進階搜尋


下載電子全文  
系統識別號 U0026-0307201221025200
論文名稱(中文) 符合EPCglobal Gen2協定的RFID碰撞避免演算法之實作
論文名稱(英文) Implementation of RFID Anti-Collision Algorithm for EPCglobal Gen2 Protocol
校院名稱 成功大學
系所名稱(中) 電信管理研究所
系所名稱(英) Institute of Telecommunications and Management
學年度 100
學期 2
出版年 101
研究生(中文) 張景超
研究生(英文) Ching-Chao Chang
學號 R96991105
學位類別 碩士
語文別 英文
論文頁數 56頁
口試委員 指導教授-陳文字
口試委員-李坤洲
口試委員-林易泉
口試委員-林福林
口試委員-黃光渠
中文關鍵字 射頻辨識  碰撞避免  實作平台 
英文關鍵字 RFID  anti-collision  implementation 
學科別分類
中文摘要 近年來,無線射頻辨識系統(RFID)已經成為重要的基礎科技。它是一種快速、安全、高效的辨識程序,深深影響了供應鏈管理、收費繳費、圖書館、電子護照、購物等諸多領域。射頻辨識系統處於一個無線傳輸的環境中,當讀取器必須同時辨識多個標籤時,會產生資料碰撞而無法辨識的情況,因此如何避免資料傳送的碰撞問題(Anti-collision),一直是學者們努力的方向。然而,碰撞避免的相關研究大部分僅限於系統模擬階段,鮮少有實作方面的研究。
本研究建立了一套RFID實驗平台系統,包括防碰撞演算法的運作、程式的編譯和燒錄、數據收集的方法等。我們選擇眾所周知的Schoute演算法與最簡略的Low Bound演算法,實作並比較其結果。實驗結果與其它研究的模擬結果大致相符。因此,我們建立的平台在實際環境中是可運行的。未來,後續的研究者可以提出更有效率的防碰撞演算法,並使用這個實驗平台來驗證其性能。
英文摘要 In recent years, radio frequency identification (RFID) has become an important infrastructure technology. It is a fast, secure, and efficient identification procedure that influences many various applications, such as supply chain management, toll-payment, libraries, e-passports, and shopping. RFID technology works in a wireless environment in which a reader has to identify many tags at the same time. This usually leads to collisions and unidentified data in reading process. Therefore, one always strives to solve such an anti-collision problem. However, most research effort is usually limited to the stage of system simulation. Although the simulation is actually performed in accordance with the protocol, it is still not enough to explain the reliability in the real work.
This research builds a RFID platform, including work of anti-collision algorithm, programs of compilation and burning, method of data collecting, and so on. We select a well-known algorithm (Schoute’s Method) to implement and compare with a base line algorithm (low bound method). The experiment results are quit consistent with that from other works of research. Thus, the experiment platform we built is reliable in actual work. Future research can focus on more efficient anti-collision algorithms, and use this experiment platform to verify the algorithms.
論文目次 摘 要 I
誌 謝 III
CONTENT IV
FIGURE LIST VI
TABLE LIST VIII
CHAPTER 1 INTRODUCTION 1
1.1 BRIEF OF RFID SYSTEMS 1
1.1.1 Basic RFID System Components 2
1.1.2 The Communication Model of RFID System 3
1.2 MOTIVATION AND OBJECTIVES 4
CHAPTER 2 RELATED WORKS 6
2.1 RFID ANTI-COLLISION METHOD 6
2.2 LITERATURE REVIEW 9
2.2.1 Low Bound Method 10
2.2.2 Schoute’s Method 10
2.3 EPC CLASS1 GEN2 UHF RFID SPECIFICATION 12
2.3.1 The Procedures of Reader/Tag 13
2.3.2 The Operations of Inventory Commands 14
2.3.3 EPCglobal Gen2 Algorithm 15
2.4 BRIEF OF RFID SYSTEM TEST PLATFORM 20
2.4.1 Test Platform-AS3992 UHF Gen2 Reader Chip 20
2.4.2 Microcontroller-8051 Single Chip 22
2.5 BRIEF OF MONITORING INTERFACE 24
2.6 SUMMARY 25
CHAPTER 3 METHODOLOGY 26
3.1 IMPLEMENTING ALGORITHM DESCRIPTION 26
3.1.1 Low Bound Frame Size Algorithm 26
3.1.2 Schoute Algorithm 29
3.2 EXPERIMENT DESCRIPTION 31
3.3 IDENTIFICATION EFFICIENCY FACTOR 34
CHAPTER 4 EXPERIMENT RESULTS 36
4.1 PERFORMANCE COMPARISON OF ALGORITHMS 36
4.2 PERFORMANCE COMPARISON OF QINITIAL 45
CHAPTER 5 CONCLUSION 53
REFERENCES 54
參考文獻 [1] Jia Zhai and Gi-Nam Wang, “An Anti-collision Algorithm Using Two-Functioned Estimation for RFID Tags”, ICCSA 2005, LNCS 3483, pp. 702–711, 2005.
[2] Rakesh Kumar, “Interaction of RFID Technology and Public Policy”.
[3] ISO/IEC 18000-1.Information technology AIDC techniques–RFID for item management–air interface, part1–generic parameters for air interface communication for globally accepted frequencies. http://www.iso.org.
[4] Ari Juels. “yoking-proofs for RFID tags.” In Ravi Sandhu and Roshan Thomas, editors, Workshop on Pervasive Computing and Communications Security–PerSec 2004, pages 138–143, Orlando, Florida, USA, March 2004.IEEE.
[5] Ranasinghe, D.C., Engels, D.W. and Cole, P.H. “Security and privacy solutions for low-cost RFID systems,” Intelligent Sensors, Senso Networks and Information Processing Conference, 2004. Proceedings of the 2004,14-17 Dec. 2004 Page(s):337 – 342
[6] Don R. Hush and Cliff Wood, “Analysis of Tree Algorithm for RFID Arbitration,” In IEEE International Symposium on Information Theory, 1998.
[7] C. Law, K. Lee, and K.-Y. Siu, “Efficient memoryless protocol for tag identification.” In Proceedings of the 4th International Workshop on Discrete Algorithm and Methods for Mobile Computing and Communications, p. 75-84, Boston, MA, August 2000.
[8] Vogt, H. “Efficient Object Identification with Passive RFID Tags.” In international Conference on Pervasive Computing, LNCS, Springer-Verlag 2002.
[9] Vogt, H. “Multiple Object Identification with Passive RFID Tags.” Systems, Man and Cybernetics, 2002 IEEE International Conference on Volume 3, p.6-9 Oct. 2002.
[10] Jia Zhai, Gi-Nam Wang, “An Anti-collision Algorithm Using Two-Functioned Estimation for RFID Tags.” Computational Science and Its Applications – ICCSA 2005: International Conference, Singapore, May 9-12, 2005, Proceedings, Part IV, Volume 3483, p.702-711, Apr. 2005.
[11] Wen-Tzu Chen and Wen-Bin Kao, “A Scheme for Improving the Efficiency of RFID Anti-Collision in EPCglobal Generation 2 Protocol”, master thesis, NCKU, June 2008.
[12] K. Finkenzeller, RFID Handbook Radio Frequency Identification Fundamentals and Applications. John Wiley & Sons, 2000.
[13] V. Anatharam, “The stability region of the finite-user slotted aloha protocol”, IEEE Trans. Inf. Theory, vol. 37, no. 3, pp. 535-540, May 1991.
[14] J. E. Wieselthier, A. Ephremides, and L. A. Michaels, “An exact analysis and performance evaluation of framed aloha with capture”, IEEE Trans. Commun., vol. 37, no. 2, pp. 125-137, Feb. 1989.
[15] H. Vogt, “Efficient object identification with passive RFID tags”, Apr. 2002, pp. 98-113.
[16] F. C. Schoute, “Dynamic frame length aloha”, IEEE Trans. Commun., vol. 31, no. 4, pp. 565-568, Apr. 1983.

[17] Zhonghua Li, Chunhui He and Hong-Zhou Tan, “An Enhanced Tag Estimation Method Applied to Tag Anti-collision Algorithm in RFID Systems”, International Conference on Information Science and Technology March 26-28, 2011.
[18] Wen-Tzu Chen and Guan-Hung Lin, “An Efficient Anti-Collision Method for Tag Identification in a RFID System,” IEICE Transactions on Communications, volume E89-B, number 12, pp. 3386-3392, December 2006.
[19] EPC™ Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz – 960 MHz Version 1.1.0
[20] Data Sheet-AS3992 UHF RFID Single Chip Reader
[21] MCS® 51 Microcontroller Family User's Manual, February 1994, Publication number 121517, Intel Corporation
[22] XILINX, “Spartan-II 8-bit Microcontroller Solutions -Customer Tutorial”, March 2000
[23] Datasheet -MAX3232CPE - 3.0V to 5.5V, Low-Power, up to 1Mbps, True RS-232 Transceivers Using Four 0.1uF External Capacitors - Maxim Integrated Products
[24] Jun-Bong Eom, Tae-Jin Lee, “Accurate Tag Estimation for Dynamic Framed-Slotted ALOHA in RFID Systems,” IEEE COMMUNICATIONS LETTERS, VOL. 14, NO. 1, JANUARY 2010, pp. 60-62.
[25] Bo Li, Junyu Wang, “Efficient Anti-Collision Algorithm Utilizing the Capture Effect for ISO 18000-6C RFID Protocol”, IEEE COMMUNICATIONS LETTERS, VOL. 15, NO. 3, MARCH 2011, pp. 352-354.
論文全文使用權限
  • 同意授權校內瀏覽/列印電子全文服務,於2012-07-11起公開。
  • 同意授權校外瀏覽/列印電子全文服務,於2012-07-11起公開。


  • 如您有疑問,請聯絡圖書館
    聯絡電話:(06)2757575#65773
    聯絡E-mail:etds@email.ncku.edu.tw