Next Article in Journal
A Globally Generalized Emotion Recognition System Involving Different Physiological Signals
Next Article in Special Issue
Low-Cost Electronic Tagging System for Bee Monitoring
Previous Article in Journal
A Robust Method for Detecting Parking Areas in Both Indoor and Outdoor Environments
Previous Article in Special Issue
A Novel Displacement and Tilt Detection Method Using Passive UHF RFID Technology
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Energy-Aware RFID Anti-Collision Protocol

by
Laura Arjona
*,
Hugo Landaluce Simon
and
Asier Perallos Ruiz
Faculty of Engineering, University of Deusto and DeustoTech-Fundacion Deusto, Deusto Foundation, 48007 Bilbao, Spain
*
Author to whom correspondence should be addressed.
Sensors 2018, 18(6), 1904; https://doi.org/10.3390/s18061904
Submission received: 21 May 2018 / Revised: 6 June 2018 / Accepted: 7 June 2018 / Published: 11 June 2018
(This article belongs to the Special Issue RFID-Based Sensors for IoT Applications)

Abstract

:
The growing interest in mobile devices is transforming wireless identification technologies. Mobile and battery-powered Radio Frequency Identification (RFID) readers, such as hand readers and smart phones, are are becoming increasingly attractive. These RFID readers require energy-efficient anti-collision protocols to minimize the tag collisions and to expand the reader’s battery life. Furthermore, there is an increasing interest in RFID sensor networks with a growing number of RFID sensor tags. Thus, RFID application developers must be mindful of tag anti-collision protocols. Energy-efficient protocols involve a low reader energy consumption per tag. This work presents a thorough study of the reader energy consumption per tag and analyzes the main factor that affects this metric: the frame size update strategy. Using the conclusion of this analysis, the anti-collision protocol Energy-Aware Slotted Aloha (EASA) is presented to decrease the energy consumption per tag. The frame size update strategy of EASA is configured to minimize the energy consumption per tag. As a result, EASA presents an energy-aware frame. The performance of the proposed protocol is evaluated and compared with several state of the art Aloha-based anti-collision protocols based on the current RFID standard. Simulation results show that EASA, with an average of 15 mJ consumed per tag identified, achieves a 6% average improvement in the energy consumption per tag in relation to the strategies of the comparison.

1. Introduction

Radio Frequency Identification (RFID) technology is becoming increasingly popular to the point where almost anything can be tagged. This is mainly because the cost of commercial RFID tags is negligible compared to the value of the products to which they are attached. Current examples of RFID expansion can be found in sensing, activity recognition and localization systems [1,2].
RFID technology uses a spectrum of radio frequency to transfer the identification information between two communication devices: reader and tags [3]. The coexistence of several tags provides RFID technology with a great flexibility at the expense of the tag collision problem. Tags share the same communication channel (the air) and may respond simultaneously to the same interrogation command, interfering and garbling their waveforms. The reader then is unable to interpret the information received from the tags, requiring a re-transmission and extending the tag identification time. Anti-collision protocols are then proposed to arbitrate tags’ responses and to increase the number of tags identified by a time unit.
In the literature, three main types of anti-collision protocols have been reported: Aloha-based, tree-based and hybrid protocols. The three types of protocols can be applied to active (battery-operated tags), passive (tags backscatter information) or semi-passive (combination of active and passive) RFID systems. Tree-based protocols [4,5,6], in essence, split colliding tags into subsets and further split the subsets repeatedly up to the successful response of all the tags that are within the interrogation zone. Aloha-based protocols [7] divide time into frames so that tags randomly choose one slot per frame to respond. While in Frame-Slotted Aloha (FSA), the frame size L is fixed during the identification process, in Dynamic Frame Slotted Aloha (DFSA), it is variable, and the protocol’s performance is greatly influenced by the update of L. The fact that the standard EPC-global Class-1 Generation-2 (EPC C1G2) [8] currently uses a DFSA structure to arbitrate collisions highlights the research relevance of this scheme. For this reason, this work focuses on DFSA protocols. Finally, hybrid protocols combine the advantages of tree and Aloha protocols [9].
RFID systems, which have already been adopted in applications such as supply chains, are now considered a front-runner of the ubiquitous era with the emergence of mobile RFID [10]. Currently, mobile and battery-powered RFID readers, such as hand readers and smart phones, are increasingly being used [11,12]. Most popular applications focus on RFID-based indoor localization and identification systems with mobile readers [13,14,15]. Therefore, it is desired to expand the reader’s battery life by using an energy-aware tag anti-collision protocol. This work presents the Energy-Aware Slotted Aloha (EASA) anti-collision protocol.
Defining n as the the total number of tags inside the reader interrogation zone and defining E as the total amount of energy consumed by the reader to identify the n tags, the metric E/n is defined as the energy per tag identified consumed by the reader, in one identification round. The ratio E/n provides information not only about the energy consumption of the RFID system using a particular anti-collision protocol, but it also provides information about the scalability of the system. Ideally, if the system is scalable to large population sizes, the ratio E/n should not vary considerably with increasing n, meaning that the reader energy consumption per tag is approximately constant and independent of n. In previous research, most energy saving protocols aim to reduce the energy cost of the reader and tags separately for active RFID systems [16,17,18,19]. They are not suitable for passive RFID systems. Other recent works focus on passive RFID systems, but they use tree-based anti-collision protocols [4,11,20].
The proposed protocol updates the frame size so that E / n is minimized. To do so, the frame size is set as a function of the estimated tag set size and the parameter ρ . The parameter ρ is defined as the ratio between the tag set size n and the frame size L, and its value is updated with the characteristics of the physical RFID system. The results of the performance evaluation show that the proposed protocol decreases E / n in relation to the strategies in the comparison. The following main contributions are made in this work:
  • Analytical study of the L that minimizes the E / n metric.
  • Presentation of a novel anti-collision protocol: EASA; the proposed protocol applies the results obtained in the previous contribution to decrease E / n in an RFID system based on EPC C1G2.
  • E / n evaluation of EASA and comparison with several anti-collision protocols of the state of the art.
The rest of the paper is organized as follows. Section 2 presents the RFID Standard EPC C1G2 and several related Aloha-based anti-collision protocols in the literature. Section 3 provides a thorough analysis of the main factor that affects E / n and obtains the value of L that minimizes it. The proposed EASA anti-collision protocol is presented in Section 4. Section 5 provides the results of the performance evaluation followed by the study of the physical identified limitations and future work in Section 6. Finally, Section 6 concludes this paper.

2. Background

Some definitions are provided to properly set the background of this work and to better understand the main contributions: Bulleted lists look like this:
  • A command is a bit-string transmitted by the reader to the tags.
  • An inventory round is the period of time that begins when the reader transmits the initial command (Qc), and it ends when the reader interrupts the identification process and the tags loose their state. Ideally, an inventory round ends when all the tags in the reader interrogation zone have been identified.
  • A slot is a period of time that separate tags’ responses. Conventionally, three types of slots are considered attending to the tags’ responses to the reader’s commands: idle (none of the tags reply), single (only one tag replies) and collision (more than one tag replies in the same slot). The duration of each type of slot is referred as T i , T s and T k , respectively. These slots are accurately specified in the current standard [8], and their duration is determined by the link timing parameters ( T 1 , T 2 , T 3 ) .
  • A frame is a sequence of slots. Tags can respond in only one slot per frame. An identification process is composed of a set of frames.
The strategies analyzed in this work are based on the RFID transmission model between the reader and the tags defined in Figure 1, meeting EPC C1G2 requirements [8]. In this figure, three types of slots are represented: a single slot, with only one tag response (x), a collision slot, with three tags’ simultaneous responses (xxx) and an idle slot, with no response. According to this figure, a single slot has a duration T s , and this slot involves two reader commands and two tag’s responses. A collision slot has a duration T k , and it involves one reader command and one tags’ response. Finally, an idle slot has a duration T i , and it only involves one reader command. The parameter T 1 refers to the time needed for the tags to generate their responses after every reader command. The parameter T 2 refers to the time needed for the reader to receive all the tag transmissions. Finally, a slot will be considered idle when the reader waits for the tags’ responses for a time T 3 .
Now that the main concepts have been explained, the current standard in the RFID system is presented.

2.1. RFID Standard EPC C1G2

EPC C1G2 [8], the current standard in RFID systems, defines the requirements followed by the proposed protocol in this work. EPC C1G2 employs a DFSA protocol to arbitrate collisions, known as the Slot Counter protocol. The probability of collision is sensitive to the choice of L, which is dynamically updated by means of the parameter named Q (L = 2 Q ). The optimum L setting depends on the unknown number of responding tags.
The slot counter protocol schedules tags’ responses along time slots. In order to manage the identification process, the reader begins with transmitting Qc once and then alternates between the QueryAdjust(QA) and QueryRep(QR) commands. QA starts a new frame with the updated size and arranges that the tags randomly select a slot in the frame (the initial value of their internal slot counter S C ), while QR tells the tags to decrement S C . Thus, when S C = 0, the tag transmits a 16-bit random number (RN16); and once it is acknowledged (ACK), the tag transmits its E P C code of length k.

2.2. Background of DFSA Anti-Collision Protocols

Currently, the EPC C1G2 standard is followed by most RFID manufacturers, enhancing the research relevance of DFSA-based protocols. Consequently, many DFSA protocols based on the standard have recently appeared with the main objective of improving a set of metrics regarding the process of tag identification. Several DFSA protocols can be found in the literature that update L using the tag set size estimated by the reader, referred to as n ^ .
Prior to presenting the most relevant single-reader strategies, a system model with one reader and n tags is defined. A DFSA frame of size L is defined. The variables c s , c k and c i correspond to the number of single, collision and idle slots in the frame, respectively, and up to the current slot. Additionally, p s , p k and p i correspond to the probability that only one tag, no tag or more than one tag occupies a slot, respectively. The examination slot refers to the particular slot within each frame where L is updated. Some of the most relevant DFSA-based protocols in the literature are introduced next.

2.2.1. Eom

Eom et al. [21] introduced a DFSA anti-collision protocol that updates L according to the estimated tag set size. The estimation algorithm is based on the number of collided tags per slot, referred to as γ . On the one hand, the protocol proposed by the authors in [21] shows a positive performance in terms of the estimation error and the total number of slots used for identification. On the other hand, the authors did not distinguish between the three types of slots to measure the total number of slots. Thus, the comparison with the rest of the protocols is unfair.

2.2.2. ILCM-FbF

The protocol Improved Linearized Combinational Model with Frame by Frame examination of L (ILCM-FbF) for the optimal frame size adaptation was introduced by Solic et al. in [7]. The authors presented a DFSA protocol based on the estimation of the tag population with a linear function that depends on c k and L. Then, at the end of the frame, L is updated using the value of n ^ . The simulation scenario is limited, because the results are only compared with the slot counter protocol.

2.2.3. ILCM-SbS

The protocol Improved Linearized Combinational Model with Slot by Slot examination of L (ILCM-SbS) was presented by Solic et al. in [22] as an improved version of ILCM-FbF [7]. Simulation results showed that ILCM-SbS lowers the time required to identify a set of tags compared with some protocols of the state of the art. However, this strategy might overload a reader that has only a limited capacity, because L is calculated at every slot.

2.2.4. Chen14

Chen [23] presented an anti-collision protocol (Chen14) that examines L at just one slot per frame, determined as L / i , claiming to significantly reduce the number of total examination slots. The presented protocol updates L as a function of n ^ , and then, L is updated based on n ^ . Simulation results showed an improved performance in terms of normalized throughput, defined as T h r o u g h p u t = c s / ( c s + c k + c i ) . However, this metric assumes equal duration for each type of slot, and contrasting the EPC C1G2 requirements, these slots have different durations.

2.2.5. Chen16

Chen proposed in [24] an anti-collision algorithm (Chen16) based on the early and optimal adjustment of the frame length with the aim of maximizing the normalized throughput (U), defined as U = ( c s T s ) / ( c s T s + c i T i + c k T k ) . This protocol was presented as an extension of the study in [23]. In this Chen16 protocol, the tag set size is estimated in every frame at the examination point L / 5 . The value of this slot has been selected as the slot where maximum U is obtained. Based on the previous n ^ , if a new frame is required, the author updates L with the variable y, where y is expressed as a second-order polynomial.
Simulation results show competitive values regarding U, but the function defined to set y is not valid for all the range of T k / T i . Particularly, if T k > > T i , y takes negative values, leading to negative values for L. Additionally, the examination point L / 5 has been set based on a particular scenario with specific timing parameters. Therefore, this value might not be appropriate for a scenario with different timing settings of the RFID system.

2.2.6. SSA and DSSA

The Segment-by-Segment Aloha protocol (SSA) was proposed in [25] to effectively decrease the frame adjustment times with satisfactory throughput. In this protocol, one frame is composed of a set of slot-segments, and each slot-segment is composed of s L continuous time slots, where s L = 4. In order to increase the throughput of SSA, the authors introduced the Dynamic SSA (DSSA) protocol. DSSA varies s L dynamically by tracking, in real time, the number of single slots. Both protocols present a positive performance regarding the throughput and the number of tags identified per second. However, the authors assume a simulation scenario where the protocols are compared with just one additional protocol, and for one specific scenario, with a particular set of timing configuration.

