A novel algorithm L-NCD for redundant reader elimination in P2P-RFID network

With the development of radio frequency identification technology, radio frequency identification system has been deployed in different applications in a large scale. It needs a densely deployed reader environment to cover the work area, especially in radio frequency identification logistics and warehousing applications. If the distribution area and the number of readers are not optimized, and some of them will be redundant, which will reduce the efficiency of the whole radio frequency identification system. Researchers have proposed many algorithms and optimization techniques to solve the problem of redundant readers. In this paper, the authors propose a novel redundant reader elimination algorithm, namely, L-NCD, in P2P-RFID reader network, combined with layered eliminate optimization and neighboring coverage density. The simulation results demonstrate that the proposed algorithm eliminates more redundant readers than the other methods such as redundant-reader elimination under the same conditions.

[1]  Jin Wang,et al.  Method of Reduction the Redundant Reader Based on RFID Reader Communication Protocol , 2014 .

[2]  Shunzheng Yu,et al.  A fuzzy k-coverage approach for RFID network planning using plant growth simulation algorithm , 2014, J. Netw. Comput. Appl..

[3]  Daniel W. Engels,et al.  Colorwave: an anticollision algorithm for the reader collision problem , 2003, IEEE International Conference on Communications, 2003. ICC '03..

[4]  Chao-Tung Yang,et al.  A Layered Optimization Approach for Redundant Reader Elimination in Wireless RFID Networks , 2007 .

[5]  Huang Yihua,et al.  A middleware-based approach for redundant reader elimination , 2011, The 5th International Conference on New Trends in Information Science and Service Science.

[6]  Zhiying Yang,et al.  A Count Based Algorithm for Redundant Reader Elimination in RFID Application System , 2013, 2013 Third International Conference on Intelligent System Design and Engineering Applications.

[7]  Minos N. Garofalakis,et al.  Adaptive cleaning for RFID data streams , 2006, VLDB.

[8]  Ananth Grama,et al.  Redundant reader elimination in RFID systems , 2005, 2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005..

[9]  Kun-Ming Yu,et al.  A Density-Based Algorithm for Redundant Reader Elimination in a RFID Network , 2008, 2008 Second International Conference on Future Generation Communication and Networking.

[10]  Lida Xu,et al.  Data Cleaning for RFID and WSN Integration , 2014, IEEE Transactions on Industrial Informatics.

[11]  Jiming Chen,et al.  Dynamic Authentication with Sensory Information for the Access Control Systems , 2014, IEEE Transactions on Parallel and Distributed Systems.

[12]  Houn-Gee Chen,et al.  Consumer's acceptance of high-tech products: the case of RFID credit cards in Taiwan , 2014 .

[13]  Ziming Guo,et al.  A Dynamic Bit Arbitration Anti-Collision Algorithm for RFID System , 2007, 2007 International Workshop on Anti-Counterfeiting, Security and Identification (ASID).

[14]  Hui Sheng,et al.  An Improved Anti-Collision Algorithm in RFID System , 2013 .

[15]  Xu Huang,et al.  Efficient Dynamic Framed Slotted ALOHA for RFID Passive Tags , 2007, The 9th International Conference on Advanced Communication Technology.

[16]  Shivani Kundra,et al.  The study of recent technologies used in E-passport system , 2014, 2014 IEEE Global Humanitarian Technology Conference - South Asia Satellite (GHTC-SAS).

[17]  Hairulnizam Mahdin,et al.  Redundant readers elimination in dense radio frequency identification network , 2015 .

[18]  Ruchuan Wang,et al.  A Novel RFID Reader System Framework based on Peer-to-Peer Network , 2011 .

[19]  Jae-Hyun Kim,et al.  Dynamic framed slotted ALOHA algorithms using fast tag estimation method for RFID system , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[20]  Ngoc-Tu Nguyen,et al.  A Maximum-Weight-Independent-Set-Based Algorithm for Reader-Coverage Collision Avoidance Arrangement in RFID Networks , 2016, IEEE Sensors Journal.

[21]  Daniel W. Engels,et al.  The reader collision problem , 2002, IEEE International Conference on Systems, Man and Cybernetics.

[22]  Gustavo Alonso,et al.  A Pipelined Framework for Online Cleaning of Sensor Data Streams , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[23]  Nazish Irfan,et al.  Efficient Approach for Redundant Reader Elimination in Large-Scale RFID Networks , 2010, 2010 First International Conference on Integrated Intelligent Computing.

[24]  Yang Li,et al.  SA-PSO based optimizing reader deployment in large-scale RFID Systems , 2015, J. Netw. Comput. Appl..

[25]  H. T. Mouftah,et al.  Decentralized RFID Coverage Algorithms With Applications for the Reader Collisions Avoidance Problem , 2016, IEEE Transactions on Emerging Topics in Computing.

[26]  Jun-Seok Park,et al.  Effects of reader interference on the RFID interrogation range , 2007, 2007 European Microwave Conference.

[27]  James C. Chen,et al.  Supply chain management with lean production and RFID application: A case study , 2013, Expert Syst. Appl..

[28]  Ari Juels,et al.  Squealing Euros: Privacy Protection in RFID-Enabled Banknotes , 2003, Financial Cryptography.

[29]  Shengli Lai,et al.  ALOHA-Based Anti-Collision Algorithms Used in RFID System , 2006, 2006 International Conference on Wireless Communications, Networking and Mobile Computing.

[30]  Manish Sharma,et al.  Smart ration card using RFID and GSM technique , 2014, 2014 5th International Conference - Confluence The Next Generation Information Technology Summit (Confluence).

[31]  Meie Shen,et al.  Optimizing RFID Network Planning by Using a Particle Swarm Optimization Algorithm With Redundant Reader Elimination , 2012, IEEE Transactions on Industrial Informatics.

[32]  Chae-Woo Lee,et al.  An enhanced dynamic framed slotted ALOHA algorithm for RFID tag identification , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[33]  Ching-Hsien Hsu,et al.  An Overlap Aware Technique for Redundant Reader Elimination , 2012, 2012 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing.

[34]  Osama Moselhi,et al.  RFID indoor location identification for construction projects , 2012 .