Beruflich Dokumente
Kultur Dokumente
6, JUNE 2016
Abstract—Up to date energy-aware radio frequency identifica- reader and the tags to establish communication. In addition, it
tion (RFID) anticollision protocols are mainly focused on RFID is a low-intrusive technology, which can be easily adapted to the
systems using active tags. The introduction of RFID in portable Internet of Things and the paradigm of Ubiquitous Computation
devices, and the increasing popularity of passive tags, demands low
energy-consumption anticollision protocols in environments with [2], [3]. Typically, an RFID system comprises tags and read-
passive tags. Memoryless protocols present the simplest tag hard- ers [1]. The tags can be active (battery operated) or passive
ware that is beneficial for a low energy consumption. However, (obtaining power from the reader’s signal). Passive tags are pre-
the excessive collisions required by these protocols increases the ferred when low cost and long lifetime are sought, but provide
energy consumption, wasting a large number of tag transmitting less coverage. This paper is focused on passive RFID systems
bits. In this paper, a window procedure is presented to manage
the length of the tags’ bit-stream in order to limit the energy consisting of a reader and different numbers of passive tags.
wastage in collisions. The bit window is applied to two memoryless The existence of various tags transmitting at the same time
anticollision protocols, the query tree protocol (QT) and the colli- causes the tag collision problem [1], [4], [5]. Since tags share
sion tree protocol (CT), producing the query window tree protocol the same communication channel (the air), their signals can be
(QwT) and the collision window tree protocol (CwT). Simulations garbled and the reader may not be able to decode the waveforms
show that the use of this window yields significant reductions in
energy consumption and identification time. In addition, QwT and of the signals. This leads to retransmitting the tag messages
CwT are compared to state of the art memoryless protocols to con- until the reader receives them correctly, causing an increase
firm that CwT is an outstanding candidate for reducing energy in the time needed to identify the tags and in the energy con-
consumption. Also, the results obtained show how the bit win- sumed during that process. Due to some restrictions imposed
dow procedure increases energy savings as the length of the tag by RFID [4], general multi-access protocols have had to be
ID increases.
adapted, producing anti-collision protocols. These protocols are
Index Terms—RFID, anti-collision, memoryless protocols, still an interesting research topic, much covered in the current
query tree, collision tree, bit-tracking, energy aware. literature [5]–[7]. The main existing anti-collision protocols can
be classified into Aloha-based and tree-based protocols.
I. I NTRODUCTION Aloha based protocols are probabilistic, since the tag
responses are organized randomly. These responses are dis-
T HE Radio Frequency Identification (RFID) technology is
one of the best known auto-identification techniques. It is
used to identify codes stored in tags that backscatter a reader’s
tributed among various slots, and the more uniformly spaced
are the transmissions, the higher is the probability of success.
signal [1]. The tags are attached to different objects, provid- Research in Aloha based protocols is focused on the improve-
ing them with new functionalities. Location, traceability, and ment of dynamic framed slotted Aloha protocols (DFSA) [8]–
remote identification of the objects are the most common appli- [10]. The estimators used to define the frame size are increas-
cations of RFID. An outstanding characteristic of this technol- ingly accurate at the expense of an increase in the mathematical
ogy is that it does not need a direct line of sight between the and computational cost [11]. Tree based protocols are, on the
other hand, deterministic: they identify the total number of tags
Manuscript received October 20, 2014; revised September 21, 2015 and in the interrogation zone. The total amount of information trans-
January 7, 2016; accepted February 21, 2016. Date of publication March 3, mitted between readers and tags is usually higher than in Aloha
2016; date of current version June 7, 2016. This work has been partially funded based protocols. However, the tags’ cost is usually lower in tree
by the Spanish “Ministerio de Ciencia e Innovacin” (TEC2013-45585-C2-2-R)
and the Basque Government (PC2013-71A). The associate editor coordinating based protocols. The reader controls every step of the protocol,
the review of this paper and approving it for publication was M. Manteghi. using commands or bit-string prefixes (called queries) to split
H. Landaluce, A. Perallos, E. Onieva, and L. Arjona are with colliding tags into subsets, and further repeatedly split those
the Deusto Institute of Technology (DeustoTech), University of Deusto, subsets until achieving a successful response from all the tags.
Bilbao 48007, Spain (e-mail: hlandaluce@deusto.es; perallos@deusto.es;
enrique.onieva@deusto.es; laura.arjona@deusto.es). There are two types of tags: those with memory and those with-
L. Bengtsson is with Department of Computer Science and Engineering, out. The main difference between them is that the response of
Chalmers University of Technology, Göteborg SE-41296, Sweden tags not using memory (memoryless tags) depends only on the
(e-mail: labe@chalmers.se).
query prefix transmitted by the reader and the identification
Color versions of one or more of the figures in this paper are available online
at http://ieeexplore.ieee.org. code (ID). The query tree protocol (QT) [12] is one of the most
Digital Object Identifier 10.1109/TWC.2016.2537800 representative memoryless protocols. On the other hand, tags
1536-1276 © 2016 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution
requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
LANDALUCE et al.: ENERGY AND IDENTIFICATION TIME DECREASING PROCEDURE 4235
Fig. 3. Example of a communication slot between the reader and one tag.
TABLE I
H EURISTIC F UNCTIONS TO P ROVIDE DYNAMISM TO THE B IT W INDOW
B. Heuristic Functions
Three heuristic functions will be presented (linear, quadratic IV. T HE Q W T P ROTOCOL
and exponential) to dynamically adjust the window size W in The first presented protocol is the QwT, which applies a
order to maintain a balance by reducing the tag transmitting bits dynamic bit window to QT. Whenever the reader transmits a
and limiting the number of go-on slots. These functions yield query [q1 . . . q L ] of length L to indicate to the tags whether
three different gradients to increase W , taking into considera- to transmit or not, the parameter value W , which adds
tion the length of the current query L. This allows the reader log2 W + 1 bits to the reader command, is attached. Tags
to choose small W when PC is prone to increase, providing a receive and compare the query with their ID [d1 . . . dk ], and
small colliding tag bit rate; while they offer larger W when L matching tags respond with the W bits [w1 . . . wW ] = [d L+1 . . .
increases (and, thus PC decreases), contributing to decrease the d L+W ] to the last query bit received, where di , wi {0, 1}, see
number of go-on slots. As will be explained below, the result Fig. 3. Apart from this, a cyclic redundancy check procedure
of these functions f (L) will only be assigned to W upon a (CRC), similar to that demanded on the EPC C1G2 stan-
go-on slot since during a collision or an idle slot, W will be dard [8], is attached to the tags’ window response so that the
held unchanged. Table I shows the three heuristic functions and reader can differentiate by checking the consistency of the CRC
a limiting function to k−L for the tags’ responses in case the between a correct response that can be used, or an erroneous tag
heuristic function exceeds this value. response, caused by a collision.
Each function’s gradient is adjusted with the parameter β Pseudo-code for the QwT reader and tags is shown in Fig. 5
using graphical simulations to decrease the energy consumed to perform one full identification of a set of tags. A recursive
by the protocol the window is applied to. Two protocols function (QwT see Fig. 5 line 2) is called until all the set of
have been chosen in this paper to be modified by a bit win- tags is identified. In the beginning, the reader is initialized with
dow procedure: QT, which provides the lowest tag hardware W = 1 and two starting queries ‘0’ and ‘1.’ A new command is
cost and the highest improvement capacity, yielding the query assembled with the first query and W , and broadcast to the tags.
window tree protocol (QwT); and CT, which is an evolved After a certain period of time or after receiving a response, the
QT using bit tracking, yielding the collision window tree reader identifies the type of slot, generates a new query, and
protocol (CwT). assigns a new value to W considering the type of slot received.
LANDALUCE et al.: ENERGY AND IDENTIFICATION TIME DECREASING PROCEDURE 4239
There are four different type of slots: idle, collision, go-on, and
success.
• An idle slot (Fig. 5 line 8) is when no response is received.
The reader then discards that query and continues with the
process.
• A collision slot (Fig. 5 lines {10−12}) is when the
reader receives a window which is not CRC consistent.
W remains unchanged, retaining its former value, and
two supplementary queries are generated [q1 . . . q L , 0]
and [q1 . . . q L , 1]; made of the former query [q1 . . . q L ]
appended with either ‘0’ or ‘1.’ Then the reader recur-
sively starts transmitting them to the tags.
• A go-on slot (Fig. 5 lines {15−17}) is when the CRC
validates the received window and the condition L +
W < k is met. A new query is generated by affixing
the immediately received window to the former query
[q1 . . . q L , w1 . . . wW ] and a new W is calculated with
the heuristic function, W = f (L). Then, the reader recur-
sively transmits the new command with the updated query
and W .
• Finally, a success slot (Fig. 5 line 19) is when the CRC
validates the received window and the tag ID is uniquely
defined L + W = k. Then, the ID is stored in a database Fig. 6. Variation in the number of go-on slots and transmitted bits per tag in
and the query is discarded, to continue with the process. QwT for different values of β, for n tags, and three different heuristic functions:
The tag’s operation in Fig. 5 starts with receiving the reader’s (a) linear, (b) quadratic, and (c) exponential.
command. The tag obtains the query and compares it to the
proper portion of its ID. Should its ID match the query, the
tag calculates the CRC (as discussed in the comparison in
Section VI, CRCs of 1 and 5 bits are used). Then, the tag trans-
mits by backscattering the W bits that follow the last query bit
received L and attaches the calculated CRC in the response.
A. Tuning β in QwT
As a result of the expression L + W < k, the response
received from the tags does not uniquely identify a full tag
ID and therefore a go-on slot is considered. The recalculation Fig. 7. Selected β for n tags in the interrogation zone using the reader’s energy
of W is done using one of the heuristic functions proposed consumption in QwT for three heuristic functions: (a) linear, (b) quadratic, and
in Table I: linear, quadratic, or exponential. These functions (c) exponential.
include a parameter β that varies the gradient of the func-
tion differently, and must be tuned in order to minimize the are shown in both Fig. 6 and Fig. 7, but the visible tendency
number of go-on slots and tag transmitting bits. These met- using different values of n is similar.
rics are simulated for different values of β and two sets of tags
n = {500, 1000}. The simulation procedure and the parameters
used are defined in Section VI from scenario S1. The results V. T HE C OLLISION W INDOW T REE (C W T)
obtained are shown on the left and right Y -axes, respectively, The second proposed protocol is the collision window tree
in Fig. 6. For the three heuristic functions proposed, the mag- protocol (CwT), which applies the dynamic bit window to CT.
nitudes show opposite behaviours and when one is reduced the This causes the challenging coexistence of two techniques: bit
other one is increased. A balance between these metrics is there- tracking and the bit window. The first one uses Manchester cod-
fore sought. The simulation results of the energy consumed by ification, which allows the reader to identify the exact colliding
the RFID reader calculated using (1), for different values of β, bit and therefore avoids the need of affixing a CRC to the tags’
are shown in Fig. 7 (more details about the simulation param- responses in order to identify the type of slot. Additionally, this
eters are also given in Section VI). The results show that when codification incorporates a clock signal within the transmitting
the energy consumed by the reader is at its lowest (β = 87 for data, which eases the synchronization of the tags’ responses.
Fig. 7.a, β = 105 for Fig. 7.b, β = 0.4 for Fig. 7.c) a proper And last but not least, the combination of both techniques not
balance is achieved between the number of go-on slots and tag only extinguishes idle slots but also decreases the number of tag
transmitting bits in Fig. 6. A handful of tags n = {500, 1000} transmitting bits compared to the non-windowed protocols.
4240 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 6, JUNE 2016
Fig. 9. Dependence of the number of go-on slots and transmitted bits per tag
in CwT on β for n tags with three different heuristic functions: (a) linear,
(b) quadratic, and (c) exponential.
TABLE II
PARAMETERS U SED IN S IMULATIONS . * I NDICATES THE C ONTROL VARIABLES
TABLE IV
T HE B IT W INDOW S AVINGS (N EGATIVE ) AND L OSSES (P OSITIVE ), U SING THE T HREE H EURISTIC F UNCTIONS IN S1. Q UANTITIES IN B OLD R EPRESENT
THE B EST R ESULTS A MONG THE T HREE H EURISTICS . QwTquad AND CwTlin P RESENT THE H IGHEST E NERGY AND I DENTIFICATION T IME S AVINGS
Fig. 12. Simulation results of: (a) the average tag transmitting bits, (b) the tag bit efficiency, (c) the total slots, and (d) the reader bits transmitted in S1.
Fig. 13. Simulation results obtained for the energy consumption in S2, S3, S4, when n is 100 and 1000 tags.
LANDALUCE et al.: ENERGY AND IDENTIFICATION TIME DECREASING PROCEDURE 4245
E. Identified Limitations
This section presents all the limitations encountered during
the design and experimentation process. Some of them have
been already mentioned, but all of them are gathered here. The
main problem caused by the window is the increase in the num-
ber of slots, mainly caused by the increase in the number of
go-on slots. CwT is proposed using bit tracking to decrease the
number of slots. The parameter β used in the three heuristic
functions is chosen to have a higher gradient, thus obtain-
ing better results in terms of identification time and energy
consumption than the QwT. However, the number of tag trans-
mitting bits is increased. This behaviour can be improved and
therefore more research should be carried out to decrease the
number of go-on slots. Another limitation is that the length of
Fig. 14. Simulation results of the energy consumption (a), the identification the current query L and the value W transmitted in the reader
time (b), the tag bit efficiency (c) and the reader bits transmitted (d) in S5 with
n = 1000 tags.
command present a dynamic size, and tags would need special
characters to differentiate both variables. Another parameter
should be included in the command indicating the length L.
because it behaves in a similar manner to the rest of the heuristic Besides, another possible option to mitigate this problem is
functions. The number of tags n is fixed to 1000. to standardize the values of W to powers of 2, and attach
The parameter β used in the former simulations was calcu- the exponent with a fixed size instead of the real value to the
lated for the specific ID length of k = 128 bits. However, in query. This modification could also help the performance of the
order to work properly, the window procedure needs a retun- protocol since the exponential increase of the window would
ing of this parameter for each of the values of k chosen in this be beneficial. Lastly, all the tests have been developed under
new simulation. Therefore, Table V shows the different tuning homogeneous tag ID distributions. The heuristic functions have
values of β for every simulated ID length k. been tuned for this type of distribution, and they would need
The simulation results are shown in Fig. 14. Notice that the to be readjusted according to its variations. Besides, in non-
longer is the ID length k, the better are the results of the win- uniform tag ID distributions, a conversion method [26] could
dowed protocols in energy consumption and identification time be used to obtain a virtual homogeneous distribution.
presented in Fig. 14.a and Fig. 14.b, respectively. For low k, the As future work, the estimation of the proper β value upon
bit tracking protocols CT and OQTT present the lowest energy different scenarios, and the adaptation of the window to identify
consumption. Since OQTT is the most slot decreasing protocol, tags with different ID lengths are proposed.
it does not suffer from an excessive waste of tag transmitting
bits compared to the windowed protocols, which produce a
larger number of slots. However, this balance between the num- VII. C ONCLUSION
ber of tag transmitting bits and slots is slightly inverted as k A bit window procedure has been presented and carefully
increases. In this manner, for the largest values of k of the simu- analysed. Two anti-collision protocols, which we have called
lation results, the windowed protocols present the lowest energy QwT and CwT, have been presented, which apply this bit
4246 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 6, JUNE 2016
window procedure to the memoryless QT and CT protocols. Then, rewriting expression (6) a recursive equation is obtained:
The contributing window has been tested under three differ-
ent heuristic functions retaining their memoryless feature. The ⎡ ⎤n−1
procedure provides an important decrease in the number of ⎢ 1 1 ⎥ 1 1
PG = pn = ⎢
⎣ 1 − 1 − ⎥ + 1 − pn−1
tag transmitting bits, but at the expense of an increase in 2L 2W ⎦ 2L 2L
the number of slots and reader transmitting bits. However,
a b
the window achieves significant energy savings over the non-
windowed protocols, thanks to the reduction of the time spent
1 n−1 1 n−1 1 n−2
by the tags in transmitting. In addition, simulation compar- = a + bp n−1 = a + b a + bp n−2
isons showed that the windowed CwT is a protocol which 2L 2L 2L
outperforms the others in terms of energy savings and thus is 1 n−1
to be considered as a good RFID anti-collision candidate in = (a + ba n−2 + b2 a n−2 + . . . + bn−1 ) + bn p0
2L
passive RFID systems. In addition, when the ID length is suf- p0 =0
ficiently large, QwT outperforms the others in terms of energy (9)
consumption.
n
According to a n − bn = (a − b) a n−k bk−1 and a − b =
k=1
ACKNOWLEDGMENT 1
2 L+W
the final expression is obtained:
The authors would like to thank Emil Gustavsson and
Magnus Önnheim at Chalmers University of Technology for 1 a n − bn
their valuable help in developing the proof of expression (4). PG = = 2W (a n − bn )
2L a − b
n
1 1 1 n
=2 W
1− L 1− W − 1− L (10)
A PPENDIX 2 2 2
Proof of expression (4): Given a set of n tags with n pre-
fixes or queries in S = {s1 , . . . , sn } the following expression is
proposed:
R EFERENCES
PG = P(go−on with n queries) [1] K. Finkenzeller and R. Waddington, RFID Handbook: Radio-frequency
Identification Fundamentals and Applications. Hoboken, NJ, USA:
= pn = P(go−on with n queries|snL )P(snL ) Wiley, 1999.
[2] M. Weiser, “The computer for the 21st century,” Sci. Amer., vol. 265,
no. 3, pp. 94–104, 1991.
+ P(go−on with n queries|snL )P(snL ) (6) [3] R. Want, “Enabling ubiquitous sensing with RFID,” Computer, vol. 37,
no. 4, pp. 84–86, 2004.
[4] C. Abraham et al., “Inventory management using passive RFID tags: A
where the condition that sn matches the L bits transmitted by survey,” Dept. Comput. Sci., The Univ. Texas at Dallas, Richardson, TX,
the reader is snL = 21L , the non-matching condition is snL = 1 − USA, 2002, pp. 1–16.
1 [5] D. K. Klair, K.-W. Chin, and R. Raad, “A survey and tutorial of RFID
2L
, and the rest of the expressions are shown in (7) and (8): anti-collision protocols,” IEEE Commun. Surveys Tuts., vol. 12, no. 3,
pp. 400–421, Apr. 2010.
P(go−on with n queries|snL ) [6] L. Zhu and T.-S. Yum, “A critical survey and analysis of RFID anti-
collision mechanisms,” IEEE Commun. Mag., vol. 49, no. 5, pp. 214–221,
= P(go−on with (n − 1) queries) = pn−1 (7) May 2011.
[7] D.-H. Shih, P.-L. Sun, D. C. Yen, and S.-M. Huang, “Taxonomy and sur-
vey of RFID anti-collision protocols,” Comput. Commun., vol. 29, no. 11,
P(go−on with n queries|snL ) pp. 2150–2166, 2006.
[8] EPCglobal, “Radio-frequency identity protocols class-1 generation-2
= P(s1 , s2 . . . sn−1 no collision with sn ) UHF RFID protocol for communications at 860 MHz–960 MHz version
1.2.0,” 2008.
n−1
[9] C. Qian, Y. Liu, R. Ngan, and L. Ni, “ASAP: Scalable collision arbitra-
= P(sk no collision with sn ) tion for large RFID systems,” IEEE Trans. Parallel Distrib. Syst., vol. 24,
k=1 no. 7, pp. 1277–1288, Jul. 2013.
[10] H. Wu, Y. Zeng, J. Feng, and Y. Gu, “Binary tree slotted ALOHA for pas-
n−1 sive RFID tag anticollision,” IEEE Trans. Parallel Distrib. Syst., vol. 24,
= [P(sk no collision with sn |skL )P(skL ) no. 1, pp. 19–31, Jan. 2013.
[11] L. Zhang, J. Zhang, and X. Tang, “Assigned tree slotted aloha RFID tag
k=1 anti-collision protocols,” IEEE Trans. Wireless Commun., vol. 12, no. 11,
pp. 5493–5505, Nov. 2013.
+ P(sk no collision with sn |skL )P(skL )] [12] C. Law, K. Lee, and K.-Y. Siu, “Efficient memoryless protocol for tag
identification,” in Proc. 4th Int. Workshop Discr. Algorithms Methods
n−1
1 1
1
1
1
n−1 Mobile Comput. Commun., 2000, pp. 75–84.
= + 1− L = 1− L 1− W [13] D. R. Hush and C. Wood, “Analysis of tree algorithms for RFID
2W 2 L 2 2 2 arbitration,” in Proc. IEEE Int. Symp. Inf. Theory, 1998, p. 107.
k=1
[14] D. P. Bertsekas, R. G. Gallager, and P. Humblet, Data Networks.
(8) Englewood Cliffs, NJ, USA: Prentice-Hall, 1992, vol. 2.
LANDALUCE et al.: ENERGY AND IDENTIFICATION TIME DECREASING PROCEDURE 4247
[15] V. Namboodiri and L. Gao, “Energy-aware tag anticollision protocols for Asier Perallos received the B.E., M.S., and Ph.D.
RFID systems,” IEEE Trans. Mobile Comput., vol. 9, no. 1, pp. 44–59, degrees in computer engineering from the University
Jan. 2010. of Deusto, Bilbao, Spain. Since 1999, he has
[16] X. Yan and X. Liu, “Evaluating the energy consumption of the RFID been working as a Lecturer with the Faculty of
tag collision resolution protocols,” Telecommun. Syst., vol. 52, no. 4, Engineering, University of Deusto. Currently, he is
pp. 2561–2568, 2013. an Associate Professor. He is the Head Researcher
[17] D. K. Klair, K.-W. Chin, and R. Raad, “An investigation into the energy of the DeustoTech Mobility Unit, Deusto Institute
efficiency of pure and slotted aloha based RFID anti-collision proto- of Technology (DeustoTech), where he coordinates
cols,” in Proc. IEEE Int. Symp. World Wireless Mobile Multimedia Netw. the research activities of around 25 researchers. He
(WoWMoM’07), 2007, pp. 1–4. has over a decade of experience in R&D manage-
[18] F. Hessar and S. Roy, “Energy based performance evaluation of passive ment, more than 25 JCR indexed publications and
EPC gen 2 class 1 RFID systems,” IEEE Trans. Commun., vol. 61, no. 4, more than 50 other contributions in the area of ITS and 2 Ph.D. disserta-
pp. 1337–1348, Apr. 2013. tions supervised. His research interests include telematic systems, vehicular
[19] X. Jia, Q. Feng, and L. Yu, “Stability analysis of an efficient anti-collision communication middleware, and intelligent transportation systems.
protocol for RFID tag identification,” IEEE Trans. Commun., vol. 60,
no. 8, pp. 2285–2294, Aug. 2012. Enrique Onieva was born in Priego de Cordoba,
[20] H. Landaluce, A. Perallos, and I. Zuazola, “A fast RFID identification Spain, in 1983. He received the B.E., M.E., and
protocol with low tag complexity,” IEEE Commun. Lett., vol. 17, no. 9, Ph.D. degrees in computer science (with specializa-
pp. 1704–1706, Sep. 2013. tion in soft computing and intelligent systems) from
[21] X. Jia, Q. Feng, and C. Ma, “An efficient anti-collision protocol for RFID the University of Granada, Granada, Spain, in 2006,
tag identification,” IEEE Commun. Lett., vol. 14, no. 11, pp. 1014–1016, 2008, and 2011, respectively. From 2007 to 2012, he
Nov. 2010. was with AUTOPIA at the Centre for Automation
[22] Y.-C. Lai, L.-Y. Hsiao, H.-J. Chen, C.-N. Lai, and J.-W. Lin, “A and Robotics, Madrid, Spain. In 2012, he was with
novel query tree protocol with bit tracking in RFID tag identification,” the Models of Decision and Optimization Group,
IEEE Trans. Mobile Comput., vol. 12, no. 10, pp. 2063–2075, Oct. University of Granada. Since 2013, he has been with
2013. the Mobility Unit, Deusto Insitute of Technology.
[23] H. Vogt, “Efficient object identification with passive RFID tags,” His research interests include soft computing techniques in ITS, including
in Pervasive Computing. New York, NY, USA: Springer, 2002, fuzzy-logic based decision and control, and evolutionary optimization.
pp. 98–113.
[24] L. Pan and H. Wu, “Smart trend-traversal protocol for RFID tag arbitra-
tion,” IEEE Trans. Wireless Commun., vol. 10, no. 11, pp. 3565–3569, Laura Arjona received the B.E. degree in telecom-
Nov. 2011. munications engineering from the University of
[25] H. Landaluce, A. Perallos, and I. Angulo, “Managing the number of Granada, Granada, Spain, in 2014, and the M.S.
tag bits transmitted in a bit-tracking RFID collision resolution protocol,” degree in information and communication elec-
Sensors, vol. 14, pp. 1010–1027, 2014. tronic systems from the National University of
[26] M. Shahzad and A. Liu, “Probabilistic optimal tree hopping for RFID Distance Education (UNED), Madrid, Spain, in 2015.
identification,” IEEE/ACM Trans. Netw., vol. 23, no. 3, pp. 796–809, Jun. She is currently pursuing the Ph.D. degree at the
2015. DeustoTech Mobility Research Team, University of
Deusto, Bilbao, Spain. Her research interests include
RFID technology, anticollision protocols, and wire-
less sensor networks.
Hugo Landaluce received the B.S. degree in indus-
trial control and electronics engineering from the
University of Deusto, Bilbao, Spain, the M.S. Lars Bengtsson (M’93–SM’07) received the M.Sc.
degree in advanced electronic systems from the degree in electrical engineering and the Ph.D. degree
University of the Basque Country, Leioa, Spain, and in computer systems engineering from Chalmers
the Ph.D. degree in telecommunications and com- University of Technology, Gothenburg, Sweden, in
puter science from the University of Deusto, in 1983 and 1997, respectively. He is an Associate
2007, 2012, and 2014, respectively. He is currently Professor (Docent) with Chalmers University of
a Research Associate with the Mobility Research Technology. He worked as an Electrical Engineer in
Group, DeustoTech. His research interests include industry for some years. His research interests include
RFID technology, anticollision protocols, and algo- radio frequency identification systems and on circuits
rithm analysis and optimization. for residue arithmetic.