Collision Free RFID Tag
-
Upload
atifjaved91 -
Category
Documents
-
view
214 -
download
0
Transcript of Collision Free RFID Tag
-
7/26/2019 Collision Free RFID Tag
1/6
34 JOURNAL OF COMMUNICATIONS AND NETWORKS, VOL. 14, NO. 1, FEBRUARY 2012
Collision-Free Arbitration Protocol for Active RFID
Systems
Honggang Wang, Changxing Pei, and Bo Su
Abstract: Collisions between tags greatly reduce the identifica-
tion speed in radio frequency identification (RFID) systems and in-
crease communication overhead. In particular for an active RFID
system, tags are powered by small batteries, and a large num-
ber of re-transmissions caused by collisions can deteriorate and
exhaust the tag energy which may result in missing tags. An ef-
ficient collision-free arbitration protocol for active RFID systems
is proposed in this paper. In this protocol, a new mechanism in-
volving collision detection, collision avoidance, and fast tag access
is introduced. Specifically, the pulse burst duration and busy-tone-
detection delay are introduced between the preamble and data por-
tion of a tag-to-reader (T-R) frame. The reader identifies tag colli-
sion by detecting pulses and transmits a busy tone to avoid unnec-
essary transmission when collision occurs. A polling process is then
designed to quickly access the collided tags. It is shown that the use
of the proposed protocol results in a system throughput of 0.612,
which is an obvious improvement when compared to the framed-
slotted ALOHA (FSA) arbitration protocol for ISO/IEC 18000-
7 standard. Furthermore, the proposed protocol greatly reduces
communication overhead, which leads to energy conservation.
Index Terms: ALOHA, collision, radio frequency identification
(RFID).
I. INTRODUCTION
In a radio frequency identification (RFID) system, a reader is
required to identify tags as quickly as possible. All tags share
the same wireless channel, which leads to collisions between
multiple tags. Therefore, a tag arbitration protocol, also called
an anti-collision protocol, is important for fast identification of
multiple tags.
Tag arbitration protocols can be simply categorized into tree-
based protocols and ALOHA-based protocols. The tree-based
tag arbitration protocols are deterministic [1], [2], while theALHOA-based ones presented in [3][8] are statistical. In [5],
combinatory model and frame-size update methods are pre-
sented for analyzing object identification using passive and ac-tive RFID technology. In [7] and [8], a binary tree is intro-
duced to deal with collision tags such that a better throughputis achieved. In [8], improved framed-slotted ALOHA (FSA)
with robust estimation and binary selection (EB-FSA) is used
to achieve a maximum system throughput of about 0.42. On
one hand, given the fact that the performance of FSA is lim-
Manuscript received November 9, 2010; approved for publication by Homay-oun Yousefizadeh, Division II Editor, June 17, 2011.
This work was supported in part by NSFC (No. 61072067), the 111 Project(B08038), the Project ISN 1001004, and Shaanxi Industrial Science and Tech-nology Project (2009K01-46).
The authors are with the State Key Laboratory of Theory and Key Technolo-
gies of Integrated Services Networks, Xidian University, Xian, China, email:[email protected], [email protected], [email protected].
ited by the initial frame size, the performance of EB-FSA is
also affected by this factor. On the other hand, EB-FSA re-
quires an estimation phase with a fixed framed size before iden-
tification phases. While using a large frame size in the esti-mation phase leads to the wastage of time slots, the use of a
very small frame size requires an increased number of time
slots in the estimation phase. Hence, a simple and effective
method is required for choosing an appropriate frame size for
unknown tags in the estimation phase. In [9], a reservation-based protocol is used to achieve a high system throughput,
but a long reservation-bit sequence significantly increases the
complication of tag design. In addition, too many reservation
bits overlap temporally, which greatly deteriorates the demod-
ulation performance of the reservation-bit sequence. In [10],a capture-aware access control method for improving the sys-
tem throughput of slotted-ALOHA-based arbitration protocol is
proposed. The use of this method results in a limited improve-
ment in the system throughput. Slotted ALOHA is adopted
for the standard ISO/IEC 18000-6 standard [11]. In [13] and
[14], RFID-arbitration-protocolperformance evaluation and im-
provement based on the ISO/IEC 18000-6 standard type C are
presented.
The aforementioned protocols are more effective for a pas-
sive RFID system. A passive tag backscatters reply signals, de-pending on the continuous waves transmitted by a reader. A pas-
sive tag can not work independently without utilizing the reader
radiation. In other words, a passive tag cannot listen indepen-
dently to a wireless channel and actively transmit data. However,when powered by a battery, an active tag can listen to a wireless
channel as well as can transmit data actively. Currently, framed-
slotted ALOHA is adopted as the arbitration protocol for the
ISO/IEC 18000-7 standard for active RFID applications [12].
The usual application of active RFID are in logistics, assetmanagement, real-time location system (RTLS), and so on. For
these applications, fast tag identification and collision arbitra-
tion are still the key technical challenges. In a general wireless-
network node device, the media access control (MAC) layer di-rectly controls the actions of the wireless communication mod-ule, which is regarded as the main component responsible for
energy dissipation. An active tag is similar to a wireless net-
work node with limited energy, and the arbitration protocol in a
RFID system functions as a MAC protocol in a general wireless
network system. Therefore, a good arbitration protocol shouldhave low energy consumption, high system throughput, and be
as simple as possible.
To decrease communication overhead and better system
throughput for an active RFID system, an efficient collision-free
arbitration protocol is presented in this paper. Our protocol is
different from slotted ALOHA. In brief, a new method for colli-
1229-2370/12/$10.00 c 2012 KICS
-
7/26/2019 Collision Free RFID Tag
2/6
WANGet al.: COLLISION-FREE ARBITRATION PROTOCOL FOR ACTIVE RFID SYSTEMS 35
Fig. 1. Modified T-R frame structure.
sion detection and collision avoidance is introduced. In our pro-
posed protocol, a reader can determine whether tags are collid-
ing by detecting the pulses, that are added into the tag-to-reader
(T-R) frame. When a collision occurs, the reader transmits abusy tone to avoid unnecessary transmission and uses a polling
process to access the collision tags quickly by using pulse po-
sition ID. In accordance with the description given above, the
proposed arbitration protocol is named collision-free ALOHA(CFA).
The rest of this paper is arranged as follows. In Section II,
slotted ALOHA arbitration protocol for ISO/IEC 18000-6 and
18000-7 are introduced. The proposed arbitration protocol is de-
scribed in Section III. In Section IV, a theoretical throughput
analysis and simulation results are presented. Finally, Section Vconcludes the paper.
II. SLOTTED ALOHA ARBITRATION PROTOCOL
The slotted ALOHA arbitration protocol is adopted for the
ISO/IEC 18000-6 standard type C [11]. In this standard, a readerstarts an inventory process by broadcasting a command Queryafter initialization. Query contains a parameter Q, which im-
plies that the tag population estimated by the reader is2Q. UponreceivingQuery, participating tags pick a random number in the
range[0, 2Q 1]. Tags that pick zero reply immediately in thecurrent slot, where as those that pick a nonzero number do not
reply. If only one tag replies, it is successfully identified by the
reader. If more than one tag reply in the same time slot, a colli-
sion occurs and no tag is identified. The reader may adjustQ to
obtain optimum performance. An algorithm that can be used bythe reader to choose a appropriate Qaccording to tag responses
in the previous time slot, referred to as Q algorithm in the fol-
lowing sections, is presented in [11].A variation of slotted ALOHA, framed-slotted ALOHA, is
adopted for the ISO/IEC 18000-7 [12]. A reader initiates a tag
collection process through standard command collection. Tags
receiving collection randomly select a slot to respond. The selec-
tion is determined by a pseudo-random number generator. Uponselecting a slot number, a tag waits for a time delay before re-
sponding; this delay is equals to the time of slot number multi-
plied by the slot delay. The total number of slots is determined
by the current window size (frame length). The reader dynam-
ically chooses an optimum window size for the next collectionround on the basis of the number of collisions in this round.
The use of slotted ALOHA and framed-slotted ALOHA canresult in an optimum throughput of 0.368 [4], [6], [13]. The use
Fig. 2. Frame structure based on the ISO/IEC 18000-7 standard.
of the framed-slotted ALOHA arbitration protocol adopted for
the ISO/IEC 18000-7 standard results in a system throughput of
about 0.328. The deference of 0.04 from the theoretical value of
0.368 is mainly due to the estimation error in the tag population.
System throughput is usually defined as the ratio of the totalnumber of successfully accessed tags and the total number of
time slots used by the reader.
III. PROPOSED ARBITRATION PROTOCOL
A. Collision Detection and Collision-Free Mechanism
In our proposed protocol, collision detection and a collision-
free mechanism are realized by a new data frame in the T-
R link. As shown in Fig. 1, the new T-R frame is a modifi-
cation of the T-R frame based on the standard ISO 18000-7,
which is shown in Fig. 2. The differences between the two T-Rframes are that a pulse burst duration (PBD) and a busy-tone-
detection delay (BTDD) are introduced between the preamble
and data. However, in the new T-R frame, the first data byte for
data communication timing is still put on the head of the data
part [12]. The PBD is divided into several small time slots called
subslots. After receiving a command from the reader, for exam-ple, collection, tags reply with the proposed frame in which a
pulse is transmitted in a random subslot. When the transmis-
sion of the preamble and the pulse is finished, tags switch their
transmitter to their receivers and wait for a busy tone in theBTDD. These pulses are detected and recorded by the reader,
and the number of pulses represents the number of collision
tags. When more than one pulse is detected in the PBD, the
reader transmits a busy tone in the BTDD. After receiving busytone, tags that want to reply in the current slot halt the transmis-
sion of the real data part. This is done to avoid the unnecessary
transmission. If the busy tone is not received, tags again switch
to their transmitter and data transmission continues. The aboveprocess is termed as a collision-free mechanism.
For easy detection, pulses can be shaped or modulated before
transmission. Protection intervals are added at the beginning and
end of the PBD to avoid inter-symbol interference. Accordingto the ISO/IEC 18000-7 standard, the pulse width can be set as
18s or 30 s, and other values can also be determined eas-
ily. The width of BTDD should satisfy the minimum time re-
quirement of the transceiver switch and the pulse detection.
B. Protocol Description
The proposed arbitration protocol is based on slotted ALOHA
and has the following steps.
1) The reader initiates an inventory round through the command
-
7/26/2019 Collision Free RFID Tag
3/6
36 JOURNAL OF COMMUNICATIONS AND NETWORKS, VOL. 14, NO. 1, FEBRUARY 2012
(a)
(b)
Fig. 3. Inventory flow chart for the proposed protocol: (a) Inventoryprocess on the reader side and (b) inventory process on the tag side.
collection that contains the parametersQ and Ws. Upon re-
ceiving this command participating tags pick a random value
in the range[0, 2Q 1]. Tags that pick zero reply immedi-ately. Tags that pick a nonzero value try to reply in the nextslot. Q algorithm defined in [11]is used to choose the value
ofQ. The reader refreshes Q each time before sending col-
lection.
2) Tags that reply in the current slot should transmit a pulse in a
randomly selected subslot in the range [0, Ws 1].Ws rep-resents the number of subslots in the PBD.
3) The reader receives the reply signals from tags and detectsthe pulse number in the PBD. The number of detected pulses
is then considered as the estimation value of the number ofcollisionsNc in the current slot. If no pulse or signal is de-
tected, the reader starts a new inventory. If only one pulse is
detected, i.e., Nc = 1, the reader waits for the data transmis-sion. It means that a tag completes the frame transmission
when a busy tone is not received. When a tag is identified, itdoes not participate in the next inventory round [11], [12].
4) When more than one pulse is detected, i.e., Nc > 1, it indi-cates Nc tags in the current slot, and the reader transmits a
busy tone in the BTDD. IfNc is more than a given thresh-
old Nth, it results in step 1) being repeated and the whole
procedure is started over again. Otherwise, the reader startsa polling process through command polling that contains
pulse position ID, i.e., subslot sequence numbers. The reader
records the sub-slot sequence numbers of all the subslots in
which the pulses are located. The reader then accesses the
collision tags by polling these subslot sequence numbers oneby one. When a received position ID is equal to the selected
subslot sequence number, the tag responds topolling. To en-
sure that only the collision tags respond to polling, one-bitpolling ID (PID) is set into all tags. Ifcollectionis received,
tags initiate the PID with zero, i.e., PID = 0, and if a busytone is received, it implies that tags collided in the last slot,
i.e., PID = 1. Whenpollingis received, tags with PID = 1reply with the frame shown in Fig. 2 instead of the proposed
frame shown in Fig. 1 to reduce the transmission delay.
5) If collisions still occur during the polling process, which can
be detected by a cyclic-redundancy check, the reader gives
up these collision tags in this round of polling. After polling
all detected subslot sequence numbers, the reader repeats
the procedure from step 1) and starts a new inventory round
throughcollection.The inventory flow chart for CFA is shown in Fig. 3. Here,
A and B represent the frames in Figs. 1 and 2, respectively.
It should be noted that the reader is authorized to terminatethe polling process and start a new inventory round at any time.
IV. ANALYSIS AND SIMULATION
A. Theoretical System Throughput
GivenN slots andn tags, the probability of having qtags in
one slot is given by a binomial distribution:
p(N , n , q ) =n
q1
Nq
N 1Nnq
(1)
where p(N,n, 1) is the probability of a successful tag access.As is well known, under the only condition of N = n, theprobability reaches a maximum value of 0.368, which is the
maximum theoretical system throughput of slotted ALOHA or
framed-slotted-ALOHA-based arbitration protocols.For a given Nth(Nth 2), the theoretical system throughput
of the proposed protocol is given by
Ps= p(N,n, 1) + Np
1p(N,n, 0) + 1p(N,n, 1) + 1P(Nc > Nth) + Sp(2)
where Np is the average number of tags successfully accessedduring the polling process. Sp is the average number of occu-
-
7/26/2019 Collision Free RFID Tag
4/6
WANGet al.: COLLISION-FREE ARBITRATION PROTOCOL FOR ACTIVE RFID SYSTEMS 37
Fig. 4. Theoretical system throughput for different threshold values.
pied time slot during the polling process. The expression for Npis
Np =nci=2
p(N , n , i)Wsp(Ws, i, 1) (3)
where nc is defined as the actual number of participating tags
when Nccollision tags are detected using pulse detection in one
slot andnc Nc. In this case, there is the following relation:
Nc = Ws(1 p(Ws, nc, 0)) (4)
Spis given by
Sp =nci=2
p(N , n , i)(Ws(1 p(Ws, i, 0)) + 1) (5)
To obtain the upper bound of the theoretical system through-
put, let Ws . Thus,we can get Nc = nc from (4). Thiscondition implies that there are no pulse collisions in subslots
in our theoretical analysis. Then, in (3) and (5), the value ofncis equal to Nth because the polling process is performed when
Nc Nth. Moreover,
P(Nc > Nth) =n
i=(Nth+1)
p(N , n , i) (6)
The system throughput can then be calculated using (2). For
example, for n = 1000 (it should be noted that the algorithmcan achieve a constant system throughput for different number
of tags), the theoretical throughput for different threshold value
shown in Fig. 4. For Nth 6, the theoretical throughput isalmost constant at 0.612.
B. Simulation Results
To analyze the performance of the proposed protocol, we
focus on two metrics: System throughput and communication
overhead.
The average number of collisions in one collision slot is 2.39for the slotted ALOHA arbitration protocol [4], [15]. Therefore,
Fig. 5. Collision probability versus number of tags.
Fig. 6. Relation betweenNc and nc.
Nth should be larger than 2.39 in order to prevent collisions in
slots for most cases. The probability of different number of tags
colliding in one slot is shown in Fig. 5. When the number of col-
lision is more than 6, the collision probability is almost zero. Bythe analysis results obtained from Figs. 4 and 5, we set Nth= 6
as the optimal value in our simulation.The value ofWs should be large enough to decrease the col-
lision of pulses in a subslot. However, too many subslots will
introduce an additional access time delay. The relationship be-tweenNcand ncis described by (4). Fig. 6 shows the relation-
ship between the detection results ofNcand ncfor Ws= 8andWs = 16. The average number of colliding tags (simulationresult) is about 3 when Q algorithm is adopted to estimate the
number of tags. Thus, the value ofWs = 8and Ws = 16cansatisfy the purpose of low collision probability, as well as a low
additional access time delay.
The simulation results for the proposed protocol, CFA, are
shown in Fig. 7. By setting Ws= 16andNth= 6in our simu-lation, the use of CFA result in system throughput value of 0.6,
-
7/26/2019 Collision Free RFID Tag
5/6
38 JOURNAL OF COMMUNICATIONS AND NETWORKS, VOL. 14, NO. 1, FEBRUARY 2012
Fig. 7. System throughput of CFA.
which is very close to the theoretical value 0.612. This differ-ence is ascribed to the estimation errors in the determination of
the number of tags from Q algorithm and pulse detection. We
compare CFA with the existing ALOHA based arbitration pro-tocols for an active RFID system, for example, EB-FSA (= 1)[8] and framed-slotted ALOHA (FSA) [12]. CFA shows an ob-
vious improvement in system throughput. In our simulation, the
channel conditions and capture effect are not taken into account.
CFA not only improves the system throughput but also re-duces the communication overhead.
The communication overhead contains all the transmission
data by the reader and tags. For CFA, the overhead includes
reader commands, for example, collection and polling, thepreamble of the T-R frame, the data part of the T-R frame, andthe added parts of PBD and BTDD in the proposed frame ar-
chitecture. For FSA, the overhead includes reader commands,
for example,collection, the data part of the T-R frame, and the
preamble of the T-R frame. We record the transmission times
for all types of transmission packets from the reader and tagsto determine the communication overhead. We set Ws = 16andNth = 6in the CFA simulation. It is assumed that readercommands have the same length. Fig. 8 illustrates the commu-
nication overhead for CFA and FSA in our simulation. When
compared with FSA, CFA reduces reader-command transmis-sion times from 3221 to 1667 and reduce data transmission more
efficiently, which decreases from 7541 to 1096 for an inventoryof 1000 tags.
The only additional overhead is a small amount of data per-
taining to PBD and BTDD transmission. Both the time delayand energy consumption corresponding to PBD and BTDD are
very low, and the delay is dependent on the pulse width and the
number of subslots. For CFA, setting the number of sub-slots as
8 or 16 is enough for the protocol to perform well. For example,
whenWs = 16and the pulse width is set as 18s, the PBD isonly 288s (several bits). When compared to the length of the
T-R data which can possibly be hundreds of bits, the time-delay
cost is negligible.
Furthermore, we defi
ne the overhead ratio (Oratio) for analyz-ing the communication overhead for the arbitration protocols,
Fig. 8. Communication overhead for CFA and FSA.
Fig. 9. Communication overhead ratio for CFA and FSA.
which is given as follows
Oratio=packet transmission times
number of identified tags (%). (7)
The overhead ratio defined by (7) is shown in Fig. 9. CFA
obviously reduces all types of transmission overhead, which re-
sults in low time delay and low energy consumption.
Moreover, CFA established a waiting-time threshold forempty-slot detection. If no signal is detected within the time
threshold, the reader will start a new round to speed up the in-
ventory process. In our system throughput analysis, empty slotsaccount for about one third of the total slots. Empty-slot detec-
tion can increase the relative system throughput.
V. CONCLUSION
We proposed a CFA protocol to prevent the collision of tags
in active RFID systems. For the given parameters, CFA achieved
a system throughput of about 0.612, as shown by theoretical
analysis and simulation results. When compared with the sys-tem throughput of FSA for the ISO 18000-7 standard, and even
-
7/26/2019 Collision Free RFID Tag
6/6
WANGet al.: COLLISION-FREE ARBITRATION PROTOCOL FOR ACTIVE RFID SYSTEMS 39
the EB-FSA ( = 1) [8], CFA showed a significant improve-ment in the system throughput. Moreover, collision avoidance
and empty-slot detection by CFA greatly reduced the communi-
cation overhead and access time delay, which are very important
for battery-powered active RFID tag.
The proposed arbitration protocol can be backward-compatible with a slotted-ALOHA-based RFID system that in-
cludes the Q algorithm for the estimation of the number of
tags. Under this circumstance, the proposed protocol only per-
forms the basic process besides the collision resolve process. In
short, CFA is a very simple protocol, the use of which results inlow improvement cost for current products.
REFERENCES
[1] C. Law, K. Lee, and K. Y. Siu, Efficient memoryless protocol for tag iden-tification, inProc. Int. Workshop on Discrete Algorithms and Methods for
Mobile Computing and Communications, USA, Aug. 2000, pp. 7584.[2] R. Don and C. W. Hush, Analysis of tree algorithms for RFID arbitration,
inProc. IEEE ISIT, USA, Aug. 1998, pp. 107116.[3] H. Vogt, Efficient object identification with passive RFID tags, in Proc.
Int. Conf. Pervasive Comput., Swiss, Aug. 2002, pp. 98113.[4] J. Cha and J. Kim, Novel anti-collision algorithms for fast object identi-
fication in RFID system, in Proc. Int. Conf. Parallel Distrib. Syst., Japan,July 2005, pp. 6367.
[5] B. Zhen, M. Kobayashi, and M. Shimizu, Framed ALOHA for multipleRFID objects identification, IEICE Trans. Commun., vol. E88-B, no. 3,pp. 991999, 2005.
[6] C. Floerkemeier, Bayesian transmission strategy for framed ALOHAbased RFID protocols, inProc. IEEE Int. Conf. RFID, USA, Mar. 2007,pp. 228235.
[7] M. A. Bonuccelli and F. Lonetti, Tree slotted aloha: A new protocol fortag identification in RFID Networks, in Proc. IEEE Int. Symp. World ofWireless Mobile and Multimedia Networks, USA, June 2006, pp. 603608.
[8] J. Park, M. Y. Chung, and T. J. Lee, Identification of RFID tags in framed-slotted ALOHA with robust estimation and binary selection, IEEE Com-mun. Lett., vol. 11, no. 5, pp. 452454, May 2007.
[9] C. P. Wong and Q. Y. Feng, Grouping based bit-slot ALOHA protocol for
tag anti-collision in RFID systems,IEEE Commun. Lett., vol. 11, no. 12,pp. 946948, Dec. 2007.
[10] W. J. Shin and J. G. Kim, A capture-aware access control method forenhanced RFID anti-collision performance, IEEE Commun. Lett., vol. 13,no. 5, pp. 354356, May 2009.
[11] ISO/IEC, 18000-6 Radio frequency for item management, Part 6: Param-eters for air interface communications at 860 MHz to 960 MHz, p. 110,2006.
[12] ISO/IEC, 18000-7 Radio frequency for item management, Part 7: Param-eters for an active RFID air interface communications at 433 MHz, p. 3,2004.
[13] Y. Maguire and R. Pappu, An optimal Q-algorithm for the ISO 18000-6CRFID protocol, IEEE Trans. Autom. Sci. Eng., vol. 6, no. 1, pp. 1624,Jan. 2009.
[14] Y. C. Ko, S. Roy, J. R. Smith, H.-W. Lee, and C.-H. Cho, RFID MAC per-formance evaluation based on ISO/IEC 18000-6 type C, IEEE Commun.
Lett., vol. 12, no. 6, pp. 426428, June 2008.
[15] F. C. Schoute, Dynamic frame length ALOHA,IEEE Trans. Commun.,vol. 31, no. 4, pp. 565568, Apr. 1983.
Honggang Wang was born in 1977, and is a Ph.D.candidate. He received the M.S. degree in commu-nication and information system from Xidian Univer-sity in 2005. He is currently working on the energyefficiency physical layer and communication protocoldesigns of RFID and WSN.
Changxing Pei was born in 1945, Professor, Advi-sor for doctoral students at Xidian University. His re-search interests include wireless communication andnetwork measurement, quantum communication, andanti-jamming communication.
Bo Su was born in 1982, Ph.D. candidate. He com-pleted his B.Sc. from Xidian University. Now, he iscurrently studying at the College of Telecommunica-
tion at Xidian University for his Ph.D. and his majorresearch fields include wireless ad hoc & sensor net-works.