Tweaked query tree algorithm to cope with capture effect and detection error in RFID systems

In this paper, we propose a new Query Tree-based identification algorithm, namely, Tweaked Query Tree (TQT), to cope with hidden or missing tags caused by both Capture Effect and Detection Error phenomena in RFID systems. The whole identification process is divided into several query cycles, where hidden tags in a cycle re-transmit in the first query of the next one. The average number of time slots to successfully detect one tag and the tag loss rate defined as the ratio between the number of missing tags and the total number of tags, are evaluated by computer simulations. Obtained results show that the proposed TQT much more effectively solves the hidden tags problem in comparison with conventional methods.

[1]  Ravikanth Pappu,et al.  An Optimal Q-Algorithm for the ISO 18000-6C RFID Protocol , 2009, IEEE Transactions on Automation Science and Engineering.

[2]  Jeong Geun Kim,et al.  A capture-aware access control method for enhanced RFID anti-collision performance , 2009, IEEE Communications Letters.

[3]  M. Jacomet,et al.  Contactless Identification Device With Anticollision Algorithm , 1999 .

[4]  Hideaki Sakai,et al.  Maximum Likelihood Approach for RFID Tag Cardinality Estimation under Capture Effect and Detection Errors , 2013, IEICE Trans. Commun..

[5]  Torben Larsen,et al.  Robust statistical methods for detection of missing RFID tags , 2011, IEEE Wireless Communications.

[6]  Yuan-Cheng Lai,et al.  General binary tree protocol for coping with the capture effect in RFID tag identification , 2010, IEEE Communications Letters.

[7]  Ivan Stojmenovic,et al.  RFID Systems: Research Trends and Challenges , 2011 .

[8]  D. R. Hush,et al.  Analysis of tree algorithms for RFID arbitration , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).

[9]  Wonjun Lee,et al.  Comparative Evaluation of Probabilistic and Deterministic Tag Anti-collision Protocols for RFID Networks , 2007, EUC Workshops.

[10]  Anh T. Pham,et al.  Tweaked binary tree algorithm to cope with capture effect and detection error in RFID systems , 2015, 2015 21st Asia-Pacific Conference on Communications (APCC).

[11]  Torben Larsen,et al.  Fast Capture—Recapture Approach for Mitigating the Problem of Missing RFID Tags , 2012, IEEE Transactions on Mobile Computing.

[12]  Bo Li,et al.  Efficient Anti-Collision Algorithm Utilizing the Capture Effect for ISO 18000-6C RFID Protocol , 2011, IEEE Communications Letters.

[13]  Roy H. Campbell,et al.  Using Generalized Query Tree to Cope with the Capture Effect in RFID Singulation , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.

[14]  Lei Zhu,et al.  The Optimal Reading Strategy for EPC Gen-2 RFID Anti-Collision Systems , 2010, IEEE Transactions on Communications.

[15]  Lawrence G. Roberts,et al.  ALOHA packet system with and without slots and capture , 1975, CCRV.

[16]  Javier Vales-Alonso,et al.  Analysis of the identification process in active RFID systems with Capture Effect , 2010 .

[17]  Wen-Tzu Chen,et al.  An Accurate Tag Estimate Method for Improving the Performance of an RFID Anticollision Algorithm Based on Dynamic Frame Length ALOHA , 2009, IEEE Transactions on Automation Science and Engineering.

[18]  Francesca Lonetti,et al.  Instant collision resolution for tag identification in RFID networks , 2007, Ad Hoc Networks.

[19]  Sozo Inoue,et al.  Privacy and Personal Information Protection in RFID Systems , 2017 .

[20]  A. Hussain,et al.  Software defined radio for RFID signal in Rayleigh fading channel , 2010, TENCON 2010 - 2010 IEEE Region 10 Conference.