Advanced
Accelerating RFID Tag Identification Processes with Frame Size Constraint Relaxation
Accelerating RFID Tag Identification Processes with Frame Size Constraint Relaxation
Journal of Information and Communication Convergence Engineering. 2012. Sep, 10(3): 242-247
Copyright ©2012, The Korean Institute of Information and Commucation Engineering
This is an Open Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/li-censes/bync/ 3.0/) which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • Received : May 11, 2012
  • Accepted : June 07, 2012
  • Published : September 30, 2012
Download
PDF
e-PUB
PubReader
PPT
Export by style
Share
Article
Author
Metrics
Cited by
TagCloud
About the Authors
Young-Jae Park
Young Beom Kim
ybkim@konkuk.ac.kr

Abstract
In the determination of suitable frame sizes associated with dynamic framed slotted Aloha used in radio frequency identification tag identification processes, the widely imposed constraint L = 2 Q often yields inappropriate values deviating far from the optimal values, while a straightforward use of the estimated optimal frame sizes causes frequent restarts of read procedures, both resulting in long identification delays. Taking a trade-off, in this paper, we propose a new method for determining effective frame sizes where the effective frame size changes in a multiple of a predetermined step size, namely Δ . Through computer simulations, we show that the proposed scheme works fairly well in terms of identification delay.
Keywords
I. INTRODUCTION
Due to the ability to identify objects wirelessly without line-of-sight, radio frequency identification (RFID) systems are becoming noticeably prevalent. RFID systems are thought to be particularly attractive for applications such as retail, inventory management, and supply-chain management [1 , 2] .
RFID systems consist of a reader and multiple tags. While the reader is powerful in terms of memory and computational resources, there are many types of tags with varying computational capabilities. Among the various tag types, passive ones are becoming more and more popular for large scale deployments due to their low cost [2] .
Collision due to simultaneous tag responses is one of the key issues in RFID systems. It results in wastage of bandwidth and energy, and increases identification delays. To minimize collisions, RFID readers must use an anticollision protocol. The design of anti-collision protocols becomes more challenging considering that the tags must be simple, cheap, and small enough.
The anti-collision algorithm of RFID can be either deterministic or statistical. In this paper, we analyze anticollision protocols based on framed slotted Aloha (FSA). Such protocols have the ability to adjust their frame size in accordance with varying tag populations using a tag estimation function.
Consider a reader with N tags in its interrogation zone. Initially, the reader starts the collision resolution process with an arbitrary frame size. Tags then choose a slot randomly to transmit their identification. The reader monitors the status of each slot and counts the number of slots filled with zero, one, or multiple tag responses. This observation is then translated to a tag estimate,
PPT Slide
Lager Image
via a tag estimation function. Once an estimate is computed, the reader adjusts its frame size accordingly in such a way that the reading process can be terminated as soon as possible.
PPT Slide
Lager Image
An example of radio frequency identification systems.
In this vein, an inaccurate tag estimate can result in non- optimal frame sizes, which can again increase identification delay and energy wastage. Another factor that should be considered carefully in designing the reading process is to determine when to stop the reading process, namely the termination time Tα . Here, Tα denotes the minimum number of read cycles required to identify all N tags in the interrogation zone with probability α , also referred to as the assurance level .
H. Vogt [3 , 4] proposed a tag estimation function and a framework for choosing optimal frame sizes for computed tag estimates, including a procedure for adaptively reading a static set of tags. It is generally accepted that Vogt's tag estimation function based on Chebyshev's inequality is the most accurate among several estimation functions [1] . However, as is performed in [5] , the constraint that the frame size should be of the form 2 Q for some integer Q is imposed. As a result, the actual frame sizes used in identification processes often deviate far from the optimal (or sub-optimal) frame sizes, thereby significantly prolonging the identification delay. On the other hand, a direct use of optimal frame sizes as estimated can lead to frequent restarts of identification processes, also resulting in longer identification delays.
Based on the observations stated above, we propose a new method for determining effective frame sizes which change linearly proportional to a fixed step size Δ according to tag estimaties
PPT Slide
Lager Image
. In the proposed scheme, Young et al.'s estimate is used instead of Vogt's estimate [3] for more secure estimation of N and the simplified parameter estimation method proposed in [6] for the initial estimation of optimal frame sizes and termination time. Through computer simulations, we show that the proposed scheme works fairly well in terms of identification delay.
The remainder of this paper is organized as follows. First, as a preliminary step for presenting our scheme, we give a formulation of passive tag reading processes as an optimal design problem, and then introduce Vogt's [3] and Young et al.'s schemes in the next section. In Section III, we summarize the simplified parameter estimation method proposed by Young et al. for computing optimal frame sizes and termination time and propose a new method for determining effective frame sizes. This is followed by a review of simulation results and discussion in Section IV. Section V concludes the paper.
PPT Slide
Lager Image
A sample outcome of dynamic frame slotted Aloha read cycles.
II. BACKGROUND
We consider FRID systems adopting passive tags and dynamic frame slotted Aloha (DFSA) with no muting as the anti-collision protocol. DFSA can be defined as FSA protocols with variable frame sizes [2] . By DFSA with no muting, it is meant that no tags are informed of the outcome of each reading cycle from the reader. Similar to basic frame slotted Aloha (BFSA), DFSA operates in multiple cycles but with the key difference that in each read cycle, the reader uses a tag estimation function to vary its frame size. A tag estimation function calculates the number of tags based on the information collected through each reading frame, consisting of the number of empty solts ( H ), number of successful slots ( S ), and number of collision slots ( C ). This information is then used by the funsction to obtain a tag estimate, and hence the optimal frame size L for a given cycle. Here, the optimal frame size is one which promises the minimum identification delay and maximum system efficiency including the lowest battery power consumption. Throughout this paper we assume the situation of static tag sets where the tags in the interrogation zone do not depart and no new tags arrive until the ongoing reading process is terminated by the reader.
- A. Problem Formulation
Denote by Ht , St , Ct the number of empty slots, successful slots, and collision slots, respectively, after the tth read cycle. If we put O t =( Ht , St , Ct ) and t =1,2..., then the vector ( O 1 , O 2 , ..., O t ) now represents the observation data collected until the tth read cycle. With the DFSA protocol in operation, the frame size L is updated every read cycle. We denote by Lt , where t = 1,2,..., the frame size used for the tth read cycle. The value of L 1 is set to an appropriate value as the reading process starts (e.g., 16 [3] ).
PPT Slide
Lager Image
A sample trajectory of tag estimates when N = 48.
The optimal design problem for the tag reading process can be formulated as follows.
Given an assurance level α , for t = 1,2,..., devise the tag estimate Nt = f ( O 1 , O 2 ,..., O t ) , optimal frame size L t +1 = g(Nt) , and termination time T α such that the identification delay
PPT Slide
Lager Image
is minimized under the constraint that
PPT Slide
Lager Image
Suppose there are N tags in the interrogation zone (actually the number of tags N is unknown to the reader) and we continue the read cycle with the same frame size L . The question now is when to stop the reading process such that the identification delay is minimized and with confidence level α all tags are read.
- B. Vogt's Estimate[3]
With N tags in the interrogation zone and frame size L , the average number of slots with occupancy r ( r = 0,1,..., N ), denoted by
PPT Slide
Lager Image
is given by
PPT Slide
Lager Image
PPT Slide
Lager Image
A Comparison of Vogt’s and the proposed methods forcomputing optimal frame sizes.
Based on the observations until the tth cycle, { O 1 , O 2 ,..., O t } , Vogt's estimate Evd is computed as,
PPT Slide
Lager Image
where
PPT Slide
Lager Image
denotes the average number of slots with occupancy greater than or equal to 2 . Thus it always holds that
PPT Slide
Lager Image
It is noteworthy that Vogt's estimate utilizes only the last observation O t . Upon obtaining Nt = Evd ( O t ) , the optimal frame size for the ( t +1) st cycle L t+1 is determined appropriately according to a table proposed in [3] .
- C. The Estimate of Young et al.
A problem with Vogt's scheme is that the tag estimate does not converge to the actual value and continuously fluctuates as the reading process proceeds, due to the fact that Vogt's estimate utilizes only the most recent observation O t instead of O 1 , O 2 , ..., O t .
In DFSA, the tag estimate Nt is computed after the tth cycle for t = 1,2,... and the frame size Lt+1 for the ( t +1) st read cycle is adjusted appropriately. As the tag reading process goes on, the frame size Lt may or may not change. We can decompose the sequence of observations into multiple groups. Each group consists of consecutive observations with the same frame size. Each group of consecutive read cycles with same frame size is termed a round . In this vein, a read process can be organized as
PPT Slide
Lager Image
The sample averages after each read cycle in the mth round
PPT Slide
Lager Image
are given by
PPT Slide
Lager Image
The estimate
PPT Slide
Lager Image
for th cycle in mth round of Young et al. is given by
PPT Slide
Lager Image
Fig. 3 shows that the estimate
PPT Slide
Lager Image
yields more stable results compared to Evd .
PPT Slide
Lager Image
The optimal frame sizes vs. number of tags.
III. PROPOSED SCHEME
In this section, we first summarize the simple parameter estimation method proposed in [6] and then present the proposed scheme for determining effective frame sizes.
- A. Simple Parameter Estimation Approach[6]
Denoting by Et the event that all tags are identified until the end of the tth read cycle, under an independence assumption among tags we have
PPT Slide
Lager Image
Upon applying the constraint (1), i.e., P [ Et ] ≥α , the termination time Tα can be computed as
PPT Slide
Lager Image
where the operator ⎡ x ⎤ stands for the smallest integer greater than or equal to x . The exact value of Tα can be computed following the Markov chain approach described in [3] . However, the computation is extremely burdensome especially for large values of N . Though the independence assumption is not generally true, Fig. 4 shows that the values computed in both ways coincide exactly, except only one case. Throughout we use the formula (2) for the estimation of Tα .
The optimal frame size L*N for a given N , minimizing the identification delay τ id , is given by
PPT Slide
Lager Image
By putting L =λN as was done before, τ id can be expressed as a function of λ , i.e.,
PPT Slide
Lager Image
Fig. 5 shows the tendency for the optimal frame size to grow linearly in N with the slope in the interval [1.3,1.6] . Thus, we can roughly compute the optimal frame size according to
  • L*N=λ*× N with λ*∈[1.3,1.6].
- B. Determination of Effective Frame Sizes
Fig. 6 shows the tag identification procedure used in the proposed scheme. In the main procedure, we see that a new reading round starts whenever the value of frame size L needs to be updated. As briefly discussed in Section I, if frame sizes are updated frequently, the identification delay increases while sticking to the constraint L = 2 Q yields inaccurate frame sizes much different from the optimal frame sizes. In this respect, we propose to set the actual frame sizes used in the reading process, namely the effective frame sizes linearly proportional to a fixed step size Δ , i.e.,
PPT Slide
Lager Image
with
PPT Slide
Lager Image
The value of Δ can be set to any positive integer, e.g., 4,8,16,32,.... In order to prevent frequent updates of the effective frame sizes, we impose the following update rule. Denoting by
PPT Slide
Lager Image
, the new effective frame size,
PPT Slide
Lager Image
On the other hand, Vogt's procedure for reading tags [3] often generates overestimated values of N and L , which lead to unnecessarily large values of Tα , thereby resulting in greater identification delays. In order to circumvent this problem, as shown in Fig. 6 , considering the cases of the initial value of L being too small compared to N , the initial estimation for the number of tags is performed twice. In the first estimation, the value of L is set to 16 while in the second estimation, the value of L obtained in the first estimation is used for reliable tag estimates.
PPT Slide
Lager Image
The tag read procedure used in the proposed scheme.
IV. SIMULATION RESULTS AND DISCUSSION
We performed computer simulations to evaluate the proposed scheme. The desired assurance level α was set to 0.99, meaning the requirement that on the average the number of cases failing to identify all tags should not exceed 1% of all identification processes. In the simulations, we used the tagestimate
PPT Slide
Lager Image
and the read procedure described in Fig. 6 . Via the estimation of optimal frame sizes according to (3), effective frame sizes were determined by (5). In (5), the value of Δ was set to 16, which appears to be most appropriate in our simulation. The termination time Tα was computed from the effective frame size by the formula (2).
PPT Slide
Lager Image
Performance of two schemes in terms of identification delay.
PPT Slide
Lager Image
The identification accuracies of the two schemes.
The tag set size N for the simulation ranges from 10 to 100 and for each tag set size we carried out 1,000 runs of the reading procedure. Figs. 7 and 8 show that the proposed scheme works fairly well for the entire range of N with the desired accuracy level (i.e., 0.99) being satisfied all the time. For example, the identification delay for N = 80 in the proposed scheme is shorter than that in Vogt's scheme by about 1,200 slots. We can also observe that the proposed scheme is more useful for large values of N . On the other hand, Fig. 8 shows that the actual accuracy of Vogt's scheme turns out to be unnecessarily far above the desired accuracy level.
V. CONCLUSIONS
In setting suitable frame sizes associated with DFSA used in RFID tag identification processes, the constraint L = 2 Q yields inappropriate values deviating far from the optimal values while a straightforward use of the estimated optimal frame sizes causes frequent restarts of read procedures, both resulting in long identification delays. Taking a trade-off, in this paper, we proposed a new method for determining effective frame sizes where the effective frame sizes change in a multiple of a predetermined step size, namely Δ . Through computer simulations we show that the proposed scheme works fairly well in terms of identification delay.
References
Klair D. K , Chin K. W , Raad R 2007 “ On the accuracy of RFID tag estimation functions,” Proceedings of International Symposium on Communications and Information Technologies Sidney, Australia 1401 - 1406
Klair D. K , Chin K. W , Raad R 2010 “ A survey and tutorial of RFID anti-collision protocols,” IEEE Communications Surveys and Tutorials 12 (3) 400 - 421
Vogt H 2002 “ Efficient object identification with passive RFID tags,” Proceedings of the 1st International Conference on Pervasive Computing Zurich, Switzerland 98 - 113
Vogt H 2002 “ Multiple object identification with passive RFID tags,” Proceedings of IEEE International Conference on Systems, Man and Cybernetics Hammanet, Tunisia
Class 1 generation 2 UHF air interface protocol standard version 1.0.9 (Gen 2) [Internet] EPCglobal Available:http://www.epcglobalus.org/Standards/EPCglobalStandards/Class1Generation2UHFAirInterfaceProtocol/tabid/322/Default.aspx
Park Y. J , Kim Y. B 2012 “ On facilitating RFID tag read processes via a simple parameter estimation,” Journal of the Korean Institute of Communication Sciences 37 (1) 38 - 44