scholarly journals A RFID-Integrated Framework for Tag Anti-Collision in UAV-Aided VANETs

2021 ◽  
Vol 13 (22) ◽  
pp. 4500
Author(s):  
Yixin He ◽  
Dawei Wang ◽  
Fanghui Huang ◽  
Yufei Zhang ◽  
Ruonan Zhang ◽  
...  

In this paper, we investigate tags in anti-collision applications of radio frequency identification (RFID) technology in unmanned aerial vehicle (UAV)-aided vehicular ad hoc networks (VANETs). The integration of RFID technology in UAV-aided VANETs can provide reliable traffic-related services for vehicles. However, multiple tags’ simultaneous responses to a reader mounted on a UAV, denoted as tag collision, gravely affect the correct tag detection on each vehicle. Therefore, in order to decrease the collision probability and improve the throughput, we propose a multi-frequency tag identification method. In the proposed scheme, we devise a tag grouping method based on adaptive power control to make the reader dynamically match the optimal frame length. Based on the above matching results, we introduce a tag estimation method using the optimal weight to improve the accuracy of tag estimation. We theoretically analyze the closed-form expression of the security outage probability expression. Finally, our simulation results demonstrate that the proposed tag anti-collision scheme achieved significant performance superiority in terms of the throughput and identification time slots.

Sensors ◽  
2019 ◽  
Vol 19 (23) ◽  
pp. 5231 ◽  
Author(s):  
Felipe Lobo ◽  
Danilo Grael ◽  
Horacio Oliveira ◽  
Leandro Villas ◽  
Abdulaziz Almehmadi ◽  
...  

In vehicular ad hoc networks (VANets), a precise localization system is a crucial factor for several critical safety applications. The global positioning system (GPS) is commonly used to determine the vehicles’ position estimation. However, it has unwanted errors yet that can be worse in some areas, such as urban street canyons and indoor parking lots, making it inaccurate for most critical safety applications. In this work, we present a new position estimation method called cooperative vehicle localization improvement using distance information (CoVaLID), which improves GPS positions of nearby vehicles and minimize their errors through an extended Kalman filter to execute Data Fusion using GPS and distance information. Our solution also uses distance information to assess the position accuracy related to three different aspects: the number of vehicles, vehicle trajectory, and distance information error. For that purpose, we use a weighted average method to put more confidence in distance information given by neighbors closer to the target. We implement and evaluate the performance of CoVaLID using real-world data, as well as discuss the impact of different distance sensors in our proposed solution. Our results clearly show that CoVaLID is capable of reducing the GPS error by 63%, and 53% when compared to the state-of-the-art VANet location improve (VLOCI) algorithm.


Author(s):  
Nur’Aifaa Zainudin ◽  
Hairulnizam Mahdin ◽  
Deden Witarsyah ◽  
Mokhairi Makhtar ◽  
Mohd Izuan Hafez Ninggal ◽  
...  

RFID technology is a Radio frequency identification system that provides a reader reading the data item from its tag. Nowadays, RFID system has rapidly become more common in our life because of its autonomous advantages compared to the traditional barcode. It can detect hundreds of tagged items automatically at a time. However, in RFID, missing tag detection can occur due to signal collisions and interferences. It will cause the system to report incorrect tag’s count due to an incorrect number of tags being detected. The consequences of this problem can be enormous to business, as it will cause incorrect business decisions to be made. Thus, a Missing Tag Detection Algorithm (MTDA) is proposed to solve the missing tag detection problem. There are many other existing approaches has been proposed including Window Sub-range Transition Detection (WSTD), Efficient Missing-Tag Detection Protocol (EMD) and Multi-hashing based Missing Tag Identification (MMTI) protocol. The result from experiments shows that our proposed approach performs better than the other in terms of execution time and reliability.


2021 ◽  
Vol 13 (9) ◽  
pp. 235
Author(s):  
Abdallah Y. Alma’aitah ◽  
Mohammad A. Massad

Radio frequency identification (RFID) technology facilitates a myriad of applications. In such applications, an efficient reader–tag interrogation process is crucial. Nevertheless, throughout reader–tag communication, significant amounts of time and power are consumed on inescapable simultaneous tag replies (i.e., collisions) due to the lack of carrier sensing at the tags. This paper proposes the modulation cutoff intervals (MCI) process as a novel reader–tag interaction given the lack of carrier sensing constraints in passive RFID tags. MCI is facilitated through a simple digital baseband modulation termination (DBMT) circuit at the tag. DBMT detects the continuous-wave cutoff by the reader. In addition, DBMT provides different flags based on the duration of the continuous-wave cutoff. Given this capability at the tag, the reader cuts off its continuous-wave transmission for predefined intervals to indicate different commands to the interrogated tag(s). The MCI process is applied to tag interrogation (or anti-collision) and tag-counting protocols. The MCI process effect was evaluated by the two protocols under high and low tag populations. The performance of such protocols was significantly enhanced with precise synchronization within time slots with more than 50% and more than 55.6% enhancement on time and power performance of anti-collision and counting protocols, respectively. Through the MCI process, fast and power-efficient tag identification is achieved in inventory systems with low and high tag mobility; alternatively, in addition to the rapid and power efficient interaction with tags, anonymous tag counting is conducted by the proposed process.


Author(s):  
Mahmood A. Al-shareeda ◽  
Mohammed Anbar ◽  
Murtadha A. Alazzawi ◽  
Selvakumar Manickam ◽  
Iznan H. Hasbullah

Recently, vehicular ad hoc networks (VANETs) have been garnering significant inter-est from the people involved in transportation field. Nowadays automotive manufactur-ers have already supplying vehicles with multitude of road sensors that provides many useful characteristics. VANET communication not only offers the drivers and passen-gers with the various safety related services but also provides a wide range of valuable applications. However, the inherent openness of the wireless communication medium used by VANETs exposes vehicles to various security and privacy issues. Researchers have proposed many security schemes to solve the issues mentioned above for the widespread deployment of VANETs. However, these schemes failed to fulfill all as-pects of security and privacy requirements. Besides, these schemes have not provided the performance parameters such as computation and communication costs. The pri-mary emphasis of this paper is on the taxonomy of security schemes based conditional privacy-preserving with respect to strengths and limitations. Besides, a comparison be-tween these schemes related to the model of security and privacy requirements, attacks, and performance parameters is provided. Finally, this paper critically reviews the re-lated works by taking into consideration the design and development of all VANETs security and privacy schemes, this paper could serve as a guide and reference.


Electronics ◽  
2020 ◽  
Vol 9 (7) ◽  
pp. 1112
Author(s):  
Shahab Haider ◽  
Ziaul Haq Abbas ◽  
Ghulam Abbas ◽  
Muhammad Waqas ◽  
Shanshan Tu ◽  
...  

The death toll due to highway crashes is increasing at an alarming rate across the globe. Vehicular Ad Hoc Networks (VANETs) have emerged as a promising solution to prevent crashes by enabling collision avoidance applications. However, a robust and stable collision avoidance application is a cross-layer problem that must address a number of key challenges across all layers of a VANET communication architecture. This paper presents and evaluates a novel VANET protocol suite, named Direction-Aware Vehicular Collision Avoidance (DVCA), which covers application, security services, network, and link layers. DVCA is a vehicle-to-vehicle communication architecture that provides enhanced collision probability computation and adaptive preventive measures for cooperative collision avoidance on bi-directional highways. Moreover, DVCA enables secure, in-time, and reliable dissemination of warning messages, which provides adequate time for vehicles to prevent collisions. Simulation and analytical results demonstrate reasonable reduction in collisions by DVCA, as compared with eminent VANET communication architectures.


Sensors ◽  
2021 ◽  
Vol 21 (18) ◽  
pp. 6092
Author(s):  
Zhonghui Pei ◽  
Xiaojun Wang ◽  
Zhen Lei ◽  
Hongjiang Zheng ◽  
Luyao Du ◽  
...  

Beacon messages and emergency messages in vehicular ad hoc networks (VANETs) require a lower delay and higher reliability. The optimal MAC protocol can effectively reduce data collision in VANETs communication, thus minimizing delay and improving reliability. In this paper, we propose a Q-learning MAC protocol based on detecting the number of two-hop neighbors. The number of two-hop neighbors in highway scenarios is calculated with very little overhead using the beacon messages and neighbor locations to reduce the impact of hidden nodes. Vehicle nodes are regarded as agents, using Q-learning and beacon messages to train the near-optimal contention window value of the MAC layer under different vehicle densities to reduce the collision probability of beacon messages. Furthermore, based on the contention window value after training, a multi-hop broadcast protocol combined with contention window adjustment for emergency messages in highway scenarios is proposed to reduce forwarding delay and improve forwarding reliability. We use the trained contention window value and the state information of neighboring vehicles to assign an appropriate forwarding waiting time to the forwarding node. Simulation experiments are conducted to evaluate the proposed MAC protocol and multi-hop broadcast protocol and compare them with other related protocols. The results show that our proposed protocols outperform the other related protocols on several different evaluation metrics.


Sign in / Sign up

Export Citation Format

Share Document