Reducing Transmitted Bits in a Memoryless RFID Anti-collision Protocol
Nikola Cmiljanic, Hugo Landaluce, Asier Perallos and Laura Arjona
DeustoTech-Fundaci
´
on Deusto, Deusto Foundation, Av. Universidades 24, 48007, Bilbao, Spain
Keywords:
RFID, Anti-collision, Tag Identification, Window, Query Tree.
Abstract:
The use of Radio Frequency Identification (RFID) technologies is growing. RFID enables data to be collected
from many objects, for identification and other purposes. One of the main disadvantages in tag identification,
known as the tag collision problem, is becoming significant, since it leads to the increase in the number of
transmitted bits and identification time. The window methodology is created with the aim to manage the
number of transmitted bits by the tags. As a result, tags transmit exclusively the bits defined by the window
instead of sending their full ID value on every response. This paper presents a protocol with a standardized
window. The window size is transmitted as the exponent of power of 2. Simulations show that the proposed
solution with standarized window size reduces the number of bits transmitted by the reader, with respect to
other protocols using the window, which results in a lower number of total bits in the identification process.
1 INTRODUCTION
Radio Frequency Identification (RFID) is very popu-
lar, and it is experiencing a higher growth every day.
RFID is a technology that uses radio waves to auto-
matically identify people or objects. This technology
helps in many fields and provides information about
people, goods and products in transport. As opposed
to barcode, RFID does not require close handling, no
line of sight is required between the reader and the
object to be identified, and tags provide significantly
greater storage capacity. Those are the reasons why
RFID is increasingly present.
The main components of an RFID system are: a
reader and transponders (in advance tags) (Finken-
zeller, 2010). RFID uses radiofrequency waves in or-
der to automatically identify and track tags attached to
objects. The reader is the main component, which is
in charge of managing the identification process and
collecting data from the tags by using an antenna that
broadcasts radio waves. A tag is a small label which is
attached to an object that wants to be identified. The
reader sends out electromagnetic waves that the tag
antenna receives and backscatters with its ID, convert-
ing those waves into digital data.
Tags are categorized into: passive, active, and
semi passive. Passive tags are smaller and do not have
a power supply. They reflect the data received from
the reader to transmit their data. Active tags have an
integrated battery, which is used to provide voltage to
the chip and to transmit a longer distance. Semi pas-
sive tags use a battery only to power on the chip, so
the entire energy, which is received from the reader,
can be used for the transmission of data. Tags are
available in many shapes such as smart cards, coins,
keys, key fobs, clocks, and smart labels. RFID sys-
tems can also be classified according to the working
frequencies of the carrier signals: low frequency (LF)
125kHz-134kHz, high frequency (HF) 13.56Mhz, ul-
tra high frequency (UHF) 860-930 MHz, and super
high frequency (SHF). Depending on the frequency,
tags have various achievable ranges, from a few cm to
8 m (Finkenzeller, 2010).
The process of tag identification comprises a
reader interrogation and a tag response. One of the
main problems in RFID systems happens when multi-
ple tags are interrogated by the reader simultaneously
and they reflect their respective signals back to the
reader at the same time. As a result of this obstruction
there is a failed transmission called collision. These
collisions cause the reader to be unable to identify
tags successfully and rapidly. Thus, RFID obtains
low tag reading performance and a high waste of en-
ergy. To minimize the influence of the tag collision
problem, RFID readers use an anti-collision protocol.
Anti-collision protocols can be divided into three cat-
egories: Aloha-based protocols which are probabilis-
tic, tree-based protocols which are deterministic, and
hybrid protocols (Klair et al., 2010).
Aloha-based protocols (Wang et al., 2009; J. and
T., 2008), come from computer networks and they use
a random access strategy in order to identify tags.
152
Cmiljanic, N., Landaluce, H., Perallos, A. and Arjona, L.
Reducing Transmitted Bits in a Memoryless RFID Anti-collision Protocol.
DOI: 10.5220/0005963201520157
In Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016) - Volume 6: WINSYS, pages 152-157
ISBN: 978-989-758-196-0
Copyright
c
2016 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved