iconOpen Access

ARTICLE

A Novel Anti-Collision Algorithm for Large Scale of UHF RFID Tags Access Systems

Xu Zhang1, Yi He1, Haiwen Yi1, Yulu Zhang2, Yuan Li2, Shuai Ma2, Gui Li3, Zhiyuan Zhao4, Yue Liu1, Junyang Liu1, Guangjun Wen1, Jian Li1,*

1 School of Information and Communication Engineering/Yibin Institute, University of Electronic Science and Technology of China, Chengdu, 611731, China
2 Department of IoT Technology Research, China Mobile Research Institute, Beijing, 100053, China
3 The 10th Research Institute of China Electronics Technology Group Corporation, Chengdu, 611731, China
4 College of Information and Communication, National University of Defense Technology, Wuhan, 430019, China

* Corresponding Author: Jian Li. Email: email

Computers, Materials & Continua 2024, 80(1), 897-912. https://doi.org/10.32604/cmc.2024.050000

Abstract

When the radio frequency identification (RFID) system inventories multiple tags, the recognition rate will be seriously affected due to collisions. Based on the existing dynamic frame slotted Aloha (DFSA) algorithm, a sub-frame observation and cyclic redundancy check (CRC) grouping combined dynamic framed slotted Aloha (SUBF-CGDFSA) algorithm is proposed. The algorithm combines the precise estimation method of the quantity of large-scale tags, the large-scale tags grouping mechanism based on CRC pseudo-random characteristics, and the Aloha anti-collision optimization mechanism based on sub-frame observation. By grouping tags and sequentially identifying them within subframes, it accurately estimates the number of remaining tags and optimizes frame length accordingly to improve efficiency in large-scale RFID systems. Simulation outcomes demonstrate that this proposed algorithm can effectively break through the system throughput bottleneck of 36.8%, which is up to 30% higher than the existing DFSA standard scheme, and has more significant advantages, which is suitable for application in large-scale RFID tags scenarios.

Keywords


1  Introduction

Passive ultra-high frequency (UHF) RFID [13] has gained widespread use in the industrial sector due to its extensive communication range, rapid identification speed, strong reliability, ample storage capacity, and other benefits. In the process of transmission between tags and reader, interference and collision between data will be caused due to the sharing of the same wireless channel [46]. Currently, anti-collision algorithms utilizing RFID may be roughly divided into two categories: deterministic algorithm based on tree [710] and random algorithm based on Aloha class [1115]. The tree-based anti-collision algorithm is a deterministic algorithm. Multiple tags are constantly grouped in the recognition process until there is only one tag in the group, at which point the reader can successfully identify it [1617]. Random algorithms based on the Aloha class mainly include the pure Aloha algorithm (PA), slotted Aloha algorithm (SA), framed slotted Aloha algorithm (FSA), DFSA [1820] and various enhanced algorithms [2123].

The advantages of Aloha algorithms are low cost, easy implementation, and low hardware requirements for readers. This type of algorithm does not require the detection of specific collision locations, making it well-suited for application in UHF RFID systems. Chen et al. utilized the maximum a posteriori probability decision algorithm to estimate quantity of tags and proposed an enhanced Aloha algorithm to enhance the efficiency of RFID systems [24]. Zhang et al. put forward an Aloha algorithm for grouping adaptive time-slot allocation. The main concept is to pre-scan the time slots selected by tags so that they can adaptively choose and allocate time slots, thus avoiding extensive collision and idle time slots [25]. An anti-collision algorithm named Grouped Dynamic Frame Slotted Aloha (GDFSA) was also introduced in which the estimated tag number is first determined, followed by grouping and dynamic frame slot strategies to identify tags [26]. Chen et al. estimated unrecognized tags by observing collision and idle slots in subframes, dynamically adjusting the frame length range and proposing a dynamic frame slot Aloha algorithm based on a subframe observation mechanism with system throughput near optimal at 0.361 [27]. Mustapha et al. suggested an Aloha algorithm based on Bayesian tag estimation, which improved accuracy while maintaining system throughput optimality [28]. To improve identification performance in dense tag situations, Bai et al. modified tag set grouping using fuzzy C values and presented an anti-collision Aloha method based on EPC grouping [29]. Zahran et al. brought forth an Aloha algorithm for optimal frame length allocation adopting multi-factor estimation to dynamically adjust frame length gradually reducing invalid time slots [30]. The results indicated that the system efficiency could still be maintained even when there is large-scale access to tags.

In this paper, the SUBF-CGDFSA algorithm is proposed. In accordance with both experimental and theoretical analysis of the current anti-collision algorithm, this algorithm takes the grouping mechanism as the starting point and combines the sub-frame observation mechanism with the accurate tags number estimation method. On the basis of them, this paper optimizes and improves them. The large-scale tags grouping mechanism is used first, and then the sub-frame based DFSA (SUBF-DFSA) algorithm is used to identify intra-group tags. In contrast to current anti-collision algorithms, the suggested approach exhibits enhanced flexibility in recognizing a substantial quantity of tags. It effectively maintains high throughput, significantly improves slot efficiency, and conserves a substantial amount of system resources.

2  Preliminaries: Tags Estimation, Grouping Rules and Sub-Frame Observation Mechanism

An RFID reader typically deploys a large quantity of tags, with all tags sharing the same communication channel. This often leads to tag collision, resulting in increased collision time slots. The efficient identification of a large quantity of tags poses a significant challenge in RFID systems. Performance indicators are required in order to assess multi-tag anti-collision algorithms’ macroscopic performance. The ratio of successful time slots needed by a reader to identify every tag in its working domain to the total quantity of time slots, also referred to as throughput, defines the system efficiency of an anti-collision algorithm in RFID systems. The system efficiency U may be stated as follows, assuming that there are n tags in the reader’s working domain and N slots total needed to identify tags:

U=nN(1)

The more time slots the anti-collision algorithm utilizes, the lower the system efficiency it can achieve. Thus, system efficiency is one of the most crucial measures to assess the efficacy of RFID anti-collision algorithms.

2.1 Tags Estimation

When optimizing the system efficiency, it is essential to accurately estimate quantity of tags in the application scene and consider the algorithm complexity. This paper conducts research on system recognition efficiency based on the Schoute tags estimation method and the Vogt tags estimation method.

The Schoute tags estimation method is based on the Poisson estimation technique. The Poisson tags estimation function is proposed in accordance with the posterior probability of m tags choosing the same specific time slot i. This function calculates the posterior expected value of the tag collision time slot, which is found to be m=2.39. In other words, 2.39 tags on average are reacting in each collision slot. Therefore, in accordance with the Schoute estimation method, the approximate quantity of system tags is:

N=S+2.39C(2)

where S is the quantity of tags successfully identified and C is the quantity of collision slots.

The Vogt algorithm is utilized to estimate the quantity of remaining tags in accordance with the tag recognition status from the previous frame. This algorithm is grounded in the Chebyshev inequality principle, which states that the results of random experiments on any random variable will eventually converge towards the expected value. In other words, the quantity of tags n that can minimize the distance between the experimental result (e,s,c) and the expected vector (E(e),E(s),E(c)) represents an estimation for the quantity of tags in the system using Vogt’s method. Here, (E(e),E(s),E(c)) denotes the anticipated values for idle, successful, and collision slots, respectively.

ε(n,e,s,c)=minn|(E(e)E(s)E(c))(esc)|(3)

The system’s frame length is represented as F and the quantity of tags is denoted as n. Probability statistics state that the likelihood of r tags selecting the same time slot inside the reader’s reading range is:

Pn,1F(r)=Cnr(1F)r(11F)nr(4)

Therefore, the expected value E(e),E(s),E(c) of idle, successful, and collision slots are expressed as follows:

E(e)=FP(0)=F(11F)(5)

E(s)=FP(1)=n(11F)n1(6)

E(c)=FP(k)=FE(0)E(1)(7)

2.2 Grouping Rules

Grouping rules are suggested to guarantee a high throughput rate while handling a large quantity of tags. This will enable the reader to maintain efficiency under such circumstances. If the quantity of tags is small, grouping is not necessary. However, if the quantity of tags is too large, it is advisable to arrange the tags based on the estimated range. This significantly reduces tag collisions. The electronic tag is the data carrier of the identification object, storing the information of the identification object and the tag, and generating a CRC code according to the data sequence after the data is written to the tag, which is used to verify the sequence in data communication. Moreover, CRC check codes have good pseudo-random characteristics, and the generated low-level CRC check codes are close to uniform distribution. The group identification algorithm uses the CRC codes of tags as the basis for grouping. In the algorithm, the generated CRC codes are used to generate a lower CRC code value as the group number of each tag.

In the existing RFID standards, 16-bit CRC code is generally used as the verification code, so the 16-bit CRC is discussed as an example. For example, after a tag receives a request to start recognition, it extracts its own 16-bit CRC code value, and it divided by the generator polynomial G(x)=x4+x+1 is a 4-bit CRC code by modulo 2 division, so that the group in which each tag belongs is uniquely identified. The 4-bit CRC code value can be represented in the range of 0–15, so all tags are assigned to 16 groups. Therefore, a one-bit check code can be split into 2 groups, a two-bit check code into 4 groups, a three-bit check code into 8 groups, and so on.

According to the group processing of identification tags in the scenario, the algorithm maintains a high and stable throughput for each quantity of tags. The quantity of groups is determined in accordance with the quantity of tags, and it is significant to establish the critical value of tags for switching between the number of groups. Based on different sets of regulations, various critical values for tags can be established.

2.2.1 Critical Value to Determine Scheme Ⅰ

The critical value for grouping tags is chosen in accordance with the quantity of tags and the reading throughput, taking into account varying numbers of groups. For instance, assuming n tags are to be identified in an RFID system with a frame length of F, the system throughput rate in the Aloha algorithm is represented as:

U=nF(11F)n1(8)

The frame length is fixed at a value of F=256, and the critical value for switching between two adjacent tag grouping schemes is determined using the formula mentioned above. This involves considering the quantity of tags with consistent throughput when the number of groups varies.

In formula (9), a and b represent the quantity of tag groups. By adjusting the values of a and b in the equation above, one can determine the number of tag groups. Table 1 outlines the corresponding relationship between the quantity of groups and the quantity of tags.

images

na256×(11256)na1=nb256×(11256)nb1(9)

2.2.2 Critical Value to Determine Scheme Ⅱ

Maximum throughput in the traditional DFSA method is reached when the quantity of tags is equal to the original frame length. For an original frame length of 256, the generated CRC check code consists of 1 bit and is divided into two groups. The theoretical maximum throughput is achieved when there are 2 * 256 = 512 tags present, resulting in a generated CRC check code of 2 bits divided into four groups. This pattern continues, with maximum throughput being achieved at 4 * 256 = 1024 tags and so on.

The quantity of tags corresponding to the optimal throughput of adjacent grouping schemes is determined, and the median value of the two is identified as the critical value. For instance, if there are 256 * 21 = 512 tags for the two groups and 256 * 22 = 1024 tags for the four groups, the critical value would be the median of these two numbers, which is (512 + 1024)/2 = 768. Table 2 can then be filled in accordingly.

images

2.2.3 Critical Value to Determine Scheme III

When categorizing tags in the scene, the quantity of bits generated by different CRC check codes determines the quantity of groups. The simulation of throughput based on CRC check grouping combined with the traditional DFSA algorithm indicates that as the quantity of tags continues to increase, the system throughput will decrease. To ensure optimal grouping performance, with an initial frame length F=256, the relationship between the quantity of distinct groups and system throughput as the quantity of tags increases is depicted in Fig. 1.

images

Figure 1: Performance comparison of traditional DFSA in different grouping schemes

According to the simulation outcomes, the critical value of the number of tags for different grouping schemes is determined. This corresponds to the quantity of tags at the intersection point of the throughput rate of adjacent grouping schemes, and is recorded in Table 3.

images

At the onset of the initial RFID system identification and at the conclusion of each round of identification, an estimation is made regarding the number of tags that remain unidentified. Based on these predictive results, a determination is made as to whether it is necessary to group the tags. In cases where tags must be sorted into multiple groups for identification purposes, the reader employs an identification frame with the maximum quantity of time slots in order to identify tags. This approach allows for control over the quantity of tags in each group within a higher reading throughput range, thereby preventing significant tag collisions during identification. Consequently, these three strategies effectively maintain a high throughput rate for the system and reduce tag recognition time.

2.3 Sub-Frame Observation Mechanism

In order to simplify the tags number estimation algorithm, it is recommended to avoid using methods that require extensive computation. By doing this, we may increase the tags number estimate algorithm’s time efficiency and lower its computing complexity. The traditional DFSA algorithm estimates the quantity of unrecognized tags in accordance with the relationship between successful, collision, and idle slots in the entire frame, in order to adjust the size of the next frame length. However, if the frame length in the previous recognition cycle was not appropriate, it may negatively impact the next recognition cycle and significantly reduce system recognition efficiency. Therefore, a new mechanism will be introduced to estimate the quantity of unrecognized tags using only a portion of the current frame, namely a subframe.

The algorithm calculates the estimated quantity of tags to be identified in accordance with the statistics of idle, successful, and collision slots observed in subframes, as well as the relationship between subframes and current frames. Assuming that n tags are allocated in F slots, the probabilities of idle slots occurring e times, successful slots occurring s times, and collision slots occurring c times in subframe Fsub can be expressed using formula (10).

P(Fsub,e,s,c)=(Fsub!e!s!c!)P0P1P2(10)

where P0,P1,P2 are the occurrence probabilities of idle, successful and collision slots. The specific calculation formula is as follows:

P0=(1eFsub)n(11)

P1=(ns)(sFsube)s(1sFsube)nss!ss=(ns)((Fsubes)ns(Fsube)n)s!(12)

P2=k=0cv=0ck(1)(k+v)(ck)(ckv)×(ns)!(nsk)!(ckv)(nsk)c(ns)(13)

When the value of P(n|e,s,c) is maximal, the quantity of tags involved in the subframe is determined. Given that the tag estimation result in the subframe is nsub, the total tags number involved in the entire frame nest can be estimated using the following formula:

nest=nsub×(FFsub)(14)

The frame length is modified based on the above-mentioned tag estimate findings, with the subframe Fsub representing the first m time slots in the inventory cycle. In accordance with the EPC global C1 Gen2 standard, the frame length F=2Q (Q is an integer ranging from 0–15), so the value of subframe Fsub is usually F/2, F/4, F/8, F/16, etc. [31]. Table 4 lists the subframe Fsub of different frame length F:

images

In accordance with EPC global C1 Gen2 standard, frame length F=2Q (where Q is an integer from 0–15), so frame length F sometimes cannot be strictly equal to tag number n. To achieve a stable throughput, it is necessary for the reader to appropriately adjust the frame length in accordance with the estimated quantity of tags. The specific calculation method is as follows:

Given a tag number n, the throughput at FL (FL=2Q) is equal to the throughput at FH (FH=2Q+1). FL and FH are two adjacent frames. According to formula (8), it can be got:

nFL(11FL)n1=nFH(11FH)n1(15)

where n represents the critical value of the quantity of tags, which determines whether adjustment of the frame length is necessary. After the deformation of formula (15), it can be obtained that:

n=1+ln(FHFL)ln(FLFHFH1FL1)(16)

In the actual RFID system, tag number n must be an integer. It allows us to determine the optimal frame length for a given quantity of tags, which can be expressed as:

Fopt={2Q,n=n2Q+1,n=n(17)

where n and n represent rounded up and down, respectively. According to formulas (16) and (17), the optimal frame length corresponding to any quantity of tags can be derived and filled in Table 5.

images

3  Proposed SUBF-CGDFSA Description

Using the large-scale tags grouping technique is the initial step if a large quantity of tags needs to be identified in the scene. Subsequently, the SUBF-DFSA algorithm is employed to identify intra-group tags. Combined with the tags number estimation method, tags grouping method and sub-frame observation mechanism, this paper proposes a novel Aloha algorithm, namely SUBF-CGDFSA algorithm. The SUBF-CGDFSA algorithm flow is shown in Fig. 2.

images

Figure 2: Flow chart of SUBF-CGDFSA algorithm

In this algorithm, the frame length is adjusted in accordance with the statistical results of subframe Fsub, which is the first m time slots of the whole frame. It adjusts the frame length by collecting the information of successful and collision slots in subframes. The quantity of tags detected by observing subframe information is as follows:

nest=(Ssub+2.39Csub)×F/Fsub(18)

where Ssub is the quantity of successful slots in the subframe, Csub is the quantity of collision slots, and F is the frame length.

Since the frame length is constantly changing, so is the sub-frame Fsub. According to the estimation result of the above equation, if the estimated tag number nest does not correspond to the current frame length F, the current round of recognition will finish and a new round will begin with a frame length adjustment. When the quantity of tags nest matches the current frame length F, the identification of the current round will continue. When a suitable frame length is detected, the reader continues the current recognition cycle. After reading all the time slots, the average quantity of tags for each collision time slot is estimated. The average quantity of tags within each collision slot can be expressed as the formula (19).

nave =nestSC(19)

where nestS is the quantity of remaining tags estimated by the reader, and C is the quantity of collision slots counted. The reader adjusts the optimal frame length corresponding to the size of nave , and takes it as the initial frame length to identify each collision slot, respectively.

The SUBF-CGDFSA algorithm flow is as follows:

Step 1: The reader sets the frame length F and subframe length Fsub, gives the tags the inventory instruction, and, depending on the tag response result, determines how many tags to recognize in the following round;

Step 2: In accordance with the quantity of tags to be identified, the reader sends grouping instructions to judge the interval where the quantity of tags is located. If the quantity of tags does not fall in the first interval, the group operation is performed, otherwise, the fourth step is entered;

Step 3: When the tag obtains the instruction from the reader, it also acquires the group number i sent by the reader, and receives the query instruction from the reader, including the query group number j. When i=j, the tag will reply to the reader’s inquiry;

Step 4: The reader transmits query commands to tags within the operational domain, specifying frame length F, subframe length Fsub and slot counter t;

Step 5: The tag response is received by the reader in each slot, t++. After reading Fsub slots, the reader can estimate the remaining quantity of tags based on the statistical findings. If it is zero, it sends query command with frame length F=1; if it is not zero, will proceed to the next step;

Step 6: The reader updates frame length F and subframe Fsub according to the statistics of subframe Fsub. If the present frame length is appropriate, continue to adjust Fsub=F until a complete frame is identified. The index number of the collision slot is recorded and then pushed onto the stack; Otherwise, the frame length F is improperly set, and the identification of the epicycle is terminated and Step 4 is returned;

Step 7: According to the formula (19), the average tag number nave in each collision time slot is determined, and the initial frame length Fini for each collision time slot is established;

Step 8: Verify if the stack is empty. If it is, the identification process concludes. This group identification is over, and the value of j will be increased by 1. The step 11 is entered. Otherwise, the reader extracts the new slot index number from the stack;

Step 9: The label broadcast query command, which may result in slot conflicts, includes the initial frame length Fini and slot index number;

Step 10: After reading a time slot, the reader calculates statistics (S,C) to determine whether the collision time slot C is zero. If it is, return to step 6 and continue to determine whether the stack is empty. If no, it estimates the remaining quantity of tags based on nrst=round(2.39C), sets a new frame length, assigns Fini to return to step 7, and then continues to identify until the tags colliding in this time slot are identified;

Step 11: After each round of recognition, it is essential to estimate the quantity of remaining unrecognized tags. If it is zero, the whole recognition process will be finished. Otherwise, the next round of recognition will be carried out.

Compared to the existing Aloha anti-collision algorithm, SUBF-CGDFSA algorithm has better stability. In addition, the determination of tag quantity and the establishment of frame length during the recognition process are accomplished through table lookup. This only requires a single judgment in each recognition cycle, with the evaluation process involving only addition, multiplication, and comparison operations, resulting in minimal complexity.

4  Simulation Results

Using MATLAB simulation platform, according to ISO18000-6C (EPC C1G2) standard, all tag lengths are standardized to 128 bits. The initial frame length F is set at 256, and tag IDs are spread uniformly. The quantity of tags to be identified in the inventory process is estimated based on both Schoute tags estimation and Vogt tags estimation. The error between the estimated tag value and the actual quantity of tags present in the scene is calculated, and the simulation results can be seen in Fig. 3.

images

Figure 3: Comparison of tags estimation results (a) estimated result of tags; (b) the error between the estimated and actual quantity of tags

The simulation results indicate that with the inventory times increasing, the quantity of tags to be identified in the scene gradually decreases. For this reason, the tags estimation results based on the above two tags estimation algorithms show that the tags estimation based on the Vogt algorithm is more accurate than the Schoute algorithm, especially in the initial inventory.

Based on sub-frame observation, the initial frame length is adjusted and the quantity of tags in the collision time slot is processed. The SUBF-DFSA algorithm is employed for tags in the collision slots, and the Schoute and Vogt estimation method are utilized to estimate the remaining quantity of tags, which are then used as the initial frame length for the next frame. In our simulation, we set the initial frame length F to 32, 64, 128, and 256, respectively. Fig. 4 presents the outcomes of the simulation.

images

Figure 4: Simulation of SUBF-DFSA algorithm based on two tags estimation methods (a) F=32; (b) F=64; (c) F=128; (d) F=256

Simulation outcomes indicate that the SUBF-DFSA anti-collision algorithm can break through the bottleneck of 36.8%. With the increase of the quantity of tags, the system throughput rate remains above 40% after stabilization. Significantly improve the recognition performance of the system. When the initial frame size is set to 32, 64, 128, and 256, the system recognition efficiency does not decrease. In addition, the frame length of the SUBF-DFSA algorithm is slightly adjusted to the integer power of 2, which conforms to the EPC global C1 Gen2 protocol standard.

According to the scheme to determine the tags grouping critical value obtained from the grouping theory analysis above, grouping scheme switching is carried out when the quantity of tags is in different intervals. The simulation results of SUBF-CGDFSA anti-collision algorithm were compared with the existing algorithms, such as SUBF-DFSA, GDFSA [26], traditional DFSA and FSA. Fig. 5 illustrates a comparison of the system efficiency for these various algorithms.

images

Figure 5: Comparison of system efficiency of different algorithms (a) critical value to determine scheme Ⅰ; (b) critical value to determine scheme Ⅱ; (c) critical value to determine scheme III

The simulation outcomes indicate that the system efficiency of SUBF-CGDFSA algorithm is almost unaffected by the number of tags. In large-scale tags scenarios, the three grouping schemes can all maintain high system efficiency and stable performance. For the actual large-scale tags access scenario, grouping mismatch will cause a series of problems. If there are too many groups, a large quantity of idle time slots will be produced within the group, leading to time slot waste and decreased algorithm performance. Conversely, if the quantity of groups is too small, frequent collisions will occur within the group. Even if the group is divided, desired system efficiency cannot be achieved and algorithm performance will deteriorate. Simulation results show that dynamic grouping based on the critical value obtained from theoretical analysis can flexibly avoid the above problems. The algorithm can achieve high throughput and maintain stability in each tag number interval. When compared to the method without grouping, the grouping algorithm performs noticeably better.

Taking the performance of traditional DFSA as the benchmark, the improvement of system efficiency of each algorithm compared with traditional DFSA algorithm was investigated. The outcomes of the simulation are depicted in Fig. 6.

images

Figure 6: Comparison of performance improvement of each algorithm compared with traditional DFSA algorithm (a) critical value to determine scheme Ⅰ; (b) critical value to determine scheme Ⅱ; (c) critical value to determine scheme III

The simulation outcomes indicate that the performance of the SUBF-DFSA algorithm is remarkably enhanced compared with the traditional DFSA algorithm in large-scale tag scenarios. Furthermore, the SUBF-CGDFSA algorithm has further improved the throughput index under different grouping schemes. When the quantity of tags is low and frequent collision is absent, both algorithms perform similarly and demonstrate a substantial improvement in system efficiency compared to the traditional DFSA. However, when the quantity of tags exceeds 300, the throughput of the SUBF-DFSA algorithm can be increased by approximately 10%. Moreover, when there are more than 1200 tags, the throughput performance of the SUBF-CGDFSA algorithm consistently increases by over 30% after grouping using three distinct schemes. Specifically, with grouping scheme 3 for identifying 1500 tags, the maximum throughput rate can be increased by around 32%. As evident from these findings, as the quantity of tags increases, there is a more pronounced improvement in throughput, thus indicating its suitability for large-scale tag access systems.

5  Conclusion

In this paper, an innovative anti-collision algorithm named SUBF-CGDFSA for large scale of UHF RFID tags access systems is proposed. The large-scale tags grouping mechanism is first used to group tags, and the sub-frame observation mechanism is introduced in order to support massive tag identification scenarios. The intra-group identification is accomplished by estimating the number of tags in the subframe and optimizing the frame length settings through the preset configuration table, reducing system complexity. The results indicate that the novel RFID anti-collision algorithm proposed in this paper, namely SUBF-CGDFSA, can break through the bottleneck of 36.8% of the system throughput. With the increase in the quantity of tags, the system’s throughput rate remains stable at over 40%. At the same time, the algorithm is not affected by the initial frame length and exhibits excellent robustness. The proposed anti-collision algorithm has a broad application prospect in intelligent detection. Through reasonable selection and optimization algorithm, real-time perception of the surrounding environment and prediction of collision risk can be realized, enhancing the convenience of people’s daily lives and work. With the ongoing development of artificial intelligence technology, it is believed that the implementation of this anti-collision algorithm utilizing artificial intelligence will lead to significant breakthroughs and innovations in the field.

Acknowledgement: The authors would like to thank the editors and reviewers for their valuable work, as well as the supervisor and family for their valuable support during the research process.

Funding Statement: This work was supported in part by National Natural Science Foundation of China (U22B2004, 62371106), in part by the Joint Project of China Mobile Research Institute & X-NET (Project Number: 2022H002), in part by the Pre-Research Project (31513070501), in part by National Key R&D Program (2018AAA0103203), in part by Guangdong Provincial Research and Development Plan in Key Areas (2019B010141001), in part by Sichuan Provincial Science and Technology Planning Program of China (2022YFG0230, 2023YFG0040), in part by the Fundamental Enhancement Program Technology Area Fund (2021-JCJQ-JJ-0667), in part by the Joint Fund of ZF and Ministry of Education (8091B022126) and in part by Innovation Ability Construction Project for Sichuan Provincial Engineering Research Center of Communication Technology for Intelligent IoT (2303-510109-04-03-318020).

Author Contributions: The authors confirm contribution to the paper as follows: Jian Li: Investigation, Software, Methodology and Funding. Xu Zhang: Investigation, Writing-Original Draft, Writing-Review and Editing. Yi He and Haiwen Yi: Data Collection. Yulu Zhang, Yuan Li and ShuaiMa: Analysis and Interpretation of Results. Gui Li, Zhiyuan Zhao and Junyang Liu Resources and Validation. Junyang Liu and Guangjun Wen: Writing Review and Editing. All authors reviewed the results and approved the final version of the manuscript.

Availability of Data and Materials: The data that support the findings of this research are available from the corresponding author, Jian Li, upon reasonable request.

Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present research.

References

1. A. Lehto, J. Nummela, L. Ukkonen, L. Sydanheimo, and M. Kivikoski, “Passive UHF RFID in paper industry: Challenges, benefits and the application environment,” IEEE Trans. Autom. Sci. Eng., vol. 6, no. 1, pp. 66–79, Jan. 2009. doi: 10.1109/TASE.2008.2007269. [Google Scholar] [CrossRef]

2. K. Saarinen, T. Björninen, L. Ukkonen, and L. Frisk, “Reliability Analysis of RFID Tags in Changing Humid Environment,” IEEE Trans. Compon., Packag. Manufact. Technol., vol. 4, no. 1, pp. 77–85, Jan. 2014. doi: 10.1109/TCPMT.2013.2278182. [Google Scholar] [CrossRef]

3. P. Solic, Z. Blazevic, M. Skiljo, L. Patrono, R. Colella and J. J. P. C. Rodrigues “Gen2 RFID as IoT Enabler: Characterization and performance improvement,” IEEE Wirel. Commun., vol. 24, no. 3, pp. 33–39, Jun. 2017. doi: 10.1109/MWC.2017.1600431. [Google Scholar] [CrossRef]

4. W. Wang, Y. Zhang, Y. Sang, and S. Wang, “Analysis of anti-collision algorithms in RFID system,” in 2009 IEEE Int. Conf. Commun. Technol. Appl., Beijing, China, 2009, pp. 58–62. doi: 10.1109/ICCOMTA.2009.5349239. [Google Scholar] [CrossRef]

5. L. Zhu and T. S. P. Yum, “A critical survey and analysis of RFID anti-collision mechanisms,” IEEE Commun. Mag., vol. 49, no. 5, pp. 214–221, May 2011. doi: 10.1109/MCOM.2011.5762820. [Google Scholar] [CrossRef]

6. R. Jayadi, Y. Lai, and C. Lin, “Efficient time-oriented anti-collision protocol for RFID tag identification,” Comput. Commun., vol. 112, no. 3, pp. 141–153, Nov. 2017. doi: 10.1016/j.comcom.2017.08.016. [Google Scholar] [CrossRef]

7. P. Hou, X. Zhang, and H. Tian, “Adaptive query tree algorithm based on hamming weight grouping,” Comput. Eng. Design, vol. 44, no. 1, pp. 307–313, Jan. 2023. doi: 10.16208/j.issn1000-7024.2023.01.041. [Google Scholar] [CrossRef]

8. W. Xue, J. Chen, X. Li, and Y. Shen, “Self-adaptive query tree anti-collision algorithm based on map-ping sequence code,” Softw. Guide, vol. 21, no. 2, pp. 68–72, Feb. 2022. [Google Scholar]

9. L. Bai, J. Liu, and K. Cao, “Improved adaptive multi-tree anti-collision algorithm based on prefix group,” Comput. Simul., vol. 39, no. 1, pp. 288–292, Jan. 2022. [Google Scholar]

10. J. Wu, “A RFID anti-collision algorithm research based on binary tree and multi-tree search,” Electr. Des. Eng., vol. 28, no. 14, pp. 59–67, Jul. 2020. doi: 10.14022/j.issn1674-6236.2020.14.013. [Google Scholar] [CrossRef]

11. J. Vales-Alonso, V. Bueno-Delgado, E. Egea-Lopez, F. J. Gonzalez-Castano, and J. Alcaraz, “Multiframe maximum-likelihood tags estimation for RFID anticollision protocols,” IEEE Trans. Ind. Inform., vol. 7, no. 3, pp. 487–496, Aug. 2011. doi: 10.1109/TII.2011.2158831. [Google Scholar] [CrossRef]

12. W. Sun and C. Jin, “A novel dynamic frame slotted Aloha algorithm for anti-collision in RFID systems,” Inf. Control, vol. 41, no. 2, pp. 233–237, Apr. 2012. doi: 10.3724/SP.J.1219.2012.00233 [Google Scholar] [CrossRef]

13. Y. Xu and Y. Chen, “An improved dynamic framed slotted Aloha anti-collision algorithm based on estimation method for RFID systems,” in 2015 IEEE Int. Conf. RFID (RFID), San Diego, CA, USA, Apr. 2015, pp. 15–17. doi: 10.1109/RFID.2015.7113066. [Google Scholar] [CrossRef]

14. J. Su, Z. Sheng, D. Hong, and V. C. M. Leung, “An efficient sub-frame based tag identification algorithm for UHF RFID systems,” in 2016 IEEE Int. Conf. Commun. (ICC), Kuala Lumpur, Malaysia, May 22–27, 2016, pp. 1–6. doi: 10.1109/ICC.2016.7511360. [Google Scholar] [CrossRef]

15. X. Chen and Z. Zhu, “Research and improvement of anti-collision algorithm based on RFID system,” Electron. Meas. Technol., vol. 44, no. 11, pp. 84–89, Jun. 2021. doi: 10.19651/j.cnki.emt.2106427. [Google Scholar] [CrossRef]

16. L. Mo, B. Tang, and M. Fang, “An RFID search tree anti-collision algorithm for reducing communication complexity,” Telecommun. Eng., vol. 61, no. 10, pp. 1297–1301, Oct. 2021. doi: 10.3969/j.issn.1001-893x.2021.10.016Y. [Google Scholar] [CrossRef]

17. Fu, H. Zhu, X. Liu, and C. Wen, “Research on RFID label identification algorithm based on collision bit eigenvalue,” Mod. Inf. Technol., vol. 8, no. 3, pp. 176–181, Feb. 2024. doi: 10.19850/j.cnki.2096-4706.2024.03.037. [Google Scholar] [CrossRef]

18. H. Wu and Y. Zeng, “Tag estimate and fame length for dynamic frame slotted Aloha anti-collision RFID system,” Acta Automatica Sinica, vol. 36, no. 4, pp. 620–624, Apr. 2010. doi: 10.3724/SP.J.1004.2010.00620 [Google Scholar] [CrossRef]

19. Y. He and X. Wang, “An Aloha-based improved anti-collision algorithm for RFID systems,” IEEE Wirel. Commun., vol. 20, no. 5, pp. 152–158, Oct. 2013. doi: 10.1109/MWC.2013.6664486. [Google Scholar] [CrossRef]

