Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2068897.2068919acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
research-article

Interference cancellation-based RFID tags identification

Published: 31 October 2011 Publication History
  • Get Citation Alerts
  • Abstract

    In this paper we investigate interference cancellation to faster identify tags in RFID networks. We explore how interference cancellation can be applied to ALOHA and tree-based identification schemes, its limitations, the extent of achievable improvements, and the overhead incurred to obtain effective gains. Analytical and simulation results show that for an ALOHA-based scheme interference cancellation allows us to identify nearly 23% of tags without directly interrogating them. This speeds up tag identification (over 20% faster) while producing little overhead. For a tree-based scheme nearly 50% of the tags are identified by exploiting interference cancellation, resulting in an improvement of the identification rate of over 20%. Finally, we propose an enhancement of the tree-based scheme with interference cancellation that achieves a further identification speed up of 50%.

    References

    [1]
    EPC R© Radio-Frequency Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz--960 MHz Version 1.1. 0, 2006.
    [2]
    G. Bhanage, Y. Zhang, Y. Zhang, W. Trappe, and R. Howard. RollCall: the design for a low-cost and power efficient active RFID asset tracking system. In EUROCON, 2007.
    [3]
    M. Bonuccelli, F. Lonetti, and F. Martelli. Instant collision resolution for tag identification in RFID networks. Elsevier, Ad Hoc Networks, (5), 2007.
    [4]
    J. Capetanakis. Tree algorithms for packet broadcast channels. IEEE Transactions on Information Theory, 25(5), 1979.
    [5]
    F. Fuschini, C. Piersanti, F. Paolazzi, and G. Falciasecca. On the efficiency of load modulation in RFID systems operating in real environment. IEEE Antennas and Wireless Propagation Letters, 7, 2008.
    [6]
    D. Halperin, T. Anderson, and D. Wetherall. Taking the sting out of carrier sense: interference cancellation for wireless lans. In ACM MobiCom, 2008.
    [7]
    S. Hong, H. Zhang, I. Song, K. Chang, D.-B. Shin, and H.-S. Lee. ISO/IEC 18000--7 based on rfid multi-hop relay system. In IEEE ISCIT, 2009.
    [8]
    G. Khandelwal, K. Lee, A. Yener, and S. Serbetli. ASAP: a MAC protocol for dense and time constrained RFID systems. EURASIP Journal on Wireless Communications and Networking, 2, 2007.
    [9]
    J. Kim and J. Lee. Capture effects of wireless CSMA/CA protocols in Rayleigh and shadow fading channels. IEEE Transactions on vehicular technology, 48(4), 1999.
    [10]
    M. Kodialam and T. Nandagopal. Fast and reliable estimation schemes in RFID systems. In ACM MobiCom, 2006.
    [11]
    T. F. La Porta, G. Maselli, and C. Petrioli. Anticollision protocols for single-reader rfid systems: Temporal analysis and optimization. IEEE Transactions on Mobile Computing, 10:267--279, February 2011.
    [12]
    Y.-C. Lai and L.-Y. Hsiao. General binary tree protocol for coping with the capture effect in rfid tag identification. IEEE Communications Letters, 14(3), March 2010.
    [13]
    C. Law, K. Lee, and K.-Y. Siu. Efficient memoryless protocol for tag identification. In ACM DIALM, 2000.
    [14]
    J. Massey. Collision resolution algorithms and random-access communication. Multi-Users Communication Networks, CISM Courses and Lectures, (256), 1981.
    [15]
    J. Myung, W. Lee, J. Srivastava, and T. K. Shih. Tag-splitting: Adaptive collision arbitration protocols for rfid tag identification. IEEE Transactions on Parallel and Distributed Systems, 18(6), june 2007.
    [16]
    V. Sarangan, M. Devarapalli, and S. Radhakrishnan. A framework for fast RFID tag reading in static and mobile environments. Computer Networks, 52(5), 2008.
    [17]
    B. Sheng, Q. Li, and W. Mao. Efficient continuous scanning in rfid systems. In IEEE INFOCOM, 2010.
    [18]
    D. Shih, P. Sun, D. Yen, and S. Huang. Taxonomy and survey of RFID anti-collision protocols. Computer communications, 29(11), 2006.
    [19]
    D. Tseng and Z. Lin. Anti-collision algorithm with the aid of interference cancellation and tag set partitioning in radio-frequency identification systems. Communications, IET, 3(1), 2009.
    [20]
    N. Vaidya and S. R. Das. Rfid-based networks: exploiting diversity and redundancy. SIGMOBILE Mob. Comput. Commun. Rev., 12(1), 2008.
    [21]
    S. Verdu. Multiuser detection. Cambridge Univ Pr, 1998.
    [22]
    N. Wu, M. Nystrom, T. Lin, and H. Yu. Challenges to global RFID adoption. Technovation, 26(12), 2006.
    [23]
    M. Zhang, T. Li, S. Chen, and B. Li. Using analog network coding to improve the rfid reading throughput. In Proceedings of the 2010 IEEE 30th International Conference on Distributed Computing Systems, ICDCS '10, pages 547--556, Washington, DC, USA, 2010. IEEE Computer Society.
    [24]
    N. Zhang and B. Vojcic. Binary search algorithms with interference cancellation RFID systems. In IEEE MILCOM, 2005.
    [25]
    S. Zhang, S. Liew, and L. Lu. Physical layer network coding schemes over finite and infinite fields. In IEEE Globecom, 2008.

    Cited By

    View all
    • (2019)Hard Latency-Constraints for High-Throughput Random Access: SICQTAICC 2019 - 2019 IEEE International Conference on Communications (ICC)10.1109/ICC.2019.8761687(1-7)Online publication date: May-2019
    • (2018)Towards an Efficient Identification Process for Large-Scale RFID SystemsSensors10.3390/s1807235018:7(2350)Online publication date: 19-Jul-2018
    • (2018)Fast Discrepancy Identification for RFID-Enabled IoT NetworksIEEE Access10.1109/ACCESS.2017.27858106(6194-6204)Online publication date: 2018
    • Show More Cited By

    Index Terms

    1. Interference cancellation-based RFID tags identification

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      MSWiM '11: Proceedings of the 14th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
      October 2011
      462 pages
      ISBN:9781450308984
      DOI:10.1145/2068897
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 31 October 2011

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. RFID
      2. interference cancellation
      3. tag identification

      Qualifiers

      • Research-article

      Conference

      MSWiM '11
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 398 of 1,577 submissions, 25%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)5
      • Downloads (Last 6 weeks)2
      Reflects downloads up to 29 Jul 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2019)Hard Latency-Constraints for High-Throughput Random Access: SICQTAICC 2019 - 2019 IEEE International Conference on Communications (ICC)10.1109/ICC.2019.8761687(1-7)Online publication date: May-2019
      • (2018)Towards an Efficient Identification Process for Large-Scale RFID SystemsSensors10.3390/s1807235018:7(2350)Online publication date: 19-Jul-2018
      • (2018)Fast Discrepancy Identification for RFID-Enabled IoT NetworksIEEE Access10.1109/ACCESS.2017.27858106(6194-6204)Online publication date: 2018
      • (2016)Fast and scalable counterfeits estimation for large-scale RFID systemsIEEE/ACM Transactions on Networking (TON)10.1109/TNET.2015.240666924:2(1052-1064)Online publication date: 1-Apr-2016
      • (2015)P-MTIIEEE/ACM Transactions on Networking10.1109/TNET.2014.232646023:4(1356-1366)Online publication date: 1-Aug-2015
      • (2015)Inducing Collisions for Fast RFID Tag IdentificationIEEE Communications Letters10.1109/LCOMM.2015.246823519:10(1838-1841)Online publication date: Oct-2015
      • (2014)Arbitrarily accurate approximation scheme for large-scale RFID cardinality estimationIEEE INFOCOM 2014 - IEEE Conference on Computer Communications10.1109/INFOCOM.2014.6847971(477-485)Online publication date: Apr-2014
      • (2013)Informative countingProceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing10.1145/2491288.2491299(21-30)Online publication date: 29-Jul-2013

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media