Next century challenges: mobile networking for “Smart Dust”
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
Inferring Activities from Interactions with Objects
IEEE Pervasive Computing
Battery-free Wireless Identification and Sensing
IEEE Pervasive Computing
RFID-based techniques for human-activity detection
Communications of the ACM - Special issue: RFID
The RFID technology for neurosciences: feasibility of limbs' monitoring in sleep diseases
IEEE Transactions on Information Technology in Biomedicine
Watermarking-based intellectual property protection for sensor streaming data
International Journal of Computer Applications in Technology
Hi-index | 0.00 |
This paper reports the first use of ID Modulation to embed a bitstream representing sensor information in a standards-compliant Radio Frequency Identification (RFID) channel. Like other forms of information hiding, ID Modulation embeds a new, lower bit-rate channel in a pre-existing host channel, without requiring any changes to the protocols defining the host channel. Like most other forms of information hiding, the embedded data is represented as correlations introduced into the host channel data stream. Most previous applications of information hiding have emphasized either secrecy (as in steganography) or robustness to removal (as in watermarking). The benefit of information hiding that is most important for the application reported here is backward compatibility with pre-existing standards and hardware. It has allowed us to build a new communication layer (for transmitting sensor data) on top of current RFID infrastructure.