Embedded Singularity Chipless RFID Tags

被引:53
作者
Blischak, Andrew T. [1 ]
Manteghi, Majid [2 ]
机构
[1] Virginia Tech, Dept Elect & Comp Engn, Virginia Tech Antenna Grp, Blacksburg, VA 24060 USA
[2] Virginia Tech, Bradley Dept Elect & Comp Engn, Blacksburg, VA 24061 USA
关键词
Chipless RFID; matrix pencil; pole singularities; SEM; singularity expansion method;
D O I
10.1109/TAP.2011.2164191
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Every structure scatters an impulse plane wave in a unique fashion. The structural information of an object can be extracted by analyzing the late-time scattered field as the impulse-response of the structure. The late-time scattered field, which represents the source-free response of the structure, contains a summation of damped sinusoids. The frequency and damping factor of these damped sinusoids are uniquely associated with the structural information, and can be used to identify an unknown object. We propose to create uniquely identifiable scattered fields from an object by incorporating "notches" in the structure giving rise to specific damped sinusoids in the source-free scattered field of the structure. In this manner, data can be embedded into the structure of an object which is detectable using electromagnetic waves, allowing a metallic object to serve as a chipless radio-frequency identification tag (RFID). Data is encoded as complex natural resonant frequencies (referred to as poles) in the structure and is retrieved from the scattered field. Data retrieval is based on Singularity Expansion Method (SEM) analysis using target identification techniques. Each complex-frequency pole provides two-dimensional data (real and imaginary) which can be extracted from the late-time impulse response of the structure using a numerical technique such as the Matrix Pencil Method. We have designed and prototyped a 6-bit (3-pole) tag. The tag is analyzed using simulations and measurements. The tag is successfully read remotely via its scattered fields. The measured data are compared with simulation, and are in close agreement.
引用
收藏
页码:3961 / 3968
页数:8
相关论文
共 23 条
[1]   Extrapolation of time-domain responses from three-dimensional conducting objects utilizing the matrix pencil technique [J].
Adve, RS ;
Sarkar, TK ;
Pereira, OMC ;
Rao, SM .
IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, 1997, 45 (01) :147-156
[2]  
Baum C. E., 1971, INTERACTION NOTE EMP, P1
[3]  
Baum C. E., 1986, IEEE ANTENN PROPAG M, V28, P14, DOI DOI 10.1109/MAP.1986.27868
[4]   THE SINGULARITY EXPANSION METHOD AND ITS APPLICATION TO TARGET IDENTIFICATION [J].
BAUM, CE ;
ROTHWELL, EJ ;
CHEN, KM ;
NYQUIST, DP .
PROCEEDINGS OF THE IEEE, 1991, 79 (10) :1481-1492
[5]   A new Anti-Collision Method for SAW tags using Linear Block Codes [J].
Brandl, Maria ;
Schuster, Stefan ;
Scheiblhofer, Stefan ;
Stelzer, Andreas .
2008 IEEE INTERNATIONAL FREQUENCY CONTROL SYMPOSIUM, VOLS 1 AND 2, 2008, :284-+
[6]  
Dayhoff S., 2005, TCBC WORKSH MAY 13 1
[7]  
Dobkin D. M., 2008, The RF in RFID: Passive UHF RFID in Practice
[8]  
FELSEN LB, 1976, TRANSIENT ELECTROMAG
[9]   Inline SAW RFID tag using time position and phase encoding [J].
Harma, Sanna ;
Arthur, Wesley G. ;
Hartmann, Clinton S. ;
Maev, Roman G. ;
Plessky, Victor P. .
IEEE TRANSACTIONS ON ULTRASONICS FERROELECTRICS AND FREQUENCY CONTROL, 2008, 55 (08) :1840-1846
[10]  
Manteghi M., 2009, URSI USNC NAT RAD SC