Skip to main content

Efficient Object Identification with Passive RFID Tags

  • Conference paper
  • First Online:
Pervasive Computing (Pervasive 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2414))

Included in the following conference series:

Abstract

Radio frequency identification systems with passive tags are powerful tools for object identification. However, if multiple tags are to be identified simultaneously, messages from the tags can collide and cancel each other out. Therefore, multiple read cycles have to be performed in order to achieve a high recognition rate. For a typical stochastic anti-collision scheme, we show how to determine the optimal number of read cycles to perform under a given assurance level determining the acceptable rate of missed tags. This yields an efficient procedure for object identification. We also present results on the performance of an implementation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Klaus Finkenzeller. RFID-Handbuch. Hanser Fachbuch, 1999. Also available in English as RFID Handbook: Radio-Frequency Identification Fundamentals and Applications, John Wiley & Sons, 2000.

    Google Scholar 

  2. L. E. Holmquist, J. Redström, and P. Ljungstrand. Token-Based Access to Digital Information. In Hans-W. Gellersen, editor, Handheld and Ubiquitous Computing, volume 1707 of LNCS, pages 234–245. Springer-Verlag, 1999.

    Chapter  Google Scholar 

  3. Don R. Hush and Cliff Wood. Analysis of Tree Algorithms for RFID Arbitration. In IEEE International Symposium on Information Theory, pages 107. IEEE, 1998.

    Google Scholar 

  4. Normal Lloyd Johnson and Samuel Kotz. Urn Models and Their Applications. Wiley, 1977.

    Google Scholar 

  5. Valentin F. Kolchin, Boris A. Svast’yanov, and Vladimir P. Christyakov. Random Allocations. V H. Winston & Sons, 1978.

    Google Scholar 

  6. Marc Langheinrich, Friedemann Mattern, Kay Römer, and Harald Vogt. First Steps Towards an Event-Based Infrastructure for Smart Things. Ubiquitous Computing Workshop (PACT 2000), October 2000.

    Google Scholar 

  7. Ching Law, Kayi Lee, and Kai-Yeung Siu. Efficient Memoryless Protocol for Tag Identification. In Proceedings of the 4th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, pages 75–84. ACM, August 2000.

    Google Scholar 

  8. Rajeev Motwani and Prabhakar Raghavan. Randomized Algorithms. Cambridge University Press, 1995.

    Google Scholar 

  9. Fred S. Roberts. Applied Combinatorics. Prentice-Hall, 1984.

    Google Scholar 

  10. Kay Römer. Smart Playing Cards-A Ubiquitous Computing Game. Workshop on Designing Ubiquitous Computing Games, Ubicomp, 2001.

    Google Scholar 

  11. Frits C. Schoute. Control of ALOHA Signalling in a Mobile Radio Trunking System. In International Conference on Radio Spectrum Conservation Techniques, pages 38–42. IEE, 1980.

    Google Scholar 

  12. Frits C. Schoute. Dynamic Frame Length ALOHA. IEEE Transactions on Communications, COM-31(4):565–568, April 1983.

    Google Scholar 

  13. Wojciech Szpankowski. Packet Switching in Multiple Radio Channels: Analysis and Stability of a Random Access System. Computer Networks: The International Journal of Distributed Informatique, 7(1):17–26, February 1983.

    Google Scholar 

  14. K. Takaragi, M. Usami, R. Imura, R. Itsuki, and T. Satoh. An Ultra Small Individual Recognition Security Chip. IEEE Micro, 21(6):43–49, 2001.

    Article  Google Scholar 

  15. Roy Want, Kenneth P. Fishkin, Anuj Gujar, and Beverly L. Harrison. Bridging Physical and Virtual Worlds with Electronic Tags. In Proceeding of the CHI 99 Conference on Human Factors in Computing Systems: the CHI is the Limit, pages 370–377. ACM Press, 1999.

    Google Scholar 

  16. Jeffrey E. Wieselthier, Anthony Ephremides, and Larry A. Michaels. An Exact Analysis and Performance Evaluation of Framed ALOHA with Capture. IEEE Transactions on Communications, COM-37,2:125–137, 1989.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Vogt, H. (2002). Efficient Object Identification with Passive RFID Tags. In: Mattern, F., Naghshineh, M. (eds) Pervasive Computing. Pervasive 2002. Lecture Notes in Computer Science, vol 2414. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45866-2_9

Download citation

  • DOI: https://doi.org/10.1007/3-540-45866-2_9

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-44060-4

  • Online ISBN: 978-3-540-45866-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics