3.1.4 Bandpass Filters for RFID Systems 49
3.2 Matching Filters and their Applications to RFID 54
3.3 A Review of Optimal Estimation 58
3.3.1 Linear Least Square Estimation 58
3.3.2 Linear Minimum Mean Square Error Estimation 59
3.3.3 Maximum Likelihood Estimation 61
3.3.4 Comparison of the Three Estimation Algorithms 62
3.4 Summary 64
Appendix 3.A Derivation of Poles of the Chebyshev Filter 67
References 68
4 RFID-Oriented Modulation Schemes 69
4.1 A Brief Review of Analogue Modulation 69
4.2 Amplitude- and Phase-Shift Keying and Performance Analysis 72
4.2.1 M-ary Quadrature Amplitude Modulation 72
4.2.2 Symbol Error Rate Analysis of M-QAM 74
4.2.3 Numerical Results for M-QAM 80
4.3 Phase-Shift Keying and Performance Analysis 81
4.4 Frequency-Shift Keying and Performance Analysis 85
4.5 Summary 90
Appendix 4.A Derivation of SER Formula (4.24) 91
Appendix 4.B Derivation of SER Formula (4.40) 93
References 94
5 MIMO for RFID 95
5.1 Introduction 95
5.2 MIMO Principle 97
5.3 Channel Modelling of RFID-MIMO Wireless Systems 100
5.4 Design of Reader Transmit Signals 102
5.4.1 Signal Design 102
5.4.2 Simulation Results 103
5.5 Space-Time Coding for RFID-MIMO Systems 105
5.5.1 A Review of Real Orthogonal Design 105
5.5.2 Space-Time Coding for RFID-MIMO Systems 110
5.5.3 Two Space-Time Decoding Approaches for RFID-MIMO Systems 111
5.5.4 Simulation Results 113
5.6 Differential Space-Time Coding for RFID-MIMO Systems 122
5.6.1 A Review of Unitary DSTC 122
5.6.2 Application of Unitary DTSC to RFID 125
5.6.3 Simulation Results 126
5.7 Summary 127
Appendix 5.A Alamouti Space-Time Coding for Narrowband Systems 129
Appendix 5.B Definition of Group 133
Appendix 5.C Complex Matrix/Vector Gaussian Distribution 133
Appendix 5.D Maximum Likelihood Receiver for Unitary STC 134
References 136
6 Blind Signal Processing for RFID 138
6.1 Introduction 138
6.2 Channel Model of Multiple-Tag RFID-MIMO Systems 141
6.2.1 Channel Model of Single-Tag RFID-MIMO Systems 141
6.2.2 Channel Model of Multiple-Tag RFID-MIMO Systems 141
6.3 An Analytical Constant Modulus Algorithm 143
6.4 Application of ACMA to Multiple-Tag RFID Systems 150
6.5 Summary 160
References 164
7 Anti-Collision of Multiple-Tag RFID Systems 166
7.1 Introduction 166
7.2 Tree-Splitting Algorithms 168
7.2.1 Mean Identification Delay 171
7.2.2 Collision Analysis and Transmission Efficiency: Approach I 173
7.2.3 Collision Analysis and Transmission Efficiency: Approach II 175
7.2.4 Numerical Results 185
7.2.5 Variants of TS Algorithms 194
7.3 Aloha-Based Algorithm 194
7.3.1 Mean Identification Delay 195
7.3.2 Collision Analysis and Transmission Efficiency 197
7.3.3 Numerical Results 198
7.3.4 Adaptive Frame Size Aloha Algorithms 200
7.4 Summary 212
Appendix 7.A Inclusion-Exclusion Principle 213
Appendix 7.B Probability of Successful Transmissions in Some Particular Time Slots in Aloha 214
Appendix 7.C Probability of an Exact Number of Successful Transmissions in Aloha 215
