{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T08:18:30Z","timestamp":1760170710674,"version":"build-2065373602"},"reference-count":47,"publisher":"MDPI AG","issue":"22","license":[{"start":{"date-parts":[[2021,11,9]],"date-time":"2021-11-09T00:00:00Z","timestamp":1636416000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Science, Technology, and Innovation Commission of Shenzhen Municipality","award":["JCYJ20190806160218174"],"award-info":[{"award-number":["JCYJ20190806160218174"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61901379 and 61941119"],"award-info":[{"award-number":["61901379 and 61941119"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"open research fund of National Mobile Communications Research Laboratory, Southeast University","award":["2020D04"],"award-info":[{"award-number":["2020D04"]}]},{"name":"Innovation Foundation for Doctor Dissertation of Northwestern Polytechnical University","award":["CX202037"],"award-info":[{"award-number":["CX202037"]}]},{"name":"Program of China Scholarships Council","award":["202006290166"],"award-info":[{"award-number":["202006290166"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Remote Sensing"],"abstract":"<jats:p>In this paper, we investigate tags in anti-collision applications of radio frequency identification (RFID) technology in unmanned aerial vehicle (UAV)-aided vehicular ad hoc networks (VANETs). The integration of RFID technology in UAV-aided VANETs can provide reliable traffic-related services for vehicles. However, multiple tags\u2019 simultaneous responses to a reader mounted on a UAV, denoted as tag collision, gravely affect the correct tag detection on each vehicle. Therefore, in order to decrease the collision probability and improve the throughput, we propose a multi-frequency tag identification method. In the proposed scheme, we devise a tag grouping method based on adaptive power control to make the reader dynamically match the optimal frame length. Based on the above matching results, we introduce a tag estimation method using the optimal weight to improve the accuracy of tag estimation. We theoretically analyze the closed-form expression of the security outage probability expression. Finally, our simulation results demonstrate that the proposed tag anti-collision scheme achieved significant performance superiority in terms of the throughput and identification time slots.<\/jats:p>","DOI":"10.3390\/rs13224500","type":"journal-article","created":{"date-parts":[[2021,11,9]],"date-time":"2021-11-09T21:39:07Z","timestamp":1636493947000},"page":"4500","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A RFID-Integrated Framework for Tag Anti-Collision in UAV-Aided VANETs"],"prefix":"10.3390","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8758-3776","authenticated-orcid":false,"given":"Yixin","family":"He","sequence":"first","affiliation":[{"name":"Research & Development Institute of Northwestern Polytechnical University in Shenzhen, Shenzhen 518057, China"},{"name":"School of Electronics and Information, Northwestern Polytechnical University, Xi\u2019an 710072, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9981-3623","authenticated-orcid":false,"given":"Dawei","family":"Wang","sequence":"additional","affiliation":[{"name":"Research & Development Institute of Northwestern Polytechnical University in Shenzhen, Shenzhen 518057, China"},{"name":"School of Electronics and Information, Northwestern Polytechnical University, Xi\u2019an 710072, China"},{"name":"National Mobile Communications Research Laboratory, Southeast University, Nanjing 210096, China"},{"name":"School of Communication and Information Engineering, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an 710121, China"}]},{"given":"Fanghui","family":"Huang","sequence":"additional","affiliation":[{"name":"Research & Development Institute of Northwestern Polytechnical University in Shenzhen, Shenzhen 518057, China"},{"name":"School of Electronics and Information, Northwestern Polytechnical University, Xi\u2019an 710072, China"}]},{"given":"Yufei","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Electronics and Information, Northwestern Polytechnical University, Xi\u2019an 710072, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0030-6758","authenticated-orcid":false,"given":"Ruonan","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Electronics and Information, Northwestern Polytechnical University, Xi\u2019an 710072, China"}]},{"given":"Xiaohong","family":"Yan","sequence":"additional","affiliation":[{"name":"School of Electronic Engineering, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an 710121, China"}]}],"member":"1968","published-online":{"date-parts":[[2021,11,9]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Feroz, S., and Abu Dabous, S. (2021). UAV-Based Remote Sensing Applications for Bridge Condition Assessment. Remote Sens., 13.","DOI":"10.3390\/rs13091809"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"5785","DOI":"10.1109\/JSEN.2016.2568260","article-title":"Priority-Based Data Gathering Framework in UAV-Assisted Wireless Sensor Networks","volume":"16","author":"Say","year":"2016","journal-title":"IEEE Sens. J."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Huang, F., Zhang, Y., Wang, Z., and Deng, X. (2021). A Novel Conflict Management Method Based on Uncertainty of Evidence and Reinforcement Learning for Multi-Sensor Information Fusion. Entropy, 23.","DOI":"10.3390\/e23091222"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Wang, D., He, Y., Yu, K., Srivastava, G., Nie, L., and Zhang, R. (2021). Delay Sensitive Secure NOMA Transmission for Hierarchical HAP-LAP Medical-care IoT Networks. IEEE Trans. Ind. Informat., to be published.","DOI":"10.1109\/TII.2021.3117263"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1379","DOI":"10.1109\/LWC.2020.2991037","article-title":"Relay Selection for UAV-assisted Urban Vehicular Ad Hoc Networks","volume":"9","author":"He","year":"2020","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Jobaer, S., Zhang, Y., Iqbal Hussain, M.A., and Ahmed, F. (2020). UAV-Assisted Hybrid Scheme for Urban Road Safety Based on VANETs. Electronics, 9.","DOI":"10.3390\/electronics9091499"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"5416","DOI":"10.1109\/JIOT.2020.3020819","article-title":"Blockchain-Envisioned UAV Communication Using 6G Networks: Open Issues, Use Cases, and Future Directions","volume":"8","author":"Aggarwal","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"16017","DOI":"10.1109\/TVT.2020.3041754","article-title":"A Route Segmented Broadcast Protocol Based on RFID for Emergency Message Dissemination in Vehicular Ad-Hoc Networks","volume":"69","author":"Afrashteh","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MMM.2020.3042408","article-title":"Software-Defined RFID Readers: Wireless Reader Testbeds Exploiting Software-Defined Radios for Enhancements in UHF RFID Systems","volume":"22","author":"Saxl","year":"2021","journal-title":"IEEE Microw. Mag."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Zhang, W., Lin, B., Gao, C., Yan, Q., Li, S., and Li, W. (2018, January 26\u201328). Optimal Placement in RFID-Integrated VANETs for Intelligent Transportation System. Proceedings of the 2018 IEEE International Conference on RFID Technology & Application (RFID-TA), Macao, China.","DOI":"10.1109\/RFID-TA.2018.8552765"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Buffi, A., Nepa, P., and Cioni, R. (2017, January 20\u201322). SARFID on drone: Drone-based UHF-RFID tag localization. Proceedings of the 2017 IEEE International Conference on RFID Technology & Application (RFID-TA), Warsaw, Poland.","DOI":"10.1109\/RFID-TA.2017.8098872"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Longhi, M., and Marrocco, G. (2017, January 20\u201322). Flying Sensors: Merging Nano-UAV with Radiofrequency Identification. Proceedings of the 2017 IEEE International Conference on RFID Technology & Application (RFID-TA), Warsaw, Poland.","DOI":"10.1109\/RFID-TA.2017.8098875"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Greco, G., Lucianaz, C., Bertoldo, S., and Allegretti, M. (2015, January 7\u201311). A Solution for Monitoring Operations in Harsh Environment: A RFID Reader for Small UAV. Proceedings of the 2015 International Conference on Electromagnetics in Advanced Applications (ICEAA), Turin, Italy.","DOI":"10.1109\/ICEAA.2015.7297235"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"He, Y., Zhang, R., Li, B., and Wang, D. (2019, January 23\u201325). An Anti-Collision Protocol Based on UAV for Internet of Things. Proceedings of the IEEE 11th International Conference on Wireless Communications and Signal Processing (WCSP), Xi\u2019an, China.","DOI":"10.1109\/WCSP.2019.8927978"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"845","DOI":"10.1109\/TIM.2018.2857045","article-title":"A SAR-Based Measurement Method for Passive-Tag Positioning with a Flying UHF-RFID Reader","volume":"68","author":"Buffi","year":"2019","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Hr\u00faz, M., Bugaj, M., Nov\u00e1k, A., Kandera, B., and Bad\u00e1nik, B. (2021). The Use of UAV with Infrared Camera and RFID for Airframe Condition Monitoring. Appl. Sci., 11.","DOI":"10.3390\/app11093737"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Won, D., Park, M., and Chi, S. (2018, January 16\u201319). Construction Resource Localization Based on UAV-RFID Platform Using Machine Learning Algorithm. Proceedings of the 2018 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), Bangkok, Thailand.","DOI":"10.1109\/IEEM.2018.8607668"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"102335","DOI":"10.1109\/ACCESS.2020.2997304","article-title":"IADRL: Imitation Augmented Deep Reinforcement Learning Enabled UGV-UAV Coalition for Tasking in Complex Environments","volume":"8","author":"Zhang","year":"2020","journal-title":"IEEE Access"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Orgeira-Crespo, P., Ulloa, C., Rey-Gonzalez, G., and P\u00e9rez Garc\u00eda, J.A. (2020). Methodology for Indoor Positioning and Landing of an Unmanned Aerial Vehicle in a Smart Manufacturing Plant for Light Part Delivery. Electronics, 9.","DOI":"10.3390\/electronics9101680"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1683","DOI":"10.1007\/s12205-020-2074-y","article-title":"UAV-RFID Integration for Construction Resource Localization","volume":"24","author":"Won","year":"2020","journal-title":"KSCE J. Civ. Eng."},{"key":"ref_21","first-page":"8613","article-title":"ReLoc: Hybrid RSSI- and Phase-Based Relative UHF-RFID Tag Localization With COTS Devices","volume":"69","author":"Li","year":"2020","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Rahman, M.M., McDermid, G.J., Strack, M., and Lovitt, J. (2017). A New Method to Map Groundwater Table in Peatlands Using Unmanned Aerial Vehicles. Remote Sens., 9.","DOI":"10.3390\/rs9101057"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1109\/JRFID.2017.2765619","article-title":"The Interrogation Footprint of RFID-UAV: Electromagnetic Modeling and Experimentations","volume":"1","author":"Casati","year":"2017","journal-title":"IEEE J. Radio Freq. Identificat."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1109\/TASE.2016.2614134","article-title":"Collision Detection and Signal Recovery for UHF RFID Systems","volume":"15","author":"Tan","year":"2018","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"621","DOI":"10.1007\/s11276-020-02466-1","article-title":"Novel RFID Anti-Collision Algorithm Based on the Monte-Carlo Query Tree Search","volume":"27","author":"Samsami","year":"2021","journal-title":"Wirel. Netw."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"620","DOI":"10.1109\/LCOMM.2019.2895819","article-title":"An Efficient Dynamic Anti-Collision Protocol for Mobile RFID Tags Identification","volume":"23","author":"Jia","year":"2019","journal-title":"IEEE Commun. Lett."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1962","DOI":"10.1109\/TPDS.2019.2901883","article-title":"An Efficient Ring-Based Metadata Management Policy for Large-Scale Distributed File Systems","volume":"30","author":"Gao","year":"2019","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"36207","DOI":"10.1109\/ACCESS.2019.2900739","article-title":"A Novel Cross Layer Anti-Collision Algorithm for Slotted ALOHA-Based UHF RFID Systems","volume":"7","author":"Huang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/LNET.2019.2909814","article-title":"The Impact of External Interference on RFID Anti-Collision Protocols","volume":"1","author":"Benedetti","year":"2019","journal-title":"IEEE Netw. Lett."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1109\/LAWP.2016.2561960","article-title":"Compact Multiservice UHF RFID Reader Antenna for Near-Field and Far-Field Operations","volume":"16","author":"Pakkathillam","year":"2017","journal-title":"IEEE Antennas Wirel. Propag. Lett."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Prakash, A., Anand, R., and Chandra, B.M. (2019, January 15\u201316). Forward Search Approach Using Power Search Algorithm (FSA-PSA) to Solve Dynamic Economic Load Dispatch problems. Proceedings of the 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS), Coimbatore, India.","DOI":"10.1109\/ICACCS.2019.8728541"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"1823","DOI":"10.1109\/LCOMM.2017.2693998","article-title":"Modeling Timely-Delivery Ratio of Slotted Aloha With Energy Harvesting","volume":"21","author":"Bae","year":"2017","journal-title":"IEEE Commun. Lett."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Khalil, G., Doss, R., and Chowdhury, M. (2020). A New Secure RFID Anti-Counterfeiting and Anti-Theft Scheme for Merchandise. J. Sens. Actuator Netw., 9.","DOI":"10.3390\/jsan9010016"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"1321","DOI":"10.1109\/TPDS.2012.218","article-title":"Grouping-proofs-based Authentication Protocol for Distributed RFID Systems","volume":"24","author":"Liu","year":"2013","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1109\/LWC.2017.2770123","article-title":"Security of Grouping-proof Authentication Protocol for Distributed RFID Systems","volume":"7","author":"Sun","year":"2018","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"125029","DOI":"10.1109\/ACCESS.2020.3007771","article-title":"Huynh, B. A New Strong Adversary Model for RFID Authentication Protocols","volume":"8","author":"Hosseinzadeh","year":"2020","journal-title":"IEEE Access"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"He, Y., Zhai, D., Huang, F., Wang, D., Tang, X., and Zhang, R. (2021). Joint Task Offloading, Resource Allocation, and Security Assurance for Mobile Edge Computing-Enabled UAV-Assisted VANETs. Remote Sens., 13.","DOI":"10.3390\/rs13081547"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"1656","DOI":"10.1109\/TII.2018.2794996","article-title":"Lightweight RFID Protocol for Medical Privacy Protection in IoT","volume":"14","author":"Fan","year":"2018","journal-title":"IEEE Trans. Ind. Informat."},{"key":"ref_39","unstructured":"Sun, H., and Ting, W. (2010). ISO\/IEC WD 29167\u20136 Information Technology\u2014Automatic Identification and Data Caputre Techniques\u2014Part 6: Air Interface for Security Services and File Management for RFID at 860\u2013960 MHz, Internation Organization for Standardization."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Arjona, L., Landaluce, H., Perallos, A., and Onieva, E. (2020). Dynamic Frame Update Policy for UHF RFID Sensor Tag Collisions. Sensors, 20.","DOI":"10.3390\/s20092696"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Chen, Y.H., Chen, Y.A., and Huang, S.R. (2020). A Mobility Aware Binary Tree Algorithm to Resolve RFID Jam and Bottleneck Problems in a Next Generation Specimen Management System. Micromachines, 11.","DOI":"10.3390\/mi11080755"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Jiang, Z., Li, B., Yang, M., and Yan, Z. (2020). LC-DFSA: Low Complexity Dynamic Frame Slotted Aloha Anti-Collision Algorithm for RFID System. Sensors, 20.","DOI":"10.3390\/s20010228"},{"key":"ref_43","first-page":"250","article-title":"A Tag Distribution Distance Based Collision Avoidance Algorithm in RFID Systems","volume":"34","author":"Jiang","year":"2016","journal-title":"J. Northwestern Polytech. Univ."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"998","DOI":"10.1109\/TCOMM.2019.2952126","article-title":"A Group-Based Binary Splitting Algorithm for UHF RFID Anti-Collision Systems","volume":"68","author":"Su","year":"2020","journal-title":"IEEE Trans. Commun."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"683","DOI":"10.1109\/TCCN.2019.2952885","article-title":"Primary Privacy Preserving With Joint Wireless Power and Information Transfer for Cognitive Radio Networks","volume":"6","author":"Wang","year":"2020","journal-title":"IEEE Trans. Cognit. Commun. Netw."},{"key":"ref_46","first-page":"91","article-title":"Physical Layer Security Performance Analysis for Wireless Sensor Network","volume":"57","author":"Sheng","year":"2021","journal-title":"Comput. Eng. Appl."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"5386","DOI":"10.1109\/TCOMM.2017.2748119","article-title":"Achieving Full Secrecy Rate With Energy-Efficient Transmission Control","volume":"65","author":"Wang","year":"2017","journal-title":"IEEE Trans. Commun."}],"container-title":["Remote Sensing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2072-4292\/13\/22\/4500\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T07:28:11Z","timestamp":1760167691000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2072-4292\/13\/22\/4500"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,9]]},"references-count":47,"journal-issue":{"issue":"22","published-online":{"date-parts":[[2021,11]]}},"alternative-id":["rs13224500"],"URL":"https:\/\/doi.org\/10.3390\/rs13224500","relation":{},"ISSN":["2072-4292"],"issn-type":[{"type":"electronic","value":"2072-4292"}],"subject":[],"published":{"date-parts":[[2021,11,9]]}}}