{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T16:49:56Z","timestamp":1648658996049},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2011,10,26]],"date-time":"2011-10-26T00:00:00Z","timestamp":1319587200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2011,12]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>In large-scale RFID systems, all of the communications between readers and tags are via a shared wireless channel. When a reader intends to collect all IDs from numerous existing tags, a tag identification process is invoked by the reader to collect the tags' IDs. This phenomenon results in tag-to-reader signal collisions which may suppress the system performance greatly. To solve this problem, we design an efficient tag identification protocol in which a significant gain is obtained in terms of both identification delay and communication overhead. A <jats:italic>k<\/jats:italic>-ary tree-based abstract is adopted in our proposed tag identification protocol as underlying architecture for collision resolution. Instead of just recognizing whether tag collision happens at each interrogation time period, the reader can further obtain the reason of why the collision occurs in the current tag inquiry operation. With this valuable information, we can reduce tag signal collisions significantly and at the same time avoid all of the tag idle scenarios during a tag identification session. The rigorous performance analysis and evaluation show that our proposed tag identification protocol outperforms existing tree-based schemes.<\/jats:p>","DOI":"10.1186\/1687-1499-2011-139","type":"journal-article","created":{"date-parts":[[2011,12,23]],"date-time":"2011-12-23T19:15:36Z","timestamp":1324667736000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Adaptive collision resolution for efficient RFID tag identification"],"prefix":"10.1186","volume":"2011","author":[{"given":"Yung-Chun","family":"Chen","sequence":"first","affiliation":[]},{"given":"Kuo-Hui","family":"Yeh","sequence":"additional","affiliation":[]},{"given":"NaiWei","family":"Lo","sequence":"additional","affiliation":[]},{"given":"Yingjiu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Enrico","family":"Winata","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,10,26]]},"reference":[{"issue":"1","key":"138_CR1","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/90.759318","volume":"7","author":"I Chamtac","year":"1999","unstructured":"Chamtac I, Petrioli C, Redi J: Energy-conserving access protocols for identification networks. IEEE\/ACM Trans Netw 1999, 7(1):51-59. 10.1109\/90.759318","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"1","key":"138_CR2","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/TMC.2009.96","volume":"9","author":"V Namboodiri","year":"2010","unstructured":"Namboodiri V, Gao L: Energy-aware tag anti-collision protocols for RFID systems. IEEE Trans Mobile Comput 2010, 9(1):44-59.","journal-title":"IEEE Trans Mobile Comput"},{"key":"138_CR3","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1109\/ICACT.2007.358450","volume-title":"Proceedings of 9th International Conference on Advanced Communication Technology","author":"T Cheng","year":"2007","unstructured":"Cheng T, Jin L: Analysis and simulation of RFID anti-collision algorithms. Proceedings of 9th International Conference on Advanced Communication Technology 2007, 697-701."},{"key":"138_CR4","unstructured":"EPC\u2122 Radio-Frequency Identification Protocols Class 1 Generation-2 UHF RFID Protocol for Communication at 860-960 MHz Version 1.0.9. EPCGlobal Inc; 2005."},{"key":"138_CR5","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/SAINT-W.2006.10","volume-title":"Proceedings of International Symposium on Applications and the Internet Workshops","author":"C Floerkemeier","year":"2006","unstructured":"Floerkemeier C, Wille M: Comparison of transmission schemes for framed ALOHA based RFID protocols. Proceedings of International Symposium on Applications and the Internet Workshops 2006, 92-97."},{"key":"138_CR6","unstructured":"Information Technology-Radio Frequency Identification for Item Management-Part 6: Parameters for Air Interface Communications at 860 MHz to 960 MHz, Amendment 1: Extension with Type C and Update of Types A and B, ISO\/IEC 18000-6:2004\/Amd. 1:(E). 2006."},{"key":"138_CR7","first-page":"583","volume-title":"Proceedings of 17th International Conference on Computer Communications and Networks","author":"DK Klair","year":"2007","unstructured":"Klair DK, Chin KW, Raad R: On the suitability of framed slotted aloha based RFID anti-collision protocols for use in RFID-enhanced WSNs. Proceedings of 17th International Conference on Computer Communications and Networks 2007, 583-590."},{"key":"138_CR8","first-page":"1","volume-title":"Proceedings of 17th International Conference on Computer Communications and Networks","author":"DK Klair","year":"2008","unstructured":"Klair DK, Chin KW: A novel anti-collision protocol for energy efficient identification and monitoring in RFID-enhanced WSNs. Proceedings of 17th International Conference on Computer Communications and Networks 2008, 1-8."},{"issue":"1","key":"138_CR9","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/TASE.2008.2007266","volume":"6","author":"Y Maguire","year":"2009","unstructured":"Maguire Y, Pappu R: An optimal Q-algorithm for the ISO 18000-6C RFID protocol. IEEE Trans Autom Sci Eng 2009, 6(1):16-24.","journal-title":"IEEE Trans Autom Sci Eng"},{"issue":"12","key":"138_CR10","doi-asserted-by":"publisher","first-page":"946","DOI":"10.1109\/LCOMM.2007.071252","volume":"11","author":"CP Wong","year":"2007","unstructured":"Wong CP, Feng Q: Grouping based bit-slot ALOHA protocol for tag anti-collision in RFID systems. IEEE Commun Lett 2007, 11(12):946-948.","journal-title":"IEEE Commun Lett"},{"issue":"12","key":"138_CR11","doi-asserted-by":"publisher","first-page":"3583","DOI":"10.1109\/TCOMM.2011.102910.090390","volume":"58","author":"L Zhu","year":"2010","unstructured":"Zhu L, Yum TSP: Optimal framed aloha based anti-collision algorithms for RFID systems. IEEE Trans Commun 2010, 58(12):3583-3592.","journal-title":"IEEE Trans Commun"},{"issue":"3","key":"138_CR12","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1109\/LCOMM.2011.011311.101332","volume":"15","author":"B Li","year":"2011","unstructured":"Li B, Wang J: Efficient anti-collision algorithm utilizing the capture effect for ISO 18000-6C RFID protocol. IEEE Commun Lett 2011, 15(3):352-354.","journal-title":"IEEE Commun Lett"},{"key":"138_CR13","unstructured":"860 MHz - 930 MHz Class 1 Radio Frequency Identification Tag Radio Frequency and Logical Communication Interface Specification Candidate Recommdation Version 1.0.1. Au-to-ID Center; 2002."},{"key":"138_CR14","first-page":"1653","volume-title":"Proceedings of IEEE International Conference on Communications","author":"KW Chiang","year":"2006","unstructured":"Chiang KW, Hua C, Yum TS Peter: Prefix-randomized query-tree protocol for RFID systems. Proceedings of IEEE International Conference on Communications 2006, 1653-1657."},{"key":"138_CR15","first-page":"225","volume-title":"Proceedings of 10th International Conference on Advanced Communication Technology","author":"JS Cho","year":"2008","unstructured":"Cho JS, Shin JD, Kim SK: RFID tag anti-collision protocol: query tree with reversed IDs. Proceedings of 10th International Conference on Advanced Communication Technology 2008, 225-230."},{"key":"138_CR16","first-page":"4589","volume-title":"Proceedings of IEEE 60th Vehicular Technology Conference","author":"HS Choi","year":"2004","unstructured":"Choi HS, Cha JR, Kim JH: Fast wireless anti-collision algorithm in ubiquitous ID system. Proceedings of IEEE 60th Vehicular Technology Conference 2004, 4589-4592."},{"issue":"1","key":"138_CR17","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1109\/LCOMM.2007.061471","volume":"11","author":"JH Choi","year":"2007","unstructured":"Choi JH, Lee D, Lee H: Query tree-based reservation for efficient RFID tag anti-collision. IEEE Commun. Lett 2007, 11(1):85-87.","journal-title":"IEEE Commun. Lett"},{"key":"138_CR18","unstructured":"Draft Protocol Specification for a 900 MHz Class 0 Radio Frequency Identification Tag. Auto-ID Center; 2003."},{"issue":"6","key":"138_CR19","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/LCOMM.2008.080056","volume":"12","author":"YC Lai","year":"2008","unstructured":"Lai YC, Lin CC: A pair-resolution blocking algorithm on adaptive binary splitting for RFID tag identification. IEEE Commun Lett 2008, 12(6):432-434.","journal-title":"IEEE Commun Lett"},{"issue":"3","key":"138_CR20","doi-asserted-by":"publisher","first-page":"962","DOI":"10.1109\/TNET.2008.2002558","volume":"17","author":"YC Lai","year":"2009","unstructured":"Lai YC, Lin CC: Two blocking algorithms on adaptive binary splitting: single and pair resolutions for RFID tag identification. IEEE\/ACM Trans Netw 2009, 17(3):962-975.","journal-title":"IEEE\/ACM Trans Netw"},{"key":"138_CR21","first-page":"75","volume-title":"Proceedings of the 4th International Workshop on Discrete Algorithm and Methods for Mobile Computing and Communication","author":"C Law","year":"2000","unstructured":"Law C, Lee K, Siu KY: Efficient memoryless protocol for tag identification. Proceedings of the 4th International Workshop on Discrete Algorithm and Methods for Mobile Computing and Communication 2000, 75-84."},{"key":"138_CR22","first-page":"1","volume-title":"Proceedings of 2nd International Conference on Mobile Technology, Applications and Systems","author":"L Liu","year":"2005","unstructured":"Liu L, Xie ZH, Xi JT, Lai SL: An improved anti-collision algorithm in RFID system. Proceedings of 2nd International Conference on Mobile Technology, Applications and Systems 2005, 1-5."},{"issue":"3","key":"138_CR23","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1109\/LCOMM.2006.1603365","volume":"10","author":"J Myung","year":"2006","unstructured":"Myung J, Lee W, Srivastava J: Adaptive binary splitting for efficient RFID tag anti-collision. IEEE Commun Lett 2006, 10(3):144-146. 10.1109\/LCOMM.2006.1603365","journal-title":"IEEE Commun Lett"},{"key":"138_CR24","doi-asserted-by":"publisher","first-page":"1096","DOI":"10.1109\/TMM.2006.879817","volume":"8","author":"J Myung","year":"2006","unstructured":"Myung J, Lee W, Shih TK: An adaptive memoryless protocol for RFID tag collision arbitration. IEEE Trans Multimedia 2006, 8: 1096-1101.","journal-title":"IEEE Trans Multimedia"},{"issue":"6","key":"138_CR25","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1109\/TPDS.2007.1098","volume":"18","author":"J Myung","year":"2007","unstructured":"Myung J, Lee W, Srivastava J, Shih TK: Tag-splitting: adaptive collision arbitration protocols for RFID tag identification. IEEE Trans Parallel Distrib Syst 2007, 18(6):763-775.","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"138_CR26","first-page":"153","volume-title":"Proceedings of 21st International Conference on Advanced Information Networking and Applications Workshops","author":"HS Ning","year":"2007","unstructured":"Ning HS, Cong Y, Xu ZQ, Hong T, Chao JC, Zhang Y: Performance evaluation of RFID anti-collision algorithm with FPGA implementation. Proceedings of 21st International Conference on Advanced Information Networking and Applications Workshops 2007, 153-158."},{"issue":"4","key":"138_CR27","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1109\/LCOMM.2006.1613732","volume":"10","author":"TP Wang","year":"2006","unstructured":"Wang TP: Enhanced binary search with cut-through operation for anti-collision in RFID systems. IEEE Commun Lett 2006, 10(4):236-238. 