The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - March (2012 vol.11)
pp: 518-528
Karsten Fyhn , Dept. of Electron. Syst., Aalborg Univ., Aalborg, Denmark
R. M. Jacobsen , Dept. of Electron. Syst., Aalborg Univ., Aalborg, Denmark
P. Popovski , Dept. of Electron. Syst., Aalborg Univ., Aalborg, Denmark
T. Larsen , Dept. of Electron. Syst., Aalborg Univ., Aalborg, Denmark
ABSTRACT
The technology of Radio Frequency IDentification (RFID) enables many applications that rely on passive, battery-less wireless devices. If a RFID reader needs to gather the ID from multiple tags in its range, then it needs to run an anticollision protocol. Due to errors on the wireless link, a single reader session, which contains one full execution of the anticollision protocol, may not be sufficient to retrieve the ID of all tags. This problem can be mitigated by running multiple, redundant reader sessions and use the statistical relationship between these sessions. On the other hand, each session is time consuming and therefore the number of sessions should be kept minimal. We optimize the process of running multiple reader sessions, by allowing only some of the tags already discovered to reply in subsequent reader sessions. The estimation procedure is integrated with an actual tree-based anticollision protocol, and numerical results show that the reliable tag resolution algorithm attain high speed of protocol execution, while not sacrificing the reliability of the estimators used to assess the probability of missing tags.
INDEX TERMS
trees (mathematics), optimisation, protocols, radio links, radiofrequency identification, statistical analysis, telecommunication network reliability, probability, recapture approach, missing RFID tags, radiofrequency identification tags, battery-less wireless devices, RFID reader, anticollision protocol, wireless link, single reader session, redundant reader sessions, statistical relationship, actual tree-based anticollision protocol, tag resolution algorithm, protocol execution, reliability, Protocols, Estimation, Radiofrequency identification, Wireless communication, Passive networks, anticollision protocols., RFID, reliable arbitration process
CITATION
Karsten Fyhn, R. M. Jacobsen, P. Popovski, T. Larsen, "Fast Capture—Recapture Approach for Mitigating the Problem of Missing RFID Tags", IEEE Transactions on Mobile Computing, vol.11, no. 3, pp. 518-528, March 2012, doi:10.1109/TMC.2011.62
REFERENCES
[1] N. Gershenfeld, R. Krikorian, and D. Cohen, “The Internet of Things,” Scientific Am., vol. 291, no. 4, pp. 76-81, 2004.
[2] J.M. Kahn, R.H. Katz, and K.S.J. Pister, “Next Century Challenges: Mobile Networking for ‘Smart Dust’,” Proc. ACM MobiCom, pp. 271-278, 1999.
[3] R. Angeles, “RFID Technologies: Supply-Chain Applications and Implementation Issues,” Information Systems Management, vol. 22, no. 1, pp. 51-65, 2005.
[4] K. Finkenzeller, RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification. John Wiley & Sons, 2003.
[5] EPCglobal Inc., EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz - 960 MHz, 1st ed., Oct. 2008.
[6] H. Vogt, “Efficient Object Identification with Passive RFID Tags,” Proc. Int'l Conf. Pervasive Computing, pp. 98-113, 2002.
[7] D. Hush and C. Wood, “Analysis of Tree Algorithms for RFID Arbitration,” IEEE Int'l Symp. Information Theory, p. 107, Aug. 1998.
[8] I. Cidon and M. Sidi, “Conflict Multiplicity Estimation and Batch Resolution Algorithms,” IEEE Trans. Information Theory, vol. 34, no. 1, pp. 101-110, Jan. 1988.
[9] R.M. Jacobsen, K.F. Nielsen, P. Popovski, and T. Larsen, “Reliable Identification of RFID Tags Using Multiple Independent Reader Sessions,” Proc. IEEE Int'l Conf. Radio Frequency Identification (RFID), 2009.
[10] P. Popovski, K. Fyhn, R.M. Jacobsen, and T. Larsen, “Robust Statistical Methods for Detection of Missing RFID Tags,” IEEE Wireless Comm. Magazine, vol. 18, no. 4, pp. 74-80, Aug. 2011.
[11] G. Khandelwal, K. Lee, A. Yener, and S. Serbetli, “ASAP: A MAC Protocol for Dense and Time-Constrained RFID Systems,” EURASIP J. Wireless Comm. and Networking, vol. 2007, p. 3, Jan. 2007.
[12] J.L. Massey, Collision-Resolution Algorithms and Random-Access Communications, no. 265. Springer-Verlag, pp. 73-137, 1981.
[13] L.W.F. Chaves, E. Buchmann, and K. Böhm, “Tagmark: Reliable Estimations of RFID Tags for Business Processes,” Proc. 14th ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining (KDD '08), pp. 999-1007, 2008.
[14] D. Engels and S. Sarma, “The Reader Collision Problem,” IEEE Int'l Conf. Systems, Man and Cybernetics, vol. 3, p. 6, Oct. 2002.
[15] P. Popovski, F.H.P. Fitzek, and R. Prasad, “A Class of Algorithms for Collision Resolution with Multiplicity Estimation,” Algorithmica, vol. 49, no. 4, pp. 286-317, 2007.
22 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool