Novel anti-collision algorithm for tag identification in RFID systems

被引:1
作者
Feng, Bo [1 ,2 ,3 ]
Li, Jin-Tao [1 ]
Zheng, Wei-Min [1 ,3 ]
Zhang, Ping [1 ,2 ,3 ]
Ding, Zhen-Hua [1 ,2 ,3 ]
机构
[1] Institute of Computing Technology, Chinese Academy of Sciences
[2] Graduate University, Chinese Academy of Sciences
[3] Guangdong Electronics Industry Institute
来源
Zidonghua Xuebao/Acta Automatica Sinica | 2008年 / 34卷 / 06期
关键词
Anti-collision algorithm; ID-binary tree; RFID; Tag identification;
D O I
10.3724/SP.J.1004.2008.00632
中图分类号
学科分类号
摘要
In the RFID system, tag-to-reader communication collision occurs when more than one tag responds to a reader's interrogation at the same time. Without any coordination among the reader and the tags, the responses from the tags will become illegible to the reader. Anti-collision algorithms for passive RFID tag identification are significant for fast and correctly obtaining the tags ID. This paper presents a novel anti-collision algorithm which is called stack-based ID-binary tree anti-collision algorithm (SIBT). The novelty of the SIBT algorithm is that the algorithm maps a set of n tags into a corresponding ID-binary tree, and sees the process of collision arbitration as a process of building the ID-binary tree. In order to efficiently construct an ID-binary tree, the reader uses a stack to store the threads of the construction information while the tag uses a counter to keep track of the stack position where the tag is on. Both theoretic results and simulation performance evaluations show that the SIBT outperforms other tree based tag anti-collision algorithms.
引用
收藏
页码:632 / 638
页数:6
相关论文
共 18 条
[1]  
Finkenzeller K., RFID Handbook: Radio-frequency Identification Fundamentals and Applications (Second Edition), pp. 6-9, (2003)
[2]  
Stanford V., Pervasive computing goes the last hundred feet with RFID systems, Pervasive Computing, 2, 2, pp. 9-14, (2003)
[3]  
Satoh I., Linking physical worlds to logical worlds with mobile agents, Proceedings of IEEE International Conference on Mobile Data Management, pp. 332-343, (2004)
[4]  
Want R., Enabling ubiquitous sensing with RFID, Computer, 37, 4, pp. 84-86, (2004)
[5]  
Romer K., Schoch T., Mattern F., Dubendorfer T., Smart identification frameworks for ubiquitous computing applications, Proceedings of the 1st IEEE International Conference on Pervasive Computing and Communications, pp. 253-262, (2003)
[6]  
Vogt H., Multiple object identification with passive RFID tags, Proceedings of IEEE International Conference on Systems, Man, and Cybernetics, pp. 6-9, (2002)
[7]  
RFID for item management-air interface. Part 3: Parameters for air interface communications at 13.56 MHz, ISO standard 18000-3, (2003)
[8]  
I·code 1 system design guide, (2008)
[9]  
RFID for item management-air interface. Part 6: Parameters for air interface communications at 860 MHz to 960 MHz, ISO standard 18000-6, (2004)
[10]  
Kleinrock L., Lam S.S., Packet switching in a multi-access broadcast channel: Performance evaluation, IEEE Transactions on Communications, 23, 4, pp. 410-423, (1975)