• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhang Degan, Song Xiaodong, Zheng Ke, Liang Yanpin. A Kind of New Anti-Collision Approach Based on AID[J]. Journal of Computer Research and Development, 2015, 52(12): 2725-2735. DOI: 10.7544/issn1000-1239.2015.20140560
Citation: Zhang Degan, Song Xiaodong, Zheng Ke, Liang Yanpin. A Kind of New Anti-Collision Approach Based on AID[J]. Journal of Computer Research and Development, 2015, 52(12): 2725-2735. DOI: 10.7544/issn1000-1239.2015.20140560

A Kind of New Anti-Collision Approach Based on AID

More Information
  • Published Date: November 30, 2015
  • The RFID technology is one of the key technologies of the Internet of things which need to be studied. Based on our researches of the RFID technologies, a kind of new anti-collision approach based on AID (associated ID) has been put forward in this paper. As we know, the realization mechanism of anti-collision approach is between the tags with the memory and the memory-less tags. We propose a method to build the association between tags with memory, so that tags in a certain trigger condition can take the initiative to send their own ID.Tags use modulated binary pulse to send data to the reader. This approach is different from that with the memory-less tags. Because there exists association relationship between father-tag and son-tag, when it is applied to the multi-tree searching method that we have proposed, the advantage of this method is that a single communication can identify multiple tags at one time, which has greatly improved the identification efficiency. When the approach is applied to the uncertainty ALOHA algorithm, the reader can decide the location of the empty slots based on the position of the binary pulse, so the working reader can avoid the efficiency decreasing problem caused by reading empty slots. Due to no limit of ID length, experimental results of our simulations show that this approach can greatly decrease the probability of collision and improve the identification efficiency of the system during many kinds of its applications.
  • Related Articles

    [1]Liu Yongzhi, Qin Guiyun, Liu Pengtao, Hu Chengyu, Guo Shanqing. Provably Secure Public Key Authenticated Encryption with Keyword Search Based on SGX[J]. Journal of Computer Research and Development, 2023, 60(12): 2709-2724. DOI: 10.7544/issn1000-1239.202220478
    [2]Wang Houzhen, Qin Wanying, Liu Qin, Yu Chunwu, Shen Zhidong. Identity Based Group Key Distribution Scheme[J]. Journal of Computer Research and Development, 2023, 60(10): 2203-2217. DOI: 10.7544/issn1000-1239.202330457
    [3]Li Zichen, Xie Ting, Zhang Juanmei, Xu Ronghua. Post Quantum Authenticated Key Exchange Protocol Based on Ring Learning with Errors Problem[J]. Journal of Computer Research and Development, 2019, 56(12): 2694-2701. DOI: 10.7544/issn1000-1239.2019.20180874
    [4]Yang Yatao, Zhang Yaze, Li Zichen, Zhang Fengjuan, Liu Boya. RAKA: New Authenticated Key Agreement Protocol Based on Ring-LWE[J]. Journal of Computer Research and Development, 2017, 54(10): 2187-2192. DOI: 10.7544/issn1000-1239.2017.20170477
    [5]Yang Xiaoyan, Hou Mengbo, Wei Xiaochao. Verifier-Based Three-Party Password Authenticated Key Exchange Protocol[J]. Journal of Computer Research and Development, 2016, 53(10): 2230-2238. DOI: 10.7544/issn1000-1239.2016.20160463
    [6]Wen Weiqiang, Wang Libin. A Strongly Secure Lattice-Based Key Exchange Protocol[J]. Journal of Computer Research and Development, 2015, 52(10): 2258-2269. DOI: 10.7544/issn1000-1239.2015.20150518
    [7]Sun Yu, Han Qingtong, and Liu Jianwei. Design of Key Exchange Protocol Based on Short Group Signature[J]. Journal of Computer Research and Development, 2012, 49(12): 2619-2622.
    [8]Gao Haiying. Provable Secure ID-Based Authenticated Key Agreement Protocol[J]. Journal of Computer Research and Development, 2012, 49(8): 1685-1689.
    [9]Pan Jiaxin and Wang Libin. A Modular Approach Towards Design and Analysis of Authenticated Key Exchange Protocol Based on Extended Canetti-Krawczyk Model[J]. Journal of Computer Research and Development, 2011, 48(8): 1390-1399.
    [10]Ren Yongjun, Wang Jiandong, Wang Jian, Xu Dazhuan, and Zhuang Yi. Identity-Based Authenticated Key Agreement Protocols in the Standard Model[J]. Journal of Computer Research and Development, 2010, 47(9): 1604-1610.

Catalog

    Article views (1115) PDF downloads (561) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return