ArticlePDF Available

Energy Efficient Tag Identification Algorithms For RFID: Survey, Motivation And New Design

Authors:

Abstract and Figures

RFID is widely applied in massive tag based applications, thus effective anti-collision algorithms to reduce communication overhead are of great importance to RFID in achieving energy and time efficiency. Existing MAC algorithms are primarily focusing on improving system throughput or reducing total identification time. However, with the advancement of embedded systems and mobile applications, the energy consumption aspect is increasingly important and should be considered in the new design. In this article, we start with a comprehensive review and analysis of the state-of-the-art anti-collision algorithms. Based on our existing works, we further discuss a novel design of anti-collision algorithm and show its effectiveness in achieving energy efficiency for the RFID system using EPCglobal C1 Gen2 UHF standard.
Content may be subject to copyright.
1536-1284/19/$25.00 © 2019 IEEE IEEE Wireless Communications • Accepted for Publication
1
AbstrAct
RFID is widely applied in massive tag based
applications, thus effective anti-collision algorithms
to reduce communication overhead are of great
importance to RFID in achieving energy and time
efficiency. Existing MAC algorithms are primarily
focusing on improving system throughput or reduc-
ing total identification time. However, with the
advancement of embedded systems and mobile
applications, the energy consumption aspect is
increasingly important and should be considered
in the new design. In this article, we start with a
comprehensive review and analysis of the state-
of-the-art anti-collision algorithms. Based on our
existing works, we further discuss a novel design of
anti-collision algorithm and show its effectiveness
in achieving energy efficiency for the RFID system
using EPCglobal C1 Gen2 UHF standard.
IntroductIon
The Internet of Things (IoT) is an emerging appli-
cation of Internet and traditional telecommunica-
tion networks, which allows embedded objects
to implement interconnection and interopera-
bility. Radio frequency identification (RFID),
which is a key technology to enable Internet of
Things (IoT), can identify objects automatically
by employing wireless communication. Typical-
ly, an RFID system includes tags, a reader and
back-end systems. A tag is made up of antenna,
coupling component, and microchip. Enclosed in
an adhesive sticker, every tag is attached to an
item with a unique identifier (UID). The reader
initializes an identification process by broadcast-
ing a query command. After receiving the query
command, the tags in the vicinity respond to
the reader with their IDs. Accordingly, RFID can
identify multiple items without line of sight and
easily map the physical world to the cyber world.
According to the power supply mode, an RFID
tag can be categorized as either a passive or
active tag. A passive tag with small size and low
cost has no onboard power supply, its operating
energy is from the continuous wave transmitted
by the reader. Thus, the transmission distance is
quite limited. In contrast, an active tag has an
internal battery to provide energy for the micro-
chip and ensure communication between tag
and reader. The potential transmission range can
thus reach several hundred meters. However,
the production cost is high, and the service life-
time is short because the battery needs to be
periodically replaced.
RFID drives many IoT applications. For exam-
ple, by accurately tracking a good expiry date or
item leakage, RFID can help reduce waste and
energy consumption in operations ranging from
monitoring to packaging and refrigeration, which in
turns enables more extensive deployment of RFID
systems [1]. With a future trend to integrate RFID
into IoT system, the format of the reader may not
necessarily be a fixed device. A mobile reader or
even battery powered wireless sensor nodes can
be enabled as reader devices. Thus, energy effi-
ciency is an important metric to evaluate the over-
all performance of RFID systems [2-4]. An energy
efficient RFID protocol can prolong the operating
lifetimes of readers and tags (if they are active) and
promote the growth of green RFID and its various
applications that have been envisioned. In order to
achieve that, the reader needs to adopt an ener-
gy-efficient anti-collision algorithm to optimize tag
cardinality (the number of unread tags) estimation,
adaptively modulate transmission power level, and
reduce tag collision and eavesdropping, etc. [4]. In
this article, we survey the state-of-the-art anti-col-
lision algorithms and demonstrate our effort in
developing an energy efficient RFID anti-collision
algorithm.
Existing RFID anti-collision solutions can be
mainly divided into Aloha-based [5-6] and tree-
based. A tree-based [7] algorithm is especially
operated by recursively dividing the contending
tags into smaller groups until each group contains
up to one tag. An Aloha-based algorithm employs
a frame structure that contains a certain number
of time intervals (called time slots) per frame, and
tags randomly pick up a time slot to respond to the
reader using their IDs. These previous works pay
more attention to improving system throughput
or reducing identification time rather than ener-
gy consumption. For a static or fixed reader with
power supply, identification time is more important
when a number of tagged items need to be identi-
fied in a continuous scanning manner. However, in
many scenarios like inventory control where a por-
table or mobile reader with limited power is widely
used, the energy consumption is critical, especially
when periodic scanning is needed. Lower energy
consumption can maintain a longer service time
and avoid frequent recharging or replacement.
In the following sections, we start with a review
of various types of anti-collision mechanisms. Fur-
Jian Su, Zhengguo Sheng, Victor C. M. Leung, and Yongrui Chen
E E T I A
F RFID: S, M A N D
ACCEPTED FROM OPEN CALL
Jian Su is with Nanjing University of Information Science and Technology; Zhengguo Sheng is with the University of Sussex;
Victor C. M. Leung is with the University of British Columbia; Yongrui Chen ias with University of Chinese Academy of Sciences.
Digital Object Identifier:
10.1109/MWC.2019.1800249
IEEE Wireless Communications • Accepted for Publication 2
thermore, in order to achieve energy efficiency and
reduce the computational complexity, we present
an anti-collision solution called an Energy-Aware
Frame Adjustment Strategy (EAFAS) based algo-
rithm. The proposed algorithm integrates the
low-cost estimation method, adaptive frame
size calculation strategy and efficient frame size
adjustment policy. To be specific, the presented
algorithm ascertains the optimal frame size based
on both estimated tag cardinality and energy effi-
ciency of RFID system. Moreover, the proposed
in-frame mechanism can also end the improper
frame in advance. The remainder of the article is
organized as follows. The next section reviews and
analyzes the mainstream anti-collision strategies for
RFID systems. Then we discuss the existing ener-
gy-efficient RFID algorithms. A newly energy-effi-
cient anti-collision algorithm is then described.We
then illustrate the performance results. Finally, we
conclude the article.
summAry of AntI-collIsIon AlgorIthms In rfId
With consideration of cost and implementation
complexity, the time-division multiple access
(TDMA) solutions have been mainly used in RFID
systems. That is, each tag occupies the channel
in a separated time interval and communicates
to the reader. The TDMA based solutions can be
divided into Aloha-based and tree-based algo-
rithms which can be further divided into binary
splitting and query tree. A comparison of various
solutions is shown in Table 1.
AlohA-bAsed AlgorIthms
Aloha-based algorithms can be divided into three
types, namely Pure Aloha (PA), Slotted Aloha (SA)
and Framed Slotted Aloha (FSA). Among them,
Dynamic FSA (DFSA) has been widely used in
UHF RFID. The DFSA algorithm is characterized
by the strategy to adapt the frame size along
the identification process [6]. The principle of
the DFSA algorithm is to divide time into several
frame segments, each of which consists of a num-
ber of time slots. A tag responds to the reader
with its ID when it receives a query command
specifying the parameter F (F corresponds to the
number of slots per frame). There are three pos-
sible states in a time slot: single response (single-
ton slot), no response (empty slot), and multiple
responses (collision slot). After reading a frame,
the reader needs to make full use of probabilistic
or statistical methods to estimate the cardinality.
Therefore, the Aloha-based algorithms can also be
called probabilistic algorithms.
The performance of DFSA depends on both
the cardinality (the number of remaining tags) esti-
mation and the setting of the frame size. For a par-
ticular frame, the system throughput is calculated
as the number of identified tags over the frame
size. Specifically, the maximum system throughput
0.368 is attained asymptotically when the frame
size is equal to the number of tags to be identi-
fied [5]. In order to improve the performance of
DFSA, most previous solutions [5-6] require vast
computational costs so that the accuracy of esti-
mation can be ensured. However, most handheld
RFID readers in practice are computation con-
strained due to their low-cost hardware structure
such as single-core microprocessor. Consequently,
anti-collision algorithms with complex estimation
are inefficient in terms of time or energy efficien-
cy. Recently, a number of energy-efficient DFSA
algorithms have been proposed for the purpose
of reducing computational overhead. The litera-
ture [9] presented an anti-collision protocol that
depends on one examination of frame size at a
specific time slot during each identification round.
The authors in [18] introduced an Improved Linear-
ized Combinatorial Model (ILCM) to estimate the
cardinality with modest calculation cost. However,
its performance fluctuates sharply with the number
of tags. In [10], the authors presented a FuzzyQ
method that integrates fuzzy logic with a DFSA
algorithm. A fuzzy rule based system is defined to
model the frame size and the collision rate with
fuzzy sets to adaptively calculate frame size. How-
ever, the performance of FuzzyQ needs to be fur-
ther improved.
ere are three pos-
sible states in a time
slot: single response
(singleton slot), no
response (empty slot),
and multiple responses
(collision slot). Aer
reading a frame, the
reader needs to make
full use of probabilistic
or statistical methods
to estimate the cardi-
nality. erefore, the
Aloha-based algorithms
can also be called
probabilistic algorithms.
TABLE 1. The Characteristics of various anti-collision algorithms.
Categories Methods No Tag
starvation
Good
stability
High
throughput
Low
complexity
Energy
efficient
Compatible
to UHF
standard
DFSA
MAP [5] ü ü
ILCM [10] ü ü
EACAEA [9] ü ü
FuzzyQ [11] ü ü ü
SUBF-DFSA [12] ü ü ü ü
ds-DFSA [14] ü ü ü ü
EAFSA ü ü ü ü ü
QT
CT [7] ü ü ü ü
MQT [13] ü ü ü
BS
BS [15] ü ü ü ü
ISE-BS [15] ü ü ü ü
IEEE Wireless Communications • Accepted for Publication
3
The overall feature of the Aloha-based algo-
rithms is easy to implement. The reader can sta-
tistically analyze the distribution of tags within the
frame thereby estimating the number of unread
tags. The disadvantages are the tag starvation prob-
lem and high complexity in tag cardinality estima-
tion. The tag cardinality estimation methods with
high complexity cause higher energy consumption
at the reader side.
Query tree AlgorIthms
In query tree (QT) algorithms, every tag is
assigned with a unique ID. The QT algorithm is
working as a virtual traversal tree. The depth is
defined as the number of branches from the root
node to the leaf node. Each branch is marked
with the method of “left 0 right 1.” The read-
er first sends a probe command with a prefix
0; tags with prefix ID 0 will transmit their IDs to
the reader. When a collision occurs, the read-
er iteratively divides the collided tags into two
subsets according the position of collided bits
of tags. The subsets become smaller until each
subset contains only one tag. Such algorithms
require a stack inside the reader to store the
query prefix information. The reader constantly
updates the query prefix based on the collision
bits and pushes the query prefix onto the stack
until the stack is empty. The current research
on the QT algorithm focuses on how to use the
collision information to update the query prefix.
The authors in [7] presented a collision tree (CT)
algorithm that generates prefix and splits collid-
ed tags according to the first collided bit. M-ary
Query Tree (MQT) has been proposed in [13],
by forming an M-ary traversal tree instead of a
binary traversal tree for collided tags. Although
the number of probed slots is reduced, the com-
munication overhead is increased by containing
both a mapped M-bits string and ID sequence.
Compared to Aloha-based algorithms, QT algo-
rithms use the tag ID to separate the collided tags.
Hence, they are deterministic in nature and not
suffering from the tag starvation problem. How-
ever, QT algorithms require a large number of
reader queries and tag responses, and rely on col-
lided responses to determine subsequent queries,
which causes higher energy consumption at both
the reader and tags (if the active tags are used).
Also, QT algorithms require strict synchronization
of the date responded by multiple tags. Therefore,
its application is limited and it is difficult to apply to
UHF RFID systems.
bInAry splIttIng AlgorIthms
Binary splitting (BS) algorithms were original-
ly developed for random access networks. The
BS algorithm continuously divides a collided
tag set into smaller subsets by using a random
binary number. Essentially, a BS algorithm also
belongs to a probabilistic algorithm because it has
a strong randomness. It has been widely used in
the ISO/IEC 18000-6B standard. Different from
the Aloha-based algorithm, contending tags in
the BS will be repeatedly divided into groups until
each group owns only one tag. Compared to Alo-
ha-based algorithms, BS algorithms are insensitive
to tag cardinality because when the tag number
is increased, the system throughput is almost
converged to a constant value. Although the BS
approach can tackle tag starvation, it has relative-
ly long identification latency due to the splitting
procedure starting from a single set with all tags.
Moreover, such an algorithm always uses a tag ID
to perform collision arbitration, and hence reduc-
es the time efficiency.
exIstIng energy-effIcIent
AntI-collIsIon AlgorIthms
dfsA AlgorIthms wIth
low cost estImAtIon And sub-frAme observAtIon
In most RFID application scenarios, the reader
needs to estimate the cardinality accurately to
maximize the system throughput. Previous works
focus on how to improve the estimation accu-
racy at the end of the frame, then update the
frame size accordingly [5–6, 8]. If the foregoing
frame size is improper, the accumulated estima-
tion error will degrade the whole performance.
Moreover, the estimation with high complexity
will consume more energy. In [11], we proposed
a sub-frame based algorithm (SUBF-DFSA) to
overcome the accumulated estimation error.
Specifically, the tag cardinality is estimated
based on the linear relation between the empty
and collision slot statistically counted in a sub-
frame. Since the computational complexity of
the estimation is reduced, the energy efficiency
of SUBF-DFSA can be improved compared to
the estimation methods with high complexity.
However, since the usage of empirical correla-
tion is not based on theoretical calculation, the
accuracy of estimation is not sufficient. In [12],
we further proposed a two-phase anti-collision
algorithm called detected sector based DFSA
(ds-DFSA) to enhance the identification perfor-
mance. The ds-DFSA algorithm effectively uses
empty, singleton and collision statistics in an
early observation phase to recursively determine
an optimal frame size. After that, the simple
calculation is used to estimate the number of
concurrent tags contained in each collision slot
nave. Then, the frame size for each collision slot
is obtained as the closest power-of-two value to
nave. Benefiting from such divide-and-conquer
frame size assignment and low-cost estimation
strategy, both time and energy efficiency have
been improved. Moreover, due to the require-
ment of a new command, modification to the
existing UHF RFID standard is needed for the
proposed algorithm, thus making it difficult to be
implemented in off-the-shelf RFID systems.
bs AlgorIthm wIth Idle slots elImInAtIon
In BS-based algorithms, a single set is usually
formed in concurrent tags. If a collision is detect-
ed, the reader will repeatedly divide the collided
tag set into multiple subsets and resolve them one
by one. Although BS-based solutions are robust to
tag starvation, its latency is high due to the large
number of concurrent tags involved in each col-
lision response. Moreover, the tag ID is used for
collision arbitration in BS-based solutions, which
increases the total collision arbitration time and
wastes the energy consumption. In [14], by elim-
inating the empty slots, we presented a binary
splitting protocol (ISE-BS) to enhance the perfor-
mance of the RFID system. The ISE-BS algorithm
Compared to Alo-
ha-based algorithms,
QT algorithms use the
tag ID to separate the
collided tags. Hence,
they are determinis-
tic in nature and not
suffering from the tag
starvation problem.
However, QT algo-
rithms require a large
number of reader que-
ries and tag responses,
and rely on collided
responses to determine
subsequent queries,
which causes higher
energy consumption
at both the reader and
tags (if the active tags
are used).
IEEE Wireless Communications • Accepted for Publication 4
is a variant of binary splitting by means of intro-
ducing 1-bit Q signal to pre-split contending tags
set. Since the empty slots in the splitting process
and the time duration used for collision arbitra-
tion are eliminated, the performance of ISE-BS
can be improved on the basis of time and energy
efficiency.
Although the above discussed algorithms can
improve the energy efficiency to some extent,
they are unable to optimize the frame size set-
ting according to the energy consumption. In the
following, an improved anti-collision algorithm is
proposed to overcome these drawbacks. The pro-
posed algorithm aims at achieving both robust esti-
mation with low-cost and energy efficient frame
size setting.
A new desIgn of
energy effIcIent IdentIfIcAtIon strAtegy
tAg cArdInAlIty estImAtIon
In order to guarantee the estimation accuracy,
here we also refer to the maximum a posteriori
probability (MAP) [5] method to calculate the
tag cardinality based on feedback from a sub-
frame. Although MAP can achieve an accurate
estimation, its high computational overhead hin-
ders its application in low-cost RFID platforms
such as a handheld reader. In the proposed
estimation method, we design look-up tables
(LUT) to pre-store intermediate variables of
estimation results. Restricted by the sub-frame
size and the item quantity in the tables, the pro-
posed estimation strategy is space-efficient and
implementable. Considering n tags allocated in F
slots, the probability that an empty slot occurs e
times, singleton slot occurs s times, and collision
slot occurs c times in a sub-frame Fsub can be
expressed as P(n|e, s, c) by using multinomial
distribution, that is
P(n|e,s,c)=F
sub
!
e!s!c!
P
i
e
P
s
s
P
c
c
(1)
The tag cardinality involved in a sub-frame is
determined when the value of P(n|e, s, c) is max-
imized. So, the estimation result in a sub-frame is
^
nsub. Then the estimated cardinality involved in the
full frame is calculated as
^
nest = ^
nsub · (F/Fsub) (2)
The recommendation setting of Fsub can be
referred to [12].
AdAptIve frAme sIze cAlculAtIon
Traditionally, most existing DFSA algorithms set
the frame size as the proximal value of the esti-
mated tag cardinality with the aim of maximizing
the system throughput [9, 11, 12, 15]. However,
such frame size setting strategy is only applied
when equal time duration for each slot type is
assumed. The EPCglobal C1 Gen2 UHF RFID
standard specifies different duration for empty,
singleton, and collision slots, defined as Te, Ts, and
Tc, respectively. Therefore, the traditional system
throughput is not an appropriate metric to eval-
uate the performance of the RFID anti-collision
algorithm. Moreover, such metric does not con-
sider the energy consumption. Unlike the pre-
vious DFSA algorithms, the proposed algorithm
calculates the frame size by maximizing the ener-
gy efficiency, which can be defined as
η
effi
=S(P
RT
+P
Rr
)T
EPC
[ ]
T
total
P
Rt
+T
received
P
Rr
+E
est
(3)
wherein S and C denote the number of singleton
slots and collision slots, respectively. TS, TRN16, and
TEPC denote the time duration of a singleton slot,
a 16-bits random number and a EPC (UID). Ttotal
denotes the required time for a whole identifica-
tion process. Treceived denotes the receiving time
duration of the reader for identifying all tags. PRt
and PRr represent the transmitting and receiving
power of the reader when it communicates with
tags, respectively. Eest is the energy consumption
during the tag cardinality estimation process. If
the frame size F is assumed large enough, the
probability distribution of r tags allocated in a slot
can be approximated as a Poisson distribution
with mean l = n/F. Then S, C, Treceived and Ttotal
can be approximated as the functions of the tag
number n and frame size F. By maximizing Eq. 1,
the value of l corresponding to the different time
parameters can be derived. The optimal frame
size can be determined by the estimated tag car-
dinality nest and l.
frAme sIze Adjustment strAtegy
The general frame size adjustment strategy can
be divided into three categories. First is Frame-by-
Frame (FbF) [5, 8] in which the reader calculates
a new frame size in the last slot of the current
frame. The FbF strategy is not efficient when the
frame size (the number of slots within the frame)
is far away from the number of tags. Second is
Slot-by-Slot (SbS) in which the reader calculates
the new frame size at every slot in the current
frame. The SbS strategy suffers from a rather high
complexity. Finally, the sub-frame solution pro-
vides the flexibility of ending the current frame
in advance to maintain the performance stability
with a reduced computational complexity. Third is
Point-by-Point (PbP) in which the reader chooses
some particular slots within the frame, referred to
as the point in the presented works [9, 11, 12].
