10
Hindawi Publishing Corporation International Journal of Distributed Sensor Networks Volume 2013, Article ID 674698, 9 pages http://dx.doi.org/10.1155/2013/674698 Research Article QSA: Query Splitting-Based Anticollision for Mobile RFID-Based Internet-of-Things Jianliang Gao, Jianxin Wang, Jianbiao He, and Weiping Wang School of Information Science and Engineering, Central South University, Changsha 410083, China Correspondence should be addressed to Weiping Wang; [email protected] Received 28 March 2013; Accepted 2 July 2013 Academic Editor: Lu Liu Copyright © 2013 Jianliang Gao et al. is is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Mobility is a common character of the emerging RFID-based internet-of-things. However, most of prior RFID anticollision algo- rithms ignore the movement of tags, which can degrade the identification performance seriously and even result in tag starvation problem. is paper presents a novel anticollision algorithm named Query Splitting-based Anticollision (QSA) for mobile RFID- based internet-of-things. By designing adaptive query, QSA reduces the number of collisions efficiently and makes it possible to identify multiple mobile tags without rollback. In QSA, we propose a query stack technology to avoid the rollback operation caused by new arriving tags, which solves the tag starvation problem under mobile environments. e performance evaluation shows that the proposed algorithm takes fewer timeslots and has better performance in identifying mobile tags. 1. Introduction Radio frequency identification (RFID) is a contactless wire- less communication technology. e scope for using this technology boosts as RFID tag becomes a low-cost device due to mass production [1]. As the rapid proliferation of RFID tags, it has given rise to various concepts that integrate the physical world with the virtual one. One of the most popular concepts is the Internet-of-ings (IoT), a vision in which the Internet extends into physical entities. In the IoT, RFID is the foundation to connect the things together [2]. RFID systems consist of a reading device called reader, and multiple tags which are attached to physical entities in the IoT. e reader is typically a powerful device with ample memory and computational resources. On the other hand, tags vary significantly in their computational capabilities. Among tag types, passive ones are emerging to be a popular choice for large scale deployments due to their low cost [3]. For passive tags, they respond only at reader commands with the energy provided by the reader [2, 4]. In RFID systems, the reader usually needs to communi- cate with multiple tags. If there are multiple tags in a reader’s interrogation zone, the reader receives the responses from these tags simultaneously. For a reader, it is not able to distin- guish exact information from the interfered wireless signals, which is called collision. Collision is a serious problem in RFID systems since the reader will not receive the messages rightly once collision occurs [5]. An example is shown in Figure 1. Simultaneous responses transmitted by multiple tags collide, resulting in an increase of identification delay, even failure of reading the tags. erefore, an efficient anticollision algorithm is required to reduce collisions and to achieve fast identification. e tag collision problem becomes more serious in mobile RFID-based IoT. e physical entities with tags are oſten mobile, which facilitates competitive advantage through benefits such as improved efficiency, increased visibility, reduced cost, and many others [6]. e mobile devices can be part of numerous products, gadgets, and vehicle parts [7]. ese devices close the gap between the real word and its vir- tual representation via, for example, seamless identification and integration with other wirelessly-embedded devices and their surroundings. However, the mobile devices result in new challenges for anticollision problem. One of the challenges is tag starvation. For example, as shown in Figure 1, the reader is processing the collision caused by Tag 1 to Tag . Assuming the reader has partitioned the tags for several rounds and will identify one tag out right now. If Tag +1 enters the reader’s interrogation zone at this time, the new arrived tag might cause the rollback

Research Article QSA: Query Splitting-Based …downloads.hindawi.com/journals/ijdsn/2013/674698.pdf4. QSA: Query Splitting-Based Anticollision for Mobile IoT.. Overview of the Anticollision

  • Upload
    others

  • View
    45

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Research Article QSA: Query Splitting-Based …downloads.hindawi.com/journals/ijdsn/2013/674698.pdf4. QSA: Query Splitting-Based Anticollision for Mobile IoT.. Overview of the Anticollision

Hindawi Publishing CorporationInternational Journal of Distributed Sensor NetworksVolume 2013 Article ID 674698 9 pageshttpdxdoiorg1011552013674698

Research ArticleQSA Query Splitting-Based Anticollision forMobile RFID-Based Internet-of-Things

Jianliang Gao Jianxin Wang Jianbiao He and Weiping Wang

School of Information Science and Engineering Central South University Changsha 410083 China

Correspondence should be addressed to Weiping Wang wpwangcsueducn

Received 28 March 2013 Accepted 2 July 2013

Academic Editor Lu Liu

Copyright copy 2013 Jianliang Gao et al This is an open access article distributed under the Creative Commons Attribution Licensewhich permits unrestricted use distribution and reproduction in any medium provided the original work is properly cited

Mobility is a common character of the emerging RFID-based internet-of-things However most of prior RFID anticollision algo-rithms ignore the movement of tags which can degrade the identification performance seriously and even result in tag starvationproblem This paper presents a novel anticollision algorithm named Query Splitting-based Anticollision (QSA) for mobile RFID-based internet-of-things By designing adaptive query QSA reduces the number of collisions efficiently and makes it possible toidentify multiple mobile tags without rollback In QSA we propose a query stack technology to avoid the rollback operation causedby new arriving tags which solves the tag starvation problem under mobile environments The performance evaluation shows thatthe proposed algorithm takes fewer timeslots and has better performance in identifying mobile tags

1 Introduction

Radio frequency identification (RFID) is a contactless wire-less communication technology The scope for using thistechnology boosts as RFID tag becomes a low-cost device dueto mass production [1] As the rapid proliferation of RFIDtags it has given rise to various concepts that integrate thephysical world with the virtual one One of the most popularconcepts is the Internet-of-Things (IoT) a vision in which theInternet extends into physical entities In the IoT RFID is thefoundation to connect the things together [2]

RFID systems consist of a reading device called readerand multiple tags which are attached to physical entities inthe IoT The reader is typically a powerful device with amplememory and computational resources On the other handtags vary significantly in their computational capabilitiesAmong tag types passive ones are emerging to be a popularchoice for large scale deployments due to their low cost [3]For passive tags they respond only at reader commands withthe energy provided by the reader [2 4]

In RFID systems the reader usually needs to communi-cate with multiple tags If there are multiple tags in a readerrsquosinterrogation zone the reader receives the responses fromthese tags simultaneously For a reader it is not able to distin-guish exact information from the interfered wireless signals

which is called collision Collision is a serious problem inRFID systems since the reader will not receive the messagesrightly once collision occurs [5] An example is shown inFigure 1 Simultaneous responses transmitted bymultiple tagscollide resulting in an increase of identification delay evenfailure of reading the tagsTherefore an efficient anticollisionalgorithm is required to reduce collisions and to achieve fastidentification

The tag collision problem becomes more serious inmobile RFID-based IoT The physical entities with tags areoftenmobile which facilitates competitive advantage throughbenefits such as improved efficiency increased visibilityreduced cost and many others [6] The mobile devices canbe part of numerous products gadgets and vehicle parts [7]These devices close the gap between the real word and its vir-tual representation via for example seamless identificationand integration with other wirelessly-embedded devices andtheir surroundings

However the mobile devices result in new challenges foranticollision problem One of the challenges is tag starvationFor example as shown in Figure 1 the reader is processing thecollision caused by Tag 1 to Tag 119873 Assuming the reader haspartitioned the tags for several rounds and will identify onetag out right now If Tag119873+1 enters the readerrsquos interrogationzone at this time the new arrived tagmight cause the rollback

2 International Journal of Distributed Sensor Networks

Reader

Tag NTag 1 Tag 2

Readerrsquosinterrogation zone

Antenna

middot middot middot

Tag N + 1

Collision

Figure 1 The tag collision with mobile tag

of the partition operations Therefore the done operationshave to be repeated and the delay of identifying the tagsincreases If the new tags enter the readerrsquos interrogation zoneat an interval that causes rollback repeatedly some tagsmightdepart the readerrsquos interrogation zone before being identifiedwhich is called ldquotag starvationrdquo in mobile environmentsTherefore it is necessary to provide efficient anticollision formobile RFID-based IoT

In this paper we will deal with the ldquotag starvationrdquo andperformance problem for anticollision in mobile IoT By thedesign of query stack and query rules the proposed anticol-lision algorithm avoids repetition operations and decreasesthe collisions consequently In summary our contributionsinclude the following

(i) We characterize the problem of anticollision inmobile environment which is more practical for theemerging IoT technology

(ii) We propose a novel anticollision algorithm namedQuery Splitting-basedAnticollision (QSA) formobileRFID-based IoT which solves the problem of tag star-vation and performance degradation resulted fromthe tag mobility

(iii) Simulation and analysis evaluate the efficiency ofthe proposed algorithm The results show the betterperformance of the proposed algorithm to the priormethods

The rest of this paper is organized as follows Section 2outlines preliminary includes background related workSection 3 presents the problems for mobile tags Section 4gives the detailed design of our algorithm The simulationresults are provided in Section 5 Finally Section 6 concludesthe paper

2 Preliminary

21 Collision Detection Code technologies are widely usedfor collision detection Manchester code is one of the mostpopular technologies for RFID systems [5] In Manchestercode the value of one bit is defined as the voltage transitionwithin a bit windowA bit ldquo0rdquo is coded by a positive transitionwhile a bit ldquo1rdquo is coded by a negative transition In RFID

systems if two (ormore) tags transmit different values simul-taneously the positive and negative transitions of the receivedbits cancel each other out This state is not permissible inManchester code during data transmission and is recognizedas an error Therefore Manchester code makes it possible toldquotrace a collision to an individual bitrdquo and ldquofind where thecollided bit isrdquo [8]

Figure 2 shows an example of Manchester code forcollision detection The IDs of tag 1 and tag 2 are ldquo10101100rdquoand ldquo10001001rdquo respectively When tags 1 and 2 send theirIDs simultaneously using Manchester code the decodeddata from the interfered signal received by the reader isldquo10119909011199090119909rdquo where ldquo119909rdquo represents a collided bit In thisexample the locations of the collided bits are the 3rd 6thand 8th bits This information helps the reader separate thecollided tags into subsets more smartly and identify the tagsmore quickly

Manchester code can be utilized to detect the collisionbits but the tags should be strictly synchronized Fortunatelythe tags in passive RFID systems are all driven by the readerwith both energy and the same clock frequency

22 Anticollision Algorithms Many researches have focusedon the issue of anticollision including tag-driven and readerdriven procedures [9] Tag-driven anticollision protocolsfunction asynchronously [5] For example in Aloha-basedprotocols [10] time is divided into slots and each tag ran-domly transmits its ID in each timeslot The tags contin-uously retransmit their IDs until the reader acknowledgestheir transmission However the Aloha-based protocols haveseveral serious problems For example a specific tag maynot be identified for a long time leading to the so-calledldquotag starvationrdquo problem The performance of Aloha-basedprotocols is sensitive to the number of tags Furthermore itis very difficult to predict the number of tags in mobile envi-ronments if not impossible

For reader-driven anticollision protocols they functionsynchronously since all tags are controlled and checked bythe reader simultaneouslyTherefore the reader can avoid tagstarvation under static environments Furthermore they canbe categorized into Binary Tree algorithm (BT) [11ndash13] andQuery Tree algorithm (QT) [14ndash16]

221 Binary Tree Algorithm (BT) BT performs collision res-olution by splitting collided tags into disjoint subsets Thesesubsets become increasingly smaller until they contain onetag Each tag has a random binary number generator Forexample in Figure 3 tags with a counter value of zero areconsidered to be in the transmit state otherwise tags are inthe sleep state After each timeslot the reader informs tagswhether there is a collision or not If therewas a collision eachtag in the transmit state generates a random binary numberTags will become in sleep state after being identified

As can be seen that the average number of timeslots toidentify the first tag is

119879 (119873) = log2119873 (1)

where119873 is the number of tags Note that the reader needs tobroadcast the universal condition (all bits are ldquo1rdquo) before the

International Journal of Distributed Sensor Networks 3

1 0 11 0 1 0 0

1 0 0 0 1 0 0 1

1 0 10 0

Tag 1

Tag 2

Decoded datax x x

Figure 2 Collision detection with Manchester code

0 1

0 1

0 10 1

0 1

0 10 1

CollisionTag

The first timeslot

The second timeslot

The third timeslot

Figure 3 Binary tree based anticollision procedure

first timeslots to collect all tags lying in its interrogation zeroFurthermore the total number of timeslots for identifying all119873 tags is

119879 (119873) =

119873

sum

119896=1

log2119896 (2)

The time consumption is the most serious defect since ithas not recorded the history information which results in alarge amount of repeat operations

222 Query Tree (QT) Query tree (QT) algorithms storetree construction at the reader and tags only need to have aprefix matching circuit The reader transmits a serial numberto tags which they then compare against their IDs The tagswhose IDs equal to or lower than the serial number respondto the readerrsquos commandThe reader thenmonitors tags replybit by bit usingManchester code and once a collision occursthe reader splits tags into subsets based on collided bits Thereader then transmits another query by replacing the mostsignificant collided bit with ldquo0rdquo and sets the other bits to ldquo1rdquoThis procedure stops until a single tag has been selected out

Rollback Query Tree (RQT) is proposed to reduce theaverage number of timeslots for identifying the tags Duringthe partition operation these records are saved at the readerThus the anticollision can avoid the repeating operationsbased on the saved informationwhen the reader tries to selectout the next tag The timeslot number of RQT is

119879 (119873) = log2119873 +119873 minus 1 (3)

where119873 is the number of tags

3 Problem for Identifying Mobile Tags

In static environments Rollback Query Tree reduces thenumber of timeslots to deal with collision in RFID systemsHowever both tag starvation and delay problems occurred inmobile environments If one tag enters the readerrsquos interro-gation zone when the reader is processing the entered tagssome obtained results might be destroyed by the new arrivedtag The total number of identifying tags is

119879 (119873 +119872) = 119879 (119873) +

119872

sum

119894=1

(119879119894+ 119877119894) (4)

where119873119872 are the numbers of the tags in the readerrsquos inter-rogation zone already and the new arrived tags respectively119879(119873) is the timeslots number as is defined in formula (3)119879119894 119877119894are the timeslots for processing the new arrived tag 119894

and the timeslots that caused by the repeat operations Theincreased timeslot for a new arrived tag 119894 is 119879

119894+ 119877119894

If the increased time is greater than the interval timebetween the arriving tags the existing tags might not beprocessed in a long time since the reader has to reexecute therollback operations for the new arrived tags Therefore tagsstarvation problem will happen if the following condition ismet

119879119894rarr 119894+1le 119879119894+ 119877119894 (5)

where 119879119894rarr 119894+1

is the interval time between the new arrivedtag 119894 to 119894 + 1 If each tag 119894 meets the requirement in formula(5) no tags will be selected out successfullyThis requirementis considerably strong but to a moving tag it will fail to beidentified only if the reader has not processed before it leavesthe readerrsquos interrogation zone

4 International Journal of Distributed Sensor Networks

In the following we take an example to illustrate therollback caused by a new arriving tag As shown in Figure 4there are already four tags (IDs 10100011 11100010 11100011and 11110010) in the readerrsquos interrogation zone After tworounds of query (named 119902

1and 119902

2) the tag 10100011 is the

first one to be identified Then the reader should broadcastthe queries 119902

3 1199024 and 119902

5to select the next smallest tag

11100010 in the readerrsquos interrogation zone If a new tag01100011 enters the interrogation zone between broadcasting1199024and 119902

5 it will respond to the query 119902

5ldquole11100010rdquo Then

the reader receives the response ldquo119909110001119909rdquo (combined by11100010 and 01100011) instead of selecting out tag 11100010Therefore the reader should broadcast the new request com-mand ldquole11111111rdquo according to the highest uncertain ldquo119909rdquo bitUnfortunately this query command includes the responsesfrom all tags and the queries ldquo119902

3rdquo and ldquo119902

4rdquo have to be

executed again in the following In an extreme situation theoperation might be repeated many times for the consecutivearriving tags as shown in formula (5) Thus tag starvation ispossible for query tree schemes in mobile environments

4 QSA Query Splitting-BasedAnticollision for Mobile IoT

41 Overview of the Anticollision Algorithm Firstly a set ofqueries 119876 = (119902

1 1199022 119902

119897) is defined for the reader where

1199021is initialized as ldquole1119899rdquo The reader executes the following

steps to identify tags

(1) Broadcast the current query in 119876 to all tags(2) When receiving the responses from tags

(21) if the reply is string 119908 without ldquo119909rdquo bits thenselect and process the tag with ID 119908

(22) if a collision is detected that is the reply is string119908 with ldquo119909rdquo bits then set the next query in 119876

(23) if there is no reply from tags do nothing

(3) Update 119876 according to the received responses

Repeat the above procedure until 119876 is empty In thisprocedure four commands (REQUEST SELECT READ-DATA and DESELECT) are adopted as defined in Table 1

For tags let119908 = 11990811199082 119908

119899be the tagrsquos IDThe query is

defined as follows if119908 le 119902 then the tag sends string119908 to thereader where 119902 is the query string received from the reader

As can be seen from the above procedure that the keyproblem is how to design the query scheme our main ideais to keep the history records which can avoid rollback of thedone operations

42 Design of Adaptive Query

421 Query Stack Design for Rollback Operation As shownin Table 1 REQUEST is the query command for the readerto split tags into subsets To reduce the total timeslots foridentifying all tags we design a query stack structure toimplement the rollback operations during query processldquoPush Queryrdquo and ldquoPop Queryrdquo are the two basic operations

Table 1 Definition of commands

REQUEST(ID Condition)

Reader sends REQUEST command withparameter ID Condition to tags Tags comparetheir IDs against the received ID Conditionand reply their IDs to the reader if ID leID Condition

SELECT (ID) Reader selects the tag IDREAD-DATA Reader reads data from the selected tag

DESELECT Reader cancels the selected tag and this tagthus enters silent state

of query stack Each query response is pushed into querystack if and only if the response includes ldquo119909rdquo

We also take the example in Figure 4 to explain thestack operation The response is ldquo111119909001119909rdquo for the query1199023 ldquole11111111rdquo The response ldquo111119909001119909rdquo includes ldquo119909rdquo thus

it is pushed into the query stack as shown in Figure 5 In thesame way the response ldquo1110001119909rdquo is also pushed into thequery stack with the query 119902

4 ldquole11101111rdquo When the reader

broadcasts the query 1199025 ldquole11100010rdquo a new tag ldquo01100011rdquo

enters the readerrsquos interrogation zone Thus the response willbe ldquo119909110001119909rdquo and it is also pushed into the stack as shownin Figure 5

Once a response includes no ldquo119909rdquo the reader will select thistag (using the command SELECT as shown in Table 1) andread the selected tag (using the command READ-DATA asshown in Table 1) After that the reader will pop one elementfrom the query stack For example when the new arrived tagldquo01100011rdquo has been processed the element ldquo119909110001rdquo willthen be popped out The following design is how to set theldquo119909rdquo bits and broadcast new query commands

422 Rule Design for Query Condition The rule for querycommand is one of the most important designs in QSA Asshown in Table 2 the rules can be presented as two kindsOne is for the obtained response and the other is for the popstack

(1) Rule for Obtained Response When the reader receivesresponse including ldquo119909rdquo bits the next query condition shouldbe set according to the collision bits in the response Thesecond line in Table 2 shows the rule for this kind of obtainedresponse

In the first iteration all bits are set as ldquo1rdquo that isMax(ID) to collect the responses from all tags For examplethe parameter is ldquo11111111rdquo for eight bits ID In the followingiteration the highest bit ldquo119909rdquo is set as ldquo0rdquo the bits which arelower than the highest ldquo119909rdquo are all set as ldquo1rdquo According to thesetting of ldquo119909rdquo bits we can draw the following theorem

Theorem 1 Rule for obtained response implements binarysplitting for multiple tags

Proof The response is a string 119878 = 0 1 119909119899 where 119899 is thebit number of tag ID The highest ldquo119909rdquo bit in 119878 is denoted as 119896and it must meet the following requirement

119878 [119896] = 119909 119878 [119899 sdot sdot sdot 119896 + 1] = 0 1119899minus119896 (6)

International Journal of Distributed Sensor Networks 5

A

B

11110010C

01100011

Rollback forthe new arrived tagq3 le 11111111

q1 le 11111111

q2 le 10111111

q7 le 11111111q4 le 11101111

q5 le 11100010

q6 le 11100011

10100011

Processed tag

To be processed

New arrived

1110001111100010

Collision

Figure 4 Rollback problem for the new arrived tag

Stack 3

Stack 2

Stack 1

Push query Pop query

x110001x

1110001x

111x001x

Figure 5 Query stack for new arrived tags

Table 2 Rule design for query condition

The firstiteration The nth iteration

Rule forobtainedresponse

Max(ID)bit(119896) = 0 bit(119896 minus 1 sdot sdot sdot 1) = 1119896minus1(where k is the highest ldquoxrdquo bit in theresponse)

Rule for popstack

Cannothappen

if there is new arrived tagbit(119896) = 1bit(119896 minus 1 sdot sdot sdot 1)= 0119896minus1

elsebit(119896 sdot sdot sdot 1) = 1119896

end

Then there is at least one tag whose 119896th bit is ldquo1rdquo and atleast one tagwhose 119896th bit is ldquo0rdquoOtherwise the 119896th bit cannotbe ldquo0rdquoTherefore REQUEST ldquole bit(119896) = 0 bit(119896minus1 sdot sdot sdot 0) = 1rdquo

splits the tags into two catalogs as binary division one catalogis with 119878[119896] = 0 and the other is with 119878[119896] = 1

This rule can reduce the query scope by dividing theresponding tags into two catalogs until only one tag respond

(2) Rule for Pop Stack After one tag is selected and processedthe top element is popped out This element includes ldquo119909rdquo bitThe rule for pop stack deals with the problem of setting thesebits which is shown in the third line of Table 2 Note that itcannot be the first iteration in anticollision process (ldquocannothappenrdquo in Table 2) since the stack is empty at the beginning

To the popped element there are two situations withoutnew arrived tag and with arrived tag when it pushed intothe stack For the situation without new arrived tag all bitsare set as ldquo1rdquo in order to include all unprocessed tags thatis bit(119896 sdot sdot sdot 1) = 1119896 where 119896 is the highest ldquo119909rdquo bit On theother hand if there are new arrived tags the highest ldquo119909rdquobit is set as ldquo1rdquo and the lower bits are all set as ldquo0rdquo that isbit(119896 minus 1 sdot sdot sdot 1) = 0119896minus1

Whether there is new arrived tag or not it can be judgedaccording to the following formula

Highest119909 (Top) gt Highest119909 (Top-1) (7)

whereHighest119909 is the function to obtain the highest ldquo119909rdquo bit inits parameter Top means the first element in the query stackand Top-1 is the second one

Theorem 2 If the highest ldquo119909rdquo bit of the first stack elementis higher than that of the second stack element that is thecondition of formula (7) is met there must be new arrived tag

6 International Journal of Distributed Sensor Networks

Begin

Request (max ID)

Wait for a given period

No

No

No

Yes

Received theresponse

ldquoXrdquo bit in V

Yes

Read-data

Deselect

Read one tag

Stack is empty

End

Process right subtree

Process left subtree pop stackrdquo and

Set V as ldquorule forobtained valuerdquo and

request (V)

Yes

Decode the response V

Push V onto stack

Select (V)

V998400 = pop stackSet V998400 as ldquorule for

request (V998400)

Figure 6 Flow chart of the proposed QSA algorithm

Proof According to rule for obtained response the readerfirst processes the tags whose highest ldquo119909rdquo bit is ldquo0rdquoThereforeonly when the higher ldquo119909rdquo bit is processed it is possiblefor lower ldquo119909rdquo to be processed Thus the highest ldquo119909rdquo alwaysdecreases as the distance to the top of query stack Howeverit is possible that the ldquo119909rdquo can be at any bit if new tags arriveThat is to say formula (7) is a result caused by new arrivedtags

For example as shown in Figure 5 the highest ldquo119909rdquo bitin the top stack element Stack 3 is 8 and that in Stack 2 is1 Formula (7) meets and there is new arrived tag In theexample the query for Stack 2 element ldquo1110001119909rdquo is 119902

5

ldquole11100010rdquo in the example of Figure 4While the highest ldquo119909rdquobit in top element Stack 1 is the 8th bit There is new arrivedtag whose 8th bit is ldquo0rdquo Otherwise the new arrived tag isimpossible to be included by the query ldquole11100010rdquo and thetop element cannot be ldquo119909rdquo at the 8th bit In fact there is anew arrived tag whose ID is 01100011 in the example

43 The Procedure of the Proposed QSA Based on the designof query stack and query rule we describe the procedureof the proposed QSA algorithm in the following In QSA

the reader first broadcasts the query with the parameter(max ID) and receives the replies from all tags in its inter-rogation zone If the received response of this query includesldquo119909rdquo the tree can be divided into the left subtree and the rightsubtree according to the highest bit ldquo119909rdquo In the left subtreethe highest ldquo119909rdquo bit is ldquo0rdquo and that of the right tree is ldquo1rdquo Theprocedure of the anticollision algorithm is shown in Figure 6Itmainly includes three parts process the left subtree processthe right subtree and read one tag

431 Process the Left Subtree If there is ldquo119909rdquo in the receivedresponse the reader begins to process the left subtree Firstlythe reader pushes the response which has ldquo119909rdquo bits into thequery stack We design this query stack which can record theentrance to the right subtreeThen it sets the query conditionaccording to the rule for obtained response in Table 2 Finallythe reader broadcasts the query with the set condition whichenables a new round communication

432 Read One Tag If the received response has no ldquo119909rdquo bitthere is no collision and a single tag is identified The readerwill select this tag and read data from it After the tag is

International Journal of Distributed Sensor Networks 7

0 100 200 3000

500

1000

1500Th

e num

ber o

f col

lisio

ns (t

imes

)

The number of tags

QT RQT Proposed QSA

(a)

0 100 200 3000

400

800

1200

The n

umbe

r of c

ollis

ions

(tim

es)

The number of tags

QT RQT Proposed QSA

(b)

Figure 7 The number of collisions versus various numbers of tags (a) Tag ID is 64 bits (b) tag ID is 128 bits

0 100 200 300

45

48

51

The number of tags

RQT Proposed QSA

Iden

tifica

tion

effici

ency

()

Figure 8 Identification efficiency

processed command ldquoDESELECTrdquo will make this tag keepsilent state in the following

433 Process the Right Subtree After one tag is read thealgorithm will begin to process the right subtree Firstly thetop element of the query stack is popped out and it is setaccording to the rule for pop stack As described in previousSection there are two possibilities that is with new arrivedtag and without new arrived tag when setting the querycondition If there is new tag which causes higher ldquo119909rdquo bitthe query will enter the left tree process after receiving theresponse Otherwise the process will further deal with theright subtree Note that the process will end until the query

200

400

600

800

The n

umbe

r of c

ollis

ions

(tim

es)

QT RQT Proposed QSA

0 2 4 6The interval of entering tags (timeslots)

Figure 9The number of collisions versus various mobile velocities

stack is empty which means that all tags have been identifiedalready

5 Simulation Results

To evaluate anticollision performance we compare the timeconsumption and identification efficiency of the proposedQSA algorithm with that of two representative schemesQuery tree (QT) and Rollback Query Tree (RQT) Undermobile environments we measure the number of timeslotsused to read out all tags Firstly we fix mobile velocity of thetags and evaluate the resultsThemobile velocity of tags is set

8 International Journal of Distributed Sensor Networks

as the following rule a group of five tags enter the readerrsquosinterrogation zero at the interval of five timeslots

Figure 7 shows the results of collision numbers undervarious numbers of tags As can be seen that QT meets themost number of collisions since it has not recorded thequery results during the procedure of finding the least tagID RQT always takesmore collisions than the proposedQSAalgorithm which is consistent with formula (4) Both 64 bitsand 128 bits tag ID in Figures 7(a) and 7(b) the proposedQSA takes the least number of collisions which illustratesthe efficiency of the QSA since it overcomes the rollbackoperations when new tags arrive

To identify the tags as soon as possible the algorithmshould keep high identification efficiency Identification effi-ciency is defined as the ratio of the number of successtimeslots to the total timeslot number Higher identificationefficiency means less wasted timeslots for collisions Figure 8describes the comparison of identification efficiency betweenRQT and the proposed QSA The identification efficiency ofQSA is higher than that of RQT It validates the analysis ofnumber of consumed timeslots in Figure 7(a) The identifi-cation efficiency of the proposed QSA especially decreasesslowly as the tag number increasesWhile the RQT is of loweridentification efficiency when the tag number increases Forexample the identification efficiency of the RQT is below 45when the tag number is 300

From the theoretical analysis it can be known that themobile velocity will affect the results of collisions Finally weevaluate the impact of tagmobile velocity In this experimenttotal 200 tags enter the readerrsquos interrogation zone at differentintervals which varies from 1 to 5 timeslots The samewith the above experiments five tags come into the readerrsquosinterrogation zone at a pointed timeslot As can be seen fromFigure 9 the proposed QSA achieves the least number ofcollisions under all intervals of entering tags An interest-ing change happens in QT scheme the collision numberincreases firstly and then decreases It is because the tagnumber increases quickly at the smaller interval of enteringtags which causes more collisions The gap between RQTand the proposed QSA increases as the interval increases Itindicates that the velocity of mobile tags will cause differentrollback operations in RQT while it is eliminated in our QSAalgorithm

6 Conclusions

Collision is considered as one of the most important issuesthat affect the identification process in RFID systems Mobiletags of IoT especially induce new problems such as perfor-mance degrade and tag starvation In this paper we proposea novel anticollision algorithm named QSA to solve theseproblems The proposed QSA can overcome the problemsresulted from mobile tags efficiently Compared to priorschemes the QSA presents a better performance at differentmobile velocity and various tag numbers

Acknowledgments

This work is supported in part by the National NaturalScience Foundation of China under Grant nos 61106036

61173169 and 61272147 in part by the science and technologyprojects of Hunan province and in part by State Key Lab-oratory of Computer Architecture Institute of ComputingTechnology Chinese Academy of Sciences

References

[1] A-H Mohsenian-Rad V Shah-Mansouri V W S Wong andR Schober ldquoDistributed channel selection and randomizedinterrogation algorithms for large-scale and dense RFID sys-temsrdquo IEEE Transactions on Wireless Communications vol 9no 4 pp 1402ndash1413 2010

[2] F Villanueva V David and M Francisco ldquoInternet of Thingsarchitecture for a RFID-based product tracking businessmodelrdquo in Proceedings of the 6th International Conference onInnovative Mobile and Internet Services in Ubiquitous Comput-ing pp 811ndash816 2012

[3] Y-H Chen S-J Horng R-S Run et al ldquoA novel anti-collisionalgorithm in RFID systems for identifying passive tagsrdquo IEEETransactions on Industrial Informatics vol 6 no 1 pp 105ndash1212010

[4] J Panneerselvam L Liu R Hill Y Zhan and W Liu ldquoAninvestigation of the effect of cloud computing on networkmanagementrdquo in International Conference on High PerformanceComputing and Communications pp 1794ndash1799 2012

[5] D K Klair K-W Chin and R Raad ldquoA survey and tutorial ofRFID anti-collision protocolsrdquo IEEE Communications Surveysand Tutorials vol 12 no 3 pp 400ndash421 2010

[6] Y Jiang and R Zhang ldquoAn adaptive combination query treeprotocol for tag identification in RFID systemsrdquo IEEE Commu-nications Letters vol 16 no 8 pp 1192ndash1194 2012

[7] S Jiang J Miao and L Wang ldquoMobile node authenticationprotocol for crossing cluster in heterogeneous wireless sensornetworkrdquo in Proceedings of the 3rd International Conference onCommunication Software and Networks (ICCSN rsquo11) pp 205ndash209 May 2011

[8] X Jia Q Feng and C Ma ldquoAn efficient anti-collision protocolfor RFID tag identificationrdquo IEEE Communications Letters vol14 no 11 pp 1014ndash1016 2010

[9] L Kang J Zhang K Wu D Zhang and L Ni ldquoRCSMAreceiver-based carrier sense multiple access in UHF RFIDsystemsrdquo IEEE Transactions on Parallel and Distributed Systemsvol 23 no 4 pp 735ndash743 2012

[10] M Al-Medhwahi A Alkholidi and H Hamam ldquoA new hybridframe ALOHA and binary splitting algorithm for anti-collisionin RFID systemsrdquo in Proceedings of the 18th InternationalConference on Software Telecommunications and ComputerNetworks (SoftCOM rsquo10) pp 219ndash224 September 2010

[11] Y-C Lai and C-C Lin ldquoTwo blocking algorithms on adaptivebinary splitting single and pair resolutions for RFID tagidentificationrdquo IEEEACM Transactions on Networking vol 17no 3 pp 962ndash975 2009

[12] Y-C Lai and C-C Lin ldquoA pair-resolution blocking algorithmon adaptive binary splitting for RFID tag identificationrdquo IEEECommunications Letters vol 12 no 6 pp 432ndash434 2008

[13] Y-C Lai and L-Y Hsiao ldquoGeneral binary tree protocol forcoping with the capture effect in RFID tag identificationrdquo IEEECommunications Letters vol 14 no 3 pp 208ndash210 2010

[14] Y Lai L Hsiao H Chen C Lai and J Lin ldquoA novel querytree protocol with bit tracking in RFID tag identificationrdquo IEEETransactions on Mobile Computing pp 1ndash13 2012

International Journal of Distributed Sensor Networks 9

[15] J H Choi D Lee andH Lee ldquoQuery tree-based reservation forefficient RFID tag anti-collisionrdquo IEEE Communications Lettersvol 11 no 1 pp 85ndash87 2007

[16] J Shin B Jeon and D Yang ldquoMultiple RFID tags identificationwith M-ary query tree schemerdquo IEEE Communications Lettersvol 17 no 3 pp 604ndash607 2013

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpwwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 2: Research Article QSA: Query Splitting-Based …downloads.hindawi.com/journals/ijdsn/2013/674698.pdf4. QSA: Query Splitting-Based Anticollision for Mobile IoT.. Overview of the Anticollision

2 International Journal of Distributed Sensor Networks

Reader

Tag NTag 1 Tag 2

Readerrsquosinterrogation zone

Antenna

middot middot middot

Tag N + 1

Collision

Figure 1 The tag collision with mobile tag

of the partition operations Therefore the done operationshave to be repeated and the delay of identifying the tagsincreases If the new tags enter the readerrsquos interrogation zoneat an interval that causes rollback repeatedly some tagsmightdepart the readerrsquos interrogation zone before being identifiedwhich is called ldquotag starvationrdquo in mobile environmentsTherefore it is necessary to provide efficient anticollision formobile RFID-based IoT

In this paper we will deal with the ldquotag starvationrdquo andperformance problem for anticollision in mobile IoT By thedesign of query stack and query rules the proposed anticol-lision algorithm avoids repetition operations and decreasesthe collisions consequently In summary our contributionsinclude the following

(i) We characterize the problem of anticollision inmobile environment which is more practical for theemerging IoT technology

(ii) We propose a novel anticollision algorithm namedQuery Splitting-basedAnticollision (QSA) formobileRFID-based IoT which solves the problem of tag star-vation and performance degradation resulted fromthe tag mobility

(iii) Simulation and analysis evaluate the efficiency ofthe proposed algorithm The results show the betterperformance of the proposed algorithm to the priormethods

The rest of this paper is organized as follows Section 2outlines preliminary includes background related workSection 3 presents the problems for mobile tags Section 4gives the detailed design of our algorithm The simulationresults are provided in Section 5 Finally Section 6 concludesthe paper

2 Preliminary

21 Collision Detection Code technologies are widely usedfor collision detection Manchester code is one of the mostpopular technologies for RFID systems [5] In Manchestercode the value of one bit is defined as the voltage transitionwithin a bit windowA bit ldquo0rdquo is coded by a positive transitionwhile a bit ldquo1rdquo is coded by a negative transition In RFID

systems if two (ormore) tags transmit different values simul-taneously the positive and negative transitions of the receivedbits cancel each other out This state is not permissible inManchester code during data transmission and is recognizedas an error Therefore Manchester code makes it possible toldquotrace a collision to an individual bitrdquo and ldquofind where thecollided bit isrdquo [8]

Figure 2 shows an example of Manchester code forcollision detection The IDs of tag 1 and tag 2 are ldquo10101100rdquoand ldquo10001001rdquo respectively When tags 1 and 2 send theirIDs simultaneously using Manchester code the decodeddata from the interfered signal received by the reader isldquo10119909011199090119909rdquo where ldquo119909rdquo represents a collided bit In thisexample the locations of the collided bits are the 3rd 6thand 8th bits This information helps the reader separate thecollided tags into subsets more smartly and identify the tagsmore quickly

Manchester code can be utilized to detect the collisionbits but the tags should be strictly synchronized Fortunatelythe tags in passive RFID systems are all driven by the readerwith both energy and the same clock frequency

22 Anticollision Algorithms Many researches have focusedon the issue of anticollision including tag-driven and readerdriven procedures [9] Tag-driven anticollision protocolsfunction asynchronously [5] For example in Aloha-basedprotocols [10] time is divided into slots and each tag ran-domly transmits its ID in each timeslot The tags contin-uously retransmit their IDs until the reader acknowledgestheir transmission However the Aloha-based protocols haveseveral serious problems For example a specific tag maynot be identified for a long time leading to the so-calledldquotag starvationrdquo problem The performance of Aloha-basedprotocols is sensitive to the number of tags Furthermore itis very difficult to predict the number of tags in mobile envi-ronments if not impossible

For reader-driven anticollision protocols they functionsynchronously since all tags are controlled and checked bythe reader simultaneouslyTherefore the reader can avoid tagstarvation under static environments Furthermore they canbe categorized into Binary Tree algorithm (BT) [11ndash13] andQuery Tree algorithm (QT) [14ndash16]

221 Binary Tree Algorithm (BT) BT performs collision res-olution by splitting collided tags into disjoint subsets Thesesubsets become increasingly smaller until they contain onetag Each tag has a random binary number generator Forexample in Figure 3 tags with a counter value of zero areconsidered to be in the transmit state otherwise tags are inthe sleep state After each timeslot the reader informs tagswhether there is a collision or not If therewas a collision eachtag in the transmit state generates a random binary numberTags will become in sleep state after being identified

As can be seen that the average number of timeslots toidentify the first tag is

119879 (119873) = log2119873 (1)

where119873 is the number of tags Note that the reader needs tobroadcast the universal condition (all bits are ldquo1rdquo) before the

International Journal of Distributed Sensor Networks 3

1 0 11 0 1 0 0

1 0 0 0 1 0 0 1

1 0 10 0

Tag 1

Tag 2

Decoded datax x x

Figure 2 Collision detection with Manchester code

0 1

0 1

0 10 1

0 1

0 10 1

CollisionTag

The first timeslot

The second timeslot

The third timeslot

Figure 3 Binary tree based anticollision procedure

first timeslots to collect all tags lying in its interrogation zeroFurthermore the total number of timeslots for identifying all119873 tags is

119879 (119873) =

119873

sum

119896=1

log2119896 (2)

The time consumption is the most serious defect since ithas not recorded the history information which results in alarge amount of repeat operations

222 Query Tree (QT) Query tree (QT) algorithms storetree construction at the reader and tags only need to have aprefix matching circuit The reader transmits a serial numberto tags which they then compare against their IDs The tagswhose IDs equal to or lower than the serial number respondto the readerrsquos commandThe reader thenmonitors tags replybit by bit usingManchester code and once a collision occursthe reader splits tags into subsets based on collided bits Thereader then transmits another query by replacing the mostsignificant collided bit with ldquo0rdquo and sets the other bits to ldquo1rdquoThis procedure stops until a single tag has been selected out

Rollback Query Tree (RQT) is proposed to reduce theaverage number of timeslots for identifying the tags Duringthe partition operation these records are saved at the readerThus the anticollision can avoid the repeating operationsbased on the saved informationwhen the reader tries to selectout the next tag The timeslot number of RQT is

119879 (119873) = log2119873 +119873 minus 1 (3)

where119873 is the number of tags

3 Problem for Identifying Mobile Tags

In static environments Rollback Query Tree reduces thenumber of timeslots to deal with collision in RFID systemsHowever both tag starvation and delay problems occurred inmobile environments If one tag enters the readerrsquos interro-gation zone when the reader is processing the entered tagssome obtained results might be destroyed by the new arrivedtag The total number of identifying tags is

119879 (119873 +119872) = 119879 (119873) +

119872

sum

119894=1

(119879119894+ 119877119894) (4)

where119873119872 are the numbers of the tags in the readerrsquos inter-rogation zone already and the new arrived tags respectively119879(119873) is the timeslots number as is defined in formula (3)119879119894 119877119894are the timeslots for processing the new arrived tag 119894

and the timeslots that caused by the repeat operations Theincreased timeslot for a new arrived tag 119894 is 119879

119894+ 119877119894

If the increased time is greater than the interval timebetween the arriving tags the existing tags might not beprocessed in a long time since the reader has to reexecute therollback operations for the new arrived tags Therefore tagsstarvation problem will happen if the following condition ismet

119879119894rarr 119894+1le 119879119894+ 119877119894 (5)

where 119879119894rarr 119894+1

is the interval time between the new arrivedtag 119894 to 119894 + 1 If each tag 119894 meets the requirement in formula(5) no tags will be selected out successfullyThis requirementis considerably strong but to a moving tag it will fail to beidentified only if the reader has not processed before it leavesthe readerrsquos interrogation zone

4 International Journal of Distributed Sensor Networks

In the following we take an example to illustrate therollback caused by a new arriving tag As shown in Figure 4there are already four tags (IDs 10100011 11100010 11100011and 11110010) in the readerrsquos interrogation zone After tworounds of query (named 119902

1and 119902

2) the tag 10100011 is the

first one to be identified Then the reader should broadcastthe queries 119902

3 1199024 and 119902

5to select the next smallest tag

11100010 in the readerrsquos interrogation zone If a new tag01100011 enters the interrogation zone between broadcasting1199024and 119902

5 it will respond to the query 119902

5ldquole11100010rdquo Then

the reader receives the response ldquo119909110001119909rdquo (combined by11100010 and 01100011) instead of selecting out tag 11100010Therefore the reader should broadcast the new request com-mand ldquole11111111rdquo according to the highest uncertain ldquo119909rdquo bitUnfortunately this query command includes the responsesfrom all tags and the queries ldquo119902

3rdquo and ldquo119902

4rdquo have to be

executed again in the following In an extreme situation theoperation might be repeated many times for the consecutivearriving tags as shown in formula (5) Thus tag starvation ispossible for query tree schemes in mobile environments

4 QSA Query Splitting-BasedAnticollision for Mobile IoT

41 Overview of the Anticollision Algorithm Firstly a set ofqueries 119876 = (119902

1 1199022 119902

119897) is defined for the reader where

1199021is initialized as ldquole1119899rdquo The reader executes the following

steps to identify tags

(1) Broadcast the current query in 119876 to all tags(2) When receiving the responses from tags

(21) if the reply is string 119908 without ldquo119909rdquo bits thenselect and process the tag with ID 119908

(22) if a collision is detected that is the reply is string119908 with ldquo119909rdquo bits then set the next query in 119876

(23) if there is no reply from tags do nothing

(3) Update 119876 according to the received responses

Repeat the above procedure until 119876 is empty In thisprocedure four commands (REQUEST SELECT READ-DATA and DESELECT) are adopted as defined in Table 1

For tags let119908 = 11990811199082 119908

119899be the tagrsquos IDThe query is

defined as follows if119908 le 119902 then the tag sends string119908 to thereader where 119902 is the query string received from the reader

As can be seen from the above procedure that the keyproblem is how to design the query scheme our main ideais to keep the history records which can avoid rollback of thedone operations

42 Design of Adaptive Query

421 Query Stack Design for Rollback Operation As shownin Table 1 REQUEST is the query command for the readerto split tags into subsets To reduce the total timeslots foridentifying all tags we design a query stack structure toimplement the rollback operations during query processldquoPush Queryrdquo and ldquoPop Queryrdquo are the two basic operations

Table 1 Definition of commands

REQUEST(ID Condition)

Reader sends REQUEST command withparameter ID Condition to tags Tags comparetheir IDs against the received ID Conditionand reply their IDs to the reader if ID leID Condition

SELECT (ID) Reader selects the tag IDREAD-DATA Reader reads data from the selected tag

DESELECT Reader cancels the selected tag and this tagthus enters silent state

of query stack Each query response is pushed into querystack if and only if the response includes ldquo119909rdquo

We also take the example in Figure 4 to explain thestack operation The response is ldquo111119909001119909rdquo for the query1199023 ldquole11111111rdquo The response ldquo111119909001119909rdquo includes ldquo119909rdquo thus

it is pushed into the query stack as shown in Figure 5 In thesame way the response ldquo1110001119909rdquo is also pushed into thequery stack with the query 119902

4 ldquole11101111rdquo When the reader

broadcasts the query 1199025 ldquole11100010rdquo a new tag ldquo01100011rdquo

enters the readerrsquos interrogation zone Thus the response willbe ldquo119909110001119909rdquo and it is also pushed into the stack as shownin Figure 5

Once a response includes no ldquo119909rdquo the reader will select thistag (using the command SELECT as shown in Table 1) andread the selected tag (using the command READ-DATA asshown in Table 1) After that the reader will pop one elementfrom the query stack For example when the new arrived tagldquo01100011rdquo has been processed the element ldquo119909110001rdquo willthen be popped out The following design is how to set theldquo119909rdquo bits and broadcast new query commands

422 Rule Design for Query Condition The rule for querycommand is one of the most important designs in QSA Asshown in Table 2 the rules can be presented as two kindsOne is for the obtained response and the other is for the popstack

(1) Rule for Obtained Response When the reader receivesresponse including ldquo119909rdquo bits the next query condition shouldbe set according to the collision bits in the response Thesecond line in Table 2 shows the rule for this kind of obtainedresponse

In the first iteration all bits are set as ldquo1rdquo that isMax(ID) to collect the responses from all tags For examplethe parameter is ldquo11111111rdquo for eight bits ID In the followingiteration the highest bit ldquo119909rdquo is set as ldquo0rdquo the bits which arelower than the highest ldquo119909rdquo are all set as ldquo1rdquo According to thesetting of ldquo119909rdquo bits we can draw the following theorem

Theorem 1 Rule for obtained response implements binarysplitting for multiple tags

Proof The response is a string 119878 = 0 1 119909119899 where 119899 is thebit number of tag ID The highest ldquo119909rdquo bit in 119878 is denoted as 119896and it must meet the following requirement

119878 [119896] = 119909 119878 [119899 sdot sdot sdot 119896 + 1] = 0 1119899minus119896 (6)

International Journal of Distributed Sensor Networks 5

A

B

11110010C

01100011

Rollback forthe new arrived tagq3 le 11111111

q1 le 11111111

q2 le 10111111

q7 le 11111111q4 le 11101111

q5 le 11100010

q6 le 11100011

10100011

Processed tag

To be processed

New arrived

1110001111100010

Collision

Figure 4 Rollback problem for the new arrived tag

Stack 3

Stack 2

Stack 1

Push query Pop query

x110001x

1110001x

111x001x

Figure 5 Query stack for new arrived tags

Table 2 Rule design for query condition

The firstiteration The nth iteration

Rule forobtainedresponse

Max(ID)bit(119896) = 0 bit(119896 minus 1 sdot sdot sdot 1) = 1119896minus1(where k is the highest ldquoxrdquo bit in theresponse)

Rule for popstack

Cannothappen

if there is new arrived tagbit(119896) = 1bit(119896 minus 1 sdot sdot sdot 1)= 0119896minus1

elsebit(119896 sdot sdot sdot 1) = 1119896

end

Then there is at least one tag whose 119896th bit is ldquo1rdquo and atleast one tagwhose 119896th bit is ldquo0rdquoOtherwise the 119896th bit cannotbe ldquo0rdquoTherefore REQUEST ldquole bit(119896) = 0 bit(119896minus1 sdot sdot sdot 0) = 1rdquo

splits the tags into two catalogs as binary division one catalogis with 119878[119896] = 0 and the other is with 119878[119896] = 1

This rule can reduce the query scope by dividing theresponding tags into two catalogs until only one tag respond

(2) Rule for Pop Stack After one tag is selected and processedthe top element is popped out This element includes ldquo119909rdquo bitThe rule for pop stack deals with the problem of setting thesebits which is shown in the third line of Table 2 Note that itcannot be the first iteration in anticollision process (ldquocannothappenrdquo in Table 2) since the stack is empty at the beginning

To the popped element there are two situations withoutnew arrived tag and with arrived tag when it pushed intothe stack For the situation without new arrived tag all bitsare set as ldquo1rdquo in order to include all unprocessed tags thatis bit(119896 sdot sdot sdot 1) = 1119896 where 119896 is the highest ldquo119909rdquo bit On theother hand if there are new arrived tags the highest ldquo119909rdquobit is set as ldquo1rdquo and the lower bits are all set as ldquo0rdquo that isbit(119896 minus 1 sdot sdot sdot 1) = 0119896minus1

Whether there is new arrived tag or not it can be judgedaccording to the following formula

Highest119909 (Top) gt Highest119909 (Top-1) (7)

whereHighest119909 is the function to obtain the highest ldquo119909rdquo bit inits parameter Top means the first element in the query stackand Top-1 is the second one

Theorem 2 If the highest ldquo119909rdquo bit of the first stack elementis higher than that of the second stack element that is thecondition of formula (7) is met there must be new arrived tag

6 International Journal of Distributed Sensor Networks

Begin

Request (max ID)

Wait for a given period

No

No

No

Yes

Received theresponse

ldquoXrdquo bit in V

Yes

Read-data

Deselect

Read one tag

Stack is empty

End

Process right subtree

Process left subtree pop stackrdquo and

Set V as ldquorule forobtained valuerdquo and

request (V)

Yes

Decode the response V

Push V onto stack

Select (V)

V998400 = pop stackSet V998400 as ldquorule for

request (V998400)

Figure 6 Flow chart of the proposed QSA algorithm

Proof According to rule for obtained response the readerfirst processes the tags whose highest ldquo119909rdquo bit is ldquo0rdquoThereforeonly when the higher ldquo119909rdquo bit is processed it is possiblefor lower ldquo119909rdquo to be processed Thus the highest ldquo119909rdquo alwaysdecreases as the distance to the top of query stack Howeverit is possible that the ldquo119909rdquo can be at any bit if new tags arriveThat is to say formula (7) is a result caused by new arrivedtags

For example as shown in Figure 5 the highest ldquo119909rdquo bitin the top stack element Stack 3 is 8 and that in Stack 2 is1 Formula (7) meets and there is new arrived tag In theexample the query for Stack 2 element ldquo1110001119909rdquo is 119902

5

ldquole11100010rdquo in the example of Figure 4While the highest ldquo119909rdquobit in top element Stack 1 is the 8th bit There is new arrivedtag whose 8th bit is ldquo0rdquo Otherwise the new arrived tag isimpossible to be included by the query ldquole11100010rdquo and thetop element cannot be ldquo119909rdquo at the 8th bit In fact there is anew arrived tag whose ID is 01100011 in the example

43 The Procedure of the Proposed QSA Based on the designof query stack and query rule we describe the procedureof the proposed QSA algorithm in the following In QSA

the reader first broadcasts the query with the parameter(max ID) and receives the replies from all tags in its inter-rogation zone If the received response of this query includesldquo119909rdquo the tree can be divided into the left subtree and the rightsubtree according to the highest bit ldquo119909rdquo In the left subtreethe highest ldquo119909rdquo bit is ldquo0rdquo and that of the right tree is ldquo1rdquo Theprocedure of the anticollision algorithm is shown in Figure 6Itmainly includes three parts process the left subtree processthe right subtree and read one tag

431 Process the Left Subtree If there is ldquo119909rdquo in the receivedresponse the reader begins to process the left subtree Firstlythe reader pushes the response which has ldquo119909rdquo bits into thequery stack We design this query stack which can record theentrance to the right subtreeThen it sets the query conditionaccording to the rule for obtained response in Table 2 Finallythe reader broadcasts the query with the set condition whichenables a new round communication

432 Read One Tag If the received response has no ldquo119909rdquo bitthere is no collision and a single tag is identified The readerwill select this tag and read data from it After the tag is

International Journal of Distributed Sensor Networks 7

0 100 200 3000

500

1000

1500Th

e num

ber o

f col

lisio

ns (t

imes

)

The number of tags

QT RQT Proposed QSA

(a)

0 100 200 3000

400

800

1200

The n

umbe

r of c

ollis

ions

(tim

es)

The number of tags

QT RQT Proposed QSA

(b)

Figure 7 The number of collisions versus various numbers of tags (a) Tag ID is 64 bits (b) tag ID is 128 bits

0 100 200 300

45

48

51

The number of tags

RQT Proposed QSA

Iden

tifica

tion

effici

ency

()

Figure 8 Identification efficiency

processed command ldquoDESELECTrdquo will make this tag keepsilent state in the following

433 Process the Right Subtree After one tag is read thealgorithm will begin to process the right subtree Firstly thetop element of the query stack is popped out and it is setaccording to the rule for pop stack As described in previousSection there are two possibilities that is with new arrivedtag and without new arrived tag when setting the querycondition If there is new tag which causes higher ldquo119909rdquo bitthe query will enter the left tree process after receiving theresponse Otherwise the process will further deal with theright subtree Note that the process will end until the query

200

400

600

800

The n

umbe

r of c

ollis

ions

(tim

es)

QT RQT Proposed QSA

0 2 4 6The interval of entering tags (timeslots)

