Beyond the limit: A fast tag identification protocol for RFID systems
نویسندگان
چکیده
This paper presents the design, experiment test and performance evaluation of FAST, a fast tag identification protocol in RFID systems. FAST includes a collision tolerant mechanism (CTM) that can identify tags in collision slots correctly. Each tag sends a randomly selected signature in its selected slot. When multiple tags select the same slot and a collision occurs, the reader can detect all the signatures correctly by exploiting the cross correlation. It then asks tags to send their tag IDs sequentially through a series of ACK commands, leading to no collision in the tag ID transmissions. By using CTM, all the tags in the collision slots can be identified successfully if the number of tags involved conforms to the signature detection limit. FAST also includes a dynamic frame length estimation mechanism to maximize the slot utilization so as to further improve the performance of tag identification. Theoretical analysis and experimental results from the USRP2 testbed demonstrate the feasibility of FAST. Simulation results show that FAST outperforms other protocols dramatically.
منابع مشابه
افزایش سرعت شناسایی در سیستمهای RFID
Radio frequency identification (RFID) is a new generation of automatic identification systems, based on wireless communication technology. In these systems all the tags using one communication channel to communicate with the reader. When two or more tags transmit their data to the reader simultaneously, their transmitted signals will collide. Resolving this collision has a direct impact on the ...
متن کاملDesign and Implementation of Field Programmable Gate Array Based Baseband Processor for Passive Radio Frequency Identification Tag (TECHNICAL NOTE)
In this paper, an Ultra High Frequency (UHF) base band processor for a passive tag is presented. It proposes a Radio Frequency Identification (RFID) tag digital base band architecture which is compatible with the EPC C C2/ISO18000-6B protocol. Several design approaches such as clock gating technique, clock strobe design and clock management are used. In order to reduce the area Decimal Matrix C...
متن کاملA Scalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled Delegation
RFID systems allow fast and automatic identification of RFID tags through a wireless channel. Information on product items like name, model, purpose, expiration date, etc., can be easily stored and retrieved from RFID tags attached to items. That is why, in the near future, RFID tags can be an active part of our everyday life when interacting with items around us. Frequently, such items may cha...
متن کاملCE-TIP: A Code Expansion Based Tag Identification Protocol for RFID Systems
With the ability of recognizing tag content wirelessly within a limited distance and a short period of query time, RFID technology has been adopted and deployed on various applications. In consequence, how to effectively avoid responses collision from multiple tags and to further reduce the average query time per tag becomes an important performance issue for RFID systems. To get better perform...
متن کاملPerfect tag identification protocol in RFID networks
Radio Frequency IDentification (RFID) systems are becoming more and more popular in the field of ubiquitous computing, in particular for objects identification. An RFID system is composed by one or more readers and a number of tags. One of the main issues in an RFID network is the fast and reliable identification of all tags in the reader range. The reader issues some queries, and tags properly...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Pervasive and Mobile Computing
دوره 21 شماره
صفحات -
تاریخ انتشار 2015