Threshold jumping and wrap-around scan techniques toward efficient tag identification in high density RFID systems

Hsu, Ching-Hsien; Chao, Han-Chieh; Hyuk Park, Jong
September 2011
Information Systems Frontiers;Sep2011, Vol. 13 Issue 4, p471
Academic Journal
With the emergence of wireless RFID technologies, the problem of Anti-Collision has been arousing attention and instigated researchers to propose different heuristic algorithms for advancing RFID systems operated in more efficient manner. However, there still have challenges on enhancing the system throughput and stability due to the underlying technologies had faced different limitation in system performance when network density is high. In this paper, we present a Threshold Jumping ( TJ) and a Wrap-Around Scan ( WAS) techniques, which are query tree based approaches, aiming to coordinate simultaneous communications in high density RFID environments, to speedup tag identification, to increase the overall read rate and to improve system throughput in large-scale RFID systems. The main idea of the Threshold Jumping is to limit the number of collisions. When the number of collisions exceeds a predefined threshold, it reveals that tag density in RF field is too high. To avoid unnecessary enquiry messages, the prefix matching will be moved to next level of the query tree, alleviating the collision problems. The method of setting frequency bound indeed improves the efficiency in high density and randomly deployed RFID systems. However, in irregular or imbalanced RFID networks, inefficient situation may happen. The problem is that the prefix matching is performed in single direction level-order scheme, which may cause an imbalance query tree on which the right sub-tree always not been examined if the identification process goes to next level before scan the right sub-tree due to threshold jumping. By scanning the query tree from right to left in alternative levels, i.e., wrap-around, this flaw cold be ameliorated. To evaluate the performance of proposed techniques, we have implemented the TJ and the WAS method along with the query tree protocol. The simulation results show that the proposed techniques provide superior performance in high density environments. It is shown that the TJ and WAS are effective in terms of increasing system throughput and minimizing identification delay.


Related Articles

  • Integrating Wireless Sensors and RFID Tags into Energy-Efficient and Dynamic Context Networks. Tomás Sánchez López; Daeyoung Kim; Gonzalo Huerta Canepa; Koudjo Koumadi // Computer Journal;Mar2009, Vol. 52 Issue 2, p240 

    Context-aware systems have traditionally used distributed sensors to gather context information. The unique identity provided by radio frequency identification (RFID) tags could provide additional information to the sensor data. However, the task of matching identity and sensor information in...

  • Lifting RFID's veil of secrecy. Tanner, John C. // America's Network;Jun2006, Vol. 110 Issue 3, p42 

    The article discusses the RFID chips virus vulnerability. RFID tag is a computer chip connected to a network that relies on the software. This is similar to other network like the Internet-capable mobile phones. The news on RFID virus story is brought by the unawareness of its use. RFID tag is...

  • Evaluation and exploration of RFID systems by rapid prototyping. Angerer, Christoph; Langwieser, Robert; Rupp, Markus // Personal & Ubiquitous Computing;Mar2012, Vol. 16 Issue 3, p309 

    Today's RFID systems exhibit relatively little functionality, while future systems and ubiquitous computing applications require an ample set of general purpose features, like wide communication ranges, high data rates, high reliability, and many more. In order to meet these high-performance...

  • Analysis of Bluetooth Protocol in Presence of Bursty Traffic. Latkoski, Pero; Gavrilovska, Liljana // Journal of Communications;Nov2007, Vol. 2 Issue 6, p38 

    Bluetooth (BT) technology through its considerable functionality and flexibility is incorporated in many modern personal electronic devices, offering reliable and sufficient wireless connectivity. On the other hand, the new generation of cellular communication systems while providing wide...

  • RHS-US: Real-Time Hash-Chain Scheme Decreasing Pre-Calculation Mechanism for Ubiquitous Services. Deok Gyu Lee; Jong Hyuk Park; Heai-Jo Kang; Bok Yong Choi; Kwang Nam Choi // Wireless Personal Communications;Nov2009, Vol. 51 Issue 1, p193 

    In the ubiquitous society of the near future, various customer-oriented intellectual services will be required where RFID systems using wireless recognition technology are widely applied. In these RFID systems, it is important to protect personal information during wireless communication, as...

  • Pervasive Wireless. Savage, Neil // Technology Review;Mar/Apr2006, Vol. 109 Issue 1, p68 

    The article discusses research being done on wireless devices by Dipankar Raychaudhuri, director of the Rutgers University laboratory, et al. Raychaudhuri foresees a day when radio frequency identification tags embedded in merchandise call cellular telephones to alert its owner to sales,...

  • RFID Sensors Sniff Out Chemicals. Roberti, Mark // RFID Journal;May/Jun2014, p1 

    The article offers information related to the development of radio frequency identification (RFID) wireless devices. The researchers at Georgia Tech Research Institute have designed sensors, linking to RFID transponders, which can detect the presence of hazardous gases in the atmosphere. An...

  • Real time locating systems drive growth.  // Converter;Feb2008, Vol. 45 Issue 2, p19 

    The article discusses the growth of Active Radio Frequency Identification (RFID), which incorporates many technologies, including Real Time Locating Systems, Ubiquitous Sensor Networks and Active RFID with Zigbee. Results of a study by IDTechEx reveals that this market is growing faster than...

  • A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction. Yang, Anjia; Liang, Kaitai; Zhuang, Yunhui; Wong, Duncan S.; Jia, Xiaohua // Security & Communication Networks;Nov2015, Vol. 8 Issue 16, p2836 

    The privacy model of radio frequency identification (RFID) systems is for formalizing the adversarial capabilities and the security requirements of RFID anonymity and untraceability. Existing unpredictability-based privacy models such as unp-privacy, eunp-privacy, unp*-privacy, and unp...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics