Next Article in Journal
Accuracy vs. Energy: An Assessment of Bee Object Inference in Videos from On-Hive Video Loggers with YOLOv3, YOLOv4-Tiny, and YOLOv7-Tiny
Next Article in Special Issue
Computing Offloading Based on TD3 Algorithm in Cache-Assisted Vehicular NOMA–MEC Networks
Previous Article in Journal
Performance Evaluation for Clinical Stroke Rehabilitation via an Automatic Mobile Gait Trainer
Previous Article in Special Issue
Mutual Coupling Reduction of a Multiple-Input Multiple-Output Antenna Using an Absorber Wall and a Combline Filter for V2X Communication
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Capture-Aware Dense Tag Identification Using RFID Systems in Vehicular Networks

1
School of Ocean Information Engineering, Jimei University, Xiamen 361000, China
2
Navigation Institute, Jimei University, Xiamen 361000, China
3
School of Informatics, Xiamen University, Xiamen 361000, China
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(15), 6792; https://doi.org/10.3390/s23156792
Submission received: 22 June 2023 / Revised: 24 July 2023 / Accepted: 27 July 2023 / Published: 29 July 2023

Abstract

:
Passive radio-frequency identification (RFID) systems have been widely applied in different fields, including vehicle access control, industrial production, and logistics tracking, due to their ability to improve work quality and management efficiency at a low cost. However, in an intersection situation where tags are densely distributed with vehicle gathering, the wireless channel becomes extremely complex, and the readers on the roadside may only decode the information from the strongest tag due to the capture effect, resulting in tag misses and considerably reducing the performance of tag identification. Therefore, it is crucial to design an efficient and reliable tag-identification algorithm in order to obtain information from vehicle and cargo tags under adverse traffic conditions, ensuring the successful application of RFID technology. In this paper, we first establish a Nakagami-m distributed channel capture model for RFID systems and provide an expression for the capture probability, where each channel is modeled as any relevant Nakagami-m distribution. Secondly, an advanced capture-aware tag-estimation scheme is proposed. Finally, extensive Monte Carlo simulations show that the proposed algorithm has strong adaptability to circumstances for capturing under-fading channels and outperforms the existing algorithms in terms of complexity and reliability of tag identification.

1. Introduction

The vehicle networking industry is booming due to the rapid development of emerging technologies such as edge computing, wireless communication, and artificial intelligence [1,2,3,4,5,6,7]. Compared to visual inspection technology, which relies on “seeing” assets, RFID solutions rely on “listening” by using ultra-high-frequency (UHF) signals to remotely interrogate RFID tags attached to or embedded in objects, which greatly improves the efficiency of traffic control systems, including electronic toll collection, cargo inspection, and vehicle entry control, among other applications [8,9].
A complete UHF RFID system consists of readers, UHF tags, and back-end servers [10]. Each tag has a globally unique electronic product code (EPC). However, collisions may occur when multiple vehicles or cargo tags use backward scattering modulation to respond to readers simultaneously on the same cascaded channel [11,12]. Therefore, the RFID system needs to effectively coordinate the network and employ anti-collision algorithms. Collisions between readers will also certainly occur in the application system for intensive readers. In particular, with the rise of reinforcement learning [13,14,15,16], it is necessary for RFID systems that a multi-reader anti-collision algorithm based on reinforcement learning is used. However, this paper focuses on the field of identifying tags for a single reader in densely distributed vehicular networks.
Anti-collision algorithms are divided into two categories: the tree-based algorithm [17,18,19] (including query tree and tree splitting) and the ALOHA-based algorithm [20,21,22,23]. The former requires high computing costs when solving the problem of tag starvation. In addition, when the length of the tag ID is long, the tree-based algorithm causes frequent time slot collision, resulting in a large identification delay [20]. In contrast, the ALOHA-based algorithm guarantees equal opportunity for tags in random access, especially in table-dense scenarios with better adaptability [21]. It is favored by most RFID vendors due to its compliance with EPC Class 1 Gen2 UHF standards [24]. The ALOHA-based tag-identification algorithm is designed for rapid vehicle identification on expressways [22,23]. However, the aforementioned works do not comprehensively take into account actual difficulties and simply concentrate on tag recognition in ideal circumstances, neglecting the capture effect.
In Figure 1, as roadside observers, readers can swiftly discern multiple densely clustered tags within each vehicle as they congregate at intersections and obtain reliable target information by using RFID technology [25]. However, in wireless communication, the capture effect is a ubiquitous phenomenon [26]. For instance, in scenarios of checkpoints and intersections, tag density increases significantly with vehicle aggregation, which causes a complex RFID channel condition and frequent timeslots collision. The impact of the capture effect on the system is amplified as the number of collision timeslots increases. Furthermore, for the densely distributed tags, identification delay is a crucial issue for vehicular networks. Thus, it is necessary to mitigate the capture effect under collision timeslots to reduce identification delay and improve system efficiency.
An analytic model for the capture effect categorizes tags based on signal strength [27]. Subsequently, to study the relationship between frame length and the number of tags that can be identified under unreliable channels, some work has focused on improving the efficiency of tag identification through capture-aware anti-collision schemes on the reader side [28,29,30,31]. The capture-aware backlog-estimation algorithm (CMEBE) estimates tag population and the probability of the capture effect with two-dimensional searches for minimum values [28]. However, it is difficult for the the CMEBE algorithm to guarantee identification performance under a large-scale tag environment. A capture-aware estimation (CAE) algorithm also simultaneously estimates the tag population and the probability of capture effect based on the number of idle slots in a frame [29]. Although it has low computational complexity, the algorithm fails in tag identification when the number of tags is much larger than the frame length. Minimum mean square error (MMSE) and Bayesian mean square estimation (CBMS) are proposed respectively in Ref. [30,31] for large-scale tag identification scenarios. However, the computational cost is increased because the algorithm uses a 2D search. Although researchers have begun to study the effect of capture on the system identification rate of RFID systems, this study is still in its infancy. They only give a fixed value of the capture probability, and the estimation performance and computational cost need to be improved.
Some researchers have explored the capture effect by establishing an RFID model through the stochastic distribution of tag positions, using a uniform or sigmoid-shaped distribution function for distance. In Ref. [32], the authors discussed an RFID model related to the capture effect under unreliable fading channel conditions. In Ref. [33,34], the authors provided a collision-avoidance algorithm for mobile tags under complex channel conditions. However, these studies fail to account for the impact of the capture effect on system identification efficiency in scenarios where tags are densely distributed within a specific area. In fact, due to the dense concentration of numerous tags in a particular region, the wireless channel becomes highly complex during tag identification [35,36], significantly affecting the identification efficiency of the system. Relying on path-loss analysis to determine capture probability is insufficient. In Ref. [37], the authors discussed the advantages of the RFID system in traffic recognition compared to visual detection under dense tags and proposed a traffic sign inventory-management system. However, it does not further study the reader’s recognition performance in the context of dense tags. Therefore, it is unclear how the capture effect behaves when tags are located at the same distance or densely distributed. In this work, we construct a channel model to explore and analyze the capture probability of dense tag distributions and their influence on the performance of tag-identification algorithms. The contributions of this paper are as follows:
  • A fading channel-capture model is established to analyze the capture probability in different channel environments, and the closed expression of the Nakagami-m fading channel capture probability is derived.
  • We propose an advanced capture-aware estimation algorithm that quickly adjusts the initial frame length through the first few timeslots in a frame, reduces the delay caused by the lack of prior knowledge of the number of tags, and improves the estimation performance of both tags and capture probabilities.
  • Considering the capture effect in fading channels and the duration of the slots, this paper dynamically adjusts the size of the next frame by combining the estimate of the number of tags and the capture probability, thus greatly improving the tag-identification rate. Compared with other excellent algorithms, the estimation method proposed in this paper shows better identification performance.
The remainder of the paper is organized as follows. Section 2 introduces the background, Section 3 establishes the system model, Section 4 shows the proposed estimation algorithm and the optimal frame length strategy. The numerical and analytical results are presented in Section 5, and Section 6 concludes the paper with an overview of some crucial points.

