CDMA-based anti-collision algorithm for EPC global C1 Gen2 systems
- 140 Downloads
Abstract
Frame slotted ALOHA protocol as a key technology to improve system throughput has been widely applied to modern radio frequency identification systems. In this paper, a novel frame slotted ALOHA collision arbitration protocol based on code division multiple access has been proposed. The main aim of the proposed algorithm is to avoid collisions between multiple tags. In the scheme, an orthogonal sequence is used as the means to distinguish the transmitted data from different tags within the same time slot and frequency band. The theoretical analysis and simulation results proved that the performance of our proposed algorithm outperforms the existing ALOHA-based protocols.
Keywords
RFID Anti-collision Aloha CDMA System throughput1 Introduction
Comparison of TDMA and CDMA communication channel access techniques for an RFID system
Generally, most existing anti-collision protocols are based on time division multiple access (TDMA) methods including ALOHA-based algorithms [3, 4, 5] and tree-based algorithms [6, 7]. An ALOHA-based protocol is an intuitive solution which has been adopted by some UHF RFID standards such as ISO/IEC 18000 6C and EPC global C1 Gen2, but it does not appear to be scalable [8]. That is to say, the efficiency of the ALOHA-based protocol is affected by the cardinality (tag backlog). To enhance the performance and stability of the ALOHA-based protocol, researchers have proposed a series of improved frame slotted ALOHA protocols [9, 10]. Although these protocols could maintain a stable throughput value of nearly \(36\%\), they cannot breakthrough the maximum theoretical value of \(36.8\%\) achieved by a slotted ALOHA protocol. Compared to the ALOHA-based protocol, a tree-based protocol is cardinality insensitive because when the cardinality increases, the system throughput remains stable. However, the main disadvantage of this protocol is that every two slots should be triggered by a query command transmitted by the reader. Too many reader query commands lower the system throughput.
Aimed at the defects inherent in TDMA, there have also been many attempts to apply more efficient transmission schemes to RFID systems to reduce the collision rate. Previous attempts [11, 12, 13, 14, 15, 16] have shown that code division multiple access (CDMA) transmission can be an attractive option for RFID systems. In CDMA-RFID systems, tag separation is achieved through a set of spreading sequences used to spread the tag backscattering data. However, the performance of CDMA-RFID systems is mainly limited by the number of spreading sequences: using overly long spreading sequences will result in a significant increase in complexity.
We propose an FSA-CDMA anti-collision algorithm in which the tags can be adaptively divided into groups and identified group-by-group. For the purpose of exceeding the limited throughput of the ALOHA-based protocol, we introduce the CDMA mechanism into FSA. The reader can simultaneously identify multiple tags through orthogonal spreading sequences. The simulation results show that the proposed scheme outperforms current protocols by improving system throughput and decreasing identification delay. The remainder of the paper is organized as follows: the proposed FSA-CDMA is described in Sects. 2, 3 analyses the performance of the proposed scheme, conclusions are drawn in Sect. 4, and possible future research is presented.
2 The FSA-CDMA algorithm
Comparison of various throughputs for slotted ALOHA and CDMA
Slot status in the proposed algorithm
- Case 1:
Empty slot: no tags select the slot. Accordingly, the reader cannot receive any data from a tag.
- Case 2:
Successful slot: it contains two cases. One case is only one tag’s selected current slot and responds with its ID. Another is that multiple tags select the slot and respond with their IDs encoded by different spreading sequences. In either case, the tags can be successfully identified by the reader.
- Case 3:
Collision slot: it also contains two cases. One case is complete collision including all collided tags selecting the same spreading sequence, and each active (currently selected) spreading sequence selected by at least two tags. Another is partial collision: some active spreading sequences are selected by one tag, the other selected by more than one tag.
Flowchart through the FSA-CDMA process
FSA system throughput
Relationship between frame size and tag range
| Q | Frame size (F = 2Q) | Appropriate tag range \(n_1\) to \(n_2\) |
|---|---|---|
| 2 | 4 | 1–5 |
| 3 | 8 | 6–11 |
| 4 | 16 | 12–22 |
| 5 | 32 | 23–44 |
| 6 | 64 | 45–89 |
| 7 | 128 | 90–177 |
| 8 | 256 | 178–355 |
| 9 | 512 | 356–710 |
| 10 | 1024 | 711–1420 |
Parameter values for numerical computations
| Parameters | Values (\(\upmu \)s) | Parameters | Values (\(\upmu \)s) |
|---|---|---|---|
| Reader to tag preamble | 112.5 | PC \(+\) EPC \(+\) CRC | 800 |
| Tag to reader preamble | 112.5 | T1 | 62.5 |
| Query command | 412.5 | T2 | 62.5 |
| QueryRep command | 75 | T3 | 50 |
| ACK command | 337.5 | T4 | 112.5 |
| Additional load (SF) | \(SF\times 100\) | RN16 | 100 |
| Tsucc (other schemes) | 2012.5 | \(T_{succ }\) (our scheme) | 2112.5 |
| Tidle (other schemes) | 300 | \(T_{idle}\) (our scheme) | 300 |
| Tcoll (other schemes) | 750 | \(T_{coll}\) (our scheme) | 1750/2250 |
3 Simulation results
Simulation results: time efficiency
Simulation results: average identification time for one tag
Herein \(G_{inv}\) denotes the frequency of inversion of a given digital gate (\(0G_{inv}1\)), \(T_{clk}\) denotes the internal clock period of a tag, \(V_{cc }\) denotes the internal supply voltage, \(C_{load}\) is the loading capacitance, and \(T_{dura}\) is the time duration of a tag in the identification process. In our simulation experiments, we set \(G_{inv}\), \(T_{clk}\), \(V_{cc }\), and \(C_{load}\) as 0.5, 1/1.92 MHz, 1 V, and 11.5 pF, respectively. The comparison of energy consumption is shown in Fig. 8 where the proposed scheme is the most energy efficient, that is to say, under the same conditions, FSA-CDMA will consume less energy [17, 34, 35, 36].
Simulation results: tag energy consumption
4 Conclusion
In this paper, an FSA-CDMA anti-collision algorithm has been proposed for tag identification; this was suitable for EPC global C1 Gen2 systems. Our algorithm is based on the mechanism of a CDMA technique of in-frame analysis and has a lower complexity but nevertheless, proved to be an efficient and accurate estimation method capable of handling tag backlog. The simulation results reveal that our proposed scheme outperforms existing ALOHA-based algorithms in terms of time efficiency, average identification time for one tag, and energy consumption of the tags. However, how to choose and design an appropriate PN sequence instead of the current orthogonal sequence can be considered as a valid future research extension of this work.
Notes
Acknowledgements
We would like to thank the anonymous reviewers for their valuable comments. This job is supported by Scientific Research Program Funded by Shaanxi Provincial Education Department (Program No. 2013JK1139) and China Postdoctoral Science Foundation (No. 2013M542370) and the Specialized Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20136118120010). And this project is also supported by NSFC Grant (Program Nos. 11301414 and 11226173 and 51409213). This work is also supported by Shaanxi Province Hundred Talents Program, Natural Science Foundation of China under Grants 61272509, Research Fund for the Doctoral Program of Higher Education 20136118110002, Natural Science Foundation of Shaanxi Province 2016JM6058.
References
- 1.Finkenzeller, K. (2003). RFID handbook: Fundamentals and applications in contactless smart cards and identification (2nd ed., pp. 1–9). John Wiley & Sons Inc.Google Scholar
- 2.Klair, D. K., Chin, K. W., & Raad, R. (2010). A survey and tutorial of RFID anti-collision protocols. IEEE Communications Surveys and Tutorials, 12(3), 400–421.CrossRefGoogle Scholar
- 3.Vogt, H. (2002). Efficient object identification with passive RFID tags. In International conference on pervasive computing (pp. 98–113) London.Google Scholar
- 4.Solic, P., Radic, J., & Rozic, N. (2014). Energy efficient tag estimation method for Aloha-based RFID systems. IEEE Sensors Journal, 14(10), 3637–3647.CrossRefGoogle Scholar
- 5.Su, J., Sheng, Z., Hong, D., & Wen, G. (2016). An effective frame breaking policy for dynamic framed slotted Aloha in RFID. IEEE Communications Letters, 20(4), 692–695.CrossRefGoogle Scholar
- 6.Su, J., Wen, G., & Hong, D. (2015). A new RFID anti-collision algorithm based on the Q-ary search scheme. Chinese Journal of Electronics, 24(4), 679–683.CrossRefGoogle Scholar
- 7.Jian, S. U., et al. (2016). An efficient anti-collision algorithm based on improved collision detection scheme. IEICE Transactions on Communications, 99(2), 465–470.Google Scholar
- 8.Qian, C., et al. (2013). ASAP: Scalable collision arbitration for large RFID systems. IEEE Transactions on Parallel and Distributed Systems, 24(7), 1277–1288.CrossRefGoogle Scholar
- 9.Yu, P., et al. (2013). Reducing tag collision in radio frequency identification systems by using a grouped dynamic frame slotted ALOHA algorithm. Acta Physica Sinica, 62(14), 148401.Google Scholar
- 10.Chen, W.-T. (2014). A feasible and easy-to-implement anticollision algorithm for the EPCglobal UHF class-1 generation-2 RFID protocol. IEEE Transactions on Automation Science and Engineering, 11(2), 485–491.CrossRefGoogle Scholar
- 11.Mazurek, G. (2009). Active RFID system with spread-spectrum transmission. IEEE Transactions on Automation Science and Engineering, 6(1), 25–32.CrossRefGoogle Scholar
- 12.Loeffler, A., Schuh, F., & Gerhaeuser, H. (2010). Realization of a CDMA-based RFID system using a semi-active UHF transponder. In 2010 6th international conference on wireless and mobile communications (ICWMC). IEEE.Google Scholar
- 13.Demeechai, T., & Siwamogsatham, S. (2011). Using CDMA to enhance the MAC performance of ISO/IEC 18000-6 type C. IEEE Communications Letters, 15(10), 1129–1131.CrossRefGoogle Scholar
- 14.Riordan, J. (2012). Introduction to combinatorial analysis. North Chelmsford: Courier Corporation.Google Scholar
- 15.Jiang, Y., Zhang, H., Zhang, H., Liu, H., Song, X., Gu, M., et al. (2015). Design of mixed synchronous/asynchronous systems with multiple clocks. IEEE Transactions on Parallel and Distributed Systems, 26(8), 2220–2232.CrossRefGoogle Scholar
- 16.Jiang, Y., Zhang, H., Zhang, H., Liu, H., Song, X., Gu, M., et al. (2015). Design of mixed synchronous/asynchronous systems with multiple clocks. IEEE Transactions on Parallel and Distributed Systems, 26(8), 2220–2232.CrossRefGoogle Scholar
- 17.Bin, G., & Sheng, V. S. (2016). A robust regularization path algorithm for v-support vector classification. IEEE Transactions on Neural Networks and Learning Systems,. doi: 10.1109/TNNLS.2016.2527796.Google Scholar
- 18.Wei, W., & Qi, Y. (2011). Information potential fields navigation in wireless Ad-Hoc sensor networks. Sensors, 11(5), 4794–4807.CrossRefGoogle Scholar
- 19.Jiang, Y., Zhang, H., Li, Z., Deng, Y., Song, X., Gu, M., et al. (2015). Design and optimization of multiclocked embedded systems using formal techniques. IEEE Transactions on Industrial Electronics, 62(2), 1270–1278.CrossRefGoogle Scholar
- 20.Jiang, Y., Zhang, H., Song, X., Jiao, X., William, N. N., Hung, W. N., et al. (2013). Bayesian-network-based reliability analysis of PLC systems. IEEE Transactions on Industrial Electronics, 60(11), 5325–5336.CrossRefGoogle Scholar
- 21.Wei, W., et al. (2014). GI/Geom/1 queue based on communication model for mesh networks. International Journal of Communication Systems, 27(11), 3013–3029.Google Scholar
- 22.Wei, W., Fan, X., Song, H., Fan, X., & Yang, J. (2016). Imperfect information dynamic Stackelberg game based resource allocation using hidden Markov for cloud computing. IEEE Transactions on Service Computing. doi: 10.1109/TSC.2016.2528246.
- 23.Zhang, H., Jiang, Y., Hung, W. N. N., Song, X., Gu, M., & Sun, J.-G. (2014). Symbolic analysis of programmable logic controllers. The IEEE Transactions on Computers, 63(10), 2563–2575.CrossRefGoogle Scholar
- 24.Wei, W., Qiang, Y., & Zhang, J. (2013). A bijection between lattice-valued filters and lattice-valued congruences in residuated lattices. Mathematical Problems in Engineering. doi: 10.1155/2013/908623.
- 25.Wei, W., Srivastava, H. M., Zhang, Y., Wang, L., Shen, P., & Zhang, J. (2014). A local fractional integral inequality on fractal space analogous to Andersons inequality. In Abstract and Applied Analysis (Vol. 2014). Hindawi Publishing Corporation.Google Scholar
- 26.Angerer, C., Langwieser, R., & Rupp, M. (2010). RFID reader receivers for physical layer collision recovery. IEEE Transcations on Communications, 58(12), 3526–3537.CrossRefGoogle Scholar
- 27.Su, W., Alchazidis, N. V., & Ha, T. T. (2010). Multiple RFID tags access algorithm. IEEE Transactions on Mobile Computing, 3(2), 174–187.Google Scholar
- 28.Li, J., Li, X., Yang, B., & Sun, X. (2015). Segmentation-based image copy-move forgery detection scheme. IEEE Transactions on Information Forensics and Security, 10(3), 507–518.CrossRefGoogle Scholar
- 29.Jiang, Y., Yang, Y., Liu, H., Kong, H., Gu, M., & Sun, J.-G., et al. (2016). From Stateflow simulation to verified implementation: A verification approach and a real-time train controller design. In RTAS (pp. 231–241).Google Scholar
- 30.Landaluce, H., Perallos, A., Bengtsson, L., & Carcia, I. J. (2014). Simplified computation in memoryless anti-collision RFID identification protocols. Electronics Letters, 50(17), 1250–1252.CrossRefGoogle Scholar
- 31.EPCglobal. (2013). EPC radio-frequency identify protocols class-1 generation-2 UHF RFID protocol for communications at 860 MHz–960 MHz ver. 2. 2. 0.Google Scholar
- 32.Pan, Zhaoqing, Zhang, Yun, & Kwong, Sam. (2015). Efficient motion and disparity estimation optimization for low complexity multiview video coding. IEEE Transactions on Broadcasting, 61(2), 166–176.CrossRefGoogle Scholar
- 33.Xia, Z., Wang, X., Sun, X., & Wang, Q. (2015). A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 27(2), 340–352.CrossRefGoogle Scholar
- 34.Zhangjie, F., Ren, K., Shu, J., Sun, X., & Huang, F. (2015). Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Transactions on Parallel and Distributed Systems,. doi: 10.1109/TPDS.2015.2506573.
- 35.Bin, G., Sheng, V. S., Tay, K. Y., Romano, W., & Li, S. (2015). Incremental support vector learning for ordinal regression. IEEE Transactions on Neural Networks and Learning Systems, 26(7), 1403–1416.Google Scholar
- 36.Wei, W., Yang, X.-L., Shen, P.-Y., & Zhou, B. (2012). Holes detection in anisotropic sensornets: Topological methods. International Journal of Distributed Sensor Networks, 2012, 1–9.Google Scholar







