進階搜尋


下載電子全文  
系統識別號 U0026-2008201300301300
論文名稱(中文) 密集多讀取器環境下讀取重疊區射頻辨識標籤之混合式阻隔機制
論文名稱(英文) A Hybrid Blocking Scheme for Identifying RFID Overlapping Tags with Multiple Readers
校院名稱 成功大學
系所名稱(中) 電腦與通信工程研究所
系所名稱(英) Institute of Computer & Communication
學年度 101
學期 2
出版年 102
研究生(中文) 張央忠
研究生(英文) Iang-Chong Chang
學號 Q36001428
學位類別 碩士
語文別 英文
論文頁數 46頁
口試委員 指導教授-李忠憲
口試委員-林輝堂
口試委員-鄭伯炤
口試委員-蘇銓清
口試委員-蘇淑茵
中文關鍵字 射頻辨識  標籤辨識  防碰撞  Blocking 演算法  讀取區重疊 
英文關鍵字 RFID  tag identification  tag anti-collision  blocking algorithms  overlapping interrogation zone 
學科別分類
中文摘要 在射頻辨識(RFID)系統領域,設計標籤辨識效率的提升方法一直是個重要的研究方向,在標籤辨識的過程中,標籤若同時傳送訊號將會在讀取器端產生碰撞,所以我們需要設計防碰撞演算法來解決這個問題,在過去的研究中所提出的Single Resolution Blocking 演算法(SRB) 和Pair Resolution Blocking 演算法(PRB)便是其中的兩個重要的防碰撞演算法,它們利用了前一次標籤辨識的資訊,在新一次辨識時減少無謂的碰撞進而提升效率,然而,我們發現在讀取器彼此緊鄰的環境中,若多個讀取器之讀取區域發生重疊將會對辨識效率產生負面的影響。在本篇論文中我們將討論其問題之原因,並且提出一個混合式的阻隔機制 – Hybrid Blocking Algorithm (HBA),HBA參考在讀取器中存取的上一輪辨識之ID發送一定長度的字首,藉以避免重疊區造成的問題,最後,模擬結果顯示HBA演算法能夠避免多個讀取器讀取區重疊所造成的影響,因此在讀取器密集之場景有較好的效能。
英文摘要 For Radio Frequency Identification (RFID) systems, designing an efficient method of tag identification is an important issue. In the process of tag identification, many tags .may simultaneously transmit signals. This will cause collisions at reader side. Thus, we have to design tag anti-collision algorithms to solve this problem. Single Resolution Blocking algorithm (SRB) and Pair Resolution Blocking algorithm (PRB) proposed in previous studies are two of the important anti-collision algorithms. They refer to the information of the previous identification to reduce avoidable collisions and improve the efficiency. However, we found that performance of the blocking algorithms will be worse in the dense RFID systems because multiple readers may have many overlapping interrogation zones. In this paper, we will discuss the cause of this problem and propose a hybrid blocking scheme - Hybrid Blocking Algorithm (HBA). In HBA, reader refers to the recognized tags’ IDs at its storage and sends the prefix of IDs in certain length in order to overcome the problem caused by the overlapping interrogation zone. Finally, our simulation results show that HBA is able to deal with the problem caused by readers’ reading range overlapping. Therefore, HBA has better performance in dense RFID systems.
論文目次 Content

摘要 I
ABSTRACT II
誌謝 III
CONTENTS IV
LIST OF TABLES V
LIST OF FIGURES VI
CHAPTER 1 INTRODUCTION 1
1.1 INTRODUCTION 1
1.2 MOTIVATION & CONTRIBUTION 2
1.3 ORGANIZATION 3
CHAPTER 2 BACKGROUND 4
2.1 ABS ALGORITHM 4
2.2 BLOCKING ALGORITHMS ON ABS(SRB AND PRB) 8
CHAPTER 3 PROBLEM OF ABS-BASED ALGORITHMS IN DENSE RFID SYSTEMS 12
3.1 TAGS IN OVERLAPPING INTERROGATION ZONE 12
3.2 THE PROBLEM ON BLOCKING TECHNIQUE 13
CHAPTER 4 PROPOSED ALGORITHMS 18
4.1 DETECTION OF READER COLLISION 18
4.2 HYBRID BLOCKING ALGORITHM 19
4.2.1 THE PROCEDURE OF HBA 20
4.2.2 AN EXAMPLE 25
CHAPTER 5 PERFORMANCE EVALUATION 27
5.1 SIMULATION SETUP 27
5.2 SIMULATION RESULTS 30
5.2.1 IMPACT OF PREFIX LENGTH IN HBA 30
5.2.2 IMPACT OF THE RATIO OF OVERLAPPING TAG 36
5.2.3 IMPACT OF RS AND RO 40
5.3 COMPARISON OF HARDWARE COMPLEXITY 42
CHAPTER 6 CONCLUSION 44
REFERENCES 45

List of Table

TABLE 1 COLLISION PROBABILITY ACCORDING TO NUMBER OF TAGS AND PREFIX LENGTH 25
TABLE 2 THE ASSUMPTION OF TRANSMISSION TIME. 29
TABLE 3 SIMULATION SCENARIOS 30
TABLE 4 HARDWARE COMPLEXITY 43

List of Figure

FIGURE 1 AN EXAMPLE OF ABS IN FRAME FI. 5
FIGURE 2 AN EXAMPLE OF ABS IN FRAME FI+1. 7
FIGURE 3 AN EXAMPLE OF SRB IN FRAME FI+1. 9
FIGURE 4 AN EXAMPLE OF PRB IN FRAME FI+1. 11
FIGURE 5 THE SCENARIO OF MULTIPLE READER-TO-TAG. 13
FIGURE 6 EXAMPLES WITH PROBLEM OF TAGS IN OVERLAPPING INTERROGATION ZONE. 14
FIGURE 7 THE RESULT ACCORDING TO THE RATIO OF OVERLAPPING TAGS. 15
FIGURE 8 EXAMPLES WITH DIFFERENT RATIO OF OVERLAPPING TAGS. 17
FIGURE 9 DETECTION OF READER COLLISION USING BEACON MESSAGE. 19
FIGURE 10 PSEUDO-CODE OF HBA. 23
FIGURE 11 AN EXAMPLE OF HBA IN FRAME FI+1. 26
FIGURE 12 LINK TIMING. 29
FIGURE 13 IMPACT OF PREFIX LENGTH L. 32
FIGURE 14 IMPACT OF PREFIX LENGTH L. 35
FIGURE 15 IMPACT OF RO. 39
FIGURE 16 IMPACT OF RS AND RO. 42
參考文獻 [1] D. K. Klair, K. W. Chin and R. Raad, “A Survey and Tutorial of RFID Anti-Collision Protocols”, IEEE Communications Surveys & Tutorials, Vol. 12, Iss. 3, pp. 400-421, Third Quarter 2010
[2] Information Technology—Radio Frequency Identification (RFID) for Item Management—Part 6: Parameters for Air Interface Communications at 860-930 MHz, ISO/IEC 18000-6(B), 2004
[3] T. F. La Porta, G. Maselli and C. Petrioli, “Anticollision Protocols for Single-Reader RFID Systems: Temporal Analysis and Optimization”, Vol. 10, Iss. 2, pp. 267-279, Feb. 2011
[4] J. Park, M. Y. Chung and T. J. Lee, “Identification of RFID Tags in Framed-Slotted ALOHA with Robust Estimation and Binary Selection”, IEEE Communications Letters, Vol. 11, Iss. 5, pp. 452-454, May 2007
[5] I. Joe and J. Lee, “A Novel Anti-Collision Algorithm with Optimal Frame Size for RFID System”, 2007. SERA 2007. 5th ACIS International Conference on Software Engineering Research, Management & Applications, pp. 424-428, 20-22 Aug. 2007
[6] Y. C. Ko, S. Roy, J. R. Smith and H. W. Lee, “RFID MAC Performance Evaluation Based on ISO/IEC 18000-6 Type C”, IEEE Communications Letters, Vol. 12, Iss. 6, pp. 426-428, Jun. 2008
[7] J. B. Eom, T. J. Lee, R. Rietman and A.Yener, “An Efficient Framed-Slotted ALOHA Algorithm with Pilot Frame and Binary Selection for Anti-Collision of RFID Tags”, IEEE Communications Letters, Vol. 12, Iss. 11, pp. 861-863, Nov. 2008
[8] H. Wu, Y. Zeng, J. Feng and Y. Gu, “Binary Tree Slotted ALOHA for Passive RFID Tag Anticollision”, IEEE Transactions on Parallel and Distributed Systems, Vol. 24, Iss. 1, pp. 19-31, Jan. 2013
[9] J. Myung, W. Lee and T. K. Shih, “An Adaptive Memoryless Protocol for RFID Tag Collision Arbitration”, IEEE Transactions on Multimedia, Vol. 8, Iss. 5, pp. 1096-1101, Oct. 2006
[10] J. H. Choi, D. Lee and H. Lee, “Query Tree-Based Reservation for Efficient RFID Tag Anti-Collision”, IEEE Communications Letters, Vol. 11, Iss. 1, pp. 85-87, Jan. 2007
[11] C. N.Yang and J. Y. He, “An Effective 16-bit Random Number Aided Query Tree Algorithm for RFID Tag Anti-Collision”, IEEE Communications Letters, Vol. 15, Iss. 5, pp. 539-541, May 2011
[12] International Telecommunication Union, “ITU Internet Reports 2005: The Internet of Things Executive Summary”
[13] J. Myung and W. Lee, “Adaptive binary splitting for efficient RFID tag anti-collision”, IEEE Communications Letters, Vol. 10, Iss. 3, pp. 144-146, Mar. 2006
[14] J. Myung and W. Lee, “Tag-Splitting: Adaptive Collision Arbitration Protocols for RFID Tag Identification”, IEEE Transactions on Parallel and Distributed Systems, Vol. 18, Iss. 6, pp. 763-775, Jun. 2007
[15] Y. C Lai and L. Y. Hsiao, “General Binary Tree Protocol for Coping with the Capture Effect in RFID Tag Identification”, IEEE Communications Letters, Vol. 14, Iss. 3, pp. 208-210, Mar. 2010
[16] Y. C. Lai and C. C. Lin, “Two Blocking Algorithms on Adaptive Binary Splitting: Single and Pair Resolutions for RFID Tag Identification”, IEEE/ACM Transactions on Networking, Vol. 17, Iss. 6, pp. 962-975, Jun. 2009
[17] J. S. Li and Y. M. Huo, “An Efficient Time-Bound Collision Prevention Scheme for RFID Re-Entering Tags”, IEEE Transactions on Mobile Computing, Vol.12, Iss. 6, pp. 1054-1064, Jun. 2013
[18] E. Hamouda, N. Mitton and D. Simplot-Ryl, “Reader Anti-Collision in Dense RFID Networks With Mobile Tags”, 2011 IEEE International Conference on RFID-Technologies and Applications (RFID-TA), pp. 327-334, 15-16 Sept. 2011
[19] R. Ferrero, F. Gandino, B. Monchucchio and M. Rebaudengo, “A Fair and High Throughput Reader-to-Reader Anticollision Protocol in Dense RFID Networks”, IEEE Transactions on Industrial Informatics, Vol. 8, Iss. 3, pp. 697-706, Aug. 2012
[20] A. –H. Mohsenian, V. Shah-Mansouri, V. W. S. Wong and R. Schober, “Distributed Channel Selection and Randomized Interrogation Algorithms for Large-Scale and Dense RFID Systems”, IEEE Transactions on Wireless Communications, Vol. 9, Iss. 4, pp. 1402-1413, Apr. 2010
[21] J. Yu, W. Lee And D. Z. Du, “Reducing Reader Collision for Mobile RFID”, IEEE Transactions on Consumer Electronics, Vol. 57, Iss. 2, pp. 574-582, May 2011
論文全文使用權限
  • 同意授權校內瀏覽/列印電子全文服務,於2015-08-27起公開。
  • 同意授權校外瀏覽/列印電子全文服務,於2015-08-27起公開。


  • 如您有疑問,請聯絡圖書館
    聯絡電話:(06)2757575#65773
    聯絡E-mail:etds@email.ncku.edu.tw