Skip to main content

Anticipative Wrap-Around Inquiry Method towards Efficient RFID Tag Identification

  • Conference paper
Ubiquitous Intelligence and Computing (UIC 2009)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5585))

Included in the following conference series:

  • 1322 Accesses

Abstract

One of the challenges in designing modern RFID systems is that when more than one tag exists in an RFID environment, it may occurs collisions so that the whole system becomes inefficient and increases the time for identifying RFID Tags. To simultaneously recognize multiple tags within a reader interrogation zone, an anti-collision algorithm should be applied. In this paper, we present an Anticipative Wrap-Around Inquiry (AWAI) method, which is an enhanced technique based on the query tree protocol. The main idea of the Anticipative Inquiry is to limit number of collisions at different level of a query tree. When number of collisions reaches a predefined ratio, it reveals that density in RF field is too high. To avoid sending unnecessary inquiries, the prefix matching will be moved to next level, alleviating the collision problems. Since the prefix matching is performed in level-ordered scheme, it may cause an imbalanced query tree on which the right sub-tree was not examined due to threshold jumping. By scanning the query tree from right sub-tree to left sub-tree in alternative levels, i.e., wrap-around, this flaw could be significantly ameliorated. The experimental results show that the method of setting frequency bound and wrap-around scan indeed improve the identification efficiency in high density and randomly deployed RFID systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Choi, H.S., Cha, J.R., Kim, J.H.: Improved Bit-by-bit Binary Tree Algorithm in Ubiquitous ID System. In: Aizawa, K., Nakamura, Y., Satoh, S. (eds.) PCM 2004. LNCS, vol. 3332, pp. 696–703. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  2. Klair, D.K., Chin, K.-W., Raad, R.: An investigation into the energy efficiency of pure and slotted aloha based RFID anti-collision protocols. In: Proceedings of the IEEE WoWMoM 2007, Helsinki, Finland, June 18-21 (2007)

    Google Scholar 

  3. Law, C., Lee, K., Siu, K.-Y.: Efficient Memoryless Protocol for Tag Identification. In: Proceedings of the International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (August 2000)

    Google Scholar 

  4. Lee, S., Joo, S.D., Lee, C.W.: An enhanced dynamic framed slotted aloha algorithm for RFID tag identification. In: Proceedings of ACM Mobiquitous 2005 (July 2005)

    Google Scholar 

  5. Myung, J., Lee, W.: An adaptive memoryless tag anti-collision protocol for RFID networks. In: Proceedings of IEEE INFOCOM 2005, Poster Session (March 2005)

    Google Scholar 

  6. Myung, J., Lee, W., Srivastava, J.: Adaptive binary splitting for efficient RFID tag anti-collision. IEEE Communication Letter 10(3), 144–146 (2006)

    Article  Google Scholar 

  7. Sahoo, A., Iyer, S., Bhandari, N.: Improving RFID System to Read Tags Efficiently, KRSIT Technical Report, IIT Bombay (June 2006)

    Google Scholar 

  8. Vogt, H.: Efficient Object Identification with Passive RFID Tags. In: Mattern, F., Naghshineh, M. (eds.) PERVASIVE 2002. LNCS, vol. 2414, pp. 98–113. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  9. Zhen, B., Kobayashi, M., Shimizui, M.: Framed aloha for multiple RFID objects Identification. IEICE Trans. on Comm. E88-B(3), 991–999 (2005)

    Article  Google Scholar 

  10. Zhou, Z., Gupta, H., Das, S.R., Zhu, X.: Slotted Scheduled Tag Access in Multi-Reader RFID Systems. In: Proceedings of the IEEE International Conference on Networks Protocols (ICNP), pp. 61–70 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hsu, CH., Chen, WJ., Chung, YC. (2009). Anticipative Wrap-Around Inquiry Method towards Efficient RFID Tag Identification. In: Zhang, D., Portmann, M., Tan, AH., Indulska, J. (eds) Ubiquitous Intelligence and Computing. UIC 2009. Lecture Notes in Computer Science, vol 5585. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02830-4_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02830-4_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02829-8

  • Online ISBN: 978-3-642-02830-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics