Abstract
Radio frequency identification systems with passive tags are powerful tools for object identification. However, if multiple tags are to be identified simultaneously, messages from the tags can collide and cancel each other out. Therefore, multiple read cycles have to be performed in order to achieve a high recognition rate. For a typical stochastic anti-collision scheme, we show how to determine the optimal number of read cycles to perform under a given assurance level determining the acceptable rate of missed tags. This yields an efficient procedure for object identification. We also present results on the performance of an implementation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Klaus Finkenzeller. RFID-Handbuch. Hanser Fachbuch, 1999. Also available in English as RFID Handbook: Radio-Frequency Identification Fundamentals and Applications, John Wiley & Sons, 2000.
L. E. Holmquist, J. Redström, and P. Ljungstrand. Token-Based Access to Digital Information. In Hans-W. Gellersen, editor, Handheld and Ubiquitous Computing, volume 1707 of LNCS, pages 234–245. Springer-Verlag, 1999.
Don R. Hush and Cliff Wood. Analysis of Tree Algorithms for RFID Arbitration. In IEEE International Symposium on Information Theory, pages 107. IEEE, 1998.
Normal Lloyd Johnson and Samuel Kotz. Urn Models and Their Applications. Wiley, 1977.
Valentin F. Kolchin, Boris A. Svast’yanov, and Vladimir P. Christyakov. Random Allocations. V H. Winston & Sons, 1978.
Marc Langheinrich, Friedemann Mattern, Kay Römer, and Harald Vogt. First Steps Towards an Event-Based Infrastructure for Smart Things. Ubiquitous Computing Workshop (PACT 2000), October 2000.
Ching Law, Kayi Lee, and Kai-Yeung Siu. Efficient Memoryless Protocol for Tag Identification. In Proceedings of the 4th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, pages 75–84. ACM, August 2000.
Rajeev Motwani and Prabhakar Raghavan. Randomized Algorithms. Cambridge University Press, 1995.
Fred S. Roberts. Applied Combinatorics. Prentice-Hall, 1984.
Kay Römer. Smart Playing Cards-A Ubiquitous Computing Game. Workshop on Designing Ubiquitous Computing Games, Ubicomp, 2001.
Frits C. Schoute. Control of ALOHA Signalling in a Mobile Radio Trunking System. In International Conference on Radio Spectrum Conservation Techniques, pages 38–42. IEE, 1980.
Frits C. Schoute. Dynamic Frame Length ALOHA. IEEE Transactions on Communications, COM-31(4):565–568, April 1983.
Wojciech Szpankowski. Packet Switching in Multiple Radio Channels: Analysis and Stability of a Random Access System. Computer Networks: The International Journal of Distributed Informatique, 7(1):17–26, February 1983.
K. Takaragi, M. Usami, R. Imura, R. Itsuki, and T. Satoh. An Ultra Small Individual Recognition Security Chip. IEEE Micro, 21(6):43–49, 2001.
Roy Want, Kenneth P. Fishkin, Anuj Gujar, and Beverly L. Harrison. Bridging Physical and Virtual Worlds with Electronic Tags. In Proceeding of the CHI 99 Conference on Human Factors in Computing Systems: the CHI is the Limit, pages 370–377. ACM Press, 1999.
Jeffrey E. Wieselthier, Anthony Ephremides, and Larry A. Michaels. An Exact Analysis and Performance Evaluation of Framed ALOHA with Capture. IEEE Transactions on Communications, COM-37,2:125–137, 1989.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Vogt, H. (2002). Efficient Object Identification with Passive RFID Tags. In: Mattern, F., Naghshineh, M. (eds) Pervasive Computing. Pervasive 2002. Lecture Notes in Computer Science, vol 2414. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45866-2_9
Download citation
DOI: https://doi.org/10.1007/3-540-45866-2_9
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44060-4
Online ISBN: 978-3-540-45866-1
eBook Packages: Springer Book Archive