9
840 IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, VOL. 7, NO. 4, OCTOBER 2010 Efficient Estimation and Collision-Group-Based Anticollision Algorithms for Dynamic Frame-Slotted ALOHA in RFID Networks Chun-Fu Lin and Frank Yeong-Sung Lin Abstract—There are two challenges for the frame-slotted ALOHA algorithms in radio-frequency identification (RFID). The first challenge is estimating unknown tag-set size accurately; the second challenge is improving the efficiency of the arbitration process so that it uses less time slots to read all tags. This study proposes estimation algorithm based on the Poisson distribution theory and identifies the overestimation phenomenon in full collision. Our novel anticollision algorithm alternates two distinct reading cycles for dividing and solving tags in collision groups. This makes it more efficient for a reader to identify all tags within a small number of time slots. Note to Practitioners—The contribution of this study is to propose solutions to the estimation and arbitration problem on the RFID MAC layer protocol for the frame-slotted ALOHA. We present efficient estimation and anticollision algorithms to estimating and arbitrating an unknown quantity of tags. The full collision phenomenon and the impact to the estimation accuracy are studied. When full collision occurs, our proposed anticollision algorithm can be effectively solved and use less time slots to read all tags and it has the maximum throughput close to the theoret- ical value. The proposed algorithms are useful for engineers to implement the RFID systems by setting proper frame length to enhance the current RFID standards such as ISO 18000-6 or EPC class 1 generation 2. Index Terms—Anticollision, radio-frequency identification (RFID), tag-set size estimation. I. INTRODUCTION T HE RADIO-FREQUENCY IDENTIFICATION (RFID) technology uses radio waves to identify objects. The RFID tags can operate in adverse condition such as heat or damp and can be read by an RFID reader without line-of-sight. These advantages make the RFID to become an alternative approach as a replacement of the barcodes. The RFID tags can be classified into three categories: active, semi-passive, and passive tags. The active and semi-passive tags are equipped with batteries as partial or complete power sources. The passive tags do not have their own batteries; instead, they derive power from the radio wave, which when sent from the RFID readers, encounter their antennas forming a magnetic field. The effective Manuscript received December 02, 2009; accepted January 31, 2010. Date of publication March 11, 2010; date of current version October 06, 2010. This paper was recommended for publication by Associate Editor J. Li and Editor M. Zhou upon evaluation of the reviewers’ comments. The authors are with the Department of Information Management, National Taiwan University, Taipei 106, Taiwan (e-mail: [email protected]; [email protected]). Digital Object Identifier 10.1109/TASE.2010.2042806 communication distances between reader and tag vary from few centimeters to tens of meters apart. In general, the passive tags have shorter distances than the active tags and semi-passive tags. Since the RFID can detect and track a variety of items in a quick and flexible way, it is used in many applications such as object tracking, inventory management, and supply-chain man- agement. It will be widely spread in consumer products as the manufacture cost of RFID tags reduces. To secure and facilitate the end-to-end supply chains of global trade, the World Customs Organization [22] encourages applying high technologies such as RFID to build smart containers. Taiwan Customs has already adopted the passive RFID E-seal system in Kaohsiung harbor [13] to improve the transit containers’ security and efficiency of the operation, as well as cutting costs by reducing manned escorts. There are two types of RFID collision problems, a reader col- lision problem and a tag identification problem [14]. The reader collision problem [12] is caused by two adjacent readers inter- secting their interrogation zones so that neither reader is able to communication with any tags located in this intersection. The reader collision problem is described as N-coloring problem which is NP-complete. It can be solved in distributed or central- ized planning methods such as Colorwave [10] and simulated annealing [11]. The tag identification problem is caused by collisions in sit- uations where more than one tag responds to a single reader’s query. There are four different types of the anticollision pro- cedures: space-division multiple access (SDMA), frequency-di- vision multiple access (FDMA), code-division multiple access (CDMA), and time-division multiple access (TDMA). On ac- count of the simplicity and limited functions of tag, TDMA pro- cedures are the largest group in RFID systems [14]. TDMA procedures can be further classified into tag-driven procedures and reader-driven procedures. Tag-driven pro- cedures are asynchronous operations and referred to as tag-talk-first (TTF). Reader-driven procedures are synchronous operations and referred to as reader-talk-first (RTF). Cur- rently, the major trend of TDMA anticollision procedures is reader-driven. The reader-driven procedures have two different modes: deterministic and stochastic. The deterministic pro- cedures are tree-based algorithms, such as binary-tree, query tree, and their variants [3], [15], [16]. By using the prefix bits, tree-based procedures mute subsets of tags to reduce the number of contenders for the channel and decrease the probability of collision. 1545-5955/$26.00 © 2010 IEEE

840 IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ...oplab.im.ntu.edu.tw/download/pubication/journal/J25... · Anticollision Algorithms for Dynamic Frame-Slotted ALOHA in RFID Networks

  • Upload
    others

  • View
    9

  • Download
    0

Embed Size (px)

Citation preview

840 IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, VOL. 7, NO. 4, OCTOBER 2010

Efficient Estimation and Collision-Group-BasedAnticollision Algorithms for Dynamic Frame-Slotted

ALOHA in RFID NetworksChun-Fu Lin and Frank Yeong-Sung Lin

Abstract—There are two challenges for the frame-slottedALOHA algorithms in radio-frequency identification (RFID). Thefirst challenge is estimating unknown tag-set size accurately; thesecond challenge is improving the efficiency of the arbitrationprocess so that it uses less time slots to read all tags. This studyproposes estimation algorithm based on the Poisson distributiontheory and identifies the overestimation phenomenon in fullcollision. Our novel anticollision algorithm alternates two distinctreading cycles for dividing and solving tags in collision groups.This makes it more efficient for a reader to identify all tags withina small number of time slots.

Note to Practitioners—The contribution of this study is topropose solutions to the estimation and arbitration problem onthe RFID MAC layer protocol for the frame-slotted ALOHA.We present efficient estimation and anticollision algorithms toestimating and arbitrating an unknown quantity of tags. The fullcollision phenomenon and the impact to the estimation accuracyare studied. When full collision occurs, our proposed anticollisionalgorithm can be effectively solved and use less time slots to readall tags and it has the maximum throughput close to the theoret-ical value. The proposed algorithms are useful for engineers toimplement the RFID systems by setting proper frame length toenhance the current RFID standards such as ISO 18000-6 or EPCclass 1 generation 2.

Index Terms—Anticollision, radio-frequency identification(RFID), tag-set size estimation.

I. INTRODUCTION

T HE RADIO-FREQUENCY IDENTIFICATION (RFID)technology uses radio waves to identify objects. The

RFID tags can operate in adverse condition such as heat ordamp and can be read by an RFID reader without line-of-sight.These advantages make the RFID to become an alternativeapproach as a replacement of the barcodes. The RFID tags canbe classified into three categories: active, semi-passive, andpassive tags. The active and semi-passive tags are equippedwith batteries as partial or complete power sources. The passivetags do not have their own batteries; instead, they derive powerfrom the radio wave, which when sent from the RFID readers,encounter their antennas forming a magnetic field. The effective

Manuscript received December 02, 2009; accepted January 31, 2010. Dateof publication March 11, 2010; date of current version October 06, 2010.This paper was recommended for publication by Associate Editor J. Li andEditor M. Zhou upon evaluation of the reviewers’ comments.

The authors are with the Department of Information Management, NationalTaiwan University, Taipei 106, Taiwan (e-mail: [email protected];[email protected]).

Digital Object Identifier 10.1109/TASE.2010.2042806

communication distances between reader and tag vary from fewcentimeters to tens of meters apart. In general, the passive tagshave shorter distances than the active tags and semi-passivetags.

Since the RFID can detect and track a variety of items in aquick and flexible way, it is used in many applications such asobject tracking, inventory management, and supply-chain man-agement. It will be widely spread in consumer products as themanufacture cost of RFID tags reduces. To secure and facilitatethe end-to-end supply chains of global trade, the World CustomsOrganization [22] encourages applying high technologies suchas RFID to build smart containers. Taiwan Customs has alreadyadopted the passive RFID E-seal system in Kaohsiung harbor[13] to improve the transit containers’ security and efficiencyof the operation, as well as cutting costs by reducing mannedescorts.

There are two types of RFID collision problems, a reader col-lision problem and a tag identification problem [14]. The readercollision problem [12] is caused by two adjacent readers inter-secting their interrogation zones so that neither reader is able tocommunication with any tags located in this intersection. Thereader collision problem is described as N-coloring problemwhich is NP-complete. It can be solved in distributed or central-ized planning methods such as Colorwave [10] and simulatedannealing [11].

The tag identification problem is caused by collisions in sit-uations where more than one tag responds to a single reader’squery. There are four different types of the anticollision pro-cedures: space-division multiple access (SDMA), frequency-di-vision multiple access (FDMA), code-division multiple access(CDMA), and time-division multiple access (TDMA). On ac-count of the simplicity and limited functions of tag, TDMA pro-cedures are the largest group in RFID systems [14].

TDMA procedures can be further classified into tag-drivenprocedures and reader-driven procedures. Tag-driven pro-cedures are asynchronous operations and referred to astag-talk-first (TTF). Reader-driven procedures are synchronousoperations and referred to as reader-talk-first (RTF). Cur-rently, the major trend of TDMA anticollision procedures isreader-driven. The reader-driven procedures have two differentmodes: deterministic and stochastic. The deterministic pro-cedures are tree-based algorithms, such as binary-tree, querytree, and their variants [3], [15], [16]. By using the prefixbits, tree-based procedures mute subsets of tags to reducethe number of contenders for the channel and decrease theprobability of collision.

1545-5955/$26.00 © 2010 IEEE

LIN AND LIN: EFFICIENT ESTIMATION AND COLLISION-GROUP-BASED ANTICOLLISION ALGORITHMS 841

The stochastic procedures are based on ALOHA protocols.Shoute [21] shows that dynamic frame-slotted ALOHA couldachieve better throughput than frame-slotted. The dynamicframe-slotted ALOHA algorithms [8], [9] restrict tags torandomly transmitting their IDs in bounded frame size andadjust for the next reading cycle if necessary. The readerbroadcasts the request and each tag in its interrogation zoneselects a random time slot in then replies at that slot. Thereader does not know the exact number of tag-set size in itsinterrogation zone. However, it can obtain the values of ,and , which correspond to the number of empty, occupied,and collision slots, by detecting the reading results of timeslots. The values of and can be used to derive theestimated tag-set size .

Several anticollision algorithms for dynamic frame-slottedALOHA [1], [2], [6], [19] calculate in order to adjust prop-erly. The improper setting of may causes more collisions orcreate more idle slots that decrease the throughput. Our researchshows that full collision affects the accuracy of the esti-mation algorithms. In this study, we focus on the frame-slottedALOHA protocols and propose novel tag-set size estimationsand anticollision algorithms to solve these problems.

II. OVERVIEW OF THE FRAME-SLOTTED ALOHA ALGORITHMS

There are two challenges for the frame-slotted ALOHA algo-rithms. First, we need to know how to estimate unknown tag-setsize accurately. Second, we need to know how to improve theefficiency of the arbitration process so that it uses less time slotsto read all tags.

In our study, most of the estimation algorithms are based onthe binomial distribution theory. Given and , the probabili-ties of zero, one and more than two tags transmitting in a slotare and . They are defined as [1], [2], [6], [17]

(1)

(2)

(3)

By multiplying with (1) and (2), their expected valuesare

(4)

(5)

(6)

Vogt [6] proposed two estimation algorithms. One is the lowerbound estimation where is calculated by ; the other isthe minimum distance vector (MDV) based on Chebyshev’s in-equality theory. The tag-set size is estimated by varying to findthe minimum distance between and their expectedvalues according to (4)–(6). The author modeled the arbitrationprocess as a Markov decision process and proposed a lookuptable to provide the optimal frame sizes according to estimatedtag-set size . The optimal frame sizes are used to ensure thatthe arbitration process can guarantee the assurance level in min-imum steps (cycles).

Lee et al. [4] claimed Vogt’s arbitration process has poorperformance when is large. They proposed an anticollisionalgorithm called Enhance Dynamic Frame Slotted ALOHA(EDFSA) and use MDV for the estimation as well. EDFSAlimits the number of contending tags to improve the arbitrationefficiency. If there are collisions, EDFSA calculates the esti-mated tag-set size and uses it to look for the corresponding

and modulo value from the lookup table. Both valuesare broadcasted to all tags. On receiving the request, the taggenerates its random number and divides this number by .Only those tags deriving zero remainder can join the contentionof next reading cycle.

Cha et al. [1] proposed two estimation algorithms. Colli-sion Ratio Estimation (CRE) algorithm defined collision ratio

and made it equals to (3). Estimated tag-setsize can be found by varying to satisfy the equation aspossible. The second algorithm called 2.39C which is basedon the optimal collision rate theory and can be estimated by

.Wong et al. [7] proposed the Grouping Based Bit-Slot

ALOHA (GBBSA) anticollision algorithm. Each tag has areservation sequence (RS) which is 128 bits long. On receivingthe reader’s request, a tag will set a random bit of RS to 1 andthe rest of the bits to 0. This bit represents the reservation timeslot. GBBSA assume tags respond with their RSs at the sametime and the reader can derive a sequence, including collidingbit-slots and zero bit-slots, from these RSs. Colliding bit-slotmeans that more than one tag has selected this time slot andzero bit-slot indicates there is no selection of this time slot. Inconsideration of efficiency, tags have to select a random valuein that is an integer variable maintained by thereader. Only those tags that select zero value can reply theirRSs immediately. The reader dynamically adjusts when thenumber of colliding bit-slots of RSs is less than 11 or largerthan 20. The reader generates a request list according to thesequence and requests tags by scrolling tag IDs.

Chen [2] derived the estimation by modeling the estima-tion problem as a multinomial distribution problem with in-dependent trials and exactly , and outcomes. The authorused the multinomial estimation (ME) to estimate . The Dy-namic Frame-slotted ALOHA algorithm (DFA) was presentedin a way that set the frame size to for the next readingcycle. The experimental results showed that ME has lower av-erage estimate errors for and DFSA outperformedthe algorithms such as [6] that used fewer slots to read all tags.

Bonuccelli et al. [19] proposed a tree-based anticollision al-gorithm called Tree Slotted Aloha (TSA). The author proposedbounded MDV (BMDV) that enhance MDV by limiting thelower and upper bounds at for calculatingthe distance values. The arbitration process follows a tree struc-ture. After a reading cycle, if the reader detects collisions, it in-serts new child nodes into the tree according to the number ofthe collisions, estimates the tag-set size, and decides the framesize of the child nodes. The reader goes down to the child nodesby following the depth-first order of tree and repeats the arbitra-tion process. All the tags keep their random selection numberand a tree level counter to ensure only those tags colliding in

842 IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, VOL. 7, NO. 4, OCTOBER 2010

that child node can join the contention at the next reading cycle.TSA repeats the process recursively until all tags are read.

Maselli et al. [20] indicated the estimation of BMDV to beinaccurate when the collision rate is high. The authors claimedthe calculation of the minimum vector distance can be stoppedwhen the distance vector becomes extremely small. The Dy-namic Minimum Distance Vector (DMDV) and Dynamic TreeSlotted ALOHA (DyTSA) were proposed as an enhancement ofTSA. Unlike BMDV, DMDV has a loose upper bound whereis varied until the vector distance becomes less than one. DyTSAfollows the depth-first order of TSA for the arbitration process.Instead of setting the estimated frame size for a collision node,DyTSA uses the data of the previous completely solved siblingnodes. It then sets the frame size of the child node to the averagenumber of the previous completely solved sibling nodes.

III. THE TAG-SET SIZE ESTIMATION

The Poisson distribution [5] is a discrete probability distri-bution based on the number of events occurring in a fixed timeperiod T. Herein, T is divided into short slots of length .The occurrence probability of an event in is . If goes toinfinity, the probability of exactly occurrences of such eventcan be written as , where is the ex-pected number of occurrences in T.

When and are large, can be approximate to. Kodialam et al. [18] rewrote (4)–(6) and defined three

estimators: Zero Estimator (ZE), Singleton Estimator (SE), andCE (Collision Estimator). The ZE and SE are used to developthe estimation algorithms for .

The Poisson distribution can be used as the approximation ofa binomial distribution as the number of trials goes to infinityand the expected number of successes remains fixed. When thereader performs a reading cycle, an outcome that is composedof , and is observed. Note that in real world the valuesof , and are subject to , i.e., . In ourapproximation model, we assume goes to infinity and define(1)–(3) as the occurrence probabilities of three events ,and . Let , and . Theprobabilities that exactly occurrences of occurrencesof , and occurrences of are , and and theycan be written as

(7)

(8)

(9)

The outcome is analogous to the one of the combi-nations of three events. Since no estimation is requiredif is equal to 0, the possible four combinations are

. Each probability is nogreater than one. Therefore, the estimation probability isdefined as

(10)

The estimation value of tag-set size is calculated as

(11)

IV. THE SIMULATION RESULTS OF ESTIMATION ALGORITHMS

The proposed algorithm is compared with ME [2], MDV [6],2.39 C [1], CRE [1], BMDV [19], and DMDV [20] throughMonte Carlo simulation. The frame size was fixed to 128 forthe comparison purpose. Tag-set size was varied from 32 to1024. The number of the full collision is recorded and dividedby the number of the simulations to obtain the full collision ratiofc-ratio. The estimation error defined in [2] wasused to measure the estimation quality. We ran the simulation10 000 times to average ’s.

During the implementation, we found the factorial computa-tion at large values caused serious program overflowswhich impacted the estimation. Therefore we replaced andrewrote (7)–(9) by Stirling’s approximation as follows:

(12)

(13)

(14)

The logarithm and exponentiation were taken to transform theproblem into an easy one. For example, if and are notequal to zero, can be written as

Other implementations are listed as follows.1) ME: The factorial terms were also rewritten by Stirling’s

approximation and taken logarithm and exponentiation as

2) MDV: The minimum distance vector was calculated as:

LIN AND LIN: EFFICIENT ESTIMATION AND COLLISION-GROUP-BASED ANTICOLLISION ALGORITHMS 843

Fig. 1. The tag-set size estimations in full collisions ���� � �� ��� � ����� � ����and ��� is varied from 32 to 1024.

3) CRE

4) BMDV and DMDV: The BMDV calculated when. The DMDV has a loose upper bound

when is varied until .The experimental results are listed in Table III. The proposedalgorithm has a lower average for and outperforms others for

. However, for , DMDV apparently has alower average than ours. In order to study this phenomenon,we conducted another experiment. We setto simulate the full collisions and varied from 32 to 1024. Asshown in Fig. 1 and Table II, the full collision estimations by2.39 C, BMDV and DMDV are relative small compared to ME,CRE, MDV, and the proposed algorithm. Note , thefull collision estimations are 983 by DMDV and 2759 by theproposed algorithm.

Fig. 2 shows the experimental results of the average estimateerrors. Fig. 3 shows that the fc-ratio starts increasing atand rapidly reaches 69.07% at . We can see the av-erage of DMDV inversely decreasing as increases becauseDMDV has the full collision estimation of 983. Figs. 4 and 5illustrates similar phenomenon which also appear on ME, CRE,MDV, and the proposed algorithm as the experiment was con-ducting to and the fc-ratio are 100%. Since 2.39 Cand BMDV compute the full collision estimations at 307 and512, respectively, as we know from Table I, the occurrence offull collision is zero at these tag-set sizes. Therefore, this phe-nomenon is not remarkable to 2.39 C and BMDV for .

V. THE COLLISION GROUP ALGORITHM

Kodialam [18] defined the load factor and found theexpected number of the occupied slots attain a maximum when

, i.e., . Lee [4] and Chen [2] also derived the sameconclusions in regard to the system utility

TABLE ITHE PROCEDURE OF CGA

TABLE IITHE TAG-SET SIZE ESTIMATIONS IN FULL COLLISION

By taking the first derivative of with respect to , themaximum efficiency happens when equals . Since isunknown, therefore, will be dynamically adjusted to theestimated tag-set size .

The experimental results in the previous section show that ourproposed estimation algorithm calculates high value in full col-lision. If the frame size is set to such value, it could be inefficient

844 IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, VOL. 7, NO. 4, OCTOBER 2010

TABLE IIITHE AVERAGE ESTIMATE ERRORS OF DIFFERENT ESTIMATION ALGORITHMS

Fig. 2. The experimental results when tag-set sizes are varied from 32 to 1024and ��� is fixed to 128.

in high tag-density environment. Our proposed anticollision al-gorithm called Collision Group Algorithm (CGA) basically fol-lows the principle of . However, we use the divide andconquer methodology to improve the arbitration efficiency. Theoperation scenario of CGA is described as follows.

1) A time slot has enough time either for a reader to send re-quest, or for a tag to respond and receive acknowledgment(ACK) from a reader [20]. If collision occurs, the readerwill not send ACK.

2) An RFID tag can deactivate itself when it receives ACK.3) A reading cycle includes the time slots needed for the

reader’s request and relative tags response.

Fig. 3. The full collision ratio fc-ratio when tag-set sizes are varied from 32 to1024 and ��� is fixed to 128.

4) The reader maintains a bit string with max-imum bit length of 128 long to record the collision status.If slot collides, is set to 1.

5) The reader has two request commands and that havedifferent message headers for tags to distinguish from. Thereader sends and alternately. includes frame size

. includes group frame size and collision status .6) Tag maintains a local variable to remember its selection.

If tag answers at slot , it set to .Each CGA loop has two reading cycles. In the first cycle, the

reader sends including frame size to all tags. On receiving, the active tags answer at their randomly selected time slots

within . The reader observes the reading results and updates

LIN AND LIN: EFFICIENT ESTIMATION AND COLLISION-GROUP-BASED ANTICOLLISION ALGORITHMS 845

Fig. 4. The experimental results when tag-set sizes are varied from 1000 to5000 and ��� is fixed to 128.

Fig. 5. The full collision ratio fc-ratio when tag-set sizes are varied from 1000to 5000 and ��� is fixed to 128.

the collision status . If the number of collision , thereader performs the estimation algorithm to derive and setgroup frame size to . The framesize of second cycle is set to .

In the second cycle, the reader sends including groupframe size and collision status to all tags. On receiving

, each active tag calculates its collision group number bysumming up 1’s from the first bit to th bit in ; Tag randomlyselects a number in and transmit its ID in a time slot

, where . The reader observes the readingresults. If the number of collisions , the frame size forthe next iteration is set to .The reader continues the arbitration process until no collisionoccurs.

The procedures of the CGA are listed as Table I.Fig. 6 illustrates an example of CGA iteration. Suppose is

set to 4. At the beginning of cycle , the reader sends. The active tags , and receive the request and

transmit their IDs at randomly selected time slots: 1, 3, 3, 4,and 4, respectively. After cycle , the reader obtains the readingresults . It updates to 0011 and per-forms the estimation to obtain . The group frame sizeis therefore set to 3.

Fig. 6. A reading example of CGA.

In cycle , the reader sends .Tags and calculate their collision groups number .Tags and also calculate their collision groups as .Assuming the random selections of , and are 2, 2, 1,and 3. Tags transmit their IDs at time slots 2, 2, 4, and 6. Thereader obtains the result and let

for the next iteration.

VI. THE PERFORMANCE ANALYSIS FOR THE

ANTICOLLISION ALGORITHMS

The CGA was compared with that of DFA [2], EDFSA [4],GBBSA [7], and DyTSA [20] on the basis of whether all tagswere successfully read from different tag-set sizes. The simula-tions were run 1000 times to obtain the average number.

We compare the read performance of CGA with that of otheralgorithms. The calculations of time slots are described asfollows.

1) CGA: The reader sends two requests and use slots forthe first cycle. The reader performs the estimation and uses

slots for the next cycle. Therefore,time slots are required for iteration.

2) DFA: The reader sends one request and uses timeslots for tags to reply. The reader performs ME for thesetting of the next frame size. Therefore, timeslots are required for iteration.

3) EDFSA: The reader sends one request and uses slots fortags to reply according to the estimation and the lookuptable. Therefore, time slots are required for singleiteration.

4) GBBSA: The reader sends one request command and thetags that randomly select zero value reply their RSs at oncein the next time slot. These RSs arrive at the same timeand form a new RS. The reader scrolls IDs and requestsfor tag’s reply according to the new RS which bits are notequal to zero. The GBBSA requires 2 (for request and replyRSs) (for scrolling IDs) time slots for iteration.

5) DyTSA: The reader sends one request command and usesslots for tags to reply. New nodes are created according to

the number of collisions and they are inserted into the tree.The DMDV estimation is performed to decide the framesize of node. If the sibling nodes are completely solved,the frame size is set to the average tag-set size number of

846 IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, VOL. 7, NO. 4, OCTOBER 2010

Fig. 7. Comparison of the simulation results for CGA with four different initial��� values.

Fig. 8. Comparison of the simulation results for CGA, DFA, and DyTSA. Theinitial frame sizes were set to 32.

the sibling nodes. The arbitrations are repeated recursivelyin depth-first order. Therefore, DyTSA requires 1 + slotsfor iteration.

The different initial frame size affects the read performance.Fig. 7 shows the simulation results of the CGA with differentsizes of initial frame . The hump on the line indicates the in-fluence of full collision as small initial meets large . Theexperiment also indicates that small initial frame size could useless slots than large initial frame size ones to read all tags. Forexample, when , initial frame sizeoutperforms . For any tag population within that range,full collision is possible to occur. The CGA estimateswith or with . In such extreme condi-tion, the CGA could be more efficient with the estimation closeto the tag population.

Figs. 8–10 presents the average required time slots for CGA,DFA, and DyTSA with three different sizes of initial . EDFSAand GBBSA both have the frame size of 128 are compared asFig. 11. Note that both DyTSA and CGA depend on the esti-mation of tag-set size. DyTSA follow depth-first tree order andthe reader has to calculate and broadcast the node frame sizefor every child node. In CGA, the colliding tags can calculate

Fig. 9. Comparison of the simulation results for CGA, DFA, and DyTSA. Theinitial frame sizes were set to 64.

Fig. 10. Comparison of the simulation results for CGA, DFA, and DyTSA. Theinitial frame sizes were set to 96.

Fig. 11. Comparison of the simulation results for CGA, DFA, DyTSA,EDFSA, and CBBSA. The initial frame sizes were set to 128.

its own collision group from . The experiments show that, inmost cases, the CGA uses fewer slots to read all the tags and canhave a better performance.

The normalized throughput is defined as the number of tagsdivided by the number of required time slots that are usedto measure the channel’s performance. The initial frame size

LIN AND LIN: EFFICIENT ESTIMATION AND COLLISION-GROUP-BASED ANTICOLLISION ALGORITHMS 847

Fig. 12. The comparison for different initial frame size of CGA on normalizedthroughput.

Fig. 13. Comparison of the average number of cycles for CGA with differentinitial frame size.

Fig. 14. Comparison of the normalized throughput for CGA, DFA, DyTSA,EDFSA, and CBBSA. The initial frame sizes were set to 128.

also influences the throughput. Fig. 12 shows the maximumthroughput occurs when the tag-set size is approximately equalto frame size. It also shows the effect of overestimation at fullcollision and its influence on the throughput. For example,when initial and , CGA estimates and allocatesthe frame size to 719 that decreases the throughput. This valueis obviously too large to solve the collisions. As we can see in

Fig. 13, the average number of cycles is therefore decreasing.However, CGA can efficiently solve the collisions and itsthroughput is outperformed to other algorithms in most cases,as shown in Fig. 14.

VII. CONCLUSION

This paper presents efficient estimation and anticollision al-gorithms; for the estimation and the arbitration to an unknownquantity of tags. The proposed estimation algorithm has low av-erage estimation errors in a high tag density environment. Whenfull collision occurs, our proposed anticollision algorithm caneffectively solve and use less time slots to read all tags. Thesimulation results show that proposed algorithms outperformothers.

REFERENCES

[1] J.-R. Cha and J.-H. Kim, “Novel anti-collision algorithms for fast ob-ject identification in RFID systems,” in Proc. Int. Conf. Parallel andDistrib. Syst. Comput., 2005, vol. 2, pp. 63–67.

[2] W.-T. Chen, “An accurate tag estimate method for improving the per-formance of an RFID anti-collision algorithm based on dynamic framelength ALOHA,” IEEE Trans. Autom. Sci. Eng., no. 99, pp. 1–7, 2008.

[3] K. Finkenzeller, RFID Handbook, 2nd ed. New York: Wiley, 2003.[4] S.-R. Lee, S.-D. Joo, and C.-W. Lee, “An enhance dynamic framed

slotted ALOHA algorithm for RFID tag identification,” in Proc. Int.Conf. Mobile and Ubiquitous Systems: Networking and Services, 2005,pp. 166–174.

[5] D. E. Knuth, The Art of Computer Programming. Reading, MA: Ad-dison Wesley, vol. 2.

[6] H. Vogt, “Efficient object identification with passive RFID tags,” inProc. Int. Conf. Pervasive Computing, 2002, pp. 98–113.

[7] C.-P. Wong and Q.-Y. Feng, “Grouping based bit-slot ALOHA pro-tocol for tag anti-collision in RFID systems,” IEEE Commun. Lett., vol.11, no. 12, Dec. 2007.

[8] UHF Air Interface Protocol Standards, EPCglobal,C1G2, 2005.[9] Parameters for Air Interface Communications at 860 MHz to 960

MHz Information Technology—Radio Frequency Identification forItem Management, ISO/IEC 18000-6, 2004.

[10] J. Waldrop, D. W. Engels, and S. E. Sarma, “Colorwave: An anticol-lision algorithm for the reader collision problem,” in Proc. IEEE ICC,2003, vol. 2, pp. 1206–1210.

[11] C.-F. Lin and F. Y. S. Lin, “A simulated annealing algorithm for RFIDreader networks,” in Proc. IEEE WCNC, 2007, pp. 1669–1672.

[12] D. W. Engels and S. E. Sarma, “The reader collision problem,” in Proc.IEEE Int. Conf. Syst., Man, Cybern., 2002, vol. 3, pp. 6–9.

[13] “Taiwan customs officials adopt RFID-enabled container seals,” RFIDJournal 2009. [Online]. Available: http://www.rfidjournal.com/article/view/4727,

[14] D.-H. Shih, P.-L. Sun, D. C. Yen, and S.-M. Huang, “Taxonomy andsurvey of RFID anti-collision protocols,” Comput. Commun. 2006, pp.2150–2166.

[15] C. Law, K. Lee, and K.-Y. Siu, “Efficient memoryless protocol fortag identification,” in Proc. 4th Int. Workshop on Discrete Algorithmsand Methods for Mobile Computing and Communications, 2000, pp.75–84.

[16] J. Myung, W. Lee, and T. K. Shih, “An adaptive memoryless protocolfor RFID tag collision arbitration,” IEEE Trans. Multimedia, vol. 8, no.5, pp. 1096–1101, Oct. 2006.

[17] D. K. Klair, K. Chin, and R. Raad, “On the accuracy of RFID tag esti-mation functions,” in Proc. ISCIT, Oct. 17–19, 2007, pp. 1401–1406.

[18] M. S. Kodialam and T. Nandagopal, “Fast and reliable estimationschemes in RFID systems,” in Proc. MOBICOM, 2006, pp. 322–333.

[19] M. A. Bonuccelli, F. Lonetti, and F. Martelli, “Instant collision reso-lution for tag identification in RFID networks,” Elsevier Ad Hoc Net-works pp. 1220–1232, Nov. 2007.

[20] G. Maselli, C. Petrioli, and C. Vicari, “Dynamic tag estimation for op-timizing tree slotted aloha in RFID networks,” in Proc. MSWiM, 2008,pp. 315–322.

[21] F. C. Schoute, “Dynamic frame length ALOHA,” IEEE Trans.Commun., vol. COM-31, no. 4, pp. 565–568, Apr. 1983.

[22] WCO SAFE Framework of Standards, , Jun. 2007, World Customs Or-ganization.

848 IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, VOL. 7, NO. 4, OCTOBER 2010

Chun-Fu Lin is working towards the Ph.D. degreeat the Department of Information Management, Na-tional Taiwan University, Taipei. since 2003.

He is also a Taiwan Customs Officer. Currently, heworks on the Taiwan government’s project to imple-ment the applications of RFID e-Seal in cross-bordersupply chain security. His research interests includenetwork optimization, network planning, anticolli-sion algorithm, and RFID networks.

Yeong-Sung (Frank) Lin received the B.S. degreein electrical engineering from the Department ofElectrical Engineering, National Taiwan University,Taipei, in 1983, and the Ph.D. degree in electricalengineering from the Department of Electrical En-gineering, University of Southern California (USC),Los Angeles, in 1991.

After graduating from the USC, he joinedTelcordia Technologies (formerly, Bell Commu-nications Research, abbreviated as Bellcore) inNew Jersey. In 1994, he joined the faculty of the

Electronic Engineering Department, National Taiwan University of Scienceand Technology. Since 1996, he has been with the faculty of the InformationManagement Department, National Taiwan University. His research interestsinclude network optimization, network planning, network survivability, perfor-mance evaluation, high-speed networks, distributed algorithms, content-basedinformation retrieval/filtering, biometrics and network/information security.