CN116011478B - Unknown label identification method based on large-scale RFID system - Google Patents
Unknown label identification method based on large-scale RFID system Download PDFInfo
- Publication number
- CN116011478B CN116011478B CN202310152344.3A CN202310152344A CN116011478B CN 116011478 B CN116011478 B CN 116011478B CN 202310152344 A CN202310152344 A CN 202310152344A CN 116011478 B CN116011478 B CN 116011478B
- Authority
- CN
- China
- Prior art keywords
- unknown
- tag
- tags
- reader
- vector
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Near-Field Transmission Systems (AREA)
Abstract
The invention relates to an unknown label identification method based on a large-scale RFID system, which belongs to the technical field of radio frequency identification and the Internet of things, and comprises the following steps: firstly, a reader constructs an expected frame vector through EPC of a tag, and on the basis of the expected frame vector, the sizes of all '0' fragments are screened out, and the lengths of all '0' fragments are used for constructing an indication vector. The unknown label and the inactivated known label are marked simultaneously through the indication vector, so that the inactivation efficiency of the unknown label is greatly improved. When all known tags in the system are deactivated, the reader decodes all received unknown tag responses by Manchester encoding and constructs another indicator vector by screening out all "0" fragments. The reader causes the unknown tags to reply to their EPCs in a particular time slot via the indication vector. The indication vector can reduce the broadcasting cost of the reader, can effectively skip empty time slots and improves the identification efficiency of unknown tags.
Description
Technical Field
The invention relates to the technical field of radio frequency identification and the Internet of things, in particular to an unknown tag identification method based on a large-scale RFID system.
Background
In general, a radio frequency identification (English: radio Frequency Identification, RFID) system consists of a back-end server with a database, a reader with one or more antennas, and a large number of RFID tags. Because the backend server has powerful computing power and memory power, it is possible to efficiently process the data stored in the database and the information returned by the reader, and provide instructions to the reader in real time to adjust, synchronize and manage the RFID tags. The reader is connected with the back-end server through a wired high-speed link, and sends radio frequency signals to the tags in the communication range through the antenna and receives information sent back by the tags. Each tag has a unique 96-bit electronic product code (english: electronic Product Code; EPC for short) for marking the identity of the target.
Through the quick checking of the tags in the system, the reader can realize the effective management of the tag targets in the RFID system. For example, in a large-scale warehouse, RFID-tagged product information is stored in a database of a back-end server. The reader can perform corresponding commercial operations on the marked products by counting tags, and unknown tags that enter the RFID system but are not registered will severely interfere with normal tag management. These unknown tags may choose the same time slot as the known tags to reply to the reader, resulting in collisions of tags that do not effectively monitor the known tags. Particularly in some important applications, identifying unknown tags in the system in time and eliminating their effect can avoid considerable economic profit losses and even safety accidents.
In the last decade, the problem of identification of unknown tags has been well studied in the academia. In the existing work, the main idea is to aim at improving the slot utilization based on the frame slot Aloha (english: framed Slotted Aloha, abbreviated: FSA) protocol. The FSA protocol is widely used for communication procedures between readers and tags, which allows each tag to randomly select a time slot to reply in a time frame. In view of this, since the time slots of the replies of the tags are random, empty time slots and conflicting time slots will be unavoidable, which will result in a relatively low efficiency when the reader collects the tags EPC.
To solve this troublesome problem in the FSA protocol, many researchers have conducted intensive studies and proposed many constructive methods. For example, chu et al propose an EUTI protocol that identifies unknown tags, in which an indicative vector is introduced to direct the known and unknown tags to respond in a particular time slot. In the first stage, the reader first builds a desired frame vector for labeling unknown tags, and then deactivates the known tags by a vector based on the desired non-gaps. However, a low proportion of the expected gaps may result in inefficient marking of unknown labels in one time frame. Furthermore, although collision slots are used to accelerate the deactivation process of known tags, the broadcasting of the indication vector introduces additional overhead. In the second stage, the EUTI protocol adopts a time frame with a larger frame length to reduce the proportion of conflict time slots, and constructs an indication vector to skip the expected empty time slots, so that the identification efficiency of unknown tags is improved. Compared with the prior work, the identification efficiency of the EUTI protocol can be greatly improved. However, a large number of "0" bits are included in the indication vector, so that the broadcasting overhead increases. Therefore, reducing broadcast overhead and improving the utilization of each slot are critical to improving recognition efficiency.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides an unknown label identification method based on a large-scale RFID system, which is reasonable in design, overcomes the defects in the prior art and has good effect.
In order to achieve the above purpose, the present invention adopts the following technical scheme:
an unknown label identification method based on a large-scale RFID system, wherein the large-scale RFID system comprises a back-end server, an RFID reader,Personal known tag->An unknown tag, each tag having a unique 96-bit electronic code, designated EPC, said unknown tag identification method comprising the steps of:
s1, firstly entering a known tag deactivation stage, and carrying out hash operation on EPCs of all known tags by a reader to construct an expected frame vector consisting of 0 and 1The method comprises the steps of carrying out a first treatment on the surface of the The reader screens out all "0" fragments between the two "1" bits from the vector, wherein the maximum value of the length is +.>Indicating all->Binary character strings of bit length together form a vector +.>;
S2, broadcasting parameter requests to all tags by a reader, and storing an index vector in the memory of each RFID tagEach tag is based on hash result +.>And updated index vector->To determine if it is an unknown tag;
s3, marking the label which is not marked in S2 as a known label, and inactivating all the known labels by an RFID reader;
s4, entering an unknown label identification stage, and obtaining a hash result by each unknown label through hash operationAnd construct a length of +.>The bit vector is then sent to the reader;
s5, after receiving information sent back by all unknown tags, the reader decodes all the unknown tag information by Manchester decoding and reconstructs a compact indication vector;
S6, the reader reads the vectorBroadcasting to all unknown tags in the system, wherein each unknown tag memory stores an index vector +.>If the hash result of each unknown tag +.>And if the value of the index vector is equal to that of the updated index vector, the unknown label sends the EPC to the reader in the corresponding time slot, so that the reader can identify the unknown label.
Further, the step S1 specifically includes: RFID reader is treated by random seedHash the electronic codes of all known tags, map all known tags to a length +.>In the array of bits, a desired frame vector consisting of "0" and "1" is thus constructed>Wherein "1" represents a desired non-empty slot, including a desired single slot and a desired collision slot, and "0" represents a desired empty slot; the reader screens out all the "0" fragments between the two "1" bits from the vector and obtains the lengths of these "0" fragments, wherein the maximum value of the lengths is +.>A representation; the size of each "0" fragment is +.>Is represented by a binary string of (2), then all +.>Binary character strings of bit length together form a vector +.>。
Further, the step S2 specifically includes: the readers respectively broadcast parametersSum vector->Feed systemAll tags in the system, each tag being based on a hash function +.>Obtaining hash result and obtaining final value after taking remainder of frame length>The method comprises the steps of carrying out a first treatment on the surface of the Each RFID tag memory stores an index vector, which is marked as +.>And initialized to "0"; each tag is added by +.>Each of +.>Bit fragment size to update +.>The method comprises the steps of carrying out a first treatment on the surface of the If updated->Is not equal to +.>The tag is marked as an unknown tag and will remain silent during the known tag deactivation phase until the unknown tag identification phase begins.
Further, the step S3 specifically includes: if a tag is not marked as an unknown tag, the tag will passAnddetermining whether to send a response message to the reader; if->Is equal to->The tag will send a short response to the reader in the corresponding slot, the index value of the response slot being used for updating +.>The index value of the "0" segment in all the "0" segments; if a tag replies in a single slot, the reader sends an "ACK" command to deactivate the tag; if the reader receives the responses of multiple tags simultaneously in a time slot, the reader sends an "NCK" command to keep the tags active and participate in the next round of known tag deactivation phase, i.e., loops steps S1 through S3, until all known tags are deactivated.
Further, step S4 specifically includes: when all the known tags are deactivated, the reader starts an unknown tag identification stage; mapping all unknown RFID tags to a long formIn the array of bits, first the reader sends a parameter request command +.>Wherein->Is a random seed; when receiving the request command, each unknown tag is added by hash operation>Obtaining hash result and taking the remainder of frame length to obtain result +.>Then each tag constructs a length +.>Wherein the index value is +.>The value of the bit of (2)Is "1" and the remaining bits are "0".
Further, step S5 specifically includes: all unknown labels send the constructed vectors to a reader at the same time, the reader decodes all vectors by Manchester decoding, when the values of the same bit in all vectors are all 0, the reader decodes the corresponding bit into 0, and if at least one of the values of the same bit in all vectors is 1, the reader decodes the corresponding bit into X, namely, the X represents a conflict bit; the decoded tag information is recorded as a vectorThe reader will +.>Reconstructing a compact indicator vector +.>The method comprises the steps of carrying out a first treatment on the surface of the Reader screens out->The "0" fragments between all "X" of the sequence, and finding the maximum value of the lengths in all fragments, denoted +.>The method comprises the steps of carrying out a first treatment on the surface of the All "0" fragments are treated with one +.>The bit-long string indicates its length, all representing a length of "0" fragments +.>The strings of bits together form a vector +.>。
Further, the step S6 specifically includes: the reader will vectorBroadcasting to all unknown tags in the system, wherein each tag is stored with another one in the memoryIndex vector->And initialized to "0", when +.>After that, each unknown tag is tagged by adding +.>Each of->Bit element to update +.>The method comprises the steps of carrying out a first treatment on the surface of the If updated->Is equal to->The unknown tag sends its EPC to the reader in the corresponding time slot, and the index value of the corresponding time slot is used for updating +.>Index values of "0" fragments in all "0" fragments; when an unknown tag sends EPC to the reader in a single time slot, the reader can correctly identify the unknown tag; if a plurality of unknown tags actually select a conflict time slot to send EPC, the reader cannot accurately identify all tags replied in the conflict time slot, and the unknown tags will participate in the next unknown tag identification phase, i.e. steps S4 to S6 are repeated until all the unknown tags are identified.
Further, at the firstThe number of known tags which are not inactivated during the sub-loop steps S1 to S3 is +.>UnlabeledKnowing the number of tags +.>Probability of one time slot being an expected empty time slot +.>The method comprises the following steps:
probability of one time slot being a desired single time slotThe method comprises the following steps:
then at vectorIn (1) expect->0 segments, all 0 segments having an average length ofThe length of each fragment is +.>The binary number of bits represents a binary number of bits.
Further, in the step S2, the probability that an unknown label is marked isThe expected value of the number of unknown tags marked in the current cycle is +.>。
Further, in the step S3, the expected value of the number of unlabeled unknown labels isThe method comprises the steps of carrying out a first treatment on the surface of the Probability of a desired single time limit being selected by at least one unknown tag +.>The method comprises the following steps: />
the expected value of the known number of tags that are deactivated in this cycle is:
then the firstTotal execution time of sub-loop steps S1 to S3 +.>The method comprises the following steps:
wherein, the liquid crystal display device comprises a liquid crystal display device,time of broadcasting parameter request for reader, +.>Time taken for a single time slot for transmitting 1 bit of information, < > and->For the duration of the collision time slot, +.>The expected value of the time taken for a reader to send 1 bit of information to a tag to deactivate a known tag is:
Further, at the firstDuring the sub-loop steps S4 to S6, and (2)>Representing the number of unknown tags that were not identified before the current cycle was performed, the probability that a slot was not selected by any unknown tag +.>The method comprises the following steps:
probability that a time slot is selected by only one unknown tagThe method comprises the following steps:
First, theTime spent in the process of sub-looping steps S4 to S6 +.>The method comprises the following steps:
wherein, the liquid crystal display device comprises a liquid crystal display device,time cost of single slot for tag transmission of 96-bit EPC, < >>Time taken for the tag to transmit 1 bit of information to the reader, < > for the tag>To be in vector->The number of "0" fragments in a sequence, the average length of all "0" fragmentsDegree is->The length of each fragment is +.>The binary number of bits represents;
the expected value of the time taken to identify an unknown tag is:
The invention has the beneficial technical effects.
(1) The invention introduces a compact index vector which is composed of the length of the 0 segment, shortens the broadcasting cost of the reader, and effectively improves the efficiency of unknown label marking and known label deactivation.
(2) The invention designs a compact index vector based on label reply, and collects EPCs of unknown labels by allocating a designated slot to each unknown label, thereby not only reducing broadcast overhead, but also eliminating useless empty time slots.
(3) The invention carries out extensive theoretical analysis and simulation, and proves the feasibility and effectiveness of the method.
Drawings
FIG. 1 is a schematic diagram of a process of the known tag deactivation phase of the present invention.
Fig. 2 is a schematic diagram of the manchester encoding process of the present invention.
FIG. 3 is a schematic diagram of the process of the unknown tag identification phase of the present invention.
Fig. 4 is a graph showing the results of simulation comparison experiments in which the deactivation time of the known tags varies with the number of known tags when u=10000 in the present invention.
Fig. 5 is a graph of simulation versus experimental results of the change of the deactivation time of the known tags with the number of unknown tags when n=10000 in the present invention.
Fig. 6 is a graph of simulation comparison experiment results of the change of the identification time of the unknown label with the number of the known labels when u=10000 in the present invention.
Fig. 7 is a graph of simulation comparison experiment results of the change of the identification time of the unknown label with the number of the unknown labels when n=10000 in the present invention.
