RFID identification—design and optimization

RFID identification—design and optimization

For access to this article, please select a purchase option:

Buy chapter PDF
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
RFID Protocol Design, Optimization, and Security for the Internet of Things — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

This chapter addresses the fundamental RFID tag identification problem, namely reading all IDs of a given set of tags, which is needed in almost all RFID systems. Because tags respond over a shared wireless medium, tag identification protocols are also called collision arbitration, tag singulation, or tag anticollision protocols. Tag identification protocols need to be scalable as the number of tags that need to be identified could be as large as tens of thousands with the increasing adoption of RFID tags. An RFID system with a large number of tags may require multiple readers with overlapping regions. In this chapter, we first focus on the single-reader version of the tag identification problem and then extend our solution to the multiple-reader problem.

Chapter Contents:

  • 1.1 Introduction
  • 1.1.1 Background and problem statement
  • 1.1.2 Summary and limitations of prior art
  • 1.1.3 System model
  • 1.1.4 Proposed approach
  • Population size estimation
  • Finding optimal level
  • Population size reestimation
  • Finding hopping destination
  • Population distribution conversion
  • 1.2 Related work
  • 1.2.1 Nondeterministic identification protocols
  • 1.2.2 Deterministic identification protocols
  • 1.2.3 Hybrid identification protocols
  • 1.3 Optimal tree hopping
  • 1.3.1 Average number of queries
  • 1.3.2 Calculating optimal hopping level
  • 1.3.3 Maximum number of queries
  • 1.4 Minimizing identification time
  • 1.5 Discussion
  • 1.5.1 Virtual conversion of population distributions
  • 1.5.2 Reliable tag identification
  • 1.5.3 Continuous scanning
  • 1.5.4 Multiple readers
  • 1.6 Performance comparison
  • 1.6.1 Reader side comparison
  • Normalized reader queries
  • Identification speed
  • 1.6.2 Tag side comparison
  • Normalized tag responses
  • Tag response fairness
  • Normalized collisions
  • Normalized empty reads
  • 1.7 Conclusion

Inspec keywords: protocols; radiofrequency identification

Other keywords: multiple-reader problem; tag identification protocols; tag singulation; shared wireless medium; single-reader version; overlapping regions; collision arbitration; RFID tag identification problem; tag anticollision protocols

Subjects: RFID systems; Protocols

Preview this chapter:
Zoom in

RFID identification—design and optimization, Page 1 of 2

| /docserver/preview/fulltext/books/ce/pbce112e/PBCE112E_ch1-1.gif /docserver/preview/fulltext/books/ce/pbce112e/PBCE112E_ch1-2.gif

Related content

This is a required field
Please enter a valid email address