Skip to main content
Log in

A localized fault tolerant load balancing algorithm for RFID systems

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Radio frequency identification (RFID) is a unique scientific invention that comprises individually recognizable, low-cost tags and readers where the readers monitor the tags using frequencies from the radio spectrum. Uniform distribution of the tags for gaining a balanced load of the readers is a significant concern to ensure successful collection of data from all of the tags of an RFID system with multiple readers. Moreover, some of the readers in an RFID network may become defective during operation and stop working. As a result, information would not be collected from those tags which were associated with the defective readers and the network would operate with partial information. We target to maintain a balance among the load of the readers by placing the tags as evenly as possible to address the fast tag reading problem. We convert the addressed issue as a load balancing problem and introduce a cellular automaton inspired localized algorithm as a solution to this problem. Our proposed algorithm utilizes the local information of the readers to relocate tags from a heavily loaded reader to a lightly loaded reader. We develop our proposed algorithm as a fault tolerant one so that all of the tags in the network are always under surveillance even if some of the readers become defective. Numerical analysis and comparison results suggest that the proposed localized load balancing algorithm outperforms the existing localized solution and gives a competitive result compared to the centralized algorithm. Finally, we implement our proposed algorithm in the parallel programming platform Compute Unified Device Architecture that greatly improves the runtime of the proposed algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  • Ali K, Alsalih W, Hassanein H (2011a) Set-cover approximation algorithms for load-aware readers placement in RFID networks. In: 2011 IEEE international conference on communications (ICC), pp 1–6. https://doi.org/10.1109/icc.2011.5963396

  • Ali K, Hassanein HS, Alsalih W (2011b) Using neighbor and tag estimations for redundant reader eliminations in RFID networks. In: 2011 IEEE wireless communications and networking conference, pp 832–837

  • Bhatia M, Sood SK (2018) Internet of things based activity surveillance of defence personnel. J Ambient Intell Hum Comput 9(6):2061–2076. https://doi.org/10.1007/s12652-017-0507-3

    Article  Google Scholar 

  • Bilodeau JS, Bouzouane A, Bouchard B, Gaboury S (2018) An experimental comparative study of rssi-based positioning algorithms for passive RFID localization in smart environments. J Ambient Intell Huma Comput 9(5):1327–1343. https://doi.org/10.1007/s12652-017-0531-3

    Article  Google Scholar 

  • Bouet M, Pujolle G (2008) A range-free 3-d localization method for RFID tags based on virtual landmarks. In: PIMRC, pp 1–5

  • Bulusu N, Heidemann J, Estrin D (2000) Gps-less low cost outdoor localization for very small devices. In: IEEE pervasive computing magazine, pp 28–34

    Article  Google Scholar 

  • Campioni F, Choudhury S, Al-Turjman F (2018) Readers scheduling for RFID networks in the IOT era. In: 2018 IEEE international conference on communications workshops (ICC Workshops), pp 1–6. https://doi.org/10.1109/ICCW.2018.8403753

  • Capetanakis J (1979) Tree algorithms for packet broadcast channels. IEEE Trans Inf Theory 25(5):505–515

    Article  MathSciNet  Google Scholar 

  • Chen G, Shen X (2015) Free launch: optimizing GPU dynamic kernel launches through thread reuse. In: In Proceedings of the 48th international symposium on microarchitecture (MICRO-48). ACM, New York, NY, USA, pp 407–419

  • Chen Q, Hoilun N, Yunhao L (2008) Cardinality estimation for large-scale RFID systems. In: Sixth annual IEEE international conference on pervasive computing and communications (PerCom), pp 30–39

  • Chiu D, Jain R (1989) Analysis of the increase and decrease algorithms for congestion avoidance in computer networks. Comput Netw ISDN Syst 17(1):1–14

    Article  Google Scholar 

  • Dhas V, Muthukaruppan R, Balakrishnan K, Ganesan R (2010) Optimal solution for RFID load balancing. Communications in computer and information science. Springer, Berlin

    Google Scholar 

  • Dominikus S (2011) Medassist—a privacy preserving application using RFID tags. In: IEEE international conference on RFID-technologies and applications (RFID-TA), pp 370–375

  • Dong C, Guiran C, Jiajia L, Jie J (2011) Study on the interconnection architecture and access technology for internet of things. In: International conference on computer science and service system (CSSS), pp 1744–1748

  • Dong Q, Shukla A, Shrivastava V, Agrawal D, Banerjee S, Kar K (2007) Load balancing in large-scale RFID systems. In: IEEE INFOCOM 2007—26th IEEE international conference on computer communications, pp 2281–2285

  • Floerkemeier C (2006) Transmission control scheme for fast rfid object identification. In: Fourth annual IEEE international conference on pervasive computing and communications workshops (PerCom workshops 2006), pp 457–462

  • Garland M, Grand SL, Nickolls J, Anderson J, Hardwick J, Morton S, Phillips E, Zhang Y, Volkov V (2008) Parallel computing experiences with CUDA. In: IEEE micro 28, vol 4, pp 13–27

    Article  Google Scholar 

  • Garzon M (1995) Models of massive parallelism: analysis of cellular automata and neural networks. Springer, Berlin

    Book  Google Scholar 

  • He T, Huang C, Blum BM, Stankovic JA, Abdelzaher T (2003) Range-free localization schemes for large scale sensor networks. In: MobiCom, pp 81–95

