-
In a radio frequency identification system, designing a tag anti-collision algorithm with good performance is the key to improving the system throughput. In this paper, we propose a principle of dynamic frame size regulation and a method of tag grouping, and design a novel algorithm called grouped dynamic framed slotted ALOHA (GDFSA) through combining the above, which first estimates the number of unread tags and divides them into groups, then uses dynamic frame slotted ALOHA in each group. The simulation results show that the proposed algorithm can stabilize the throughput rate between 34.6%-36.8% and the time slots increase linearly in the identification procedure. When the tag number is beyond 2000 compared with conventional algorithms, the proposed algorithm can enhance the slot efficiency by 30%, and optimize the throughput rate obviously and save the system resource.
-
Keywords:
- anti-collision /
- group /
- dynamic frame slotted ALOHA /
- throughput rate
[1] Lin Q W 2007 Proc. of IEEE International Workshop on Anti-counterfeiting, Security, Identification Xiamen, China, April 16-18, 2007 p356
[2] Zhong W F, Chen J J, Wu L G, Pan M Y 2012 Proc. of International Conference on Measurement, Information and Control Harbin, China, May 18-20, 2012 p717
[3] Zhou W, Kapoor G, Piramuthu S 2009 Proc. of the 4th International Conference for Internet Technology and Secured Transactions London, United Kingdom, November 9-12, 2009 p1
[4] Helmut W 2009 Proc. of the 16th International Conference on Systems, Signals and Image Processing Chalkida, Greece, June 18-20, 2009 p1
[5] Li R L, Liu S Y, Gou P F, Qi Z Q 2008 Microprocessors 5 100 (in Chinese) [李瑞林, 刘嵩岩, 苟鹏飞, 綦志强 2008 微处理机 5 100]
[6] Liang B, Hu A Q, Qin Z Y 2007 J. Electron. Inform. Technol. 29 2158 (in Chinese) [梁彪, 胡爱群, 秦中元 2007 电子与信息学报 29 2158]
[7] Hou Z G, He Y G, Li B 2011 Acta Phys. Sin. 60 025211 (in Chinese) [侯周国, 何怡刚, 李兵 2011 物理学报 60 025211]
[8] Liu D, Wang Z X, Tan J, Min H, Wang J Y 2009 Proc. of IEEE International Conference on RFID Orlando, FL, USA, April 27-28, 2009 p56
[9] Yan X Q, Xu Y, Li B 2011 Proc. of IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications Changsha, China, November 16-18, 2011 p1715
[10] Myung J, Lee W, Srivastava J 2006 IEEE Commun. Lett. 10 144
[11] Gao L 2006 M. S. Dissertation (Chengdu: University of Electronic Science and Technology of China) (in Chinese) [高乐 2006 硕士学位论文(成都: 电子科技大学)]
[12] Zhang Y P, Zhao D D 2008 Proc. of China-Japan Joint Microwave Conference Shanghai, China, September 10-12, 2008 p502
[13] Cui Y H, Zhao Y P 2010 IEEE Trans.Commun. 58 1356
[14] Lee C W, Cho H, Kim S W 2008 IEICE Trans. Commun. E91-B 641
[15] Huang X, Le S 2007 Proc. of the 9th International Conference Advanced Communication Technology Gangwon-Do, Korea(South), February 12-14, 2007 p94
[16] Tong Q L, Zou X C, Tong H Q 2009 Proc. of World Congress on Computer Science and Information Engineering Los Angeles, CA, USA, March 31-April 2, 2009 p384
[17] Piao C H, Fan Z J, Yang C Y, Han X F 2010 Proc. of IEEE International Conference on Wireless Communications, Networking and Information Security Beijing, China, June 25-27, 2010 p568
[18] Wu H F, Zeng Y 2010 IEEE Trans. Automat. Sci. Engin. 7 963
[19] Pupunwiwat P, Stantic B 2010 Proc. of the 6th International Conference on Wireless Communications, Networking and Mobile Computing Chengdu, China, September 23-25, 2010 p1
-
[1] Lin Q W 2007 Proc. of IEEE International Workshop on Anti-counterfeiting, Security, Identification Xiamen, China, April 16-18, 2007 p356
[2] Zhong W F, Chen J J, Wu L G, Pan M Y 2012 Proc. of International Conference on Measurement, Information and Control Harbin, China, May 18-20, 2012 p717
[3] Zhou W, Kapoor G, Piramuthu S 2009 Proc. of the 4th International Conference for Internet Technology and Secured Transactions London, United Kingdom, November 9-12, 2009 p1
[4] Helmut W 2009 Proc. of the 16th International Conference on Systems, Signals and Image Processing Chalkida, Greece, June 18-20, 2009 p1
[5] Li R L, Liu S Y, Gou P F, Qi Z Q 2008 Microprocessors 5 100 (in Chinese) [李瑞林, 刘嵩岩, 苟鹏飞, 綦志强 2008 微处理机 5 100]
[6] Liang B, Hu A Q, Qin Z Y 2007 J. Electron. Inform. Technol. 29 2158 (in Chinese) [梁彪, 胡爱群, 秦中元 2007 电子与信息学报 29 2158]
[7] Hou Z G, He Y G, Li B 2011 Acta Phys. Sin. 60 025211 (in Chinese) [侯周国, 何怡刚, 李兵 2011 物理学报 60 025211]
[8] Liu D, Wang Z X, Tan J, Min H, Wang J Y 2009 Proc. of IEEE International Conference on RFID Orlando, FL, USA, April 27-28, 2009 p56
[9] Yan X Q, Xu Y, Li B 2011 Proc. of IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications Changsha, China, November 16-18, 2011 p1715
[10] Myung J, Lee W, Srivastava J 2006 IEEE Commun. Lett. 10 144
[11] Gao L 2006 M. S. Dissertation (Chengdu: University of Electronic Science and Technology of China) (in Chinese) [高乐 2006 硕士学位论文(成都: 电子科技大学)]
[12] Zhang Y P, Zhao D D 2008 Proc. of China-Japan Joint Microwave Conference Shanghai, China, September 10-12, 2008 p502
[13] Cui Y H, Zhao Y P 2010 IEEE Trans.Commun. 58 1356
[14] Lee C W, Cho H, Kim S W 2008 IEICE Trans. Commun. E91-B 641
[15] Huang X, Le S 2007 Proc. of the 9th International Conference Advanced Communication Technology Gangwon-Do, Korea(South), February 12-14, 2007 p94
[16] Tong Q L, Zou X C, Tong H Q 2009 Proc. of World Congress on Computer Science and Information Engineering Los Angeles, CA, USA, March 31-April 2, 2009 p384
[17] Piao C H, Fan Z J, Yang C Y, Han X F 2010 Proc. of IEEE International Conference on Wireless Communications, Networking and Information Security Beijing, China, June 25-27, 2010 p568
[18] Wu H F, Zeng Y 2010 IEEE Trans. Automat. Sci. Engin. 7 963
[19] Pupunwiwat P, Stantic B 2010 Proc. of the 6th International Conference on Wireless Communications, Networking and Mobile Computing Chengdu, China, September 23-25, 2010 p1
Catalog
Metrics
- Abstract views: 5499
- PDF Downloads: 498
- Cited By: 0