An Efficient RFID Reader Network Planning Strategy Based on P2P Computing

  • He XUEmail author
  • Weiwei SHEN
  • Peng LI
  • Cong QIAN
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 1)


Radio Frequency identification (RFID) technology has been used in many areas, which needs to deploy many readers in the RFID network. Extra readers in the network will consume more power, resulting in a waste of RFID network resources. Therefore, the elimination of redundant readers is important to optimize an RFID network deployment. RFID reader redundant deployment optimization can ensure that users use the minimum number of readers to cover a specific range of all tags. Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. P2P based RFID network is a novel distributed systems. In this paper, an efficient redundant reader elimination strategy is discussed, which is based on the P2P-based RFID reader network.


RFID Network Planning P2P Internet of Things 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Karmakar, Nemai Chandra. Handbook of smart antennas for RFID systems[M]. New Jersey: Wiley, 2010.Google Scholar
  2. 2.
    Wu Y, Sheng Q Z, Zeadally S. RFID: opportunities and challenges[M]. Next-Generation Wireless Technologies. Springer London, 2013: 105-129.Google Scholar
  3. 3.
    Sakurai S. Prediction of sales volume based on the RFID data collected from apparel shops[J]. International Journal of Space-Based and Situated Computing, 2011, 1(2-3): 174-182.Google Scholar
  4. 4.
    Takeda A, Oide T, Takahashi A. Simple dynamic load balancing mechanism for structured P2P network and its evaluation[J]. International Journal of Grid and Utility Computing, 2012, 3(2-3): 126-135.Google Scholar
  5. 5.
    Okaie Y, Nakano T. A game theoretic framework for peer-to-peer market economy[J]. International Journal of Grid and Utility Computing, 2011, 2(3): 183-195.Google Scholar
  6. 6.
    Sharifkhani F, Pakravan M R. A review of new advances in resource discovery approaches in unstructured P2P networks[C]. Advances in Computing, Communications and Informatics (ICACCI), 2013 International Conference on. IEEE, 2013: 828-833.Google Scholar
  7. 7.
    Eftychiou A, Vrusias B, Antonopoulos N. A dynamically semantic platform for efficient information retrieval in P2P networks[J]. International Journal of Grid and Utility Computing, 2012, 3(4): 271-283.Google Scholar
  8. 8.
    Takaoka M, Uchida M, Ohnishi K, et al. A generalised diffusion-based file replication scheme for load balancing in P2P file-sharing networks[J]. International Journal of Grid and Utility Computing, 2012, 3(4): 242-252.Google Scholar
  9. 9.
    Sula A, Spaho E, Matsuo K, et al. A new system for supporting children with autism spectrum disorder based on IoT and P2P technology[J]. International Journal of Space-Based and Situated Computing, 2014, 4(1): 55-64.Google Scholar
  10. 10.
    Nandakumar R, Chintalapudi K K, Padmanabhan V, et al. Dhwani: secure peer-to-peer acoustic NFC[C]. ACM SIGCOMM Computer Communication Review. ACM, 2013, 43(4): 63-74.Google Scholar
  11. 11.
    Wang C S, Chen C L, Deng D J. P2P-based mobile navigation system with location service[J]. Peer-to-Peer Networking and Applications, 2015, 8(1): 22-31.Google Scholar
  12. 12.
    Hui F C P, Chan H C B. Position Estimation Methods for an RFID-based Positioning System with a P2P Network Architecture[C]. European Wireless 2014; 20th European Wireless Conference; Proceedings of. VDE, 2014: 1-6Google Scholar
  13. 13.
    Hui C P. RFID-based location tracking system using a peer-to-peer network architecture[D]. The Hong Kong Polytechnic University, 2015.Google Scholar
  14. 14.
    Urien P, Piramuthu S. LLCPS and SISO: A TLS-based framework with RFID for NFC P2P retail transaction processing[C]. 2013 IEEE International Conference on RFID. IEEE, 2013: 152-159.Google Scholar
  15. 15.
    D. W. Engels. The reader collision problem[R]. White Paper MIT-AUTOID-WH-007, MIT Auto ID Center, November 2001.Google Scholar
  16. 16.
    D.-Y. Kim, B.-J. Jang, H.-G. Yoon, J.-S. Park, and J.-G. Yook. Effects of reader interference on the RFID interrogation range[C]. In the Proceedings of the 37th European Microwave Conference, pages 728–731, October 2007.Google Scholar
  17. 17.
    N. lrfan and M. C. E Yagoub. Efficient Approach for Redundant Reader Elimination in Large-Scale RF10 Networks[C]. 2010 First International Conference on Integrated Intelligent Computing, pp. l 02-107,5-7 Aug. 2010.Google Scholar
  18. 18.
    Leong K S, Ng M L, Cole P H. The reader collision problem in RFID systems[C]. 2005 IEEE International Symposium on Microwave, Antenna, Propagation and EMC Technologies for Wireless Communications. IEEE, 2005, 1: 658-661.Google Scholar
  19. 19.
    Su-Ryun Lee, Sung-Don Joo, and Chae-Woo Lee. An enhanced dynamic framed slotted ALOHA algorithm for RFID tag identification[C]. The Second Annual International Conference on Networking and Services, 2005, Page(s): 166–172Google Scholar
  20. 20.
    Jae-Ryong Cha and Jae-Hyun Kim. Dynamic framed slotted ALOHA algorithms using fast tag estimation method for RFID system[C]. Consumer Communications and Networking Conference, 2006, Page(s): 768–772Google Scholar
  21. 21.
    Xu Huang and Son Le. Efficient Dynamic Framed Slotted ALOHA for RFID Passive Tags[C]. The 9th International Conference on Advanced Communication Technology, 2007, Page(s):94–97Google Scholar
  22. 22.
    Leian Liu and Shengli Lai. ALOHA-Based AntiCollision Algorithms Used in RFID System[C]. International Conference on Wireless Communications, Networking and Mobile Computing, 2006, Page(s): 1–4.Google Scholar
  23. 23.
    J. Waldrop, D.W. Engels, and S.E. Sarma. Colorwave: an anticollision algorithm for the reader collision problem[C]. IEEE International Conference on Communications, 2003, Page(s): 1206-1210.Google Scholar
  24. 24.
    Ziming Guo and Binjie Hu. A Dynamic Bit Arbitration Anti-Collision Algorithm for RFID System[C]. IEEE International Workshop on Anticounterfeiting, Security, Identification, 2007, Page(s): 457–460.Google Scholar
  25. 25.
    Leian Liu, Zhenhua Xie, Jingtian Xi, and Shengli Lai. An improved anti-collision algorithm in RFID system[C]. 2nd International Conference on Mobile Technology, Applications and Systems, 2005.Google Scholar
  26. 26.
    B. Carbunar, M. K. Ramanathan, M. Koyuturk, C. Hoffmann, and A. Grama. Redundant-reader elimination in RFID systmes[C]. Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (SECON), pages 176–184, September 2005.Google Scholar
  27. 27.
    C.-H. Hsu, Y.-M. Chen, and C.-T. Yang. A layered optimization approach for redundant reader elimination in wireless rfid networks[C]. In IEEE Asia-Pacific Services Computing Conference, pages 138–145, 2007.Google Scholar
  28. 28.
    Z. Guo, A.Zhou. Data quality and data cleaning research[J]. Journal of software, 2002, 13(11):2076-2082.Google Scholar
  29. 29.
    Y. Gu, G.Yu, T.Zhang. RFID complex event processing technology[J]. Computer science and exploration, 2007(03).Google Scholar
  30. 30.
    Juels A, Pappu R. Squealing Euros: Privacy protection in RFID-enabled banknotes [C]. Financial cryptography. Springer Berlin Heidelberg, 2003:103-121.Google Scholar
  31. 31.
    Xu H, Wang S, Wang R. A Novel RFID Reader System Framework Based On Peer-to-Peer Network[J]. International Journal of Advancements in Computing Technology, 2011, 3(3): 104-110.Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.School of Computer Science & Technology/School of softwareNanjing University of Posts and TelecommunicationsNanjingChina
  2. 2.Jiangsu High Technology Research Key Laboratory for Wireless Sensor NetworksNanjingChina

Personalised recommendations