2007
DOI: 10.1016/j.adhoc.2007.02.016
|View full text |Cite
|
Sign up to set email alerts
|

Instant collision resolution for tag identification in RFID networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
46
0
9

Year Published

2010
2010
2020
2020

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 77 publications
(56 citation statements)
references
References 6 publications
1
46
0
9
Order By: Relevance
“…One of the main challenges in Aloha protocols is the reader doesn't know the number of identified tags and must estimate to properly tune the frames size. Some basic Frame Slotted Aloha schemes devote to optimizing the slot-based protocols, such as the Tree Slotted Aloha (TSA) [17], Binary Splitting Tree Slotted Aloha (BSTSA) protocol [18]. TSA will issue a new frame for each collision groups in the previous frame, compelling the collided ones to participate, which reduces the size of collision groups and makes the protocol much more efficient.…”
Section: Related Workmentioning
confidence: 99%
“…One of the main challenges in Aloha protocols is the reader doesn't know the number of identified tags and must estimate to properly tune the frames size. Some basic Frame Slotted Aloha schemes devote to optimizing the slot-based protocols, such as the Tree Slotted Aloha (TSA) [17], Binary Splitting Tree Slotted Aloha (BSTSA) protocol [18]. TSA will issue a new frame for each collision groups in the previous frame, compelling the collided ones to participate, which reduces the size of collision groups and makes the protocol much more efficient.…”
Section: Related Workmentioning
confidence: 99%
“…32 This paper aims to verify the intactness of anonymous 33 RFID systems without tag IDs as a priori (Section 2). Since tag 34 IDs usually contain object-specific information, we should 35 prevent such information from leakage when it is privacy 36 sensitive for tagged objects [6,17,18]. In an anonymous RFID 37 system, RFID readers are not expected to collect IDs from 38 tags or to access them on the server [19][20][21][22].…”
Section: Introductionmentioning
confidence: 99%
“…In (10), the minimal is supposed to be achieved by a searching process with varying in the range [ 1 + 2 , 3( 1 + 2 )], where 1 + 2 is the lower bound of according to [15], since 1 tags have been identified, and if there are collisions, at least 2 tags collided. The upper bound of is set to 3( 1 + 2 ), since by simulation no further accuracy in the estimation is obtained if the upper bound is set to higher values.…”
Section: The Proposed Algorithm T-gdfsamentioning
confidence: 99%