Fast Anti-Collision Algorithms in RFID Systems

Tag anti-collision for RFID system is a significant issue for fast tag identification. This paper presents two novel fast tag anti-collision algorithms called DJ (<i>detection</i> <i>and</i> <i>jump</i>) and EDJ (<i>extended</i> <i>detection</i> <i>and</i> <i>jump</i>) algorithm, which split the tag reading procedure into two steps including <i>collision</i> <i>detection</i> <i>and</i> <i>jump</i> <i>reading</i>. The proposed new algorithms highly improve the tag reading efficiency comparing to the popular <i>Q-algorithm</i> as discussed in the EPC (electronic product code) international standard. Our simulation evaluation shows that the proposed <i>DJ</i> and <i>EDJ</i> algorithms outperform the <i>Q-algorithm</i> in both identification delay and power consumption.

[1]  Zhensheng Zhang,et al.  Routing in intermittently connected mobile ad hoc networks and delay tolerant networks: overview and challenges , 2006, IEEE Communications Surveys & Tutorials.

[2]  Paolo Costa,et al.  Semi-Probabilistic Content-Based Publish-Subscribe , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[3]  Feng Zhou,et al.  Evaluating and optimizing power consumption of anti-collision protocols for applications in RFID systems , 2004, Proceedings of the 2004 International Symposium on Low Power Electronics and Design (IEEE Cat. No.04TH8758).

[4]  Marco Conti,et al.  Opportunistic networking: data forwarding in disconnected mobile ad hoc networks , 2006, IEEE Communications Magazine.

[5]  Leonard Kleinrock,et al.  Packet Switching in a Multiaccess Broadcast Channel: Dynamic Control Procedures , 1975, IEEE Trans. Commun..

[6]  M. Jacomet,et al.  Contactless Identification Device With Anticollision Algorithm , 1999 .

[7]  Hans-Arno Jacobsen,et al.  Content-based routing in mobile ad hoc networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[8]  Roberto Beraldi,et al.  Content-based routing in highly dynamic mobile ad hoc networks , 2005, Int. J. Pervasive Comput. Commun..

[9]  Kai-Yeung Siu,et al.  Efficient memoryless protocol for tag identification (extended abstract) , 2000, DIALM '00.

[10]  D. R. Hush,et al.  Analysis of tree algorithms for RFID arbitration , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).

[11]  Daniel W. Engels,et al.  Radio Frequency Identification and the Electronic Product Code , 2001, IEEE Micro.

[12]  John Capetanakis,et al.  Tree algorithms for packet broadcast channels , 1979, IEEE Trans. Inf. Theory.

[13]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[14]  Bob Metcalfe,et al.  Steady-state analysis of a slotted and controlled Aloha system with blocking , 1975, CCRV.

[15]  Jia Zhai,et al.  An Anti-collision Algorithm Using Two-Functioned Estimation for RFID Tags , 2005, ICCSA.

[16]  Harald Vogt,et al.  Multiple object identification with passive RFID tags , 2002, IEEE International Conference on Systems, Man and Cybernetics.

[17]  Vinny Cahill,et al.  STEAM: event-based middleware for wireless ad hoc networks , 2002, Proceedings 22nd International Conference on Distributed Computing Systems Workshops.