scholarly journals Forklift Tracking: Industry 4.0 Implementation in Large-Scale Warehouses through UWB Sensor Fusion

2021 ◽  
Vol 11 (22) ◽  
pp. 10607
Author(s):  
Andrea Motroni ◽  
Alice Buffi ◽  
Paolo Nepa

This article addresses the problem of determining the location of pallets carried by forklifts inside a warehouse, which are recognized thanks to an onboard Radio Frequency IDentification (RFID) system at the ultra-high-frequency (UHF) band. By reconstructing the forklift trajectory and orientation, the location of the pallets can be associated with the forklift position at the time of unloading events. The localization task is accomplished by means of an easy-to-deploy combination of onboard sensors, i.e., an inertial measurement unit (IMU) and an optical flow sensor (OFS), with a commercial ultra-wideband (UWB) system through an Unscented Kalman Filter (UKF) algorithm, which estimates the forklift pose over time. The proposed sensor fusion approach contributes to the localization error mitigation by preventing drifts in the trajectory reconstruction. The designed methos was at first evaluated by means of a simulation framework and then through an experimental analysis conducted in a large warehouse with a size of about 4000 m2.

Sensor Review ◽  
2017 ◽  
Vol 37 (3) ◽  
pp. 338-345 ◽  
Author(s):  
Yawei Xu ◽  
Lihong Dong ◽  
Haidou Wang ◽  
Jiannong Jing ◽  
Yongxiang Lu

Purpose Radio frequency identification tags for passive sensing have attracted wide attention in the area of Internet of Things (IoT). Among them, some tags can sense the property change of objects without an integrated sensor, which is a new trend of passive sensing based on tag. The purpose of this paper is to review recent research on passive self-sensing tags (PSSTs). Design/methodology/approach The PSSTs reported in the past decade are classified in terms of sensing mode, composition and the ways of power supply. This paper presents operation principles of PSSTs and analyzes the characteristics of them. Moreover, the paper focuses on summarizing the latest sensing parameters of PSSTs and their matching equipment. Finally, some potential applications and challenges faced by this emerging technique are discussed. Findings PSST is suitable for long-term and large-scale monitoring compared to conventional sensors because it gets rid of the limitation of battery and has relatively low cost. Also, the static information of objects stored in different PSSTs can be identified by a single reader without touch. Originality/value This paper provides a detailed and timely review of the rapidly growing research in PSST.


Sensors ◽  
2018 ◽  
Vol 18 (10) ◽  
pp. 3584 ◽  
Author(s):  
Rania Baashirah ◽  
Abdelshakour Abuzneid

Radio Frequency Identification (RFID) is one of the leading technologies in the Internet of Things (IoT) to create an efficient and reliable system to securely identify objects in many environments such as business, health, and manufacturing areas. Recent RFID authentication protocols have been proposed to satisfy the security features of RFID communication. In this article, we identify and review some of the most recent and enhanced authentication protocols that mainly focus on the authentication between a reader and a tag. However, the scope of this survey includes only passive tags protocols, due to the large scale of the RFID framework. We examined some of the recent RFID protocols in term of security requirements, computation, and attack resistance. We conclude that only five protocols resist all of the major attacks, while only one protocol satisfies all of the security requirements of the RFID system.


2008 ◽  
pp. 1975-1993
Author(s):  
Katina Michael ◽  
Amelia Masters

Spurred by the recent escalation of terrorist attacks and their increasingly devastating outcomes, defense intelligence in the context of homeland security has been drawn into the spotlight. The challenge, at both national and global levels, of managing information in order to offensively resist attack or defensively keep citizens safe from further harm has never been greater. In meeting this challenge, the tools and strategies used by relevant defensive powers are a key factor in the success or failure of all activities, ranging from small-scale, homeland security administration through to large-scale, all-inclusive war. In all areas within this wide scope, the adoption of positioning technologies has played an important role. Of special significance are the global positioning system (GPS), second-generation (2G) and beyond mobile telephone networks (includingwireless data networks), radio-frequency identification (RFID) and geographic information systems (GIS). Since most positioning technology has been developed or released for use within the commercial sector, however, concerns beyond technological feasibility are raised when applications are harnessed solely for defense. The integration between commercial and military sectors and public and private needs must be considered and, primarily, this involves ensuring that the enforcement of homeland security does not compromise citizen rights.


2020 ◽  
Vol 63 (8) ◽  
pp. 1271-1271
Author(s):  
Qianqian Su ◽  
Rui Zhang ◽  
Rui Xue

Abstract Modular exponentiation, as a fundamental operation used in many public-key cryptosystems, has always be considered to be very time-consuming. It is difficult for some devices with limited computation capability, such as mobile devices and low-cost radio frequency identification (RFID) tags, to perform large-scale modular exponentiations. In cryptosystems, one typical case of modular exponentiation is that the modulus is a composite number. For instance, in RSA algorithm, the modulus is the product of two distinct prime numbers. In this paper, we investigate how to securely and efficiently outsource composite modular exponentiations and put forward two secure outsourcing algorithms for composite modular exponentiations based on single untrusted cloud. The first algorithm, named MCExp, is designed for outsourcing single composite modular exponentiation, i.e. $u^a$ mod $N$. The second algorithm, named SMCExp, is designed for outsourcing simultaneous composite modular exponentiation, i.e. $\prod ^{n}_{i=1}u^{a_i}_{i}$ mod $N$. Different from algorithms based on two untrusted servers, the proposed algorithms are very practical because they avoid the strong assumption that there must exist two servers without collusion. The proposed algorithms not only protect the privacy of the exponent and the base simultaneously, but also enable users to verify the correctness of the result returned by the cloud with high probability. Compared with using the square-and-multiply algorithm, the user can achieve higher efficiency by using the proposed algorithms. Besides, we prove the security of our algorithms and conduct several experiments to demonstrate the efficiency of the proposed algorithms. Finally, we show that the proposed algorithms can be used to construct the secure outsourcing algorithms for Shamir’s identity-based signature and identity-based multi-signature.


