{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,9]],"date-time":"2024-06-09T22:09:54Z","timestamp":1717970994986},"reference-count":31,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"abstract":"<jats:p>In recent years, indoor position has been an important role in many applications, such as production management, store management and shelves in supermarket or library. Much time and energy are exhausted because one object cannot be quickly and accurately located. Traditional indoor position systems have some problems, such as complicated software and hardware system, inaccurate position and high time complexity. In this paper, the authors propose an RFID-based collaborative information system, Tagrom, for indoor localization using COTS RFID readers and tags. Unlike former methods, Tagrom works with reference tags and phase of Passive UHF-RFID tags, which improves traditional distribution of reference tags and utilize RF phase replace of traditional RSSI or multipath profile to determine the position of target RFID tags.<\/jats:p>","DOI":"10.4018\/ijbdcn.2017070106","type":"journal-article","created":{"date-parts":[[2017,5,3]],"date-time":"2017-05-03T16:20:31Z","timestamp":1493828431000},"page":"69-82","source":"Crossref","is-referenced-by-count":5,"title":["Indoor Localization Using the Reference Tags and Phase of Passive UHF-RFID Tags"],"prefix":"10.4018","volume":"13","author":[{"given":"He","family":"Xu","sequence":"first","affiliation":[{"name":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China & Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ye","family":"Ding","sequence":"additional","affiliation":[{"name":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China & Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Peng","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China & Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ruchuan","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China & Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"2432","reference":[{"key":"ijbdcn.2017070106-0","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2011.5764607"},{"key":"ijbdcn.2017070106-1","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2012.6193042"},{"key":"ijbdcn.2017070106-2","doi-asserted-by":"publisher","DOI":"10.1504\/IJSSC.2014.066002"},{"key":"ijbdcn.2017070106-3","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.12.047"},{"key":"ijbdcn.2017070106-4","doi-asserted-by":"publisher","DOI":"10.1504\/IJSSC.2016.076565"},{"key":"ijbdcn.2017070106-5","doi-asserted-by":"publisher","DOI":"10.1504\/IJSSC.2016.076572"},{"key":"ijbdcn.2017070106-6","doi-asserted-by":"crossref","unstructured":"Khan, W.Z., Saad, M.N.B.M., & Aalsalem, M.Y. (2013). Scrutinising well-known countermeasures against clone node attack in mobile wireless sensor networks. International Journal of Grid and Utility Computing, 4(2-3), 119-127.","DOI":"10.1504\/IJGUC.2013.056247"},{"key":"ijbdcn.2017070106-7","doi-asserted-by":"publisher","DOI":"10.1109\/GHTC-SAS.2014.6967573"},{"key":"ijbdcn.2017070106-8","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.157"},{"key":"ijbdcn.2017070106-9","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847960"},{"key":"ijbdcn.2017070106-10","doi-asserted-by":"publisher","DOI":"10.1016\/j.autcon.2013.06.012"},{"key":"ijbdcn.2017070106-11","doi-asserted-by":"publisher","DOI":"10.1023\/B:WINE.0000044029.06344.dd"},{"key":"ijbdcn.2017070106-12","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935166"},{"key":"ijbdcn.2017070106-13","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1145\/2348543.2348580","article-title":"Zee: Zero-effort crowdsourcing for indoor localization.","author":"A.Rai","year":"2012","journal-title":"Proceedings of the 18th annual international conference on Mobile computing and networking"},{"key":"ijbdcn.2017070106-14","doi-asserted-by":"publisher","DOI":"10.1109\/ICISCE.2015.177"},{"key":"ijbdcn.2017070106-15","doi-asserted-by":"publisher","DOI":"10.1504\/IJSSC.2011.040343"},{"key":"ijbdcn.2017070106-16","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906417"},{"key":"ijbdcn.2017070106-17","first-page":"251","article-title":"Relative Localization of RFID Tags using Spatial-Temporal Phase Profiling.","author":"L.Shangguan","year":"2015","journal-title":"Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation"},{"key":"ijbdcn.2017070106-18","doi-asserted-by":"publisher","DOI":"10.1117\/12.666712"},{"key":"ijbdcn.2017070106-19","doi-asserted-by":"publisher","DOI":"10.1504\/IJGUC.2015.070681"},{"key":"ijbdcn.2017070106-20","doi-asserted-by":"publisher","DOI":"10.1504\/IJGUC.2014.058232"},{"key":"ijbdcn.2017070106-21","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2010.0735"},{"key":"ijbdcn.2017070106-22","first-page":"71","article-title":"ArrayTrack: A Fine-Grained Indoor Location System.","author":"J.Xiong","year":"2013","journal-title":"Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation"},{"key":"ijbdcn.2017070106-23","doi-asserted-by":"publisher","DOI":"10.1504\/IJSSC.2011.040337"},{"key":"ijbdcn.2017070106-24","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639111"},{"key":"ijbdcn.2017070106-25","doi-asserted-by":"publisher","DOI":"10.1145\/2348543.2348578"},{"key":"ijbdcn.2017070106-26","doi-asserted-by":"publisher","DOI":"10.1504\/IJGUC.2016.073776"},{"key":"ijbdcn.2017070106-27","doi-asserted-by":"crossref","unstructured":"Zhang, Y., & Minier, M. (2013). How network coding system constrains packet pollution attacks in wireless sensor networks. International Journal of Grid and Utility Computing, 4(2-3), 197-203.","DOI":"10.1504\/IJGUC.2013.056256"},{"key":"ijbdcn.2017070106-28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymssp.2012.05.006"},{"key":"ijbdcn.2017070106-29","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2007.84"},{"key":"ijbdcn.2017070106-30","doi-asserted-by":"crossref","unstructured":"Zhu, Y.Q., Chen, H.G., & Wang, K.H. (2014). Consumer\u2019s acceptance of high-tech products: the case of RFID credit cards in Taiwan. International Journal of Technology Marketing, 9(2), 143-162.","DOI":"10.1504\/IJTMKT.2014.060089"}],"container-title":["International Journal of Business Data Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=181587","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,5]],"date-time":"2022-05-05T19:51:44Z","timestamp":1651780304000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijbdcn.2017070106"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":31,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.4018\/ijbdcn.2017070106","relation":{},"ISSN":["1548-0631","1548-064X"],"issn-type":[{"value":"1548-0631","type":"print"},{"value":"1548-064X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,7]]}}}