RFID queries—single category

RFID queries—single category

For access to this article, please select a purchase option:

Buy chapter PDF
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
RFID Protocol Design, Optimization, and Security for the Internet of Things — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

The key technical contribution of this chapter is in proposing a protocol to search tags in a population of RFID tags. This chapter represents the first effort on addressing this important and practical problem for C1G2 compliant RFID systems. The key technical depth of this chapter is in the mathematical development of the theory that RTSP is based on. The solid theoretical underpinning ensures that RTSP always achieves the required confidence interval. We have proposed a technique to handle large frame sizes to ensure the compliance with the C1G2 standard. We have also proposed a method to implicitly estimate the number of tags in set C. We implemented RTSP and conducted side-by-side comparisons with TH, the fastest prior tag identification protocol. Our experimental results show that RTSP always achieves the required confidence interval and significantly outperforms TH in terms of search time.

Chapter Contents:

  • 7.1 Introduction
  • 7.1.1 Background and motivation
  • 7.1.2 Problem statement
  • 7.1.3 Limitations of prior art
  • 7.1.4 Proposed approach
  • 7.1.5 Technical challenges and proposed solutions
  • 7.1.6 Advantages over prior art
  • 7.2 Related work
  • 7.3 System model
  • 7.3.1 Architecture
  • 7.3.2 C1G2 compliance
  • 7.3.3 Communication channel
  • 7.3.4 Independence assumption
  • 7.4 RFID tag search protocol
  • 7.4.1 Protocol description
  • 7.4.2 Estimating number of tags in set C
  • 7.5 Parameter optimization
  • 7.5.1 False positive probability
  • 7.5.2 Confidence condition
  • 7.5.3 Duration condition
  • 7.5.4 Handling large frame sizes
  • 7.6 Performance evaluation
  • 7.6.1 Accuracy
  • Observed confidence interval vs. |A|
  • Observed confidence interval vs. |B|
  • Observed confidence interval vs. |C|
  • 7.6.2 Execution time
  • 7.7 Conclusion

Inspec keywords: radiofrequency identification; query processing; protocols

Other keywords: RTSP; RFID tags; RFID queries; C1G2 compliant RFID systems; frame sizes; tag identification protocol

Subjects: Protocols; RFID systems

Preview this chapter:
Zoom in

RFID queries—single category, Page 1 of 2

| /docserver/preview/fulltext/books/ce/pbce112e/PBCE112E_ch7-1.gif /docserver/preview/fulltext/books/ce/pbce112e/PBCE112E_ch7-2.gif

Related content

This is a required field
Please enter a valid email address