Skip to main content
Log in

An Efficient Protocol for the Tag-information Sampling Problem in RFID Systems

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

Given a population S of N tags in an RFID system, the tag-information sampling problem is to randomly choose K distinct tags from S to form a subset T, and then inform each tag in T of a unique integer from {1,2,⋯ ,K}. This is a fundamental problem in many real-time analysis applications of RFID systems, as it enables rapidly selecting a small random tag subset T from a large tag population S and collecting the tag-information from T for analyzing purposes. However, existing protocols for this problem are far from satisfactory due to high communication costs. This paper aims at solving this problem by using a small communication cost. First, a lower bound on communication cost, denoted by Clb, is obtained for the tag-information sampling problem. Then, a protocol Ps is proposed for solving the studied problem, and is proved to have a communication cost within a factor of 2 of the lower bound Clb. Lastly, extensive simulation results not only verify the theoretical properties of the proposed protocol but also demonstrate its advantages in comparison with the state-of-art protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Notes

  1. The reader R may transmit IDs and newly collected tag-information either to or from the backend server, or transmit newly collected tag-information to the backend server.

  2. Changing the data rate from readers to tags would only alter the absolute communication time of the three protocols, but not affect the comparison results. Two reasons account for this: (1) the communication cost of each protocol remains constant regardless of changes in data rates, and (2) all protocols are tested at the same data rates.

  3. Note that we set the length of the Bloom filter to be 24K in the simulations when testing TOP [23]. This parameter setting is according to part A: Energy cost in Section IV of [23].

References

  1. Li J, Feng G, Wei W, Luo C, Cheng L, Wang H, Song H, Ming Z (2018) Psotrack: A rfid-based system for random moving objects tracking in unconstrained indoor environment. IEEE Internet of Things Journal 5(6):4632–4641

    Article  Google Scholar 

  2. Shangguan L, Jamieson K (2016) The design and implementation of a mobile rfid tag sorting robot. In: Proceedings of the 14th annual international conference on mobile systems, applications, and services, pp 31–42

  3. Xie L, Sun J, Cai Q, Wang C, Jie W u, see Sanglu Lu. (2016) Tell me what i: Recognize rfid tagged objects in augmented reality systems. In: Proceedings of the 2016 ACM International joint conference on pervasive and ubiquitous computing, pp 916–927

  4. Liu X, Li K, Min G, Lin K, Xiao B, Shen Y, Qu W (2014) Efficient unknown tag identification protocols in large-scale rfid systems. IEEE Trans Parallel Distrib Syst 25(12):3145–3155

    Article  Google Scholar 

  5. Reyes PM, Worthington WJ, Collins JD (2015) Knowledge management enterprise and rfid systems. Management Research Review

  6. Wang X, Liu Z, Gao Y, Zheng X, Dang Z, Shen X (2019) A near-optimal protocol for the grouping problem in rfid systems. IEEE Trans. Mob. Comput: 1–1

  7. Bu K, Xu M, Liu X, Luo J, Zhang S, Weng M (2015) Deterministic detection of cloning attacks for anonymous rfid systems. IEEE Trans Industr Inform 11(6):1255–1266

    Article  Google Scholar 

  8. Liu X, Li K, Jie W u, Liu AX, Xie X, Zhu C, Xue W (2016) Top-k queries for multi-category rfid systems. In: IEEE INFOCOM 2016-The 35th Annual IEEE international conference on computer communications. IEEE, pp 1–9

  9. Wang X, Liu Z, Gao Y, Zheng X, Chen X, Wu C (2019) Near-optimal data structure for approximate range emptiness problem in information-centric internet of things. IEEE Access 7:21857–21869

    Article  Google Scholar 

  10. Xie L, Han H, Li Q, Wu J, Lu S (2014) Efficiently collecting histograms over rfid tags. In: IEEE INFOCOM 2014-IEEE Conference on computer communications. IEEE, pp 145–153

  11. Li Q, Qu H, Liu Z, Zhou N, Sun W, Sigg S, Li J (2019) Af-dcgan: Amplitude feature deep convolutional gan for fingerprint construction in indoor localization systems. IEEE Transactions on Emerging Topics in Computational Intelligence

  12. Chen S, Zhang M, Xiao B (2011) Efficient information collection protocols for sensor-augmented rfid networks. In: 2011 Proceedings IEEE INFOCOM. IEEE, pp 3101–3109

  13. Liu X, Cao J, Yang Y, Qu W, Zhao X, Li K, Yao D (2019) Fast rfid sensory data collection: Trade-off between computation and communication costs. IEEE/ACM Trans Networking 27 (3):1179–1191

    Article  Google Scholar 

  14. Liu X, Xie X, Wang S, Liu J, Yao D, Cao J, Li K (2019) Efficient range queries for large-scale sensor-augmented rfid systems. IEEE/ACM Trans Networking 27(5):1873–1886

    Article  Google Scholar 

  15. WISP: Wireless Identification and Sensing Platform, 2011

  16. Gu Y, Wang Y, Liu Z, Liu J, Li J (2020) Sleepguardian: An rf-based healthcare system guarding your sleep from afar. IEEE Network

  17. Han H u, Liu Z, An J (2020) Mining mobile intelligence for wireless systems: A deep neural network approach. IEEE Comput Intell Mag 15(1):24–31

    Article  Google Scholar 

  18. Liu Z, Tsuda T, Watanabe H, Ryuo S, Iwasawa N (2019) Data driven cyber-physical system for landslide detection. Mob Netw Appl 24(3):991–1002

    Article  Google Scholar 

  19. Celimuge W u, Liu Z, Di Z, Yoshinaga T, Ji Y (2018) Spatial intelligence toward trustworthy vehicular IoT. IEEE Commun Mag 56(10):22–27

    Article  Google Scholar 

  20. Liu J, Chen S, Xiao B, Wang Y, Chen L (2017) Category information collection in rfid systems. In: 2017 IEEE 37th International conference on distributed computing systems (ICDCS). IEEE, pp 2220–2225

  21. Liu X, Yang Q, Luo J, Bo D, Zhang S (2018) An energy-aware offloading framework for edge-augmented mobile rfid systems. IEEE Internet of Things Journal 6(3):3994–4004

    Article  Google Scholar 

  22. Xie X, Liu X, Li K, Xiao B, Qi H (2017) Minimal perfect hashing-based information collection protocol for rfid systems. IEEE Trans Mob Comput 16(10):2792–2805

    Article  Google Scholar 

  23. Qiao Y, Chen S, Li T, Chen S (2015) Tag-ordering polling protocols in rfid systems. IEEE/ACM Trans Networking 24(3):1548–1561

    Article  Google Scholar 

  24. Wang X, Ji Y, Dang Z, Zheng X, Zhao B (2015) Improved weighted bloom filter and space lower bound analysis of algorithms for approximated membership querying. In: International conference on database systems for advanced applications. Springer, pp 346–362

  25. Bloom BH (1970) Space/time trade-offs in hash coding with allowable errors. Commun ACM 13 (7):422–426

    Article  Google Scholar 

  26. Cichelli RJ (1980) Minimal perfect hash functions made simple. Commun ACM 23(1):17–19

    Article  Google Scholar 

  27. Liu X, Qi H, Li K, Stojmenovic I, Liu AX, Shen Y, Qu W, Xue W (2015) Sampling bloom filter-based detection of unknown rfid tags. IEEE Trans Commun 63(4):1432–1442

    Article  Google Scholar 

  28. Zhu F, Xiao B, Liu J, Chen L (2016) Efficient physical-layer unknown tag identification in large-scale rfid systems. IEEE Trans Commun 65(1):283–295

    Google Scholar 

  29. EPCGlobal (2018) EPC Radio-frequency identity protocols generation-2 UHF RFID standard, Specification for RFID Air Interface Protocol for Communications at 860 MHz - 960 MHz. Tech. Rep.

  30. Mitzenmacher M, Upfal E (2017) Probability and computing: Randomization and probabilistic techniques in algorithms and data analysis. Cambridge University Press, Cambridge

    MATH  Google Scholar 

  31. Zhou Z, Chen B, Yu H (2014) Understanding rfid counting protocols. IEEE/ACM Trans Netw 24(1):312–327

    Article  Google Scholar 

  32. Xiao Q, Chen S, Liu J, Cheng G, Luo J (2019) A protocol for simultaneously estimating moments and popular groups in a multigroup rfid system. IEEE/ACM Trans Netw 27(1):143–158

    Article  Google Scholar 

  33. Chung K-M, Mitzenmacher M, Vadhan S (2013) Why simple hash functions work: Exploiting the entropy in a data stream. Theory of Computing 9(1):897–945

    Article  MathSciNet  Google Scholar 

  34. Zhu L, Wang X, Yang Y, Xu S, Wu X, Zhao W, Feng H (2020) Epc-based efficient tag selection in rfid systems. IEEE Access

  35. Waldrop J, Engels DW, Sarma SE (2003) Colorwave: an anticollision algorithm for the reader collision problem. In: IEEE International Conference on Communications, 2003. ICC’03, vol 2. IEEE, pp 1206–1210

  36. Tang S, Yuan J, Li X-Y, Chen G, Liu Y, Zhao J (2009) Raspberry: A stable reader activation scheduling protocol in multi-reader rfid systems. In: 2009 17th IEEE International conference on network protocols. IEEE, pp 304–313

  37. Tang S, Wang C, Li X-Y, Jiang C (2011) Reader activation scheduling in multi-reader rfid systems: A study of general case. In: 2011 IEEE International Parallel & Distributed Processing Symposium. IEEE, pp 1147–1155

  38. Liu J, Chen S, Xiao Q, Chen M, Xiao B, Chen L (2018) Efficient information sampling in multi-category rfid systems. IEEE/ACM Trans Netw 27(1):159–172

    Article  Google Scholar 

  39. Yu J, Chen L, Zhang R, Wang K (2017) Finding needles in a haystack Missing tag detection in large rfid systems. IEEE Trans Commun 65(5):2036–2047

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported in part by the National Natural Sciences Foundation of China under Grants 61402008, 61702006 and 61672038, in part by the Provincial Key Research and Development Program of Anhui Province under Grants 202004a05020009 and 201904a05020071, in part by the University Natural Science Research Project of Anhui Province (No. KJ2020A0249), in part by the Electronic Information and Control of Fujian University Engineering Research Center, Minjiang University, under Grant MJXY-KF-EIC1803, and in part by the Open Fund of Key Laboratory of Anhui Higher Education Institutes under Grant CS2020-006.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Xiujun Wang or Yangzhao Yang.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

It is an extended version of MONAMI 2020 conference paper.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, X., Gao, Y., Yang, Y. et al. An Efficient Protocol for the Tag-information Sampling Problem in RFID Systems. Mobile Netw Appl 26, 1974–1985 (2021). https://doi.org/10.1007/s11036-021-01738-0

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-021-01738-0

Keywords

Navigation