Reader scheduling for tag access in RFID systems

Arunabha Sen, Arun Das, Chenyang Zhou, Anisha Mazumder, Nathalie Mitton, Abdoul Aziz Mbacke

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

'Reader' and 'Tag' type devices are utilized in the Radio-Frequency IDentification technology for identification and tracking of objects. A tag can be 'read' by a reader when the tag is within the reader's sensing range. However, when tags are present in the intersection area of the sensing ranges of two or more readers, simultaneous activation of the readers may cause 'reader collision'. In order to ensure collision-free reading, a scheduling scheme is needed to read tags in the shortest possible time. We study this scheduling problem in a stationary setting and the reader minimization problem in a mobile setting. We show that the optimal schedule construction problem is NP-complete and provide an approximation algorithm and techniques that we evaluate through simulation.

Original languageEnglish (US)
Title of host publication2016 7th International Conference on the Network of the Future, NOF 2016
EditorsOtto Carlos Muniz Bandeira Duarte, Stefano Secci, Marcelo Goncalves Rubinstein, Marcelo Dias de Amorim
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781509046713
DOIs
StatePublished - Jan 6 2017
Event2016 7th International Conference on the Network of the Future, NOF 2016 - Buzios, RJ, Brazil
Duration: Nov 16 2016Nov 18 2016

Publication series

Name2016 7th International Conference on the Network of the Future, NOF 2016

Other

Other2016 7th International Conference on the Network of the Future, NOF 2016
CountryBrazil
CityBuzios, RJ
Period11/16/1611/18/16

Keywords

  • RFID Radio Frequency IDentification
  • distributed algorithms
  • reader anticollision problem
  • ressource allocation scheduling

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Reader scheduling for tag access in RFID systems'. Together they form a unique fingerprint.

Cite this