The Community for Technology Leaders
RSS Icon
Issue No.02 - February (2011 vol.10)
pp: 267-279
Gaia Maselli , University of Rome "La Sapienza", Rome
Thomas F. La Porta , The Pennsylvania State University, University Park
One of the major challenges in the use of Radio Frequency-based Identification (RFID) on a large scale is the ability to read a large number of tags quickly. Central to solving this problem is resolving collisions that occur when multiple tags reply to the query of a reader. To this purpose, several MAC protocols for passive RFID systems have been proposed. These typically build on traditional MAC schemes, such as aloha and tree-based protocols. In this paper, we propose a new performance metric by which to judge these anticollision protocols: time system efficiency. This metric provides a direct measure of the time taken to read a group of tags. We then evaluate a set of well-known RFID MAC protocols in light of this metric. Based on the insights gained, we propose a new anticollision protocol, and show that it significantly outperforms previously proposed mechanisms.
RFID, passive tags, single reader, anticollision, MAC protocols.
Gaia Maselli, Thomas F. La Porta, "Anticollision Protocols for Single-Reader RFID Systems: Temporal Analysis and Optimization", IEEE Transactions on Mobile Computing, vol.10, no. 2, pp. 267-279, February 2011, doi:10.1109/TMC.2010.58
[1] D.W. ENGELS, "The Reader Collision Problem," AUTO-ID CENTER, 2001.
[2] D.W. Engels and S.E. Sarma, "The Reader Collision Problem," Proc. IEEE Int'l Conf. Systems, Man, and Cybernetics, vol. 3, Oct. 2002.
[3] S. Zhou, Z. Luo, E. Wong, C. Tan, and J. Luo, "Interconnected RFID Reader Collision Model and Its Application in Reader Anti-Collision," Proc. IEEE Int'l Conf. Radio Frequency Identification (RFID '07), Mar. 2007.
[4] D.-H. Shih, P.-L. Sun, D.C. Yen, and S.-M. Huang, "Taxonomy and Survey of RFID Anti-Collision Protocols," Elsevier Computer Comm., vol. 29, pp. 2150-2166, 2006.
[5] M. Kodialam and T. Nandagopal, "Fast and Reliable Estimation Schemes in RFID Systems," Proc. ACM MobiCom, pp. 322-333, 2006.
[6] N. Abramson, "The Aloha System—Another Alternative for Computer Communications," Proc. Full Joint Computer Conf. Am. Federation of Information Processing Soc. (AFIPS), vol. 37, pp. 281-285, 1970.
[7] J. Capetanakis, "Tree Algorithms for Packet Broadcast Channels," IEEE Trans. Information Theory, vol. 25, no. 5, pp. 505-515, Sept. 1979.
[8] "EPC Radio-Frequency Identification Protocols Class-1 Gen-2 UHF RFID Protocol for Communications at 860MHz-960MHz, EPCglobal," , Dec. 2004.
[9] J. Massey, "Collision Resolution Algorithms and Random-Access Communication," Report UCLA-ENG-8016, Univ. of California, Los Angeles, 1981.
[10] J. Myung and W. Lee, "Adaptive Binary Splitting: A RFID Tag Collision Arbitration Protocol for Tag Identification," Mobile Networks Applications, vol. 11, no. 5, pp. 711-722, 2006.
[11] C. Law, K. Lee, and K.-Y. Siu, "Efficient Memoryless Protocol for Tag Identification (Extended Abstract)," Proc. ACM Discrete Algorithms and Methods for Mobile Computing and Comm. (DIALM '00), pp. 75-84, 2000.
[12] F.B.M. Cesana, "Arpa: An Arbitration Protocol Based on Advanced Channel Feedback for Radio Frequency Identification," Proc. IEEE Int'l Conf. Wireless and Mobile Computing, Networking and Comm. (WIMOB '08), pp. 178-183, Oct. 2008.
[13] M. Bonuccelli, F. Lonetti, and F. Martelli, "Instant Collision Resolution for Tag Identification in RFID Networks," Ad Hoc Networks, pp. 1220-1232, 2007.
[14] S.-R. Lee, S.-D. Joo, and C.-W. Lee, "An Enhanced Dynamic Framed Slotted Aloha Algorithm for RFID Tag Identification," Proc. IEEE MOBIQUITOUS, pp. 166-174, 2005.
[15] D. Klair, K.-W. Chin, and R. Raad, "On the Accuracy of RFID Tag Estimation Functions," Proc. Int'l Symp. Comm. and Information Technologies, (ISCIT '07), pp. 1401-1406, 2007.
[16] H. Vogt, "Efficient Object Identification with Passive RFID Tags," Proc. Int'l Conf. Pervasive Computing (Pervasive '02), pp. 98-113, Springer, 2002.
[17] J.-R. Cha and J.-H. Kim, "Dynamic Framed Slotted Aloha Algorithms Using Fast Tag Estimation Method for RFID System," Proc. IEEE Consumer Comm. and Networking Conf. (CCNC '06), vol. 2, pp. 768-772, Jan. 2006.
[18] L. Devroye, "The Height and Size of Random Hash Trees and Random Pebbled Hash Trees," SIAM J. Computing, vol. 28, no. 4 pp. 1215-1224, 1999.
[19] G. Maselli, C. Petrioli, and C. Vicari, "Dynamic Tag Estimation for Optimizing Tree Slotted Aloha in Rfid Networks," Proc. 11th Symp. Modeling, Analysis and Simulation of Wireless, and Mobile Systems (MSWiM '08), pp. 315-322, 2008.
[20] "The Network Simulator—ns-2,", 2010.
[21] G. Bagnato, G. Maselli, C. Petrioli, and C. Vicari, "Performance Analysis of Anti-Collision Protocols for RFID Systems," Proc. IEEE 69th Vehicular Technology Conf. (VTC Spring' 09), pp. 1-5, Apr. 2009.
5 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool