A new anti-collision protocol based on information of collided tags in RFID systems

被引:11
作者
Bagheri, Nasour [1 ]
Alenaby, Parvin [1 ]
Safkhani, Masoumeh [2 ]
机构
[1] Shahid Rajaee Teacher Training Univ, Dept Elect Engn, Tehran, Iran
[2] Shahid Rajaee Teacher Training Univ, Dept Comp Engn, Tehran, Iran
关键词
radio frequency identification; anti-collision protocols; collided data; slotted ALOHA; FREQUENCY IDENTIFICATION SYSTEMS; AUTHENTICATION PROTOCOL; USER AUTHENTICATION; LIGHTWEIGHT; PERMUTATION; IMPROVEMENT; SECURITY; NETWORK;
D O I
10.1002/dac.2975
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Radio frequency identification (RFID) technology has recently become an integral part of a wide range of applications. One of the challenges in RFID systems is the tag anti-collision issue, for which several anti-collision tag identification protocols have been proposed. This paper proposes a novel slotted ALOHA-based RFID tag anti-collision algorithm which can be employed for tag identification. The main idea of this algorithm is to use the information available in collision slots, called collided data, to identify tags uniquely. For this purpose, the collision slots that include only two tags are selected. Then, the non-conflict bits in these slots are used to possibly identifying the tags. Because in the proposed algorithm readers use both single slots and also the collision slots for tag identification, the performance is increased significantly compared with other protocols. Results of the study indicate that in the proposed algorithm, the optimal frame size for an individual tag number is equal to the half of tags number and the efficiency of the proposed protocol is improved to about 73%. Copyright (c) 2015 John Wiley & Sons, Ltd.
引用
收藏
页数:9
相关论文
共 30 条
  • [1] [Anonymous], 2008, CLASS 1 GENERATION 2
  • [2] [Anonymous], 2010, ICT2007216676 ECRYPT
  • [3] Privacy-Friendly Authentication in RFID Systems: On Sublinear Protocols Based on Symmetric-Key Cryptography
    Avoine, Gildas
    Bingol, Muhammed Ali
    Carpent, Xavier
    Yalcin, Siddika Berna Ors
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2013, 12 (10) : 2037 - 2049
  • [4] Privacy-friendly synchronized ultralightweight authentication protocols in the storm
    Avoine, Gildas
    Carpent, Xavier
    Martin, Benjamin
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (02) : 826 - 843
  • [5] Weaknesses in a new ultralightweight RFID authentication protocol with permutation-RAPP
    Bagheri, Nasour
    Safkhani, Masoumeh
    Peris-Lopez, Pedro
    Tapiador, Juan E.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (06) : 945 - 949
  • [6] Bang O, 2009, 11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS,, P354
  • [7] Resolving Collision in EPCglobal Class-1 Gen-2 System by Utilizing the Preamble
    Bratuz, Iztok
    Vodopivec, Andrej
    Trost, Andrej
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2014, 13 (10) : 5330 - 5339
  • [8] Lightweight and provably secure user authentication with anonymity for the global mobility network
    Chen, Chun
    He, Daojing
    Chan, Sammy
    Bu, Jiajun
    Gao, Yi
    Fan, Rong
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2011, 24 (03) : 347 - 362
  • [9] An extensible and ubiquitous RFID management framework over next-generation networks
    Cho, Kideok
    Pack, Sangheon
    Kwon, Ted 'Taekyoung'
    Choi, Yanghee
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2010, 23 (9-10) : 1093 - 1110
  • [10] An accurate analytical formula for the essential joint probability of framed slotted aloha protocols
    Chung, In-Hang
    Yen, Ming-Ching
    Hwang, Chi-Kuang
    [J]. JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2013, 350 (10): : 3432 - 3440