Skip to main content

The Summarize of Medium Access Control Protocol in RFID

  • Conference paper
  • First Online:
Advanced Technologies in Ad Hoc and Sensor Networks

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 295))

Abstract

RFID (Radio Frequency Identification) is a technology which do not need to be established the direct contact but with the optical contact between the system and the objective, identify a specific target with a radio signal. One of the main advantages of RFID is multitarget identification; at the same time, but there is a problem which is called the tag collision. The ALOHA-based probabilistic algorithm had a tag hunger problem, Tag cannot be identified in a limited time, although the Binary search tree algorithm has solved this problem, but also with shortcomings of longer period of recognition, and the large amount of tag communication. This article organized various types of literature reported collision prevention mechanism used in RFID systems and documents provided the latest and more comprehensive MAC protocol herein compared with others and provided a new summary for RFID MAC protocol. A detailed description of different ways solving the reader and tag collision, so as to provide a more convenient and efficient research references for the readers of this article.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shih D, Sun PL, Yen DC, Huang SM (2006) Taxonomy and survey of RFID anti-collision protocols. Comput Commun 29:2150–2166

    Article  Google Scholar 

  2. Tang Z, He Y (2007) Research of multi-access and anti-collision protocols in RFID systems, 2007 IEEE international workshop on anti-counterfeiting, security, identification. Xiamen, pp 377–380

    Google Scholar 

  3. Mutti C, Floerkemeier C (2008) CDMA-based RFID systems in dense scenarios: Concepts and challenges, 2008 IEEE international conference on RFID. Los Vegas, pp 215–222

    Google Scholar 

  4. Vandenameele P (2001) Space division multiple access for wireless local area networks. Kluwer Academic Publishers, Norwell

    Google Scholar 

  5. Finkenzeller K (2003) RFID handbook: Fundamentals and applications in contactless smart cards and identification. Wiley, England

    Google Scholar 

  6. Ali K, Hassanein H, Taha AM (2007) RFID anti-collision protocols for dense passive tag environments, In: Proceedings of the 32nd IEEE conference on local computer networks. Ireland, pp 819–824

    Google Scholar 

  7. Kim J, Lee W, Kim E, Kim D, Suh K (2007) Optimized transmission power control of interrogators for collision arbitration in UHF RFID systems. IEEE Commun Lett 11:22–24

    Article  Google Scholar 

  8. Alsalih W, Ali K, Hassanein H (2008) Optimal distance-based clustering for tag anti-collision in RFID systems, 33rd IEEE conference on local computer networks. Montreal, pp 266–273

    Google Scholar 

  9. Lee J, Kwon T, Choi Y, Das SK, Kim K (2004) Analysis of RFID anti-collision algorithms using smart antennas. In: Proceedings of the 2nd international conference on embedded networked sensor systems SenSys 04. Baltimore, pp 265–266

    Google Scholar 

  10. Zhou F, Jin D, Huang C, Hao M (2003) Optimize the power consumption of passive electronic tags for anti-collision schemes. In: Proceedings of 5th international conference on ASIC, vol. 2. Beijing, pp 1213–1217

    Google Scholar 

  11. Ryu J, Lee H, Seok Y, Kwon T, Choi Y (2007) A hybrid query tree protocol for tag collision arbitration in RFID systems, ICC 07: IEEE international conference on communications. Glasgow, pp 5981–5986

    Google Scholar 

  12. Myung J, Lee W, Srivastava J, Shih TK (2007) Tag-splitting: Adaptive collision arbitration protocols for RFID tag identification. IEEE Trans Parallel Distrib Syst 18:763–775

    Article  Google Scholar 

  13. Zhang N, Vojcic B (2005) Binary search algorithms with interference cancellation RFID systems, MILCOM 2005: IEEE military communication conference, vol. 2. Atlantic City, pp 950–955

    Google Scholar 

  14. Chen W, Horng S, Fan P (2007) An enhanced anti-collision algorithm in RFID based on counter and stack, ICSNC 07: Proceedings of the second international conference on systems and networks communications. Cap Esteral, French Riviera, pp 21–24

    Google Scholar 

  15. Wong CP (2007) Grouping based bit-slot ALOHA protocol for tag anti-collision in RFID systems. IEEE Commun Lett 11:946–948

    Article  Google Scholar 

  16. Cha J, Kim J (2006) Dynamic framed slotted ALOHA algorithms using fast tag estimation method for RFID system, CCNC2006: 3rd IEEE consumer communications and networking conference, vol. 2. Los Vegas, pp 768–772

    Google Scholar 

  17. Khandelwal G, Yener A, Lee K, Serbetli S (2006) ASAP: A MAC protocol for dense and time constrained RFID systems, ICC 06: IEEE international conference on communications, vol. 9. Istanbul, pp 4028–4033

    Google Scholar 

  18. Engels DW, Sarma SE (2002) The reader collision problem, 2002 IEEE international conference on systems, man and cybernetics, vol. 3, pp. 641–646, Hammamet, pp 641–646

    Google Scholar 

  19. Leong KS, Ng ML, Cole PH (2005) The reader collision problem in RFID systems, MAPE 2005:IEEE international symposium on microwave, antenna, propagation and EMC technologies for wireless communications, vol. 1. Beijing, pp 658–661

    Google Scholar 

  20. Waldrop J, Engels DW, Sarma SE (2003) Colorwave: An anti-collision algorithm for the reader collision problem, ICC 03: IEEE international conference on communications, vol. 2. Anchorage, pp 1206–1210

    Google Scholar 

  21. Waldrop J, Engels DW, Sarma SE (2003) Colorwave: A MAC for RFID reader networks, WCNC 2003: 2003 IEEE wireless communications and networking, vol. 3. New Orleans, pp 1701–1704

    Google Scholar 

  22. Ho J, Engels DW, Sarma SE (2006) HiQ: A hierarchical Q-learning algorithm to solve the reader collision problem, SAINT workshops 2006: International symposium on applications and the internet workshops. Phoenix, pp 88–91

    Google Scholar 

  23. Birari SM, Iyer S (2005) Mitigating the reader collision problem in RFID networks with mobile readers, 13th IEEE international conference on networks. Kuala Lumpur, pp 463–468

    Google Scholar 

  24. Wang D, Wang J, Zhao Y (2006) A novel solution to the reader collision problem in RFID system, WiCOM 2006: International conference on wireless communications, networking and mobile computing. Wuhan, pp 1–4

    Google Scholar 

  25. Lin C, Lin F (2007) A simulated annealing algorithm for RFID reader networks, WCNC2007: IEEE wireless communications and networking conference. Hong Kong, pp 1669–1672

    Google Scholar 

  26. Carbunar B, Ramanathan MK, Koyuturk M, Hoffmann C, Grama A (2005) Redundant reader elimination in RFID systems, IEEE SECON 2005: 2005 Second annual IEEE communications society conference on sensor and Ad Hoc communications and networks. Santa Clara, pp 176–184

    Google Scholar 

Download references

Acknowledgments

The subject is sponsored by the National Natural Science Foundation of P. R. China (No.611700656137301761171053613731361103195) the Natural Science Foundation of Jiangsu Province (BK2012833) Scientific and Technological Support Project of Jiangsu ProvinceNo. BE2012183BE2012755 Natural Science Key Fund for Colleges and Universities in Jiangsu Province (11KJA52000112KJA520002) Project sponsored by Jiangsu provincial research scheme of natural science for higher education institutions (11KJB520016) Scientific Research and Industry Promotion Project for Higher Education Institutions (JHB2012-7) Science and Technology Innovation Fund for higher education institutions of Jiangsu Province (CXZZ12-0479) Doctoral Fund of Ministry of Education of China (20113223110002).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhijie Han .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Han, Z., Xu, Y., Wang, R. (2014). The Summarize of Medium Access Control Protocol in RFID. In: Wang, X., Cui, L., Guo, Z. (eds) Advanced Technologies in Ad Hoc and Sensor Networks. Lecture Notes in Electrical Engineering, vol 295. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-54174-2_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-54174-2_30

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-54173-5

  • Online ISBN: 978-3-642-54174-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics