{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T22:10:39Z","timestamp":1760220639492,"version":"build-2065373602"},"reference-count":26,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2011,3,4]],"date-time":"2011-03-04T00:00:00Z","timestamp":1299196800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>In Radio Frequency Identification facilities the identification delay of a set of tags is mainly caused by the random access nature of the reading protocol, yielding a random identification time of the set of tags. In this paper, the cumulative distribution function of the identification time is evaluated using a discrete time Markov chain for single-set time-constrained passive RFID systems, namely those ones where a single group of tags is assumed to be in the reading area and only for a bounded time (sojourn time) before leaving. In these scenarios some tags in a set may leave the reader coverage area unidentified. The probability of this event is obtained from the cumulative distribution function of the identification time as a function of the sojourn time. This result provides a suitable criterion to minimize the probability of losing tags. Besides, an identification strategy based on splitting the set of tags in smaller subsets is also considered. Results demonstrate that there are optimal splitting configurations that reduce the overall identification time while keeping the same probability of losing tags.<\/jats:p>","DOI":"10.3390\/s110302946","type":"journal-article","created":{"date-parts":[[2011,3,6]],"date-time":"2011-03-06T18:54:40Z","timestamp":1299437680000},"page":"2946-2960","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["On the Optimal Identification of Tag Sets in Time-Constrained RFID Configurations"],"prefix":"10.3390","volume":"11","author":[{"given":"Javier","family":"Vales-Alonso","sequence":"first","affiliation":[{"name":"Department of Information Technologies and Communications, Technical University of Cartagena, Plaza del Hospital 1, 30202 Cartagena, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0613-5411","authenticated-orcid":false,"given":"Mar\u00eda Victoria","family":"Bueno-Delgado","sequence":"additional","affiliation":[{"name":"Department of Information Technologies and Communications, Technical University of Cartagena, Plaza del Hospital 1, 30202 Cartagena, Spain"}]},{"given":"Esteban","family":"Egea-L\u00f3pez","sequence":"additional","affiliation":[{"name":"Department of Information Technologies and Communications, Technical University of Cartagena, Plaza del Hospital 1, 30202 Cartagena, Spain"}]},{"given":"Juan Jos\u00e9","family":"Alcaraz","sequence":"additional","affiliation":[{"name":"Department of Information Technologies and Communications, Technical University of Cartagena, Plaza del Hospital 1, 30202 Cartagena, Spain"}]},{"given":"Juan Manuel","family":"P\u00e9rez-Ma\u00f1ogil","sequence":"additional","affiliation":[{"name":"Department of Information Technologies and Communications, Technical University of Cartagena, Plaza del Hospital 1, 30202 Cartagena, Spain"}]}],"member":"1968","published-online":{"date-parts":[[2011,3,4]]},"reference":[{"key":"ref_1","unstructured":"Finkenzeller, K (2000). RFID Handbook: Radio-Frequency Identification, Fundamentals and Applications, John Wiley."},{"key":"ref_2","unstructured":"ISO\/IEC 1800-6:2003(E). Part 6: Parameters for Air Interface Communications at 860\u2013960 MHz, 2003. Available online: http:\/\/www.iso.org (accessed on 2 March 2011)."},{"key":"ref_3","unstructured":"EPC Radio-Frequency Identify Protocol for Communications at 868\u2013960 MHz. Available online: http:\/\/www.epcglobalinc.org (accessed on 2 March 2011)."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Bueno-Delgado, MV, and Vales-Alonso, J (2010). On the Optimal Frame-Length Configuration on Real Passive RFID Systems. J Netw Comput Applicat, in press.","DOI":"10.1016\/j.jnca.2010.04.022"},{"key":"ref_5","unstructured":"Vales-Alonso, J, Bueno-Delgado, MV, Egea-Lopez, E, Alcaraz-Espin, J, and Gonzalez Casta\u00f1o, FJ (2010). Radio Frequency Identification Fundamentals and Applications, Intech."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Alcaraz, J, Egea-Lopez, E, Vales-Alonso, J, and Garcia-Haro, J (2010). Dynamic System Model for Optimal Configuration of Mobile RFID Systems. Comput Netw, in Press.","DOI":"10.1016\/j.comnet.2010.07.013"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"8010","DOI":"10.3390\/s100908010","article-title":"Using RFID to Enhance Security in Off-Site Data Storage","volume":"10","author":"Velasco","year":"2010","journal-title":"Sens. J"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","article-title":"RFID Security and Privacy: A Research Survey","volume":"24","author":"Juels","year":"2006","journal-title":"IEEE J. Sel. Area. Commun"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Mitrokotsa, A, Rieback, MR, and Tanenbaum, AS (2009). Classifying RFID Attacks and Defenses. Inf Syst Front.","DOI":"10.1007\/s10796-009-9210-z"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"845","DOI":"10.3390\/s90200845","article-title":"Enhanced TDMA Based Anti-Collision Algorithm with a Dynamic Frame Size Adjustment Strategy for Mobile RFID Readers","volume":"9","author":"Shin","year":"2009","journal-title":"Sens. J"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"84","DOI":"10.3390\/s100100084","article-title":"RAC-Multi: Reader Anti-Collision Algorithm for Multichannel Mobile RFID Networks","volume":"10","author":"Shin","year":"2010","journal-title":"Sens. J"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"2150","DOI":"10.1016\/j.comcom.2005.12.011","article-title":"Taxonomy and Survey of RFID Anti-Collision Protocols","volume":"29","author":"Shih","year":"2006","journal-title":"J. Comput. Commun"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1109\/LCOMM.2008.080254","article-title":"RFID MAC Performance Evaluation Based on ISO\/IEC 18000-6 Type C","volume":"12","author":"Ko","year":"2008","journal-title":"IEEE Commun. Lett"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Bueno-Delgado, MV, Vales-Alonso, J, and Gonzalez-Casta\u00f1o, FJ (2009, January 3\u20135). Analysis of DFSA Anti-collision Protocols in Passive RFID Environments. Porto, Portugal.","DOI":"10.1109\/IECON.2009.5415261"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Nikitin, P, and Rao, V (2006, January 9\u201314). Performance Limitations of Passive UHF RFID Systems. Albuquerque, NM, USA.","DOI":"10.1109\/APS.2006.1710704"},{"key":"ref_16","unstructured":"Kawakita, Y, and Mitsugi, J (2006, January 23\u201327). Anti-Collision Performance of Gen2 Air Protocol in Random Error Communication Link. Phoenix, AZ, USA."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Buettner, M, and Wetherall, D (2008, January 14\u201319). An Empirical Study of UHF RFID Performance. San Francisco, CA, USA.","DOI":"10.1145\/1409944.1409970"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1109\/JSYST.2007.909179","article-title":"Evaluation of the State of Passive UHF RFID: An Experimental Approach","volume":"1","author":"Aroor","year":"2007","journal-title":"IEEE Syst. J"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1007\/3-540-45866-2_9","article-title":"Efficient Object Identification with Passive RFID Tags","volume":"2414","author":"Vogt","year":"2002","journal-title":"Lect. Note. Comput. Sci"},{"key":"ref_20","unstructured":"ICODE Available online: http:\/\/www.semiconductors.philips.com (accessed on 2 March 2011)."},{"key":"ref_21","unstructured":"Vales-Alonso, J, Bueno-Delgado, MV, Egea-L\u00f3pez, E, Alcaraz-Esp\u00edn, JJ, and Garc\u00eda-Haro, J (2009, January 16\u201317). Markovian Model for Computation of Tag Loss Ratio in Dynamic RFID Systems. Bremen, Germany."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Xie, L, Sheng, B, Tan, CC, Han, H, Li, Q, and Chen, D (2010, January 15\u201319). Efficient Tag Identification in Mobile RFID Systems. San Diego, CA, USA.","DOI":"10.1109\/INFCOM.2010.5461949"},{"key":"ref_23","unstructured":"Feller, W (1970). An Introduction to Probability Theory and its Applications, Wiley. [3rd ed]."},{"key":"ref_24","unstructured":"Note that P size is (N + 1) \u00d7 (N + 1)."},{"key":"ref_25","unstructured":"Kemeny, JG, and Snell, JL Finite Markov Chains."},{"key":"ref_26","unstructured":"The canonical form of a transition matrix is obtained by renumbering the states so that the transient states come first."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/11\/3\/2946\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T21:55:26Z","timestamp":1760219726000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/11\/3\/2946"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,3,4]]},"references-count":26,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2011,3]]}},"alternative-id":["s110302946"],"URL":"https:\/\/doi.org\/10.3390\/s110302946","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2011,3,4]]}}}