Figure 9The number of collisions versus various mobile velocities

stack is empty which means that all tags have been identifiedalready

5 Simulation Results

To evaluate anticollision performance we compare the timeconsumption and identification efficiency of the proposedQSA algorithm with that of two representative schemesQuery tree (QT) and Rollback Query Tree (RQT) Undermobile environments we measure the number of timeslotsused to read out all tags Firstly we fix mobile velocity of thetags and evaluate the resultsThemobile velocity of tags is set

8 International Journal of Distributed Sensor Networks

as the following rule a group of five tags enter the readerrsquosinterrogation zero at the interval of five timeslots

Figure 7 shows the results of collision numbers undervarious numbers of tags As can be seen that QT meets themost number of collisions since it has not recorded thequery results during the procedure of finding the least tagID RQT always takesmore collisions than the proposedQSAalgorithm which is consistent with formula (4) Both 64 bitsand 128 bits tag ID in Figures 7(a) and 7(b) the proposedQSA takes the least number of collisions which illustratesthe efficiency of the QSA since it overcomes the rollbackoperations when new tags arrive

To identify the tags as soon as possible the algorithmshould keep high identification efficiency Identification effi-ciency is defined as the ratio of the number of successtimeslots to the total timeslot number Higher identificationefficiency means less wasted timeslots for collisions Figure 8describes the comparison of identification efficiency betweenRQT and the proposed QSA The identification efficiency ofQSA is higher than that of RQT It validates the analysis ofnumber of consumed timeslots in Figure 7(a) The identifi-cation efficiency of the proposed QSA especially decreasesslowly as the tag number increasesWhile the RQT is of loweridentification efficiency when the tag number increases Forexample the identification efficiency of the RQT is below 45when the tag number is 300

From the theoretical analysis it can be known that themobile velocity will affect the results of collisions Finally weevaluate the impact of tagmobile velocity In this experimenttotal 200 tags enter the readerrsquos interrogation zone at differentintervals which varies from 1 to 5 timeslots The samewith the above experiments five tags come into the readerrsquosinterrogation zone at a pointed timeslot As can be seen fromFigure 9 the proposed QSA achieves the least number ofcollisions under all intervals of entering tags An interest-ing change happens in QT scheme the collision numberincreases firstly and then decreases It is because the tagnumber increases quickly at the smaller interval of enteringtags which causes more collisions The gap between RQTand the proposed QSA increases as the interval increases Itindicates that the velocity of mobile tags will cause differentrollback operations in RQT while it is eliminated in our QSAalgorithm

6 Conclusions

Collision is considered as one of the most important issuesthat affect the identification process in RFID systems Mobiletags of IoT especially induce new problems such as perfor-mance degrade and tag starvation In this paper we proposea novel anticollision algorithm named QSA to solve theseproblems The proposed QSA can overcome the problemsresulted from mobile tags efficiently Compared to priorschemes the QSA presents a better performance at differentmobile velocity and various tag numbers

Acknowledgments

This work is supported in part by the National NaturalScience Foundation of China under Grant nos 61106036

61173169 and 61272147 in part by the science and technologyprojects of Hunan province and in part by State Key Lab-oratory of Computer Architecture Institute of ComputingTechnology Chinese Academy of Sciences

References

[1] A-H Mohsenian-Rad V Shah-Mansouri V W S Wong andR Schober ldquoDistributed channel selection and randomizedinterrogation algorithms for large-scale and dense RFID sys-temsrdquo IEEE Transactions on Wireless Communications vol 9no 4 pp 1402ndash1413 2010

[2] F Villanueva V David and M Francisco ldquoInternet of Thingsarchitecture for a RFID-based product tracking businessmodelrdquo in Proceedings of the 6th International Conference onInnovative Mobile and Internet Services in Ubiquitous Comput-ing pp 811ndash816 2012

[3] Y-H Chen S-J Horng R-S Run et al ldquoA novel anti-collisionalgorithm in RFID systems for identifying passive tagsrdquo IEEETransactions on Industrial Informatics vol 6 no 1 pp 105ndash1212010

[4] J Panneerselvam L Liu R Hill Y Zhan and W Liu ldquoAninvestigation of the effect of cloud computing on networkmanagementrdquo in International Conference on High PerformanceComputing and Communications pp 1794ndash1799 2012

[5] D K Klair K-W Chin and R Raad ldquoA survey and tutorial ofRFID anti-collision protocolsrdquo IEEE Communications Surveysand Tutorials vol 12 no 3 pp 400ndash421 2010

[6] Y Jiang and R Zhang ldquoAn adaptive combination query treeprotocol for tag identification in RFID systemsrdquo IEEE Commu-nications Letters vol 16 no 8 pp 1192ndash1194 2012

[7] S Jiang J Miao and L Wang ldquoMobile node authenticationprotocol for crossing cluster in heterogeneous wireless sensornetworkrdquo in Proceedings of the 3rd International Conference onCommunication Software and Networks (ICCSN rsquo11) pp 205ndash209 May 2011

[8] X Jia Q Feng and C Ma ldquoAn efficient anti-collision protocolfor RFID tag identificationrdquo IEEE Communications Letters vol14 no 11 pp 1014ndash1016 2010

[9] L Kang J Zhang K Wu D Zhang and L Ni ldquoRCSMAreceiver-based carrier sense multiple access in UHF RFIDsystemsrdquo IEEE Transactions on Parallel and Distributed Systemsvol 23 no 4 pp 735ndash743 2012

[10] M Al-Medhwahi A Alkholidi and H Hamam ldquoA new hybridframe ALOHA and binary splitting algorithm for anti-collisionin RFID systemsrdquo in Proceedings of the 18th InternationalConference on Software Telecommunications and ComputerNetworks (SoftCOM rsquo10) pp 219ndash224 September 2010

[11] Y-C Lai and C-C Lin ldquoTwo blocking algorithms on adaptivebinary splitting single and pair resolutions for RFID tagidentificationrdquo IEEEACM Transactions on Networking vol 17no 3 pp 962ndash975 2009

[12] Y-C Lai and C-C Lin ldquoA pair-resolution blocking algorithmon adaptive binary splitting for RFID tag identificationrdquo IEEECommunications Letters vol 12 no 6 pp 432ndash434 2008

[13] Y-C Lai and L-Y Hsiao ldquoGeneral binary tree protocol forcoping with the capture effect in RFID tag identificationrdquo IEEECommunications Letters vol 14 no 3 pp 208ndash210 2010

[14] Y Lai L Hsiao H Chen C Lai and J Lin ldquoA novel querytree protocol with bit tracking in RFID tag identificationrdquo IEEETransactions on Mobile Computing pp 1ndash13 2012

International Journal of Distributed Sensor Networks 9

[15] J H Choi D Lee andH Lee ldquoQuery tree-based reservation forefficient RFID tag anti-collisionrdquo IEEE Communications Lettersvol 11 no 1 pp 85ndash87 2007

[16] J Shin B Jeon and D Yang ldquoMultiple RFID tags identificationwith M-ary query tree schemerdquo IEEE Communications Lettersvol 17 no 3 pp 604ndash607 2013

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpwwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 3: Research Article QSA: Query Splitting-Based …downloads.hindawi.com/journals/ijdsn/2013/674698.pdf4. QSA: Query Splitting-Based Anticollision for Mobile IoT.. Overview of the Anticollision

International Journal of Distributed Sensor Networks 3

1 0 11 0 1 0 0

1 0 0 0 1 0 0 1

1 0 10 0

Tag 1

Tag 2

Decoded datax x x

Figure 2 Collision detection with Manchester code

0 1

0 1

0 10 1

0 1

0 10 1

CollisionTag

The first timeslot

The second timeslot

The third timeslot

Figure 3 Binary tree based anticollision procedure

first timeslots to collect all tags lying in its interrogation zeroFurthermore the total number of timeslots for identifying all119873 tags is

119879 (119873) =

119873

sum

119896=1

log2119896 (2)

The time consumption is the most serious defect since ithas not recorded the history information which results in alarge amount of repeat operations

222 Query Tree (QT) Query tree (QT) algorithms storetree construction at the reader and tags only need to have aprefix matching circuit The reader transmits a serial numberto tags which they then compare against their IDs The tagswhose IDs equal to or lower than the serial number respondto the readerrsquos commandThe reader thenmonitors tags replybit by bit usingManchester code and once a collision occursthe reader splits tags into subsets based on collided bits Thereader then transmits another query by replacing the mostsignificant collided bit with ldquo0rdquo and sets the other bits to ldquo1rdquoThis procedure stops until a single tag has been selected out

Rollback Query Tree (RQT) is proposed to reduce theaverage number of timeslots for identifying the tags Duringthe partition operation these records are saved at the readerThus the anticollision can avoid the repeating operationsbased on the saved informationwhen the reader tries to selectout the next tag The timeslot number of RQT is

119879 (119873) = log2119873 +119873 minus 1 (3)

where119873 is the number of tags

3 Problem for Identifying Mobile Tags

In static environments Rollback Query Tree reduces thenumber of timeslots to deal with collision in RFID systemsHowever both tag starvation and delay problems occurred inmobile environments If one tag enters the readerrsquos interro-gation zone when the reader is processing the entered tagssome obtained results might be destroyed by the new arrivedtag The total number of identifying tags is

119879 (119873 +119872) = 119879 (119873) +

119872

sum

119894=1

(119879119894+ 119877119894) (4)

where119873119872 are the numbers of the tags in the readerrsquos inter-rogation zone already and the new arrived tags respectively119879(119873) is the timeslots number as is defined in formula (3)119879119894 119877119894are the timeslots for processing the new arrived tag 119894

and the timeslots that caused by the repeat operations Theincreased timeslot for a new arrived tag 119894 is 119879

119894+ 119877119894

If the increased time is greater than the interval timebetween the arriving tags the existing tags might not beprocessed in a long time since the reader has to reexecute therollback operations for the new arrived tags Therefore tagsstarvation problem will happen if the following condition ismet

119879119894rarr 119894+1le 119879119894+ 119877119894 (5)

where 119879119894rarr 119894+1

is the interval time between the new arrivedtag 119894 to 119894 + 1 If each tag 119894 meets the requirement in formula(5) no tags will be selected out successfullyThis requirementis considerably strong but to a moving tag it will fail to beidentified only if the reader has not processed before it leavesthe readerrsquos interrogation zone

4 International Journal of Distributed Sensor Networks

In the following we take an example to illustrate therollback caused by a new arriving tag As shown in Figure 4there are already four tags (IDs 10100011 11100010 11100011and 11110010) in the readerrsquos interrogation zone After tworounds of query (named 119902

1and 119902

2) the tag 10100011 is the

first one to be identified Then the reader should broadcastthe queries 119902

3 1199024 and 119902

5to select the next smallest tag

11100010 in the readerrsquos interrogation zone If a new tag01100011 enters the interrogation zone between broadcasting1199024and 119902

5 it will respond to the query 119902

5ldquole11100010rdquo Then

the reader receives the response ldquo119909110001119909rdquo (combined by11100010 and 01100011) instead of selecting out tag 11100010Therefore the reader should broadcast the new request com-mand ldquole11111111rdquo according to the highest uncertain ldquo119909rdquo bitUnfortunately this query command includes the responsesfrom all tags and the queries ldquo119902

3rdquo and ldquo119902

4rdquo have to be

executed again in the following In an extreme situation theoperation might be repeated many times for the consecutivearriving tags as shown in formula (5) Thus tag starvation ispossible for query tree schemes in mobile environments

4 QSA Query Splitting-BasedAnticollision for Mobile IoT

41 Overview of the Anticollision Algorithm Firstly a set ofqueries 119876 = (119902

1 1199022 119902

119897) is defined for the reader where

1199021is initialized as ldquole1119899rdquo The reader executes the following

steps to identify tags

(1) Broadcast the current query in 119876 to all tags(2) When receiving the responses from tags

(21) if the reply is string 119908 without ldquo119909rdquo bits thenselect and process the tag with ID 119908

(22) if a collision is detected that is the reply is string119908 with ldquo119909rdquo bits then set the next query in 119876

(23) if there is no reply from tags do nothing

(3) Update 119876 according to the received responses

Repeat the above procedure until 119876 is empty In thisprocedure four commands (REQUEST SELECT READ-DATA and DESELECT) are adopted as defined in Table 1

For tags let119908 = 11990811199082 119908

119899be the tagrsquos IDThe query is

defined as follows if119908 le 119902 then the tag sends string119908 to thereader where 119902 is the query string received from the reader

As can be seen from the above procedure that the keyproblem is how to design the query scheme our main ideais to keep the history records which can avoid rollback of thedone operations

42 Design of Adaptive Query

421 Query Stack Design for Rollback Operation As shownin Table 1 REQUEST is the query command for the readerto split tags into subsets To reduce the total timeslots foridentifying all tags we design a query stack structure toimplement the rollback operations during query processldquoPush Queryrdquo and ldquoPop Queryrdquo are the two basic operations

Table 1 Definition of commands

REQUEST(ID Condition)

Reader sends REQUEST command withparameter ID Condition to tags Tags comparetheir IDs against the received ID Conditionand reply their IDs to the reader if ID leID Condition

SELECT (ID) Reader selects the tag IDREAD-DATA Reader reads data from the selected tag

DESELECT Reader cancels the selected tag and this tagthus enters silent state

of query stack Each query response is pushed into querystack if and only if the response includes ldquo119909rdquo

We also take the example in Figure 4 to explain thestack operation The response is ldquo111119909001119909rdquo for the query1199023 ldquole11111111rdquo The response ldquo111119909001119909rdquo includes ldquo119909rdquo thus

it is pushed into the query stack as shown in Figure 5 In thesame way the response ldquo1110001119909rdquo is also pushed into thequery stack with the query 119902

4 ldquole11101111rdquo When the reader

broadcasts the query 1199025 ldquole11100010rdquo a new tag ldquo01100011rdquo

enters the readerrsquos interrogation zone Thus the response willbe ldquo119909110001119909rdquo and it is also pushed into the stack as shownin Figure 5

Once a response includes no ldquo119909rdquo the reader will select thistag (using the command SELECT as shown in Table 1) andread the selected tag (using the command READ-DATA asshown in Table 1) After that the reader will pop one elementfrom the query stack For example when the new arrived tagldquo01100011rdquo has been processed the element ldquo119909110001rdquo willthen be popped out The following design is how to set theldquo119909rdquo bits and broadcast new query commands

422 Rule Design for Query Condition The rule for querycommand is one of the most important designs in QSA Asshown in Table 2 the rules can be presented as two kindsOne is for the obtained response and the other is for the popstack

(1) Rule for Obtained Response When the reader receivesresponse including ldquo119909rdquo bits the next query condition shouldbe set according to the collision bits in the response Thesecond line in Table 2 shows the rule for this kind of obtainedresponse

In the first iteration all bits are set as ldquo1rdquo that isMax(ID) to collect the responses from all tags For examplethe parameter is ldquo11111111rdquo for eight bits ID In the followingiteration the highest bit ldquo119909rdquo is set as ldquo0rdquo the bits which arelower than the highest ldquo119909rdquo are all set as ldquo1rdquo According to thesetting of ldquo119909rdquo bits we can draw the following theorem

Theorem 1 Rule for obtained response implements binarysplitting for multiple tags

Proof The response is a string 119878 = 0 1 119909119899 where 119899 is thebit number of tag ID The highest ldquo119909rdquo bit in 119878 is denoted as 119896and it must meet the following requirement

119878 [119896] = 119909 119878 [119899 sdot sdot sdot 119896 + 1] = 0 1119899minus119896 (6)

International Journal of Distributed Sensor Networks 5

A

B

11110010C

01100011

Rollback forthe new arrived tagq3 le 11111111

q1 le 11111111

q2 le 10111111

q7 le 11111111q4 le 11101111

q5 le 11100010

q6 le 11100011

10100011

Processed tag

To be processed

New arrived

1110001111100010

Collision

Figure 4 Rollback problem for the new arrived tag

Stack 3

Stack 2

Stack 1

Push query Pop query

x110001x

1110001x

111x001x

Figure 5 Query stack for new arrived tags

Table 2 Rule design for query condition

The firstiteration The nth iteration

Rule forobtainedresponse

Max(ID)bit(119896) = 0 bit(119896 minus 1 sdot sdot sdot 1) = 1119896minus1(where k is the highest ldquoxrdquo bit in theresponse)

Rule for popstack

Cannothappen

if there is new arrived tagbit(119896) = 1bit(119896 minus 1 sdot sdot sdot 1)= 0119896minus1

elsebit(119896 sdot sdot sdot 1) = 1119896

end

Then there is at least one tag whose 119896th bit is ldquo1rdquo and atleast one tagwhose 119896th bit is ldquo0rdquoOtherwise the 119896th bit cannotbe ldquo0rdquoTherefore REQUEST ldquole bit(119896) = 0 bit(119896minus1 sdot sdot sdot 0) = 1rdquo

splits the tags into two catalogs as binary division one catalogis with 119878[119896] = 0 and the other is with 119878[119896] = 1

This rule can reduce the query scope by dividing theresponding tags into two catalogs until only one tag respond

(2) Rule for Pop Stack After one tag is selected and processedthe top element is popped out This element includes ldquo119909rdquo bitThe rule for pop stack deals with the problem of setting thesebits which is shown in the third line of Table 2 Note that itcannot be the first iteration in anticollision process (ldquocannothappenrdquo in Table 2) since the stack is empty at the beginning

To the popped element there are two situations withoutnew arrived tag and with arrived tag when it pushed intothe stack For the situation without new arrived tag all bitsare set as ldquo1rdquo in order to include all unprocessed tags thatis bit(119896 sdot sdot sdot 1) = 1119896 where 119896 is the highest ldquo119909rdquo bit On theother hand if there are new arrived tags the highest ldquo119909rdquobit is set as ldquo1rdquo and the lower bits are all set as ldquo0rdquo that isbit(119896 minus 1 sdot sdot sdot 1) = 0119896minus1

Whether there is new arrived tag or not it can be judgedaccording to the following formula

Highest119909 (Top) gt Highest119909 (Top-1) (7)

whereHighest119909 is the function to obtain the highest ldquo119909rdquo bit inits parameter Top means the first element in the query stackand Top-1 is the second one

Theorem 2 If the highest ldquo119909rdquo bit of the first stack elementis higher than that of the second stack element that is thecondition of formula (7) is met there must be new arrived tag

6 International Journal of Distributed Sensor Networks

Begin

Request (max ID)

Wait for a given period

No

No

No

Yes

Received theresponse

ldquoXrdquo bit in V

Yes

Read-data

Deselect

Read one tag

Stack is empty

End

Process right subtree

Process left subtree pop stackrdquo and

Set V as ldquorule forobtained valuerdquo and

request (V)

Yes

Decode the response V

Push V onto stack

Select (V)

V998400 = pop stackSet V998400 as ldquorule for

request (V998400)

Figure 6 Flow chart of the proposed QSA algorithm

Proof According to rule for obtained response the readerfirst processes the tags whose highest ldquo119909rdquo bit is ldquo0rdquoThereforeonly when the higher ldquo119909rdquo bit is processed it is possiblefor lower ldquo119909rdquo to be processed Thus the highest ldquo119909rdquo alwaysdecreases as the distance to the top of query stack Howeverit is possible that the ldquo119909rdquo can be at any bit if new tags arriveThat is to say formula (7) is a result caused by new arrivedtags

For example as shown in Figure 5 the highest ldquo119909rdquo bitin the top stack element Stack 3 is 8 and that in Stack 2 is1 Formula (7) meets and there is new arrived tag In theexample the query for Stack 2 element ldquo1110001119909rdquo is 119902

5

ldquole11100010rdquo in the example of Figure 4While the highest ldquo119909rdquobit in top element Stack 1 is the 8th bit There is new arrivedtag whose 8th bit is ldquo0rdquo Otherwise the new arrived tag isimpossible to be included by the query ldquole11100010rdquo and thetop element cannot be ldquo119909rdquo at the 8th bit In fact there is anew arrived tag whose ID is 01100011 in the example

43 The Procedure of the Proposed QSA Based on the designof query stack and query rule we describe the procedureof the proposed QSA algorithm in the following In QSA

the reader first broadcasts the query with the parameter(max ID) and receives the replies from all tags in its inter-rogation zone If the received response of this query includesldquo119909rdquo the tree can be divided into the left subtree and the rightsubtree according to the highest bit ldquo119909rdquo In the left subtreethe highest ldquo119909rdquo bit is ldquo0rdquo and that of the right tree is ldquo1rdquo Theprocedure of the anticollision algorithm is shown in Figure 6Itmainly includes three parts process the left subtree processthe right subtree and read one tag

431 Process the Left Subtree If there is ldquo119909rdquo in the receivedresponse the reader begins to process the left subtree Firstlythe reader pushes the response which has ldquo119909rdquo bits into thequery stack We design this query stack which can record theentrance to the right subtreeThen it sets the query conditionaccording to the rule for obtained response in Table 2 Finallythe reader broadcasts the query with the set condition whichenables a new round communication

432 Read One Tag If the received response has no ldquo119909rdquo bitthere is no collision and a single tag is identified The readerwill select this tag and read data from it After the tag is

International Journal of Distributed Sensor Networks 7

0 100 200 3000

500

1000

1500Th

e num

ber o

f col

lisio

ns (t

imes

)

The number of tags

QT RQT Proposed QSA

(a)

0 100 200 3000

400

800

1200

The n

umbe

r of c

ollis

ions

(tim

es)

The number of tags

QT RQT Proposed QSA

(b)

Figure 7 The number of collisions versus various numbers of tags (a) Tag ID is 64 bits (b) tag ID is 128 bits

0 100 200 300

45

48

51

The number of tags

RQT Proposed QSA

Iden

tifica

tion

effici

ency

()

Figure 8 Identification efficiency

processed command ldquoDESELECTrdquo will make this tag keepsilent state in the following

433 Process the Right Subtree After one tag is read thealgorithm will begin to process the right subtree Firstly thetop element of the query stack is popped out and it is setaccording to the rule for pop stack As described in previousSection there are two possibilities that is with new arrivedtag and without new arrived tag when setting the querycondition If there is new tag which causes higher ldquo119909rdquo bitthe query will enter the left tree process after receiving theresponse Otherwise the process will further deal with theright subtree Note that the process will end until the query

200

400

600

800

The n

umbe

r of c

ollis

ions

(tim

es)

QT RQT Proposed QSA

0 2 4 6The interval of entering tags (timeslots)

Figure 9The number of collisions versus various mobile velocities

stack is empty which means that all tags have been identifiedalready

5 Simulation Results

To evaluate anticollision performance we compare the timeconsumption and identification efficiency of the proposedQSA algorithm with that of two representative schemesQuery tree (QT) and Rollback Query Tree (RQT) Undermobile environments we measure the number of timeslotsused to read out all tags Firstly we fix mobile velocity of thetags and evaluate the resultsThemobile velocity of tags is set

8 International Journal of Distributed Sensor Networks

as the following rule a group of five tags enter the readerrsquosinterrogation zero at the interval of five timeslots

Figure 7 shows the results of collision numbers undervarious numbers of tags As can be seen that QT meets themost number of collisions since it has not recorded thequery results during the procedure of finding the least tagID RQT always takesmore collisions than the proposedQSAalgorithm which is consistent with formula (4) Both 64 bitsand 128 bits tag ID in Figures 7(a) and 7(b) the proposedQSA takes the least number of collisions which illustratesthe efficiency of the QSA since it overcomes the rollbackoperations when new tags arrive

To identify the tags as soon as possible the algorithmshould keep high identification efficiency Identification effi-ciency is defined as the ratio of the number of successtimeslots to the total timeslot number Higher identificationefficiency means less wasted timeslots for collisions Figure 8describes the comparison of identification efficiency betweenRQT and the proposed QSA The identification efficiency ofQSA is higher than that of RQT It validates the analysis ofnumber of consumed timeslots in Figure 7(a) The identifi-cation efficiency of the proposed QSA especially decreasesslowly as the tag number increasesWhile the RQT is of loweridentification efficiency when the tag number increases Forexample the identification efficiency of the RQT is below 45when the tag number is 300

From the theoretical analysis it can be known that themobile velocity will affect the results of collisions Finally weevaluate the impact of tagmobile velocity In this experimenttotal 200 tags enter the readerrsquos interrogation zone at differentintervals which varies from 1 to 5 timeslots The samewith the above experiments five tags come into the readerrsquosinterrogation zone at a pointed timeslot As can be seen fromFigure 9 the proposed QSA achieves the least number ofcollisions under all intervals of entering tags An interest-ing change happens in QT scheme the collision numberincreases firstly and then decreases It is because the tagnumber increases quickly at the smaller interval of enteringtags which causes more collisions The gap between RQTand the proposed QSA increases as the interval increases Itindicates that the velocity of mobile tags will cause differentrollback operations in RQT while it is eliminated in our QSAalgorithm

6 Conclusions

Collision is considered as one of the most important issuesthat affect the identification process in RFID systems Mobiletags of IoT especially induce new problems such as perfor-mance degrade and tag starvation In this paper we proposea novel anticollision algorithm named QSA to solve theseproblems The proposed QSA can overcome the problemsresulted from mobile tags efficiently Compared to priorschemes the QSA presents a better performance at differentmobile velocity and various tag numbers

Acknowledgments

This work is supported in part by the National NaturalScience Foundation of China under Grant nos 61106036

61173169 and 61272147 in part by the science and technologyprojects of Hunan province and in part by State Key Lab-oratory of Computer Architecture Institute of ComputingTechnology Chinese Academy of Sciences

References

[1] A-H Mohsenian-Rad V Shah-Mansouri V W S Wong andR Schober ldquoDistributed channel selection and randomizedinterrogation algorithms for large-scale and dense RFID sys-temsrdquo IEEE Transactions on Wireless Communications vol 9no 4 pp 1402ndash1413 2010

[2] F Villanueva V David and M Francisco ldquoInternet of Thingsarchitecture for a RFID-based product tracking businessmodelrdquo in Proceedings of the 6th International Conference onInnovative Mobile and Internet Services in Ubiquitous Comput-ing pp 811ndash816 2012

[3] Y-H Chen S-J Horng R-S Run et al ldquoA novel anti-collisionalgorithm in RFID systems for identifying passive tagsrdquo IEEETransactions on Industrial Informatics vol 6 no 1 pp 105ndash1212010

[4] J Panneerselvam L Liu R Hill Y Zhan and W Liu ldquoAninvestigation of the effect of cloud computing on networkmanagementrdquo in International Conference on High PerformanceComputing and Communications pp 1794ndash1799 2012

[5] D K Klair K-W Chin and R Raad ldquoA survey and tutorial ofRFID anti-collision protocolsrdquo IEEE Communications Surveysand Tutorials vol 12 no 3 pp 400ndash421 2010

[6] Y Jiang and R Zhang ldquoAn adaptive combination query treeprotocol for tag identification in RFID systemsrdquo IEEE Commu-nications Letters vol 16 no 8 pp 1192ndash1194 2012

[7] S Jiang J Miao and L Wang ldquoMobile node authenticationprotocol for crossing cluster in heterogeneous wireless sensornetworkrdquo in Proceedings of the 3rd International Conference onCommunication Software and Networks (ICCSN rsquo11) pp 205ndash209 May 2011

[8] X Jia Q Feng and C Ma ldquoAn efficient anti-collision protocolfor RFID tag identificationrdquo IEEE Communications Letters vol14 no 11 pp 1014ndash1016 2010

[9] L Kang J Zhang K Wu D Zhang and L Ni ldquoRCSMAreceiver-based carrier sense multiple access in UHF RFIDsystemsrdquo IEEE Transactions on Parallel and Distributed Systemsvol 23 no 4 pp 735ndash743 2012

[10] M Al-Medhwahi A Alkholidi and H Hamam ldquoA new hybridframe ALOHA and binary splitting algorithm for anti-collisionin RFID systemsrdquo in Proceedings of the 18th InternationalConference on Software Telecommunications and ComputerNetworks (SoftCOM rsquo10) pp 219ndash224 September 2010

[11] Y-C Lai and C-C Lin ldquoTwo blocking algorithms on adaptivebinary splitting single and pair resolutions for RFID tagidentificationrdquo IEEEACM Transactions on Networking vol 17no 3 pp 962ndash975 2009

[12] Y-C Lai and C-C Lin ldquoA pair-resolution blocking algorithmon adaptive binary splitting for RFID tag identificationrdquo IEEECommunications Letters vol 12 no 6 pp 432ndash434 2008

[13] Y-C Lai and L-Y Hsiao ldquoGeneral binary tree protocol forcoping with the capture effect in RFID tag identificationrdquo IEEECommunications Letters vol 14 no 3 pp 208ndash210 2010

[14] Y Lai L Hsiao H Chen C Lai and J Lin ldquoA novel querytree protocol with bit tracking in RFID tag identificationrdquo IEEETransactions on Mobile Computing pp 1ndash13 2012

International Journal of Distributed Sensor Networks 9

[15] J H Choi D Lee andH Lee ldquoQuery tree-based reservation forefficient RFID tag anti-collisionrdquo IEEE Communications Lettersvol 11 no 1 pp 85ndash87 2007

[16] J Shin B Jeon and D Yang ldquoMultiple RFID tags identificationwith M-ary query tree schemerdquo IEEE Communications Lettersvol 17 no 3 pp 604ndash607 2013

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpwwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 4: Research Article QSA: Query Splitting-Based …downloads.hindawi.com/journals/ijdsn/2013/674698.pdf4. QSA: Query Splitting-Based Anticollision for Mobile IoT.. Overview of the Anticollision

4 International Journal of Distributed Sensor Networks

In the following we take an example to illustrate therollback caused by a new arriving tag As shown in Figure 4there are already four tags (IDs 10100011 11100010 11100011and 11110010) in the readerrsquos interrogation zone After tworounds of query (named 119902

1and 119902

2) the tag 10100011 is the

first one to be identified Then the reader should broadcastthe queries 119902

3 1199024 and 119902

5to select the next smallest tag

11100010 in the readerrsquos interrogation zone If a new tag01100011 enters the interrogation zone between broadcasting1199024and 119902

5 it will respond to the query 119902

5ldquole11100010rdquo Then

the reader receives the response ldquo119909110001119909rdquo (combined by11100010 and 01100011) instead of selecting out tag 11100010Therefore the reader should broadcast the new request com-mand ldquole11111111rdquo according to the highest uncertain ldquo119909rdquo bitUnfortunately this query command includes the responsesfrom all tags and the queries ldquo119902

3rdquo and ldquo119902

4rdquo have to be

executed again in the following In an extreme situation theoperation might be repeated many times for the consecutivearriving tags as shown in formula (5) Thus tag starvation ispossible for query tree schemes in mobile environments

4 QSA Query Splitting-BasedAnticollision for Mobile IoT

41 Overview of the Anticollision Algorithm Firstly a set ofqueries 119876 = (119902

1 1199022 119902

119897) is defined for the reader where

1199021is initialized as ldquole1119899rdquo The reader executes the following

steps to identify tags

(1) Broadcast the current query in 119876 to all tags(2) When receiving the responses from tags

(21) if the reply is string 119908 without ldquo119909rdquo bits thenselect and process the tag with ID 119908

(22) if a collision is detected that is the reply is string119908 with ldquo119909rdquo bits then set the next query in 119876

(23) if there is no reply from tags do nothing

(3) Update 119876 according to the received responses

Repeat the above procedure until 119876 is empty In thisprocedure four commands (REQUEST SELECT READ-DATA and DESELECT) are adopted as defined in Table 1

For tags let119908 = 11990811199082 119908

119899be the tagrsquos IDThe query is

defined as follows if119908 le 119902 then the tag sends string119908 to thereader where 119902 is the query string received from the reader

As can be seen from the above procedure that the keyproblem is how to design the query scheme our main ideais to keep the history records which can avoid rollback of thedone operations

42 Design of Adaptive Query

421 Query Stack Design for Rollback Operation As shownin Table 1 REQUEST is the query command for the readerto split tags into subsets To reduce the total timeslots foridentifying all tags we design a query stack structure toimplement the rollback operations during query processldquoPush Queryrdquo and ldquoPop Queryrdquo are the two basic operations

Table 1 Definition of commands

REQUEST(ID Condition)

Reader sends REQUEST command withparameter ID Condition to tags Tags comparetheir IDs against the received ID Conditionand reply their IDs to the reader if ID leID Condition

SELECT (ID) Reader selects the tag IDREAD-DATA Reader reads data from the selected tag

DESELECT Reader cancels the selected tag and this tagthus enters silent state

of query stack Each query response is pushed into querystack if and only if the response includes ldquo119909rdquo

We also take the example in Figure 4 to explain thestack operation The response is ldquo111119909001119909rdquo for the query1199023 ldquole11111111rdquo The response ldquo111119909001119909rdquo includes ldquo119909rdquo thus

it is pushed into the query stack as shown in Figure 5 In thesame way the response ldquo1110001119909rdquo is also pushed into thequery stack with the query 119902

4 ldquole11101111rdquo When the reader

broadcasts the query 1199025 ldquole11100010rdquo a new tag ldquo01100011rdquo

enters the readerrsquos interrogation zone Thus the response willbe ldquo119909110001119909rdquo and it is also pushed into the stack as shownin Figure 5

Once a response includes no ldquo119909rdquo the reader will select thistag (using the command SELECT as shown in Table 1) andread the selected tag (using the command READ-DATA asshown in Table 1) After that the reader will pop one elementfrom the query stack For example when the new arrived tagldquo01100011rdquo has been processed the element ldquo119909110001rdquo willthen be popped out The following design is how to set theldquo119909rdquo bits and broadcast new query commands

422 Rule Design for Query Condition The rule for querycommand is one of the most important designs in QSA Asshown in Table 2 the rules can be presented as two kindsOne is for the obtained response and the other is for the popstack

(1) Rule for Obtained Response When the reader receivesresponse including ldquo119909rdquo bits the next query condition shouldbe set according to the collision bits in the response Thesecond line in Table 2 shows the rule for this kind of obtainedresponse

In the first iteration all bits are set as ldquo1rdquo that isMax(ID) to collect the responses from all tags For examplethe parameter is ldquo11111111rdquo for eight bits ID In the followingiteration the highest bit ldquo119909rdquo is set as ldquo0rdquo the bits which arelower than the highest ldquo119909rdquo are all set as ldquo1rdquo According to thesetting of ldquo119909rdquo bits we can draw the following theorem

Theorem 1 Rule for obtained response implements binarysplitting for multiple tags

Proof The response is a string 119878 = 0 1 119909119899 where 119899 is thebit number of tag ID The highest ldquo119909rdquo bit in 119878 is denoted as 119896and it must meet the following requirement

119878 [119896] = 119909 119878 [119899 sdot sdot sdot 119896 + 1] = 0 1119899minus119896 (6)

International Journal of Distributed Sensor Networks 5

A

B

11110010C

01100011

Rollback forthe new arrived tagq3 le 11111111

q1 le 11111111

q2 le 10111111

q7 le 11111111q4 le 11101111

q5 le 11100010

q6 le 11100011

10100011

Processed tag

To be processed

New arrived

1110001111100010

Collision

Figure 4 Rollback problem for the new arrived tag

Stack 3

Stack 2

Stack 1

Push query Pop query

x110001x

1110001x

111x001x

Figure 5 Query stack for new arrived tags

Table 2 Rule design for query condition

The firstiteration The nth iteration

Rule forobtainedresponse

Max(ID)bit(119896) = 0 bit(119896 minus 1 sdot sdot sdot 1) = 1119896minus1(where k is the highest ldquoxrdquo bit in theresponse)

Rule for popstack

Cannothappen

if there is new arrived tagbit(119896) = 1bit(119896 minus 1 sdot sdot sdot 1)= 0119896minus1

elsebit(119896 sdot sdot sdot 1) = 1119896

end

Then there is at least one tag whose 119896th bit is ldquo1rdquo and atleast one tagwhose 119896th bit is ldquo0rdquoOtherwise the 119896th bit cannotbe ldquo0rdquoTherefore REQUEST ldquole bit(119896) = 0 bit(119896minus1 sdot sdot sdot 0) = 1rdquo

splits the tags into two catalogs as binary division one catalogis with 119878[119896] = 0 and the other is with 119878[119896] = 1

This rule can reduce the query scope by dividing theresponding tags into two catalogs until only one tag respond

(2) Rule for Pop Stack After one tag is selected and processedthe top element is popped out This element includes ldquo119909rdquo bitThe rule for pop stack deals with the problem of setting thesebits which is shown in the third line of Table 2 Note that itcannot be the first iteration in anticollision process (ldquocannothappenrdquo in Table 2) since the stack is empty at the beginning

To the popped element there are two situations withoutnew arrived tag and with arrived tag when it pushed intothe stack For the situation without new arrived tag all bitsare set as ldquo1rdquo in order to include all unprocessed tags thatis bit(119896 sdot sdot sdot 1) = 1119896 where 119896 is the highest ldquo119909rdquo bit On theother hand if there are new arrived tags the highest ldquo119909rdquobit is set as ldquo1rdquo and the lower bits are all set as ldquo0rdquo that isbit(119896 minus 1 sdot sdot sdot 1) = 0119896minus1

Whether there is new arrived tag or not it can be judgedaccording to the following formula

Highest119909 (Top) gt Highest119909 (Top-1) (7)

whereHighest119909 is the function to obtain the highest ldquo119909rdquo bit inits parameter Top means the first element in the query stackand Top-1 is the second one

Theorem 2 If the highest ldquo119909rdquo bit of the first stack elementis higher than that of the second stack element that is thecondition of formula (7) is met there must be new arrived tag

6 International Journal of Distributed Sensor Networks

Begin

Request (max ID)

Wait for a given period

No

No

No

Yes

Received theresponse

ldquoXrdquo bit in V

Yes

Read-data

Deselect

Read one tag

Stack is empty

End

Process right subtree

Process left subtree pop stackrdquo and

Set V as ldquorule forobtained valuerdquo and

request (V)

Yes

Decode the response V

Push V onto stack

Select (V)

V998400 = pop stackSet V998400 as ldquorule for

request (V998400)

Figure 6 Flow chart of the proposed QSA algorithm

Proof According to rule for obtained response the readerfirst processes the tags whose highest ldquo119909rdquo bit is ldquo0rdquoThereforeonly when the higher ldquo119909rdquo bit is processed it is possiblefor lower ldquo119909rdquo to be processed Thus the highest ldquo119909rdquo alwaysdecreases as the distance to the top of query stack Howeverit is possible that the ldquo119909rdquo can be at any bit if new tags arriveThat is to say formula (7) is a result caused by new arrivedtags

For example as shown in Figure 5 the highest ldquo119909rdquo bitin the top stack element Stack 3 is 8 and that in Stack 2 is1 Formula (7) meets and there is new arrived tag In theexample the query for Stack 2 element ldquo1110001119909rdquo is 119902

5

ldquole11100010rdquo in the example of Figure 4While the highest ldquo119909rdquobit in top element Stack 1 is the 8th bit There is new arrivedtag whose 8th bit is ldquo0rdquo Otherwise the new arrived tag isimpossible to be included by the query ldquole11100010rdquo and thetop element cannot be ldquo119909rdquo at the 8th bit In fact there is anew arrived tag whose ID is 01100011 in the example

43 The Procedure of the Proposed QSA Based on the designof query stack and query rule we describe the procedureof the proposed QSA algorithm in the following In QSA

the reader first broadcasts the query with the parameter(max ID) and receives the replies from all tags in its inter-rogation zone If the received response of this query includesldquo119909rdquo the tree can be divided into the left subtree and the rightsubtree according to the highest bit ldquo119909rdquo In the left subtreethe highest ldquo119909rdquo bit is ldquo0rdquo and that of the right tree is ldquo1rdquo Theprocedure of the anticollision algorithm is shown in Figure 6Itmainly includes three parts process the left subtree processthe right subtree and read one tag

431 Process the Left Subtree If there is ldquo119909rdquo in the receivedresponse the reader begins to process the left subtree Firstlythe reader pushes the response which has ldquo119909rdquo bits into thequery stack We design this query stack which can record theentrance to the right subtreeThen it sets the query conditionaccording to the rule for obtained response in Table 2 Finallythe reader broadcasts the query with the set condition whichenables a new round communication

432 Read One Tag If the received response has no ldquo119909rdquo bitthere is no collision and a single tag is identified The readerwill select this tag and read data from it After the tag is

International Journal of Distributed Sensor Networks 7

0 100 200 3000

500

1000

1500Th

e num

ber o

f col

lisio

ns (t

imes

)

The number of tags

QT RQT Proposed QSA

(a)

0 100 200 3000

400

800

1200

The n

umbe

r of c

ollis

ions

(tim

es)

The number of tags

QT RQT Proposed QSA

(b)

Figure 7 The number of collisions versus various numbers of tags (a) Tag ID is 64 bits (b) tag ID is 128 bits

0 100 200 300

45

48

51

The number of tags

RQT Proposed QSA

Iden

tifica

tion

effici

ency

()

Figure 8 Identification efficiency

processed command ldquoDESELECTrdquo will make this tag keepsilent state in the following

433 Process the Right Subtree After one tag is read thealgorithm will begin to process the right subtree Firstly thetop element of the query stack is popped out and it is setaccording to the rule for pop stack As described in previousSection there are two possibilities that is with new arrivedtag and without new arrived tag when setting the querycondition If there is new tag which causes higher ldquo119909rdquo bitthe query will enter the left tree process after receiving theresponse Otherwise the process will further deal with theright subtree Note that the process will end until the query

200

400

600

800

The n

umbe

r of c

ollis

ions

(tim

es)

QT RQT Proposed QSA

0 2 4 6The interval of entering tags (timeslots)

Figure 9The number of collisions versus various mobile velocities

stack is empty which means that all tags have been identifiedalready

5 Simulation Results

To evaluate anticollision performance we compare the timeconsumption and identification efficiency of the proposedQSA algorithm with that of two representative schemesQuery tree (QT) and Rollback Query Tree (RQT) Undermobile environments we measure the number of timeslotsused to read out all tags Firstly we fix mobile velocity of thetags and evaluate the resultsThemobile velocity of tags is set

8 International Journal of Distributed Sensor Networks

as the following rule a group of five tags enter the readerrsquosinterrogation zero at the interval of five timeslots

Figure 7 shows the results of collision numbers undervarious numbers of tags As can be seen that QT meets themost number of collisions since it has not recorded thequery results during the procedure of finding the least tagID RQT always takesmore collisions than the proposedQSAalgorithm which is consistent with formula (4) Both 64 bitsand 128 bits tag ID in Figures 7(a) and 7(b) the proposedQSA takes the least number of collisions which illustratesthe efficiency of the QSA since it overcomes the rollbackoperations when new tags arrive

To identify the tags as soon as possible the algorithmshould keep high identification efficiency Identification effi-ciency is defined as the ratio of the number of successtimeslots to the total timeslot number Higher identificationefficiency means less wasted timeslots for collisions Figure 8describes the comparison of identification efficiency betweenRQT and the proposed QSA The identification efficiency ofQSA is higher than that of RQT It validates the analysis ofnumber of consumed timeslots in Figure 7(a) The identifi-cation efficiency of the proposed QSA especially decreasesslowly as the tag number increasesWhile the RQT is of loweridentification efficiency when the tag number increases Forexample the identification efficiency of the RQT is below 45when the tag number is 300

From the theoretical analysis it can be known that themobile velocity will affect the results of collisions Finally weevaluate the impact of tagmobile velocity In this experimenttotal 200 tags enter the readerrsquos interrogation zone at differentintervals which varies from 1 to 5 timeslots The samewith the above experiments five tags come into the readerrsquosinterrogation zone at a pointed timeslot As can be seen fromFigure 9 the proposed QSA achieves the least number ofcollisions under all intervals of entering tags An interest-ing change happens in QT scheme the collision numberincreases firstly and then decreases It is because the tagnumber increases quickly at the smaller interval of enteringtags which causes more collisions The gap between RQTand the proposed QSA increases as the interval increases Itindicates that the velocity of mobile tags will cause differentrollback operations in RQT while it is eliminated in our QSAalgorithm

6 Conclusions

Collision is considered as one of the most important issuesthat affect the identification process in RFID systems Mobiletags of IoT especially induce new problems such as perfor-mance degrade and tag starvation In this paper we proposea novel anticollision algorithm named QSA to solve theseproblems The proposed QSA can overcome the problemsresulted from mobile tags efficiently Compared to priorschemes the QSA presents a better performance at differentmobile velocity and various tag numbers

Acknowledgments

This work is supported in part by the National NaturalScience Foundation of China under Grant nos 61106036

61173169 and 61272147 in part by the science and technologyprojects of Hunan province and in part by State Key Lab-oratory of Computer Architecture Institute of ComputingTechnology Chinese Academy of Sciences

References

[1] A-H Mohsenian-Rad V Shah-Mansouri V W S Wong andR Schober ldquoDistributed channel selection and randomizedinterrogation algorithms for large-scale and dense RFID sys-temsrdquo IEEE Transactions on Wireless Communications vol 9no 4 pp 1402ndash1413 2010

[2] F Villanueva V David and M Francisco ldquoInternet of Thingsarchitecture for a RFID-based product tracking businessmodelrdquo in Proceedings of the 6th International Conference onInnovative Mobile and Internet Services in Ubiquitous Comput-ing pp 811ndash816 2012

[3] Y-H Chen S-J Horng R-S Run et al ldquoA novel anti-collisionalgorithm in RFID systems for identifying passive tagsrdquo IEEETransactions on Industrial Informatics vol 6 no 1 pp 105ndash1212010

[4] J Panneerselvam L Liu R Hill Y Zhan and W Liu ldquoAninvestigation of the effect of cloud computing on networkmanagementrdquo in International Conference on High PerformanceComputing and Communications pp 1794ndash1799 2012

[5] D K Klair K-W Chin and R Raad ldquoA survey and tutorial ofRFID anti-collision protocolsrdquo IEEE Communications Surveysand Tutorials vol 12 no 3 pp 400ndash421 2010

[6] Y Jiang and R Zhang ldquoAn adaptive combination query treeprotocol for tag identification in RFID systemsrdquo IEEE Commu-nications Letters vol 16 no 8 pp 1192ndash1194 2012

[7] S Jiang J Miao and L Wang ldquoMobile node authenticationprotocol for crossing cluster in heterogeneous wireless sensornetworkrdquo in Proceedings of the 3rd International Conference onCommunication Software and Networks (ICCSN rsquo11) pp 205ndash209 May 2011

[8] X Jia Q Feng and C Ma ldquoAn efficient anti-collision protocolfor RFID tag identificationrdquo IEEE Communications Letters vol14 no 11 pp 1014ndash1016 2010

[9] L Kang J Zhang K Wu D Zhang and L Ni ldquoRCSMAreceiver-based carrier sense multiple access in UHF RFIDsystemsrdquo IEEE Transactions on Parallel and Distributed Systemsvol 23 no 4 pp 735ndash743 2012

[10] M Al-Medhwahi A Alkholidi and H Hamam ldquoA new hybridframe ALOHA and binary splitting algorithm for anti-collisionin RFID systemsrdquo in Proceedings of the 18th InternationalConference on Software Telecommunications and ComputerNetworks (SoftCOM rsquo10) pp 219ndash224 September 2010

[11] Y-C Lai and C-C Lin ldquoTwo blocking algorithms on adaptivebinary splitting single and pair resolutions for RFID tagidentificationrdquo IEEEACM Transactions on Networking vol 17no 3 pp 962ndash975 2009

[12] Y-C Lai and C-C Lin ldquoA pair-resolution blocking algorithmon adaptive binary splitting for RFID tag identificationrdquo IEEECommunications Letters vol 12 no 6 pp 432ndash434 2008

[13] Y-C Lai and L-Y Hsiao ldquoGeneral binary tree protocol forcoping with the capture effect in RFID tag identificationrdquo IEEECommunications Letters vol 14 no 3 pp 208ndash210 2010

[14] Y Lai L Hsiao H Chen C Lai and J Lin ldquoA novel querytree protocol with bit tracking in RFID tag identificationrdquo IEEETransactions on Mobile Computing pp 1ndash13 2012

International Journal of Distributed Sensor Networks 9

[15] J H Choi D Lee andH Lee ldquoQuery tree-based reservation forefficient RFID tag anti-collisionrdquo IEEE Communications Lettersvol 11 no 1 pp 85ndash87 2007

[16] J Shin B Jeon and D Yang ldquoMultiple RFID tags identificationwith M-ary query tree schemerdquo IEEE Communications Lettersvol 17 no 3 pp 604ndash607 2013

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpwwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 5: Research Article QSA: Query Splitting-Based …downloads.hindawi.com/journals/ijdsn/2013/674698.pdf4. QSA: Query Splitting-Based Anticollision for Mobile IoT.. Overview of the Anticollision

International Journal of Distributed Sensor Networks 5

A

B

11110010C

01100011

Rollback forthe new arrived tagq3 le 11111111

q1 le 11111111

q2 le 10111111

q7 le 11111111q4 le 11101111

q5 le 11100010

q6 le 11100011

10100011

Processed tag

To be processed

New arrived

1110001111100010

Collision

Figure 4 Rollback problem for the new arrived tag

Stack 3

Stack 2

Stack 1

Push query Pop query

x110001x

1110001x

111x001x

Figure 5 Query stack for new arrived tags

Table 2 Rule design for query condition

The firstiteration The nth iteration

Rule forobtainedresponse

Max(ID)bit(119896) = 0 bit(119896 minus 1 sdot sdot sdot 1) = 1119896minus1(where k is the highest ldquoxrdquo bit in theresponse)

Rule for popstack

Cannothappen

if there is new arrived tagbit(119896) = 1bit(119896 minus 1 sdot sdot sdot 1)= 0119896minus1

elsebit(119896 sdot sdot sdot 1) = 1119896

end

Then there is at least one tag whose 119896th bit is ldquo1rdquo and atleast one tagwhose 119896th bit is ldquo0rdquoOtherwise the 119896th bit cannotbe ldquo0rdquoTherefore REQUEST ldquole bit(119896) = 0 bit(119896minus1 sdot sdot sdot 0) = 1rdquo

splits the tags into two catalogs as binary division one catalogis with 119878[119896] = 0 and the other is with 119878[119896] = 1

This rule can reduce the query scope by dividing theresponding tags into two catalogs until only one tag respond

(2) Rule for Pop Stack After one tag is selected and processedthe top element is popped out This element includes ldquo119909rdquo bitThe rule for pop stack deals with the problem of setting thesebits which is shown in the third line of Table 2 Note that itcannot be the first iteration in anticollision process (ldquocannothappenrdquo in Table 2) since the stack is empty at the beginning

To the popped element there are two situations withoutnew arrived tag and with arrived tag when it pushed intothe stack For the situation without new arrived tag all bitsare set as ldquo1rdquo in order to include all unprocessed tags thatis bit(119896 sdot sdot sdot 1) = 1119896 where 119896 is the highest ldquo119909rdquo bit On theother hand if there are new arrived tags the highest ldquo119909rdquobit is set as ldquo1rdquo and the lower bits are all set as ldquo0rdquo that isbit(119896 minus 1 sdot sdot sdot 1) = 0119896minus1

Whether there is new arrived tag or not it can be judgedaccording to the following formula

Highest119909 (Top) gt Highest119909 (Top-1) (7)

whereHighest119909 is the function to obtain the highest ldquo119909rdquo bit inits parameter Top means the first element in the query stackand Top-1 is the second one

Theorem 2 If the highest ldquo119909rdquo bit of the first stack elementis higher than that of the second stack element that is thecondition of formula (7) is met there must be new arrived tag

6 International Journal of Distributed Sensor Networks

Begin

Request (max ID)

Wait for a given period

No

No

No

Yes

Received theresponse

ldquoXrdquo bit in V

Yes

Read-data

Deselect

Read one tag

Stack is empty

End

Process right subtree

Process left subtree pop stackrdquo and

Set V as ldquorule forobtained valuerdquo and

request (V)

Yes

Decode the response V

Push V onto stack

Select (V)

V998400 = pop stackSet V998400 as ldquorule for

request (V998400)

Figure 6 Flow chart of the proposed QSA algorithm

Proof According to rule for obtained response the readerfirst processes the tags whose highest ldquo119909rdquo bit is ldquo0rdquoThereforeonly when the higher ldquo119909rdquo bit is processed it is possiblefor lower ldquo119909rdquo to be processed Thus the highest ldquo119909rdquo alwaysdecreases as the distance to the top of query stack Howeverit is possible that the ldquo119909rdquo can be at any bit if new tags arriveThat is to say formula (7) is a result caused by new arrivedtags

For example as shown in Figure 5 the highest ldquo119909rdquo bitin the top stack element Stack 3 is 8 and that in Stack 2 is1 Formula (7) meets and there is new arrived tag In theexample the query for Stack 2 element ldquo1110001119909rdquo is 119902

5

ldquole11100010rdquo in the example of Figure 4While the highest ldquo119909rdquobit in top element Stack 1 is the 8th bit There is new arrivedtag whose 8th bit is ldquo0rdquo Otherwise the new arrived tag isimpossible to be included by the query ldquole11100010rdquo and thetop element cannot be ldquo119909rdquo at the 8th bit In fact there is anew arrived tag whose ID is 01100011 in the example

43 The Procedure of the Proposed QSA Based on the designof query stack and query rule we describe the procedureof the proposed QSA algorithm in the following In QSA

the reader first broadcasts the query with the parameter(max ID) and receives the replies from all tags in its inter-rogation zone If the received response of this query includesldquo119909rdquo the tree can be divided into the left subtree and the rightsubtree according to the highest bit ldquo119909rdquo In the left subtreethe highest ldquo119909rdquo bit is ldquo0rdquo and that of the right tree is ldquo1rdquo Theprocedure of the anticollision algorithm is shown in Figure 6Itmainly includes three parts process the left subtree processthe right subtree and read one tag

431 Process the Left Subtree If there is ldquo119909rdquo in the receivedresponse the reader begins to process the left subtree Firstlythe reader pushes the response which has ldquo119909rdquo bits into thequery stack We design this query stack which can record theentrance to the right subtreeThen it sets the query conditionaccording to the rule for obtained response in Table 2 Finallythe reader broadcasts the query with the set condition whichenables a new round communication

432 Read One Tag If the received response has no ldquo119909rdquo bitthere is no collision and a single tag is identified The readerwill select this tag and read data from it After the tag is

International Journal of Distributed Sensor Networks 7

0 100 200 3000

500

1000

1500Th

e num

ber o

f col

lisio

ns (t

imes

)

The number of tags

QT RQT Proposed QSA

(a)

0 100 200 3000

400

800

1200

The n

umbe

r of c

ollis

ions

(tim

es)

The number of tags

QT RQT Proposed QSA

(b)

Figure 7 The number of collisions versus various numbers of tags (a) Tag ID is 64 bits (b) tag ID is 128 bits

0 100 200 300

45

48

51

The number of tags

RQT Proposed QSA

Iden

tifica

tion

effici

ency

()

Figure 8 Identification efficiency

processed command ldquoDESELECTrdquo will make this tag keepsilent state in the following

433 Process the Right Subtree After one tag is read thealgorithm will begin to process the right subtree Firstly thetop element of the query stack is popped out and it is setaccording to the rule for pop stack As described in previousSection there are two possibilities that is with new arrivedtag and without new arrived tag when setting the querycondition If there is new tag which causes higher ldquo119909rdquo bitthe query will enter the left tree process after receiving theresponse Otherwise the process will further deal with theright subtree Note that the process will end until the query

200

400

600

800

The n

umbe

r of c

ollis

ions

(tim

es)

QT RQT Proposed QSA

0 2 4 6The interval of entering tags (timeslots)

Figure 9The number of collisions versus various mobile velocities

stack is empty which means that all tags have been identifiedalready

5 Simulation Results

To evaluate anticollision performance we compare the timeconsumption and identification efficiency of the proposedQSA algorithm with that of two representative schemesQuery tree (QT) and Rollback Query Tree (RQT) Undermobile environments we measure the number of timeslotsused to read out all tags Firstly we fix mobile velocity of thetags and evaluate the resultsThemobile velocity of tags is set

8 International Journal of Distributed Sensor Networks

as the following rule a group of five tags enter the readerrsquosinterrogation zero at the interval of five timeslots

Figure 7 shows the results of collision numbers undervarious numbers of tags As can be seen that QT meets themost number of collisions since it has not recorded thequery results during the procedure of finding the least tagID RQT always takesmore collisions than the proposedQSAalgorithm which is consistent with formula (4) Both 64 bitsand 128 bits tag ID in Figures 7(a) and 7(b) the proposedQSA takes the least number of collisions which illustratesthe efficiency of the QSA since it overcomes the rollbackoperations when new tags arrive

To identify the tags as soon as possible the algorithmshould keep high identification efficiency Identification effi-ciency is defined as the ratio of the number of successtimeslots to the total timeslot number Higher identificationefficiency means less wasted timeslots for collisions Figure 8describes the comparison of identification efficiency betweenRQT and the proposed QSA The identification efficiency ofQSA is higher than that of RQT It validates the analysis ofnumber of consumed timeslots in Figure 7(a) The identifi-cation efficiency of the proposed QSA especially decreasesslowly as the tag number increasesWhile the RQT is of loweridentification efficiency when the tag number increases Forexample the identification efficiency of the RQT is below 45when the tag number is 300

From the theoretical analysis it can be known that themobile velocity will affect the results of collisions Finally weevaluate the impact of tagmobile velocity In this experimenttotal 200 tags enter the readerrsquos interrogation zone at differentintervals which varies from 1 to 5 timeslots The samewith the above experiments five tags come into the readerrsquosinterrogation zone at a pointed timeslot As can be seen fromFigure 9 the proposed QSA achieves the least number ofcollisions under all intervals of entering tags An interest-ing change happens in QT scheme the collision numberincreases firstly and then decreases It is because the tagnumber increases quickly at the smaller interval of enteringtags which causes more collisions The gap between RQTand the proposed QSA increases as the interval increases Itindicates that the velocity of mobile tags will cause differentrollback operations in RQT while it is eliminated in our QSAalgorithm

6 Conclusions

Collision is considered as one of the most important issuesthat affect the identification process in RFID systems Mobiletags of IoT especially induce new problems such as perfor-mance degrade and tag starvation In this paper we proposea novel anticollision algorithm named QSA to solve theseproblems The proposed QSA can overcome the problemsresulted from mobile tags efficiently Compared to priorschemes the QSA presents a better performance at differentmobile velocity and various tag numbers

Acknowledgments

This work is supported in part by the National NaturalScience Foundation of China under Grant nos 61106036

61173169 and 61272147 in part by the science and technologyprojects of Hunan province and in part by State Key Lab-oratory of Computer Architecture Institute of ComputingTechnology Chinese Academy of Sciences

References

[1] A-H Mohsenian-Rad V Shah-Mansouri V W S Wong andR Schober ldquoDistributed channel selection and randomizedinterrogation algorithms for large-scale and dense RFID sys-temsrdquo IEEE Transactions on Wireless Communications vol 9no 4 pp 1402ndash1413 2010

[2] F Villanueva V David and M Francisco ldquoInternet of Thingsarchitecture for a RFID-based product tracking businessmodelrdquo in Proceedings of the 6th International Conference onInnovative Mobile and Internet Services in Ubiquitous Comput-ing pp 811ndash816 2012

[3] Y-H Chen S-J Horng R-S Run et al ldquoA novel anti-collisionalgorithm in RFID systems for identifying passive tagsrdquo IEEETransactions on Industrial Informatics vol 6 no 1 pp 105ndash1212010

[4] J Panneerselvam L Liu R Hill Y Zhan and W Liu ldquoAninvestigation of the effect of cloud computing on networkmanagementrdquo in International Conference on High PerformanceComputing and Communications pp 1794ndash1799 2012

[5] D K Klair K-W Chin and R Raad ldquoA survey and tutorial ofRFID anti-collision protocolsrdquo IEEE Communications Surveysand Tutorials vol 12 no 3 pp 400ndash421 2010

[6] Y Jiang and R Zhang ldquoAn adaptive combination query treeprotocol for tag identification in RFID systemsrdquo IEEE Commu-nications Letters vol 16 no 8 pp 1192ndash1194 2012

[7] S Jiang J Miao and L Wang ldquoMobile node authenticationprotocol for crossing cluster in heterogeneous wireless sensornetworkrdquo in Proceedings of the 3rd International Conference onCommunication Software and Networks (ICCSN rsquo11) pp 205ndash209 May 2011

[8] X Jia Q Feng and C Ma ldquoAn efficient anti-collision protocolfor RFID tag identificationrdquo IEEE Communications Letters vol14 no 11 pp 1014ndash1016 2010

[9] L Kang J Zhang K Wu D Zhang and L Ni ldquoRCSMAreceiver-based carrier sense multiple access in UHF RFIDsystemsrdquo IEEE Transactions on Parallel and Distributed Systemsvol 23 no 4 pp 735ndash743 2012

[10] M Al-Medhwahi A Alkholidi and H Hamam ldquoA new hybridframe ALOHA and binary splitting algorithm for anti-collisionin RFID systemsrdquo in Proceedings of the 18th InternationalConference on Software Telecommunications and ComputerNetworks (SoftCOM rsquo10) pp 219ndash224 September 2010

[11] Y-C Lai and C-C Lin ldquoTwo blocking algorithms on adaptivebinary splitting single and pair resolutions for RFID tagidentificationrdquo IEEEACM Transactions on Networking vol 17no 3 pp 962ndash975 2009

[12] Y-C Lai and C-C Lin ldquoA pair-resolution blocking algorithmon adaptive binary splitting for RFID tag identificationrdquo IEEECommunications Letters vol 12 no 6 pp 432ndash434 2008

[13] Y-C Lai and L-Y Hsiao ldquoGeneral binary tree protocol forcoping with the capture effect in RFID tag identificationrdquo IEEECommunications Letters vol 14 no 3 pp 208ndash210 2010

[14] Y Lai L Hsiao H Chen C Lai and J Lin ldquoA novel querytree protocol with bit tracking in RFID tag identificationrdquo IEEETransactions on Mobile Computing pp 1ndash13 2012

International Journal of Distributed Sensor Networks 9

[15] J H Choi D Lee andH Lee ldquoQuery tree-based reservation forefficient RFID tag anti-collisionrdquo IEEE Communications Lettersvol 11 no 1 pp 85ndash87 2007

[16] J Shin B Jeon and D Yang ldquoMultiple RFID tags identificationwith M-ary query tree schemerdquo IEEE Communications Lettersvol 17 no 3 pp 604ndash607 2013

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpwwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 6: Research Article QSA: Query Splitting-Based …downloads.hindawi.com/journals/ijdsn/2013/674698.pdf4. QSA: Query Splitting-Based Anticollision for Mobile IoT.. Overview of the Anticollision

6 International Journal of Distributed Sensor Networks

Begin

Request (max ID)

Wait for a given period

No

No

No

Yes

Received theresponse

ldquoXrdquo bit in V

Yes

Read-data

Deselect

Read one tag

Stack is empty

End

Process right subtree

Process left subtree pop stackrdquo and

Set V as ldquorule forobtained valuerdquo and

request (V)

Yes

Decode the response V

Push V onto stack

Select (V)

V998400 = pop stackSet V998400 as ldquorule for

request (V998400)

Figure 6 Flow chart of the proposed QSA algorithm

Proof According to rule for obtained response the readerfirst processes the tags whose highest ldquo119909rdquo bit is ldquo0rdquoThereforeonly when the higher ldquo119909rdquo bit is processed it is possiblefor lower ldquo119909rdquo to be processed Thus the highest ldquo119909rdquo alwaysdecreases as the distance to the top of query stack Howeverit is possible that the ldquo119909rdquo can be at any bit if new tags arriveThat is to say formula (7) is a result caused by new arrivedtags

For example as shown in Figure 5 the highest ldquo119909rdquo bitin the top stack element Stack 3 is 8 and that in Stack 2 is1 Formula (7) meets and there is new arrived tag In theexample the query for Stack 2 element ldquo1110001119909rdquo is 119902

5

ldquole11100010rdquo in the example of Figure 4While the highest ldquo119909rdquobit in top element Stack 1 is the 8th bit There is new arrivedtag whose 8th bit is ldquo0rdquo Otherwise the new arrived tag isimpossible to be included by the query ldquole11100010rdquo and thetop element cannot be ldquo119909rdquo at the 8th bit In fact there is anew arrived tag whose ID is 01100011 in the example

43 The Procedure of the Proposed QSA Based on the designof query stack and query rule we describe the procedureof the proposed QSA algorithm in the following In QSA

the reader first broadcasts the query with the parameter(max ID) and receives the replies from all tags in its inter-rogation zone If the received response of this query includesldquo119909rdquo the tree can be divided into the left subtree and the rightsubtree according to the highest bit ldquo119909rdquo In the left subtreethe highest ldquo119909rdquo bit is ldquo0rdquo and that of the right tree is ldquo1rdquo Theprocedure of the anticollision algorithm is shown in Figure 6Itmainly includes three parts process the left subtree processthe right subtree and read one tag

431 Process the Left Subtree If there is ldquo119909rdquo in the receivedresponse the reader begins to process the left subtree Firstlythe reader pushes the response which has ldquo119909rdquo bits into thequery stack We design this query stack which can record theentrance to the right subtreeThen it sets the query conditionaccording to the rule for obtained response in Table 2 Finallythe reader broadcasts the query with the set condition whichenables a new round communication

432 Read One Tag If the received response has no ldquo119909rdquo bitthere is no collision and a single tag is identified The readerwill select this tag and read data from it After the tag is

International Journal of Distributed Sensor Networks 7

0 100 200 3000

500

1000

1500Th

e num

ber o

f col

lisio

ns (t

imes

)

The number of tags

QT RQT Proposed QSA

(a)

0 100 200 3000

400

800

1200

The n

umbe

r of c

ollis

ions

(tim

es)

The number of tags

QT RQT Proposed QSA

(b)

Figure 7 The number of collisions versus various numbers of tags (a) Tag ID is 64 bits (b) tag ID is 128 bits

0 100 200 300

45

48

51

The number of tags

RQT Proposed QSA

Iden

tifica

tion

effici

ency

()

Figure 8 Identification efficiency

processed command ldquoDESELECTrdquo will make this tag keepsilent state in the following

433 Process the Right Subtree After one tag is read thealgorithm will begin to process the right subtree Firstly thetop element of the query stack is popped out and it is setaccording to the rule for pop stack As described in previousSection there are two possibilities that is with new arrivedtag and without new arrived tag when setting the querycondition If there is new tag which causes higher ldquo119909rdquo bitthe query will enter the left tree process after receiving theresponse Otherwise the process will further deal with theright subtree Note that the process will end until the query

200

400

600

800

The n

umbe

r of c

ollis

ions

(tim

es)

QT RQT Proposed QSA

0 2 4 6The interval of entering tags (timeslots)

Figure 9The number of collisions versus various mobile velocities

stack is empty which means that all tags have been identifiedalready

5 Simulation Results

To evaluate anticollision performance we compare the timeconsumption and identification efficiency of the proposedQSA algorithm with that of two representative schemesQuery tree (QT) and Rollback Query Tree (RQT) Undermobile environments we measure the number of timeslotsused to read out all tags Firstly we fix mobile velocity of thetags and evaluate the resultsThemobile velocity of tags is set

8 International Journal of Distributed Sensor Networks

as the following rule a group of five tags enter the readerrsquosinterrogation zero at the interval of five timeslots

Figure 7 shows the results of collision numbers undervarious numbers of tags As can be seen that QT meets themost number of collisions since it has not recorded thequery results during the procedure of finding the least tagID RQT always takesmore collisions than the proposedQSAalgorithm which is consistent with formula (4) Both 64 bitsand 128 bits tag ID in Figures 7(a) and 7(b) the proposedQSA takes the least number of collisions which illustratesthe efficiency of the QSA since it overcomes the rollbackoperations when new tags arrive

To identify the tags as soon as possible the algorithmshould keep high identification efficiency Identification effi-ciency is defined as the ratio of the number of successtimeslots to the total timeslot number Higher identificationefficiency means less wasted timeslots for collisions Figure 8describes the comparison of identification efficiency betweenRQT and the proposed QSA The identification efficiency ofQSA is higher than that of RQT It validates the analysis ofnumber of consumed timeslots in Figure 7(a) The identifi-cation efficiency of the proposed QSA especially decreasesslowly as the tag number increasesWhile the RQT is of loweridentification efficiency when the tag number increases Forexample the identification efficiency of the RQT is below 45when the tag number is 300

From the theoretical analysis it can be known that themobile velocity will affect the results of collisions Finally weevaluate the impact of tagmobile velocity In this experimenttotal 200 tags enter the readerrsquos interrogation zone at differentintervals which varies from 1 to 5 timeslots The samewith the above experiments five tags come into the readerrsquosinterrogation zone at a pointed timeslot As can be seen fromFigure 9 the proposed QSA achieves the least number ofcollisions under all intervals of entering tags An interest-ing change happens in QT scheme the collision numberincreases firstly and then decreases It is because the tagnumber increases quickly at the smaller interval of enteringtags which causes more collisions The gap between RQTand the proposed QSA increases as the interval increases Itindicates that the velocity of mobile tags will cause differentrollback operations in RQT while it is eliminated in our QSAalgorithm

6 Conclusions

Collision is considered as one of the most important issuesthat affect the identification process in RFID systems Mobiletags of IoT especially induce new problems such as perfor-mance degrade and tag starvation In this paper we proposea novel anticollision algorithm named QSA to solve theseproblems The proposed QSA can overcome the problemsresulted from mobile tags efficiently Compared to priorschemes the QSA presents a better performance at differentmobile velocity and various tag numbers

Acknowledgments

This work is supported in part by the National NaturalScience Foundation of China under Grant nos 61106036

61173169 and 61272147 in part by the science and technologyprojects of Hunan province and in part by State Key Lab-oratory of Computer Architecture Institute of ComputingTechnology Chinese Academy of Sciences

References

[1] A-H Mohsenian-Rad V Shah-Mansouri V W S Wong andR Schober ldquoDistributed channel selection and randomizedinterrogation algorithms for large-scale and dense RFID sys-temsrdquo IEEE Transactions on Wireless Communications vol 9no 4 pp 1402ndash1413 2010

[2] F Villanueva V David and M Francisco ldquoInternet of Thingsarchitecture for a RFID-based product tracking businessmodelrdquo in Proceedings of the 6th International Conference onInnovative Mobile and Internet Services in Ubiquitous Comput-ing pp 811ndash816 2012

[3] Y-H Chen S-J Horng R-S Run et al ldquoA novel anti-collisionalgorithm in RFID systems for identifying passive tagsrdquo IEEETransactions on Industrial Informatics vol 6 no 1 pp 105ndash1212010

[4] J Panneerselvam L Liu R Hill Y Zhan and W Liu ldquoAninvestigation of the effect of cloud computing on networkmanagementrdquo in International Conference on High PerformanceComputing and Communications pp 1794ndash1799 2012

[5] D K Klair K-W Chin and R Raad ldquoA survey and tutorial ofRFID anti-collision protocolsrdquo IEEE Communications Surveysand Tutorials vol 12 no 3 pp 400ndash421 2010

[6] Y Jiang and R Zhang ldquoAn adaptive combination query treeprotocol for tag identification in RFID systemsrdquo IEEE Commu-nications Letters vol 16 no 8 pp 1192ndash1194 2012

[7] S Jiang J Miao and L Wang ldquoMobile node authenticationprotocol for crossing cluster in heterogeneous wireless sensornetworkrdquo in Proceedings of the 3rd International Conference onCommunication Software and Networks (ICCSN rsquo11) pp 205ndash209 May 2011

[8] X Jia Q Feng and C Ma ldquoAn efficient anti-collision protocolfor RFID tag identificationrdquo IEEE Communications Letters vol14 no 11 pp 1014ndash1016 2010

[9] L Kang J Zhang K Wu D Zhang and L Ni ldquoRCSMAreceiver-based carrier sense multiple access in UHF RFIDsystemsrdquo IEEE Transactions on Parallel and Distributed Systemsvol 23 no 4 pp 735ndash743 2012

[10] M Al-Medhwahi A Alkholidi and H Hamam ldquoA new hybridframe ALOHA and binary splitting algorithm for anti-collisionin RFID systemsrdquo in Proceedings of the 18th InternationalConference on Software Telecommunications and ComputerNetworks (SoftCOM rsquo10) pp 219ndash224 September 2010

[11] Y-C Lai and C-C Lin ldquoTwo blocking algorithms on adaptivebinary splitting single and pair resolutions for RFID tagidentificationrdquo IEEEACM Transactions on Networking vol 17no 3 pp 962ndash975 2009

[12] Y-C Lai and C-C Lin ldquoA pair-resolution blocking algorithmon adaptive binary splitting for RFID tag identificationrdquo IEEECommunications Letters vol 12 no 6 pp 432ndash434 2008

[13] Y-C Lai and L-Y Hsiao ldquoGeneral binary tree protocol forcoping with the capture effect in RFID tag identificationrdquo IEEECommunications Letters vol 14 no 3 pp 208ndash210 2010

[14] Y Lai L Hsiao H Chen C Lai and J Lin ldquoA novel querytree protocol with bit tracking in RFID tag identificationrdquo IEEETransactions on Mobile Computing pp 1ndash13 2012

International Journal of Distributed Sensor Networks 9

[15] J H Choi D Lee andH Lee ldquoQuery tree-based reservation forefficient RFID tag anti-collisionrdquo IEEE Communications Lettersvol 11 no 1 pp 85ndash87 2007

[16] J Shin B Jeon and D Yang ldquoMultiple RFID tags identificationwith M-ary query tree schemerdquo IEEE Communications Lettersvol 17 no 3 pp 604ndash607 2013

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpwwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 7: Research Article QSA: Query Splitting-Based …downloads.hindawi.com/journals/ijdsn/2013/674698.pdf4. QSA: Query Splitting-Based Anticollision for Mobile IoT.. Overview of the Anticollision

International Journal of Distributed Sensor Networks 7

0 100 200 3000

500

1000

1500Th

e num

ber o

f col

lisio

ns (t

imes

)

The number of tags

QT RQT Proposed QSA

(a)

0 100 200 3000

400

800

1200

The n

umbe

r of c

ollis

ions

(tim

es)

The number of tags

QT RQT Proposed QSA

(b)

Figure 7 The number of collisions versus various numbers of tags (a) Tag ID is 64 bits (b) tag ID is 128 bits

0 100 200 300

45

48

51

The number of tags

RQT Proposed QSA

Iden

tifica

tion

effici

ency

()

Figure 8 Identification efficiency

processed command ldquoDESELECTrdquo will make this tag keepsilent state in the following

433 Process the Right Subtree After one tag is read thealgorithm will begin to process the right subtree Firstly thetop element of the query stack is popped out and it is setaccording to the rule for pop stack As described in previousSection there are two possibilities that is with new arrivedtag and without new arrived tag when setting the querycondition If there is new tag which causes higher ldquo119909rdquo bitthe query will enter the left tree process after receiving theresponse Otherwise the process will further deal with theright subtree Note that the process will end until the query

200

400

600

800

The n

umbe

r of c

ollis

ions

(tim

es)

QT RQT Proposed QSA

0 2 4 6The interval of entering tags (timeslots)

Figure 9The number of collisions versus various mobile velocities

stack is empty which means that all tags have been identifiedalready

5 Simulation Results

To evaluate anticollision performance we compare the timeconsumption and identification efficiency of the proposedQSA algorithm with that of two representative schemesQuery tree (QT) and Rollback Query Tree (RQT) Undermobile environments we measure the number of timeslotsused to read out all tags Firstly we fix mobile velocity of thetags and evaluate the resultsThemobile velocity of tags is set

8 International Journal of Distributed Sensor Networks

as the following rule a group of five tags enter the readerrsquosinterrogation zero at the interval of five timeslots

Figure 7 shows the results of collision numbers undervarious numbers of tags As can be seen that QT meets themost number of collisions since it has not recorded thequery results during the procedure of finding the least tagID RQT always takesmore collisions than the proposedQSAalgorithm which is consistent with formula (4) Both 64 bitsand 128 bits tag ID in Figures 7(a) and 7(b) the proposedQSA takes the least number of collisions which illustratesthe efficiency of the QSA since it overcomes the rollbackoperations when new tags arrive

To identify the tags as soon as possible the algorithmshould keep high identification efficiency Identification effi-ciency is defined as the ratio of the number of successtimeslots to the total timeslot number Higher identificationefficiency means less wasted timeslots for collisions Figure 8describes the comparison of identification efficiency betweenRQT and the proposed QSA The identification efficiency ofQSA is higher than that of RQT It validates the analysis ofnumber of consumed timeslots in Figure 7(a) The identifi-cation efficiency of the proposed QSA especially decreasesslowly as the tag number increasesWhile the RQT is of loweridentification efficiency when the tag number increases Forexample the identification efficiency of the RQT is below 45when the tag number is 300

From the theoretical analysis it can be known that themobile velocity will affect the results of collisions Finally weevaluate the impact of tagmobile velocity In this experimenttotal 200 tags enter the readerrsquos interrogation zone at differentintervals which varies from 1 to 5 timeslots The samewith the above experiments five tags come into the readerrsquosinterrogation zone at a pointed timeslot As can be seen fromFigure 9 the proposed QSA achieves the least number ofcollisions under all intervals of entering tags An interest-ing change happens in QT scheme the collision numberincreases firstly and then decreases It is because the tagnumber increases quickly at the smaller interval of enteringtags which causes more collisions The gap between RQTand the proposed QSA increases as the interval increases Itindicates that the velocity of mobile tags will cause differentrollback operations in RQT while it is eliminated in our QSAalgorithm

6 Conclusions

Collision is considered as one of the most important issuesthat affect the identification process in RFID systems Mobiletags of IoT especially induce new problems such as perfor-mance degrade and tag starvation In this paper we proposea novel anticollision algorithm named QSA to solve theseproblems The proposed QSA can overcome the problemsresulted from mobile tags efficiently Compared to priorschemes the QSA presents a better performance at differentmobile velocity and various tag numbers

Acknowledgments

This work is supported in part by the National NaturalScience Foundation of China under Grant nos 61106036

61173169 and 61272147 in part by the science and technologyprojects of Hunan province and in part by State Key Lab-oratory of Computer Architecture Institute of ComputingTechnology Chinese Academy of Sciences

References

[1] A-H Mohsenian-Rad V Shah-Mansouri V W S Wong andR Schober ldquoDistributed channel selection and randomizedinterrogation algorithms for large-scale and dense RFID sys-temsrdquo IEEE Transactions on Wireless Communications vol 9no 4 pp 1402ndash1413 2010

[2] F Villanueva V David and M Francisco ldquoInternet of Thingsarchitecture for a RFID-based product tracking businessmodelrdquo in Proceedings of the 6th International Conference onInnovative Mobile and Internet Services in Ubiquitous Comput-ing pp 811ndash816 2012

[3] Y-H Chen S-J Horng R-S Run et al ldquoA novel anti-collisionalgorithm in RFID systems for identifying passive tagsrdquo IEEETransactions on Industrial Informatics vol 6 no 1 pp 105ndash1212010

[4] J Panneerselvam L Liu R Hill Y Zhan and W Liu ldquoAninvestigation of the effect of cloud computing on networkmanagementrdquo in International Conference on High PerformanceComputing and Communications pp 1794ndash1799 2012

[5] D K Klair K-W Chin and R Raad ldquoA survey and tutorial ofRFID anti-collision protocolsrdquo IEEE Communications Surveysand Tutorials vol 12 no 3 pp 400ndash421 2010

[6] Y Jiang and R Zhang ldquoAn adaptive combination query treeprotocol for tag identification in RFID systemsrdquo IEEE Commu-nications Letters vol 16 no 8 pp 1192ndash1194 2012

[7] S Jiang J Miao and L Wang ldquoMobile node authenticationprotocol for crossing cluster in heterogeneous wireless sensornetworkrdquo in Proceedings of the 3rd International Conference onCommunication Software and Networks (ICCSN rsquo11) pp 205ndash209 May 2011

[8] X Jia Q Feng and C Ma ldquoAn efficient anti-collision protocolfor RFID tag identificationrdquo IEEE Communications Letters vol14 no 11 pp 1014ndash1016 2010

[9] L Kang J Zhang K Wu D Zhang and L Ni ldquoRCSMAreceiver-based carrier sense multiple access in UHF RFIDsystemsrdquo IEEE Transactions on Parallel and Distributed Systemsvol 23 no 4 pp 735ndash743 2012

[10] M Al-Medhwahi A Alkholidi and H Hamam ldquoA new hybridframe ALOHA and binary splitting algorithm for anti-collisionin RFID systemsrdquo in Proceedings of the 18th InternationalConference on Software Telecommunications and ComputerNetworks (SoftCOM rsquo10) pp 219ndash224 September 2010

[11] Y-C Lai and C-C Lin ldquoTwo blocking algorithms on adaptivebinary splitting single and pair resolutions for RFID tagidentificationrdquo IEEEACM Transactions on Networking vol 17no 3 pp 962ndash975 2009

[12] Y-C Lai and C-C Lin ldquoA pair-resolution blocking algorithmon adaptive binary splitting for RFID tag identificationrdquo IEEECommunications Letters vol 12 no 6 pp 432ndash434 2008

[13] Y-C Lai and L-Y Hsiao ldquoGeneral binary tree protocol forcoping with the capture effect in RFID tag identificationrdquo IEEECommunications Letters vol 14 no 3 pp 208ndash210 2010

[14] Y Lai L Hsiao H Chen C Lai and J Lin ldquoA novel querytree protocol with bit tracking in RFID tag identificationrdquo IEEETransactions on Mobile Computing pp 1ndash13 2012

International Journal of Distributed Sensor Networks 9

[15] J H Choi D Lee andH Lee ldquoQuery tree-based reservation forefficient RFID tag anti-collisionrdquo IEEE Communications Lettersvol 11 no 1 pp 85ndash87 2007

[16] J Shin B Jeon and D Yang ldquoMultiple RFID tags identificationwith M-ary query tree schemerdquo IEEE Communications Lettersvol 17 no 3 pp 604ndash607 2013

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpwwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 8: Research Article QSA: Query Splitting-Based …downloads.hindawi.com/journals/ijdsn/2013/674698.pdf4. QSA: Query Splitting-Based Anticollision for Mobile IoT.. Overview of the Anticollision

8 International Journal of Distributed Sensor Networks

as the following rule a group of five tags enter the readerrsquosinterrogation zero at the interval of five timeslots

Figure 7 shows the results of collision numbers undervarious numbers of tags As can be seen that QT meets themost number of collisions since it has not recorded thequery results during the procedure of finding the least tagID RQT always takesmore collisions than the proposedQSAalgorithm which is consistent with formula (4) Both 64 bitsand 128 bits tag ID in Figures 7(a) and 7(b) the proposedQSA takes the least number of collisions which illustratesthe efficiency of the QSA since it overcomes the rollbackoperations when new tags arrive

To identify the tags as soon as possible the algorithmshould keep high identification efficiency Identification effi-ciency is defined as the ratio of the number of successtimeslots to the total timeslot number Higher identificationefficiency means less wasted timeslots for collisions Figure 8describes the comparison of identification efficiency betweenRQT and the proposed QSA The identification efficiency ofQSA is higher than that of RQT It validates the analysis ofnumber of consumed timeslots in Figure 7(a) The identifi-cation efficiency of the proposed QSA especially decreasesslowly as the tag number increasesWhile the RQT is of loweridentification efficiency when the tag number increases Forexample the identification efficiency of the RQT is below 45when the tag number is 300

From the theoretical analysis it can be known that themobile velocity will affect the results of collisions Finally weevaluate the impact of tagmobile velocity In this experimenttotal 200 tags enter the readerrsquos interrogation zone at differentintervals which varies from 1 to 5 timeslots The samewith the above experiments five tags come into the readerrsquosinterrogation zone at a pointed timeslot As can be seen fromFigure 9 the proposed QSA achieves the least number ofcollisions under all intervals of entering tags An interest-ing change happens in QT scheme the collision numberincreases firstly and then decreases It is because the tagnumber increases quickly at the smaller interval of enteringtags which causes more collisions The gap between RQTand the proposed QSA increases as the interval increases Itindicates that the velocity of mobile tags will cause differentrollback operations in RQT while it is eliminated in our QSAalgorithm

6 Conclusions

Collision is considered as one of the most important issuesthat affect the identification process in RFID systems Mobiletags of IoT especially induce new problems such as perfor-mance degrade and tag starvation In this paper we proposea novel anticollision algorithm named QSA to solve theseproblems The proposed QSA can overcome the problemsresulted from mobile tags efficiently Compared to priorschemes the QSA presents a better performance at differentmobile velocity and various tag numbers

Acknowledgments

This work is supported in part by the National NaturalScience Foundation of China under Grant nos 61106036

61173169 and 61272147 in part by the science and technologyprojects of Hunan province and in part by State Key Lab-oratory of Computer Architecture Institute of ComputingTechnology Chinese Academy of Sciences

References

[1] A-H Mohsenian-Rad V Shah-Mansouri V W S Wong andR Schober ldquoDistributed channel selection and randomizedinterrogation algorithms for large-scale and dense RFID sys-temsrdquo IEEE Transactions on Wireless Communications vol 9no 4 pp 1402ndash1413 2010

[2] F Villanueva V David and M Francisco ldquoInternet of Thingsarchitecture for a RFID-based product tracking businessmodelrdquo in Proceedings of the 6th International Conference onInnovative Mobile and Internet Services in Ubiquitous Comput-ing pp 811ndash816 2012

[3] Y-H Chen S-J Horng R-S Run et al ldquoA novel anti-collisionalgorithm in RFID systems for identifying passive tagsrdquo IEEETransactions on Industrial Informatics vol 6 no 1 pp 105ndash1212010

[4] J Panneerselvam L Liu R Hill Y Zhan and W Liu ldquoAninvestigation of the effect of cloud computing on networkmanagementrdquo in International Conference on High PerformanceComputing and Communications pp 1794ndash1799 2012

[5] D K Klair K-W Chin and R Raad ldquoA survey and tutorial ofRFID anti-collision protocolsrdquo IEEE Communications Surveysand Tutorials vol 12 no 3 pp 400ndash421 2010

[6] Y Jiang and R Zhang ldquoAn adaptive combination query treeprotocol for tag identification in RFID systemsrdquo IEEE Commu-nications Letters vol 16 no 8 pp 1192ndash1194 2012

[7] S Jiang J Miao and L Wang ldquoMobile node authenticationprotocol for crossing cluster in heterogeneous wireless sensornetworkrdquo in Proceedings of the 3rd International Conference onCommunication Software and Networks (ICCSN rsquo11) pp 205ndash209 May 2011

[8] X Jia Q Feng and C Ma ldquoAn efficient anti-collision protocolfor RFID tag identificationrdquo IEEE Communications Letters vol14 no 11 pp 1014ndash1016 2010

[9] L Kang J Zhang K Wu D Zhang and L Ni ldquoRCSMAreceiver-based carrier sense multiple access in UHF RFIDsystemsrdquo IEEE Transactions on Parallel and Distributed Systemsvol 23 no 4 pp 735ndash743 2012

[10] M Al-Medhwahi A Alkholidi and H Hamam ldquoA new hybridframe ALOHA and binary splitting algorithm for anti-collisionin RFID systemsrdquo in Proceedings of the 18th InternationalConference on Software Telecommunications and ComputerNetworks (SoftCOM rsquo10) pp 219ndash224 September 2010

[11] Y-C Lai and C-C Lin ldquoTwo blocking algorithms on adaptivebinary splitting single and pair resolutions for RFID tagidentificationrdquo IEEEACM Transactions on Networking vol 17no 3 pp 962ndash975 2009

[12] Y-C Lai and C-C Lin ldquoA pair-resolution blocking algorithmon adaptive binary splitting for RFID tag identificationrdquo IEEECommunications Letters vol 12 no 6 pp 432ndash434 2008

[13] Y-C Lai and L-Y Hsiao ldquoGeneral binary tree protocol forcoping with the capture effect in RFID tag identificationrdquo IEEECommunications Letters vol 14 no 3 pp 208ndash210 2010

[14] Y Lai L Hsiao H Chen C Lai and J Lin ldquoA novel querytree protocol with bit tracking in RFID tag identificationrdquo IEEETransactions on Mobile Computing pp 1ndash13 2012

International Journal of Distributed Sensor Networks 9

[15] J H Choi D Lee andH Lee ldquoQuery tree-based reservation forefficient RFID tag anti-collisionrdquo IEEE Communications Lettersvol 11 no 1 pp 85ndash87 2007

[16] J Shin B Jeon and D Yang ldquoMultiple RFID tags identificationwith M-ary query tree schemerdquo IEEE Communications Lettersvol 17 no 3 pp 604ndash607 2013

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpwwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 9: Research Article QSA: Query Splitting-Based …downloads.hindawi.com/journals/ijdsn/2013/674698.pdf4. QSA: Query Splitting-Based Anticollision for Mobile IoT.. Overview of the Anticollision

International Journal of Distributed Sensor Networks 9

[15] J H Choi D Lee andH Lee ldquoQuery tree-based reservation forefficient RFID tag anti-collisionrdquo IEEE Communications Lettersvol 11 no 1 pp 85ndash87 2007

[16] J Shin B Jeon and D Yang ldquoMultiple RFID tags identificationwith M-ary query tree schemerdquo IEEE Communications Lettersvol 17 no 3 pp 604ndash607 2013

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpwwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 10: Research Article QSA: Query Splitting-Based …downloads.hindawi.com/journals/ijdsn/2013/674698.pdf4. QSA: Query Splitting-Based Anticollision for Mobile IoT.. Overview of the Anticollision

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpwwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of