2. Background

2.1. Brief Analysis of ALOHA-Based Anti-Collision Algorithm

Each time slot in the UHF RFID system is expected to have three states: collision, successful, and idle. Based on statistics, the probability of collision timeslots, successful timeslots, and idle timeslots in the ALOHA algorithm follows a binomial distribution
p r = n r 1 l 1 1 l n r
where n is the number of tags in the system, r is the number of tags in the same timeslot, and l is the size of the frame length. Therefore, the number of idle timeslots is N i = l p 0 , the number of success timeslots is N s = l p 1 , and the number of collision timeslots can be expressed as N c = l N i N s . Compared to the basic frame-slotted ALOHA (FSA) with a fixed frame length, the dynamic frame-length adjustment algorithm (DFSA) dynamically adjusts the size of the next frame according to the number of tags, which makes tag identification more stable [38]. Therefore, the next frame length needs to be determined by the backlog of the number of unidentified tags, which requires the system to estimate it in advance. At present, the anti-collision scheme in the two major standards, EPC C1 G2 standard and ISO18000-6C standard TypeA [39], is based on the DFSA.

2.2. The Entire System under the Capture Effect

In fact, due to the near–far effect and the random fluctuation of the received signal power caused by fading and shading, the probability of a packet being successfully received is significant even when multiple packets are transmitted at the same timeslot, which is called the capture effect [40]. An example of detection results from ALOHA, when the capture effect occurs, can be seen in Figure 2, where the collision state can transform into a successful state with a certain probability because of the capture effect. Therefore, the application of traditional tag estimation and its optimal frame configuration is challenging due to inaccurate backlog estimation, which in turn poses an obstacle to the identification performance of UHF RFID tags [34].
Under the capture effect, if the capture probability is α , then the numbers of idle timeslots, successful timeslots, and collision timeslots are as follows
N i c a p = N i N s c a p = N s + N c α N c c a p = N c N c α .
If the duration of all three states is equal, the system throughput can be expressed as
η = N s c a p N i c a p + N s c a p + N c c a p = n l 1 1 l n 1 + 1 1 1 l n 1 + n l 1 α .
Figure 3 presents the expectation of system throughput under the non-capture effect and capture effect when a fixed frame length and the DFSA are adopted. The results show that the capture effect can enhance system throughput. This work has defaulted to the traditional frame-length adjustment scheme for DFSA, which sets the next frame length to an unrecognized number of tags. The first curve in the legend using DFSA converges to the optimal value of FSA under non-capture effects. The second curve cannot converge to the optimal value of FSA under the capture effect, which indicates that the next frame length cannot simply be set to an unidentified number of tags under the capture effect. Therefore, the adjustment of the next frame length under the capture effect needs further research, which will be discussed in Section 4.

3. Capture Model of High-Density Tag Distribution

To analyze the capture effect in densely distributed tags and its impact on anti-collision algorithms, this work models this complex channel and uses a fading channel to simulate interference and the attenuation of RF signals during transmission.
From Figure 4, the reader communicates with n tags densely stored in each container through one channel, which is characterized by its connection to two channels, namely the forward link and the reverse link. The forward channel coefficient h f , D describes the signal propagation from the reader to the tag, while the reverse channel coefficient h b , D describes the signal propagation from the tag to the reader after scattering.
In a fading channel, signal strength varies randomly due to multipath propagation, shadowing effects, and other factors. Thus, this work takes the strength of the signal received between the tags as a sample of the signal during that period.
In Section 2, this work concludes that the capture effect occurs during the collision timeslot. Therefore, this work assumes that there are s ( s 2 , s max ) tags in a collision timeslot, where s m a x is the maximum number of tags. The t-th tag is successfully captured, and the remaining s 1 tags are interference tags or noise for the RFID capture model, where tags are located at the same distance. Then, the probability of the t-th tag being captured can be defined as
M s q = P r P R t > q P R I S
where P R t is the received power from the t-th tag, P R I S = k = 1 s 1 P R d , r x , k is the hidden power from other tags, and q represents the power ratio threshold, which represents the minimum carrier-to-Interference Ratio (CIR) required by the reader to receive signals successfully. This CIR is primarily determined by the modulation mode and coding scheme used by the reader. The capture probability can then be written as [41]
α = s 0 f p t p t M s q d p t = s 0 f p t p t 0 p t / q f p s 1 p s 1 d p s 1 d p t
where f p s 1 p s 1 is the pdf (for the power) that results from the convolution of s 1 non-central Chi-square pdf’s.
According to the expression [34] for the received power of a reader in free space, assuming constant transmit power and carrier frequency of the reader, the received power is inversely proportional to distance d. However, when tags are densely distributed and located very close to each other, the distance between each tag and the reader is also close. Assuming equal reflected power from each interference tag, this work uses the default that the power of other interference signals received by the reader in each collision slot is approximately equal. In addition, these articles [42,43,44] assume that the wireless channel of the RFID system experiences Rayleigh fading and Rician fading. However, Nakagami-m is a multi-application model that is suitable for various channel conditions [45], and its distribution is closer to experimental data in various wireless communication environments [46]. Therefore, this work considers a Nakagami-m fading channel, ignoring the effect of propagation path loss and assuming that the mean received power of all interfering signals is the same. It is worth noting that the Nakagami-m fading channel model is only used to simulate the noise and attenuation effects on the signal during transmission, and it cannot accurately describe the mutual coupling effect between tags. And the instantaneous received power in Nakagami-m fading channel is then given by
f p p = m m p m 1 p ¯ m Γ m e m p p ¯ p 0 , m 0.5
where m is the channel fading parameter, p ¯ is the average power of the tag’s signal, and  Γ m represents the Gamma function. This work was derived by adopting the Laplace and inverse Laplace transformation of the expressions for the PDF, but the details are omitted in this paper for brevity. Consequently, the compound PDF results from the convolution of n 1 PDFs of received power can be written as
f p s 1 p s 1 = m m s 1 Γ m s m p ¯ m s 1 p s 1 m s m 1 e m p s 1 p ¯ .
Substituting (6) and (7) into (5), we can obtain [47]
α N a k s , q , m = s Γ m Γ m s m k = 0 1 k Γ m s + k k ! m s m + k q m s m + k .
It can be seen from the above formula that the capture effect for the RFID system is not only affected by the capture threshold q and the channel parameter m but also by the number of tags s in the collision timeslots.

4. Capture-Aware Algorithm for Large-Scale Tag Identification

4.1. Proposed Estimation Algorithm

The capture-aware algorithm can achieve parameter estimation by counting the number of different timeslot states observed after each frame and further adjusting the frame length to improve the efficiency of tag identification. However, due to the lack of prior knowledge of the number of tags, especially during large-scale intensive tag identification, it is difficult for the initial frame length to match the true number of tags, which negatively affects the system’s efficiency of tag identification [29]. When the number of tags is much larger than the initial frame length, there are many collision timeslots in a frame, and tag identification efficiency is very low, and on the other hand, many idle timeslots can also affect the system’s identification delay. Therefore, we propose a method of solving the problem of matching the initial frame length to an unknown number of tags by using the first several timeslots in a frame. In this work, we define the probability that there are no idle timeslots in the first w timeslots, which can be expressed as
P w = 1 i = 1 w w i p I i 1 p I w i
where the probability p I of the idle timeslot can be expressed as a I / l . When l  = 128, theoretical and simulation results P w are given in Table 1, where w = 1 to 8 and the number of tags n varies from 50 to 1000.
The results from Table 1 indicate that the probability P w of having all non-empty timeslots in the first w timeslots increases with the number of tags regardless of the value of w. In the context of large-scale RFID tags, the initial frame length can be rapidly adjusted according to l = μ l when P w is close to 1. It is worth noting that P w being close to 1 is not an exact expression, and in experiments, we need to perform relevant debugging based on w and the parameter σ to determine the conditions for the rapid adjustment of the initial frame length, which will be introduced in Algorithm 1. Indeed, the estimation strategy of the proposed algorithm can be divided into two parts: the estimation of tags’ numbers and the estimation of capture probability. Then, considering that the number of idle timeslots observed by the reader is not affected by the capture effect of Nakagami-m fading channels, the number of tags can be estimated using idle timeslots. Invert N i = l p 0 and replace N i with the observed value c i c a p and the proposed algorithm estimates the number of tags by
n ^ = ln c i c a p / l ln 1 1 / l , c i c a p 0 .
Algorithm 1: Pseudo-code operation of a reader.
Sensors 23 06792 i001
In addition, the number of unidentified tags in the i + 1 -th frame is b a c k l o g = n e s t c s if the estimated number of tags is n e s t after the i-th frame; then, the capture probability α can be shown to be
α ^ c a p = a r g min α c a p P E c s c a p N s 2 + c c c a p N c 2
based on the minimum mean square error. The proposed algorithm can accurately search the capture probability under the fading channel, where c s c a p and c c c a p denote the observed numbers of successful and collision timeslots, respectively; N s and N c denote their expectations, respectively; and P can be expressed as P = α c a p | 0 α c a p 1 .

