Results 1 - 10
of
20
Continuous Scanning with Mobile Reader in RFID Systems: an Experimental Study
"... In this paper, we show the first comprehensive experimental study on mobile RFID reading performance based on a relatively large number of tags. By making a number of observations regarding the tag reading performance, we build a model to depict how various parameters affect the reading performance. ..."
Abstract
-
Cited by 7 (5 self)
- Add to MetaCart
(Show Context)
In this paper, we show the first comprehensive experimental study on mobile RFID reading performance based on a relatively large number of tags. By making a number of observations regarding the tag reading performance, we build a model to depict how various parameters affect the reading performance. Through our model, we have designed very efficient algorithms to maximize the time-efficiency and energy-efficiency by adjusting the reader’s power and moving speed. Our experiments show that our algorithms can reduce the total scanning time by 50 % and the total energy consumption by 83 % compared to the prior solutions.
A Parallel Identification Protocol for RFID Systems
"... Abstract—Nowadays, RFID systems have been widely deployed for applications such as supply chain management and inventory control. One of their most essential operations is to swiftly identify individual tags to distinguish their associated objects. Most existing solutions identify tags sequentially ..."
Abstract
-
Cited by 3 (1 self)
- Add to MetaCart
(Show Context)
Abstract—Nowadays, RFID systems have been widely deployed for applications such as supply chain management and inventory control. One of their most essential operations is to swiftly identify individual tags to distinguish their associated objects. Most existing solutions identify tags sequentially in the temporal dimension to avoid signal collisions, whose performance degrades significantly as the system scale increases. In this paper, we propose a Parallel Identification Protocol (PIP) for RFID systems, which achieves the parallel identification paradigm and is com-patible with current RFID devices. Uniquely, PIP encodes the tag ID intoa specially designed patternand thus greatly facilitates the reader to correctly and effectively recover them from collisions. Furthermore, we analytically investigate its performance and provide guidance on determining its optimal settings. Extensive simulation shows that PIP reduces the identification delay by about 25% 50 % when compared with the standard method in EPC C1G2 and the state-of-the-art solutions. I.
D (2013) Efficient Protocols for Rule Checking in RFID Systems
- In: Proceedings of IEEE ICCCN. Nassau, pp 1–7 533Mobile Netw Appl
, 2014
"... Abstract—With the rapid proliferation of RFID technologies, RFID has been introduced to the applications like safety inspec-tion and warehouse management. Conventionally a number of deployment rules are specified for these applications. This paper studies a practically important problem of rule chec ..."
Abstract
-
Cited by 2 (2 self)
- Add to MetaCart
(Show Context)
Abstract—With the rapid proliferation of RFID technologies, RFID has been introduced to the applications like safety inspec-tion and warehouse management. Conventionally a number of deployment rules are specified for these applications. This paper studies a practically important problem of rule checking over a large set of RFID tags, i.e., checking whether the specified rules are satisfied according to the RFID tags within the monitoring area. This rule checking function may need to be executed frequently over a large number of tags and therefore should be made efficient in terms of execution time. Aiming to achieve time efficiency, we propose two efficient protocols based on the collision detection and the logical features of rules, respectively. Simulation results indicate that our protocols achieve much better performance than other solutions in terms of time efficiency. I.
Article On the Optimal Identification of Tag Sets in Time-Constrained RFID Configurations
, 2011
"... sensors ..."
(Show Context)
Efficient median estimation for large-scale sensor RFID systems
"... Abstract: We consider the median estimation problem in a large-scale sensor augmented RFID system. The large-scale deployment of RFID technology has opened the door to innovative ways to integrate RFID and sensor technology. Sensor-tags are tags that can report over 50 types of physical information ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
(Show Context)
Abstract: We consider the median estimation problem in a large-scale sensor augmented RFID system. The large-scale deployment of RFID technology has opened the door to innovative ways to integrate RFID and sensor technology. Sensor-tags are tags that can report over 50 types of physical information to a reader. The traditional way to obtain information from sensor-tags is to query each tag. When the number of tags is large, however, it is prohibitive to query tags individually due to the high delay. In this paper, we present a probabilistic algorithm to estimate the median of a set of sensor-RFID tags without individually querying each tag. The median estimation problem is solved using binary search. Our evaluation demonstrates that the median search algorithm exhibits high accuracy and reasonable time latency. Moreover, we also design an exact algorithm for the continuous median update problem. Our algorithm can incrementally compute the exact median in less time.
in the Mobile RFID Systems
"... Abstract: In all anti-collision protocols of RFID standards, EPCGlobal Class 1 Generation 2 (C1G2) protocol has been most widely used in RFID systems since it is simply, efficient and safety. Similar to most existing anti-collision protocols, The C1G2 protocol initially aims at tag identification of ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract: In all anti-collision protocols of RFID standards, EPCGlobal Class 1 Generation 2 (C1G2) protocol has been most widely used in RFID systems since it is simply, efficient and safety. Similar to most existing anti-collision protocols, The C1G2 protocol initially aims at tag identification of static scenarios, where all tags keep still during the tag identification process. However, in many real scenarios, tags generally move along a fixed path in the reader coverage area, which implies that tags stay the coverage area only for a limited time (sojourn time). The scenarios are usually called mobile RFID systems. Because the multiple tag identification based on a shared wireless channel is random, tags entering the reader coverage area earlier may be identified later (random later identification phenomenon). The phenomenon and the limited sojourn time may let some tags lost. In this paper, we propose an improved C1G2 protocol with first come first served feature in mobile RFID systems. The protocol can overcome the RLI phenomenon effectively and retains good initial qualities of C1G2 protocol by modifying it slightly. Simulation results show that the proposed protocol can significantly reduce the numbers of lost tags in mobile RFID systems. The idea of the paper is beneficial for redesigning other existing tag anti-collision protocols so as to make these protocols adapt to mobile RFID systems. Keywords:RFID, tag anti-collision, mobile RFID systems, EPC C1G2. 1
Computer Networks xxx (2010) xxx–xxx Contents lists available at ScienceDirect
"... Computer Networks journal homepage: www.elsevier.com/locate/comnet ..."
(Show Context)
Article The Design of RFID Conveyor Belt Gate Systems Using an Antenna Control Unit
, 2011
"... sensors ..."
Location Proof via Passive RFID Tags ⋆
"... Abstract. With the surge in location-aware applications and prevalence of RFID tags comes a demand for providing location proof service with minimal cost. We introduce two protocols that provide secure and accurate location proof service using passive RFID tags. Both protocols are lightweight, adapt ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract. With the surge in location-aware applications and prevalence of RFID tags comes a demand for providing location proof service with minimal cost. We introduce two protocols that provide secure and accurate location proof service using passive RFID tags. Both protocols are lightweight, adaptive and cost-effective. The first protocol assumes the connection of a user to the remote server. The second protocol does not require real time interactions with the server. Instead, it uses the selfreported time of local RFID reader (such as a cell phone), which may be biased. The user can upload the information to the server later to obtain the location proof. The paper presents a solution to derive users’ actual time of presence in the absence of a reliable clock, assuming an arbitrarily large number of falsified data points from malicious users. 1