Sie sind auf Seite 1von 14

4234 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO.

6, JUNE 2016

An Energy and Identification Time Decreasing


Procedure for Memoryless RFID
Tag Anticollision Protocols
Hugo Landaluce, Asier Perallos, Enrique Onieva,
Laura Arjona, and Lars Bengtsson, Senior Member, IEEE

Abstract—Up to date energy-aware radio frequency identifica- reader and the tags to establish communication. In addition, it
tion (RFID) anticollision protocols are mainly focused on RFID is a low-intrusive technology, which can be easily adapted to the
systems using active tags. The introduction of RFID in portable Internet of Things and the paradigm of Ubiquitous Computation
devices, and the increasing popularity of passive tags, demands low
energy-consumption anticollision protocols in environments with [2], [3]. Typically, an RFID system comprises tags and read-
passive tags. Memoryless protocols present the simplest tag hard- ers [1]. The tags can be active (battery operated) or passive
ware that is beneficial for a low energy consumption. However, (obtaining power from the reader’s signal). Passive tags are pre-
the excessive collisions required by these protocols increases the ferred when low cost and long lifetime are sought, but provide
energy consumption, wasting a large number of tag transmitting less coverage. This paper is focused on passive RFID systems
bits. In this paper, a window procedure is presented to manage
the length of the tags’ bit-stream in order to limit the energy consisting of a reader and different numbers of passive tags.
wastage in collisions. The bit window is applied to two memoryless The existence of various tags transmitting at the same time
anticollision protocols, the query tree protocol (QT) and the colli- causes the tag collision problem [1], [4], [5]. Since tags share
sion tree protocol (CT), producing the query window tree protocol the same communication channel (the air), their signals can be
(QwT) and the collision window tree protocol (CwT). Simulations garbled and the reader may not be able to decode the waveforms
show that the use of this window yields significant reductions in
energy consumption and identification time. In addition, QwT and of the signals. This leads to retransmitting the tag messages
CwT are compared to state of the art memoryless protocols to con- until the reader receives them correctly, causing an increase
firm that CwT is an outstanding candidate for reducing energy in the time needed to identify the tags and in the energy con-
consumption. Also, the results obtained show how the bit win- sumed during that process. Due to some restrictions imposed
dow procedure increases energy savings as the length of the tag by RFID [4], general multi-access protocols have had to be
ID increases.
adapted, producing anti-collision protocols. These protocols are
Index Terms—RFID, anti-collision, memoryless protocols, still an interesting research topic, much covered in the current
query tree, collision tree, bit-tracking, energy aware. literature [5]–[7]. The main existing anti-collision protocols can
be classified into Aloha-based and tree-based protocols.
I. I NTRODUCTION Aloha based protocols are probabilistic, since the tag
responses are organized randomly. These responses are dis-
T HE Radio Frequency Identification (RFID) technology is
one of the best known auto-identification techniques. It is
used to identify codes stored in tags that backscatter a reader’s
tributed among various slots, and the more uniformly spaced
are the transmissions, the higher is the probability of success.
signal [1]. The tags are attached to different objects, provid- Research in Aloha based protocols is focused on the improve-
ing them with new functionalities. Location, traceability, and ment of dynamic framed slotted Aloha protocols (DFSA) [8]–
remote identification of the objects are the most common appli- [10]. The estimators used to define the frame size are increas-
cations of RFID. An outstanding characteristic of this technol- ingly accurate at the expense of an increase in the mathematical
ogy is that it does not need a direct line of sight between the and computational cost [11]. Tree based protocols are, on the
other hand, deterministic: they identify the total number of tags
Manuscript received October 20, 2014; revised September 21, 2015 and in the interrogation zone. The total amount of information trans-
January 7, 2016; accepted February 21, 2016. Date of publication March 3, mitted between readers and tags is usually higher than in Aloha
2016; date of current version June 7, 2016. This work has been partially funded based protocols. However, the tags’ cost is usually lower in tree
by the Spanish “Ministerio de Ciencia e Innovacin” (TEC2013-45585-C2-2-R)
and the Basque Government (PC2013-71A). The associate editor coordinating based protocols. The reader controls every step of the protocol,
the review of this paper and approving it for publication was M. Manteghi. using commands or bit-string prefixes (called queries) to split
H. Landaluce, A. Perallos, E. Onieva, and L. Arjona are with colliding tags into subsets, and further repeatedly split those
the Deusto Institute of Technology (DeustoTech), University of Deusto, subsets until achieving a successful response from all the tags.
Bilbao 48007, Spain (e-mail: hlandaluce@deusto.es; perallos@deusto.es;
enrique.onieva@deusto.es; laura.arjona@deusto.es). There are two types of tags: those with memory and those with-
L. Bengtsson is with Department of Computer Science and Engineering, out. The main difference between them is that the response of
Chalmers University of Technology, Göteborg SE-41296, Sweden tags not using memory (memoryless tags) depends only on the
(e-mail: labe@chalmers.se).
query prefix transmitted by the reader and the identification
Color versions of one or more of the figures in this paper are available online
at http://ieeexplore.ieee.org. code (ID). The query tree protocol (QT) [12] is one of the most
Digital Object Identifier 10.1109/TWC.2016.2537800 representative memoryless protocols. On the other hand, tags
1536-1276 © 2016 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution
requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
LANDALUCE et al.: ENERGY AND IDENTIFICATION TIME DECREASING PROCEDURE 4235

with memory usually use an internal counter to determine the


allowance of transmissions [13], [14]. The memoryless tags’
need to transmit queries increases the amount of information
transmitted between the reader and the tags. In compensation,
these tags have the lowest hardware requirements.
The energy consumed in such anti-collision protocols has
been studied in several papers considering active tags exclu-
sively, due to their use of batteries [15]–[17]. Energy consump-
tion in passive RFID systems is not usually studied, due to the
reader’s connection to a general power source. However, bat-
tery powered readers such as smart-phones and hand-readers
are increasingly being used and, therefore, their energy con- Fig. 1. Example of a Collision/Idle/Success/Go-On slot in the transmission
sumption should also be studied. Given the lack of batteries model used.
and the need to obtain power from the reader’s signal, the sim-
plicity of the tags is very important [4]. Tags with a high cost and a tag response to that message. Three types of slot
can cause, however, an increase in the reader’s power consump- can occur, depending on the number of tag responses
tion because they will need more energy to transmit messages received by the reader: {collision, idle, success}. A col-
and to power up their circuitry [18]. Because we aim to pre- lision occurs when more than one tag responds in the
serve the low cost of the tags, we concentrate on protocols same slot. The reader is unable to decode the tags’
providing low cost tags: the memoryless tree based protocols responses due to the garbled waveforms of the received
[12], [19]. These protocols avoid random number generators or signals. An idle slot occurs when there is no response to
additional storage memories; basically, a comparison is needed the reader’s inquiry. A success occurs when a single tag
between the received query at the tag-side and its own ID. Then, reply is correctly received by the reader and, therefore,
matching tags transmit their full ID, or the remaining part of it. identified.
Collisions, therefore, cause the loss of full tag responses, which • Query. A bit-string command transmitted by the reader
increases the identification time and the energy consumption to the tags that indicates the prefix they must compare
of the reader. An excessive number of collisions produced by with their ID. If a tag ID matches the query received,
QT generates an enormous increase in the information trans- it responds, backscattering the full or the non-compared
mitted between the reader and the tags. In [20], a preliminary part of the ID, depending on the type of protocol.
version of the query window tree (QwT) is presented. This pro- • Interrogation cycle. The period of time including all
tocol manages to decrease the number of bits transmitted by the reader queries and tag responses needed to identify the
tags using a dynamic window procedure defined by a heuristic entire set of tags. A cycle is composed of a certain number
exponential function. of slots.
In this paper, a bit window is applied to the most simpli- Now that the main concepts have been explained, we intro-
fied memoryless protocols QT and the collision tree protocol duce the RFID system transmission model between the reader
(CT) in order to produce two low energy-consumption pro- and the tags, employing some assumptions: an ideal channel
tocols: a novel version of QwT, and the collision window is assumed for transmission, with no capture-effect1 or fre-
tree protocol (CwT). Additionally, an extended analysis of the quency hops, since the impact of these drawbacks would blur
application of the window is presented, and three heuristic func- the behaviour of all the compared protocols equally; all tags in
tions are proposed and compared to define the best dynamic the antenna range remain correctly energized during the inter-
behaviour for the window. Both proposed protocols are simu- rogation cycle; all tags’ responses are synchronized; and lastly,
lated using the heuristic functions and compared to other mem- a collision occurs only when two different messages or bits
oryless protocols in the literature. The results show that the win- are simultaneously transmitted since error transmissions are not
dow procedure saves energy and time. Indeed, CwT is shown to considered. Note that these assumptions are extensively used
be a low energy-consumption protocol for passive tags. for the analysis of known anti-collision protocols [11], [12],
The rest of this paper is organized as follows. Section II [19], [21]–[23]. The transmission model is explained below.
presents related memoryless anti-collision protocols in the liter-
ature. Section III analyses the bit window procedure, Section IV A. Transmission Model
presents our proposed QwT protocol, and Section V presents
CwT. The results of the simulations and some identified limi- The transmission model used is defined in [8], which cor-
tations are given in Section VI. Finally, Section VII concludes responds to the EPC global C1G2 standard. Fig. 1 shows the
this paper. link timing of the three types of slots mentioned (collision, idle
and success) and the go-on slot explained below. The reader
II. BACKGROUND starts transmissions using commands during time t R . The bit
First, some definitions are given to properly understand strings transmitted by the reader as well as the tags (Command
selected state-of-the-art protocols: and Response in Fig. 1), will be specified later in Section VI
• Slot. The period of time that separates the tags’ responses. 1 When the reader decodes only the tag response with the highest power in a
In memoryless protocols, it comprises a reader command collision slot
4236 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 6, JUNE 2016

for each simulated protocol. The reader holds the RF down-


link carrier, also called Continuous Wave (CW), so that tags
can harvest energy and respond with their ID. After every reader
command there is a time T1 needed for the tags to generate their
responses; and a time T2 needed for the reader to receive all the
transmissions; a slot will be considered idle when the reader
waits for the tags’ responses for a time T3 . Additionally, the
tag’s response is produced during time tT .
With respect to the energy consumption model, E represents Fig. 2. Example of Manchester codification showing a collisions at the 4th and
the energy consumed by the reader. It is a function of the time the 7th bits.
it spends transmitting and receiving information. An energy
model is proposed where the reader transmits the command and child, identified with 0, and the right child, with 1. To
the C W to power up passive tags with power Pt x . In addition, guarantee a response from all the tags, this calculation is
the reader will require extra power Pr x when receiving data only applied when the query denotes a right child of the
from the tags. Therefore, the expression used to calculate the tree. Indeed, the following query for a left child will be
total energy consumed during the interrogation cycle is shown the corresponding right child.
in (1). • Success. The protocol maintains the length of the query
since the continuity of the tag distribution indicates there
E = Ec + Ei + Es will be more successes at the same level of the tree.

c+s In this manner, STT generates traversal queries to identify
= [Pt x × (t R j + T1 + tT j + T2 ) + Pr x × tT j ] the next tag aggressively. The protocol reduces collisions at the
j=0 cost of an increase in the number of idle slots. In addition, full

i tag responses are wasted on every collision, causing an increase
+ (Pt x × (t R j + T1 + T3 ) (1) in the energy consumption of the RFID system and the number
j=0 of bits transmitted by the tags.
3) CT: The CT [19], [21] is a QT based protocol that imple-
Here, E c , E s , E i represent the energy consumed during colli- ments bit tracking. This provides the reader with the ability
sion, success and idle slots and c, s, i the number of collision, to track the colliding bits in a collision slot using Manchester
success, and idle slots, respectively. coding [1]. Fig. 2 shows that bits are defined as voltage transi-
tions. The bit ‘0’ is coded by a positive transition and ‘1’ by a
negative transition. Therefore, a collision is located when a non-
B. Related Work transition state occurs. The example shows collisions in the 4th
In a memoryless protocol, the tags’ responses are generated and 7th bits.
only upon the transmission of a reader query. Thus, the tags’ CT tracks the first colliding bit in a slot so as to split the
hardware is simpler than in other protocols, such as Aloha based tags’ responses into two subsets. The reader transmits a query
protocols. We here present the best known memoryless anti- and the matching tags respond with their remaining ID bits of
collision protocols. length k−L, where L is the length of the query and k the length
1) QT: In QT, the reader must provide the tags with a query of the tag ID. Upon a collision slot, CT tracks the colliding
and the tags must respond with their full ID as a result of a bit using bit tracking and generates two new queries, attaching
successful matching of the query with their corresponding ID the correctly received part of the tags’ responses to the former
part. If a colliding response is received at the reader, two new query plus a bit ‘0’ for the first and a bit ‘1’ for the second. CT
queries are generated adding a bit ‘0’ and ‘1’ to the colliding manages to identify tags faster, thus decreasing the number of
query. Otherwise, queries are discarded when an idle or a suc- collisions and avoiding idle slots. However, CT still wastes a
cessful response is met. The process needs to go through all the large number of tag bits for every collision, which increases the
possible queries to detect all the tags. energy consumed by the reader during the process.
2) Smart Tree Traversal Protocol (STT): The smart traver- 4) Optimal Query Tracking Tree (OQTT): A QT based pro-
sal tree protocol (STT) [24] is used to reduce the number of tocol with a bit estimator and bit tracking technology, referred
collisions in QT using a tree traversal path. This protocol gener- to as OQTT, is given in [22]. It first employs a bit estima-
ates successive queries according to the following rules defined tion algorithm to estimate the existing number of tags. Tags
by the type of tags’ responses: choose to swap one of the bits in an l-bit string. This string
• Collision. The number x of bits to be appended to the col- is split into l/k−1 segments of the tag ID length k and each
liding query is x = r + wc −1, where r denotes a fixed portion is transmitted separately to the reader. The reader uses
minimum increase and wc the number of consecutive Chebyshev’s inequality [23] to calculate the estimated number
collisions. of bits n̂ with the number of selected and non-selected bits
• Idle. In this case, the protocol decreases the query length received in the tags’ responses. Once n̂ is obtained, the opti-
by y = r + we −1, where y is the number of bits by which mal number of queries m to initalize a query stack is calculated
to decrease the query, and we is the number of consecutive using m = 0.595824 × n̂. Afterwards, m queries are generated
idles. Each node in a binary tree has two children: the left and pushed onto the stack. The rest of the process is solved
LANDALUCE et al.: ENERGY AND IDENTIFICATION TIME DECREASING PROCEDURE 4237

Fig. 3. Example of a communication slot between the reader and one tag.

using CT. Although the slot efficiency obtained by OQTT is


very high, the preprocessing increases the energy consumption Fig. 4. Probability of a go-on slot PG (a) and a collision slot PC (b) for
of the protocol, especially in dense tag environments, where x different values of L and W .
is greater than 1.
A. Analysis Under Constant Values of W
III. T HE B IT W INDOW
The influence of W on a query-based protocol, such as QT or
The bit window procedure is here proposed to control the CT, is to be analysed. Given a uniformly distributed set of n tags
number of bits per slot transmitted by the tags. The window in the interrogation zone, the probability that X of the n tags
is defined as a bit-string of length W bits (0 < W < k) to be have the same prefix as a query size of L bits, and transmitting
transmitted by a tag as the response to a reader query, and a response of W bits, is described by the binomial distribution,
is computed at the reader-side, where k is the tag ID length. X ∼ Bin(X, 21L , n) in (2).
Thus, the reader transmits a query with length L bits, and the
 
window size W of log2 W  + 1 bits, where  rounds to the n
nearest integer towards −∞ and W N>0 . Fig. 3 shows an P(X, n, p) = p X (1− p)n−X (2)
X
example of the window procedure over a complete slot. The
main idea of this procedure is to adapt W to avoid the wastage The probability of an idle slot PI (X = 0) is not affected by the
of tags’ transmitting bits on collisions. Moreover, the bit win- window, and is given by (3):
dow procedure can be applied to basic query-based protocols
(QT, CT) so that the energy consumed by passive RFID sys- PI = P(X = 0) = (1−2−L )n (3)
tems can be decreased, retaining the memoryless feature and
slightly increasing the cost of the reader and tags. The probability of a success slot PS when the condition L +
The implementation of the window allows each tag to W < k is met is now called the probability of a go-on slot
respond using only W bits instead of the rest of its ID (k−L PG , obtained using (4) (this expression is developed in the
bits), where W ≤ k−L. This changes the concept of success or Appendix):
collision of the protocols. Two or more tags’ responses might
PG = 2W [(1−2−L (1−2−W ))n − (1−2−L )n ] (4)
not collide if their windows do not include different bits, tak-
ing advantage of common ID parts. Therefore, a readable tag Using (3) and (4), the probability of collision is given by PC =
response, which would lead to a success slot in QT or CT, may 1−(PG + PI ) and (5):
not be a success in this case. If one or more tags responds with
similar window bit-streams and the condition L + W < k is PC = 1−2W (1−2−L + 2−(L+W ) )n + (2W −1)(1−2−L )n (5)
met, a go-on slot situation is produced. The responding tags
cannot be uniquely identified since the received window might The calculation of the energy consumed by a protocol using the
have come from more than one tag ID: thus, they need to be bit window requires a previous calculation of the identification
re-interrogated until L + W = k, upon which a success slot is time and, therefore, the number of bits transmitted by the reader
guaranteed. Furthermore, a collision occurs only when different and the tags, and the number of slots used in the identification.
window responses are received and can not be decoded by the For this purpose, the number of nodes of the virtual tree that are
reader. Lastly, an idle slot occurs when no response is received going to be visited is needed to observe the influence of W on
after a query. the time complexity of the protocol [15]. However, the nodes
The main idea of the window is to adapt its size W to low visited are greatly influenced by the current ID distribution of
values when the probability of collision is likely to be high, and the tags, and so its calculation is outside the scope of this paper.
otherwise, adopt high W values when the probability tends to The application of the window to QT or CT firstly affects
be low. Since it is difficult to predict a collision and such a pre- PG and PC . Fig. 4 shows a representation of these probabilities
diction can be very costly for the reader and the tags, a heuristic varying W and L with n = 1000 tags. Low values of W cause a
function is sought to adapt the window size W . Therefore, an noticeable increase in PG with respect to the probability of suc-
analysis of the influence of constant W values on query-based cess in QT, QTPs , in the vicinity of the height L h of a uniformly
protocols is now presented. Three heuristic functions will then distributed tree L h = log2 (n + 1) = 10, where  rounds to
be proposed based on the conclusions obtained from this step. the nearest integer towards ∞. This implies also a reduction of
4238 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 6, JUNE 2016

TABLE I
H EURISTIC F UNCTIONS TO P ROVIDE DYNAMISM TO THE B IT W INDOW

PC with respect to the probability of collision in QT, QT Pc , in


the same range of W and L (see Fig. 4.b) according to (5) since
PI = 0 for low values of L.
The main conclusions that can be obtained from Fig. 4 are:
• Low values of W reduce the number of tag bits transmit-
ted since a collision of tag windows will waste W bits
instead of k−L as in QT. However, a low W increases
PG which presumably will increase the number of go-on
slots needed, increasing the total number of slots and bits
transmitted by the reader.
• Values of W k provide a similar behaviour to the source
protocol (QT in Fig. 4). The number of slots is reduced,
but a higher tag bit waste rate is found in collisions. In
compensation, a non-collided slot is more likely to be a
success slot.
These conclusions were confirmed using simulations in [25].
A balance between the previous two options is to be sought,
so that W can be guessed avoiding the calculation of PC and,
therefore, simplifying the identification procedure. Heuristic
functions will be proposed, to strike a balance between W
and L.
Fig. 5. Pseudo-code of QwT. First the operation of the reader is presented, then
the operation of the tag.

B. Heuristic Functions
Three heuristic functions will be presented (linear, quadratic IV. T HE Q W T P ROTOCOL
and exponential) to dynamically adjust the window size W in The first presented protocol is the QwT, which applies a
order to maintain a balance by reducing the tag transmitting bits dynamic bit window to QT. Whenever the reader transmits a
and limiting the number of go-on slots. These functions yield query [q1 . . . q L ] of length L to indicate to the tags whether
three different gradients to increase W , taking into considera- to transmit or not, the parameter value W , which adds
tion the length of the current query L. This allows the reader log2 W  + 1 bits to the reader command, is attached. Tags
to choose small W when PC is prone to increase, providing a receive and compare the query with their ID [d1 . . . dk ], and
small colliding tag bit rate; while they offer larger W when L matching tags respond with the W bits [w1 . . . wW ] = [d L+1 . . .
increases (and, thus PC decreases), contributing to decrease the d L+W ] to the last query bit received, where di , wi {0, 1}, see
number of go-on slots. As will be explained below, the result Fig. 3. Apart from this, a cyclic redundancy check procedure
of these functions f (L) will only be assigned to W upon a (CRC), similar to that demanded on the EPC C1G2 stan-
go-on slot since during a collision or an idle slot, W will be dard [8], is attached to the tags’ window response so that the
held unchanged. Table I shows the three heuristic functions and reader can differentiate by checking the consistency of the CRC
a limiting function to k−L for the tags’ responses in case the between a correct response that can be used, or an erroneous tag
heuristic function exceeds this value. response, caused by a collision.
Each function’s gradient is adjusted with the parameter β Pseudo-code for the QwT reader and tags is shown in Fig. 5
using graphical simulations to decrease the energy consumed to perform one full identification of a set of tags. A recursive
by the protocol the window is applied to. Two protocols function (QwT see Fig. 5 line 2) is called until all the set of
have been chosen in this paper to be modified by a bit win- tags is identified. In the beginning, the reader is initialized with
dow procedure: QT, which provides the lowest tag hardware W = 1 and two starting queries ‘0’ and ‘1.’ A new command is
cost and the highest improvement capacity, yielding the query assembled with the first query and W , and broadcast to the tags.
window tree protocol (QwT); and CT, which is an evolved After a certain period of time or after receiving a response, the
QT using bit tracking, yielding the collision window tree reader identifies the type of slot, generates a new query, and
protocol (CwT). assigns a new value to W considering the type of slot received.
LANDALUCE et al.: ENERGY AND IDENTIFICATION TIME DECREASING PROCEDURE 4239

