Method of ID – BTS Tag Recognition Based on the QT Protocol

Article Preview

Abstract:

With the rapid development of Internet of things, the RFID technology also develops very fast. Because of the RFID system has the advantage of low cost and do not require to contact identification, it has been used in many applications. But when system works, there may be many tags at the same time around the reader and may cause the collision problem. In this paper, we propose a Method of ID - BTS tag recognition based on the QT protocol. This method can effectively solve the problem of tag collision and it has fewer times of tags searching and less traffic.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2474-2479

Citation:

Online since:

March 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] FINKENZELLERK. RFID-Handbook Fundamentals and Applications in Contactless Smart Cards and Identification(2ridEdition)[M]. New York:Wiley and Sons, (2003).

Google Scholar

[2] WA NGB S, Z HA NGQS . Studyofanti-collision performance in paralleliz able identificationUI-IFRFID system[J]. Journal on Communications, 2009, 30(6):108-113.

Google Scholar

[3] KIMSS, KIMYH, LEESJ, etal. Animprovedanti-collisionalgorithmusingparitybitinRF1Dsystem[A] . The7thIEEEInternationalSymposiumonNetworkComputingandApplications[C] . 2008. 224—227.

Google Scholar

[4] BONUCCELLIMA, LONETTIF, MARTELLIF. Tree slotted aloha:a new protocol for tag identification in RFID networks [A] . Proc of IEEE Int Symposium on a World of Wireless, Mobile and Multimedia Networks [C] . 2006. 603·608.

DOI: 10.1109/wowmom.2006.112

Google Scholar

[5] CHAJR, KIMJH. DynamicframedslottedALOHAalgorithmsusingfasttagestimationmethodforRFIDsystem [C] . Consumer Communications and Networking Conference, CCNC2006, 3rdtEEE [C] . 2006. 768. 772.

Google Scholar

[6] R.S. Sutton, A.G. Barto, Reinforcement Learning: An Introduction, A Bradford Book, 1998, p.51–52. A Bradford Book, 1998, p.51–52.

Google Scholar

[7] WANGTP. Enhancedbinarysearchwithcut-throughoperationforanti-collisionin RFID systems [J] . IEEE Communications Letters, 2006, 10f4):236—238.

Google Scholar

[8] CAPETANAKISJ. Tree algorithm for packet broadcast channels [J] . IEEE Trans Inform Theory, 1979, 25:505-515.

DOI: 10.1109/tit.1979.1056093

Google Scholar

[9] LAWC, LEEK, SIUKY. Efficient memoryless protocol for tag identification[A]. Proceedings of 4th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communication[C]. Boston, Massachusetts, 2007. 75-84.

DOI: 10.1145/345848.345865

Google Scholar

[10] ZHOU F, CHEN C, JIN D, et al. Evaluation and optimizing power consumption of anti-collision protocols for applications in FRID systems[A]. Proceedings of the International Symposium on Low Power Electronics and Design [C]. 2004. 357-362.

DOI: 10.1145/1013235.1013321

Google Scholar