Skip to main content

An Efficient RFID Reader Network Planning Strategy Based on P2P Computing

  • Conference paper
  • First Online:
Advances on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC 2016)

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 1))

  • 1671 Accesses

Abstract

Radio Frequency identification (RFID) technology has been used in many areas, which needs to deploy many readers in the RFID network. Extra readers in the network will consume more power, resulting in a waste of RFID network resources. Therefore, the elimination of redundant readers is important to optimize an RFID network deployment. RFID reader redundant deployment optimization can ensure that users use the minimum number of readers to cover a specific range of all tags. Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. P2P based RFID network is a novel distributed systems. In this paper, an efficient redundant reader elimination strategy is discussed, which is based on the P2P-based RFID reader network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Karmakar, Nemai Chandra. Handbook of smart antennas for RFID systems[M]. New Jersey: Wiley, 2010.

    Google Scholar 

  2. Wu Y, Sheng Q Z, Zeadally S. RFID: opportunities and challenges[M]. Next-Generation Wireless Technologies. Springer London, 2013: 105-129.

    Google Scholar 

  3. Sakurai S. Prediction of sales volume based on the RFID data collected from apparel shops[J]. International Journal of Space-Based and Situated Computing, 2011, 1(2-3): 174-182.

    Google Scholar 

  4. Takeda A, Oide T, Takahashi A. Simple dynamic load balancing mechanism for structured P2P network and its evaluation[J]. International Journal of Grid and Utility Computing, 2012, 3(2-3): 126-135.

    Google Scholar 

  5. Okaie Y, Nakano T. A game theoretic framework for peer-to-peer market economy[J]. International Journal of Grid and Utility Computing, 2011, 2(3): 183-195.

    Google Scholar 

  6. Sharifkhani F, Pakravan M R. A review of new advances in resource discovery approaches in unstructured P2P networks[C]. Advances in Computing, Communications and Informatics (ICACCI), 2013 International Conference on. IEEE, 2013: 828-833.

    Google Scholar 

  7. Eftychiou A, Vrusias B, Antonopoulos N. A dynamically semantic platform for efficient information retrieval in P2P networks[J]. International Journal of Grid and Utility Computing, 2012, 3(4): 271-283.

    Google Scholar 

  8. Takaoka M, Uchida M, Ohnishi K, et al. A generalised diffusion-based file replication scheme for load balancing in P2P file-sharing networks[J]. International Journal of Grid and Utility Computing, 2012, 3(4): 242-252.

    Google Scholar 

  9. Sula A, Spaho E, Matsuo K, et al. A new system for supporting children with autism spectrum disorder based on IoT and P2P technology[J]. International Journal of Space-Based and Situated Computing, 2014, 4(1): 55-64.

    Google Scholar 

  10. Nandakumar R, Chintalapudi K K, Padmanabhan V, et al. Dhwani: secure peer-to-peer acoustic NFC[C]. ACM SIGCOMM Computer Communication Review. ACM, 2013, 43(4): 63-74.

    Google Scholar 

  11. Wang C S, Chen C L, Deng D J. P2P-based mobile navigation system with location service[J]. Peer-to-Peer Networking and Applications, 2015, 8(1): 22-31.

    Google Scholar 

  12. Hui F C P, Chan H C B. Position Estimation Methods for an RFID-based Positioning System with a P2P Network Architecture[C]. European Wireless 2014; 20th European Wireless Conference; Proceedings of. VDE, 2014: 1-6

    Google Scholar 

  13. Hui C P. RFID-based location tracking system using a peer-to-peer network architecture[D]. The Hong Kong Polytechnic University, 2015.

    Google Scholar 

  14. Urien P, Piramuthu S. LLCPS and SISO: A TLS-based framework with RFID for NFC P2P retail transaction processing[C]. 2013 IEEE International Conference on RFID. IEEE, 2013: 152-159.

    Google Scholar 

  15. D. W. Engels. The reader collision problem[R]. White Paper MIT-AUTOID-WH-007, MIT Auto ID Center, November 2001.

    Google Scholar 

  16. D.-Y. Kim, B.-J. Jang, H.-G. Yoon, J.-S. Park, and J.-G. Yook. Effects of reader interference on the RFID interrogation range[C]. In the Proceedings of the 37th European Microwave Conference, pages 728–731, October 2007.