3. Energy-Aware Aloha Frame Analysis

Traditionally, the most common metric to evaluate the performance of an RFID anti-collision protocol has been the Slot Efficiency ( S E ) [26], defined as S E = c s / ( c i + c s + c k ) . Ideally, an anti-collision protocol is desired to reach S E = 1 , meaning that just one slot per tag is required for the complete tag set identification. However, this is not achievable in practical applications, where collision and idle slots are present. An anti-collision protocol reaches the maximum S E when the frame size equals the number of tags, that is L = n [26]. However, this condition only applies when T i = T s = T k . The EPC C1G2 standard specifies different durations for idle, single and collision slots, referred to as T i , T s and T k . Therefore, traditional S E is not a meaningful parameter to measure the performance of an RFID system. To mitigate the different slots’ duration effect, the metric T i m e _ S E is introduced in [27] T i m e _ S E = c s / [ c t o t a l + ( β 1 ) c i ] , where c t o t a l = c i + c s + c k and β = T i / T k . This metric considers different durations for T k and T i , but it assumes T s = T k and does not include the time overhead information.
In order to provide an accurate evaluation of an RFID system, this work focuses on the metric E/n, defined as the energy per tag identified consumed by the reader in one inventory round. This metric considers different durations for T i , T s and T k .
The energy consumed by the reader during the identification of a whole set of tags, defined as E, is modeled in [4]. The authors present an energy consumption model where E depends on the power required by the reader to transmit and receive information to and from the tags. During the identification process, the reader transmits a set of commands and a Continuous Wave ( C W ) to power up passive tags, with power P t x . To receive the data from the tags, the reader needs an extra power P r x . Defining E t /n and E r /n as the energy per tag identified consumed by the reader during the transmitting and receiving states in one inventory round, one obtains:
E n = E t n + E r n
where:
E t = P t x ( c s T s + c k T k + c i T i )
and:
E r = P r x [ c s ( T R N 16 + T E P C ) + c k T R N 16 ]
The durations of the slots, T i , T s and T k , are set according to the standard:
T i = T 1 + T 3 + T c o m m a n d ,
T s = 2 T 1 + T R N 16 + 2 T 2 + T A C K + T E P C + T c o m m a n d ,
and:
T k = T 1 + T R N 16 + T 2 + T c o m m a n d
where T c o m m a n d refers to the duration of the reader transmitted command Qc, QA or QR, referred to as T Q c , T Q A and T Q R , respectively. In every frame, the reader will transmit just one QA or Qc in the first slot, and in the rest of slots, it will transmit QR commands. Assuming a frame with sufficiently large L, T c o m m a n d = T Q R is applied in (4)–(6) when one frame is analyzed.
The parameters T Q c , T Q A and T Q R are calculated as the reader-to-tag synchronization time T F S y n c R T or T P r e a m b l e R T , defined in [8] plus the length of each parameter divided by the reader data rate D R r , calculated as D R r = 1 / ( ( T d a t a 0 + T d a t a 1 ) / 2 ) , where T d a t a 0 = T a r i and T d a t a 1 = 1.5· T a r i . T a r i represents the reference time interval for a d a t a -0 transmission. Thus, T Q c = T F S y n c R T + 22 bits/ D R r , T Q A = T P r e a m b l e R T + 9 bits/ D R r and T Q R = T P r e a m b l e R T + 4 bits/ D R r
The parameter T R N 16 and T E P C refer to the time the tag employs to transmit RN16 and its E P C , respectively. They are calculated as the tag-to-reader synchronization time T P r e a m b l e T R plus the length of each parameter divided by the tag data rate D R t , calculated as D R t = B L F / M . The parameter B L F refers to the backscatter-link frequency. Thus, T R N 16 = T P r e a m b l e T R + 17 bits/ D R t and T E P C = T P r e a m b l e T R + 129 bits/ D R t . Finally, T A C K corresponds to the duration of the reader command ACK, and it is obtained as T A C K = T P r e a m b l e R T + 18 bits/ D R r . Table 1 summarizes the calculation of the reader and tag messages’ durations.
In the next section, the energy per tag identified consumed by the reader in one frame is analyzed, and the optimal L is derived to minimize the reader energy consumption in an RFID identification process.

Frame Size Calculation to Minimize the Reader Energy Consumption

Defining E ( n , L ) / c s ( n , L ) as the energy per tag identified consumed by the reader in one frame, one obtains:
E ( n , L ) c s ( n , L ) = E t ( n , L ) c s ( n , L ) + E r ( n , L ) c s ( n , L )
where:
E t ( n , L ) c s ( n , L ) = P t x [ ( c s ( n , L ) T s + c k ( n , L ) T k + c i ( n , L ) T i ) ] c s ( n , L )
and:
E r ( n , L ) c s ( n , L ) = P r x [ c s ( n , L ) ( T R N 16 + T E P C ) + c k ( n , L ) T R N 16 ] c s ( n , L )
where c s ( n , L ) , c k ( n , L ) and c i ( n , L ) represent the expected value of the number of single, collision and idle slots in a frame, respectively. From (8) and (9), it follows that E ( n , L ) / c s ( n , L ) is mainly influenced by the number of each type of slot and their duration. On the one hand, T i , T s and T k are fixed for a particular RFID system, and they remain constant for one frame. On the other hand, c i ( n , L ) , c s ( n , L ) and c k ( n , L ) strictly depend on the anti-collision protocol employed to identify the tag set and, particularly, on the strategy it uses to update L.
In order to perform the analysis that derives the optimal L to minimize E ( n , L ) / c s ( n , L ) , a system model with one reader and n tags is defined. The probability that b tags among n occupy a slot within a frame of size L can be approximated by a binomial distribution P b ( n , L ) [28]:
P b ( n , L ) = n b 1 L b 1 1 L n b .
If L is assumed sufficiently large, the tags distribution can be approximated by a Poisson distribution with mean ρ .
ρ = n L .
When b = 0 in (10), c i ( n , L ) can be approximated by:
c i ( n , L ) = L p i ( n , L ) = L 1 1 L n L e ρ .
When b = 1 in (10), c s ( n , L ) can be approximated by:
c s ( n , L ) = L p s ( n , L ) = n 1 1 L n 1 L ρ n / ρ n / ρ 1 e ρ .
Then, c k ( n , L ) can be approximated by:
c k ( n , L ) = L · p k ( n , L ) = L ( 1 p 0 p 1 ) .
Substituting (12)–(14) into (8) and (9) and applying n / ρ n / ρ 1 ≈ 1, the following expressions are obtained:
E t ( n , L ) c s P t x [ T s ρ e ρ + T i e ρ + T k ( 1 ( 1 + ρ ) e ρ ) ] ρ e ρ
and:
E r ( n , L ) c s P r x T R N 16 ρ e ρ T E P C e ρ + T E P C ρ e ρ .
Next, computing the derivative of E ( n , L ) / c s ( n , L ) in (7) with respect to ρ yields:
d d ρ E ( n , L ) c s ( n , L ) = d d ρ E t ( n , L ) c s ( n , L ) + d d ρ E r ( n , L ) c s ( n , L ) = P t x T k [ e ρ ( ρ 1 ) + 1 ] T i ρ 2 + P r X T R N 16 e ρ ( ρ 1 ) + T E P C ρ 2
and posing d d ρ E ( n , L ) c s ( n , L ) = 0 yields the following equation:
ρ e ρ e ρ + 1 = P r x T i P t x T k + P r x T E P C .
Solving (18), the value of ρ that minimizes E ( n , L ) / c s ( ρ ) is obtained:
ρ = 1 + W P t x ( T i T k ) P r x T E P C e ( P t x T k + P r x T E P C )
where W ( x ) represents the Lambert W-function.
Then, according to (11), the frame size that minimizes E ( n , L ) / c s ( n , L ) is obtained as L = n / ρ . Following the EPC C1G2 constraints, the L value must be a power of two. Thus, Q = r o u n d ( l o g 2 ( n / ρ ) ) and:
L = 2 r o u n d [ l o g 2 ( n / ρ ) ] .

