Skip to main content
Erschienen in: Wireless Personal Communications 1/2019

11.03.2019

A Probability-Based Anti-Collision Protocol for RFID Tag Identification

verfasst von: Xinyu Liang, Yajun Guo

Erschienen in: Wireless Personal Communications | Ausgabe 1/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Anti-collision protocols have long been an important research field in RFID systems, and the collision tree (CT) protocol is very typical. Some researchers have improved CT to achieve better performance. However, these schemes still encounter the problem of too many collisions occurring at the beginning of the tags identification. In order to reduce the initial redundant collision, we propose a Probability-based Query Tree protocol (PQT). PQT divides all tags into several small subsets before the tags to be identified, and the protocol is composed of three parts: Inverse Probability Function (IPF), Total Time Slot Function (TTSF), and Mapping Table. The inverse probability function quantifies the possibility that a subset contains tags. The total time slot function measures the number of total time slots, and is used to obtain an optimal position to divide tags in the beginning. The mapping table is presented as an adaptive method in practical applications. In performance analysis, the identification efficiency of PQT is close to the optimal value. Simulation results further show that PQT outperforms the other existing anti-collision protocols.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ahuja, S., & Potti, P. (2010). An introduction to RFID technology. Communications and Network, 2(3), 183–186.CrossRef Ahuja, S., & Potti, P. (2010). An introduction to RFID technology. Communications and Network, 2(3), 183–186.CrossRef
2.
Zurück zum Zitat Sarac, A., Absi, N., & Dauzère-Pérès, S. (2010). A literature review on the impact of RFID technologies on supply chain management. International Journal of Production Economics, 128(1), 77–95.CrossRef Sarac, A., Absi, N., & Dauzère-Pérès, S. (2010). A literature review on the impact of RFID technologies on supply chain management. International Journal of Production Economics, 128(1), 77–95.CrossRef
3.
Zurück zum Zitat Liu, X., Li, K., Liu, A. X., Guo, S., Shahzad, M., Wang, A. L., et al. (2017). Multi-category RFID estimation. IEEE/ACM Transactions on Networking, 25(1), 264–277.CrossRef Liu, X., Li, K., Liu, A. X., Guo, S., Shahzad, M., Wang, A. L., et al. (2017). Multi-category RFID estimation. IEEE/ACM Transactions on Networking, 25(1), 264–277.CrossRef
4.
Zurück zum Zitat Zou, Y., Xiao, J., Han, J., Wu, K., Li, Y., & Ni, L. M. (2017). GRfid: A device-free RFID-based gesture recognition system. IEEE Transactions on Mobile Computing, 16(2), 381–393.CrossRef Zou, Y., Xiao, J., Han, J., Wu, K., Li, Y., & Ni, L. M. (2017). GRfid: A device-free RFID-based gesture recognition system. IEEE Transactions on Mobile Computing, 16(2), 381–393.CrossRef
5.
Zurück zum Zitat Atzori, L., Iera, A., & Morabito, G. (2010). The Internet of Things: A survey. Computer Networks, 54(15), 2787–2805.MATHCrossRef Atzori, L., Iera, A., & Morabito, G. (2010). The Internet of Things: A survey. Computer Networks, 54(15), 2787–2805.MATHCrossRef
6.
Zurück zum Zitat Welbourne, E., Battle, L., Cole, G., Gould, K., Rector, K., Raymer, S., et al. (2009). Building the Internet of Things using RFID the RFID ecosystem experience. IEEE Internet Computing, 13(3), 48–55.CrossRef Welbourne, E., Battle, L., Cole, G., Gould, K., Rector, K., Raymer, S., et al. (2009). Building the Internet of Things using RFID the RFID ecosystem experience. IEEE Internet Computing, 13(3), 48–55.CrossRef
7.
Zurück zum Zitat Rennane, A., Saadi, H., Touhami, R., & Yagoub, M. C. E. (2012). A comparative performance evaluation study of the basic binary tree and aloha based anti-collision protocols for passive RFID system. In: Proceedings of 2012 24th international conference on microelectronics, Dec. 2012. Rennane, A., Saadi, H., Touhami, R., & Yagoub, M. C. E. (2012). A comparative performance evaluation study of the basic binary tree and aloha based anti-collision protocols for passive RFID system. In: Proceedings of 2012 24th international conference on microelectronics, Dec. 2012.
8.
Zurück zum Zitat Namboodiri, V., DeSilva, M., Deegala, K., & Ramamoorthy, S. (2012). An extensive study of slotted Aloha-based RFID anti-collision protocols. Computer Communications, 35(16), 1955–1966.CrossRef Namboodiri, V., DeSilva, M., Deegala, K., & Ramamoorthy, S. (2012). An extensive study of slotted Aloha-based RFID anti-collision protocols. Computer Communications, 35(16), 1955–1966.CrossRef
9.
Zurück zum Zitat Wu, H., & Zeng, Y. (2011). Efficient framed slotted aloha protocol for RFID tag anticollision. IEEE Transactions on Automation Science and Engineering, 8(3), 581–588.CrossRef Wu, H., & Zeng, Y. (2011). Efficient framed slotted aloha protocol for RFID tag anticollision. IEEE Transactions on Automation Science and Engineering, 8(3), 581–588.CrossRef
10.
Zurück zum Zitat Felemban, E. (2012). A revisit on modeling framed slotted aloha anti-collision protocol for RFID systems. In Proceedings of 2012 IEEE international conference on RFID-technologies and applications (pp. 315–318), Nov. 2012. Felemban, E. (2012). A revisit on modeling framed slotted aloha anti-collision protocol for RFID systems. In Proceedings of 2012 IEEE international conference on RFID-technologies and applications (pp. 315–318), Nov. 2012.
11.
Zurück zum Zitat Wang, H., Xiao, S., Lin, F., Yang, T., & Yang, L. T. (2014). Group improved enhanced dynamic frame slotted ALOHA anti-collision algorithm. The Journal of Supercomputing, 69(3), 1235–1253.CrossRef Wang, H., Xiao, S., Lin, F., Yang, T., & Yang, L. T. (2014). Group improved enhanced dynamic frame slotted ALOHA anti-collision algorithm. The Journal of Supercomputing, 69(3), 1235–1253.CrossRef
12.
Zurück zum Zitat Lee, C., & Lin, S. (2012). A double blocking dynamic framed slotted ALOHA anti-collision method for mobile RFID systems. In Proceedings of 2012 sixth international conference on genetic and evolutionary computing (pp. 581–584), Aug. 2012. Lee, C., & Lin, S. (2012). A double blocking dynamic framed slotted ALOHA anti-collision method for mobile RFID systems. In Proceedings of 2012 sixth international conference on genetic and evolutionary computing (pp. 581–584), Aug. 2012.
13.
Zurück zum Zitat Zhu, L., & Yum, T. P. (2010). Optimal framed Aloha based anti-collision algorithms for RFID systems. IEEE Transactions on Communications, 58(12), 3583–3592.CrossRef Zhu, L., & Yum, T. P. (2010). Optimal framed Aloha based anti-collision algorithms for RFID systems. IEEE Transactions on Communications, 58(12), 3583–3592.CrossRef
14.
Zurück zum Zitat Nithya, S., Jerlin, M. A., & Priya, S. (2013). Tag starvation and tag collisions in RFID system—A solution. International Journal of Engineering and Technology, 5(3), 2519–2522. Nithya, S., Jerlin, M. A., & Priya, S. (2013). Tag starvation and tag collisions in RFID system—A solution. International Journal of Engineering and Technology, 5(3), 2519–2522.
15.
Zurück zum Zitat Jia, X., Feng, Q., & Yu, L. (2012). Stability analysis of an efficient anti-collision protocol for RFID tag identification. IEEE Transactions on Communications, 60(8), 2285–2294.CrossRef Jia, X., Feng, Q., & Yu, L. (2012). Stability analysis of an efficient anti-collision protocol for RFID tag identification. IEEE Transactions on Communications, 60(8), 2285–2294.CrossRef
16.
Zurück zum Zitat Ryu, J., Lee, H., Seok, Y., Kwon, T., & Choi, Y. (2007). A hybrid query tree protocol for tag collision arbitration in RFID systems. In IEEE international conference on communications (pp. 5981–5986). Ryu, J., Lee, H., Seok, Y., Kwon, T., & Choi, Y. (2007). A hybrid query tree protocol for tag collision arbitration in RFID systems. In IEEE international conference on communications (pp. 5981–5986).
17.
Zurück zum Zitat Kim, Y., Kim, S., Lee, S., & Ahn, K. (2009). Improved 4-ary query tree algorithm for anti-collision in RFID system. In Proceedings of 2009 international conference on advanced information networking and applications (pp. 699–704), May. 2009. Kim, Y., Kim, S., Lee, S., & Ahn, K. (2009). Improved 4-ary query tree algorithm for anti-collision in RFID system. In Proceedings of 2009 international conference on advanced information networking and applications (pp. 699–704), May. 2009.
18.
Zurück zum Zitat Guo, Y., Li, S., Dou, J., & Zhou, S. (2016). Deterministic cloned tag detection protocol for anonymous radio-frequency identification systems. IET Information Security, 10(1), 28–32.CrossRef Guo, Y., Li, S., Dou, J., & Zhou, S. (2016). Deterministic cloned tag detection protocol for anonymous radio-frequency identification systems. IET Information Security, 10(1), 28–32.CrossRef
19.
Zurück zum Zitat Moshref, M. (2017). Improved anti-collision algorithm for tag identification in future internet of things. International Journal of Computer Network and Information Security, 9(3), 11–20. Moshref, M. (2017). Improved anti-collision algorithm for tag identification in future internet of things. International Journal of Computer Network and Information Security, 9(3), 11–20.
20.
Zurück zum Zitat Wu, F., Xu, L., Kumari, S., Li, X., Das, A. K., & Shen, J. (2017). A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications. Journal of Ambient Intelligence and Humanized Computing, 2, 1–12. Wu, F., Xu, L., Kumari, S., Li, X., Das, A. K., & Shen, J. (2017). A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications. Journal of Ambient Intelligence and Humanized Computing, 2, 1–12.
21.
Zurück zum Zitat Abdolmaleki, B., Baghery, K., Khazaei, S., & Aref, M. R. (2017). Game-based privacy analysis of RFID security schemes for confident authentication in IoT. Wireless Personal Communications, 6, 1–24. Abdolmaleki, B., Baghery, K., Khazaei, S., & Aref, M. R. (2017). Game-based privacy analysis of RFID security schemes for confident authentication in IoT. Wireless Personal Communications, 6, 1–24.
22.
Zurück zum Zitat Sun, H., Su, C., & Chen, S. P. (2018). A high security RFID system authentication protocol design base on cloud computer. Wireless Personal Communications, 102(2), 1255–1267.CrossRef Sun, H., Su, C., & Chen, S. P. (2018). A high security RFID system authentication protocol design base on cloud computer. Wireless Personal Communications, 102(2), 1255–1267.CrossRef
23.
Zurück zum Zitat Xiao, Q., Xiao, B., Chen, S., & Chen, J. (2017). Collision-aware churn estimation in large-scale dynamic RFID systems. IEEE/ACM Transactions on Networking, 25(1), 392–405. Xiao, Q., Xiao, B., Chen, S., & Chen, J. (2017). Collision-aware churn estimation in large-scale dynamic RFID systems. IEEE/ACM Transactions on Networking, 25(1), 392–405.
24.
Zurück zum Zitat Liu, X., Zhang, S., Xiao, B., & Bu, K. (2016). Flexible and time-efficient tag scanning with handheld readers. IEEE Transactions on Mobile Computing, 15(4), 840–852.CrossRef Liu, X., Zhang, S., Xiao, B., & Bu, K. (2016). Flexible and time-efficient tag scanning with handheld readers. IEEE Transactions on Mobile Computing, 15(4), 840–852.CrossRef
25.
Zurück zum Zitat Xie, X., Liu, X., & Li, K. (2017). Minimal perfect hashing-based information collection protocol for RFID systems. IEEE Transactions on Mobile Computing, 16, 2792–2805.CrossRef Xie, X., Liu, X., & Li, K. (2017). Minimal perfect hashing-based information collection protocol for RFID systems. IEEE Transactions on Mobile Computing, 16, 2792–2805.CrossRef
26.
Zurück zum Zitat Odelu, V., Das, A. K., & Goswami, A. (2016). SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms. IEEE Transactions on Consumer Electronics, 62(1), 30–38.CrossRef Odelu, V., Das, A. K., & Goswami, A. (2016). SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms. IEEE Transactions on Consumer Electronics, 62(1), 30–38.CrossRef
27.
Zurück zum Zitat Bai, Z., He, Y., & Wang, S. (2014). Research of RFID tag anti-collision algorithm based on binary tree. Journal of Networks, 9(9), 2543–2548.CrossRef Bai, Z., He, Y., & Wang, S. (2014). Research of RFID tag anti-collision algorithm based on binary tree. Journal of Networks, 9(9), 2543–2548.CrossRef
28.
Zurück zum Zitat Chen, K., & Li, B. (2013). An improved query tree anti-collision algorithm using collision location. Research Journal of Applied Sciences, Engineering and Technology, 5(8), 2494–2498.CrossRef Chen, K., & Li, B. (2013). An improved query tree anti-collision algorithm using collision location. Research Journal of Applied Sciences, Engineering and Technology, 5(8), 2494–2498.CrossRef
29.
Zurück zum Zitat Landaluce, H., Perallos, A., Bengtsson, L., & Zuazola, I. J. G. (2014). Simplified computation in memoryless anti-collision RFID identification protocols. Electronics Letters, 50(17), 1250–1252.CrossRef Landaluce, H., Perallos, A., Bengtsson, L., & Zuazola, I. J. G. (2014). Simplified computation in memoryless anti-collision RFID identification protocols. Electronics Letters, 50(17), 1250–1252.CrossRef
30.
Zurück zum Zitat Choi, S., Choi, J., & Yoo, J. (2012). An efficient anti-collision protocol for tag identification in RFID systems with capture effect. In Proceedings of 2012 fourth international conference on ubiquitous and future networks (pp. 482–483), Jul. 2012. Choi, S., Choi, J., & Yoo, J. (2012). An efficient anti-collision protocol for tag identification in RFID systems with capture effect. In Proceedings of 2012 fourth international conference on ubiquitous and future networks (pp. 482–483), Jul. 2012.
31.
Zurück zum Zitat Jia, X., Feng, Q., Fan, T., & Lei, Q. (2012). Analysis of anti-collision protocols for RFID tag identification. In Proceedings of 2012 2nd international conference on consumer electronics, communications and networks (pp. 877–880), Apr. 2012. Jia, X., Feng, Q., Fan, T., & Lei, Q. (2012). Analysis of anti-collision protocols for RFID tag identification. In Proceedings of 2012 2nd international conference on consumer electronics, communications and networks (pp. 877–880), Apr. 2012.
32.
Zurück zum Zitat Landuluce, H., Perallos, A., & Angulo, I. (2014). Managing the number of tag bits transmitted in a bit-tracking RFID collision resolution protocol. Sensors, 14(1), 1010–1027.CrossRef Landuluce, H., Perallos, A., & Angulo, I. (2014). Managing the number of tag bits transmitted in a bit-tracking RFID collision resolution protocol. Sensors, 14(1), 1010–1027.CrossRef
33.
Zurück zum Zitat Lai, Y. C., Hsiao, L. Y., & Lin, B. S. (2015). Optimal slot assignment for binary tracking tree protocol in RFID tag identification. IEEE/ACM Transactions on Networking, 23(1), 255–268.CrossRef Lai, Y. C., Hsiao, L. Y., & Lin, B. S. (2015). Optimal slot assignment for binary tracking tree protocol in RFID tag identification. IEEE/ACM Transactions on Networking, 23(1), 255–268.CrossRef
34.
