The Community for Technology Leaders
RSS Icon
Issue No.02 - February (2012 vol.23)
pp: 263-270
Lei Kang , Dept. of Comput. Sci. & Eng., Hong Kong Univ. of Sci. & Technol., Hong Kong, China
RFID has been gaining popularity due to its variety of applications, such as inventory control and localization. One important issue in RFID system is tag identification. In RFID systems, the tag randomly selects a slot to send a Random Number (RN) packet to contend for identification. Collision happens when multiple tags select the same slot, which makes the RN packet undecodable and thus reduces the channel utilization. In this paper, we redesign the RN pattern to make the collided RNs decodable. By leveraging the collision slots, the system performance can be dramatically enhanced. This novel scheme is called DDC, which is able to directly decode the collisions without exact knowledge of collided RNs. In the DDC scheme, we modify the RN generator in RFID tag and add a collision decoding scheme for RFID reader. We implement DDC in GNU Radio and USRP2 based testbed to verify its feasibility. Both theoretical analysis and testbed experiment show that DDC achieves 40 percent tag read rate gain compared with traditional RFID protocol.
radiofrequency identification, decoding, tag read rate gain, DDC scheme, collision decoding scheme, UHF RFID Systems, inventory control, tag identification, random number packet, channel utilization, collision slots, GNU Radio, USRP2 based testbed, Radiofrequency identification, Protocols, Estimation, Decoding, Algorithm design and analysis, Throughput, Frequency estimation, tag identification., RFID systems
Lei Kang, "DDC: A Novel Scheme to Directly Decode the Collisions in UHF RFID Systems", IEEE Transactions on Parallel & Distributed Systems, vol.23, no. 2, pp. 263-270, February 2012, doi:10.1109/TPDS.2011.116
[1] M. Kodialam and T. Nandagopal, "Fast and Reliable Estimation Schemes in RFID Systems," Proc. ACM MobiCom, 2006.
[2] M. Buettner and D. Wetherall, "An Empirical Study of UHF RFID Performance," Proc. ACM MobiCom, 2008.
[3] C. Qian, H.-L. Ngan, and Y. Liu, "Cardinality Estimation for Large-Scale RFID Systems," Proc. IEEE Sixth Ann. Int'l Conf. Pervasive Computing and Comm. (PerCom '08), 2008.
[4] L. Xie, B. Sheng, C.C. Tan, H. Han, Q. Li, and D. Chen, "Efficient Tag Identification in Mobile RFID Systems," Proc. IEEE INFOCOM, 2010.
[5] H. Han, B. Sheng, C.C. Tan, Q. Li, W. Mao, and S. Lu, "Counting RFID Tags Efficiently and Anonymously," Proc. IEEE INFOCOM, 2010.
[6] T. Li, S. Wu, S. Chen, and M. Yang, "Energy Efficient Algorithms for the RFID Estimation Problem," Proc. IEEE INFOCOM, 2010.
[7] S. Gollakota and D. Katabi, "Zigzag Decoding: Combating Hidden Terminals in Wireless Networks," Proc. ACM SIGCOMM, 2008.
[8] S. Katti, S. Gollakota, and D. Katabi, "Embracing Wireless Interference: Analog Network Coding," Proc. ACM SIGCOMM, 2007.
[9] EPCglobal "EPC Radio-Frequency Identity Protocols Class 1 Generation 2 UHF RFID Protocol for Communications at 860MHz-960MHz," Version 1.2.0, 2008.
[10] L. Kang and L. Ni, "Revisiting ALOHA with Physical Layer Network Coding," technical report, CSE Dep. HKUST, 2009.
[11] M.Z. Brodsky and R.T. Morris, "In Defense of Wireless Carrier Sense," Proc. ACM SIGCOMM, 2009.
[12] LAN/MAN Standards Committee, "Wireless Medium Access Control and Physical Layer Specifications for Low-Rate Wireless Personal Area Netowrks," IEEE Std 802.15.4a-2007.
[13] LAN/MAN Standards Committe, "Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications," IEEE Std 802.11-2007.
[14] V. Namboodiri and L. Gao, "Energy-Aware Tag Anti-Collision Protocols for RFID Systems," Proc. IEEE Fifth Ann. Int'l Conf. Pervasive Computing and Comm. (PerCom '07), 2007.
[15] F. Schoute, "Dynamic Frame Length ALOHA," IEEE Trans. Comm., vol. 31, no. 4, pp. 565-568, Apr. 1983.
[16] V. Anantharam, "The Stability Region of the Finite-User Slotted ALOHA Protocol," IEEE Trans. Information Theory, vol. 37, no. 3, pp. 535-540, May 1991.
[17] L. Pan and H. Wu, "Smart Trend-Traversal: A Low Delay and Energy Tag Arbitration Protocol for Large RFID Systems," Proc. IEEE INFOCOM, 2009.
[18] M. Buettner and D. Wetherall, "A Flexible Software Radio Transceiver for UHF RFID Experimentation," Technical Report UW CSE , 2009.
[19] J. Feigin, "Practical Costas Loop Design," RF Design, pp. 20-36, Jan. 2002.
[20] G.R. Danesfahani and T.G. Jeans, "Optimisation of Modified Mueller and Muller Algorithm," Electronics Letters, vol. 31, no. 13, pp. 1032-1033, June 1995.
[21] K. Wu, H. Tan, Y. Liu, J. Zhang, Q. Zhang, and L.M. Ni, "Side Channel: Bits over Interference," Proc. ACM MobiCom, 2010.
[22] J. Lee, W. Kim, S.J. Lee, D. Jo, J. Ryu, T. Kwon, and Y. Choi, "An Experimental Study on the Capture Effect in 802.11a Networks," Proc. Second ACM Int'l Workshop Wireless Network Testbeds, Experimental Evaluation and Characterization (WinTECH), 2007.
[23] G. FSF. GNU Radio - GNU FSF Project, , 2011.
21 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool