2009
DOI: 10.1007/s10796-009-9209-5
|View full text |Cite
|
Sign up to set email alerts
|

Threshold jumping and wrap-around scan techniques toward efficient tag identification in high density RFID systems

Abstract: With the emergence of wireless RFID technologies, the problem of Anti-Collision has been arousing attention and instigated researchers to propose different heuristic algorithms for advancing RFID systems operated in more efficient manner. However, there still have challenges on enhancing the system throughput and stability due to the underlying technologies had faced different limitation in system performance when network density is high. In this paper, we present a Threshold Jumping (TJ) and a Wrap-Around Sca… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
7
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 21 publications
0
7
0
Order By: Relevance
“…All tags in the reader's query area can be recognized by dividing to the subsets until each tag series has a single tag. Tree-based protocols do not lead to starvation problem, but delays in identifying tags are longer compared to ALOHA based protocols [15].…”
Section: Multiple-access and Anti-collision In Rfid Systemsmentioning
confidence: 99%
“…All tags in the reader's query area can be recognized by dividing to the subsets until each tag series has a single tag. Tree-based protocols do not lead to starvation problem, but delays in identifying tags are longer compared to ALOHA based protocols [15].…”
Section: Multiple-access and Anti-collision In Rfid Systemsmentioning
confidence: 99%
“…Techniques for RFID security have been discussed in many aspects , such as anti‐collision problems , redundant reader elimination , identification and authentication , and data privacy issues . We briefly assess the advantages and disadvantages of these different approaches, such as bitwise‐based , hash‐based , asymmetric and symmetric‐based mechanisms , in terms of cryptography complexity , system performance, and security strength.…”
Section: Related Workmentioning
confidence: 99%
“…This network can fulfill a bunch of tasks, e.g., the intelligent identification of objects, positioning, tracking, monitoring and supervision. IoT has gained much attention from researchers and practitioners from around the world [ 13 17 ].…”
Section: Introductionmentioning
confidence: 99%