Fig. 8 is a graph of simulation versus experiment results of the total execution time as a function of the number of known tags for u=10000 in the present invention.
Fig. 9 is a graph of simulated comparison experiment in which the total execution time varies with the number of unknown tags when n=10000 in the present invention.
Detailed Description
The following is a further description of embodiments of the invention, in conjunction with the specific examples:
an unknown label identification method based on a large-scale RFID system comprises a back-end server, an RFID reader and a plurality of RFID labels. The system comprises a set of known tagsThe set of unknown tags is +.>The number of tags is known as +.>The electronic codes EPC of all known tags are stored in the database of the back-end server, the number of unknown tags is +.>,/>The electronic code EPC of the size and unknown tag of (a) is notAs is known.
The invention provides an unknown tag identification method aiming at the RFID system to effectively collect EPCs of the unknown tags, which comprises two stages, namely (1) a known tag deactivation stage and (2) an unknown tag identification stage.
The known tag deactivation phase comprises two operations, namely unknown tag label and known tag deactivation, and mainly comprises the following steps:
s1, the RFID reader firstly uses random seeds asHash the electronic code of 4 known tags, map 4 known tags to a length +.>In the array of =10, a desired frame vector consisting of "0" and "1" is thus constructed +.>= "0001010010", where "1" indicates a desired non-empty slot, including a desired single slot and a desired collision slot, and "0" indicates a desired empty slot; the reader screens out all "0" fragments between two "1" bits from the vector: "000", "0", "00", and gives the length of the longest "0" fragment +.>=3; the size of each "0" segment is represented by a 2-bit binary string, namely "00", "01" and "10". These 2-bit long binary strings are combined into a compact index vector +.>= "110110", the length of this vector is much smaller than +.>。
S2, the reader transmits the vectorAnd->Equal parameters are broadcast to all tags in the system when the tags receive the vector + ->After that, each tag is according to the hash function +.>Obtaining hash result and obtaining final value after taking remainder of frame length>The method comprises the steps of carrying out a first treatment on the surface of the Each tag memory stores an index vector, which is marked as + ->And initialized to "0"; each tag is added by +.>Each of +.>Bit fragment size to update +.>The method comprises the steps of carrying out a first treatment on the surface of the As shown in FIG. 1, unknown tag +.>、/>、/>Updated +.>The values of (2) are 0, 9 and 7, respectively, and they are in +.>The value of the corresponding bit in (a)Are all "0", not equal to->These tags mark themselves as unknown tags and remain silent in the next process until the start of the unknown tag identification phase.
The unknown tag marked in S3 and S2 passesAnd->Is to decide whether or not to send a response message to the reader, as shown in fig. 1, because +_ updated by the first "0" fragment size>And their hash results->Equal, known tag->、And unknown tag->The reader will reply in the first time slot; because of the hash result->The second fragment size was added and was equal to +.>Known tag->The reader will reply in the second time slot; known tag->At the third time slotA reply reader; due to the known tag->And->Reply in a single slot, then the reader will send two "ACK" commands to deactivate them, respectively, whereas the tag +.>、/>And unknown tag->Will remain active and participate in the next round of known tag deactivation phase, i.e. loop steps S1 to S4, until all known tags are deactivated.
