计算机科学 ›› 2019, Vol. 46 ›› Issue (10): 122-127.doi: 10.11896/jsjkx.180801602
石静, 郑嘉利, 袁源, 王哲, 李丽
SHI Jing, ZHENG Jia-li, YUAN Yuan, WANG Zhe, LI Li
摘要: 针对无线射频识别(RFID)系统中多标签-多阅读器环境下标签与信道资源的分配问题,提出了一种基于Whittle索引的多阅读器信道资源分配算法。在RFID多阅读器信道分配问题中建立无休止多臂赌博机(RMAB)模型,并采用Whittle索引算法进行求解。该算法依据信道前期的忙、闲状态,将信道空闲概率作为信任值赋予每个信道,并根据信道当前的信任值计算其Whittle索引值。标签选择索引值最大的信道作为可能感知接入的信道,随后根据每个时隙数据发送成功与否来动态更新信道信任值。对信道分配过程中可能出现的标签碰撞问题,采用等待一个时隙后再根据识别反馈信息重新选择接入信道的方式来解决。将文中所提算法从两个方面与典型的DiCa算法和Gentle算法进行比较:一是在阅读器数量固定的前提下,其系统吞吐量随待识别标签数量的变化情况;二是在待识别标签数量固定的前提下,其系统吞吐量随阅读器数量的变化情况。仿真结果表明,所提算法在上述两种情况下的系统吞吐量均优于DiCa算法和Gentle算法,其吞吐量在阅读器数量固定的前提下分别平均提高了150.34%和23.98%,在待识别标签数量固定的前提下分别平均提高了205.01%和43.37%。随着阅读器和待识别标签数量的增多,所提算法在系统吞吐量方面的优势更加明显。因此,采用提出的算法可以对有限的信道资源进行合理的动态分配,有效提高RFID多阅读器系统的识别效率。
中图分类号:
[1]RAJARAMAN V.Radio frequency identification[J].Re-sonance,2017,22(6):549-575. [2]YU Y,YU X,ZHAO Z,et al.Image Analysis System for Optimal Geometric Distribution of RFID Tags Based on Flood Fill and DLT[J].IEEE Transactions on Instrumentation and Mea-surement,2018,67(4):839-848. [3]DU J,SUGUMARAN V,GAO B.RFID and Multi-Agent Based Architecture for Information Sharing in Prefabricated Component Supply Chain[J].IEEE Access,2017,5:4132-4139. [4]REZAIE H,GOLSORKHTABARAMIRI M.A fair reader collision avoidance protocol for RFID dense reader environments[J].Wireless Networks,2018,24(6):1953-1964. [5]CHEN H,WANG Z,XIA F,et al.Efficiently and Completely Identifying Missing Key Tags for Anonymous RFID Systems[J].IEEE Internet of Things Journal,2018,5(4):2915-2926. [6]NAFAR F,SHAMSI H.Design and Implementation of an RFID-GSM based Vehicle Identification System on Highways[J].IEEE Sensors Journal,2018,18(17):7281-7293. [7]ZHANG Y,YANG F,WANG Q,et al.An anti-collision algorithm for RFID-based robots based on dynamic grouping binary trees[J].Computers & Electrical Engineering,2017,63:91-98. [8]ZHOU S K,DENG M L.Survey on ALOHA tag anti-collision algorithm[J].Computer Engineering and Applications,2017,53(14):9-17.(in Chinese) 周少珂,邓淼磊.ALOHA标签防碰撞算法综述[J].计算机工程与应用,2017,53(14):9-17. [9]WANG C H,LIU C S,XU H,et al.An enhanced binary tree-based anti-collision algorithm[J].Journal of Hunan University(Natural Sciences),2013,40(8):97-101.(in Chinese) 王春华,刘迟时,徐浩,等.一种改进的基于二叉树的防碰撞算法[J].湖南大学学报(自科版),2013,40(8):97-101. [10]GOLSORKHTABARAMIRI M,ISSAZADEHKOJIDI N.A Distance Based RFID Reader Collision Avoidance Protocol for Dense Reader Environments[J].Wireless Personal Communications,2017,95(2):1781-1798. [11]YANG X M,DU L,WANG J H,et al.Improved RFID anti-collision algorithm based on identity competition and cooperation[J].Journal of University of Electronic Science and Technology of China,2015,44(5):764-768.(in Chinese) 杨晓明,杜力,王佳昊,等.基于身份竞争与协作的RFID阅读器防碰撞算法[J].电子科技大学学报,2015,44(5):764-768. [12]SAFA H,EL-HAJJ W,MEGUERDITCHIAN C.A distributed multi-channel reader anti-collision algorithm for RFID environments[J].Computer Communications,2015,64(1):44-56. [13]SOHN S,JUNG J J.Channel and time slot allocation for dense RFID networks[J].Wireless Personal Communications,2013,73(2):329-339. [14]ZHU J,HAN C,YANG H L,et al.Dynamic spectrum access mechanism of multi-users based on restless multi-armed bandit model in cognitive networks[J].Journal of Computer Applications,2014,34(10):2782-2786.(in Chinese) 朱江,韩超,杨浩磊,等.认知无线网络中基于无休止多臂赌博机模型的多用户频谱接入机制[J].计算机应用,2014,34(10):2782-2786. [15]REVERDY P,SRIVASTAVA V,LEONARD N E.Satisficing in multi-armed bandit problems[J].IEEE Transactions on Automatic Control,2015,62(8):3788-3803. [16]HE X,YANG X S,KARAMANOGLU M,et al.Global convergence analysis of the flower pollination algorithm:a discrete-time Markov chain approach[J].Procedia Computer Science,2017,108:1354-1363. [17]BORKAR V S.Whittle index for partially observed binary Markov decision processes[J].IEEE Transactions on Auto-matic Control,2017,62(12):6614-6618. [18]MOSHREF M.Improved Anti-Collision Algorithm for Tag Identification in Future Internet of Things[J].International Journal of Computer Network and Information Security,2017,9(3):11. |
[1] | 袁源, 郑嘉利, 石静, 王哲, 李丽. 基于Q-learning的RFID多阅读器防碰撞算法 Anti-collision Algorithm Based on Q-learning for RFID Multiple Readers 计算机科学, 2019, 46(6): 124-127. https://doi.org/10.11896/j.issn.1002-137X.2019.06.018 |
[2] | 甘勇, 王凯, 贺蕾. 一种全新的RFID标签所有权转移协议 New Ownership Transfer Protocol of RFID Tag 计算机科学, 2018, 45(11A): 369-372. |
[3] | 张亚力,郭亚军,崔建群,曾庆江. 一种新的超轻量级RFID认证协议 New Ultra-lightweight RFID Authentication Protocol 计算机科学, 2017, 44(1): 183-187. https://doi.org/10.11896/j.issn.1002-137X.2017.01.035 |
[4] | 孟凡振,吴杰,卜旭松,冯锋. 基于马尔可夫链模型的井下目标轨迹预测算法 Underground Target Track Prediction Algorithm Based on Markov Chain Model 计算机科学, 2014, 41(Z6): 321-323. |
[5] | 钱晓军,朱颖,吉根林. 一种改进的物联网二进制防碰撞算法 Improved Binary Anti-collision Algorithm for Internet of Things 计算机科学, 2012, 39(9): 24-27. |
[6] | 邓淼磊,黄照鹤,鲁志波. EPCGen2标准下安全的RFID认证协议 Secure RFID Authentication Protocol for EPCGen2 计算机科学, 2010, 37(7): 115-117. |
[7] | 邓森磊,马玉军,石金娥,周利华. 安全的航空物品管理RFID系统 Secure RFID System for Aviation Goods Management 计算机科学, 2010, 37(11): 107-110. |
|