Capture-Aware Couple-Resolution Blocking Protocol in RFID Systems
- 121 Downloads
In radio frequency identification systems, some applications require tags to be identified repeatedly. To achieve this, many protocols have been proposed that use information obtained from the previous tag identification process to quickly re-identify tags remaining within the communication range of the reader. However, none of these protocols consider the capture effect, and thus may not be effective in real wireless communication environments. When multiple tags simultaneously reply to a reader, the reader may consider the strongest signal to be a successful transmission rather than a collision and ignore all other replies. In this paper, we propose a new capture-aware anti-collision protocol based on the couple-resolution blocking (CRB) protocol that efficiently identifies tags repeatedly. We demonstrate that the CRB protocol suffers from the capture effect in which some tags may not be identified in practical environments. To solve this problem of the capture effect, we modify the CRB protocol by adopting the state-of-the-art capture-aware anti-collision protocol known as the multi-round collision tree (MRCT) protocol. Through computer simulation, we show that the proposed protocol with MRCT can reduce the number of slots required by approximately 50% in a random topology where most tags remain in the communication range of the reader.
KeywordsAnti-collision algorithm Capture effect RFID tag re-identification
This work was supported by the National Research Foundation of Korea (NRF) Grant funded by the Korean Government (MSIP) (No. 2011-0023856) and (No. 2016R1A5A1012966).
- 2.Hush, D. R., & Wood, C. (1998). Analysis of tree algorithms for RFID arbitration. In Proceedings of IEEE international symposium on information theory (p. 107).Google Scholar
- 3.Law, C., Lee, K., & Siu, K. Y. (2000). Efficient memoryless protocol for tag identification. In Proceedings of the 4th international workshop on discrete algorithms and methods for mobile computing and communications (DIALM 2000) (pp. 75–84).Google Scholar
- 12.Floerkemeier, C., & Lampe, M. (2004). Issues with RFID usage in ubiquitous computing applications. Lecture Notes in Computer Science, 3001, 183–193.Google Scholar
- 13.Wu, V. K. Y., & Campbell, R. H. (2009). Using generalized query tree to cope with the capture effect in RFID singulation. In Proceedings of the 6th IEEE consumer communications and networking conference (CCNC 2009) (pp. 1–5).Google Scholar
- 16.Choi, H., Kim, H., & Choi, S. (2015). New couple-resolution blocking tag identification protocol in RFID systems with capture effect. In Proceedings of the 7th international conference on ubiquitous and future networks (ICUFN 2015) (pp. 29–34).Google Scholar