53 research outputs found

    New tag estimator for the dynamic framed slotted Aloha anti-collision algorithm in RFID systems

    Get PDF
    Radio frequency identification (RFID) technology is a wireless identification technique that has been used in many fields. This paper investigates the use of this technology for traffic monitoring which is the backbone of any intelligent transportation system. One of the main issues that face this technology is tag collisions. This study examines the performance of two known anti-collisions protocols: the Basic Framed Slotted Aloha (BFSA) and the Dynamic Framed Slotted Aloha (DFSA). For such application, it was found that the DFSA method outperforms the BFSA method. However, the DFSA method requires the use of tag estimator. For this reason, the study compares also the performance of three tag estimators associated with the DFSA: Vogt, Zhen and Schoute. It is observed that the Vogt method is the best if the number of tags is low, while the Schoute approach is superior for higher value. The study proposes a new hybrid tag estimator that combines the strength of the Vogt and Schoute approaches

    Frame Size Analysis of Optimum Dynamic Tree in RFID Systems

    Get PDF
    In RFID (Radio Frequency Identification) system, an anti-collision algorithm plays a prominent role in the tag identification process in order to reduce the tag identification delay and enhance the RFID system efficiency. In this work, we present a theoretical analysis of optimal frame size assignment for maximizing the system efficiency of a tree-based anti-collision algorithm, called optimum dynamic tree (ODT) algorithm, for RFID tag identification process. Our analysis indicates that the appropriate frame size for a given number of competing tags should not be set to the same value as the number of tags, which is commonly adopted in the literature. Instead, the frame size should be smaller roughly by a factor of 0.871 to maximize system efficiency. The closed-form for calculating system efficiency is derived and the derived simulation results are in a good agreement with the theoretical one. The exact appropriate frame sizes for the number of tags ranging from 2 to 100 are tabulated and compare the tag-identification time of conventional binary tree and ODT algorithms by using the international standard ISO 18000-6B

    Framework Quick Rfid Tag Reading in Dense Environments

    Get PDF
    Radio Frequency Identification (RFID) systems provide a mechanism to automatically identify the objects and collect information about them. The main objective of RFID Medium Access Control (MAC) protocols is to provide an opportunity to RFID readers in identifying multiple tags successfully and efficiently. Several variants of ALOHA and Binary Tree Search protocols are being proposed in this area but they show acceptable performances only if limited number of tags are present in the RFID reader region as fairly low amount of data is going to be exchanged. Their performances degrade when large numbers of tags are present in the region because if multiple tags try to communicate with the reader at the same time, it leads to collisions. This problem becomes more complex in the case of mobile tags because of their limited time presence in the reader's region. In this research, we develop a framework which can be used in conjunction with most of the Framed Slotted ALOHA protocols. A new protocol, Accelerated Framed Slotted ALOHA (AFSA), which is a result of application of the framework with Enhanced Dynamic Frame Slotted ALOHA, not only tries to minimize the number of collisions but also minimizes the total wastage of bandwidth due to collisions and unoccupied slots. We show, through analysis and simulations, our approach gives better average tag reading time over existing models. We further extend our approach to mobile RFID systems where the tags move with a constant velocity in the reader's vicinity.Computer Science Departmen

    Survey on Lightweight Primitives and Protocols for RFID in Wireless Sensor Networks

    Get PDF
    The use of radio frequency identification (RFID) technologies is becoming widespread in all kind of wireless network-based applications. As expected, applications based on sensor networks, ad-hoc or mobile ad hoc networks (MANETs) can be highly benefited from the adoption of RFID solutions. There is a strong need to employ lightweight cryptographic primitives for many security applications because of the tight cost and constrained resource requirement of sensor based networks. This paper mainly focuses on the security analysis of lightweight protocols and algorithms proposed for the security of RFID systems. A large number of research solutions have been proposed to implement lightweight cryptographic primitives and protocols in sensor and RFID integration based resource constraint networks. In this work, an overview of the currently discussed lightweight primitives and their attributes has been done. These primitives and protocols have been compared based on gate equivalents (GEs), power, technology, strengths, weaknesses and attacks. Further, an integration of primitives and protocols is compared with the possibilities of their applications in practical scenarios

