ASAF ALOHA Protocol for Dense RFID Systems

被引:0
|
作者
S. Srinivasa Rao
E. G. Rajan
K. Lalkishore
机构
[1] Aurora’s Technological and Research Institute,
[2] Pentagram Research Centre,undefined
[3] Mehdipatnam,undefined
[4] R&D Cell,undefined
[5] JNT University Kukatpally,undefined
来源
Wireless Personal Communications | 2012年 / 66卷
关键词
ASAF; ALOHA; EPC; RFID;
D O I
暂无
中图分类号
学科分类号
摘要
RFID tags are used for varied applications in large numbers. Human Tracking is one such important application wherein the RFID system detects the presence of a tag in a dense tag environment. Quick estimation of the number of tags in the field at a desired level of accuracy is one of the most common requirements in the present scenario. Identification of tags has become a critical area which need more time and unsuitable in many situations; especially where tag set is dense. We introduce a novel medium access control (MAC) protocol for Radio Frequency IDentification (RFID) systems which exploits the statistical information collected at the reader. The protocol, termed Adaptive Slot Adaptive Frame (ASAF) ALOHA protocol, is motivated to significantly improve the total read time performance of the currently suggested MAC protocols for RFID systems by minimizing the collisions of the tags. In order to perform this task, ASAF estimates the dynamic tag population and adapts the frame size and number of slots simultaneously in the subsequent round via a simple policy that maximizes an appropriately defined function. We demonstrated that ASAF is better than the current RFID MAC protocols. We also considered the case where suddenly if the number of tags increases, the running frame with adapted slots gets flushed away and new frame with increased number of slots gets adapted automatically by the system showing the robustness in this case as well.
引用
收藏
页码:667 / 681
页数:14
相关论文
共 50 条
  • [21] A Novel Time- and Energy-Efficient Tag Identification Protocol in Dense RFID Systems
    Hoang, Linh T.
    Nguyen, Chuyen T.
    Pham, Anh T.
    2018 IEEE SEVENTH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND ELECTRONICS (IEEE ICCE 2018), 2018, : 69 - 74
  • [22] Early Frame Break Policy for ALOHA-Based RFID Systems
    Solic, Petar
    Radic, Josko
    Rozic, Nikola
    IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2016, 13 (02) : 876 - 881
  • [23] Dynamic Framed ALOHA Algorithm Using a Collision Factor in RFID Systems
    Choi, Seung Sik
    Hong, Yun-Sik
    Kim, Sang-Kyung
    2009 IEEE 70TH VEHICULAR TECHNOLOGY CONFERENCE FALL, VOLS 1-4, 2009, : 2046 - 2048
  • [24] A Query Tree Dynamic Frame Slot ALOHA Collision Resolution Protocol for RFID Tags
    Yan Xin-qing
    Yin Zhou-ping
    Xiong You-lun
    FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2008, : 196 - 199
  • [25] An Improved Q-Learning Algorithm Integrated into the Aloha Anti-Collision Protocol for Energy- Efficient RFID Systems
    Le, Van-Hoa
    Nguyen, Duc-Nhat-Quang
    Vo, Viet-Minh-Nhat
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2025, 22 (01) : 51 - 59
  • [26] An Efficient MAC Protocol for Throughput Enhancement in Dense RFID System
    Joshi, Gyanendra Prasad
    Kim, Sung Won
    ISWPC: 2009 4TH INTERNATIONAL SYMPOSIUM ON WIRELESS PERVASIVE COMPUTING, 2009, : 79 - 83
  • [27] Distance Bounding Protocol for RFID Systems
    Zhou, Yajian
    Zhou, Jingxian
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2016, 2016, 9798 : 241 - 249
  • [28] An Enhanced Authentication Protocol for RFID Systems
    Hosseinzadeh, Mehdi
    Ahmed, Omed Hassan
    Ahmed, Sarkar Hasan
    Trinh, Cuong
    Bagheri, Nasour
    Kumari, Saru
    Lansky, Jan
    Huynh, Bao
    IEEE ACCESS, 2020, 8 (08): : 126977 - 126987
  • [29] A Parallel Identification Protocol for RFID Systems
    Kong, Linghe
    He, Liang
    Gu, Yu
    Wu, Min-You
    He, Tian
    2014 PROCEEDINGS IEEE INFOCOM, 2014, : 154 - 162
  • [30] An anonymous search protocol for RFID systems
    Yoon H.S.
    Youm H.Y.
    Journal of Convergence Information Technology, 2011, 6 (08) : 44 - 50