• Title/Summary/Keyword: tag identification

Search Result 553, Processing Time 0.026 seconds

A Slot Allocated Blocking Anti-Collision Algorithm for RFID Tag Identification

  • Qing, Yang;Jiancheng, Li;Hongyi, Wang;Xianghua, Zeng;Liming, Zheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.6
    • /
    • pp.2160-2179
    • /
    • 2015
  • In many Radio Frequency Identification (RFID) applications, the reader recognizes the tags within its scope repeatedly. For these applications, some algorithms such as the adaptive query splitting algorithm (AQS) and the novel semi-blocking AQS (SBA) were proposed. In these algorithms, a staying tag retransmits its ID to the reader to be identified, even though the ID of the tag is stored in the reader's memory. When the length of tag ID is long, the reader consumes a long time to identify the staying tags. To overcome this deficiency, we propose a slot allocated blocking anti-collision algorithm (SABA). In SABA, the reader assigns a unique slot to each tag in its range by using a slot allocation mechanism. Based on the allocated slot, each staying tag only replies a short data to the reader in the identification process. As a result, the amount of data transmitted by the staying tags is reduced greatly and the identification rate of the reader is improved effectively. The identification rate and the data amount transmitted by tags of SABA are analyzed theoretically and verified by various simulations. The simulation and analysis results show that the performance of SABA is superior to the existing algorithms significantly.

An Efficient Tag Identification Algorithm using Bit Pattern Prediction Method (비트 패턴 예측 기법을 이용한 효율적인 태그 인식 알고리즘)

  • Kim, Young-Back;Kim, Sung-Soo;Chung, Kyung-Ho;Kwon, Kee-Koo;Ahn, Kwang-Seon
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.8 no.5
    • /
    • pp.285-293
    • /
    • 2013
  • The procedure of the arbitration which is the tag collision is essential because the multiple tags response simultaneously in the same frequency to the request of the Reader. This procedure is known as Anti-collision and it is a key technology in the RFID system. In this paper, we propose the Bit Pattern Prediction Algorithm(BPPA) for the efficient identification of the multiple tags. The BPPA is based on the tree algorithm using the time slot and identify the tag quickly and efficiently using accurate bit pattern prediction method. Through mathematical performance analysis, We proved that the BPPA is an O(n) algorithm by analyzing the worst-case time complexity and the BPPA's performance is improved compared to existing algorithms. Through MATLAB simulation experiments, we verified that the BPPA require the average 1.2 times query per one tag identification and the BPPA ensure stable performance regardless of the number of the tags.

Reducing RFID Reader Load with the Meet-in-the-Middle Strategy

  • Cheon, Jung-Hee;Hong, Jeong-Dae;Tsudik, Gene
    • Journal of Communications and Networks
    • /
    • v.14 no.1
    • /
    • pp.10-14
    • /
    • 2012
  • When tag privacy is required in radio frequency identification (ID) system, a reader needs to identify, and optionally authenticate, a multitude of tags without revealing their IDs. One approach for identification with lightweight tags is that each tag performs pseudo-random function with his unique embedded key. In this case, a reader (or a back-end server) needs to perform a brute-force search for each tag-reader interaction, whose cost gets larger when the number of tags increases. In this paper, we suggest a simple and efficient identification technique that reduces readers computation to $O$(${\sqrt{N}}$ log$N$) without increasing communication cost. Our technique is based on the well-known "meet-in-the-middle" strategy used in the past to attack symmetric ciphers.

Idle Slots Skipped Mechanism based Tag Identification Algorithm with Enhanced Collision Detection

  • Su, Jian;Xu, Ruoyu;Yu, ShiMing;Wang, BaoWei;Wang, Jiuru
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.2294-2309
    • /
    • 2020
  • In this article, a new Aloha-based tag identification protocol is presented to improve the reading efficiency of the EPC C1 Gen2-based UHF RFID system. Collision detection (CD) plays a vital role in tag identification process which determines the efficiency of anti-collision protocols since most Aloha-based protocols optimize the incoming frame length based on the collisions in current frame. Existing CD methods are ineffective in identifying collision, resulting in a degradation of identification performance. Our proposed algorithm adopts an enhanced CD (ECD) scheme based on the EPC C1 Gen2 standard to optimize identification performance. The ECD method can realize timely and effective CD by detecting the pulse width of the randomly sent by tags. According to the ECD, the reader detects the slot distribution and predicts tag cardinality in every collision slot. The tags involved in each collision slot are identified by independently assigned sub-frames. A large number of numerical results show that the proposed solution is superior to other existing anti-collision protocols in various performance evaluation metrics.

SAW ID Tag and Receiver System for Passive RFID System Application (수동형 RFID 시스템 적용을 위한 SAW ID 태그 및 수신 시스템 구현)

  • Kim, Jae-Kwon;Park, Joo-Yong;Burm, Jin-Wook
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.45 no.4
    • /
    • pp.64-71
    • /
    • 2008
  • SAW (Surface Acoustic Waves) ID (identification) tags have been designed and implemented for RFID (Radio frequency IDentification) systems. With SAW ID tag of pulse position encoding method, the data capacity increased 3 times compared with SAW ID tag of amplitude on/off method. Two different kinds of SAW ID tag receiver systems, heterodyne and homodyne receiver systems, were made. The direct conversion receiver showed better isolation property, 10 dB improvement than the heterodyne receiver to increase wireless interrogation distance.

A Study on the RFID Tag-Floor Based Navigation (RFID 태그플로어 방식의 내비게이션에 관한 연구)

  • Choi Jung-Wook;Oh Dong-Ik;Kim Seung-Woo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.12 no.10
    • /
    • pp.968-974
    • /
    • 2006
  • We are moving into the era of ubiquitous computing. Ubiquitous Sensor Network (USN) is a base of such computing paradigm, where recognizing the identification and the position of objects is important. For the object identification, RFID tags are commonly used. For the object positioning, use of sensors such as laser and ultrasonic scanners is popular. Recently, there have been a few attempts to apply RFID technology in robot localization by replacing the sensors with RFID readers to achieve simpler and unified USN settings. However, RFID does not provide enough sensing accuracy for some USN applications such as robot navigation, mainly because of its inaccuracy in distance measurements. In this paper, we describe our approach on achieving accurate navigation using RFID. We solely rely on RFID mechanism for the localization by providing coordinate information through RFID tag installed floors. With the accurate positional information stored in the RFID tag, we complement coordinate errors accumulated during the wheel based robot navigation. We especially focus on how to distribute RFID tags (tag pattern) and how many to place (tag granularity) on the RFID tag-floor. To determine efficient tag granularities and tag patterns, we developed a simulation program. We define the error in navigation and use it to compare the effectiveness of the navigation. We analyze the simulation results to determine the efficient granularities and tag arrangement patterns that can improve the effectiveness of RFID navigation in general.

EPCglobal Gen 2 Tag Identification Performance Analysis Modifying the C model in the Q Algorithm (EPCglobal Gen 2 Q 알고리즘에서 C 모델에 따른 태그 인식 성능 평가)

  • Park, Jong-Myung;Cho, Sung-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.12B
    • /
    • pp.1444-1451
    • /
    • 2009
  • This paper first proposes diverse C determining models in the Q algorithm which is proposed in the EPCglobal C1 Gen 2 standard and then compares and analyzes its performance. EPCglobal C1 Gen 2 standard proposes the slot-count (Q) selection algorithm for multiple tag identification environment, but there is no such definition for the C value which modifies the Q value depending on collision or no reply. During the tag anti-collision process, the Q algorithm adds C to the Q when there is a collision and reduces the Q by C when there is no reply. The modified Q value updates new slot-counts for tags which determines the tag identification speed, so the C value is an important factor. However, many researches only intend to increase the tag identification speed by proposing a new method or modifying the Q algorithm without any research about the C value. This paper suggests diverse C models which satisfies the EPCglobal C1 Gen 2 and analyzes their performance in the multi tag identification environment. The result of this paper can be used as an index for future researches on EPCglobal C1 Gen 2 C models and multiple tag identification performance.

Simplified Tag Identification Algorithm by Modifying Tag Collection Command in Active RFID System

  • Lim, Intaek
    • Journal of Multimedia Information System
    • /
    • v.7 no.2
    • /
    • pp.137-140
    • /
    • 2020
  • In this paper, we propose a simplified tag collection algorithm to improve the performance of ISO / IEC 18000-7, the standard of active RFID systems. In the proposed algorithm, the collection command is modified to include the result of the listening period response from the previous round. The tag, which has received the collection command, checks whether the slot to which it has responded is collided, transmits additional data to its data slot without a point-to-point read command and sleep command, and transitions to the sleep mode. The collection round in the standard consists of a series of collection commands, collection responses, read commands, read responses, and sleep commands. On the other hand, in the proposed tag collection algorithm, one collection round consists only of a collection command and a collection response. As a result of performance analysis, it can be seen that the proposed technique shows superior performance compared to the standard.

A Study on Implementation of Passive RFID Tag System Using A Capacitive method (Capacitive방식을 이용한 Passive RFID Tag System 구현)

  • 배명수;여영호;손수국
    • Proceedings of the IEEK Conference
    • /
    • 2002.06a
    • /
    • pp.199-202
    • /
    • 2002
  • This paper is about the implementation of Passive RFID(Radio Frequency Identification) tag system using a capacitive method, and explains the design and circuit's structure of this system. Fundamentally the capacitive RFID tag system consists of a tag reader, a passive tag and a host computer. And then this paper shows the system's prototype which analyzes a specification, and suggests the passive RFID system as a new method which manufactures a low cost tag system easily

  • PDF

A study on the Identification of Train Using Radio Frequency (무선주파수를 이용한 철도 차량 인식에 관한 연구)

  • 강민수;이정석;곽칠성;이기서
    • Proceedings of the KSR Conference
    • /
    • 2000.11a
    • /
    • pp.571-577
    • /
    • 2000
  • This paper is designed for the identification system of the train using RFID(radio Frequency Identification) in the 134.2㎑. The reader of transmitter transmits an interrogation signal to the tag, then the tag of receiver retransmits the defined data to the reader after receiving the interrogation signal from it. The system is also applied to the reflection communication as a backscatter modulation and selected the passive Pouter system which does not need an active electrical power device. It is useful that ore can effectively manage and control of the information of train such as materials loaded in the train. We make the reader of the identification system for the train which can communicate with the tag installed under the train.

  • PDF