There are four different type of slots: idle, collision, go-on, and
success.
• An idle slot (Fig. 5 line 8) is when no response is received.
The reader then discards that query and continues with the
process.
• A collision slot (Fig. 5 lines {10−12}) is when the
reader receives a window which is not CRC consistent.
W remains unchanged, retaining its former value, and
two supplementary queries are generated [q1 . . . q L , 0]
and [q1 . . . q L , 1]; made of the former query [q1 . . . q L ]
appended with either ‘0’ or ‘1.’ Then the reader recur-
sively starts transmitting them to the tags.
• A go-on slot (Fig. 5 lines {15−17}) is when the CRC
validates the received window and the condition L +
W < k is met. A new query is generated by affixing
the immediately received window to the former query
[q1 . . . q L , w1 . . . wW ] and a new W is calculated with
the heuristic function, W = f (L). Then, the reader recur-
sively transmits the new command with the updated query
and W .
• Finally, a success slot (Fig. 5 line 19) is when the CRC
validates the received window and the tag ID is uniquely
defined L + W = k. Then, the ID is stored in a database Fig. 6. Variation in the number of go-on slots and transmitted bits per tag in
and the query is discarded, to continue with the process. QwT for different values of β, for n tags, and three different heuristic functions:
The tag’s operation in Fig. 5 starts with receiving the reader’s (a) linear, (b) quadratic, and (c) exponential.
command. The tag obtains the query and compares it to the
proper portion of its ID. Should its ID match the query, the
tag calculates the CRC (as discussed in the comparison in
Section VI, CRCs of 1 and 5 bits are used). Then, the tag trans-
mits by backscattering the W bits that follow the last query bit
received L and attaches the calculated CRC in the response.

A. Tuning β in QwT
As a result of the expression L + W < k, the response
received from the tags does not uniquely identify a full tag
ID and therefore a go-on slot is considered. The recalculation Fig. 7. Selected β for n tags in the interrogation zone using the reader’s energy
of W is done using one of the heuristic functions proposed consumption in QwT for three heuristic functions: (a) linear, (b) quadratic, and
in Table I: linear, quadratic, or exponential. These functions (c) exponential.
include a parameter β that varies the gradient of the func-
tion differently, and must be tuned in order to minimize the are shown in both Fig. 6 and Fig. 7, but the visible tendency
number of go-on slots and tag transmitting bits. These met- using different values of n is similar.
rics are simulated for different values of β and two sets of tags
n = {500, 1000}. The simulation procedure and the parameters
used are defined in Section VI from scenario S1. The results V. T HE C OLLISION W INDOW T REE (C W T)
obtained are shown on the left and right Y -axes, respectively, The second proposed protocol is the collision window tree
in Fig. 6. For the three heuristic functions proposed, the mag- protocol (CwT), which applies the dynamic bit window to CT.
nitudes show opposite behaviours and when one is reduced the This causes the challenging coexistence of two techniques: bit
other one is increased. A balance between these metrics is there- tracking and the bit window. The first one uses Manchester cod-
fore sought. The simulation results of the energy consumed by ification, which allows the reader to identify the exact colliding
the RFID reader calculated using (1), for different values of β, bit and therefore avoids the need of affixing a CRC to the tags’
are shown in Fig. 7 (more details about the simulation param- responses in order to identify the type of slot. Additionally, this
eters are also given in Section VI). The results show that when codification incorporates a clock signal within the transmitting
the energy consumed by the reader is at its lowest (β = 87 for data, which eases the synchronization of the tags’ responses.
Fig. 7.a, β = 105 for Fig. 7.b, β = 0.4 for Fig. 7.c) a proper And last but not least, the combination of both techniques not
balance is achieved between the number of go-on slots and tag only extinguishes idle slots but also decreases the number of tag
transmitting bits in Fig. 6. A handful of tags n = {500, 1000} transmitting bits compared to the non-windowed protocols.
4240 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 6, JUNE 2016

Fig. 9. Dependence of the number of go-on slots and transmitted bits per tag
in CwT on β for n tags with three different heuristic functions: (a) linear,
(b) quadratic, and (c) exponential.

query. The window size W is recalculated using the


heuristic function W = f (L) and a new command is
recursively transmitted.
Fig. 8. Pseudo-code of CwT. First the operation of the reader is presented, then
• A success slot (Fig. 8 line 17) is when no collision has
the operation of the tag. occurred and L + W = k. The reader stores the received
ID and continues the process until no more function
instances are left.
The pseudo-code for CwT for performing one full identifica- The CwT tags’ operation in Fig. 8 is simplified compared
tion of a set of tags is presented in Fig. 8. A recursive function to the operation in QwT, since CRC is not now needed. Thus,
(CwT see Fig. 8 line 2) is called until all the set of tags is tags start receiving the reader’s command, obtain the query, and
identified. The procedure starts by broadcasting a reader query, compare it to the proper portion of their ID. Only if they match
[q1 . . . q L ] of length L, affixed to the W parameter of length the query will they backscatter the W bits that follow the last
log2 W  + 1 bits, which tells the tags the number of bits they query bit received.
must use in their reply. The value of the parameter W is calcu-
lated for every slot and always transmitted attached to the query
A. Tuning β in CwT
(initially W = 1). Tags matching the query transmit the W bits
following the last query bit received, [d L+1 . . . d L+W ] of their The heuristic functions f (L) in Table I are proposed to
ID [d1 . . . dk ]. Whether a colliding bit is found or not and to modify W with every go-on slot. The parameter β needs to
update the new query and W , the reader classifies the type of be readjusted, since the bit tracking technology modifies the
slot as one of three cases: collision, go-on, or success. performance of CwT with respect to QwT. The simulation pro-
• A collision slot (Fig. 8 lines {8−10}) is when at least cedure and the parameters used are again defined in Section VI
one colliding bit is found. Two supplementary queries from scenario S1. The results of the number of go-on slots
are generated, denoted by [q1 . . . q L , w1 . . . wc−1 , 0] and and tag transmitting bits under different values of β are shown
[q1 . . . q L , w1 . . . wc−1 , 1], using bit tracking; basically in Fig. 9 for the three proposed heuristic functions: linear,
made of the former query [q1 . . . q L ] appended with the quadratic and exponential. The results obtained present similar-
correctly received bits (win Match = w1 . . . wc−1 ) indi- ities to those previously presented for QwT, a priori. However,
cating the first colliding bit with the suffix c and attaching the number of go-on slots is lower for all values of β and n in
a bit ‘0’ and ‘1.’. Additionally, W remains unchanged. the simulation.
• A go-on slot (Fig. 8 lines {13−15}) is when both L + Given the inverse behaviour of the number of go-on slots
W < k and no collision has occurred. A new query, and tag transmitting bits, minimizing the amount of energy con-
[q1 . . . q L , w1 . . . wW ], is then made from the imme- sumed by the reader requires using a balanced window. Thus,
diately received window (win Match) and the former the energy consumed by the reader using the three mentioned
LANDALUCE et al.: ENERGY AND IDENTIFICATION TIME DECREASING PROCEDURE 4241

parameters mentioned above, and these are also modified every


time Tari changes during the simulation.
Presented in Fig. 1 is the link timing of the four typical
types of slots to perform identification time calculations and
(1) for energy calculations. Variable slots are considered, which
increases the complexity of the protocols and similar durations
for bits 0 and 1 have been used (Tari), since the simulated
protocols employ Manchester codification, different from the
standard. This, in fact, has been applied to all the protocols,
ensuring fairness in the comparison. The field Command is dif-
ferent depending on the protocol simulated, and is specified in
Table III for all the protocols, where L corresponds to the length
Fig. 10. Selected β for n tags in the interrogation zone using the reader’s energy
of the query, log2 W  + 1 to the length of the window size W ,
consumption in CwT for three heuristic functions: (a) linear, (b) quadratic, and
(c) exponential. and l and x to the number of bits and slots for the estimation
procedure in OQTT respectively. In addition, the tag response
per slot is specified for every protocol in the comparison. Each
heuristic functions is shown in Fig. 10 under varying β. The simulation was performed 100 times and averaged for accuracy.
values of β producing the minimum energy consumption of the Additionally, the tags’ IDs have been taken to be uniformly dis-
reader are β = 123 for Fig. 10.a, β = 125 for Fig. 10.b and tributed and randomly generated for every simulation iteration
β = 0.34 for Fig. 10.c. These values produce steeper gradient with varying random seed values.
functions than the QwT tuned β values. This is mainly because
the bit tracking functionality is better exploited when large tag
responses are transmitted. Since the likelihood of obtaining bits A. Savings and Losses of the Bit Window Technique
previous to a collision is higher with a large value of W , queries The three proposed heuristic functions, linear, quadratic and
can be aggressively generated, accelerating the identification exponential, denoted by subscript lin, quad, ex p, have been
process. For this reason, a more frequent use of a large W is simulated separately for each windowed protocol QwT and
preferred. On the other hand, this is likely to produce a larger CwT in S1 and compared to the non-windowed protocols QT
waste of tag transmitting bits in collisions than in QwT: this will and CT in Table IV. This table shows therefore the savings
be shown in the next section, Section VI. (negative quantities) and losses (positive quantities) that the
window technique produces in the different metrics of QT and
CT. Figures in bold indicate the best function in every metric
VI. S IMULATIONS AND R ESULTS compared. In addition, two CRC lengths have been used in the
This section presents the simulation results obtained using comparison for the case of QwT: 1 or parity bit, and 5 bits. The
Matlab 2014b for the proposed protocols (Fig. 5 and Fig. 8) data shown in that table was calculated using the expression
QwTvalue −QTvalue
employing different heuristic functions. These results are com- QTvalue for QwT in this case. The values shown were
pared with the behaviour of the main memoryless anti-collision averaged over the results for each set of tags n, from 100 to
protocols in the literature. First, the influence of the window 1000.
is presented, comparing QwT with QT and CwT with CT for As previously mentioned, the main influence of the window
the three proposed heuristic functions. Then, the best versions is on the number of bits transmitted per tag. However, Table IV
of QwT and CwT are chosen and compared to the memoryless shows savings not only in that metric, but also in the energy
protocols QT, STT, and to the memoryless bit tracking proto- consumed by the RFID system, the identification time for the
cols CT and OQTT in different simulation scenarios. Finally, set of tags, and the total number of bits needed to identify them.
some identified limitations of the bit window technique are On the other hand, there occurs an increase in the required num-
presented. ber of slots and reader bits of the windowed protocols. The
The protocols are compared in five different scenarios S1- bit window manages to balance the number of tag transmitting
S5 and Table II shows the parameters employed. S1 proposes bits and go-on slots, unavoidably increasing the latter, which
a fixed parameter scenario. Tari, which represents the reference produces an increase in the total number of slots and reader
time interval for a data-0 transmission, is set to the standard’s bits. However, the time savings produced by the reduction of
minimum of 6.25 μs, conditioning DR (data rate for reader the number of tag transmitting bits is higher than the time lost
1
and tags, calculated as T ari ), RTCal, TRCal, T1, T2 and T3 due to the number of reader bits, which is reflected in a reduc-
in accordance with the EPC standard [8]. Pt x and Pr x were tion in the total identification time and energy consumption.
obtained from [15] and k is fixed to 128 bits. Scenarios S2-S5 In conclusion, the savings in the energy consumption are still
use control variables that are modified during the simulation substantial, which confirms that the bit window technique is an
whilst the rest of the parameters remain constant from S1. energy saving procedure in S1.
Control variables are marked with a ‘*’ in the table and are: The QwT with the quadratic heuristic function QwTquad
Tari in S2; the reader transmitting power Pt x in S3; the reader shows the highest energy savings. Although the CRC of length
receiving power Pr x in S4; and the length of the tag ID k in 1 bit (C RC−1) or parity bit presents the highest savings, its
S5. S2 represents a special case since Tari also influences the reliability can be questioned since it presents a 66% rate of error
4242 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 6, JUNE 2016

TABLE II
PARAMETERS U SED IN S IMULATIONS . * I NDICATES THE C ONTROL VARIABLES

TABLE III QT and present similarities to STT in energy and identification


N UMBER OF B ITS /S LOT time. OQTT improves CT in these metrics, thanks to its esti-
mation process, and shows similar identification time results
to CwT using different strategies: while OQTT is focused on
decreasing the number of slots, the windowed CwT and QwT
focus on tag transmitting bits. This, however, benefits the win-
dowed protocols since the energy consumed by a passive reader
during the response of the tags is lower than in OQTT, as
windowed tags spend less time transmitting.
The calculation of the identification time is based on the
recognition under a 1 bit response. A CRC of 5 bits (C RC−5), total number of bits transmitted by the reader and the tags,
on the other hand, is a more complex but reliable operation. and therefore these metrics are shown in Fig. 12. As the bit
Despite the unfavorable simulated results of C RC−5 compared window technique modifies the number of tag transmitting bits
to C RC−1, the first is used in the following comparisons, and per slot, Fig. 12.a shows QwT and CwT as the least tag bit
still shows energy savings over the other anti-collision proto- transmitting protocols, quite the opposite from QT and CT,
cols. Furthermore, CwT with the linear function CwTlin is also which present the worst results. The window improves the effi-
used; CwT with quadratic and exponential functions show sim- ciency of tag transmitting bits (Fig. 12.b), calculated using the
ilar savings and losses as with the linear function. However, the k
expression bits/tag × 100. The tag bit efficiency indicates the
implementation of the last is less costly than that of the others, exploitation of the tags’ responses and the influence of a col-
and that is why it has been chosen in the following comparisons. lision on a tag response. Thus, QwT shows efficiencies higher
than 80%, which indicates that tags waste few bits in collisions
and transmit almost the minimum number of bits needed to be
B. Impact of the Number of Tags recognized, k. CwT shows also a higher tag bit efficiency than
This section compares the most representative memoryless the non-windowed protocols. Although QwT tags need to use
anti-collision protocols QT, STT with the bit tracking CT and CRCs, they transmit the lowest number of bits, closely followed
OQTT, including the best versions of QwT and CwT previously by CwT as shown in Fig. 12.a.
simulated: QwT with the exponential function and C RC−5, The windowed protocols decrease the tags’ transmitting bits,
and CwT with the linear function, now redefined as QwT and at the cost of an increase in go-on slots, which increases the
CwT for clarity in the graphs. total number of slots as shown in Fig. 12.c. Notice also that the
The performed simulations have been again parametrized bit tracking protocols OQTT, CT and CwT require the lowest
using data from Table II.S1, and n has been varied from 100 to number of slots: here OQTT stands out. STT, which slightly
1000 tags. The simulation results for the energy consumed by reduces the number of slots used by QT, cannot improve over
the protocols are shown in Fig. 11.a and the identification time the bit tracking protocols. CT and CwT track collisions to the
required to calculate the former results is shown in Fig. 11.b. individual bit avoiding idle slots, and OQTT saves the initial
Fig. 11.a shows evidence that CwT outperforms the others in collisions produced in CT, thanks to the optimal generation of
terms of energy consumption, and a very slight improvement in the starting queries. The elevated number of slots needed by
the identification time in dense tag environments in Fig. 11.b. the windowed protocols causes the number of reader bits (see
The inclusion of the window in QT and CT produces energy Fig. 12.d) to be the highest in the comparison. Additionally,
and time savings in both protocols, QwT and CwT, over the the need of a go-on slot to obtain the last few pending ID bits
non-windowed QT and CT, and these savings increase linearly of a particular tag demands that the reader transmit long L
with the inclusion of more tags in the interrogation zone. STT, queries, which increases the number of reader bits, especially
as an evolved QT based protocol, uses the smart traverse path in QwT. CwT increases W more aggressively than QwT, using
with a minimum query increase of r = 1, and shows similarities a different β tuning, preventing a frequent ocurrence of this sit-
to QwT in both metrics from Fig. 11. Bit-tracking CT improves uation. In the end, the tests performed suggest that the window
LANDALUCE et al.: ENERGY AND IDENTIFICATION TIME DECREASING PROCEDURE 4243

TABLE IV
T HE B IT W INDOW S AVINGS (N EGATIVE ) AND L OSSES (P OSITIVE ), U SING THE T HREE H EURISTIC F UNCTIONS IN S1. Q UANTITIES IN B OLD R EPRESENT
THE B EST R ESULTS A MONG THE T HREE H EURISTICS . QwTquad AND CwTlin P RESENT THE H IGHEST E NERGY AND I DENTIFICATION T IME S AVINGS

As mentioned before, the related values DR, RTCal, TRCal,


T1, T2 and T3 also change when Tari changes. The smallest
Tari used in the simulation represents the fastest RFID system,
with the minimum time between reader and tag transmissions
(T1, T2, T3). In contrast, the highest Tari allowed in the stan-
dard [8], 25 μs, configures a slow system with a long waiting
time between transmissions (see Table II.S2). As presented in
Fig. 13.a and 13.d, the slower the RFID system is, the higher
the window savings are in QwT and CwT. Thanks to the sav-
ings in tag transmitting bits produced by the window, a low tag
DR (caused by a high Tari value) is less harmful in windowed
protocols than in the others, since their tags spend less time
transmitting. On the other hand, go-on slots force the windowed
protocols to go through more time intervals between messages
(T1, T2, T3) than the others, which moderates the impact of the
low DR.
In Fig. 13.b and 13.e, simulation results using the param-
eters from Table II.S3 are shown. In this case, Pt x is varied.
Again, the windowed protocols increase their savings with the
augmentation of Pt x . QwT and CwT balance the loss caused by
the increase in the number of slots and reader bits with the sav-
ings in tag transmitting bits. Notice that Pt x is needed during
reader transmission and reception (CW, see Fig. 1), there-
fore the window, which reduces tag transmitting bits, produces
higher energy savings under higher values of Pt x receiving tag
bits than the non-windowed protocols. Despite the savings pro-
duced by the window, OQTT presents better results in a low
tag density set n = 100 than the rest. This difference is soft-
Fig. 11. Simulation results of the energy consumption (a) and the identifica- ened when n increases in Figure 13.e. Finally, Fig. 13.c and
tions time (b) in S1.
13.f show the results when using the parameters in Table II.S4.
Now, the power Pr x is varied. The windowed protocols QwT
procedure and the bit tracking technique are compatible pro- and CwT are less sensitive to an increase in Pr x than are the
cedures in CwT, producing a suitable low energy-consumption others, since they transmit fewer tag bits. Thereby, the higher
protocol for RFID passive tag environments. the Pr x , the higher the savings produced by the window are
with respect to the non-windowed protocols.

C. Impact of Tari and Power Transmission


Different scenarios, S2-S4, are used in this section to com-
D. Impact of the Tag ID Length
pare the selected memoryless protocols. The impact of the
variation of Tari and transmission power in the energy con- Now the comparison results of the chosen memoryless pro-
sumed by these protocols is shown in Fig. 13 when n is 100 tocols are shown with k as the control variable (Table II.S5).
and 1000. In this case, two heuristic functions, quadratic (QwTquad )
The simulation results in Fig. 13.a and 13.d show the energy and exponential (QwTex p ), are simulated for QwT since their
consumed by the compared protocols as Tari is modified in S2. results evolve in a different way; and the linear only for CwT
4244 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 6, JUNE 2016

Fig. 12. Simulation results of: (a) the average tag transmitting bits, (b) the tag bit efficiency, (c) the total slots, and (d) the reader bits transmitted in S1.

Fig. 13. Simulation results obtained for the energy consumption in S2, S3, S4, when n is 100 and 1000 tags.
LANDALUCE et al.: ENERGY AND IDENTIFICATION TIME DECREASING PROCEDURE 4245

TABLE V consumption and identification time. Indeed, the differences


R E -T UNING OF β FOR QwTquad , QwTex p AND CwTlin from the rest of the protocols are larger (notice the logarithmic
scale of the Y -axes in Fig. 14.a and Fig. 14.b). The evolution of
QwTquad should also be observed: the worst energy consump-
tion results occur for small values of k, and the lowest energy
consumption for k = 1024 bits. As shown in Fig. 14.c, the bit
efficiency of the windowed protocols is the highest obtained in
the simulations. First CwT, followed by QwTquad , obtain the
highest bit efficiencies in the simulations. Finally, the number
of reader bits needed by the protocols is presented in Fig. 14.d,
where QwTquad stands out as using a large number of reader
bits, especially for large k. The rest of the windowed protocols
need a longer bit-stream than the rest but they remain almost
constant as k increases. It can be concluded, therefore, that the
larger the ID length k, the greater the impact of the bit efficiency
on the energy consumption. This can be clearly observed for the
case of QwTquad with large k values, which shows the lowest
energy consumption with the highest bit efficiency.

E. Identified Limitations
This section presents all the limitations encountered during
the design and experimentation process. Some of them have
been already mentioned, but all of them are gathered here. The
main problem caused by the window is the increase in the num-
ber of slots, mainly caused by the increase in the number of
go-on slots. CwT is proposed using bit tracking to decrease the
number of slots. The parameter β used in the three heuristic
functions is chosen to have a higher gradient, thus obtain-
ing better results in terms of identification time and energy
consumption than the QwT. However, the number of tag trans-
mitting bits is increased. This behaviour can be improved and
therefore more research should be carried out to decrease the
number of go-on slots. Another limitation is that the length of
Fig. 14. Simulation results of the energy consumption (a), the identification the current query L and the value W transmitted in the reader
time (b), the tag bit efficiency (c) and the reader bits transmitted (d) in S5 with
n = 1000 tags.
command present a dynamic size, and tags would need special
characters to differentiate both variables. Another parameter
should be included in the command indicating the length L.
because it behaves in a similar manner to the rest of the heuristic Besides, another possible option to mitigate this problem is
functions. The number of tags n is fixed to 1000. to standardize the values of W to powers of 2, and attach
The parameter β used in the former simulations was calcu- the exponent with a fixed size instead of the real value to the
lated for the specific ID length of k = 128 bits. However, in query. This modification could also help the performance of the
order to work properly, the window procedure needs a retun- protocol since the exponential increase of the window would
ing of this parameter for each of the values of k chosen in this be beneficial. Lastly, all the tests have been developed under
new simulation. Therefore, Table V shows the different tuning homogeneous tag ID distributions. The heuristic functions have
values of β for every simulated ID length k. been tuned for this type of distribution, and they would need
The simulation results are shown in Fig. 14. Notice that the to be readjusted according to its variations. Besides, in non-
longer is the ID length k, the better are the results of the win- uniform tag ID distributions, a conversion method [26] could
dowed protocols in energy consumption and identification time be used to obtain a virtual homogeneous distribution.
presented in Fig. 14.a and Fig. 14.b, respectively. For low k, the As future work, the estimation of the proper β value upon
bit tracking protocols CT and OQTT present the lowest energy different scenarios, and the adaptation of the window to identify
consumption. Since OQTT is the most slot decreasing protocol, tags with different ID lengths are proposed.
it does not suffer from an excessive waste of tag transmitting
bits compared to the windowed protocols, which produce a
larger number of slots. However, this balance between the num- VII. C ONCLUSION
ber of tag transmitting bits and slots is slightly inverted as k A bit window procedure has been presented and carefully
increases. In this manner, for the largest values of k of the simu- analysed. Two anti-collision protocols, which we have called
lation results, the windowed protocols present the lowest energy QwT and CwT, have been presented, which apply this bit
4246 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 6, JUNE 2016

window procedure to the memoryless QT and CT protocols. Then, rewriting expression (6) a recursive equation is obtained:
The contributing window has been tested under three differ-
ent heuristic functions retaining their memoryless feature. The ⎡ ⎤n−1
   
procedure provides an important decrease in the number of ⎢ 1 1 ⎥ 1 1
PG = pn = ⎢
⎣ 1 − 1 − ⎥ + 1 − pn−1
tag transmitting bits, but at the expense of an increase in 2L 2W ⎦ 2L 2L
the number of slots and reader transmitting bits. However,  
a b
the window achieves significant energy savings over the non-
windowed protocols, thanks to the reduction of the time spent  
1 n−1 1 n−1 1 n−2
by the tags in transmitting. In addition, simulation compar- = a + bp n−1 = a + b a + bp n−2
isons showed that the windowed CwT is a protocol which 2L 2L 2L
outperforms the others in terms of energy savings and thus is 1 n−1
to be considered as a good RFID anti-collision candidate in = (a + ba n−2 + b2 a n−2 + . . . + bn−1 ) + bn p0
2L 
passive RFID systems. In addition, when the ID length is suf- p0 =0
ficiently large, QwT outperforms the others in terms of energy (9)
consumption.

n
According to a n − bn = (a − b) a n−k bk−1 and a − b =
k=1
ACKNOWLEDGMENT 1
2 L+W
the final expression is obtained:
The authors would like to thank Emil Gustavsson and
Magnus Önnheim at Chalmers University of Technology for 1 a n − bn
their valuable help in developing the proof of expression (4). PG = = 2W (a n − bn )
2L a − b
  n   
1 1 1 n
=2 W
1− L 1− W − 1− L (10)
A PPENDIX 2 2 2
Proof of expression (4): Given a set of n tags with n pre-

fixes or queries in S = {s1 , . . . , sn } the following expression is
proposed:
R EFERENCES
PG = P(go−on with n queries) [1] K. Finkenzeller and R. Waddington, RFID Handbook: Radio-frequency
Identification Fundamentals and Applications. Hoboken, NJ, USA:
= pn = P(go−on with n queries|snL )P(snL ) Wiley, 1999.
[2] M. Weiser, “The computer for the 21st century,” Sci. Amer., vol. 265,
no. 3, pp. 94–104, 1991.
+ P(go−on with n queries|snL )P(snL ) (6) [3] R. Want, “Enabling ubiquitous sensing with RFID,” Computer, vol. 37,
no. 4, pp. 84–86, 2004.
[4] C. Abraham et al., “Inventory management using passive RFID tags: A
where the condition that sn matches the L bits transmitted by survey,” Dept. Comput. Sci., The Univ. Texas at Dallas, Richardson, TX,
the reader is snL = 21L , the non-matching condition is snL = 1 − USA, 2002, pp. 1–16.
1 [5] D. K. Klair, K.-W. Chin, and R. Raad, “A survey and tutorial of RFID
2L
, and the rest of the expressions are shown in (7) and (8): anti-collision protocols,” IEEE Commun. Surveys Tuts., vol. 12, no. 3,
pp. 400–421, Apr. 2010.
P(go−on with n queries|snL ) [6] L. Zhu and T.-S. Yum, “A critical survey and analysis of RFID anti-
collision mechanisms,” IEEE Commun. Mag., vol. 49, no. 5, pp. 214–221,
= P(go−on with (n − 1) queries) = pn−1 (7) May 2011.
[7] D.-H. Shih, P.-L. Sun, D. C. Yen, and S.-M. Huang, “Taxonomy and sur-
vey of RFID anti-collision protocols,” Comput. Commun., vol. 29, no. 11,
P(go−on with n queries|snL ) pp. 2150–2166, 2006.
[8] EPCglobal, “Radio-frequency identity protocols class-1 generation-2
= P(s1 , s2 . . . sn−1 no collision with sn ) UHF RFID protocol for communications at 860 MHz–960 MHz version
1.2.0,” 2008.

n−1
[9] C. Qian, Y. Liu, R. Ngan, and L. Ni, “ASAP: Scalable collision arbitra-
= P(sk no collision with sn ) tion for large RFID systems,” IEEE Trans. Parallel Distrib. Syst., vol. 24,
k=1 no. 7, pp. 1277–1288, Jul. 2013.
[10] H. Wu, Y. Zeng, J. Feng, and Y. Gu, “Binary tree slotted ALOHA for pas-

n−1 sive RFID tag anticollision,” IEEE Trans. Parallel Distrib. Syst., vol. 24,
= [P(sk no collision with sn |skL )P(skL ) no. 1, pp. 19–31, Jan. 2013.
[11] L. Zhang, J. Zhang, and X. Tang, “Assigned tree slotted aloha RFID tag
k=1 anti-collision protocols,” IEEE Trans. Wireless Commun., vol. 12, no. 11,
pp. 5493–5505, Nov. 2013.
+ P(sk no collision with sn |skL )P(skL )] [12] C. Law, K. Lee, and K.-Y. Siu, “Efficient memoryless protocol for tag
identification,” in Proc. 4th Int. Workshop Discr. Algorithms Methods

n−1
1 1

1
 
1

1
n−1 Mobile Comput. Commun., 2000, pp. 75–84.
= + 1− L = 1− L 1− W [13] D. R. Hush and C. Wood, “Analysis of tree algorithms for RFID
2W 2 L 2 2 2 arbitration,” in Proc. IEEE Int. Symp. Inf. Theory, 1998, p. 107.
k=1
[14] D. P. Bertsekas, R. G. Gallager, and P. Humblet, Data Networks.
(8) Englewood Cliffs, NJ, USA: Prentice-Hall, 1992, vol. 2.
LANDALUCE et al.: ENERGY AND IDENTIFICATION TIME DECREASING PROCEDURE 4247

[15] V. Namboodiri and L. Gao, “Energy-aware tag anticollision protocols for Asier Perallos received the B.E., M.S., and Ph.D.
RFID systems,” IEEE Trans. Mobile Comput., vol. 9, no. 1, pp. 44–59, degrees in computer engineering from the University
Jan. 2010. of Deusto, Bilbao, Spain. Since 1999, he has
[16] X. Yan and X. Liu, “Evaluating the energy consumption of the RFID been working as a Lecturer with the Faculty of
tag collision resolution protocols,” Telecommun. Syst., vol. 52, no. 4, Engineering, University of Deusto. Currently, he is
pp. 2561–2568, 2013. an Associate Professor. He is the Head Researcher
[17] D. K. Klair, K.-W. Chin, and R. Raad, “An investigation into the energy of the DeustoTech Mobility Unit, Deusto Institute
efficiency of pure and slotted aloha based RFID anti-collision proto- of Technology (DeustoTech), where he coordinates
cols,” in Proc. IEEE Int. Symp. World Wireless Mobile Multimedia Netw. the research activities of around 25 researchers. He
(WoWMoM’07), 2007, pp. 1–4. has over a decade of experience in R&D manage-
[18] F. Hessar and S. Roy, “Energy based performance evaluation of passive ment, more than 25 JCR indexed publications and
EPC gen 2 class 1 RFID systems,” IEEE Trans. Commun., vol. 61, no. 4, more than 50 other contributions in the area of ITS and 2 Ph.D. disserta-
pp. 1337–1348, Apr. 2013. tions supervised. His research interests include telematic systems, vehicular
[19] X. Jia, Q. Feng, and L. Yu, “Stability analysis of an efficient anti-collision communication middleware, and intelligent transportation systems.
protocol for RFID tag identification,” IEEE Trans. Commun., vol. 60,
no. 8, pp. 2285–2294, Aug. 2012. Enrique Onieva was born in Priego de Cordoba,
[20] H. Landaluce, A. Perallos, and I. Zuazola, “A fast RFID identification Spain, in 1983. He received the B.E., M.E., and
protocol with low tag complexity,” IEEE Commun. Lett., vol. 17, no. 9, Ph.D. degrees in computer science (with specializa-
pp. 1704–1706, Sep. 2013. tion in soft computing and intelligent systems) from
[21] X. Jia, Q. Feng, and C. Ma, “An efficient anti-collision protocol for RFID the University of Granada, Granada, Spain, in 2006,
tag identification,” IEEE Commun. Lett., vol. 14, no. 11, pp. 1014–1016, 2008, and 2011, respectively. From 2007 to 2012, he
Nov. 2010. was with AUTOPIA at the Centre for Automation
[22] Y.-C. Lai, L.-Y. Hsiao, H.-J. Chen, C.-N. Lai, and J.-W. Lin, “A and Robotics, Madrid, Spain. In 2012, he was with
novel query tree protocol with bit tracking in RFID tag identification,” the Models of Decision and Optimization Group,
IEEE Trans. Mobile Comput., vol. 12, no. 10, pp. 2063–2075, Oct. University of Granada. Since 2013, he has been with
2013. the Mobility Unit, Deusto Insitute of Technology.
[23] H. Vogt, “Efficient object identification with passive RFID tags,” His research interests include soft computing techniques in ITS, including
in Pervasive Computing. New York, NY, USA: Springer, 2002, fuzzy-logic based decision and control, and evolutionary optimization.
pp. 98–113.
[24] L. Pan and H. Wu, “Smart trend-traversal protocol for RFID tag arbitra-
tion,” IEEE Trans. Wireless Commun., vol. 10, no. 11, pp. 3565–3569, Laura Arjona received the B.E. degree in telecom-
Nov. 2011. munications engineering from the University of
[25] H. Landaluce, A. Perallos, and I. Angulo, “Managing the number of Granada, Granada, Spain, in 2014, and the M.S.
tag bits transmitted in a bit-tracking RFID collision resolution protocol,” degree in information and communication elec-
Sensors, vol. 14, pp. 1010–1027, 2014. tronic systems from the National University of
[26] M. Shahzad and A. Liu, “Probabilistic optimal tree hopping for RFID Distance Education (UNED), Madrid, Spain, in 2015.
identification,” IEEE/ACM Trans. Netw., vol. 23, no. 3, pp. 796–809, Jun. She is currently pursuing the Ph.D. degree at the
2015. DeustoTech Mobility Research Team, University of
Deusto, Bilbao, Spain. Her research interests include
RFID technology, anticollision protocols, and wire-
less sensor networks.
Hugo Landaluce received the B.S. degree in indus-
trial control and electronics engineering from the
University of Deusto, Bilbao, Spain, the M.S. Lars Bengtsson (M’93–SM’07) received the M.Sc.
degree in advanced electronic systems from the degree in electrical engineering and the Ph.D. degree
University of the Basque Country, Leioa, Spain, and in computer systems engineering from Chalmers
the Ph.D. degree in telecommunications and com- University of Technology, Gothenburg, Sweden, in
puter science from the University of Deusto, in 1983 and 1997, respectively. He is an Associate
2007, 2012, and 2014, respectively. He is currently Professor (Docent) with Chalmers University of
a Research Associate with the Mobility Research Technology. He worked as an Electrical Engineer in
Group, DeustoTech. His research interests include industry for some years. His research interests include
RFID technology, anticollision protocols, and algo- radio frequency identification systems and on circuits
rithm analysis and optimization. for residue arithmetic.

Das könnte Ihnen auch gefallen