Computer Science ›› 2019, Vol. 46 ›› Issue (11A): 359-362.

• Network & Communication • Previous Articles     Next Articles

Improvement of Anti-collision Algorithm Based on RFID Tag

HOU Pei-guo, WANG Zhi-xuan, YAN Chen   

  1. (School of Electrical Engineering,Yanshan University,Qinhuangdao,Hebei 066004,China)
  • Online:2019-11-10 Published:2019-11-20

Abstract: Radio Frequency Identification (RFID) technology is a key technology in the Internet of Things.To solve the multi-tag collision problem in RFID system,this paper proposed a frame time slot Aloha anti-collision algorithm based on combined chaotic map (MDFSA).Through the algorithm,the pseudo-random number obtained by the system is more uniform,the selection of labels for each time slot is more uniform.Through statistical verification,the simulation results show that the MDFSA algorithm improves the stability and efficiency of the system and reduces the number of collisions.Compared with traditional DFSA algorithm,the proposed algorithm increases the efficiency of the maximum system by 33%.As the number of tags increases,the performance of the algorithm is more stable and the advantages are more significant.It is suitable for large RFID tag rapid identification systems.

Key words: Aloha, Anti-collision algorithm, Chaotic system, Pseudo random number generator, RFID

CLC Number: 

  • TP391
[1]SAARINEN K,BJORNINEN T,UKKONEN L,et al.Relia-bility Analysis of RFID Tags in Changing Humid Environment [J].IEEE Transactions on Components,Packaging and Manufacturing Technology,2014,4(1):77-85.
[3]ŠOLICP,BLAŽEVICZ,ŠKILJO M,et al.Gen2 RFID as IoT Enabler:Characterization and Performan-ce Improvement[J].IEEE Wireless Communications,2017,24(3):33-39.
[4]JAYADI R,LAI Y C,LIN C C,et al.Efficienttime oriented anti-collision protocol for RFID tag identification[J].Computer Communications,2017,112:141-153.
[6]SILVA I,VIEGAS C.An Effective Extension of Anti-Collision Protocol for RFID in the Industrial Internet of Things (IIoT)[J].Sensors,2018,18(12):4426.
[9]XIONG T W,TAN X,YAN N,et al.Modeling and simulation of RTLS based on UHF RFID [J].Journal of System Simulation,2011,23(1):212-216.
[10]LEE S R,JOO S D,LEE C W.An enhanced dyna-mic framed slotted ALOHA algorithm for RFID tag identification[C]∥The Second Annual International Conference on Mobile and Ubiquitous Systems:Networking and Services.IEEE Computer Society,2005.
[11]FU Y,QIAN Z H,MENG J,et al.Frame slot-ted Aloha anti-collision algorithm based on continuous slot prediction [J].transactions of the Chinese Academy of Sciences,2016,9(44):2081-2086.
[15]CHEN W T.An Accurate Tag Estimate Method for Improving the Performance of an RFID Anticollision Algorithm Based on Dynamic Frame Length ALOHA[J].IEEE Transactions on Automation Scienceand Engineering,2009,6(1):9-15.
[16]闫永梅,郝润芳,张朝霞,等.基于 Tent 映射的伪混沌序列的产生和分析[J].太原理工大学学报,2008,39(5):66-69.
[17]KATZ O,RAMON D A,WAGNER I A.A robust random number generator based on a differential current-mode chaos[M].IEEE Educational Activities Department,2008.
[18]BONANNO C,MENCONI G.Computational information forthe logistic map at the chaos threshold[J].Discrete and Continuous Dynamical Systems-Series B (DCDS-B),2002,2(3):415-431.
[1] ZHAO Geng, LI Wen-jian, MA Ying-jie. Chaotic Sequence Cipher Algorithm Based on Discrete Anti-control [J]. Computer Science, 2022, 49(4): 376-384.
[2] LUO Wen-cong, ZHENG Jia-li, QUAN Yi-xuan, XIE Xiao-de, LIN Zi-han. Optimized Deployment of RFID Reader Antenna Based on Improved Multi-objective Salp Swarm Algorithm [J]. Computer Science, 2021, 48(9): 292-297.
[3] DUAN Wen, ZHOU Liang. Redundant RFID Data Removing Algorithm Based on Dynamic-additional Bloom Filter [J]. Computer Science, 2021, 48(8): 41-46.
[4] LI Li, ZHENG Jia-li, LUO Wen-cong, QUAN Yi-xuan. RFID Indoor Positioning Algorithm Based on Proximal Policy Optimization [J]. Computer Science, 2021, 48(4): 274-281.
[5] QUAN Yi-xuan, ZHENG Jia-li, LUO Wen-cong, LIN Zi-han, XIE Xiao-de. Improved Grey Wolf Optimizer for RFID Network Planning [J]. Computer Science, 2021, 48(1): 253-257.
[6] XU He, WU Man-xing, LI Peng. RFID Indoor Relative Position Positioning Algorithm Based on ARIMA Model [J]. Computer Science, 2020, 47(9): 252-257.
[7] LI Li,ZHENG Jia-li,WANG Zhe,YUAN Yuan,SHI Jing. RFID Indoor Positioning Algorithm Based on Asynchronous Advantage Actor-Critic [J]. Computer Science, 2020, 47(2): 233-238.
[8] FENG An-qi, QIAN Li-ping, HUANG Yu-pin, WU Yuan. RFID Data-driven Vehicle Speed Prediction Using Adaptive Kalman Filter [J]. Computer Science, 2019, 46(4): 100-105.
[9] WANG Li-juan, LI Guo-dong, LV Dong-mei. Chaotic System Image Encryption Algorithm Based on Dynamic Parameter Control [J]. Computer Science, 2019, 46(11A): 469-472.
[10] ZHAO Fang-zheng, LI Cheng-hai, LIU Chen, SONG Ya-fei. Security Analysis and Optimization of Hyper-chaotic Color Image Encryption Algorithm [J]. Computer Science, 2019, 46(11A): 483-487.
[11] YAN Bo, HE Shao-bo. Dynamics and Complexity Analysis of Fractional-order Unified Chaotic System [J]. Computer Science, 2019, 46(11A): 539-543.
[12] LI Lu-lu, DONG Qing-kuan, CHEN Meng-meng. Cloud-based Lightweight RFID Group Tag Authentication Protocol [J]. Computer Science, 2019, 46(1): 182-189.
[13] YANG Zi-wei, ZHENG Jia-li, YUE Shi-bin, YUAN Yuan, SHI Jing. New Q Value Anti-collision Algorithm Based on Label Grouping [J]. Computer Science, 2018, 45(9): 152-155.
[14] ZHOU Shao-ke, ZHANG Zhen-ping, CUI Lin. Dynamic Frame Time Slot ALOHA Algorithm Based on Dynamic Factor Mean [J]. Computer Science, 2018, 45(6A): 328-331.
[15] LIU Yao-zong, LIU Yun-heng. Security Provenance Model for RFID Big Data Based on Blockchain [J]. Computer Science, 2018, 45(11A): 367-368.
Full text



No Suggested Reading articles found!