Abstract
Radio Frequency identification (RFID) technology has been used in many areas, which needs to deploy many readers in the RFID network. Extra readers in the network will consume more power, resulting in a waste of RFID network resources. Therefore, the elimination of redundant readers is important to optimize an RFID network deployment. RFID reader redundant deployment optimization can ensure that users use the minimum number of readers to cover a specific range of all tags. Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. P2P based RFID network is a novel distributed systems. In this paper, an efficient redundant reader elimination strategy is discussed, which is based on the P2P-based RFID reader network.
Access provided by CONRICYT-eBooks. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Karmakar, Nemai Chandra. Handbook of smart antennas for RFID systems[M]. New Jersey: Wiley, 2010.
Wu Y, Sheng Q Z, Zeadally S. RFID: opportunities and challenges[M]. Next-Generation Wireless Technologies. Springer London, 2013: 105-129.
Sakurai S. Prediction of sales volume based on the RFID data collected from apparel shops[J]. International Journal of Space-Based and Situated Computing, 2011, 1(2-3): 174-182.
Takeda A, Oide T, Takahashi A. Simple dynamic load balancing mechanism for structured P2P network and its evaluation[J]. International Journal of Grid and Utility Computing, 2012, 3(2-3): 126-135.
Okaie Y, Nakano T. A game theoretic framework for peer-to-peer market economy[J]. International Journal of Grid and Utility Computing, 2011, 2(3): 183-195.
Sharifkhani F, Pakravan M R. A review of new advances in resource discovery approaches in unstructured P2P networks[C]. Advances in Computing, Communications and Informatics (ICACCI), 2013 International Conference on. IEEE, 2013: 828-833.
Eftychiou A, Vrusias B, Antonopoulos N. A dynamically semantic platform for efficient information retrieval in P2P networks[J]. International Journal of Grid and Utility Computing, 2012, 3(4): 271-283.
Takaoka M, Uchida M, Ohnishi K, et al. A generalised diffusion-based file replication scheme for load balancing in P2P file-sharing networks[J]. International Journal of Grid and Utility Computing, 2012, 3(4): 242-252.
Sula A, Spaho E, Matsuo K, et al. A new system for supporting children with autism spectrum disorder based on IoT and P2P technology[J]. International Journal of Space-Based and Situated Computing, 2014, 4(1): 55-64.
Nandakumar R, Chintalapudi K K, Padmanabhan V, et al. Dhwani: secure peer-to-peer acoustic NFC[C]. ACM SIGCOMM Computer Communication Review. ACM, 2013, 43(4): 63-74.
Wang C S, Chen C L, Deng D J. P2P-based mobile navigation system with location service[J]. Peer-to-Peer Networking and Applications, 2015, 8(1): 22-31.
Hui F C P, Chan H C B. Position Estimation Methods for an RFID-based Positioning System with a P2P Network Architecture[C]. European Wireless 2014; 20th European Wireless Conference; Proceedings of. VDE, 2014: 1-6
Hui C P. RFID-based location tracking system using a peer-to-peer network architecture[D]. The Hong Kong Polytechnic University, 2015.
Urien P, Piramuthu S. LLCPS and SISO: A TLS-based framework with RFID for NFC P2P retail transaction processing[C]. 2013 IEEE International Conference on RFID. IEEE, 2013: 152-159.
D. W. Engels. The reader collision problem[R]. White Paper MIT-AUTOID-WH-007, MIT Auto ID Center, November 2001.
D.-Y. Kim, B.-J. Jang, H.-G. Yoon, J.-S. Park, and J.-G. Yook. Effects of reader interference on the RFID interrogation range[C]. In the Proceedings of the 37th European Microwave Conference, pages 728–731, October 2007.
N. lrfan and M. C. E Yagoub. Efficient Approach for Redundant Reader Elimination in Large-Scale RF10 Networks[C]. 2010 First International Conference on Integrated Intelligent Computing, pp. l 02-107,5-7 Aug. 2010.
Leong K S, Ng M L, Cole P H. The reader collision problem in RFID systems[C]. 2005 IEEE International Symposium on Microwave, Antenna, Propagation and EMC Technologies for Wireless Communications. IEEE, 2005, 1: 658-661.
Su-Ryun Lee, Sung-Don Joo, and Chae-Woo Lee. An enhanced dynamic framed slotted ALOHA algorithm for RFID tag identification[C]. The Second Annual International Conference on Networking and Services, 2005, Page(s): 166–172
Jae-Ryong Cha and Jae-Hyun Kim. Dynamic framed slotted ALOHA algorithms using fast tag estimation method for RFID system[C]. Consumer Communications and Networking Conference, 2006, Page(s): 768–772
Xu Huang and Son Le. Efficient Dynamic Framed Slotted ALOHA for RFID Passive Tags[C]. The 9th International Conference on Advanced Communication Technology, 2007, Page(s):94–97
Leian Liu and Shengli Lai. ALOHA-Based AntiCollision Algorithms Used in RFID System[C]. International Conference on Wireless Communications, Networking and Mobile Computing, 2006, Page(s): 1–4.
J. Waldrop, D.W. Engels, and S.E. Sarma. Colorwave: an anticollision algorithm for the reader collision problem[C]. IEEE International Conference on Communications, 2003, Page(s): 1206-1210.
Ziming Guo and Binjie Hu. A Dynamic Bit Arbitration Anti-Collision Algorithm for RFID System[C]. IEEE International Workshop on Anticounterfeiting, Security, Identification, 2007, Page(s): 457–460.
Leian Liu, Zhenhua Xie, Jingtian Xi, and Shengli Lai. An improved anti-collision algorithm in RFID system[C]. 2nd International Conference on Mobile Technology, Applications and Systems, 2005.
B. Carbunar, M. K. Ramanathan, M. Koyuturk, C. Hoffmann, and A. Grama. Redundant-reader elimination in RFID systmes[C]. Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (SECON), pages 176–184, September 2005.
C.-H. Hsu, Y.-M. Chen, and C.-T. Yang. A layered optimization approach for redundant reader elimination in wireless rfid networks[C]. In IEEE Asia-Pacific Services Computing Conference, pages 138–145, 2007.
Z. Guo, A.Zhou. Data quality and data cleaning research[J]. Journal of software, 2002, 13(11):2076-2082.
Y. Gu, G.Yu, T.Zhang. RFID complex event processing technology[J]. Computer science and exploration, 2007(03).
Juels A, Pappu R. Squealing Euros: Privacy protection in RFID-enabled banknotes [C]. Financial cryptography. Springer Berlin Heidelberg, 2003:103-121.
Xu H, Wang S, Wang R. A Novel RFID Reader System Framework Based On Peer-to-Peer Network[J]. International Journal of Advancements in Computing Technology, 2011, 3(3): 104-110.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
XU, H., SHEN, W., LI, P., QIAN, C. (2017). An Efficient RFID Reader Network Planning Strategy Based on P2P Computing. In: Xhafa, F., Barolli, L., Amato, F. (eds) Advances on P2P, Parallel, Grid, Cloud and Internet Computing. 3PGCIC 2016. Lecture Notes on Data Engineering and Communications Technologies, vol 1. Springer, Cham. https://doi.org/10.1007/978-3-319-49109-7_36
Download citation
DOI: https://doi.org/10.1007/978-3-319-49109-7_36
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-49108-0
Online ISBN: 978-3-319-49109-7
eBook Packages: EngineeringEngineering (R0)