Modified tree-based identification protocols for solving hidden-tag problem in RFID systems over fading channels

نویسندگان

  • Chuyen T. Nguyen
  • Anh Tuan H. Bui
  • Van-Dinh Nguyen
  • Anh T. Pham
چکیده

Hidden-tag problem is one of the most important issues in the implementation of radio-frequency identification (RFID) systems. Due to effects of imperfect wireless channels, RFID tags can be hidden during the identification process by either another tag or an unsuccessful detection. The former is known as the capture effect (CE) while the latter is the detection error (DE). This study newly proposes two modified tree-based identification protocols, namely tweaked binary tree (TBT) and tweaked query tree (TQT), which are able to tackle the hidden-tag problem caused by both the CE and DE. The performance of the proposed TBT and TQT protocols, in terms of the average number of slots required to detect a tag, and the tag-loss rate, is evaluated in comparison with that of previously proposed ones. Computer simulations and numerical results confirm the effectiveness of the proposed protocols.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

افزایش سرعت شناسایی در سیستم‌های RFID

Radio frequency identification (RFID) is a new generation of automatic identification systems, based on wireless communication technology. In these systems all the tags using one communication channel to communicate with the reader. When two or more tags transmit their data to the reader simultaneously, their transmitted signals will collide. Resolving this collision has a direct impact on the ...

متن کامل

A Novel Approach for ID Distribution Problem in Tree-Based Tag Anti-Collision Protocols of RFID Systems

Tag collision is one of the most important issues in RFID systems and many tag anti-collision protocols were proposed in literature. But some kind of these protocols like Tree-based protocols (specifically Query tree) which its performance depends on tag ID length and construction, have some issues like ID distribution. In this paper we discuss about Query tree protocol which may influenced by ...

متن کامل

Reverse Query Tree approach to cope with Id distribution problem in Tree-based tag anti-collision protocols of RFID

Tag collision is one of the most important issues in RFID systems and many tag anti-collision protocols were proposed in literature. But some kind of these protocols like Tree-based protocols (specifically Query tree) which its performance depends on tag id length and construction, have some issues like id distribution. In this paper we discuss about Query tree protocol which may influenced by ...

متن کامل

Efficient Novel Anti-collision Protocols for Passive RFID Tags

In this paper we discuss how to reduce identification time with a given number of tags in the field of an RFID reader. This paper proposes three methods for fast tag identification: bi-slotted tree based RFID tag anti-collision protocols, query tree based reservation, and the combining method of them. Theses proposed methods can be used for enhancing the identification speed of RFID systems.

متن کامل

Enhancing privacy of recent authentication schemes for low-cost RFID systems

Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IET Communications

دوره 11  شماره 

صفحات  -

تاریخ انتشار 2017