Revisiting RFID Missing Tag Identification: Theoretical Foundation and Algorithm Design

IF 3.6 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE IEEE/ACM Transactions on Networking Pub Date : 2024-03-28 DOI:10.1109/TNET.2024.3404471
Kanghuai Liu;Lin Chen;Jihong Yu;Ziyue Jia
{"title":"Revisiting RFID Missing Tag Identification: Theoretical Foundation and Algorithm Design","authors":"Kanghuai Liu;Lin Chen;Jihong Yu;Ziyue Jia","doi":"10.1109/TNET.2024.3404471","DOIUrl":null,"url":null,"abstract":"We revisit the problem of missing tag identification in RFID networks by making three contributions. Firstly, we quantitatively compare and gauge the existing propositions spanning over a decade on missing tag identification. We show that the expected execution time of the best solution in the literature is \n<inline-formula> <tex-math>$\\Theta \\left ({{N+\\frac {(1-\\alpha )^{2}(1-\\delta )^{2}}{ \\epsilon ^{2}}}}\\right )$ </tex-math></inline-formula>\n, where \n<inline-formula> <tex-math>$\\delta $ </tex-math></inline-formula>\n and \n<inline-formula> <tex-math>$\\epsilon $ </tex-math></inline-formula>\n are parameters quantifying the required identification accuracy, N denotes the number of tags in the system, among which \n<inline-formula> <tex-math>$\\alpha N$ </tex-math></inline-formula>\n tags are missing. Secondly, we analytically establish the expected execution time lower-bound for any missing tag identification algorithm as \n<inline-formula> <tex-math>$\\Theta \\left ({{\\frac {N}{\\log N}+\\frac {(1-\\delta )^{2}(1-\\alpha )^{2}}{\\epsilon ^{2} \\log \\frac {(1-\\delta )(1-\\alpha )}{\\epsilon }}}}\\right )$ </tex-math></inline-formula>\n, thus setting the theoretical performance limit. Thirdly, we develop two novel missing tag identification algorithms with the expected execution time of \n<inline-formula> <tex-math>$\\Theta \\left ({{\\frac {\\log \\log N}{\\log N}N+\\frac {(1-\\alpha )^{2}(1-\\delta )^{2}}{ \\epsilon ^{2}}}}\\right )$ </tex-math></inline-formula>\n, reducing the time overhead by a factor of up to \n<inline-formula> <tex-math>$\\log N$ </tex-math></inline-formula>\n over the best algorithm in the literature. The key technicality in our first algorithm is a novel data structure termed as collision-partition tree (CPT), built on a subset of bits in tag pseudo-IDs, leading to a more balanced tree structure and reducing the time complexity in parsing the entire tree. To further improve time efficiency, our second algorithm integrates multiple CPTs to form a collision-partition forest (CPF), reducing both the number of slots and the quantity of information broadcasting.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 5","pages":"4056-4066"},"PeriodicalIF":3.6000,"publicationDate":"2024-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE/ACM Transactions on Networking","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10540347/","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0

Abstract

We revisit the problem of missing tag identification in RFID networks by making three contributions. Firstly, we quantitatively compare and gauge the existing propositions spanning over a decade on missing tag identification. We show that the expected execution time of the best solution in the literature is $\Theta \left ({{N+\frac {(1-\alpha )^{2}(1-\delta )^{2}}{ \epsilon ^{2}}}}\right )$ , where $\delta $ and $\epsilon $ are parameters quantifying the required identification accuracy, N denotes the number of tags in the system, among which $\alpha N$ tags are missing. Secondly, we analytically establish the expected execution time lower-bound for any missing tag identification algorithm as $\Theta \left ({{\frac {N}{\log N}+\frac {(1-\delta )^{2}(1-\alpha )^{2}}{\epsilon ^{2} \log \frac {(1-\delta )(1-\alpha )}{\epsilon }}}}\right )$ , thus setting the theoretical performance limit. Thirdly, we develop two novel missing tag identification algorithms with the expected execution time of $\Theta \left ({{\frac {\log \log N}{\log N}N+\frac {(1-\alpha )^{2}(1-\delta )^{2}}{ \epsilon ^{2}}}}\right )$ , reducing the time overhead by a factor of up to $\log N$ over the best algorithm in the literature. The key technicality in our first algorithm is a novel data structure termed as collision-partition tree (CPT), built on a subset of bits in tag pseudo-IDs, leading to a more balanced tree structure and reducing the time complexity in parsing the entire tree. To further improve time efficiency, our second algorithm integrates multiple CPTs to form a collision-partition forest (CPF), reducing both the number of slots and the quantity of information broadcasting.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
重新审视 RFID 标签丢失识别:理论基础与算法设计
我们通过三个方面的贡献来重新审视 RFID 网络中的标签缺失识别问题。首先,我们定量比较和衡量了十多年来关于缺失标签识别的现有命题。我们表明,文献中最佳解决方案的预期执行时间为 $Theta \left ({{N+frac {(1-\alpha )^{2}(1-\delta )^{2}}{ \epsilon ^{2}}}}\right )$ ,其中 $\delta $ 和 $\epsilon $ 是量化所需的识别精度的参数,N 表示系统中的标签数量,其中 $\alpha N$ 标签丢失。其次,我们通过分析确定任何缺失标签识别算法的预期执行时间下限为 $\Theta \left ({{\frac {N}{\log N}+\frac {(1-\delta )^{2}(1-\alpha )^{2}}{\epsilon ^{2})\log \frac {(1-\delta )(1-\alpha )}{epsilon }}}}\right )$ ,从而设定了理论性能极限。第三,我们开发了两种新型的丢失标签识别算法,其预期执行时间为 $\Theta \left ({{\frac {log \log N}{\log N}N+\frac {(1-\alpha )^{2}(1-\delta )^{2}}{ \epsilon ^{2}}}}\right )$,与文献中的最佳算法相比,时间开销最多可减少 $\log N$。我们第一种算法的关键技术是一种称为碰撞分区树(CPT)的新型数据结构,它建立在标签伪 ID 中的一个比特子集上,从而产生了一种更平衡的树结构,并降低了解析整棵树的时间复杂度。为了进一步提高时间效率,我们的第二种算法整合了多个 CPT,形成了碰撞分区森林(CPF),从而减少了插槽数量和信息广播量。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE/ACM Transactions on Networking
IEEE/ACM Transactions on Networking 工程技术-电信学
CiteScore
8.20
自引率
5.40%
发文量
246
审稿时长
4-8 weeks
期刊介绍: The IEEE/ACM Transactions on Networking’s high-level objective is to publish high-quality, original research results derived from theoretical or experimental exploration of the area of communication/computer networking, covering all sorts of information transport networks over all sorts of physical layer technologies, both wireline (all kinds of guided media: e.g., copper, optical) and wireless (e.g., radio-frequency, acoustic (e.g., underwater), infra-red), or hybrids of these. The journal welcomes applied contributions reporting on novel experiences and experiments with actual systems.
期刊最新文献
Table of Contents IEEE/ACM Transactions on Networking Information for Authors IEEE/ACM Transactions on Networking Society Information IEEE/ACM Transactions on Networking Publication Information FPCA: Parasitic Coding Authentication for UAVs by FM Signals
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1