skip to main content
10.1145/1298197.1298210acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
Article

Exploiting id knowledge for tag identification in rfid networks

Published: 22 October 2007 Publication History

Abstract

In this paper, we consider the problem of identifying a set of objects in an RFID network. We propose a query tree based protocol to reduce the number of transmission collisions. The key idea of our protocol is to take advantage of the (partial) knowledge about the set of tags to be identified: in particular, their approximated number, and above all their distribution. More specifically, we show how much gain in performance can be achieved by having information about the set of IDs to be identified. Such information can be obtained from statistical data, or from other features, depending on the application. Of course, a perfect knowledge makes useless the identification process: the aim of this work is to show how query tree protocols improve, by taking into account of the information about the tags. Simulation results show that our approach performs better than classical query tree protocols [1], in terms of number of queries needed to identify all tags, which is a commonly used metric, strictly related to delay. Moreover, our approach out performs also Aloha-based protocols that for their randomized nature, are independent from the IDs distributions: in such protocols, tags randomly choose a slot in which transmit, that is equivalent to "re-naming" the IDs, so they do not take any advantage from the knowledge of the original ID distribution.

References

[1]
Ching Law, Kayi Lee, and Kai-Yeung Siu. Efficient memoryless protocol for tag identification (extended abstract). In Proc. of 4th International workshop on Discrete Algorithms and methods for mobile computing and communications (DIALM'00), pages 75--84, 2000.
[2]
Klaus Finkenzeller. RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification. John Wiley & Sons, 2nd edition, 2003.
[3]
MIT Auto-ID Center. Draft protocol specification for a 900 MHz class 0 radio frequency identification tag. http://www.epcglobalinc.org, February, 23rd, 2003.
[4]
EPCglobal. Epc radio-frequency identity protocols class-1 generation-2 uhf rfid protocol for communications at 860 mhz - 960 mhz, version 1.0.9. http://www.epcglobalinc.org/standards/, January 2005.
[5]
D. W. Engels and S.E. Sarma. The reader collision problem. In IEEE International Conference on Systems, Man and Cybernetics, 2002, volume 3, October 2002.
[6]
. Waldrop, D.W. Engels, and S.E. Sarma. Colorwave: a MAC for RFID reader networks. In IEEE Wireless Communications and Networking 2003. (WCNC 2003), volume 3, pages 1701--1704, New Orleans, Louisiana, March 2003.
[7]
J. Myung, W. Lee, J. Srivastava, and T. K. Shih. Tag-splitting: Adaptive collision arbitration protocols for RFID tag identification. IEEE Transactions on Parallel and Distributed Systems, 18(6):763--775, June 2007.
[8]
H. Vogt. Efficient object identification with passive RFID tags. In Proceedings of International Conference on Pervasive Computing 2002, pages 98--113, 2002.
[9]
S.-R. Lee, S.-D. Joo, and C.-W. Lee. An enhanced dynamic framed slotted aloha algorithm for RFID tag identification. In Proc. of Mobiquitous 2005, pages 166--172, 2005.
[10]
D. R. Hush and C. Wood. Analysis of tree algorithms for rfid arbitration. In IEEE International Symposium on Information Theory, page 107, August 1998.
[11]
M. A. Bonuccelli, F. Lonetti, and F. Martelli. Tree slotted aloha: a new protocol for tag identification in RFID networks. In Proc. of IEEE Int. Symposium on a World of Wireless, Mobile and Multimedia Networks, pages 603--608, June, 2006.
[12]
L. G. Roberts. Extensions of packet communication technology to a hand held personal terminal. In Proc. of Spring Joint Computer Conference, AFIPS Conference, 1972, volume 40, pages 295--298, 1972.
[13]
A. Micic, A. Nayak, D. Simplot-Ryl, and I. Stojmenovic. A hybrid randomized protocol for RFID tag identification. Sensor Review, 26(2):147--154, 2006.
[14]
F. C. Schoute. Dynamic frame length aloha. IEEE Transactions on Communications, COM-31(4):565--568, April 1983.
[15]
John I. Capetanakis. Tree algorithms for packet broadcast channels. IEEE Transactions on Information Theory, IT-25:505-515, September 1979.
[16]
M. A. Bonuccelli, F. Lonetti, and F. Martelli. Comparative analysis of tag identification protocols in rfid networks. Presented at Med-Hoc-Net 2006, Lipari Island, Italy, June 2006.

Cited By

View all
  • (2022)A Bit-Tracking Knowledge-Based Query Tree for RFID Tag Identification in IoT SystemsSensors10.3390/s2209332322:9(3323)Online publication date: 26-Apr-2022
  • (2022)Face Biometric Authentication System for ATM using Deep Learning2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS)10.1109/ICICCS53718.2022.9788310(1446-1451)Online publication date: 25-May-2022
  • (2021)Design of Multi-Functional Access Control SystemIEEE Access10.1109/ACCESS.2021.30879179(85255-85264)Online publication date: 2021
  • Show More Cited By

Index Terms

  1. Exploiting id knowledge for tag identification in rfid networks

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        PE-WASUN '07: Proceedings of the 4th ACM workshop on Performance evaluation of wireless ad hoc, sensor,and ubiquitous networks
        October 2007
        104 pages
        ISBN:9781595938084
        DOI:10.1145/1298197
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 22 October 2007

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. anti-collision protocol
        2. passive tags
        3. radio frequency identification

        Qualifiers

        • Article

        Conference

        MSWiM07
        Sponsor:

        Acceptance Rates

        Overall Acceptance Rate 70 of 240 submissions, 29%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)3
        • Downloads (Last 6 weeks)1
        Reflects downloads up to 15 Feb 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2022)A Bit-Tracking Knowledge-Based Query Tree for RFID Tag Identification in IoT SystemsSensors10.3390/s2209332322:9(3323)Online publication date: 26-Apr-2022
        • (2022)Face Biometric Authentication System for ATM using Deep Learning2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS)10.1109/ICICCS53718.2022.9788310(1446-1451)Online publication date: 25-May-2022
        • (2021)Design of Multi-Functional Access Control SystemIEEE Access10.1109/ACCESS.2021.30879179(85255-85264)Online publication date: 2021
        • (2018)A Comparison of RFID Anti-Collision Protocols for Tag IdentificationApplied Sciences10.3390/app80812828:8(1282)Online publication date: 1-Aug-2018
        • (2018)Query Tree with Knowledge-based Splitting for RFID Tag IdentificationProceedings of the 2018 International Conference on Sensors, Signal and Image Processing10.1145/3290589.3290592(24-28)Online publication date: 12-Oct-2018
        • (2016)Comparative analysis of RFID anti-collision algorithms in IoT applications2016 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS)10.1109/ISPACS.2016.7824757(1-5)Online publication date: Oct-2016
        • (2013)Tag Identification Protocols in RFID SystemsSecurity and Trends in Wireless Identification and Sensing Platform Tags10.4018/978-1-4666-1990-6.ch001(1-33)Online publication date: 2013
        • (2010)Energy-Aware Tag Anticollision Protocols for RFID SystemsIEEE Transactions on Mobile Computing10.1109/TMC.2009.969:1(44-59)Online publication date: 1-Jan-2010
        • (2009)Smart Labels, Smart Tags and RFIDeCulture10.1007/978-3-540-75276-9_15(183-184)Online publication date: 2009
        • (2008)ARPAProceedings of the 2008 IEEE International Conference on Wireless & Mobile Computing, Networking & Communication10.1109/WiMob.2008.40(178-183)Online publication date: 12-Oct-2008

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media