International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 10 - Mar 2014 Detection of RFID Tags using Multiple Bit Slots in Slotted Aloha Model Ms. RUPALI D.PATIL#1, Ms. V. N. Katkar#2, Prof. A.TAYAL*3 # Department of Computer Science and Engineering, Nagpur University G.H. Raisoni Institute of Engineering and Technology for Women, Nagpur * Department of Computer and Information Technology, Nagpur University PCE, Nagpur. Abstract— The Radio frequency identification system (RFID) having the radio frequency transmitter and radio frequency receiver. In the mobile RFID environment, consumer will get product related information of tags by using radio frequency receiver. Tag collision arises in RFID environment. To remove this collision in tag multiple bit slot reservation aloha protocol is used. In multiple bit slot reservation slotted aloha protocol before allocating the frame slot radio frequency assigns the reservation slot and radio frequency receiver generate random sequence in its own reservation slot randomly selected by transmitter to reserve a frame slot, then the transmitter efficiently captures the reservation collisions in reservation slot by Manchester coding. The protocol reduces collision frame slot and eliminates empty frame slots. The performance evaluation shows that the proposed slotted aloha protocol outperforms the other aloha based protocols. Keywords- Tag identification, slotted ALOHA, RFID module, AVR microcontroller collision arises only when multiple tag simultaneously transmit their IDs to a receiver. Therefore receiver cannot identify them individually. The practical use of RFID is not possible in large -scale industries due to the high probability of tag collision. A common approach to avoid tag collision is to use an RFID reader for coordinating tag trans-missions. One method is used to identify collision is multiple bit slot reservation slotted aloha protocol. This slotted aloha protocol having advantages of reservation mechanism. In the mechanisms, RFID receiver assigns some small size slots which is called as reservation slot that represents the frame slots and in each inventory round these frame slots compose a frame. To reserve a frame slot the transmitter will randomly selects the reservation slots in which receiver receives its IDs and generates the random sequence for the reservation slots. As a result this protocol reduces time overhead in each inventory round. 2. Literature Review 1. Introduction The radio frequency identification is an automatic identification technique which is used for many applications such as supply chain and traffic control. The RFID system having RFID transmitter and RFID receiver. Tag which is attached to the products have the information about product i.e.(unique identification code called as IDs) and transmit IDs in response to interrogation signals from RFID transmitter through a shared wireless media between RFID transmitter and receiver during communication. The process of transmitting IDs from RFID transmitter to the RFID receiver is called tag identification. The RFID system is preferred to the barcode for long-distance electricity transmission. When mobile phones is having RFID receiver as consumer electronics device, the receiver is called mobile RFID receiver. Nowadays internet is being used everywhere and benefit of using internet in mobile RFID receiver, it can be used to enables products to connect the internet. For example in digital supermarket, in digital bookshop mobile RFID receiver can be used where consumer will get information about products. When tag collision arises which will reduces identification performance of RFID receivers? Tag ISSN: 2231-5381 Hyuntae Cho, Hyunsung Jang, and Yunju Baek [1] propose that RFID is high-technology automatic identification based on wireless network and enable noncontact identification. It cannot be applied beyond their radio communication range and also proposes a large active RFID system utilizing ZigBee networks in order to extend a reader’s radio coverage. Lei Pan and Hongyi Wu[2] proposes a Smart TrendTraversal (STT) protocol for RFID tag arbitration which effectively reduces the collision overhead occurred in the arbitration process. Smart Trend-Traversal, a Query Treebased scheme, dynamically issues queries according to the online learned tag density and distribution; and therefore, it significantly reduces delay and energy consumption comparing with the existing Tree-based and Aloha-based protocols. C. P. Wong and Quanyuan Feng[3] present the research project represent that tag collision arbitration is a significant issue in RFID system design. It presents an efficient stochastic scheme based protocol which is http://www.ijettjournal.org Page 513 International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 10 - Mar 2014 characterized by the fact that both idle and collision timeslots are reduced obviously. Utilizing of reservation sequence and controlling the number of tags to respond ensure the protocol works stably and efficiently. Results show that the proposed protocol has a good performance and requires less time consumption than other stochastic scheme based protocols Xiaolin Jia, Quanyuan Feng, Lishan Yu [4] represents the Stability Analysis of an Efficient Anti-Collision Protocol for RFID Tag Identification. An efficient anti-collision protocol named collision tree protocol (CT) and analyze the stability of it. The performance of CT is only dependent on the number of tags to be identified and not influenced by the distribution of tag IDs and other factors, and the average performance of CT for one-tag identification converges to a constant. According to the definition of the stability of an anti-collision protocol, CT is a stable anticollision protocol for RFID tag identification. 3. Research Methodology to Be Employed When we work with RFID environment then the tag collision problem occurs. Tag collision problem is serious one. To efficiently identify this collision problem multiple bit slots in slotted aloha protocol model is used. If there are four user i.e. user1, user2, user3 and user4. Each user will contain some bytes of data i.e. user1 contain 100, user2 contain150, user3 contain 200 and user4 contain 50 bytes of data. The fig. shown in below states that each user wants to reserved its data in the reservation slots. In pure ALOHA protocol when user wants to reserved its data in the reservation slots then user1 will send its data in first slot at a time without sensing the channel whether it is busy or not, When user2 wants to send data i.e. of 150 byte then he will send again without sensing of status of channel that it is busy or not. Similarly user3 and user4 will follow this procedure and data will send into reservation slot. But this process will require large bandwidth of channel as all users will send data into the reservation slots at a time. Hence to overcome this problem the CSMA (carrier sense multiple access) slotted aloha protocol is introduced. Carrier sense multiple access slotted aloha protocol will sense the channel first and then it will send the data. If the channel is busy then user has to wait for random amount of data and it will sense again if the channel is free then user can send the data. Slotted aloha protocol will send the data in the form of slots. Let’s consider the above example if user1 has to send data of 100 bytes then he will send the data of 50 byte in the first slots. Before sending of data user will sense the channel and if it is busy then it will wait for a particular time and time should be in the random form. If the channel is free then it will send the data in slotted ISSN: 2231-5381 form. Then user2 will sense the channel before sending and send 50 bytes of data.User3 will send the 50 bytes of data in the reservation slot and then user4 will also send the 50 bytes of data into the reservation slot. Then again user1 will send 50 bytes of data into the reservation slots, now user1 has send 100 bytes of data completely in slotted form. Likewise user 2, user3 will send its data.User1 and user4 has already sent its data completed. In this way the CSMA (carrier sense multiple access) slotted aloha protocol is successfully implemented for detecting the collision problem. 4. Proposed Plan of Work 1) Module 1: It is the development of RF module i.e. radio frequency transmitter and radio frequency receiver. Radio transmitter will transmit the data into the slots and receiver will receive the output. 2) Module 2: It is the development of slotted aloha protocol. Slotted aloha protocol will sense the channel first and then transmit the data to the channel. 3) Module 3: It is the module of development of CSMA technique. CSMA is carrier sense multiple access technique which will sense the channel before sending of bytes of data into the channel. If the channel is busy then user has to wait a random amount of time. 4) Module 4: It is the module of integration with the system which will integrates the all module which is mentioned above. 5) MODULE 5: It is the module of Result Evaluation and Optimization. 4.1) Module 1: Interfacing Of RFID Module with AVR Microcontroller The fig. for interfacing of RFID Module with AVR is shown in fig.4.1. RFID module reads ID of RFID tags. Transmitter of RFID module will transmit the identification number which is detected by RFID reader when someone swaps RFID tags. The interfacing of RF module with AVR is shown in fig.1.1 and tags which has to be identified are shown in fig.1.2.Every tag has its unique identification number. Our aim is to detect that identification number. Tags is having magnetic field inside it and its coverage area is small and hence we have to place RFID tags very near to the light emitting diode which will detect the identification number of tags. The figures are shown in below which shows the message displayed on LCD. http://www.ijettjournal.org Page 514 International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 10 - Mar 2014 6. References [1]Chen Yihong, Feng Quanyuan, ”Multiple-Bits-Slot Reservation Aloha Protocol for Tag Identification” IEEE Transactions on Consumer Electronics, Vol. 59, No. 1, February 2013 [2] L.Pan and H.Wu, “Smart trend-traversal protocol for RFID tag Arbitration,”IEEE Trans.Wireless Comm-un., vol.10, no.11, pp.3565-3569, Nov. 2011. Fig.1.1 Interfacing of RF module with AVR. After detecting ID of RFID tags the transmitter of RFID module will send ID to the AVR microcontroller. Then AVR microcontroller will send out-put to the LCD display. The respected output i.e. real identification number is displayed on LCD. The performance shows that the multiple bit slot reservation slotted aloha protocol is suitable for communication complexity and identification speed. Hence the multiple bit slot reservation slotted aloha protocol is the proper solution to the mobile RFID environment that requires a high performance anticollision protocol. This project can be implementing in military purpose and also for taking attendance. The multiple bit slot reservation slotted aloha protocol can be used in digital supermarket and in digital bookshop. This protocol can widely used in application such as traffic control and supply chain. 5 . Conclusion As the interfacing of RFID Module with the advanced virtual RISC architecture has been done successfully. Collision problem is serious in mobile RFID environment and hence to remove this collision the multiple bit slot reservation slotted aloha protocol is used. The basic idea of multiple bit slotted aloha protocol is that radio frequency identification receiver uses multiple-bit random sequence which avoid collision frame slot when RFID transmitter select the same reservation slot and empty frame slot by using reservation of frame slots before RFID transmitter allocate the frame slots. Multiple bit slot reservation slotted aloha protocol which reduces the two kinds of time overheads and reduces the complexity. The multiple bit slot reservation slotted aloha protocol provides the way of determining the number of reservation slots. [3] C.P.Wong and Q.Feng, “Grouping based bit-slot ALOHA protocol for tag anti-collision in RFID systems,” IEEE Commun. Lett.,vol.11, no.12, pp. 946-948, Dec. 2008. [4] Xiaolin Jia, Quanyuan Feng, Lishan Yu “Stability Analysis of an Efficient Anti-Collision Protocol for RFID Tag Identification” IEEE TRANSACTIONS, VOL. 60, NO. 8, AUGUST 2012. [5] H.Cho, J.Kim, and Y.Baek, “Large-scale active RFID system utilizing ZigBee networks,” IEEE Trans. Consum. Electron., Vol. 57, No. 2, pp.379-385, May 2011. [6] J.Myung, W.Lee, J.Srivastava, and T.K.Shih,“Tagsplitting: adaptive Collision arbitration protocols for RFID tag identification,” IEEE Trans.Parallel Distrib. Syst., vol. 18, no. 6, pp.763-775, Jun. 2007 [7] S.-R.Lee, S.-D. Joo, and C.-W.Lee, “An enhanced dynamic framed slotted aloha algorithm for RFID tag identification,” in The 2nd Intl. Annual Conference on Mobile and Ubiquitous Systems: Networking and Services, San Diego, USA, pp.166-172, 2005. [8] L.Zhu and T.-S.P.Yum,“The optimal Reading strategy for EPC Gen-2 RFID anti-collision systems,” IEEE Trans. Commun, vol. 58, no. 9, pp. 2725-2733, Sep. 2010 [9] Y.H.Chen, S.J.Horng, R.S.Run, J.L.Lai, R.J. Chen, W.C.Chen et al.,“A novel anti-collision algorithm in RFID systems for identifying passive tags,” IEEE Trans Ind. Informat., vol.6, no.1, pp.105- 121,Feb. 2010. [10] C.Wang, “Performance analysis of RFID generation-2 protocol,”IEEE Trans.Wireless Commun., vol.8, no.5, pp. 2592-2601, 2009. [11] M. A.Bonuccelli, F.Lonetti, and F. Martelli, “Instant collision resolution for tag identification in RFID networks,”Ad Hoc Networks, vol. 5, no.8,pp. 12201232,2007. [12] J.Yu, W.Lee, and D.Du, “Reducing reader collision for mobile RFID,”IEEE Ttrans. Consum. Electron, Vol. 57, No. 2 pp.574-582, May 2011. ISSN: 2231-5381 http://www.ijettjournal.org Page 515