SlideShare a Scribd company logo
1 of 9
Download to read offline
David C. Wyld et al. (Eds) : NETCOM, NCS, WiMoNe, CSEIT, SPM - 2015
pp. 59–67, 2015. © CS & IT-CSCP 2015 DOI : 10.5121/csit.2015.51606
TABLE-BASED IDENTIFICATION
PROTOCOL OF COMPUTATIONAL RFID
TAGS
Yunmin Kim, Ji Hyoung Ahn, and Tae-Jin Lee
College of Information and Communication Engineering
Sungkyunkwan University, Suwon 16419, South Korea
kym0413@skku.edu, beramode@skku.edu, tjlee@skku.edu
ABSTRACT
Computation RFID (CRFID) expands the limit of traditional RFID by granting computational
capability to RFID tags. RFID tags are powered by Radio-Frequency (RF) energy harvesting.
However, CRFID tags need extra energy and processing time than traditional RFID tags to
sense the environment and generate sensing data. Therefore, Dynamic Framed Slotted ALOHA
(DFSA) protocol for traditional RFID is no longer a best solution for CRFID systems. In this
paper, we propose a table-based CRFID tag identification protocol considering CRFID
operation. An RFID reader sends the message with the frame index. Using the frame index,
CRFID tags calculate the energy requirement and processing time information to the reader
along with data transmission. The RFID reader records the received information of tags into a
table. After table recording is completed, the optimal frame size and proper time interval is
provided based on the table. The proposed CRFID tag identification protocol is shown to
enhance the identification rate and the delay via simulations.
KEYWORDS
Computational RFID, Energy harvesting, Sensing energy, Processing delay, Tag identification
1. INTRODUCTION
Internet of Things (IoT) is one of the emerging technologies that connects the physical world of
things to the Internet [1]. Various applications such as metering, surveillance system, and factory
maintenance systems are expected to be realized by IoT networks. There are many challenges to
implement IoT networks [2]. IoT communications aim to support a massive number of deployed
devices. To collect information of a large number of devices, efficient Medium Access Control
(MAC) protocol is required. Moreover, there is an energy consumption issue due to energy-
critical small IoT devices. Devices should be energy efficient to maximize the network lifetime to
provide better network maintenance and reliability.
Radio Frequency IDentification (RFID) is a contact-less identification technology. An RFID
network consists of a RFID reader and multiple tags [3]. RFID tags classified into passive tags
and active tags. Passive RFID tags transmit data by backscattering the signal of the reader. Since
the transmission relies on the signal from the reader, passive tags are battery-less and semi-
60 Computer Science & Information Technology (CS & IT)
permanent. Traditional RFID tags can only send the predefined information such as unique IDs of
tags. Thus, the role of RFID tags may be limited in IoT networks which require smarter and more
complex jobs of devices.
Computational RFID (CRFID) is an enhanced RFID that can overcome the limitation of the
traditional RFID. CRFID incorporating the sensing capability into RFID expands the
functionality of RFID [4]. Fig. 1 indicates the simple concept of the CRFID tag. In a sensor part,
a surrounding environment is measured and data is produced by local computing process. Then,
the generated data is delivered to the RFID part and tags transmit it by backscattering the signal
of the reader. With this computational capability, potential applicability of CRFID can be
widened with sufficiently low energy consumption [5]. In this sense, CRFID is treated as a viable
solution of enabling IoT networks [6].
Figure 1. Structure of CRFID tag with sensing and processing capability.
There have been researches for CRFID systems. Yang et al. [7] proposed a switching mechanism
of the firmware of a CRFID tag by the command from the reader. The inefficiency of firmware
switching of a CRFID tag using wired interface is stated. To resolve the problem, the reader
command for firmware switching is designed to be compatible with the EPC standard. The
energy overhead and switching delay are simulated. In [8], an efficient way to transmit bulk data
of a CRFID tag is studied. Authors stated the low performance of data stream of a CRFID tag
caused by Cyclic Redundancy Check (CRC) calculation. Then, they proposed an efficient data
transfer scheme for the CRFID tag by precomputing and exploiting the intermediate
computations for CRC. Since the latency of CRFID tags is reduced with the proposed scheme,
data transfer efficiency is improved. Wickramasinghe et al. [9] studied the ambulatory monitoring
systems using CRFID sensors. Receiving data is segmented based on the natural activity
boundaries and an algorithm to track the body movement transition is presented. In the
experiment, CRFID in ambulatory monitoring shows high performance.
Existing studies do not tackle the most important difference of CRFID tags from traditional RFID
tags. With the sensing operation, CRFID tags need extra energy and processing time before
communicating with the reader. Dynamic Framed Slotted ALOHA (DFSA), which is used in the
conventional RFID identification [10], may not be compatible with CRFID systems. Estimation
of the number of tags in DFSA will no longer match with the actual number of active CRFID tags
due to new characteristics of CRFID. Thus, the optimal frame size needs to be redesigned in
DFSA.
Computer Science & Information Technology (CS & IT) 61
In this paper, we propose a CRFID tag identification protocol considering the sensing capability.
Initially, a CRFID reader collects the energy and processing time requirement of individual tags
along with the identification process. When the reader collects all of the energy requirements and
processing time of tags, reader estimates the exact number of active tags at every frames. Then,
the optimal frame size is decided using the table to maximize the identification rate.
2. PROPOSED CRFID TAG IDENTIFICATION METHOD
2.1. DFSA Algorithm in CRFID Systems
One of the key differences of the CRFID tag is that it senses and generates data to report. With
this sensing and processing capability, CRFID tag requires extra energy and processing time for
local computation. Furthermore, energy and processing time requirement among CRFID tags
may vary with one another. Depending on the type of sensing job, some CRFID tags may need
more energy than others. Received energy from the reader will also vary depend on the distance
between the reader and the tag. Another difference of CRFID tag is continuous data transfer.
While conventional RFID tags stop operating after the successful identification, CRFID tags
continuously respond to the reader when they have data to transmit.
For the conventional RFID, DFSA algorithm is used for tag identification. In DFSA, a reader
assigns a frame size, the number of time slots in a frame. Then, tags randomly select their own
time slots and transmit their IDs to the reader. In [11], it is shown that the optimal frame size is
the same as the number of identifying tags. The number of identifying tags is estimated using the
fraction of idle slots (zero estimation) [12]. Since the DFSA algorithm does not reflect the novel
characteristics of the CRFID tag, it cannot simply adapt to CRFID systems.
Fig. 2 shows the CRFID tag identification process using DFSA. We assume that the reader
provides extra energy for sensing operation at the beginning of a frame. Tags 1, 2, and 5 require
charging twice for sensing, while tags 3 and 4 need charging only once. The reader assigns 5 slots
in frame 1 since the number of tags is 5. However, only tags 3 and 4 respond to the reader. Then,
the reader assigns 3 slots to frame 2 by zero estimation. In frame 2, all the tags respond to the
reader and contend to transmit data. Frame 2 cannot accommodate all the active tags since the
number of active CRFID tags is larger than the frame size. Furthermore, because of the
processing delay, tags actually contend in 2 slots which causes further degradation of
performance.
2.2. System Model
Now, we describe the proposed table-based CRFID tag identification protocol. A CRFID network
consists of a reader and multiple tags. Since the CRFID network is likely to be installed for a
purpose, we assume that the reader knows the number of tags. The tags are equipped with small
capacitors that can store relatively small amount of energy. At the beginning of every frame, the
reader sends a packet intended for charging tags to support sensing operation. The number of
required charging for sensing is randomly distributed in [1, maxe ]. The main idea of the proposed
MAC protocol is to collect the energy and processing time requirements of tags during the tag
identification. After that, the reader can schedule the optimal frame size to identify tags based on
the table. Also, the time duration for sensing operation is provided based on the table. The
proposed scheme can be divided into table recording phase and normal phase.
62 Computer Science & Information Technology (CS & IT)
Figure 2. CRFID tag identification using DFSA algorithm.
2.3. Table Recording Phase
When the reader starts to receive data, it operates as the table recording phase. In the table
recording phase, the reader collects the energy requirement (e ) and processing delay (t ) of
individual tag along with receiving data. Let ie and it be the energy and processing time
requirements of tag i . Since energy and processing the information of tags is yet to be collected,
the reader decides frame as the number of entire tags. The reader sends the querying message
with a frame index. When the tag i charges sufficient enough amount of energy for sensing, it
performs sensing and records the frame index as its ie . Then, the tag transmits ie and it along
with the generated data to the reader. The reader records the received ie and it information in the
table.
Fig. 3 shows an example of collecting process for energy and processing information in the table
recording phase. In frame 1, tags 3 and 4 respond to the reader and consume the charged energy.
Since other tags need more energy to perform sensing, they sleep in frame 1. The reader records
3e , 3t , 4e , and 4t of tags 3 and 4 in the table. In frame 2, all tags become active and respond to