    Google Scholar 

  17. N. lrfan and M. C. E Yagoub. Efficient Approach for Redundant Reader Elimination in Large-Scale RF10 Networks[C]. 2010 First International Conference on Integrated Intelligent Computing, pp. l 02-107,5-7 Aug. 2010.

    Google Scholar 

  18. Leong K S, Ng M L, Cole P H. The reader collision problem in RFID systems[C]. 2005 IEEE International Symposium on Microwave, Antenna, Propagation and EMC Technologies for Wireless Communications. IEEE, 2005, 1: 658-661.

    Google Scholar 

  19. Su-Ryun Lee, Sung-Don Joo, and Chae-Woo Lee. An enhanced dynamic framed slotted ALOHA algorithm for RFID tag identification[C]. The Second Annual International Conference on Networking and Services, 2005, Page(s): 166–172

    Google Scholar 

  20. Jae-Ryong Cha and Jae-Hyun Kim. Dynamic framed slotted ALOHA algorithms using fast tag estimation method for RFID system[C]. Consumer Communications and Networking Conference, 2006, Page(s): 768–772

    Google Scholar 

  21. Xu Huang and Son Le. Efficient Dynamic Framed Slotted ALOHA for RFID Passive Tags[C]. The 9th International Conference on Advanced Communication Technology, 2007, Page(s):94–97

    Google Scholar 

  22. Leian Liu and Shengli Lai. ALOHA-Based AntiCollision Algorithms Used in RFID System[C]. International Conference on Wireless Communications, Networking and Mobile Computing, 2006, Page(s): 1–4.

    Google Scholar 

  23. J. Waldrop, D.W. Engels, and S.E. Sarma. Colorwave: an anticollision algorithm for the reader collision problem[C]. IEEE International Conference on Communications, 2003, Page(s): 1206-1210.

    Google Scholar 

  24. Ziming Guo and Binjie Hu. A Dynamic Bit Arbitration Anti-Collision Algorithm for RFID System[C]. IEEE International Workshop on Anticounterfeiting, Security, Identification, 2007, Page(s): 457–460.

    Google Scholar 

  25. Leian Liu, Zhenhua Xie, Jingtian Xi, and Shengli Lai. An improved anti-collision algorithm in RFID system[C]. 2nd International Conference on Mobile Technology, Applications and Systems, 2005.

    Google Scholar 

  26. B. Carbunar, M. K. Ramanathan, M. Koyuturk, C. Hoffmann, and A. Grama. Redundant-reader elimination in RFID systmes[C]. Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (SECON), pages 176–184, September 2005.

    Google Scholar 

  27. C.-H. Hsu, Y.-M. Chen, and C.-T. Yang. A layered optimization approach for redundant reader elimination in wireless rfid networks[C]. In IEEE Asia-Pacific Services Computing Conference, pages 138–145, 2007.

    Google Scholar 

  28. Z. Guo, A.Zhou. Data quality and data cleaning research[J]. Journal of software, 2002, 13(11):2076-2082.

    Google Scholar 

  29. Y. Gu, G.Yu, T.Zhang. RFID complex event processing technology[J]. Computer science and exploration, 2007(03).

    Google Scholar 

  30. Juels A, Pappu R. Squealing Euros: Privacy protection in RFID-enabled banknotes [C]. Financial cryptography. Springer Berlin Heidelberg, 2003:103-121.

    Google Scholar 

  31. Xu H, Wang S, Wang R. A Novel RFID Reader System Framework Based On Peer-to-Peer Network[J]. International Journal of Advancements in Computing Technology, 2011, 3(3): 104-110.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to He XU .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

XU, H., SHEN, W., LI, P., QIAN, C. (2017). An Efficient RFID Reader Network Planning Strategy Based on P2P Computing. In: Xhafa, F., Barolli, L., Amato, F. (eds) Advances on P2P, Parallel, Grid, Cloud and Internet Computing. 3PGCIC 2016. Lecture Notes on Data Engineering and Communications Technologies, vol 1. Springer, Cham. https://doi.org/10.1007/978-3-319-49109-7_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49109-7_36

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49108-0

  • Online ISBN: 978-3-319-49109-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics