Advertisement

The Aloha Anti-collision Algorithms for RFID Systems Using in Smart Hospital

  • Mohammad El Harrak HajriEmail author
  • Ali El Yaakoubi
  • Lahcen Amhaimar
  • Mohamed Yassin Chkouri
  • A. Asselman
Conference paper
Part of the Lecture Notes in Intelligent Transportation and Infrastructure book series (LNITI)

Abstract

One of the areas of research in Radio Frequency Identification (RFID) systems is the reduction of identification processing time for a number of tags in an RFID reader recognition region. During the last decade, numerous research results concerning anti-collision algorithms have been presented in the literature. Most of them are tree-based protocols. However, it is important that tree-based protocols improve the stability and throughput of the system because they may experience long identification delays when the network density is high. In this study, we present a highly efficient prediction-based tree algorithm to obtain more efficient tag identification performance. Our proposed mechanism can effectively reduce collisions and rest cycles by exploiting the pre-detection technique and the adjustable slot size mechanism. The results of the simulation show that the proposed mechanism can effectively improve tag identification time performance from about 29.9 to 64.8% over previous techniques. In addition, the number of request cycles, the number of collisions and the total number of slots are reduced compared to previous prior detection protocols. It is also observed that the proposed scheme may have good performance in large scale RFID systems. The purpose of this paper is to comparing the efficiency of several algorithms with MATLAB.

Keywords

RFID Random access Matlab 

References

  1. 1.
    Stockman, H.: Communication by means of reflected power. In: Proceedings of the IRE, pp. 1196–1204 Oct (1948)CrossRefGoogle Scholar
  2. 2.
    Abramson, N.: The ALOHA system-another alternative for computer communications. In: Fall Joint Computer Conference, AFIPS Conference Proceedings. Vol. 37, pp. 281–285 (1970)Google Scholar
  3. 3.
    Finkenzeller, K., Handbook, R.F.I.D.: Fundamentals and Applications in Contactless Smart Cards and Identification. 2nd edn, John Wiley & Sons Ltd (2003)Google Scholar
  4. 4.
    Roberts, L.G.: Extensions of packet communication technology to a hand held personal terminal. In: American Federation of Information Processing Societies conference proceedings, Spring Joint Computer conference. vol. 40, pp. 295–298 (1972)Google Scholar
  5. 5.
    Wieselthier, J.E., Ephremides, A., Michaels, L.A.: An exact analysis and performance evaluation of framed ALOHA with capture. IEEE Trans. Commun. 37, 125–137 (1989)CrossRefGoogle Scholar
  6. 6.
    Du, R., Okada, H., Nakanishi, H., Sanada, H., Tezuka, Y.: Performance evaluation and optimization of ALOHA scheme with capture effect. In: Conference Record GLOBECOM’87. pp. 555–560 Nov (1987)Google Scholar
  7. 7.
    EPCglobal: Class 1 Generation 2 UHF Air Interface Protocol Standard Version 1.0.9 (2005)Google Scholar
  8. 8.
    International Organization for Standardization, ISO/IEC 14443-3: Identification Cards-Contactless Integrated Circuit(s) cards-Proximity cards-Part3: Initialization and anti-collision (2000)Google Scholar
  9. 9.
    Vogt, H.: Multiple object identification with passive RIFD tags, In: 2002 IEEE International Conference on Systems, man and Cybernetics. vol. 3, pp. 6–9 Oct (2002)Google Scholar
  10. 10.
    Zhai, J, Wang, G.-N.: An anti-collision algorithm using two-functioned estimation for RFID tags. In: International Conference on Computational Science and its Applications. pp. 702–711 (2005)CrossRefGoogle Scholar
  11. 11.
    Schoute, F.C.: Dynamic frame length ALOHA. IEEE Trans. Commun. 31, 565–568 (1983)CrossRefGoogle Scholar
  12. 12.
    Law, C., Lee, K., Siu, K.Y.: Efficient memoryless protocol for tag identification. In: Proceedings of the 4th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications. Boston, MA, USA, 11 Aug 2000Google Scholar
  13. 13.
    Myung, J., Lee, W.: An adaptive memoryless tag anticollision protocol for RFID networks. In: Proceedings of the 24th Annual IEEE Conference on Computer Communications (INFOCOM’05). Poster Session, Miami, FL, USA, 13–15 Mar 2005Google Scholar
  14. 14.
    Choi, H.S., Cha, J.R., Kim, J.H.: Improved bit-by-bit binary tree algorithm in ubiquitous ID system. In: Proceedings of the 5th Pacific Rim Conference on Multimedia. pp. 696–703, Tokyo, Japan, 30 Nov–3 Dec 2004Google Scholar
  15. 15.
    Myung, J., Lee, W., Srivastava, J.: Adaptive binary splitting for efficient RFID tag anti-collision. IEEE Commun. Lett. 10, 144–146 (2006) [CrossRef]CrossRefGoogle Scholar
  16. 16.
    Capetanakis, J.I.: Tree algorithms for packet broadcast channels. IEEE Trans. Inf. Theory 25, 505–515 (1979)MathSciNetCrossRefGoogle Scholar
  17. 17.
    Feng, B., Tao, L.J., Bo, G.J., Hua, D.Z.: ID-Binary tree stack anti-collision algorithm for RFID. In: Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC’06). pp. 207–212, Cagliari, Italy, 26–29 June 2006Google Scholar
  18. 18.
    Sahoo, A., Iyer, S., Bhandari, N.: Improving RFID System to Read Tags Efficiently; KRSIT Technical Report; IIT Bombay, Mumbai, India, June 2006Google Scholar
  19. 19.
    Zhou, Z., Gupta, H., Das, S.R., Zhu, X.: Slotted scheduled tag access in multi-reader RFID systems. In: Proceedings of the IEEE International Conference on Networks Protocols (ICNP). pp. 61–70, Beijing, China, 16–19 Oct 2007Google Scholar
  20. 20.
    Ryu, J., Lee, H., Seok, Y., Kwon, T., Choi, Y.: A hybrid query tree protocol for tag collision arbitration in RFID systems. In: Proceedings of the IEEE International Conference on Communications (ICC-07). pp. 5981–5986, Glasgow, UK, 24–28 June 2007Google Scholar
  21. 21.
    Kim, T.H., Lee, S.J.: A hybrid hyper tag anti-collision algorithm in RFID system. In: Proceedings of the 11th International Conference on Advanced Communication Technology (ICACT 2009). vol. 2, pp. 1276–1281, Phoenix Park, Korea, 15–18 Feb 2009Google Scholar
  22. 22.
    Liang, C.K., Chien, Y.C., Tsai, C.H.: A pre-detection query tree tag anti-collision scheme in RFID systems. In: Proceedings of the Seventh International Conference on Sensor Technologies and Applications (SENSORCOMM’13). pp. 51–56, Barcelona, Spain, 26–29 Aug 2013Google Scholar
  23. 23.
    Zhou, F., Jin, D., Huang, C., Hao, M.: Optimize the power consumption of passive electronic tags for anti-collision schemes. In: Proceedings of the 5th International Conference on ASIC. vol. 2, pp. 1213–1217, Beijing, China, 21–24 Oct 2003Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Mohammad El Harrak Hajri
    • 1
    • 1
    Email author
  • Ali El Yaakoubi
    • 1
  • Lahcen Amhaimar
    • 1
  • Mohamed Yassin Chkouri
    • 2
  • A. Asselman
    • 1
  1. 1.Optics and Photonics Team, Faculty of SciencesAbdelmalek Essaadi UniversityTetouanMorocco
  2. 2.SIGL Team, ENSA of TetouanAbdelmalek Essaadi UniversityTetouanMorocco

Personalised recommendations