TITLE

Channel and Time Slot Allocation for Dense RFID Networks

AUTHOR(S)
Sohn, Surgwon; Jung, Jong-Jin
PUB. DATE
November 2013
SOURCE
Wireless Personal Communications;Nov2013, Vol. 73 Issue 2, p329
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
This paper presents a constraint satisfaction approach to the reader collision problem in dense mode environments for static RFID networks. Our method assigns available channels and time slots to the RFID readers to increase the read rate while satisfying all the interference constraints. We model the problem with a hybrid frequency and time division multiplexing constraint satisfaction for reader anti-collision and assign workable channels and time slots to each reader using backtracking search algorithms. A depth-first-search based on backtracking was performed to find solutions to constraint satisfaction problems. Instead of performing an exhaustive search for the optimal result, we adopted good variable ordering heuristics as branching strategies where the search can be completed quickly. Thus, the search space is greatly reduced, and approximate solutions are found instantly. To find appropriate heuristics, we applied a problem classifying rule to determine the quality of the variable ordering heuristics. Computer simulations of the comparable performance of some variable ordering algorithms in the channel and time slot allocation for dense RFID networks are presented.
ACCESSION #
91528826

 

Related Articles

  • Hardware Implementation of Higher Data Rate Anti-Collision Algorithm of RFID Systems. Sampe, Jahariah; Othman, Masuri; Ismail, Mahamod // European Journal of Scientific Research;Oct2007, Vol. 18 Issue 3, p561 

    This paper presents a proposed hardware implementation of higher data rate Fast Detection Anti-collision Algorithm (higher data rate FDACA) for Radio Frequency Identification (RFID) systems. The proposed higher data rate FDACA is deterministic anticollision technique and is based on Time...

  • Heuristic algorithms for effective broker deployment. Yifeng Qian; Beihong Jin; Wenjing Fang // Information Technology & Management;Jun2011, Vol. 12 Issue 2, p55 

    In the pervasive e-business applications covering large geographical areas and involving many RFID readers or sensors, broker deployment strategies have a direct effect on the deployment cost and collaboration efficiency. By analyzing the deployment cost and collaboration basis, this paper...

  • Heuristic Approach of Dynamic Framed Slotted Aloha for RFID Systems. Robithoh Annur; Suvit Nakpeerayuth; Takada, Jun-ichi; Lunchakorn Wuttisittikulkij // Australian Journal of Basic & Applied Sciences;May2014, Vol. 8 Issue 7, p160 

    Background: The basic framed slotted Aloha with fixed frame size have exponential increase of tag identification delay with the increase in the number of tags. The system efficiency drops considerably with the increase in the number of tags and reaches zero in large number of tags. Dynamic frame...

  • Precise-Optimal Frame Length Based Collision Reduction Schemes for Frame Slotted Aloha RFID Systems. Dhakal, Sunil; Shin, Seokjoo // KSII Transactions on Internet & Information Systems;Jan2014, Vol. 8 Issue 1, p165 

    An RFID systems employ efficient Anti-Collision Algorithms (ACAs) to enhance the performance in various applications. The EPC-Global G2 RFID system utilizes Frame Slotted Aloha (FSA) as its ACA. One of the common approaches used to maximize the system performance (tag identification efficiency)...

  • Threshold jumping and wrap-around scan techniques toward efficient tag identification in high density RFID systems. Hsu, Ching-Hsien; Chao, Han-Chieh; Hyuk Park, Jong // Information Systems Frontiers;Sep2011, Vol. 13 Issue 4, p471 

    With the emergence of wireless RFID technologies, the problem of Anti-Collision has been arousing attention and instigated researchers to propose different heuristic algorithms for advancing RFID systems operated in more efficient manner. However, there still have challenges on enhancing the...

  • Simplified computation in memoryless anti-collision RFID identification protocols. Landaluce, H.; Perallos, A.; Bengtsson, L.; Garcia Zuazola, I. J. // Electronics Letters;8/14/2014, Vol. 50 Issue 17, p1250 

    A memoryless-based Collision window Tree plus (CwT+ ) protocol for simplified computation in anti-collision radio frequency identification (RFID) is proposed and presented. The CwT+ makes effective use of a threshold to accurately enhance bit-tracking and in turn lowers the identification time...

  • A Heterogeneous Access Remote Integrating Surveillance Heuristic Model for a Moving Train in Tunnel. Patgar, Tanuja. P.; Shankaraiah // International Journal of Intelligent Systems & Applications;Mar2016, Vol. 8 Issue 3, p59 

    Many number of real time applications are available for train monitoring using satellite based navigation system with high level of speed and precision. But these systems have faced lot of issues such as multipath loss and line of sight which results in lesser accuracy measurements. When the...

  • A Slot Allocated Blocking Anti-Collision Algorithm for RFID Tag Identification. Yang Qing; Li Jiancheng; Wang Hongyi; Zeng Xianghua; Zheng Liming // KSII Transactions on Internet & Information Systems;Jun2015, Vol. 9 Issue 6, p2160 

    In many Radio Frequency Identification (RFID) applications, the reader recognizes the tags within its scope repeatedly. For these applications, some algorithms such as the adaptive query splitting algorithm (AQS) and the novel semi-blocking AQS (SBA) were proposed. In these algorithms, a staying...

  • Prevention and Detection Methods for Enhancing Security in an RFID System. Khor, Jing Huey; Ismail, Widad; Ghulam Rahman, Mohammad // International Journal of Distributed Sensor Networks;2012, p1 

    Low-cost radio frequency identification (RFID) tag is exposed to various security and privacy threats due to computational constraint. This paper proposes the use of both prevention and detection techniques to solve the security and privacy issues. A mutual authentication protocol with...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics