Abstract

Radio Frequency IDentification (RFID) technology successfully integrates radio transmitter and receiver, small size memory space and control circuitry to remotely store and retrieve data via wireless RF transceiver. As low-cost RFID tag can be massively manufactured by semiconductor industry, new applications associated with RFID technology have emerged rapidly such as inventory tracking, book storage and management, and airport baggage handling. Generally an RFID system is composed of many RFID tags (or tagged objects), at least one RFID reader, and one backend application system with database. An RFID tag gains its operation energy from query signals that are radio waves transmitted by RFID reader. Once a tag responds the query with its stored information to RFID reader, usually a unique identity number or string, the RFID system can recognize the tag carrier and perform required business logic operation. As RFID technique is widely used in supply chain management, the corresponding RFID application systems are expected to process and manage large amount of tagged objects at a predefined period of time regularly. Therefore, for large-scaled RFID applications, tag reading throughput is very critical since it will affect the total data processing time. To measure tag reading throughput of a RFID system, two performance criteria are usually adopted: tag reading delay and reader energy consumption [5]. As RFID reader and tag always communicate over a shared wireless channel, it is very easy to have signal collisions during a normal tag identification process when multiple tags exist in reader’s interrogation area. Signal collision results in query or data retransmission and eventually increases communication overhead and time delay of tag identification. Hence, an efficient tag collision arbitration mechanism is very important and critical for RFID systems to achieve effective performance. Existing RFID tag identification schemes can be classified into aloha-based solutions [3, 10, 12-13, 16, 21, 23-24] and tree-based solutions [1, 2, 4, 6-9, 14-15, 17-20, 22]. In aloha-based schemes, a reader estimates the number of tags in its interrogation area and broadcasts the total number of timeslots to each tag. Then each RFID tag randomly selects its own timeslot to transmit its ID without knowing which timeslots have been selected by other tags. By distributing tag responses to distinct timeslots instead of getting all tag responses at the same time, aloha-based schemes effectively reduce the probability of signal collision. However, aloha-based schemes have tag starvation problem in which certain tags may not

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call