An Efficient Data Collection Algorithm of Active RFID Tags for Ubiquitous Services in Maritime Logistics

Similar documents
Industrial Networks & Databases

EPL 657 Wireless Networks

How To Balance Load In Rdi With Power Conservation In A Power Efficient System

An Overview of ZigBee Networks

WBAN Beaconing for Efficient Resource Sharing. in Wireless Wearable Computer Networks

Adaptive MAC Protocol for Emergency Data Transmission in Wireless Body Sensor Networks

Chapter 7 Low-Speed Wireless Local Area Networks

How To Make A Multi-User Communication Efficient

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

An Intelligent Middleware Platform and Framework for RFID Reverse Logistics

A Non-beaconing ZigBee Network Implementation and Performance Study

Mac Protocols for Wireless Sensor Networks

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

FOMA (R) /Wireless LAN Dual Terminals, Wireless LAN Technology

ZIGBEE ECGR-6185 Advanced Embedded Systems. Charlotte. University of North Carolina-Charlotte. Chaitanya Misal Vamsee Krishna

Using RFID Techniques for a Universal Identification Device

A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification

Demystifying Wireless for Real-World Measurement Applications

2.0 System Description

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers

Enhanced Power Saving for IEEE WLAN with Dynamic Slot Allocation

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

Gemalto Mifare 1K Datasheet

A Study on Design of Health Device for U-Health System

The Research and Application of College Student Attendance System based on RFID Technology

Smart Integrated Multiple Tracking System Development for IOT based Target-oriented Logistics Location and Resource Service

IEEE Broadband Wireless Access Working Group. ATM Based MAC Layer Proposal for the Air Interface Specification

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012

DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL

Securing MANET Using Diffie Hellman Digital Signature Scheme

Implementation of IR-UWB MAC Development Tools Based on IEEE a

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Wireless Sensor Networks Database: Data Management and Implementation

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

CSE 123: Computer Networks Fall Quarter, 2014 MIDTERM EXAM

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Protocol Design for Neighbor Discovery in AD-HOC Network

CS263: Wireless Communications and Sensor Networks

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Wireless Personal Area Networks (WPANs)

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0

Lecture 17: Wireless Networking"

Power Characterisation of a Zigbee Wireless Network in a Real Time Monitoring Application

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

A Novel Technique for Clock Synchronization to Increase Network Lifetime in WSN

Lab Exercise Objective. Requirements. Step 1: Fetch a Trace

Analysis of Immunity by RF Wireless Communication Signals

Performance Evaluation of Dynamic Bandwidth Allocation Algorithm for XG-PON Using Traffic Monitoring and Intra- Scheduling

Design of Remote data acquisition system based on Internet of Things

LIN (Local Interconnect Network):

Course Duration: Course Content Course Description Course Objectives Course Requirements

ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK

A Study on HL7 Standard Message for Healthcare System Based on ISO/IEEE 11073

Automated Security System using ZigBee

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

CHAPTER 1 Introduction 1

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks

Privacy and Security in library RFID Issues, Practices and Architecture

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

NFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate

Protocolo IEEE Sergio Scaglia SASE Agosto 2012

AN Application Note: FCC Regulations for ISM Band Devices: MHz. FCC Regulations for ISM Band Devices: MHz

Figure 1. The Example of ZigBee AODV Algorithm

System Virtualization and Efficient ID Transmission Method for RFID Tag Infrastructure Network

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

RFID Design Principles

Development of Integrated Management System based on Mobile and Cloud Service for Preventing Various Hazards

Vibration Measurement of Wireless Sensor Nodes for Structural Health Monitoring

CS698T Wireless Networks: Principles and Practice

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems

Security in Near Field Communication (NFC)

Professur Technische Informatik Prof. Dr. Wolfram Hardt. Network Standards. and Technologies for Wireless Sensor Networks. Karsten Knuth

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin,

Hosts Address Auto Configuration for Mobile Ad Hoc Networks

Research Article ISSN Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0

Hello viewers, welcome to today s lecture on cellular telephone systems.

Improving Bluetooth Network Performance Through A Time-Slot Leasing Approach

Personal Health Care Management System Developed under ISO/IEEE with Bluetooth HDP

RFID Design Principles

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

Multi-level Metadata Management Scheme for Cloud Storage System

Information Paper. FDMA and TDMA Narrowband Digital Systems

Wireless LAN g USB Adapter

Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks

SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS

Journal of Chemical and Pharmaceutical Research, 2014, 6(3): Research Article

CWNA Instructor Led Course Outline

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System

Transcription:

, pp. 33-42 http://dx.doi.org/10.14257/ijseia.2015.9.5.04 An Efficient Data Collection Algorithm of Active RFID Tags for Ubiquitous Services in Maritime Logistics Hyung-Rim Choi 1, Byung-Kwon Park 2, Ick-Sung Choi 3 and Young-Jae Park 4 1, 2 Dept. of Management Information Systems, Dong-A University 3 Media Device Lab., Dong-A University 4 Dept. of Management Information Systems, Tongmyong University 1, 2 {hrchoi, bpark} @dau.ac.kr, 3 pnk003@daum.net 4 Corresponding Author: yjpark@tu.ac.kr Abstract This paper proposes an efficient data collection algorithm for active RFID systems. The algorithm can be used for ubiquitous services in maritime logistics adaptation. Conventional algorithms use slotted aloha in ISO 18000-7 or CSMA/CA in DASH 7 mode 2. They show poor throughput performance because they collect all tags at every wakeup round. The proposed algorithm, adapted to maritime logistics, improved the performance by reading the previously collected tags without collision. The newly joined tags are collected by conventional collection algorithm. Experimental results show that the proposed algorithm has better throughput performance than conventional algorithms. Keywords: RFID, ISO/IEC 18000-7, DASH 7 mode 2, multiple tag identification, tag collection, wireless sensor network 1. Introduction RFID (Radio Frequency Identification) is a communication technology used to identify tags using wireless radio technology. It is widely used in such areas as port logistics, container movement monitoring, product movement monitoring from producer to consumer, passport identification, and transportation card access control. We adapted the RFID in maritime logistics for ubiquitous services. A RFID system can be classified into two types according to the power supply: an active RFID system and a passive RFID system. In the active RFID system, each tag has its own battery, and has the advantages of a long communication range with readers. In the passive RFID system, each tag does not have an internal power source and the power is supplied from the reader using wireless radio. Tag collection is one of the major processes in active RFID systems. The reader collects data from all the tags located within its communication range. An anti-collision process is needed to resolve data transmission collisions among tags. The process can be classified into two types: tree-based protocol and CSMA/CA-based protocol. Tree-based protocols use multiple reader queries and tag responses during tag collection [1]. They have significant overhead in communication bandwidth. The CSMA/CA-based protocol is more commonly used in active RFID systems [2]. We propose an efficient RFID tag collection protocol suitable for maritime logistics adaptation. We assume that A RFID tag is attached to a container. In the case of container transportation in maritime logistics, containers are occupied most of time in a container ship or in a seaport yard. In a container ship, all tags do not move during transportation. In a seaport yard, only a small fraction of containers are moved and the other containers are stacked in yard. For these reasons, the movement of tags is small in maritime logistics. We propose an efficient RFID tag collection protocol which is effective when the movement of tags is small. ISSN: 1738-9984 IJSEIA Copyright c 2015 SERSC

2. Conventional Protocols In this section, we introduce ISO/IEC 18000-7 and DASH 7 mode 2 as the international standards for active RFID using 433 MHz band. The two standards cannot collect more than thousands of tags due to their implementation complexity [3]. As the number of tags is large, the tag collection time is increased rapidly due to a lot of collisions. In addition, we introduce tree protocols commonly used for passive RFID. 2.1. ISO/IEC 18000-7 ISO/IEC 18000 is an international standard for RFID technologies. ISO/IEC 18000 is intended to support compatibility among RFID devices and to encourage inter-operability of products in RFID market. ISO/IEC 18000-7 defines an air interface for RFID devices operating at 433 MHz frequency [4]. ISO/IEC 18000-7 includes the specifications of the forward and return link parameters, operating frequency, operating channel accuracy, occupied channel bandwidth, maximum power, spurious emissions, modulation, duty cycle, data coding, bit rate, bit rate accuracy, bit transmission order, operating channels, frequency hop rate, hop sequence, spreading sequence, chip rate, and communication protocol. Figure 1 shows a tag collection example using the framed slotted aloha anti-collision protocol in ISO/IEC 18000-7. A reader broadcasts wake-up signal to wake up all the tags within the reader s RF communication range. Then, the reader collects data from all the tags through multiple collection rounds. This collection round is repeated until no additional tags are detected during three subsequent collection rounds. Collection round consists of collection command, listen period, and acknowledgement period. Collection round is started by broadcasting collection command from the reader, which is followed by listen period and acknowledgement period. The collection command contains a window size parameter which defines the total number of slots within which the tag can respond in listen period. Listen period is performed after broadcasting collection command. Upon receipt of a collection command, each tag selects a random slot and sends its response containing its own tag ID in that slot. As shown in Figure 1 (b), the status of time slots within the frame in listen period can be classified into three groups: identified slots that have exactly one tag response (first and fourth slots), collided slots that have more than two tag responses (second slot), and empty slots that have no tag response (third slot). In the example in Figure 1 (b), the reader receives two tag responses successfully, and the collided tags will be collected again during subsequent collection rounds later. After completing the listen period, the reader performs acknowledgement period to collect additional data from the tags identified in the listen period. By using a point-topoint read command, the reader reads additional data from tag, and then sends a sleep command to that tag for saving energy. Any tag that receives a sleep command changes its state to sleep state, and does not participate in the subsequent collection rounds. If a tag sent all data to reader in listen period, the tag data need not be collected again. In this case, the point-to-point read command transmission can be skipped and only the sleep command is sent to the tag. When the collection round is completed, the reader immediately starts next collection round by transmitting new collection command. The collection command includes new window size. Window size means the length of listen period. The window size is adjusted by estimating the number of remaining tags using the number of identified slots, collided slots, and empty slots. The window size is optimal when its length is same as the number of unread tags. The number of unread tags can be estimated by Equation (1) [5]. 34 Copyright c 2015 SERSC

(a) Wakeup Round (b) i th collection round (in case of window size = 4). Figure 1. Operation of ISO/IEC 18000 and DASH 7 mode 2 The estimated number of unread tags = 2.3922 * the number of collided slots ----------- -(1) ISO/IEC 18000-7 has drawbacks of poor performance and slot synchronization overhead. 2.2. DASH 7 Mode 2 DASH 7 mode 2 is a wireless network standard by DASH 7 Alliance to enhance ISO/IEC 18000-7 using 433 MHz frequency [2]. DASH 7 improved a lot of parts in ISO/IEC 18000-7. Dash 7 mode 2 uses new efficient PHY/MAC layers. The important advances are as follows: the use of new encoding and modulation schemes to support data transfer speed up to 200 Kbits/s, the enhanced wakeup signaling using packet trains, the un-slotted CSMA/CA to avoid collisions among tags, the low-power consumption for long battery life, the AES 128-bit shared key encryption support, the long communication range of up to 2 km, and the use of multiple channels while ISO/IEC 18000-7 uses single channel. Dash 7 mode 2 also supports the event-driven communication where an event can trigger a tag-initiated communication or a tag-to-tag communication which is not supported in ISO/IEC 18000-7. DASH 7 mode 2 has drawbacks of poor performance. 2.3. Tree Protocols Tree protocols have two processes: network configuration building step and tag data reading step. In network configuration building step, tree protocols use tree scheme to build network configuration information by repeating "reader-inquiring" and "tag answering" until all tags are identified. Reader broadcasts tag prefix by traversing the tree Copyright c 2015 SERSC 35