    Mobile Tag Reading in a Multi-reader Rfid Environment

    Get PDF
    Radio Frequency Identification (RFID) refers to an emerging technology that intends, but not limited to replace barcode technology. RFID system assures to provide an effective inventorying, tracking and monitoring of any sorts of products in any field of applications. Recently, the large scale deployment of RFID system in supply chain management has necessities the use of multiple readers. Unfortunately, multi-reader RFID system suffers from reader collision problems that severely affect the system performance. Hence, this thesis aims to propose a novel framework for multi-reader RFID system based on Framed Slotted ALOHA protocol. The proposed framework is specific to a scenario in supply chain where a tag affixed to an item is in motion that moves on a conveyor belt and multiple readers which are fixed around the conveyor belt are supposed to read all the items. This work also determines the best pattern for the distribution of the tags on the conveyor belt.Computer Science Departmen

    FRAMEWORK FOR IMPROVING PERFORMANCE OF PROTOCOLS FOR READING RADIO FREQUENCY IDENTIFICATION TAGS

    Get PDF
    Radio-frequency Identification (RFID) is a highly sought-after wireless technology used to track and manage inventory in the supply chain industry. It has varied applications ranging from automated toll collection and security access management to supply chain logistics. Miniaturization and low tag costs of RFID tags have lead to item-level tagging, where not just the pallet holding products is tagged but each product inside has a tag attached to it. Item-level tagging of goods improves the accuracy of the supply chain but it significantly increases the number of tags that an RFID reader must identify and track. Faster identification is crucial to cutting cost and improving efficiency. Existing RFID protocols were designed to primarily handle static scenarios with both RFID tags and readers not being in motion. This research addresses the problem of inventory tracking within a warehouse in multitude of scenarios that involves mobile tags, multiple readers and high density environments. Mobility models are presented and frameworks are developed for the following scenarios: a) mobile tags on a conveyor belt with multiple fixed readers; b) mobile reader in a warehouse with stationary tags in shelves; and c) high density tag population with Near-Field (NF) communication. The proposed frameworks use information sharing among readers to facilitate protocol state handoff and segregation of tags into virtual zones to improve tag reading rates in mobile tag and mobile reader scenarios respectively. Further, a tag’s ability to listen to its Near-Field neighboring tags transmissions is exploited to assist the reader in resolving collisions and hence enhancing throughput. The frameworks discussed in this research are mathematically modeled with a probabilistic analysis of protocols employed in conjunction with framework. With an increased number of tags to be identified, mathematically understanding the performance of the protocol in these large-scale RFID systems becomes essential. Typically, this analysis is performed using Markov-chain models. However, these analyses suffer from the common state-space explosion problem. Hence, it is essential to come up with a scalable analysis, whose computation model is insensitive to the number of tags. The following research analyzes the performance of tag identification protocols in highly dense tag scenarios, and proposes an empirical formula to estimate the approximate time required to read all the tags in a readers range without requiring protocol execution

    Building efficient wireless infrastructures for pervasive computing environments

    Get PDF
    Pervasive computing is an emerging concept that thoroughly brings computing devices and the consequent technology into people\u27s daily life and activities. Most of these computing devices are very small, sometimes even invisible , and often embedded into the objects surrounding people. In addition, these devices usually are not isolated, but networked with each other through wireless channels so that people can easily control and access them. In the architecture of pervasive computing systems, these small and networked computing devices form a wireless infrastructure layer to support various functionalities in the upper application layer.;In practical applications, the wireless infrastructure often plays a role of data provider in a query/reply model, i.e., applications issue a query requesting certain data and the underlying wireless infrastructure is responsible for replying to the query. This dissertation has focused on the most critical issue of efficiency in designing such a wireless infrastructure. In particular, our problem resides in two domains depending on different definitions of efficiency. The first definition is time efficiency, i.e., how quickly a query can be replied. Many applications, especially real-time applications, require prompt response to a query as the consequent operations may be affected by the prior delay. The second definition is energy efficiency which is extremely important for the pervasive computing devices powered by batteries. Above all, our design goal is to reply to a query from applications quickly and with low energy cost.;This dissertation has investigated two representative wireless infrastructures, sensor networks and RFID systems, both of which can serve applications with useful information about the environments. We have comprehensively explored various important and representative problems from both algorithmic and experimental perspectives including efficient network architecture design and efficient protocols for basic queries and complicated data mining queries. The major design challenges of achieving efficiency are the massive amount of data involved in a query and the extremely limited resources and capability each small device possesses. We have proposed novel and efficient solutions with intensive evaluation. Compared to the prior work, this dissertation has identified a few important new problems and the proposed solutions significantly improve the performance in terms of time efficiency and energy efficiency. Our work also provides referrable insights and appropriate methodology to other similar problems in the research community
    corecore