Efficient Access Algorithms for Dynamic Many-tag Passive RFID Storage Systems

نویسندگان

  • Victor K.Y. Wu
  • Nitin H. Vaidya
  • Roy H. Campbell
چکیده

In this work, we investigate efficient algorithms for accessing information stored in a large number of RFID tags. Interrogators, equipped with RFID scanners, regularly arrive at the tag system, read from and write messages to the tags, and then leave. We develop techniques for the interrogators to read the newest messages from the tags as quickly as possible, since newer information is often the most relevant and interesting. We borrow ideas from aloha and query tree, two traditional singulation schemes, to form our many-tag access algorithms. Our query tree-based algorithms access tags faster, but are not as robust as our aloha-based algorithms. We study two scenarios. In the static scenario, the tag population is fixed. Here, it is naive to initially singulate all the tags, and then query them afterward to read the newest messages. Our results indicate that better-performing algorithms instead progressively segment the tag population at each round to find the newest messages. In the dynamic scenario, tags are continually arriving and departing, causing information to quickly disappear. We combat this by encoding messages, dividing the coded bits into multiple chunks, and then spreading them across multiple tags. This requires us to access a large number of tags when reading. Therefore, our results show that better-performing algorithms initially singulate all the tags (as opposed to the static scenario), and then continually query them afterward individually for data chunks in order to recover the newest messages.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Performance Analysis of Anti Collision Algorithms for Tracking Objects Containing Passive Rfid Tags

Radio frequency identification (RFID) systems have emerged as an efficient and cost effective solution for tracking objects containing passive RFID tags. The choice of passive RFID tag is due to its low cost and simplicity of implementation. The problem is to identify objects containing passive RFID tags. If there are multiple objects in the range of a tag reader, they all send their ID to the ...

متن کامل

افزایش سرعت شناسایی در سیستم‌های RFID

Radio frequency identification (RFID) is a new generation of automatic identification systems, based on wireless communication technology. In these systems all the tags using one communication channel to communicate with the reader. When two or more tags transmit their data to the reader simultaneously, their transmitted signals will collide. Resolving this collision has a direct impact on the ...

متن کامل

Joint Design of RFID Reader and Tag Anti-Collision Algorithms: A Cross-Layer Approach

This paper investigates the potential interactions between reader and tag anti-collision algorithms of passive RFID (radio frequency identification) systems. Conventionally, reader and tag anti-collision algorithms are designed by assuming that they are independent from each other. In practice, however, readers and tags usually operate in the same frequency band. Therefore, contention between t...

متن کامل

Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module

This is a very useful application of RFID (Radio-frequency identification) and is very commonly used in institutes, offices, homes and so on. An RFID system consists of a reader device and a transponder. A transponder or tag has a unique serial number which is identified by the reader. Here RFID has been interfaced with ARM Processor to provide secured access. The relevant messages are also dis...

متن کامل

Efficient Passive Full-disclosure Attack on RFID Light- weight Authentication Protocols LMAP++ and SUAP

Radio Frequency Identification (RFID) is a technology that has been widely used in daily life, such as in access control, in electronic passports, in payment and ticketing. However, since the RFID information may be easily unveiled over the air, security and the privacy issues always exist. Many RFID authentication protocols have been proposed to preserve security and privacy of the system. Nev...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010