in depth first search method. If collision occurs for the tag prefix, reader divides the prefix into two subgroups by adding 0 and 1 at the end of prefix. This process is repeated until all tags are identified without collision. Tree protocols have drawbacks of poor performance, communication overhead for network configuration, and poor mobility support. 3. Proposed Tag Collection Algorithm We propose a tag collection algorithm more efficient than ISO/IEC 18000-7 and DASH 7 mode 2. We briefly explain the design requirements at subsection 3.1 and the proposed collection process at subsection 3.2. 3.1. Design Requirements The proposed collection algorithm is designed to achieve the following goals. Good throughput performance: Conventional algorithms have poor performance because they collect all tag data by using collision-based collection algorithm at every wakeup round. Conventional collection algorithms use slotted aloha, CSMA/CA, or tree protocols. The slotted aloha and CSMA/CA have poor throughput performance less than 36.8% [6, 7]. The throughput performance of tree protocols is less than 34.6% ~ 37.5% [1, 6, 7]. The throughput performance of proposed algorithm should be better than the conventional algorithms. Small communication overhead for tag collection: Conventional tree protocols have a significant communication overhead to build network configuration more than two times of the number of tags. The configuration should be rebuilt whenever the network topology is changed. The proposed protocol should have small communication overhead for tag collection. Support for multiple variable-length frames: Conventional ISO/IEC 18000-7 and DASH 7 support only the fixed-length frame. In addition, multiple response frames are read sequentially in acknowledgement period by using point-to-point read commands. The proposed algorithm should support to transmit multiple variable-length frames without point-to-point read command for each frame. 3.2. Proposed Collection Process The proposed algorithm improved the performance by reducing collisions in collection process. The proposed algorithm reads previously joined tags without collision, and collects only newly joined tags using the conventional method, while conventional algorithms collect all tags using collision-based collection algorithms at every wakeup round. The collection process consists of wakeup signaling, the proposed collection round for previously joined tags, and multiple conventional collection rounds for newly joined tags as shown in Figure 2 (a). The reader broadcasts wake-up signal to wake up all the tags within the reader s RF communication range. Then, the reader collects data from the previously joined tags through the proposed collection round. The proposed collection round for previously joined tags consists of synchronization period and direct reading period as shown in Figure 2 (b). The reader starts the proposed collection round by broadcasting a collection command in synchronization period. The reader manages previously joined tag set. The tags in the set are read directly without collision in direct reading period. In this period, the reader sends a point-to-point read command to read tag sequentially. Each tag receiving the point-to-point read command sends response with tag data to the reader. If the tag does not respond for some time, the reader removes the tag from the joined tag set and reads next tag in the joined tag set. The point-to-point read command can include a subset of followings: data acknowledgement for the recently read tag, tag sleep command for the recently read tag, next tag read 36 Copyright c 2015 SERSC

command, and no acknowledgement for the recently unread tag. After reading all tags in the joined tag set, conventional collection rounds for newly joined tags are started. In this collection round, the reader reads newly joined tags and the tags which did not send any response in previous wakeup rounds. The reader makes a new joined tag set by merging the old joined tag set with the newly joined tags in this process. The collection round for newly joined tags consists of synchronization period, listen period, and acknowledgement period as shown in Figure 2 (c). It is the same as conventional collection rounds. In the synchronization period, the reader broadcasts a collection command to tags. Window size (the length of listen period) is contained in collection command. In the listen period, the tag receiving collection command selects a random time and sends data to the reader in that time. To resolve collision among tags, slotted-aloha or CSMA/CA can be used. After finishing the listen period, the reader starts acknowledgement period. In the acknowledgement period, the reader collects additional data from the tags identified in the listen period by using a point-to-point read command. After reading the data from tag, reader sends sleep command to that tag for saving energy. Any tag that receives a sleep command changes its state to sleep state, and does not participate in the subsequent collection rounds. If tag sent all data to reader in listen period, the tag data need not be read again. In this case, the point-to-point read command transmission can be skipped and only sleep command is sent to tag in acknowledgement period. The reader repeats the collection round by transmitting the collection command. This process continues until no more tags are detected during three subsequent collection rounds. Collection round for previously joined tags and acknowledgement period in newly joined tags collection rounds are very similar procedure. We used proposed procedure for previously joined tags collection, while we used conventional algorithm (ISO/IEC 1800-7 or DASH 7 mode 2) for acknowledgement period in newly joined tags collection. The reason not to use proposed algorithm in newly joined tags collection is for compatibility with conventional algorithms (ISO/IEC 1800-7 or DASH 7 mode 2). By using this scheme, the proposed reader can also read the tags using conventional algorithms. In the proposed scheme, tag can send multiple variable length response frames. The response frame has a flag indicating that it is the last frame of response. The reader sends the next tag read command when it receives the last frame or when the reader did not receive any response for some time. If the reader did not receive response for some time, the reader removes the tag from the previously joined tag set and tries to read next tag in the previously joined tag set. (a) Wakeup Round Copyright c 2015 SERSC 37

(b) Collection Round for Previously Joined Tags (Joined Tag Collection) (c) i th Collection Round for Newly Joined Tags Figure 2. Operation of Proposed Algorithm An example operation of the wakeup round and the proposed collection round is shown in Figure 2. The operation of collection rounds for newly joined tags is same as that of the collection round shown in Figure 1 (b). Figure 2 (b) shows an example of proposed collection round for previously joined tags. Let s assume the previously joined tag set is tag 2, tag 4, tag 5 and tag 6. The reader initiates the proposed collection round for previously joined tags by broadcasting collection command. Reader sends point-to-point read command to tag 2 which is the first tag in previously joined tag set. Tag 2 received the read command and sends response frame to reader. The response frame has a flag that the frame is last frame. After receiving the response from tag 2, reader sends a frame which has information of data acknowledgement for tag 2, sleep command for tag 2, and point-to-point read command for tag 4 which is the second tag in previously joined tag set. Tag 4 has two frames to response. Tag 4 received the read command and sends two response frames to reader. The last flag of the first response frame has false value meaning that it is not the last frame. The last flag of second response frame has true value meaning that it is the last frame of tag response. After receiving the frame with last frame flag, reader reads next tag 5 by sending point-to-point read command to tag 5. Tag 5 does not respond because it is 38 Copyright c 2015 SERSC

moved out or in faulty state. Reader waits the response from tag 5 for some time. If the reader does not receive the response for some time, reader removes tag 5 from previously joined tag set and sends point-to-point read command to next tag 6. This read command includes not acknowledgement information that tag 5 was not able to read. Tag 6 responds by sending response frame to reader which is the last frame of response. After receiving the response from tag 6, reader sends a frame which includes information of data acknowledgement for tag 6 and sleep command for tag 6. After performing the proposed collection round for previously joined tags, conventional collection rounds to collect newly joined tags are started. The tags go into sleep state if it receives sleep command from reader or there is no communication for 30 seconds. 4. Experimental Results Experiments have been performed under various conditions to evaluate the proposed algorithm. We compared throughput performance and tag collection time of the proposed algorithm with those of conventional CSMA/CA algorithm and query tree algorithm. Conventional algorithms (ISO/IEC 18000-7 and DASH 7 mode 2) do not deal with information sharing among wakeup rounds. We assume that conventional algorithms do not share information among wakeup rounds. We used the estimation method proposed in [5] to adjust window size (the length of listen period) for every collection round. We assume that reader knows the number of all tags in wireless network. The experiment has been performed in LINUX using C language. Figure 3 shows the performance and the tag collection time of the proposed algorithm, the CSMA/CA algorithm, and query tree algorithm for each wakeup round time. The experiment has also been performed for the case where 10 % of the tags are leaved and 10 % of the tags are newly joined at every wakeup round. Figure 3 (a) shows the throughput performance for 100 tags. In proposed algorithm, the previously joined tag set is empty at first wakeup round. In this case, proposed algorithm uses conventional collection round algorithm to collect all the tags, In this reason, the throughput and collection time are similar to conventional CSMA/CA algorithm at first wakeup round. After performing the first wakeup round, the throughput of proposed algorithm is 362.9% and 129.8 % better than CSMA/CA algorithm and query tree algorithm, respectively. Figure 3 (b) shows the tag collection time for 100 tags. Tag collection time is the required time to collect all tags in a wakeup round. After performing the first wakeup round, the tag collection time of proposed algorithm is 73.2 % and 29.7% less than CSMA/CA algorithm and query tree algorithm, respectively. (a) Data throughput. Copyright c 2015 SERSC 39

(b) Tag collection time. Figure 3. Experimental Results for each Wakeup Round Figure 4 shows the performance and the tag collection time for various numbers of tags. When the tags are not moving, the proposed algorithm shows 386.4% and 143.6% better performance than CSMA/CA algorithm and query tree algorithm respectively. When 50% of tags join/leave, the proposed algorithm shows 154.8% and 137.0% better performance than the CSMA/CA algorithm and query tree algorithm, respectively. When tags are not moving, the collection time of the proposed algorithm also is reduced by 68.0% and 22.1% than CSMA/CA algorithm and query tree algorithm, respectively. When 50% of tags join/leave, the collection time of proposed algorithm is reduced by 20.5% and 13.8% than CSMA/CA algorithm and query tree algorithm, respectively. Figure 5 shows the performance and the tag collection time when tags join/leave. The proposed algorithm shows 250.5% better performance and 65.9% smaller collection time when the percentage of moving tags is less than 70% than CSMA/CA algorithm. The proposed algorithm shows better performance than query tree algorithm when the percentage of moving tags is less than 50%. (a) Data throughput 40 Copyright c 2015 SERSC

(b) Tag Collection Time. Figure 4. Experimental Results for the Number of Tags The proposed algorithm is efficient when the number of joining/leaving tags is less than 50%. Conventional CSMA/CA algorithm and query tree algorithm are not affected by the number of tag join/leaving. If most of tags join/leave or the reader moves fast, conventional algorithms can be good solution. 5. Conclusion This paper proposed an efficient tag collection algorithm to enhance throughput performance and collection time. The proposed algorithm can improve performance by directly reading previously collected tag set without collision. We showed the efficiency of proposed algorithm through experiments. The proposed algorithm is expected to be widely used because of its high performance. Furthermore, the proposed algorithm can be implemented with low complexity. Conventional RFID algorithms cannot collect more than thousands of tags due to their high implementation complexity [3]. When the percentage of joining/leaving tags is not large, the proposed algorithm can collect large number of tags efficiently. We believe the proposed algorithm can significantly contribute to the ubiquitous services using active RFID tags in maritime logistics where the join/leave movements of tags are small. For future research, we need to test proposed algorithm in the real environment. (a) Data throughput. Copyright c 2015 SERSC 41

Acknowledgements (b) Tag Collection Time. Figure 5. Experimental Results for Tag Replacements This work is supported by the project "Development of Active IP-RFID Technology in Maritime Logistics" from the Korean Ministry of Land, Transportation, and Maritime Affairs (MLTM). References [1] C. Law, K. Lee and K. Y. Siu, Efficient Memoryless Protocol for Tag Identification, Proceedings of the 4th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, Boston MA USA, (2000) August 11-11. [2] JP. Norair, ISO 18000-7 Mode 2 Specification, DASH7 Alliance, (2012). [3] Z. Bajic and N. Cargonja, Apparatus and method for managing power-constrained wireless devices, US Patent Application, vol. 13, no. 166, (2011), pp. 130. [4] ISO/IEC 18000-7, Information technology RFID for item management Part 7: Parameters for air interface communications at 433 MHz, ISO, (2009). [5] J. Cha and J. Kim, Novel Anti-collision Algorithms for Fast Object Identification in RFID Systems, Proceedings of the 11th International Conference on Parallel and Distributed Systems Workshops, Fukuoka Japan, (2005) July 22-22. [6] Z. Luo, Y. Shen, H. Wang and J. Jiang, An Approach of Adjusting Frame Size in Anti-Collision Algorithm for Active RFID System, Proceedings of the IEEE 13th International Conference on Communication Technology, Jinan China, (2011) September 25-28. [7] S. Chen and M. Zhang, Efficient Information Collection Protocols for Sensor- augmented RFID Networks, Proceedings of the IEEE International Conference on Computer Communications, Shanghai China, (2011) April 10-15. [8] G. H. S. Carvalho, I. Woungang, A. Anpalagan and S. K. Dhurandher, Energy-Efficient Radio Resource Management Scheme for Heterogeneous Wireless Networks: a Queueing Theory Perspective, Journal of Convergence, vol. 3, no. 4, (2012), pp. 15. [9] M. J. Sharma and V. Leung, IP Multimedia subsystem authentication protocol in LTE-heterogeneous networks, Journal of Human-centric Computing and Information Sciences, vol. 2, no. 1, (2012), pp. 1. [10] R. Sumathi and M. G. Srinivas, A Survey of QoS Based Routing Protocols for Wireless Sensor Networks, Journal of Information Processing Systems, vol. 8, no. 4, (2012), pp. 589. 42 Copyright c 2015 SERSC