2017 ◽  
Vol 2017 ◽  
pp. 1-9 ◽  
Author(s):  
Ju-min Zhao ◽  
Ding Feng ◽  
Deng-ao Li ◽  
Wei Gong ◽  
Hao-xiang Liu ◽  
...  

Radio Frequency Identification (RFID) is an emerging technology for electronic labeling of objects for the purpose of automatically identifying, categorizing, locating, and tracking the objects. But in their current form RFID systems are susceptible to cloning attacks that seriously threaten RFID applications but are hard to prevent. Existing protocols aimed at detecting whether there are cloning attacks in single-reader RFID systems. In this paper, we investigate the cloning attacks identification in the multireader scenario and first propose a time-efficient protocol, called the time-efficient Cloning Attacks Identification Protocol (CAIP) to identify all cloned tags in multireaders RFID systems. We evaluate the performance of CAIP through extensive simulations. The results show that CAIP can identify all the cloned tags in large-scale RFID systems fairly fast with required accuracy.


Sensors ◽  
2020 ◽  
Vol 20 (7) ◽  
pp. 1843 ◽  
Author(s):  
Jahangir Alam ◽  
Maher Khaliel ◽  
Abdelfattah Fawky ◽  
Ahmed El-Awamry ◽  
Thomas Kaiser

This paper focuses on the frequency coded chipless Radio Frequency Identification (RFID) wherein the tag’s information bits are physically encoded by the resonators’ notch position which has an effect on the frequency spectrum of the backscattered or retransmitted signal of the tag. In this regard, the notch analytical model is developed to consider the notch position and quality factor. Besides, the radar cross section (RCS) mathematical representation of the tag is introduced to consider the incident wave’s polarization and orientation angles. Hence, the influences of the incident wave’s orientation and polarization mismatches on the detection performance are quantified. After that, the tag measurement errors and limitations are comprehensively explained. Therefore, approaches to measureing RCS- and retransmission-based tags are introduced. Furthermore, the maximum reading range is theoretically calculated and practically verified considering the Federal Communications Commission (FCC) Ultra Wideband (UWB) regulations. In all simulations and experiments conducted, a mono-static configuration is considered, in which one antenna is utilized for transmission and reception.


2019 ◽  
Vol 144 (2) ◽  
pp. 189-195
Author(s):  
Andrew P. Norgan ◽  
Kurt E. Simon ◽  
Barbara A. Feehan ◽  
Lynn L. Saari ◽  
Joseph M. Doppler ◽  
...  

Context.— Preanalytic errors, including specimen labeling errors and specimen loss, occur frequently during specimen collection, transit, and accessioning. Radio-frequency identification tags can decrease specimen identification and tracking errors through continuous and automated tracking of specimens. Objective.— To implement a specimen tracking infrastructure to reduce preanalytic errors (specimen mislabeling or loss) between specimen collection and laboratory accessioning. Specific goals were to decrease preanalytic errors by at least 70% and to simultaneously decrease employee effort dedicated to resolving preanalytic errors or investigating lost specimens. Design.— A radio-frequency identification specimen-tracking system was developed. Major features included integral radio-frequency identification labels (radio-frequency identification tags and traditional bar codes in a single printed label) printed by point-of-care printers in collection suites; dispersed radio-frequency identification readers at major transit points; and systems integration of the electronic health record, laboratory information system, and radio-frequency identification tracking system to allow for computerized physician order entry driven label generation, specimen transit time tracking, interval-based alarms, and automated accessioning. Results.— In the 6-month postimplementation period, 6 mislabeling events occurred in collection areas using the radio-frequency identification system, compared with 24 events in the 6-month preimplementation period (75% decrease; P = .001). In addition, the system led to the timely recovery of 3 lost specimens. Labeling expenses were decreased substantially in the transition from high-frequency to ultrahigh frequency radio-frequency identification tags. Conclusions.— Radio-frequency identification specimen tracking prevented several potential specimen-loss events, decreased specimen recovery time, and decreased specimen labeling errors. Increases in labeling/tracking expenses for the system were more than offset by time savings and loss avoidance through error mitigation.


2019 ◽  
Vol 24 (2) ◽  
pp. 142-155 ◽  
Author(s):  
Chengcheng Wang ◽  
Zhongzhi Xu ◽  
Ronghua Du ◽  
Haifeng Li ◽  
Pu Wang

Author(s):  
Kawther Mekki ◽  
Omrane Necibi ◽  
Hugo Dinis ◽  
Paulo Mendes ◽  
Ali Gharsallah

Abstract In order to encrypt/encode data based on the magnitude level of the radar cross-section (RCS), we propose an approach with a precise estimation considering the resonant characteristics of a multipatch backscatter-based chipless radio frequency identification (RFID) dedicated for chipless tags depolarization. The working principle is based on the polarization mismatch between the tag and the reader antenna to control the magnitude of the backscatter, which allows a reliable detection in real environments. We introduce in this paper a new 4-bit chipless RFID tag with an enhanced RCS, based on a triangular patch antenna with multiple resonators. Additionally, we propose an ultra-wideband impulse radar (UWB-IR)-based reader that interrogates the chipless tag with a UWB pulse, and the received backscatter was studied in both time- and frequency-domains. The antenna was operating from 4.7 to 6.1 GHz, a band allocated for RFID systems. The obtained experimental measurement results in the environment of anechoic chamber were exceptionally relevant to validate the simulation results.


Sign in / Sign up

Export Citation Format

Share Document