A multi-hop routing protocol in tag-to-tag networks of passive tags

2023-1-27
Murat, Furkan
With the evolution of technology, tag-to-tag communication between passive RFID tags using backscattering, which is accepted as a milestone in RFID technology, has emerged in recent years. Different from the conventional passive RFID systems, tags could communicate with each other with the existence of RF signals in the environment. With this development, passive RFID tags evolved into passive tags because the usage areas could not be limited to the identification or tracking of attached objects. On the other hand, the communication ranges of the passive tags were limited as a consequence of having no internal power sources, such as batteries. Therefore, multi-hop communication was required to connect two passive tags that were not in their communication ranges. In this study, we proposed a novel multi-hop routing protocol with our system design for tag-to-tag networks of passive tags. We created a sectoral circular area design and placed the central controller, which was the RF signal source of the network, at the center of the circular area. Afterward, we divided the circular area into sectors by considering the communication ranges of the central controller and passive tags. To validate and test our solution, we created a simulation environment where passive tags were distributed uniform randomly in the circular area. With the assistance of the central controller, sectors determined by the designed routing algorithms were excited, and multi-hop tag-to-tag communication was achieved. By taking into account the energy requirements of the backscatter communication, our proposed routing protocol has provided an energy-efficient tag-to-tag communication among the passive tags in a multi-hop fashion.

Suggestions

A novel user activity prediction model for context aware computing systems
Peker, Serhat; Koçyiğit, Altan; Department of Information Systems (2011)
In the last decade, with the extensive use of mobile electronic and wireless communication devices, there is a growing need for context aware applications and many pervasive computing applications have become integral parts of our daily lives. Context aware recommender systems are one of the popular ones in this area. Such systems surround the users and integrate with the environment; hence, they are aware of the users' context and use that information to deliver personalized recommendations about everyday ...
An Effective Forest Fire Detection Framework Using Heterogeneous Wireless Multimedia Sensor Networks
Kizilkaya, Burak; Ever, Enver; Yatbaz, Hakan Yekta; Yazıcı, Adnan (2022-05-01)
With improvements in the area of Internet of Things (IoT), surveillance systems have recently become more accessible. At the same time, optimizing the energy requirements of smart sensors, especially for data transmission, has always been very important and the energy efficiency of IoT systems has been the subject of numerous studies. For environmental monitoring scenarios, it is possible to extract more accurate information using smart multimedia sensors. However, multimedia data transmission is an expensi...
Data Delivery in Wireless Multimedia Sensor Networks: Challenging and Defying in the IoT Era
Al-Turjman, Fadi; Radwan, Ayman (2017-10-01)
The vision of wireless multimedia sensor networks (WMSNs) nowadays is to afford real-time multimedia applications using the pervasive wireless sensors around us. This necessitates strict QoS conditions, which have led to new emerging challenges in terms of data delivery in the Internet of Things era. Accordingly, multipath routing protocols with multi-constraints are recommended in WMSNs. In this article, a comprehensive overview of both best effort and real-time multipath routing protocols for WMSNs is per...
RONFC: A Novel Enabler-Independent NFC Protocol for Mobile Transactions
Turk, Ismail; Angın, Pelin; Cosar, Ahmet (Institute of Electrical and Electronics Engineers (IEEE), 2019-01-01)
The use of near field communication (NFC) technology for contactless mobile transactions has become popular in the past decade with the availability of this technology in mobile devices. Today, there are millions of the NFC-enabled mobile handsets in the market, with mobile handset manufacturers and mobile network operators enabling m-wallet solutions using the secure elements (SEs) that they own, thus can remotely control, on the devices. While this approach gives full control to the SE owner to activate a...
A Practical NFC Relay Attack on Mobile Devices Using Card Emulation Mode
Cavdar, D.; Tomur, E. (2015-05-29)
In this study, a practical card-emulated relay attack is implemented on Near Field Communication (NFC) equipped mobile devices. NFC is a promising communication technology which is also used in smart mobile devices. As an effective and flexible communication technology, NFC is frequently used in innovative solutions nowadays such as payments, access control etc. Because of the nature of these transactions, security is a critical issue that should be considered in system design and development phases. Althou...
Citation Formats
F. Murat, “A multi-hop routing protocol in tag-to-tag networks of passive tags,” M.S. - Master of Science, Middle East Technical University, 2023.