Next Article in Journal
Evaluating Quantum Dot Performance in Homogeneous FRET Immunoassays for Prostate Specific Antigen
Previous Article in Journal
A Mobile Robot Localization via Indoor Fixed Remote Surveillance Cameras
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Investigation of Interference Models for RFID Systems †

1
China Academy of Electronics and Information Technology, Shuangyuan Road 11, Shijingshan District, Beijing 100041, China
2
Dipartimento di Automatica e Informatica, Politecnico di Torino, Corso Duca Degli Abruzzi 24, Torino 10129, Italy
*
Author to whom correspondence should be addressed.
This paper is an extended version of our paper published in the 11th International Conference on Advances in Mobile Computing & Multimedia (MoMM-2013). Zhang, L.; Ferrero, R.; Gandino, F.; Rebaudengo, M. Simulation and evaluation of the interference models for RFID reader-to-reader collisions. In Proceedings of the International Conference on Advances in Mobile Computing & Multimedia, Vienna, Austria, 2–4 December 2013; pp. 209–216.
Sensors 2016, 16(2), 199; https://doi.org/10.3390/s16020199
Submission received: 30 December 2015 / Accepted: 28 January 2016 / Published: 4 February 2016
(This article belongs to the Section Sensor Networks)

Abstract

:
The reader-to-reader collision in an RFID system is a challenging problem for communications technology. In order to model the interference between RFID readers, different interference models have been proposed, mainly based on two approaches: single and additive interference. The former only considers the interference from one reader within a certain range, whereas the latter takes into account the sum of all of the simultaneous interferences in order to emulate a more realistic behavior. Although the difference between the two approaches has been theoretically analyzed in previous research, their effects on the estimated performance of the reader-to-reader anti-collision protocols have not yet been investigated. In this paper, the influence of the interference model on the anti-collision protocols is studied by simulating a representative state-of-the-art protocol. The results presented in this paper highlight that the use of additive models, although more computationally intensive, is mandatory to improve the performance of anti-collision protocols.

1. Introduction

Radio frequency identification (RFID) is currently a leading technology in the automatic identification and data capture area. With the growing interests of end users in different applications, RFID systems have been exploited in various areas, including smart shopping [1,2], agri-food traceability [3,4], supply chain management [5], construction industry [6], healthcare [7] and temperature tracking for food [8]. Generally, an RFID system is able to increase the process efficiency, by achieving complete traceability and better quality control at a low cost.
A basic RFID system is composed of several tags, one or more readers and a central server. The tag contains data that can be retrieved by a reader located nearby. The server receives, processes and stores the data sent by the readers. Since wireless communication is adopted in an RFID system and the majority of RFID-based applications require a dense reader deployment, data transmissions are susceptible to suffer from interference due to the signals simultaneously broadcast by other readers and tags. The interference in RFID systems can be classified into three types: tag-to-tag, reader-to-tag and reader-to-reader interference [9,10]. Tag-to-tag interference occurs when a reader interrogates multiple tags at the same time. Since this issue affects the performance of all of the RFID systems that involve more than one tag, many approaches have been proposed to address the tag-to-tag collision [11]. Reader-to-tag interference occurs when two or more readers interrogate the same tag simultaneously; this can be solved by separating the interrogation range of the readers. Reader-to-reader interference happens when a reader that is interrogating a tag receives strong signals from one or more readers operating at the same radio frequency, disturbing the weak signal backscattered from the target tag.
So far, although a number of research works related to analyzing reader-to-reader interference have been conducted, there is not an agreed interference model that can address the reader-to-reader collision problem efficiently and accurately. The existing interference models can be roughly categorized into two groups: single interference and additive interference models. In a single interference model, only the collisions between two readers are evaluated. On the contrary, also the interferences caused by a group of readers are considered in an additive interference model: although each reader in the group cannot disturb a certain reader r if considered alone, the interference generated by the whole group would prevent r from identifying tags.
In this paper, the single and additive interference models are evaluated and compared by simulating an RFID system. On the one hand, the single interference models can be simulated more easily, so they are preferred for a faster evaluation. On the other hand, the additive interference models consider a wider set of possible collisions, in a more coherent way with the real behavior of an RFID network. The goal of the paper is to evaluate if the difference in accuracy between the models are so relevant to recommend the use of an additive interference model for a realistic simulation, despite its computational overhead. In order to emulate the behavior of different RFID applications, three scenarios have been analyzed, and a wide range of system configurations has been considered for each of them. The first scenario consists of a set of independent readers: each reader periodically interrogates the tags with a given probability, and its activity is not affected by the other readers. Without any regulation among the readers, the reader-to-reader interference is more likely to occur, thus preventing the tag identification. In order to increase the performance of the RFID network, the adoption of a channel access method is suggested. Time division multiple access (TDMA) [12] is a well-known channel access scheme for shared medium networks. In a TDMA anti-collision protocol, the readers are scheduled to operate at different time slots. The second scenario considers a basic implementation of the TDMA scheme, with a random choice of the time slot for every reader. Many TDMA protocols have been specifically designed for RFID systems. In particular, the third scenario considers that the readers are scheduled according to the distributed color selection protocol (DCS) [13], which is an ad hoc TDMA protocol for RFID networks. The study of the behavior of the RFID system with the three proposed interrogation scenarios allows one to identify two main issues. Firstly, without applying any anti-collision protocol, the reader-to-reader interference dramatically reduces the system performance, i.e., the throughput and the interrogation efficiency. Secondly, the interference model used to simulate a protocol notably affects the estimated performance. Therefore, a precise evaluation of the reader-to-reader anti-collision protocols requires a proper selection of the interference model: in this way, the configuration parameters can be set more suitably in order to obtain a better performance.
The remainder of the paper proceeds as follows. The most common interference models are reviewed in Section 2. Section 3 describes the evaluation parameters. The simulation results under the three scenarios are presented in Section 4, Section 5 and Section 6. Finally, Section 7 is devoted to the conclusions.

