Threshold jumping and wrap-around scan techniques toward efficient tag identification in high density RFID systems

Size: px
Start display at page:

Download "Threshold jumping and wrap-around scan techniques toward efficient tag identification in high density RFID systems"

Transcription

1 DOI /s Threshold jumping and wrap-around scan techniques toward efficient tag identification in high density RFID systems Ching-Hsien Hsu & Han-Chieh Chao & Jong Hyuk Park # Springer Science + Business Media, LLC 2009 Abstract With the emergence of wireless RFID technologies, the problem of Anti-Collision has been arousing attention and instigated researchers to propose different heuristic algorithms for advancing RFID systems operated in more efficient manner. However, there still have challenges on enhancing the system throughput and stability due to the underlying technologies had faced different limitation in system performance when network density is high. In this paper, we present a Threshold Jumping (TJ) and a Wrap-Around Scan (WAS) techniques, which are query tree based approaches, aiming to coordinate simultaneous communications in high density RFID environments, to speedup tag identification, to increase the overall read rate and to improve system throughput in largescale RFID systems. The main idea of the Threshold C.-H. Hsu Department of Computer Science and Information Engineering, Chung Hua University, Hsinchu, Taiwan, Republic of China chh@chu.edu.tw H.-C. Chao Institute of Computer Science & Information Engineering, and Department of Electronic Engineering, National Ilan University, I-Lan, Taiwan, Republic of China hcc@mail.niu.edu.tw hcc@mail.ndhu.edu.tw H.-C. Chao Department of Electrical Engineering, National Dong Hwa University, Hualien, Taiwan, Republic of China J. Hyuk Park (*) Department of Computer Science and Engineering, Kyungnam University, Masan, Kyungnam, South Korea parkjonghyuk1@hotmail.com Jumping is to limit the number of collisions. When the number of collisions exceeds a predefined threshold, it reveals that tag density in RF field is too high. To avoid unnecessary enquiry messages, the prefix matching will be moved to next level of the query tree, alleviating the collision problems. The method of setting frequency bound indeed improves the efficiency in high density and randomly deployed RFID systems. However, in irregular or imbalanced RFID networks, inefficient situation may happen. The problem is that the prefix matching is performed in single direction level-order scheme, which may cause an imbalance query tree on which the right subtree always not been examined if the identification process goes to next level before scan the right sub-tree due to threshold jumping. By scanning the query tree from right to left in alternative levels, i.e., wrap-around, this flaw cold be ameliorated. To evaluate the performance of proposed techniques, we have implemented the TJ and the WAS method along with the query tree protocol. The simulation results show that the proposed techniques provide superior performance in high density environments. It is shown that the TJ and WAS are effective in terms of increasing system throughput and minimizing identification delay. Keywords Tag anti-collision. Query tree. Wrap-around scan. Threshold jumping 1 Introduction Radio Frequency Identifier (RFID) system is an automatic technology to identify objects, record metadata or control individual target through radio waves. The RFID system is mainly composed by three components, tags, readers and host system. An RFID tag is comprised of integrated circuit

2 with an antenna for storing information and communication, respectively. An RFID reader is capable of reading the information stored at tags located in its sensing range. The host system is a control center that provides services and management. The electronics in the RFID reader use an outside power resource to generate signal to drives the reader s antenna and turn into radio wave. The radio wave will be received by RFID tag which will reflect the energy in the way of signaling its identification and other related information. In matured RFID systems, the reader s RF can also instruct the memory to be read or written from which the tag contained. Many applications, such as supply chain automation, identification of products at check-out points, security and access control, localization and object tracking have been developed to take the primary function of RFID systems. Advantages of RFID technologies, such as price efficiency, fast deployment, reusable and accuracy of stock management also broaden the scope of applications of RFID systems. Advanced characteristics of recent RFID readers, like size miniaturization and capabilities of Wi-Fi or cellular also motivate the development of large scale RFID systems. In recent RFID technologies, it is motivated that an RFID system can be integrated with wireless sensor network by interfacing RFID tags with external sensing capabilities, such as light, temperature or shock sensors; forming a hybrid infrastructure that combines advantages of both technologies. Similar to wireless sensor network, RFID tags can be deployed in an ad-hoc fashion instead of pre-installed statically. As a result, RFID has gradually been applied to our daily lives so that some identification problems might be happened. When a reader simultaneously communicate with multiple tags that are in the same interrogation zone, the tags responses might be collided because the tag could not be aware the existence of neighboring tags due to it has no carrier sense ability. Therefore, efficient methods for identifying multiple tags simultaneously are of great importance for the development of large-scale wireless RFID systems. In general, the tag anti-collision techniques can be classified into two categories, aloha based and query tree based protocols. Aloha based approaches use time slot to reduce collision probability. Tags randomly select a particular slot in the time frame, load and transmit its identification to the reader. Once the transmission is collided, tags will repeatedly send its id in next interval of time to make sure its id is successfully recognized. Alohabased protocols can reduce the collision probability. However, they have the tag starvation problem that a particular tag nay not be identified for a long time. For the consideration of performance, when number of RFID tag increased, the tag collision rate will be increased as well; this may result a low tag recognition rate. The query tree based schemes use a data structure similar to a binary search algorithm. An RFID reader consecutively communicates with tags by sending prefix codes based on the query tree data structure. Only tags in the reader s interrogation zone and of which ID match the prefix respond. The reader can identify a tag if only one tag respond the inquiry. Otherwise the tags responses will be collided if multiple tags respond simultaneously. Although tree based protocols do not bring the tag starvation problem, but they have relatively long identification delay. In this paper, we present a Threshold Jumping (TJ) and a Wrap-Around Scan (WAS) techniques aim to coordinate simultaneous communications in high density RFID environments, to speedup tag identification and to increase the overall read rate and throughput in large-scale RFID systems. The main idea of the proposed technique is to limit number of collisions during the identification phase. When number of collisions larger than the predefined acceptable ratio, it reveals that the density in RF field is too high. In order to minimize unnecessary inquiry, the prefix matching will be moved to lower level of the query tree, alleviating the collision problems. The method of setting collision bound indeed improves the efficiency of large-scale RFID tag identification. Together with the concept of wrap-around scan, the tag anti-collision problem could be significantly ameliorated. To evaluate the performance of proposed techniques, we have implemented the TJ and the WAS method along with other tag identification approaches. The experimental results show that the proposed techniques present significant improvement in most circumstance. The rest of this paper is organized as follows: In Section 2, a brief survey of related work will be presented. Section 3 introduces the tree based tag identification algorithm as preliminary of this study. In section 4, two query tree based algorithms, the Threshold Jumping (TJ) and Wrap-Around Scan (WAS) are proposed. Performance comparisons and analysis of the proposed techniques will be given in Section 5. Finally, in Section 6, some concluding remarks are made. 2 Related work Many research results have been proposed in literature, such as security and privacy related research (Weis et al. 2004) focuses on methods of preserving and protecting privacy of RFID tags; the RFID reader collision avoidance and hidden terminal problems were firstly addressed in (Engels et al. 2002) aiming to enhance accuracy of RFID systems; the energy saving and coverage problems (Namboodiri and Gao 2007; Zhang and Hou 2005; Ching- Hsien et al. 2008) were extensively studied in order to improve lifetime of wireless RFID networks.

3 Research efforts for collision avoidance have been also presented in literature. Frequency Division Multiple Access (FDMA), Code Division Multiple Access (CDMA), Time Division Multiple Access (TDMA) and Carrier Sense Multiple Access (CSMA) (Jain and Das 2006) are four basic access methods to categorize MAC-level protocols. Standard collision avoidance protocols like RTS-CTS (Sobrinho et al. 2005) cannot be directly applied in RFID systems due to the reason, in traditional wireless networks, the CTS are sent back to the sender. Similar situation in RFID system, when a reader broadcasts an RTS, all tags in the read range need to send back CTS to the reader. It then requires another collision avoidance mechanism for CTS, and it will make the protocol more complicated. Techniques for resolving RFID reader collision problems are usually proposed as reader anti-collision techniques or tag anticollision solutions. The Colorwave (Waldrop 2003) is a scheduling-based approach prevents RFID readers from simultaneously transmitting signal to an RFID tag. The Colorwave is used as a distributed anti-collision system based on TDMA in RFID network. The Pulse protocol (Shailesh et al. 2005) is referred as a beacon broadcast and CSMA mechanism. Readers periodically send a beacon during communication with tags in separate control channels. The contend_back-off and the delay_before_ beaconing in the protocol are similar in wireless networks. If a reader receives a beacon, the residual back-off timer will be stored and kept until the next coming chance. This process is expected to achieve the fairness among all readers. A coverage-based RFID reader anti-collision mechanism was proposed in (Joongheon et al. 2546). Kim et al. (Joongheon et al. 2546) presented a localized clustering coverage protocol for solving reader collision problems occurring among homogeneous RFID readers. In (Cha et al. 2006), Cha et al. proposed two ALOHA-based algorithms with a Tag Estimation Method (TEM) for speedup object identification in RFID systems. Hsu et al. (Ching-Hsien et al. 1007) proposed a two phase dynamic modulation (TPDM) scheme to coordinate communications between multiple readers and tags. In TPDM, the scheduling is divided into two phases, the regional scheduling and the hidden terminal scheduling. The existing tag identification approaches can be classified into two main categories, the Aloha-based (Klair et al. 2007; Law et al. 2000; Roberts 1975; Vogt 2002; Zhen et al. 2005) anti-collision scheme and the tree-based scheme (Capetanakis 1979; Myung et al. 2006; Ryu et al. 2007; Zhou et al. 2004). RFID readers in the former scheme create a frame with a certain number of time slots, and then add the frame length into the inquiry message sending tags in its vicinity. Tags response the interrogation based on a random time slot. Because collisions may happen at the time slot when two or more tag response simultaneously, making those tags could not be recognized. Therefore, the readers have to send inquiries contiguously until all tags are identified. As a result, Aloha-based scheme might have long processing latency in identifying large-scale RFID systems (Law et al. 2000). In (Vogt 2002), Vogt et al. investigated how to recognize multiple RFID tags within the reader s interrogation ranges without knowing the number of tags in advance by using framed Aloha. A similar research is also presented in (Zhen et al. 2005) by Zhen et al. In (Klair et al. 2007), Klair et al. also presented a detailed analytical methodology and an in-depth qualitative energy consumption analysis of pure and slotted Aloha anti-collision protocols. Another anti-collision algorithm called enhanced dynamic framed slotted aloha (EDFSA) is proposed in (Lee et al. 2005). EDFSA estimates the number of unread tags first and adjusts the number of responding tags or the frame size to give the optimal system efficiency. In tree-based scheme, such as ABS (Myung et al. 2006), IBBT (Choi et al. 2004) and IQT (Sahoo et al. 2006), RFID readers split the set of tags into two subsets and labeled them by binary numbers. The reader repeats such process until each subset has only one tag. Thus the reader is able to identify all tags. The adaptive memoryless tag anti-collision protocol proposed by Myung et al. (Myung & Lee 2005) is an extended technique based on the query tree protocol. Choi et al. also proposed the IBBT (Improved Bit-by-bit Binary-Tree) algorithm (Choi et al. 2004) in Ubiquitous ID system and evaluate the performance along three other old schemes. The IQT protocol (Sahoo et al. 2006) is a similar work approach by exploiting specific prefix patterns in the tags to make the entire identification process. Recently, Zhou et al. (Zongheng et al. 2007) consider the problem of slotted scheduled access of RFID tags in a multiple reader environment. They developed centralized algorithms in a slotted time model to read all the tags. With the fact of NPhard, they also designed approximation algorithms for the single channel and heuristic algorithms for the multiple channel cases. Although tree based schemes have advantage of implementation simplicity and better response time compare with the Aloha based ones, they still have challenges in decreasing the identification latency. In this paper, we present two enhanced tree based tag identification techniques aim to coordinate simultaneous communications in large-scale RFID systems, to speedup minimize tag identification latency and to increase the overall read rate and throughput. 3 Query tree based tag anti-collision Radio Frequency IDentification (RFID) system is operated with the identification function through radio frequency, but

4 usually, not only one tag is applied to the identification, that means RFID reader needs to identify multiple tags at the same time. However, collision problems may happen in the process of identifying multiple tags. Binary splitting is a commonly approach applied in solving the tag collision problems. Figure 1 demonstrates a simple example of the query tree scheme. As this is a simple example, the collision only happened at nodes 0 and 01, which are represented as grid circles. The reader takes six inquiries to identify the three tags in this example. Considering when tag density becomes higher, every time when collision happened, the reader will add one bit for prefix matching at next level. In such way, it may waste too much time in scanning the entire binary tree. Due to this, a threshold of collisions could be defined as the criterion to move the identification to next level of a query tree. When the number of collisions exceeds the predefined threshold, we can predict that tag density in RF field is too high. So, the prefix matching at the current level will be skipped and jump to next level in order to save unnecessary communications of prefix enquiries. This idea motivates the design of threshold jumping. 4 The proposed techniques 4.1 Threshold Jumping (TJ) Recall that when readers stay in the environment with high tags density, collision may happen very frequently, and owing to this, a lot of query time will be wasted. In Threshold Jumping algorithm, a threshold of collisions is mainly used as the criterion of moving the identification to next level of a query tree. By means of the criterion to judge the level of tag density, if the density is high, the corresponding level of the query tree will be jumped over. As shown in Fig. 2, when the number of collisions exceeds the predefined threshold, prefix matching at the present level will be skipped in order to save unnecessary prefix inquiries for the remaining part at the same level. Through the step, the number of inquiry message could be significantly reduced. Let s take an example to clarify the above concept. Given an RFID network having 13 tags with 4-bits id length as shown in Fig. 3, the prefix matching will be conducted in level order scheme. Prefix messages are with 1-bit in level 1, two bits length in level 2, and so on. To perform a complete inquiry in different level, the number of inquiry messages will be 2 in level 1, 4 in level 2, 8 in level 3, etc. Having the threshold set to 2 I /M, where I denotes the level in the query tree and M is a pre-defined constant, if the collisions in level I exceeds 2 I /M, the prefix matching will be jumped to the next level for a new search. Figure 3 shows the example of identifying 13 RFID tags using TJ with M=3. Based on the threshold ratio 1/3, the threshold in levels 1, 2, 3 are [2/3], [4/3] and [8/3], respectively. Namely, in level 1, the identification will be moved to level 2 if 1 collision occurred; when I=2, i.e., level 2, the identification moves to level 3 if more than 2 collisions are occurred; similarly, when I=3, the identification will be jumped to level 4 if more than 3 collisions are raised in level 3, and so on. Table 1 summarizes the detail information (collision, identified or idle) using the TJ method compared to the traditional query tree scheme. The TJ uses 22 inquiries to identify all tags while the QT spent 24 inquiries. One thing worthy to mention is that although 22 inquiries is much more than the number of RFID tags, but to exhaustively scan RFID tags using full length id is not a feasible approach. This is because for RFID tags having more than 16 bits length id, the process of scanning entire query tree will lead significant large amount of inquiries, i.e., Therefore, the query tree based mechanism with prefix matching is usually considered as the feasible solution in tag anti-collision problem. Recall the example described above, it s clear that there are a lot of unnecessary broadcast in the method of query tree with binary splitting. For the TJ technique, when collision exceeds a certain proportion, it reveals that tag density is too high so there is no need to continuously launch broadcast to current level in order to save identification time. Therefore, in the Threshold Jumping method, the threshold is taken to count the collision numbers. Once collision is over the proportion, there is no need to continue the query to the current level, instead, jumping to the next level. Based on the reduction of broadcasting messages, the efficiency of identification will be enhanced. 4.2 Wrap-Around Scan (WAS) The method of setting collision limitation in TJ (Threshold Jumping) is adopted to improve identification efficiency when tag density is high. Recall that the TJ scans the query tree in a level order scheme. The direction of scan is always from left to right. Considering that the single direction scan in TJ may result very limited information of idle or collision in the right sub-tree of the query tree due to the threshold jumping. As a result, the identification of right sub-tree will be postponed to the last moment. The main reason is that if threshold is fulfilled in TJ, right sub-tree will be skipped over so that inefficiency may happen if tag density is low or meets the situation of unbalanced tree. The problem can be resolved through alternatively change the direction of prefix scan in different levels; the so-called WAS (Wrap-Around Scan). In WAS, the identification of tags in the right sub-tree could be advanced by reversing

5 Fig. 1 Example of query tree algorithm the direction of scan in each level alternatively. Figure 4 demonstrates the idea of wrap-around scan. The level ordered scans start from left to right in all odd (or even) levels and starts from right to left in all even (or odd) levels. Using wrap-around scan, the amount of prefix inquiries is expected to be decreased as the advance findings of the information of no response / collisions in the query tree could be in a balanced way. Let s use the same example that illustrated in section 4.1 to demonstrate the WAS scheme. Figure 5 gives the details of identification of the WAS method. The WAS scans the query tree from right to left in level 1, the reverse in level 2, and reverse again in level 3, and so on. Since the threshold ration is set 1/3, the threshold of collisions are 1, 2 and 3 in level 1, level 2 and level 3, respectively. The only one collision happened in level 1 is node 1, the two collision nodes appeared in level 2 are nodes 00 and 01; while the three collision nodes in level 3 are happened at nodes 111, 100 and 010 in order. It s clear that the efficiency of identification is enhanced by means of the addition of WAS (Wrap-Around Scan) in TJ (Threshold Jumping). The reason is that the WAS (Wrap-Around Scan) could identify the tags of right sub-tree and learned more information regarding no response and collision. The advanced information can significantly diminish the inquiry messages. Such phenomenon reveals that the WAS (Wrap- Around Scan) can speed up the identification efficiency, especially in unbalanced or irregular RFID networks. 5 Performance evaluation To evaluate the performance of the proposed techniques, we have implemented the TJ and WAS schemes along with the query tree protocol (QT). Figure 6 compares the number of inquiries to identify different number of RFID tags. Because Fig. 2 The paradigm of threshold jumping

6 Fig. 3 Example of threshold jumping the tag id is set 8 bits length, density=10% means that there are %=26 tags and density=20% means that there are %=51 tags, and so on. All tags are randomly generated in a uniform distribution manner. This is so called balance tree, as entitled in the figure. In this test, the threshold ratio is set 1/3. Basically, the proposed techniques TJ and WAS can reduce the amount of inquiry messages. As we expected, the WAS outperforms the TJ. Although the TJ and WAS methods do not improve the inquiry messages very much in low density network, when density increasing, both of the proposed methods present significant improvements to the traditional query tree protocol. Figure 7 uses the same configuration as that of Fig. 6 but increases the length of tag ID. Because of the long Table 1 Tag identification of three different schemes Step Binary Tree Threshold Jumping Wrap-Around Scan Broadcast Status Identified Tag Broadcast Status Identified Tag Broadcast Status Identified Tag 1 0 Collision 0 Collision 0 Collision 2 1 Collision 00 Collision 00 Collision 3 00 Collision 01 Collision 01 Collision 4 01 Collision 000 Collision 111 Collision 5 10 Collision 001 Collision 110 Identified Collision 010 Collision 101 Collision Collision 0000 Identified Collision Collision 0001 Identified Identified Collision 0010 Identified Collision Identified Identified Identified Collision 0100 Identified Identified Identified Identified Identified Identified Identified Identified Collision 0111 No Response 0100 Identified Identified Identified Identified Identified Identified Identified Identified No Response 1001 Identified Identified Identified Identified Identified Identified Identified Identified No Response Identified Identified Identified Identified Identified Identified 1111

7 Fig. 4 The paradigm of wrap-around scan simulation time for high density network with 12 bits ID length, we only report the results from density=20% to density=80%. Namely, the number of tags in this test is set from %~ %, i.e., 819~3277. This simulation has similar observations as those of Fig. 6. The TJ and WAS have better performance compare to the QT in terms of the inquiry messages. As the TJ and WAS schemes define a collision threshold to limit unnecessary inquiries, Fig. 8 examines the effects of different threshold ratio to the performance of the two schemes. Figure 8(a) is the result for density=80% and Fig. 8(b) is the results for density=50%. For high density network, we observed that lower threshold resulting less inquiry cost. Both of the TJ and WAS methods outperform the traditional query tree protocol (QT). For low density RFID network, it is obvious that TJ and WAS will reach a lower bound inquiries when threshold ratio is less than 1/5. Similar to the previous one, the TJ and WAS have better performance compare to the QT in terms of the inquiry messages. The last experiment was conducted with different distribution of tags id. The term Tree Balance Factor (TBF) defined in Fig. 9 is used to indicate the percentage of tags distributed in left sub-tree and right sub-tree of a query tree. TBF=10% means that number of tags in left sub-tree and right sub-tree are with the ratio 1:9; similarly, TBF= 20% represents the number of tags in left sub-tree and right sub-tree are with the ratio 2:8. Since the distribution of tags in a query tree is not a uniform distribution, this is so called Fig. 5 Example of wrap-around scan

8 Inquiry QT Balance Tree (8-Bits) Inquiry Balance Tree (8-Bits), density=80% QT TJ WAS TJ WAS Density(%) a Threshold Ratio (1/TR) Inquiry Balance Tree (8-Bits), density=50% Fig. 6 Performance comparison of the TJ, WAS and QT with 8 bits RFID tag imbalance tree, as titled in Fig. 9. The experiment varies tree balance factor from 10% which means a balance tree, to 50% which reflects an imbalance distribution. The density is set 80% in this test. From the experimental results, the WAS scheme outperforms the TJ and the query tree methods. For imbalanced instances, the TJ performs worse than the query tree (BT) protocol. This is because the TJ method does not scan right sub-tree in most of levels in a query tree. As a result, there is no information of collision or no response at upper levels of the right sub-tree. Consequently, when the identification goes to lower levels, the reader needs to match large number of tags id. This situation usually happened in imbalanced tree. Such phenomenon matches the results shown in Fig. 9. For the cases of TBF=40% and 50%, the TJ scheme could present noticeable improvement as compare to the QT b QT TJ WAS Threshold Ratio Fig. 8 Performance comparison of the TJ, WAS and QT with different threshold ratio a results of density=80% b results of density=50% Inquiry Balance Treee(12--Bits) 350 Inquiry QT Imbalance Tree (8-Bits) TJ WAS QT TJ WA Density(%) Tree Balance Factor (%) Fig. 7 Performance comparison of the TJ, WAS and QT with 12 bits RFID tag Fig. 9 Performance comparison of the TJ, WAS and BT in imbalanced tree

9 6 Conclusions With the emergence of wireless RFID technologies, identifying high density RFID tags is a crucial task in developing largescale RFID systems. In this paper, we have presented two enhanced tree-based tag identification techniques for minimizing tag identification cost. By setting a collision bound, the prefix matching will be jumped to lower level of the query tree in order to alleviate the collision problems. Together with the wrap-around scan technique, the efficiency of tag identification can be significantly improved. To evaluate the performance of proposed techniques, we have implemented the TJ and WAS techniques along with the query tree protocol (QT). The experimental results show that the proposed techniques provide considerable improvements on the latency of tag identification. It is also shown that the TJ and WAS are effective in terms of increasing system throughput, efficiency and easy implementation. There is also room for improvement of the identification technique in order to eliminate runtime peaks. It remains challenging, however, to find an optimal approach that would take environmental effects into account in order to adapt to them. We hope that the work done so far helps implementing pervasive computing environments that employ RFID systems. Acknowledgement The authors are grateful to the anonymous referees whose insightful comments enabled us to make significant improvements. This research was supported by NSC, National Science Council of Taiwan, under grant number NSC E References Birari, S. M. & Iyer, S. (2005). Mitigating the Reader Collision Problem in RFID Networks with mobile readers, International Conference on Networks (ICON). Capetanakis, J. I. (1979). Tree algorithms for packet broadcast channels. IEEE Transactions on Information Theory, 25, Cha, J. R. & Kim, J. H. (2009). Dynamic Framed Slotted ALOHA Algorithm using Fast Tag Estimation method for RFID System, in proceedings CCNC 06, Las Vegas, USA, Choi, H. S., Cha, J. R. & Kim, J. H. (2004). Improved Bit-by-bit Binary Tree Algorithm in Ubiquitous ID System, in proceedings of the IEEE PCM 2004, Tokyo, Japan, Nov. 29-Dec. 3, pp , Engels, D. W. & Sarma, S. E. (2002). The reader collision problem, in proceedings of the IEEE International Conference on Systems, Man and Cybernetics. Jain, S., & Das, S. R. (2006). Collision avoidance in multi-reader RFID networks, in proceedings of the WiNTECH California: Los Angeles. Kim, J., Kim, S., Kim, D., Lee W. & Kim, E. (2005). Low-Energy Localized Clustering: An Adaptive Cluster Radius Configuration Scheme for Topology Control in Wireless Sensor Networks, proceedings of the IEEE Vehicular Technology Conference (VTC), pp Klair, D. K., Chin, K.-W., & Raad, R. (2007). An investigation into the energy efficiency of pure and slotted aloha based RFID anticollision protocols, in proceedings of the IEEE WoWMoM 07, June Finland: Helsinki. Law, C., Lee, K. & Siu, K.-Y. (2000). Efficient Memoryless Protocol for Tag Identification. in proceedings of the International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications. Lee, S., Joo, S.D. & Lee, C.W. (2005). An enhanced dynamic framed slotted aloha algorithm for RFID tag identification, in ACM Mobiquitous. Myung, J., & Lee, W. (2005). An adaptive memoryless tag anticollision protocol for RFID networks, IEEE INFOCOM 05. Mar: Poster Session. Myung, J., Lee, W., & Srivastava, J. (2006). Adaptive binary splitting for efficient RFID tag anti-collision. IEEE Communication Letter, 10(3), Namboodiri, V. & Gao, L. (2007). Energy-Aware Tag Anti-Collision Protocols for RFID Systems, in proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications, pp Roberts, L. G. (1975). Aloha Packet System with and without Slots and Capture. ACM SIGCOMM Computer Communication Review, 5, Ryu, J., Lee, H., Seok, Y., Kwon, T., & Choi, Y. (2007). A Hybrid Query Tree Protocol for Tag Collision Arbitration in RFID systems. IEEE International Conference on Communications (ICC-07), 24 28, Sahoo, A., Iyer, S., & Bhandari, N. (2006). Improving RFID System to Read Tags Efficiently. IIT Bombay, June: KRSIT Technical Report. Sobrinho, J. L., de Haan, R. & Brazio, J.M. (2005). Why RTS-CTS is not your ideal wireless LAN multiple access protocol, in proceedings of the IEEE Wireless Communications and Networking Conference, pp Vogt, H. (2002). Efficient Object Identification with Passive RFID Tags, in proceedings of the 1st International Conference on Pervasive Computing. LNCS, 2414, Weis, S., Sarma, S. E., Rivest, R. L., & Engels, D. W. (2004). Security and privacy aspects of low-cost radio frequency identification systems, Security in Pervasive Computing. LNCS, 2803, Waldrop, J., Engels, D. W. & Sarma, S. E. (2003). Colorwave: an anticollision algorithm for the reader collision problem, proceedings of the IEEE International Conference on Communications, pp Zhang, H., & Hou, J. C. (2005). Maintaining sensing coverage and connectivity in large sensor networks. Wireless Ad Hoc and Sensor Networks, 1(1 2), Zhen, B., Kobayashi, M., & Shimizui, M. (2005). Framed aloha for multiple RFID objects Identification. IEICE Trans. on Comm, E88-B(3), Zhou, Z., Gupta, H., Das S. R. & Zhu. X. (2007). Slotted Scheduled Tag Access in Multi-Reader RFID Systems, in proceedings of the IEEE International Conference on Networks Protocols (ICNP), pp Zhou, F., Chen, C., Jin, D., Huang, C., & Min, H. (2004). Evaluating and Optimizing Power Consumption of Anti-Collision Protocols for Applications in RFID systems, in proceedings of the International Symposium on Low Power Electronics and Design. California, USA, August: Newport Beach. Hsu, Ching-Hsien, Chen, Shih-Chang, Yu, Chia-Hao & Park, J. H. (2009). Alleviating the Reader Collision Problem in Mobile and Wireless RFID Environments, Journal of Personal and Ubiquitous Computing, Springer, doi: /s Hsu, Ching-Hsien, Chen, Yi-Min & Kang, H. J. (2008). Performance-Effective and Low-Complexity Redundant Reader Detection in Wireless RFID Networks, EURASIP Journal on Wireless Communications and Networking, vol. 2008, Article ID , 9 pages, doi: /2008/

10 Dr. Ching- Hsien. Hsu received the B.S. and Ph.D. degrees in Computer Science from Tung Hai University and Feng Chia University, Taiwan, in 1995 and 1999, respectively. He is currently an associate professor in the department of Computer Science and Information Engineering at Chung Hua University, Taiwan. Dr. Hsu s research interest is primarily in parallel and distributed computing, cloud and grid computing, P2P computing and services computing. Dr. Hsu has published more than 100 academic papers in journals, books and conference proceedings. He was awarded as annual outstanding researchers by Chung Hua University in 2005, 2006 and 2007 and got the excellent research award in Dr. Hsu is serving in a number of journal editorial boards, including International Journal of Communication Systems, International Journal of Computer Science, International Journal of Grid and High Performance Computing, International Journal of Smart Home and International Journal of Multimedia and Ubiquitous Engineering. He has edited more than 20 international journal special issues as a guest editor. He has severed many international conferences as various chairs and committee members. Dr. Hsu is currently an IEEE senior member and serves as an executive committee of IEEE Technical Committee on Scalable Computing (TCSC). Homepage: TEL: FAX: Han-Chieh Chao is a joint appointed Full Professor of the Department of Electronic Engineering and Institute of Computer Science & Information Engineering. He also serves as the Dean of the College of Electrical Engineering & Computer Science for National Ilan University, I-Lan, Taiwan, R.O.C. He has been appointed as the Director of the Computer Center for Ministry of Education on September 2009 as well. His research interests include High Speed Networks, Wireless Networks, IPv6 based Networks, Digital Creative Arts and Digital Divide. He received his MS and Ph.D. degrees in Electrical Engineering from Purdue University in 1989 and 1993 respectively. Dr. Chao is also serving as an IPv6 Steering Committee member and co-chair of R&D division of the NICI (National Information and Communication Initiative, a ministry level government agency which aims to integrate domestic IT and Telecom projects of Taiwan), Co-chair of the Technical Area for IPv6 Forum Taiwan, the Editor-in-Chief of the Journal of Internet Technology, Journal of Internet Protocol Technology and International Journal of Ad Hoc and Ubiquitous Computing. Dr. Chao has served as the guest editors for Mobile Networking and Applications (ACM MONET), IEEE JSAC, IEEE Communications Magazine, Computer Communications, IEE Proceedings Communications, the Computer Journal, Telecommunication Systems, Wireless Personal Communications, and Wireless Communications & Mobile Computing. Dr. Chao is an IEEE senior member and a Fellow of IET (IEE). He is a Chartered Fellow of British Computer Society. Dr. Jong Hyuk Park received his Ph.D. degree in Graduate School of Information Security from Korea University, Korea. Before August, 2007, Dr. Park had been a research scientist of R&D Institute, Hanwha S&C Co., Ltd., Korea. He is now a professor at the Department of Computer Science and Engineering, Kyungnam University, Korea. Dr. Park has published about 100 research papers in international journals and conferences. Dr. Park has served as Chairs, program committee or organizing committee chair for many international conferences and workshops; Chair of SH 06/07/08, MUE 07/08, IPC 07/07, FGCN 07/08, TRUST 07/08, SMPE 07/08, UASS 07/08, SSDU 07/ 08, UIC 07/08, Mobility 08, SUTC 08, WPS 08, SecUbiq 07, ISM 07, and PC member of PerCom 08, AINA 07/08, MOBIQU- ITOUS 07/08, ATC 08, EUC 07 and so on. Dr. Park was editor-inchief of the International Journal of Multimedia and Ubiquitous Engineering (IJMUE), the managing editor of the International Journal of Smart Home (IJSH). And he is Associate Editors / Editors of 13 international journals including seven journals indexed by SCI(E). Dr. Park s research interests include Digital Forensics, Security, Ubiquitous and Pervasive Computing, Context Awareness, Multimedia Service, etc. He is a member of the KICS, KIISC, KMS, and IEICE. Homepage:

A Improved Frame Slotted Aloha Protocol with Early End in Mobile RFID Systems

A Improved Frame Slotted Aloha Protocol with Early End in Mobile RFID Systems Sensors & Transducers 2013 by IFSA http://www.sensorsportal.com A Improved Frame Slotted Aloha Protocol with Early End in Mobile RFID Systems 1 Xiaowu Li, 2 Zhenjiang Wang, 3 Xin Ren, 4 Yuyan Liu, 5 Qing

More information

A RFID Explicit Tag Estimation Scheme for Dynamic Framed- Slot ALOHA Anti-Collision

A RFID Explicit Tag Estimation Scheme for Dynamic Framed- Slot ALOHA Anti-Collision A RFID Explicit Tag Estimation Scheme for Dynamic Framed- Slot ALOHA Anti-Collision Author Pupunwiwat, Prapassara, Stantic, Bela Published 2010 Conference Title 6th International Conference on Wireless

More information

Novel Tag Anti-collision Algorithm with Adaptive Grouping

Novel Tag Anti-collision Algorithm with Adaptive Grouping Wireless Sensor Network, 2009, 1, 475-481 doi:10.4236/wsn.2009.15057 Published Online December 2009 (http://www.scirp.org/journal/wsn). Novel Tag Anti-Collision Algorithm with Adaptive Grouping Abstract

More information

A simulation study on the energy efficiency of pure and slotted Aloha based RFID tag reading protocols

A simulation study on the energy efficiency of pure and slotted Aloha based RFID tag reading protocols University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 9 A simulation study on the energy efficiency of pure and slotted Aloha

More information

RECENT ADVANCES in SOFTWARE ENGINEERING, PARALLEL and DISTRIBUTED SYSTEMS

RECENT ADVANCES in SOFTWARE ENGINEERING, PARALLEL and DISTRIBUTED SYSTEMS RECENT ADANCES in SOFTWARE ENGINEERING, PARALLEL and DISTRIBUTED SYSTEMS The First Search Right Algorithm for Elimination in RFID Network Jui-Wen Hung 1, I-Hui Li 2, Hsin-Hung Lin, Jyun-An Cai Department

More information

Grouping Based Dynamic Framed Slotted ALOHA for Tag Anti-Collision Protocol in the Mobile RFID Systems

Grouping Based Dynamic Framed Slotted ALOHA for Tag Anti-Collision Protocol in the Mobile RFID Systems Appl. Math. Inf. Sci. 7, No. 2L, 655-659 (2013) 655 Applied Mathematics & Information Sciences An International Journal http://dx.doi.org/10.12785/amis/072l40 Grouping Based Dynamic Framed Slotted ALOHA

More information

Design of the RFID for storage of biological information

Design of the RFID for storage of biological information Design of the RFID for storage of biological information Yu-Lee Choi *, Seok-Man Kim **, Sang-Hee Son ***, and Kyoung-Rok Cho ** Dept. of Bio and Information Technology * Chungbuk National University,

More information

Performance Analysis of Anti-collision Algorithm for Tag Identification Time Improvement

Performance Analysis of Anti-collision Algorithm for Tag Identification Time Improvement , pp.1-10 http://dx.doi.org/10.14257/ijseia.2014.8.3.01 Performance Analysis of Anti-collision Algorithm for Tag Identification Time Improvement Chang-Su Kim 1, Bong-Im Jang 1 and Hoe-Kyung Jung 1* 1 PaiChai

More information

Minimising collisions in RFID data streams using probabilistic Cluster-Based Technique

Minimising collisions in RFID data streams using probabilistic Cluster-Based Technique Minimising collisions in RFID data streams using probabilistic Cluster-Based Technique Author Pupunwiwat, Prapassara, Stantic, Bela Published 2013 Journal Title Wireless Networks DOI https://doi.org/10.1007/s11276-012-0495-3

More information

Conceptual Selective RFID Anti-Collision Technique Management

Conceptual Selective RFID Anti-Collision Technique Management Conceptual Selective RFID Anti-Collision Technique Management Author Pupunwiwat, Prapassara, Darcy, Peter, Stantic, Bela Published 2011 Journal Title Procedia Computer Science DOI https://doi.org/10.1016/j.procs.2011.07.114

More information

Efficient and Reliable Estimation of Tags in RFID Systems

Efficient and Reliable Estimation of Tags in RFID Systems Proceedings of the International MultiConference of Engineers and Computer Scientists 8 Vol II IMECS 8, 9- March, 8, Hong Kong Efficient and Reliable Estimation of Tags in RFID Systems Xu Huang Abstract

More information

RFID as an Infrastructure

RFID as an Infrastructure Yan Qiao, Shigang Chen, Tao Li RFID as an Infrastructure Monograph August 28, 2012 Springer Chapter 1 Introduction Abstract RFID (radio frequency identification) tags are becoming ubiquitously available

More information

On the Accuracy of RFID Tag Estimation Functions

On the Accuracy of RFID Tag Estimation Functions 1 On the Accuracy of RFID Tag Estimation Functions Dheeraj K. Klair, Kwan-Wu Chin and Raad Raad Telecommunications Information Technology Research Institute University of Wollongong orthfields Avenue,

More information

RFIDcover - A Coverage Planning Tool for RFID Networks with Mobile Readers

RFIDcover - A Coverage Planning Tool for RFID Networks with Mobile Readers RFIDcover - A Coverage Planning Tool for RFID Networks with Mobile Readers S. Anusha and Sridhar Iyer Indian Institute of Technology Bombay, India {anusha, sri}@it.iitb.ac.in Abstract. Radio Frequency

More information

On the Accuracy of RFID Tag Estimation Functions

On the Accuracy of RFID Tag Estimation Functions University of Wollongong Research Online Faculty of Informatics - Papers Faculty of Informatics 27 On the Accuracy of RFID Tag Estimation Functions D. K. Klair University of Wollongong K. Chin University

More information

Conceptual Selective RFID Anti-Collision Technique Management

Conceptual Selective RFID Anti-Collision Technique Management Available online at www.sciencedirect.com Procedia Computer Science 5 (2011) 827 834 The Fifth International Workshop on RFID Technology - Concepts, Applications, Challenges Conceptual Selective RFID Anti-Collision

More information

Joined Q-ary Tree Anti-Collision for Massive Tag Movement Distribution

Joined Q-ary Tree Anti-Collision for Massive Tag Movement Distribution Proc. 33rd Australasian Computer Science Conference (ACSC 2010), Brisbane, Australia Joined Q-ary Tree Anti-Collision for Massive Tag Movement Distribution Prapassara Pupunwiwat Bela Stantic Institute

More information

Unknown-Target Information Collection in Sensor-Enabled RFID Systems

Unknown-Target Information Collection in Sensor-Enabled RFID Systems 1164 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 22, NO. 4, AUGUST 2014 Unknown-Target Information Collection in Sensor-Enabled RFID Systems Hao Yue, Student Member, IEEE, Chi Zhang, Member, IEEE, Miao Pan,

More information

Joined Q-ary Tree Anti-Collision for Massive Tag Movement Distribution

Joined Q-ary Tree Anti-Collision for Massive Tag Movement Distribution Joined Q-ary Tree Anti-Collision for Massive Tag Movement Distribution Author Pupunwiwat, Prapassara, Stantic, Bela Published 2010 Conference Title Proceedings of the Thirty-Third Australasian Computer

More information

Applying RFID Hand-Held Device for Factory Equipment Diagnosis

Applying RFID Hand-Held Device for Factory Equipment Diagnosis Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009 Applying RFID Hand-Held Device for Factory Equipment Diagnosis Kai-Ying Chen,

More information

Unified Q-ary Tree for RFID Tag Anti-Collision Resolution

Unified Q-ary Tree for RFID Tag Anti-Collision Resolution Unified Q-ary Tree for RFID Tag Anti-Collision Resolution Prapassara Pupunwiwat Bela Stantic Institute of Integrated and Intelligent Systems Griffith University, Gold Coast Campus Queensland 4222, Australia

More information

A Critical Survey and Analysis of RFID Anti-Collision Mechanisms

A Critical Survey and Analysis of RFID Anti-Collision Mechanisms ACCEPTED FROM OPEN CALL A Critical Survey and Analysis of RFID Anti-Collision Mechanisms Lei Zhu and Tak-Shing Peter Yum, The Chinese University of Hong Kong ABSTRACT The anti-collision mechanism is an

More information

The RFID Story. Sanjay Sarma Dean of Digital Learning, Professor of Mechanical Engineering. The Internet of Things: Roadmap to a Connected World

The RFID Story. Sanjay Sarma Dean of Digital Learning, Professor of Mechanical Engineering. The Internet of Things: Roadmap to a Connected World The RFID Story Sanjay Sarma Dean of Digital Learning, Professor of Mechanical Engineering Computer Science and Artificial Intelligence Laboratory (CSAIL) Massachusetts Institute of Technology CLASSIFYING

More information

A Critical Survey and Analysis of RFID Anti-Collision Mechanisms

A Critical Survey and Analysis of RFID Anti-Collision Mechanisms ACCEPTED FROM OPEN CALL A Critical Survey and Analysis of RFID Anti-Collision Mechanisms Lei Zhu and Tak-Shing Peter Yum, The Chinese University of Hong Kong ABSTRACT The anti-collision mechanism is an

More information

CHAPTER 6 A CDMA BASED ANTI-COLLISION DETERMINISTIC ALGORITHM FOR RFID TAGS

CHAPTER 6 A CDMA BASED ANTI-COLLISION DETERMINISTIC ALGORITHM FOR RFID TAGS CHAPTER 6 A CDMA BASED ANTI-COLLISION DETERMINISTIC ALGORITHM FOR RFID TAGS 6.1 INTRODUCTION Applications making use of Radio Frequency Identification (RFID) technology with large tag populations often

More information

Multi Token Based Location Sharing for Multi UAV Systems

Multi Token Based Location Sharing for Multi UAV Systems Multi Token Based Location Sharing for Multi UAV Systems Eyup Emre Ulku*, Ilker Bekmezci ASTIN, Computer Engineering Department, Istanbul, Turkey. Turkish Air Force Academy, Computer Engineering Department,

More information

An Improved Anti-collision Algorithm in RFID System

An Improved Anti-collision Algorithm in RFID System An Improved Anti-collision Algorithm in RFID System Leian Liu, Zhenhua Xie, Jingtian Xi, Shengli Lai School of Electronic and Information Engineering South China University of Technology Guangzhou, 510641,

More information

LOAD SHARING IN HETEROGENEOUS DISTRIBUTED SYSTEMS

LOAD SHARING IN HETEROGENEOUS DISTRIBUTED SYSTEMS Proceedings of the 2 Winter Simulation Conference E. Yücesan, C.-H. Chen, J. L. Snowdon, and J. M. Charnes, eds. LOAD SHARING IN HETEROGENEOUS DISTRIBUTED SYSTEMS Helen D. Karatza Department of Informatics

More information

Mobile Agent Code Updating and Authentication Protocol for Code-centric RFID System

Mobile Agent Code Updating and Authentication Protocol for Code-centric RFID System Mobile Agent Code Updating and Authentication Protocol for Code-centric RFID System 1 Liang Yan, 2 Hongbo Guo, 3 Min Chen, 1 Chunming Rong, 2 Victor Leung 1 Department of Electrical Engineering and Computer

More information

Extending Birthday Paradox Theory to Estimate the Number of Tags in RFID Systems

Extending Birthday Paradox Theory to Estimate the Number of Tags in RFID Systems Extending Birthday Paradox Theory to Estimate the Number of Tags in RFID Systems Masoud Shakiba 1,2 *, Mandeep Jit Singh 1, Elankovan Sundararajan 2, Azam Zavvari 1,2, Mohammad Tariqul Islam 1 1 Department

More information

A Railway Warehouse Information Acquisition System Based on Passive RFID Tag

A Railway Warehouse Information Acquisition System Based on Passive RFID Tag A Railway Warehouse Information Acquisition System Based on Passive RFID Tag Weidong Li 1, Jinyu Xu 1*, Wa Niu 2 1. Dalian Jiaotong University, China. 2.Central University of Finance and Economics, China.

More information

Research on Design and Implementation of Intelligent Warehouse Management System in Z Company

Research on Design and Implementation of Intelligent Warehouse Management System in Z Company International Journal of Science and Qualitative Analysis 2016; 2(3): 30-35 http://www.sciencepublishinggroup.com/j/ijsqa doi: 10.11648/j.ijsqa.20160203.12 ISSN: 2469-8156 (Print); ISSN: 2469-8164 (Online)

More information

Quality Monitoring Traceability Platform of Agriculture products Cold Chain Logistics Based on the Internet of Things

Quality Monitoring Traceability Platform of Agriculture products Cold Chain Logistics Based on the Internet of Things 517 A publication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Editors: Peiyu Ren, Yancang Li, Huiping Song Copyright 2015, AIDIC Servizi S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The

More information

In-Network Phased Filtering Mechanism for a Large-Scale RFID Inventory Application

In-Network Phased Filtering Mechanism for a Large-Scale RFID Inventory Application In-Network Phased Filtering Mechanism for a Large-Scale RFID Inventory Application Wonil Choi, Nonmember, and Myong-Soon Park, Member, IEEE ㅔ Abstract--RFID technology is one of automatic identification

More information

Further Discussing About the Conflict Problem of RFID Tag

Further Discussing About the Conflict Problem of RFID Tag International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(1): 6-10 Published online January 21, 2016 (http://www.aascit.org/journal/wcnmc) ISSN: 2381-1137 (Print); ISSN:

More information

Campus Tracking System Based On IoT Yibiao Pi

Campus Tracking System Based On IoT Yibiao Pi Applied Mechanics and Materials Online: 2014-08-11 ISS: 1662-7482, Vols. 599-601, pp 1416-1419 doi:10.4028/www.scientific.net/amm.599-601.1416 2014 Trans Tech Publications, Switzerland Campus Tracking

More information

DESIGN, OPERATION AND ANTI-COLLISION PROCEDURE OF DATA TRANSFER OF INTELLIGENT LOAD UNITS

DESIGN, OPERATION AND ANTI-COLLISION PROCEDURE OF DATA TRANSFER OF INTELLIGENT LOAD UNITS Advanced Logistic Systems Vol. 6. No. 1. (2012) pp. 190-200. DESIGN, OPERATION AND ANTI-COLLISION PROCEDURE OF DATA TRANSFER OF INTELLIGENT LOAD UNITS ISTVÁN SZENTMIKLÓSI 1, BÉLA ILLÉS 2 Abstract: The

More information

Applications of Fast-Moving RFID Tags in High-speed Railway Systems

Applications of Fast-Moving RFID Tags in High-speed Railway Systems Applications of Fast-Moving RFID Tags in High-speed Railway Systems Xiaoqiang Zhang and Manos Tentzeris Xiaoqiang Zhang is with the School of Logistics, Southwest Jiaotong University, Sichuan, China and

More information

Research Article Identifying the Missing Tags in Categorized RFID Systems

Research Article Identifying the Missing Tags in Categorized RFID Systems Hindawi Publishing Corporation International Journal of Distributed Sensor Networks Volume 214, Article ID 582951, 12 pages http://dx.doi.org/1.1155/214/582951 Research Article Identifying the Missing

More information

Laboratory Management Based on Internet of Things. Jianming Huang

Laboratory Management Based on Internet of Things. Jianming Huang Advanced Materials Research Online: 2013-06-27 ISSN: 1662-8985, Vol. 711, pp 665-669 doi:10.4028/www.scientific.net/amr.711.665 2013 Trans Tech Publications, Switzerland Laboratory Management Based on

More information

AUTHENTICATION OF THE WIRELESS RFID SYSTEM USING SECURITY PROTOCOL

AUTHENTICATION OF THE WIRELESS RFID SYSTEM USING SECURITY PROTOCOL AUTHENTICATION OF THE WIRELESS RFID SYSTEM USING SECURITY PROTOCOL D.P.Anusuya,Asst.Professor, Karpapga Vinayaga College of Engineering and Technology, Madhrandagam,Chennai,India. anu.krish1988@gmail.com

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 21 BioTechnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(21), 2014 [12736-12740] Research on informational management of laboratory

More information

Missing Tag Identification in Blocker-enabled RFID Systems

Missing Tag Identification in Blocker-enabled RFID Systems Missing Tag Identification in locker-enabled RFID Systems Xia Wang, Jia Liu, Feng Zhu, Yanyan Wang and Lijun Chen State Key Laboratory for Novel Software Technology, Nanjing University, China College of

More information

Low-cost RFID identification variation

Low-cost RFID identification variation Edith Cowan University Research Online ECU Publications Pre. 2011 2006 Low-cost RFID identification variation Koong Lin Tzu-Chang Yeh Yao-Yuan Liu Chad Lin Edith Cowan University 10.2991/jcis.2006.14 Originally

More information

Secure EPCglobal Class-1 Gen-2 RFID System Against Security and Privacy Problems

Secure EPCglobal Class-1 Gen-2 RFID System Against Security and Privacy Problems Secure EPCglobal Class-1 Gen-2 RFID System Against Security and Privacy Problems Kyoung Hyun Kim 1, Eun Young Choi 2,SuMiLee 3, and Dong Hoon Lee 4 Center for Information Security Technologies(CIST), Korea

More information

A Logistics Monitoring Technology Based on Wireless Sensors

A Logistics Monitoring Technology Based on Wireless Sensors A Logistics Monitoring Technology Based on Wireless Sensors https://doi.org/10.3991/ijoe.v13i07.7375 Hongxia Sun Zhengzhou Shengda University of Economics, Business & Management, Zhengzhou, China sunhongxia421@163.com

More information

RFID Project Technical Report

RFID Project Technical Report RFID Project Technical Report Bernard Ghanem 1. Introduction The use of Radio Frequency Identification (RFID) technology extends historically to the 1970 s, when the first commercial products emerged.

More information

Changes of Clothing Distribution Logistics Management RFID Technology

Changes of Clothing Distribution Logistics Management RFID Technology Science Journal of Business and Management 2016; 4(3): 72-76 http://www.sciencepublishinggroup.com/j/sjbm doi: 10.11648/j.sjbm.20160403.12 ISSN: 2331-0626 (Print); ISSN: 2331-0634 (Online) Changes of Clothing

More information

THE APPLICATION OF RADIO FREQUENCY IDENTIFICATION (RFID) IN SPEEDING UP THE FLOW OF MATERIALS IN AN INDUSTRIAL MANUFACTURING PROCESS

THE APPLICATION OF RADIO FREQUENCY IDENTIFICATION (RFID) IN SPEEDING UP THE FLOW OF MATERIALS IN AN INDUSTRIAL MANUFACTURING PROCESS THE APPLICATION OF RADIO FREQUENCY IDENTIFICATION (RFID) IN SPEEDING UP THE FLOW OF MATERIALS IN AN INDUSTRIAL MANUFACTURING PROCESS B.N. GATSHENI AND F. AGHDASI ABSTRACT: RFID can work in conjunction

More information

Application of Internet of Things Management in Electric Power Industry

Application of Internet of Things Management in Electric Power Industry Application of Internet of Things Management in Electric Power Industry Yong Qian1, a, Xinyu Wang1, Hua Guo1, Xuanchen Long1, Xiaoguang Chi1 1State Grid Tieling Electric Power Supply Company, Tieling,

More information

SMART ATTENDANCE AND AUTO NOTIFICATION SYSTEM USING RFID

SMART ATTENDANCE AND AUTO NOTIFICATION SYSTEM USING RFID e-issn 2455 1392 Volume 2 Issue 7, July 2016 pp. 190 194 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com SMART ATTENDANCE AND AUTO NOTIFICATION SYSTEM USING RFID Vikas Kumar Ranjan 1, Shri

More information

RSAA: Reliable Splitting Aware ALOHA to Capture Passing Tags

RSAA: Reliable Splitting Aware ALOHA to Capture Passing Tags : Reliable Splitting Aware ALOHA to Capture Passing Tags Lei Kang, Chen Qian and Lionel Ni Hong Kong University of Science and Technology University of Texas at Austin {kang,ni}@cse.ust.hk,cqian@cs.utexas.edu

More information

Design of intelligent logistics information platform based on wireless sensor RFID technology. Hai Ye 1, a

Design of intelligent logistics information platform based on wireless sensor RFID technology. Hai Ye 1, a 5th International Conference on Education, Management, Information and Medicine (EMIM 2015) Design of intelligent logistics information platform based on wireless sensor RFID technology Hai Ye 1, a 1 Qingyuan

More information

IEEE RFID 2012 Tutorials and Workshops

IEEE RFID 2012 Tutorials and Workshops IEEE RFID 2012 Tutorials and Workshops Tutorial: Advanced UHF RFID Tag Antenna Design (April 3: 8:30 am 12:00 pm) Organizer: Gaetano Marrocco (University of Roma Tor Vergata) Things equipped with electronic

More information

A GATE SENSOR FOR CONSTRUCTION LOGISTICS

A GATE SENSOR FOR CONSTRUCTION LOGISTICS A GATE SENSOR FOR CONSTRUCTION LOGISTICS Woo-Jae Lee plum_80@naver.com Soon-Wook Kwon swkwon@skku.edu Cheolho Choi Doalltech Sae-myung B/D 770-11, Yeoksam-Dong, Gangnam-Gu, Seoul, Korea 135-928 choi@doalltech.com

More information

Efficient Pinpointing of Misplaced Tags in Large RFID Systems

Efficient Pinpointing of Misplaced Tags in Large RFID Systems th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks Efficient Pinpointing of Misplaced Tags in Large RFID Systems Kai Bu, Bin Xiao, Qingjun Xiao, Shigang

More information

Passengers Rights Boarding pass using Radio frequency identification

Passengers Rights Boarding pass using Radio frequency identification Passengers Rights Boarding pass using Radio frequency identification SAUTY Aurélien, Institut de Formation Universitaire et de Recherche du Transport Aérien. aurelien_sauty@yahoo.com The reason of this

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 11 Radio Frequency Identification Objectives Define Radio Frequency Identification (RFID) Explain the need for RFID and how RFID works List the components

More information

Design and implementation of energy management system software in green building

Design and implementation of energy management system software in green building Acta Technica 62 No. 1A/2017, 495 506 c 2017 Institute of Thermomechanics CAS, v.v.i. Design and implementation of energy management system software in green building Hongyan Zhang 1, Zhiping Zhou 1 Abstract.

More information

RFID Based Electricity Billing and Cut-Off System for Energy Through GSM

RFID Based Electricity Billing and Cut-Off System for Energy Through GSM RESEARCH ARTICLE OPEN ACCESS RFID Based Electricity Billing and Cut-Off System for Energy Through GSM 1 K.Jansi lakshmi, 2 N.Swetha soundarya, 3 D.Sasi kala, 4 B.Venkatarami reddy, 5 A.Akhil Assistant

More information

REMOTE CONTROL SYSTEM FOR GREENHOUSE ENVIRONMENT USING MOBILE DEVICES

REMOTE CONTROL SYSTEM FOR GREENHOUSE ENVIRONMENT USING MOBILE DEVICES REMOTE CONTROL SYSTEM FOR GREENHOUSE ENVIRONMENT USING MOBILE DEVICES Sin-Woo Kang, Sun-Ok Chung, Ki-Dae Kim Dept. of Biosystems Machinery Engineering Chungnam National University, Daejeon, Republic of

More information

A Centralized and Aligned Scheduler for passive RFID Dense Reader Environments working under EPCglobal standard

A Centralized and Aligned Scheduler for passive RFID Dense Reader Environments working under EPCglobal standard A Centralized and Aligned Scheduler for passive RFID Dense Reader Environments working under EPCglobal standard M. Victoria Bueno-Delgado, Pablo Pavon-Marino Communications and Technology Information Department,

More information

Security issues in RFID Middleware Systems: Proposed EPC implementation for network layer attacks

Security issues in RFID Middleware Systems: Proposed EPC implementation for network layer attacks Security issues in RFID Middleware Systems: Proposed EPC implementation for network layer attacks Arif Sari School of Applied Sciences, Department of Management Information Systems, European University

More information

A Novel and Efficient Anti-Collision Protocol for RFID Tag Identification

A Novel and Efficient Anti-Collision Protocol for RFID Tag Identification JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, VOL. 12, NO. 4, DECEMBER 216 173 A Novel and Efficient Anti-Collision for RFID Tag Identification Adarsh Kumar, Krishna Gopal, and Alok Aggarwal Abstract

More information

Keywords RFID, field management, bulk material inventory, nuclear plant, area subdivision.

Keywords RFID, field management, bulk material inventory, nuclear plant, area subdivision. International Journal of Innovative Research in Engineering & Management (IJIREM) ISSN: 2350-0557, Volume-4, Issue-1, January-2017 DOI: 10.21276/ijirem.2017.4.1.4 Strategies for Field Management Using

More information

IEEE TRANSACTION ON PARALLEL AND DISTRIBUTED SYSTEM 1. On the Design and Deployment of RFID Assisted Navigation Systems for VANETs

IEEE TRANSACTION ON PARALLEL AND DISTRIBUTED SYSTEM 1. On the Design and Deployment of RFID Assisted Navigation Systems for VANETs IEEE TRANSACTION ON PARALLEL AND DISTRIBUTED SYSTEM On the Design and Deployment of RFID Assisted Navigation Systems for VANETs Wei Cheng, Member, IEEE, Xiuzhen Cheng, Member, IEEE, Min Song, Senior Member,

More information

Integration of RFID and WSN for Supply Chain Intelligence System

Integration of RFID and WSN for Supply Chain Intelligence System Integration of RFID and WSN for Supply Chain Intelligence System Shiva Mirshahi 1, Sener Uysal 2 Dept. of Electrical and Electronic Engineering Eastern Mediterranean University Famagusta, North Cyprus

More information

Automatic Neighboring BS List Generation Scheme for Femtocell Network

Automatic Neighboring BS List Generation Scheme for Femtocell Network Automatic Neighboring BS List Generation Scheme for Femtocell Network Kwanghun Han, Seungmin Woo, Duho Kang, and Sunghyun Choi School of Electrical Engineering and INMC, Seoul National University, Seoul,

More information

System Virtualization and Efficient ID Transmission Method for RFID Tag Infrastructure Network

System Virtualization and Efficient ID Transmission Method for RFID Tag Infrastructure Network System Virtualization and Efficient ID Transmission Method for RFID Tag Infrastructure Network Shin-ichi Kuribayashi 1 and Yasunori Osana 1 1 Department of Computer and Information Science, Seikei University,

More information

Missing Tag Identification in Open RFID Systems

Missing Tag Identification in Open RFID Systems Missing Tag Identification in Open RFID Systems Yanyan Wang, Jia Liu, Xia Wang, Feng Zhu, and Lijun Chen State Key Laboratory for Novel Software Technology, Nanjing University, China Email: wangyanyan@smail.nju.edu.cn,

More information

IMPLEMENTATION FOR ENHANCING SECURITY OF RFID CARD

IMPLEMENTATION FOR ENHANCING SECURITY OF RFID CARD IMPLEMENTATION FOR ENHANCING SECURITY OF RFID CARD Shilpa S. Badhiye1,Prof.Rupali S. Khule2 1 student, Electronics and telecommunication Department, MCOERC, Maharashtra, India 2 Professor, Electronics

More information

RFID Technical Tutorial and Threat Modeling. Presented by: Neeraj Chaudhry University of Arkansas

RFID Technical Tutorial and Threat Modeling. Presented by: Neeraj Chaudhry University of Arkansas RFID Technical Tutorial and Threat Modeling Presented by: Neeraj Chaudhry University of Arkansas 1 RFID Tutorial Outline Introduction RFID System Tags Readers Data link layer Modulation Encoding Anti-Collision

More information

Investigation of the construction of intelligent logistics system from traditional logistics model based on wireless network technology

Investigation of the construction of intelligent logistics system from traditional logistics model based on wireless network technology Ouyang et al. EURASIP Journal on Wireless Communications and Networking (2019) 2019:20 https://doi.org/10.1186/s13638-018-1334-8 RESEARCH Investigation of the construction of intelligent logistics system

More information

Privacy Management for Medical Service Application using Mobile Phone collaborated with RFID Reader

Privacy Management for Medical Service Application using Mobile Phone collaborated with RFID Reader Privacy Management for Medical Service Application using Mobile Phone collaborated with RFID Reader Byunggil Lee and Howon Kim Electronics and Telecommunications Research Institute bglee@etri.re.kr Abstract

More information

Production Management Modelling Based on MAS

Production Management Modelling Based on MAS International Journal of Automation and Computing 7(3), August 2010, 336-341 DOI: 10.1007/s11633-010-0512-x Production Management Modelling Based on MAS Li He 1 Zheng-Hao Wang 2 Ke-Long Zhang 3 1 School

More information

A Design and Application of RFID Gantry Quan Gang Wen 1,a Yongbing Xu 2,b

A Design and Application of RFID Gantry Quan Gang Wen 1,a Yongbing Xu 2,b International Power, Electronics and Materials Engineering Conference (IPEMEC 015) A Design and Application of RFID Gantry Quan Gang Wen 1,a Yongbing Xu,b 1, Computer Department Zhuhai College of Jilin

More information

Analyzing CRFIDs in Simulation Ting-You Wang and Ting-Yen Wang Advised by Michael Buettner

Analyzing CRFIDs in Simulation Ting-You Wang and Ting-Yen Wang Advised by Michael Buettner Analyzing CRFIDs in Simulation Ting-You Wang and Ting-Yen Wang Advised by Michael Buettner Background RFIDs have almost become ubiquitous such that one can find RFID readers installed in almost any location.

More information

SenseAnywhere introduces the AiroSensor. A lifetime wireless datalogger.

SenseAnywhere introduces the AiroSensor. A lifetime wireless datalogger. SenseAnywhere introduces the AiroSensor. A lifetime wireless datalogger. Introduction SenseAnywhere s AiroSensor leads a new generation of wireless, ultra low-power data loggers that connect to the Cloud.

More information

Call for Papers. August 16-17, Melbourne Park Function Centre Melbourne, Australia. Australian. Submit your abstract by March 28

Call for Papers. August 16-17, Melbourne Park Function Centre Melbourne, Australia. Australian. Submit your abstract by March 28 Call for Papers August 16-17, 2016 Submit your abstract by March 28 Melbourne Park Function Centre Melbourne, Australia www.protectionsymposium.com.au Overview The Protection Symposium (APS) is a leading

More information

This is the accepted version of a paper presented at IEEE International Symposium on Communications, Control, and Signal Processing,May 21-24, 2014.

This is the accepted version of a paper presented at IEEE International Symposium on Communications, Control, and Signal Processing,May 21-24, 2014. http://www.diva-portal.org Postprint This is the accepted version of a paper presented at IEEE International Symposium on Communications, Control, and Signal Processing,May 21-24, 2014. Citation for the

More information

Application of Decision Trees in Mining High-Value Credit Card Customers

Application of Decision Trees in Mining High-Value Credit Card Customers Application of Decision Trees in Mining High-Value Credit Card Customers Jian Wang Bo Yuan Wenhuang Liu Graduate School at Shenzhen, Tsinghua University, Shenzhen 8, P.R. China E-mail: gregret24@gmail.com,

More information

Jiman Hong Ph.D./Professor

Jiman Hong Ph.D./Professor Jiman Hong Ph.D./Professor Director, Embedded Operating System Research Institute E-mail : gman@daisy.kw.ac.kr HomePage : http://eoslab.kw.ac.kr/ gman/ Work Address School of Computer Science and Engineering

More information

Introduction to RFID

Introduction to RFID Introduction to RFID Hu Hai Year 1 Mphil Student 2004. 09. 11 1. What is RFID? Radio frequency identification, or RFID, is a generic term for that use radio waves to automatically identify people or objects.

More information

Design of Transmission Scheme for Radiation Detection &Management Information

Design of Transmission Scheme for Radiation Detection &Management Information 17th World Conference on Nondestructive Testing, 25-28 Oct 2008, Shanghai, China Design of Transmission Scheme for Radiation Detection &Management Information Jinping LIU Chao LIU Detection Center, No.8

More information

Construction of a Mega Disaster Crisis Management System

Construction of a Mega Disaster Crisis Management System Construction of a Mega Disaster Crisis Management System Kazuhiro Takahagi 1, Tomoyuki Ishida 1, Akira Sakuraba 2, Kaoru Sugita 3, Noriki Uchida 3, and Yoshitaka Shibata 2 1 Ibaraki University, Hitachi,

More information

2017 European Internet of Things Product Leadership Award

2017 European Internet of Things Product Leadership Award 2017 European Internet of Things Product Leadership Award Contents Background and Company Performance... 3 Industry Challenges... 3 Product Family Attributes and Business Impact of Wirepas... 4 Conclusion...

More information

A Machine Setup Model for TFT-LCD Cell Back-End Process

A Machine Setup Model for TFT-LCD Cell Back-End Process A Machine Setup Model for TFT-LCD Cell Back-End Process Y.-C. Chang 1, P.-S. Chen 2, P.-C. Chen 1 1 Department of Industrial Engineering and Management, National Chiao Tung University, Hsinchu, Taiwan

More information

A Quality Evaluation Technique of RFID Middleware in Ubiquitous Computing

A Quality Evaluation Technique of RFID Middleware in Ubiquitous Computing A Quality Evaluation Technique of RFID Middleware in Ubiquitous Computing Gi oug, Oh, and Doo yeon, Kim and Sang il, Kim and Sung yul, Rhew giug@korea.com kimdoo@moe.go.kr hava67@selab.ssu.ac.kr syrhew@comp.ssu.ac.kr

More information

Design of logistics tracking and monitoring system based on internet of things

Design of logistics tracking and monitoring system based on internet of things Acta Technica 62 No. 2A/2017, 75 82 c 2017 Institute of Thermomechanics CAS, v.v.i. Design of logistics tracking and monitoring system based on internet of things Qiang Yu 1 Abstract. To improve the information

More information

Cloud Load Balancing Based on ACO Algorithm

Cloud Load Balancing Based on ACO Algorithm Cloud Load Balancing Based on ACO Algorithm Avtar Singh, Kamlesh Dutta, Himanshu Gupta Department of Computer Science, National Institute of Technology,Hamirpur, HP, India Department of Computer Science,

More information

A Hybrid Scheduling Approach for Scalable Heterogeneous Hadoop Systems

A Hybrid Scheduling Approach for Scalable Heterogeneous Hadoop Systems A Hybrid Scheduling Approach for Scalable Heterogeneous Hadoop Systems Aysan Rasooli Department of Computing and Software McMaster University Hamilton, Canada Email: rasooa@mcmaster.ca Douglas G. Down

More information

LOGISTICAL ASPECTS OF THE SOFTWARE TESTING PROCESS

LOGISTICAL ASPECTS OF THE SOFTWARE TESTING PROCESS LOGISTICAL ASPECTS OF THE SOFTWARE TESTING PROCESS Kazimierz Worwa* * Faculty of Cybernetics, Military University of Technology, Warsaw, 00-908, Poland, Email: kazimierz.worwa@wat.edu.pl Abstract The purpose

More information

A Simulation-based Multi-level Redundancy Allocation for a Multi-level System

A Simulation-based Multi-level Redundancy Allocation for a Multi-level System International Journal of Performability Engineering Vol., No. 4, July 205, pp. 357-367. RAMS Consultants Printed in India A Simulation-based Multi-level Redundancy Allocation for a Multi-level System YOUNG

More information

International Journal of Informative & Futuristic Research ISSN (Online):

International Journal of Informative & Futuristic Research ISSN (Online): Reviewed Paper Volume 2 Issue 7 March 2015 International Journal of Informative & Futuristic Research Accomplished Billing Cart Based on ARM7 Paper ID IJIFR/ V2/ E7/ 028 Page No. 2082-2087 Subject Area

More information

Reassignment Scheme of an RFID Tag s Key for Owner Transfer

Reassignment Scheme of an RFID Tag s Key for Owner Transfer Reassignment Scheme of an RFID Tag s Key for Owner Transfer Junichiro Saito 1, Kenji Imamoto 1, and Kouichi Sakurai 2 1 Graduate School of Information Science and Electrical Engineering, The Department

More information

Research on Operation Mode of Intelligent Logistics Base on Fourth Party Logistics Platform

Research on Operation Mode of Intelligent Logistics Base on Fourth Party Logistics Platform Advanced Materials Research Online: 2013-01-11 ISSN: 1662-8985, Vols. 631-632, pp 1254-1259 doi:10.4028/www.scientific.net/amr.631-632.1254 2013 Trans Tech Publications, Switzerland Research on Operation

More information

Exploiting Dynamic Workload Variation in Low Energy Preemptive Task Scheduling

Exploiting Dynamic Workload Variation in Low Energy Preemptive Task Scheduling Exploiting Dynamic Workload Variation in Low Energy Preemptive Scheduling Xiaobo Sharon Department of Electrical and Electronic Engineering Department of Computer Science and Engineering Hong Kong University

More information

CHAPTER 1 INTRODUCTION This chapter briefly discuss on the overview of this research. It contains five sections. The first section is introduction; follow by the problem statement. Next are the objectives

More information

RFID Adaptor for Detecting and Handling Data/ Events in Internet of Things

RFID Adaptor for Detecting and Handling Data/ Events in Internet of Things , Vol 8(S5), 140 148, March 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 DOI: 10.17485/ijst/2015/v8iS5/62033 RFID Adaptor for Detecting and Handling Data/ Events in Internet of Things Ina Kim,

More information

LOGISTICS SECURITY MONITORING AND REAL-TIME TRACKING BASED ON RFID TECHNOLOGY DESIGN AND APPLICATION OF ELECTRONIC SEAL Yu Shao

LOGISTICS SECURITY MONITORING AND REAL-TIME TRACKING BASED ON RFID TECHNOLOGY DESIGN AND APPLICATION OF ELECTRONIC SEAL Yu Shao LOGISTICS SECURITY MONITORING AND REAL-TIME TRACKING BASED ON RFID TECHNOLOGY DESIGN AND APPLICATION OF ELECTRONIC SEAL Yu Shao Department of Computer Science, Ningbo Dahongying University, Ningbo, 315175,

More information