20. J. B. Eom and T. J. Lee, “Accurate tag estimation for dynamic framed-slotted Aloha in RFID systems,” IEEE Commun. Lett., vol. 14, no. 1, pp. 60–62, Jan. 2010. doi: 10.1109/LCOMM.2010.01.091378. [Google Scholar] [CrossRef]

21. Y. He, P. She, L. Zuo, and C. Zhang, “Research on anti-collision algorithm of UHF RFID based on parallelizable identification,” Appl. Res. Comput., vol. 37, no. 2, pp. 493–497, Feb. 2020. doi: 10.19734/j.issn.1001-3695.2018.07.0550. [Google Scholar] [CrossRef]

22. Y. Liu and Y. Zhang, “Radio frequency identification anti-collision algorithm based on logistic mapping,” J. Comput. Appl., vol. 40, no. 8, pp. 2334–2339, Aug. 2020. doi: 10.11772/j.issn.1001-9081.2019122121. [Google Scholar] [CrossRef]

23. X. Zhou, Y. Wu, C. Xiang, and L. Ding, “RFID anti-collision algorithm based on label parallel recognition technology,” Mod. Electron. Tech., vol. 46, no. 40, pp. 1–6, May 2023. doi: 10.16652/j.issn.1004-373x.2023.10.001. [Google Scholar] [CrossRef]

24. W. T. Chen, “Optimal frame length analysis and an efficient anti-collision algorithm with early adjustment of frame length for RFID Systems,” IEEE Trans. Veh. Technol., vol. 65, no. 5, pp. 3342–3348, May 2016. doi: 10.1109/TVT.2015.2441052. [Google Scholar] [CrossRef]

25. X. Zhang and Y. Hu, “Research on a grouped adaptive allocating slot anti-collision algorithm in RFID system,” Acta Electronica Sinica, vol. 44, no. 6, pp. 1328–1335, Jun. 2016. [Google Scholar]

26. Y. Pang, Q. Peng, J. Lin, Q. Zhou, G. Li, and W. Wu, “Reducing tag collision in radio frequency identification systems by using a grouped dynamic frame slotted Aloha algorithm,” Acta Physica Sinica, vol. 62, no. 14, pp. 496–503, Jun. 2013. doi: 10.7498/aps.62.148401. [Google Scholar] [CrossRef]

27. Y. Chen, J. Su, and W. Yi, “An efficient and easy-to-Implement tag identification algorithm for UHF RFID systems,” IEEE Commun. Lett., vol. 21, no. 7, pp. 1509–1512, Jul. 2017. doi: 10.1109/LCOMM.2017.2649490. [Google Scholar] [CrossRef]

28. B. Mustapha, D. Mustapha, D. Brahim, D. Karim, and M. Abdelmadjid, “A cooperative Bayesian and lower bound estimation in dynamic framed slotted Aloha algorithm for RFID systems,” Int. J. Commun. Syst., vol. 31, no. 13, pp. e3723.1–e3723.13, 2018. doi: 10.1002/dac.3723. [Google Scholar] [CrossRef]

29. Z. Bai, S. Wang, and Y. He, “A novel anti-collision algorithm in RFID for Internet of Things,” IEEE Access, vol. 6, pp. 45860–45874, Aug. 2018. doi: 10.1109/ACCESS.2018.2863565. [Google Scholar] [CrossRef]

30. E. G. Zahran, A. A. Arafa, H. I. Saleh, and M. I. Dessouky, “Enhanced Aloha-based anti-collision algorithm for efficien RFID tags identification,” in 2019 Nov. Intell. Lead. Emerg. Sci. Conf. (NILES), Giza, Egypt, Nov. 28–30, 2019, pp. 59–62. doi: 10.1109/NILES.2019.8909297. [Google Scholar] [CrossRef]

31. J. Su, X. Yang, and Y. Han, “A time efficient and easy to implement RFID technology for multiple tags,” Acta Electronica Sinica, vol. 46, no. 4, pp. 903–910, Apr. 2018. doi: 10.3969/j.issn.0372-2112.2018.04.019. [Google Scholar] [CrossRef]


Cite This Article

APA Style
Zhang, X., He, Y., Yi, H., Zhang, Y., Li, Y. et al. (2024). A novel anti-collision algorithm for large scale of UHF RFID tags access systems. Computers, Materials & Continua, 80(1), 897-912. https://doi.org/10.32604/cmc.2024.050000
Vancouver Style
Zhang X, He Y, Yi H, Zhang Y, Li Y, Ma S, et al. A novel anti-collision algorithm for large scale of UHF RFID tags access systems. Comput Mater Contin. 2024;80(1):897-912 https://doi.org/10.32604/cmc.2024.050000
IEEE Style
X. Zhang et al., "A Novel Anti-Collision Algorithm for Large Scale of UHF RFID Tags Access Systems," Comput. Mater. Contin., vol. 80, no. 1, pp. 897-912. 2024. https://doi.org/10.32604/cmc.2024.050000


cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 140

    View

  • 31

    Download

  • 0

    Like

Share Link