The reader updates the frame size at the point
which is usually set as a fraction of the current
frame. In our proposed algorithm, we adopt a
hybrid strategy combining sub-frame observation
and SbS. At every slot, the reader keeps track of
the relation between E and C, and then the read-
er will reset the sub-frame size if the difference
value between E and C is above the threshold
value. After the reading of Fsub slots, the reader
estimates the tag cardinality and updates the new
frame size for the next identification round. Then
the reader computes the energy efficiency heffi1
and heffi2 with the current frame size and the new
frame size, respectively. The reader ends the cur-
rent frame and enables the new frame only if
heffi1 < heffi2. Otherwise, the reader will continue
reading the next slot in the current frame. The
identification process continues until no collision
occurs. According to the hybrid frame size adjust-
ment strategy, the algorithm can achieve a better
and stable performance.
By combining tag cardinality estimation and
adaptive frame size calculation, the Energy-Aware
Frame Adjustment Strategy (EAFAS) based algo-
e traditional system
throughput is not an
appropriate metric to
evaluate the perfor-
mance of the RFID
anti-collision algorithm.
Moreover, such metric
does not consider the
energy consumption.
Unlike the previous
DFSA algorithms, the
proposed algorithm
calculates the frame
size by maximizing the
energy efficiency.
IEEE Wireless Communications • Accepted for Publication
5
rithm is proposed. The flowchart of the EAFAS is
described in Fig. 1.
evAluAtIon dIscussIon
This section evaluates the performance of the
EAFAS algorithm in metrics, system throughput
and energy efficiency, and compares it with state-
of-the-art methods including MAP [5], ILCM [8],
EACAEA [9], FuzzyQ [10], and SUBF-DFSA [11].
Simulation scenarios with a reader and a various
number of tags have been evaluated using MAT-
LAB, where the tags are uniformly distributed
in the reader vicinity so that all tags can receive
the reader’s command. In our simulations, the
tag number is chosen between 100 and 1000.
This article mainly focuses on the MAC layer,
whereas the physical layer effects are not consid-
ered [8–12, 14]. To reduce the randomness and
ensure the convergence, the simulation results
are averaged over 1000 iterations. The parame-
ters used in the MATLAB simulation are listed in
Table 2, which are aligned with the EPCglobal C1
Gen2 UHF RFID and commercial Impinj solution
specifications.
Figure 2a compares the system throughput
of various algorithms. The number of tags varies
between 5 and 100. The frame size is initialized
as 16. As can be observed from Fig. 2a, the pro-
posed EAFAS achieves more stable performance,
especially when the number of tags increases. Such
an improvement is due to the reasons that the pro-
posed estimation strategy can obtain the accurate
result and the proposed frame setting mechanism
can ease estimation error, which in turn reduc-
es the total number of slots. The performance of
MAP and ILCM are very close because their frame
size adjustment is based on the same estimation
derived from a full frame. In contrast, the EACAEA,
FuzzyQ and SUBF-DFSA adopt the PbP strategy
to adjust the frame size. Thus, they can provide
more stable performance than the previous two
algorithms. Figure 2b plots the system throughput
when the tag number ranges between 100 and
1000. The frame size is also initialized as 16. By
comparing both Figs. 2a and 2b, most algorithms
show discrepant performance. For example, the
average system throughput of SUBF-DFSA is lower
than MAP, ILCM and EACAEA when the number
of tags is between 5 and 100. As the number of
tags increases, the impact of the initial frame on sys-
tem throughput will be weakened. The SUBF-DFSA
algorithm is capable of interrupting inappropriate
frames through PbP observation for achieving a
considerable performance improvement. Since the
frame size can be adaptively adjusted to a different
tag cardinality, the EAFAS can always hold the best
system throughput compared to other algorithms.
To further compare the performance of the
EAFAS to other methods, a 95 percent confi-
dence interval of system throughput for various
algorithms is summarized in the Table 3. As can
be observed, the lower bound of the EAFAS is
even higher than the upper bound of MAP, ILCM,
EACAEA, and FuzzyQ at any number of simulation
runs. Therefore, we believe our proposed method
shows robust performance under different simula-
tion runs.
For the purpose of evaluating the energy
consumption of anti-collision algorithms, Fig. 3
shows the energy efficiency of various algo-
rithms. We can observe from Fig. 3a, the curves
of all algorithms fluctuate when the number of
tags is small. As the number of tags is above 50,
their performance becomes more stable; this is
especially true when the number is above 100
in Fig. 3b. When the number of tags is close to
the initial frame size, all algorithms can achieve
the highest performance. However, with a con-
tinuing increase of tag numbers, all algorithms
show deteriorating performance because of the
extra slots used to estimate the unread tags. It
is also noted that energy efficiency depends on
both identification time and estimation complexi-
ty; the proposed EAFAS is the only algorithm that
can maintain good performance in both through-
put and energy efficiency. Moreover, since our
FIGURE 1. The flowchart of the proposed algo-
rithm.
Reader broadcasts
Query/QueryAdj (F,Fsub)
Tag response
E=E+1
slot_index++
C=C+1
slot_index++
Identify the tag
S=S+1
slot_index++
E-3.2C/ threshold or
E-0.6C/-threshold
Fsub=slot_index
slot_index F
Slot_index==Fsub
effi1<effi2
Compute effi1and effi2
Is C==0?
Identification ends
Y
N
Y
N
Y
N
Y
N
Y
N
singleton
collision
empty
estimates tag cardinality
TABLE 2. The Parameters used in MATLAB simu-
lation.
Parameters Value Parameters Value
R->T modulation DSB-ASK T->R modulation FM0
R->T preamble
(ms) 312. 5 T->R preamble
(ms) 150
R->T frame-syns
(ms) 237.5 BLF (kHz) 40
Tari (ms) 25 Data rate (kb/s) 40
DR 8 M 1
Iteration times 1000 T1 (ms) 250
TRcal (ms) 200 T2 (ms) 100
RTcal (ms) 75 T3 (ms) 50
RN16 (ms) 550 EPC (ms) 3350
e SUBF-DFSA algo-
rithm is capable of
interrupting inappropri-
ate frames through PbP
observation for achiev-
ing a considerable
performance improve-
ment. Since the frame
size can be adaptively
adjusted to a different
tag cardinality, the
EAFAS can always
hold the best system
throughput compared
to other algorithms.
IEEE Wireless Communications • Accepted for Publication 6
FIGURE 2. Comparison of system throughput under various algorithms.
0 20 40 60 80 100
0.26
0.28
0.3
0.32
0.34
0.36
0.38
0.4
Number of tags
System throughput
MAP
ILCM
EACAEA
FuzzyQ
SUBF-DFSA
EAFAS
100 200 300 400 500 600 700 800 900 1000
0.3
0.31
0.32
0.33
0.34
0.35
0.36
Number of tags
System throughput
MAP
ILCM
EACAEA
FuzzyQ
SUBF-DFSA
EAFAS
TABLE 3. The 95 percent confidence interval of system throughput for various algorithms.
Algorithms
MAP ILCM EACAEA FuzzyQ SUBF-DFSA EAFAS
ST
100 0.336~0.345 0.314~0.330 0.335~0.339 0.309~0.315 0.344~0.352 0.350~0.356
200 0.335~0.342 0.319~0.333 0.334~0.339 0.309~0.317 0.345~0.352 0.349~0.355
300 0.336~0.344 0.319~0.332 0.334~0.339 0.309~0.317 0.344~0.351 0.349~0.355
400 0.336~0.344 0.319~0.332 0.334~0.339 0.309~0.315 0.344~0.351 0.350~0.356
500 0.336~0.344 0.319~0.332 0.334~0.338 0.309~0.315 0.345~0.351 0.349~0.355
600 0.336~0.344 0.319~0.331 0.335~0.339 0.308~0.317 0.345~0.351 0.350~0.355
700 0.336~0.343 0.319~0.331 0.335~0.339 0.310~0.317 0.345~0.351 0.350~0.355
800 0.336~0.344 0.319~0.332 0.334~0.338 0.310~0.317 0.345~0.351 0.349~0.355
900 0.336~0.344 0.319~0.332 0.335~0.338 0.309~0.316 0.344~0.351 0.349~0.355
1000 0.336~0.344 0.319~0.332 0.335~0.339 0.308~0.316 0.345~0.351 0.349~0.355
FIGURE 3. Comparison of energy efficiency under various algorithms.
0 20 40 60 80 100
0.45
0.46
0.47
0.48
0.49
0.5
0.51
Number of tags
Energy efficiency
MAP
ILCM
EACAEA
FuzzyQ
SUBF-DFSA
EAFAS
100 250 400 550 700 850 100
0
0.45
0.46
0.47
0.48
0.49
0.5
0.51
Number of tags
Energy efficiency
MAP
ILCM
EACAEA
FuzzyQ
SUBF-DFSA
EAFAS
IEEE Wireless Communications • Accepted for Publication
7
presented solution is based on the EPCglobal C1
Gen2 standard, it is compatible with most hard-
ware platforms, thus saving cost.
conclusIon
This tutorial has discussed energy efficient
RFID anti-collision algorithms regarding design
concept and analysis, especially on the perfor-
mance of the MAC layer. We have mainly ana-
lyzed and compared the performance of system
throughput and energy consumption of various
anti-collision algorithms. In our view, our pro-
posed EAFAS solution makes RFID capable of
adapting to energy-aware scenarios and meet-
ing future green IoT application requirements of
energy efficiency and high system throughput.
The acquired new insights on MAC performance
could also provide a precise guideline for the
efficient designs of practical and reliable RFID
communications systems. Hence, these results
will potentially have a broad impact across a
range of areas, including supply chain manage-
ment, inventory control, and asset tracking.
Acknowledgment
This work is supported by the National Natural
Science Foundation of China (No. 61802196); the
Natural Science Foundation of Jiangsu Province
(No. BK20180791); the Natural Science Foun-
dation of Jiangsu Higher Education Institutions
of China (No. 17KJB510036); and the Startup
Foundation for Introducing Talent of NUIST (No.
2243141701031). We would like to thank editor
Han-Chieh Chao and the anonymous reviewers
for their insights that improved the article signifi-
cantly.
references
[1] I. Bose and S. Yan, “The Green Potential of RFID Projects: A
Case-Based Analysis,” IT Professional, vol. 13, no. 1, 2011,
pp. 41–47.
[2] F. Shaikh, S. Zeadally, and E. Exposito, “Enabling Technolo-
gies for Green Internet of Things,” IEEE Systems J., vol. 11,
no. 2, 2017, pp. 983–94.
[3] R. Arshad et al., “Green IoT: An Investigation on Energy on
Energy Saving Practices for 2020 and Beyond,” IEEE Access,
vol. 5, 2017, pp. 15667–81.
[4] C. Zhu et al., “Green Internet of Things for Smart World,”
IEEE Access, vol. 3, 2015, pp. 2151–62.
[5] W. T. Chen, “An Accurate Tag Estimate Method for Improv-
ing the Performance of an RFID Anticollision Algorithm
Based on Dynamic Frame Length Aloha,” IEEE Trans. Auto-
mation Sci. and Eng., vol. 6, no. 1, 2009, pp. 9–15.
[6] B. Knerr et al., “Slot-Wise Maximum Likelihood Estimation of
the Tag Population Size in FSA Protocols,” IEEE Trans. Com-
mun., vol. 58, no. 2, 2010, pp. 578–85.
[7] X. Jia, Q. Feng, and L. Yu, “Stability Analysis of an Efficient
Anti-Collision Protocol for RFID Tag Identification,” IEEE
Trans. Commun., vol. 68, no. 6, 2012, pp. 2285–93.
[8] P. Solic, J. Radic, and N. Rozic, “Energy Efficient Tag Estima-
tion Method for Aloha-based RFID Systems,” IEEE Sensors J.,
vol. 14, no. 10, pp. 3637-3647, 2014.
[9] W. T. Chen, “Optimal Frame Length Analysis and an Effi-
cient Anticollision Algorithm with Early Adjustment of Frame
Length for RFID Systems,” IEEE Trans. Veh. Technol., vol. 65,
no. 5, 2016, pp. 3342–48.
[10] L. Arjona et al., “Fast Fuzzy Anticollision Protocol for the
RFID Standard EPC Gen-2,” Electron. Lett., vol. 52, no. 8,
2016, pp. 663–65.
[11] J. Su et al., “An Efficient Sub-Frame Based Tag Identification
Algorithm for UHF RFID Systems,” Proc. Intl. Conf. Com-
mun. (ICC 2016), 2016, pp. 1–6.
[12] J. Su et al., “An Effective Frame Breaking Policy for Dynam-
ic Framed Slotted Aloha in RFID,” IEEE Commun. Lett., vol.
20. no. 4, 2016, pp. 692–95.
[13] J. Shin, B. Jeon, and D. Yang, “Multiple RFID Tags Identifi-
cation with M-ary Query Tree Scheme,” IEEE Commun. Lett.,
vol. 17. no. 3, 2013, pp. 604–07.
[14] J. Su et al., “Idle-Slots Elimination Based Binary Splitting
Anti-Collision Algorithm for RFID,” IEEE Commun. Lett., vol.
20. no. 12, 2016, pp. 2394–97.
[15] C.-S. Lee, D.-H. Kim, and J.-D. Kim, “An Energy Efficient
Active RFID Protocol to Avoid Overhearing Problem,” IEEE
Sensor J., vol. 14, no. 1, 2014, pp. 15–24.
bIogrAphIes
Jian Su (sj890718@gmail.com) has been a lecturer in the School of
Computer and Software at the Nanjing University of Information
Science and Technology since 2017. He received his Ph.D. with
distinction in communication and information systems at the Uni-
versity of Electronic Science and Technology of China in 2016. He
holds a B.S. in electronic and information engineering from Hankou
University and an M.S. in electronic circuits and systems from Cen-
tral China Normal University. His current research interests cover
Internet of Things, RFID, and wireless sensors networking.
Zhengguo Sheng (Z.Sheng@sussex.ac.uk) has been a senior
lecturer in the Department of Engineering and Design at the
University of Sussex since 2015. He received his Ph.D. and M.S.
with distinction at Imperial College London in 2011 and 2007,
respectively, and his B.Sc. from the University of Electronic Sci-
ence and Technology of China (UESTC) in 2006. His current
research interests cover the Internet of Things (IoT), connected
vehicles, and cloud/edge computing.
Victor c. M . L eung (vleung@ece.ubc.ca) is an emeritus pro-
fessor of electrical and computer engineering at the University
of British Columbia. He has co-authored approximately 1200
technical papers in the areas of wireless networks and mobile
systems, in addition to 43 book chapters and 14 book titles.
He is a Fellow of the Royal Society of Canada, the Canadian
Academy of Engineering, Institute of Electrical and Electronics
Engineers (IEEE), and the Engineering Institute of Canada.
Yongrui c hen (chenyr@ucas.ac.cn) has been an associate pro-
fessor in the Department of Electronical, Electrical and Commu-
nication Engineering at the University of Chinese Academy of
Sciences (UCAS) since 2014. He received his Ph.D. at UCAS in
2011, his M.S. at Tsinghua University in 2007, and his B.Sc. from
Yanshan University in 2001. His current research interests cover
the Internet of Things (IoT) and heterogeneous wireless networks.
e acquired new
insights on MAC
performance could
also provide a pre-
cise guideline for the
efficient designs of
practical and reliable
RFID communications
systems. Hence, these
results will potentially
have a broad impact
across a range of areas,
including supply chain
management, invento-
ry control, and asset
tracking.
... In order to cope with the issue of tag collision, many efficient identification (tag anti-collision) algorithms/protocols have been proposed based on two main approaches: treebased and Aloha-based [12], [13]. Aloha-based protocols reduce the likelihood of tag collisions by distributing tag responses over time (frame). ...
... Since there are two tags responding, a collision may happen, and if so, the reader broadcasts another Collect command followed by two collecting slots until both of the two relevant tags are identified. The reader may successfully collect the two IDs in the k-th trial with the probability of success (P succ (k)) given in (13). In each trial, one Collect command is used; thus, through k trials, the reader broadcasts k Collect commands. ...
Article
Full-text available
In this paper, we present a novel time-efficient tag identification protocol for active radio frequency identification (RFID) systems. Our protocol design is based on a conventional M -ary Detecting Tree (MDT) that divides contention tags into M subgroups and performs the identification in two phases: scanning and collecting. While the MDT protocol effectively eliminates redundant empty slots (i.e., slots without any tag responses), it requires two success slots (i.e., slots with exactly one tag’s response) to identify one tag, raising concerns about potential identification delays. We introduce an innovative anti-collision protocol called Enhanced M -ary Detecting Tree (EMDT) to address this issue. The proposed EMDT switches from the scanning phase to the collecting phase when the estimated number of responding tags becomes smaller than a predefined threshold, which is found via theoretical analysis and has an optimal value of three. This adjustment allows the reader to typically require just one success slot for identifying each tag, thus significantly reducing the total time needed to identify all tags. The proposed phase-switching mechanism is backed by Zero-Estimation (ZE) for tag cardinality estimation and Manchester encoding for data transmission, both widely employed in RFID standards. Theoretical analysis and computer simulations are performed in different system settings, including ideal and non-ideal transmission channels, to validate the efficacy of the proposed protocol in comparison with conventional alternatives.
... Due to several benefits such as (i) no initial connection setup and (ii) low delay for short packets etc., random access protocols are suitable for machine-type-communication devices. One well-known random access protocol is framed slotted ALOHA [1][2][3][4][5][6][7], which is especially suitable for unsophisticated devices due to its simplicity; besides, devices using the framed slotted ALOHA protocol has no sensing phase, which is a benefit from the perspective of energy consumption. The framed slotted ALOHA is considered in different real systems, for some examples, unmanned aerial vehicles [2], a radio frequency identification [3,4], and machine type communication networks [5][6][7]. ...
... One well-known random access protocol is framed slotted ALOHA [1][2][3][4][5][6][7], which is especially suitable for unsophisticated devices due to its simplicity; besides, devices using the framed slotted ALOHA protocol has no sensing phase, which is a benefit from the perspective of energy consumption. The framed slotted ALOHA is considered in different real systems, for some examples, unmanned aerial vehicles [2], a radio frequency identification [3,4], and machine type communication networks [5][6][7]. Time is partitioned into frames within the protocol utilizing framed slotted ALOHA. ...
Article
Full-text available
The framed slotted ALOHA is a suitable multiple access control (MAC) protocol for machine-type-communication devices due to (i) no initial setup overhead and (ii) low delay for small data. Directional wireless energy transfer can increase the radio frequency (RF) energy intensity in an intended direction to charge a device in a highly energy-efficient and low interference manner. However, when RF energy is transferred in a directional manner on the framed slotted ALOHA protocol, it is critical for the framed slotted ALOHA to determine which device is charged in an idle slot such that system throughput is increased as much as possible. This paper studies three charging selection policies for the framed slotted ALOHA, in which different acquisition ways of devices’ energy information are considered to select a device to be charged in an idle slot. Extensive simulation results show that the “dedicated slot based minimum residual energy first" policy outperforms the random selection policy which outperforms the “piggybacking information based minimum residual energy first" policy.
... The FA with dynamic frame has also been scrutinized for age improvement, wherein the AP extends the frame duration until all updates are recovered using SIC [23]. To address the instability issue in FSA, the Dynamic FSA (DFSA) has been proposed [24], [25]. In DFSA, the AP dynamically adjusts the frame length based on estimations of backlogged nodes in each frame, aiming to optimize throughput. ...
... With a slight abuse of notation, we useL t (l) = {(a,m a t ) : a ∈Â t | am a t = l} to deriveL t (l) in Proposition 1. Proof. Knowing I in (25) implies that |L ′ t | = n S . Furthermore, given that |L t | = l and |L ′ t | = n S , the probability of observing L ′ t depends on which specific sets of n S nodes out of l active nodes transmit successfully in frame t. ...
Article
Full-text available
Information aging has gained prominence in characterizing communication protocols for timely remote estimation and control applications. This work proposes an Age of Information (AoI)-aware threshold-based dynamic frame slotted ALOHA (T-DFSA) for contention resolution in random access machine-type communication networks. Unlike conventional DFSA that maximizes the throughput in each frame, the frame length and age-gain threshold in T-DFSA are determined to minimize the normalized average AoI reduction of the network in each frame. At the start of each frame in the proposed protocol, the common Access Point (AP) stores an estimate of the age-gain distribution of a typical node. Depending on the observed status of the slots, age-gains of successful nodes, and maximum available AoI, the AP adjusts its estimation in each frame. The maximum available AoI is exploited to derive the maximum possible age-gain at each frame and thus, to avoid overestimating the age-gain threshold, which may render T-DFSA unstable. Numerical results validate our theoretical analysis and demonstrate the effectiveness of the proposed T-DFSA compared to the existing optimal frame slotted ALOHA, threshold-ALOHA, and age-based thinning protocols in a considerable range of update generation rates.
... Slotted-ALOHA based protocols are beneficial for IoT devices to reduce the latency and signaling overhead of short packets [4]. A slotted-ALOHA based protocol, called framed slotted ALOHA [5], is deployed in practical wireless networks, for instance, low power wide area networks [6], radio frequency identification [7], and machine type communication networks [8,9]. In this protocol, time is divided into frames, and then each frame is further divided into time slots. ...
Article
Full-text available
This paper considers a wireless power transfer for framed slotted ALOHA in wireless powered Internet of Things (IoT) networks. Compared to devices in conventional networks, IoT devices might produce smaller packets which size might be hundreds of bits. That is, it is possible that packet size is smaller than a time slot. Given a constant slot time, as a packet is sent in a time slot, it is possible to leave residual time not being used. Thus, this paper proposes a residual time based energy harvesting scheme. In the proposed scheme, a base station utilizes the residual time in a time slot to send an RF charging signal, besides using entirely idle slots. Using the proposed scheme, devices can harvest more energy and then increase transmission rates. An analysis is developed to study the performances of the proposed residual time based energy harvesting scheme. Compared with a prior system where a base station sends RF charging signals merely in entirely idle time slots, numerical results show that the residual time based energy harvesting scheme produces a significantly higher mean transmission rate.
... The planning theory of using RFID technology for supply chain management to reduce marketing risks is to install electronic labels at the bottom of goods and conduct status management control and data tracking for goods in transit. At the same time, RFID has a strong energy saving ability, which can effectively reduce communication costs during transportation [20]. ...
Article
Full-text available
The overall economic development of today’s society is showing a downward trend. In the process of operating and marketing, enterprises are affected by various factors. After the marketing risk reaches a certain level, enterprises would encounter various risks such as blocked marketing plans and failure to meet the estimated marketing goals. Enterprise marketing is affected by economic and market risks such as lack of information, decision-making errors, natural disasters, human factors, and other natural and social risks. This article combined information technology with supply chain management, applied radio frequency identification (RFID) technology to supply chain management, and controlled enterprise marketing risks through reasonable management of the supply chain. It also compared the effectiveness of enterprise marketing risk control between an information technology intelligent supply chain combined with RFID and a supply chain managed by ordinary artificial structures. The experimental results showed that the highest value of goods loss rate in the supply chain based on RFID technology and using traditional technology was 5% and 15%, respectively, according to the sample of goods loss experiments. For the information verification process of goods in supply chain management, the information identification accuracy rates of barcode and RFID technology were 89.98% and 97.7%, respectively. Therefore, applying the information technology intelligent supply chain management model combined with RFID technology to enterprise marketing risk control can save money for enterprises, ensure product quality, and effectively reduce the risks encountered in enterprise marketing by reducing information gaps, and reducing transportation and storage costs.
Chapter
The incremental development of the Internet of Things (IoT) technologies and the rapid popularization of IoT based applications has promoted the rapid integration of edge computing and cloud computing into an innovation service paradigm, edge cloud service (ECS). As one of the most important technologies in IoT scenarios, radio frequency identification (RFID) has been widely used for object identification and tracking. Since RFID devices with limited resources are unable to process large amounts of data, it tends to employ ECS to address the issues of insufficient computing and storage resources. However, due to the diversity, uncertainty and dynamic of quality of service (QoS) in edge enabled cloud context, it brings well-known trust concern and has become one of the most challenging issues for RFID based application to adopt ECS. To this end, a novel trust management framework for RFID based application in edge enabled cloud context is proposed. Such a framework can facilitate RFID application developers to evaluate and choose a trustworthy ECS based on their specific QoS requirements. In addition, a trust level evaluation model is proposed, which can effectively evaluates the trust level of various ECSs based on dynamic QoS. The experimental result of a case study using a real-world dataset shows that the proposed framework can effectively evaluate the trust level of various ECSs with multiple and dynamic QoS attributes to improve the availability of RFID applications.
Article
Full-text available
The IoT is capable of connecting zillion of devices together on a huge scale, and it will continue to grow in the following years. The existing system is an integration of sensors on connected network collecting data onto the cloud through networking devices making purely dynamic, self-adapting, context free intelligent decision without human intervention. Therefore, there is an increase in the power consumption, cell congestion, signaling storms, truck rolls, communication delays in mass deployment of IoT devices and implement new technologies. There are several techniques of improving the IoT system. This paper stress on the using the concept of Green ecosystem as one of the techniques for components in IoT to sustain a Green IoT architecture.
Article
Full-text available
Internet of Things (IoT) is an emerging concept which aims to connect billions of devices with each other. The IoT devices sense, collect and transmit important information from their surroundings. This exchange of very large amount of information amongst billions of devices creates a massive energy need. Green IoT envisions the concept of reducing the energy consumption of IoT devices and making the environment safe. Inspired by achieving a sustainable environment for IoT, we first give the overview of green IoT and the challenges that are faced due to excessive usage of energy hungry IoT devices. We then discuss and evaluate the strategies that can be used to minimize the energy consumption in IoT like designing energy efficient datacenters, energy efficient transmission of data from sensors and design of energy efficient policies etc. Moreover, we critically analyze the green IoT strategies and propose 5 principles that can be adopted to achieve green IoT. Finally, we consider a case study of very important aspect of IoT, i.e., smart phones and we provide an easy and concise view for improving the current practices to make the IoT greener for the world in 2020 and beyond.
Article
Full-text available
Smart world is envisioned as an era in which objects (e.g., watches, mobile phones, computers, cars, buses, and trains) can automatically and intelligently serve people in a collaborative manner. Paving the way for smart world, Internet of Things (IoT) connects everything in the smart world. Motivated by achieving a sustainable smart world, this paper discusses various technologies and issues regarding green IoT, which further reduces the energy consumption of IoT. Particularly, an overview regarding IoT and green IoT is performed first. Then, the hot green information and communications technologies (ICTs) (e.g., green radio-frequency identification, green wireless sensor network, green cloud computing, green machine to machine, and green data center) enabling green IoT are studied, and general green ICT principles are summarized. Furthermore, the latest developments and future vision about sensor cloud, which is a novel paradigm in green IoT, are reviewed and introduced, respectively. Finally, future research directions and open problems about green IoT are presented. Our work targets to be an enlightening and latest guidance for research with respect to green IoT and smart world.
Article
Tag collision avoidance is critical to the success of data communications in radio frequency identification (RFID) system. This letter presents an efficient idle-slots elimination based binary splitting (ISE-BS) algorithm to improve the performance of the RFID system. In ISE-BS, by introducing 1-b random number Q and 16-b random number serial identifier, which are transmitted before data exchange, tag collisions can be informed and unnecessary data exchange between reader and tags can be further eliminated. Moreover, ISE-BS exploits Q to separate conflicting tags into 0-1 subsets randomly. Specifically, the tags in subset 0 will start to transmit in the next period, where the success flag signal reflects the immediate data transmission. The tags in subset 1 will wait in the pipeline. In such a way, the idle slots introduced by conventional binary splitting anti-collision algorithms can be removed with the schedule of ISE-BS. Extensive simulation results show that ISE-BS outperforms the existing proposed algorithms.
Article
A new methodology which integrates fuzzy logic with RFID anti-collision protocols is proposed. The resulting FuzzyQ protocol significantly decreases the identification time by updating the transmission frame size in a dynamic and adaptive way. Simulation results show the performance of FuzzyQ compared with earlier protocols based on the standard EPC Gen-2.
Article
The tag collision problem is considered as one of the critical issues in RFID system. To further improve the identification efficiency of an UHF RFID system, a frame breaking policy is proposed with dynamic framed slotted aloha algorithm. Specifically, the reader makes effective use of idle, successful, and collision statistics during the early observation phase to recursively determine the optimal frame size. Then the collided tags in each slot will be resolved by individual frames. Simulation results show that the proposed algorithm achieves a better identification performance compared with the existing Aloha-based algorithms.
Article
This paper proposes an efficient anticollision algorithm to improve the read performance of the EPCglobal UHF Class-1 Generation-2 RFID standard. Optimal frame length is one of the most important parameters to be adjusted in RFID anticollision algorithms. Hence, we first derive the optimal frame length by analyzing the maximum of normalized throughput and by taking into account the unequal time intervals of successful, collision, and empty slots. We find that the optimal frame length should be set to 1.89 times of the number of tags when the ratio between collision-slot duration and empty-slot duration is 5. The proposed anticollision algorithm is based on the mechanism of early adjustment of frame length and examines the fitness of frame lemgth only at an optimal time slot in each read round. The primary advantage of our algorithm is the ability to achieve a good compromise between computation complexity and throughput performance. The results show that the proposed method provides up to 400 tags/s read speed and can obtain 5-10 % time-saving efficiency as compared with typical dynamic framed slotted ALOHA.
Article
Recent technological advances have led to an increase in the carbon footprint. Energy efficiency in the Internet of Things (IoT) has been attracting a lot of attention from researchers and designers over the last couple of years, paving the way for an emerging area called green IoT. There are various aspects (such as key enablers, communications, services, and applications) of IoT, where efficient utilization of energy is needed to enable a green IoT environment. We explore and discuss how the various enabling technologies (such as the Internet, smart objects, sensors, etc.) can be efficiently deployed to achieve a green IoT. Furthermore, we also review various IoT applications, projects and standardization efforts that are currently under way. Finally, we identify some of the emerging challenges that need to be addressed in the future to enable a green IoT.
Article
Radio frequency identification (RFID) technology has become an important tool for items identification and tracking. Its rapid deployment in dynamic industry areas enables variety of new applications in behavioral analysis and processes automation. In such systems it is crucial to identify all RFID tags before they leave the interrogation area. To accomplish fast identification, it is necessary to estimate a number of tags which are in the reader interrogation area. In this paper, we revisit the problem of tag quantity estimate and adapting frame size of dynamic frame slotted ALOHA widely used as RFID medium access control mechanism. The main disadvantage in the implementation of the state-of-the-art estimation algorithms includes the number of required computations, along with the temporary storage of large numbers which appear before estimation. As a consequence, such algorithms are energy inefficient and may require specific computer architecture to support the calculus. In order to address stated issues, we present improved linearized combinatorial model algorithm for optimal frame size selection which, due to linear property of the estimator, allows significant reduction in the estimate computation with acceptable tradeoff in accuracy. Simulations analyze the required number of slots to identify tag population and the floating point operation costs required to compute estimate. In addition, to emphasize the importance of reducing computational cost, we give a case study which compares energy consumed by the mobile RFID reader processor to compute the estimate and its energy equivalent of the required radio front-end energy to identify tags.
Article
In this paper we describe an energy efficient protocol for active radio frequency identification (RFID) tags complying with the standard. The energy efficiency is a key requirement for the wider acceptance of the active RFID systems that use battery constrained tags. The existing active RFID protocols try to reduce energy consumption of tags by putting them into sleep mode when the reader is not interrogating. To start interrogation, a reader sends a special signal that wakes up its nearby tags in sleep mode. After wake up, a tag remains in active mode during the whole interrogation period until it receives a sleep command from the reader. However, the existing protocols do not consider ineffective energy consumption of tags during the interrogation period. Overhearing is a state of a tag in which it wastes energy for maintaining active RX state while there is no frame destined to it. According to our analysis, the amount of energy consumed by a tag due to overhearing is several times larger than that consumed for the effective communication. To eliminate overhearing, a tag has to know the time and the duration of its effective communication intervals in advance, and it has to maintain active mode only for those intervals while keeping sleep mode in other intervals of the interrogation period. But, a tag is hard to know the effective communication intervals in advance with the existing protocols. We propose Reservation Aloha for No Overhearing (RANO) that is designed to inform a tag of its effective communication intervals to eliminate overhearing problem in active RFID communication. We implement them on our own designed active RFID hardware to check its validity and efficiency. Using the hardware, the number of tags, the collection time of the tags and the data volume of the tags for the collection were varied in the performance test. The results show that RANO protocols saved the energy about several dozen times than the standard protocol when the number of tags- increases.