Professional Documents
Culture Documents
Abstract The advanced properties like low cost, increased locations cannot be avoided in dense networks. There exist
communication range, own battery source etc. preferred Radio various solutions to solve this problem but none of them
frequency identification (RFID) over bar codes for object concentrate on state of a device. RFID devices are resource
identification and tracking. In RFID systems, reader-to-reader, constraint devices thus there is fast consumption of stored
tag-to-tag, reader-to-tag collisions are major challenges during
energy with time in a dense network. The state-of-art anti-
object identification. The performance analysis of state-of-art
protocols shows that the majority of probabilistic and collision protocols concentrate on unique identification with
deterministic algorithms are inefficient. In this work, the collision resolution only rather than selecting the best suitable
proposed protocol uses simulated annealing mechanism which device which can efficiently reduce the collision and perform
concentrates on parameters of physical state of the RFID readers proper identification also. Simulated annealing is a
while selecting the reader for interrogation. If readers with best probabilistic technique for approximating the optimum
physical state are selected for interrogation then chances of solution from a universal set of solutions. Thus, it helps in
better network performance also increases. The physical state selecting the best reader for identification of tag with physical
parameters include energy efficiency, mobility, distance to tag state of readers taken into consideration. If best deices are
etc. The simulation analysis of proposed scheme shows better
selected everytime for identification then a major benefit of
performance with parameters like tag identification ratio, total
successful interrogation cycles, total time cycles, total IDLE improving the performance of RFID network is quite feasible.
cycles, total number of collisions, delay, and total number of There exist various parameters that can be used for measuring
packets sent and received. It is also observed that a collision free the performance of anti-collision protocols in RFID networks.
RFID network is possible with integration of simulated annealing These parameters are explained as follows.
mechanism. x Tag Identification Ratio (TIR): It is the ratio of the number
of identified tags to the total number of tags present in a
KeywordsRFID; simulated annealing; tag-to-tag collisions; given geographical location.
reader-to-reader collisions
x Total time cycles: Majority of reader and tag devices consist
I. INTRODUCTION of single transmitter and receiver unit. Thus, one tag can be
identified at a time only. An efficient anti-collision protocol
Radio Frequency identification (RFID) technology is popular
should identify maximum number of tag in minimum time
among various applications [1]-[3] like medical devices,
cycles.
patient monitoring system, supply chain management, military
services, authorization and access control etc. RFID x Total IDLE cycles: In IDLE cycles, a reader does not
technology provides wide range of communication at low cost identify the tag. This may be due to requirement of pre-
for reading multiple devices at same time thus, preferred over processing, collisions in previous cycle/s, device not ready,
bar codes. Among RFID devices, reader read the information ambiguity among reader to solve a collision etc. An anti-
from tags which are attached to products. The read collision protocol is considered to be efficient if it
information is stored in backend system for information minimizes the number of IDLE cycles.
processing [4][5]. In majority of application scenarios, RFID x Total successful interrogation cycles: In successfully
devices create a dense network where there is large number of interrogation cycle, a reader successfully identifies a tag. In
readers and tags present at one geographical location. Here, order to improvement the performance, a reader should
one reader tries to read multiple tags and tags contend to be maximize the number of successful interrogation cycles.
read by reader. As a result, chances of collisions among x Total collisions: Minimum collisions during interrogation
reader-to-reader, reader-to-tag or tag-to-tag increases cycles mean maximum performance. Thus, an anti-collision
drastically. In order to efficiently management the RFID protocol is developed to minimize the number of collisions.
network, proper identification of devices is important. On x Total Delay: Delay is directly proportional to time. If there
other hand, the presence of multiple readers or tags at random are more collisions then delay will automatically increase.
E
,
Parameters Value
d
Number of Readers 1000
<
Number of Tags 100000
d
Channel Type WirelessChannel
Radio Propagation Model TwoRayGround
W
Network Interface WirelessPhy EZ W
MAC Type 802.11
Figure 7: Comparative analysis of number of cycles required
Interface Queue Priority Queue for 100000 tags identification
Antenna OmniAntenna
>
E/>
Max Packets in Queue 50 ,
X dimension of the topography 1000 meters d
Data Rates 5 packets/second
W
Packet Size 512 bits EZ W
,
interrogation time may expire before tag identification.
E
d
>
<
,
d/Z
d d
<
d
EZ W
W
EZ
W
W
Figure 9: Comparative analysis of number of successful
interrogation cycles for identifying 100000 tags
Figure 6: Comparative analysis of TIR
>
E
reader increases the chances of presence of multiple readers at Figure 10: Comparative analysis of reader-to-reader collisions
same location but use of uniform channel distribution process
increases the chances of channels allocation. If waiting time is The comparative reader-to-reader collision analysis shows
small e.g. 5 msec. then readers frequently get the interrogation that the proposed scheme does not give provision for a
cycle which reduces the number of IDLE cycles and improves collision rather it sends a control message to wait until any
the performance also. channel gets free. As shown in Fig. 10, the proposed protocol
reduces reader-to-reader collisions with increase in number of to tag, distance to move, count of covering least number of
readers and it is same as other state-of-art protocols. obstacle free areas etc. These parameters are different from
However, other protocols may goes into IDLE state after tags which include energy efficiency, distance from selected
collision whereas the proposed protocol uses uniform channel reader and distance from obstacles. The network performance
allocation procedure which improves its performance. parameters like tag identification ratio, total successful
The comparative analysis of number of packets sent by interrogation cycles total time cycles, total IDLE cycles, total
readers show that the proposed protocol has lesser number of number of collisions, delay, and total number of packets sent
transmitted packets compared to other protocols as shown in and received show that the proposed protocol is better than
Fig. 11. The number of packets sent is lesser for proposed other protocols. Simulation of large network shows that the
scheme because it does not ask to re-send request after proposed protocol is suitable for dense network. Further, read-
collision rather put them on wait until channel get free. Further, to-reader collision analysis shows contiguous and uniform
increases in repeated requests increases the usage of channels channel distribution scheme give zero collision network.
which in-turn increases the collisions and decreases the
performance of other protocols. REFERENCES
[1]. $ .XPDU . *RSDO DQG $ $JJDUZDO Design and Analysis of
>
Lightweight Trust Mechanism for Secret Data using Lightweight
EW
d
[2]. A. Kumar, . *RSDO DQG $ $JJDUZDO A Novel Trusted Hierarchy
<
Construction for RFID-Sensor Based Secure Mobile Ad Hoc
d NETworkds 0$1(7V XVLQJ (UURU &RUUHFWLQJ &RGHV (&&V
Electronics Telecommunication Research Institute Journal (ETRI
Journal), vol. 37, iss. 1, pp. 186-196, 2015.
, Networking Conference, Kowloon, Hong Kong, pp. 1669-1672, March
Z
d
2007.
[9]. S.-W. Hung, J. Sum, Y.-f Huang, "Empirical analysis on the application
< of simulated annealing for RFID reader networks", IEEE Conference on
d Soft Computing in Industrial Applications 2008 (SMCia '08)., Muroran,
Japan, pp. 177 181, June 2008.
[10]. -7LDQ<)DQ<=KX.+X5),'UHDGHUDQWL-collision using chaos
W QHXUDO QHWZRUN EDVHG RQ DQQHDOLQJ VWUDWHJ\ th World Congress on