2020
DOI: 10.1007/s11276-020-02466-1
|View full text |Cite
|
Sign up to set email alerts
|

Novel RFID anti-collision algorithm based on the Monte–Carlo query tree search

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 61 publications
0
4
0
Order By: Relevance
“…In addition, to verify the performance of the algorithm, the study analyzed the temporal and spatial complexity. The experimental results indicated that the method was significantly superior to existing methods in recognition efficiency [8]. To avoid the poor performance of the time division multiple access anti-collision algorithm when the number of labels was large, C Jing et al conducted simulation analysis on the performance of four anti-collision algorithms based on blind source separation.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, to verify the performance of the algorithm, the study analyzed the temporal and spatial complexity. The experimental results indicated that the method was significantly superior to existing methods in recognition efficiency [8]. To avoid the poor performance of the time division multiple access anti-collision algorithm when the number of labels was large, C Jing et al conducted simulation analysis on the performance of four anti-collision algorithms based on blind source separation.…”
Section: Related Workmentioning
confidence: 99%
“…The multiple readers' collision problem, that is, the interference of adjacent readers in the signal crossing area leads to the reduction of the read-write range of readers, and sometimes the tags can't be read accurately. Another multiple electronic tags' collision problem is multiple tags communicate with only one reader simultaneously (Samsami & Yasrebi, 2020).…”
Section: Collision Problems In the Rfid Systemmentioning
confidence: 99%
“…The initialization phase and the verification phase are the same as other security protocols [18]. The ownership change stage is a unique stage based on the supply chain security agreement, and it is also the most important link, because it involves the update of the important secret information of the label.…”
Section: Related Workmentioning
confidence: 99%