期刊文献+

自适应帧Aloha的RFID标签防冲突协议 被引量:20

ADFA Protocol for RFID Tag Collision Arbitration
在线阅读 下载PDF
导出
摘要 为减少重复识别标签的时间,在动态帧时隙Aloha的RFID标签防冲突协议的基础上提出了一种自适应的动态帧时隙Aloha(adaptive dynamic framed Aloha,ADFA)的防冲突协议.在ADFA协议中,阅读器每成功识别一个标签就自适应地给该标签分配一个时隙号,该时隙号规定了标签在一次识别过程中被阅读器识别的顺序,若当前识别过程中待识别的标签与上一次识别过程中的标签相比有较多的重复,ADFA协议就可以减少冲突和空时隙,从而减少标签识别时间.另外,为进一步减少ADFA协议识别标签的时间,还对其作了改进,在改进的ADFA协议中,提出了一种低复杂度标签估计和最优帧长方案.理论分析和仿真结果均表明,ADFA协议在重复识别标签时能够减少识别时间,改进ADFA协议的标签估计方法能够减少计算复杂度,而其最优帧长方案能使系统的吞吐量得到提高. When a radio frequency identification(RFID) system identifies multiple tags,tag collisions will happen.The RFID system generally applies a tag anti-collision protocol to resolve the multi-tag collisions.To reduce identified time,this paper proposes a new adaptive dynamic framed Aloha(ADFA) for RFID tag collision arbitration.Based on dynamic framed Aloha protocol,ADFA adaptively allocates each identified tag a slot number.During the next reading round,the tags will be identified according to the slot number,which can reduce collision and idle slots when a reader repeatedly tags.In many RFID applications where a reader may repeatedly identify tags,such as supply chain operation,object tracking and locating,the proposed protocols can reduce time of re-identifying tags.Furthermore,to reduce more identified time,we improve ADFA protocol and propose a tag quantity estimate with low computational complexity and an optimal frame length.The tag estimate is based on Vogt method,and can reduce computational complexity by narrowing the search range of the tag quantity.And the optimal frame length scheme can achieve maximum throughput under the condition that the slot durations are different.The theoretical computation and simulation results both show that ADFA can reduce identified time when repeatedly reading tags,and the tag estimate in the improved ADFA can lower computational complexity.In addition,the optimal frame length in the improved ADFA can also advance system throughput.
作者 吴海锋 曾玉
出处 《计算机研究与发展》 EI CSCD 北大核心 2011年第5期802-810,共9页 Journal of Computer Research and Development
基金 云南省教育厅科学研究基金项目(2010Y423)
关键词 RFID 防冲突 ALOHA 自适应 标签 RFID collision arbitration Aloha adaptive tag
  • 相关文献

参考文献22

  • 1Finkenzeller K. RFID Handbook: Radio-Frequency Identification Fundamentals and Applications [M]. 2nd ed. New York: John Wiley and Sons, 2003:1-100.
  • 2丁振华,李锦涛,冯波.基于Hash函数的RFID安全认证协议研究[J].计算机研究与发展,2009,46(4):583-592. 被引量:93
  • 3Capetanakis J I. Tree algorithms for packet broadcast channels[J]. IEEE Trans on Information Theory, 1979, 25 (5) : 505-515.
  • 4Hush D R, Wood C. Analysis of tree algorithm for RFID arbitration [C] //Proc of IEEE Int Syrup on Information Theory. Piscataway, NJ: IEEE, 1998:107.
  • 5Law C, Lee K, Siu K S. Efficient memoryless protocol for tag identification [C] //Proc of the 4th ACM Int Workshop on Discrete Algorithms and Methods for Mobile Computing and Communication. New York: ACM, 2000:75-84.
  • 6冯波,李锦涛,郑为民,张平,丁振华.一种新的RFID标签识别防冲突算法[J].自动化学报,2008,34(6):632-638. 被引量:20
  • 7Schoute F C. Dynamic frame length aloha [J]. IEEE Trans on Communications, 1983, Com-31(4):565-568.
  • 8Chen W T. An accurate tag estimate method for improving the performance of an RFID anticollision algorithm based on dynamic frame length ALOHA [J]. IEEE Trans on Automation Science and Engineering, 2008, 6(1) : 1-7.
  • 9Floerkemeier C. Bayesian transmission strategy for framed ALOHA based RFID protocols [C] /]Proc of IEEE Int Conf on RFID. Piscataway, NJ: IEEE, 2007:228-235.
  • 10Cha J R, Kim J H. Novel anti-collision algorithms for fast object identification in RFID system [C]//Proc of Int Conf on Parallel and Distributed Systems Computing. Piscataway, NJ.. IEEE, 2005:63-67.

二级参考文献93

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2International Organization for Standardization (ISO). ISO 18000-6, RFID for Item Management-Air Interface, Part 6: Parameters for Air Interface Communications at 860MHz to 960MHz[S]. 2004
  • 3Gong L, Needham R, Yahalom R. Reasoning about belief in cryptographic protocols [C] //Proc of the 1990 IEEE Computer Society Symp on Research in Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 1990:234-248
  • 4Tsudik G. YA-TRAP, yet another trivial RFID authentication protocol [C] //Proc of the 4th Annual IEEE Int conf on Pervasive Computing and Communications Workshops. Los Alamitos, CA: IEEE Computer Society, 2006 : 640-643
  • 5Kaps J P, Gaubatz G, Sunar B. Cryptography on a speck of dust [J]. IEEE Computer Magazine, 2007, 40(2): 38-44
  • 6Landt J, Catlin B. Shrouds of Time-The history of RFID, Ver. 1.0 [R]. Pittsburgh:AIM Inc. , 2001
  • 7Rhee K, Kwak J, Kim S, et al. Challenge-response based RFID authentication protocol for distributed database environment [C] //Proc of the 2nd Int Conf on Security in Pervasive Computing. Berlin: Springer, 2005:70-84
  • 8Finkenzeller K. RFID Handbook: Radio Frequency Identification Fundamentals and Applications [M]. Second edition. New York: John Wiley and Sons Ltd, 2003
  • 9Avoine G, Oechslin P. RFID traceability: A multilayer problem [C] //Proc of the 9th Int Conf on Financial Cryptography. Berlin: Springer, 2005:125-140
  • 10Peris-Lopez P, Cesar Hernandez Castro J, Estevez Tapiador J M, et al. RFID systems: A survey on security threats and proposed solutions [C] //Proc of the IFIP- TC6 11th Int Conf on Personal Wireless Communications. Berlin: Springer, 2006: 159-170

共引文献151

同被引文献265

引证文献20

二级引证文献92

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部