Novel RFID anti-collision algorithm based on the Monte–Carlo query tree search

Tag collision is a pressing issue in radio frequency identification systems which significantly lowers the system performance if not mitigated carefully. This paper presents the Monte–Carlo Query Tree Search (MCQTS) method as a novel and fast anti-collision algorithm. This method combines the capabilities of the conventional Monte–Carlo Tree Search and Query Tree by applying a few heuristics on the tree traversal to raise the chance of facing the most promising states. The collision mitigation based on the MCQTS is presented and its performance in terms of time, and space (memory) complexity is analytically verified. Simulations are performed, and the effects of tree size, number of tags, and tag ID length on the performance of the proposed method are investigated. The results are compared to the previously presented tree-based algorithms, and it is shown that for typical tag lengths, the MCQTS method performs between 3.89% and 62.06% (in average) faster than the conventional methods for multi-tag identification.

[1]  Guoxing Zhang,et al.  An improved binary search RFID anti-collision algorithm , 2017, 2017 12th International Conference on Computer Science and Education (ICCSE).

[2]  Yuan-Cheng Lai,et al.  General binary tree protocol for coping with the capture effect in RFID tag identification , 2010, IEEE Communications Letters.

[3]  Yuxing Chen,et al.  A Staff Access Control System Based on RFID Technology , 2016 .

[4]  C. M. Roberts,et al.  Radio frequency identification (RFID) , 2006, Comput. Secur..

[5]  Yuan-Cheng Lai,et al.  An RFID anti-collision algorithm with dynamic condensation and ordering binary tree , 2013, Comput. Commun..

[6]  Katina Michael RFID/NFC Implants for Bitcoin Transactions , 2016, IEEE Consumer Electronics Magazine.

[7]  Hervé Rivano,et al.  A Survey of RFID Readers Anticollision Protocols , 2018, IEEE Journal of Radio Frequency Identification.

[8]  Subir Kumar Sarkar,et al.  Anti-collision algorithm for RFID system using adaptive Bayesian Belief Networks and it's VLSI Implementation , 2017, 2017 11th International Conference on Intelligent Systems and Control (ISCO).

[9]  Wei Xi,et al.  CBID: A Customer Behavior Identification System Using Passive Tags , 2014, 2014 IEEE 22nd International Conference on Network Protocols.

[10]  Izabela Lacmanovic,et al.  Contactless payment systems based on RFID technology , 2010, The 33rd International Convention MIPRO.

[11]  Jorge L. V. Barbosa,et al.  An intelligent model for logistics management based on geofencing algorithms and RFID technology , 2015, Expert Syst. Appl..

[12]  Anthony J. Maeder,et al.  RFID Localisation For Internet Of Things Smart Homes: A Survey , 2017, ArXiv.

[13]  Lei Yang,et al.  ShopMiner: Mining Customer Shopping Behavior in Physical Clothing Stores with COTS RFID Devices , 2015, SenSys.

[14]  A. Provotorov,et al.  Development of Methods for Determining the Locations of Large Industrial Goods During Transportation on the Basis of RFID , 2015 .

[15]  Hu Chen,et al.  A Low Complexity Anti-Collision Algorithm for RFID Using Query Tree , 2018, 2018 Cross Strait Quad-Regional Radio Science and Wireless Technology Conference (CSQRWC).

[16]  Quanyuan Feng,et al.  An Efficient Anti-Collision Protocol for RFID Tag Identification , 2010, IEEE Communications Letters.

[17]  Klaus Finkenzeller,et al.  Rfid Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification , 2003 .

[18]  Tanvi Agrawal,et al.  An Optimized Query Tree Algorithm in RFID Inventory Tracking -A case Study Evidence , 2012 .

[19]  Alain Yee-Loong Chong,et al.  Structural equation modeling for multi-stage analysis on Radio Frequency Identification (RFID) diffusion in the health care industry , 2012, Expert Syst. Appl..

[20]  Shuang-Hua Yang,et al.  Hybrid Zigbee RFID sensor network for humanitarian logistics centre management , 2011, J. Netw. Comput. Appl..

[21]  Bo Li,et al.  Efficient Anti-Collision Algorithm Utilizing the Capture Effect for ISO 18000-6C RFID Protocol , 2011, IEEE Communications Letters.

[22]  Majid Manteghi,et al.  Chipless RFID: Design Procedure and Detection Techniques , 2014 .

[23]  Girish. R. Talmale,et al.  Medicine Reminder and Monitoring System for Secure Health Using IOT , 2016 .

[24]  Yi Pan,et al.  A Novel Anti-Collision Algorithm in RFID Systems for Identifying Passive Tags , 2010, IEEE Transactions on Industrial Informatics.

[25]  Ji Hwan Choi,et al.  Novel Query Tree Algorithm Based on Reservation and Time-Divided Responses to Support Efficient Anti-Collision Protocol , 2018, 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN).

[26]  Rémi Coulom,et al.  Efficient Selectivity and Backup Operators in Monte-Carlo Tree Search , 2006, Computers and Games.

[27]  Rajiv Khosla,et al.  RFID-based Hospital Real-time Patient Management System , 2007, 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007).

[28]  Tae-Jin Lee,et al.  An efficient framed-slotted ALOHA algorithm with pilot frame and binary selection for anti-collision of RFID tags , 2008, IEEE Communications Letters.

[29]  Cheng-Ta Yang,et al.  Mutual Authentication Protocol for Role-Based Access Control Using Mobile RFID , 2016 .

[30]  Yunhao Liu,et al.  Design and Implementation of an RFID-Based Customer Shopping Behavior Mining System , 2017, IEEE/ACM Transactions on Networking.

[31]  Liu Baolong,et al.  An Investigation on Tree-Based Tags Anti-collision Algorithms in RFID , 2017, 2017 International Conference on Computer Network, Electronic and Automation (ICCNEA).

[32]  Kay Römer,et al.  Smart Identification Frameworks for Ubiquitous Computing Applications , 2004, Wirel. Networks.

[33]  Henry C. W. Lau,et al.  A RFID case-based logistics resource management system for managing order-picking operations in warehouses , 2009, Expert Syst. Appl..

[34]  Csaba Szepesvári,et al.  Bandit Based Monte-Carlo Planning , 2006, ECML.

[35]  Edwin Lughofer,et al.  An Online RFID Localization in the Manufacturing Shopfloor , 2018, Predictive Maintenance in Dynamic Systems.

[36]  Quanyuan Feng,et al.  Stability Analysis of an Efficient Anti-Collision Protocol for RFID Tag Identification , 2012, IEEE Transactions on Communications.

[37]  A. L. Herrera-May,et al.  Design and implementation of a system access control by RFID , 2016, 2016 IEEE International Engineering Summit, II Cumbre Internacional de las Ingenierias (IE-Summit).

[38]  Simon M. Lucas,et al.  A Survey of Monte Carlo Tree Search Methods , 2012, IEEE Transactions on Computational Intelligence and AI in Games.

[39]  Jiang-Liang Hou,et al.  Quantitative performance evaluation of RFID applications in the supply chain of the printing industry , 2006, Ind. Manag. Data Syst..

[40]  Shing-Tsaan Huang,et al.  Adaptive splitting and pre-signaling for RFID tag anti-collision , 2009, Computer Communications.

[41]  Peter Norvig,et al.  Artificial Intelligence: A Modern Approach , 1995 .

[42]  W. Tsai,et al.  Logistics Management System Based on Permissioned Blockchains and RFID Technology , 2019, Proceedings of the 2019 International Conference on Computer, Network, Communication and Information Systems (CNCI 2019).

[43]  Kai Cheng,et al.  RFID enabled manufacturing: fundamentals, methodology and applications , 2006 .

[44]  Demis Hassabis,et al.  Mastering the game of Go without human knowledge , 2017, Nature.

[45]  Gökhan Dalkiliç,et al.  Review of different classes of RFID authentication protocols , 2019, Wirel. Networks.

[46]  Deming Wang,et al.  A Highly Stable and Reliable 13.56-MHz RFID Tag IC for Contactless Payment , 2015, IEEE Transactions on Industrial Electronics.

[47]  Baolong Liu,et al.  An Anti-Collision Algorithm for RFID Based on an Array and Encoding Scheme , 2018, Inf..

[48]  Jianqiang Wang,et al.  RFID-Based Vehicle Positioning and Its Applications in Connected Vehicles , 2014, Sensors.

[49]  Ravikanth Pappu,et al.  An Optimal Q-Algorithm for the ISO 18000-6C RFID Protocol , 2009, IEEE Transactions on Automation Science and Engineering.

[50]  Byeongchan Jeon,et al.  Multiple RFID Tags Identification with M-ary Query Tree Scheme , 2013, IEEE Communications Letters.

[51]  Pedro M. Reyes,et al.  Impact of RFID on manufacturing effectiveness and efficiency , 2012 .

[52]  H. Jaap van den Herik,et al.  Progressive Strategies for Monte-Carlo Tree Search , 2008 .

[53]  Mostafa Salah,et al.  Tag Anti-collision Algorithm for RFID Systems with Minimum Overhead Information in the Identification Process , 2011 .

[54]  Tzer-Shyong Chen,et al.  The Application of RFID to Healthcare Management of Nursing House , 2016, Wirel. Pers. Commun..

[55]  Thomas F. La Porta,et al.  Anticollision Protocols for Single-Reader RFID Systems: Temporal Analysis and Optimization , 2011, IEEE Transactions on Mobile Computing.

[56]  Raymond E. Floyd RFID in Transportation , 2015, IEEE Potentials.

[57]  Li Yi-nan Research on RFID anti-collision algorithms based on binary tree , 2010 .

[58]  Francesca Lonetti,et al.  Instant collision resolution for tag identification in RFID networks , 2007, Ad Hoc Networks.

[59]  Haejae Jung,et al.  A Memory Efficient Anti-Collision Protocol to Identify Memoryless RFID Tags , 2015, J. Inf. Process. Syst..

[60]  Yu Min Wang,et al.  Understanding the determinants of RFID adoption in the manufacturing industry , 2010 .

[61]  Aneesh Krishna,et al.  Application of RFID Technology to Reduce Overcrowding in Hospital Emergency Departments , 2018 .

[62]  Inkyu Lee,et al.  FTTP: A Fast Tree Traversal Protocol for Efficient Tag Identification in RFID Networks , 2010, IEEE Communications Letters.

[63]  Kai-Yeung Siu,et al.  Efficient memoryless protocol for tag identification (extended abstract) , 2000, DIALM '00.

[64]  Hyuckjae Lee,et al.  Bi-slotted tree based anti-collision protocols for fast tag identification in RFID systems , 2006, IEEE Communications Letters.

[65]  Mustapha Djeddou,et al.  Improved RFID anti-collision algorithm , 2013 .

[66]  Rui Wang,et al.  A Novel RFID Anti-Collision Algorithm based on Binary Tree , 2013, J. Networks.