{"title":"重新审视 RFID 标签丢失识别:理论基础与算法设计","authors":"Kanghuai Liu;Lin Chen;Jihong Yu;Ziyue Jia","doi":"10.1109/TNET.2024.3404471","DOIUrl":null,"url":null,"abstract":"We revisit the problem of missing tag identification in RFID networks by making three contributions. Firstly, we quantitatively compare and gauge the existing propositions spanning over a decade on missing tag identification. We show that the expected execution time of the best solution in the literature is \n<inline-formula> <tex-math>$\\Theta \\left ({{N+\\frac {(1-\\alpha )^{2}(1-\\delta )^{2}}{ \\epsilon ^{2}}}}\\right )$ </tex-math></inline-formula>\n, where \n<inline-formula> <tex-math>$\\delta $ </tex-math></inline-formula>\n and \n<inline-formula> <tex-math>$\\epsilon $ </tex-math></inline-formula>\n are parameters quantifying the required identification accuracy, N denotes the number of tags in the system, among which \n<inline-formula> <tex-math>$\\alpha N$ </tex-math></inline-formula>\n tags are missing. Secondly, we analytically establish the expected execution time lower-bound for any missing tag identification algorithm as \n<inline-formula> <tex-math>$\\Theta \\left ({{\\frac {N}{\\log N}+\\frac {(1-\\delta )^{2}(1-\\alpha )^{2}}{\\epsilon ^{2} \\log \\frac {(1-\\delta )(1-\\alpha )}{\\epsilon }}}}\\right )$ </tex-math></inline-formula>\n, thus setting the theoretical performance limit. Thirdly, we develop two novel missing tag identification algorithms with the expected execution time of \n<inline-formula> <tex-math>$\\Theta \\left ({{\\frac {\\log \\log N}{\\log N}N+\\frac {(1-\\alpha )^{2}(1-\\delta )^{2}}{ \\epsilon ^{2}}}}\\right )$ </tex-math></inline-formula>\n, reducing the time overhead by a factor of up to \n<inline-formula> <tex-math>$\\log N$ </tex-math></inline-formula>\n over the best algorithm in the literature. The key technicality in our first algorithm is a novel data structure termed as collision-partition tree (CPT), built on a subset of bits in tag pseudo-IDs, leading to a more balanced tree structure and reducing the time complexity in parsing the entire tree. To further improve time efficiency, our second algorithm integrates multiple CPTs to form a collision-partition forest (CPF), reducing both the number of slots and the quantity of information broadcasting.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 5","pages":"4056-4066"},"PeriodicalIF":3.6000,"publicationDate":"2024-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Revisiting RFID Missing Tag Identification: Theoretical Foundation and Algorithm Design\",\"authors\":\"Kanghuai Liu;Lin Chen;Jihong Yu;Ziyue Jia\",\"doi\":\"10.1109/TNET.2024.3404471\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We revisit the problem of missing tag identification in RFID networks by making three contributions. Firstly, we quantitatively compare and gauge the existing propositions spanning over a decade on missing tag identification. We show that the expected execution time of the best solution in the literature is \\n<inline-formula> <tex-math>$\\\\Theta \\\\left ({{N+\\\\frac {(1-\\\\alpha )^{2}(1-\\\\delta )^{2}}{ \\\\epsilon ^{2}}}}\\\\right )$ </tex-math></inline-formula>\\n, where \\n<inline-formula> <tex-math>$\\\\delta $ </tex-math></inline-formula>\\n and \\n<inline-formula> <tex-math>$\\\\epsilon $ </tex-math></inline-formula>\\n are parameters quantifying the required identification accuracy, N denotes the number of tags in the system, among which \\n<inline-formula> <tex-math>$\\\\alpha N$ </tex-math></inline-formula>\\n tags are missing. Secondly, we analytically establish the expected execution time lower-bound for any missing tag identification algorithm as \\n<inline-formula> <tex-math>$\\\\Theta \\\\left ({{\\\\frac {N}{\\\\log N}+\\\\frac {(1-\\\\delta )^{2}(1-\\\\alpha )^{2}}{\\\\epsilon ^{2} \\\\log \\\\frac {(1-\\\\delta )(1-\\\\alpha )}{\\\\epsilon }}}}\\\\right )$ </tex-math></inline-formula>\\n, thus setting the theoretical performance limit. Thirdly, we develop two novel missing tag identification algorithms with the expected execution time of \\n<inline-formula> <tex-math>$\\\\Theta \\\\left ({{\\\\frac {\\\\log \\\\log N}{\\\\log N}N+\\\\frac {(1-\\\\alpha )^{2}(1-\\\\delta )^{2}}{ \\\\epsilon ^{2}}}}\\\\right )$ </tex-math></inline-formula>\\n, reducing the time overhead by a factor of up to \\n<inline-formula> <tex-math>$\\\\log N$ </tex-math></inline-formula>\\n over the best algorithm in the literature. The key technicality in our first algorithm is a novel data structure termed as collision-partition tree (CPT), built on a subset of bits in tag pseudo-IDs, leading to a more balanced tree structure and reducing the time complexity in parsing the entire tree. To further improve time efficiency, our second algorithm integrates multiple CPTs to form a collision-partition forest (CPF), reducing both the number of slots and the quantity of information broadcasting.\",\"PeriodicalId\":13443,\"journal\":{\"name\":\"IEEE/ACM Transactions on Networking\",\"volume\":\"32 5\",\"pages\":\"4056-4066\"},\"PeriodicalIF\":3.6000,\"publicationDate\":\"2024-03-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE/ACM Transactions on Networking\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10540347/\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE/ACM Transactions on Networking","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10540347/","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
Revisiting RFID Missing Tag Identification: Theoretical Foundation and Algorithm Design
We revisit the problem of missing tag identification in RFID networks by making three contributions. Firstly, we quantitatively compare and gauge the existing propositions spanning over a decade on missing tag identification. We show that the expected execution time of the best solution in the literature is
$\Theta \left ({{N+\frac {(1-\alpha )^{2}(1-\delta )^{2}}{ \epsilon ^{2}}}}\right )$
, where
$\delta $
and
$\epsilon $
are parameters quantifying the required identification accuracy, N denotes the number of tags in the system, among which
$\alpha N$
tags are missing. Secondly, we analytically establish the expected execution time lower-bound for any missing tag identification algorithm as
$\Theta \left ({{\frac {N}{\log N}+\frac {(1-\delta )^{2}(1-\alpha )^{2}}{\epsilon ^{2} \log \frac {(1-\delta )(1-\alpha )}{\epsilon }}}}\right )$
, thus setting the theoretical performance limit. Thirdly, we develop two novel missing tag identification algorithms with the expected execution time of
$\Theta \left ({{\frac {\log \log N}{\log N}N+\frac {(1-\alpha )^{2}(1-\delta )^{2}}{ \epsilon ^{2}}}}\right )$
, reducing the time overhead by a factor of up to
$\log N$
over the best algorithm in the literature. The key technicality in our first algorithm is a novel data structure termed as collision-partition tree (CPT), built on a subset of bits in tag pseudo-IDs, leading to a more balanced tree structure and reducing the time complexity in parsing the entire tree. To further improve time efficiency, our second algorithm integrates multiple CPTs to form a collision-partition forest (CPF), reducing both the number of slots and the quantity of information broadcasting.
期刊介绍:
The IEEE/ACM Transactions on Networking’s high-level objective is to publish high-quality, original research results derived from theoretical or experimental exploration of the area of communication/computer networking, covering all sorts of information transport networks over all sorts of physical layer technologies, both wireline (all kinds of guided media: e.g., copper, optical) and wireless (e.g., radio-frequency, acoustic (e.g., underwater), infra-red), or hybrids of these. The journal welcomes applied contributions reporting on novel experiences and experiments with actual systems.