Anti-tag collision algorithms of RFID

Slides:



Advertisements
Similar presentations
Victor K. Y. Wu Department of Electrical Engineering
Advertisements

14-MAC Sub-layer Dr. John P. Abraham Professor UTPA.
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Ethernet – CSMA/CD Review
Multiple access What if multiple machines are sharing the same link?
Fast and Reliable Estimation Schemes in RFID Systems Murali Kodialam and Thyaga Nandagopal Bell Labs, Lucent Technologies.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
1 Muiti-Access methods in RFID System Student :Yi-Shyuan WU Adviser : Kai-Wei Ke Date :
Lectured By: Vivek Dimri Assistant Professor, CSE Dept. SET, Sharda University, Gr. Noida.
1 Cooperative Communications in Networks: Random coding for wireless multicast Brooke Shrader and Anthony Ephremides University of Maryland October, 2008.
Adaptive Splitting Protocols for RFID Tag Collision Arbitration Jihoon Myung and Wonjun Lee ACM Mobihoc 06.
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Ncue-csie1 A QoS Guaranteed Multipolling Scheme for Voice Traffic in IEEE Wireless LANs Der-Jiunn Deng 、 Chong-Shuo Fan 、 Chao-Yang Lin Speaker:
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Prof.R.K.NADESH;SITE;VIT MEDIUM ACCESS CONTROL Wireless channel is a shared medium MAC coordinates transmission between users sharing the spectrum Goals:
RFID Cardinality Estimation with Blocker Tags
ECE358: Computer Networks Spring 2012
CS352- Link Layer Dept. of Computer Science Rutgers University.
Cs/ee 143 Communication Networks Chapter 3 Ethernet Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech.
Medium Access Control Sublayer
Lecture 16 Random Access protocols r A node transmits at random at full channel data rate R. r If two or more nodes “collide”, they retransmit at random.
Fast and Reliable Estimation Schemes in RFID Systems Murali Kodialam and Thyaga Nandagopal Bell Labs, Lucent Technologies Presented by : Joseph Gunawan.
1 Cardinality Estimation for Large-scale RFID Systems Chen Qian, Hoilun Ngan, and Yunhao Liu Hong Kong University of Science and Technology.
INTERNET OF THINGS SUBBAIYA VASU UDAYARAJAN UOTTAWA CSI 5169 WIRELESS NETWORKS AND MOBILE COMPUTING SUBMITTED TO: PROFESSOR STOJMENOVIC.
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
A Multichain Backoff Mechanism for IEEE WLANs Alkesh Patel & Hemant Patel ECE 695 – Leading Discussion By : Shiang- Rung Ye and Yu-Chee Tseng.
2014 YU-ANTL Lab Seminar Performance Analysis of the IEEE Distributed Coordination Function Giuseppe Bianchi April 12, 2014 Yashashree.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking LANs 2: MAC protocols.
Multimedia Support for Wireless W-CDMA with Dynamic Spreading By Ju Wang Mehmet Ali Elicin And Jonathan C.L. Liu Lecture by Seth Caplan.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Cyclic Code. Linear Block Code Hamming Code is a Linear Block Code. Linear Block Code means that the codeword is generated by multiplying the message.
Cyclic Redundancy Check (CRC).  An error detection mechanism in which a special number is appended to a block of data in order to detect any changes.
MEDIUM ACCESS CONTROL Wireless channel is a shared medium MAC coordinates transmission between users sharing the spectrum Goals: prevent collisions while.
Chapter 6 Multiple Radio Access
RFID E STIMATION P ROBLEM Lee, Gunhee S URVEY. R EFERENCES Energy Efficient Algorithms for the RFID Estimation Problem –Tao Li, Samuel Wu, Shigang Chen.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
Computer Science Department of University of Virginia  Voltage on a tag Radio Frequency Identification Systems New Ideas and Algorithms Introduction to.
Every Bit Counts – Fast and Scalable RFID Estimation
Midterm Review. Physical Layer Physical layer design goal: send out bits as fast as possible with acceptable low error ratio C=B*log(1+S/N) – C is the.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Medium Access Control in Wireless networks
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
Wireless and Mobile Networks (ELEC6219) Session 4: Efficiency of a link. Data Link Protocols. Adriana Wilde and Jeff Reeve 22 January 2015.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
CSMA/CD Simulation Carrier Sense Multiple Access (CSMA), although more efficient than ALOHA or slotted ALOHA, still has one glaring inefficiency: When.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
Sensing multiple passive tags simultaneously
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Channel Allocation (MAC)
Net301 lecture9 11/5/2015 Lect 9 NET301.
Services of DLL Framing Link access Reliable delivery
Figure 12.1 Data link layer divided into two functionality-oriented sublayers Networks can be divided into two categories: those using point-to-point.
Mobile Communications Chapter 3 : Media Access
Learning Objectives After interacting with this Learning Object, the learner will be able to: Explain the process of collision detection in CSMA/CD.
The Medium Access Control Sublayer
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Qingwen Liu, Student Member, IEEE Xin Wang, Member, IEEE,
Javad Ghaderi, Tianxiong Ji and R. Srikant
IOT Technologies: Radio Frequency Identification (RFID)
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Multiple Access Control (MAC) Protocols
Satellite Packet Communications A UNIT -V Satellite Packet Communications.
Presentation transcript:

Anti-tag collision algorithms of RFID Chun-Fu Lin

Agenda Taxonomy of tag collision protocols Bi-slotted tree based anti-collision protocols Adaptive binary splitting I-code

Reader collision Tag collision Centralized Probability-based Distributed Probability-based Deterministic-based (Prefix-based)

RFID research topics Hardware Collision Security & privacy Application circuit, antenna design, etc. Collision Reader collision Tag collision Security & privacy Application CSI/CTPAT/WCO SAFE Supply chain management, medical care, etc.

Taxonomy of tag anti-collision protocols by Dong-Her Shih et. al Taxonomy of tag anti-collision protocols by Dong-Her Shih et. al., published in Computer Communications, 2006

SDMA (Space Division Multiple Access) Reuse a certain resource, such as channel capacity in spatially separated area. Reduce the reading range of readers and forms as an array in space. Electronically controlled directional antenna Various tags can be distinguished by their angular positions.

FDMA (Frequency Division Multiple Access) Several transmission channels on various carrier frequencies are simultaneously available. Tags respond on one of several frequencies.

CDMA (Code Division Multiple Access) Too complicate and too computationally intense for RFID tags as well

TDMA (Time Division Multiple Access) The largest group of RFID anti-collision protocols Tag driven (tag talk first, TTF) Tag transmits as it is ready Aloha SuperTag Tags keep quiet and retransmit until reader acknowledges Reader driven (reader talk first, RTF) Polling, splitting, I-code, contactless

Polling Reader must have the complete knowledge (database) of tags Reader interrogates the RFID tags by polling ‘‘whose serial number starts with a 1 in the first position?’’ Those tags meet this test reply “yes” while others remain Slow, inflexible

Splitting method Tree algorithm Based on binary search tree algorithm Each collided tag generates a random number by flipping an unbiased B-sided coin B = 2, each collided tag would generate a number 0 or 1 The reader always sends a feedback informing the tags whether 0 packet, 1 packet, or more than 1 packet is transmitted in the previous slot. Each tag needs to keep track of its position in the binary tree according to the reader’s feedback

R set responds first L: set generates 1 R: set generates 0 S: single reply Z: zero reply C: collision

Query Tree Prefix based Tags match the prefix respond

I-Code stochastic passive tag identification protocol based on the framed-slotted Aloha concept. Each tag transmits its information in a slot that it chooses randomly based on the seed sent by the reader. The reader can vary the frame size N, the actual size of a slot is chosen according to the amount of data requested

Approximation of N The reader detects the number of slots by a triple of numbers c = (c0, c1, ck), where c0 stands for the number of slots in the read cycle in which 0 tags have transmitted, c1 denotes the number of slots in which a single tag transmitted and ck stands for the number of slots in which multiple tags are transmitted. Lower bound method Minimum Distance method: distance between read result c and the expected value vector of n

Various N values corresponding to specific ranges have been found from experiments and tabulated If n  [17, 27], both 32 and 64 are appropriate choices for N

Contact-less Is based on the tree splitting methodology to identify one bit of the ID in every arbitration step The tag uses the modulation scheme which identifies “0” in the specified bit position with 00ZZ (Z stands for no modulation) and “1” as “ZZ00”. In this way, the reader can recognize the responses from all the tags and divide the unidentified tags into 2 groups.

1 1 Identified 1101

Related papers published in IEEE communications letters (I/F 1 Related papers published in IEEE communications letters (I/F 1.196) from 2006 ~ now MARCH 2006, Adaptive Binary Splitting for Efficient RFID Tag Anti-Collision, Jihoon Myung, Student Member, IEEE, Wonjun Lee, Senior Member, IEEE, and Jaideep Srivastava, Fellow, IEEE APRIL 2006, Enhanced Binary Search with Cut-Through Operation for Anti-Collision in RFID Systems, Tsan-Pin Wang DECEMBER 2006, Bi-Slotted Tree based Anti-Collision Protocols for Fast Tag Identification in RFID Systems, Ji Hwan Choi, Student Member, IEEE, Dongwook Lee, and Hyuckjae Lee, Member, IEEE JANUARY 2007, Optimized Transmission Power Control of Interrogators for Collision Arbitration in UHF RFID Systems, Joongheon Kim, Member, IEEE, Wonjun Lee, Senior Member, IEEE, Eunkyo Kim, Dongshin Kim, Student Member, IEEE, and Kyoungwon Suh, Student Member, IEEE JANUARY 2007, Query Tree-Based Reservation for Efficient RFID Tag Anti-Collision, Ji Hwan Choi, Student Member, IEEE, Dongwook Lee, and Hyuckjae Lee, Member, IEEE Tag collision Reader collision

Ji-Hwan Choi, Dongwook Lee, Hyuckjae Lee, “Bi-slotted tree based anti-collision protocols for fast tag identification in RFID systems,” IEEE communication letter, December 2006

BSQTA Reader sends n-1 bits prefix. Tag that match the prefix will Send ID from n+1 bit to end bit if its n-th bit is 0. Wait for LENGTH-n bit duration if its n-th bit is 1. If reader detects any collision occurs, it pushes the prefixes (prefix+0, prefix+1) into stack and repeats the exploring process. BSCTTA (variation from BSQTA, tags send their ID from n+1 bit to the time that ACK signal received)

P:101 Reader 1 Tag1 1010010 1 Tag2 1011010 Wait |N-prefix| bits

Simulation One reader Number of tags increases from 2 to 65536 Tag IDs are randomly generated ID length is not clear (believe to be 250) Compared to QTA and CTTA

In another way of thinking The tag collision problem can be referred to as a distributed systems problem : how to reach a consensus agreement (transmission slot) for every distributed node (tag) without interaction to each other? The constraints will be Tag is unable to detect collision Tag has limited or no calculation capability Tag has limited or no memory space Tags can be moved in and out dynamically Reader has no information of the number of tags There could be not just one reader

Jihoon Myung, Wonjun Lee, Jaideep Srivastava, “Adaptive binary splitting for efficient RFID tag anti-collision,” IEEE communication letter, March 2006

Every tag maintains two local variables: Pc and Ac(i). Pc, progressed-slot counter; number of tags recognized by the reader so far. Ac(i), allocated-slot counter, time slot for tag i’s transmission. Reader sends feedback (readable, idle, collision) to tags According to reader’s feedback, each tag decides its transmission time of slot. If feedback=readable, tag adds 1 to Pc. If feedback=idle and Pc < Ac(i), tag decreases Ac(i) by 1 If feedback=collision and Pc < Ac(i), tag generates a random number of 0 and 1 and adds to Ac(i).

Binary tree protocol and query tree protocol are compared Simulation results Identification delay Number of time slots required for all tags Tag communication overhead Average number of bits transmitted by a tag for identification n: number of tags recognized in the last process γ: number of staying tags (tsSr,i∩Sr,i-1) α: number of arriving tags (taSr,i+1-Sr,i) β: number of leaving tags (tlSr,i-Sr,i+1) w: given, w=γ/n, α/n=β/n=1-w Binary tree protocol and query tree protocol are compared Sr,i: the set of all the tags recognized by reader r in the ith Identification process

Stable for static tags w=0, No staying tags, arriving tags=leaving tags w=1, static tags, no arriving and leaving tags

Harald Vogt, “Efficient Object Identification with Passive RFID Tags,” Proceedings of the International Conference on Pervasive Computing, April 2002, pp.98-113.

I-Code Reader is attached to the serial interface of a host (PC) Communication and power transmission between the readers and tags takes places by inductive coupling All tags within reading range will answer requests from the reader An I-Code tag provides 64 bytes memory It employs a variant of slotted Aloha for access to the shared communication medium

Tag reading cycle I: what data is requested in memory Rnd: random value  {0, 31} for tag’s function sT of randomization N: frame size  {1, 4, 8, 16, 32, 64, 128, 256} s: tag sends in slot s, 0≤s≤N The result of a read cycle can be viewed as a triple of numbers <c0, c1, ck>

Mathematical Preliminaries Occupancy Given N slots and n tags, the number r of tags in one slot is The expected value of the number of slots with occupancy number r is given by

μr: the number of slots being filled with exactly r tags Remaining arrangement

Tags reading as a Markov process 1 2 3 n

The matrix Q is used to compute a lower bound of the number of reading steps necessary to identify all tags with a given probability.

How to estimate n? Based on the results of read cycles c=<c0, c1, ck>, and the current value of N, the function that compute estimations of n is: Error function: sums up the weighted errors over all possible outcomes of the read cycle

An problem to optimal value for the number of cycles Small frame size  high collisions Large frame size  high response time Stochastic nature of reading process (frame slotted Aloha) can not guarantee 100% probability of identifying all tags Compute the time to achieve a given assurance level α : values were obtained by performing read cycles for 1 min. and computing the average consumed time tN : cycle time, also depends on the connection speed between reader and host

TN is nearly linear in N For a fixed frame size N, the time Tα required to achieve an assurance level α is S satisfies If the optimal frame size is known, e.g. if n can be estimated correctly, then the identification time that meet the threshold α increase linearly with the number of tags Min number of read cycles Probability of identify k tags after s read cycles, K = 1, 2, …, n. Choose its nth component and Compare it to α

Two estimation functions Lower bound  a collision involves at least 2 different tags Distance between read result c and the expected value vector of n

Lower-bound is accurate for small n but grows fast with larger n. e-dist is more steady

Due to the inaccuracy of the estimation functions and the jitter as shown in Fig.3, it is free to choose the actual frame size for a given estimate; ex. if n{17,27}, both 32 and 64 are appropriate choice for N.

Thank you