129
Views
4
CrossRef citations to date
0
Altmetric
Original Articles

Localized algorithms for redundant readers elimination in RFID networks

, &
Pages 260-271 | Received 27 Aug 2017, Accepted 16 Dec 2017, Published online: 19 Jan 2018

References

  • Ajami S , Rajabzadeh A . Radio frequency identification (rfid) technology and patient safety. J Res Med Sci J Isfahan Univ Med Sci. 2013;18:809–813.
  • Sarac A , Absi N , Dauzère-Pérès S . A literature review on the impact of rfid technologies on supply chain management. Int J Prod Econ. 2010;128:77–95.
  • Moore SE . Rfid material tracking method and apparatus. US patent 6,714,121. 2004 Mar 30.
  • Opasjumruskit K , Thanthipwan T , Sathusen O , et al . Self-powered wireless temperature sensors exploit rfid technology. IEEE Pervasive Comput. 2006;5:54–61.
  • Abad E , Palacio F , Nuin M , et al . Rfid smart tag for traceability and cold chain monitoring of foods: demonstration in an intercontinental fresh fish logistic chain. J Food Eng. 2009;93:394–399.
  • Clare TJ . Electronic article security system for store which uses intelligent security tags and transaction data. US Patent 5,745,036. 1998 Apr 28.
  • Meyers M , Brown M , Patadia S , et al . Mike meyers comptia rfid+ certification passport. Osborne: McGraw-Hill; 2007.
  • Thornton F , Sanghera P . How to cheat at deploying and securing RFID. Burlington, MA: Syngress; 2011.
  • Al-Turjman F , Al-Fagih A , Hassanein H . A novel cost-effective architecture and deployment strategy for integrated RFID and WSN systems. In: 2012 International Conference on Computing, Networking and Communications (ICNC). Maui, HI; 2012. p. 835–839.
  • Sarma SE , Weis SA , Engels DW . Towards the five-cent tag. Technical report, Technical Report MIT-AUTOID-WH-006, MIT Auto ID Center, 2000. Available from: http://www.autoidcenter.org
  • Kalischnig E . Rfid: Making sense of sensor-based technology. Manufacturing and Logistics IT. 2004.
  • Anusha S , Iyer S . Rfidcover-a coverage planning tool for rfid networks with mobile readers. In: Enokido T , Yan L , Xiao B , Kim D , Dai Y , Yang LT , editors. Lecture notes in computer science. Vol. 3823. Berlin, Heidelberg: Springer Berlin Heidelberg; 2005. p. 1047.
  • Oztekin A , Mahdavi F , Erande K , et al . Criticality index analysis based optimal rfid reader placement models for asset tracking. Int J Prod Res. 2010;48:2679–2698.
  • Guan Q , Liu Y , Yang Y , et al . Genetic approach for network planning in the RFID systems. In: 2006. ISDA’06. Sixth International Conference on Intelligent Systems Design and Applications. Vol. 2. Jinan (China); 2006. p. 567–572.
  • Tian D , Georganas N . A coverage-preserving node scheduling scheme for large wireless sensor networks. In: Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications. Atlanta (GA, USA); 2002. p. 32–41.
  • Zhang H , Hou J . Maintaining sensing coverage and connectivity in large sensor networks. Ad Hoc Sensor Wirel Networks. 2005;1:89–124.
  • Carbunar B , Grama A , Vitek J , et al . Coverage preserving redundancy elimination in sensor networks. In: 2004. IEEE SECON. First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks. Santa Clara (CA, USA); 2004. p. 377–386.
  • Chvatal V . A greedy heuristic for the set-covering problem. Math Oper Res. 1979;4:233–235.
  • Garzon M . Models of massive parallelism: analysis of cellular automata and neural networks. New York (NY): Springer Science & Business Media; 2012.
  • Choudhury S , Akl SG , Salomaa K . Energy efficient cellular automaton based algorithms for mobile wireless sensor networks. In: 2012 IEEE Wireless Communications and Networking Conference (WCNC). IEEE; 2012. p. 2341–2346.