Suppose at the firstThe number of known tags which are not inactivated during the sub-loop steps S1 to S3 is +.>The number of unlabeled unknown tags is +.>Probability of one time slot being an expected empty time slot +.>The method comprises the following steps:
probability of one time slot being a desired single time slotThe method comprises the following steps:
then at vectorIn (1) expect->The average length of all "0" fragments is +.>The length of each fragment is +.>The binary number of bits represents a binary number of bits. />
The probability of an unknown label being marked isThe expected value of the number of unknown tags marked in the current cycle is +.>. The expected value of the number of unlabeled unknown tags is +.>The method comprises the steps of carrying out a first treatment on the surface of the Probability of a desired single time limit being selected by at least one unknown tag +.>The method comprises the following steps:
the expected value of the known number of tags that are deactivated in this cycle is:
then the firstTotal execution time of sub-loop steps S1 to S3 +.>The method comprises the following steps:
wherein, the liquid crystal display device comprises a liquid crystal display device,time of broadcasting parameter request for reader, +.>Time taken for a single time slot for transmitting 1 bit of information, < > and->For the duration of the collision time slot, +.>The expected value of the time taken for a reader to send 1 bit of information to a tag to deactivate a known tag is:
The unknown label identification stage is entered, and mainly comprises the following steps:
s4, after all the known RFID tags are deactivated, starting an unknown tag identification stage by the reader; mapping all unknown tags to one lengthIn an array of 8 bits, the reader first sends a parameter request command to all unknown tagsWherein->Is a random seed; when receiving the request command, each unknown label is according to the hash functionObtaining hash result and taking the remainder of frame length to obtain result +.>Each unknown tag constructs an 8-bit binary character string, and transmits the 8-bit binary character string to a reader, wherein each binary character string comprises one bit of '1', the rest bits are '0', and the index value of the '1' bit is the result of tag hash operation->;
S5, all unknown labels simultaneously send the constructed vectors to a reader, and the reader decodes the vectors into a decoding vector through Manchester decoding= "0X00X 0", then the reader filters out all "0" fragments, i.e. "0", "00" and "0", the size of the longest fragment being 2, then each fragment is converted into a 2-bit binary string to indicate its size, and then the 2-bit strings are combined to construct->I.e. +.>=“011001”。
Specifically, as shown in fig. 2, manchester decoding is a synchronous clock decoding technique supported by the Gen2 standard, and is used in the physical layer to decode the clock and data of the synchronous bit stream. In manchester decoding, each bit is represented by a voltage transition. Specifically, "0" represents a single transition of the voltage from high to low, and "1" represents a single transition of the voltage from low to high. If the bits transmitted to the reader at the same time are not identical (i.e., "0" and "1"), the reader decodes the bits into a collision bit "X". If multiple bits simultaneously transmitted to the reader are identical (i.e., "0" or "1"), the reader can successfully decode the bits into the corresponding values (i.e., "0" or "1"). As shown in fig. 2, if the manchester decoded signal 1 is "010110", and the manchester decoded signal 2 is "110010", the superimposed signal will be decoded by the reader as "X10".
S6, the reader reads the vectorBroadcasting to all unknown tags in the system, wherein each tag memory stores another index character string +.>And initialized to "0"; as shown in FIG. 3, when +.>After that, each unknown tag is labeled with (>+01=1) to update the index string +.>The method comprises the steps of carrying out a first treatment on the surface of the If unknown tag->Is->Is equal to->The tag will reply its EPC to the reader in the first time slot, unknown tag +.>、/>And->Will continue to pass (+)>+10+1=100) updates its index string +.>. Because of the hash result->Equal to->Unknown tag->Will be at the secondReplying to the reader in each time slot; unknown tag->And->In the third time slot reply, resulting in the generation of conflicting time slots, they will remain active and participate in the next round of unknown tag identification phase, i.e. the loop steps S4 to S6 are repeated until all unknown tags are identified.
In the first placeDuring the sub-loop steps S4 to S6, and (2)>Representing the number of unknown tags that were not identified before the current cycle was performed, the probability that a slot was not selected by any unknown tag +.>The method comprises the following steps:
probability that a time slot is selected by only one unknown tagThe method comprises the following steps:
First, theTime spent in the process of sub-looping steps S4 to S6 +.>The method comprises the following steps:
wherein, the liquid crystal display device comprises a liquid crystal display device,time cost of single slot for tag transmission of 96-bit EPC, < >>Time taken for the tag to transmit 1 bit of information to the reader, < > for the tag>To be in vector->The number of "0" fragments in (a) and the average length of all "0" fragments is +.>The length of each fragment is +.>The binary number of bits represents;
the expected value of the time taken to identify an unknown tag is:
To further illustrate the advantages of the method of the present invention, the invention is further described in connection with experiments.
The invention compares with EUTI protocol, and carries out extensive simulation to evaluate the performance of the method (CUT for short) provided by the invention; the main evaluation index of unknown tag identification is the total execution time, which consists of two parts: (1) The deactivation time of a known tag and (2) the EPC collection time of an unknown tag;
first, the number of known tags was studiedAnd the number of unknown tags->Impact on the deactivation time of CUT and EUTI protocols. In general, the greater the number of known tags and unknown tags, the longer it takes to deactivate the known tags. As shown in fig. 4, when the number of unknown tags is fixed to 10000, the influence of the number of known tags appears. As the number of known tags increases, the deactivation time of both CUT and eutr protocols increases. In addition, the CUT method reduces the overhead of broadcasting by avoiding broadcasting of desired frame vectors and employing a "0" segment design, thereby making recognition efficiency superior to the EUTI. FIG. 5 illustrates the effect of the number of unknown tags on the deactivation time, which is still better for the CUT method than for EUTI, and decreases with increasing number of unknown tags. The main reason is that the benefits of the "0" segment design are more pronounced when the number of unknown tags is large.
