Research Article  Open Access
Shanjin Wang, Zhonghua Li, Chunhui He, Jianming Li, "An Effective SchedulingBased RFID Reader Collision Avoidance Model and Its Resource Allocation via Artificial Immune Network", Mathematical Problems in Engineering, vol. 2016, Article ID 7854154, 11 pages, 2016. https://doi.org/10.1155/2016/7854154
An Effective SchedulingBased RFID Reader Collision Avoidance Model and Its Resource Allocation via Artificial Immune Network
Abstract
Radio frequency identification, that is, RFID, is one of important technologies in Internet of Things. Reader collision does impair the tag identification efficiency of an RFID system. Many developed methods, for example, the schedulingbased series, that are used to avoid RFID reader collision, have been developed. For schedulingbased methods, communication resources, that is, time slots, channels, and power, are optimally assigned to readers. In this case, reader collision avoidance is equivalent to an optimization problem related to resource allocation. However, the existing methods neglect the overlap between the interrogation regions of readers, which reduces the tag identification rate (TIR). To resolve this shortage, this paper attempts to build a readertoreader collision avoidance model considering the interrogation region overlaps (R2RCAMIRO). In addition, an artificial immune network for resource allocation (RAIROaiNet) is designed to optimize the proposed model. For comparison, some comparative numerical simulations are arranged. The simulation results show that the proposed R2RCAMIRO is an effective model where TIR is improved significantly. And especially in the application of readertoreader collision avoidance, the proposed RAIROaiNet outperforms GA, optaiNet, and PSO in the total coverage area of readers.
1. Introduction
As a wireless automatic identification and data capture technique, RFID (radio frequency identification) is employed to automatically identify the targets. With the main advantages of noncontact and fast reading rate for multiple targets, RFID has been applied widely in logistics, supply chain management, transportation, manufacturing, positioning, and many other fields [1, 2].
For RFID applications with many tags within a large deployment region, multiple or even dense readers are necessary to enhance the identification efficiency. If R2RCP (readertoreader collision problem) happens, the identification efficiency of the systems will be reduced inevitably. Therefore, how to solve R2RCP has become one research focus. In general, schedulingbased reader collision avoidance methods are suitable for stationary reader scenarios. In the schedulingbased series, one or more kinds of communication resources, that is, time slots, channels, and power, are allocated to readers to maximize the tag identification efficiency of RFID systems. Further, intelligent algorithms are applied to optimize the utility of RFID systems. In [3], the reader collision problem is formulated as 0/1 integer programming problem and a simulated annealing algorithm is introduced to solve it. In [4], time slots are allocated by using color graphing and PSO. A resource allocationbased model is built in [5] and is optimized by using the genetic algorithm (RAGA). Such model is improved as a readertoreader collision avoidance model (R2RCAM) by [6]. And a well designed artificial immune system is introduced to optimize R2RCAM, which has better performance in solving R2RCP by comparison with RAGA and a random method (RM). These achievements indicate that intelligent algorithms are effective to deal with the reader collision problems from the viewpoint of resource scheduling. Note that a family of coveragebased methods [7, 8] deal with the reader collision problem by adaptively controlling the communication power of readers and minimizing the overlap between the interrogation region. Inspired by such spirit, it is worth to consider the overlap of the interrogation regions of readers and the resource of power, while R2RCAM without consideration about overlap is not suitable for the practice of RFID applications.
In order to overcome the defects of canonical R2RCAM, this paper proposes an effective R2RCAM considering the interrogation region overlap (R2RCAMIRO). The proposed R2RCAMIRO takes into account not only the overlap but also the resource of power and the tag identification capacity of a reader. In addition, a revised artificial immune network (aiNet), namely, RAIROaiNet, is designed to optimize R2RCAMIRO. The proposed R2RCAMIRO is expected to improve the tag identification rate with limited communication resources for multiple readers, where the proposed RAIROaiNet is used.
The rest of our paper is arranged as follows. Section 2 reviews related theories and principles including R2RCP, R2RCAM, and the basic artificial immune network. Section 3 proposes R2RCAMIRO and RAIROaiNet. And Section 4 proves the effectiveness of the proposed model and compares RAIROaiNet with RAGA [5], PSO [4], and optaiNet [9] in the area of effective interrogation region by numerical simulations. And finally, the conclusions are made in Section 5.