2. Related Work

This section reviews the most common models that are applied to describe the interference in an RFID network. The models are categorized according to the type of reader-to-reader collision. Collisions that involve only two readers are called direct collisions: they represent the only source of interference assumed by single interference models. Instead, collisions due to multiple readers are called additive collisions and are taken into account by additive interference models. A reader r experiences an additive collision if there are no other readers causing a direct collision; however, r still cannot identify the tags because other farther readers generate a combined interference.

2.1. Single Interference Models

The single interference model represents the direct collisions that occur in the RFID network by means of an interference graph. Each reader is assigned to a node, and two nodes are linked by an edge if the corresponding readers, referred to as neighbors, may collide when they query tags at the same time. The main interference graphs are described in the following.

2.1.1. Bernoulli Random Graph

The Bernoulli random graph is the simplest interference model. Given a set of nodes, the edges are randomly added. The kind of stochastic process applied to build the graph leads to different variants of the Bernoulli random graph. For example, for every pair of nodes, an edge may be added with a probability p B r g independent from every other edge [14]. Another common approach for building a Bernoulli random graph is defined in [15]. The first step is to fix the total number of edges N B r g in the graph. Then, given a set of vertices, all of the possible graphs with N B r g edges are generated. Finally, one member of that set is randomly and uniformly chosen as the Bernoulli random graph.
The Bernoulli random graph models the randomness of the signal propagation in RFID networks due to external causes. Its main advantage is the simplicity of the model, which enables one to exactly express many average properties of the network. However, it does not properly capture the behavior of real-world networks, because the probability of a link between two nodes is independent of their real distance.

2.1.2. Unit Disk Graph

A collision between two RFID readers can be simply predicted by evaluating their distance: the readers may collide if their distance is lower than a threshold D. Since the only condition for generating a collision is the relative distance between two readers, two nodes r 1 and r 2 are linked by an edge if r 1 is located within a circle centered in r 2 and with radius D. This interference graph is called the unit disk graph [16].
Some variants of the basic model exist. In a random geometric graph, the position of the readers is randomly chosen inside the unit square [ 0 , 1 ] 2 [17]. This interference graph becomes a random sector graphs [18] if the antenna of the readers is directional.
Threshold D can be evaluated in different ways. An explicit formula is obtained in [19] considering a homogeneous RFID network. In that case, the interrogation range d, the transmit power P r and the antenna gain G r are the same for all of the readers. Similarly, the antenna gain G t and the power reflection coefficient R t are the same for all of the tags. Under the condition of a homogeneous network, the value of the threshold is:
D = K 0 Γ P r d 2 α G r 2 R t P r G t 2 G r 2 N 0 K 0 2 Γ d 2 α α
where α is the path loss exponent, Γ is the SINR (signal to interference plus noise ratio) needed to identify the tag, N 0 is the background noise power and K 0 is a coefficient that depends on the adopted propagation model (for example, K 0 = 4 π λ 2 in the free space model).
The analysis in [20] determines the presence of a reader-to-reader collision by correlating the distances between the two readers and the group of tags to query. Reader r 1 can identify tags near it without any interference from reader r 2 if the following condition is satisfied:
| r 1 r 2 | ( 1 + Δ ) | r 1 t |
where Δ is a positive constant, | r 1 r 2 | is the distance between the two readers and | r 1 t | is the distance between r 1 and the farthest tag t that is queried. Since the longest distance at which a tag can be identified corresponds to the interrogation range d, the longest distance expected in Equation (2) such that two readers experience a reader-to-reader collision is:
D = ( 1 + Δ ) d
Equation (3) can be simplified by assigning a constant value to D [21], without any explicit correlation to the interrogation range.

2.1.3. Quasi Unit Disk Graph

Ideally, with an omnidirectional antenna, the interference area generated by a reader is circular, because its emitted signals propagate in all directions in the same way. However, this does not hold up in a real scenario, for example due to the irregular shape of the field, some obstacles that obstruct the signal propagation, the atmospheric conditions, etc. The quasi unit disk graphs models this situation by introducing a parameter ρ, with 0 < ρ < 1 [22]. As in the unit disk graph, two nodes farther than D do not interfere. However, a distance lower than D does not entail an interference between the nodes. In detail, in the quasi unit disk graph, two nodes are surely linked only if their distance is lower than ρ D . If the distance ranges between ρ D and D, the existence of the edge is unspecified.
A natural extension of the quasi unit disk graph is the quasi random geometric graph [23], where the nodes are independent and uniformly distributed on the unit square [ 0 , 1 ] 2 . The presence of obstacles that reduce the interference between a pair of readers can be captured by other graphs, such as the faulty random geometric graph [24], which is obtained from a random geometric graph through random removal of edges and vertices.

2.2. Additive Interference Models

The criterion followed by the additive interference models for determining the occurrence of a reader-to-reader collision is the evaluation of the SINR at the reader’s antenna. Let be P t , r the power of the reply that reader r receives from tag t and I the interference generated by the other readers. r can identify t only if the measured SINR is higher than a threshold Γ:
P t , r I + N 0 Γ
The contributions to I due to each reader can be represented with a weighted undirected graph: the weight w i , 0 of an edge between two readers r i and r 0 expresses the interference that the signal emitted by r i provokes on r 0 . Reader r 0 experiences a reader-to-reader collision if the sum of the weights of all its incoming edges in the graph is so high that Equation (4) is not satisfied:
P t , r i = 1 N 1 w i , 0 + N 0 < Γ
The following subsections present two categories of additive interference models, which differ in the quantity of readers that are considered to compute the interference perceived by the target reader.

2.2.1. Complete Weighted Graph

The most general additive interference models compute the interference received by reader r 0 by summing the contributions of all of the other readers:
I 0 = i = 1 N 1 P r i , r 0
where N is the number of the readers in the network and P r i , r 0 is the power of the signal transmitted by r i , measured at r 0 ’s antenna. The resulting interference graph corresponds to a complete weighted graph: each node is linked to all of the others, and an edge between two nodes r i and r j has weight P r i , r j .
Different approaches for estimating the power of the signals P t , r in Equation (4) and P r i , r j in Equation (6) exist [19]. A reader can only query tags closer than d, so the lowest power of the signal received by a tag is:
P r , t = P r G r G t K 0 d α
Since only a fraction of the signal is backscattered by the tag, the lowest power of the tag’s reply received by the reader is:
P t , r = R t P r , t G t G r K 0 d α
In a homogeneous network, r 1 generates an interference on the transmission of r 0 equal to:
P r 1 , r 0 = P r G r G r K 0 | r 1 r 0 | α
thus, the amount of interference perceived by r 0 is:
I 0 = i = 1 N 1 P r G r G r K 0 | r i r 0 | α

2.2.2. Random Proximity Graph

The interference caused by a reader on another one is inversely proportional to their distance, as shown in Equation (9), so the greatest amount of interference is due to close readers. Therefore, the total interference can be satisfactorily approximated by summing the contributions of the k closest readers. The obtained interference graph is called the random proximity graph [25]. In this graph, the deployment area is the unit square [ 0 , 1 ] 2 , and the nodes are randomly located with a uniform distribution. Each node is linked with its k closest nodes, which are identified according to the Euclidean distance.
The random proximity graph can be generalized to a K-nearest neighbor graph [26] if a metric space other than the Euclidean space is considered. In that case, the number of dimensions is higher than two, and a measure of distance different from the Euclidean distance may be applied.

3. Simulation Setup

An ad hoc simulator for RFID networks [27] has been adopted to test and compare the single and additive interference models. In particular, the unit disk graph and the complete weighted graph models are chosen as representative of the two classes of models.
In the experiments, the deployment area is a 1000 m × 1000 m field. In order to evaluate the influence of the reader density, the number of readers varies from 10 to 50. The RFID network is considered homogeneous. Table 1 shows the values of the parameters adopted in the simulation, in accordance with [28]. In particular, D is computed by substituting the adopted values into Equation (1). D is used to determine whether two readers are neighbors in the unit disk graph model.
The following metrics have been adopted to compare the interference models:
  • success rate: the ratio of the number of successful interrogations to the amount of attempts;
  • throughput: the average number of successful interrogations performed per reader during a specific amount of time;
  • percentage of additive collisions (for the additive interference model only): the ratio of the number of collisions caused by more than one reader to the amount of reader-to-reader collisions.
Table 1. Parameters of the interference models.
Table 1. Parameters of the interference models.
ParameterSymbolValue
Interrogation ranged5 m
Reader antenna gain G r 6 dBi
Tag antenna gain G t 1 dBi
Tag’s power reflection coefficient R t 3/4
Reader’s transmit power P r 30 dBm
Model coefficient K 0 1/ G r 2
Path loss exponentα2
SINR ThresholdΓ10
Noise power N 0 0
Threshold distanceD288.68 m
As the activity of the readers depends on the application requirements, different behaviors are tested by considering three scenarios in the simulations:
  • probabilistic interrogation: at every time slot, each reader has a probability p of querying tags;
  • slotted interrogation: the communication is organized in rounds composed by a fixed number of time slots, and each reader randomly chooses a time slot to interrogate the tags;
  • DCS protocol: the readers are scheduled according to a state-of-the-art TDMA protocol [13].
Different configuration parameters have been considered for every scenario: each case is simulated 100 times in order to reduce the effect of randomness.

4. Probabilistic Interrogation Scenario

In the current scenario, the activity of the readers is modeled as a Bernoulli process, i.e., a discrete-time stochastic process. The simulation time is divided into iterations of the same length: in the experiments, each simulation consists of 2000 iterations. The last instant of an iteration is called the interrogation point. The readers are allowed to interrogate the tags only at the interrogation points, with a probability p. The probability p, which represents the interrogation frequency of the system, is selected according to the goal of the system: the higher p, the more often the tags are queried. The activity of a reader at the interrogation point is independent of the other readers. Furthermore, the operation is memoryless, i.e., the behavior of a reader is independent of the previous iterations.
The throughput of the readers depends on p and on the density of the nodes: for example, few tag identifications are expected to be completed with a low density and a low value of p (because few interrogations are attempted) or with a high density and a high value of p (because there is too much interference generated by the simultaneous interrogations). Different simulations of the probabilistic interrogation scenario are performed, with p ranging from 0.1 to 1.

4.1. Success Rate in the Probabilistic Interrogation Scenario

Figure 1 compares the success rate in the two models, with 30 or 50 readers in the network. It can be observed that the success rate is always lower than 0.6 for 30 readers and 0.4 for 50 readers: this indicates that an anti-collision algorithm is necessary to reach a good probability of tag identification in an RFID system. Beyond a certain threshold of p, called bottleneck probability, it is impossible to perform any tag identification because the quantity of readers simultaneously querying is too high. As shown in Figure 1a, with 30 readers, the bottleneck probability is 0.8 according to the single interference model, but it falls to 0.4 according to the additive interference model. Similarly, as shown in Figure 1b, with 50 readers, the bottleneck probability reduces from 0.6 to 0.2, by passing from the single to the additive interference model. This remarkable difference in the bottleneck probability reveals to what extent the behavior of the readers differs according to the single and additive interference models.
Figure 1. Success rate in the probabilistic interrogation scenario: (a) 30 readers; (b) 50 readers.
Figure 1. Success rate in the probabilistic interrogation scenario: (a) 30 readers; (b) 50 readers.
Sensors 16 00199 g001
In both the networks, the successful ratio results always in being higher by using the additive interference model than by using the single interference one, since the additive interference model is able to consider a larger number of reader-to-reader collisions with respect to the single interference one.
The success rate in Figure 1b is always lower than the corresponding rate in Figure 1a, because, as the network density grows, the interrogations of a reader influence more neighbors.

4.2. Throughput in the Probabilistic Interrogation Scenario

Figure 2a considers the probabilistic interrogation scenario and shows the throughput computed by using the single interference model. Considering a quantity of readers between 10 and 30, initially, the throughput increases, but after a peak, it decreases. The position of the peak is due to p: as the quantity of readers increases, the peak is reached with a lower probability. When there are more than 30 readers, the throughput constantly decreases as p grows. For a fixed interrogation probability, the throughput decreases if the quantity of readers grows, because a larger number of readers involves a greater number of simultaneous interferences.
Figure 2b presents the throughput expected by the additive interference model. The peak point is reached with a value of p higher than 0.1 only if there are 10 readers or less in the network. In accordance with the single interference model, the throughput decreases if the quantity of readers grows due to the bigger amount of collisions among them. It can be also observed that the throughput quickly becomes zero in some system configurations (e.g., 30 readers with p > 0.4), in accordance with the success rate shown in Figure 1.
By comparing Figure 2a,b, it can be noted that the value of p associated with the peak point, which represents the best configuration, notably differs according to the two interference models when there are 30 readers or less. Instead, the two models agree with more than 40 readers: in this case, the peak point is always reached with p = 0 . 1 .
Independently of the number of readers, the highest throughput achievable according to the single interference model is higher than the throughput estimated by using the additive interference one. Figure 3 compares the best throughput according to the two interference models considering a quantity of readers between 10 and 50. It can be observed that the absolute difference in throughput decreases if the quantity of readers grows. However the relative difference increases. In fact, the percentage difference, i.e., the difference between the two values divided by their average, rises from 39% with 10 readers to 45% with 50 readers.
Figure 2. Throughput in the probabilistic interrogation scenario. (a) Single interference model; (b) Additive interference model.
Figure 2. Throughput in the probabilistic interrogation scenario. (a) Single interference model; (b) Additive interference model.
Sensors 16 00199 g002
Figure 3. Best throughput in the probabilistic interrogation scenario.
Figure 3. Best throughput in the probabilistic interrogation scenario.
Sensors 16 00199 g003

4.3. Percentage of Additive Collisions in the Probabilistic Interrogation Scenario

Figure 4 shows the ratio of collisions due to an additive interference. When the number of readers is between 10 and 30, the ratio initially grows as the interrogation probability grows, because the number of collisions is limited and the relative quota of the additive ones is significant. However, after reaching a peak point, the percentage of additive collisions starts to decrease as p increases, because the direct collisions become predominant: in this case, it is more likely for a reader to have a neighbor that tries to query the tags nearby, causing a collision. With 40 or more readers, the ratio of additive collisions over the total quantity of collisions decreases with a progressively lower impact on the total interference. Independently of the number of readers, the greatest ratio of additive collisions over the total quantity of collisions is about 22%.
Figure 4. Percentage of additive collisions for the additive interference model in the probabilistic interrogation scenario.
Figure 4. Percentage of additive collisions for the additive interference model in the probabilistic interrogation scenario.
Sensors 16 00199 g004

5. Slotted Interrogation Scenario

In this scenario, the communications are organized in rounds with the same duration. The rounds are composed by time slots. Each reader randomly selects a time slot to query tags. If there is a collision, the reader randomly picks a new slot for the further rounds. If the quantity of time slots is high, after a self adjustment phase, the system becomes steady, and the readers are able to query tags without reader-to-reader collisions.
This slotted mechanism is at the base of any TDMA protocol, because it reduces the reader-to-reader collisions. Nevertheless, the quantity of slots per round may affect the performance. In fact, a large quantity of time slots does not correspond directly to a high throughput, because if there are too many time slots, some of them could remain unused. In this section, the trade-off between the throughput and the number of collisions is evaluated trough simulations. All of the simulations last 1000 s, and the length of the time slot is set to 0.5 s.

5.1. Success Rate in the Slotted Interrogation Scenario

Figure 5 illustrates the success rate according to the two interference models. The rate monotonically climbs up as the number of time slots increases, because the probability that more than one reader transmits at the same time slot reduces. The highest number of time slots adopted in the simulations is 30. In this case, with 50 readers, the success rate is equal to 0.63 according to the additive interference model, and it is even higher, equal to 0.71, according to the single interference model.
With respect to the results obtained in the probabilistic interrogation, the success rate is remarkable higher, since the interrogations are scheduled in different time slots, and this reduces the reader-to-reader collisions. However, Figure 5a shows that if the quantity of time slots and of readers are the same, the success rate is lower than one. This result is due to the starting unsteady phase, during which the readers look for a free time slot.
Instead, the difference between the two models is primarily influenced by the quantity of slots: it reduces as the quantity of slots increases. With a larger quantity of time slots, the readers have a greater probability to be assigned to a different time slot, with negligible interference among them.
Figure 5. Success rate in the slotted interrogation scenario: (a) 30 readers; (b) 50 readers.
Figure 5. Success rate in the slotted interrogation scenario: (a) 30 readers; (b) 50 readers.
Sensors 16 00199 g005

5.2. Throughput in the Slotted Interrogation Scenario

Figure 6 shows the throughput estimated by the two interference models. The general behavior is similar in both the interference models and with any network density: the throughput raises to a peak and then slowly decreases. The position of the peak changes according to the number of readers. In both models, a large quantity of readers corresponds to many time slots needed to obtain the best throughput.
Figure 6. Throughput in the slotted interrogation scenario. (a) Single interference model; (b) Additive interference model.
Figure 6. Throughput in the slotted interrogation scenario. (a) Single interference model; (b) Additive interference model.
Sensors 16 00199 g006
The throughput predicted by the single interference model is always larger than the throughput computed with the additive model, while the quantity of slots corresponding to the best throughput is lower for the single interference model (e.g., with 10 readers, five time slots per round correspond to the best throughput in Figure 6b; however, in Figure 6a, the supposed best number of time slots is three). The difference is greater for a large quantity of readers: with 50 readers, the best quantity of slots per round is 11 and 19 for the single and additive interference models, respectively.
Figure 7 shows the comparison of the best throughput with the considered models. The percentage difference between the best throughput supposed by the considered models is almost constant and independent of the number of readers. It oscillates in the interval between 37% and 40%. For a larger quantity of readers, the best throughput is achieved by using a higher quantity of slots, as shown in Figure 6. As a consequence, the percentage difference between the best throughput in the two models is not affected by the number of readers, because it is compensated by using a different quantity of slots.
Figure 7. Best throughput in the slotted interrogation scenario.
Figure 7. Best throughput in the slotted interrogation scenario.
Sensors 16 00199 g007

5.3. Percentage of Additive Collisions in the Slotted Interrogation Scenario

Figure 8 considers the scenario of slotted interrogation and shows the ratio of additive collisions over the total quantity of collisions. Only with 10 readers, the ratio of additive collisions is affected by the number of slots per round. This confirms the trend of Figure 7: by varying the number of readers, the best throughput is achieved by using a different quantity of slots. Since the percentage of additive collisions is poorly affected by the quantity of slots, the percentage difference is similar with both models.
Figure 8. Ratio of additive collisions with the slotted interrogation scenario.
Figure 8. Ratio of additive collisions with the slotted interrogation scenario.
Sensors 16 00199 g008

6. DCS Scenario

The distributed color selection (DCS) protocol [13] is one of the most popular TDMA anti-collision protocols. The main idea is to use a certain number of colors ( m a x C o l o r s ) to distinguish all of the readers in the system, so that each reader has the smallest possible number of neighbors with the same color. Initially, each reader selects a color and queries the tags only during the corresponding time slot. Once a reader detects an interrogation failure, it randomly changes the color and broadcasts the new color to its neighbors: this message is referred to as a kick. Whenever a reader receives a kick with the same color as its own, it selects another color.
With respect to the previous scenario, in DCS, the choice of a new time slot for a reader may be due not only to its own activity (i.e., after an interrogation failure), but also to the information received from its neighbors (i.e., when they send a kick). However, no countermeasures are planned in DCS if a reader experiences an interference generated by a group of other readers. This event is considered only by the additive interference model, so the performance of DCS is expected to change depending on the considered interference model. The goal of this section is to investigate the different performance of the DCS protocol according to the single and additive interference models. The length of each slot is 0.5 s, and the total simulation time is 1000 s.

6.1. Success Rate in the DCS Scenario

Figure 9 presents the success rate achieved with DCS according to the two interference models. The values reported in both models decrease as more readers are deployed, since more collisions appear when the density grows. When there are 30 readers, DCS shows a good performance (i.e., the success rate is larger than 99%) with m a x C o l o r s 10 in the single interference model and m a x C o l o r s 15 in the additive interference model. However, when the number of readers grows to 50, a big raise of m a x C o l o r s is required in order to get the same performance: the values of m a x C o l o r s required to reach a success rate higher than 99% become 18 and 25 for the single and additive interference models, respectively.
Figure 9. Success rate in the distributed color selection (DCS) scenario: (a) 30 readers; (b) 50 readers.
Figure 9. Success rate in the distributed color selection (DCS) scenario: (a) 30 readers; (b) 50 readers.
Sensors 16 00199 g009
It can be observed that the difference between the two models is much larger than in the case of probabilistic and slotted interrogations. For example, in Figure 9a, if the value of m a x C o l o r s is lower than or equal to three, the success rate is close to zero according to the additive interference model: this means that three colors are not enough to avoid collisions in such a dense deployment. On the contrary, with three colors, the single interference model supposes that 18% of the interrogations are successful. According to the additive interference model, a similar success rate is achieved only if m a x C o l o r s is at least equal to eight. Furthermore, the difference between the considered interference models is larger for a greater quantity of readers. In Figure 9b, the additive interference model estimates a success rate close to zero with a value of m a x C o l o r s lower than or equal to six: this configuration leads to a success rate of 24% in the single interference model. m a x C o l o r s should be at least equal to 15 to achieve such a success rate in the additive interference model. This analysis reveals that the choice of the interference model plays an important role in the design of an anti-collision protocol, in order to set the proper configuration parameters (like the value of m a x C o l o r s in DCS depending on the network density).

6.2. Throughput in the DCS Scenario

Figure 10 presents the throughput of the DCS protocol in the single and additive interference models. On the one hand, a large value of m a x C o l o r s results in a good ability to avoid collisions, but on the other hand, it also means fewer interrogation attempts at the same time. This explains the trend of the throughput in both the inference models: initially, the throughput grows as m a x C o l o r s increases, because the number of reader-to-reader collisions reduces. However, after reaching a peak, the throughput decreases if m a x C o l o r s further increases, because the number of reader-to-reader collisions keeps stable, but the readers query tags less frequently.
Figure 10. Throughput in the DCS scenario. (a) Single interference model; (b) Additive interference model.
Figure 10. Throughput in the DCS scenario. (a) Single interference model; (b) Additive interference model.
Sensors 16 00199 g010
The single interference model tends to overestimate the performance of the DCS protocol, since it ignores the additive collisions. Besides the throughput loss, the additive collisions may affect the behavior of the network in other ways: first, more k i c k packets are exchanged in the additive interference model because a reader can collide also with a group of readers and not only with a single one, so it needs to change color more often; secondly, it is more likely that its new color will cause another collision, because, besides the colors of its neighbors, the reader should avoid also the colors of readers that can generate an additive collision.

6.3. Best Configuration in the DCS Scenario

As shown in Table 2, the optimal value of m a x C o l o r s in order to achieve the highest throughput depends on the interference model. For example, in a network with 40 readers, m a x C o l o r s should be 10 according to the single interference model, but that value turns to 17 according to the additive interference model. The difference between that optimal value grows as the quantity of readers rises: for example, the difference raises from one, with 10 readers, to 10, with 50 readers. Considering that the additive model is more accurate, it can be concluded that the single interference model is not able to compute the optimal parameter setting for the DCS protocol, especially if there are many readers. The fourth and the fifth columns in Table 2 report the throughput according to the additive interference model for two distinct values of m a x C o l o r s : the value suggested by the single interference model (as shown in the second column) and the value suggested by the additive interference model (as shown in the third column). If there are more than 10 readers, by selecting the value of m a x C o l o r s according to the single interference model, the throughput loss, with respect to the configuration selected according to the additive interference model, ranges from 59.4% to 67.4%. The difference is less significant with 10 readers because the optimal value of m a x C o l o r s suggested by the two interference models does not differ significantly.
Table 2. Analysis of the optimal value of m a x C o l o r s in the DCS scenario.
Table 2. Analysis of the optimal value of m a x C o l o r s in the DCS scenario.
Number of Readers Optimal maxColors Throughput in Additive Model Through-Put Loss
SingleModelAdditiveModelSingleConfigurationAdditiveConfiguration
1034418.84474.9811.8%
205896.03236.7159.4%
3071249.10150.8167.4%
40101740.85109.1262.6%
50122228.6885.1566.3%

6.4. Percentage of Additive Collisions in the DCS Scenario

It can be observed from Figure 11 that the influence of additive collisions on the performance initially increases up to a peak and then decreases, with respect to the growing value of m a x C o l o r s . For example with 40 readers, the percentage of additive collisions firstly grows to the peak point at 41% (with m a x C o l o r s = 10 ), because the direct collisions deceases as m a x C o l o r s grows, which is also reflected in Figure 10. Afterwards, the percentage of additive collisions drops down until approaching 0%. In fact, with many time slots, DCS achieves a stable state in which each reader can perform the interrogation without interferences from other readers, since each reader owns a unique time slot.
Figure 11. Percentage of additive collisions for the additive interference model in the DCS scenario.
Figure 11. Percentage of additive collisions for the additive interference model in the DCS scenario.
Sensors 16 00199 g011

7. Conclusions

This paper investigates the interference models for the reader-to-reader collisions in RFID systems. In order to evaluate the effects of the models on the estimation of the performance of RFID systems, two general cases, namely the probabilistic interrogations and the slotted interrogations, are considered and simulated. The success rate, the throughput and the percentage of additive collisions are taken into account as analysis metrics. Moreover, DCS is implemented and simulated in order to study the influence of the interference models on a state-of-the-art TDMA anti-collision protocol. The goal of the investigation was to find if and when the simpler single interference models can be used instead of the more accurate additive interference models, without compromising the results of the analysis. In general, a single interference model underestimates the impact of the reader interference on the system performance. Furthermore, in the design of an anti-collision protocol, if the configuration parameters are chosen according to a single interference model, the system may not be able to achieve the optimal performance, as supposed by the additive interference model. Therefore, an accurate study on the RFID reader-to-reader collisions should prefer the additive interference model.

Acknowledgments

This work has been partially supported by the grant “Nano-materials and -technologies for intelligent monitoring of safety, quality and traceability in confectionery products (NAMATECH)” from Regione Piemonte.

Author Contributions

L.Z. developed the simulation tool, performed the experiments and contributed to write the paper. R.F. and F.G. designed the experiments, analyzed the data and contributed to writing the paper. M.R. supervised the research and critically revised the paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Hou, J.L.; Chen, T.G. An RFID-based shopping service system for retailers. Adv. Eng. Inform. 2011, 25, 103–115. [Google Scholar] [CrossRef]
  2. Piramuthu, S.; Wochner, S.; Grunow, M. Should retail stores also RFID-tag “cheap” items? Eur. J. Oper. Res. 2014, 233, 281–291. [Google Scholar] [CrossRef]
  3. Costa, C.; Antonucci, F.; Pallottino, F.; Aguzzi, J.; Sarria, D.; Menesatti, P. A Review on Agri-Food Supply Chain Traceability by Means of RFID Technology. Food Bioprocess Technol. 2013, 6, 353–366. [Google Scholar] [CrossRef]
  4. Cuinas, I.; Exposito, I.; Gay-Fernandez, J.A.; Alejos, A.V.; Sanchez, M.G. From Farm to Fork: Traceability Based on RFID—A Proposal for Complete Traceability in the Wine Sector; SciTePress: Setubal, Portugal, 2012; pp. 265–270. [Google Scholar]
  5. Cimino, M.G.; Marcelloni, F. Autonomic tracing of production processes with mobile and agent-based computing. Inf. Sci. 2011, 181, 935–953. [Google Scholar] [CrossRef]
  6. Valero, E.; Adán, A.; Cerrada, C. Evolution of RFID applications in construction: A literature review. Sensors 2015, 15, 15988–16008. [Google Scholar] [CrossRef] [PubMed]
  7. Najera, P.; Lopez, J.; Roman, R. Real-time location and inpatient care systems based on passive RFID. J. Netw. Comput. Appl. 2011, 34, 980–989. [Google Scholar] [CrossRef]
  8. Badia-Melis, R.; Ruiz-Garcia, L.; Garcia-Hierro, J.; Villalba, J.I.R. Refrigerated fruit storage monitoring combining two different wireless sensing technologies: RFID and WSN. Sensors 2015, 15, 4781–4795. [Google Scholar] [CrossRef] [PubMed]
  9. Bueno-Delgado, M.; Vales-Alonso, J.; Angerer, C.; Rupp, M. A comparative study of RFID schedulers in dense reader environments. In Proceedings of the IEEE International Conference on Industrial Technology, Vina del Mar, Chile, 14–17 March 2010; pp. 1373–1378.
  10. Papapostolou, A.; Chaouchi, H. RFID-assisted indoor localization and the impact of interference on its performance. J. Netw. Comput. Appl. 2011, 34, 902–913. [Google Scholar] [CrossRef]
  11. Bueno-Delgado, M.; Vales-Alonso, J. On the optimal frame-length configuration on real passive RFID systems. J. Netw. Comput. Appl. 2011, 34, 864–876. [Google Scholar] [CrossRef]
  12. Shin, K.C.; Park, S.B.; Jo, G.S. Enhanced TDMA based anti-collision algorithm with a dynamic frame size adjustment strategy for mobile RFID readers. Sensors 2009, 9, 845–858. [Google Scholar] [CrossRef] [PubMed]
  13. Waldrop, J.; Engels, D.; Sarma, S. Colorwave: A MAC for RFID reader networks. In Proceedings of the IEEE Wireless Communications and Networking, New Orleans, LA, USA, 20 March 2003; Volume 3, pp. 1701–1704.
  14. Gilbert, E.N. Random graphs. Ann. Math. Stat. 1959, 30, 1141–1144. [Google Scholar] [CrossRef]
  15. Erdős, P.; Rényi, A. On random graphs I. Publ. Math. 1959, 6, 290–297. [Google Scholar]
  16. McDiarmid, C. Random channel assignment in the plane. Random Struct. Algorithms 2003, 22, 187–212. [Google Scholar] [CrossRef]
  17. Haenggi, M.; Andrews, J.G.; Baccelli, F.; Dousse, O.; Franceschetti, M. Stochastic geometry and random graphs for the analysis and design of wireless networks. IEEE J. Sel. Areas Commun. 2009, 27, 1029–1046. [Google Scholar] [CrossRef]
  18. Díaz, J.; Petit, J.; Serna, M. A random graph model for optical networks of sensors. IEEE Trans. Mob. Comput. 2003, 2, 186–196. [Google Scholar] [CrossRef]
  19. Zhang, L.; Ferrero, R.; Gandino, F.; Rebaudengo, M. Evaluation of single and additive interference models for RFID collisions. Math. Comput. Model. 2013, 58, 1236–1248. [Google Scholar] [CrossRef]
  20. Gupta, P.; Kumar, P. The capacity of wireless networks. IEEE Trans. Inf. Theory 2000, 46, 388–404. [Google Scholar] [CrossRef]
  21. Engels, D.; Sarma, S. The reader collision problem. In Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Yasmine Hammamet, Tunisia, 6–9 October 2002; Volume 3, pp. 1–6.
  22. Kuhn, F.; Wattenhofer, R.; Zollinger, A. Ad-hoc networks beyond unit disk graphs. In Proceedings of the Joint Workshop on Foundations of Mobile Computing, San Diego, CA, USA, 19 September 2003; ACM: New York, NY, USA, 2003; pp. 69–78. [Google Scholar]
  23. Aly, S.A.; Kapoor, V.; Meng, J.; Klappenecker, A. Bounds on the network coding capacity for wireless random networks. In Proceedings of the IEEE Information Theory and Applications Workshop, La Jolla, CA, USA, 29 January–2 February 2007; pp. 231–236.
  24. Díaz, J.; Petit, J.; Serna, M. Faulty random geometric networks. Parallel Process. Lett. 2000, 10, 343–357. [Google Scholar] [CrossRef]
  25. Díaz, J.; Lotker, Z.; Serna, M. The distant-2 chromatic number of random proximity and random geometric graphs. Inf. Process. Lett. 2008, 106, 144–148. [Google Scholar] [CrossRef]
  26. Paredes, R.; Chávez, E. Using the k-nearest neighbor graph for proximity searching in metric spaces. In String Processing and Information Retrieval; Lecture Notes in Computer Science; Springer: Berlin, Germany; Heidelberg, Germany, 2005; Volume 3772, pp. 127–138. [Google Scholar]
  27. Ferrero, R.; Gandino, F.; Montrucchio, B.; Rebaudengo, M.; Zhang, L. A novel simulator for RFID reader-to-reader anti-collision protocols. In Proceedings of the 2015 International EURASIP Workshop on RFID Technology (EURFID), Rosenheim, Germany, 22–23 October 2015; pp. 1–6.
  28. Zhang, L.; Ferrero, R.; Gandino, F.; Rebaudengo, M. Simulation and evaluation of the interference models for RFID reader-to-reader collisions. In Proceedings of the International Conference on Advances in Mobile Computing & Multimedia, Vienna, Austria, 2–4 December 2013; ACM: New York, NY, USA, 2013; pp. 209–216. [Google Scholar]

Share and Cite

MDPI and ACS Style

Zhang, L.; Ferrero, R.; Gandino, F.; Rebaudengo, M. Investigation of Interference Models for RFID Systems. Sensors 2016, 16, 199. https://doi.org/10.3390/s16020199

AMA Style

Zhang L, Ferrero R, Gandino F, Rebaudengo M. Investigation of Interference Models for RFID Systems. Sensors. 2016; 16(2):199. https://doi.org/10.3390/s16020199

Chicago/Turabian Style

Zhang, Linchao, Renato Ferrero, Filippo Gandino, and Maurizio Rebaudengo. 2016. "Investigation of Interference Models for RFID Systems" Sensors 16, no. 2: 199. https://doi.org/10.3390/s16020199

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop