2012
DOI: 10.1109/tap.2012.2208087
|View full text |Cite
|
Sign up to set email alerts
|

Electromagnetic Models for Passive Tag-to-Tag Communications

Abstract: Abstract-The UHF passive radio frequency identification technology generally enables an asymmetric interaction between the reader and the tag, the latter only being able to respond to the query of the reader through backscattering modulation. Very recently, some experiments put into evidence the possibility to set up a tag-to-tag communication by using a simple illuminator. The key issues and the physical limitation of such a cross-link are here investigated both theoretically and numerically by fully accounti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 36 publications
(12 citation statements)
references
References 12 publications
0
12
0
Order By: Relevance
“…Tag and tag communication [149], grid issues [150,151,152], e.g., granularity and cross-talk, might be considered or utilized to enhance the resolution, coverage, and detection of the inter-tag defects.…”
Section: Future Trends and Perspectivesmentioning
confidence: 99%
See 1 more Smart Citation
“…Tag and tag communication [149], grid issues [150,151,152], e.g., granularity and cross-talk, might be considered or utilized to enhance the resolution, coverage, and detection of the inter-tag defects.…”
Section: Future Trends and Perspectivesmentioning
confidence: 99%
“…The rapid evolution of large-area electronics printing technologies, e.g., inkjet printing, has enhanced the development of low-cost RFID-enabled sensors as well as accelerated their high granularity deployment in large scale structures. Tag and tag communication [ 149 ], grid issues [ 150 , 151 , 152 ], e.g., granularity and cross-talk, might be considered or utilized to enhance the resolution, coverage, and detection of the inter-tag defects.…”
Section: Future Trends and Perspectivesmentioning
confidence: 99%
“…There are related works on routing protocols for small scale passive RFID T2T networks, but even those works are quite limited and inadequate. In [29], the authors suggested that the range of T2T backscatter communication could be improved by multi-hop cooperative routing strategy. However, no detailed investigation was not included in their research.…”
Section: Related Work On Protocols For Passive Rfid T2t Networkmentioning
confidence: 99%
“…It has security key usage while transmitting the data information from request to the server system fig: 10. The personal computer will have the normal configuration to use the process in the block chain step by step [13]. This cloud process will have tree structures to have the share market invest in bit coins.…”
Section: Request and Response Transactionmentioning
confidence: 99%