  • Choudhury S , Salomaa K , Akl SG . A cellular automaton model for wireless sensor networks. J Cell Autom. 2012;7(3):223–241.
  • Choudhury S , Salomaa K , Akl SG . A cellular automaton model for connectivity preserving deployment of mobile wireless sensors. In: 2012 IEEE International Conference on Communications (ICC). Ottawa (ON, Canada); 2012. p. 6545–6549.
  • Choudhury S , Salomaa K , Akl SG . Cellular automaton-based algorithms for the dispersion of mobile wireless sensor networks. Int J Parallel Emer Distrib Syst. 2014;29:147–177.
  • Choudhury S . Cellular automaton based algorithms for wireless sensor networks. Queen’s University, Canada. 2012.
  • Munir A , Hossen MS , Choudhury S . Localized load balancing in RFID systems. In: 2016 Proceedings of the 5th International Conference on Theory and Practice of Natural Computing (TPNC), 2016 Dec 12--13. Sendai, Japan. 2016. p. 34–45.
  • Ali K , Hassanein H , Alsalih W . Using neighbor and tag estimations for redundant reader eliminations in RFID networks. In: 2011 IEEE Wireless Communications and Networking Conference (WCNC). Cancun (Mexico); 2011. p. 832–837.
  • Irfan N , Yagoub M , Hettak K . Redundant reader elimination approaches for rfid networks. Autonom Intell Syst. 2011;396–405.
  • Irfan N , Yagoub M . Efficient algorithm for redundant reader elimination in wireless rfid networks. Int J Comput Sci Issues. 2010;3:1–8.
  • Carbunar B , Ramanathan M , Koyuturk M , et al . Redundant-reader elimination in rfid systems. Computer Science Technical Reports. West Lafayette, IN: Purdue University; 2005. p. 1–14. ( Report no. 05-013).
  • Hsu C , Chen Y , Yang C . A layered optimization approach for redundant reader elimination in wireless rfid networks. In: The 2nd IEEE Asia-Pacific Service Computing Conference. Tsukuba Science City (Japan): IEEE; 2007. p. 138–145.
  • Yang Z , Chen J . The simulation and analysis of algorithms for redundant reader elimination in rfid system. In: 2009. EMS’09. Third UKSim European Symposium on Computer Modeling and Simulation. Athens (Greece); 2009. p. 494–498.
  • Rashid N , Choudhury S , Salomaa K . CARRE: cellular automaton based redundant readers elimination in RFID networks. In: 2016 IEEE International Conference on Communications (ICC). Kuala Lumpur (Malaysia): IEEE; 2016. p. 1–6.
  • Liu B , Nguyen N , Pham V , et al . A maximum-weight-independent-set-based algorithm for reader-coverage collision avoidance arrangement in rfid networks. IEEE Sens J. 2016;16:1342–1350.
  • Wada T , Hori T , Fujimoto M , et al . An adaptive multi-range-sensing method for 3d localization of passive rfid tags. IEICE Trans Fundam Electron Commun Comput Sci. 2012;95:1074–1083.
  • Nguyen N , Liu B , Pham V . A dynamic-range-based algorithm for reader-tag collision avoidance deployment in RFID networks. In: 2016 International Conference on Electronics, Information, and Communications (ICEIC). Danang (Vietnam): IEEE; 2016. p. 1–4.
  • Tang S , Wang C , Li X , et al . Reader activation scheduling in multi-reader RFID systems: A study of general case. In: 2011 IEEE international Conference on Parallel & Distributed Processing Symposium (IPDPS). Anchorage (AL, USA): IEEE; 2011. p. 1147–1155.
  • Jedda A , Khair M , Mouftah H . Distributed algorithms for the RFID coverage problem. In: 2013 IEEE International Conference on Communications (ICC). Budapest (Hungary): IEEE; 2013. p. 1758–1762.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.