2. Reviews of Related Theories and Principles
2.1. ReadertoReader Collision Problem (R2RCP)
A basic RFID system is composed of some tags, one or more readers, and an application system, as shown in Figure 1. Multiple readers operating within a group become a reader network. When a tag attached to the objects to be identified enters the interrogation region of a reader, it will be powered and activated. Then, the tag sends its corresponding information to the reader. The reader identifies the tag by receiving information and sends the corresponding data to related application system for further processing and storage. And the readers operate according to the commands of the application system.
In multiplereader scenarios, the backscatter signal of a tag is easily disturbed. This is because the backscatter power is much weaker than the transmitting power of any neighboring interfering reader. As a result, R2RCP will happen and decrease the desired reader’s effective interrogation radius.
Figure 2 shows an example of R2RCP with two readers, where one is a desired reader and the other is an interfering reader . The distance between and is defined as . If only is operating, that is, is not interfered; it can harvest a maximum interrogation radius with the value of . However, if is operating simultaneously with , the interrogation radius of reader will reduce to . Further, strong enough interference from will probably make smaller than which is the distance from the target tag to . Consequently, is not able to detect successfully. To sum up, the radius of the desired reader follows
2.2. Canonical ReadertoReader Collision Avoidance Model (R2RCAM)
Assume that readers are deployed randomly in a specified region with the area of . channels and slots are available to be allocated for these readers.
For clarification, three variables are defined as in Table 1.

And can be calculated by solvingwhere is the signaltointerferenceplusnoise ratio (SINR) for in the slot, is the desired minimum value of SINR to identify tags, presents the normalized spectrum power, presents reflection coefficient of effective power, represents the gain of transmitting antenna, represents the gain of receiving antenna, is the referenced path loss at 1 m distant from a reader, is the exponent of path loss that is not less than two, and denotes the fading coefficient. The signal fading is ignored due to the lineofsight distance between readers. In addition, represents the operating power of in the slot. According to EPC global C1G2 [10], denotes the spectrum mask level and is also a function with the arguments of the channel interval between readers. is the channel number used by in the slot, where . Note that is a 2value function which equals 1 if is operating at the slot and equals 0 otherwise. Please see [6] for detailed derivations.
However, must be not more than ; that is,where is the required minimum power for tag operation, means the modulation depth, and is the wavelength of in the slot.
Accordingly, can be determined byIn R2RCAM, the utility of an RFID system is evaluated by the interrogation region area of all the readers which is defined as . To maximize , R2RCAM is formulated as
2.3. Artificial Immune Network (aiNet)
To solve theoretical or engineering problems which can be generalized as optimization problems, for example, R2RCAM, intelligent algorithms are generally employed. aiNet is a main member in artificial immune systems, which is enlightened by biological immune systems to solve realworld problems [11].
Take the canonical optaiNet [9] as an example to introduce the structure of aiNet. The optaiNet uses real number encoding and has five operators, that is, cloning, mutation, selection, suppression, and recruitment. In the cloning phase, optaiNet uses the uniform cloning operator, where a fixnumber cloning is conducted for each antibody individual, and all the clones except the parent one experience the Gaussian mutation followingThen, only one antibody, whose affinity is the highest among offsprings, is selected to enter the next generation. In (6), is a random variable following Gaussian distribution whose mean is zero and standard deviation is 1, is the control coefficient, is the mutated antibody of , and is the function of normalized affinity in the interval . If the average affinity looks stable, the suppression operator will be triggered. For any two antibodies, if their distance is smaller than a suppression threshold , the one with lower affinity will be removed. Then, a number of antibodies are randomly generated and merged into the antibody population to keep the population diversity. Repeat the above process until it is terminated.
3. The Proposed R2RCAMIRO Optimized by RAIROaiNet
3.1. R2RCAMIRO
3.1.1. Modeling of R2RCAMIRO
To solve theoretical optimization problem, let us assume that tags are distributed uniformly in the deployment region and the maximum transmitting power of readers is . And the other assumptions are the same as those of R2RCAM.
Taking into account the identification capacity of a reader in a slot, must satisfywhere is the maximum number of tags that can identify in one slot. As a result, we can getAccording to (3) and (8), is determined byTag identification rate (TIR) is a measure of the RFID system performance. TIR is defined as the ratio of the number of identifiable tags to the total number of tags. Because of the assumption that the tags are distributed uniformly, TIR is equal to the ratio of the total interrogation area to the reader deployment region area. That is, In the canonical R2RCAM, is calculated easily by (5). However, there may be an overlap between the interrogation regions of some readers. Thus, the canonical R2RCAM does not meet the practice requirement and decreases TIR of the RFID system. Let represent the interrogation region of the reader . And in the proposed R2RCAMIRO, the total interrogation region followswhere is the interrogation region of in the slot.
Consequently, R2RCAMIRO can be formulated as
3.1.2. Analysis of R2RCAMIRO
Assume that when the maximum TIR is obtained, a reader works in slot ( and ) and the interrogation radii are , respectively. Without loss of generality, it is assumed that . As a result,This indicates that if just works in slot, its interrogation area will not change. Assume that another reader () works in slot (, , , and ) and its interrogation radius in slot is denoted by . If does not work in slot, the theoretical interrogation radius of will increase because its total interference decreases. With the constraints of the maximum reader interrogation radius and the identification capacity, the interrogation radius may be unchanged. Thus, and can be obtained. Thus, the total interrogation region of satisfiesThus, the total area of the interrogation regions of all the readers satisfiesClearly, the total interrogation area of an RFID system when each reader just works in one slot is not less than that when some readers operate in two or more slots. Thus, only one slot can be allocated to each operating reader in R2RCAMIRO.
3.1.3. Calculation Procedure of
Due to the interrogation region overlap, cannot be calculated directly. Thus, a grid method is employed to compute . Taking Figure 3 as an example, the details of the grid method are depicted as follows.
Step 1. Determine the region of all the circles shown as the red rectangle with the length of and the width of .
Step 2. Divide the region into ( and ) small rectangles with the area of , where determines the accuracy.
Step 3. Mark those small rectangles whose centers lie in any one of the circles as shown in yellow.
Step 4. Count the number of the marked small rectangles and use the total area of these rectangles as the result of ; that is, .
If the parameter is large, the accuracy will be impaired. However, smaller will result in a significant increase of the computational complexity. So, a preprocessing procedure is necessary to decrease the complexity by reducing the number of the circles and the area of the rectangular region. There are four situations for a single circle, where () it lies in some circle; () it is independent and does not intersect with any other circles; () it intersects with only one circle; or () it intersects with two or more circles. For any circle, if it is in , it can be removed without having an impact on the result. If it is in , its area can be calculated easily. If it is in , its area without the overlap is added to the result. And then, this circle can be removed. It is assumed that a circle with the centric point intersects with the other circle with the centric point at point and point . And then the area of the overlap can be obtained bywhere is , is , and is the distance from the point to the point . For , the grid method is employed.
Taking Figure 4 as an example, the details of the preprocessing procedure are depicted as follows.
Step 1. Find the circles in some other circles, such as the one in the red solid box in Figure 4(a). And then remove it.
Step 2. Find the independent circles, such as the two in the red solid box in Figure 4(b). Calculate their area and add it to the result. And then remove them.
Step 3. Find the circles intersected with only one other circle, such as the one in the red solid box in Figure 4(c). Calculate the area without the overlap as shown in green by (16) and add it to the result. And then remove it.
Step 4. If new independent circles or ones intersected with another circle appear, repeat Steps 2 and 3 until any circle intersects with two or more other ones.
Step 5. Separate the rest of the circles into groups, where the intersected circles belong to the same group and circles in different groups do not intersect with each other, as shown in Figure 4(d). And the area of each group is calculated by the grid method.
3.2. RAIROaiNet
By improving the main immune operators, artificial immune networks become efficient, adaptive, and suitable for the practical applications. To find the optimal scheme of time slots, channels, and power for an RFID reader network, this subsection designs RAIROaiNet to solve R2RCAMIRO. The technical details of the proposed algorithm are introduced in the following subsections.
3.2.1. Encoding Format
A hybrid encoding format is used in RAIROaiNet uses. Table 2 presents the encoding format used by the antibody. In Table 2, each antibody includes three segments of the slot, the channel, and the power, where is an integer and denotes the time slot, is an integer and denotes the channel, and is a real number and denotes the power. Note that means that does not operate.

3.2.2. Affinity Function
To evaluate each antibody individual about the resource scheduling solution, an affinity function is designed according to R2RCAMIRO presented in Section 2, which is presented as
3.2.3. Initialization
In the initialization, an antibody population with individuals is constructed randomly. And each antibody must be feasible, where , , and for and .
3.2.4. Cloning Operator
The uniform cloning operator is used, where each antibody is reproduced for a constant multiplier of . The uniform cloning is simple to implement and can remarkably depress the computational consumption. All the cloned offsprings except the parent antibodies will execute the following mutation operator in order to increase the population diversity.
3.2.5. Mutation Operator
Because the proposed RAIROaiNet uses hybrid encoding, a differentiated mutation operator is employed, in which different segments (i.e., the slot, the channel, and the power) of each antibody experience different mutation processes. In detail, the random uniform mutation operator is employed for the slot segment and the channel segment, where a randomly selected bit is changed randomly in its set of feasible solutions. And for the power segment, the used Gaussian mutation operator is given in (6). Note that only one randomly selected segment experiences the mutation for each offspring. The pseudocode of the mutation process is shown in Pseudocode 1.

3.2.6. Suppression Operator and Recruitment
The similarity between any two antibodies is evaluated by the measure of hybrid distance (). It is obtained by the sum of the normalized distance of each segment. The corresponding formula is given in (18)where and are the Hamming distance of the slot segment and the channel segment, respectively, is the Euclidean distance of the power segment, and is the maximum Euclidean distance which equals . The higher the hybrid distance is, the better diversity the antibody population has. Thus, in order to keep the diversity of the antibody population, once the hybrid distance of two antibodies is smaller than a threshold , the antibody with lower affinity will be suppressed. The threshold is determined by such defined similarity followingThe desired goal is to adjust the threshold dynamically and to remove those of similar antibodies. After the suppression operator, some new antibodies are randomly produced to keep the antibody population at the number of .
The flowchart of our proposed RAIROaiNet is shown in Figure 5. The left orange box shows the flowchart of optaiNet, while the right green box highlights the revised immune operators of RAIROaiNet. In RAIROaiNet, each antibody experiences the uniform cloning operator, the differentiated mutation operator, the hybrid similarity evaluation, the similaritybased suppression operator, and the recruitment in each generation. Repeat the above process until it is terminated.
4. Simulations and Results
4.1. Environment for Simulation
In the numerical simulations, suppose that readers are randomly deployed in a square area of 100 × 100 m^{2} and in the multiplereader scenarios, where readers and tags transmit in the same channels following EPCglobal C1G2 [10]. All parameters in R2RCAMIRO are listed in Table 3.

4.2. Simulation Results and Discussion
The effectiveness of the proposed R2RCAMIRO optimized by the designed RAIROaiNet is discussed in this subsection. And furthermore, the efficiency of the designed RAIROaiNet is examined by comparison with RAGA [5], PSO [4], and optaiNet [9] in the total coverage area of the readers.
For all algorithms in the simulations, the population size is set to 50, the maximum number of generations is set to 1000, and all the numerical simulations are repeated for 50 runs. In the proposed RAIROaiNet, the encoding format has been introduced in Section 3.2.1, the cloned multiplier is 10, the control parameter of mutation is 100, and the suppression parameter is 10%. RAGA uses hybrid encoding; in other words, the integer encoding is used in both the slot segment and the channel segment, and the 6bit binary encoding for is used in the power segment. PSO uses real number encoding. And, optaiNet also uses real number encoding and has the same cloned copies and control parameters of mutation to the proposed RAIROaiNet. Other parameters of RAGA, optaiNet, and PSO used in the simulations are referred to in [4, 5] and [9], respectively.
4.2.1. Effectiveness of the Proposed R2RCAMIRO
Figure 6 shows TIRs from two different models: the proposed R2RCAMIRO and R2RCAM. Note that the overlap is considered in R2RCAMIRO but not in R2RCAM. As shown in Figure 6, TIRs grow nonlinearly as the number of readers increases and is less than 24. When more readers are added, R2RCP become more serious, and thus the solution dimension increases more. It heavily degrades the convergence performance of RAIROaiNet. Consequently, TIRs begin to decrease. These two models have similar TIR with less than 10 readers, while TIR of the proposed R2RCAMIRO is much better than that of R2RCAM. For example, with 20 readers, the proposed R2RCAMIRO harvests an improvement of 11.9%.
Assume that 10 channels are available for 20 readers, and the maximum power is 1 W. In this case, Figure 7 shows the effect of the number of available time slots on TIR. Seen from Figure 7, when the slot number increases from 3 to 15, TIR increases nonlinearly and is gradually approximate to 38% optimized by the proposed R2RCAMIRO, while TIR is lower than 36%, if R2RCAM is used.
Assume that 5 time slots are available for 20 readers, and the maximum power is 1 W. In this case, Figure 8 presents the effect of the number of available channels. In Figure 8, TIRs of the two models are similar when the number available channels is less than 6, while the proposed R2RCAMIRO shows its superiority obviously with more available channels. In particular, with 20 channels, TIR of the proposed R2RCAMIRO can reach 33.6%, which improves R2RCAM by 16.7%.
Assume that 5 time slots and 10 channels are available for 20 readers. In this case, Figure 9 describes the effect of the power. As shown in Figure 9, TIR increases when the power becomes greater and is approaching 31% for the proposed R2RCAMIRO, while it is approaching 29% for R2RCAM. The proposed R2RCAMIRO improves TIR by 7.9% with the maximum power of 2 W compared with R2RCAM.
The results from Figures 6–9 illustrate that R2RCAMIRO is effective and outperforms R2RCAM, where the overlap is ignored in the tag identification rate with limited resources.
4.2.2. Comparison in the Total Coverage Area of the Readers
Assume that 5 time slots and 10 channels are available for 20 readers, and the maximum power is 1 W. In this case, Figure 10 shows the total coverage area of readers based on the proposed model optimized by RAGA, optaiNet, PSO, and the proposed RAIROaiNet.
As shown in Figure 10, these four algorithms perform similarly to some extent in the optimal total coverage area with less than 6 readers. This is because the dimension of the solution is so low that each algorithm can capture the global optima and some desired solution. However, as more readers are added, the dimension of the solution becomes higher, which degrades the convergence performance. And the total coverage area optimized by RAIROaiNet is much better than those obtained by the other algorithms. In particular, with 30 readers, the proposed algorithm has an improvement of 14.69%, 49.15%, and 74.43% compared with RAGA, optaiNet, and PSO, respectively.
Figure 11 gives the graphical representations of interrogation regions with 30 readers for the best solutions optimized by RAGA, optaiNet, PSO, and the proposed RAIROaiNet, respectively.
(a) RAGA
(b) optaiNet
(c) PSO
(d) The proposed RAIROaiNet
As shown in Figure 11, it is clear that the readers, where the proposed RAIROaiNet is used, have much larger interrogation region than those by the other three algorithms. The proposed RAIROaiNet has 16 operating readers with the average radius of 3.9887 m, while RAGA has 15 operating readers with the average radius of 3.4899 m, PSO has 14 operating readers with the average radius of 3.6659 m, and optaiNet has 15 operating readers with the average radius of 3.0091 m. This indicates that the proposed RAIROaiNet has larger average radius with more operating readers and outperforms the other three algorithms in interrogation regions especially in dense reader scenarios.
5. Conclusions
In this paper, the problem of RFID readertoreader collision is studied. And an enhanced collision avoidance model (i.e., R2RCAMIRO) related to time slots, channels, and power is formulated. In the proposed model, the overlap between the interrogation regions of readers and the tag identification capacity of readers are considered. This makes R2RCAMIRO suitable for the practice of RFID applications. In addition, a revised artificial immune network (i.e., RAIROaiNet) is designed to optimize the proposed R2RCAMIRO. In RAIROaiNet, the hybrid encoding, uniform cloning, differentiated mutation, hybrid distance based similarity evaluation, and similaritybased suppression are helpful to optimize the proposed R2RCAMIRO. The simulation results show that the proposed R2RCAMIRO is effective in tag identification rate with limited communication resources and the proposed RAIROaiNet outperforms RAGA, optaiNet, and PSO in the total coverage area of readers.
Conflict of Interests
The authors declare that there is no conflict of interests regarding the publication of this paper.
Acknowledgments
This work is partially supported by the National Nature Science Foundation of China under Grants nos. 61201087 and 61471122, the Guangdong Natural Science Foundation under Grant no. S201301001182, the Science and Technology Program of Huizhou under Grant nos. 2013B020015006 and 2014B020004025, the Science and Technology Program of Zhaoqing under Grants nos. 2012G027 and 2013C003, and the Science and Technology Program of Guangzhou under Grant no. 2014J4100001.
References
 S. D. Park and H. Lee, “Selfrecognition of vehicle position using UHF passive RFID tags,” IEEE Transactions on Industrial Electronics, vol. 60, no. 1, pp. 226–234, 2013. View at: Publisher Site  Google Scholar
 G. M. Gaukler, “Itemlevel RFID in a retail supply chain with stockoutbased substitution,” IEEE Transactions on Industrial Informatics, vol. 7, no. 2, pp. 362–370, 2011. View at: Publisher Site  Google Scholar
 C.F. Lin and F. Y.S. Lin, “A simulated annealing algorithm for RFID reader networks,” in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC '07), pp. 1671–1674, IEEE, Kowloon, China, March 2007. View at: Publisher Site  Google Scholar
 T. Chen, Y. S. Yang, and B. Yang, “RFID dense reader network anticollision PSO model and solving,” in Proceedings of the 3rd International Conference on Intelligent HumanMachine Systems and Cybernetics (IHMSC '11), vol. 1, pp. 92–96, IEEE, Zhejiang, China, August 2011. View at: Publisher Site  Google Scholar
 H. Seo and C. Lee, “A new GAbased resource allocation scheme for a readertoreader interference problem in RFID systems,” in Proceedings of the IEEE International Conference on Communications (ICC '10), pp. 1–5, Cape Town, South Africa, May 2010. View at: Publisher Site  Google Scholar
 Z. Li and C. He, “Optimal schedulingbased RFID readertoreader collision avoidance method using artificial immune system,” Applied Soft Computing Journal, vol. 13, no. 5, pp. 2557–2568, 2013. View at: Publisher Site  Google Scholar
 W. Alsalih, K. Ali, and H. Hassanein, “A power control technique for anticollision schemes in RFID systems,” Computer Networks, vol. 57, no. 9, pp. 1991–2003, 2013. View at: Publisher Site  Google Scholar
 W. Dong and X. Hao, “The optimization control of UHF reader transmit power,” in Proceedings of the 2nd International Conference on Computer Science and Network Technology (ICCSNT '12), pp. 996–1000, IEEE, Changchun, China, December 2012. View at: Publisher Site  Google Scholar
 L. N. de Castro and J. Timmis, “An artificial immune network for multimodal function optimization,” in Proceedings of the Congress on Evolutionary Computation (CEC '02), vol. 1, pp. 699–704, IEEE, Honolulu, Hawaii, USA, May 2002. View at: Publisher Site  Google Scholar
 EPCglobal, “EPC radiofrequency identity protocols class1 generation2 UHF RFID protocol for communications at 860MHz–960MHz version 1.0.9,” EPCglobal Standard Specification, 2004. View at: Google Scholar
 Z. Li, Y. Zhang, and H.Z. Tan, “IAAIS: an improved adaptive artificial immune system applied to complex optimization problems,” Applied Soft Computing Journal, vol. 11, no. 8, pp. 4692–4700, 2011. View at: Publisher Site  Google Scholar
Copyright
Copyright © 2016 Shanjin Wang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.