Managing Tag Collision in RFID Data Streams using Smart Tag Anti-Collision Techniques

Managing Tag Collision in RFID Data Streams using Smart Tag Anti-Collision Techniques

Prapassara Pupunwiwat, Bela Stantic
Copyright: © 2013 |Pages: 32
DOI: 10.4018/978-1-4666-2080-3.ch008
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Radio Frequency Identification (RFID) is considered an emerging technology for advancing a wide range of applications, such as supply chain management and distribution. However, despite the extensive development of the RFID technology in many areas, the RFID tags collision problems remain a serious issue. Collision problems occur due to the simultaneous presence of multiple numbers of tags within the reader zone. To solve collision problems, different anti-collision methods have been mentioned in literature. These methods are either insufficient or too complex, with a high overhead cost of implementation. In this chapter, the authors propose a novel deterministic anti-collision algorithm using combinations of Q-ary trees with the intended goal to minimise memory usage queried by the RFID reader. By reducing the size of queries, the RFID reader can preserve memories, and the identification time can be improved. In addition, the chapter introduces a novel probabilistic group-based anti-collision method to improve the overall performance of the tag recognition process.
Chapter Preview
Top

Introduction

Radio Frequency Identification (RFID) technology uses radio frequency waves to automatically identify people or objects. The main RFID systems consist of fast capturing radio frequency tags and networked electromagnetic readers. RFID technology is currently emerging as an important technology for advancing a wide range of applications. It has the potential to improve the efficiency of business processes by providing automatic identification and data capture. The current interest in RFID technology has grown rapidly and can now be certified by CompTIA RFID+ certification in order to validate the knowledge and skills of professionals who work with RFID technology. In the modern world, RFID technology is used in different applications such as distribution and retail packaging, security, library system, defence and military, health care, and baggage and passenger tracing at the airport.

Chip-based RFID systems are mainly comprised of the following components:

  • Chipped-Tag, which has a microchip attached to an antenna that transmits and responds to radio signals of a particular frequency. Chipped-Tag types are separated into three categories known as Passive Tag, Semi-Passive Tag, and Active Tag. In this chapter, we focus on passive tag, which does not have its own power source, and has no battery on-board. The tag obtains power from radio waves received from the reader. Passive Tags are small and light weight, and their functionalities are limited due to power source. Due to a lack of enough power, it cannot support an active transmitter to communicate with the reader. Passive tags are well suited in applications for which tags are not reusable, because of their low cost.

  • Reader, which sends and receives RFID data to and from tags via antennas. Readers come in multiple formats, which can be separated into three main categories: Fixed readers, Handheld readers, and Vehicle-mount readers.

  • Middleware, which pre-processes the RFID data and converts it into a meaningful Data.

  • Application software, which is a specific component that resides on host computer.

In traditional RFID systems where chipped-tags are presented, there are several methods of identification. The most common is to store a serial number that uniquely identifies a person or object such as Electronic Product Code (EPC). All EPC numbers contain strings of binary numbers, which provide a unique identity for every physical object. All data captured by RFID readers before any further process are known as dirty data. In order to improve efficiency of database, dirty data must be filtered at the earlier stage soon after they were captured. The filtering of RFID data streams is known as filtering at the edge, where data are still meaningless and easier to eliminate. The main issue that usually arises in RFID data streams is the data stream errors. There are four typical errors, which include unreliable reads, noises, missed reads, and duplications/redundancies.

Several techniques for filtering RFID data have been proposed in literatures. However, these techniques only filter specific kind of errors generated. Therefore, the amount of wrong data is still recorded into the database. The most common errors are missed reads, which usually happen in a situation of low-cost and low power hardware that lead to a frequently dropped reads (Derakhshan et al., 2007). Another cause of missed reads is simultaneous transmissions in RFID systems, which lead to collisions as the readers and tags typically operate on the same channel. Tag collisions in RFID systems happen when multiple tags simultaneously reflect their respective signals back to the reader at the same time, preventing the reader from identifying all tags. Filling in dropped reads is one way to alter missed reads but it is sufficient to prevent missing data from the beginning. RFID collision problem can be solved by using anti-collision techniques, to prevent two or more tags from responding to a reader at the same time, and to re-identify them again when collisions occurred.

Complete Chapter List

Search this Book:
Reset