Efficient tag reading protocol for large-scale RFID systems with pre-reading

نویسندگان

  • Shuen-Chih Tsai
  • Yu-Min Hu
  • Chen-Hsun Chai
  • Jung-Shian Li
چکیده

In large-scale RFID systems, collecting all of the tag IDs is a time-consuming process. A protocol designated as Smart Trend-Traversal (STT) has been proposed to reduce collisions during the tag collection process and to dynamically construct the query strings used to interrogate the tags. In general, if the tag ID information is known to the reader from a previous tag collection round, the efficiency of the current round can be significantly improved. Various protocols have been proposed for scanning a known tag set based on the use of a hash function. Accordingly, the present study proposes an Enhanced STT scheme based on a blocking protocol and a Distributed Record Tag-Check (DRTC) mechanism. Compared to the conventional STT scheme, the proposed protocol adaptively adjusts the length of the query string depending on the response received to the previous query. Moreover, in the DRTC mechanism, the tags determine their transmission slot frame directly without the assistance of the reader, and thus the overall overhead of the tag-collection process is reduced. The simulation results show that the Enhanced STT scheme reduces the total number of queries required to collect the entire tag set compared to the conventional STT method. Moreover, the proposed DRTC mechanism yields an effective reduction in the total number of frame slots compared to existing protocols such as TPP/CSTR and ECRB. © 2016 Elsevier B.V. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Efficient Delegation and Transfer of Ownership Protocol for RFID tags

RFID technology raises many privacy concerns among which the potential tracking of an RFID tag bearer and the possibility of collecting information about him. As RFID tags may often change hands, it is also necessary to guarantee the privacy of a new tag owner. In this paper, we introduce a new protocol based on pseudonyms that solves these privacy issues while enabling tag identification witho...

متن کامل

Measurement of Effective Reading Distance of UHF RFID Passive Tags

Currently, for manufacturing UHF RFID passive tags, the online inspection mechanism is very simple. This mechanism tries to read tag IDs in the near field, and hence validates tag’s usability. For UHF RFID applications, tag usability is a very rough indicator and cannot characterize the performance of a tag accurately. In practice, effective reading distance is the key performance index of a ta...

متن کامل

Lightweight RFID Authentication Protocols for Special Schemes

This thesis addresses the problem of providing secure protocols for the practical application of low cost Radio-Frequency Identification (RFID) tags. This is particularly challenging because the tags are limited in cryptographic functionality and general performance, but also when there is a need to read multiple tags in a range of practical environments whilst maintaining data privacy. Several...

متن کامل

An RFID Mutual Authentication Protocol using ECIES

-Security of data is a major issue in RFID environment as RFID is a wireless Radio frequency devices used in the wireless network. The data reads by the tag is send to reader which is then stored at the server, but security is an important concern during the transmission of data from tag to reader. Although there are various security and authentication techniques implemented for the security of...

متن کامل

Optimum Tag Reading Efficiency of Multi-Packet Reception Capable RFID Readers

Maximizing the tag reading rate of a reader is one of the most important design objectives in RFID systems as the tag reading rate is inversely proportional to the time required to completely read all the tags within the readers radio field. To this end, numerous techniques have been independently suggested so far and they can be broadly categorized into pure advancements in the link-layer tag ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computer Communications

دوره 88  شماره 

صفحات  -

تاریخ انتشار 2016