This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Multiple RFID Tags Access Algorithm
February 2010 (vol. 9 no. 2)
pp. 174-187
Weilian Su, Naval Postgraduate School, Monterey
Nikolaos V. Alchazidis, Naval Postgraduate School, Monterey
Tri T. Ha, Naval Postgraduate School, Monterey
One of the main problems that affect the data integrity of passive RFID systems is the collision between the tags. A popular anticollision algorithm which dominates the standards in HF and UHF passive RFID systems is Framed Slotted Aloha (FSA) and some variations of FSA. Throughput and average time delay of the RFID system which determines the performance/efficiency of the system are reduced rapidly when the number of tags inside the interrogation zone is increased. Using larger frame sizes is not always the solution. This paper discusses and compares the existing protocols, and proposes a variation of FSA, called Progressing Scanning (PS) algorithm. The PS algorithm divides the tags in the interrogation zone into smaller groups and gives the reader the ability to communicate with each of them. For performance analysis, the PS algorithm was evaluated with the parameters of a typical passive RFID system at 2.5 GHz. The results showed that the PS algorithm can improve the efficiency of the RFID system and provide a reliable solution for cases with a high density of tags in the area (over 800 tags).

[1] K. Finkenzeller, RFID Handbook, Fundamentals and Applications in Contactless Smart Cards and Identification, second ed. Wiley, 2004.
[2] S. Lahiri, RFID Sourcebook. IBM Press, 2005.
[3] J. Cha and J. Kim, “Novel Anti-Collision Algorithms for Fast Object Identification in RFID System,” IEEE Proc. 2005 11th Int'l Conf. Parallel and Distributed Systems (ICPADS), vol. 2, pp. 63-67, July 2005.
[4] http:/www.epcglobalinc.org, 2009.
[5] F.C. Schoute, “Dynamic Frame Length ALOHA,” IEEE Trans. Comm., vol. 31, no. 4, pp. 565-568, Apr. 1983.
[6] H. Vogt, “Efficient Object Identification with Passive RFID Tags,” Proc. Int'l Conf. Pervasive Computing, pp. 98-113, Apr. 2002.
[7] H. Vogt, “Multiple Object Identification with Passive RFID Tags,” Proc. IEEE Int'l Conf. Systems, Man and Cybernetics (SMC '02), vol. 3, pp. 4-9, Oct. 2002.
[8] S. Lee, S. Joo, and C. Lee, “An Enhanced Dynamic Framed Slotted ALOHA Algorithm for RFID Tag Identification,” Proc. Second Ann. Int'l Conf. Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous '05), pp. 166-172, July 2005.
[9] ISO/IEC, “18000 Part 4: Parameters for Air Interface Communications at 2.45 GHz,” ISO, 2004.
[10] T.S. Rappaport, Wireless Communications—Principles and Practices, second ed. Prentice Hall, 2002.
[11] R. Bridgelall, “Bluetooth/802.11 Protocol Adaptation for RFID Tags,” Symbol Technologies, RFDESIGN, July 2002.
[12] G.D. Vita and G. Iannaccone, “Design Criteria for the RF Section of UHF and Microwave Passive RFID Transponders,” IEEE Trans. Microwave Theory and Techniques, vol. 53, no. 9, pp. 2978-2990, Sept. 2005.
[13] P. Sorrells, Passive RFID Basics, AN680, DS00680B, Microchip Technology, Inc., pp. 1-5, 1998.
[14] F. Zhou, C. Chen, D. Jim, C. Huang, and H. Min, “Evaluation and Optimizing Power Consumption of Anticollision Protocols for Applications in RFID Systems,” Proc. Int'l Symp. Low Power Electronics and Design (ISLPED '04), pp. 357-362, Aug. 2004.
[15] F. Borgonovo and M. Zorzi, “Slotted ALOHA and CDPA: A Comparison of Channel Access,” Wireless Networks, vol. 3, pp. 43-51, 1997.

Index Terms:
Passive RFID systems, tags, framed slotted aloha, collisions, data integrity, progressing scanning algorithm.
Citation:
Weilian Su, Nikolaos V. Alchazidis, Tri T. Ha, "Multiple RFID Tags Access Algorithm," IEEE Transactions on Mobile Computing, vol. 9, no. 2, pp. 174-187, Feb. 2010, doi:10.1109/TMC.2009.106
Usage of this product signifies your acceptance of the Terms of Use.