98
Views
6
CrossRef citations to date
0
Altmetric
Articles

A Novel and Efficient Reader-to-Reader and Tag-to-Tag Anti-Collision Protocol

ORCID Icon, &

References

  • A. Kumar, K. Gopal, and A. Aggarwal, “Design and analysis of lightweight trust mechanism for secret data using lightweight cryptographic primitives in MANETs,” Int. J. Network Security, Vol. 18, no. 1, pp. 1–18, Jan. 2016.
  • A. Kumar, K. Gopal, and A. Aggarwal, “A novel trusted hierarchy construction for RFID-sensor based secure mobile ad hoc NETworks (MANETs) using error correcting codes (ECCs),” Electron. Telecommun. Res. Inst. J., Vol. 37, no. 1, pp. 186–96, Mar. 2015.
  • The Basics of RFID Technology. Available: http://www.rfidjournal.com/articles/view?1337/2
  • A. Kumar, M. Goyal, K. Rajalakshmi, and A. Aggarwal, “ A simulation annealing based anti-collision protocol for RFID tag identification,” in International Conference on Contemporary Computing (IC3), Noida, India, Aug. 2016, pp. 1–7.
  • A. Kumar, K. Gopal, and A. Aggarwal, “A novel and efficient anti-collision protocol for RFID tag identification,” J. Commun. Softw. Syst., Vol. 12, no. 4, pp. 173–81, Dec. 2016. doi: 10.24138/jcomss.v12i4.75
  • M. Du, C. Jing, and M. Du, “Tag location method integrating GNSS and RFID technology,” J. Global Positioning Syst., Vol. 14, no. 1, pp. 2–10, Nov. 2016. doi: 10.1186/s41445-016-0002-8
  • M. Z. Zakaria, and M. Y. Jamaluddin, “Path optimization and object localization using hybrid particle swarm and ant colony optimization for mobile RFID reader,” J. Inf. Sci. Comput. Technol., Vol. 6, no. 1, pp. 568–76, Dec. 2016.
  • Litum| IoT. Available: http://litumiot.com/tag/rfid-location-tracking-system/
  • J. A. Bitsch Link, P. Smith, N. Viol, and K. Wehrle, “Footpath: Accurate map-based indoor navigation using smartphones,” in Proc. of 2011 International Conference on Indoor Positioning and Indoor Navigation (IPIN), Sept. 2011, pp. 1–8.
  • H. Liu, Y. Gan, J. Yang, S. Sidhom, Y. Wang, Y. Chen, and F. Ye, “Push the limit of WiFi based localization for smartphones,” in Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, Istanbul, Turkey, Mar. 2012, pp. 305–16.
  • T.-C. Tsai, “Map compression for a RFID-based two-dimensional indoor navigation system,” Ph.D. dissertation, Auckland University of Technology, 2008.
  • L. Wang, “iNavigation: An image based indoor navigation system,” Ph.D. dissertation, Auckland University of Technology, 2012.
  • G. A. Dimitriou, A. Bletsas, A. C. Polycarpou, and J. N. Sahalos, “On efficient UHF RFID coverage inside a room,” in Proceedings of the Fourth European Conference on Antennas and Propagation (EuCAP), Barcelona, Spain, Apr. 2010, pp. 1–5.
  • K. Chawla, and G. Robins, “An RFID-based object localisation framework,” Int. J. Radio Freq. Identif. Technol. Appl., Vol. 3, no. 1–2, pp. 2–30, Jan. 2011.
  • D. K. Klair, K.-W. Chin, and R. Raad, “A survey and tutorial of RFID anti-collision protocols,” IEEE Commun. Surv. Tutorials, Vol. 12, no. 3, pp. 400–21, Apr. 2010.
  • G. Khadka, and S.-S. Hwang, “Tag-to-tag interference suppression technique based on time division for RFID,” J. Sens., Vol. 17, no. 1, pp. 1–18, Jan. 2017. doi: 10.1109/JSEN.2016.2633501
  • L. Yang, J. Han, Y. Qi, C. Wang, Y. Liu, Y. Cheng, and X. Zhong, “Revisting tag collision problem in RFID systems,” in IEEE 39th International Conference on Parallel Processing (ICPP), San Diego, CA, USA, Sept. 2010, pp. 178–87.
  • L. Xie, Y. Yin, A. V. Vasilakos, and S. Lu, “Managing RFID data: Challenges, opportunities and solutions,” IEEE Commun. Surv. Tutorials, Vol. 16, no. 3, pp. 1294–311, Mar. 2014. doi: 10.1109/SURV.2014.022614.00143
  • Z. Li, C. He, J. Li, and X. Huang, “RFID reader anti-collision algorithm using adaptive hierarchical artificial immune system,” Expert Syst. Appl., Vol. 41, no. 5, pp. 2126–33, Apr. 2014. doi: 10.1016/j.eswa.2013.09.011
  • R. Want, “An introduction to RFID technology,” IEEE Pervasive Comput., Vol. 5, no. 1, pp. 25–33, Feb. 2006. doi: 10.1109/MPRV.2006.2
  • F. Gandino, R. Ferrero, B. Montrucchio, and M. Rebaudengo, “DCNS: An adaptable high throughput RFID reader-to-reader anticollision protocol,” IEEE Trans. Parallel Distrib. Syst., Vol. 24, no. 5, pp. 893–905, May 2013. doi: 10.1109/TPDS.2012.208
  • H. Huo, J. Q. Liu, and Y. J. Wang, “Flood diversion algorithm for anticollision in RFID system,” Int. J. Distrib. Sens. Netw., Vol. 11, no. 4, pp. 1–11, Feb. 2015. doi: 10.1155/2015/245914
  • V. Namboodiri, M. Desilva, K. Deegala, and S. Ramamoorthy, “An extensive study of slotted Aloha-based RFID anti-collision protocols,” Comput. Commun., Vol. 35, no. 16, pp. 1955–66, Sep. 2012. doi: 10.1016/j.comcom.2012.05.015
  • T. Cheng, and L. Jin, “Analysis and simulation of RFID anti-collision algorithms,” in IEEE 9th International Conference on Advanced Communication Technology, Gangwon-Do, Korea, Feb. 2007, pp. 697–701.
  • Y. He, and X. Wang, “An Aloha-based improved anti-collision algorithm for RFID systems,” IEEE Wireless Commun., Vol. 20, no. 5, pp. 152–58, Oct. 2013.
  • C.-F. Lin, and F. Y.-S Lin, “A simulated annealing algorithm for RFID reader networks,” in IEEE Wireless Communications and Networking Conference, Kowloon, Hong Kong, Mar. 2007, pp. 1669–72.
  • S. W. Hung, J. Sum, and Y. Huang, “Empirical analysis on the application of simulated annealing for RFID reader networks,” in IEEE Conference on Soft Computing in Industrial Applications 2008 (SMCia ‘08), Muroran, Japan, June 2008, pp. 177–81.
  • J. Tian, Y. Fan, Y. Zhu, and K. Hu, “RFID reader anti-collision using chaos neural network based on annealing strategy,” in 7th World Congress on Intelligent Control and Automation 2008 (WCICA 2008), Chongqing, China, June 2008, pp. 6128–32.
  • C. H. Ko, “3D-web-GIS RFID location sensing system for construction objects,” Sci. World J., Vol. 2013, pp. 1–8, article ID: 217972, June 2013.
  • Z. Li, J. Li, C. He, C. Tang, and J. Zhou, “RFID reader-to-reader collision avoidance model with multiple density tag distribution solved by artificial immune network optimization,” J. Appl. Soft Comput., Vol. 30, pp. 249–264, May 2015. doi: 10.1016/j.asoc.2015.01.056
  • M. Tao, S. Huang, Y. Li, M. Yan, and Y. Zhou, “SA-PSO based optimizing reader deployment in large-scale RFID systems,” J. Netw. Comput. Appl., Vol. 52, pp. 90–100, June 2015. doi: 10.1016/j.jnca.2015.02.011
  • J. V. Alonso, F. J. Parrado-Garcia, and J. J. Alcaraz, “OSL: An optimization-based scheduler for RFID dense-reader environments,” Ad Hoc Netw., Vol. 37, no. 2, pp. 512–25, Feb. 2016. doi: 10.1016/j.adhoc.2015.10.004
  • NS-3 Simulator: https://www.nsnam.org/

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.