The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - February (2011 vol.10)
pp: 267-279
Gaia Maselli , University of Rome "La Sapienza", Rome
Thomas F. La Porta , The Pennsylvania State University, University Park
ABSTRACT
One of the major challenges in the use of Radio Frequency-based Identification (RFID) on a large scale is the ability to read a large number of tags quickly. Central to solving this problem is resolving collisions that occur when multiple tags reply to the query of a reader. To this purpose, several MAC protocols for passive RFID systems have been proposed. These typically build on traditional MAC schemes, such as aloha and tree-based protocols. In this paper, we propose a new performance metric by which to judge these anticollision protocols: time system efficiency. This metric provides a direct measure of the time taken to read a group of tags. We then evaluate a set of well-known RFID MAC protocols in light of this metric. Based on the insights gained, we propose a new anticollision protocol, and show that it significantly outperforms previously proposed mechanisms.
INDEX TERMS
RFID, passive tags, single reader, anticollision, MAC protocols.
CITATION
Gaia Maselli, Thomas F. La Porta, "Anticollision Protocols for Single-Reader RFID Systems: Temporal Analysis and Optimization", IEEE Transactions on Mobile Computing, vol.10, no. 2, pp. 267-279, February 2011, doi:10.1109/TMC.2010.58
REFERENCES
[1] D.W. ENGELS, "The Reader Collision Problem," AUTO-ID CENTER, 2001.
[2] D.W. Engels and S.E. Sarma, "The Reader Collision Problem," Proc. IEEE Int'l Conf. Systems, Man, and Cybernetics, vol. 3, Oct. 2002.
[3] S. Zhou, Z. Luo, E. Wong, C. Tan, and J. Luo, "Interconnected RFID Reader Collision Model and Its Application in Reader Anti-Collision," Proc. IEEE Int'l Conf. Radio Frequency Identification (RFID '07), Mar. 2007.
[4] D.-H. Shih, P.-L. Sun, D.C. Yen, and S.-M. Huang, "Taxonomy and Survey of RFID Anti-Collision Protocols," Elsevier Computer Comm., vol. 29, pp. 2150-2166, 2006.
[5] M. Kodialam and T. Nandagopal, "Fast and Reliable Estimation Schemes in RFID Systems," Proc. ACM MobiCom, pp. 322-333, 2006.
[6] N. Abramson, "The Aloha System—Another Alternative for Computer Communications," Proc. Full Joint Computer Conf. Am. Federation of Information Processing Soc. (AFIPS), vol. 37, pp. 281-285, 1970.
[7] J. Capetanakis, "Tree Algorithms for Packet Broadcast Channels," IEEE Trans. Information Theory, vol. 25, no. 5, pp. 505-515, Sept. 1979.
[8] "EPC Radio-Frequency Identification Protocols Class-1 Gen-2 UHF RFID Protocol for Communications at 860MHz-960MHz, EPCglobal," http://www.epcglobalinc.org/standardsuhfc1g2 , Dec. 2004.
[9] J. Massey, "Collision Resolution Algorithms and Random-Access Communication," Report UCLA-ENG-8016, Univ. of California, Los Angeles, 1981.
[10] J. Myung and W. Lee, "Adaptive Binary Splitting: A RFID Tag Collision Arbitration Protocol for Tag Identification," Mobile Networks Applications, vol. 11, no. 5, pp. 711-722, 2006.
[11] C. Law, K. Lee, and K.-Y. Siu, "Efficient Memoryless Protocol for Tag Identification (Extended Abstract)," Proc. ACM Discrete Algorithms and Methods for Mobile Computing and Comm. (DIALM '00), pp. 75-84, 2000.
[12] F.B.M. Cesana, "Arpa: An Arbitration Protocol Based on Advanced Channel Feedback for Radio Frequency Identification," Proc. IEEE Int'l Conf. Wireless and Mobile Computing, Networking and Comm. (WIMOB '08), pp. 178-183, Oct. 2008.
[13] M. Bonuccelli, F. Lonetti, and F. Martelli, "Instant Collision Resolution for Tag Identification in RFID Networks," Ad Hoc Networks, pp. 1220-1232, 2007.
[14] S.-R. Lee, S.-D. Joo, and C.-W. Lee, "An Enhanced Dynamic Framed Slotted Aloha Algorithm for RFID Tag Identification," Proc. IEEE MOBIQUITOUS, pp. 166-174, 2005.
[15] D. Klair, K.-W. Chin, and R. Raad, "On the Accuracy of RFID Tag Estimation Functions," Proc. Int'l Symp. Comm. and Information Technologies, (ISCIT '07), pp. 1401-1406, 2007.
[16] H. Vogt, "Efficient Object Identification with Passive RFID Tags," Proc. Int'l Conf. Pervasive Computing (Pervasive '02), pp. 98-113, Springer, 2002.
[17] J.-R. Cha and J.-H. Kim, "Dynamic Framed Slotted Aloha Algorithms Using Fast Tag Estimation Method for RFID System," Proc. IEEE Consumer Comm. and Networking Conf. (CCNC '06), vol. 2, pp. 768-772, Jan. 2006.
[18] L. Devroye, "The Height and Size of Random Hash Trees and Random Pebbled Hash Trees," SIAM J. Computing, vol. 28, no. 4 pp. 1215-1224, 1999.
[19] G. Maselli, C. Petrioli, and C. Vicari, "Dynamic Tag Estimation for Optimizing Tree Slotted Aloha in Rfid Networks," Proc. 11th Symp. Modeling, Analysis and Simulation of Wireless, and Mobile Systems (MSWiM '08), pp. 315-322, 2008.
[20] "The Network Simulator—ns-2," http://www.isi.edu/nsnamns, 2010.
[21] G. Bagnato, G. Maselli, C. Petrioli, and C. Vicari, "Performance Analysis of Anti-Collision Protocols for RFID Systems," Proc. IEEE 69th Vehicular Technology Conf. (VTC Spring' 09), pp. 1-5, Apr. 2009.
5 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool