Next Article in Journal
Acoustic Sensor-Based Soundscape Analysis and Acoustic Assessment of Bird Species Richness in Shennongjia National Park, China
Next Article in Special Issue
Review of Wireless RFID Strain Sensing Technology in Structural Health Monitoring
Previous Article in Journal
Deep Learning Regression Approaches Applied to Estimate Tillering in Tropical Forages Using Mobile Phone Images
Previous Article in Special Issue
Flexible, Fully Printable, and Inexpensive Paper-Based Chipless Arabic Alphabet-Based RFID Tags
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

MIMO Radio Frequency Identification: A Brief Survey

1
Department of Computer Engineering, Umm Al-Qura University, Makkah 21955, Saudi Arabia
2
Department of Electrical and Computer Engineering, King Abdul Aziz University, Jeddah 21589, Saudi Arabia
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(11), 4115; https://doi.org/10.3390/s22114115
Submission received: 15 April 2022 / Revised: 17 May 2022 / Accepted: 24 May 2022 / Published: 28 May 2022
(This article belongs to the Special Issue Recent Advances in RFID Sensors and Their Applications)

Abstract

:
In this paper, we briefly look at the latest state-ot-the-art in the domain of multi-input multi-output (MIMO) radio frequency identification (RFID) systems while detailing the work done in the domain of anti-collision, range enhancements, bit error rate (BER) improvements and security. Various passive ultra-high frequency (UHF) RFID implementations are considered that employ multiple antennas at the reader and single or multiple antennas at each tag. We look at several recent works those explored MIMO for RFID receivers. When using MIMO at the backscatter channel, significant improvements can be achieved in the BER as well as range extension. With the extra reliability and increased throughput, such systems can be deployed in many important applications like large tag reading scenarios and accurate tracking. Increased throughput is directly dependent on estimation of tag quantity in a bulk reading environment and usually estimators designed for single antenna systems under-perform in such settings causing low signal to noise ratio (SNR) when employed in MIMO systems where tag signal overlapping can happen more often. One of the key challenges is to keep the design of the RFID tag simple, cutting cost and power requirement when employing anti-collision schemes. We provide a brief survey in some of the recent developments related to MIMO RFID systems, the protocols and algorithms used, and improvements achieved.

1. Introduction

Radio frequency identification (RFID) allows us to identify objects remotely through the means of wireless communication [1,2]. It has found its application in a variety of domains including but not limited to access control, object identification, transportation, tracking and electronic identification (ID) [3,4,5]. An RFID system is composed of RFID readers and tags along with the RFID software or a middleware application working via application programming interfaces (APIs) [6]. The tag is made up of a small electronic circuit along with an antenna or multiple antennas containing a unique ID. Different types of tags exist including active ones and those that are passive [7]. While an active tag has a power source, usually an internal battery to power the main circuit along with radio frequency (RF) communication, a passive tag relies on power of the incoming signal from the RFID reader’s transmitter and modulates it [8]. As passive RFID tags do not contain an internal power source, they rely solely on the energy of the carrier wave. This causes them to have a short range compared to active tags and finds their applications in short range identification applications. The range can be increased by deploying multiple antennas in an RFID reader but it is limited by the sensitivity of the tag chip [9]. Similarly, tag design can significantly influence the sensitivity and a number of efforts have been undertaken to improve the design [9,10,11,12].
Passive tags provide an attractive option for applications where lower costs and a longer shelf life is expected [13]. Various measurements of the channel such as [14,15] proved that the channel for passive RFID systems can be defined as a cascaded one with forward and backscattering components and both channels can be represented via Rayleigh distribution [16]. However, the cascaded channel acts to degrade the transmission since it fades deeper compared to an ordinary Rayleigh channel [17]. Some of the parameters affecting the tag reading ability of the reader are the distance of the tag, its orientation with respect to the receiver, multipath fading, noisy channel, and interference. The interference can be both from multiple tags transmitting signals at the same time or from nearby RFID readers. An RFID system (Figure 1) is usually composed of a receiver with M transmit antennas, N receive antennas, and a tag having L antennas. The core principle behind backscatter communication is such that initially a reader will transmit a continuous wave (CW) to energize the tag or tags. This is followed by the tag sending back the CW signal to the receiver by modifying the impedance loads of its attached antennas according to a particular code prestored in the tag and known as identification data. This technique is referred to as backscatter modulation, whereby the tag transmits secret information to the reader which is modulated over the reflected CW signal. The reader will extract the required information by first estimating and then decoding the signal from the tag after backscatter modulation. The transmission and reception paths, analogous to radar systems, are divided into two categories: bistatic and monostatic [18]. In monostatic systems, a single or multiple antennas first transmit and then listen to the tag response and the channel is half-duplex. On the other hand, in bistatic systems, directional coupling is employed, whereby separate RF channels are used for transmission and reception to enable full-duplex communication. The reader continues to broadcast the CW signal throughout the process to keep the tag energized and at the same time receive the signal echoed by the tag when operating in a full-duplex mode. While such systems are faster, the interference at the receiver side from its own transmit antennas needs to be eliminated. There are various protocols and standards [19] that defines the communication process among the tag and the reader. For HF band, there is ISO 15693 and ISO 18000-3, and ISO 18000-6 and EPCglobal for UHF [20]. Additionally, the UHF frequency range is within 860–915 MHz and it is 13.56 MHz for HF.
Several works have explored multiple-input multiple-output (MIMO) [21] for RFID receivers. When using MIMO at the backscatter channel, significant improvements can be achieved in the bit error rate (BER) as well as extension of reverse-link interrogation range (RIR). With the extra reliability and increased throughput, such systems can be deployed in many important applications like large tag reading scenarios and accurate tracking etc. Increased throughput is directly dependent on estimation of tag quantity in a bulk reading environment and usually estimators designed for single antenna systems underperform in such settings causing average or low signal to noise ratio (SNR) when employed in MIMO systems where tag signal overlapping can happen more often. One of the major areas of recent research has been bulk reading capabilities of the RFID reader systems. To enhance bulk reading capabilities of an RFID system, collision recovery techniques can play an important role as they help in recovering the signal collisions due to interference from neighboring tags who are communicating simultaneously. Most of the recent collision recovery algorithms are based on the assumption that perfect knowledge of the channel state information (CSI) exists but it is difficult to achieve. Block diagram of a typical MIMO RFID system is depicted in Figure 1. The narrowband MIMO channel [22] can be expressed as:
y ( t ) = H b S ( t ) H f x ( t ) + n ( t ) ,
where H b is the channel matrix from the tag to the reader while H f is a channel matrix from reader to the tag, x is the transmitted signal and y is the received signal at the reader. S in Equation (1) represents the backscattering matric and is also known as signaling matrix and n is the noise at receiver. H b and H f are Gaussian distributed and mutually independent. In this work we go through latest state-of-the-art in MIMO RFID systems and briefly look at the tools and techniques used. Some of the major contributions of this work are:
  • A study of various estimation algorithms being employed in case of multi-antenna RFID interrogators.
  • A brief look at various anti-collision algorithms and their viability.
  • A brief look at the recent advancements in the domain of security.
The rest of the paper is organized as follows: Section 2 details various estimation techniques and algorithms used in MIMO RFID systems. Section 3 compares various anti-collision algorithms being used in multi-antenna RFID systems. Section 4 looks at recent advances in the domain of secure MIMO RFID systems. Section 5 presents the discussion and Section 6 concludes the paper.

2. Estimation Techniques

Both forward interrogation range (FIR) and RIR are considered when estimating the actual interrogation range of an RFID reader [23]. FIR calculated as the longest distance at which an RFID signal can turn on a tag and is the measure of average power absorbed at its voltage rectifier. RIR, on the other hand, is the longest distance at which the backscattered tag response signal can be accurately detected and is measured using the signal to noise ratio (SNR) that is strong enough for the tag’s data to be read after demodulation. The RIR plays a significant role in evaluating tag reading capabilities of a reader compared to the FIR. The estimation techniques summarized in this work are listed in Table 1. Various estimators employed in the summarized works have been listed along with the frequency range, MIMO configuration and gain. The gain represents performance improvements over a SISO RFID configuration. Kim et al. [24] studies the reverse-link interrogation range of MIMO UHF RFID readers with maximal-ration combining (MRC) and compare it against a SISO reader. The channel is assumed to be arbitrarily correlated to the Nakagami- m distribution. The interrogation range is one of the foremost parameters in evaluating the performance of an RFID reader. Figure 2 details the proposed system architecture of mono-static and bi-static readers. In Figure 2b, it can be observed that from M t transmit antennas, M r receive antennas and a single tag antenna, an M t × 1 × M r pinhole channel matrix is obtained.
Due to spatial multiplexing, a MIMO based multi receiver antenna-based setup can greatly enhance the BER performance at the receiver [25]. It is derived that using multiple antennas improves the reader SNR and hence improved average RIR. In uncorrelated Rayleigh channels, the gain of a 2 × 2 MIMO system is 36 % higher, while for a 3 × 3 MIMO system is 60 % higher compared to that of a SISO reader system. On the other hand, in correlated environment the gain is almost 26 % for 2 × 2 MIMO and 44 % for 3 × 3 MIMO. The complexity of the system will increase along with hardware and computational costs, but it is worth the improvement.
The indoor channels are usually characterized by a combination of light-of-sight (LOS) component together with dense multipath components (DMC) [26,27]. The authors of [28] propose a UHF MIMO RFID system for high accuracy positioning. A maximum likelihood (ML) direct positioning algorithm for coherent measurements is performed by nearby antennas in a closed setting and non-coherent measurements in long displaced settings. The proposed solution considers the LOS component together with DMCs. The presence of DMCs makes the process of precise positioning more difficult. Exploiting diversity and a higher bandwidth can improve positioning in such channels. An ML positioning technique is used to estimate the position, along with the channel estimates. A dual antenna tag is proposed that supports both 2.45 GHz and UHF bands. The proposed system is able to reduce the position errors below 0.15 m by 80%.
Table 1. Comparison of various estimation techniques.
Table 1. Comparison of various estimation techniques.
PaperAlgorithmFrequency BandStandardBandwidthTx PowerMIMOGain
Kim et al. [24]Maximal Ratio Combining917–920.6 MHz-600 kHz30 dBm3 × 3
2 × 2
36%
60%
Grebien et al. [28]Maximum Likelihood865–928 MHz
2.45 GHz
EPCglobal C1 Gen-225 MHz-
8 dBm
4 × 480%
Duangsuwan et al. [29]Minimal Mean Square Error
Zero Forcing
2.4–2.5 GHzEPCglobal Gen-1-−20 dBm2 × 220%
Muzamane et al. [30]Maximum Likelihood902–928 MHzCustom MIMO Tag--1 × 2 × 1-
Khelladi et al. [31]Regularized Least Squares-EPCglobal C1 Gen-2--2 × 2
4 × 4
340%
Chen et al. [32]BABF and Custom Estimator915 MHzEPCglobal C1 Gen-2-30 dBm1 × 2, 2 × 1
2 × 3, 3 × 2
90%
While the interest in in the microwave frequencies such as 2.45 GHz is growing rapidly, the authors of [29] make a case for blind signal estimation to detect multiple tags in a MIMO RFID system. The backscattering in RFID interrogation can be modeled as a fading channel, which makes the interrogation process more complex. A perspective of blind channel estimation is presented to the RFID reader receiver for multiuser detection. Multiple antennas have been explored to enhance multiple tag reading capabilities. In the proposed blind estimation-based system, linear equalization techniques have been employed at the receiver including minimal mean square error (MMSE) and zero-forcing (ZF) to estimate the channel state. The channel is assumed to be an indoor one and the proposed blind estimation technique independence component analysis (ICA) is employed for estimating the CIR. The proposed technique outperforms traditional linear estimation schemes when the number of tags is less.
The domain of theoretical modeling of MIMO RFID systems offers a lot of opportunities to study various MIMO techniques in RFID context [33]. Multi-antenna tags enable the possibility of having uncorrelated channel characteristics during the transmission and reception of signals realizing polarization diversity. Muzamance et al. [30] have evaluated the performance of a 1 × 2 × 1 MIMO UHF RFID system and propose a new UHF MIMO passive tag prototype and its corresponding reader system. The proposed system consists of a reader with one transmit and receive antenna, whereas the tag has two antennas and is based on a polarization-time coded backscatter diversity scheme. For validation, the experimental BER of the proposed scheme is compared against BER for simulated AWGN, Rayleigh, and Rician models while altering different parameter. For forward and backward channels, a Rician fading model has been used to simulate the chamber room environment.
One of the key challenges is to keep the design of the RFID tag simple, cutting cost and power requirement when employing anti-collision schemes [34]. Khelladi et al. [31] have proposed a novel channel estimation technique employing concealed pilots for a multi-antenna RFID system. The proposed solution does not use additional data bits and reduces the number of tag interrogation requests and improves channel estimation performance. The technique is based on hidden pilots consisting of a predetermined sequence summed with the data symbols. Since the suggested technique is bandwidth efficient, it enables quick detection of multiple tags. Figure 3 details the proposed architecture with a single transmit and multiple receive antennas. A regularized LS estimation scheme is applied on the preamble part of the tag’s signal that contains the concealed pilots that is same for all tags. The authors also derived solution for the optimization problem and a closed form expression considering the mean square error (MSE) for the given technique. The proposed technique outperforms slotted aloha and post-preamble-based estimation in terms of reading large number of tags.
In the past decade, various multiaccess algorithms such as slotted ALOHA [35,36] have been proposed to tackle the issue of collision where multiple tags exist in the interrogation range of a reader. To enhance the interrogation throughput, the frame size must be the same length as the number of tags in the interrogation range. However, in a real-life environment, the number of tags in the interrogation range of the reader vary significantly and several works such as [37] have investigated the estimation of tags in the range of an RFID reader. Chen et al. [32] have proposed a multi-antenna RFID system that employs blind adaptive beamforming (BABF) algorithm to improve the interrogation range and the error rate performance in half- and full-duplex modes. Figure 4 [32] depicts the proposed MIMO RFID reader in half duplex and full duplex modes having M antennas. In Figure 4a, both the transmitter and receiver use common antennas leading to full duplex communication, whereas in Figure 4b, separate transmit and receive antennas are used.
In a bistatic reader system, both the forward and reverse links undergo the same channel variations, and the channel coefficients are same, whereas in monostatic systems, they observe independent channel coefficients [38]. The authors have quantified the gains related to reader interrogation range while employing multiple antennas and then used a BABF scheme to improve both the interrogation range and data transmission. The idea is to estimate the antenna weight vectors, by sending a continuous wave to probe the tags, in order to maximize the interrogation range. Simulation results and experimental analysis using Universal Software Radio Peripheral (USRP) device suggests that the proposed scheme complies with the EPCglobal standard and improves the interrogation range as well as the packet error rate of the system.

3. Anti-Collision Techniques

An active area of research in MIMO RFID systems is improving the bulk reading capabilities of the reader through improvements in collision recovery [39] from signals of multiple tags. The anti-collision techniques that are reviewed in this work are summarized in Table 2. Various collision recovery algorithms have been used to overcome the collision problem in MIMO RFID systems. It was observed that most of the works used passive tags having EPCglobal Class 1 Gen 2 standard, whereas double Rayleigh fading channel was used in simulations. Salah et al. [40] suggest that considering backscatter link frequency tolerance, which is ignored in traditional collision recovery methods, can be used for enhancing collision recovery. In traditional collision recovery algorithms, backscatter link frequency (BLF) is assumed to be identical for the collided tags. However, since BLF may vary based on manufacturing processes, the tolerance must be considered but it requires perfect channel estimation. Figure 5 details the proposed multi-antenna reader with collision recover. The power spectrum for pilot tones is computed and converted to energy spectrum followed by the proposed metric given in Equation (2).
By further simulating BLF tolerance artificially, additional improvements can be achieved. The technique is to successfully decode a single tag in a single slot from a group of multiple colliding tags. The power spectrum for each antenna is calculated and then divided by the BLF to be converted into energy spectrum. The peaks can then be used to compute a new metric called Normalized Maximum Energy (NME) for each antenna and given as:
NME n R = max f { E s , n R   ( f ) } f { E s , n R   ( f ) }  
where E s , n R   ( f ) is the energy received on a single antenna n R having a BLF f . The antenna with a higher NME will have a higher SIR and then a single antenna matched filter receiver is utilized for the selected antenna. The proposed technique can improve the bulk reading time by up to 8% over traditional ML receivers, whereas an improvement of 25% can be achieved through the means of artificial rate tolerance simulation. The proposed technique can significantly enhance tag reading in multi-antenna systems without additional complexity overhead.
Collision occurs when the tag signals from multiple tags are received at the same time [47]. In case the number of readers is lower than the number of tags, a multi-label communication model can enhance the interrogation performance through the use of non-sparse schemes [48]. The authors of [41] consider the case of multiple tags, which requires the establishment of a MIMO RFID model. It is assumed that the reader has M antennas while there are N tags that can communicate with the reader. A new method for identifying multiple tags, using blind separation of the source signals based on label collision followed by recovery, is proposed. For bulk reading of tags, an anti-collision algorithm based on Searching-and-Averaging Method in Time Domain (SAMTD) is developed. Furthermore, a two-step extraction method is proposed that considers non-sparse RFID signals. The base vector of the source signal was estimated using the sample of the unit interval. Later, a corresponding signal with smallest interference is extracted in order to avoid a mixed matrix. The throughput analysis suggests that the proposed algorithm outperforms traditional blind source separation (BSS) and ALOHA [49] algorithms. With three antennas, a total of six tags could be perfectly separated. The scheme would work well for scenarios where collision identification is required and where the recovery of the signals is non-fully sparse.
While existing anti-collision algorithms [50] solely focus on reducing collision probability, they undergo an inherent problem of vast idle slots. Jian et al. [42] propose a collision-tolerant dynamic framed slotted Aloha (CE-DFSA) based technique that is able to identify multiple tags in a slot to decrease the identification time during the identification process. Orthogonal Walsh Sequence (WS) is employed to identify multiple tags that eliminates the need for a spread spectrum. When the RFID reader generates a query, multiple tags would respond having orthogonal WS. Throughput of the system, while considering disparity between the duration of the slots, is not a good estimate of performance evaluation of the anti-collision with regards to the identification time. The authors have thus evaluated their proposed algorithm in terms of time efficiency given as:
η time _ effi = n   ·   T ID I   ·   T I +   S   ·   T S +   C   ·   T c  
where T ID is the time for transmitting tag ID, S is the successful slots, I represents idle slots, and C is the collision slots whereas T S , T I , and T C represent the time durations. It is shown via simulations that the proposed technique is able to improve and accelerate the tag identification procedure more efficiently compared to traditional anti-collision algorithms. The proposed scheme is compared against various anti-collision algorithms and the gains have been quantified.
Multi-antenna RFID schemes are effective in solving the collision problem; however, when employing a quadrature receiver [51], the often-overlooked aspect is that the collided signals can be statistically represented as rectilinear signal with a degree of impropriety. For such improper complex signals, the performance can be improved by processing together the received signal and its complex conjugate using the technique known as widely linear (WL) processing. Deng et al. [43] make a case for a widely linear minimum-mean-square-error (WLMMSE) technique for anti-collision in multi-tag RFID systems. It considers the improper statistics of second order for backscatter tag signals. The proposed technique is effective in separating overlapped tag signals in a single slot and can be extended to multi-antenna RFID systems for throughput enhancements. The simulation and experimental results suggest that the proposed scheme is superior to the traditional signal recovery techniques based on linear models such as linear MMSE (LMMSE).
One of the most prolific standards for RFID systems is the EPCglobal Class-1 Gen-2 and finds its uses in several applications [52]. FM0 encoding scheme used in the EPCglobal Class-1 Gen-2 standard is particularly of interest specially in the domain of logistics. The operating frequency is around 900 MHz, and the range is close to 10 m. Salah et al. [44] derive and evaluate the performance of ML decoding for a UHF RFID system with several receive antennas. The channel is simulated realistically as a doubly selective Rayleigh fading model that makes the decoding process more complex. The performance metrics used are symbol error probability (SEP) and the derived results are compared against experimental simulations. The pairwise error probability (PEP) closes in when the number of antennas increase and gives good results even with two antennas. Perfect channel knowledge was assumed, and it was considered that all tag reply signals undergo block fading.
The throughput of RFID standards such as EPCglobal is restricted by the tag collisions in multi-tag environments [53]. Since the number of tags are unknown at any point in time, they always exceed the frame length that must be equal to the number of tags to be read, hence complicating the performance of the anticollision algorithms. By improving the estimation process of tag quantity, the throughput of an RFID system can be greatly enhanced. Traditional receivers rely on single antenna systems and are usually difficult to be utilized for MIMO RFID systems as the low SNRs due to colliding tag signals degrade their performance significantly. Deng et al. [45] came up with a multi-dimensional tag quantity estimation scheme for MIMO RFID systems that exploits spatial diversity at the multiple antennas of the receiver. The collided tag signals are stored in the form of high-dimensional vectors, thus making the estimation of tag quantity to be modeled as high-dimensional data clusters. It is observed that for a suitable SNR at various backscattering channels, the separation is enhanced by distance increments between clusters enabled by the modeling technique. Therefore, a density-based spatial clustering of applications with noise (DBSCAN) algorithm was integrated into the high-dimensional space to estimate tag quantities. Figure 6 explains the tag recovery algorithm used. The proposed technique outperforms various traditional approaches, and it is proved through simulations and experimentation.
Identification performance in large RFID networks [54] is a key priority and multiple anti-collision techniques have been adopted in the past to enhance this metric. The authors of [46] propose a collision arbitration technique called group-based binary splitting algorithm (GBSA) to tackle the issue of tag collisions through arbitration strategies. The technique is a combination of estimation based on tag cardinality, a smart grouping strategy, and a modified binary splitting algorithm. An ML estimator [55] is employed for computing the cardinality. The tags are categorized into multiple groups according to the cardinality estimation and the optimal grouping design. For the case of multiple tag signals, filling the same time slot, a binary splitting technique is applied to them while the remaining tags are added to a queue and processed later for identification. The system is evaluated using mathematical models followed by simulations where it is observed that the proposed technique outperforms the existing anticollision techniques employed in UHF RFID readers. The use of GBSA technique enhances the system throughput significantly while reducing the complexity of the system.

4. Security

RFID is set to become one of the core technologies powering the Internet of Things (IoT) networks [56]. However, with ever growing deployments and the presence of tags everywhere, the privacy concerns are growing. The reader to tag transmission is prone to eavesdropping operations exposing personal information since the backscatter channel is of broadcast nature [57,58]. Several computationally simple cryptography algorithms have been proposed, but they have their limitations. Table 3 lists the few works we summarized associated with security in MIMO RFID systems. In case of a passive tag, eavesdropping attacks are common while active tags are prone to relay attacks. Recently, physical layer security (PLS) [59] techniques have shown themselves as a good alternative to cryptography algorithms as they can ensure proper secrecy and depends upon secrecy capacity. Little work has been done in the domain of backscatter link security employing PLS techniques. Yang et al. [60] investigate the PLS of a MIMO RFID system. A noise injection precoding technique is employed that is ideal for low resourced backscatter channel. Figure 7 details the RFID reader design for EPCglobal C1 Gen-2 tags with the eavesdropper transceiver. A multiantenna tag scenarios is examined with respect to the secrecy rate maximization (SRM) issue [61] by improving both the energy as well as the precoding matrix of the artificial noise at the receiver. The results obtained from the simulations suggest that the proposed technique performs quite well in terms of computational power and enhances secrecy rate of the communication.
In automotive domain, RFID based keyless entry [62,63] solutions are being adopted at a rapid pace. The passive keyless entry and start (PKES) [62,64] system enables a car to be unlocked after authentication without a physical key. However, this introduces several security challenges and security can be compromised if security of the system is weak making the system vulnerable to attacks. As discussed above, by employing multiple antennas, we can significantly improve the interrogation range of an RFID system, but it will require more sophisticated cryptographic schemes to be developed to enhance the security of the system. Jadoon et al. [65] proposed a sophisticated security technique for PKES systems whereby the reader has multiple antennas to intercept relay attacks. The proposed algorithm is based on HB (Hopper and Blum) [66,67] protocol which is computationally a lightweight algorithm and is modified for use in the proposed MIMO RFID systems. The system employs three antennas at different proximities to deter relay attacks. It is observed through simulation results that the proposed algorithm achieves its intended tasks without compromising the performance of the system while providing protection against relay attacks.
Table 3. Comparison of various security schemes for MIMO RFID.
Table 3. Comparison of various security schemes for MIMO RFID.
PaperAlgorithmLayerAttackTechniqueRx Antennas
Yang et al. [60]Projected GradientPhysicalPassive EavesdropperBackscatter2
Jadoon et al. [65]Modified HBPhysicalRelay AttackChallenge Response3

5. Discussion

This paper is an attempt to briefly review the literature related to MIMO RFID systems including academic journals and conference proceedings from the past decade. In doing so, we provide a general outline of the various domains being targeted in the past and present research. With saturation in the traditional RFID systems research and the great potential of multi-antenna systems, more researchers will shift in favor of empirical and theoretical studies in MIMO RFID systems. As explained in the previous sections, the recent MIMO RFID research carried out in the past decade can be divided into three main categories: estimation, anti-collision, and security. The main challenges addressed in the literature were (a) reducing reader to reader interference, (b) bit error rate and capacity improvement through spatial multiplexing, (c) minimizing channel estimation error, (d) collision recovery, and (e) improved security against eavesdropping and relay attacks. While in some papers, authors have developed theoretical frameworks, the work is still in its early phases and further methods and modeling tools need to be designed for evaluating various aspects MIMO RFID systems. It was observed that very few efforts have been undertaken to study the performance improvements of multi-antenna tag designs, which can help improve the sensitivity and range compared to a single antenna tag at the cost of higher cost and power requirements [68]. Similarly, dual-frequency tags (operating both in UHF and GHz band) have only been studied for MIMO RFID systems in [28] and needs to be further evaluated for the enhanced power level allowances in the GHz band. Majority of the articles we reviewed were related to the anti-collision algorithm designs and bulk reading scenarios as this is an area where MIMO RFID systems can improve the gains manyfold. Several algorithms have proposed for improving tag reading times and accuracy. Though many efforts have been carried out to address security issues in RFID systems [69,70,71], further research needs to be conducted in the MIMO context as multiple antenna systems become more prevalent. There are almost no studies on the cost impacts of multi-antenna systems and specific application scenarios where spatial multiplexing can provide higher gains over traditional RFID systems.

6. Conclusions

The state-of-art in MIMO RFID systems was briefly explored and some of the recently proposed algorithms were detailed. We summarized some of the significant improvements achieved through promising new techniques in estimating both the number of tags and fading channel. We have provided a brief survey in some of the recent developments related to MIMO RFID systems, the protocols and algorithms used, and improvements achieved. While doing so, we looked at several recent works that explored MIMO techniques for RFID receivers. Various passive UHF RFID implementations were considered that employed multiple antennas at the reader and single or multiple antennas at each tag. As shown in Table 1, Table 2 and Table 3, a number of recent algorithms have been designed to tackle the issues associated with MIMO RFID systems. One of the key challenges is to keep the design of the RFID tag simple, cutting cost and power requirement when employing anti-collision schemes. The domain of MIMO based communication systems is already quite complex but the computational and power limitations as a unique case of RFID systems makes it more complex. There is a strong need for exploring low cost, low power algorithms for passive UHF RFID systems that are able to enhance various performance metrics without overburdening the system and also stay within the boundaries of the prevalent standards such as EPCglobal Class 1 Gen 2.

Author Contributions

Conceptualization, M.A. and M.M.; methodology, S.A.H.A.; investigation, F.R.A.-O.; resources, S.A.H.A.; data curation, S.A.H.A.; writing—original draft preparation, M.M.; writing—review and editing, M.M.; visualization, F.R.A.-O.; supervision, F.A.; project administration, M.A.; funding acquisition, M.A. All authors have read and agreed to the published version of the manuscript.

Funding

This work was funded by National Science, Technology and Innovation Plan (MAARIFAH), King Abdulaziz City for Science and Technology (KACST), Kingdom of Saudi Arabia, grant number (14-ELE1448-10).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

We thank Department of Computer Engineering, College of Computer Information Systems, Umm Al Qura University, Makkah, Saudi Arabia for their logistic support.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Weinstein, R. Rfid: A Technical Overview and Its Application to the Enterprise. IT Prof. 2005, 7, 27–33. [Google Scholar] [CrossRef]
  2. Landt, J. The History of Rfid. IEEE Potentials 2005, 24, 8–11. [Google Scholar] [CrossRef]
  3. Want, R. An Introduction to Rfid Technology. IEEE Pervasive Comput. 2006, 5, 25–33. [Google Scholar] [CrossRef]
  4. Domdouzis, K.; Kumar, B.; Anumba, C. Radio-Frequency Identification (Rfid) Applications: A Brief Introduction. Adv. Eng. Inform. 2007, 21, 350–355. [Google Scholar] [CrossRef]
  5. Nath, B.; Reynolds, F.; Want, R. Rfid Technology and Applications. IEEE Pervasive Comput. 2006, 5, 22–24. [Google Scholar] [CrossRef]
  6. Klaus, F. Rfid Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification; Wiley: Hoboken, NJ, USA, 2003; ISBN 0470844027. [Google Scholar]
  7. Deak, G.; Curran, K.; Condell, J. A Survey of Active and Passive Indoor Localisation Systems. Comput. Commun. 2012, 35, 1939–1954. [Google Scholar] [CrossRef]
  8. Chawla, V.; Ha, D.S. An Overview of Passive Rfid. IEEE Commun. Mag. 2007, 45, 11–17. [Google Scholar] [CrossRef]
  9. Nikitin, P.V.; Rao, K.V.S. Performance Limitations of Passive Uhf Rfid Systems. In Proceedings of the 2006 IEEE Antennas and Propagation Society International Symposium, Albuquerque, NM, USA, 9–14 July 2006. [Google Scholar]
  10. De Vita, G.; Iannaccone, G. Design Criteria for the Rf Section of Uhf and Microwave Passive Rfid Transponders. IEEE Trans. Microw. Theory 2005, 53, 2978–2990. [Google Scholar] [CrossRef]
  11. Yeager, D.; Zhang, F.; Zarrasvand, A.; Otis, B.P. A 9.2 µa Gen 2 Compatible Uhf Rfid Sensing Tag with−12dbm Sensitivity and 1.25 µvrms Input-Referred Noise Floor. In Proceedings of the 2010 IEEE International Solid-State Circuits Conference-(ISSCC), San Francisco, CA, USA, 7–11 February 2010. [Google Scholar]
  12. Nikitin, P.V.; Rao, K.V.S. Gain Measurement of Antennas Using Rfid. In Proceedings of the 2011 IEEE International Symposium on Antennas and Propagation (APSURSI), Spokane, WA, USA, 3–8 July 2011. [Google Scholar]
  13. Jones, A.K.; Dontharaju, S.; Tung, S.; Hawrylak, P.J.; Mats, L.; Hoare, R.; Cain, J.; Mickle, M. Passive Active Radio Frequency Identification Tags. Int. J. Radio Freq. Identif. Technol. 2006, 1, 52–73. [Google Scholar] [CrossRef]
  14. Griffin, J.D.; Durgin, G.D. Multipath Fading Measurements for Multi-Antenna Backscatter Rfid at 5.8 Ghz. In Proceedings of the 2009 IEEE International Conference on RFID, Orlando, FL, USA, 27–28 April 2009. [Google Scholar]
  15. Kim, D.; Ingram, M.A.; Smith, W.W. Measurements of Small-Scale Fading and Path Loss for Long Range Rf Tags. IEEE Trans. Antennas 2003, 51, 1740–1749. [Google Scholar]
  16. Griffin, J.D.; Durgin, G.D. Gains for Rf Tags Using Multiple Antennas. IEEE Trans. Antennas 2008, 56, 563–570. [Google Scholar] [CrossRef]
  17. Bekkali, A.; Zou, S.; Kadri, A.; Crisp, M.; Penty, R.V. Performance Analysis of Passive Uhf Rfid Systems under Cascaded Fading Channels and Interference Effects. IEEE Trans. Wirel. Commun. 2014, 14, 1421–1433. [Google Scholar] [CrossRef] [Green Version]
  18. Lasser, G.; Langwieser, R.; Mecklenbräuker, C.F. Automatic Leaking Carrier Canceller Adjustment Techniques. EURASIP J. Embed. Syst. 2013, 2013, 8. [Google Scholar] [CrossRef] [Green Version]
  19. Phillips, T.; Karygiannis, T.; Kuhn, R. Security Standards for the Rfid Market. IEEE Secur. Priv. 2005, 3, 85–89. [Google Scholar] [CrossRef]
  20. Zhang, J.; Periaswamy, S.C.G.; Mao, S.; Patton, J. Standards for Passive Uhf Rfid. GetMobile Mob. Comput. Commun. 2020, 23, 10–15. [Google Scholar] [CrossRef]
  21. He, C.; Chen, X.; Wang, Z.J.; Su, W. On the Performance of Mimo Rfid Backscattering Channels. EURASIP J. Wirel. Commun. Netw. 2012, 2012, 357. [Google Scholar] [CrossRef] [Green Version]
  22. Zheng, F.; Kaiser, T. A Space-Time Coding Approach for Rfid Mimo Systems. EURASIP J. Embed. Syst. 2012, 2012, 9. [Google Scholar] [CrossRef] [Green Version]
  23. Yoon, H.; Jang, B.-J. Link Budget Calculation for Uhf Rfid Systems. Microw. J. 2008, 51, 64–74. [Google Scholar]
  24. Kim, D.; Jo, H.; Yoon, H.; Mun, C.; Jang, B.; Yook, J. Reverse-Link Interrogation Range of a Uhf Mimo-Rfid System in Nakagami-M Fading Channels. IEEE Trans. Ind. Electron. 2010, 57, 1468–1477. [Google Scholar]
  25. Langwieser, R.; Angerer, C.; Scholtz, A.L. A Uhf Frontend for Mimo Applications in Rfid. In Proceedings of the 2010 IEEE Radio and Wireless Symposium (RWS), New Orleans, LA, USA, 10–14 January 2010. [Google Scholar]
  26. Poutanen, J.; Salmi, J.; Haneda, K.; Kolmonen, V.-M.; Vainikainen, P. Angular and Shadowing Characteristics of Dense Multipath Components in Indoor Radio Channels. IEEE Trans. Antennas 2010, 59, 245–253. [Google Scholar] [CrossRef]
  27. Li, J.; Ai, B.; He, R.; Yang, M.; Zhong, Z. On Modeling of Dense Multipath Component for Indoor Massive Mimo Channels. IEEE Antennas Wirel. Propag. Lett. 2019, 18, 526–530. [Google Scholar] [CrossRef]
  28. Grebien, S.; Galler, F.; Neunteufel, D.; Mühlmann, U.; Maier, S.J.; Arthaber, H.; Witrisal, K. Experimental Evaluation of a Uhf-Mimo Rfid System for Positioning in Multipath Channels. In Proceedings of the 2019 IEEE International Conference on RFID Technology and Applications (RFID-TA), Pisa, Italy, 25–27 September 2019. [Google Scholar]
  29. Duangsuwan, S.; Promwong, S. Rfid Reader Receiver Using Blind Signal Estimation for Multiuser Detection. Int. J. Inf. Electron. Eng. 2014, 4, 153. [Google Scholar] [CrossRef]
  30. Muzamane, H.A.; Liu, H.-C. Experimental Results and Performance Analysis of a 1 × 2 × 1 Uhf Mimo Passive Rfid System. Sensors 2021, 21, 6308. [Google Scholar] [CrossRef] [PubMed]
  31. Khelladi, M.F.; Metref, A.; Fergani, B. Request Efficient Channel Estimation Method for Mimo Passive Rfid Systems. In Proceedings of the 2015 IEEE International Conference on RFID (RFID), San Diego, CA, USA, 15–17 April 2015. [Google Scholar]
  32. Chen, S.; Zhong, S.; Yang, S.; Wang, X. A Multiantenna Rfid Reader with Blind Adaptive Beamforming. IEEE Internet Things J. 2016, 3, 986–996. [Google Scholar] [CrossRef]
  33. Boyer, C.; Roy, S. —Invited Paper—Backscatter Communication and Rfid: Coding, Energy, and Mimo Analysis. IEEE Trans. Commun. 2013, 62, 770–785. [Google Scholar] [CrossRef]
  34. Su, J.; Sheng, Z.; Leung, V.C.M.; Chen, Y. Energy Efficient Tag Identification Algorithms for Rfid: Survey, Motivation and New Design. IEEE Wirel. Commun. Lett. 2019, 26, 118–124. [Google Scholar] [CrossRef]
  35. Chen, W. An Accurate Tag Estimate Method for Improving the Performance of an Rfid Anticollision Algorithm Based on Dynamic Frame Length Aloha. IEEE Trans. Autom. Sci. Eng. 2009, 6, 9–15. [Google Scholar] [CrossRef]
  36. Yu, J.; Chen, L. Stability Analysis of Frame Slotted Aloha Protocol. In Tag Counting and Monitoring in Large-Scale Rfid Systems: Theoretical Foundations and Algorithm Design; Yu, J., Chen, L., Eds.; Springer International Publishing: Cham, Switzerland, 2019; pp. 7–42. [Google Scholar]
  37. Wu, H.; Zeng, Y. Bayesian Tag Estimate and Optimal Frame Length for Anti-Collision Aloha Rfid System. IEEE Trans. Autom. Sci. Eng. 2010, 7, 963–969. [Google Scholar] [CrossRef]
  38. Bharadia, D.; Katti, S. Full Duplex {Mimo} Radios. In Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14), Seattle, WA, USA, 2–4 April 2014. [Google Scholar]
  39. Zeng, Y.; Ding, H. A Physical-Layer Uhf Rfid Tag Collision Resolution Based on Miller Code. Wirel. Commun. Mob. Comput. 2021, 2021, 6636846. [Google Scholar] [CrossRef]
  40. Salah, H.; Ahmed, H.A.; Robert, J.; Heuberger, A. Multi-Antenna Uhf Rfid Reader Utilizing Stimulated Rate Tolerance. IEEE J. Radio Freq. Identif. 2017, 1, 124–134. [Google Scholar] [CrossRef]
  41. Cheng, X.; Liu, C. Research on Rfid Collision Detection Algorithm Based on the Underdetermined Blind Separation. In Proceedings of the 2016 4th International Conference on Machinery, Materials and Computing Technology, Hangzhou, China, 23–24 January 2016. [Google Scholar]
  42. Su, J.; Sheng, Z.; Xie, L. A Collision-Tolerant-Based Anti-Collision Algorithm for Large Scale Rfid System. IEEE Commun. Lett. 2017, 21, 1517–1520. [Google Scholar] [CrossRef]
  43. Deng, W.; Li, Z.; Xia, Y.; Wang, K.; Pei, W. A Widely Linear Mmse Anti-Collision Method for Multi-Antenna Rfid Readers. IEEE Commun. Lett. 2019, 23, 644–647. [Google Scholar] [CrossRef]
  44. Salah, H.; Robert, J.; Ahmed, H.A.; Mahmoud, K.; Heuberger, A. Theoretical Performance Evaluation of Uhf-Rfid Systems with Multi-Antenna Maximum-Likelihood Decoding. IEEE J. Radio Freq. Identif. 2019, 3, 108–117. [Google Scholar] [CrossRef]
  45. Deng, W.; Xia, Y.; Li, Z.; Pu, R.; Pei, W. A High-Dimensional Collided Tag Quantity Estimation Method for Multi-Antenna Rfid Systems. IEEE Commun. Lett. 2021, 25, 132–136. [Google Scholar] [CrossRef]
  46. Su, J.; Sheng, Z.; Liu, A.X.; Han, Y.; Chen, Y. A Group-Based Binary Splitting Algorithm for Uhf Rfid Anti-Collision Systems. IEEE Trans. Commun. 2020, 68, 998–1012. [Google Scholar] [CrossRef] [Green Version]
  47. Abbasian, A.; Safkhani, M. Cncaa: A New Anti-Collision Algorithm Using Both Collided and Non-Collided Parts of Information. Comput. Netw. 2020, 172, 107159. [Google Scholar] [CrossRef]
  48. Klair, D.K.; Chin, K.-W.; Raad, R. A Survey and Tutorial of Rfid Anti-Collision Protocols. IEEE Commun. Surv. Tutor. 2010, 12, 400–421. [Google Scholar] [CrossRef] [Green Version]
  49. Feng, S.; Wang, M.; Yan, J.; Zhu, Y.; Li, Z. Independent Component Analysis Based Tag Anti-Collision Algorithm in Multi-Antenna Radio Frequency Identification. In Proceedings of the 2015 5th International Conference on Information Science and Technology (ICIST), Changsha, China, 24–26 April 2015. [Google Scholar]
  50. Ullah, S.; Alsalih, W.; Alsehaim, A.; Alsadhan, N. A Review of Tags Anti-Collision and Localization Protocols in Rfid Networks. J. Med. Syst. 2012, 36, 4037–4050. [Google Scholar] [CrossRef]
  51. Angerer, C.; Langwieser, R.; Rupp, M. Rfid Reader Receivers for Physical Layer Collision Recovery. IEEE Trans. Commun. 2010, 58, 3526–3537. [Google Scholar] [CrossRef]
  52. Bratuž, I.; Vodopivec, A.; Trost, A. Resolving Collision in Epcglobal Class-1 Gen-2 System by Utilizing the Preamble. IEEE Trans. Wirel. Commun. 2014, 13, 5330–5339. [Google Scholar] [CrossRef]
  53. Šolić, P.; Maras, J.; Radić, J.; Blažević, Z. Comparing Theoretical and Experimental Results in Gen2 Rfid Throughput. IEEE Trans. Autom. Sci. Eng. 2016, 14, 349–357. [Google Scholar] [CrossRef]
  54. Eom, J.B.; Yim, S.-B.; Lee, T.J. An Efficient Reader Anticollision Algorithm in Dense Rfid Networks with Mobile Rfid Readers. IEEE Trans. Ind. Electron. 2009, 56, 2326–2336. [Google Scholar]
  55. Bueno-Delgado, M.V.; Pavón-Mariño, P. A Maximum Likelihood-Based Distributed Protocol for Passive Rfid Dense Reader Environments. J. Supercomput. 2013, 64, 456–476. [Google Scholar] [CrossRef]
  56. Landaluce, H.; Arjona, L.; Perallos, A.; Falcone, F.; Angulo, I.; Muralter, F. A Review of Iot Sensing Applications and Challenges Using Rfid and Wireless Sensor Networks. Sensors 2020, 20, 2495. [Google Scholar] [CrossRef] [PubMed]
  57. Zhang, Y.; Gao, F.; Fan, L.; Lei, X.; Karagiannidis, G.K. Secure Communications for Multi-Tag Backscatter Systems. IEEE Wirel. Commun. Lett. 2019, 8, 1146–1149. [Google Scholar] [CrossRef]
  58. Saad, W.; Han, Z.; Poor, H.V. On the Physical Layer Security of Backscatter Rfid Systems. In Proceedings of the 2012 International Symposium on Wireless Communication Systems (ISWCS), Paris, France, 28–31 August 2012. [Google Scholar]
  59. Wyner, A.D. The Wire-Tap Channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  60. Yang, Q.; Wang, H.; Zhang, Y.; Han, Z. Physical Layer Security in Mimo Backscatter Wireless Systems. IEEE Trans. Wirel. Commun. 2016, 15, 7547–7560. [Google Scholar] [CrossRef]
  61. Luo, Y.; Pu, L.; Wang, G.; Zhao, Y. Rf Energy Harvesting Wireless Communications: Rf Environment, Device Hardware and Practical Issues. Sensors 2019, 19, 3010. [Google Scholar] [CrossRef] [Green Version]
  62. Francillon, A.; Danev, B.; Capkun, S. Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars. In Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, 6–9 February 2011. [Google Scholar]
  63. Wang, J.; Lounis, K.; Zulkernine, M. Cskes: A Context-Based Secure Keyless Entry System. In Proceedings of the 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), Milwaukee, WI, USA, 15–19 July 2019. [Google Scholar]
  64. Jeong, H.; So, J. Channel Correlation-Based Relay Attack Avoidance in Vehicle Keyless-Entry Systems. Electron. Lett. 2018, 54, 395–397. [Google Scholar] [CrossRef]
  65. Jadoon, A.K.; Wang, L.; Zia, M.A. Hb-Protocol Based Advance Security System for Pkes Using Multiple Antennas. China Commun. 2018, 15, 98–110. [Google Scholar]
  66. Hopper, N.J.; Blum, M. A Secure Human-Computer Authentication Scheme; Tech. Rep. CMU-CS-00-139; Carnegie Mellon University: Pittsburgh, PA, USA, 2000. [Google Scholar]
  67. Munilla, J.; Peinado, A. Hb-Mp: A Further Step in the Hb-Family of Lightweight Authentication Protocols. Comput. Netw. 2007, 51, 2262–2267. [Google Scholar] [CrossRef]
  68. Mangal, V.; Atzeni, G.; Kinget, P.R. Multi-Antenna Directional Backscatter Tags. In Proceedings of the 2018 48th European Microwave Conference (EuMC), Madrid, Spain, 23–27 September 2018. [Google Scholar]
  69. Pateriya, R.K.; Sharma, S. The Evolution of Rfid Security and Privacy: A Research Survey. In Proceedings of the 2011 International Conference on Communication Systems and Network Technologies, Katra, India, 3–5 June 2011. [Google Scholar]
  70. Munoz-Ausecha, C.; Ruiz-Rosero, J.; Ramirez-Gonzalez, G. Rfid Applications and Security Review. Computation 2021, 9, 69. [Google Scholar] [CrossRef]
  71. Juels, A. Rfid Security and Privacy: A Research Survey. IEEE J. Sel. Areas Commun. 2006, 24, 381–394. [Google Scholar] [CrossRef]
Figure 1. A typical MIMO RFID system.
Figure 1. A typical MIMO RFID system.
Sensors 22 04115 g001
Figure 2. (a) Mono-static RFID Reader (b) Bi-static RFID Reader. Reproduced from [24] with permission from IEEE.
Figure 2. (a) Mono-static RFID Reader (b) Bi-static RFID Reader. Reproduced from [24] with permission from IEEE.
Sensors 22 04115 g002
Figure 3. Architecture of the multi receive antenna RFID system. Reproduced from [31] with permission from IEEE.
Figure 3. Architecture of the multi receive antenna RFID system. Reproduced from [31] with permission from IEEE.
Sensors 22 04115 g003
Figure 4. (a) Full duplex RFID Reader; (b) Half duplex RFID Reader. Reproduced from [32] with permission from IEEE.
Figure 4. (a) Full duplex RFID Reader; (b) Half duplex RFID Reader. Reproduced from [32] with permission from IEEE.
Sensors 22 04115 g004
Figure 5. Multi-antenna RFID Reader with collision recovery. Reproduced from [40] with permission from IEEE.
Figure 5. Multi-antenna RFID Reader with collision recovery. Reproduced from [40] with permission from IEEE.
Sensors 22 04115 g005
Figure 6. Flowchart of the tag recovery scheme. Reproduced from [45] with permission from IEEE.
Figure 6. Flowchart of the tag recovery scheme. Reproduced from [45] with permission from IEEE.
Sensors 22 04115 g006
Figure 7. MIMO RFID system with a passive eavesdropper. Reproduced from [60] with permission from IEEE.
Figure 7. MIMO RFID system with a passive eavesdropper. Reproduced from [60] with permission from IEEE.
Sensors 22 04115 g007
Table 2. Comparison of various anti-collision techniques.
Table 2. Comparison of various anti-collision techniques.
PaperAlgorithmStandardChannelRx Antennas
Salah et al. [40]NME + MFEPCglobal C1 Gen-2Double Rayleigh2, 4
Cheng et al. [41]Two Step Method-Noise3
Jian et al. [42]CE-DFSAEPCglobal C1 Gen-2Block Fading -
Deng et al. [43]WLMMSEISO 18000-6CQuasi-static Rayleigh4
Salah et al. [44]MLEPCglobal C1 Gen-2Double Rayleigh2, 4, 8
Deng et al. [45]DBSCANEPCglobal C1 Gen-2Uncorrelated Rayleigh4
Su et al. [46]GBSAEPCglobal C1 Gen-2Noise-less1
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Alotaibi, M.; Murad, M.; Alhuthali, S.A.H.; Al-Osaimi, F.R.; Aldosari, F. MIMO Radio Frequency Identification: A Brief Survey. Sensors 2022, 22, 4115. https://doi.org/10.3390/s22114115

AMA Style

Alotaibi M, Murad M, Alhuthali SAH, Al-Osaimi FR, Aldosari F. MIMO Radio Frequency Identification: A Brief Survey. Sensors. 2022; 22(11):4115. https://doi.org/10.3390/s22114115

Chicago/Turabian Style

Alotaibi, Majid, Mohsin Murad, Shakir A. H. Alhuthali, Faisal R. Al-Osaimi, and Fahd Aldosari. 2022. "MIMO Radio Frequency Identification: A Brief Survey" Sensors 22, no. 11: 4115. https://doi.org/10.3390/s22114115

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop