Other affiliations: Nanjing University
Bio: Peng Li is an academic researcher from Nanjing University of Posts and Telecommunications. The author has contributed to research in topics: Radio-frequency identification & Authentication. The author has an hindex of 11, co-authored 58 publications receiving 418 citations. Previous affiliations of Peng Li include Nanjing University.
TL;DR: The proposed BKNN algorithm has the smallest location error compared with the Gaussian-based algorithm, LANDMARC and an improved KNN algorithm and the average error in location estimation is about 15 cm using the method.
Abstract: The Global Positioning System (GPS) is widely used in outdoor environmental positioning. However, GPS cannot support indoor positioning because there is no signal for positioning in an indoor environment. Nowadays, there are many situations which require indoor positioning, such as searching for a book in a library, looking for luggage in an airport, emergence navigation for fire alarms, robot location, etc. Many technologies, such as ultrasonic, sensors, Bluetooth, WiFi, magnetic field, Radio Frequency Identification (RFID), etc., are used to perform indoor positioning. Compared with other technologies, RFID used in indoor positioning is more cost and energy efficient. The Traditional RFID indoor positioning algorithm LANDMARC utilizes a Received Signal Strength (RSS) indicator to track objects. However, the RSS value is easily affected by environmental noise and other interference. In this paper, our purpose is to reduce the location fluctuation and error caused by multipath and environmental interference in LANDMARC. We propose a novel indoor positioning algorithm based on Bayesian probability and K-Nearest Neighbor (BKNN). The experimental results show that the Gaussian filter can filter some abnormal RSS values. The proposed BKNN algorithm has the smallest location error compared with the Gaussian-based algorithm, LANDMARC and an improved KNN algorithm. The average error in location estimation is about 15 cm using our method.
TL;DR: The weighted path length and support vector regression algorithm is introduced to improve the positioning precision of LANDMARC and the results show that the proposed algorithm is effective.
Abstract: Nowadays, location-based services, which include services to identify the location of a person or an object, have many uses in social life. Though traditional GPS positioning can provide high quality positioning services in outdoor environments, due to the shielding of buildings and the interference of indoor environments, researchers and enterprises have paid more attention to how to perform high precision indoor positioning. There are many indoor positioning technologies, such as WiFi, Bluetooth, UWB and RFID. RFID positioning technology is favored by researchers because of its lower cost and higher accuracy. One of the methods that is applied to indoor positioning is the LANDMARC algorithm, which uses RFID tags and readers to implement an Indoor Positioning System (IPS). However, the accuracy of the LANDMARC positioning algorithm relies on the density of reference tags and the performance of RFID readers. In this paper, we introduce the weighted path length and support vector regression algorithm to improve the positioning precision of LANDMARC. The results show that the proposed algorithm is effective.
TL;DR: In this paper, a kind of WiFi supported RFID reader (WiRF) is implemented using open source hardware platforms, such as Node MCU and RFID-RC522, to assist teacher to perform automatic attendance record and students' behavior record.
Abstract: Currently, Internet of Things (IoT) technologies are used in many areas, such as intelligent transportation, smart city, hospital, games, education. Earlier interactive response system uses infrared or radio frequency (RF) wireless communication technologies to transmit the students’ answer to teachers’ managerment system, where there exists high cost, inconvenient usage, difficult deployment. How to use IoT to improve the quality of higher education becomes a very important topic in the researh area of teaching. Radio Frequency Identification (RFID) is one of key technologies to implement IoT applications, and most of universities use the High Frequency (HF) RFID card as the students’ identification devices in China. In this paper, a kind of WiFi supported RFID reader (WiRF) is implemented using open source hardware platforms, such as Node MCU and RFID-RC522. Then the proposed WiRF system is used to assist teacher to perform automatic attendance record and students’ behavior record. In addition, Quick Response (QR) code is another technology to enable IoT. In this paper, QR code is designed to quickly access course video and perform real-time interactive response in the classroom, which will provide multidimensional learning and strengthen the motivation of students’ learning. This IoT system can improve the attendance of students, and give a positive impact on students’ learning process for higher education.
TL;DR: This protocol is based on the Physical Unclonable Function (PUF) and the lightweight cryptography to achieve efficient verification of a single tag and results show that this protocol has a good balance between performance and security.
Abstract: With the fast development of the Internet of Things, Radio Frequency Identification (RFID) has been widely applied into many areas. Nevertheless, security problems of the RFID technology are also gradually exposed, when it provides life convenience. In particular, the appearance of a large number of fake and counterfeit goods has caused massive loss for both producers and customers, for which the clone tag is a serious security threat. If attackers acquire the complete information of a tag, they can then obtain the unique identifier of the tag by some technological means. In general, because there is no extra identifier of a tag, it is difficult to distinguish an original tag and its clone one. Once the legal tag data is obtained, attackers can be able to clone this tag. Therefore, this paper shows an efficient RFID mutual verification protocol. This protocol is based on the Physical Unclonable Function (PUF) and the lightweight cryptography to achieve efficient verification of a single tag. The protocol includes three process: tag recognition, mutual verification and update. The tag recognition is that the reader recognizes the tag; mutual verification is that the reader and tag mutually verify the authenticity of each other; update is supposed to maintain the latest secret key for the following verification. Analysis results show that this protocol has a good balance between performance and security.
TL;DR: This paper proposes PRDL: relative localization method of RFID tags via phase and RSSI based on deep learning, and shows that PRDL can achieve better results than the traditional relative localization methods.
Abstract: Ultra-high frequency radio frequency identification (UHF RFID) technology has been widely used in many areas, and RFID localization becomes a research hotspot. There are many kinds of research on absolute localization; however, due to some disadvantages of absolute localization, relative localization is more effective in some situations. At present, there are some problems with relative localization: existing methods have low localization accuracy, and it is difficult for them to deal with high-density tags. Aiming at these problems, this paper proposes PRDL: relative localization method of RFID tags via phase and RSSI based on deep learning. By using deep learning, the variation characteristics of RFID phase and RSSI are extracted with limited data accuracy conditions. On this basis, we can infer the relative positional relationship of RFID tags with high accuracy, and design the corresponding sorting algorithm to obtain the sequence arrangement. PRDL has experimented with bare tags and actual books, and the experimental results show that PRDL can achieve better results than the traditional relative localization methods. A series of tests also showed that PRDL has good robustness and generalization ability.
•01 Mar 2017
TL;DR: World specialists will talk about reliability tests in quantum networks; about quantum hacking, its importance and limitations, and its role in classical and quantum cryptography; about high rate and about low cost QKD systems; about free space quantum communication; and about future quantum repeaters for continental scale quantum communication.
Abstract: ▓ Local Randomness for True Random Number generators ▓ Non-local Randomness for distribution of Cryptographic Keys ▓ Towards faster, longer distances and cheaper QKD engines ▓ Quantum Repeaters ▓ Device-Independent Quantum Information Processing
01 Jan 2003
TL;DR: The Colorwave algorithm is presented, a simple, distributed, on-line algorithm for the reader collision problem in radio frequency identification (RFID) systems that enables the RFID system to automatically adapt to changes in the system and in the operating environment of the system.
Abstract: We present the Colorwave algorithm, a simple, distributed, on-line algorithm for the reader collision problem in radio frequency identification (RFID) systems. RFID systems are increasingly being used in applications, such as those experienced in supply chain management, which require RFID readers to operate in close proximity to one another. Readers physically located near one another may interfere with one another's operation. Such reader collisions must be minimized to ensure the correct operation of the RFID system. The Colorwave algorithm yields on-line solutions that are near the optimal static solutions. The dynamic nature of the algorithm enables the RFID system to automatically adapt to changes in the system and in the operating environment of the system.
TL;DR: This paper provides a near complete and up-to-date view of the IoT authentication field and provides a summary of a large range of authentication protocols proposed in the literature, using a multi-criteria classification previously introduced in this work.
Abstract: The Internet of Things (IoT) is the ability to provide everyday devices with a way of identification and another way for communication with each other. The spectrum of IoT application domains is very large including smart homes, smart cities, wearables, e-health, etc. Consequently, tens and even hundreds of billions of devices will be connected. Such devices will have smart capabilities to collect, analyze and even make decisions without any human interaction. Security is a supreme requirement in such circumstances, and in particular authentication is of high interest given the damage that could happen from a malicious unauthenticated device in an IoT system. This paper gives a near complete and up-to-date view of the IoT authentication field. It provides a summary of a large range of authentication protocols proposed in the literature. Using a multi-criteria classification previously introduced in our work, it compares and evaluates the proposed authentication protocols, showing their strengths and weaknesses, which constitutes a fundamental first step for researchers and developers addressing this domain.
TL;DR: The role of Internet of Things in building a smart educational process, and also, in making efficient and effective decisions, which is vital in the authors' daily life are illustrated.
Abstract: The role of education, which propagates knowledge, becomes increasingly significant in the past little years due to the fulminatory expansion in knowledge. Meantime, the model of education process is going via a conversion in which the learning of different students need to be completed in various ways. Therefore, the smart education environment is encouraged. It incorporates different information and communication technologies to activate learning process and adjust to the requirements of different students. The quality of learning process for students can be enhanced through continually monitoring and analyzing the state and activities of different students via information sensing devices and information processing platforms for offering feedback about learning process of different students. The Internet of Things pledges to achieve a great variation in life, goodness of individual's life, and organizations' productivity. Via a vastly dispensed locally smart network of intelligent objects, the IoT has the chance to allow expansions and improvements to essential utilities in various fields, while introducing a novel ecosystem for developing application. Applying the concept of Internet of Things in any education environment will increase the quality of education process because students will learn rapidly, and teachers will fulfill their job efficiently. This paper is designed to illustrate the basic concepts, definitions, characteristics, technology, and challenges of Internet of Things. We also illustrated the role of Internet of Things in building a smart educational process, and also, in making efficient and effective decisions, which is vital in our daily life.
TL;DR: This paper provides an introduction to IPS and the different technologies, techniques, and some methods commonly employed and serves as a guide for the reader to easily find further details on each technology used in IPS.
Abstract: An accurate and reliable Indoor Positioning System (IPS) applicable to most indoor scenarios has been sought for many years. The number of technologies, techniques, and approaches in general used in IPS proposals is remarkable. Such diversity, coupled with the lack of strict and verifiable evaluations, leads to difficulties for appreciating the true value of most proposals. This paper provides a meta-review that performed a comprehensive compilation of 62 survey papers in the area of indoor positioning. The paper provides the reader with an introduction to IPS and the different technologies, techniques, and some methods commonly employed. The introduction is supported by consensus found in the selected surveys and referenced using them. Thus, the meta-review allows the reader to inspect the IPS current state at a glance and serve as a guide for the reader to easily find further details on each technology used in IPS. The analyses of the meta-review contributed with insights on the abundance and academic significance of published IPS proposals using the criterion of the number of citations. Moreover, 75 works are identified as relevant works in the research topic from a selection of about 4000 works cited in the analyzed surveys.