4.2. Frame Length Adjustment

In Section 2, it is observed that collision timeslots have the potential to convert into successful timeslots in the capture environment. However, setting a frame length that is too long may increase idle timeslots and ultimately lead to time slot waste. Conversely, reducing the frame length can increase the likelihood of capturing transmission slots but may also decrease system identification efficiency. Therefore, this paper proposes an optimal method for frame-length adjustment. Combining Equation (3) and capture-aware efficiency with the duration of different time slots can then be written as
η i d = N s t s + N c t c α c a p N i t i + N s t s + N c t c
where t i , t s and t c can be expressed as the duration of the idle time slot, the successful time slot, and the collision time slot, respectively. Divide the numerator and denominator of the above equation by t s . Let u = t i / t s , υ = t c / t s and take a linear model ( l = k n , k R + ) into account [48]. Combining the lim n ( 1 1 / k n ) n = e 1 / k , we can obtain
η i d 1 k e 1 k + k 1 + α N a k 1 + k u k e 1 k k 1 + v + 1 v α N a k .
Then, the optimal frame length can be written by
l o p t = k * n ^
where k * = a r g max k k ( η i d ) , k denotes the searching range of k and · is a floor integer function.
Table 2 shows the performance comparison between equal timeslots and unequal timeslots. According to the different frame size and system-throughput values corresponding to different channel shape parameters, we find that the method under an unequal time slot is better than the method under an equal time slot, which further verifies that the time slot setting in EPC C1 G2 protocol is still suitable under the influence of fading channel capture effect. Next, according to Equation (14), this work establishes the relationship between n and the optimal frame length l o p t for different channel parameters m adopting the EPC C1 G2 standard, as depicted in Figure 5. It is evident that when the number of tags is constant, the RFID system requires a greater optimal frame length as m increases.

4.3. Description of the Algorithm

In the proposed algorithm, an identification cycle is depicted, which is implemented as shown in Algorithm 1.
To recognize densely distributed large-scale tags, the reader will send a query command with a short frame l after initializing the parameters. Then, the tag will randomly select a time slot from the frame and respond to the query command. After that, the S l o t _ d i f f ( w ) and σ are compared, where S l o t _ d i f f ( w ) is used to record the calculation results of the first w slot states, and σ can control the pace of the frame length adjustment (w = 4, σ = 1 in this work). If the former is larger than the latter, a dynamic adjustment of the initial frame length l is performed according to the method of l = κ l . Otherwise, the adjustment is completed. After sending the query command with the frame length l, the reader will count the idle slots after each frame ends to estimate the number of tags. It will also count the number of successful slots and collision slots to estimate the capture probability. Finally, the optimal frame length is found according to the Formulas (12)–(14), and the reader will send a query command with the next frame length until all tags are recognized.

5. Numerical and Analytical Result

In this section, numerical results are presented to verify the performance of the proposed algorithm. The random data used in the experiments were generated using MATLAB’s internal function (MATLAB Version: 9.14.0.2194193 (R2023a)). Firstly, the capture effect was simulated using the Monte Carlo method, and 10,000 independent experiments were performed to obtain the average results. Simulation results, including Figure 6 and Figure 7, are presented to investigate the impact of various parameters on the capture performance of Nakagami-m fading channels in a dense tags environment. In the experiment, the numbers of collision slot tags were set to two, three, and four, and the theoretical value in the closed expression of capture probability in the Nakagami-m fading channel in Section 3 was compared with the actual value. Then, in order to more intuitively explore the influence of other factors on the capture effect, a 3D surface diagram of the capture probability under the Nakagami-m fading channel was presented in Figure 6. Additionally, in order to validate the performance and versatility of the proposed algorithm in estimating the capture probability, the capture probability under the actual Nakagami-m fading channel was not used. Instead, the search range for the capture probability was set to a larger range, α = 0 , 0.1 , 0.2 , , 1 , and the step size was 0.1. The prior distribution of the tag was set to be uniform over the range of μ , where μ varies from 50 to 1000. The search range for the tag of the CMEBE and MMSE, CBMS algorithms was set to N = c s c a p + 2 c c c a p n N max | n Z , where N max = 1000 . In the experiments, the initial frame length of the proposed algorithm was set to 128. The parameters w, κ , and σ were set to 4, 2, and 0.85 in the proposed algorithm, respectively. Based on the analysis in Table 2, the setting of time slot duration was t i = 50 μ s, t s = 400 μ s, and t c = 200 μ s ( u = 0.125 , v = 0.5 ), which is consistent with the EPC C1 G2 Protocols, and the VOGT [49] algorithm used an equal duration for all timeslots. To evaluate the performance of an algorithm, the estimation error is defined as e r r o r = x x ^ x × 100 % .
Figure 6 shows that when the capture threshold is constant, the capture effect is related to these two factors, which are the shape parameter m of the fading channel and the number of tags s in the collision timeslots. Among them, the value of the capture probability decreases with the increase in the shape parameter m of the channel; in other words, a larger m will make the capture effect more difficult to occur. The capture probability also decreases as the number of tags in the collision timeslots increases.
Figure 7 presents the same trend as Figure 6 and also shows that the capture probability is closely related to the coding and modulation capability of the reader. When the capture threshold is set to a large size, the conditions for satisfying the capture will be more stringent, such as q = 7 , m = 2 , and the capture probability is only 0.08 ( s = 2 ).
Afterward, we conducted simulations to evaluate the estimation performance of the proposed algorithm. The simulation results are shown in Figure 8 and Figure 9. In Figure 8, we compare the estimation error of the capture probability of the proposed algorithm with that of other algorithms. The results show that the estimation error of the capture probability of all four algorithms decreases as the capture probability increases. Compared with the other algorithms, the estimation algorithm for capture probability proposed in this paper demonstrates good estimation performance in the range of capture probabilities from 0 to 0.5. For example, when the capture probability is 0.2, the estimation error of the proposed algorithm is only 3.46%, much lower than that of the other three algorithms. Additionally, Figure 7 shows that the capture probability is usually small under a fading channel, which further demonstrates the superiority of the proposed algorithm.
Figure 9 illustrates the tag estimation performance of various algorithms in the presence of the capture effect. Notably, CMEBE and CAE exhibit suboptimal tag-estimation accuracy when the number of tags is large. Specifically, when there are more than 700 tags, CAE’s estimation algorithm becomes invalid due to a lack of free timeslots caused by mismatched initial frame length during tag estimation, which significantly impairs its performance. Because the VOGT algorithm does not have the capture sensing ability, it has a large estimation error when the number of tags exceeds 200. In contrast, both MMSE and CBMS and our proposed algorithm employ an identical initial frame-length-adjustment mechanism, resulting in similar performance trends for tag estimation. Simulation results indicate that with 1000 tags, the proposed algorithm achieves a tag estimation error of only 1.94%, which is a reduction of 29.96% compared to the MMSE, CBMS algorithm and 70.29% compared to the CAE algorithm. Therefore, this paper’s proposed algorithm exhibits superior tag estimation performance in the presence of a capture effect under fading channels.
The capture probability of a Nakagami-m fading channel is not only related to the encoding and modulation method of the reader but also depends on the degree of fading and the number of tags in the collision epoch. Therefore, compared to a fixed capture effect, we need to deeply explore the impact of different estimation algorithms on the stability of tag identification under the parameters of channel fading.
To simplify the analysis of the role of the capture effect in collision-avoidance strategies, we assume that the reader can count the number of tags in the collision epoch and use the formula, combined with the setting of the capture threshold, to obtain the probability of the occurrence of capture effect in different collision epochs under the fading channel. In this experiment, the number of tags is n = 700 , and the capture threshold is set to q = 2 .
When the capture threshold is fixed, the probability of the occurrence of the capture effect is mainly affected by the shape parameters of the fading channel. Therefore, different shape parameters will affect the efficiency of tag identification in the system. However, by combining with the channel environment, we can set the optimal next frame length to achieve the optimal overall efficiency of tag identification. To determine the next frame length in the VOGT algorithm, this article employs the method l n e x t = n ^ c s c a p . In contrast, for the CAE and CMEBE algorithms, method l n e x t = α ^ + 1 α ^ n ^ c s c a p is utilized to determine the subsequent frame length. As for both MMSE and CBMS and our proposed algorithm, we adjust the next frame length using the formulas (12)–(14).
Figure 10 shows the influence of shape parameters of the Nakagami-m fading channel on the tag-identification efficiency under different algorithms, in which channel shape parameters reflect the fading degree of the channel. When m = 1 , the fading channel follows Rayleigh distribution. It can be seen that the identification efficiency of the five algorithms decreases with the increase in the channel-shape parameter m, among which the VOGT algorithm has the worst tag-identification performance. When the shape parameter m = 0.5 , the proposed algorithm is very close to the tag-identification efficiency of CMEBE, CAE, MMSE, and CBMS, all reaching 83%, mainly because their estimation performance is not different when the capture probability is large. However, with the increase in the channel shape parameters, the capture effect becomes smaller. When m = 3 , the identification efficiency of the proposed algorithm is 76.83%, only declining by about six percentage points, indicating that the proposed algorithm exhibits strong stability compared to other algorithms.
Next, we employ the Big O notation to obtain the computational complexity of the proposed algorithm with that of pre-existing algorithms. Here, we specify that the set of estimation tags n and capture effect α of the above algorithm are N and P, respectively. Assuming that ε = P , φ = N , where · represents the cardinality of the set, the VOGT method needs to gradually search for an extreme value within a certain number of tags, and its computational complexity can be approximated as O i = 1 φ n ˜ i . CMEBE, MMSE, and CBMS all require a two-dimensional search for the number of tags and probability of capture effect. The computational complexity of CMEBE, MMSE, and CBMS can be approximated as O ε i = 1 φ n ˜ i , where n ˜ i represents the i search value of the number of tags, and CAE and the algorithms proposed in this paper involve one-dimensional searches, with the CAE algorithm having a complexity approximation of O 1 . The proposed algorithm has an estimated complexity of O ε .
Thus, based on the proposed model, a conclusion can be drawn from the experiment that the estimation performance and tag-identification efficiency of the proposed algorithm are better than those of other algorithms. Among them, Table 3 indicates that the proposed scheme possesses the features of low complexity and high identification efficiency in vehicular network tag identification.

6. Conclusions

In this paper, a Nakagami-m fading-channel-capture model is established based on vehicle cargo tags in a large-scale environment with dense tags, and an effective capture-aware estimation algorithm is proposed. Both theoretical analysis and simulation results have shown that the proposed capture-aware algorithm is superior to the reference algorithms. In addition, we derive the optimal frame length for different durations of slots, further confirming that the duration settings of slots in the EPC C1 G2 standard are also applicable in the channel capture model. Next, we will develop a reader equipped with capture-aware technology that is in line with the current level of hardware development and conduct real-world testing on dense vehicle tags or cargo tags to further enhance its performance.

Author Contributions

Conceptualization, W.X. and Z.S.; methodology, W.X. and Y.S.; software, Z.S.; validation, L.L.; formal analysis, W.X.; investigation, Y.W.; resources, W.X.; data curation, L.L.; writing—original draft preparation, W.X. and Z.S.; writing—review and editing, Z.S., Y.S. and Y.W.; visualization, W.X. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Guidance Projects of FuJian Science and Technology Agency: 2022H0022 and the Project of the Xiamen Science and Technology Bureau: 2022CXY0317.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data that support the findings of this study are available from the corresponding authors upon reasonable request.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Wu, Q.; Nie, S.; Fan, P.; Liu, H.; Qiang, F.; Li, Z. A swarming approach to optimize the one-hop delay in smart driving inter-platoon communications. Sensors 2018, 18, 3307. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  2. Wu, Q.; Zheng, J. Performance modeling and analysis of the ADHOC MAC protocol for VANETs. In Proceedings of the 2015 IEEE International Conference on c Communications (ICC), London, UK, 8–12 June 2015; pp. 3646–3652. [Google Scholar]
  3. Wu, Q.; Zhao, Y.; Fan, Q.; Fan, P.; Wang, J.; Zhang, C. Mobility-aware cooperative caching in vehicular edge computing based on asynchronous federated and deep reinforcement learning. IEEE J. Sel. Top. Signal Process. 2022, 17, 66–81. [Google Scholar] [CrossRef]
  4. Wu, Q.; Shi, S.; Wan, Z.; Fan, Q.; Fan, P.; Zhang, C. Towards V2I age-aware fairness access: A dqn based intelligent vehicular node training and test method. arXiv 2022, arXiv:2208.01283. [Google Scholar]
  5. Fan, J.; Yin, S.; Wu, Q.; Gao, F. Study on refined deployment of wireless mesh sensor network. In Proceedings of the 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), Chengdu, China, 23–25 September 2010; pp. 1–5. [Google Scholar]
  6. Wu, Q.; Zheng, J. Performance modeling and analysis of the ADHOC MAC protocol for vehicular networks. Wirel. Netw. 2016, 22, 799–812. [Google Scholar] [CrossRef]
  7. Wu, Q.; Xia, S.; Fan, P.; Fan, Q.; Li, Z. Velocity-adaptive V2I fair-access scheme based on IEEE 802.11 DCF for platooning vehicles. Sensors 2018, 18, 4198. [Google Scholar] [CrossRef] [Green Version]
  8. Olaby, O.; Hamadache, M.; Soper, D.; Winship, P.; Dixon, R. Development of a novel railway positioning system using RFID technology. Sensors 2022, 22, 2401. [Google Scholar] [CrossRef]
  9. Shariq, M.; Singh, K.; Maurya, P.K.; Ahmadian, A.; Taniar, D. AnonSURP: An anonymous and secure ultralightweight RFID protocol for deployment in internet of vehicles systems. J. Supercomput. 2022, 78, 8577–8602. [Google Scholar] [CrossRef]
  10. Park, S.; Lee, H. Self-recognition of vehicle position using UHF passive RFID tags. IEEE Trans. Ind. Electron. 2012, 60, 226–234. [Google Scholar] [CrossRef]
  11. Qin, H.; Chen, W.; Chen, W.; Li, N.; Zeng, M.; Peng, Y. A collision-aware mobile tag reading algorithm for RFID-based vehicle localization. Comput. Netw. 2021, 199, 108422. [Google Scholar] [CrossRef]
  12. Wang, H.; Wang, S.; Yao, J.; Pan, R.; Huang, Q.; Zhang, H.; Yang, J. Effective anti-collision algorithms for RFID robots system. Assem. Autom. 2019, 40, 55–64. [Google Scholar] [CrossRef]
  13. Wu, G.; Xu, Z.; Zhang, H.; Shen, S.; Yu, S. Multi-agent DRL for joint completion delay and energy consumption with queuing theory in MEC-based IIoT. J. Parallel Distrib. Comput. 2023, 176, 80–94. [Google Scholar] [CrossRef]
  14. Zhang, P.; Chen, N.; Shen, S.; Yu, S.; Kumar, N.; Hsu, C.H. AI-Enabled Space-Air-Ground Integrated Networks: Management and Optimization. IEEE Netw. 2023. [Google Scholar] [CrossRef]
  15. Shen, S.; Wu, X.; Sun, P.; Zhou, H.; Wu, Z.; Yu, S. Optimal privacy preservation strategies with signaling Q-learning for edge-computing-based IoT resource grant systems. Expert Syst. Appl. 2023, 225, 120192. [Google Scholar] [CrossRef]
  16. Wang, C.; Jiang, C.; Wang, J.; Shen, S.; Guo, S.; Zhang, P. Blockchain-Aided Network Resource Orchestration in Intelligent Internet of Things. IEEE Internet Things J. 2022, 10, 6151–6163. [Google Scholar] [CrossRef]
  17. Li, G.; Sun, H.; Li, Z.; Wu, P.; Inserra, D.; Su, J.; Fang, X.; Wen, G. A Dynamic Multi-ary Query Tree Protocol for Passive RFID Anti-collision. CMC Comput. Mater. Contin. 2022, 72, 4931–4944. [Google Scholar] [CrossRef]
  18. Zhang, H.; Gao, L.; Luo, H.g.; Zhai, Y. Research on the RFID anticollision strategy based on decision tree. Wirel. Commun. Mob. Comput. 2022, 2022, 2913157. [Google Scholar] [CrossRef]
  19. Yang, X.; Wu, B.; Wu, S.; Liu, X.; Zhao, W.W. Time Slot Detection-Based M-ary Tree Anticollision Identification Protocol for RFID Tags in the Internet of Things. Wirel. Commun. Mob. Comput. 2021, 2021, 6638936. [Google Scholar] [CrossRef]
  20. Zhang, G.; Tao, S.; Cai, Q.; Gao, W.; Jia, J.; Wen, J. A fast and universal RFID tag anti-collision algorithm for the Internet of Things. IEEE Access 2019, 7, 92365–92377. [Google Scholar] [CrossRef]
  21. Zhong, D. An ALOHA-Based Algorithm Based on Grouping of Tag Prefixes for Industrial Internet of Things. Secur. Commun. Netw. 2022, 2022, 1812670. [Google Scholar] [CrossRef]
  22. Nafar, F.; Shamsi, H. Design and implementation of an RFID-GSM-based vehicle identification system on highways. IEEE Sens. J. 2018, 18, 7281–7293. [Google Scholar] [CrossRef]
  23. Qu, Z.; Sun, X.; Chen, X.; Yuan, S. A novel RFID multi-tag anti-collision protocol for dynamic vehicle identification. PLoS ONE 2019, 14, e0219344. [Google Scholar] [CrossRef]
  24. Global, E. EPC radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 MHz–960 MHz. Version 2008, 1, 23. [Google Scholar]
  25. Menon, V.G.; Jacob, S.; Joseph, S.; Sehdev, P.; Khosravi, M.R.; Al-Turjman, F. An IoT-enabled intelligent automobile system for smart cities. Internet Things 2022, 18, 100213. [Google Scholar] [CrossRef]
  26. Salah, H.; Ahmed, H.A.; Robert, J.; Heuberger, A. A time and capture probability aware closed form frame slotted ALOHA frame length optimization. IEEE Commun. Lett. 2015, 19, 2009–2012. [Google Scholar] [CrossRef]
  27. Shin, W.J.; Kim, J.G. A capture-aware access control method for enhanced RFID anti-collision performance. IEEE Commun. Lett. 2009, 13, 354–356. [Google Scholar] [CrossRef]
  28. Li, B.; Wang, J. Efficient anti-collision algorithm utilizing the capture effect for ISO 18000-6C RFID protocol. IEEE Commun. Lett. 2011, 15, 352–354. [Google Scholar] [CrossRef]
  29. Yang, X.; Wu, H.; Zeng, Y.; Gao, F. Capture-aware estimation for the number of RFID tags with lower complexity. IEEE Commun. Lett. 2013, 17, 1873–1876. [Google Scholar] [CrossRef]
  30. Wang, Y.; Wu, H.; Zeng, Y. Capture-aware estimation for large-scale RFID tags identification. IEEE Signal Process. Lett. 2015, 22, 1274–1277. [Google Scholar] [CrossRef]
  31. Wu, H.; Wang, Y.; Zeng, Y. Capture-aware Bayesian RFID tag estimate for large-scale identification. IEEE/CAA J. Autom. Sin. 2017, 5, 119–127. [Google Scholar] [CrossRef]
  32. Chen, Y.; Feng, Q.; Senior Member, I.; Jia, X.; Chen, H. Modeling and analyzing RFID generation-2 under unreliable channels. J. Netw. Comput. Appl. 2021, 178, 102937. [Google Scholar] [CrossRef]
  33. Wang, H.; Yu, R.; Pan, R.; Liu, M.; Huang, Q.; Yang, J. Fast tag identification for mobile RFID robots in manufacturing environments. Assem. Autom. 2021, 41, 292–301. [Google Scholar] [CrossRef]
  34. Su, J.; Sheng, Z.; Liu, A.X.; Han, Y.; Chen, Y. Capture-aware identification of mobile RFID tags with unreliable channels. IEEE Trans. Mob. Comput. 2020, 21, 1182–1195. [Google Scholar] [CrossRef]
  35. Katagi, T.; Ohmine, H.; Miyashita, H.; Nishimoto, K. Analysis of mutual coupling between dipole antennas using simultaneous integral equations with exact kernels and finite gap feeds. IEEE Trans. Antennas Propag. 2016, 64, 1979–1984. [Google Scholar] [CrossRef]
  36. Sarkar, B.; Takeyeva, D.; Guchhait, R.; Sarkar, M. Optimized radio-frequency identification system for different warehouse shapes. Knowl.-Based Syst. 2022, 258, 109811. [Google Scholar] [CrossRef]
  37. Chen, W.; Childs, J.; Ray, S.; Lee, B.S.; Xia, T. RFID Technology Study for Traffic Signage Inventory Management Application. IEEE Trans. Intell. Transp. Syst. 2022, 23, 17809–17818. [Google Scholar] [CrossRef]
  38. Schoute, F. Dynamic frame length ALOHA. IEEE Trans. Commun. 1983, 31, 565–568. [Google Scholar] [CrossRef]
  39. Mokhtari, A.; Atani, R.E.; Maghsoodi, M. Using capture effect in DFSA anti-collision protocol in RFID systems according to ISO18000-6C standard. Majlesi J. Mechatron. Syst. 2012, 1, 26. [Google Scholar]
  40. Wang, J.; Shi, Y.; Yang, C.; Ji, S.; Su, H. Research on fading characteristics of ultrahigh frequency signals in Karst landform around radio quiet zone of FAST. Radio Sci. 2020, 55, 1–10. [Google Scholar] [CrossRef]
  41. Wang, Y.; Shi, J.; Chen, L.; Lu, B.; Yang, Q. A novel capture-aware TDMA-based MAC protocol for safety messages broadcast in vehicular ad hoc networks. IEEE Access 2019, 7, 116542–116554. [Google Scholar] [CrossRef]
  42. Sabesan, S.; Crisp, M.J.; Penty, R.V.; White, I.H. Wide area passive UHF RFID system using antenna diversity combined with phase and frequency hopping. IEEE Trans. Antennas Propag. 2013, 62, 878–888. [Google Scholar] [CrossRef]
  43. Gao, Y.; Chen, Y.; Bekkali, A. Performance of passive UHF RFID in cascaded correlated generalized Rician fading. IEEE Commun. Lett. 2016, 20, 660–663. [Google Scholar] [CrossRef] [Green Version]
  44. Zhang, Y.; Gao, F.; Fan, L.; Lei, X.; Karagiannidis, G.K. Secure communications for multi-tag backscatter systems. IEEE Wirel. Commun. Lett. 2019, 8, 1146–1149. [Google Scholar] [CrossRef]
  45. Jameel, F.; Haider, M.A.A.; Butt, A.A. Performance analysis of VANETs under Rayleigh, Rician, Nakagami-m and Weibull fading. In Proceedings of the 2017 International Conference on Communication, Computing and Digital Systems (C-CODE), Islamabad, Pakistan, 8–9 March 2017; pp. 127–132. [Google Scholar]
  46. Zhang, Y.; Gao, F.; Fan, L.; Lei, X.; Karagiannidis, G.K. Backscatter communications over correlated Nakagami-m fading channels. IEEE Trans. Commun. 2018, 67, 1693–1704. [Google Scholar] [CrossRef]
  47. Wang, Y.; Shi, J.; Chen, L. Capture Effect in the FSA-Based Networks under Rayleigh, Rician and Nakagami-m Fading Channels. Appl. Sci. 2018, 8, 414. [Google Scholar] [CrossRef]
  48. Khandelwal, G.; Lee, K.; Yener, A.; Serbetli, S. ASAP: A MAC protocol for dense and time-constrained RFID systems. EURASIP J. Wirel. Commun. Netw. 2007, 2007, 18730. [Google Scholar] [CrossRef] [Green Version]
  49. Vogt, H. Efficient object identification with passive RFID tags. In Pervasive Computing, Proceedings of the First International Conference, Pervasive 2002 Zurich, Switzerland, 26–28 August 2002. Proceedings 1; Springer: Berlin/Heidelberg, Germany, 2002; pp. 98–113. [Google Scholar]
Figure 1. Vehicles with a high volume of cargo tags are statically detected at traffic intersections.
Figure 1. Vehicles with a high volume of cargo tags are statically detected at traffic intersections.
Sensors 23 06792 g001
Figure 2. Detection results from ALOHA when the capture effect occurs.
Figure 2. Detection results from ALOHA when the capture effect occurs.
Sensors 23 06792 g002
Figure 3. A comparison of FSA and DFSA with the capture effect.
Figure 3. A comparison of FSA and DFSA with the capture effect.
Sensors 23 06792 g003
Figure 4. A monostatic system with transmit and receive antennas to be colocated at the reader (the reader device is positioned on the left side of the diagram, while the dotted line box on the right represents areas with high-density tag distribution).
Figure 4. A monostatic system with transmit and receive antennas to be colocated at the reader (the reader device is positioned on the left side of the diagram, while the dotted line box on the right represents areas with high-density tag distribution).
Sensors 23 06792 g004
Figure 5. Optimal frame length l o p t as function of tags n ( q = 2 , u = 0.125 , v = 0.5 ).
Figure 5. Optimal frame length l o p t as function of tags n ( q = 2 , u = 0.125 , v = 0.5 ).
Sensors 23 06792 g005
Figure 6. Capture probability on the Nakagami-m fading channel ( q = 2 ).
Figure 6. Capture probability on the Nakagami-m fading channel ( q = 2 ).
Sensors 23 06792 g006
Figure 7. 3D Capture probability on Nakagami-m fading ( s = 2 ).
Figure 7. 3D Capture probability on Nakagami-m fading ( s = 2 ).
Sensors 23 06792 g007
Figure 8. Capture probability estimation of the proposed algorithm ( l = 128 , n = 700).
Figure 8. Capture probability estimation of the proposed algorithm ( l = 128 , n = 700).
Sensors 23 06792 g008
Figure 9. Tag estimation of proposed algorithm under fading environment (m = 1.5, q = 2).
Figure 9. Tag estimation of proposed algorithm under fading environment (m = 1.5, q = 2).
Sensors 23 06792 g009
Figure 10. Comparison of the identification efficiency of five algorithms.
Figure 10. Comparison of the identification efficiency of five algorithms.
Sensors 23 06792 g010
Table 1. Probability of no idle slot in the first w slots when l  = 128.
Table 1. Probability of no idle slot in the first w slots when l  = 128.
n w = 1 w = 2 w = 4 w = 6 w = 8
500.32440.10520.01100.00110.0001
(0.3241)(0.1055)(0.0110)(0.0010)(0)
1000.54360.29550.08730.02580.0076
(0.5439)(0.2956)(0.0871)(0.0257)(0.0074)
4000.95660.91510.83740.76630.7012
(0.9557)(0.9152)(0.8374)(0.7675)(0.7010)
7000.99590.99180.98360.97550.9675
(0.9956)(0.9905)(0.9833)(0.9750)(0.9677)
10000.99960.99920.99840.99760.9969
(1.0000)(0.9995)(0.9983)(0.9977)(0.9966)
where the results given in the brackets are computed from (9).
Table 2. The values of l o p t and η i d when n = 700.
Table 2. The values of l o p t and η i d when n = 700.
Fading Channels (m) u = v = 1 u = 0.125 , v = 0.5
l opt η id l opt η id
0.53930.6303 6990.8427
14660.5522 8280.8116
1.55080.5131 8980.7938
25350.4885 9440.7823
2.55550.4712 9780.7738
35710.4581 10040.7672
3.55830.4478 10250.7618
where the results are computed from the Equation (12)–(14).
Table 3. Comparison of estimation methods.
Table 3. Comparison of estimation methods.
Estimation MethodEstimated ObjectNumber of Identification TagsEstimation Error of Capture Probability (%)Estimation Error of Tags (%)Identification Efficiency (%)Computational ComplexityRun Time (s)
VOGT n ^ Small-46.7454.21 O i = 1 φ n ˜ i 5.7462
CMEBE n ^ , α ^ Small8.509.8472.86 O ε i = 1 φ n ˜ i 14.3671
CAE n ^ , α ^ Small9.386.5373.21 O 1 1.15
MMSE, CBMS n ^ , α ^ Large5.652.7779.66 O ε i = 1 φ n ˜ i 32.61/33.13
Proposed algorithm n ^ , α ^ Large2.731.9481.31 O ε 15.42
where the estimation error of capture probability when α = 0.2 and the estimation error of tags and identification efficiency when n = 700 .
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Xu, W.; Song, Z.; Sun, Y.; Wang, Y.; Lai, L. Capture-Aware Dense Tag Identification Using RFID Systems in Vehicular Networks. Sensors 2023, 23, 6792. https://doi.org/10.3390/s23156792

AMA Style

Xu W, Song Z, Sun Y, Wang Y, Lai L. Capture-Aware Dense Tag Identification Using RFID Systems in Vehicular Networks. Sensors. 2023; 23(15):6792. https://doi.org/10.3390/s23156792

Chicago/Turabian Style

Xu, Weijian, Zhongzhe Song, Yanglong Sun, Yang Wang, and Lianyou Lai. 2023. "Capture-Aware Dense Tag Identification Using RFID Systems in Vehicular Networks" Sensors 23, no. 15: 6792. https://doi.org/10.3390/s23156792

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop