SlideShare a Scribd company logo
1 of 9
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2890
An Energy-Oriented Collision Arbitration Protocol for Passive RFID Tag
Identification
Kyongjin Sok1, Prof. Gon Hong1, Kwangnam Choe2, Kinam Sin3, Changho Kim4, Chongil Rim5
1Institute of Information Technology, University of Sciences, Pyongyang, Democratic People’s Republic of Korea
2Department of Light Industry Machinery Engineering, Pyongyang University of Mechanical Engineering,
Pyongyang, Democratic People’ Republic of Korea
3Faculty of Mathematics, Kim Il Sung University, Pyongyang, Democratic People’s Republic of Korea
4Department of Information Technology, Kim Hyong Jik University, Pyongyang, Democratic People’s
Republic of Korea
5Department of Automation Engineering, Pyongyang University of Mechanical Engineering, Pyongyang,
Democratic People’s Republic of Korea
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Portable readers such as smartphones and
handheld devices are becoming increasingly popular in a
wide range of RFID applications due to the relatively easy
and inexpensive way to collect data. In order to expand the
battery life of the reader, efficient tag identification
protocols are indispensable in the large-scale passive RFID
systems. In the conventional tree-based protocols, an
excessive collision and a huge waste of transmitting bits
lead to considerable performance degradation. In this study,
an improved M-ary query collision tree protocol (IMQCT)
was proposed. In order to restrict the length of bits
transmitted by tags, a fixed-window procedure was applied
to M-ary query tree protocol, without calculating and
transmitting the window size in each query cycle. As a result
of the simulation, the proposed protocol was proved to be a
considerably improved protocol in energy and time savings,
compared to the existing tree-based protocols.
Key Words: RFID, anti-collision, tag identification, tree-
based, window methodology
1. INTRODUCTION
Radio frequency identification (RFID), a non-contact
automatic identification technology through radio
frequency signal, is vital to the implementation of Internet
of Things (IoT). With the rapid development of IoT
technology, RFID technology has been more and more
useful in our life and industry [1-3]. Because passive RFID
tags have very limited computation and communication
capabilities, how to quickly identify all tags is a
challenging problem [1]. Besides, energy saving for
portable readers such as smartphone and handheld device
is also an important issue [2]. This is because, in passive
RFID systems, the reader needs to not only supply energy
for its own operations, but also power up all tags in its
interrogation area. In RFID systems, a tag collision, in
which a reader cannot identify any tag, may occur when
multiple tags try to respond to the reader at the same
time. The occurrence of such collisions causes the tags to
retransmit their messages in the subsequent query;
therefore, it can not only elongate the tag identification
time but also increase the energy consumption at the
reader [1].
So far, many anti-collision protocols have been proposed
to solve such a collision problem, and they can be
classified into three broad categories: ALOHA-based, tree-
based and hybrid protocols. In general, ALOHA-based
protocols show a good performance in case that the
number of tags is relatively small due to the time slot used
for tag identification [1-6]. However, ALOHA-based
protocols have a tag starvation problem and suffer a
considerable degradation of performance in large-scale
systems. Tree-based protocols have the advantage of
successfully identifying all the tags even when the number
of tags in the interrogation area is enormous [1-3, 12-20].
Finally, hybrid protocols combine the advantages of
ALOHA and tree protocols. Hybrid protocols usually
perform better at the expense of higher hardware and
software complexity [2, 7].
The bit-tracking technology based on Manchester code,
which allows the reader to identify the locations of the
collided bit, have been widely used in tree-based
protocols, such as collision tree (CT) [14], k -Ary tree-
based anti-collision scheme ( k -TAS) [15], M -ary query
tree (MQT) [16] and collision window tree (CwT) [3, 18,
19] protocols. In general, the tree-based protocols such as
query tree (QT) [12] and CT transmit two queries which
differ only in the last bit. In k -TAS and MQT, multi-bit
arbitration is performed once per cycle using a mapping
function; therefore, it can reduce the number of query
cycles as compared to the binary tree protocols [15, 16].
As a result of the comparison between several ALOHA-
based and tree-based protocols, k -TAS showed the best
performance regarding the interrogation cycle and the
time required for the identification of all tags [17].
Anti-collision protocols for active RFID systems
considering energy efficiency have been proposed in
several papers [8-11]. However, the energy consumed in
the passive RFID systems has not yet been extensively
studied. Recently, the increasing number of RFID systems
that use handheld or portable devices requires the energy
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2891
saving of the readers. Moreover, the used anti-collision
protocol affects the reader’s power consumption,
particularly in a large-scale system. In general, the energy
cost of passive systems is related to two factors: the
number of query cycles and the time spent on transmitting
information between the reader and tags [1, 3]. Therefore,
to save the reader’s energy, both the number of query
cycles and the number of transmitted bits must be
reduced as low as possible. In previous research, most
existing tree-based protocols focus on eliminating or
reducing idle and collision slots.
Window-based methodologies, i.e., Query window tree
(QwT), collision window tree (CwT) and flexible query
window tree (FQwT), are attractive choices, which can
limit the length of tag response in passive RFID system
[18-20]. Window-based protocols effectively reduce the
reader’s energy with the help of heuristic window
procedures. However, this benefit is accompanied by the
addition of the number of slots due to the introduction of a
new type of slot, go-on slot.
In this study, a new protocol called improved M-ary query
collision tree (IMQCT) protocol was proposed by applying
a fixed-window procedure to M-ary query tree protocol
with memoryless and m -bits arbitration. The fixed-
window methodology can limit the length of the tag
response, without calculating and transmitting the
window size in each query cycle. As a result of the
comparison with the several existing tree-based protocols,
the proposed protocol showed better performance mainly
in terms of energy and time savings. The content of this
paper is arranged as follows. Section 2 describes the bit
window methodology and MQT protocol. The IMQCT
protocol is presented in Section 3. Section 4 shows the
simulation results compared with the several existing
tree-based protocols. Finally, the conclusions are drawn in
Section 5.
2. RELATED WORK
2.1 Bit tracking and MQT protocol
At first, the bit-tracking technology is briefly explained for
a better understanding of the proposed protocol.
Manchester coding has got very useful in the numerous
protocols for RFID tag identification because it can
accelerate the identification process due to its capability of
detecting the locations of collided bits [14-16]. In addition,
this coding method is specified in the ISO/IEC 14443
standard. However, it requires all tags within the readers
reading range to transmit their data synchronously. In
detail, 0 and 1 are logically encoded by the positive and
negative transitions of the voltage level, respectively. If the
bits with different values (0 and 1) are transmitted
simultaneously by more than two tags, the transitions
(positive and negative) of the received bits do not conform
to the coding rules as shown in Figure 1; as a result, the
location of collision bits can be detected.
Tag 1 : 1100
Tag 2 : 1010
Reader : 1XX0
Figure 1. Example of Manchester coding. “X” denotes a
collision bit.
In the traditional tree-based protocols including BS and QT,
the combined response of tags is processed bit by bit. In
case that the current bit is readable, the reader moves to
the next bit after directly identifying the bit. In case of the
bit on collision state, the reader splits the bit into 0 and 1
and re-interrogates with the two new queries. The overall
process can be explained as a binary tree. In contrast, MQT
can perform m -bits arbitration at a time because MQT is
not based on a binary tree but on an M-ary tree [16], in
which M is 2m
, and furthermore, Manchester coding is
capable of tracking a collision to an individual bit. The
mapping example for 2 bits is shown in Table 1.
Table 1. Example of the mapping table
2 bits in Tag ID 4 bits mapped string
00 0001
01 0010
10 0100
11 1000
The tags which have IDs matched with the query prefix
messaged from the reader will respond with the rest part
except for the matched part of their IDs. At this time, the
first m -bits in the rest ID will be mapped into M -bits. In
this paper, this query type is called mapping-rest query,
designated simply as mrq. M -bits string points out which
child node of the M -ary tree the tag belongs to. When p
designates the number of collision bits in the mapping part,
the reader generates new p queries ( 1,..., pqr qr ), where, p
sets of m -bits ( 1,..., pr r ) can be inversely mapped by using
the mapping table or mapping function. An example of the
4-ary tree formed in the identification process is illustrated
in Figure 2, and the communication procedure is shown in
Table 2. In Figure 2, ‘10’ is an empty node. After receiving
the query prefix ‘00’, two tags A (0001 0111) and B (0011
1010) respond with 0010 0111 and 1000 1010,
respectively, which produce *0*0 **1* (#2 of Table 2). By
using the previous prefix ‘00’ and the received mapping
part *0*0 ( 2p  ), the reader prepares two new queries
‘0001’ and ‘0011’ ( 1 01r  and 2 11r  ). M -ary query
protocol has two advantages over the conventional query
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2892
trees: (i) dividing collision tags into not two but many
subgroups ( M ) so that the total number of queries can be
reduced and (ii) identifying empty nodes so that the idle
slot can be eliminated.
1010 1000 1100 1100
0001 0111 0011 1010
<1>
ɛ
<2>
00
<3>
0001
<4>
0011
<5>
10
<6>
11
: collision node
: Identification nodeTag A Tag B
Tag C Tag D
Figure 2. Example of M-ary query tree ( 2m  ).
According to the combined mapping part received from the
tags, the reader can identify the locations of a ‘0’ bit and a
colliding bit. Such a ‘0’ bit and a colliding bit indicate that
the corresponding nodes are an empty node and a readable
or collided node, respectively.
Table 2. Communications procedure by using MQT
Slot Prefix Mapping
part
Rest part Identification
#1 ɛ **0* ******
#2 00 0*0* **1*
#3 0001 0010 11 0000 1011 (A)
#4 0011 0100 10 0010 0110 (B)
#5 10 0100 1000 1010 1000 (C)
#6 11 0001 1100 1100 1100 (C)
2.2 Window methodology
The QwT and CwT are the attractive methodologies
applying a bit window to QT and CT, respectively. CwT
adopts the bit-tracking, while QwT utilizes the CRC in order
to judge the slot status. The reader broadcasts a query
prefix [ 1 Lq q ] with the length L by attaching the window
size ( ws ) with the length of 2[log ] 1ws  bits. This bit
string ws tells the tag how many bits they should respond,
which is calculated in each query cycle. CwT has three
possible slot statuses, as follows:
 When at least one collision bit is detected, a
collision slot happens. Then, the reader generates
two new queries 1 1 1[ , ,0]L colq q w w   and
1 1 1[ , ,1]L colq q w w   by using bit-tracking, where
colw indicates the first collision bit in the window
part.
 When at least one tag responds, and the condition
L ws k  is satisfied, a go-on slot happens.
Then, the reader generates a new query by
attaching the received window to the previous
query prefix. The window size ws is recalculated
using the heuristic function in Eq. (1).
 When the condition L ws k  is satisfied, a
success slot happens. Then, the tag is identified
subsequently.
Eq. (1) shows an exponential heuristic function, where 
is an adjustable parameter, and it is selected through
experiments [18, 19].
( ) (1 )L
f L k e 
  (1)
The CwT protocol significantly reduces the number of bits
transmitted by tags. As a result, it achieves a considerable
energy saving. However, this benefit is accompanied with a
certain degree of increase in the numbers of slots and bits
transmitted by the reader because the use of bit window
forces this protocol to introduce a new type of slot, go-on
slot, which is the additional slot to obtain the last part of
tag ID. In addition, the window size needs to be
recalculated in each query cycle, and the reader’s query
message contains a bit string to specify the window size
[3].
3. PROPOSED IMQCT PROTOCOL
3.1 System transmission model
We use the transmission model defined by GS1 EPC, which
corresponds to the EPCglobal Class 1 Gen 2 Specification
[21]. Figure 3 illustrates the link timing of the collision, go-
on, and success slot. During the identification, time is
divided into slots, and each slot begins with the reader’s
query commands. The reader transmits the continuous-
wave (CW) RF signal and the query commands during the
time Rt . The tags harvest operating energy from this RF
signal and transmit their messages. After receiving the
reader’s command, the tags generate their responses
during the time 1T . The tag’s response lasts during the time
Tt . Additionally, 2T is the time duration from the finish of
tag response to reader transmission.
Query CW
Collision/Go-on/Success Slot
Reader
Tag Tag Response
tT
T1 T2tR
Figure 3. Linking time for collision, go-on and success slot.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2893
According to the above transmission model, the time and
energy model are described as follows. The time taken for
identifying n tags in the reading area consists of the time
required for transmitting the reader’s query and tag’s
response in each slot. Let cC , gC and sC denote the
numbers of the collision, go-on and successful slots,
respectively, and they can be counted in the reader side.
Therefore, the identification time is written as follows:
1 2( ) ( )c g sC C C
Ri Tii
T n T T T T
 
    (2)
where RiT and TiT refer to the time taken for transmitting
the reader’s query and tags’ response in the i -th slot,
respectively. The energy consumption of the reader is
expressed by (3) and calculated during the time of
transmitting and receiving information. The reader will
transmit the RF signal to power up passive tags with power
txP in each interrogation cycle. The reader will consume
extra power rxP to receive a tag’s response.
1 2( ) [ ( ) ]c g sC C C
tx Ri Ti rx Tii
E n P T T T T P T
 
       (3)
3.2 Fixed-window methodology
In tree-based protocols, the collision probability of tag
response is very high at the beginning of the identification
process, and the transmission of the rest bits except prefix
causes a long identification delay; moreover, the longer the
tag ID is, the more the waste of the transmitted bits is. In
MQT, both the M -bits mapping part and ID string are
responded in each slot. The occurrence of a collision makes
the M -bits string very useful but ID string wasted, and
thus, the communication overhead is increased. In order to
effectively limit the length of the tag response, the window
methodology is applied to the MQT protocol with none-idle
slot and m-bits arbitration feature.
The window-resizing methodology makes it possible to
decrease the length of the tag response. In other words, the
window needs to be resized as a smaller value in the trend
of a high probability of collision and as a larger value in the
trend of a low probability of collision. In general, the
collision prediction is difficult, and its implementation in
the reader and the tags are expensive. Therefore, the go-on
slot, in which no collision occurs in the window part, is
used for the collision prediction in the next query. As the
length of query prefix increases during the identification
process, the number of tags that belong to the node
corresponding to the query prefix decreases, and the
collision probability within the window part gradually
decreases, finally leading to the go-on slot. Especially in
MQT, since the collision tags are divided into many
subgroups ( M ), the collision probability for the next query
after the occurrence of the go-on slot is considerably
reduced. Therefore, reducing the number of queries by
transmitting the whole rest bit is more reasonable rather
than increasing the window size gradually. That is, the
window size is not changed until the go-on slot occurs, and
once the go-on slot occurs, the rest bits are transmitted. It
is called fixed-window methodology, differentiating it from
the traditional window methodology in which varies the
window size in each query cycle.
q1··· qL
Prefix
dL+m+1··· dL+m+F
Tag's response
m1··· mM
Reader-side
d1··· dL dL+1··· dL+m dL+m+1 ··· dk
q1··· qL
dL+m+1··· dL+m+Fm1··· mM
Tag-side
matching mapping windowing
M+F bits
Fbitsm bits
M bits Fbits
Figure 4. The fixed-window procedure on the collision
slot.
The fixed-window size affects the performance of the
protocol. If the fixed-window size is large, the number of
bits transmitted by the tag increases, and the collision
probability in the window part also increases. Thereby, the
occurrence probability of go-on slot is reduced, resulting in
an increased number of query-response cycles. In
particular, if the window size is large enough, the number
of bits transmitted by tags might be equal to the
performance of the MQT. This fixed-window methodology
can be simply implemented in the reader and the tags
because the use of the fixed-window does not require the
calculation of window size and transmission of the bit
string representing it in each query cycle.
The fixed-window is defined as a bit string of the fixed
length that the tag must transmit, and the length, F
( 1 F k L m    ), is a predefined parameter of the
system, where k and L are the lengths of the tag ID and
query prefix, respectively. Figure 4 shows the
communication procedure for the fixed-window query on
the collision slot. The introduction of the fixed-window
query into MQT allows the tag to transmit only the
mapping pattern and fixed-window part ( M F ), not the
rest of its ID ( k L bits). In the paper, this query type is
called mapping-window query (designated briefly as mwq).
Fixed-window procedure changes the creation process of
the collision and success slot. If two or more tags’ windows
do not include any different bit, a go-on slot situation
( )L m F k   which would result in a success slot but
may not be a success is produced. In this case, they need to
be re-queried until a success slot condition ( )L m F k  
is guaranteed. When there is no collision in the window
part, the reader uses the window part directly to generate
new queries, like a common part of CT, and therefore the
total query-response cycles can be reduced.
3.3 The proposed IMQCT protocol
IMQCT utilizes two types of the query; that is, mapping-
window query (mwq) and mapping-rest query (mrq), and
their messages contain a query prefix [ 1 Lq q ], indicating
to the tags whether to respond or not. Algorithm 1 and 2
shows the pseudo-code of the IMQCT protocol. The
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2894
identification procedure is executed until all the tags in the
interrogation area are identified. The query is initialized
with type = mwq and prefix = ‘ε’. The reader broadcasts a
query message and waits for the response from the tags.
After receiving the reader’s query, the tag compares the
prefix with its ID 1[ ]Ld d (Algorithm 2 line 3). After
successful matching, the tag maps m bits into M bits by
using the mapping table (Algorithm 2 line 4). According to
the type of query received by the reader, the tag decides
the length of the bit string that it should respond, as shown
below (Algorithm 2 lines 5–9).
,
,
F queryType mwq
r
k L m queryType mrq

 
  
(4)
In detail, if the type of query is mwq, the bit string to be
transmitted is the window part 1[ ]L FL m md d    .
Otherwise, the bit string to be transmitted is the rest tag ID
1[ ]L m kd d   . Then, the tag transmits the mapping pattern
1[ ]Mm m and the prepared bit string to the reader. After
receiving the tag response, the reader retrieves p sets of
m -bits from the combined mapping part with the length
M by using the mapping table (Algorithm 1 lines 7 and 8),
where p is the number of the collided bits in the combined
mapping part (1 2m
p  ). When a collision occurs in the
received bit string except for the mapping part, the reader
creates p new queries 1 1[ ]L mq q m m  (Algorithm 1 lines
10-14). When the type of the current query is mwq, and no
collision occurs in the window part, go-on status is
satisfied. At this time, the reader creates p mrq queries by
appending the m -bits string and window part to the
previous query, that is, 1 1 1[ ]L m Fq q m m w w   (Algorithm
1 lines 16-21). When the type of the current query is mrq,
and collision bit is not detected in the received bit string
except for the mapping part, the reader identifies p tag IDs
(Algorithm 1 lines 16-21). Table 3 illustrates an
identification process of IMQCT protocol. In this example,
we assume that there are four tags (A, B, C and D) which
have (000001100011), (001011101010), (110100011110)
and (111100111111) as their IDs, where 2m  and 2F  .
Algorithm 1 Reader Operation
(1) Initialize: query.type = mwq; query.prefix = ‘ε’
(2) Push query into S
(3) While S!=NULL do
(4) query = pop(S)
(5) broadcast(query)
(6) [mapPart, respBits]=receiveResponse()
(7) p=countCollBits(mapPart)
(8) mBits=demapping(mapPart)
(9) if isCollision(respBits) then
(10) for i=1 to p
(11) query.type=mwq
(12) query.prefix+=mBits[i]
(13) push(query)
(14) end for
(15) else
(16) if query.type=mwq then
(17) for i=1 to p
(18) query.type=mrq
(19) query.prefix+=mBits[i]+respBits
(20) push(query)
(21) end for
(22) else if query.type=mrq
(23) for i=1 to p
(24) tagID=query.prefix+mBits[i]+ respBits
(25) end for
(26) end if
(27) end if
(28) end while
Algorithm 2 Tag Operation
(1) Receive a query
(2) L=getPrefixLength(query)
(3) if query.prefix=ID[1:L] then
(4) mapPtn[1:M]=mapping(ID[L+1:L+m])
(5) if query.type=mwq then
(6) respBits=ID[L+m+1:L+m+F]
(7) else if query.type=mrq then
(8) respBits=ID[L+m+1:k]
(9) end if
(10) backscatter(mapPtn+respBits)
(11) end if
In Table 3, ‘*’ denotes collision, and the bit string in
parentheses indicates the mapping part received. When the
reader broadcasts a query mwq (ε), all tags respond with
their mapping patterns (0001, 0001, 1000 and 1000) and
window parts (00, 10, 01 and 11), respectively. At this
time, the mapping part and window part received by the
reader is (*00*) and ‘**’, respectively (#1 of Table 3). Using
demapping, the reader gets two m -bits (00 and 11) by
using the mapping table and then generates two query
commands mwq (00) and mwq (11).
Table 3. Identification process by using IMQCT ( 2M 
and 2F  )
Slot Reader query Received bits Slot status
#1 mwq (ε) (*00*) ** collision
#2 mwq (00) (0*0*) *1 collision
#3 mwq (0000) (0010) 10 go-on
#4 mrq (00000110) (0001) 11 success (A)
#5 mwq (0010) (1000) 10 go-on
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2895
#6 mrq (00101110) (0100) 10 success (B)
#7 mwq (11) (*0*0) 00 go-on
#8 mrq (110100) (0010) 1110 success (C)
#9 mrq (111100) (1000) 1111 success (D)
In #2 of Table 3, the reader sends a query mwq (00), where
the tag A and B matches the prefix (00), then two tags
respond with (0001) 01 and (0100) 11, respectively. Since
the collision occurs in the window part, the reader gets two
m -bits (00 and 10) from mapping part (0*0*) and then
prepares two new queries mwq (0000) and mwq (0010).
In #3, tag A matches the prefix (0000) and responds with
(0010) 10. Since there is no collision bit in the window
part, go-on slot status is satisfied. Then, the reader sends
mrq (00000110), tag A finally is identified (#4). Other tags
are also identified in the same way.
Collision node Go-on node Success node
Figure 5. The particular type of the M -ary tree ( 2m  ).
In order to simplify the theoretical analysis, we consider a
particular type of M -ary tree similar to the perfect M -ary
tree. In this tree, all internal nodes except the parent-of-
leaf nodes have M children, and each parent-of-leaf node
has only one leaf node, and all leaf nodes are in the same
depth. The root node is in the depth of 0 and the number of
the internal nodes at a depth of h is 2mh
. The parent-of-leaf
nodes are in depth H ( 1,2,3...H  ). Therefore, the parent-
of-leaf node corresponds to the go-on slot, while the leaf
node corresponds to the success slot. If tag IDs are
uniformly distributed, the tree constructed by the
distribution may be similar to this particular tree in shape.
The number of bits transmitted on the collision and go-on
slot is:
wb M F  (5)
The number of bits transmitted on the success slot can be
written as follows:
( 1)rb k m H F m M      (6)
Thus, the total number of bits transmitted by tags for the
above tree structure can be expressed as given in (7).
0
2 2
H
mh mH
w r
h
S b b

  (7)
The finite sum of exponential terms can be computed as
1
0
1
1
nn
i
i
a
a
a





 (8)
Substituting Eq. (8) into Eq. (7), MQfwTS can be written as
1
0
2 2 2
H
mh mH mH
IMQCT w w r
h
S b b b


  
2 1
2 2
2 1
mH
mH mH
w w rm
b b b

  

(9)
The average tag transmitting bit for one tag identification
in IMQCT is
2 1
w
IMQCT w rm
b
A b b  

2 ( 2)
2 1m
M F
k M H m

    

(10)
From Eq. (10), we can see that the number of tag
transmission bits decreases as the number of tags
increases. In particular, the number of tag transmission
bits is close to the tag length when 2m  and 1F  .
4. RESULTS AND DISCUSSION
This section presents the simulation results of the
proposed protocol using Visual Studio 2013 and Qt 5.5.0. A
comparison between IMQCT protocol and tree-based
protocols including CT, CwT and MQT is presented here.
First, the influence of changing F in IMQCT is shown in the
graph. Then all the protocols from state-of-the-art will be
compared with IMQCT under different tag sets.
Table. 4 Parameters used in simulations
Parameter Value
k 128 bits
Tari 6.25𝜇s
Data rate 160kbps
T1 18.86 𝜇s
T2 8.13 𝜇s
Ptx 825mW
Prx 125mW
It should be noticed that some overhead is not taken into
account in our simulation due to the communication
latency and the propagation delay from the signal
processing on the channel. The protocols are compared in a
scenario with one reader and a set of tags varying from 200
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2896
to 5000 tags. Tag IDs are assumed as uniformly distributed
and are dynamically generated for every simulation
iteration. The simulated results were averaged over 100
iterations for accuracy.
1 2 3 4 5 6 7 8 9 10
2.40
2.45
2.50
2.55
2.60
2.65
2.70
2.75
(a)
Slotspertag
Fixed window size
slots total bits
158
160
162
164
166
168
170
172
174
Totalbitspertag
1 2 3 4 5 6 7 8 9 10
0.94
0.96
0.98
1.00
1.02
1.04
1.06
(b)
Fixed window size
Energy(J)
energy time
1.06
1.08
1.10
1.12
1.14
1.16
Time(s)
Figure 6. Simulation results per tag: (a) the number of
slots and total transmitted bits and (b) consumed energy
and time.
Table 4 shows the parameters used in the simulations.
Tari is the duration of a data-0 ( 6.25Tar si  ) and it
influences the other parameters. To simplify the
calculation, Bits 0 and 1 have been considered as 1 Tari .
For CwT, the exponential function is used as a heuristic
function and the value of  is set 0.419.
1000 2000 3000 4000 5000
1.4
1.6
1.8
2.0
2.2
2.4
2.6
2.8
3.0
(a)
Numberofcycles
Number of tags
CT CwT MQT(m=2) MQT(m=4) IMQCT
1000 2000 3000 4000 5000
10
20
30
40
50
60
(b) CT CwT MQT(m=2) MQT(m=4) IMQCT
Number of tags
Readerbits
1000 2000 3000 4000 5000
120
140
160
180
200
220
240
(c) CT CwT MQT(m=2) MQT(m=4) IMQCT
Number of tags
Tagbits
Figure 7. Simulation results per tag: (a) the number of
slots, (b) the reader transmitting bits and (c) the tag
transmitting bits.
In order to validate the fixed-window methodology, the
fixed-window size needs to be adjusted since the number
of query cycles and transmitted bits is influenced by the
window size. This observation is carried out for varying
fixed-window size F and a set of tags ( 128k  and
1000n  ).
Figure 6 shows the obtained result: Figure 6 (a) shows the
number of slots and total bits per tag, and Figure 6 (b)
shows the energy and time consumed to identify one tag.
As can be observed from Figure 6, as F increases, the
value of all performance metrics increases. In addition,
when 4m  , the number of slots is smaller than when
2m  . However, the number of total transmitted bits and
the energy and time consumed are larger. From the
observation above, we can see that the proposed protocol
gives the best performance when 2m  and 1F  , and
thus these parameters are used in simulations.
Figure 7 (a) shows the average number of slots required to
identify a given number of tags. From the figure, we can see
that MQT ( 4m  ) consumes the least slots, and the
window-based protocols (CwT and IMQCT) require more
reader bits than other protocols because they introduce the
go-on slot, which is the additional slot to obtain the last
part of the tag ID. IMQCT consumes fewer slots than CwT,
and it is because that IMQCT is based on MQT that can
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2897
arbitrate m-bits in each cycle. As can be seen in Figure 7
(c), IMQCT protocol outperforms all compared protocols in
terms of the number of bits transmitted by tags. More
specifically, as described in Eq. (10), when the number of
tags increases, the average number of tag transmission bits
decreases. Moreover, when 1000n  , the average number
of bits transmitted by tag is 130.8, which is close to the tag
ID length.
Figure 8 compares the bit efficiency of various protocols.
The bits efficiency is calculated by the expression
( / ) 100tk a  , which means the usefulness of tags’
responses and the influence of the collision and go-on slots
(here, ta is the average number of bits transmitted by the
reader and tags). As can be observed from the figure,
IMQCT achieves the highest bit efficiency, and it is about
77.5% when the tag number is 5000.
1000 2000 3000 4000 5000
50
55
60
65
70
75
80
CT CwT MQT(m=2) MQT(m=4) IMQCT
Number of tags
Bitefficiency
Figure 8. Bits efficiency.
Many anti-collision protocols have been evaluated using
the number of slots and transmitted bits, but not the time
and energy. The time and energy required to identify all
tags in the interrogation area are calculated by using Eq.
(2) and (3). Figure 9 shows the identification speed of
IMQCT compared to other protocols.
1000 2000 3000 4000 5000
600
650
700
750
800
850
900
950
CT CwT MQT(m=2) MQT(m=4) IMQCT
Number of tags
IdentificationSpeed(tags/s)
Figure 9. Identification speed.
1000 2000 3000 4000 5000
1.0
1.1
1.2
1.3
1.4
1.5
1.6
CT CwT MQT(m=2) MQT(m=4) IMQCT
Number of tags
Energyconsumption(mJ)
Figure 10. Energy consumption per tag.
Figure 10 shows the simulation result in terms of energy
consumed by the reader. In this comparison, IMQCT
outperforms the CwT and other tree-based protocols for all
the different sets of tags. For example, the proposed
protocol saved more energy than CT, CwT, MQT ( 2m  )
and MQT ( 4m  ) up to 34.8%, 18.3%, 28.5% and 15.2%,
respectively when the number of tags is 5000. Therefore,
the proposed protocol not only achieves a higher
identification speed but also saves energy consumption
under the same conditions.
5. CONCLUSION
In this paper, a new anti-collision protocol called IMQCT
was proposed. IMQCT was designed by applying a fixed-
window procedure to the MQT protocol in order to limit
the number of bits transmitted by tags. The proposed
protocol was compared with the existing several tree-
based protocols as regard to relation to the number of
slots, transmitted bits, consumed energy and identification
speed. Simulation results showed that IMQCT
outperformed them in terms of identification speed under
low energy consumption. Therefore, IMQCT can be a
suitable candidate where energy-efficiency is sought in the
large-scale passive RFID system. There are still some issues
to be resolved in our future work. Although the proposed
protocol has improved the performance of MQT with the
introduction of fixed-window, it still suffers from a large
number of slots (go-on slot). Our future work will focus on
the minimization of the number of slot numbers. In
addition, the effect of various tag ID distributions needs to
be investigated since IMQCT is based on the uniqueness of
the tag IDs.
References
[1] Klair DK, Chin KW and Raad R. A survey and tutorial of
RFID anti-collision protocols. IEEE Commun Surv Tut
2010; 12(3): 400-421.
[2] Zhu L and Yum TS. A critical survey and analysis of
RFID anti-collision mechanisms. IEEE Commun Mag
2011; 49(5): 214–221.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2898
[3] Cmiljanic N, Landaluce H and Perallos A. A comparison
of RFID anti-collision protocols for tag identification.
Appl Sci-Basel 2018; 8(8): 1282.
[4] Vogt H. Efficient object identification with passive
RFID tags. In: Proceedings of the international
conference on pervasive computing 2002; 98–113.
[5] Zhang L, Zhang J and Tang X. Assigned tree slotted
aloha RFID tag anti-collision protocols. IEEE T Wirel
Commun 2013; 12(11): 5493–5505.
[6] Wu H, Zeng Y, Feng J, et al. Binary tree slotted ALOHA
for passive RFID tag anticollision. IEEE T Parall Distr
2013; 24(1): 19–31.
[7] Yang J, Wang YH, Cai QL, et al. A Novel Hybrid
Anticollision Algorithm for RFID System Based on
Grouped Dynamic Framed Recognition and Binary
Tree Recursive Process. Int J Distrib Sens N 2015;
11(8): 641327.
[8] Namboodiri V, Gao L. Energy-aware tag anticollision
protocols for RFID systems. IEEE T Mobile Comput
2010; 9(1): 44–59.
[9] Yan X, and Liu X. Evaluating the energy consumption
of the RFID tag collision resolution protocols.
Telecommun Syst 2013; 52(4): 2561–2568.
[10] Klair DK, Chin KW and Raad R. An investigation into
the energy efficiency of pure and slotted aloha based
RFID anti-collision protocols. In: Proceedings of 2007
IEEE international symposium on a world of wireless,
mobile and multimedia networks 2007; 1–4.
[11] Rahimian S, Noori M and Ardakani M. An energy-
efficient adaptive frameless ALOHA protocol. EURASIP
J Wirel Comm 2016; 2016:186.
[12] C Law, K Lee, K Y Siu, Efficient memoryless protocol
for tag identification, In: Proceedings of the 4th
international workshop on discrete algorithms and
methods for mobile computing and communications.
75–84 (2000)
[13] Zhang W, Guo YJ, Tang XM, et al. An Efficient Adaptive
Anticollision Algorithm Based on 4-Ary Pruning Query
Tree. Int J Distrib Sens N 2013; 9(12): 848746.
[14] Jia X, Feng Q and Ma C. An efficient anti-collision
protocol for RFID tag identification. IEEE Commun
Lett 2010; 14(11): 1014-1016.
[15] Chen Y, Yeh K, Lo N, et al. Adaptive collision resolution
for efficient RFID tag identification. EURASIP J Wirel
Comm 2011; 2011:139.
[16] Shin J, Jeon B and Yang D. Multiple RFID tags
identification with M-ary query tree scheme. IEEE
Commun Lett 2013; 17(3): 604-607.
[17] M A Kalache, L Fergani, Performances comparison of
RFID anti-collision algorithms. In: Proceedings of
international conference on multimedia computing
and systems, 808-813 (2014)
[18] Landaluce H, Perallos A and Angulo I. Managing the
number of tag bits transmitted in a bit-tracking RFID
collision resolution protocol. Sensors 2014; 14: 1010–
1027.
[19] Landaluce H, Perallos A, Onieva E, et al. An energy and
identification time decreasing procedure for
memoryless RFID tag anticollision protocols. IEEE T
Wirel Commun 2016: 15(6); 4234–4247.
[20] Cmiljanic N, Landaluce H, Perallos A, et al. Influence of
the distribution of tag IDs on RFID memoryless anti-
collision protocols. Sensors 2017; 17(8): 2017:1891.
[21] GS1, EPC™ Radio-Frequency Identity Protocols
Generation-2 UHF RFID Standard Specification for
RFID Air Interface Protocol for Communications at
860 MHz–960Hz Ver. 2.1 (2018)

More Related Content

What's hot

Automatic recognition of the digital modulation types using the artificial ne...
Automatic recognition of the digital modulation types using the artificial ne...Automatic recognition of the digital modulation types using the artificial ne...
Automatic recognition of the digital modulation types using the artificial ne...IJECEIAES
 
Paper id 312201514
Paper id 312201514Paper id 312201514
Paper id 312201514IJRAT
 
Comparative Performance Analysis of Wireless Communication Protocols for Inte...
Comparative Performance Analysis of Wireless Communication Protocols for Inte...Comparative Performance Analysis of Wireless Communication Protocols for Inte...
Comparative Performance Analysis of Wireless Communication Protocols for Inte...chokrio
 
IRJET - Color Qr Code
IRJET -  	  Color Qr CodeIRJET -  	  Color Qr Code
IRJET - Color Qr CodeIRJET Journal
 
Multi User Detection in CDMA System Using Linear and Non Linear Detector
Multi User Detection in CDMA System Using Linear and Non Linear DetectorMulti User Detection in CDMA System Using Linear and Non Linear Detector
Multi User Detection in CDMA System Using Linear and Non Linear DetectorWaqas Tariq
 
07.dsn.rfid reliability
07.dsn.rfid reliability07.dsn.rfid reliability
07.dsn.rfid reliabilitynikhiltiware
 
Review of Deep Neural Network Detectors in SM MIMO System
Review of Deep Neural Network Detectors in SM MIMO SystemReview of Deep Neural Network Detectors in SM MIMO System
Review of Deep Neural Network Detectors in SM MIMO Systemijtsrd
 
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET Journal
 
Wireless Data Acquisition System Using ARM Cortex M-3
Wireless Data Acquisition System Using ARM Cortex M-3Wireless Data Acquisition System Using ARM Cortex M-3
Wireless Data Acquisition System Using ARM Cortex M-3IOSR Journals
 
Paper id 2520141232
Paper id 2520141232Paper id 2520141232
Paper id 2520141232IJRAT
 
Implementing radio frequency identification technology in libraries advantage...
Implementing radio frequency identification technology in libraries advantage...Implementing radio frequency identification technology in libraries advantage...
Implementing radio frequency identification technology in libraries advantage...Ghouse Modin Mamdapur
 

What's hot (12)

Automatic recognition of the digital modulation types using the artificial ne...
Automatic recognition of the digital modulation types using the artificial ne...Automatic recognition of the digital modulation types using the artificial ne...
Automatic recognition of the digital modulation types using the artificial ne...
 
Paper id 312201514
Paper id 312201514Paper id 312201514
Paper id 312201514
 
Comparative Performance Analysis of Wireless Communication Protocols for Inte...
Comparative Performance Analysis of Wireless Communication Protocols for Inte...Comparative Performance Analysis of Wireless Communication Protocols for Inte...
Comparative Performance Analysis of Wireless Communication Protocols for Inte...
 
IRJET - Color Qr Code
IRJET -  	  Color Qr CodeIRJET -  	  Color Qr Code
IRJET - Color Qr Code
 
Giacomo Cernicchi - BSc_ENG
Giacomo Cernicchi - BSc_ENGGiacomo Cernicchi - BSc_ENG
Giacomo Cernicchi - BSc_ENG
 
Multi User Detection in CDMA System Using Linear and Non Linear Detector
Multi User Detection in CDMA System Using Linear and Non Linear DetectorMulti User Detection in CDMA System Using Linear and Non Linear Detector
Multi User Detection in CDMA System Using Linear and Non Linear Detector
 
07.dsn.rfid reliability
07.dsn.rfid reliability07.dsn.rfid reliability
07.dsn.rfid reliability
 
Review of Deep Neural Network Detectors in SM MIMO System
Review of Deep Neural Network Detectors in SM MIMO SystemReview of Deep Neural Network Detectors in SM MIMO System
Review of Deep Neural Network Detectors in SM MIMO System
 
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
 
Wireless Data Acquisition System Using ARM Cortex M-3
Wireless Data Acquisition System Using ARM Cortex M-3Wireless Data Acquisition System Using ARM Cortex M-3
Wireless Data Acquisition System Using ARM Cortex M-3
 
Paper id 2520141232
Paper id 2520141232Paper id 2520141232
Paper id 2520141232
 
Implementing radio frequency identification technology in libraries advantage...
Implementing radio frequency identification technology in libraries advantage...Implementing radio frequency identification technology in libraries advantage...
Implementing radio frequency identification technology in libraries advantage...
 

Similar to IRJET- An Energy-Oriented Collision Arbitration Protocol for Passive RFID Tag Identification

Grouping based radio frequency identification anti-collision protocols for d...
Grouping based radio frequency identification anti-collision  protocols for d...Grouping based radio frequency identification anti-collision  protocols for d...
Grouping based radio frequency identification anti-collision protocols for d...IJECEIAES
 
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoT
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoTIRJET- Energy Efficient Technique to Reduce Energy Consumption in IoT
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoTIRJET Journal
 
IRJET- An Evaluation of the Performance Parameters of CMOS and CNTFET based D...
IRJET- An Evaluation of the Performance Parameters of CMOS and CNTFET based D...IRJET- An Evaluation of the Performance Parameters of CMOS and CNTFET based D...
IRJET- An Evaluation of the Performance Parameters of CMOS and CNTFET based D...IRJET Journal
 
Wireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmWireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmjournalBEEI
 
IRJET - Smartcard based Grocerydispensing Sytem
IRJET - Smartcard based Grocerydispensing SytemIRJET - Smartcard based Grocerydispensing Sytem
IRJET - Smartcard based Grocerydispensing SytemIRJET Journal
 
The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...IJCNCJournal
 
Best strategy to control data on internet-of-robotic-things in heterogeneous ...
Best strategy to control data on internet-of-robotic-things in heterogeneous ...Best strategy to control data on internet-of-robotic-things in heterogeneous ...
Best strategy to control data on internet-of-robotic-things in heterogeneous ...IJECEIAES
 
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...TELKOMNIKA JOURNAL
 
Performance Analysis of Preamble Detection at Maximum Throughput Level for OFDM
Performance Analysis of Preamble Detection at Maximum Throughput Level for OFDMPerformance Analysis of Preamble Detection at Maximum Throughput Level for OFDM
Performance Analysis of Preamble Detection at Maximum Throughput Level for OFDMijtsrd
 
Performance Analysis of Different Combination of Mimo Antenna System using Di...
Performance Analysis of Different Combination of Mimo Antenna System using Di...Performance Analysis of Different Combination of Mimo Antenna System using Di...
Performance Analysis of Different Combination of Mimo Antenna System using Di...ijtsrd
 
IRJET- Power Line Carrier Communication
IRJET- Power Line Carrier CommunicationIRJET- Power Line Carrier Communication
IRJET- Power Line Carrier CommunicationIRJET Journal
 
Smart automatic petrol pump system based on internet of things
Smart automatic petrol pump system based on internet of things Smart automatic petrol pump system based on internet of things
Smart automatic petrol pump system based on internet of things IJECEIAES
 
Performance evaluation of bandwidth optimization algorithm (boa) in atm network
Performance evaluation of bandwidth optimization algorithm (boa) in atm networkPerformance evaluation of bandwidth optimization algorithm (boa) in atm network
Performance evaluation of bandwidth optimization algorithm (boa) in atm networkEditor Jacotech
 
IRJET- Investigation on Delay and Power Minimization in IEEE 802.15.4 Protoco...
IRJET- Investigation on Delay and Power Minimization in IEEE 802.15.4 Protoco...IRJET- Investigation on Delay and Power Minimization in IEEE 802.15.4 Protoco...
IRJET- Investigation on Delay and Power Minimization in IEEE 802.15.4 Protoco...IRJET Journal
 
IRJET- Smart Trolley using Bluetooth Module
IRJET-  	  Smart Trolley using Bluetooth ModuleIRJET-  	  Smart Trolley using Bluetooth Module
IRJET- Smart Trolley using Bluetooth ModuleIRJET Journal
 
IRJET - A Review on Congestion Control Methods in Mobile Adhoc Networks
IRJET - A Review on Congestion Control Methods in Mobile Adhoc NetworksIRJET - A Review on Congestion Control Methods in Mobile Adhoc Networks
IRJET - A Review on Congestion Control Methods in Mobile Adhoc NetworksIRJET Journal
 
Network selection based on chi-square distance and reputation for internet o...
Network selection based on chi-square distance and reputation  for internet o...Network selection based on chi-square distance and reputation  for internet o...
Network selection based on chi-square distance and reputation for internet o...IJECEIAES
 
Evaluation and Design an Efficient Mobile WiMax Architecture Using Coded OFDM...
Evaluation and Design an Efficient Mobile WiMax Architecture Using Coded OFDM...Evaluation and Design an Efficient Mobile WiMax Architecture Using Coded OFDM...
Evaluation and Design an Efficient Mobile WiMax Architecture Using Coded OFDM...IRJET Journal
 
DoS attacks detection in MQTT networks
DoS attacks detection in MQTT networksDoS attacks detection in MQTT networks
DoS attacks detection in MQTT networksnooriasukmaningtyas
 

Similar to IRJET- An Energy-Oriented Collision Arbitration Protocol for Passive RFID Tag Identification (20)

Grouping based radio frequency identification anti-collision protocols for d...
Grouping based radio frequency identification anti-collision  protocols for d...Grouping based radio frequency identification anti-collision  protocols for d...
Grouping based radio frequency identification anti-collision protocols for d...
 
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoT
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoTIRJET- Energy Efficient Technique to Reduce Energy Consumption in IoT
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoT
 
IRJET- An Evaluation of the Performance Parameters of CMOS and CNTFET based D...
IRJET- An Evaluation of the Performance Parameters of CMOS and CNTFET based D...IRJET- An Evaluation of the Performance Parameters of CMOS and CNTFET based D...
IRJET- An Evaluation of the Performance Parameters of CMOS and CNTFET based D...
 
Wireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmWireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithm
 
IRJET - Smartcard based Grocerydispensing Sytem
IRJET - Smartcard based Grocerydispensing SytemIRJET - Smartcard based Grocerydispensing Sytem
IRJET - Smartcard based Grocerydispensing Sytem
 
The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...
 
Best strategy to control data on internet-of-robotic-things in heterogeneous ...
Best strategy to control data on internet-of-robotic-things in heterogeneous ...Best strategy to control data on internet-of-robotic-things in heterogeneous ...
Best strategy to control data on internet-of-robotic-things in heterogeneous ...
 
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
 
Performance Analysis of Preamble Detection at Maximum Throughput Level for OFDM
Performance Analysis of Preamble Detection at Maximum Throughput Level for OFDMPerformance Analysis of Preamble Detection at Maximum Throughput Level for OFDM
Performance Analysis of Preamble Detection at Maximum Throughput Level for OFDM
 
Performance Analysis of Different Combination of Mimo Antenna System using Di...
Performance Analysis of Different Combination of Mimo Antenna System using Di...Performance Analysis of Different Combination of Mimo Antenna System using Di...
Performance Analysis of Different Combination of Mimo Antenna System using Di...
 
IRJET- Power Line Carrier Communication
IRJET- Power Line Carrier CommunicationIRJET- Power Line Carrier Communication
IRJET- Power Line Carrier Communication
 
Smart automatic petrol pump system based on internet of things
Smart automatic petrol pump system based on internet of things Smart automatic petrol pump system based on internet of things
Smart automatic petrol pump system based on internet of things
 
Performance evaluation of bandwidth optimization algorithm (boa) in atm network
Performance evaluation of bandwidth optimization algorithm (boa) in atm networkPerformance evaluation of bandwidth optimization algorithm (boa) in atm network
Performance evaluation of bandwidth optimization algorithm (boa) in atm network
 
IRJET- Investigation on Delay and Power Minimization in IEEE 802.15.4 Protoco...
IRJET- Investigation on Delay and Power Minimization in IEEE 802.15.4 Protoco...IRJET- Investigation on Delay and Power Minimization in IEEE 802.15.4 Protoco...
IRJET- Investigation on Delay and Power Minimization in IEEE 802.15.4 Protoco...
 
IRJET- Smart Trolley using Bluetooth Module
IRJET-  	  Smart Trolley using Bluetooth ModuleIRJET-  	  Smart Trolley using Bluetooth Module
IRJET- Smart Trolley using Bluetooth Module
 
IRJET - A Review on Congestion Control Methods in Mobile Adhoc Networks
IRJET - A Review on Congestion Control Methods in Mobile Adhoc NetworksIRJET - A Review on Congestion Control Methods in Mobile Adhoc Networks
IRJET - A Review on Congestion Control Methods in Mobile Adhoc Networks
 
10.1.1.150.595
10.1.1.150.59510.1.1.150.595
10.1.1.150.595
 
Network selection based on chi-square distance and reputation for internet o...
Network selection based on chi-square distance and reputation  for internet o...Network selection based on chi-square distance and reputation  for internet o...
Network selection based on chi-square distance and reputation for internet o...
 
Evaluation and Design an Efficient Mobile WiMax Architecture Using Coded OFDM...
Evaluation and Design an Efficient Mobile WiMax Architecture Using Coded OFDM...Evaluation and Design an Efficient Mobile WiMax Architecture Using Coded OFDM...
Evaluation and Design an Efficient Mobile WiMax Architecture Using Coded OFDM...
 
DoS attacks detection in MQTT networks
DoS attacks detection in MQTT networksDoS attacks detection in MQTT networks
DoS attacks detection in MQTT networks
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsmeharikiros2
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...ppkakm
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesChandrakantDivate1
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwaitjaanualu31
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdfKamal Acharya
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257subhasishdas79
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...josephjonse
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementDr. Deepak Mudgal
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxMustafa Ahmed
 

Recently uploaded (20)

Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systems
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdf
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 

IRJET- An Energy-Oriented Collision Arbitration Protocol for Passive RFID Tag Identification

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2890 An Energy-Oriented Collision Arbitration Protocol for Passive RFID Tag Identification Kyongjin Sok1, Prof. Gon Hong1, Kwangnam Choe2, Kinam Sin3, Changho Kim4, Chongil Rim5 1Institute of Information Technology, University of Sciences, Pyongyang, Democratic People’s Republic of Korea 2Department of Light Industry Machinery Engineering, Pyongyang University of Mechanical Engineering, Pyongyang, Democratic People’ Republic of Korea 3Faculty of Mathematics, Kim Il Sung University, Pyongyang, Democratic People’s Republic of Korea 4Department of Information Technology, Kim Hyong Jik University, Pyongyang, Democratic People’s Republic of Korea 5Department of Automation Engineering, Pyongyang University of Mechanical Engineering, Pyongyang, Democratic People’s Republic of Korea ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Portable readers such as smartphones and handheld devices are becoming increasingly popular in a wide range of RFID applications due to the relatively easy and inexpensive way to collect data. In order to expand the battery life of the reader, efficient tag identification protocols are indispensable in the large-scale passive RFID systems. In the conventional tree-based protocols, an excessive collision and a huge waste of transmitting bits lead to considerable performance degradation. In this study, an improved M-ary query collision tree protocol (IMQCT) was proposed. In order to restrict the length of bits transmitted by tags, a fixed-window procedure was applied to M-ary query tree protocol, without calculating and transmitting the window size in each query cycle. As a result of the simulation, the proposed protocol was proved to be a considerably improved protocol in energy and time savings, compared to the existing tree-based protocols. Key Words: RFID, anti-collision, tag identification, tree- based, window methodology 1. INTRODUCTION Radio frequency identification (RFID), a non-contact automatic identification technology through radio frequency signal, is vital to the implementation of Internet of Things (IoT). With the rapid development of IoT technology, RFID technology has been more and more useful in our life and industry [1-3]. Because passive RFID tags have very limited computation and communication capabilities, how to quickly identify all tags is a challenging problem [1]. Besides, energy saving for portable readers such as smartphone and handheld device is also an important issue [2]. This is because, in passive RFID systems, the reader needs to not only supply energy for its own operations, but also power up all tags in its interrogation area. In RFID systems, a tag collision, in which a reader cannot identify any tag, may occur when multiple tags try to respond to the reader at the same time. The occurrence of such collisions causes the tags to retransmit their messages in the subsequent query; therefore, it can not only elongate the tag identification time but also increase the energy consumption at the reader [1]. So far, many anti-collision protocols have been proposed to solve such a collision problem, and they can be classified into three broad categories: ALOHA-based, tree- based and hybrid protocols. In general, ALOHA-based protocols show a good performance in case that the number of tags is relatively small due to the time slot used for tag identification [1-6]. However, ALOHA-based protocols have a tag starvation problem and suffer a considerable degradation of performance in large-scale systems. Tree-based protocols have the advantage of successfully identifying all the tags even when the number of tags in the interrogation area is enormous [1-3, 12-20]. Finally, hybrid protocols combine the advantages of ALOHA and tree protocols. Hybrid protocols usually perform better at the expense of higher hardware and software complexity [2, 7]. The bit-tracking technology based on Manchester code, which allows the reader to identify the locations of the collided bit, have been widely used in tree-based protocols, such as collision tree (CT) [14], k -Ary tree- based anti-collision scheme ( k -TAS) [15], M -ary query tree (MQT) [16] and collision window tree (CwT) [3, 18, 19] protocols. In general, the tree-based protocols such as query tree (QT) [12] and CT transmit two queries which differ only in the last bit. In k -TAS and MQT, multi-bit arbitration is performed once per cycle using a mapping function; therefore, it can reduce the number of query cycles as compared to the binary tree protocols [15, 16]. As a result of the comparison between several ALOHA- based and tree-based protocols, k -TAS showed the best performance regarding the interrogation cycle and the time required for the identification of all tags [17]. Anti-collision protocols for active RFID systems considering energy efficiency have been proposed in several papers [8-11]. However, the energy consumed in the passive RFID systems has not yet been extensively studied. Recently, the increasing number of RFID systems that use handheld or portable devices requires the energy
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2891 saving of the readers. Moreover, the used anti-collision protocol affects the reader’s power consumption, particularly in a large-scale system. In general, the energy cost of passive systems is related to two factors: the number of query cycles and the time spent on transmitting information between the reader and tags [1, 3]. Therefore, to save the reader’s energy, both the number of query cycles and the number of transmitted bits must be reduced as low as possible. In previous research, most existing tree-based protocols focus on eliminating or reducing idle and collision slots. Window-based methodologies, i.e., Query window tree (QwT), collision window tree (CwT) and flexible query window tree (FQwT), are attractive choices, which can limit the length of tag response in passive RFID system [18-20]. Window-based protocols effectively reduce the reader’s energy with the help of heuristic window procedures. However, this benefit is accompanied by the addition of the number of slots due to the introduction of a new type of slot, go-on slot. In this study, a new protocol called improved M-ary query collision tree (IMQCT) protocol was proposed by applying a fixed-window procedure to M-ary query tree protocol with memoryless and m -bits arbitration. The fixed- window methodology can limit the length of the tag response, without calculating and transmitting the window size in each query cycle. As a result of the comparison with the several existing tree-based protocols, the proposed protocol showed better performance mainly in terms of energy and time savings. The content of this paper is arranged as follows. Section 2 describes the bit window methodology and MQT protocol. The IMQCT protocol is presented in Section 3. Section 4 shows the simulation results compared with the several existing tree-based protocols. Finally, the conclusions are drawn in Section 5. 2. RELATED WORK 2.1 Bit tracking and MQT protocol At first, the bit-tracking technology is briefly explained for a better understanding of the proposed protocol. Manchester coding has got very useful in the numerous protocols for RFID tag identification because it can accelerate the identification process due to its capability of detecting the locations of collided bits [14-16]. In addition, this coding method is specified in the ISO/IEC 14443 standard. However, it requires all tags within the readers reading range to transmit their data synchronously. In detail, 0 and 1 are logically encoded by the positive and negative transitions of the voltage level, respectively. If the bits with different values (0 and 1) are transmitted simultaneously by more than two tags, the transitions (positive and negative) of the received bits do not conform to the coding rules as shown in Figure 1; as a result, the location of collision bits can be detected. Tag 1 : 1100 Tag 2 : 1010 Reader : 1XX0 Figure 1. Example of Manchester coding. “X” denotes a collision bit. In the traditional tree-based protocols including BS and QT, the combined response of tags is processed bit by bit. In case that the current bit is readable, the reader moves to the next bit after directly identifying the bit. In case of the bit on collision state, the reader splits the bit into 0 and 1 and re-interrogates with the two new queries. The overall process can be explained as a binary tree. In contrast, MQT can perform m -bits arbitration at a time because MQT is not based on a binary tree but on an M-ary tree [16], in which M is 2m , and furthermore, Manchester coding is capable of tracking a collision to an individual bit. The mapping example for 2 bits is shown in Table 1. Table 1. Example of the mapping table 2 bits in Tag ID 4 bits mapped string 00 0001 01 0010 10 0100 11 1000 The tags which have IDs matched with the query prefix messaged from the reader will respond with the rest part except for the matched part of their IDs. At this time, the first m -bits in the rest ID will be mapped into M -bits. In this paper, this query type is called mapping-rest query, designated simply as mrq. M -bits string points out which child node of the M -ary tree the tag belongs to. When p designates the number of collision bits in the mapping part, the reader generates new p queries ( 1,..., pqr qr ), where, p sets of m -bits ( 1,..., pr r ) can be inversely mapped by using the mapping table or mapping function. An example of the 4-ary tree formed in the identification process is illustrated in Figure 2, and the communication procedure is shown in Table 2. In Figure 2, ‘10’ is an empty node. After receiving the query prefix ‘00’, two tags A (0001 0111) and B (0011 1010) respond with 0010 0111 and 1000 1010, respectively, which produce *0*0 **1* (#2 of Table 2). By using the previous prefix ‘00’ and the received mapping part *0*0 ( 2p  ), the reader prepares two new queries ‘0001’ and ‘0011’ ( 1 01r  and 2 11r  ). M -ary query protocol has two advantages over the conventional query
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2892 trees: (i) dividing collision tags into not two but many subgroups ( M ) so that the total number of queries can be reduced and (ii) identifying empty nodes so that the idle slot can be eliminated. 1010 1000 1100 1100 0001 0111 0011 1010 <1> ɛ <2> 00 <3> 0001 <4> 0011 <5> 10 <6> 11 : collision node : Identification nodeTag A Tag B Tag C Tag D Figure 2. Example of M-ary query tree ( 2m  ). According to the combined mapping part received from the tags, the reader can identify the locations of a ‘0’ bit and a colliding bit. Such a ‘0’ bit and a colliding bit indicate that the corresponding nodes are an empty node and a readable or collided node, respectively. Table 2. Communications procedure by using MQT Slot Prefix Mapping part Rest part Identification #1 ɛ **0* ****** #2 00 0*0* **1* #3 0001 0010 11 0000 1011 (A) #4 0011 0100 10 0010 0110 (B) #5 10 0100 1000 1010 1000 (C) #6 11 0001 1100 1100 1100 (C) 2.2 Window methodology The QwT and CwT are the attractive methodologies applying a bit window to QT and CT, respectively. CwT adopts the bit-tracking, while QwT utilizes the CRC in order to judge the slot status. The reader broadcasts a query prefix [ 1 Lq q ] with the length L by attaching the window size ( ws ) with the length of 2[log ] 1ws  bits. This bit string ws tells the tag how many bits they should respond, which is calculated in each query cycle. CwT has three possible slot statuses, as follows:  When at least one collision bit is detected, a collision slot happens. Then, the reader generates two new queries 1 1 1[ , ,0]L colq q w w   and 1 1 1[ , ,1]L colq q w w   by using bit-tracking, where colw indicates the first collision bit in the window part.  When at least one tag responds, and the condition L ws k  is satisfied, a go-on slot happens. Then, the reader generates a new query by attaching the received window to the previous query prefix. The window size ws is recalculated using the heuristic function in Eq. (1).  When the condition L ws k  is satisfied, a success slot happens. Then, the tag is identified subsequently. Eq. (1) shows an exponential heuristic function, where  is an adjustable parameter, and it is selected through experiments [18, 19]. ( ) (1 )L f L k e    (1) The CwT protocol significantly reduces the number of bits transmitted by tags. As a result, it achieves a considerable energy saving. However, this benefit is accompanied with a certain degree of increase in the numbers of slots and bits transmitted by the reader because the use of bit window forces this protocol to introduce a new type of slot, go-on slot, which is the additional slot to obtain the last part of tag ID. In addition, the window size needs to be recalculated in each query cycle, and the reader’s query message contains a bit string to specify the window size [3]. 3. PROPOSED IMQCT PROTOCOL 3.1 System transmission model We use the transmission model defined by GS1 EPC, which corresponds to the EPCglobal Class 1 Gen 2 Specification [21]. Figure 3 illustrates the link timing of the collision, go- on, and success slot. During the identification, time is divided into slots, and each slot begins with the reader’s query commands. The reader transmits the continuous- wave (CW) RF signal and the query commands during the time Rt . The tags harvest operating energy from this RF signal and transmit their messages. After receiving the reader’s command, the tags generate their responses during the time 1T . The tag’s response lasts during the time Tt . Additionally, 2T is the time duration from the finish of tag response to reader transmission. Query CW Collision/Go-on/Success Slot Reader Tag Tag Response tT T1 T2tR Figure 3. Linking time for collision, go-on and success slot.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2893 According to the above transmission model, the time and energy model are described as follows. The time taken for identifying n tags in the reading area consists of the time required for transmitting the reader’s query and tag’s response in each slot. Let cC , gC and sC denote the numbers of the collision, go-on and successful slots, respectively, and they can be counted in the reader side. Therefore, the identification time is written as follows: 1 2( ) ( )c g sC C C Ri Tii T n T T T T       (2) where RiT and TiT refer to the time taken for transmitting the reader’s query and tags’ response in the i -th slot, respectively. The energy consumption of the reader is expressed by (3) and calculated during the time of transmitting and receiving information. The reader will transmit the RF signal to power up passive tags with power txP in each interrogation cycle. The reader will consume extra power rxP to receive a tag’s response. 1 2( ) [ ( ) ]c g sC C C tx Ri Ti rx Tii E n P T T T T P T          (3) 3.2 Fixed-window methodology In tree-based protocols, the collision probability of tag response is very high at the beginning of the identification process, and the transmission of the rest bits except prefix causes a long identification delay; moreover, the longer the tag ID is, the more the waste of the transmitted bits is. In MQT, both the M -bits mapping part and ID string are responded in each slot. The occurrence of a collision makes the M -bits string very useful but ID string wasted, and thus, the communication overhead is increased. In order to effectively limit the length of the tag response, the window methodology is applied to the MQT protocol with none-idle slot and m-bits arbitration feature. The window-resizing methodology makes it possible to decrease the length of the tag response. In other words, the window needs to be resized as a smaller value in the trend of a high probability of collision and as a larger value in the trend of a low probability of collision. In general, the collision prediction is difficult, and its implementation in the reader and the tags are expensive. Therefore, the go-on slot, in which no collision occurs in the window part, is used for the collision prediction in the next query. As the length of query prefix increases during the identification process, the number of tags that belong to the node corresponding to the query prefix decreases, and the collision probability within the window part gradually decreases, finally leading to the go-on slot. Especially in MQT, since the collision tags are divided into many subgroups ( M ), the collision probability for the next query after the occurrence of the go-on slot is considerably reduced. Therefore, reducing the number of queries by transmitting the whole rest bit is more reasonable rather than increasing the window size gradually. That is, the window size is not changed until the go-on slot occurs, and once the go-on slot occurs, the rest bits are transmitted. It is called fixed-window methodology, differentiating it from the traditional window methodology in which varies the window size in each query cycle. q1··· qL Prefix dL+m+1··· dL+m+F Tag's response m1··· mM Reader-side d1··· dL dL+1··· dL+m dL+m+1 ··· dk q1··· qL dL+m+1··· dL+m+Fm1··· mM Tag-side matching mapping windowing M+F bits Fbitsm bits M bits Fbits Figure 4. The fixed-window procedure on the collision slot. The fixed-window size affects the performance of the protocol. If the fixed-window size is large, the number of bits transmitted by the tag increases, and the collision probability in the window part also increases. Thereby, the occurrence probability of go-on slot is reduced, resulting in an increased number of query-response cycles. In particular, if the window size is large enough, the number of bits transmitted by tags might be equal to the performance of the MQT. This fixed-window methodology can be simply implemented in the reader and the tags because the use of the fixed-window does not require the calculation of window size and transmission of the bit string representing it in each query cycle. The fixed-window is defined as a bit string of the fixed length that the tag must transmit, and the length, F ( 1 F k L m    ), is a predefined parameter of the system, where k and L are the lengths of the tag ID and query prefix, respectively. Figure 4 shows the communication procedure for the fixed-window query on the collision slot. The introduction of the fixed-window query into MQT allows the tag to transmit only the mapping pattern and fixed-window part ( M F ), not the rest of its ID ( k L bits). In the paper, this query type is called mapping-window query (designated briefly as mwq). Fixed-window procedure changes the creation process of the collision and success slot. If two or more tags’ windows do not include any different bit, a go-on slot situation ( )L m F k   which would result in a success slot but may not be a success is produced. In this case, they need to be re-queried until a success slot condition ( )L m F k   is guaranteed. When there is no collision in the window part, the reader uses the window part directly to generate new queries, like a common part of CT, and therefore the total query-response cycles can be reduced. 3.3 The proposed IMQCT protocol IMQCT utilizes two types of the query; that is, mapping- window query (mwq) and mapping-rest query (mrq), and their messages contain a query prefix [ 1 Lq q ], indicating to the tags whether to respond or not. Algorithm 1 and 2 shows the pseudo-code of the IMQCT protocol. The
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2894 identification procedure is executed until all the tags in the interrogation area are identified. The query is initialized with type = mwq and prefix = ‘ε’. The reader broadcasts a query message and waits for the response from the tags. After receiving the reader’s query, the tag compares the prefix with its ID 1[ ]Ld d (Algorithm 2 line 3). After successful matching, the tag maps m bits into M bits by using the mapping table (Algorithm 2 line 4). According to the type of query received by the reader, the tag decides the length of the bit string that it should respond, as shown below (Algorithm 2 lines 5–9). , , F queryType mwq r k L m queryType mrq       (4) In detail, if the type of query is mwq, the bit string to be transmitted is the window part 1[ ]L FL m md d    . Otherwise, the bit string to be transmitted is the rest tag ID 1[ ]L m kd d   . Then, the tag transmits the mapping pattern 1[ ]Mm m and the prepared bit string to the reader. After receiving the tag response, the reader retrieves p sets of m -bits from the combined mapping part with the length M by using the mapping table (Algorithm 1 lines 7 and 8), where p is the number of the collided bits in the combined mapping part (1 2m p  ). When a collision occurs in the received bit string except for the mapping part, the reader creates p new queries 1 1[ ]L mq q m m  (Algorithm 1 lines 10-14). When the type of the current query is mwq, and no collision occurs in the window part, go-on status is satisfied. At this time, the reader creates p mrq queries by appending the m -bits string and window part to the previous query, that is, 1 1 1[ ]L m Fq q m m w w   (Algorithm 1 lines 16-21). When the type of the current query is mrq, and collision bit is not detected in the received bit string except for the mapping part, the reader identifies p tag IDs (Algorithm 1 lines 16-21). Table 3 illustrates an identification process of IMQCT protocol. In this example, we assume that there are four tags (A, B, C and D) which have (000001100011), (001011101010), (110100011110) and (111100111111) as their IDs, where 2m  and 2F  . Algorithm 1 Reader Operation (1) Initialize: query.type = mwq; query.prefix = ‘ε’ (2) Push query into S (3) While S!=NULL do (4) query = pop(S) (5) broadcast(query) (6) [mapPart, respBits]=receiveResponse() (7) p=countCollBits(mapPart) (8) mBits=demapping(mapPart) (9) if isCollision(respBits) then (10) for i=1 to p (11) query.type=mwq (12) query.prefix+=mBits[i] (13) push(query) (14) end for (15) else (16) if query.type=mwq then (17) for i=1 to p (18) query.type=mrq (19) query.prefix+=mBits[i]+respBits (20) push(query) (21) end for (22) else if query.type=mrq (23) for i=1 to p (24) tagID=query.prefix+mBits[i]+ respBits (25) end for (26) end if (27) end if (28) end while Algorithm 2 Tag Operation (1) Receive a query (2) L=getPrefixLength(query) (3) if query.prefix=ID[1:L] then (4) mapPtn[1:M]=mapping(ID[L+1:L+m]) (5) if query.type=mwq then (6) respBits=ID[L+m+1:L+m+F] (7) else if query.type=mrq then (8) respBits=ID[L+m+1:k] (9) end if (10) backscatter(mapPtn+respBits) (11) end if In Table 3, ‘*’ denotes collision, and the bit string in parentheses indicates the mapping part received. When the reader broadcasts a query mwq (ε), all tags respond with their mapping patterns (0001, 0001, 1000 and 1000) and window parts (00, 10, 01 and 11), respectively. At this time, the mapping part and window part received by the reader is (*00*) and ‘**’, respectively (#1 of Table 3). Using demapping, the reader gets two m -bits (00 and 11) by using the mapping table and then generates two query commands mwq (00) and mwq (11). Table 3. Identification process by using IMQCT ( 2M  and 2F  ) Slot Reader query Received bits Slot status #1 mwq (ε) (*00*) ** collision #2 mwq (00) (0*0*) *1 collision #3 mwq (0000) (0010) 10 go-on #4 mrq (00000110) (0001) 11 success (A) #5 mwq (0010) (1000) 10 go-on
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2895 #6 mrq (00101110) (0100) 10 success (B) #7 mwq (11) (*0*0) 00 go-on #8 mrq (110100) (0010) 1110 success (C) #9 mrq (111100) (1000) 1111 success (D) In #2 of Table 3, the reader sends a query mwq (00), where the tag A and B matches the prefix (00), then two tags respond with (0001) 01 and (0100) 11, respectively. Since the collision occurs in the window part, the reader gets two m -bits (00 and 10) from mapping part (0*0*) and then prepares two new queries mwq (0000) and mwq (0010). In #3, tag A matches the prefix (0000) and responds with (0010) 10. Since there is no collision bit in the window part, go-on slot status is satisfied. Then, the reader sends mrq (00000110), tag A finally is identified (#4). Other tags are also identified in the same way. Collision node Go-on node Success node Figure 5. The particular type of the M -ary tree ( 2m  ). In order to simplify the theoretical analysis, we consider a particular type of M -ary tree similar to the perfect M -ary tree. In this tree, all internal nodes except the parent-of- leaf nodes have M children, and each parent-of-leaf node has only one leaf node, and all leaf nodes are in the same depth. The root node is in the depth of 0 and the number of the internal nodes at a depth of h is 2mh . The parent-of-leaf nodes are in depth H ( 1,2,3...H  ). Therefore, the parent- of-leaf node corresponds to the go-on slot, while the leaf node corresponds to the success slot. If tag IDs are uniformly distributed, the tree constructed by the distribution may be similar to this particular tree in shape. The number of bits transmitted on the collision and go-on slot is: wb M F  (5) The number of bits transmitted on the success slot can be written as follows: ( 1)rb k m H F m M      (6) Thus, the total number of bits transmitted by tags for the above tree structure can be expressed as given in (7). 0 2 2 H mh mH w r h S b b    (7) The finite sum of exponential terms can be computed as 1 0 1 1 nn i i a a a       (8) Substituting Eq. (8) into Eq. (7), MQfwTS can be written as 1 0 2 2 2 H mh mH mH IMQCT w w r h S b b b      2 1 2 2 2 1 mH mH mH w w rm b b b      (9) The average tag transmitting bit for one tag identification in IMQCT is 2 1 w IMQCT w rm b A b b    2 ( 2) 2 1m M F k M H m        (10) From Eq. (10), we can see that the number of tag transmission bits decreases as the number of tags increases. In particular, the number of tag transmission bits is close to the tag length when 2m  and 1F  . 4. RESULTS AND DISCUSSION This section presents the simulation results of the proposed protocol using Visual Studio 2013 and Qt 5.5.0. A comparison between IMQCT protocol and tree-based protocols including CT, CwT and MQT is presented here. First, the influence of changing F in IMQCT is shown in the graph. Then all the protocols from state-of-the-art will be compared with IMQCT under different tag sets. Table. 4 Parameters used in simulations Parameter Value k 128 bits Tari 6.25𝜇s Data rate 160kbps T1 18.86 𝜇s T2 8.13 𝜇s Ptx 825mW Prx 125mW It should be noticed that some overhead is not taken into account in our simulation due to the communication latency and the propagation delay from the signal processing on the channel. The protocols are compared in a scenario with one reader and a set of tags varying from 200
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2896 to 5000 tags. Tag IDs are assumed as uniformly distributed and are dynamically generated for every simulation iteration. The simulated results were averaged over 100 iterations for accuracy. 1 2 3 4 5 6 7 8 9 10 2.40 2.45 2.50 2.55 2.60 2.65 2.70 2.75 (a) Slotspertag Fixed window size slots total bits 158 160 162 164 166 168 170 172 174 Totalbitspertag 1 2 3 4 5 6 7 8 9 10 0.94 0.96 0.98 1.00 1.02 1.04 1.06 (b) Fixed window size Energy(J) energy time 1.06 1.08 1.10 1.12 1.14 1.16 Time(s) Figure 6. Simulation results per tag: (a) the number of slots and total transmitted bits and (b) consumed energy and time. Table 4 shows the parameters used in the simulations. Tari is the duration of a data-0 ( 6.25Tar si  ) and it influences the other parameters. To simplify the calculation, Bits 0 and 1 have been considered as 1 Tari . For CwT, the exponential function is used as a heuristic function and the value of  is set 0.419. 1000 2000 3000 4000 5000 1.4 1.6 1.8 2.0 2.2 2.4 2.6 2.8 3.0 (a) Numberofcycles Number of tags CT CwT MQT(m=2) MQT(m=4) IMQCT 1000 2000 3000 4000 5000 10 20 30 40 50 60 (b) CT CwT MQT(m=2) MQT(m=4) IMQCT Number of tags Readerbits 1000 2000 3000 4000 5000 120 140 160 180 200 220 240 (c) CT CwT MQT(m=2) MQT(m=4) IMQCT Number of tags Tagbits Figure 7. Simulation results per tag: (a) the number of slots, (b) the reader transmitting bits and (c) the tag transmitting bits. In order to validate the fixed-window methodology, the fixed-window size needs to be adjusted since the number of query cycles and transmitted bits is influenced by the window size. This observation is carried out for varying fixed-window size F and a set of tags ( 128k  and 1000n  ). Figure 6 shows the obtained result: Figure 6 (a) shows the number of slots and total bits per tag, and Figure 6 (b) shows the energy and time consumed to identify one tag. As can be observed from Figure 6, as F increases, the value of all performance metrics increases. In addition, when 4m  , the number of slots is smaller than when 2m  . However, the number of total transmitted bits and the energy and time consumed are larger. From the observation above, we can see that the proposed protocol gives the best performance when 2m  and 1F  , and thus these parameters are used in simulations. Figure 7 (a) shows the average number of slots required to identify a given number of tags. From the figure, we can see that MQT ( 4m  ) consumes the least slots, and the window-based protocols (CwT and IMQCT) require more reader bits than other protocols because they introduce the go-on slot, which is the additional slot to obtain the last part of the tag ID. IMQCT consumes fewer slots than CwT, and it is because that IMQCT is based on MQT that can
  • 8. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2897 arbitrate m-bits in each cycle. As can be seen in Figure 7 (c), IMQCT protocol outperforms all compared protocols in terms of the number of bits transmitted by tags. More specifically, as described in Eq. (10), when the number of tags increases, the average number of tag transmission bits decreases. Moreover, when 1000n  , the average number of bits transmitted by tag is 130.8, which is close to the tag ID length. Figure 8 compares the bit efficiency of various protocols. The bits efficiency is calculated by the expression ( / ) 100tk a  , which means the usefulness of tags’ responses and the influence of the collision and go-on slots (here, ta is the average number of bits transmitted by the reader and tags). As can be observed from the figure, IMQCT achieves the highest bit efficiency, and it is about 77.5% when the tag number is 5000. 1000 2000 3000 4000 5000 50 55 60 65 70 75 80 CT CwT MQT(m=2) MQT(m=4) IMQCT Number of tags Bitefficiency Figure 8. Bits efficiency. Many anti-collision protocols have been evaluated using the number of slots and transmitted bits, but not the time and energy. The time and energy required to identify all tags in the interrogation area are calculated by using Eq. (2) and (3). Figure 9 shows the identification speed of IMQCT compared to other protocols. 1000 2000 3000 4000 5000 600 650 700 750 800 850 900 950 CT CwT MQT(m=2) MQT(m=4) IMQCT Number of tags IdentificationSpeed(tags/s) Figure 9. Identification speed. 1000 2000 3000 4000 5000 1.0 1.1 1.2 1.3 1.4 1.5 1.6 CT CwT MQT(m=2) MQT(m=4) IMQCT Number of tags Energyconsumption(mJ) Figure 10. Energy consumption per tag. Figure 10 shows the simulation result in terms of energy consumed by the reader. In this comparison, IMQCT outperforms the CwT and other tree-based protocols for all the different sets of tags. For example, the proposed protocol saved more energy than CT, CwT, MQT ( 2m  ) and MQT ( 4m  ) up to 34.8%, 18.3%, 28.5% and 15.2%, respectively when the number of tags is 5000. Therefore, the proposed protocol not only achieves a higher identification speed but also saves energy consumption under the same conditions. 5. CONCLUSION In this paper, a new anti-collision protocol called IMQCT was proposed. IMQCT was designed by applying a fixed- window procedure to the MQT protocol in order to limit the number of bits transmitted by tags. The proposed protocol was compared with the existing several tree- based protocols as regard to relation to the number of slots, transmitted bits, consumed energy and identification speed. Simulation results showed that IMQCT outperformed them in terms of identification speed under low energy consumption. Therefore, IMQCT can be a suitable candidate where energy-efficiency is sought in the large-scale passive RFID system. There are still some issues to be resolved in our future work. Although the proposed protocol has improved the performance of MQT with the introduction of fixed-window, it still suffers from a large number of slots (go-on slot). Our future work will focus on the minimization of the number of slot numbers. In addition, the effect of various tag ID distributions needs to be investigated since IMQCT is based on the uniqueness of the tag IDs. References [1] Klair DK, Chin KW and Raad R. A survey and tutorial of RFID anti-collision protocols. IEEE Commun Surv Tut 2010; 12(3): 400-421. [2] Zhu L and Yum TS. A critical survey and analysis of RFID anti-collision mechanisms. IEEE Commun Mag 2011; 49(5): 214–221.
  • 9. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2898 [3] Cmiljanic N, Landaluce H and Perallos A. A comparison of RFID anti-collision protocols for tag identification. Appl Sci-Basel 2018; 8(8): 1282. [4] Vogt H. Efficient object identification with passive RFID tags. In: Proceedings of the international conference on pervasive computing 2002; 98–113. [5] Zhang L, Zhang J and Tang X. Assigned tree slotted aloha RFID tag anti-collision protocols. IEEE T Wirel Commun 2013; 12(11): 5493–5505. [6] Wu H, Zeng Y, Feng J, et al. Binary tree slotted ALOHA for passive RFID tag anticollision. IEEE T Parall Distr 2013; 24(1): 19–31. [7] Yang J, Wang YH, Cai QL, et al. A Novel Hybrid Anticollision Algorithm for RFID System Based on Grouped Dynamic Framed Recognition and Binary Tree Recursive Process. Int J Distrib Sens N 2015; 11(8): 641327. [8] Namboodiri V, Gao L. Energy-aware tag anticollision protocols for RFID systems. IEEE T Mobile Comput 2010; 9(1): 44–59. [9] Yan X, and Liu X. Evaluating the energy consumption of the RFID tag collision resolution protocols. Telecommun Syst 2013; 52(4): 2561–2568. [10] Klair DK, Chin KW and Raad R. An investigation into the energy efficiency of pure and slotted aloha based RFID anti-collision protocols. In: Proceedings of 2007 IEEE international symposium on a world of wireless, mobile and multimedia networks 2007; 1–4. [11] Rahimian S, Noori M and Ardakani M. An energy- efficient adaptive frameless ALOHA protocol. EURASIP J Wirel Comm 2016; 2016:186. [12] C Law, K Lee, K Y Siu, Efficient memoryless protocol for tag identification, In: Proceedings of the 4th international workshop on discrete algorithms and methods for mobile computing and communications. 75–84 (2000) [13] Zhang W, Guo YJ, Tang XM, et al. An Efficient Adaptive Anticollision Algorithm Based on 4-Ary Pruning Query Tree. Int J Distrib Sens N 2013; 9(12): 848746. [14] Jia X, Feng Q and Ma C. An efficient anti-collision protocol for RFID tag identification. IEEE Commun Lett 2010; 14(11): 1014-1016. [15] Chen Y, Yeh K, Lo N, et al. Adaptive collision resolution for efficient RFID tag identification. EURASIP J Wirel Comm 2011; 2011:139. [16] Shin J, Jeon B and Yang D. Multiple RFID tags identification with M-ary query tree scheme. IEEE Commun Lett 2013; 17(3): 604-607. [17] M A Kalache, L Fergani, Performances comparison of RFID anti-collision algorithms. In: Proceedings of international conference on multimedia computing and systems, 808-813 (2014) [18] Landaluce H, Perallos A and Angulo I. Managing the number of tag bits transmitted in a bit-tracking RFID collision resolution protocol. Sensors 2014; 14: 1010– 1027. [19] Landaluce H, Perallos A, Onieva E, et al. An energy and identification time decreasing procedure for memoryless RFID tag anticollision protocols. IEEE T Wirel Commun 2016: 15(6); 4234–4247. [20] Cmiljanic N, Landaluce H, Perallos A, et al. Influence of the distribution of tag IDs on RFID memoryless anti- collision protocols. Sensors 2017; 17(8): 2017:1891. [21] GS1, EPC™ Radio-Frequency Identity Protocols Generation-2 UHF RFID Standard Specification for RFID Air Interface Protocol for Communications at 860 MHz–960Hz Ver. 2.1 (2018)