4. RFID Anti-Collision Protocol Energy-Aware Slotted Aloha

In this section, the analysis of the energy-aware Aloha frame presented in Section 3 is applied to a DFSA anti-collision protocol, resulting in the Energy-Aware Slotted Aloha (EASA) protocol. EASA is based on EPC C1G2, regarding the reader and the tag operation. The pseudocode of EASA is presented in Algorithm 1. First the operation of the reader is presented, then the operation of the tag. The variable s l o t _ i n d e x represents the reader’s internal counter, which keeps track of the present slot in the current frame.
Algorithm 1 Pseudocode of EASA. First, the operation of the reader is presented, then the operation of the tag.
Reader Operation
1:
Initialization: s l o t _ i n d e x = 1, L = 2 Q
2:
calculate ρ by solving (19)
3:
broadcast Qc
4:
while 1 do
5:
 read slot and update c i , c s , c k
6:
if s l o t _ i n d e x = L then
7:
   n ^ = M M S E ( c i , c s , c k )
8:
   Q = l o g 2 ( n ^ c s ) / ρ , L = 2 r o u n d ( Q )
9:
  broadcast QA
10:
else
11:
   s l o t _ i n d e x = s l o t _ i n d e x +1
12:
  broadcast QR
13:
end if
14:
end while
Tag Operation
1:
while energized by the reader do
2:
 receive reader’s commands
3:
if QA or Qc then
4:
  Generate S C [ 0 , L 1 ]
5:
else
6:
  if QR then
7:
    S C = S C 1
8:
  end if
9:
end if
10:
if S C = 0 then
11:
  transmit R N 16
12:
  if ACK then
13:
   transmit E P C
14:
  end if
15:
end if
16:
end while
First, the reader sets the value of ρ by solving (19). The value of ρ is obtained just once at the beginning of the inventory round, according to the RFID system parameters P t x , P r x , T i , T k and T E P C . These parameters define the particular RFID system used. Then, the initial L to begin the identification process is obtained with (20), and the reader starts the identification procedure by broadcasting Qc, specifying the initial Q value of the tags. Each tag selects a slot in the frame to transmit its E P C . The reader continues the identification process analyzing each slot of the frame, updating the variables c i , c s and c k according to the tags’ responses:
  • Only one tag response is detected: c s = c s + 1.
  • Two ore more tags response are detected: c k = c k + 1.
  • No tag response is detected: c i = c i + 1.
Then, the reader broadcasts QR to go from one slot to the next. When the reader reaches the last slot of the frame, the remaining tag population size is estimated with a traditional Mean Minimum Square Error (MMSE) estimator [28]:
n ^ = m i n n c i ( n , L ) c s ( n , L ) c k ( n , L ) c i c s c k 2 = m i n n c i ( n , L ) c i 2 + c s ( n , L ) c s 2 + c k ( n , L ) c k 2 .
This estimator compares the expected value of the number of idle, single and collision slots at the end of the frame ( c i ( n , L ) , c s ( n , L ) and c k ( n , L ) , obtained with (12), (13) and (14)), with the observed numbers ( c i , c s and c k ). Then, n ^ is obtained as the value of n, which minimizes the mean square error of the expected and observed values. Finally, the frame size is updated with (20), and a new frame is started by broadcasting QA, specifying the new L. The tag operation follows the EPC C1G2 standard behavior (see Section 2.1). Therefore, EASA is compatible with commercial RFID tags.
EASA presents an energy-aware frame, because this protocol sets the frame size according to ρ and n ^ so that E/n is minimized. Besides, if the timing parameters of the RFID system vary, EASA adapts to these changes, obtaining a new solution for ρ and updating L accordingly. Furthermore, EASA can be physically implemented in a real system and commercial tags, because EASA is based on EPC C1G2.

5. Energy Evaluation

This section evaluates the performance of EASA regarding the energy per tag identified consumed by the reader in one inventory round E / n and compares it with the anti-collision protocols of the state of the art presented in Section 2.2: Eom [21], ILCM-FbF [7], ILCM-SbS [22], Chen14 [23], Chen16 [24], SSA [25] and DSSA [25]. Physical-layer effects are not considered here, assuming a non-impaired channel and no capture effect. Note that these assumptions are extensively used for the analysis of known anti-collision protocols whose analysis focuses on the media access control layer [4,21,24,25]. Simulation results were obtained with MATLAB R2017b. A scenario with one reader and a varying number of tags is evaluated, where the tags are uniformly distributed. The simulation responses have been averaged over 1000 iterations for accuracy in the results. Timing parameters are set according to Table 2. Before proceeding with the performance evaluation, some implementation details must be taken into consideration:
  • To evaluate the anti-collision protocols’ performance with n, the tag set sizes considered are N = [ 16 , 32 , 64 , 128 , 256 , 512 , 1024 , 2048 ] and nN.
  • L values are limited to a power of two, following the EPC C1G2 specifications.
  • The initial L is set to 16 (Q = 4), following the EPC C1G2 recommendation.
  • The length of the E P C is set to k = 128.
Figure 2 shows that EASA clearly improves E / n for all n evaluated, with an average of 15 mJ consumed by the reader per tag identified. Overall, EASA presents a 6% average reduction in E / n compared to ILCM-SbS, the protocol with the second lowest E / n . Additionally, for all the protocols in the comparison, low variations of E / n with n are obtained, presenting a quasi-constant behavior for all the range of n evaluated. The strategies Chen14, SSA and DSSA present an increasing peak in E / n around n = 1024 and n = 2048, because they limit L to 1024 in both situations. From this figure, it can be concluded that the solution of ρ obtained for one frame results in the lowest energy consumed by the reader in one inventory round.
Next, all the algorithms presented in Section 2.2 are evaluated in terms of the number of slots and the reader and tag bits, in order to provide a deeper insight into the E / n results. Results are averaged for N.
Figure 3 shows the evaluation results of the number of slots. The proposed protocol presents the highest c i , with around 3–7 idle slots per tag, while the alternative protocols show around 1–2 idle slots per tag. All protocols in the comparison update L with a power of two value close to n, except for EASA and Chen16. EASA updates L with (20), where ρ = 4.13 , and Chen16 updates L with L = y n ^ , where y = 1.2 . Because EASA generates frames with a size around 4.13 -times the estimated number of tags (scaled to a power of two value), it generates a higher number of slots than the alternative protocols, resulting in a higher number of idle slots. However, idle slots are the shortest of the three types, having a low impact on the total identification time. In particular, according to Table 2, an idle slot is around 27-times shorter than a collision slot. In relation to c k , the proposed protocol achieves the lowest value of 0.1–0.4 collision slots per tag.
Recovering the results obtained in Figure 2, it is noticed that the reduction in the number of collision slots per tag of EASA results in a lower E / n . That is, the increase in the number of idle slots is compensated with a decrease in the number of collision slots.
Next, the total number of reader transmitted bits per tag and the average number of bits transmitted by one tag are evaluated, because these metrics also influence E / n . Results are shown in Figure 4a,b.
Regarding Figure 4a, EASA presents the highest number of total reader bits per tag because of the higher number of c i /n generated. Despite the higher values of the number of reader bits of EASA, the proposed protocol achieves an improved performance in terms of E / n . This occurs because EASA greatly reduces the total number of collision slots, reducing the total reader and tag waiting periods. These waiting periods are represented by the link timing parameters T 1 , T 2 and T 3 , as defined in Section 2. During these periods, the reader and the tags do not transmit any bit, but the reader consumes energy from its battery by transmitting the C W . Using the values of Table 2, the total waiting time of a collision slot is defined by T 1 + T 2 = 162.50 μ s, while the total waiting time of an idle slot is T 1 + T 3 = 96.25 μ s. Therefore, the waiting time of a collision slot is about 1.7-times higher than that of an idle slot. Overall, it can be concluded that EASA results in energy savings despite the higher number of reader bits per tag, because it highly reduces the number of collision slots and the waiting time periods.
Regarding Figure 4b, EASA presents the lowest number of bits per tag compared the rest of the strategies, with an average of 146 bits. Because EASA generates fewer c k / n (see Figure 3b), tags suffer fewer collisions, and therefore, they transmit fewer bits.

5.1. Effect of P t x and P r x on E / n

Next, the total energy consumption for n tags’ identification is evaluated when P t x and P r x are varied for two different tag set sizes (n = 64 and 1024). Firstly, E / n is evaluated when P r x is fixed to 125 mW, and P t x takes two values, 125 and 825 mW. Next, E / n is evaluated when P t x is fixed to 825 mW, and P r x takes the values 25 and 800 mW. These values of P t x and P r x have been selected considering that a typical commercial RFID reader, by regulation, provides a maximum output power of 1 W. The rest of the parameters are set according to Table 2. Simulation results are shown in Table 3. When P r x is set to 125 mW, all the protocols in the comparison show a similar behavior, presenting an increasing E / n with increasing n and increasing P t x . When P t x is set to 825 mW, E / n increases with increasing n, but it hardly varies for the two P r x values analyzed. In conclusion, for all the protocols analyzed, the reader transmitting power P t x greatly affects the energy per tag identified consumed by the reader in one inventory round, and the higher P t x for a particular P r x , the higher E / n . Furthermore, it can be seen that the protocols with the lowest number of slots (see Figure 3) and bits per tag (see Figure 4) present the lowest energy consumption (see Figure 2). Therefore, these two parameters are key regarding the energy efficiency of an anti-collision protocol.
EASA presents the lowest E / n for all the combinations of P t x and P r x evaluated. This occurs because the value of ρ is calculated as a function of these parameters (see (19)). Therefore, EASA presents an energy-aware behavior, because this protocol adapts to different values of P t x and P r x , lowering the overall E/n in relation to the alternative protocols.

5.2. Effect of T a r i and B L F on E / n

The results shown in Figure 2 correspond to a specific RFID system, with a particular set of timing parameters, defined in Table 2. This work assumes that the two key parameters that define an RFID system are T a r i and B L F , because most of the configuration parameters are obtained as a function of these two. Next, the protocols’ performance is evaluated in terms of E / n for different RFID systems with varying T a r i and B L F . The two parameters are varied from the whole range of values allowed by EPC C1G2 [8]. The values of P t x and P r x used are set according to Table 2.
The different values of T a r i and B L F greatly affect the performance of EASA, because they result in different values of ρ to update the frame size L. As was shown in Section 3, the value of ρ is obtained as a function of T i , T k and T E P C (see (19), which ultimately depends on T a r i and B L F . Therefore, the value of ρ also depends on T a r i and B L F
Firstly, T a r i is set to 25 μ s, while B L F is varied from 40–640 kbps. Then, B L F is set to 40 kbps, and T a r i is varied from the minimum (6.25 μ s) to the maximum (25 μ s) value allowed by EPC C1G2. As a result, 1 / ρ varies from 1.36–4.13. The values of T 1 , T 2 and T 3 are also affected because they are set as a function of T a r i and B L F . The evaluated results are averaged for N and shown in Table 4.
Overall, E/n decreases with increasing B L F for a particular T a r i for all the protocols evaluated. It is important to note that a higher B L F involves a faster tag (higher data rate D R t ). Therefore, if D R t increases, the reader consumes a lower amount of receiving power E r , reducing the overall E/n.
EASA presents the lowest E/n when 1/ ρ ≥ 2.66. Therefore, there is evidence that EASA presents an energy-aware frame. Furthermore, the higher the value of 1/ ρ , the more notable the improvement in E/n of the proposed protocol in relation to the rest of the strategies. This occurs because the frame size of EASA increases with increasing 1/ ρ (see (20)), decreasing the probability of collisions. As 1/ ρ decreases, the performance of EASA deteriorates. In this situation, the probability of collision in EASA is higher than in the previous situation (L is smaller for the same n). As a result, the reader consumes a higher amount of transmitting and receiving power E r and E t , increasing the overall E/n of EASA.

5.3. Analysis of Communication Channel Effects on the Battery Lifetime

An ideal communication channel has been considered in the previous analysis, where there are no communication errors between the reader and the tags, and tags are uniformly distributed inside the reader interrogation zone. However, the capture effect is very common in passive RFID systems [29]. This phenomenon occurs when the reader successfully resolves one tag reply in a collided slot. A different effect is the detection error [30], which means that a single tag response is detected as idle, due to fading or interference. As a result, re-transmissions are required in subsequent slots.
These two effects will influence the protocols’ performance in terms of the metric E / n . As a result, the reader battery lifetime will be also affected. This section evaluates the protocol’s performance in terms of the reader’s battery duration under the capture effect and the detection error. For this purpose, an RFID system with n passive tags and one battery-operated reader is considered. The reader operates from a lithium rechargeable battery, which has 0.48 kJ of energy [31]. The reader is assumed to transmit until all n tags are read and is not affected by its orientation to the tags.
Next, the percentage of the reader energy consumed from the battery to identify n = 1024 tags with respect to the total battery capacity is measured when the capture effect P c and the probability of a detection error P d are present in the communication channel. First, E (J) is evaluated for n = 1024 for all the protocols. Then, the percentage is obtained considering that 0.48 kJ represents 100% of the battery capacity. The timing parameters of Section 5.1 are used. Simulation results are shown in Table 5.
On the one hand, for a fixed P d , the reader battery consumption decreases with increasing P c for all the protocols in the comparison because fewer collided slots and more single slots occur. On the other hand, for a fixed P c , the battery consumption increases with increasing P d , because a higher number of total slots is required to complete one inventory round.
Table 5 shows that the improvement of EASA in relation to the rest of the protocols in the comparison becomes less significant with increasing P c . The capture effect leads to collision slots becoming single slots. Therefore, a high P c will be favorable to protocols with a high number of collision slots. Because EASA achieves the lowest number of collision slots (see Figure 3b), P c has a smaller impact on EASA performance compared to the alternative protocols. This behavior is more notable for P d = P c = 0.2, where EASA and ILCM show the same percentage.
Assuming a reader with a lithium rechargeable battery of 0.48 kJ of energy, the reader will be capable of reading up to 32,201 tags with the EASA protocol (performing 31.45 identification cycles of 1024 tags) before the battery is empty (in the scenario with P d = P c = 0). In contrast, if the reader uses ILCM-FbF (the protocol with the highest E), the number of tags read is reduced to 28,683 tags, which represents 3517.8 fewer tags than in the case of using EASA.
The results of this section show that the battery consumption of a mobile RFID reader that is working in an communication channel with the capture effect and detection error will be minimized if the reader employs EASA. Therefore, EASA provides a longer battery lifetime for the reader than the alternative protocols.

6. Conclusions and Future Work

A novel RFID anti-collision protocol based on the current standard EPC-global Class-1 Generation-2 has been presented to decrease the energy per tag consumed by the reader E / n . EASA presents an energy-aware frame, because this protocol sets the frame size according to the parameters ρ and n ^ so that E / n is minimized.
The metric E / n has been thoroughly studied, analyzing the main factor that affects it: the frame size L update strategy. From this study, it has been concluded that in order to decrease E / n , L must be 1/ ρ -times the estimated number of tags, where ρ is set according to the timing and power parameters of the RFID system T i , T k , T E P C , P t x and P r x .
The proposed protocol was compared with several protocols of the state of the art in relation to E / n and the number of slots and transmitted bits. Simulation results showed that EASA, with an average 15 mJ per tag consumed by the reader, achieves a 6% average improvement in E / n in relation to the strategies of the comparison. Therefore, EASA is a suitable candidate where energy-efficiency is sought in passive RFID.
Several works in the literature present an SDR-RFID system [32,33,34] to evaluate the performance of the slot counter protocol (used in EPC C1G2) in a real scenario. In these systems, it would be possible to analyze the capture effect and the detection error in a real scenario. Because EASA is based on EPC C1G2, it can be physically implemented with an SDR-RFID system and commercial tags. Although this implementation is out of the scope of this work, it is proposed as future work.

Author Contributions

Methodology, L.A.; Formal Analysis, L.A.; Writing-Original Draft Preparation, L.A. and H.L.S.; Writing-Review & Editing, L.A., H.L.S. and A.P.R.; Supervision, H.L.S. and A.P.R.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Yang, L.; Chen, Y.; Li, X.Y.; Xiao, C.; Li, M.; Liu, Y. Tagoram: Real-time Tracking of Mobile RFID Tags to High Precision Using COTS Devices. In Proceedings of the 20th MobiCom ’14 Annual International Conference on Mobile Computing and Networking, Maui, HI, USA, 7–11 September 2014; pp. 237–248. [Google Scholar] [CrossRef]
  2. Pradhan, S.; Chai, E.; Sundaresan, K.; Qiu, L.; Khojastepour, M.A.; Rangarajan, S. RIO: A Pervasive RFID-based Touch Gesture Interface. In Proceedings of the 23rd MobiCom ’17 Annual International Conference on Mobile Computing and Networking, Snowbird, UT, USA, 16–20 October 2017; pp. 261–274. [Google Scholar] [CrossRef]
  3. Finkenzeller, K. RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, 2nd ed.; John Wiley & Sons, Inc.: New York, NY, USA, 2003. [Google Scholar]
  4. Landaluce, H.; Perallos, A.; Onieva, E.; Arjona, L.; Bengtsson, L. An Energy and Identification Time Decreasing Procedure for Memoryless RFID Tag Anticollision Protocols. IEEE Trans. Wirel. Commun. 2016, 15, 4234–4247. [Google Scholar] [CrossRef]
  5. Hou, Y.; Zheng, Y. PHY assisted tree-based RFID identification. In Proceedings of the IEEE INFOCOM 2017—IEEE Conference on Computer Communications, Atlanta, GA, USA, 1–4 May 2017; pp. 1–9. [Google Scholar] [CrossRef]
  6. Lai, Y.; Hsiao, L.; Lin, B. Optimal Slot Assignment for Binary Tracking Tree Protocol in RFID Tag Identification. IEEE/ACM Trans. Netw. 2015, 23, 255–268. [Google Scholar] [CrossRef]
  7. Solic, P.; Radic, J.; Rozic, N. Energy Efficient Tag Estimation Method for ALOHA-Based RFID Systems. IEEE Sens. J. 2014, 14, 3637–3647. [Google Scholar] [CrossRef]
  8. GS1 EPCglobal Inc. Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz—960 MHz. Brussels, Belgium, November 2013. Version 2.0. Available online: https://www.gs1.org/sites/default/files/docs/epc/Gen2_Protocol_Standard.pdf (accessed on 9 June 2018).
  9. Wu, H.; Zeng, Y.; Feng, J.; Gu, Y. Binary Tree Slotted ALOHA for Passive RFID Tag Anticollision. IEEE Trans. Parallel Distrib. Syst. 2013, 24, 19–31. [Google Scholar] [CrossRef]
  10. Seidler, C. RFID Opportunities for Mobile Telecommunication Services. In ITU-T Lighthouse Technical Paper; ITU-T Technology Watch: Addis Ababa, Ethiopia, 2005. [Google Scholar]
  11. Hessar, F.; Roy, S. Energy Based Performance Evaluation of Passive EPC Gen 2 Class 1 RFID Systems. IEEE Trans. Commun. 2013, 61, 1337–1348. [Google Scholar] [CrossRef]
  12. Agrawal, T.; Biswas, P.; Sharma, R. A novel-Q DFSA algorithm for passive RFID system. Pervasive Mob. Comput. 2017, 40, 89–103. [Google Scholar] [CrossRef]
  13. Yu, J.; Lee, W.; Du, D.Z. Reducing reader collision for mobile RFID. IEEE Trans. Consum. Electron. 2011, 57, 574–582. [Google Scholar] [CrossRef]
  14. Luo, J.; Zhou, S.; Cheng, H.; Liao, Y.; Bu, K. A Range-Free Localization of Passive RFID Tags Using Mobile Readers. In Proceedings of the IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems, Dallas, TX, USA, 19–22 October 2015; pp. 445–446. [Google Scholar] [CrossRef]
  15. Zanaj, E.; Ranxha, G.; Kaso, A.; Zanaj, B. 3D localization method for RFID tags by using mobile readers and virtual reference tags. In Proceedings of the 22nd International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia, 17–19 September 2014; pp. 51–55. [Google Scholar] [CrossRef]
  16. Namboodiri, V.; Gao, L. Energy-Aware Tag Anticollision Protocols for RFID Systems. IEEE Trans. Mob. Comput. 2010, 9, 44–59. [Google Scholar] [CrossRef] [Green Version]
  17. Zhu, Y.; Jiang, W.; Zhang, Q.; Guan, H. Energy-Efficient Identification in Large-Scale RFID Systems with Handheld Reader. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 1211–1222. [Google Scholar] [CrossRef]
  18. Jia, X.; Feng, Q.; Ma, C. An Efficient Anti-Collision Protocol for RFID Tag Identification. Commun. Lett. IEEE 2010, 14, 1014–1016. [Google Scholar] [CrossRef]
  19. Zhang, L.; Xiang, W. An energy- and time-efficient M-ary detecting tree RFID MAC protocol. In Proceedings of the IEEE International Conference on Communications (ICC), London, UK, 8–12 June 2015; pp. 2882–2887. [Google Scholar] [CrossRef]
  20. Zhang, L.; Xiang, W.; Tang, X.; Li, Q.; Yan, Q. A Time- and Energy-Aware Collision Tree Protocol for Efficient Large-Scale RFID Tag Identification. IEEE Trans. Ind. Inform. 2018, 14, 2406–2417. [Google Scholar] [CrossRef]
  21. Eom, J.B.; Lee, T.J. Accurate tag estimation for dynamic framed-slotted ALOHA in RFID systems. IEEE Commun. Lett. 2010, 14, 60–62. [Google Scholar] [CrossRef] [Green Version]
  22. Solic, P.; Radic, J.; Rozic, N. Early Frame Break Policy for ALOHA-Based RFID Systems. IEEE Trans. Autom. Sci. Eng. 2015, 13, 876–881. [Google Scholar] [CrossRef]
  23. Chen, W.T. A fast anti-collision Algorithm for the EPCglobal UHF class-1 generation-2 RFID standard. IEEE Commun. Lett. 2014, 18, 1519–1522. [Google Scholar] [CrossRef]
  24. Chen, W.T. Optimal Frame Length Analysis and an Efficient Anti-Collision Algorithm With Early Adjustment of Frame Length for RFID Systems. IEEE Trans. Veh. Technol. 2016, 65, 3342–3348. [Google Scholar] [CrossRef]
  25. Duan, L.; Zhang, X.; Wang, Z.J.; Duan, F. A Feasible Segment-by-Segment ALOHA Algorithm for RFID Systems. Wirel. Pers. Commun. 2017, 96, 2633–2649. [Google Scholar] [CrossRef]
  26. Klair, D.; Kwan-Wu, C.; Raad, R. A Survey and Tutorial of RFID Anti-Collision Protocols. IEEE Commun. Surv. Tutor. 2010, 12, 400–421. [Google Scholar] [CrossRef]
  27. Porta, T.F.L.; Maselli, G.; Petrioli, C. Anticollision Protocols for Single-Reader RFID Systems: Temporal Analysis and Optimization. IEEE Trans. Mob. Comput. 2011, 10, 267–279. [Google Scholar] [CrossRef]
  28. Vogt, H. Efficient Object Identification with Passive RFID Tags. In Pervasive Computing; Mattern, F., Naghshineh, M., Eds.; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2002; Volume 2414, pp. 98–113. [Google Scholar] [CrossRef]
  29. Wu, H.; Zeng, Y. Passive RFID Tag Anticollision Algorithm for Capture Effect. IEEE Sens. J. 2015, 15, 218–226. [Google Scholar] [CrossRef]
  30. Nguyen, C.T.; Bui, A.T.H.; Nguyen, V.D.; Pham, A.T. Modified tree-based identification protocols for solving hidden-tag problem in RFID systems over fading channels. IET Commun. 2017, 11, 1132–1142. [Google Scholar] [CrossRef]
  31. Klair, D.K.; Chin, K.W.; Raad, R. An Investigation into thie Energy Eficiency of Pure and Slotted Aloha Based REID Anti-Collision Protocols. In Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, Espoo, Finland, 18–21 June 2007; pp. 1–4. [Google Scholar] [CrossRef]
  32. Kargas, N.; Mavromatis, F.; Bletsas, A. Fully-Coherent Reader With Commodity SDR for Gen2 FM0 and Computational RFID. IEEE Wirel. Commun. Lett. 2015, 4, 617–620. [Google Scholar] [CrossRef]
  33. Buettner, M.; Wetherall, D. A software radio-based UHF RFID reader for PHY/MAC experimentation. In Proceedings of the IEEE International Conference on RFID, Orlando, FL, USA, 12–14 April 2011; pp. 134–141. [Google Scholar] [CrossRef]
  34. Solic, P.; Maras, J.; Radic, J.; Blazevicevic, Z. Comparing Theoretical and Experimental Results in Gen2 RFID Throughput. IEEE Trans. Autom. Sci. Eng. 2017, 14, 349–357. [Google Scholar] [CrossRef]
Figure 1. Link timing of EPC C1G2.
Figure 1. Link timing of EPC C1G2.
Sensors 18 01904 g001
Figure 2. Evaluation of the energy consumption per tag in one inventory round, varying n from 16–2048, with P t x = 825 mW and P r x = 125 mW. EASA, Energy-Aware Slotted Aloha; ILCM-SbS, Improved Linearized Combinational Model with Slot by Slot; FbF, Frame by Frame; DSSA, Dynamic Segment-by-Segment Aloha.
Figure 2. Evaluation of the energy consumption per tag in one inventory round, varying n from 16–2048, with P t x = 825 mW and P r x = 125 mW. EASA, Energy-Aware Slotted Aloha; ILCM-SbS, Improved Linearized Combinational Model with Slot by Slot; FbF, Frame by Frame; DSSA, Dynamic Segment-by-Segment Aloha.
Sensors 18 01904 g002
Figure 3. (a) Total number of idle slots per tag c i / n and (b) total number of collision slots per tag c k / n , varying n from 16–2048.
Figure 3. (a) Total number of idle slots per tag c i / n and (b) total number of collision slots per tag c k / n , varying n from 16–2048.
Sensors 18 01904 g003
Figure 4. (a) Reader bits per tag and (b) bits per tag to identify n tags, varying n from 16–2048.
Figure 4. (a) Reader bits per tag and (b) bits per tag to identify n tags, varying n from 16–2048.
Sensors 18 01904 g004
Table 1. Main EPC C1G2 timing parameters’ calculation.
Table 1. Main EPC C1G2 timing parameters’ calculation.
ParameterDescriptionCalculation
T d a t a 0 Duration of a reader data-0 T a r i
T d a t a 1 Duration of a reader data-11.5· T a r i
T P r e a m b l e R T Duration of R-T Preamble T d e l + T d a t a 0 + R T c a l + T R c a l
T F S y n c R T Duration of Frame Sync. T d e l + T d a t a 0 + R T c a l
T P r e a m b l e T R Duration of T-R7/ D R t
D R r Reader data rate 1 / ( ( T d a t a 0 + T d a t a 1 ) / 2 )
D R t Tag data rate B L F / M
T Q c Duration of a Qc T F S y n c R T + 22/ D R r
T Q A Duration of a QA T P r e a m b l e R T + 9/ D R r
T Q R Duration of a QR T P r e a m b l e R T + 4/ D R r
T A C K Duration of a ACK T F S y n c R T + 24/ D R r
T R N 16 Duration of tag R N 16 23/ D R t
T E P C Duration of tag E P C 135/ D R t
Table 2. Simulation parameters according to EPC C1G2 [8].
Table 2. Simulation parameters according to EPC C1G2 [8].
ParameterValueParameterValue
T a r i 6.25 μ s B L F 40 kbps
T P r e a m b l e R T 234.38 μ s T 1 87.5 μ s
T P r e a m b l e T R 700.00 μ s T 2 75 μ s
T F S y n c R T 34.38 μ s T 3 8.75 μ s
D R r 128 kbps D R t 10 kbps
T Q A 104.69 μ s T Q R 65.63 μ s
T Q C 406.25 μ s T Q E 65.63 μ s
Table 3. Energy consumption per tag E/n (mJ) evaluation varying P t x and P r x for n = 64 and n = 1024. Each combination of P t x and P r x results in a different ρ value for EASA. Quantities in bold represent the best results among the strategies in the comparison.
Table 3. Energy consumption per tag E/n (mJ) evaluation varying P t x and P r x for n = 64 and n = 1024. Each combination of P t x and P r x results in a different ρ value for EASA. Quantities in bold represent the best results among the strategies in the comparison.
P r x = 125 mW P r x = 25 mW P r x = 800 mW
P t x = 125 mWmW P t x = 825 mW
1 / ρ 7.414.133.397.32
Protocol n = 64 n = 1024 n = 64 n = 1024 n = 64 n = 1024 n = 64 n = 1024
EASA2.632.4415.3214.9115.10238.0417.20257.10
Chen162.762.6015.8615.7315.56248.6318.12273.58
Chen142.812.6616.1015.9815.75279.6818.51279.68
ILCM-SbS2.772.4415.8415.1915.60240.6918.17257.88
ILCM-FbF2.922.8516.4616.7416.10262.9519.09300.00
Eom2.832.6716.1916.0315.80252.8418.52281.47
DSSA2.772.5716.0015.6415.66247.3218.16271.18
SSA2.762.5315.8815.5015.63245.1018.12266.85
Table 4. Study of the effect of T a r i and B L F on E / n (mJ). Results are averaged for N. T a r i and B L F are varied from the maximum to the minimum values allowed by EPC C1G, resulting in different ρ values for EASA. P t x and P r x are set to 825 mW and 125 mW, respectively. Quantities in bold represent the best results among the protocols in the comparison.
Table 4. Study of the effect of T a r i and B L F on E / n (mJ). Results are averaged for N. T a r i and B L F are varied from the maximum to the minimum values allowed by EPC C1G, resulting in different ρ values for EASA. P t x and P r x are set to 825 mW and 125 mW, respectively. Quantities in bold represent the best results among the protocols in the comparison.
Tari ( μ s)2525252525251611.438.897.276.25
BLF (kbps)640320213.316064404040404040
1 / ρ 1.361.611.811.982.663.073.443.713.904.034.13
EASA2.133.104.125.0410.5316.4015.8715.5615.3715.2415.17
Chen162.123.094.065.0310.8516.6716.2816.0715.9415.8815.84
Chen142.063.104.075.0510.9316.8116.4216.2316.1116.0516.00
ILCM-SbS2.163.124.085.0310.7316.4316.0215.8415.7215.6315.56
ILCM-FbF2.173.184.195.2011.2817.3716.9816.7716.6716.5816.54
Eom2.113.114.095.0811.0216.9416.5516.3516.2316.1516.12
DSSA2.133.104.085.0510.8816.7316.3116.1215.9815.9215.87
SSA2.153.104.085.0410.8316.6216.2316.0115.9015.8015.75
Table 5. Percentage (%) of the reader battery consumed to identify n = 1024 tags. The reader uses a lithium battery, which has 0.48 kJ of energy [31]. The protocols are evaluated in terms of the probability of the capture effect P c and the probability of a detection error P d . The timing parameters of Section 5.1 are used. Quantities in bold represent the best results among the protocols in the comparison.
Table 5. Percentage (%) of the reader battery consumed to identify n = 1024 tags. The reader uses a lithium battery, which has 0.48 kJ of energy [31]. The protocols are evaluated in terms of the probability of the capture effect P c and the probability of a detection error P d . The timing parameters of Section 5.1 are used. Quantities in bold represent the best results among the protocols in the comparison.
P d 0000.20.20.2
P c 00.10.200.10.2
EASA3.183.183.173.223.213.20
Chen163.363.303.253.333.283.25
Chen143.413.353.303.443.393.35
ILCM-SbS3.243.223.193.253.223.20
ILCM-FbF3.573.513.463.613.503.44
Eom3.423.393.403.433.443.37
DSSA3.313.263.243.243.243.23
SSA3.343.313.333.323.333.33

Share and Cite

MDPI and ACS Style

Arjona, L.; Landaluce Simon, H.; Perallos Ruiz, A. Energy-Aware RFID Anti-Collision Protocol. Sensors 2018, 18, 1904. https://doi.org/10.3390/s18061904

AMA Style

Arjona L, Landaluce Simon H, Perallos Ruiz A. Energy-Aware RFID Anti-Collision Protocol. Sensors. 2018; 18(6):1904. https://doi.org/10.3390/s18061904

Chicago/Turabian Style

Arjona, Laura, Hugo Landaluce Simon, and Asier Perallos Ruiz. 2018. "Energy-Aware RFID Anti-Collision Protocol" Sensors 18, no. 6: 1904. https://doi.org/10.3390/s18061904

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop