2006
DOI: 10.1016/j.comcom.2005.12.011
|View full text |Cite
|
Sign up to set email alerts
|

Taxonomy and survey of RFID anti-collision protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
101
0
9

Year Published

2009
2009
2016
2016

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 263 publications
(122 citation statements)
references
References 16 publications
0
101
0
9
Order By: Relevance
“…Sometimes, it has the probability of 1/2 96 to generate the same identification because the length of tag identification has only 96 bits. Many researchers also provide complete solution for tag collision (Shih et al, 2006;Lee et al, 2004). Hence, we think that tag collision is almost impossible happened for RFID tag.…”
Section: System Assumptionmentioning
confidence: 99%
“…Sometimes, it has the probability of 1/2 96 to generate the same identification because the length of tag identification has only 96 bits. Many researchers also provide complete solution for tag collision (Shih et al, 2006;Lee et al, 2004). Hence, we think that tag collision is almost impossible happened for RFID tag.…”
Section: System Assumptionmentioning
confidence: 99%
“…The first methodology uses filtering algorithms to correct incoming records when data is first captured. The filtration processes rely on anti-collision protocols to correct tagged observations as they are being physically read pre-data storage [8]. The second approach applies correcting algorithms to the stored data, which enhances the integrity of the observations within the data storage.…”
Section: Related Workmentioning
confidence: 99%
“…The different proposals fall into the two following categories: (i) splitting algorithms or (ii) probabilistic protocols. In the first group, a well-known protocol, called QT memoryless [2] exemplifies its operation: the reader sends a string prefix and all the tags whose ID match that prefix reply. The reader appends a new digit to the string prefix subsequently.…”
Section: Related Workmentioning
confidence: 99%
“…For passive tags, mainly due to the limitations of the devices, the protocols are very simple and most of them fall into the following two categories [2]:…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation