Abstract

This paper investigates the issue of missing-tag event detection in practical radio frequency identification (RFID) systems with the presence of not only unexpected tags but also the detection error. Among all the previous works, the recently proposed protocol “RFID monitoring with UNexpected tags (RUN)” is one of the first studies taking the unexpected tags into account. The protocol is proven to outperform conventional ones in terms of achieving a required reliability. Nevertheless, it completely ignores the effect of the so-called detection error, which is a common phenomenon in the literature of RFID, on tag reading. The phenomenon might result in the false-alarm detection of the event and it is believed that RUN is no longer efficient and reliable. We therefore propose two modified versions of the RUN protocol, namely, mRUN1 and mRUN2, as solutions for the issue. Similarly to RUN, the protocols execute multiple Aloha reading rounds to cope with the unexpected tags. On the other hand, they utilize tracking counters supposedly available at the reader to mitigate the effect of the detection error. While mRUN1 requires many counters to monitor the existence of each expected tag (the tag’s identity is already known), mRUN2 uses only one counter to deal with the event caused by either real missing tags or the detection error. Performance analysis will be investigated to find optimal parameter settings for the protocols. Computer simulation results are also provided to validate our analysis as well as to show the merit of the proposed protocols in comparison with the conventional protocols.

1. Introduction

Radio Frequency IDentification (RFID) has been considered as one of the key technologies in future networks [13] owing to many great benefits, such as low cost (5 cents per tag [4]) and non-line-of-sight wireless transmission. The technology has also been ubiquitously employed in many different applications such as warehouse management, object tracking, authentication, and inventory control [5]. In those applications, each object is attached with a tag, which can be passive, semipassive, or active, represented by a unique Identity (ID). While semipassive and active tags have their own internal power sources, passive ones are powered up by harvesting the RF energy from RFID readers. The passive tags are therefore limited in communication range, much cheaper than the others, and are our target in this study. The readers try to collect and monitor the ID information of all tags as quickly as possible thanks to different standard Medium Access Control (MAC) protocols such as tree-based and Aloha-based ones [6].

Although RFID technology has created a multibillion dollar market [7], there are still numerous major troubles in the RFID-based industry as shoplifting, employee theft, and vendor fraud [8, 9]. The troubles become more serious in large-scale systems where thousands (Australian farms with tens of thousands of goats) or even millions (Amazon warehouses) of objects need to be monitored [10, 11]. According to [12], retailers lost an estimation of 34.5 billion dollars due to these causes in 2011. In order to cope with this situation, research in RFID has been investigated so intensively in recent years. Most of them focus on the tag-collection problem where all the IDs need to be identified in a short period of time. The main challenge in those works is to resolve the radio collision when tags respond to the reader in the same time slot. Although significant contribution has been gained in the literature so far [13, 14], proposed algorithms/protocols probably take much time for the ID collection due to a huge number of tags with corresponding 96-bit (or 128-bit) IDs. Another approach is to monitor the existence of expected tags (i.e., the tags whose IDs are already known to the reader) and give a necessary warning/alarm to system managers. This is referred to as the missing-tag event detection problem, which attracts much attention from researchers thanks to its practically important role [15].

Current missing-tag detection algorithms/protocols can be classified into two types: probabilistic [1618] and deterministic [1921]. In particular, the former only reports the detection of the missing-tag event and thus has a fast execution time. On the other hand, the latter certainly requires more time since it feedbacks the ID of each missing tag to the reader. Both the two types have their own merits and can be used together. Nevertheless, those above works assume a perfect system implementation that includes only expected tags. The assumption is, clearly, not practical since there also exists unexpected tags (the ones whose IDs are not known a priori to the reader) in real RFID systems. This fact can be seen in monitoring baggage of passengers of different airline companies where each company uses its own readers. Another example is at retail stores where readers are used to monitor only expensive merchandise such as jewelry but still receive responses from inexpensive ones [22]. Many similar examples could be also observed in hospitals, prisons, and shopping malls [23, 24]. In such scenarios, the unexpected tags might result in more severe radio collision and wrong observations of the status of each time slot, and thus, the previous protocols may report false alarms on the event detection.

To cope with the unexpected tags, a new method, namely, “RFID monitoring protocol with UNexpected tags (RUN)” has been proposed in [25, 26] using the standard Aloha-based protocol. This method is one of the first missing-tag detection works considering the existence of unexpected tags. RUN executes multiple Aloha reading rounds with different frame size and different random seeds, denoted by and , respectively. Each tag within the reader’s transmission range uses , , and its ID to select a slot to respond to the reader in the frame by evaluating a hash function . The value of the function is uniformly distributed in . Here, the reader knows exactly which slots are nonempty if all expected tags are present in the considered system. Therefore, by using different frame sizes and random seeds in different reading rounds, the effect of unexpected tags on the monitoring protocol is mitigated thanks to the mechanism of random responses. At the same time, RUN minimizes the protocol execution time by choosing an optimal frame size in each reading.

Not similar to previous studies, RUN has been proven to be able to achieve a required reliability in the presence of unexpected tags. Nevertheless, RUN completely ignores the so-called detection error [2729]. In the literature of RFID, this phenomenon is common and might result in wrong observations of tag responses in time slots. In particular, due to multipath fading and noise, the received signal strength at the reader during a time slot might be lower than a required sensitivity threshold. As a result, the slot might be observed as empty even when several tags respond to the reader in that slot. Therefore, conventional missing-tag event detection protocols such as RUN might very frequently give false-alarm/warning on the event to the system administrator. It, then, takes much more time and energy to check and confirm which one is missing and also the reason, which makes the protocols no longer efficient and reliable.

In this paper, we study the missing-tag event detection issue in a practical model with the presence of not only unexpected tags but also the detection error. To the best of our knowledge, this is also one of the first works dealing with both the factors in the literature. Two modified versions of RUN, namely, mRUN1 and mRUN2, are then proposed. As with RUN, mRUN1, and mRUN2 protocols execute multiple Aloha reading rounds to cope with the unexpected tags. In addition, they utilize tracking counters supposedly available at the reader to mitigate the effect of the detection error. The event is announced to happen only if the counters reach a predefined threshold. While mRUN1 requires many counters to monitor the existence of each expected tag, mRUN2 uses only one counter to deal with the event. Performance analysis will be given to find optimal parameter settings of the proposed protocols. Computer simulation results are also provided to validate our analysis as well as to show the merit of the proposed protocols in comparison with the conventional protocols.

The remaining of this paper is organised as follows. In Section 2, the considered RFID system with Aloha-based protocols, the detection error, and the conventional RUN is described. Proposed protocols are developed in Section 3, and numerical results and discussions are presented in Section 4. Finally, conclusions are drawn in Section 5.

2. System Description

2.1. System Model

Our considered RFID system described in Figure 1 includes a reader, sets of expected tags, and unexpected tags denoted by and , respectively. While expected tags’ identities (IDs) have been recorded at the reader, those of unexpected tags are still not identified. The unexpected tags also need not to be monitored, and the reader neither knows their IDs nor the cardinality of . An unknown number of tags out of tags denoted by is supposed to be missing, where stands for the cardinality of a set and . The main task of this work is to design an efficient protocol/algorithm that can quickly detect a missing-tag event with a required probability whenever the number of missing tags exceeds a predefined threshold denoted by .

2.2. Communication Protocol: Aloha, Wireless Channel Model, and Detection Error

The communication between the reader and tags is based on the so-called frame slotted Aloha (FSA) specified in the EPCGlobal Class 1 Generation 2 (C1G2) RFID standard as its Media Access Control (MAC) layer communication protocol [30]. The reader first broadcasts a message consisting of a frame size and a random seed . Then, each tag randomly responds to the reader in one of the slots where the slot selection is calculated via a hash function . The responding message, due to privacy and security concerns, is one bit or a few bits instead of the ID. It is also noted that only one bit is needed to distinguish an empty slot from a nonempty one, which might be based on the received signal strength at the reader. Since all expected tag’s IDs are available, the reader knows exactly the slot that an expected tag is mapped to. Nevertheless, a particular slot that contains only missing tags might be identified as nonempty due to the presence of unexpected tags.

On the other hand, the communication channel in this work is assumed to be flat Rayleigh fading with an Additive White Gaussian Noise (AWGN). The model is supposed to ignore effects of path-loss phenomenon, which might be still valid in indoor environments [31]. In particular, the received signal model from the -th tag at the reader is described aswhere , , and are the transmitted Binary Phase Shift Keying (BPSK) signal, received signal, and transmit power, respectively. is an AWGN with . is the channel coefficient whose probability density function (pdf) denoted by is Rayleigh distributed, i.e.,It is also noted in (1) that we only consider the uplink channels from tags to reader, for simplicity, in which the transmit power from each tag is assumed to be the same. The reason is that this work focuses on designing missing-tag detection algorithms. The more sophisticated and practical channel models in terms of physical-layer perspectives will be reported in the future works. Due to the fading and noise, a slot, which is expected to be nonempty, might be detected as empty with an average probability of . This is when the received signal power at the reader during that time slot is lower than the reader’s sensitivity threshold denoted by . This phenomenon is widely known in the literature of RFID as detection error. Moreover, since tags respond in slots randomly, we assume in this paper that the average probability at each nonempty slot is the same regardless of the number of responding tags in the slot.

The performance of the Aloha protocol in our model is summarized via a simple example in Figure 2 considering the effects of unexpected tags and the detection error. A message that includes frame size of is sent to the tags. After receiving the tags’ response, the reader observes that slots 1, 4, and 5 are empty while slots 2 and 3 are nonempty. This is because slot 3 includes an unexpected tag, while the detection error happens in slot 4. Furthermore, the missing-tag event is detected successfully in this example since slots 4 and 5, which are expectedly nonempty, are observed as empty. Nevertheless, while slot 5 accurately reflects the event, observation in slot 4 results in a false detection due to the detection error, which reduces the performance efficiency of the protocol.

2.3. Conventional Approach-RUN Method

RUN (RFID monitoring protocol with unexpected tags) has been proposed in [25] as one of the first missing-tag detection methods to cope with the presence of unexpected tags. To detect if any tags in is missing, RUN executes Aloha frames with different random seeds. When the reader executes a frame, RUN finds if the observed status of each slot is similar to expected one. Here, it is noted that the reader knows which slots in the frames should be nonempty if all the tags in are present. Therefore, if an expectedly nonempty slot is observed as empty at the -th () frame, the reader stops and declares that some tags are missing without transmitting the remaining frames.

To improve the efficiency of the method, RUN estimates the optimal frame size denoted by before the -th execution. To do so, the reader first estimates the value of at the start of the -th frame denoted by by averaging over the previous frames as follows:where is the expected number of nonempty slots out of the slots precomputed by the reader using the hash function. is the observed number of slots that is expectedly empty in the -th frame but observed as nonempty. Here, it is worthy mentioning that (3) can be easily obtained thanks to the random responses from tags over slots of a frame. Then, the optimal frame is proven to beWe can see in RUN that effects of the detection error on the tag reading (and thus, the false-alarm detection) are completely ignored. Therefore, we believe that it would be useful if RUN is reconsidered in a more practical model where both the unexpected tags and the detection error are taken into account.

3. Proposed Missing-Tag Event Detection Protocols

In this section, we propose two modified versions of RUN protocols, namely, mRUN1 and mRUN2, for missing-tag event detection considering not only unexpected tags but also the detection error. Both the Aloha frames and assumed tracking counters supposedly available at the reader are utilized to mitigate the effects of the phenomena.

3.1. Protocol Description

The proposed protocols plan to use detection rounds, which might be initially set as , for a detection of the missing-tag event. In the -th () round, the reader broadcasts a message consisting of a frame size and a random seed . Tags upon receiving the message randomly respond to the reader in one of the time slots where the random slot selection is based on the hash function described in Section 2. Here, owing to the hash function, the reader knows exactly which slots are nonempty if no tags in are missing.

The reader is assumed to have tracking counters that are initially set to zero. The purpose of the counters is to mitigate the effects of the detection error on the protocols’ performance. In particular, if a slot, which is expected to be nonempty, is observed as empty, the proposed protocols increase counters involved in the slot by one. If any counter reaches a predefined threshold denoted by , mRUN1 and mRUN2 stop executing and declare that the missing-tag event happens. Otherwise, the reader estimates the number of unexpected tags by which the optimal frame size used for the next round and the remaining number of detection rounds denoted by and , respectively, can be reestimated. These assumptions are valid in RFID domains thanks to the power of the reader, and were used in several works [31, 32]. If the reader does not detect the missing-tag event after the total number of detection rounds, it declares that the number of missing tags is less than .

More specifically, mRUN1 requires counters denoted by to monitor the existence of the corresponding expected tags. During the -th frame, if the missing-tag event is detected in several slots, the counters of all expected tags involved in the slots are increased by one. The reader then keeps transmitting the same frame size and the random seed in next reading rounds. In the other cases where no missing event is detected, the counters are kept unchanged and the detection process continues with different frame size and random seed. The transmission is repeated until a counter reaches . Thanks to this mechanism, the missing event caused by real missing tags happens again at the same slots. Moreover, the probability that the existing tags are notified as the missing tags due to the detection error is significantly reduced. Nevertheless, mRUN1 although can find exactly which tag is missing, it costs more hardware implementation at the reader (for counters) and the time (number of time slots) to monitor each tag.

On the other hand, the reader uses only one counter denoted by for mRUN2 to monitor the missing-tag event. If the event is found in a detection round, the reader increases by one and stops executing the remaining slots of the current frame (this mechanism is different from that of mRUN1 where all the slots of each frame are utilized). Then, the reader retransmits the same frame size and the random seed. In this case, if the event is still detected at the same slot, is increased by one again, and this retransmission process is repeated until reaches . During the process, if the event is not detected, is set to zero and a new message with different frame size and random seed is created and broadcasted to the tags. mRUN2, different from mRUN1, only deals with the missing-tag event without showing the specific missing tags. Also, since only one counter is employed, mRUN2 reduces the hardware complexity and, the total protocol execution time in comparison with mRUN1. The proposed protocols are summarized in Figures 3 and 4.

3.2. Parameter Optimization under Impacts of Unexpected Tags and Detection Error

The proposed protocols try to quickly detect a missing-tag event with at least to a required probability whenever the number of missing tags exceeds the threshold . Therefore, protocols’ parameters such as and before the -th round should be optimally selected to not only satisfy those predefined requirements but also improve the performance efficiency of the protocols. To do this, our protocols first estimate the number of unexpected tags that may result in incorrect observations in each frame. In particular, if we denote by the probability that an expectedly empty slot is observed as nonempty in the -th frame, it can be calculated aswhere is defined as the detection error probability, while is the probability that the detection error does not happen in that slot. This equality is held thanks to the random responses from tags over the frame. The expected number of those slots in the -th frame denoted by can also be computed aswhere is the number of slots out of the ones that is expectedly nonempty. Based on (6), the estimate of before the -th round can be found using the observed values of over the previous frames as follows:When this estimate does not change by more than a predefined threshold in consecutive frames, the estimate is understood as the real value of .

Given the estimate of , we now find the optimal values of and . In particular, we first denote by a probability that slots, which expectedly include a particular missing tag, are observed as nonempty after executed frames. The probability can be written asHere, is the probability that at least one tag in our system responds during the slot that expectedly includes the missing tag’s response. Since the proposed protocols are required to detect the missing-tag event with a probability greater or equal to when , the following condition should be satisfied:or equivalently,In this case, can be numerically selected as the minimum value satisfying (10) to improve the performance efficiency of the proposed protocols in terms of time slots consumption, given the estimate of . In this paper, we assume that the detection error probability is known a priori thanks to a certain method using measured transmission data. The method could be based on, for example, expectation-maximization (EM) approach [33]. Studies that try to improve the estimation accuracy of will be investigated in future works. Consequently, given the frame size , the total number of slots used to detect a missing-tag event denoted by is written asTo find the optimal value of that minimizes the executed time for a detection of the event, we can set the differentiation of with respect to to be and use Newton-Raphson searching method.

3.3. Expected Detection Time Slots

Here, the expected detection time slots of two protocols mRUN1 and mRUN2, respectively, denoted by and are analyzed. Let be the probability that a missing-tag event is detected at a given time slot among slots. Then, can be computed asIn (12) that the first term represents for the case where at least one tag in responds at the considered slot, while the detection error happens here. The second term describes another situation where at least one missing tag maps to the slot in the precomputed frame, and the others do not select this slot in the executed frame. Therefore, if we denote by the number of time slots used for the first detection of a missing-tag event, the average value of denoted by can be calculated for given values of and as follows:where is defined as the probability that the first missing-tag event is detected at slot .

Since mRUN1 executes all slots of each frame, the expected number of slots in mRUN1 () can be calculated as follows:where represents the largest integer smaller than or equal to .

On the other hand, mRUN2 stops executing the remaining slots in each frame when a missing-tag event is detected. Therefore, is written as

4. Numerical Results and Discussions

In this section, we evaluate the performance of the proposed protocols mRUN1 and mRUN2 with different system parameters via computer simulations. Similarly to [25], the numbers of unexpected tags and expected tags are set to 1000 and 100, respectively. The required probability is set to 0.9. The detection error is assumed to happen at any slots with responses. The threshold for a missing-tag detection is set as same as the number of missing tags . The simulation results are obtained by Monte Carlo method with the number of simulation runs of . The obtained results are compared with those of the conventional RUN and also the recently published two-phase Bloom filter-based missing-tag detection protocol (BMTD) [22] to show the merit of the proposed ones. It is noted in BMTD that a Bloom filter is exploited at the reader to first deactivate the unexpected tags and then test the membership of the other expected ones.

Before showing the performance of the proposed protocols, we investigate physical-layer perspectives of the detection error to validate our assumption in Section 2. In particular, we consider the transmission within a time slot assuming the Rayleigh fading channel model with AWGN. The Signal-to-Noise Ratio (SNR) is set to be 10dB, while the threshold is supposed to be 3dB higher than the noise power. We then plot in Figure 5 the detection error probability with respect to the number of transmitting tags. It is interesting to observe that the probability is quite significant in our model especially when the number of tags in the slot is small. It implies that this phenomenon should be taken into account when designing missing-tag event detection protocols. In this paper, to highlight the importance of the protocol design, we adopt a simple detection error model where the average detection error probability is the same at each nonempty slot. The more practical model will be investigated in future works.

We now plot in Figure 6 theoretical and simulation results of the number of slots used in our proposed protocols for a given number of missing tags. The detection error probability and the threshold are supposedly and 2, respectively. Note that they can be also set to other possible values. We can see that the theoretical result matches with the simulation one, which confirms the correctness of our analysis. It is also validated that the proposed protocols execute fewer time slots when the number of missing tags increases. Moreover, mRUN1 uses more time slots for a missing-tag event detection than mRUN2. This is because while mRUN2 only deals with the event, mRUN1 needs to identify the involved missing tags. Besides, the validity of our analysis can be confirmed again in Figure 7 where the number of slots is replotted with respect to the detection error probability, and the same behaviour of the performance of the proposed protocols is observed as that in Figure 6.

4.1. False-Alarm and True-Alarm Probabilities

In order to show the efficiency and reliability of missing-tag event detection protocols, the performance of the proposed protocols is now evaluated via the so-called false-alarm and true-alarm probabilities denoted by and , respectively. In particular, we suppose that among times of detection of the missing-tag event, times are caused by the real missing tags, while times are due to the detection error where . Then, and can be, respectively, calculated as

We then plot in Figures 8 and 9 the probabilities and of mRUN1 and mRUN2, respectively, versus the detection error probability in 1000 times of a successful detection of missing-tag event, given different values of . We can see that when is small (), the proposed protocols easily achieve a perfect performance with almost true-alarm detection even with small values of   (). Nevertheless, as increases, the probability that the status of a slot is wrongly observed increases. Therefore, the number of times of false-alarm detection also increases. In this case, we can evidently see the usefulness of larger values of in improving the reliability of the proposed protocols. It is believed that, for a given value of the detection error probability, we always select a suitable value of that helps the protocols to meet a predefined requirement of the true-alarm probability. Table 1 describes an example of selecting optimal values of corresponding to the detection error probability for given .

4.2. Performance Comparison with the Conventional RUN and BMTD

In order to show the merit of the proposed protocols, we now compare the performance of mRUN1 and mRUN2 with that of the conventional RUN and BMTD protocols. In particular, we present in Figures 10 and 11 the numbers of slots used in all the protocols with respect to the number of missing tags ( is set to 2) and the detection error probability (both and are set to 5), respectively, given . It is seen that although more slots are executed in mRUN1 and mRUN2 to handle the detection error, they are significantly reduced when the number of missing tags or the probability increases. In Figure 11, the performance of the four protocols is observed to be almost the same when reaches .

On the other hand, we plot in Figure 12 the true-alarm and false-alarm probabilities of the four protocols with respect to the probability , given and . We can see that even when is small (), the conventional RUN is obviously unreliable () while our protocols achieve almost 100%. This is because the detection error has been taken into account in our proposed protocols while it is completely ignored in RUN and BMTD. Although decreases when increases, mRUN1 and mRUN2 always outperform RUN and BMTD in terms of achieving a required reliability with an optimal selection of .

5. Conclusions

This paper investigated the missing-tag event detection issue in RFID systems taking both the unexpected tags and the detection error into account. Two protocols mRUN1 and mRUN2 were proposed using multiple Aloha-based reading rounds and tracking counters supposedly available at the reader. While mRUN2 only dealt with the event, mRUN1 identified specific missing tags involved in the event. Computer simulations were performed. The obtained results showed the validity of our analysis as the theoretical number of slots executed in the proposed protocols matched with the simulation one. The performance of the proposed protocols was also compared with that of the conventional RUN and BMTD protocols. The comparison showed that although more slots were executed in mRUN1 and mRUN2 than the conventional protocols, they would be almost the same in all the protocols when the detection error probability or the number of missing tags kept increasing. Moreover, the proposed protocols presented a better performance than the conventional ones in terms of giving much more smaller false-alarm, but higher true-alarm probabilities. The results demonstrated the efficiency and reliability of the proposed protocols. In future works, we plan to consider the impacts of more practical detection error model on the protocol design where the positions of tags and different fading channels are taken into account.

Data Availability

Our work focuses on theoretical perspectives with computer simulations, and no data sets were generated during the work.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

This work is supported by Hanoi University of Science and Technology, Vietnam, through a Project no. T2017-PC-115.