Zurück zum Zitat Pan, L., & Wu, H. (2011). Smart trend-traversal protocol for RFID tag arbitration. IEEE Transactions on Wireless Communications, 10(11), 3565–3569.CrossRef Pan, L., & Wu, H. (2011). Smart trend-traversal protocol for RFID tag arbitration. IEEE Transactions on Wireless Communications, 10(11), 3565–3569.CrossRef
35.
Zurück zum Zitat Guo, H., Leung, V. C. M., & Bolic, M. (2012). M-ary RFID tags splitting with small idle slots. IEEE Transactions on Automation Science and Engineering, 9(1), 177–181. Guo, H., Leung, V. C. M., & Bolic, M. (2012). M-ary RFID tags splitting with small idle slots. IEEE Transactions on Automation Science and Engineering, 9(1), 177–181.
36.
Zurück zum Zitat Shao, M., Jin, X., & Jin, L. (2014). An improved dynamic adaptive multi-tree search anti-collision algorithm based on RFID. In Proceedings of 2014 international conference on data science and advanced analytics (pp. 72–75), Nov. 2014. Shao, M., Jin, X., & Jin, L. (2014). An improved dynamic adaptive multi-tree search anti-collision algorithm based on RFID. In Proceedings of 2014 international conference on data science and advanced analytics (pp. 72–75), Nov. 2014.
37.
Zurück zum Zitat Hush, D. R., & Wood, C. (1998). Analysis of tree algorithms for RFID arbitration. In Proceedings of the IEEE symposium on information theory (pp. 107–116), Aug. 1998. Hush, D. R., & Wood, C. (1998). Analysis of tree algorithms for RFID arbitration. In Proceedings of the IEEE symposium on information theory (pp. 107–116), Aug. 1998.
38.
Zurück zum Zitat Zhang, L., Zhang, J., & Tang, X. (2013). Assigned tree slotted Aloha RFID tag anti-collision protocols. IEEE Transactions on Wireless Communications, 12(11), 5493–5505.CrossRef Zhang, L., Zhang, J., & Tang, X. (2013). Assigned tree slotted Aloha RFID tag anti-collision protocols. IEEE Transactions on Wireless Communications, 12(11), 5493–5505.CrossRef
39.
Zurück zum Zitat Zhang, W., Guo, Y., Tang, X., Cui, G., Wu, L., & Mei, Y. (2013). An efficient adaptive anticollision algorithm based on 4-ary pruning query tree. International Journal of Distributed Sensor Networks, 9, 1–7. Zhang, W., Guo, Y., Tang, X., Cui, G., Wu, L., & Mei, Y. (2013). An efficient adaptive anticollision algorithm based on 4-ary pruning query tree. International Journal of Distributed Sensor Networks, 9, 1–7.
40.
Zurück zum Zitat Landaluce, H., Perallos, A., & Angulo, I. (2013). Influence of managing the number of tag bits transmitted on the query tree RFID collision resolution protocol. Journal of Communications Software and Systems, 9(1), 35.CrossRef Landaluce, H., Perallos, A., & Angulo, I. (2013). Influence of managing the number of tag bits transmitted on the query tree RFID collision resolution protocol. Journal of Communications Software and Systems, 9(1), 35.CrossRef
41.
Zurück zum Zitat Yan, X. Q., Liu, Y., Li, B., & Liu, X. M. (2015). A memoryless binary query tree based successive scheme for passive RFID tag collision resolution. Information Fusion, 22, 26–38.CrossRef Yan, X. Q., Liu, Y., Li, B., & Liu, X. M. (2015). A memoryless binary query tree based successive scheme for passive RFID tag collision resolution. Information Fusion, 22, 26–38.CrossRef
42.
Zurück zum Zitat Jayadi, R., Lai, Y., & Li, C. (2017). Efficient time-oriented anti-collision protocol for RFID tag identification. Computer Communications, 112, 141–153.CrossRef Jayadi, R., Lai, Y., & Li, C. (2017). Efficient time-oriented anti-collision protocol for RFID tag identification. Computer Communications, 112, 141–153.CrossRef
43.
Zurück zum Zitat Bagheri, N., Alenaby, P., & Safkhani, M. (2017). A new anti-collision protocol based on information of collided tags in RFID systems. International Journal of Communication Systems, 30(3), e2975.CrossRef Bagheri, N., Alenaby, P., & Safkhani, M. (2017). A new anti-collision protocol based on information of collided tags in RFID systems. International Journal of Communication Systems, 30(3), e2975.CrossRef
44.
Zurück zum Zitat Fu, Y., Wang, X., Wang, E., & Qian, Z. (2017). A bit arbitration tree anti-collision protocol in radio frequency identification systems. International Journal of Distributed Sensor Networks, 13(11), 155014771774157.CrossRef Fu, Y., Wang, X., Wang, E., & Qian, Z. (2017). A bit arbitration tree anti-collision protocol in radio frequency identification systems. International Journal of Distributed Sensor Networks, 13(11), 155014771774157.CrossRef
45.
Zurück zum Zitat Wei, W., Su, J., Song, H., Wang, H., & Fan, X. (2018). CDMA-based anti-collision algorithm for EPC global C1 Gen2 systems. Telecommunication Systems, 67(1), 63–71.CrossRef Wei, W., Su, J., Song, H., Wang, H., & Fan, X. (2018). CDMA-based anti-collision algorithm for EPC global C1 Gen2 systems. Telecommunication Systems, 67(1), 63–71.CrossRef
46.
Zurück zum Zitat Cmiljanic, N., Landaluce, H., Perallos, A., & Arjona, L. (2017). Influence of the distribution of tag IDs on RFID memoryless anti-collision protocols. Sensors, 17(8), 1891.CrossRef Cmiljanic, N., Landaluce, H., Perallos, A., & Arjona, L. (2017). Influence of the distribution of tag IDs on RFID memoryless anti-collision protocols. Sensors, 17(8), 1891.CrossRef
47.
Zurück zum Zitat Zhang, Y., Yang, F., Wang, Q., He, Q., Li, J., & Yang, Y. (2017). An anti-collision algorithm for RFID-based robots based on dynamic grouping binary trees. Computers & Electrical Engineering, 63, 91–98.CrossRef Zhang, Y., Yang, F., Wang, Q., He, Q., Li, J., & Yang, Y. (2017). An anti-collision algorithm for RFID-based robots based on dynamic grouping binary trees. Computers & Electrical Engineering, 63, 91–98.CrossRef
48.
Zurück zum Zitat Chen, B., Zhou, Z., & Yu, H. (2016). Understanding RFID counting protocols. IEEE/ACM Transactions on Networking, 24(1), 312–327.CrossRef Chen, B., Zhou, Z., & Yu, H. (2016). Understanding RFID counting protocols. IEEE/ACM Transactions on Networking, 24(1), 312–327.CrossRef
49.
Zurück zum Zitat Shakiba, M., Singh, M. J., Sundararajan, E., Zawari, A., & Islam, M. T. (2014). Extending birthday paradox theory to estimate the number of tags in RFID systems. PLoS ONE, 9(4), e95425.CrossRef Shakiba, M., Singh, M. J., Sundararajan, E., Zawari, A., & Islam, M. T. (2014). Extending birthday paradox theory to estimate the number of tags in RFID systems. PLoS ONE, 9(4), e95425.CrossRef
Metadaten
Titel
A Probability-Based Anti-Collision Protocol for RFID Tag Identification
verfasst von
Xinyu Liang
Yajun Guo
Publikationsdatum
11.03.2019
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2019
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-019-06240-1

Weitere Artikel der Ausgabe 1/2019

Wireless Personal Communications 1/2019 Zur Ausgabe

Neuer Inhalt