Parallel and distributed computation: numerical methods
Parallel and distributed computation: numerical methods
Fair end-to-end window-based congestion control
IEEE/ACM Transactions on Networking (TON)
Convex Optimization
An Enhanced Dynamic Framed Slotted ALOHA Algorithm for RFID Tag Identification
MOBIQUITOUS '05 Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
Collision avoidance in a dense RFID network
WiNTECH '06 Proceedings of the 1st international workshop on Wireless network testbeds, experimental evaluation & characterization
Anonymous cardinality estimation in RFID systems with multiple readers
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Anonymous cardinality estimation in RFID systems with multiple readers
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Hi-index | 0.00 |
A radio frequency identification (RFID) system consists of a set of readers and several objects, equipped with small computer chips, called tags. In a dense RFID system, where several readers are placed together to improve the read rate and correctness, readers and tags can frequently experience packet collision. A common approach to avoid collision is to use a distinct frequency channel for interrogation for each reader. Various multi-channel anti-collision protocols have been proposed for RFID readers. However, due to their heuristic nature, most algorithms may not fully utilize the achievable system performance. In this paper, we develop an optimization-based distributed randomized multi-channel interrogation algorithm, called FDFA, for large-scale RFID systems. For this purpose, we develop elaborate models for reader-to-tag and reader-to-reader collision problems. FDFA algorithm is guaranteed to find a local optimum of a max-min fair resource allocation problem to balance the processing load among readers. Simulation results show that FDFA has a significantly better performance than the existing heuristic algorithms in terms of the number of successful interrogations. It also better utilizes the frequency spectrum.