1. Trang chủ
  2. » Luận Văn - Báo Cáo

Thiết kế và đánh giá hiệu năng các giao thức truyền thông trong hệ thống RFID

110 1 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 110
Dung lượng 2,57 MB

Nội dung

Thiết kế và đánh giá hiệu năng các giao thức truyền thông trong hệ thống RFID.Thiết kế và đánh giá hiệu năng các giao thức truyền thông trong hệ thống RFID.Thiết kế và đánh giá hiệu năng các giao thức truyền thông trong hệ thống RFID.Thiết kế và đánh giá hiệu năng các giao thức truyền thông trong hệ thống RFID.Thiết kế và đánh giá hiệu năng các giao thức truyền thông trong hệ thống RFID.Thiết kế và đánh giá hiệu năng các giao thức truyền thông trong hệ thống RFID.Thiết kế và đánh giá hiệu năng các giao thức truyền thông trong hệ thống RFID.Thiết kế và đánh giá hiệu năng các giao thức truyền thông trong hệ thống RFID.Thiết kế và đánh giá hiệu năng các giao thức truyền thông trong hệ thống RFID.Thiết kế và đánh giá hiệu năng các giao thức truyền thông trong hệ thống RFID.Thiết kế và đánh giá hiệu năng các giao thức truyền thông trong hệ thống RFID.Thiết kế và đánh giá hiệu năng các giao thức truyền thông trong hệ thống RFID.Thiết kế và đánh giá hiệu năng các giao thức truyền thông trong hệ thống RFID.Thiết kế và đánh giá hiệu năng các giao thức truyền thông trong hệ thống RFID.Thiết kế và đánh giá hiệu năng các giao thức truyền thông trong hệ thống RFID.Thiết kế và đánh giá hiệu năng các giao thức truyền thông trong hệ thống RFID.Thiết kế và đánh giá hiệu năng các giao thức truyền thông trong hệ thống RFID.Thiết kế và đánh giá hiệu năng các giao thức truyền thông trong hệ thống RFID.Thiết kế và đánh giá hiệu năng các giao thức truyền thông trong hệ thống RFID.Thiết kế và đánh giá hiệu năng các giao thức truyền thông trong hệ thống RFID.Thiết kế và đánh giá hiệu năng các giao thức truyền thông trong hệ thống RFID.Thiết kế và đánh giá hiệu năng các giao thức truyền thông trong hệ thống RFID.Thiết kế và đánh giá hiệu năng các giao thức truyền thông trong hệ thống RFID.Thiết kế và đánh giá hiệu năng các giao thức truyền thông trong hệ thống RFID.Thiết kế và đánh giá hiệu năng các giao thức truyền thông trong hệ thống RFID.Thiết kế và đánh giá hiệu năng các giao thức truyền thông trong hệ thống RFID.Thiết kế và đánh giá hiệu năng các giao thức truyền thông trong hệ thống RFID.Thiết kế và đánh giá hiệu năng các giao thức truyền thông trong hệ thống RFID.Thiết kế và đánh giá hiệu năng các giao thức truyền thông trong hệ thống RFID.Thiết kế và đánh giá hiệu năng các giao thức truyền thông trong hệ thống RFID.

MINISTRY OF EDUCATION AND TRAINING HANOI UNIVERSITY OF SCIENCE AND TECHNOLOGY HOANG TRUNG TUYEN DESIGN AND PERFORMANCE EVALUATION OF COMMUNICATION PROTOCOLS IN RFID SYSTEMS DOCTORAL DISSERTATION OF TELECOMMUNICATION ENGINEERING Hanoi−2023 MINISTRY OF EDUCATION AND TRAINING HANOI UNIVERSITY OF SCIENCE AND TECHNOLOGY HOANG TRUNG TUYEN DESIGN AND PERFORMANCE EVALUATION OF COMMUNICATION PROTOCOLS IN RFID SYSTEMS Major: Telecommunication Engineering Code: 9520208 DOCTORAL DISSERTATION OF TELECOMMUNICATION ENGINEERING SUPERVISORS: 1.Assoc Prof Nguyen Thanh Chuyen 2.Dr To Thi Thao Hanoi−2023 DECLARATION OF AUTHORSHIP I, Hoang Trung Tuyen, declare that the dissertation titled "Design and performance evaluation of communication protocols in RFID systems" has been entirely composed by myself I assure some points as follows: ■ This work was done wholly or mainly while in candidature for a Ph.D research degree at Hanoi University of Science and Technology ■ The work has not been submitted for any other degree or qualifications at Hanoi University of Science and Technology or any other institutions ■ Appropriate acknowledgement has been given within this dissertation where reference has been made to the published work of others ■ The dissertation submitted is my own, except where work in the collaboration has been included The collaborative contributions have been clearly indicated Hanoi, September 12, 2023 PhD Student Hoang Trung Tuyen SUPERVISORS Assoc.Prof Nguyen Thanh Chuyen i Dr To Thi Thao ACKNOWLEDGEMENT This dissertation was written during my doctoral course at School of Electrical and Electronic Engineering (SEEE) and Communications Theory and Applications Research Group (CTARG), Hanoi University of Science and Technology (HUST) I would like to thank all member of SEEE, CTARG as well as all of my colleagues in Military Science Academy (MSA) I am so grateful for all people who always support and encourage me for completing this study I would like to extend my heartfelt gratitude to my principal supervisor Associate Professor Nguyen Thanh Chuyen for his instructive guidance and valuable suggestions in my academic studies He gave me much help and advice during my PhD study and the preparation of this dissertation I am deeply grateful for his help I gratefully appreciate my secondary advisor Dr To Thi Thao for her constructive suggestions I also acknowledge Associate Professor Le Doan Hoang from the University of Aizu, Japan, for their instructive comments and discussions about my research work I am also thankful to my friends and my fellow CTARG members for their discussions and comments about my dissertation I would like to express my heartfelt gratitude to my family, wife, and children for their unwavering support throughout my PhD journey Their encouragement, patience, and understanding have been instrumental in helping me overcome the challenges and obstacles that I have encountered along the way Their love and sacrifices have been my driving force, and I am forever grateful for their unwavering support Thank you for being my rock and my inspiration, I could not have done this without you Hanoi, 2023 Ph.D Student ii CONTENTS DECLARATION OF AUTHORSHIP i ACKNOWLEDGEMENT ii CONTENTS vi ABBREVIATIONS vi SYMBOLS vii LIST OF TABLES xi LIST OF FIGURES xiv INTRODUCTION CHAPTER BACKGROUND OF STUDY 1.1 Research Background 1.1.1 Introduction to the Internet of Things (IoT) 1.1.2 Radio Frequency Identification (RFID) Systems 1.2 Problem Statement and Literature Review 16 1.2.1 Anti-collision protocols/algorithms 17 1.2.2 Missing-tag Detection/Monitoring 23 1.3 Summary 25 CHAPTER PERFORMANCE ANALYSIS OF HYBRID ALOHA/CDMA RFID SYSTEMS WITH QUASI-DECORRELATING DETECTOR IN NOISY CHANNELS 26 2.1 Introduction 26 2.2 System Description and Conventional Approach 27 2.2.1 System Model 27 2.2.2 Transmission Channel Model 28 2.2.3 Conventional Decorrelating Detector 29 2.3 Performance Analysis 30 2.3.1 Quasi-decorrelating Detector (QDD) 30 2.3.2 Performance Analysis of Tag Identification Efficiency 32 2.4 Performance Evaluation and Discussions 34 2.4.1 System Efficiency 34 iii 2.4.2 False Alarm and False Detection 38 2.5 Summary 41 CHAPTER ON THE DESIGN OF NOMA-ENHANCED BACKSCATTER COMMUNICATION SYSTEMS 42 3.1 Introduction 42 3.1.1 Related Works and Motivation 42 3.1.2 Major Contributions and Organization 43 3.2 System Model and Conventional Approach 45 3.2.1 System Description 45 3.2.2 Conventional Approach 46 3.3 Proposed NOMA-Enhanced BackCom Systems 48 3.3.1 NOMA-Enhanced BackCom: Static Systems 48 3.3.2 NOMA-Enhanced BackCom: Dynamic Systems 51 3.4 Simulation Results and Discussions 52 3.4.1 Number of Successful Backscatter Nodes 53 3.4.2 Number of Successful Transmitted Bits 57 3.5 Summary 60 CHAPTER EFFICIENT MISSING-TAG EVENT DETECTION PROTOCOLS TO COPE WITH UNEXPECTED TAGS AND DETECTION ERROR IN RFID SYSTEMS 61 4.1 Introduction 61 4.2 System Description 62 4.2.1 System Model 62 4.2.2 Communication Protocol: Aloha, Wireless Channel Model, and Detection Error 63 4.2.3 Conventional Approach 65 4.3 Proposed Missing-Tag Event Detection Protocols 66 4.3.1 Protocol Description 66 4.3.2 Parameter Optimization under Impacts of Unexpected Tags and Detection Error 69 4.3.3 Expected Detection timeslots 70 iv 4.4 Numerical Results and Discussions 71 4.4.1 False-Alarm and True-Alarm Probabilities 74 4.4.2 Performance Comparison with Conventional Protocols 75 4.5 Summary 76 CONCLUSION AND FUTURE WORKS 78 PUBLICATIONS 80 BIBLIOGRAPHY 81 APPENDICES 92 v ABBREVIATIONS No Abbreviation Meaning APRC Adaptive Power Reflection Coefficient AWGN Addtitive White Gaussian Noise BMTD Bloom filter-based Missing-Tag Detection BN Backscatter Node CD Code-Domain CDMA Code Division Multiple Access DD Decorrelating Detector DSP Dynamic-Size Pairing FA False Alarm 10 FDMA Frequency Division Multiple Access 11 FSA Frame Slotted Aloha 12 ID IDentity 13 IoT Internet of Thing 14 MAC Medium Access Control 15 MAI Multiple Access Interference 16 NOMA Non-othogonal Multiple Access 17 PD Power-Domain 18 QDD Quasi-Decorrelating Detector 19 RF Radio Frequency 20 RFID Radio Frequencyl IDdentification 21 SDMA Space Division Multiple Access 22 SIC Successive Interference Cancellation 23 SINR Signal-to-Interference-and Noise Ratio 24 SNR Signal-to-Noise Ratio 25 TA True Alarm 26 TDMA Time Division Multiple Access 27 TNP Two Node Pairing vi SYMBOLS No Symbol Meaning A Multi-stage feed-forward matrix B Number of backscatter nodes b Number of backscatter nodes multiplexed α Required reliability C1i The i-th tag counter, i ∈ [1, |E|] C2 Reader counter Cth Counter threshold c Gold code D1 Expected detection time slots of mRUN1 protocol 10 D2 Expected detection time slots of mRUN2 protocol 11 E Set of expected tags 12 E[D] Expected detection time slots 13 i ] E[X01 Expected number of slots that is expectedly empty in the i-th in pre-computed frame but observed as non-empty in the i-th executed frame 14 ξi Power reflection coefficient of the i-th BN 15 ϵ Number of feed-forward stage matrix 16 f Frame size 17 G Annular region 18 G Code set 19 g Probability that a missing-tag event is detected at a given time slot among f slots 20 H(.) Hash function 21 h Channel coefficient 22 I Identity matrix 23 K Number of Gold codes 24 L Length of the register vii 25 Lc Gold code length 26 M Truncation matrix 27 M NOMA group size 28 m Number of tags in E missing from population 29 N Number of tags 30 B Number of BNs 31 Nl Number of tags in the l-th slot 32 Nfa Number of available tags detected as missing ones 33 Nfd Number of actual missing tags detected as available ones 34 No Noise power 35 NS Normalized number of successful BNs 36 N near Number of successful BNs from near subregion 37 N far Number of successful BNs from far subregion 38 Nnear Number of BNs in near regions 39 Nfar Number of BNs in far regions 40 n Number of frames required to ensure detection 41 n Vector of White Gaussian noise 42 n(t) White Gaussian noise 43 η System efficiency 44 P Reader’s transmitted power 45 PeDD Bit error probability using DD 46 PeQDD Bit error probability using QDD 47 Paloha (i) Probability that i tags among N tags simultaneously transmit their IDs 48 Pd (a|i) Probability that a tags are not collided 49 Ps (a|i) Probability that a tags are successfully detected 50 Pcdma (a|i, K) Probability that a tags are assigned with a different codes of the K codes 51 c Pcdma (i − a|i, K − a) Probability that the remaining (i − a) tags are collided with the (K − a) codes 52 Ps (j) Probability that the j-th tag is successfully detected 53 Pde Probability of detection error viii PUBLICATIONS A PUBLICATIONS DIRECTLY RELATED TO THE DISSERTATION Chuyen T Nguyen, Tuyen T Hoang, Linh T Hoang, and Vu X Phan (2019), Efficient missing-tag event detection protocols to cope with unexpected tags and detection error in RFID systems, Wireless Communications and Mobile Computing, DOI: 10.1155/2019/6218671, (ISI), 2019 Tuyen T Hoang, Hieu V Dao, Vu X Phan, and Chuyen T Nguyen (2019), Performance Analysis of Hybrid ALOHA/CDMA RFID Systems with Quasi-decorrelating Detector in Noisy Channels, REV Journal on Electronics and Communications, Vol 9, No 1–2, January–June, 2019 Tuyen T Hoang, Hoang D Le, Luu X Nguyen, and Chuyen T Nguyen (2023), On the Design of NOMA-Enhanced Backscatter Communication Systems, IEEE Access, DOI: 10.1109/ACCESS.2023.3272892, (ISI), May 2023 B PUBLICATIONS RELATED TO THE DISSERTATION Chuyen T Nguyen, Tuyen T Hoang, and Vu X Phan (2017), A simple method for anonymous tag cardinality estimation in RFID systems with false detection, In 2017 4th NAFOSTED Conference on Information and Computer Science (NICS), IEEE, Vietnam, ISBN 978-1-4673-8013-3, pp.101-104, 2017 80 BIBLIOGRAPHY [1] Klair D.K., Chin K.W., and Raad R (2010) A survey and tutorial of RFID anti-collision protocols IEEE Communications Surveys & Tutorials, 12(3):pp 400–421 [2] Luo W., Chen S., Qiao Y., and Li T (2013) Missing-tag detection and energy– time tradeoff in large-scale rfid systems with unreliable channels IEEE/ACM transactions on networking, 22(4):pp 1079–1091 [3] Su W., Alchazidis N., and Ha T.T (2010) Multiple RFID tags access algorithm IEEE Transactions on Mobile Computing, 9(2):pp 174–187 [4] Mutti C and Floerkemeier C (2008) CDMA-based RFID systems in dense scenarios: Concepts and Challenges In RFID, 2008 IEEE International Conference on, pp 215–222 IEEE [5] Corvaja R and Pupolin S (1998) Multi-user performance of CDMA in the presence of phase noise In Global Telecommunications Conference, 1998 GLOBECOM 1998 The Bridge to Global Integration IEEE , volume 6, pp 3314–3319 IEEE [6] Chen H.H (2005) Quasi-decorrelating detector: A non-matrix inversion based decorrelating detector with near-far resistance and complexity trade-off European Transactions on Telecommunications, 16(4):pp 273–289 [7] Vaezi M., Aruma Baduge G.A., Liu Y., Arafa A., Fang F., and Ding Z (Dec 2019) Interplay between NOMA and other emerging technologies: A survey IEEE Trans Cognitive Commun Netw., 5(4):pp 900–919 [8] Guo J., Zhou X., Durrani S., and Yanikomeroglu H (Oct 2018) Design of nonorthogonal multiple access enhanced backscatter communication IEEE Trans Wireless Commun., 17(10):pp 6837–6852 [9] Nguyen C.T., Hayashi K., Kaneko M., Popovski P., and Sakai H (2013) Maximum likelihood approach for rfid tag set cardinality estimation with detection errors Wireless personal communications, 71(4):pp 2587–2603 81 [10] Nguyen C.T., Hayashi K., Kaneko M., and Sakai H (2013) Maximum likelihood approach for rfid tag cardinality estimation under capture effect and detection errors IEICE transactions on communications, 96(5):pp 1122–1129 [11] Popovski P., Fyhn K., Jacobsen R.M., and Larsen T (2011) Robust statistical methods for detection of missing rfid tags IEEE Wireless Communications, 18(4):pp 74–80 [12] Al-Fuqaha A., Guizani M., Mohammadi M., Aledhari M., and Ayyash M (2015) Internet of things: A survey on enabling technologies, protocols, and applications IEEE communications surveys & tutorials, 17(4):pp 2347–2376 [13] Nguyen D.C., Ding M., Pathirana P.N., Seneviratne A., Li J., Niyato D., Dobre O., and Poor H.V (2021) 6g internet of things: A comprehensive survey IEEE Internet of Things Journal , 9(1):pp 359–383 [14] Vermesan O., Friess P., Guillemin P., Giaffreda R., Grindvoll H., Eisenhauer M., Serrano M., Moessner K., Spirito M., Blystad L.C., et al (2022) Internet of things beyond the hype: Research, innovation and deployment In Building the Hyperconnected Society-Internet of Things Research and Innovation Value Chains, Ecosystems and Markets, pp 15–118 River Publishers [15] Zhang Z., Xiao Y., Ma Z., Xiao M., Ding Z., Lei X., Karagiannidis G.K., and Fan P (2019) 6g wireless networks: Vision, requirements, architecture, and key technologies IEEE Vehicular Technology Magazine, 14(3):pp 28–41 [16] Ma H.D (2011) Internet of things: Objectives and scientific challenges Journal of Computer science and Technology, 26(6):p 919 [17] Jara A.J., Ladid L., and Gómez-Skarmeta A.F (2013) The internet of everything through ipv6: An analysis of challenges, solutions and opportunities J Wirel Mob Networks Ubiquitous Comput Dependable Appl., 4(3):pp 97–118 [18] Christin D., Reinhardt A., Mogre P.S., Steinmetz R., et al (2009) Wireless sensor networks and the internet of things: selected challenges Proceedings of the 8th GI/ITG KuVS Fachgespräch Drahtlose sensornetze, pp 31–34 [19] Landaluce H., Arjona L., Perallos A., Falcone F., Angulo I., and Muralter F (2020) A review of iot sensing applications and challenges using rfid and wireless sensor networks Sensors, 20(9):p 2495 [20] Roberti M (2006) A 5-cent breakthrough RFID journal , 5(6) 82 [21] Zhang C (2021) Intelligent internet of things service based on artificial intelligence technology In 2021 IEEE 2nd International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE), pp 731– 734 IEEE [22] Gazis V., Görtz M., Huber M., Leonardi A., Mathioudakis K., Wiesmaier A., Zeiger F., and Vasilomanolakis E (2015) A survey of technologies for the internet of things In 2015 international wireless communications and mobile computing conference (IWCMC), pp 1090–1095 IEEE [23] Singh D., Tripathi G., and Jara A.J (2014) A survey of internet-of-things: Future vision, architecture, challenges and services In 2014 IEEE world forum on Internet of Things (WF-IoT), pp 287–292 IEEE [24] Shahroz M., Mushtaq M.F., Ahmad M., Ullah S., Mehmood A., and Choi G.S (2020) Iot-based smart shopping cart using radio frequency identification IEEE Access, 8:pp 68426–68438 [25] Finkenzeller K (2010) RFID handbook: fundamentals and applications in contactless smart cards, radio frequency identification and near-field communication John wiley & sons [26] Klaus Finkenzeller D and Handbook R Fundamentals and applications in contactless smart cards and identification April 2003 P , 187 [27] EPCglobal E Tag data standards version 1.1 rev 1.24, epcglobal standard specification, april 2004 [28] Yan L., Zhang Y., Yang L.T., and Ning H (2008) The Internet of things: from RFID to the next-generation pervasive networked systems Crc Press [29] Schuster E.W., Allen S.J., and Brock D.L (2007) Global RFID: the value of the EPCglobal network for supply chain management Springer Science & Business Media [30] Khan M.A., Sharma M., and Prabhu B.R (2009) A survey of rfid tags International Journal of Recent Trends in Engineering, 1(4):p 68 [31] El Khaddar M.A., Boulmalf M., Harroud H., and Elkoutbi M (2011) Rfid middleware design and architecture Designing and Deploying RFID Applications, pp 305–326 83 [32] Bolic M., Simplot-Ryl D., and Stojmenovic I (2010) Rfid systems: research trends and challenges [33] Roberts C.M (2006) Radio frequency identification (rfid) Computers & security, 25(1):pp 18–26 [34] Want R (2004) The magic of rfid: Just how those little things work anyway? Queue, 2(7):pp 40–48 [35] Lahiri S (2005) RFID sourcebook IBM press [36] Inc E (2013) Radio-frequency identity protocols c1g2 uhf rfid protocol for communications at 860 mhz [37] Burdet L.A (2004) Rfid multiple access methods ETH Zurich [38] Zhen B., Kobayashi M., and Shimizu M (2005) Framed aloha for multiple rfid objects identification IEICE Transactions on Communications, 88(3):pp 991– 999 [39] Myung J., Lee W., Srivastava J., and Shih T.K (2007) Tag-splitting: adaptive collision arbitration protocols for rfid tag identification IEEE transactions on parallel and distributed systems, 18(6):pp 763–775 [40] Engels D.W and Sarma S.E (2002) The reader collision problem In IEEE international conference on systems, man and cybernetics, volume 3, pp 6–pp IEEE [41] Waldrop J., Engels D.W., and Sarma S.E (2003) Colorwave: an anticollision algorithm for the reader collision problem In IEEE International Conference on Communications, 2003 ICC’03., volume 2, pp 1206–1210 IEEE [42] Leong K.S., Ng M.L., and Cole P.H (2005) The reader collision problem in rfid systems In 2005 IEEE international symposium on microwave, antenna, propagation and EMC technologies for wireless communications, volume 1, pp 658–661 IEEE [43] Shih D.H., Sun P.L., Yen D.C., and Huang S.M (2006) Taxonomy and survey of rfid anti-collision protocols Computer communications, 29(11):pp 2150–2166 [44] Masse D (2004) Rfid handbook: fundamentals and applications in contactless smart cards and identification second edition Microwave Journal , 47(10):pp 168–169 84 [45] Su W., Alchazidis N., and Ha T.T (2009) Multiple rfid tags access algorithm IEEE Transactions on Mobile computing, 9(2):pp 174–187 [46] Rohatgi A (2005) Rfid anti-collision system using the spread spectrum technique Technical report, Georgia Institute of Technology [47] Law C., Lee K., and Siu K.Y (2000) Efficient memoryless protocol for tag identification In Proceedings of the 4th international workshop on Discrete algorithms and methods for mobile computing and communications, pp 75–84 [48] Myung J and Lee W (2006) Adaptive binary splitting: a rfid tag collision arbitration protocol for tag identification Mobile networks and applications, 11(5):pp 711–722 [49] Chen W.C., Horng S.J., and Fan P (2007) An enhanced anti-collision algorithm in rfid based on counter and stack In 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007), pp 21–21 IEEE [50] Myung J., Lee W., and Shih T.K (2006) An adaptive memoryless protocol for rfid tag collision arbitration IEEE Transactions on Multimedia, 8(5):pp 1096– 1101 [51] Myung J and Lee W (2005) An adaptive memoryless tag anti-collision protocol for rfid networks In IEEE ICC Citeseer [52] Su J., Chen Y., Sheng Z., Huang Z., and Liu A.X (2020) From m-ary query to bit query: a new strategy for efficient large-scale rfid identification IEEE Transactions on Communications, 68(4):pp 2381–2393 [53] Abramson N (1970) The aloha system: Another alternative for computer communications In Proceedings of the November 17-19, 1970, fall joint computer conference, pp 281–285 [54] Liu L and Lai S (2006) Aloha-based anti-collision algorithms used in rfid system In 2006 International Conference on Wireless Communications, Networking and Mobile Computing, pp 1–4 IEEE [55] Vogt H (2002) Efficient object identification with passive rfid tags In Pervasive Computing: First International Conference, Pervasive 2002 Zurich, Switzerland, August 26–28, 2002 Proceedings , pp 98–113 Springer 85 [56] Vogt H (2002) Multiple object identification with passive rfid tags In IEEE International Conference on Systems, Man and Cybernetics, volume 3, pp 6–pp IEEE [57] Johnson N.L and Kotz S (2011) Leading personalities in statistical sciences: From the seventeenth century to the present John Wiley & Sons [58] Chen W.T (2008) Performance comparison of binary search tree and framed aloha algorithms for rfid anti-collision IEICE transactions on communications, 91(4):pp 1168–1171 [59] Floerkemeier C (2007) Bayesian transmission strategy for framed aloha based rfid protocols In 2007 IEEE International Conference on RFID, pp 228–235 IEEE [60] Bueno-Delgado V.M and Vales-Alonso J (2010) Analysis of the identification process in active rfid systems with capture effect In European Workshop on Smart Objects: Systems, Technologies and Applications, pp 1–6 VDE [61] Wieselthier J.E., Ephremides A., and Michaels L.A (1989) An exact analysis and performance evaluation of framed aloha with capture IEEE Transactions on Communications, 37(2):pp 125–137 [62] Oh S.Y., Jung S.H., Hong J.W., and Lie C.H (2008) A scheme to increase throughput in framed-aloha-based rfid systems with capture ETRI journal , 30(3):pp 486–488 [63] Shin W.J and Kim J.G (2009) A capture-aware access control method for enhanced rfid anti-collision performance IEEE Communications Letters, 13(5):pp 354–356 [64] Lai Y.C and Hsiao L.Y (2010) General binary tree protocol for coping with the capture effect in rfid tag identification IEEE Communications Letters, 14(3):pp 208–210 [65] Li B and Wang J (2011) Efficient anti-collision algorithm utilizing the capture effect for iso 18000-6c rfid protocol IEEE Communications Letters, 15(3):pp 352–354 [66] Nguyen C.T., Nguyen V.D., and Pham A.T (2019) Tag cardinality estimation using expectation-maximization in aloha-based rfid systems with capture effect and detection error IEEE Wireless Communications Letters, 8(2):pp 636–639 86 [67] Nguyen C.T., Bui A.T.H., Nguyen V.D., and Pham A.T (2017) Modified treebased identification protocols for solving hidden-tag problem in rfid systems over fading channels Iet Communications, 11(7):pp 1132–1142 [68] Wu H and Zeng Y (2014) Passive rfid tag anticollision algorithm for capture effect IEEE sensors journal , 15(1):pp 218–226 [69] Šolić P., Maras J., Radić J., and Blažević Z (2016) Comparing theoretical and experimental results in gen2 rfid throughput IEEE Transactions on Automation Science and Engineering, 14(1):pp 349–357 [70] Šolić P., Blažević Z., Škiljo M., and Patrono L (2016) Impact of tag responsiveness on gen2 rfid throughput IEEE Communications Letters, 20(11):pp 2181–2184 [71] Wu H., Wang Y., and Zeng Y (2017) Capture-aware bayesian rfid tag estimate for large-scale identification IEEE/CAA Journal of Automatica Sinica, 5(1):pp 119–127 [72] Ahmed H.A., Salah H., Robert J., and Heuberger A (2016) A closed-form solution for aloha frame length optimizing multiple collision recovery coefficients’ reading efficiency IEEE Systems Journal , 12(1):pp 1047–1050 [73] Nguyen C.T., Hayashi K., Kaneko M., Popovski P., and Sakai H (2013) Probabilistic dynamic framed slotted aloha for rfid tag identification Wireless Personal Communications, 71:pp 2947–2963 [74] Mutti C and Floerkemeier C (2008) Cdma-based rfid systems in dense scenarios: Concepts and challenges In 2008 IEEE International Conference on RFID, pp 215–222 IEEE [75] Vahedi E., Ward R.K., and Blake I.F (2014) Performance analysis of rfid protocols: Cdma versus the standard epc gen-2 IEEE Transactions on Automation Science and Engineering, 11(4):pp 1250–1261 [76] Nguyen C.T., Thang T.C., and Pham A.T (2015) Performance analysis of Hybrid ALOHA/CDMA anti-collision scheme for RFID systems over fading channels In Ubiquitous and Future Networks (ICUFN), 2015 Seventh International Conference on, pp 657–661 IEEE [77] Nguyen C.T., Phan V.X., Quyen N.X., Hoang T.M., and Pham A.T (2016) Performance evaluation of missing-tag algorithms in CDMA-based RFID systems In 87 Communications and Electronics (ICCE), 2016 IEEE Sixth International Conference on, pp 131–135 IEEE [78] Gill H.S., Gaba G.S., and Gupta N (2011) Reduction of multiple access interference in cdma by using improved minimum mean square error receiver Int J Sci Eng, 2:pp 2–5 [79] Guo J., Durrani S., and Zhou X (2019) Monostatic backscatter system with multi-tag to reader communication IEEE Transactions on Vehicular Technology, 68(10):pp 10320–10324 [80] Sacarelo G and Kim Y.H (2021) Beamforming and reflection coefficient control for multiantenna backscatter communication with nonorthogonal multiple access IEEE Access, 9:pp 56104–56114 [81] Kaneko M., Hu W., Hayashi K., and Sakai H (2014) Compressed sensingbased tag identification protocol for a passive rfid system IEEE Communications Letters, 18(11):pp 2023–2026 [82] Matsuoka K., Yushima Y., Hayakawa R., Kawasaki R., Hayashi K., and Kaneko M (2016) An rfid tag identification protocol via boolean compressed sensing IEICE Communications Express, 5(5):pp 118–123 [83] Mayer M., Görtz N., and Kaitovic J (2014) Rfid tag acquisition via compressed sensing In 2014 IEEE RFID Technology and Applications Conference (RFIDTA), pp 26–31 IEEE [84] Lee J., Kwon T., Choi Y., Das S.K., and Kim K.a (2004) Analysis of rfid anticollision algorithms using smart antennas In Proceedings of the 2nd international conference on Embedded networked sensor systems, pp 265–266 [85] Wang X., Zhou X., Shen W., Zou Z., and Zheng L (2014) A mimo-based backscattering rfid with interleave division multiple access for real-time sensing applications In 2014 IEEE RFID Technology and Applications Conference (RFID-TA), pp 312–317 IEEE [86] Feng S., Wang M., Yan J., Zhu Y., and Li Z (2015) Independent component analysis based tag anti-collision algorithm in multi-antenna radio frequency identification In 2015 5th International Conference on Information Science and Technology (ICIST), pp 519–524 IEEE 88 [87] Li T., Chen S., and Ling Y (2013) Efficient protocols for identifying the missing tags in a large rfid system IEEE/ACM Transactions on Networking, 21(6):pp 1974–1987 [88] Tan C.C., Sheng B., and Li Q (2010) Efficient techniques for monitoring missing rfid tags IEEE Transactions on Wireless Communications, 9(6):pp 1882–1889 [89] Li T., Chen S., and Ling Y (2010) Identifying the missing tags in a large rfid system In Proceedings of the eleventh ACM international symposium on Mobile ad hoc networking and computing, pp 1–10 [90] Shahzad M and Liu A.X (2016) Fast and reliable detection and identification of missing rfid tags in the wild IEEE/ACM Transactions on Networking, 24(6):pp 3770–3784 [91] Yu J., Chen L., Zhang R., and Wang K (2017) Finding needles in a haystack: Missing tag detection in large rfid systems IEEE transactions on communications, 65(5):pp 2036–2047 [92] Luo W., Chen S., Li T., and Chen S (2011) Efficient missing tag detection in rfid systems In 2011 Proceedings IEEE INFOCOM , pp 356–360 IEEE [93] Tan C.C., Sheng B., and Li Q (2008) How to monitor for missing rfid tags In 2008 The 28th International Conference on Distributed Computing Systems, pp 295–302 IEEE [94] Zheng Y and Li M (2012) Fast tag searching protocol for large-scale rfid systems IEEE/ACM Transactions On Networking, 21(3):pp 924–934 [95] Shahzad M and Liu A.X (2015) Expecting the unexpected: Fast and reliable detection of missing rfid tags in the wild In 2015 IEEE Conference on Computer Communications (INFOCOM), pp 1939–1947 IEEE [96] Cha J.R and Kim J.H (2006) Dynamic framed slotted aloha algorithms using fast tag estimation method for rfid system In CCNC 2006 2006 3rd IEEE Consumer Communications and Networking Conference, 2006., volume 2, pp 768–772 IEEE [97] Chen W.T (2008) An accurate tag estimate method for improving the performance of an rfid anticollision algorithm based on dynamic frame length aloha IEEE transactions on automation science and engineering, 6(1):pp 9–15 89 [98] Zhang Z., Lu Z., Chen Q., and Yan X (2012) Design and optimization of a CDMA-based multi-reader passive UHF RFID system for dense scenarios IEICE Transactions on Communications, 95(1):pp 206–216 [99] Nguyen C.T., Hoang T.T., and Phan V.X (2017) A simple method for anonymous tag cardinality estimation in rfid systems with false detection In 2017 4th NAFOSTED Conference on Information and Computer Science, pp 101–104 IEEE [100] EPCglobal E (2004) Radio-frequency identity protocols Class-1 Generation-2 UHF RFID protocol for communications at 860 Mhz–960 Mhz version 1.0 K Chiew et al./On False Authenticationsfor C1G2 Passive RFID Tags, 65 [101] Lupas R and Verd´ u S (1989) Linear Multiuser Detectors for synchronous Code Division Multiple Access channels IEEE Transactions on Information Theory, 35(1):pp 123–136 [102] Shieh L.S., Zou X., and Tsai J.S (1996) Model conversion of continuous-time uncertain systems via the interval geometric-series method IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, 43(10):pp 851–854 [103] Xu C., Yang L., and Zhang P (Sept 2018) Practical backscatter communication systems for battery-free internet of things: A tutorial and survey of recent research IEEE Signal Processing Mag., 35(5):pp 16–27 [104] Han K and Huang K (Apr 2017) Wirelessly powered backscatter communication networks: Modeling, coverage, and capacity IEEE Trans Wireless Commun., 16(4):pp 2548–2561 [105] Zhang Q., Zhang L., Liang Y.C., and Kam P.Y (2019) Backscatter-NOMA: An integrated system of cellular and internet-of-things networks In IEEE Int Conf Commun., pp 1–6 [106] Farajzadeh A., Ercetin O., and Yanikomeroglu H (2019) UAV data collection over NOMA backscatter networks: UAV altitude and trajectory optimization In IEEE Int Conf Commun., pp 1–7 [107] Yang G., Xu X., and Liang Y.C (Jan 2020) Resource allocation in NOMAenhanced backscatter communication networks for wireless powered IoT IEEE Wireless Commun Lett., 9(1):pp 117–120 90 [108] Wang J., Ye H.T., Kang X., Sun S., and Liang Y.C (Dec.2020) Cognitive backscatter NOMA networks with multi-slot energy causality IEEE Commun Lett., 24(12):pp 2854–2858 [109] Ardakani F.D., Huang R., and Wong V.W.S (Apr 2022) Joint device pairing, reflection coefficients, and power control for NOMA backscatter systems IEEE Trans Veh Technol., 71(4):pp 4396–4411 [110] Li X., Liu H., Li G., Liu Y., Zeng M., and Ding Z (Oct 2022) Effective capacity analysis of AmBC-NOMA communication systems IEEE Trans Veh Technol., 71(10):pp 11257–11261 [111] Yang G., Xu X., and Liang Y.C (2019) Resource allocation in noma-enhanced backscatter communication networks for wireless powered iot IEEE Wireless Communications Letters, 9(1):pp 117–120 [112] Gaynor M and Waterman J (2016) Design framework for sensors and rfid tags with healthcare applications Health Policy and Technology, 5(4):pp 357–369 [113] Nguyen L.X., Nguyen C.T., Phan V.X., and Pham A.T (2021) A novel user pairing scheme for non-orthogonal multiple access backscatter communication In IEEE Int Conf Commun Electron., pp 509–514 [114] Khalid Z and Durrani S (2013) Distance distributions in regular polygons IEEE Transactions on Vehicular Technology, 62(5):pp 2363–2368 [115] Wei X., Al-Obiedollah H., Cumanan K., Ding Z., and Dobre O.A (Aug 2022) Energy efficiency maximization for hybrid TDMA-NOMA system with opportunistic time assignment IEEE Trans Veh Technol., 71(8):pp 8561–8573 [116] Zeb S., Abbas Q., Hassan S.A., Mahmood A., Mumtaz R., Hassan Zaidi S.M., Ali Raza Zaidi S., and Gidlund M (2019) NOMA enhanced backscatter communication for green IoT networks In IEEE Int Symp Wireless Commun Syst., pp 640–644 [117] Park T., Lee G., Saad W., and Bennis M (Jun 2021) Sum rate and reliability analysis for power-domain nonorthogonal multiple access (PD-NOMA) IEEE Internet Things J., 8(12):pp 10160–10169 [118] Liu W., Huang K., Zhou X., and Durrani S (Mar 2019) Next generation backscatter communication: systems, techniques, and applications EURASIP J Wireless Commun Netw., (69):pp 1–11 91 [119] Zhang R., Liu Y., Zhang Y., and Sun J (2011) Fast identification of the missing tags in a large rfid system In 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp 278–286 IEEE [120] Liu X., Li K., Min G., Shen Y., Liu A.X., and Qu W (2013) Completely pinpointing the missing rfid tags in a time-efficient way IEEE Transactions on Computers, 64(1):pp 87–96 [121] Luo W., Chen S., Li T., and Qiao Y (2012) Probabilistic missing-tag detection and energy-time tradeoff in large-scale rfid systems In Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing, pp 95–104 [122] Shao C., Kim T., Yu J., Choi J., and Lee W (2015) Protar: Probabilistic tag retardation for missing tag identification in large-scale rfid systems IEEE transactions on industrial informatics, 11(2):pp 513–522 [123] Shieh H.L., Lin S.F., and Chang W.S (2012) Rfid medicine management system In 2012 International Conference on Machine Learning and Cybernetics, volume 5, pp 1890–1894 IEEE [124] Tan H (2008) The application of rfid technology in the warehouse management information system In 2008 International Symposium on Electronic Commerce and Security, pp 1063–1067 IEEE 92 APPENDICES The number of successfully decoded BNs is the primary performance metric investigated in this study Here, we focus on the performance analysis of the TNP scheme, in which the NOMA group size is set to M = Let N S be the normalized number of successful BNs It is defined by the ratio of the number of successful BNs and the total number of BNs, which can be expressed as N near + N far , (AP.1) B are respectively the average number of successful BNs in near NS = where N near and N far and far regions, which are written as    − 2ρ1    Nnear ,  N near = Pnear r ≤ PγBξ1   − 2ρ1    Nfar ,  N far = Pfar r ≤ PγBξ2 (AP.2) where Nnear = Nfar = B/2 are the total number of BNs in near and far regions In addition, Pnear (r) and Pfar (r) are the probabilities that a node of distance r belongs to the near and far sub-regions, respectively Here, it is noted that, after sorting B nodes based on the measured signal levels, B/2 nodes, i.e., 1, 2, ,B/2, having stronger signal power levels belong to the near sub-region while the rest of the nodes are in the far one The probability that a node at a distance r is the i-th node in the sorted list is, then, expressed as B−i pi,r = CB−1 pn (r)i−1 pf (r)B−i fr (r) , B−i where CB−1 ≜ (B−1)! (B−i)!(i−1)! and fr (d) = 2r RO −RI2 (AP.3) defined in Section 3.2.1 Additionally, pn (r) and pf (r) are respectively the probabilities that a BN is at a region specified by (RI , r) and (r, RO ), which can be calculated by Z pn (r) = r fx (x) dx = RI Z RO pf (r) = r r2 − RI2 2x dx = , 2 − R2 RO RI RO − RI I Z RO Z fx (x) dx = r r − r2 RO 2x dx = − R2 RO RO − RI2 I (AP.4) (AP.5) Using (AP.3), the probabilities, i.e., Pnear (r) and Pfar (r), are determined as  B  X    pi,r ,   Pnear (r) =    P (r)    far = i=1 B X i= B2 +1 93 pi,r (AP.6) To complete (AP.1), we need to determine the probabilities of a successful BN belonging to near or far sub-regions in (AP.2) Based on (AP.6), these probabilities are written as  Pnear r≤ γB P ξ1  − 2ρ1 ! γB P ξ1 Z =2 − 2ρ B  B −R RO I RI  j −r RO × r2 − RI  Pfar r≤ γB P ξ2  − 2ρ1 ! Z =2 × −1 X 2r γB P ξ2 − j=0  B−1−j 2ρ j CB−1 dr, (AP.7) B −1 X 2r j CB−1 B 2 RI RO − RI j=0 j  B−1−j − r2 dr, RO r2 − RI2 (AP.8) where j = B − i After some mathematical manipulations, the average number of successful BNs in (AP.2) can be computed as  B N near = B −1 X γNo P ξ1 − 2ρ −RI2 !j+1 RO −RI2 j CB−1 j+1 j=0   × F1 j + 1, j + − B; j + 2;   B N far = B −1 X j=0 γNo P ξ2 − 2ρ −RI2 γNo P ξ1 − 2ρ1  − RI2  − R2 RO I , (AP.9) !B−j RO −RI2 j CB−1 B−j   × F1 B − j, −j; B + − j;  γNo P ξ2 − 2ρ1  − RI2  − R2 RO I  (AP.10) By substituting (AP.9) and (AP.10) into (AP.1), we can obtain the normalized number of successful BN N S 94

Ngày đăng: 02/10/2023, 05:17

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN

w