2015
DOI: 10.1109/tnet.2013.2295839
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Slot Assignment for Binary Tracking Tree Protocol in RFID Tag Identification

Abstract: Tag anti-collision has long been an important issue in RFID systems. To accelerate tag identification, some researchers have recently adopted bit tracking technology that allows the reader to detect the locations of collided bits in a collision slot. However, these methods still encounter the problem of too many collisions occurring at the beginning of identification. This paper proposes an optimal binary tracking tree protocol (OBTT) that tries to separate all of the tags into smaller sets to reduce collision… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
45
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 57 publications
(45 citation statements)
references
References 36 publications
0
45
0
Order By: Relevance
“…• A modification of the OQTT is presented in [59] called Optimal Binary Tracking Tree (OBTT). This modification implements the estimator of the OQTT with a simple Binary Tree (BT) protocol [60].…”
Section: Optimal Query Tracking Tree Protocolmentioning
confidence: 99%
“…• A modification of the OQTT is presented in [59] called Optimal Binary Tracking Tree (OBTT). This modification implements the estimator of the OQTT with a simple Binary Tree (BT) protocol [60].…”
Section: Optimal Query Tracking Tree Protocolmentioning
confidence: 99%
“…A BT based protocol with a bit estimator and bit tracking technology, referred to as the Optimal Binary Tracking Tree (OBTT) protocol, is given in [8]. It first employs a bit estimation algorithm to estimate the existing number of tags.…”
Section: Optimal Binary Tracking Tree Protocolmentioning
confidence: 99%
“…Tree based protocols, on the other hand, are classified as deterministic since they are supposed to read all the tags in the interrogation zone [3]. These protocols usually split the set of tags upon collisions until achieving a successful response from all the tags; however, some recent solutions provide an estimation phase to define 2 Wireless Communications and Mobile Computing initial subsets which are easier to be identified by the reader [7,8].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, an effective anti-collision algorithm is important in accelerating tag identification. To cope with the multiple tags identification, many anti-collision algorithms have been proposed, which can be classified into Aloha-based [2][3][4], query tree (QT)-based [5], and hybrid algorithms [6][7].…”
Section: Introductionmentioning
confidence: 99%