A novel RFID reader system framework based on peer-to-peer network

被引:2
作者
Xu H. [1 ]
Wang S.-P. [2 ]
Wang R.-C. [3 ,4 ]
机构
[1] College of Internet of Things, Nanjing University of Posts and Telecommunications
[2] College of Automation, Nanjing University of Posts and Telecommunications
[3] College of Computer, Nanjing University of Posts and Telecommunications
[4] Jiangsu Province High Technology Research Key Lab of Wireless Sensor Networks
关键词
IOT; P2P; RFID;
D O I
10.4156/ijact.vol3.issue3.10
中图分类号
学科分类号
摘要
With the development of Internet of Things (IOT), Radio Frequency Identification (RFID) is a hot topic in recent years. However, the traditional RFID reader system has some drawbacks, such as the effective reading distance of the reader is very small, and the reading speed of the reader is very slow. In this paper, we propose a novel RFID reader system framework, which is based on Peer-to-Peer (P2P) network. P2P overlay network is distributed system in nature, without any hierarchical organization or centralized control. In our proposed system, every reader is a peer in P2P network. The advantages of the proposed RFID reader system based on P2P are: 1) extend the reading distance; 2) decrease the reading collision; and 3) improve the reading speed.
引用
收藏
页码:104 / 110
页数:6
相关论文
共 21 条
[1]  
From RFID to The Internet of Things - Pervasive Networked Systems, pp. 1-28, (2006)
[2]  
Wu N.C., Nystrom M.A., Lin T.R., Yu H.C., Challenges to global RFID adoption, Technovation, Elsevier, 26, 12, pp. 1317-1323, (2006)
[3]  
Walk D., Buth D., Desch M., Et al., RFID Standards and Radio Regulations, pp. 1-257, (2008)
[4]  
Siror J.K., Guanqun L., Pang K., Huanye S., Dong W., Use of RFID for intelligent preshipment inspection, International Journal of Digital Content Technology and Its Applications, Advanced Institute of Convergence Information Technology, 4, 8, pp. 242-251, (2010)
[5]  
Wang L., Yi X., Lv C., Guo Y., Security improvement in authentication protocol for gen-2 based RFID system, Journal of Convergence Information Technology, Advanced Institute of Convergence Information Technology, 6, 1, pp. 157-169, (2011)
[6]  
Siror J.K., Guangun L., Kaifang P., Huanye S., Dong W., Impact of RFID technology on tracking of export goods in Kenya, Journal of Convergence Information Technology, Advanced Institute of Convergence Information Technology, 5, 9, pp. 190-199, (2010)
[7]  
Lua E.K., Crowcroft J., Pias M., Sharma R., Lim S., A Survey and Comparision Of Peer-to- Peer Overlay Network Schemes, IEEE Communications Surveys & Tutorials, IEEE, 7, 2, pp. 72-93, (2004)
[8]  
Ripeanu M., Peer-to-peer Architecture Case Study: Gnutella Network, pp. 99-100, (2001)
[9]  
Shirky C., Listening to napster, Peer-to-Peer: Harnessing the Benefits of a Disruptive Technology, pp. 19-28, (2001)
[10]  
Liang J., Kumar R., Ross K.W., The kazaa overlay: A measurement study, Computer Networks Journal, Elsevier, 49, 6, pp. 1-25, (2005)