Академический Документы
Профессиональный Документы
Культура Документы
RFID
Chun-Fu Lin
Agenda
Taxonomy of tag collision protocols
Bi-slotted tree based anti-collision protocols
Adaptive binary splitting
I-code
Tag collision Reader collision
Probability-based Centralized
Deterministic-based (Prefix-based) Distributed
RFID research topics
Hardware
circuit, antenna design, etc.
Collision
Reader collision
Tag collision
Security & privacy
Application
CSI/CTPAT/WCO SAFE
Supply chain management, medical care, etc.
Taxonomy of tag anti-collision protocols
by Dong-Her Shih et. al., published in Computer Communications, 2006
SDMA (Space Division
Multiple Access)
Reuse a certain resource,
such as channel capacity in
spatially separated area.
Reduce the reading range
of readers and forms as
an array in space.
Electronically controlled
directional antenna
Various tags can be
distinguished by their
angular positions.
FDMA (Frequency
Division Multiple
Access)
Several transmission
channels on various
carrier frequencies are
simultaneously
available.
Tags respond on one
of several frequencies.
CDMA (Code Division Multiple Access)
Too complicate and too computationally
intense for RFID tags as well
TDMA (Time Division Multiple Access)
The largest group of RFID anti-collision protocols
Tag driven (tag talk first, TTF)
Tag transmits as it is ready
Aloha
SuperTag
Tags keep quiet and retransmit until reader acknowledges
Reader driven (reader talk first, RTF)
Polling, splitting, I-code, contactless
Polling
Reader must have the complete knowledge
(database) of tags
Reader interrogates the RFID tags by polling whose
serial number starts with a 1 in the first position?
Those tags meet this test reply yes while others
remain
Slow, inflexible
Splitting method
Tree algorithm
Based on binary search tree algorithm
Each collided tag generates a random number by
flipping an unbiased B-sided coin
B = 2, each collided tag would generate a number 0
or 1
The reader always sends a feedback informing the
tags whether 0 packet, 1 packet, or more than 1
packet is transmitted in the previous slot.
Each tag needs to keep track of its position in the
binary tree according to the readers feedback
R set responds first
L: set generates 1
R: set generates 0
S: single reply
Z: zero reply
C: collision
Query Tree
Prefix based
Tags match the prefix respond
I-Code
stochastic passive tag identification protocol
based on the framed-slotted Aloha concept.
Each tag transmits its information in a slot that
it chooses randomly based on the seed sent
by the reader.
The reader can vary the frame size N, the
actual size of a slot is chosen according to the
amount of data requested
Approximation of N
The reader detects the number of slots by a triple of numbers c =
(c0, c1, ck), where c0 stands for the number of slots in the read
cycle in which 0 tags have transmitted, c1 denotes the number of
slots in which a single tag transmitted and ck stands for the
number of slots in which multiple tags are transmitted.
Lower bound method
Tag collision
Reader collision
Ji-Hwan Choi, Dongwook Lee, Hyuckjae
Lee, Bi-slotted tree based anti-collision
protocols for fast tag identification in RFID
systems, IEEE communication letter,
December 2006
BSQTA
Reader sends n-1 bits prefix.
Tag that match the prefix will
Send ID from n+1 bit to end bit if its n-th bit is 0.
Wait for LENGTH-n bit duration if its n-th bit is 1.
If reader detects any collision occurs, it pushes the
prefixes (prefix+0, prefix+1) into stack and repeats the
exploring process.
BSCTTA (variation from BSQTA, tags send their
ID from n+1 bit to the time that ACK signal
received)
P:101
Reader
0 1 0
Tag1
1010010
0 1 0
Tag2
1011010 Wait |N-prefix| bits
Simulation
One reader
Number of tags increases from 2 to 65536
Tag IDs are randomly generated
ID length is not clear (believe to be 250)
Compared to QTA and CTTA
In another way of thinking
The tag collision problem can be referred to as a
distributed systems problem : how to reach a
consensus agreement (transmission slot) for every
distributed node (tag) without interaction to each other?
The constraints will be
Tag is unable to detect collision
Tag has limited or no calculation capability
Tag has limited or no memory space
Tags can be moved in and out dynamically
Reader has no information of the number of tags
There could be not just one reader
Jihoon Myung, Wonjun Lee, Jaideep
Srivastava, Adaptive binary splitting for
efficient RFID tag anti-collision, IEEE
communication letter, March 2006
Every tag maintains two local variables: Pc and Ac(i).
Pc, progressed-slot counter; number of tags recognized by the
reader so far.
Ac(i), allocated-slot counter, time slot for tag is transmission.
Reader sends feedback (readable, idle, collision) to tags
According to readers feedback, each tag decides its
transmission time of slot.
If feedback=readable, tag adds 1 to Pc.
If feedback=idle and Pc < Ac(i), tag decreases Ac(i) by 1
If feedback=collision and Pc < Ac(i), tag generates a
random number of 0 and 1 and adds to Ac(i).
Simulation results
Identification delay
Number of time slots required for all tags
Tag communication overhead
Average number of bits transmitted by a tag for identification
n: number of tags recognized in the last process
: number of staying tags (tsSr,iSr,i-1)
: number of arriving tags (taSr,i+1-Sr,i)
: number of leaving tags (tlSr,i-Sr,i+1)
w: given, w=/n, /n=/n=1-w
Binary tree protocol and query tree protocol are
compared
Sr,i: the set of all the tags recognized by reader r in the ith
Identification process
Stable for
static tags
Remaining arrangement
Tags reading as a Markov process
0 1 2 3 n
The matrix Q is used to compute a lower bound of the number of
reading steps necessary to identify all tags with a given probability.
S satisfies