Computer Science ›› 2017, Vol. 44 ›› Issue (Z6): 294-299.doi: 10.11896/j.issn.1002-137X.2017.6A.067

Previous Articles     Next Articles

Negative Acknowledgement Based Data Delivery Scheme for WISP

ZHANG Wen-bin, LI Er-tao, LI Fei, LI Yan-yan and ZHU Yi-hua   

  • Online:2017-12-01 Published:2018-12-01

Abstract: The wireless identification and sensing platform (WISP) is able to harvest energy from the ultra-high-frequency (UHF)signals transmitted by the radio frequency identification (RFID) reader so as to power the microprocessor and sensors inside the WISP and deliver the data captured by the sensors to the reader.The NAK(negative acknow-ledgement) based data delivery scheme was presented which can remedy the problem of wasting channel in WISP due to high ratio of duplicated packets being transmitted.The experimental results show that the proposed scheme is able to reduce the ratio of duplicated packets and improve the effective throughput.

Key words: Battery-free sensor network,Wireless identification and sensing platform (WISP),RFID,Data delivery

[1] 王志伟,闫秀霞,孙宝连.RFID技术应用研究综述及研究趋势展望[J].物流技术,2014,33(5):1-5.
[2] 吕倩.基于云计算及物联网构建智慧校园[J].计算机科学,2011,38(B10):18-21.
[3] 吕峻闽,缪春池,周启海,等.基于RFID和SCOR的物联网配送中心信息系统模型研究[J].计算机科学,2011,38(12):128-130.
[4] 蒋浩,高春华,张林,等.一种基于 RFID 的室内车载监控系统定位方法的设计与实现[J].计算机科学,2012,39(2):29-33.
[5] 宋波.基于WISP的节点状态检测及安全机制研究[D].成都:电子科技大学,2013.
[6] International Organization for Standardization Information technology-Radio frequency identification for item management-Part 6C:Parameters for air interface communications at 860 MHz to 960 MHz:ISO/IEC 18000-6C[S].2005.
[7] 刘云浩.无源感知网络[J].中国计算机学会通讯,2014,10(6):23-27.
[8] SAMPLE A P,YEAGER D J,POWLEDGE P S,et al.Design of an RFID-based battery-free programmable sensing platform [J].IEEE Transactions on Instrumentation and Measurement,2008,57(11):2608-2615.
[9] SAMPLE A P,SMITH J R.The wireless identification and sensing platform-Wirelessly Powered Sensor Networks and Computational RFID [M].New York:Springer,2013:33-56.
[10] GitHub.Inc.wisp/dlwisp41[EB/OL].[2015-11-11].
[11] YEAGER D J,POWLEDGE P S,P RASAD R,et al.Wirelessly-charged UHF tags for sensor data collection[C]∥2008 IEEE International Conference on RFID.IEEE,2008:320-327.
[12] EPCglobal Inc.EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860-960 MHz [S/OL].[2015-11-24].
[13] YEAGER D,ZHANG F,ZARRASVAND A,et al.A 9μA,addressable gen2 sensor tag for biosignal acquisition[J].IEEE Journal of Solid-State Circuits,2010,45(10):2198-2209.
[14] MONTEFIORE A,PARRY D,PHILPOTT A.A Radio Fre-quency Identification (RFID)-based wireless sensor device for drug compliance measurement [EB/OL].[2015-11-14].
[15] HOQUE E,DICKERSON R F,STANKOVIC J A.Monitoring body positions and movements during sleep using WISPs [C]∥ACM Wireless Health 2010.ACM,2010:44-53.
[16] GUMMESON J,CLARK S S,FU K,et al.On the limits of effective hybrid micro-energy harvesting on mobile CRFID sensors [C]∥Proceedings of the 8th International Conference on Mobile Systems,Applications,and Services.ACM,2010:195-208.
[17] GASCO F,FERABOLI P,BRAUN J,et al.Wireless strainmeasurement for structural testing and health monitoring of carbon fiber composites [J].Composites Part A:Applied Science and Manufacturing,2011,42(9):1263-1274.
[18] VISVANATHAN R,RANASINGHE D C,S HINIMOTO T R L,et al.Framework for preventing falls in acute hospitals using passive sensor enabled radio frequency identification technology [C]∥2012 Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).IEEE,2012:5858-5862.
[19] TALLA V,BUETTNER M,WETHERALL D,et al.Hybridanalog-digital backscatter platform for high data rate,battery-free sensing [C]∥2013 IEEE Topical Conference on Wireless Sensors and Sensor Networks (WiSNet).IEEE,2013:1-3.
[20] CZESKIS A,KOSCHER K,SMITH J R,et al.RFIDs and secret handshakes:defending against ghost-and-leech attacks and unauthorized reads with context-aware communications [C]∥Proceedings of the 15th ACM Conference on Computer and Communications Security.ACM,2008:479-490.
[21] SHU Y,CHEN J,JIANG F,et al.Demo:WISP-based access control combining electronic and mechanical authentication[C]∥Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems.ACM,2011:433-434.
[22] CHAE H J,SALAJEGHEH M,YEAGER D J,et al.Maximalist cryptography and computation on the WISP UHF RFID tag-Wirelessly Powered Sensor Networks and Computational RFID[M].New York:Springer,2013:175-187.

No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .