Tải bản đầy đủ (.pdf) (110 trang)

Thiết kế và đánh giá hiệu năng các giao thức truyền thông trong hệ thống RFID

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (2.57 MB, 110 trang )

MINISTRY OF EDUCATION AND TRAINING
HANOI UNIVERSITY OF SCIENCE AND TECHNOLOGY

HOANG TRUNG TUYEN

DESIGN AND PERFORMANCE EVALUATION
OF COMMUNICATION PROTOCOLS IN RFID SYSTEMS

DOCTORAL DISSERTATION OF
TELECOMMUNICATION ENGINEERING

Hanoi−2023


MINISTRY OF EDUCATION AND TRAINING
HANOI UNIVERSITY OF SCIENCE AND TECHNOLOGY

HOANG TRUNG TUYEN

DESIGN AND PERFORMANCE EVALUATION
OF COMMUNICATION PROTOCOLS IN RFID SYSTEMS
Major: Telecommunication Engineering
Code: 9520208

DOCTORAL DISSERTATION OF
TELECOMMUNICATION ENGINEERING
SUPERVISORS:
1.Assoc. Prof. Nguyen Thanh Chuyen
2.Dr. To Thi Thao

Hanoi−2023




DECLARATION OF AUTHORSHIP
I, Hoang Trung Tuyen, declare that the dissertation titled "Design and performance evaluation of communication protocols in RFID systems" has been entirely
composed by myself. I assure some points as follows:


This work was done wholly or mainly while in candidature for a Ph.D. research
degree at Hanoi University of Science and Technology.



The work has not been submitted for any other degree or qualifications at Hanoi
University of Science and Technology or any other institutions.



Appropriate acknowledgement has been given within this dissertation where reference has been made to the published work of others.



The dissertation submitted is my own, except where work in the collaboration has
been included. The collaborative contributions have been clearly indicated.

Hanoi, September 12, 2023
PhD Student

Hoang Trung Tuyen

SUPERVISORS


Assoc.Prof. Nguyen Thanh Chuyen

i

Dr. To Thi Thao


ACKNOWLEDGEMENT
This dissertation was written during my doctoral course at School of Electrical
and Electronic Engineering (SEEE) and Communications Theory and Applications
Research Group (CTARG), Hanoi University of Science and Technology (HUST). I
would like to thank all member of SEEE, CTARG as well as all of my colleagues in
Military Science Academy (MSA). I am so grateful for all people who always support
and encourage me for completing this study.
I would like to extend my heartfelt gratitude to my principal supervisor Associate
Professor Nguyen Thanh Chuyen for his instructive guidance and valuable suggestions
in my academic studies. He gave me much help and advice during my PhD study and
the preparation of this dissertation. I am deeply grateful for his help. I gratefully
appreciate my secondary advisor Dr To Thi Thao for her constructive suggestions.
I also acknowledge Associate Professor Le Doan Hoang from the University of Aizu,
Japan, for their instructive comments and discussions about my research work. I am
also thankful to my friends and my fellow CTARG members for their discussions and
comments about my dissertation.
I would like to express my heartfelt gratitude to my family, wife, and children for
their unwavering support throughout my PhD journey. Their encouragement, patience,
and understanding have been instrumental in helping me overcome the challenges and
obstacles that I have encountered along the way. Their love and sacrifices have been
my driving force, and I am forever grateful for their unwavering support. Thank you
for being my rock and my inspiration, I could not have done this without you.

Hanoi, 2023
Ph.D. Student

ii


CONTENTS

DECLARATION OF AUTHORSHIP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

i

ACKNOWLEDGEMENT. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

ii

CONTENTS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

vi

ABBREVIATIONS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

vi

SYMBOLS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

vii

LIST OF TABLES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .


xi

LIST OF FIGURES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

xiv

INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1

CHAPTER 1. BACKGROUND OF STUDY . . . . . . . . . . . . . . . . . . . . . . . . .

6

1.1. Research Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

6

1.1.1. Introduction to the Internet of Things (IoT). . . . . . . . . . . . . . . . . . . . . . . . . . .

6

1.1.2. Radio Frequency Identification (RFID) Systems . . . . . . . . . . . . . . . . . . . . . . .

7

1.2. Problem Statement and Literature Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

16


1.2.1. Anti-collision protocols/algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

17

1.2.2. Missing-tag Detection/Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

23

1.3. Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

25

CHAPTER 2. PERFORMANCE ANALYSIS OF HYBRID ALOHA/CDMA
RFID SYSTEMS WITH QUASI-DECORRELATING DETECTOR IN NOISY
CHANNELS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

26

2.1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

26

2.2. System Description and Conventional Approach . . . . . . . . . . . . . . . . . . . . . . . . . .

27

2.2.1. System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

27


2.2.2. Transmission Channel Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

28

2.2.3. Conventional Decorrelating Detector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

29

2.3. Performance Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

30

2.3.1. Quasi-decorrelating Detector (QDD) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

30

2.3.2. Performance Analysis of Tag Identification Efficiency . . . . . . . . . . . . . . . . .

32

2.4. Performance Evaluation and Discussions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

34

2.4.1. System Efficiency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

34

iii



2.4.2. False Alarm and False Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

38

2.5. Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

41

CHAPTER 3. ON THE DESIGN OF NOMA-ENHANCED BACKSCATTER COMMUNICATION SYSTEMS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
42
3.1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

42

3.1.1. Related Works and Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

42

3.1.2. Major Contributions and Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

43

3.2. System Model and Conventional Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

45

3.2.1. System Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

45


3.2.2. Conventional Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

46

3.3. Proposed NOMA-Enhanced BackCom Systems . . . . . . . . . . . . . . . . . . . . . . . . . . .

48

3.3.1. NOMA-Enhanced BackCom: Static Systems . . . . . . . . . . . . . . . . . . . . . . . . .

48

3.3.2. NOMA-Enhanced BackCom: Dynamic Systems . . . . . . . . . . . . . . . . . . . . . .

51

3.4. Simulation Results and Discussions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

52

3.4.1. Number of Successful Backscatter Nodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

53

3.4.2. Number of Successful Transmitted Bits. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

57

3.5. Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .


60

CHAPTER 4. EFFICIENT MISSING-TAG EVENT DETECTION PROTOCOLS TO COPE WITH UNEXPECTED TAGS AND DETECTION
ERROR IN RFID SYSTEMS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

61

4.1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

61

4.2. System Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

62

4.2.1. System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

62

4.2.2. Communication Protocol: Aloha, Wireless Channel Model, and Detection
Error . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

63

4.2.3. Conventional Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

65

4.3. Proposed Missing-Tag Event Detection Protocols . . . . . . . . . . . . . . . . . . . . . . . . .


66

4.3.1. Protocol Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

66

4.3.2. Parameter Optimization under Impacts of Unexpected Tags and Detection
Error . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

69

4.3.3. Expected Detection timeslots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

70

iv


4.4. Numerical Results and Discussions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

71

4.4.1. False-Alarm and True-Alarm Probabilities. . . . . . . . . . . . . . . . . . . . . . . . . . . .

74

4.4.2. Performance Comparison with Conventional Protocols. . . . . . . . . . . . . . . .

75


4.5. Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

76

CONCLUSION AND FUTURE WORKS . . . . . . . . . . . . . . . . . . . . . . . . . . . .

78

PUBLICATIONS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

80

BIBLIOGRAPHY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

81

APPENDICES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

92

v


ABBREVIATIONS

No.

Abbreviation Meaning


1

APRC

Adaptive Power Reflection Coefficient

2

AWGN

Addtitive White Gaussian Noise

3

BMTD

Bloom filter-based Missing-Tag Detection

4

BN

Backscatter Node

5

CD

Code-Domain


6

CDMA

Code Division Multiple Access

7

DD

Decorrelating Detector

8

DSP

Dynamic-Size Pairing

9

FA

False Alarm

10

FDMA

Frequency Division Multiple Access


11

FSA

Frame Slotted Aloha

12

ID

IDentity

13

IoT

Internet of Thing

14

MAC

Medium Access Control

15

MAI

Multiple Access Interference


16

NOMA

Non-othogonal Multiple Access

17

PD

Power-Domain

18

QDD

Quasi-Decorrelating Detector

19

RF

Radio Frequency

20

RFID

Radio Frequencyl IDdentification


21

SDMA

Space Division Multiple Access

22

SIC

Successive Interference Cancellation

23

SINR

Signal-to-Interference-and Noise Ratio

24

SNR

Signal-to-Noise Ratio

25

TA

True Alarm


26

TDMA

Time Division Multiple Access

27

TNP

Two Node Pairing
vi


SYMBOLS

No.

Symbol

Meaning

1

A

Multi-stage feed-forward matrix

2


B

Number of backscatter nodes

3

b

Number of backscatter nodes multiplexed

4

α

Required reliability

5

C1i

The i-th tag counter, i ∈ [1, |E|]

6

C2

Reader counter

7


Cth

Counter threshold

8

c

Gold code

9

D1

Expected detection time slots of mRUN1 protocol

10

D2

Expected detection time slots of mRUN2 protocol

11

E

Set of expected tags

12


E[D]

Expected detection time slots

13

i ]
E[X01

Expected number of slots that is expectedly empty in the i-th in
pre-computed frame but observed as non-empty in the i-th executed
frame

14

ξi

Power reflection coefficient of the i-th BN

15

ϵ

Number of feed-forward stage matrix

16

f

Frame size


17

G

Annular region

18

G

Code set

19

g

Probability that a missing-tag event is detected at a given time slot
among f slots

20

H(.)

Hash function

21

h


Channel coefficient

22

I

Identity matrix

23

K

Number of Gold codes

24

L

Length of the register
vii


25

Lc

Gold code length

26


M

Truncation matrix

27

M

NOMA group size

28

m

Number of tags in E missing from population

29

N

Number of tags

30

B

Number of BNs

31


Nl

Number of tags in the l-th slot

32

Nfa

Number of available tags detected as missing ones

33

Nfd

Number of actual missing tags detected as available ones

34

No

Noise power

35

NS

Normalized number of successful BNs

36


N near

Number of successful BNs from near subregion

37

N far

Number of successful BNs from far subregion

38

Nnear

Number of BNs in near regions

39

Nfar

Number of BNs in far regions

40

n

Number of frames required to ensure detection

41


n

Vector of White Gaussian noise

42

n(t)

White Gaussian noise

43

η

System efficiency

44

P

Reader’s transmitted power

45

PeDD

Bit error probability using DD

46


PeQDD

Bit error probability using QDD

47

Paloha (i)

Probability that i tags among N tags simultaneously transmit their
IDs.

48

Pd (a|i)

Probability that a tags are not collided

49

Ps (a|i)

Probability that a tags are successfully detected

50

Pcdma (a|i, K)

Probability that a tags are assigned with a different codes of the K
codes


51

c
Pcdma
(i − a|i, K − a) Probability

that the remaining (i − a) tags are collided with the

(K − a) codes
52

Ps (j)

Probability that the j-th tag is successfully detected

53

Pde

Probability of detection error
viii


54

Pr i

Received power at the reader from the i-th BN

55


Pfp

Probability that slots, which expectedly include a particular missing
tag, are observed as non-empty after nf executed frame

56

Pnear (r)

Probability that a node of distance r belongs to the near subregions.

57

Pfar (r)

Probability that a node of distance r belongs to the far subregions.

58

pn

Probability of a BN being in the subregion specified by RI and r

59

pf

Probability of a BN being in the subregion specified by RO and r


60

p(t)

Rectangular pulse

61

pi01

Probability that an expectedly empty slot is observed as non-empty
in the i-th frame

62

ρ

Path-loss coefficient

63

Q(.)

Monotonically decreasing function

64

R

Random seed


65

R

Correlation matrix

66

R−1

Inversion matrix of R

67

RI

Inner radius of coverage area

68

RO

Outer radius of coverage area

69

Rmn

Cross-correlation coefficient of matrix R


70

Rfa

False alarm rate

71

Rfd

False detection rate

72

r

Distance between a BN and a reader

73

r(t)

Received signal at the reader

74

S

Total number of slots used to detect a missing-tag event


75

s(t)

Transmitted signal from the tag

76

sgn(.)

Sign function

77

T

Threshold to detect missing tags

78

Ts

Time-slot duration

79

Tb

Bit duration


80

Tc

Chip duration

81

U

Set of unknown/unexpected tags

82

ν(t)

Transmitted signal at the reader

ix


83

l
X01

Random variable for number of slots that is expectedly empty in
the l-th in pre-computed frame but observed as non-empty in the
l-th executed frame


84

x

Vector of transmitted information bits

85

ˆ
x

Estimate of x

86

x

Transmitted information bit

87

γth

Reader’s sensitivity threshold

88

z


Filters’ output signal matrix

89



Signal vector after MAI elimination

90

⌊·⌋

Greatest integer function

91

|·|

Cardinality of a set

x


LIST OF TABLES

1.1

Tag characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

2.1


Simulation parameters for RFID system. . . . . . . . . . . . . . . . . . . . 34

3.1

Simulation parameters for NOMA-aided BackCom systems. . . . . . . . . . 53

3.2

Backscatter node’s data structure. . . . . . . . . . . . . . . . . . . . . . . . 53

4.1

A comparison of related works on missing-tag event detection. . . . . . . . 68

4.2

Simulation parameters for missing-tag event detection protocols. . . . . . . 72

4.3

Optimal selection of Cth in mRUN1 and mRUN2, given Pta = 0.95 and
m = T = 5. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75

xi


LIST OF FIGURES

1.1


The Internet of Things (IoT) Integration [14]. . . . . . . . . . . . . . . . . 6

1.2

Components of an RFID system. . . . . . . . . . . . . . . . . . . . . . . . 7

1.3

RFID tag. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

1.4

A passive RFID tag having 96 bits of memory to represent an EPC number. Header identifies the version of EPC itself; EPC Manager number
identifies an organization; Object class refers to a unique type of product
produced by an EPC manager; Serial number uniquely identifies each
item within an object class. . . . . . . . . . . . . . . . . . . . . . . . . . . 9

1.5

A magnetic coupling RFID system. . . . . . . . . . . . . . . . . . . . . . . 11

1.6

An electromagnetic coupling RFID system. . . . . . . . . . . . . . . . . . . 12

1.7

An illustration of Tree-based protocol. . . . . . . . . . . . . . . . . . . . . 13


1.8

FSA throughput for different frame sizes. . . . . . . . . . . . . . . . . . . . 15

1.9

An illustration of FSA protocol. . . . . . . . . . . . . . . . . . . . . . . . . 15

1.10 An illustration of tag collision (a) and reader collision (b). . . . . . . . . . 16
1.11 An illustration of FSA-based communication protocol with CE and DE. . . 19
1.12 CDMA detector: A matched filter bank [78]. . . . . . . . . . . . . . . . . . 21
1.13 Decorrelating detector. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
1.14 A RFID system using NOMA. . . . . . . . . . . . . . . . . . . . . . . . . . 23
2.1

CDMA-based RFID system with FSA protocol. . . . . . . . . . . . . . . . 27

2.2

Transmission channel model. . . . . . . . . . . . . . . . . . . . . . . . . . . 29

2.3

Reader structure with decorrelating detector. . . . . . . . . . . . . . . . . . 30

2.4

Quasi-decorrelating detector structure. . . . . . . . . . . . . . . . . . . . . 31

2.5


Flowchart of simulation process to calculate BER and system efficiency. . . 35

2.6

BER performance of QDD and DD detectors with respect to a number
of tags, given Lc = 31, SNR = 7 dB ϵ = 3. . . . . . . . . . . . . . . . . . . 36

2.7

BER comparison between DD and QDD by varying values of SNR. . . . . 36

2.8

System efficiency with respect to the number of tags, given f = 32, K
= 30, Lc = 30, SNR = 7 dB. . . . . . . . . . . . . . . . . . . . . . . . . . . 37

2.9

System efficiency with respect to the number of tags, given K = 30, f
= 32, Lc = 31, SNR = 7 dB. . . . . . . . . . . . . . . . . . . . . . . . . . . 38
xii


2.10 System efficiency with respect to the number of codes, given K = 30, f
= 32, Lc = 31, SNR = 7 dB. . . . . . . . . . . . . . . . . . . . . . . . . . . 39
2.11 System efficiency with respect to frame size, given N =1000, K = 30, Lc
= 31. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
2.12 False alarm and false detection rate with respect to the SNR in the
conventional missing-tag detection protocols with DD and QDD, given

N =1000, K = 15, f = 512, L = 4, Threshold = 0.3. . . . . . . . . . . . . 40
2.13 False alarm and false detection rates with respect to the threshold in the
conventional missing-tag detection protocols with DD and QDD, given
N =1000, K = 15, f = 512, L = 4, SNR = 0 dB. . . . . . . . . . . . . . . 40
3.1

Illustration of (a) system model, (b) time-slot structure, and (c) NOMAaided BackCom system with M = 2. . . . . . . . . . . . . . . . . . . . . . 45

3.2

The structure of backscatter node with variable power reflection coefficients. 51

3.3

The flowchart of TNP scheme. . . . . . . . . . . . . . . . . . . . . . . . . . 54

3.4

The flowchart of APRC scheme. . . . . . . . . . . . . . . . . . . . . . . . . 55

3.5

The flowchart of DSP scheme. . . . . . . . . . . . . . . . . . . . . . . . . . 56

3.6

The comparison of different schemes in static NOMA-enhanced BackCom systems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57

3.7


Normalized successful BNs versus channel threshold for the static systems using the TNS scheme. . . . . . . . . . . . . . . . . . . . . . . . . . . 57

3.8

Normalized successful BNs versus channel threshold for the static systems using the APRC scheme. . . . . . . . . . . . . . . . . . . . . . . . . . 58

3.9

Normalized successful BNs versus channel threshold for the dynamic
systems using the DSP scheme. . . . . . . . . . . . . . . . . . . . . . . . . 58

3.10 Performance comparison of different schemes in static NOMA-enhanced
BackCom systems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
3.11 Performance comparison of DSP and hybrid APRC/DSP schemes in
dynamic NOMA-enhanced BackCom systems. . . . . . . . . . . . . . . . . 59
4.1

RFID system model. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63

4.2

Aloha communication protocol with unexpected tags and detection error. . 64

4.3

Flowchart of mRUN1 protocol.

. . . . . . . . . . . . . . . . . . . . . . . . 67

4.4


Flowchart of mRUN2 protocol.

. . . . . . . . . . . . . . . . . . . . . . . . 68

4.5

Detection error probability Pde versus the number of tags in a slot. . . . . 72

xiii


4.6

Theoretical and simulation results of the number of slots with respect
to the number of missing tags. . . . . . . . . . . . . . . . . . . . . . . . . . 73

4.7

Theoretical and simulation results of the number of slots with respect
to the detection error probability. . . . . . . . . . . . . . . . . . . . . . . . 73

4.8

True-alarm and false-alarm probabilities with respect to the detection
error probability of mRUN1. . . . . . . . . . . . . . . . . . . . . . . . . . . 74

4.9

True-alarm and false-alarm probabilities with respect to the detection

error probability of mRUN2. . . . . . . . . . . . . . . . . . . . . . . . . . . 75

4.10 The numbers of slots with respect to the number of missing tags of
conventional RUN, BMTD, proposed mRUN1 and mRUN2. . . . . . . . . 76
4.11 The numbers of slots with respect to the detection error probability of
conventional RUN, BMTD, proposed mRUN1 and mRUN2. . . . . . . . . 77
4.12 False-alarm (FA) and True-alarm (TA) probabilities with respect to
the detection error probability of conventional RUN, BMTD, proposed
mRUN1 and mRUN2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77

xiv


INTRODUCTION
Motivation
Radio Frequency IDentification (RFID) has become increasingly prevalent in IoT
applications due to advancements in automatic identification technology. The technology provides a convenient means of identifying and tracking a huge number of
different objects and devices that make up IoT networks. It has also recently garnered
significant research interests, prompting extensive exploration of challenging issues in
literature, such as tag anti-collision and missing-tag detection/monitoring. Tag anticollision focuses on resolving signal collision caused by simultaneous transmission from
multiple tags [1]. This collision leads to incorrect signal decoding at central processing
units (readers/interrogators) and renders subsequent operations of RFID systems nonfunctional. Meanwhile, the missing-tag detection/monitoring issue is to design reliable
protocols that can accurately detect/monitor whether some tags are missing [2].
In order to cope with the tag collision, many communications/access protocols have
been designed for years. They are usually based on different multiple access techniques,
which schedule and control the order of each tag’s transmission. Among them, Code
Division Multiple Access (CDMA) [3, 4] is considered as one of the most promising anticollision solutions, especially for dense RFID systems. Each tag is assigned with one
of the orthogonal pseudo-codes so that multiple tags could be successfully identified at
the same time. In this case, Decorrelating Detector (DD) is usually implemented at the
reader for signal decoding. Nevertheless, the implementation of DD might also enhance

the background noise according to [5], and thus, might degrade the system performance.
To overcome the disadvantage of the noise enhancement in DD, Quasi-Decorrelating
Detector (QDD) [6] has been studied as one of the alternative solutions. This motivates
me to study and propose using QDD as one of the most efficient candidates for the
structure of readers in CDMA-based RFID systems.
Communication and signal processing algorithms/technologies also play an important role in mitigating the tag collision. One of the well-known recent approaches is
non-orthogonal multiple access (NOMA). NOMA enables multiple tags to be served at
the same time/frequency resources by using the principle of successive interference cancellation (SIC) decoding [7]. This is achieved by differently designed transmitted power
levels, also known as power-domain NOMA. In [8], authors provide a design guideline
1


for the backscatter communication (BackCom) systems (including RFID) using a hybrid TDMA and power domain NOMA. In particular, backscatter nodes (BNs) i.e.,
tags are categorized into different regions based on their power levels. Then, NOMA
is implemented for groups of tags selected from the different regions. However, there
are three major drawbacks to this design framework. Firstly, the BNs are chosen for
NOMA grouping in a random manner, which may increase the likelihood of signal
decoding failure due to adverse wireless channel issues. Secondly, BNs are assigned
by constant power reflection coefficients based on their locations, which is to make a
significant difference in the channel gains. Using these fixed settings, nonetheless, may
lead to poor performance over time-varying channel conditions. Thirdly, the design
framework in [8] is intended for static NOMA-aided BackCom systems only. In practical systems, BNs may frequently enter or leave the reader’s coverage area, necessitating
dynamic schemes. These limitations make it essential to develop novel schemes to enhance the performance of conventional NOMA-aided BackCom systems. Therefore,
this dissertation aims to address these limitations by proposing new paring schemes
both static and dynamic BackCom systems.
On the other hand, the issue of missing-tag detection/monitoring in RFID systems
has been extensively studied in both academia and industry, but it is still a relatively
new and under-investigated problem. Many existing works assume a perfect system
implementation that includes only expected tags that are known to RFID readers. The
assumption is, clearly, not practical since there also exists unexpected tags (the ones

whose IDs are not known a priori to readers) in real RFID systems. In such scenarios,
the unexpected tags might result in more severe radio collision and wrong observations
of the status of each timeslot. In this situation, previous protocols may report false
alarms on the event detection. Moreover, many existing studies do not consider the
issue of detection error due to effects of wireless transmission and noise, which is a
common phenomenon in RFID literature [9, 10, 11]. In particular, when the received
signal strength at the reader during a timeslot falls below a certain sensitivity threshold
due to noise or multipath fading, the signal decoding is not successful even in timeslots
with one tag’s response. As a result, traditional missing-tag detection protocols may
frequently produce false alarms for the system administrator, requiring more time and
energy consumption. This inefficiency and unreliability render the protocols no longer
efficient and reliable. Therefore, it is crucial to mitigate the impact of unexpected tags
and the detection error in missing-tag event detection protocols.

2


Objectives
The primary objectives of this dissertation is to offer a design framework for the
performance enhancement of RFID systems, by considering the critical issues of (i) tag
anti-collision and (ii) missing-tag monitoring.
For tag anti-collision, the objective of implementing QDD at the reader structure
in hybrid Aloha/CDMA-based RFID systems is not only to improve tag identification performance, but also to overcome the disadvantage of noise enhancement in DD.
Another objective in this research area is to improve the performance of conventional
NOMA-aided BackCom using novel user pairing schemes for static and dynamic systems. One scheme selects NOMA groups based on successful decoding probability,
while another adjusts BN’s power reflection coefficients depending on their channel
conditions to increase decoding probability.
On the other hand, for missing-tag detection, the objective is to re-design conventional detection protocols taking the effect of unexpected tags and detection error into
account. It is expected that the new protocols outperform conventional ones in terms
of time (and/or) energy consumption.


Research scope and methodology
Research scope
The research scope of this dissertation focuses on the efficient designs and analysis
in terms of time/energy consumption of tag anti-collision and missing-tag detection
protocols in RFID systems. The designs are mainly based on assumptions/requests of
practical RFID models that might not be optimal for current protocols. They, then,
adopt common and different communication/signal processing technologies, algorithms
to improve the protocols’ performance. It is also noted that the research scopes are
contributed in terms of theoretical points of view without testbed, experimental systems.
Methodology
The research methodology employed in this dissertation mainly includes mathematical analysis and Monte Carlo computer simulation evaluation. Mathematical analysis
is for protocol designs, while Monte Carlo simulations are implemented to validate the
logic and also, the accuracy of the designs.

3


Contributions and structure of the dissertation
The dissertation has three main contributions as follows:
• The first contribution of dissertation is the analysis and evaluation of the performance of hybrid ALOHA/CDMA-based RFID systems using QDD as a multi-user
detector. This work is proved both in terms of analysis and computer simulations
to enhance the efficiency of tag identification under effects of wireless channel
impairments. This contribution has been published in:
Tuyen T. Hoang, Hieu V. Dao, Vu X. Phan, and Chuyen T. Nguyen, Performance Analysis of Hybrid ALOHA/CDMA RFID Systems with Quasidecorrelating Detector in Noisy Channels, REV Journal on Electronics and
Communications, Vol. 9, No. 1–2, January–June, 2019.
• The second contribution of the dissertation is the proposal of a comprehensive
design framework for both static and dynamic NOMA-enhanced BackCom systems. It includes, for static systems, Two-node pairing (TNP) and novel adaptive power reflection coefficient (APRC) schemes. For dynamic systems, a novel
dynamic-sized pairing (DSP) and hybrid APRC/DSP schemes are introduced.
These schemes are proposed to improve the system performance in terms of the

number of successfully decoded bits and the number of successful multiplexed BNs
from different regions for NOMA grouping. This contribution has been submitted
to IEEE Access.
Tuyen T. Hoang, Hoang D. Le, Luu X. Nguyen, and Chuyen T. Nguyen, On
the Design of NOMA-Enhanced Backscatter Communication Systems, IEEE
Access, DOI: 10.1109/ACCESS.2023.3272892, (ISI), May 2023.
• The third contribution of the dissertation is proposal of two protocols, namely
mRUN1 and mRUN2, to address the issue of missing-tag event detection. These
protocols use tracking counters at the reader and tags to mitigate detection errors
and announce the event only if the counters reach a predefined threshold. The
protocols are validated through performance analysis and simulations, showing
their superiority over conventional protocols in terms of false-alarm and true-alarm
probabilities. The contribution has been published in Wireless Communications
and Mobile Computing, 2019.
Chuyen T. Nguyen, Tuyen T. Hoang, Linh T. Hoang, and Vu X. Phan
(2019), Efficient missing-tag event detection protocols to cope with unexpected
4


tags and detection error in RFID systems, Wireless Communications and Mobile Computing, DOI: 10.1155/2019/6218671, (ISI), 2019.
The dissertation consists of four chapters and is organized as follows:
• Introduction provides the main motivations, objectives of the dissertation as well
as research scope, methodology, contributions, and structure of dissertation.
• Chapter 1 presents the research background, problem statements, and literature
review.
• Chapter 2 addresses the tag anti-collision issue with CDMA-based approach in
which Quasi-decorrelating detector is adopted in hybrid ALOHA/ CDMA-based
RFID systems.
• Chapter 3 focuses the design and analysis of efficient user pairing schemes for
NOMA-enhanced Backscatter communication systems.

• Chapter 4 considers the missing-tag monitoring issue with unexpected tags and
detection error.
• Conclusion and future works summarize the contributions of this dissertation, and
introduces some future works.

5


Chapter 1
BACKGROUND OF STUDY
1.1. Research Background
1.1.1. Introduction to the Internet of Things (IoT)
The growth of the Internet of Things (IoT) has been spurred by recent advancements in wireless communication and smart device technologies. This enables millions
of physical objects to be connected to the Internet with widespread sensing and computing abilities, as illustrated in Fig. 1.1. The IoT plays a crucial role in the future of
the internet and has been widely discussed by both academic and industrial communities because of its ability to provide various customer services in various aspects of
daily life [12, 13]. The IoT allows for smooth communication and automatic control
among different devices without human interaction. This results in the potential for
industry revolution and significant benefits to society through advanced, intelligent,
and automated remote management systems.

Figure 1.1: The Internet of Things (IoT) Integration [14].

On the other hand, the fast growth of smart devices in IoT applications poses
challenges of autonomy, low-power consumption, low cost, and high scalability [13, 15],
while the essential issue is making a full interoperability of interconnected IoT devices
possible [16]. To cope with the issue, there are several solutions in the literature
6


which are Internet Protocol version 6 (IPv6), Wireless Sensor Networks (WSNs), and

Radio Frequency Identification (RFID). Nevertheless, it is infeasible and un-necessary
for each among billions of IoT devices to be associated with an IP address [17]. In
addition, the WSNs face with not-easy-to-solve challenges of energy consumption and
configuration [18, 19]. In this case, the RFID technology has been considered as one of
the most potential candidates for the aforementioned connectivity issue in IoT thanks
to a number of considerable benefits, which is also our focus in this dissertation. Indeed,
it is reported in [19] that RFID has become one of the fundamental pillars that enable
the IoT and promote its rapid development. It has been widely used in a variety of
large-scale applications, including inventory management, logistics tracking, precision
agriculture, etc., to enable automatic identification and tracking of tags attached to
objects [20, 21, 22, 23, 24]. Moreover, RFID is capable of detecting/identifying multiple
objects/tags without line-of-sight signal propagation, while it is able to offer a number
of other great advantages including low manufacture costs (5 cents per tag), easy
implementation, long service lifetime, and robustness [20].
1.1.2. Radio Frequency Identification (RFID) Systems
Radio Frequency Identification (RFID) is a contactless automatic identification and
data capture (AIDC) technology that uses RF signals for communication. Data is
stored on silicon chips (tag memory), which are attached to targets such as books,
parcels, humans, animals, or other objects. This section presents the components of an
RFID system and explains how it operates to provide a better understanding of RFID.
1.1.2.1. RFID Components
As illustrated in Fig. 1.2, a typical RFID system consists of a reader, multiple
tags/transponders, and the middle-ware software (application) [25].
Data

Reader

Clock
Energy


Contactless
data carrier =
Transponder

Coupling element
(coil, microwave antenna)

Application

Figure 1.2: Components of an RFID system.

RFID Tag: Tags (or transponders) are the actual data-carrying devices that are
attached to objects for identification. A tag harvests energy from reader interrogation,
7


performs lightweight computation, and transmits data in response to reader queries.
Due to their simple structure, small size, and low manufacturing cost, tags serve as an
economical and competitive method for managing massive objects, such as inventory
control, object tracking, activity monitoring, authentication, localization, and more.

Figure 1.3: RFID tag.

The basic components of a tag include a microchip containing non-volatile memory
and an antenna to collect and transmit radio waves as shown in Fig. 1.3 [26]. The chip
contains circuitry that stores a unique binary number in called an electronic product
code (EPC) [27], while the antenna serves as the receiver and transmitter of information. EPC is a universal identifier (normally, 64 or 96 bits) that provides a unique
identity to a specific physical object. The antenna, which is much larger than the
microchip, typically consists of loops or coiled wire extending out from the chip. It
receives signals from an RFID reader and backscatters the signal with required data.

RFID tags can be broadly classified in three types: passive, active, and semi-passive[1].
• Passive tags do not have their own power source, and they rely on the energy
emitted by the RFID reader to power them up. When the RFID reader sends
a signal to the tag, the tag absorbs the energy and uses it to transmit the data
back to the reader. Passive tags can be further classified as low-frequency (LF),
high-frequency (HF), and ultra-high frequency (UHF) tags. LF tags are suitable
for short-range applications, such as access control systems, whereas HF tags
are ideal for mid-range applications, such as payment systems. UHF tags are
suitable for long-range applications, such as inventory management and supply
chain management. Fig. 1.4 shows the EPC tag data structure of the 96-bit
passive tag [28, 29].
• Active tags have an onboard power source, usually a battery, and are equipped
with a powered receiver and transmitter. This enables the reception of very weak
8


Figure 1.4: A passive RFID tag having 96 bits of memory to represent an EPC number. Header
identifies the version of EPC itself; EPC Manager number identifies an organization; Object class
refers to a unique type of product produced by an EPC manager; Serial number uniquely identifies
each item within an object class.

signals and transmission of signals over long distances or through interference.
Moreover, active tags are capable of detecting collisions and sensing the channel,
thereby improving their overall performance. They are particularly useful in scenarios where the tag needs to operate in harsh environments or over a long range.
Active tags are often larger and more expensive than passive tags due to their
additional components and power source. However, they offer greater flexibility
and functionality in terms of their communication capabilities
• Semi-passive tags combine elements of both active and passive tags. They possess an onboard power source that is used to power the microchip and a passive
receiver. The semi-passive tag communicates using backscatter and can communicate over a longer range than passive tags. Semi-passive tags are typically used
in applications where longer read ranges are needed, such as in logistics or asset tracking. The use of a battery allows for the tag to transmit data at higher

power levels than passive tags. This feature is particularly useful in applications
where tags are embedded in metal or other materials that can interfere with the
radio signal. Semi-passive tags are also capable of sensing their environment and
collecting additional data such as temperature, humidity, or motion.
Table 1.1: Tag characteristics
Characteristics

Passive tag

Active tag

Semi-passive tag

Frequency
Internal power
Transceiver on broad
Bit rate (Kbps)
Memory (KB)
Multi-tag collection
Read Range (m)
Tag size
Cost (USD)
Life Time (years)

LF, HF, UHF, Microwave
No
No
246
128
3 sec. to identify 20 tags

0.1-7
Thin, flexible
0.15-1.00
3-10

UHF, Microwave
Yes
Yes
20/40/250
128
1000 tag/sec at 100 mph
More than 100
Large, bulky
10-100
0.5-5

UHF
Yes
No
16
4
7 tags/sec at 3 mph
60-80
Thin, flexible
0.75-2.00
0.5-5

In brief, Table. 1.1 technically summarizes various characteristics a according to tag
types [1, 30].
9



×