Abstract
In RFID systems, the reader usually identifies all the RFID tags in the interrogation region with the maximum power. However, some applications may only need to identify the tags in a specified area, which is usually smaller than the reader’s default interrogation region. In this paper, we respectively present two solutions to identify the tags in the specified area. The principle of the solutions can be compared to the picture-taking process of a camera. It first focuses on the specified area and then shoots the tags. The design of the two solutions is based on the extensive empirical study on RFID tags. Realistic experiment results show that our solutions can reduce the execution time by \(46\,\%\) compared to the baseline solution.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Vogt, H.: Efficient object identification with passive RFID tags. In: Mattern, F., Naghshineh, M. (eds.) PERVASIVE 2002. LNCS, vol. 2414, p. 98. Springer, Heidelberg (2002)
Maguire, Y., Pappu, R.: An optimal q-algorithm for the ISO 18000-6C RFID protocol. IEEE Trans. Autom. Sci. Eng. 6(1), 16–24 (2009)
Zhen, B., Kobayashi, M., Shimuzu, M.: Framed aloha for multiple RFID objects identification. IEICE Trans. Commun. E80–B(3), 991–999 (2005)
Lee, S., Joo, S., Lee, C.: An enhanced dynamic framed slotted ALOHA algorithm for RFID tag identification. In: Proceedings of MobiQuitous, pp. 166–172. IEEE (2005)
Tan, C.C., Sheng, B., Li, Q.: How to monitor for missing RFID tags. In: IEEE ICDCS, pp. 295–302. IEEE (2008)
Li, T., Chen, S., Ling, Y.: Identifying the missing tags in a large RFID system. In: ACM MobiHoc, pp. 1–10. ACM (2010)
Zheng, Y., Li, M.: Fast tag searching protocol for large-scale RFID systems. In: IEEE ICNP, pp. 363–372. IEEE (2011)
Kodialam, M., Nandagopal, T.: Fast and reliable estimation schemes in RFID systems. In: ACM MobiCom, pp. 322–333. ACM (2006)
Qian, C., Ngan, H., Liu, Y., Ni, L.M.: Cardinality estimation for large-scale RFID systems. IEEE Trans. Parallel Distrib. Syst. 22(9), 1441–1454 (2011)
Zheng, Y., Li, M., Qian, C.: PET: probabilistic estimating tree for large-scale RFID estimation. In: IEEE ICDCS, pp. 37–46. IEEE (2011)
Buettner, M., Wetherall, D.: An emprical study of UHF RFID performance. In: Proceedings of MobiCom, pp. 223–234. ACM (2008)
Arror, S.R., Deavours, D.D.: Evaluation of the state of passive UHF RFID: an experimental approach. IEEE Syst. J. 1(2), 168–176 (2007)
Jeffery, S.R., Garofalakis, M., Franklin, M.J.: Adaptive cleaning for RFID data streams. In: Proceedings of VLDB, pp. 163–174. ACM (2006)
Xu, X., Gu, L., Wang, J., Xing, G.: Negotiate power and performance in the reality of RFID systems. In: IEEE PerCom, pp. 88–97. IEEE (2010)
Acknowledgement
This work is partially supported by the National Natural Science Foundation of China under Grant No. 61100196, 61073028, 61021062; the JiangSu Natural Science Foundation under Grant No. BK2011559; and NSF grants ECCS 1231461, ECCS 1128209, CNS 1138963, CNS 1065444, and CCF 1028167.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Yin, Y., Xie, L., Wu, J., Vasilakos, A.V., Lu, S. (2014). Focus and Shoot: Efficient Identification Over RFID Tags in the Specified Area. In: Stojmenovic, I., Cheng, Z., Guo, S. (eds) Mobile and Ubiquitous Systems: Computing, Networking, and Services. MobiQuitous 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 131. Springer, Cham. https://doi.org/10.1007/978-3-319-11569-6_27
Download citation
DOI: https://doi.org/10.1007/978-3-319-11569-6_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11568-9
Online ISBN: 978-3-319-11569-6
eBook Packages: Computer ScienceComputer Science (R0)