Beyond the limit: A fast tag identification protocol for RFID systems

This paper presents the design, experiment test and performance evaluation of FAST, a fast tag identification protocol in RFID systems. FAST includes a collision tolerant mechanism (CTM) that can identify tags in collision slots correctly. Each tag sends a randomly selected signature in its selected slot. When multiple tags select the same slot and a collision occurs, the reader can detect all the signatures correctly by exploiting the cross correlation. It then asks tags to send their tag IDs sequentially through a series of ACK commands, leading to no collision in the tag ID transmissions. By using CTM, all the tags in the collision slots can be identified successfully if the number of tags involved conforms to the signature detection limit. FAST also includes a dynamic frame length estimation mechanism to maximize the slot utilization so as to further improve the performance of tag identification. Theoretical analysis and experimental results from the USRP2 testbed demonstrate the feasibility of FAST. Simulation results show that FAST outperforms other protocols dramatically.

[1]  David Wetherall,et al.  An empirical study of UHF RFID performance , 2008, MobiCom '08.

[2]  Dina Katabi,et al.  Zigzag decoding: combating hidden terminals in wireless networks , 2008, SIGCOMM '08.

[3]  Yunhao Liu,et al.  Beyond Trilateration: On the Localizability of Wireless Ad Hoc Networks , 2009, IEEE/ACM Transactions on Networking.

[4]  Shigeng Zhang,et al.  Unknown Tag Identification in Large RFID Systems: An Efficient and Complete Solution , 2015, IEEE Transactions on Parallel and Distributed Systems.

[5]  Alex X. Liu,et al.  Every bit counts: fast and scalable RFID estimation , 2012, Mobicom '12.

[6]  V. Anantharam The stability region of the finite-user slotted ALOHA protocol , 1989, Proceedings of the 28th IEEE Conference on Decision and Control,.

[7]  F. Schoute,et al.  Dynamic Frame Length ALOHA , 1983, IEEE Trans. Commun..

[8]  Lawrence G. Roberts,et al.  ALOHA packet system with and without slots and capture , 1975, CCRV.

[9]  T. L. Porta,et al.  Anti-collision Protocols for Single-Reader RFID Systems : Temporal Analysis and Optimization , 2010 .

[10]  Feng Zhou,et al.  Evaluating and optimizing power consumption of anti-collision protocols for applications in RFID systems , 2004, Proceedings of the 2004 International Symposium on Low Power Electronics and Design (IEEE Cat. No.04TH8758).

[11]  David Wetherall,et al.  Taking the sting out of carrier sense: interference cancellation for wireless LANs , 2008, MobiCom '08.

[12]  Shigeng Zhang,et al.  Complete and fast unknown tag identification in large RFID systems , 2012, 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012).

[13]  Srihari Nelakuditi,et al.  CSMA/CN: carrier sense multiple access with collision notification , 2012, TNET.

[14]  Bo Sheng,et al.  Counting RFID Tags Efficiently and Anonymously , 2010, 2010 Proceedings IEEE INFOCOM.

[15]  Thomas F. La Porta,et al.  Anticollision Protocols for Single-Reader RFID Systems: Temporal Analysis and Optimization , 2011, IEEE Transactions on Mobile Computing.

[16]  Wonjun Lee,et al.  Adaptive Binary Splitting: A RFID Tag Collision Arbitration Protocol for Tag Identification , 2005, 2nd International Conference on Broadband Networks, 2005..

[17]  Miao Pan,et al.  A time-efficient information collection protocol for large-scale RFID systems , 2012, 2012 Proceedings IEEE INFOCOM.

[18]  Lixin Gao,et al.  Energy-Aware Tag Anti-Collision Protocols for RFID Systems , 2007, PerCom.

[19]  Kaishun Wu,et al.  DDC: A Novel Scheme to Directly Decode the Collisions in UHF RFID Systems , 2012, IEEE Transactions on Parallel and Distributed Systems.

[20]  Shaojie Tang,et al.  RASPberry: A stable reader activation scheduling protocol in multi-reader RFID systems , 2009, 2009 17th IEEE International Conference on Network Protocols.

[21]  Dan Suciu,et al.  Physical Access Control for Captured RFID Data , 2007, IEEE Pervasive Computing.

[22]  Wei Lou,et al.  Elimination of exposed terminal problem using signature detection , 2012, 2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).

[23]  Jin Zhang,et al.  Symbol-level detection: A new approach to silencing hidden terminals , 2012, 2012 20th IEEE International Conference on Network Protocols (ICNP).

[24]  Bo Sheng,et al.  Finding popular categories for RFID tags , 2008, MobiHoc '08.

[25]  Shigang Chen,et al.  Energy Efficient Algorithms for the RFID Estimation Problem , 2010, 2010 Proceedings IEEE INFOCOM.

[26]  Torben Larsen,et al.  Reliable identification of RFID tags using multiple independent reader sessions , 2009, 2009 IEEE International Conference on RFID.

[27]  Wonjun Lee,et al.  Adaptive splitting protocols for RFID tag collision arbitration , 2006, MobiHoc '06.

[28]  Chae-Woo Lee,et al.  An enhanced dynamic framed slotted ALOHA algorithm for RFID tag identification , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[29]  Lei Yang,et al.  Season: Shelving interference and joint identification in large-scale RFID systems , 2011, 2011 Proceedings IEEE INFOCOM.

[30]  Kai Bu,et al.  Less is More: Efficient RFID-Based 3D Localization , 2013, 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems.

[31]  David Tse,et al.  Fundamentals of Wireless Communication , 2005 .

[32]  Murali S. Kodialam,et al.  Anonymous Tracking Using RFID Tags , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[33]  Mo Li,et al.  PET: Probabilistic Estimating Tree for Large-Scale RFID Estimation , 2011, IEEE Transactions on Mobile Computing.

[34]  Murali S. Kodialam,et al.  Fast and reliable estimation schemes in RFID systems , 2006, MobiCom '06.

[35]  Shigang Chen,et al.  Efficient Protocols for Identifying the Missing Tags in a Large RFID System , 2013, IEEE/ACM Transactions on Networking.

[36]  Dong Chao,et al.  Universal Software Radio Peripheral , 2010 .

[37]  Mo Li,et al.  ZOE: Fast cardinality estimation for large-scale RFID systems , 2013, 2013 Proceedings IEEE INFOCOM.

[38]  Shigeng Zhang,et al.  LOCK: A fast and flexible tag scanning mechanism with handheld readers , 2014, 2014 IEEE 22nd International Symposium of Quality of Service (IWQoS).