VTC Spring 2009 - IEEE 69th Vehicular Technology Conference 2009
DOI: 10.1109/vetecs.2009.5073775
|View full text |Cite
|
Sign up to set email alerts
|

Performance Analysis of Anti-Collision Protocols for RFID Systems

Abstract: Recently RFID technology has made its way into end-user applications, enabling automatic item identification without requiring line of sight. In particular passive tags provide a promising, low cost and energy-efficient solution for inventory applications. However, their large-scale adoption strictly depends on the efficiency of the identification process. A major challenge is how to arbitrate channel access so that all tags are able to answer the reader inquiries and identify themselves over time. This paper … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(15 citation statements)
references
References 8 publications
0
15
0
Order By: Relevance
“…Tags in one group transmit their IDs to the reader. Since QT and other tree-based protocols [5][6] could not avoid idle cycles, in which there is no tag answering the query sent by reader, the identification performance and efficiency of them are limited.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Tags in one group transmit their IDs to the reader. Since QT and other tree-based protocols [5][6] could not avoid idle cycles, in which there is no tag answering the query sent by reader, the identification performance and efficiency of them are limited.…”
Section: Related Workmentioning
confidence: 99%
“…The basic idea of the tree-based protocols [5][6][7][8] is to repeatedly split the group of tags encountering collisions into subgroups until there is only one tag in a subgroup to be identified without collisions. Typical tree based algorithms are query tree, collision tree, M-ary query tree.…”
Section: Introductionmentioning
confidence: 99%
“…bits set to 5 indicates that the maximal grouping size is 2 5 . Lev bits is set to 4, which refers to the fact that the maximal depth of the binary tree in recursive process is 2 4 . Obviously, bits can be set to 23 as a sum of bits + bits + Lev bits .…”
Section: Simulationmentioning
confidence: 99%
“…Since QT and other tree-based protocols [8][9][10]cannot avoid idle cycles, in which there is no tag answeringthe query sent by the reader, the identificationperformance and efficiency of them are limited.…”
Section: Query Tree Protocolmentioning
confidence: 99%