Wireless Communications and Mobile Computing

Wireless Communications and Mobile Computing / 2021 / Article
Special Issue

Deep and Transfer Learning Approaches for Complex Data Analysis in the Industry 4.0 Era

View this Special Issue

Research Article | Open Access

Volume 2021 |Article ID 9967739 | https://doi.org/10.1155/2021/9967739

Lingyun Zhao, Lukun Wang, Shan Du, "An Efficient -Algorithm for RFID Tag Anticollision", Wireless Communications and Mobile Computing, vol. 2021, Article ID 9967739, 7 pages, 2021. https://doi.org/10.1155/2021/9967739

An Efficient -Algorithm for RFID Tag Anticollision

Academic Editor: Yuanpeng Zhang
Received18 Mar 2021
Revised14 Apr 2021
Accepted19 Apr 2021
Published10 May 2021

Abstract

In large-scale Internet of Things (IoT) applications, tags are attached to items, and users use a radiofrequency identification (RFID) reader to quickly identify tags and obtain the corresponding item information. Since multiple tags share the same channel to communicate with the reader, when they respond simultaneously, tag collision will occur, and the reader cannot successfully obtain the information from the tag. To cope with the tag collision problem, ultrahigh frequency (UHF) RFID standard EPC G1 Gen2 specifies an anticollision protocol to identify a large number of RFID tags in an efficient way. The -algorithm has attracted much more attention as the efficiency of an EPC C1 Gen2-based RFID system can be significantly improved by only a slight adjustment to the algorithm. In this paper, we propose a novel -algorithm for RFID tag identification, namely, HTEQ, which optimizes the time efficiency of an EPC C1 Gen2-based RFID system to the utmost limit. Extensive simulations verify that our proposed HTEQ is exceptionally expeditious compared to other algorithms, which promises it to be competitive in large-scale IoT environments.

1. Introduction

RFID is a key enabler of the Internet of Things (IoT), playing a crucial role in connecting low-/nonpowered devices to IoT environments. EPC C1 Gen2 [1] is the standard RFID protocol devised to meet the needs of such applications. An RFID reader can communicate with hundreds of passive (nonpowered) tags within seconds, even at a distance of 10 meters from the tags. The most remarkable virtue of the Gen2 standard is its light weight. Due to the shared nature of RF medium, a passive RFID system requires a collision arbitration protocol to serialize responses of tags, mitigating collisions between the tag responses.

Recently, there are mainly three kinds of collision arbitration protocols in tag identification, namely, Aloha-based [25], query tree-based [68], and tree splitting-based [9, 10] protocol. In the Aloha-based protocol, the reader combines tag number estimation and frame size adjustment strategies to identify tags. Specifically, the reader sends a query command containing a parameter ( denotes the number of) to allow the tags to return the IDs. The reader detects the responses in each slot and distinguishes their different states: collision, empty, or singleton. According to slot statistics in a frame, the reader can estimate the cardinality of unread tags and update the new frame for the next round. Through theoretical analysis, the maximal system throughput of Aloha-based protocols is 0.368 [25]. In query tree-based protocols [68], the reader inquires about the tags through probe commands. Each tag is required to be equipped with a prefix matching circuit, and it will respond only when the tag ID matches the prefix of the probe command. Once a collision is detected, the reader will update the query prefix according to the position of collision bits. Then, the reader uses the updated prefixes to interrogate the tags until all of them are successfully identified. In tree splitting protocols, the reader continues to group the colliding tags with a separation probability of 0.5, until a certain group contains only one tag.

The -algorithm, adopted by the EPC C1 Gen2 standard, is a collision arbitration algorithm that clearly represents its lightweight property such that a couple of simple arithmetic operations constitute the algorithm. The -algorithm is composed of a few fundamental arithmetic and logical operations [1]. The flowchart of the -algorithm is illustrated in Figure 1. Looking specifically into the algorithm, it adds the constant to when it finds collided replies and subtracts the constant from whenever having no reply. The algorithm alters its frame size once the value has been changed. This simplicity of the logic and the use of a minimal number of computations make Gen2 RFID readers identify tags without wasting batteries in IoT environments. Another strength inherited in the -algorithm is the early adjustment of frame size, by which a disadvantageous frame size can be canceled before the end of the frame. The feature might have a substantial impact on the identification performance in large-scale and/or mobile tag environments such as smart factories and highways, which is an important characteristic of a quality collision arbitration algorithm [11].

Only a limited number of early researchers attempted to further improve the performance of the -algorithm [1214]. The algorithm [12] suggested differentiating into and , which means the constant for a collision and an empty slot, respectively. The study also found the optimal ratio of to () which maximizes the per-slot throughput of tag identification. In a similar vein, the author in literature [13] presents a fine-tuned numerical method to determine the value. However, the study also considered a per-slot throughput as its objective, which means that, theoretically, the performance of such an algorithm is not very different from that of the algorithm.

Another approach has been taken to improve the -algorithm in [14], where a per-time throughput is addressed as the metric of tag identification efficiency. This is important as the time duration of each slot (singleton, empty, and collision) is actually different from each other in the EPC C1 Gen2 standard. As the studies commonly recognized the difference, the algorithms were designed to determine and that reduce the collision slots, whose time duration is significantly longer than the empty slots, rather than the total number of consumed slots. Although such an algorithm is a reasonable approach, the rigorous optimization of the -algorithm in terms of time efficiency has not been addressed. Due to such immaturity of the previous research efforts, the -algorithm has received little attention for a good while, despite its obvious benefits of lightweight property and innate ability of early adjustment.

On the other hand, there are many works following the dynamic framed slotted Aloha (DFSA) to consider the time efficiency. The literature [15] conducted temporal analysis on the time efficiency of an FSA protocol, adopting an in-frame adjustment feature of the -algorithm. The performance of conventional DFSA depends on both an accurate cardinality estimation and adaptive frame adjustment. The cardinality estimation requires burdensome statistics and imposes high complexity. The latest research [3, 16] shows remarkable performance with optimization of frame sizes for fast identification; additional calculations for tag cardinality estimation were required on every slot.

In this paper, we provide a theoretical analysis on the time performance of the -algorithm, and based on the analysis, the detailed structure of a highly time-efficient -algorithm (HTEQ) is proposed. Then, we provide a performance evaluation between major -algorithm variants and a competitive DFSA algorithm. In the following, we further discuss the experimental results.

The contributions of this paper are summarized as follows. (1)A rigorous analysis of the time performance of the -algorithm and the optimal parameters for a time-efficient -algorithm are derived(2)We provide a thorough performance evaluation between the proposed HTEQ, other competitive -algorithm variants, and representative DFSA. The factors behind the experimental results are examined concretely(3)Through performance limitation analysis, a novel RFID tag identification algorithm, namely, HTEQ, is proposed, which provides highly competitive time efficiency in RFID anticollision for large-scale IoT applications, while maintaining the strengths of the -algorithm, such as early frame adjustment and low computational overhead

2. The Proposed Algorithm

In this section, we first analyze the time performance of an FSA protocol on which the -algorithm is premised and suggest a highly efficient -algorithm based on theoretical analysis.

2.1. Analysis on Time Performance

In the FSA protocol, a reader informs tags of a frame size, in which the tags randomly select their responding slots. In such a model, the tag identification delay can be defined as the average time between two successively identified tags. Given tags, the tag identification delay in a frame size is expressed as where and denote the expected time duration of a frame and the probability that a tag is successfully identified in a slot given and , respectively. The probability that tags respond in a slot is given by

Based on Equation (2), the probabilities of a success, an empty, and a collision slot are expressed as , respectively. Then, the expected time duration of a frame can be calculated by summing up all the expected delays in the frame as below: where are the time durations of a success, an empty, and a collision slot, respectively. Note that the delay of the frame per second is ignored for convenience’s sake. By Equations (2) and (3), Equation (1) can be rewritten as where .

