RFID detection—missing tags

RFID detection—missing tags

For access to this article, please select a purchase option:

Buy chapter PDF
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
RFID Protocol Design, Optimization, and Security for the Internet of Things — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

The key technical contribution of this chapter is in proposing a protocol to detect and identify missing tag events in the presence of unexpected tags. This chapter represents the first effort on addressing this important and practical problem. The key technical depth of this chapter is in the mathematical development of the theory that RUND and RUNI are based upon. The solid theoretical underpinning ensures that the actual reliability of RUND is greater than or equal to the required reliability. We have proposed a technique that our protocol uses to handle large frame sizes to ensure compliance with the C1G2 standard. We have also proposed a method to implicitly estimate the size of the unexpected tag population without requiring an explicit estimation phase. We implemented RUND and RUNI and conducted side-by-side comparisons with four major prior missing tag detection and identification protocols even though none of the existing protocols handle the presence of unexpected tags. Our protocols significantly outperform all prior protocols in terms of actual reliability and detection time.

Chapter Contents:

  • 5.1 Introduction
  • 5.1.1 Background and motivation
  • 5.1.2 Summary and limitations of prior art
  • 5.1.3 Problem statement and proposed approach
  • 5.1.4 Technical challenges and solutions
  • 5.1.5 Key novelty and advantages over prior art
  • 5.2 Related work
  • 5.2.1 Probabilistic protocols
  • 5.2.2 Deterministic protocols
  • 5.3 System model
  • 5.3.1 Architecture
  • 5.3.2 C1G2 compliance
  • 5.3.3 Communication channel
  • 5.3.4 Formal development assumption
  • 5.4 Protocol for detection: RUND
  • 5.5 Parameter optimization: RUND
  • 5.5.1 Estimating number of unexpected tags
  • 5.5.2 False-positive probability
  • 5.5.3 Achieving required reliability
  • 5.5.4 Minimizing execution time
  • 5.5.5 Handling large frame sizes
  • 5.5.6 Expected detection time
  • 5.5.7 Estimating number of missing tags
  • 5.6 Protocol for identification: RUNI
  • 5.7 Parameter optimization: RUNI
  • 5.7.1 Identifying all missing tags
  • 5.7.2 Minimizing the execution time
  • 5.8 Performance evaluation
  • 5.8.1 Impact of number of missing tags on RUND
  • 5.8.2 Impact of number of unexpected tags on RUND
  • 5.8.3 Impact of number of missing tags on RUNI
  • 5.8.4 Impact of number of unexpected tags on RUNI
  • 5.8.5 Impact of deviation from threshold
  • 5.8.6 Estimation accuracy
  • 5.8.7 Comparison with tag ID collection protocol
  • 5.9 Conclusions

Inspec keywords: radiofrequency identification; protocols

Other keywords: missing tag identification protocol; unexpected tag population; missing tag detection protocol; C1G2 standard; RFID detection

Subjects: Protocols; RFID systems

Preview this chapter:
Zoom in

RFID detection—missing tags, Page 1 of 2

| /docserver/preview/fulltext/books/ce/pbce112e/PBCE112E_ch5-1.gif /docserver/preview/fulltext/books/ce/pbce112e/PBCE112E_ch5-2.gif

Related content

This is a required field
Please enter a valid email address