2020
DOI: 10.1109/tnet.2020.3004852
|View full text |Cite
|
Sign up to set email alerts
|

A Partitioning Approach to RFID Identification

Abstract: Radio-frequency identification (RFID) is a major enabler of Internet of Things (IoT), and has been widely applied in tag-intensive environments. Tag collision arbitration is considered as a crucial issue of such RFID system. To enhance the reading performance of RFID, numerous anti-collision algorithms have been presented in previous literatures. However, most of them suffer from the slot efficiency bottleneck of 0.368. In this paper, we revisit the performance of tag identification in Aloha-based RFID anti-co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
35
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 41 publications
(35 citation statements)
references
References 38 publications
0
35
0
Order By: Relevance
“…To address tag collisions, a large number of anticollision protocols have been proposed, which can be divided into probabilistic [9][10][11][12][13][14], deterministic [15][16][17][18], and hybrid algorithms. The probabilistic algorithms are essentially based on the ALOHA protocol.…”
Section: Introductionmentioning
confidence: 99%
“…To address tag collisions, a large number of anticollision protocols have been proposed, which can be divided into probabilistic [9][10][11][12][13][14], deterministic [15][16][17][18], and hybrid algorithms. The probabilistic algorithms are essentially based on the ALOHA protocol.…”
Section: Introductionmentioning
confidence: 99%
“…These articles focus on the improvement of ALOHA-based algorithm [1][2][3][4][5][6], and the basic idea behind this kind of algorithm is that the reader estimates the number of tags according to the collision, success, and idle time slots first and then adjusts the frame length dynamically based on the estimation results. When the number of tags is equal to the number of time slots, the ALOHA-based algorithm can achieve the highest throughput rate of 36.8%.…”
Section: Introductionmentioning
confidence: 99%
“…Passive defense measures cannot provide perfect security guarantee for WSN. It is necessary to provide a proactive defense technology [3]. Intrusion detection system (IDS) is one of the effective active defense technologies [4].…”
Section: Introductionmentioning
confidence: 99%