References 217
8 Localization with RFID 220
8.1 Introduction 220
8.2 RFID Localization 223
8.2.1 Geometric Class 224
8.2.2 Proximity Class 228
8.3 RFID Ranging - Frequency-Domain PDoA Approach 232
8.4 RFID AoA Finding - Spatial-Domain PDoA 235
8.5 NLoS Issue 241
8.6 Summary 244
References 245
9 Some Future Perspectives for RFID 249
Chapter 1
Introduction
1.1 What is RFID?
Identification is pervasive nowadays in daily life due to many complicated activities such as bank and library card reading, asset tracking, toll collecting, restricted accessing to sensitive data and procedures and target identification. This kind of task can be realized by passwords biometric data such as fingerprints, barcode, optical character recognition, smart card and radar. Radio frequency identification (RFID) is a technique to achieve object identification by using radio systems. It is a contactless, usually short distance, wireless data transmission and reception technique for identification of objects. An RFID system consists of two components:
- tag (also called transponder) - is a microchip that carries the identity (ID) information of the object to be identified and is located on/in the object;
- reader (also called interrogator) - is a radio frequency module containing a transmitter, receiver, magnetic coupling element (to the transponder) and control unit.
A passive RFID system works in the following way: the reader transmits radio waves to power up the tag; once the power of the tag reaches a threshold, the circuits in the tag start to work and the radio waves from the reader are modulated by the ID data inside the tag and backscattered to the reader and finally, the backscattered signals are demodulated at the reader and ID information of the tag is obtained.
RFID technology is quite similar to the well-known radar and optical barcode technologies, but an RFID system is different from radar in that backscattered signals from the tag are actively modulated in the tag (even for a passive tag or chipless tag), while backscattered signals in a radar system are often passively modulated by the scatterers of the object to be detected. An RFID system is different from an optical barcode system in that the information carrying tools are different: the RFID system uses radio waves as the tool, while the barcode system uses light or laser as the tool.
Many applications of RFID or barcode techniques are somewhat exchangeable, i.e., many ID identification tasks can be implemented by either RFID technique or barcode technique. However, optical barcode technology has the following critical drawbacks: (i) the barcode cannot be read across non-line-of-sight (NLoS) objects, (ii) each barcode needs care taken in order to be read and (iii) the information-carrying ability of the barcode is quite limited. RFID technology, using radio waves instead of optical waves to carry signals, naturally overcomes these drawbacks. It is believed that RFID can substitute, in the not-too-distant future, the widely used barcode technology, when the cost issue for RFID is resolved.
1.2 A Brief History of RFID
Many people date the origin of RFID back to the 1940s when radar systems became practical. In World War II, German airplanes used a specific manoeuvering pattern to establish a secret handshake between the pilot of the airplane and the radar operator in the base. Indeed, this principle is the same as that of modern RFID: to modulate the backscattering signal to inform the identity of an object. The true RFID, in the concept of modern RFID, appeared in the 1970s when Mario Cardullo patented the first transponder system and Charles Walton patented a number of inductively coupled identification schemes based on resonant frequencies. The first functional passive RFID systems with a reading range of several metres appeared in early 1970s [4]. Even though RFID has significantly advanced and experienced tremendous growth since then [1, 2], the road from concept to commercial reality has been long and difficult due to the cost of tags and readers. A major push that brought RFID technology into the mass market came from the retailer giant Wal-Mart, which announced in 2003 that it would require its top 100 suppliers to supply RFID-enabled shipments by the beginning of 20051. This event triggered the inevitable movement of inventory tracking and supply chain management towards the use of RFID. Up to now, RFID applications have been numerous and far reaching. The most interesting and widely used applications include those for supply chain management, security and tracking of important objects and personnel [3, 5, 6].
Similar to other kinds of radio systems, the development of RFID has also been stimulated by necessity. Even though the progress in the design and manufacturing of antennas and microchips has smoothly driven performance improvement and cost decrease of RFID, booming development for it has not appeared until recently, since optical barcode technology has dominated the market for the last few decades. In recent years, many new technologies, such as smart antennas, ultra wideband radios, advanced signal processing, state-of-art anti-collision algorithms and soon, have been applied to RFID. In the meantime, some new requirements to object identification and new application scenarios of RFID have been emerging, such as simultaneous multiple object identification, NLoS object identification and increasing demand on data-carrying capacity of tag ID. It is this kind of application that calls for the deployment of RFID systems.
1.3 Motivation and Scope of this Book
Generally, signal processing is the core of a radio system. This claim also holds true for RFID. Several books are available now coping with other topics in RFID, such as basics, fundamentals, smart antennas, security and privacy, but no book has appeared to address signal processing issues in RFID. We aim to complete this task in this book.
The main purpose of this book is two-fold: first, it will be a textbook for both undergraduate and graduate students in electrical engineering; second, it can be used as a reference book for practice engineers and academic researchers in the RFID field. Therefore, the contents of this book include both fundamentals of RFID and the state-of-the-art research results in signal processing for RFID. For the former, we will discuss the operating principles, modulation schemes and channel models of RFID. For the latter, we will highlight the following research fields: space-time coding for RFID, blind signal processing for RFID, anti-collision of multiple RFID tags and localization with RFID. Also, due to the two-fold purpose of the book, some attention will be paid to pedagogical methods. For example, some concrete examples on the analysis of transmission efficiency of tree-splitting algorithms will be illustrated in detail before presenting general results in Chapter 7.
The book consists of the following chapters, after this one.
Chapter 2 - Fundamentals of RFID Systems. In this chapter, we will discuss the following issues: (i) operating principles of RFID, (ii) classification of RFID, (iii) analogue circuits for RFID and their basic analysis, (iv) channel models of RFID, (v) a brief review of RFID protocols and (vi) challenges in RFID. This chapter provides a basis for Chapters 3 to 9.
Chapter 3 - Basic Signal Processing for RFID. In this chapter, we will discuss some basic signal processing techniques and their applications in RFID, which include analogue/digital filtering and optimal estimation.
Chapter 4 - RFID-oriented Modulation Schemes. Since a passive RFID tag does not have an 'active' transmitter, some complicated signal modulation schemes in general communication systems cannot be applied to RFID. Instead, only very simple modulation schemes, namely, binary amplitude-shift keying and frequency/phase-shift keying, are suitable for an RFID tag. In this chapter, these modulation schemes, tailored to RFID channels, will be described. The performance of these modulation schemes for RFID channels will be investigated.
Chapter 5 - MIMO for RFID. In this chapter, we will discuss the following issues: (i) channel models of RFID systems with multiple antennas at both readers and tags (MIMO); (ii) signal design at the reader for RFID-MIMO systems (iii) space-time coding at the tag for RFID-MIMO systems and (iv) differential space-time coding at the tag for RFID-MIMO systems. Using multiple antennas in radio systems (especially in communication systems) is a general trend. Actually, employing multiple antennas has been incorporated into many existing communication standards. It is also believed that RFID systems equipped with multiple antennas will be deployed in the near future. Therefore, this chapter will be dedicated to the combination of RFID with MIMO. We will show that, by proper design, the bit-error-rate performance of the system can be greatly improved by using multiple antennas at the reader and tag.
Chapter 6 - Blind Signal Processing for RFID. In practice, one often meets the situation where several or many transponders are present in the reading zone of a single reader at the same time. Therefore, it is important to study the techniques to identify multiple tags simultaneously. In principle, two approaches can be used to do this job. The first one is to use collision avoidance techniques such as Aloha from a networking viewpoint. The second one is to use source separation techniques from a signal processing viewpoint. In this chapter, the second approach will be investigated, while Chapter 7 will be devoted to the first approach. It will be shown that, under a moderate SNR and when the number of measurements to the multiple tags in one snapshot is sufficiently high, the overlapped signals coming from the multiple tags can be separated at the reader receiver if the number of the tags is less than...
Systemvoraussetzungen
Dateiformat: ePUB
Kopierschutz: Adobe-DRM (Digital Rights Management)
Systemvoraussetzungen:
- Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).
- Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions oder die App PocketBook (siehe E-Book Hilfe).
- E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)
Das Dateiformat ePUB ist sehr gut für Romane und Sachbücher geeignet – also für „fließenden” Text ohne komplexes Layout. Bei E-Readern oder Smartphones passt sich der Zeilen- und Seitenumbruch automatisch den kleinen Displays an.
Mit Adobe-DRM wird hier ein „harter” Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.
Bitte beachten Sie: Wir empfehlen Ihnen unbedingt nach Installation der Lese-Software diese mit Ihrer persönlichen Adobe-ID zu autorisieren!
Weitere Informationen finden Sie in unserer E-Book Hilfe.