the reader. Since only tag 1 succeeds in frame 2, the reader obtains 1e and 1t . Collided tags 2 and
5 may send their e and t information in the subsequent frames. The table recording phase ends
when all the information of e and t are completely collected.
Computer Science & Information Technology (CS & IT) 63
Figure 3. An example of the table recording process.
2.4. Normal Phase
Once the table is filled with all the information of e and t , the reader moves to the normal phase.
In the normal phase, the reader can decide which tags try to transmit in the current frame. If ie of
tag i is a divisor of the current frame index, the tag will become active and transmit data. To
maximize the identification rate, the reader should set the frame size to be the number of the
active tags. By searching for the table, the reader evaluates the i -th frame size as
,)mod(1
1
}0{∑=
=
tagN
j
ji eiL (1)
where }0{1 and tagN refer to the indicator function and the number of tags.
The reader can assign the time interval to mitigate the processing delay of tags. To ensure the
processing delay of tags to be tolerable, the reader chooses the maximum t among those of the
active tags in the frame. Then, the processing interval for the i -th frame is decided as
).(max
}1)mod(1|{ }0{
j
eilj
i tT
j =∈
= (2)
Fig. 4 shows the 9th and 10th frame structures in the normal phase. In the normal phase, the
processing interval of length iT is assigned after the energy transfer from the reader. So, all tags
can sense and produce data before the slot contention. We assume that the information for energy
and processing time of all tags are collected before frame 9. In frame 9, the reader finds out that
tags 3 and 4 will be active tags by the table with the frame index 9. Then, the frame size is
determined as 29 =L . The processing time interval for frame 9 is 3.09 =T since 3.043 == tt
in the table. In frame 10, all tags will be active since 1 and 2 are divisors of the frame index 10.
64 Computer Science & Information Technology (CS & IT)
The frame size 10L is decided as 5. Then, the processing time interval of frame 10 becomes
4.010 =T .
Figure 4. The 9th
and 10th
frames in the normal phase.
3. PERFORMANCE EVALUATION
In this section, we evaluate the performance of our proposed CRFID tag identification method.
The identification rate at frames and the delay are evaluated for varying number of CRFID tags.
Monte Carlo method with MATLAB as a simulation tool is used. For each iteration, tags
uniformly distributed in a square area with a reader located in the center. Then, tags perform
random contention to send data to the reader using FSA or the proposed protocol. Since DFSA is
not feasible as shown in Fig. 2, we compare the proposed method with the Framed Slotted
ALOHA (FSA). The frame size of FSA is fixed as a half of the number of existing tags
considering energy requirement. Energy requirement of CRFID tags is determined by the
distance from the reader. During the simulation, the identification rate in frames and the delay of
each tag are recorded. The parameters used in the simulations are shown in Table I.
Table 1. Simulation parameters.
Parameter Value
Simulation area 5 m×5 m
Number of tags 200~300
Maximum energy requirement 3, 6
Processing delay 0.4 ms
Duration of time slot 1 ms
Data size 96 bits
Fig. 5 shows the identification rate as frames evolve. Since the number of active CRFID tags
changes periodically, the identification rate fluctuates for a fixed frame size in FSA. In the
Computer Science & Information Technology (CS & IT) 65
proposed scheme, the identification rate fluctuates at first, then it converges to the value higher
than that of the legacy FSA. The identification rate is maximized since the optimal frame size is
allocated using the table. As the maximum energy requirement increases, the number of active
tags at frames becomes smaller. Then, the identification rate decreases since the fixed frame size
becomes too large. Also, the convergence of the identification time in the proposed method for
larger minimum energy requirement becomes longer since the table information is collected more
slowly. The proposed scheme shows better performance than the legacy FSA after about 60
frames.
Figure 5. Identification rate of CRFID systems as frame evolve.
Figure 6. Delay of CRFID tags for varying number of tags.
66 Computer Science & Information Technology (CS & IT)
Fig. 6 shows the delay of CRFID tags for varying number of tags. The average delay of tags
increases as the number of tags increases. Since the chance of transmission reduces as the number
of tags increases, the delay of tags becomes larger. The proposed method shows lower delay than
the conventional FSA. By maximizing the identification rate, the delay between transmissions is
reduced in the proposed scheme. When the maximum energy requirement is 6, the delay is larger
than that of the case with the energy requirement of 3. Since tags sleep longer when more
collisions occur, the delay increases. In the proposed method, the delay increment is negligible
compared to that of the legacy FSA. Since the optimal frame size is reduced the chance of
collisions, delay increment caused by sleep interval is minimized.
3. CONCLUSIONS
In this paper, we have proposed a CRFID tag identification protocol considering the features of
CRFID tags. Especially, we consider CRFID tags which need energy for sensing process. The
proposed MAC protocol collects the energy and processing time requirements of tags. After the
requirement of all tags is collected, the reader can schedule the optimal frame size. We also
provide the time duration to support the processing delay of CRFID tags in every frame. We have
shown that the proposed method can improve the identification rate and delay compared to the
conventional FSA scheme.
ACKNOWLEDGEMENTS
This work was supported by the National Research Foundation of Korea (NRF) grant funded by
the Korean government (MSIP)(2014R1A5A1011478, 2015R1A2A2A01004067).
REFERENCES
[1] M. Bolic, M. Rostamian, and P. M. Djuric, “Proximity Detection with RFID: A Step Toward the
Internet of Things,” IEEE transactions on Pervasive Computing, vol. 14, no. 2, pp. 70-76, Jun. 2015.
[2] H.-D. Ma, “Internet of Things: Objectives and Scientific Challenges,” Springer Journal of Computer
Science and Technology, vol. 26, no. 6, pp. 919-924, Nov. 2011.
[3] C. W. Park, J. H. Ahn, and T.-J. Lee, “RFID Identification Protocol with Optimal Frame Size for
Varying Slot Time,” International Journal of Information and Electronics Engineering, vol. 4, no. 2,
pp. 87-91, Mar. 2014.
[4] A. P. Sample, D. J. Yeager, P. S. Powledge, A. V. Mamishev, and J. R. Smith, “Design of an RFID-
Based Battery-Free Programmable Sensing Platform,” IEEE Transactions on Instrumentation and
Measurement, vol. 57, no. 11, pp. 2608-2615, Nov. 2008.
[5] B. Sheng and C. C. Tan, “Group Authentication in Heterogeneous RFID Networks,” in Proc. IEEE
Conference on Technologies for Homeland Security, pp. 167-172, Nov. 2015.
[6] L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: A survey,” International Journal of
Computer and Telecommunications Networking, vol. 54, no. 15, pp. 2787-2805, Oct. 2010.
[7] W. Yang, D. Wu, M. J. Hussain, and L. Liu, “Wireless Firmware Execution Control in Compuational
RFID Systems,” in Proc. of IEEE International Conference on RFID, pp. 129-136, Apr. 2015.
Computer Science & Information Technology (CS & IT) 67
[8] Y. Zheng and M. Li, “Read Bulk Data from Computational RFID,” in Proc. of IEEE INFOCOM, pp.
495-503, Apr. 2014.
[9] A. Wickramasinghe and D. C. Ranasinghe, “Ambulatory Monitoring Using Passive Computational
RFID Sensors,” IEEE Transactions on Sensor Journals, vol. 15, no. 10, pp. 5859-5869, Oct. 2015.
[10] “EPC Radio-Frequency Identification Protocols Generation-2 UHF RFID Protocol for
Communications at 860MHz-960MHz,” Version 2.0.0, EPCglobal, Nov. 2013.
[11] J.-R. Cha and J.-H. Kim, “Novel Anti-collision Algorithms for Fast Object Identification in RFID
Systems,” in Proc. of International Conference on Parallel and Distributed Systems, pp. 63-67, Jul.
2005.
[12] G. Khandelwal, K. Lee, A. Yener, and S. Serbetli, “ASAP: A MAC Protocol for Dense and Time-
constrained RFID Systems,” EURASIP Journal on Wireless Communications and Networking, vol.
2007, no. 2, pp. 1-13, Jan. 2007.
AUTHORS
Yunmin Kim received the B.S. and M.S. degrees in electrical and computer
engineering from Sungkyunkwan University, Korea, in 2012 and 2014, respectively.
He is currently working toward the Ph.D. degree in electrical and computer
engineering at Sungkyunkwan University since March 2014. His research interests
include energy-harvesting networks, cognitive radio networks, vehicular networks,
wireless LANs, RFID/NFC, and IoT, resource allocation and Medium Access
Control (MAC) of wireless communication networks.
Ji Hyoung Ahn received the B.S. and M.S. degrees in electronic, electrical, and
computer engineering from Sungkyunkwan University, Korea, in 2010 and 2012,
respectively. He is currently working toward the Ph.D. degree in the College of
Information and Communication Engineering at Sungkyunkwan University since
March 2012. His research interests include routing protocols for ad hoc networks,
wireless communication networks, wireless LAN, and wireless PAN.
Tae-Jin Lee received his B.S. and M.S. in electronics engineering from Yonsei
University, Korea in 1989 and 1991, respectively, and the M.S.E. degree in electrical
engineering and computer science from University of Michigan, Ann Arbor, in 1995.
He received the Ph.D. degree in electrical and computer engineering from the
University of Texas, Austin, in May 1999. In 1999, he joined Corporate R & D
Center, Samsung Electronics where he was a senior engineer. Since 2001, he has
been Professor in the College of Information and Communication Engineering at
Sungkyunkwan University, Korea. He was a visiting professor in Pennsylvania State
University from 2007 to 2008. His research interests include performance evaluation,
resource allocation, Medium Access Control (MAC), and design of communication networks and systems,
wireless LANs/PANs, vehicular networks, energy-harvesting networks, IoT, ad hoc/sensor/RFID networks,
and next generation wireless communication systems. He has been a voting member of IEEE 802.11
WLAN Working Group, and is a member of IEEE and IEICE.

More Related Content

What's hot

Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...IRJET Journal
 
Iciic2010 114
Iciic2010 114Iciic2010 114
Iciic2010 114hanums1
 
DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...
DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...
DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...IJCSEA Journal
 
07 coms 525 tcpip - udp [autosaved]
07    coms 525 tcpip - udp [autosaved]07    coms 525 tcpip - udp [autosaved]
07 coms 525 tcpip - udp [autosaved]Palanivel Kuppusamy
 
The Reliability in Decoding of Turbo Codes for Wireless Communications
The Reliability in Decoding of Turbo Codes for Wireless CommunicationsThe Reliability in Decoding of Turbo Codes for Wireless Communications
The Reliability in Decoding of Turbo Codes for Wireless CommunicationsIJMER
 
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...IOSR Journals
 
Dynamic framed slotted aloha algorithms using fast tag estimation
Dynamic framed slotted aloha algorithms using fast tag estimationDynamic framed slotted aloha algorithms using fast tag estimation
Dynamic framed slotted aloha algorithms using fast tag estimationambitlick
 
An Efficient Low Power Convolutional Coding with Viterbi Decoding using FSM
An Efficient Low Power Convolutional Coding with Viterbi Decoding using FSMAn Efficient Low Power Convolutional Coding with Viterbi Decoding using FSM
An Efficient Low Power Convolutional Coding with Viterbi Decoding using FSMAssociate Professor in VSB Coimbatore
 
Combined 2 Bank Compiled Post: SO(IT) Date: 25.09.2021 Taker: AUST
Combined 2 Bank Compiled Post: SO(IT)  Date: 25.09.2021  Taker: AUSTCombined 2 Bank Compiled Post: SO(IT)  Date: 25.09.2021  Taker: AUST
Combined 2 Bank Compiled Post: SO(IT) Date: 25.09.2021 Taker: AUSTEngr. Md. Jamal Uddin Rayhan
 
BTCL Assistant Manager Previous Year Question by Stack IT Job Solution
BTCL Assistant Manager Previous Year Question by Stack IT Job SolutionBTCL Assistant Manager Previous Year Question by Stack IT Job Solution
BTCL Assistant Manager Previous Year Question by Stack IT Job SolutionEngr. Md. Jamal Uddin Rayhan
 
WIRELESS - HOST TO HOST NETWORK PERFORMANCE EVALUATION BASED ON BITRATE AND N...
WIRELESS - HOST TO HOST NETWORK PERFORMANCE EVALUATION BASED ON BITRATE AND N...WIRELESS - HOST TO HOST NETWORK PERFORMANCE EVALUATION BASED ON BITRATE AND N...
WIRELESS - HOST TO HOST NETWORK PERFORMANCE EVALUATION BASED ON BITRATE AND N...Jaipal Dhobale
 

What's hot (19)

Jy3717961800
Jy3717961800Jy3717961800
Jy3717961800
 
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
 
Iciic2010 114
Iciic2010 114Iciic2010 114
Iciic2010 114
 
DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...
DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...
DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...
 
07 coms 525 tcpip - udp [autosaved]
07    coms 525 tcpip - udp [autosaved]07    coms 525 tcpip - udp [autosaved]
07 coms 525 tcpip - udp [autosaved]
 
The Reliability in Decoding of Turbo Codes for Wireless Communications
The Reliability in Decoding of Turbo Codes for Wireless CommunicationsThe Reliability in Decoding of Turbo Codes for Wireless Communications
The Reliability in Decoding of Turbo Codes for Wireless Communications
 
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
 
Dynamic framed slotted aloha algorithms using fast tag estimation
Dynamic framed slotted aloha algorithms using fast tag estimationDynamic framed slotted aloha algorithms using fast tag estimation
Dynamic framed slotted aloha algorithms using fast tag estimation
 
Ccna interview questions
Ccna interview questionsCcna interview questions
Ccna interview questions
 
He3413241328
He3413241328He3413241328
He3413241328
 
IJSTEV2I12120
IJSTEV2I12120IJSTEV2I12120
IJSTEV2I12120
 
An Efficient Low Power Convolutional Coding with Viterbi Decoding using FSM
An Efficient Low Power Convolutional Coding with Viterbi Decoding using FSMAn Efficient Low Power Convolutional Coding with Viterbi Decoding using FSM
An Efficient Low Power Convolutional Coding with Viterbi Decoding using FSM
 
Combined 2 Bank Compiled Post: SO(IT) Date: 25.09.2021 Taker: AUST
Combined 2 Bank Compiled Post: SO(IT)  Date: 25.09.2021  Taker: AUSTCombined 2 Bank Compiled Post: SO(IT)  Date: 25.09.2021  Taker: AUST
Combined 2 Bank Compiled Post: SO(IT) Date: 25.09.2021 Taker: AUST
 
05 network
05 network05 network
05 network
 
42 46
42 4642 46
42 46
 
Rfid based localization
Rfid based localizationRfid based localization
Rfid based localization
 
BTCL Assistant Manager Previous Year Question by Stack IT Job Solution
BTCL Assistant Manager Previous Year Question by Stack IT Job SolutionBTCL Assistant Manager Previous Year Question by Stack IT Job Solution
BTCL Assistant Manager Previous Year Question by Stack IT Job Solution
 
WIRELESS - HOST TO HOST NETWORK PERFORMANCE EVALUATION BASED ON BITRATE AND N...
WIRELESS - HOST TO HOST NETWORK PERFORMANCE EVALUATION BASED ON BITRATE AND N...WIRELESS - HOST TO HOST NETWORK PERFORMANCE EVALUATION BASED ON BITRATE AND N...
WIRELESS - HOST TO HOST NETWORK PERFORMANCE EVALUATION BASED ON BITRATE AND N...
 
Ff34970973
Ff34970973Ff34970973
Ff34970973
 

Viewers also liked

Taller no 1 de metodologia de la investigacion
Taller no 1 de metodologia de la investigacionTaller no 1 de metodologia de la investigacion
Taller no 1 de metodologia de la investigacionliriosoberon17
 
Proiect Erasmus+ Armasesti
Proiect Erasmus+  ArmasestiProiect Erasmus+  Armasesti
Proiect Erasmus+ Armasestininastan
 
Silabo de Matematica II
Silabo de Matematica IISilabo de Matematica II
Silabo de Matematica IICristina Ortiz
 
Groupe Dupont à Lisbonne 5-6 Juin
Groupe Dupont à Lisbonne 5-6 JuinGroupe Dupont à Lisbonne 5-6 Juin
Groupe Dupont à Lisbonne 5-6 JuinIsabel Marcos
 
Sylabus uniandes - curso ctt - t1
Sylabus   uniandes - curso ctt - t1Sylabus   uniandes - curso ctt - t1
Sylabus uniandes - curso ctt - t1Rafael Mera Andrade
 
Ringkasan buku 1 k.f. isherwood. fertilizer use and the environment 2
Ringkasan buku 1 k.f. isherwood. fertilizer use and the environment   2Ringkasan buku 1 k.f. isherwood. fertilizer use and the environment   2
Ringkasan buku 1 k.f. isherwood. fertilizer use and the environment 2Bondan the Planter of Palm Oil
 
Wittig ReactionPresentation1
Wittig ReactionPresentation1Wittig ReactionPresentation1
Wittig ReactionPresentation1Matthew Olson
 
Teoria do bloga
Teoria do blogaTeoria do bloga
Teoria do blogaAneta1707
 
1 internal medicine
1 internal medicine1 internal medicine
1 internal medicineIam David
 
Raquel Camargo - Responsabilidade Social (Media) e Open Data
Raquel Camargo - Responsabilidade Social (Media) e Open DataRaquel Camargo - Responsabilidade Social (Media) e Open Data
Raquel Camargo - Responsabilidade Social (Media) e Open DataSemana de Mídias Sociais UNA
 
Jango ski and boards
Jango ski and boardsJango ski and boards
Jango ski and boardshagan724
 

Viewers also liked (18)

Taller no 1 de metodologia de la investigacion
Taller no 1 de metodologia de la investigacionTaller no 1 de metodologia de la investigacion
Taller no 1 de metodologia de la investigacion
 
LEVEL 7 QCF CSM
LEVEL 7 QCF CSMLEVEL 7 QCF CSM
LEVEL 7 QCF CSM
 
Pelajaran 1
Pelajaran 1Pelajaran 1
Pelajaran 1
 
Teoria del delito
Teoria del delitoTeoria del delito
Teoria del delito
 
Kolej vokasional arau,
Kolej vokasional arau,Kolej vokasional arau,
Kolej vokasional arau,
 
Proiect Erasmus+ Armasesti
Proiect Erasmus+  ArmasestiProiect Erasmus+  Armasesti
Proiect Erasmus+ Armasesti
 
Poster
PosterPoster
Poster
 
Silabo de Matematica II
Silabo de Matematica IISilabo de Matematica II
Silabo de Matematica II
 
Groupe Dupont à Lisbonne 5-6 Juin
Groupe Dupont à Lisbonne 5-6 JuinGroupe Dupont à Lisbonne 5-6 Juin
Groupe Dupont à Lisbonne 5-6 Juin
 
Sylabus uniandes - curso ctt - t1
Sylabus   uniandes - curso ctt - t1Sylabus   uniandes - curso ctt - t1
Sylabus uniandes - curso ctt - t1
 
Ringkasan buku 1 k.f. isherwood. fertilizer use and the environment 2
Ringkasan buku 1 k.f. isherwood. fertilizer use and the environment   2Ringkasan buku 1 k.f. isherwood. fertilizer use and the environment   2
Ringkasan buku 1 k.f. isherwood. fertilizer use and the environment 2
 
Wittig ReactionPresentation1
Wittig ReactionPresentation1Wittig ReactionPresentation1
Wittig ReactionPresentation1
 
Teoria do bloga
Teoria do blogaTeoria do bloga
Teoria do bloga
 
1 internal medicine
1 internal medicine1 internal medicine
1 internal medicine
 
Tema
TemaTema
Tema
 
Raquel Camargo - Responsabilidade Social (Media) e Open Data
Raquel Camargo - Responsabilidade Social (Media) e Open DataRaquel Camargo - Responsabilidade Social (Media) e Open Data
Raquel Camargo - Responsabilidade Social (Media) e Open Data
 
ATTPT Guttuso
ATTPT GuttusoATTPT Guttuso
ATTPT Guttuso
 
Jango ski and boards
Jango ski and boardsJango ski and boards
Jango ski and boards
 

Similar to Table-Based Identification Protocol of Compuatational RFID Tags

Energy efficient anti-collision algorithm for the RFID networks
Energy efficient anti-collision algorithm for the RFID networksEnergy efficient anti-collision algorithm for the RFID networks
Energy efficient anti-collision algorithm for the RFID networksjournalBEEI
 
Data_Integrity_in_RFID_Systems
Data_Integrity_in_RFID_SystemsData_Integrity_in_RFID_Systems
Data_Integrity_in_RFID_SystemsAlchazidis Nikolas
 
Grouping based radio frequency identification anti-collision protocols for d...
Grouping based radio frequency identification anti-collision  protocols for d...Grouping based radio frequency identification anti-collision  protocols for d...
Grouping based radio frequency identification anti-collision protocols for d...IJECEIAES
 
Accessory authentication on NFC enabled product using three pass AES algorithm
Accessory authentication on NFC enabled product using three pass AES algorithmAccessory authentication on NFC enabled product using three pass AES algorithm
Accessory authentication on NFC enabled product using three pass AES algorithmIRJET Journal
 
Ijaems apr-2016-35 Comparative Analysis of Anti-Collision Protocols in RFID
Ijaems apr-2016-35 Comparative Analysis of Anti-Collision Protocols in RFIDIjaems apr-2016-35 Comparative Analysis of Anti-Collision Protocols in RFID
Ijaems apr-2016-35 Comparative Analysis of Anti-Collision Protocols in RFIDINFOGAIN PUBLICATION
 
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKSHIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKSijngnjournal
 
RFID AND GSM BASED CAMPUS SECURITY SYSTEM
RFID AND GSM BASED CAMPUS SECURITY SYSTEMRFID AND GSM BASED CAMPUS SECURITY SYSTEM
RFID AND GSM BASED CAMPUS SECURITY SYSTEMijiert bestjournal
 
Rfid applications in manufacturing
Rfid applications in manufacturingRfid applications in manufacturing
Rfid applications in manufacturinghaiyue 袁
 
IRJET- An Energy-Oriented Collision Arbitration Protocol for Passive RFID Tag...
IRJET- An Energy-Oriented Collision Arbitration Protocol for Passive RFID Tag...IRJET- An Energy-Oriented Collision Arbitration Protocol for Passive RFID Tag...
IRJET- An Energy-Oriented Collision Arbitration Protocol for Passive RFID Tag...IRJET Journal
 
RFID attendance system
RFID attendance systemRFID attendance system
RFID attendance systemA.k. Goverdhan
 
Ijaems apr-2016-18 Simulation on probabilistic anti collision protocols of RF...
Ijaems apr-2016-18 Simulation on probabilistic anti collision protocols of RF...Ijaems apr-2016-18 Simulation on probabilistic anti collision protocols of RF...
Ijaems apr-2016-18 Simulation on probabilistic anti collision protocols of RF...INFOGAIN PUBLICATION
 
Design of Anti-collision Technique for RFID UHF Tag using Verilog
Design of Anti-collision Technique for RFID UHF Tag using VerilogDesign of Anti-collision Technique for RFID UHF Tag using Verilog
Design of Anti-collision Technique for RFID UHF Tag using VerilogIOSR Journals
 
A Novel RFID Readers Employee Management System
A Novel RFID Readers Employee Management SystemA Novel RFID Readers Employee Management System
A Novel RFID Readers Employee Management SystemIJMTST Journal
 

Similar to Table-Based Identification Protocol of Compuatational RFID Tags (20)

Energy efficient anti-collision algorithm for the RFID networks
Energy efficient anti-collision algorithm for the RFID networksEnergy efficient anti-collision algorithm for the RFID networks
Energy efficient anti-collision algorithm for the RFID networks
 
43 97-101
43 97-10143 97-101
43 97-101
 
Turbo encoder and decoder chip design and FPGA device analysis for communicat...
Turbo encoder and decoder chip design and FPGA device analysis for communicat...Turbo encoder and decoder chip design and FPGA device analysis for communicat...
Turbo encoder and decoder chip design and FPGA device analysis for communicat...
 
Data_Integrity_in_RFID_Systems
Data_Integrity_in_RFID_SystemsData_Integrity_in_RFID_Systems
Data_Integrity_in_RFID_Systems
 
Grouping based radio frequency identification anti-collision protocols for d...
Grouping based radio frequency identification anti-collision  protocols for d...Grouping based radio frequency identification anti-collision  protocols for d...
Grouping based radio frequency identification anti-collision protocols for d...
 
Check shavad
Check shavadCheck shavad
Check shavad
 
Accessory authentication on NFC enabled product using three pass AES algorithm
Accessory authentication on NFC enabled product using three pass AES algorithmAccessory authentication on NFC enabled product using three pass AES algorithm
Accessory authentication on NFC enabled product using three pass AES algorithm
 
Ijaems apr-2016-35 Comparative Analysis of Anti-Collision Protocols in RFID
Ijaems apr-2016-35 Comparative Analysis of Anti-Collision Protocols in RFIDIjaems apr-2016-35 Comparative Analysis of Anti-Collision Protocols in RFID
Ijaems apr-2016-35 Comparative Analysis of Anti-Collision Protocols in RFID
 
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKSHIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
 
Co4301524529
Co4301524529Co4301524529
Co4301524529
 
RFID AND GSM BASED CAMPUS SECURITY SYSTEM
RFID AND GSM BASED CAMPUS SECURITY SYSTEMRFID AND GSM BASED CAMPUS SECURITY SYSTEM
RFID AND GSM BASED CAMPUS SECURITY SYSTEM
 
Rfid applications in manufacturing
Rfid applications in manufacturingRfid applications in manufacturing
Rfid applications in manufacturing
 
IRJET- An Energy-Oriented Collision Arbitration Protocol for Passive RFID Tag...
IRJET- An Energy-Oriented Collision Arbitration Protocol for Passive RFID Tag...IRJET- An Energy-Oriented Collision Arbitration Protocol for Passive RFID Tag...
IRJET- An Energy-Oriented Collision Arbitration Protocol for Passive RFID Tag...
 
RFID attendance system
RFID attendance systemRFID attendance system
RFID attendance system
 
Ijaems apr-2016-18 Simulation on probabilistic anti collision protocols of RF...
Ijaems apr-2016-18 Simulation on probabilistic anti collision protocols of RF...Ijaems apr-2016-18 Simulation on probabilistic anti collision protocols of RF...
Ijaems apr-2016-18 Simulation on probabilistic anti collision protocols of RF...
 
Design of Anti-collision Technique for RFID UHF Tag using Verilog
Design of Anti-collision Technique for RFID UHF Tag using VerilogDesign of Anti-collision Technique for RFID UHF Tag using Verilog
Design of Anti-collision Technique for RFID UHF Tag using Verilog
 
A Novel RFID Readers Employee Management System
A Novel RFID Readers Employee Management SystemA Novel RFID Readers Employee Management System
A Novel RFID Readers Employee Management System
 
Lte throughput
Lte throughputLte throughput
Lte throughput
 
L16590531214
L16590531214L16590531214
L16590531214
 
C361520
C361520C361520
C361520
 

Recently uploaded

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Table-Based Identification Protocol of Compuatational RFID Tags

  • 1. David C. Wyld et al. (Eds) : NETCOM, NCS, WiMoNe, CSEIT, SPM - 2015 pp. 59–67, 2015. © CS & IT-CSCP 2015 DOI : 10.5121/csit.2015.51606 TABLE-BASED IDENTIFICATION PROTOCOL OF COMPUTATIONAL RFID TAGS Yunmin Kim, Ji Hyoung Ahn, and Tae-Jin Lee College of Information and Communication Engineering Sungkyunkwan University, Suwon 16419, South Korea kym0413@skku.edu, beramode@skku.edu, tjlee@skku.edu ABSTRACT Computation RFID (CRFID) expands the limit of traditional RFID by granting computational capability to RFID tags. RFID tags are powered by Radio-Frequency (RF) energy harvesting. However, CRFID tags need extra energy and processing time than traditional RFID tags to sense the environment and generate sensing data. Therefore, Dynamic Framed Slotted ALOHA (DFSA) protocol for traditional RFID is no longer a best solution for CRFID systems. In this paper, we propose a table-based CRFID tag identification protocol considering CRFID operation. An RFID reader sends the message with the frame index. Using the frame index, CRFID tags calculate the energy requirement and processing time information to the reader along with data transmission. The RFID reader records the received information of tags into a table. After table recording is completed, the optimal frame size and proper time interval is provided based on the table. The proposed CRFID tag identification protocol is shown to enhance the identification rate and the delay via simulations. KEYWORDS Computational RFID, Energy harvesting, Sensing energy, Processing delay, Tag identification 1. INTRODUCTION Internet of Things (IoT) is one of the emerging technologies that connects the physical world of things to the Internet [1]. Various applications such as metering, surveillance system, and factory maintenance systems are expected to be realized by IoT networks. There are many challenges to implement IoT networks [2]. IoT communications aim to support a massive number of deployed devices. To collect information of a large number of devices, efficient Medium Access Control (MAC) protocol is required. Moreover, there is an energy consumption issue due to energy- critical small IoT devices. Devices should be energy efficient to maximize the network lifetime to provide better network maintenance and reliability. Radio Frequency IDentification (RFID) is a contact-less identification technology. An RFID network consists of a RFID reader and multiple tags [3]. RFID tags classified into passive tags and active tags. Passive RFID tags transmit data by backscattering the signal of the reader. Since the transmission relies on the signal from the reader, passive tags are battery-less and semi-
  • 2. 60 Computer Science & Information Technology (CS & IT) permanent. Traditional RFID tags can only send the predefined information such as unique IDs of tags. Thus, the role of RFID tags may be limited in IoT networks which require smarter and more complex jobs of devices. Computational RFID (CRFID) is an enhanced RFID that can overcome the limitation of the traditional RFID. CRFID incorporating the sensing capability into RFID expands the functionality of RFID [4]. Fig. 1 indicates the simple concept of the CRFID tag. In a sensor part, a surrounding environment is measured and data is produced by local computing process. Then, the generated data is delivered to the RFID part and tags transmit it by backscattering the signal of the reader. With this computational capability, potential applicability of CRFID can be widened with sufficiently low energy consumption [5]. In this sense, CRFID is treated as a viable solution of enabling IoT networks [6]. Figure 1. Structure of CRFID tag with sensing and processing capability. There have been researches for CRFID systems. Yang et al. [7] proposed a switching mechanism of the firmware of a CRFID tag by the command from the reader. The inefficiency of firmware switching of a CRFID tag using wired interface is stated. To resolve the problem, the reader command for firmware switching is designed to be compatible with the EPC standard. The energy overhead and switching delay are simulated. In [8], an efficient way to transmit bulk data of a CRFID tag is studied. Authors stated the low performance of data stream of a CRFID tag caused by Cyclic Redundancy Check (CRC) calculation. Then, they proposed an efficient data transfer scheme for the CRFID tag by precomputing and exploiting the intermediate computations for CRC. Since the latency of CRFID tags is reduced with the proposed scheme, data transfer efficiency is improved. Wickramasinghe et al. [9] studied the ambulatory monitoring systems using CRFID sensors. Receiving data is segmented based on the natural activity boundaries and an algorithm to track the body movement transition is presented. In the experiment, CRFID in ambulatory monitoring shows high performance. Existing studies do not tackle the most important difference of CRFID tags from traditional RFID tags. With the sensing operation, CRFID tags need extra energy and processing time before communicating with the reader. Dynamic Framed Slotted ALOHA (DFSA), which is used in the conventional RFID identification [10], may not be compatible with CRFID systems. Estimation of the number of tags in DFSA will no longer match with the actual number of active CRFID tags due to new characteristics of CRFID. Thus, the optimal frame size needs to be redesigned in DFSA.
  • 3. Computer Science & Information Technology (CS & IT) 61 In this paper, we propose a CRFID tag identification protocol considering the sensing capability. Initially, a CRFID reader collects the energy and processing time requirement of individual tags along with the identification process. When the reader collects all of the energy requirements and processing time of tags, reader estimates the exact number of active tags at every frames. Then, the optimal frame size is decided using the table to maximize the identification rate. 2. PROPOSED CRFID TAG IDENTIFICATION METHOD 2.1. DFSA Algorithm in CRFID Systems One of the key differences of the CRFID tag is that it senses and generates data to report. With this sensing and processing capability, CRFID tag requires extra energy and processing time for local computation. Furthermore, energy and processing time requirement among CRFID tags may vary with one another. Depending on the type of sensing job, some CRFID tags may need more energy than others. Received energy from the reader will also vary depend on the distance between the reader and the tag. Another difference of CRFID tag is continuous data transfer. While conventional RFID tags stop operating after the successful identification, CRFID tags continuously respond to the reader when they have data to transmit. For the conventional RFID, DFSA algorithm is used for tag identification. In DFSA, a reader assigns a frame size, the number of time slots in a frame. Then, tags randomly select their own time slots and transmit their IDs to the reader. In [11], it is shown that the optimal frame size is the same as the number of identifying tags. The number of identifying tags is estimated using the fraction of idle slots (zero estimation) [12]. Since the DFSA algorithm does not reflect the novel characteristics of the CRFID tag, it cannot simply adapt to CRFID systems. Fig. 2 shows the CRFID tag identification process using DFSA. We assume that the reader provides extra energy for sensing operation at the beginning of a frame. Tags 1, 2, and 5 require charging twice for sensing, while tags 3 and 4 need charging only once. The reader assigns 5 slots in frame 1 since the number of tags is 5. However, only tags 3 and 4 respond to the reader. Then, the reader assigns 3 slots to frame 2 by zero estimation. In frame 2, all the tags respond to the reader and contend to transmit data. Frame 2 cannot accommodate all the active tags since the number of active CRFID tags is larger than the frame size. Furthermore, because of the processing delay, tags actually contend in 2 slots which causes further degradation of performance. 2.2. System Model Now, we describe the proposed table-based CRFID tag identification protocol. A CRFID network consists of a reader and multiple tags. Since the CRFID network is likely to be installed for a purpose, we assume that the reader knows the number of tags. The tags are equipped with small capacitors that can store relatively small amount of energy. At the beginning of every frame, the reader sends a packet intended for charging tags to support sensing operation. The number of required charging for sensing is randomly distributed in [1, maxe ]. The main idea of the proposed MAC protocol is to collect the energy and processing time requirements of tags during the tag identification. After that, the reader can schedule the optimal frame size to identify tags based on the table. Also, the time duration for sensing operation is provided based on the table. The proposed scheme can be divided into table recording phase and normal phase.
  • 4. 62 Computer Science & Information Technology (CS & IT) Figure 2. CRFID tag identification using DFSA algorithm. 2.3. Table Recording Phase When the reader starts to receive data, it operates as the table recording phase. In the table recording phase, the reader collects the energy requirement (e ) and processing delay (t ) of individual tag along with receiving data. Let ie and it be the energy and processing time requirements of tag i . Since energy and processing the information of tags is yet to be collected, the reader decides frame as the number of entire tags. The reader sends the querying message with a frame index. When the tag i charges sufficient enough amount of energy for sensing, it performs sensing and records the frame index as its ie . Then, the tag transmits ie and it along with the generated data to the reader. The reader records the received ie and it information in the table. Fig. 3 shows an example of collecting process for energy and processing information in the table recording phase. In frame 1, tags 3 and 4 respond to the reader and consume the charged energy. Since other tags need more energy to perform sensing, they sleep in frame 1. The reader records 3e , 3t , 4e , and 4t of tags 3 and 4 in the table. In frame 2, all tags become active and respond to the reader. Since only tag 1 succeeds in frame 2, the reader obtains 1e and 1t . Collided tags 2 and 5 may send their e and t information in the subsequent frames. The table recording phase ends when all the information of e and t are completely collected.
  • 5. Computer Science & Information Technology (CS & IT) 63 Figure 3. An example of the table recording process. 2.4. Normal Phase Once the table is filled with all the information of e and t , the reader moves to the normal phase. In the normal phase, the reader can decide which tags try to transmit in the current frame. If ie of tag i is a divisor of the current frame index, the tag will become active and transmit data. To maximize the identification rate, the reader should set the frame size to be the number of the active tags. By searching for the table, the reader evaluates the i -th frame size as ,)mod(1 1 }0{∑= = tagN j ji eiL (1) where }0{1 and tagN refer to the indicator function and the number of tags. The reader can assign the time interval to mitigate the processing delay of tags. To ensure the processing delay of tags to be tolerable, the reader chooses the maximum t among those of the active tags in the frame. Then, the processing interval for the i -th frame is decided as ).(max }1)mod(1|{ }0{ j eilj i tT j =∈ = (2) Fig. 4 shows the 9th and 10th frame structures in the normal phase. In the normal phase, the processing interval of length iT is assigned after the energy transfer from the reader. So, all tags can sense and produce data before the slot contention. We assume that the information for energy and processing time of all tags are collected before frame 9. In frame 9, the reader finds out that tags 3 and 4 will be active tags by the table with the frame index 9. Then, the frame size is determined as 29 =L . The processing time interval for frame 9 is 3.09 =T since 3.043 == tt in the table. In frame 10, all tags will be active since 1 and 2 are divisors of the frame index 10.
  • 6. 64 Computer Science & Information Technology (CS & IT) The frame size 10L is decided as 5. Then, the processing time interval of frame 10 becomes 4.010 =T . Figure 4. The 9th and 10th frames in the normal phase. 3. PERFORMANCE EVALUATION In this section, we evaluate the performance of our proposed CRFID tag identification method. The identification rate at frames and the delay are evaluated for varying number of CRFID tags. Monte Carlo method with MATLAB as a simulation tool is used. For each iteration, tags uniformly distributed in a square area with a reader located in the center. Then, tags perform random contention to send data to the reader using FSA or the proposed protocol. Since DFSA is not feasible as shown in Fig. 2, we compare the proposed method with the Framed Slotted ALOHA (FSA). The frame size of FSA is fixed as a half of the number of existing tags considering energy requirement. Energy requirement of CRFID tags is determined by the distance from the reader. During the simulation, the identification rate in frames and the delay of each tag are recorded. The parameters used in the simulations are shown in Table I. Table 1. Simulation parameters. Parameter Value Simulation area 5 m×5 m Number of tags 200~300 Maximum energy requirement 3, 6 Processing delay 0.4 ms Duration of time slot 1 ms Data size 96 bits Fig. 5 shows the identification rate as frames evolve. Since the number of active CRFID tags changes periodically, the identification rate fluctuates for a fixed frame size in FSA. In the
  • 7. Computer Science & Information Technology (CS & IT) 65 proposed scheme, the identification rate fluctuates at first, then it converges to the value higher than that of the legacy FSA. The identification rate is maximized since the optimal frame size is allocated using the table. As the maximum energy requirement increases, the number of active tags at frames becomes smaller. Then, the identification rate decreases since the fixed frame size becomes too large. Also, the convergence of the identification time in the proposed method for larger minimum energy requirement becomes longer since the table information is collected more slowly. The proposed scheme shows better performance than the legacy FSA after about 60 frames. Figure 5. Identification rate of CRFID systems as frame evolve. Figure 6. Delay of CRFID tags for varying number of tags.
  • 8. 66 Computer Science & Information Technology (CS & IT) Fig. 6 shows the delay of CRFID tags for varying number of tags. The average delay of tags increases as the number of tags increases. Since the chance of transmission reduces as the number of tags increases, the delay of tags becomes larger. The proposed method shows lower delay than the conventional FSA. By maximizing the identification rate, the delay between transmissions is reduced in the proposed scheme. When the maximum energy requirement is 6, the delay is larger than that of the case with the energy requirement of 3. Since tags sleep longer when more collisions occur, the delay increases. In the proposed method, the delay increment is negligible compared to that of the legacy FSA. Since the optimal frame size is reduced the chance of collisions, delay increment caused by sleep interval is minimized. 3. CONCLUSIONS In this paper, we have proposed a CRFID tag identification protocol considering the features of CRFID tags. Especially, we consider CRFID tags which need energy for sensing process. The proposed MAC protocol collects the energy and processing time requirements of tags. After the requirement of all tags is collected, the reader can schedule the optimal frame size. We also provide the time duration to support the processing delay of CRFID tags in every frame. We have shown that the proposed method can improve the identification rate and delay compared to the conventional FSA scheme. ACKNOWLEDGEMENTS This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korean government (MSIP)(2014R1A5A1011478, 2015R1A2A2A01004067). REFERENCES [1] M. Bolic, M. Rostamian, and P. M. Djuric, “Proximity Detection with RFID: A Step Toward the Internet of Things,” IEEE transactions on Pervasive Computing, vol. 14, no. 2, pp. 70-76, Jun. 2015. [2] H.-D. Ma, “Internet of Things: Objectives and Scientific Challenges,” Springer Journal of Computer Science and Technology, vol. 26, no. 6, pp. 919-924, Nov. 2011. [3] C. W. Park, J. H. Ahn, and T.-J. Lee, “RFID Identification Protocol with Optimal Frame Size for Varying Slot Time,” International Journal of Information and Electronics Engineering, vol. 4, no. 2, pp. 87-91, Mar. 2014. [4] A. P. Sample, D. J. Yeager, P. S. Powledge, A. V. Mamishev, and J. R. Smith, “Design of an RFID- Based Battery-Free Programmable Sensing Platform,” IEEE Transactions on Instrumentation and Measurement, vol. 57, no. 11, pp. 2608-2615, Nov. 2008. [5] B. Sheng and C. C. Tan, “Group Authentication in Heterogeneous RFID Networks,” in Proc. IEEE Conference on Technologies for Homeland Security, pp. 167-172, Nov. 2015. [6] L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: A survey,” International Journal of Computer and Telecommunications Networking, vol. 54, no. 15, pp. 2787-2805, Oct. 2010. [7] W. Yang, D. Wu, M. J. Hussain, and L. Liu, “Wireless Firmware Execution Control in Compuational RFID Systems,” in Proc. of IEEE International Conference on RFID, pp. 129-136, Apr. 2015.
  • 9. Computer Science & Information Technology (CS & IT) 67 [8] Y. Zheng and M. Li, “Read Bulk Data from Computational RFID,” in Proc. of IEEE INFOCOM, pp. 495-503, Apr. 2014. [9] A. Wickramasinghe and D. C. Ranasinghe, “Ambulatory Monitoring Using Passive Computational RFID Sensors,” IEEE Transactions on Sensor Journals, vol. 15, no. 10, pp. 5859-5869, Oct. 2015. [10] “EPC Radio-Frequency Identification Protocols Generation-2 UHF RFID Protocol for Communications at 860MHz-960MHz,” Version 2.0.0, EPCglobal, Nov. 2013. [11] J.-R. Cha and J.-H. Kim, “Novel Anti-collision Algorithms for Fast Object Identification in RFID Systems,” in Proc. of International Conference on Parallel and Distributed Systems, pp. 63-67, Jul. 2005. [12] G. Khandelwal, K. Lee, A. Yener, and S. Serbetli, “ASAP: A MAC Protocol for Dense and Time- constrained RFID Systems,” EURASIP Journal on Wireless Communications and Networking, vol. 2007, no. 2, pp. 1-13, Jan. 2007. AUTHORS Yunmin Kim received the B.S. and M.S. degrees in electrical and computer engineering from Sungkyunkwan University, Korea, in 2012 and 2014, respectively. He is currently working toward the Ph.D. degree in electrical and computer engineering at Sungkyunkwan University since March 2014. His research interests include energy-harvesting networks, cognitive radio networks, vehicular networks, wireless LANs, RFID/NFC, and IoT, resource allocation and Medium Access Control (MAC) of wireless communication networks. Ji Hyoung Ahn received the B.S. and M.S. degrees in electronic, electrical, and computer engineering from Sungkyunkwan University, Korea, in 2010 and 2012, respectively. He is currently working toward the Ph.D. degree in the College of Information and Communication Engineering at Sungkyunkwan University since March 2012. His research interests include routing protocols for ad hoc networks, wireless communication networks, wireless LAN, and wireless PAN. Tae-Jin Lee received his B.S. and M.S. in electronics engineering from Yonsei University, Korea in 1989 and 1991, respectively, and the M.S.E. degree in electrical engineering and computer science from University of Michigan, Ann Arbor, in 1995. He received the Ph.D. degree in electrical and computer engineering from the University of Texas, Austin, in May 1999. In 1999, he joined Corporate R & D Center, Samsung Electronics where he was a senior engineer. Since 2001, he has been Professor in the College of Information and Communication Engineering at Sungkyunkwan University, Korea. He was a visiting professor in Pennsylvania State University from 2007 to 2008. His research interests include performance evaluation, resource allocation, Medium Access Control (MAC), and design of communication networks and systems, wireless LANs/PANs, vehicular networks, energy-harvesting networks, IoT, ad hoc/sensor/RFID networks, and next generation wireless communication systems. He has been a voting member of IEEE 802.11 WLAN Working Group, and is a member of IEEE and IEICE.