A novel algorithm LWFO for redundant reader elimination in RFID networks

Document Type : Special issue editorial

Authors

1 Department of Computer Engineering, Qom branch, Islamic Azad University, Qom, Iran.

2 Iran Telecom. Research center

Abstract

Abstract- Today, the Radio frequency identification system is widely used in various applications on a large scale. The readers must be densely deployed in order to cover their entire work area. If the number of readers is not optimal, some readers will be redundant, which will reduce the efficiency of the whole system. In more detail, redundant readers increase system overhead, unnecessary tag-reader communication, tag collision, and reader collision, and also, decrease the lifetime of RFID networks. The redundant reader elimination problem is a process that finds the least number of readers to cover all system tags. It is proved that the redundant reader elimination problem is NP_hard. One of the useful tasks in eliminating redundant readers is improving the performance of existing approximation algorithms. In this paper, we propose a distributed algorithm, the LWFO algorithm, which combines the count base algorithm (CBA) and a weighting algorithm. The simulation results show that the proposed algorithm reduces reader redundancy compared to existing algorithms also processing time is reasonable.

Keywords

[1] A. Abuelkhail, U. Baroudi, M. Raad, and T. Sheltami, Internet of Things for healthcare monitoring applications based on RFID clustering scheme, Wireless Networks 27 (2020), 747–763.
[2] G. Alfian, J. Rhee, H. Ahm, J. Lee, and U. Farooq, Integration of RFID, wireless sensor network, and data mining in an e-pedigree food traceability system, J. Food Eng. 212 (2017), 65–75.
[3] K. Ali, H. Hassanein, and W. Alsalih, Using neighbor and tag estimations for redundant reader eliminations in RFID networks, Proc. IEEE Wireless Commun. Netw. (WCNC), 2011, pp. 832–837.
[4] W.A.A. Alsalihy and N.A. Askar, Enhancement of redundant reader elimination by using hybrid algorithm in RFID systems, Wireless Pers. Common. 72 (2013), no. 2, 1139–1156.
[5] S. Amendola, R. Lodato, S. Manzari, C. Occhiuzzi, and G. Marrocco, RFID technology for IoT-based personal healthcare in smart spaces, IEEE Internet Things J. 1 (2014), no. 2, 144–152.
[6] B. Carbunar, M.K. Ramanathan, M. Koyuturk, C. Hoffmann, and A. Grama, Redundant reader elimination in RFID systems, Proc. 2nd Annu. IEEE Commun. Soc. Conf. Sensor Ad Hoc Commun. Netw, 2005, pp. 176–184.
[7] B. Carbunar, M.K. Ramanathan, M. Koyuturk, S. Jagannathan, and A. Grama, Efficient tag detection in RFID systems, J. Parallel Distrib. Comput. 69 (2009), no. 2, 180–196.
[8] A. Haibi, H. Bouazza, M. Bouya, K. El Yassini, K. Oufaska, M. Boulmalf, A. Lazaro, and A. Hadjoudja, A new compact metal mountable dual-band UHF RFID tag antenna with an adapted middleware for transport and SCM fields, Int. J. Commun. Antenna Propag. 11 (2021), no. 2, 106–117.
[9] A. Haibi, K. Oufaska, K. El Yassini, M. Boulmalf, and M. Bouya, Systematic mapping study on RFID technology, IEEE Access 10 (2022), 6363–6380.
[10] C.-H. Hsu, Y.-M. Chen, and C.-T. Yang, A layered optimization approach for redundant reader elimination in wireless RFID networks, 2nd IEEE Asia-Pacific Service Comput. Conf. (APSCC 2007), IEEE, 2007, pp. 138–145.
[11] C. Jin, C. Xu, X. Zhang, and J. Zhao, A secure RFID mutual authentication protocol for healthcare environments using elliptic curve cryptography, J. Med. Syst. 39 (2015), no. 3, 1–8.
[12] M.S. Khan, M.S. Islam, and H. Deng, Design of a reconfigurable RFID sensing tag as a generic sensing platform toward the future Internet of Things, IEEE Internet Things J. 1 (2014), no. 4, 300–310.
[13] H. Landaluce, L. Arjona, A. Peraiios, F. Falcone, I. Angulo, and F. Muralter, A review of IOT sensing applications and challenges using RFID and wireless sensor networks, Sensors 20 (2020), no. 9.
[14] M. Ma and P. Wang, Redundant reader elimination in large-scale distributed REID networks, IEEE Internet Things J. 5 (2018), no. 2, 884–894.
[15] M. Ma, P. Wang and C.-H. Chu, A novel distributed algorithm for redundant reader elimination in RFID networks, IEEE Int. Conf. RFID Technol. Appl. (RFID TA), 2013, pp. 1–6.
[16] A. Motroni, A. Buffi and P. Nepa, A survey on indoor vehicle localization through RFID technology, IEEE 9 (2021), 17921–17942.
[17] A.W. Nagpukar and S.K. Jaiawal, An overview of WSN and RFID network integration, 2nd Int. Conf. Electronics Commun. Syst. (ICECS), IEEE, 2015, pp. 497–502.
[18] S. Pan and Z. Yang, A count based algorithm for redundant reader elimination in RFID application system, Proc. 3rd Int. Conf. Intell. Syst. Design Eng. Appl. (IS DEA), 2013, pp. 30–33.
[19] S. Piramuthu and W. Zhau, RFID and sensor network automation in the food industry: Ensuring quality and safety through supply chain visibility, John Wiley & Sons, 2016.
[20] N. Rashid, S. Choudury and K. Salomaa, Localized algorithms for redundant readers elimination in RFID networks, Int. J. Parallel, Emergent Distrib. Syst. 34 (2018), no. 3, 1–12.
[21] R. Sundar, S. Hebbar, and V. Golla, Implementing intelligent traffic control system for congestion control, ambulance clearance, and stolen vehicle detection, IEEE Sensors J. 15 (2015), no. 2, 1109–1113.
[22] S. Sundaresan, R. Doss, S. Piramuthu, and W. Zhou, Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner privacy, Comput. Commun. 55 (2015), 112–124.
[23] X. Wang, Tennis robot design via Internet of Things and deep learning, IEEE Access 9 (2021), 127460–127470.
[24] X. Wang, Y. Ji, and B. Zhao, An approximate duplicate-elimination in RFID data streams based on d-left time bloom filter, Web Technol. Appl. 8709 (2014), 413–424.
[25] H. Xu, W. Shen, and P. Li, A novel algorithm L-NCD for redundant reader elimination in P2P-RFID network, J. Algorithm Comput. Technol. 11 (2017), no. 2, 1–13.
[26] P. Yang, PRLS-INVES: A general experimental investigation strategy for high accuracy and precision in passive RFID location systems, IEEE Internet Things J. 2 (2015), no. 2, 159–167.
[27] R. Yarinezhad and S.N. Hashemi, A routing algorithm for wireless sensor networks based on clustering and an fpt-approximation algorithm, J. Syst. Software 155 (2019), 145–161.
[28] K.-M. Yu, C.-W. Yu, and Z.-Y. Lin, A density-based algorithm for redundant reader elimination in an RFID network, Proc. 2nd Int. Conf. Future Gener. Commun. Netw. (FGCN), 2008, pp. 89–92.
[29] Z. Zhang and Q. Qi, An efficient RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography, J. Med. Syst. 38 (2014)., no. 5, 1–7.
[30] Z. Zhao, A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem, J. Med. Syst. 38 (2014), no. 5, 1–7.
Volume 15, Issue 8
August 2024
Pages 171-180
  • Receive Date: 09 November 2022
  • Revise Date: 27 January 2023
  • Accept Date: 12 February 2023