1,960 research outputs found
Adaptive and Probabilistic Power Control Algorithms for RFID Reader Networks
In radio frequency identification (RFID) systems, the detection range and read rates will suffer from interference among high power reading devices. This problem grows severely and degrades system performance in dense RFID networks. Consequently, medium access protocols (MAC) protocols are needed for such networks to assess and provide access to the channel so that tags can be read accurately. In this paper, we investigate a suite of feasible power control schemes to ensure overall coverage area of the system while maintaining a desired read rate. The power control scheme and MAC protocol dynamically adjusts the RFID reader power output in response to the interference level seen during tag reading and acceptable signal-to-noise ratio (SNR). We present novel distributed adaptive power control (DAPC) and probabilistic power control (PPC) as two possible solutions. A suitable back off scheme is also added with DAPC to improve coverage. Both the methodology and implementation of the schemes are presented, simulated, compared, and discussed for further work
Adaptive and Probabilistic Power Control Algorithms for Dense RFID Reader Network
In radio frequency identification (RFID) systems, the detection range and read rates may suffer from interferences between high power devices such as readers. In dense networks, this problem grows severely and degrades system performance. In this paper, we investigate feasible power control schemes to ensure overall coverage area of the system while maintaining a desired data rate. The power control should dynamically adjust the output power of a RFID reader by adapting to the noise level seen during tag reading and acceptable signal-to-noise ratio (SNR). We present a novel distributed adaptive power control (DAPC) and probabilistic power control (PPC) as two possible solutions. This paper discusses the methodology and implementation of both algorithms analytically. Both DAPC and PPC scheme are simulated, compared and discussed for further work
Perfect tag identification protocol in RFID networks
Radio Frequency IDentification (RFID) systems are becoming more and more
popular in the field of ubiquitous computing, in particular for objects
identification. An RFID system is composed by one or more readers and a number
of tags. One of the main issues in an RFID network is the fast and reliable
identification of all tags in the reader range. The reader issues some queries,
and tags properly answer. Then, the reader must identify the tags from such
answers. This is crucial for most applications. Since the transmission medium
is shared, the typical problem to be faced is a MAC-like one, i.e. to avoid or
limit the number of tags transmission collisions. We propose a protocol which,
under some assumptions about transmission techniques, always achieves a 100%
perfomance. It is based on a proper recursive splitting of the concurrent tags
sets, until all tags have been identified. The other approaches present in
literature have performances of about 42% in the average at most. The
counterpart is a more sophisticated hardware to be deployed in the manufacture
of low cost tags.Comment: 12 pages, 1 figur
RFID Localisation For Internet Of Things Smart Homes: A Survey
The Internet of Things (IoT) enables numerous business opportunities in
fields as diverse as e-health, smart cities, smart homes, among many others.
The IoT incorporates multiple long-range, short-range, and personal area
wireless networks and technologies into the designs of IoT applications.
Localisation in indoor positioning systems plays an important role in the IoT.
Location Based IoT applications range from tracking objects and people in
real-time, assets management, agriculture, assisted monitoring technologies for
healthcare, and smart homes, to name a few. Radio Frequency based systems for
indoor positioning such as Radio Frequency Identification (RFID) is a key
enabler technology for the IoT due to its costeffective, high readability
rates, automatic identification and, importantly, its energy efficiency
characteristic. This paper reviews the state-of-the-art RFID technologies in
IoT Smart Homes applications. It presents several comparable studies of RFID
based projects in smart homes and discusses the applications, techniques,
algorithms, and challenges of adopting RFID technologies in IoT smart home
systems.Comment: 18 pages, 2 figures, 3 table
Decentralized Power Control with Implementation for RFID Networks
In radio frequency identification (RFID) systems, the detection range and read rates will suffer from interference among high power reading devices. This problem grows severely and degrades system performance in dense RFID networks. In this paper, we investigate a suite of feasible power control schemes to ensure overall coverage area of the system while maintaining a desired read rate. The power control scheme and MAC protocol dynamically adjusts the RFID reader power output in response to the interference level seen locally during tag reading for an acceptable signal-to-noise ratio (SNR). We present novel distributed adaptive power control (DAPC) and probabilistic power control (PPC) as two possible solutions. A generic UHF wireless testbed is built using UMR/SLU GEN4-SSN for implementng the protocol. Simulation and hardware results are included
When Things Matter: A Data-Centric View of the Internet of Things
With the recent advances in radio-frequency identification (RFID), low-cost
wireless sensor devices, and Web technologies, the Internet of Things (IoT)
approach has gained momentum in connecting everyday objects to the Internet and
facilitating machine-to-human and machine-to-machine communication with the
physical world. While IoT offers the capability to connect and integrate both
digital and physical entities, enabling a whole new class of applications and
services, several significant challenges need to be addressed before these
applications and services can be fully realized. A fundamental challenge
centers around managing IoT data, typically produced in dynamic and volatile
environments, which is not only extremely large in scale and volume, but also
noisy, and continuous. This article surveys the main techniques and
state-of-the-art research efforts in IoT from data-centric perspectives,
including data stream processing, data storage models, complex event
processing, and searching in IoT. Open research issues for IoT data management
are also discussed
Adaptive Power Control Protocol with Hardware Implementation for Wireless Sensor and RFID Reader Networks
The development and deployment of radio frequency identification (RFID) systems render a novel distributed sensor network which enhances visibility into manufacturing processes. In RFID systems, the detection range and read rates will suffer from interference among high-power reading devices. This problem grows severely and degrades system performance in dense RFID networks. Consequently, medium access protocols (MAC) protocols are needed for such networks to assess and provide access to the channel so that tags can be read accurately. In this paper, we investigate a suite of feasible power control schemes to ensure overall coverage area of the system while maintaining a desired read rate. The power control scheme and MAC protocol dynamically adjust the RFID reader power output in response to the interference level seen during tag reading and acceptable signal-to-noise ratio (SNR). We present novel distributed adaptive power control (DAPC) as a possible solution. A suitable back off scheme is also added with DAPC to improve coverage. A generic UHF wireless testbed is built using UMR/SLU GEN4-SSN for implementing the protocol. Both the methodology and hardware implementation of the schemes are presented, compared, and discussed. The results of hardware implementation illustrate that the protocol performs satisfactorily as expected
Tag anti-collision algorithms in RFID systems - a new trend
RFID is a wireless communication technology that provides automatic identification or tracking and data collection from any tagged object. Due to the shared communication channel between the reader and the tags during the identification process in RFID systems, many tags may communicate with the reader at the same time, which causes collisions. The problem of tag collision has to be addressed to have fast multiple tag identification process. There are two main approaches to the tag collision problem: ALOHA based algorithms and tree based algorithms. Although these methods reduce the collision and solve the problem to some extent, they are not fast and efficient enough in real applications. A new trend emerged recently which takes the advantages of both ALOHA and tree based approaches. This paper describes the process and performance of the tag anti-collision algorithms of the tree-ALOHA trend
Energy aware improved least and most significant bit arbitration algorithm for WORM tags
AbstractPassive Radio Frequency Identification systems have gained enormous attention and popularity especially after its adoption in time and data critical systems. Theoretically, these systems have the potential to read over 100 tags per second in applications which are well insulated from RF noise. Nevertheless, this may not be the case in practical systems, as tag collision is one of the major deterrents affecting the recognition rate. This paper exhaustively analyses the existing probabilistic, deterministic and hybrid algorithms on collision resolutions. In probabilistic algorithms, tags send their entire ID to the RFID reader in respective slots while tags in deterministic algorithms respond bit by bit based on the RFID reader’s query. To minimize identification delay, tag communication overhead and high energy consumption, a new energy efficient collision resolution strategy named Improved Least and Most Significant Bit Algorithm (LaMSBA) is introduced to effectively singulate a tag and increase the identification efficiency in changing tag population even when the bits in tag ID’s are randomly or uniformly distributed. Extensive simulation studies show that LaMSBA can be chosen as better alternatives for dense time and data critical RFID enabled systems. In addition, M/G/1 Queuing model is suitably identified and the the analytical results concluded that LaMSBA is able to maintain the steady state condition even when Class 1 tags arrive at the rate of 15 tags/second in the reader’s interrogation zone
- …