scholarly journals Blind anti-collision methods for RFID system: a comparative analysis

2020 ◽  
Vol 12 (3) ◽  
pp. 8-16
Author(s):  
Chaofu Jing ◽  
Zhongqiang Luo ◽  
Yan Chen ◽  
Xingzhong Xiong

Radio Frequency Identification (RFID) is one of the critical technologies of the Internet of Things (IoT). With the rapid development of IoT and the extensive use of RFID in our life, the step of RFID development should be faster. However, the tags in an RFID system are more and more utilized, both of them communicate in the same channel. The signal the reader received is mixed, and the reader cannot get the correct message the tags send directly. This phenomenon is often called a collision, which is the main obstacle to the development of the RFID system. Traditionally, the algorithm to solve the collision problem is called the anti-collision algorithm, the widely used anti-collision algorithm is based on Time Division Multiple Access (TDMA) like ALOHA-based and Binary search-based anti-collision algorithm. The principle of the TDMA-based anti-collision algorithm is to narrow the response of tags to one in each query time. These avoidance anti-collision algorithms performance poor when the number of tags is huge, thus, some researchers proposed the Blind Source Separation (BSS)-based anti-collision algorithm. The blind anti-collision algorithms perform better than the TDMA-based algorithms; it is meaningful to do some more research about this filed. This paper uses several BSS algorithms like FastICA, PowerICA, ICA_p, and SNR_MAX to separate the mixed signals in the RFID system and compare the performance of them. Simulation results and analysis demonstrate that the ICA_p algorithm has the best comprehensive performance among the mentioned algorithms. The FastICA algorithm is very unstable, and has a lower separation success rate, and the SNR_MAX algorithm has the worst performance among the algorithms applied in the RFID system. Some advice for future work will be put up in the end.

2018 ◽  
Vol 8 (8) ◽  
pp. 1282 ◽  
Author(s):  
Nikola Cmiljanic ◽  
Hugo Landaluce ◽  
Asier Perallos

Radio Frequency Identification (RFID) is a technology that uses radio frequency signals to identify objects. RFID is one of the key technologies used by the Internet of Things (IoT). This technology enables communication between the main devices used in RFID, the reader and the tags. The tags share a communication channel. Therefore, if several tags attempt to send information at the same time, the reader will be unable to distinguish these signals. This is called the tag collision problem. This results in an increased time necessary for system identification and energy consumption. To minimize tag collisions, RFID readers must use an anti-collision protocol. Different types of anti-collision protocols have been proposed in the literature in order to solve this problem. This paper provides an update including some of the most relevant anti-collision protocols.


2017 ◽  
Vol 2017 ◽  
pp. 1-10 ◽  
Author(s):  
Hugo Landaluce ◽  
Laura Arjona ◽  
Asier Perallos ◽  
Lars Bengtsson ◽  
Nikola Cmiljanic

One of the main existing problems in Radio Frequency Identification (RFID) technology is the tag collision problem. When several tags try to respond to the reader under the coverage of the same reader antenna their messages collide, degrading bandwidth and increasing the number of transmitted bits. An anticollision protocol, based on the classical Binary Tree (BT) protocol, with the ability to decrease the number of bits transmitted by the reader and the tags, is proposed here. Simulations results show that the proposed protocol increases the throughput with respect to other recent state-of-the-art protocols while keeping a low energy consumption of a passive RFID system.


2015 ◽  
Vol 2015 ◽  
pp. 1-10 ◽  
Author(s):  
Hsing-Wen Wang

Radio Frequency IDentification (RFID) used in business applications and international business management fields can create and sustain the competitive advantage, which is also one of the wireless telecommunication techniques for recognizing objects to realize Internet of Things (IoT) technologies. In construction of IoT network, the RFID technologies play the role of the front-end data collection via tag identification, as the basis of IoT. Hence, the adoption of RFID technologies is spurring innovation and the development of the IoT. However, in RFID system, one of the most important challenges is the collision resolution between the tags when these tags transmit their data to the reader simultaneously. Hence, in this paper I develop an efficient scheme to estimate the number of unidentified tags for Dynamic Framed Slotted Aloha (DFSA) based RFID system, with the view of increasing system performance. In addition to theoretical analysis, simulations are conducted to evaluate the performance of proposed scheme. The simulation results reveal the proposed scheme works very well in providing a substantial performance improvement in RFID system. The proposed algorithm promotes business effectiveness and efficiency while applying the RFID technologies to IoT.


Author(s):  
Ching-Nung Yang ◽  
Jyun-Yan He ◽  
Yu-Ching Kun

A tag collision problem (or missed reads) in Radio Frequency Identification (RFID) system happens when multiple tags respond to a reader simultaneously. At this time, the reader cannot differentiate these tags correctly. This problem is often seen whenever a large volume of RFID tags are read together in the same radio frequency field. Tag collisions will degrade identification efficiency, and this unreliable identification will compromise the usefulness of RFID system. This chapter introduces tag collision problem and discusses tag anti-collision protocols, including ALOHA-based protocol, Binary Tree (BT) protocol, and Query Tree (QT) protocol. To date, most tag anti-collision protocols are QT protocols. Thus, in this chapter, the authors briefly describe some elegant researches on QT protocols, and also introduce their recent research results on QT protocols.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Xiaojiao Yang ◽  
Bizao Wu ◽  
Shixun Wu ◽  
Xinxin Liu ◽  
W. G. Will Zhao

Recently, a number of articles have proposed query tree algorithms based on bit tracking to solve the multitag collision problem in radio frequency identification systems. However, these algorithms still have problems such as idle slots and redundant prefixes. In this paper, a time slot detection-based M -ary tree (Time Slot Detection based M -ary tree, TSDM) tag anticollision algorithm has been proposed. When a collision occurs, the reader sends a predetection command to detect the distribution of the m -bit ID in the 2m subslots; then, the time slot after predetection is processed according to the format of the frame-like. The idle time slots have been eliminate through the detection. Using a frame-like mode, only the frame start command carries parameters, and the other time slot start commands do not carry any parameters, thereby reducing the communication of each interaction. Firstly, the research status of the anticollision algorithm is summarized, and then the TSDM algorithm is explained in detail. Finally, through theoretical analysis and simulation, it is proved that the time cost of the TSDM algorithm proposed in this paper is reduced by 12.57%, the energy cost is reduced by 12.65%, and the key performance outperforms the other anticollision algorithms.


2011 ◽  
Vol 141 ◽  
pp. 493-497 ◽  
Author(s):  
Xue Qi Xu ◽  
Cong Jin ◽  
Yu Dong Cao

Reverse supply chain (RSC) management, which is oriented towards the entire lifecycle of products, has been concerned with the emerging of green manufacturing. Based on radio frequency identification (RFID), sensing and intelligent technologies, the rapid development of the Internet of things (IoT) will form a kind of smart reverse supply chain (SRSC), which is able to enhance the reverse supply chain real-time information transmission, as well as reduce the uncertainty and complexity of the product recycling process. Some problems of RSC are analyzed in this paper, and then the SRSC system network topology is proposed. Furthermore, the technical integrated architecture and related key technologies are discussed.


Sensors ◽  
2020 ◽  
Vol 20 (8) ◽  
pp. 2378
Author(s):  
Weiqing Huang ◽  
Yanfang Zhang ◽  
Yue Feng

With the rapid development of the internet of things, radio frequency identification (RFID) technology plays an important role in various fields. However, RFID systems are vulnerable to cloning attacks. This is the fabrication of one or more replicas of a genuine tag, which behave exactly as a genuine tag and fool the reader to gain legal authorization, leading to potential financial loss or reputation damage. Many advanced solutions have been proposed to combat cloning attacks, but they require extra hardware resources, or they cannot detect a clone tag in time. In this article, we make a fresh attempt to counterattack tag cloning based on spatiotemporal collisions. We propose adaptable clone detection (ACD), which can intuitively and accurately display the positions of abnormal tags in real time. It uses commercial off-the-shelf (COTS) RFID devices without extra hardware resources. We evaluate its performance in practice, and the results confirm its success at detecting cloning attacks. The average accuracy can reach 98.7%, and the recall rate can reach 96%. Extensive experiments show that it can adapt to a variety of RFID application scenarios.


Author(s):  
Yubao Hou ◽  
Hua Liang ◽  
Juan liu

In the traditional RFID (Radio Frequency IDentification) system, a secure wired channel communication is used between the reader and the server. The newly produced mobile RFID system is different from the traditional RFID system, the communication between the reader and the server is based on a wireless channel, and the authentication protocol is suitable for traditional RFID systems, but it cannot be used in mobile RFID systems. To solve this problem, a mutual authentication protocol MSB (Most Significant Bit) for super lightweight mobile radio frequency identification system is proposed based on bit replacement operation. MSB is a bitwise operation to encrypt information and reduce the computational load of communication entities. Label, readers, and servers authenticate first and then communicate, MSB may be used to resistant to common attacks. The security analysis of the protocol shows that the protocol has high security properties, the performance analysis of the protocol shows that the protocol has the characteristics of low computational complexity, the formal analysis of the protocol based on GNY logic Gong et al. (1990) provides a rigorous reasoning proof process for the protocol.


Sign in / Sign up

Export Citation Format

Share Document