10.1109\/LCOMM.2006.1613732","journal-title":"IEEE Commun Lett"},{"issue":"2","key":"138_CR28","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1109\/TMC.2010.58","volume":"10","author":"T La Porta","year":"2011","unstructured":"La Porta T, Maselli G, Petrioli C: Anti-collision protocols for single-reader RFID systems: temporal analysis and optimization. IEEE Trans Mobile Comput 2011, 10(2):267-279.","journal-title":"IEEE Trans Mobile Comput"},{"issue":"11","key":"138_CR29","doi-asserted-by":"publisher","first-page":"1014","DOI":"10.1109\/LCOMM.2010.091710.100793","volume":"14","author":"XL Jia","year":"2010","unstructured":"Jia XL, Feng QY, Ma CZ: An efficient anti-collision protocol for RFID tag identification. IEEE Commun Lett 2010, 14(11):1014-1016.","journal-title":"IEEE Commun Lett"},{"issue":"4","key":"138_CR30","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1109\/TCOM.1983.1095854","volume":"31","author":"F Schoute","year":"1983","unstructured":"Schoute F: Dynamic frame length aloha. IEEE Trans Commun 1983, 31(4):565-568. 10.1109\/TCOM.1983.1095854","journal-title":"IEEE Trans Commun"},{"issue":"2","key":"138_CR31","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1109\/26.20080","volume":"37","author":"JE Wieselthier","year":"1989","unstructured":"Wieselthier JE, Ephremides A, Michaels LA: An exact analysis and performance evaluation of framed aloha with capture. IEEE Trans Commun 1989, 37(2):125-137. 10.1109\/26.20080","journal-title":"IEEE Trans Commun"},{"key":"138_CR32","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1109\/TIT.1979.1056093","volume":"25","author":"JI Capettanakis","year":"1979","unstructured":"Capettanakis JI: Tree algorithms for packet broadcast channels. IEEE Trans Inf Theory 1979, 25: 505-515. 10.1109\/TIT.1979.1056093","journal-title":"IEEE Trans Inf Theory"},{"issue":"2","key":"138_CR33","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1109\/TCOM.1985.1096261","volume":"33","author":"J Mosely","year":"1985","unstructured":"Mosely J, Humblet P: A class of efficient contention resolution algorithms for multiaccess channels. IEEE Trans Commun 1985, 33(2):145-151.","journal-title":"IEEE Trans Commun"},{"key":"138_CR34","volume-title":"RFID Handbook: Radio-Frequency Identification, Fundamentals and Applications","author":"K Finkenzeller","year":"1999","unstructured":"Finkenzeller K: RFID Handbook: Radio-Frequency Identification, Fundamentals and Applications. Wiley; 1999."},{"key":"138_CR35","unstructured":"ISO\/IEC 14443. Inentification cards--Contactless integrated circuit cards--Proximity cards;"},{"key":"138_CR36","unstructured":"ISO\/IEC 15693. Inentification cards--Contactless integrated circuit cards--Vicinity cards."},{"key":"138_CR37","unstructured":"ISO\/IEC 18000. ISO\/IEC 18000 Information Technology AIDC Technologies-- RFID for Item Management--Air Interface."},{"key":"138_CR38","first-page":"966","volume-title":"Proceedings of 22nd International Conference on Advanced Information Networking and Applications Workshops","author":"KH Yeh","year":"2008","unstructured":"Yeh KH, Lo NW, Winata E: An efficient tree-based tag identification protocol for RFID systems. Proceedings of 22nd International Conference on Advanced Information Networking and Applications Workshops 2008, 966-970."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2011-139.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-1499-2011-139\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2011-139.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T18:08:05Z","timestamp":1630519685000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-1499-2011-139"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,26]]},"references-count":38,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,12]]}},"alternative-id":["138"],"URL":"https:\/\/doi.org\/10.1186\/1687-1499-2011-139","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,10,26]]},"assertion":[{"value":"28 February 2011","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 October 2011","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 October 2011","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"139"}}