2009 IEEE International Conference on RFID 2009
DOI: 10.1109/rfid.2009.4911187
|View full text |Cite
|
Sign up to set email alerts
|

Reliable identification of RFID tags using multiple independent reader sessions

Abstract: Radio Frequency Identification (RFID) systems are gaining momentum in various applications of logistics, inventory, etc. A generic problem in such systems is to ensure that the RFID readers can reliably read a set of RFID tags, such that the probability of missing tags stays below an acceptable value. A tag may be missing (left unread) due to errors in the communication link towards the reader e.g. due to obstacles in the radio path. The present paper proposes techniques that use multiple reader sessions, duri… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
34
0

Year Published

2010
2010
2016
2016

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(34 citation statements)
references
References 14 publications
0
34
0
Order By: Relevance
“…Actually there is another type of "missing" tag problem [21], in which the "missing" tags represent the tags that are left unread due to errors in the communication link towards the reader, e.g., caused by the obstacles in the radio path. In other words, the study in [21] investigated the problem of tag identification (i.e., reading the tag IDs) in a scenario with non-perfect communication channels.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Actually there is another type of "missing" tag problem [21], in which the "missing" tags represent the tags that are left unread due to errors in the communication link towards the reader, e.g., caused by the obstacles in the radio path. In other words, the study in [21] investigated the problem of tag identification (i.e., reading the tag IDs) in a scenario with non-perfect communication channels.…”
Section: Related Workmentioning
confidence: 99%
“…In other words, the study in [21] investigated the problem of tag identification (i.e., reading the tag IDs) in a scenario with non-perfect communication channels. The authors studied how to minimize the probability of missing (miss-reading) a tag, which is different from the missing tag identification problem addressed in this study.…”
Section: Related Workmentioning
confidence: 99%
“…An intactness verification protocol can ei- 23 ther (1) re-identify present tags through collecting their IDs 24 and compare the collected IDs against the registered ones, 25 or (2) directly access the registered IDs on the server and 26 design efficient polling schemes [9]. Existing work adopts 27 the latter toward scalability in large systems, falling into 28 two categories-probabilistic detection that detects the event 29 of absence with certain probability [9,11], and deterministic 30 identification that accurately pinpoints the IDs of absent tags 31 if any [10,[12][13][14][15][16]. 32 This paper aims to verify the intactness of anonymous 33 RFID systems without tag IDs as a priori (Section 2).…”
Section: Introductionmentioning
confidence: 99%
“…Second, it assumes that the tag population remains static for the lifetime of tags as each tag is hard coded with some other tags' IDs. The second scheme is to run an identification protocol on the same population several times until probability of missing a tag falls below a threshold [7,10]. They estimate the probability of missing a tag based upon the number of tags that were identified in some runs of the protocol but not in others.…”
mentioning
confidence: 99%
“…While we can use the C1G2 compliant scheme proposed in [7,10] to make TH reliable, i.e., repeatedly run TH until the required reliability is achieved. We observe that in this scheme, the leaf nodes in the binary tree are queried multiple times.…”
mentioning
confidence: 99%