During the EPC collection phase, all known tags are deactivated and their effects are correspondingly eliminated. Thus, when the number of tags is knownWhen changed, the EPC collection time of the unknown tag remains unchanged, as shown in fig. 6. Furthermore, when the number of unknown tags is +.>When=10000, the CUT method protocol saves about 2 seconds over the EUTI protocol in the EPC collection phase. FIG. 7 depicts the number of unknown tags when the number of known tags is fixed to 10000 +.>Unknown tag EPC collection time when changing from 1000 to 10000. The CUT method protocol proposed by the present invention still has some advantages in terms of collection time.
FIG. 8 illustrates when the number of unknown tags is=10000, known number of tags +.>From 1000 to 10000, the total execution time of the CUT method and the eutri protocol. The total execution time of both protocols increases gradually with the number of known tags, and the CUT method performs better than the EUTI protocol. When the number of unknown tags ∈ ->As it becomes larger, the gap between the time used by the CUT method and the EUTI protocol increases. Fig. 9 illustrates the effect of the number of unknown tags when the number of known tags is 10000. It is apparent that the CUT method is still superior to the EUTI protocol. This is because the design of the "0" segment will greatly reduce the broadcast overhead.
It should be understood that the above description is not intended to limit the invention to the particular embodiments disclosed, but to limit the invention to the particular embodiments disclosed, and that the invention is not limited to the particular embodiments disclosed, but is intended to cover modifications, adaptations, additions and alternatives falling within the spirit and scope of the invention.
Claims (8)
1. An unknown tag identification method based on a large-scale RFID system, wherein the large-scale RFID system includes a back-end server, an RFID reader, n known tags, and u unknown tags, each tag having a unique 96-bit electronic code denoted EPC, the unknown tag identification method comprising the steps of:
s1, firstly, entering a known label deactivation stage, wherein an RFID reader is R through a random seed 1 Carrying out hash operation on the electronic codes of all the known tags, mapping all the known tags into an array with a length of f bits, thereby constructing a desired frame vector V consisting of 0 and 1, wherein 1 represents a desired non-empty time slot, comprising a desired single time slot and a desired conflict time slot, and 0 represents a desired empty time slot; the reader screens out all '0' fragments between two '1' bits from the vector and obtains the lengths of the '0' fragments, wherein the maximum value of the lengths is denoted by l; the size of each '0' segment is represented by a binary string with a length of l, and then all binary strings with a length of l bits jointly form a vector I;
s2, the readers respectively broadcast parameters<f,R 1 >And vector I to all tags in the system, each tag receiving the request command according to a hash function H (EPC, R 1 ) Obtaining a hash result and obtaining a final value d after taking the remainder of the frame length; each RFID tag memory stores an index vector, which is marked as z and initialized as 0; each tag updates z by increasing the fragment size of each l bits in I in turn; if the updated z is not equal to d, the tag is marked as an unknown tag and will remain silent during the known tag deactivation phase until the unknown tag identification phase begins;
s3, marking the label which is not marked in S2 as a known label, and inactivating all the known labels by an RFID reader;
s4, entering an unknown label identification stage, obtaining a hash result b by each unknown label through hash operation, constructing a vector with h bits, and sending the vector to a reader;
s5, all unknown labels send the constructed vectors to a reader at the same time, the reader decodes all vectors by Manchester decoding, when the values of the same bit in all vectors are all 0, the reader decodes the corresponding bit into 0, and if at least one of the values of the same bit in all vectors is 1, the reader decodes the corresponding bit into X, namely, the X represents a conflict bit; the decoded label information is marked as a vector W, and the reader reconstructs the W into a compact indication vector L; the reader screens out the 0 segments among all the X segments in W, finds out the maximum value of the length in all the segments, and marks the maximum value as m; all the '0' fragments are represented by a character string with the length of m bits, and all the character strings with the length of m bits representing the '0' fragments jointly form a vector L;
and S6, broadcasting the vector L to all unknown tags in the system by the reader, wherein an index vector y is stored in each unknown tag memory, and if the hash result b of each unknown tag is equal to the value of the updated index vector, the unknown tag sends an EPC (electronic product code) to the reader in a corresponding time slot so that the reader can identify the unknown tag.
2. The method for identifying unknown tags based on a large-scale RFID system according to claim 1, wherein step S3 specifically comprises: if a tag is not marked as an unknown tag, the tag determines whether to send a response message to the reader through the values of d and z; if the value of z is equal to the value of d, the tag will send a short response to the reader in the corresponding time slot, and the index value of the response time slot is the index value of the "0" segment used for updating z in all the "0" segments; if a tag replies in a single slot, the reader sends an "ACK" command to deactivate the tag; if the reader receives the responses of multiple tags simultaneously in a time slot, the reader sends an "NCK" command to keep the tags active and participate in the next round of known tag deactivation phase, i.e., loops steps S1 through S3, until all known tags are deactivated.
3. The method for identifying unknown tags based on a large-scale RFID system according to claim 2, wherein step S4 specifically comprises: when all the known tags are deactivated, the reader starts an unknown tag identification stage; mapping all unknown RFID tags into an array with h bits, and firstly, a reader sends a parameter request command to all unknown tags<h,R 2 >Wherein R is 2 Is a random seed; upon receipt of the request command, each unknown tag is hashed by H (EPC, R 2 ) After the hash result is obtained and the frame length is left to obtain a result b, then each tag constructs a vector with length h, wherein the value of the bit with index value b is 1, and the rest bits are 0.
4. The method for identifying unknown tags based on a large-scale RFID system according to claim 3, wherein step S6 specifically comprises: the reader broadcasts a vector L to all unknown tags in the system, wherein the memory of each tag stores another index vector y and is initialized to 0, and after receiving L, each unknown tag updates y by adding each m-bit element in L; if the updated value of y is equal to b, the unknown tag sends its EPC to the reader in the corresponding time slot, and the index value of the corresponding time slot is the index value of the "0" segment used for updating y in all the "0" segments; when an unknown tag sends EPC to the reader in a single time slot, the reader can correctly identify the unknown tag; if a plurality of unknown tags actually select a conflict time slot to send EPC, the reader cannot accurately identify all tags replied in the conflict time slot, and the unknown tags will participate in the next unknown tag identification phase, i.e. steps S4 to S6 are repeated until all the unknown tags are identified.
5. The method for identifying unknown tags based on a large-scale RFID system as defined in claim 4, wherein the number of known tags that are not deactivated during the ith cycle steps S1 through S3 is N i The number of unlabeled unknown labels is U i Probability P that a slot is a desired empty slot ei The method comprises the following steps:
probability P that one slot is a desired single slot si The method comprises the following steps:
6. The method for identifying unknown tags based on a large-scale RFID system as recited in claim 5, wherein in said S2, a probability that an unknown tag is tagged is P ei The expected value of the number of marked unknown labels in the current cycle is U i P ei 。
7. The method for identifying unknown tags based on a large-scale RFID system as recited in claim 6, wherein in said S3, the expected value of the number of unlabeled unknown tags is U i ·(1-P ei ) The method comprises the steps of carrying out a first treatment on the surface of the Probability P of a desired single time limit being selected by at least one unknown tag ui The method comprises the following steps:
probability P of successful deactivation of a known tag i The method comprises the following steps:
the expected value of the known number of tags that are deactivated in this cycle is:
N i+1 is the number of known tags that have not been deactivated during the i+1th cycle steps S1 through S3;
the total execution time T of the ith loop steps S1 to S3 i The method comprises the following steps:
wherein T is query Time for broadcasting parameter request for reader, T s1 Time, T, for transmitting 1-bit information in a single slot c For the duration of the conflicting time slots, t rt The expected value of the time taken for a reader to send 1 bit of information to a tag to deactivate a known tag is:
E i an expected value of time spent for deactivating a known tag during the ith cycle;
as is known from formula (7), when E i The optimal value of f can be obtained at the minimum.
8. The method for identifying unknown tags based on a large-scale RFID system as defined in claim 7, wherein U 'is used during the j-th cycle steps S4 to S6' j Representing the number of unknown tags that were not identified before the current cycle was performed, the probability P that a slot was not selected by any unknown tag n The method comprises the following steps:
one or more ofProbability P that a slot is selected by only one unknown tag d The method comprises the following steps:
the number of unknown tags identified during the j-th loop steps S4 to S6 is h·p d ;
Time T 'spent in the j-th cycle of steps S4 to S6' j The method comprises the following steps:
wherein T is sEPC Time cost, t, of a single slot used for tag transmission of 96-bit EPC tr Time, h (1-P) n ) For the number of "0" segments in vector W, the average length of all "0" segments isThe length of each fragment is +.>The binary number of bits represents;
the expected value of the time taken to identify an unknown tag is:
as is known from formula (11), when E' j And obtaining the optimal h value at the minimum.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310152344.3A CN116011478B (en) | 2023-02-23 | 2023-02-23 | Unknown label identification method based on large-scale RFID system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310152344.3A CN116011478B (en) | 2023-02-23 | 2023-02-23 | Unknown label identification method based on large-scale RFID system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116011478A CN116011478A (en) | 2023-04-25 |
CN116011478B true CN116011478B (en) | 2023-06-13 |
Family
ID=86023210
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310152344.3A Active CN116011478B (en) | 2023-02-23 | 2023-02-23 | Unknown label identification method based on large-scale RFID system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116011478B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108446577A (en) * | 2018-02-28 | 2018-08-24 | 北京宏诚创新科技有限公司 | Multi-label anti-collision method in high-frequency/ultrahigh frequency RFID recognition system |
CN113435220A (en) * | 2021-06-15 | 2021-09-24 | 扬州大学 | Method and device for estimating number of lost tags based on unreliable channel in RFID system |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8305194B2 (en) * | 2008-11-06 | 2012-11-06 | At&T Intellectual Property I, L.P. | Collision resolution protocol for mobile RFID tag identification |
US20160003932A1 (en) * | 2014-07-03 | 2016-01-07 | Lexmark International, Inc. | Method and System for Estimating Error in Predicted Distance Using RSSI Signature |
CN106384067B (en) * | 2016-08-31 | 2019-05-10 | 吉林大学 | A kind of RFID Unknown Label identifying system and recognition methods |
CN108510027B (en) * | 2018-04-02 | 2020-11-13 | 太原理工大学 | Method for label estimation and time slot pairing in large-scale RFID-based system |
CN110807339B (en) * | 2019-11-04 | 2023-04-14 | 中国石油大学(华东) | Lost label detection method of RFID system |
CN114781416B (en) * | 2022-04-06 | 2024-05-10 | 扬州大学 | Unknown label number estimation method and device based on unreliable channel in RFID system |
-
2023
- 2023-02-23 CN CN202310152344.3A patent/CN116011478B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108446577A (en) * | 2018-02-28 | 2018-08-24 | 北京宏诚创新科技有限公司 | Multi-label anti-collision method in high-frequency/ultrahigh frequency RFID recognition system |
CN113435220A (en) * | 2021-06-15 | 2021-09-24 | 扬州大学 | Method and device for estimating number of lost tags based on unreliable channel in RFID system |
Also Published As
Publication number | Publication date |
---|---|
CN116011478A (en) | 2023-04-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7612672B2 (en) | Query tree based tag identification method in RFID systems | |
CN110807339B (en) | Lost label detection method of RFID system | |
KR101048612B1 (en) | RFID tag recognition method to prevent RFID tag collision, RFID reader and RFID tag using same | |
US7425888B2 (en) | Methods for optimizing communications between an RFID reader and a tag population using non-sequential masking | |
US20100182128A1 (en) | Tag identification method, tag anticollision method, rfid tag | |
EP1818852B1 (en) | Interrogator, transponder and transponder identification method | |
US7626503B2 (en) | Bi-slot tree based tag identification method in RFID systems | |
Liu et al. | Efficient polling-based information collection in RFID systems | |
KR20060082503A (en) | Optimized binary search with anti-collision mathod and system | |
US11966807B2 (en) | Multi-tag concurrent identification method and system for query tree based on feature groups | |
Su et al. | A New RFID Anti‐collision Algorithm Based on the Q‐Ary Search Scheme | |
US7429912B2 (en) | Method for multi-reading a plurality of IDs | |
CN116011478B (en) | Unknown label identification method based on large-scale RFID system | |
CN109472177B (en) | Inventory method capable of reading TID (terminal identification) number of electronic tag | |
Liu et al. | Fast RFID polling protocols | |
CN110414286A (en) | A kind of RFID label tag collision-proof method | |
Xie et al. | Fast identification of multi-tagged objects for large-scale RFID systems | |
Wang et al. | Efficient tag grouping via collision reconciliation and data compression | |
KR101695965B1 (en) | Rfid reader and method for identifying rfid tag | |
Dong et al. | An Improved Binary Search Anti-Collision Protocol for RFID Tag Identification. | |
Kalache et al. | Performances comparison of RFID anti-collision algorithms | |
US20230113629A1 (en) | Tag Identification And Inventory Method And Apparatus, Reader, Medium And Computer Program | |
Hakeem et al. | Novel modulo based Aloha anti-collision algorithm for RFID systems | |
Lin et al. | Compact unknown tag identification for large-scale RFID systems | |
CN116127992A (en) | Unknown label identification method and system based on single-point selection RFID system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |