Skip to main content
Log in

Efficient Distributed Identification for RFID Systems

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

RFID systems have been adopted by several sectors in societies for a wide set of applications, ranging from item level tagging to supply chain management. One of the most important RFID applications is tag identification, which is a process executed in an RFID network in order to distinguish the corresponding associated objects. Most of the research in this direction is aimed to the design of efficient communication protocols, which identify the whole set of tags in the covering region of an RFID reader. The common scenario comprises one reader and a set of tags, where the reader is generally located at the center of the interrogation zone; this scenario has been studied in several different ways with a centralized paradigm. However, there is a recent interest on analyzing an alternative scheme that consists in splitting the interrogation zone and executing a distributed mechanism to identify the whole set of tags. To date, some of the few contributions considering distributed approaches do not take into account a practical communication model. Thus, in this work we evaluate and compare the performance of both RFID tag identification paradigms using the EPC Class-1 Generation-2 standard and propose a practical communication model for such proposals distributing the identification process. Our results show that, indeed, the performance of the EPC Class-1 Generation-2 standard may be highly improved with the adoption of a distributed mechanism if all its features are fully exploited. Hence, the improvements obtained with our distributed proposal reach a gain of up to 65 % on the total identification delay compared with its centralized counterpart.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19

Similar content being viewed by others

References

  1. Ali, K. (2011). Enabling ultra large-scale radio identification systems. Ph.D. thesis, Queen’s University, Kingston, ON, Canada.

  2. Ali, K., & Hassanein, H. (2009). Parallel singulation in RFID systems. In Proceedings of the IEEE global telecommunications conference (Globecom), pp. 1–6.

  3. Ali, K., & Hassanein, H. (2009). Distributed receiving in RFID systems. In Proceedings of the IEEE local computer networks (LCN), pp. 69–76.

  4. Ali, K., Hassanein, H., & Taha, A. E. (2007). RFID anti-collision protocol for dense passive tag environments. In Proceedings of the IEEE local computer networks (LCN), pp. 819–824.

  5. Alsalih, W., Ali, K., & Hassanein, H. (2008). Optimal distance-based clustering for tag anti-collision in RFID systems. In Proceedings of the IEEE local computer networks (LCN), pp. 266–273.

  6. Bueno-Delgado, M. V., Vales-Alonso, J., & González-Castaño, F. (2009). Analysis of DFSA anti-collision protocols in passive RFID enviroments. In Proceedings of the IEEE international conference of the industrial electronics society (IECON), pp. 2610–2617.

  7. Cha, J. R., Kim, & J. H. (2005). Novel anti-collision algorithms for fast object identification in RFID system. In Proceedings of the 11th inernational conference on parallel and distributed systems, vol. 2, pp. 63–67.

  8. De Donno, D., Ricciato, F., Catarinucci, L., Coluccia, A., & Tarricone, L. (2010). Challenge: Towards distributed RFID sensing with software-defined radio. In Proceedings of the ACM sixteenth annual international conference on mobile computing and networking (MobiCom), pp. 97–104.

  9. EPCGlobal. (2008). EPC radio-frequency identity protocols class-1 generation-2 UHF RFID air interference protocol for communications at 860 MHz–960 MHz. version 1.2.0.

  10. Farahani, S. (2008). Zigbee wireless networks and transceivers (1st ed.). Burlington, MA: Newnes.

  11. Finkenzeller, K. (2003). RFID handbook: Fundamentals and applications in contactless smart cards and identification (2nd ed.). New York, NY: Wiley.

    Book  Google Scholar 

  12. Joe, I., & Lee, J. (2007). A novel anti-collision algorithm with optimal frame size for RFID system. In Proceedings of the international conference on software engineering research, management and applications, pp. 424–428.

  13. Khan, M. A., Sharma, M., & Prabhus, B. (2009). A survey of RFID tags. International Journal of Recent Trend in Engineering, 1(4), 68–71.

    Google Scholar 

  14. Klair, D. K., Chin, K. W., & Raad, R. (2010). A survey and tutorial of RFID anti-collision protocols. IEEE Communications Surveys & Tutorials, 12(3), 400–421.

    Article  Google Scholar 

  15. Lee, D., Kim, K., & Lee, W. (2007). Q+-algorithm: An enhanced RFID tag collision arbitration algorithm. In Proceedings of the 4th international conference on ubiquitous intelligence and computing (UIC), pp. 23–32.

  16. Li, Z.P., Guo, S.J., Wang, Y.H., Yang, Z.H., & Zhang, M. (2010). A hybrid tag number estimation scheme for ALOHA based anti-collision algorithm in RFID networks. In Proceedings of the 12th international conference on advanced communication technology (ICACT), Vol. 2, pp. 1407–1411.

  17. Sánchez, L., & Ramos, V. (2012). Adding randomness to the EPC Class1 Gen2 standard for RFID networks. In Proceedings of the IEEE personal indoor and mobile radio communications (PIMRC), pp. 609–614.

  18. Sánchez, L., & Ramos, V. (2013). Towards a new paradigm for RFID identification: should we cluster RFID tags or not? In Proceedings of the 9th IEEE international conference on wireless and mobile computing, networking and communications (WiMob)

  19. Schoute, F. C. (1983). Dynamic frame length ALOHA. IEEE Transactions on Communications, 31(4), 565–568.

    Article  Google Scholar 

  20. Shi, X. L., Shi, X. W., Huang, Q. L., & Wei, F. (2008). An enhanced binary anti-collision algorithm of backtracking in RFID system. Progress in Electromagnetic Research, 4, 263–271.

    Article  Google Scholar 

  21. Teoh, Q. J., & Karmakar, N. (2008). A performance evaluation and analysis of capture effect in RFID system. In Asia-Pacific microwave conference (APMC 2008), pp. 1–4.

  22. Vogt, H. (2002). Efficient object identification with passive RFID tags. In Proceedings of the first international conference on pervasive computing, pp. 98–113.

  23. Yue, H., Zhang, C., Pan, M., Fang, Y., & Chen, S. (2012). A time-efficient information collection protocol for large-scale RFID systems. In Proceedings of the IEEE international conference on computer communications (INFOCOM), pp. 2158–2166.

  24. Zhang, M., Li, T., Chen, S., & Li, B. (2010). Using analog network coding to improve the RFID reading throughput. In Proceedings of the IEEE 30th international conference on distributed computing systems (ICDCS), pp. 547–556.

Download references

Acknowledgments

The authors are grateful to the National Council of Science and Technology (CONACyT: Consejo Nacional de Ciencia y Tecnología) in Mexico for supporting this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Leonardo Sanchez.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sanchez, L., Ramos, V. Efficient Distributed Identification for RFID Systems. Wireless Pers Commun 94, 1751–1775 (2017). https://doi.org/10.1007/s11277-016-3710-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-016-3710-1

Keywords

Navigation