scholarly journals Structured Deployment using Clustering Mechanism for Improving the Performance of the RFID Network

2019 ◽  
Vol 8 (4) ◽  
pp. 7137-7142

RFID is one of the most suitable technologies for today’s world. RFID technology is mainly focused for tracking and locating the objects. The objects may be either moving or immovable. Normally RFID communication is based on the RFID Tag and the Reader permutations. The Readers were deployed in different locations for the better communication between the tag and reader. This paper is focused on the structured deployment of RFID readers to form a network using clustering mechanism. The performance of the network will be analyzed by various network attribute such as throughput, Accuracy, Missing tag ratio, Read Rate and Delay. For an efficient communication, the structured deployment of the RFID Reader’s is most important. The clustering method is used for the proper deployment of RFID readers for efficient communication. Cluster is the grouping of RFID readers based on the geographical locations. Every cluster has a cluster head (CH) and these Cluster heads are responsible for every transaction between the cluster to cluster communications. This cluster head have selected according to their energy level and the centrality of the adjunct. This paper detailed how the RFID readers and tags are communicated using the clustering mechanism and performance of the RFID network is analyzed and discuss the results.

Author(s):  
Akram Al-Hourani ◽  
Sathyanarayanan Chandrasekharan ◽  
Abbas Jamalipour ◽  
Laurent Reynaud ◽  
Sithamparanathan Kandeepan

2021 ◽  
Vol 303 ◽  
pp. 01054
Author(s):  
Hongxiang Xu ◽  
Xingzhen Bai ◽  
Lujie Zhou ◽  
Peng Liu

Aiming at the problems of strong interference and poor positioning accuracy in coal mines, this paper proposes a positioning algorithm for accurate detection of personnel safety. It is of great practical significance to detect the safety movement track of underground personnel. In this paper, WSNs distributed in coal mines are divided into several clusters by clustering method. Each cluster has a certain number of sensors, which can communicate with each other to keep the estimation consistency, and send the collected data to the cluster head (CH) node. System noise includes additive noise and multiplicative noise. In order to improve the accuracy of estimation, an improved UKF algorithm is proposed. The simulation results show that the improved UKF algorithm improves the accuracy and performance of estimation, and allows better location of the underground personnel.


2021 ◽  
Vol 2021 ◽  
pp. 1-7
Author(s):  
Xinyan Wang

Tag collision is one of the critical problems in radiofrequency identification (RFID) technology which can be widely used to identify objects using tag attachment automatically. Through the transmission and reflection of wireless radiofrequency signals, noncontact identification is realized. However, when multiple tags respond to the reader simultaneously, a collision occurs, significantly degrading the identification performance of RFID systems. To tackle the tag collisions, we propose a fast hybrid strategy-based RFID anticollision (FHS-RAC) protocol. Based on the conventional query tree algorithm, the proposed FHS-RAC makes full use of collision bits and the total response bits to achieve the faster tag identification. Extensive simulations and experiments verify the feasibility and effectiveness of our proposed scheme.


2016 ◽  
Vol 12 (06) ◽  
pp. 58
Author(s):  
Razi Iqbal ◽  
Sharif Arif ◽  
H.H.R Sherazi

The paper discusses a proposed model for car parking system based on cluster head routing protocol utilizing a low cost and power efficient communication technology, ZigBee (IEEE 802.15.4). The model is designed in a way that car parking is divided into different clusters and each cluster has a head which acts a messenger for transmitting information to other heads and the coordinator of the network. Each cluster head is a ZigBee Host (Router) which collects the information of car presence in the parking slot. This information is then passed to the coordinator of the network which is used to display the information of available parking slots in a specific car parking area. Since there is only one coordinator in the network, so heads can transmit information to the coordinator using multi-hop communication if direct communication is not possible. Several simulations were performed to gauge the efficiency of the proposed model, and results show that the proposed model is reliable in communication and efficient in its operation.


Author(s):  
Salvador Ricardo Meneses González ◽  
Roberto Linares y Miranda

In this chapter, propagation channel aspects in current passive UHF RFID systems applied for automatic vehicular identification (AVI) are presented, considering the antennas design for passive UHF RFID tag and some problems relative to the electromagnetic compatibility. These issues are focused on RFID link, reader-tag-reader, and the channel modelling that is supported with measurements, and reader-reader interference problems are analysed.


2012 ◽  
pp. 1873-1884
Author(s):  
Álvaro M. Sampaio ◽  
António J. Pontes ◽  
Ricardo Simões

Full traceability of products is extremely difficult, although it has been sought after for as long as production, distribution and sales chains exist. Electronic traceability methods, such as RFID technology, have been proposed as a possible solution to this problem. In the specific case of RFID, the number of applications that promote innovative solutions in retail and other areas has been continuous growing. However, RFID tags are mostly placed externally on a surface of products or their packages. This is appropriate for logistics, but not for other applications, such as those involving user interaction. In those, not only is the placement of the RFID tag more complex, but it is also necessary that the tag is not visible or not directly accessible, to prevent accidental damage and intentional abuse. This certainly imposes challenges to manufacturing, but mainly creates new challenges to the development of new products and re-design of existing ones. This chapter presents some insights and what we consider to be the two main approaches to incorporating RFID technology into consumer products.


Author(s):  
Alvaro M. Sampaio ◽  
António J. Pontes ◽  
Ricardo Simoes

Full traceability of products is extremely difficult, although it has been sought after for as long as production, distribution and sales chains exist. Electronic traceability methods, such as RFID technology, have been proposed as a possible solution to this problem. In the specific case of RFID, the number of applications that promote innovative solutions in retail and other areas has been continuous growing. However, RFID tags are mostly placed externally on a surface of products or their packages. This is appropriate for logistics, but not for other applications, such as those involving user interaction. In those, not only is the placement of the RFID tag more complex, but it is also necessary that the tag is not visible or not directly accessible, to prevent accidental damage and intentional abuse. This certainly imposes challenges to manufacturing, but mainly creates new challenges to the development of new products and re-design of existing ones. This chapter presents some insights and what we consider to be the two main approaches to incorporating RFID technology into consumer products.


Author(s):  
Aakanksha Tewari ◽  
Brij B. Gupta

Internet of Things (IoT) is playing more and more important roles in our daily lives in the last decade. It can be a part of traditional machine or equipment to daily household objects as well as wireless sensor networks and devices. IoT has a huge potential which is still to be unleashed. However, as the foundation of IoT is the Internet and all the data collected by these devices is over the Internet, these devices also face threats to security and privacy. At the physical or sensor layer of IoT devices the most commonly used technology is RFID. Thus, securing the RFID tag by cryptographic mechanisms can secure our data at the device as well as during communication. This article first discusses the flaws of our previous ultra-lightweight protocol due to its vulnerability to passive secret disclosure attack. Then, the authors propose a new protocol to overcome the shortcomings of our previous work. The proposed scheme uses timestamps in addition to bitwise operation to provide security against de-synchronization and disclosure. This research also presents a security and performance analysis of our approach and its comparison with other existing schemes.


Sign in / Sign up

Export Citation Format

Share Document