Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

TECHNICAL SEMINAR REPORT

ON

“An Overview Of Near Field UHF RFID System”

A technical project report submitted in the partial fulfillment of the


requirement for the Degree of Bachelor of Technology under BPUT

Submitted By

DEEPAK ROUT

Reg.No. : 0701227284

Section : 7ET2(A)

Department
Of
Electronics and Telecommunication Engineering
C. V. Raman College of Engineering
ACKNOWLEDGEMENT

I would like to avail this opportunity to extend my heartiest thanks to


Prof. S. Mohapatra , Department Of Electronics & Telecommunication
Engineering, for her guidance and constant encouragement that has lead to the
successful completion of this seminar report.

I am also highly indebted to Prof. Annapurna Mishra, seminar coordinator, for


her constant support and valuable advice when they were most required.

I would also like to show my deepest regards to all the faculty members of
Electronics & Telecommunication Engineering Department for their kind advice
and constant support.

Finally I would like to thank all my friends and well-wishers for their help and
suggestions.

Deepak Rout
Regd No : 0701227284
Section : 7ET 2(A)
ABSTRACT

IDENTIFICATION OF MALICIOUS NODES IN AODV NETWORK


THROUGH GUARD NODES

This paper presents a guard node based scheme to identify malicious nodes in Ad
hoc On-Demand Distance Vector (AODV) protocol. In this scheme each node
calculates trust level of its neighboring nodes for route selection. Trust calculation
process involves opinions of other nodes about the node whose trust level is to be
determined. If a neighboring node has a trust level lower than a predefined
threshold value, it is identified as malicious and it is not considered for route
selection. Simulation results show that the proposed scheme improves performance
of AODV by identifying and removing malicious nodes. Performance of the
scheme has been evaluated for four different types of malicious attacks (denial of
service attack, wormhole attack, impersonation attack, black hole attack).
CONTENTS
TITLES Pages

1. INTRODUCTION…………………………………………… 01

2. TRADITIONAL TECHNIQUE.…………………………….. 02

3. PRINCIPLE OF OPERATION……………………………… . 04

4. DESIGN PARAMETER………………………………….......... 10

5. NEAR FIELD UHF RFID SYSTEM.………………………… 13

6. MEASUREMENT………………………………………………. 15

7. PERFORMANCE………………………………………………. 17

8. ADVANTAGES & DISADVANTAGES ……………………… 18

9. APPLCATION………………………………………………. .. .. 20

10.FUTURE CHALLENGE……………………………………….. 21

11.CONCLUSION……………………………………………………22

12.REFERENCES……………………………………………………23
LIST OF FIGURES

Figure Pages

1. Configuration of RFID system …….…………………………… . 01

2. Working of Near Field RFID ……………………………………...04

3. Load Modulation……………………………………………….......06

4. Working Of Far field RFID………………………………………...07

5. Principle of Backscattering..………………………………….........08

6. Field Regions………………………………………………………10

7. Two Port Network Model………………………………………….12

8. Reader Antenna impedance……………………………………….15

9. Measurement Setup………………………………………………...16

10. Performance curves…………………………………………….....17

You might also like