Exploiting id knowledge for tag identification in rfid networks

In this paper, we consider the problem of identifying a set of objects in an RFID network. We propose a query tree based protocol to reduce the number of transmission collisions. The key idea of our protocol is to take advantage of the (partial) knowledge about the set of tags to be identified: in particular, their approximated number, and above all their distribution. More specifically, we show how much gain in performance can be achieved by having information about the set of IDs to be identified. Such information can be obtained from statistical data, or from other features, depending on the application. Of course, a perfect knowledge makes useless the identification process: the aim of this work is to show how query tree protocols improve, by taking into account of the information about the tags. Simulation results show that our approach performs better than classical query tree protocols [1], in terms of number of queries needed to identify all tags, which is a commonly used metric, strictly related to delay. Moreover, our approach out performs also Aloha-based protocols that for their randomized nature, are independent from the IDs distributions: in such protocols, tags randomly choose a slot in which transmit, that is equivalent to "re-naming" the IDs, so they do not take any advantage from the knowledge of the original ID distribution.

[1]  Kai-Yeung Siu,et al.  Efficient memoryless protocol for tag identification (extended abstract) , 2000, DIALM '00.

[2]  Chae-Woo Lee,et al.  An enhanced dynamic framed slotted ALOHA algorithm for RFID tag identification , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[3]  Daniel W. Engels,et al.  Colorwave: a MAC for RFID reader networks , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[4]  Daniel W. Engels,et al.  The reader collision problem , 2002, IEEE International Conference on Systems, Man and Cybernetics.

[5]  Ivan Stojmenovic,et al.  A hybrid randomized protocol for RFID tag identification , 2006 .

[6]  F. Schoute,et al.  Dynamic Frame Length ALOHA , 1983, IEEE Trans. Commun..

[7]  D. R. Hush,et al.  Analysis of tree algorithms for RFID arbitration , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).

[8]  Francesca Lonetti,et al.  Tree slotted aloha: a new protocol for tag identification in RFID networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[9]  Lawrence G. Roberts,et al.  Extensions of packet communication technology to a hand held personal terminal , 1972, AFIPS '72 (Spring).

[10]  Harald Vogt,et al.  Efficient Object Identification with Passive RFID Tags , 2002, Pervasive.

[11]  Jaideep Srivastava,et al.  Tag-Splitting: Adaptive Collision Arbitration Protocols for RFID Tag Identification , 2007, IEEE Transactions on Parallel and Distributed Systems.

[12]  John Capetanakis,et al.  Tree algorithms for packet broadcast channels , 1979, IEEE Trans. Inf. Theory.