  • Hsu HH, Chen BK, Lin CY, Barolli L, Takizawa M (2011) Danger warning via fuzzy inference in an RFID-deployed environment. J Ambient Intell Hum Comput 2(4):285–292. https://doi.org/10.1007/s12652-011-0047-1

    Article  Google Scholar 

  • Irfan N, Yagoub MCE, Hettak K (2011) Redundant reader elimination approaches for RFID networks. Springer, Berlin, pp 396–405

    Google Scholar 

  • Jang S, Lee J (2008) Fuzzy logic control-based load balancing agent for distributed RFID systems, lecture notes in computer science, vol 5226. Springer, Berlin

    Google Scholar 

  • Jihoon M, Wonjun L (2006) Adaptive splitting protocols for RFID tag collision arbitration. In: 7th ACM international symposium on mobile ad hoc networking and computing, Florence, Italy

  • Lawrence G (1975) Aloha packet system with and without slots and capture. ACM SIGCOMM Comput Commun Rev 5:28–42

    Article  Google Scholar 

  • Meddeb A, Jaballah A (2017) Algorithm for readers arrangement without collision in RFID networks. In: 2017 18th international conference on parallel and distributed computing, applications and technologies (PDCAT), pp 316–321. https://doi.org/10.1109/PDCAT.2017.00059

  • Munir A, Hossen MS, Choudhury S (2016) Localized load balancing in RFID systems. In: TPNC, pp 34–45

  • Murali K, Thyaga N (2006) Fast and reliable estimation schemes in RFID systems. In: 12th annual international conference on mobile computing and networking, Los Angeles, CA, USA

  • Nickollsa J, Buck I, Garland M, Skadron K (2008) A performance study of general-purpose applications on graphics processors using CUDA. In: Queue—GPU computing, pp 40–53

  • NVIDIA (2017) CUDA C Programming Guide. http://docs.nvidia.com/cuda/cuda-c-programming-guide

  • Qunfeng D, Shukla A, Shrivastava V, Agrawal D, Banerjee S, Kar K (2007) Load balancing in large-scale RFID systems. In: IEEE INFOCOM 2007—26th IEEE international conference on computer communications, pp 2281 – 2285

  • Rashid N, Choudhury S, Salomaa K (2016) Carre: Cellular automaton based redundant readers elimination in RFID networks. In: 2016 IEEE international conference on communications (ICC), pp 1–6. https://doi.org/10.1109/ICC.2016.7510604

  • Rashid N, Choudhury S, Salomaa K (2018) Localized algorithms for redundant readers elimination in RFID networks. Int J Parallel Emerg Distrib Syst 20:1–12. https://doi.org/10.1080/17445760.2017.1419242

    Article  Google Scholar 

  • Sanpechuda T, Kovavisaruch L (2008) A review of RFID localization: applications and techniques. In: ECTI-CON, p 769–772

  • Vinod N, Lixin G (2007) Energy-aware tag anti-collision protocols for RFID systems. In: Fifth IEEE international conference on pervasive computing and communications, pp 23 – 36

  • Wang C, Wu H, Tzeng NF (2007) RFID-based 3-d positioning schemes. In: INFOCOM, pp 1235–1243

  • Wang J, Yalamanchili S (2014) Characterization and analysis of dynamic parallelism in unstructured GPU applications. 2014 IEEE international symposium on workload characterization (IISWC), Raleigh, NC, pp 51–60

  • Wang YC, Liu SJ (2017) Minimum-cost deployment of adjustable readers to provide complete coverage of tags in RFID systems. J Syst Softw 134:228–241. https://doi.org/10.1016/j.jss.2017.09.015. http://www.sciencedirect.com/science/article/pii/S0164121217302054

    Article  Google Scholar 

  • Wu F, Xu L, Kumari S, Li X, Das AK, Shen J (2018) A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications. J Ambient Intell Hum Comput 9(4):919–930. https://doi.org/10.1007/s12652-017-0485-5

    Article  Google Scholar 

  • Xie K, Cao J, Wen J (2012) Distributed load-balancing algorithm for fast tag reading. Int J Parallel Emerg Distrib Syst 28(5):434–448

    Article  Google Scholar 

  • Yang Y, Li C, Zhou H (2015) CUDA-NP: realizing nested thread-level parallelism in GPGPU applications. J Comput Sci Technol 49:93

    Google Scholar 

  • Yoon W, Vaidya N (2010) RFID reader collision problem: performance analysis and medium access. Wirel Commun Mob Comput 2010:1–24

    Google Scholar 

  • Zhang W, He ZY, Ma LM, Salem R, Han L (2018) Ap load balance strategy in face of high user density. J Ambient Intell Hum Comput 2018:1. https://doi.org/10.1007/s12652-018-0690-x

    Article  Google Scholar 

  • Zhu W, Cao J, Xu Y, Yang L, Kong J (2014) Fault-tolerant RFID reader localization based on passive RFID tags. IEEE Trans Parallel Distrib Syst 25:2065

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Salimur Choudhury.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Munir, A., Laskar, M.T.R., Hossen, M.S. et al. A localized fault tolerant load balancing algorithm for RFID systems. J Ambient Intell Human Comput 10, 4305–4317 (2019). https://doi.org/10.1007/s12652-018-1114-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-018-1114-7

Keywords

Navigation