2.2. HTEQ Algorithm

Having observed the tag identification delay, we can achieve the maximization of per-time tag identification efficiency by minimizing the tag identification delay as the following:

As the objective function is convex for both and , the optimum should be obtained by partially differentiating the function for instead of on which the inverse of the derivative does not exist. Therefore, arranging with respect to , we get the optimal frame size as below: where is the Lambert function or product logarithm and . We then get and under the optimal condition by putting to the probabilities. Using these probabilities, we can build a stationary condition that converges to and keeps the frame size remaining at the optimum as follows:

With this relationship, taking limits in as for , it gives us the asymptotic proportions of the empty and collision slots under the optimal condition, and hence, the optimal ratio is also attained:

Note that the ratio of the probabilities and the ratio of the values are in a reciprocal relationship. Figure 2 provides a detailed procedure of the HTEQ algorithm, where and are constrained by Equation (8). The overall workflow of the proposed algorithm is similar to the -algorithm, adhering to the principle of not requiring any tag estimation scheme. The only difference with the -algorithm is the biased constants and .

3. Experimental Study

The performance of the proposed approach and the reference methods were examined by carrying out extensive simulations based on the Monte Carlo simulations. The performance of the tag identification algorithms is examined in two evaluation sessions with different comparison groups: (1) Group I for comparison between -algorithms, where the original -algorithm [1] and its variants in the strict sense of the term, [12] algorithm and fast [14] algorithm, are selected for the comparison, to prove the potential of the HTEQ algorithm, which relies on tag estimation and frame size determination strategies; (2) Group II for comparison with DFSA algorithms, where relatively recent, competitive DFSA algorithms, EACAEA [5] and TES-FAS [3], are chosen as the comparison targets. For the protocol parameters in the simulations, we adopt the same setting used in [14]: 1828.13 μs, 260.625 μs, and 516.625 μs are used for , respectively.

For the fairness of the evaluation, the and values are recalculated accordingly with the aforementioned protocol parameters. Specifically, the and values of remained the same as in [14]. For the sake of clarity of comparison, the values of HTEQ and algorithm are set to be identical to the values of the algorithm, and the values are calculated using the ratios suggested by each algorithm. Table 1 summarizes the adjusted parameters. All the algorithms are implemented on MATLAB R2012b, and simulations are iterated up to 2000 times with varying random seeds [9, 1719].


Algorithms

HTEQ0.21180.08270.3906
0.21180.15000.7081
algorithm0.21180.15220.7182
-algorithm0.21180.21181

The simulation results in Figure 3 show the identification delays for -algorithm-based collision arbitration algorithms to identify one tag. The simulations are carried out every 100 tags between 100 and 1000 tags to identify. Each result is recorded after 5000 iterations for the convergence of each simulation. In Figure 3, our proposed algorithm HTEQ clearly outperforms other reference algorithms. One interesting fact is that the performance of lies fairly behind that of HTEQ despite its own protocol parameter being used for the simulation. Most algorithms except the -algorithm are designed to be more sensitive to collision slots to quickly escape from undersized frames, which can make a huge overhead. They put more weight on the value than .

Hence, holds in various algorithms. This is a rational approach; nevertheless, those algorithms except HTEQ did not consider a strict optimization of the value. For example, adopts 0.7081 for its value, but the optimal ratio is almost half of this value (0.3906), i.e., the algorithm may be fast, but not the fastest.

The findings from an exhaustive simulation shown in Figure 4 substantiate the contention above. The simulation results form an obvious convex shape on the plane. The HTEQ algorithm is situated around the optimum area of the convex. The lies on the higher position and followed by the algorithm closely. This explains why and algorithm showed similar performance in Figure 3. As a result, it validates that the proposed HTEQ algorithm essentially achieved the highly efficient tag identification with the optimized parameter .

As for the simulation results from Group II, shown in Figure 5, HTEQ performs higher, where it consistently outdistances the other algorithms along with all the tag numbers. Given that OFLA and TES-FAS are exquisite algorithms designed to pursue the optimal frame size in regard to time efficiency, the difference in the performance is rather extraordinary. According to our in-depth analysis, both DFSA algorithms suffered from degradation due to the inaccurate tag cardinality estimation. As for OFLA, it is affected by imperfect frame size calculation in addition to the erroneous tag cardinality estimation.

OFLA followed a similar process to HTEQ for finding the optimal frame size; however, it ended up with the use of the following approximation derived from a numerical method: where is a linear approximation coefficient and is set for this environment. This is the reason that the performance of OFLA fluctuated along with the tag numbers. The time efficiency of OFLA rose and fall repeatedly according to whether Equation (9) gets closer to or away from the optimal curve which is a nonlinear curve as presented in Equation (6). In the case of TES-FAS, the degradation comes mostly from its inaccurate tag cardinality estimation. The maximum a posteriori estimator used in TES-FAS is known for a highly accurate tag cardinality; however, the subframe-based scheme and its own early frame adjustment feature caused the performance deterioration. The subframe-based scheme reassesses a current frame size whenever reaching its subframe sizes. As the small frame sizes given by the subframe-based scheme reduce sample sizes for tag cardinality estimation, significant estimation errors are accumulated. Although early frame adjustment may give an edge to TES-FAS over the evaluation, especially in the large-scale environment given in this paper, it turned out that the algorithm is caught between the trade-offs due to the degradation of tag cardinality estimation.

On the other hand, HTEQ successfully found a closed-form solution for the optimal frame size and suggested the optimal relationship to determine and while maintaining the merits of the -algorithm. Note that this result is achieved without the consideration of computational cost, in which HTEQ is the most advantageous over the other DFSA algorithms. We assumed that the computational cost is neglectable in conceding that the excessive computational cost of the DFSA algorithms such as the MAP estimator can be reduced to that of the -algorithm-based algorithms by using a lookup table and additional memory space (0.3674 μs and 0.8451 μs, respectively, based on the computing power and computational overhead provided in [3]). The computation time that is amounting to 828 μs should be added to the identification time per tag of TES-FAS unless the lookup table is considered. In other words, HTEQ achieved the true optimal performance with a considerably lower computational cost of the -algorithm, without any assistance of additional resources.

4. Conclusion

This paper proposed a novel, highly time-efficient -algorithm for collision arbitration in large-scale IoT environments. The time performance of an FSA protocol deployed with the -algorithm is investigated, and the optimal parameters to maximize the per-time throughput of the -algorithm are derived based on the investigation. Our intensive simulations, including the exhaustive one and the comparison to the state-of-the-art DFSA algorithms, proved that the proposed algorithm is evidently the most time-efficient algorithm, taking full advantage of the innate strengths of the -algorithm.

Data Availability

To be frank, I derived the writing material from different journals as provided in the references. A MATLAB tool has been utilized to simulate our concept.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

References

  1. EPC, Radio-Frequency Identity Protocols Generation-2 UHF RFID Standard, Release 2.1, GS1, Brussels, Belgium, 2018.
  2. J. Su, R. Xu, S. Yu, B. Wang, and J. Wang, “Idle slots skipped mechanism based tag identification algorithm with enhanced collision detection,” KSII Transactions on Internet and Information Systems, vol. 14, no. 5, pp. 2294–2309, 2020. View at: Publisher Site | Google Scholar
  3. J. Su, Z. Sheng, A. X. Liu, Z. Fu, and Y. Chen, “A time and energy saving based frame adjustment strategy (TES-FAS) tag identification algorithm for UHF RFID systems,” IEEE Transactions on Wireless Communications, vol. 19, no. 5, pp. 2974–2986, 2020. View at: Publisher Site | Google Scholar
  4. H. Chen, K. Liu, C. Ma, Y. Han, and J. Su, “A novel time-aware frame adjustment strategy for RFID anti-collision,” Computers, Materials & Continua, vol. 57, no. 2, pp. 195–204, 2018. View at: Publisher Site | Google Scholar
  5. W.-T. Chen, “Optimal frame length analysis and an efficient anti-collision algorithm with early adjustment of frame length for RFID systems,” IEEE Transactions on Vehicular Technology, vol. 65, no. 5, pp. 3342–3348, 2016. View at: Publisher Site | Google Scholar
  6. X. Jia, Q. Feng, and L. Yu, “Stability analysis of an efficient anticollision protocol for RFID tag identification,” IEEE Transactions on Communications, vol. 60, no. 8, pp. 2285–2294, 2012. View at: Publisher Site | Google Scholar
  7. J. Su, Y. Chen, Z. Sheng, Z. Huang, and A. X. Liu, “From M-ary query to bit query: a new strategy for efficient large-scale RFID identification,” IEEE Transactions on Communications, vol. 68, no. 4, pp. 2381–2393, 2020. View at: Publisher Site | Google Scholar
  8. H. Landaluce, A. Perallos, E. Onieva, L. Arjona, and L. Bengtsson, “An energy and identification time decreasing procedure for memoryless RFID tag anticollision protocols,” IEEE Transactions on Wireless Communications, vol. 15, no. 6, pp. 4234–4247, 2016. View at: Publisher Site | Google Scholar
  9. J. Su, Z. Sheng, L. Xie, G. Li, and A. X. Liu, “Fast splitting based tag identification algorithm for anti-collision in UHF RFID system,” IEEE Transactions on Communications, vol. 67, no. 3, pp. 2527–2538, 2019. View at: Publisher Site | Google Scholar
  10. J. Su, Z. Sheng, A. X. Liu, Y. Han, and Y. Chen, “A group-based binary splitting algorithm for UHF RFID anti-collision systems,” IEEE Transactions on Communications, vol. 68, no. 2, pp. 998–1012, 2020. View at: Publisher Site | Google Scholar
  11. J. Myung, W. Lee, J. Srivastava, and T. K. Shih, “Tag-splitting: adaptive collision arbitration protocols for RFID tag identification,” IEEE Transactions on Parallel and Distributed Systems, vol. 18, no. 6, pp. 763–775, 2007. View at: Publisher Site | Google Scholar
  12. D. Lee, K. Kim, and W. Lee, “Q+—algorithm: an enhanced RFID tag collision arbitration algorithm,” in Proceedings of 4th International Conference on Ubiquitous Intelligence Computing (UIC), Hong Kong, China, 2007. View at: Google Scholar
  13. W.-T. Chen, “A feasible and easy-to-implement anticollision algorithm for the EPCglobal UHF class-1 generation-2 RFID protocol,” IEEE Transactions on Automation Science and Engineering, vol. 11, no. 2, pp. 485–491, 2014. View at: Publisher Site | Google Scholar
  14. J. Teng, X. Xuan, and Y. Bai, “A fast Q algorithm based on EPC generation-2 RFID protocol,” in Proceedings of 6th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), pp. 23–25, Chengdu, China, September, 2010. View at: Google Scholar
  15. T. F. La Porta, G. Maselli, and C. Petrioli, “Anticollision protocols for single-reader RFID systems: temporal analysis and optimization,” IEEE Transactions on Mobile Computing, vol. 10, no. 2, pp. 267–279, 2011. View at: Publisher Site | Google Scholar
  16. J. Su, X. Zhao, D. Hong, Z. Luo, and H. Chen, “Q-value fine-grained adjustment based RFID anti-collision algorithm,” IEICE Transactions on Communications, vol. E99.B, no. 7, pp. 1593–1598, 2016. View at: Publisher Site | Google Scholar
  17. J. Su, R. Xu, S. Yu, B. Wang, and J. Wang, “Redundant rule detection for software-defined networking,” KSII Transactions on Internet and Information Systems, vol. 14, no. 6, pp. 2735–2751, 2020. View at: Publisher Site | Google Scholar
  18. Z. Zhou, Q. M. J. Wu, Y. Yang, and X. Sun, “Region-level visual consistency verification for large-scale partial-duplicate image search,” ACM Transactions on Multimedia Computing, Communications, and Applications, vol. 16, no. 2, pp. 1–25, 2020. View at: Publisher Site | Google Scholar
  19. Z. Zhou, Y. Mu, and Q. M. J. Wu, “Coverless image steganography using partial-duplicate image retrieval,” Soft Computing, vol. 23, no. 13, pp. 4927–4938, 2019. View at: Publisher Site | Google Scholar

Copyright © 2021 Lingyun Zhao et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Related articles

No related content is available yet for this article.
 PDF Download Citation Citation
 Download other formatsMore
 Order printed copiesOrder
Views294
Downloads311
Citations

Related articles

No related content is available yet for this article.

Article of the Year Award: Outstanding research contributions of 2021, as selected by our Chief Editors. Read the winning articles.