scholarly journals Time Slot Detection-Based M -ary Tree Anticollision Identification Protocol for RFID Tags in the Internet of Things

2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Xiaojiao Yang ◽  
Bizao Wu ◽  
Shixun Wu ◽  
Xinxin Liu ◽  
W. G. Will Zhao

Recently, a number of articles have proposed query tree algorithms based on bit tracking to solve the multitag collision problem in radio frequency identification systems. However, these algorithms still have problems such as idle slots and redundant prefixes. In this paper, a time slot detection-based M -ary tree (Time Slot Detection based M -ary tree, TSDM) tag anticollision algorithm has been proposed. When a collision occurs, the reader sends a predetection command to detect the distribution of the m -bit ID in the 2m subslots; then, the time slot after predetection is processed according to the format of the frame-like. The idle time slots have been eliminate through the detection. Using a frame-like mode, only the frame start command carries parameters, and the other time slot start commands do not carry any parameters, thereby reducing the communication of each interaction. Firstly, the research status of the anticollision algorithm is summarized, and then the TSDM algorithm is explained in detail. Finally, through theoretical analysis and simulation, it is proved that the time cost of the TSDM algorithm proposed in this paper is reduced by 12.57%, the energy cost is reduced by 12.65%, and the key performance outperforms the other anticollision algorithms.

2018 ◽  
Vol 8 (8) ◽  
pp. 1282 ◽  
Author(s):  
Nikola Cmiljanic ◽  
Hugo Landaluce ◽  
Asier Perallos

Radio Frequency Identification (RFID) is a technology that uses radio frequency signals to identify objects. RFID is one of the key technologies used by the Internet of Things (IoT). This technology enables communication between the main devices used in RFID, the reader and the tags. The tags share a communication channel. Therefore, if several tags attempt to send information at the same time, the reader will be unable to distinguish these signals. This is called the tag collision problem. This results in an increased time necessary for system identification and energy consumption. To minimize tag collisions, RFID readers must use an anti-collision protocol. Different types of anti-collision protocols have been proposed in the literature in order to solve this problem. This paper provides an update including some of the most relevant anti-collision protocols.


2020 ◽  
Vol 12 (3) ◽  
pp. 8-16
Author(s):  
Chaofu Jing ◽  
Zhongqiang Luo ◽  
Yan Chen ◽  
Xingzhong Xiong

Radio Frequency Identification (RFID) is one of the critical technologies of the Internet of Things (IoT). With the rapid development of IoT and the extensive use of RFID in our life, the step of RFID development should be faster. However, the tags in an RFID system are more and more utilized, both of them communicate in the same channel. The signal the reader received is mixed, and the reader cannot get the correct message the tags send directly. This phenomenon is often called a collision, which is the main obstacle to the development of the RFID system. Traditionally, the algorithm to solve the collision problem is called the anti-collision algorithm, the widely used anti-collision algorithm is based on Time Division Multiple Access (TDMA) like ALOHA-based and Binary search-based anti-collision algorithm. The principle of the TDMA-based anti-collision algorithm is to narrow the response of tags to one in each query time. These avoidance anti-collision algorithms performance poor when the number of tags is huge, thus, some researchers proposed the Blind Source Separation (BSS)-based anti-collision algorithm. The blind anti-collision algorithms perform better than the TDMA-based algorithms; it is meaningful to do some more research about this filed. This paper uses several BSS algorithms like FastICA, PowerICA, ICA_p, and SNR_MAX to separate the mixed signals in the RFID system and compare the performance of them. Simulation results and analysis demonstrate that the ICA_p algorithm has the best comprehensive performance among the mentioned algorithms. The FastICA algorithm is very unstable, and has a lower separation success rate, and the SNR_MAX algorithm has the worst performance among the algorithms applied in the RFID system. Some advice for future work will be put up in the end.


2014 ◽  
Vol 496-500 ◽  
pp. 1821-1824 ◽  
Author(s):  
Min Li Xu ◽  
Li Juan Yu ◽  
Cheng Ming Chen ◽  
Shou Qi Cao

The problem of anti-collision tag is a common problem of the radio frequency identification (RFID) system. ALOHA algorithm and binary search algorithm is the main algorithm to solve the collision problem. This paper analyzes the effectiveness of binary searching of backtracking algorithm in time slot number of shortening identification tags. Combining the theoretical analysis what needs to be improved in binary searching of backtracking algorithm.


Author(s):  
Jordan Frith

The phrase the Internet of things was originally coined in a 1999 presentation about attaching radio frequency identification (RFID) tags to individual objects. These tags would make the objects machine-readable, uniquely identifiable, and, most importantly, wirelessly communicative with infrastructure. This chapter evaluates RFID as a piece of mobile communicative infrastructure, and it examines two emerging forms: near-field communication (NFC) and Bluetooth low-energy beacons. The chapter shows how NFC and Bluetooth low-energy beacons may soon move some types of RFID to smartphones, in this way evolving the use of RFID in payment and transportation and enabling new practices of post-purchasing behaviors.


2021 ◽  
Vol 13 (7) ◽  
pp. 3684
Author(s):  
Bibiana Bukova ◽  
Jiri Tengler ◽  
Eva Brumercikova

The paper focuses on the environmental burden created by Radio Frequency Identification (RFID) tags in the Slovak Republic (SR). In order to determine the burden there, a model example was created to calculate electronic waste produced by households in the SR by placing RFID tags into municipal waste. The paper presents a legislative regulatory approach towards the environmental impacts from using RFID tags in the SR, as well as an analysis of the environmental burden of using RFID tags throughout the world. The core of the paper is focused on the research conducted in order to calculate the environmental burden of a model household in the SR, where the number of used RFID tags per year was observed; then, the volume of e-waste produced by households of the Slovak Republic per year was determined. In the conclusion, we provide the results of the research presented and discuss including our own proposal for solving the problems connected with the environmental burden of RFID technology.


Sensors ◽  
2018 ◽  
Vol 18 (10) ◽  
pp. 3584 ◽  
Author(s):  
Rania Baashirah ◽  
Abdelshakour Abuzneid

Radio Frequency Identification (RFID) is one of the leading technologies in the Internet of Things (IoT) to create an efficient and reliable system to securely identify objects in many environments such as business, health, and manufacturing areas. Recent RFID authentication protocols have been proposed to satisfy the security features of RFID communication. In this article, we identify and review some of the most recent and enhanced authentication protocols that mainly focus on the authentication between a reader and a tag. However, the scope of this survey includes only passive tags protocols, due to the large scale of the RFID framework. We examined some of the recent RFID protocols in term of security requirements, computation, and attack resistance. We conclude that only five protocols resist all of the major attacks, while only one protocol satisfies all of the security requirements of the RFID system.


Sign in / Sign up

Export Citation Format

Share Document