Improving Efficiency of Large RFID Networks Using a Clustered Method: A Comparative Analysis
Abstract
:1. Introduction
- In this paper, our research has been enhanced on a novel Clustered RFID network, and the performance level has been compared with AOMDV-SAPTV and ODBC. The novelty of this protocol is to detect the duplication tags, fault tags, and cluster head faults.
- The cluster head has been changed dynamically based on the head node fails. The main motive of this research is to give a high-performance RFID network without compromising its efficiency.
- The proposed Clustered RFID network will handle the tags duplication, faults, and change of the cluster head is automatic.
- The simulation of the work has been made to analyze the network performance of Clustered RFID, AOMDV-SAPTV, and ODBC, respectively. The results were discussed based on the network attributes such as accuracy, vulnerability, success rate, delay and throughput. The comparison was made between Clustered RFID, AOMDV-SAPTV, and ODBC based on the network attributes. Finally, to conclude the discussion, Clustered RFID gives better performance than AOMDV-SAPTV and ODBC while handling the large nodes involved in the communication.
- The overall performance measure of Clustered RFID will give 93% of performance, ODBC can reach 85%, and the AOMDV_SAPTV can achieve 79% performance. Cluster RFID will give 14% better performance than AOMDV_SAPTV and 8% better than ODBC.
2. Literature Survey
3. Proposed Model
- (i)
- The location of the node must be in the middle of the cluster and have good communications with other nodes.
- (ii)
- The energy level of the selected node must be high when compared to others. Moreover, if the cluster head fails to lead the communication, the other immediate node with the same resemblance to the existing cluster head will take to lead the communication. The fuzzy logic can be used to identify the next cluster head.
Algorithm 1: Cluster Formation |
Start |
Choose CH (Cluster Head) |
L1: for I = 1 to N, allot Ri to neighbor cHi |
For j = 1 to CH |
Form the cNi for Ri |
Repeat L1 |
END |
Algorithm 2: Working of Clustered RFID |
Start |
Ti = ID creating time |
Ei = Encrypt(Ti) |
Create (Ti,Ei,ID) |
Repeat |
Start |
Tag_duplication (Tid,Ei,Ti) |
If encrypt_time(Ei = Ti) then |
No duplication |
Else |
Duplicate |
End if. |
End |
Start |
CH_fault(CHi) |
Check CH of CNi |
If(CH < 0) |
New_CH_persistent(El(RFi)) |
Do |
CH = New_CH |
While (! = EOCB) |
End if |
End |
END |
3.1. Handling of Cluster Head Fault
3.2. Eliminating Tag Duplication
- ID—tags identification
- Name—owner of the tag
- Time (T)—tag initialized time
- E (T)—encrypted time
4. Results and Discussions
4.1. Accuracy
4.2. Vulnerability
- Tn—Total number tags in the network
- Tr—Total number of tags received
4.3. Success Rate
4.4. Delay
4.5. Throughput
5. Comparative Analysis of Clustered RFID Protocol with AOMDV_SAPTV and ODBC
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Wang, B.; Ma, M. A server independent authentication scheme for RFID systems. IEEE Trans. Industr. Inform. 2012, 8, 689–696. [Google Scholar] [CrossRef]
- Garfinkel, S.; Juels, A.; Pappu, R. RFID privacy: An overview of problems and proposed solutions. IEEE Secur. Priv. 2005, 3, 34–43. [Google Scholar] [CrossRef]
- Tan, C.C.; Sheng, B.; Li, Q. Secure and serverless RFID authentication and search protocols. IEEE Trans. Wirel. Commun. 2008, 7, 1400–1407. [Google Scholar] [CrossRef]
- Kuo, N.C.; Niknejad, A.M. Single-antenna FDD reader design and communication to a commercial UHF RFID tag. IEEE Microw. Wirel. Compon. Lett. 2018, 28, 630–632. [Google Scholar] [CrossRef]
- Sharmila, G.; Ragaventhiran, J.; Islabudeen, M.; Kumar, B.M. RFID Based Smart-Cart system with automated billing and assistance for visually impaired. Mater. Today Proc. 2021, in press. [Google Scholar] [CrossRef]
- Bu, K.; ** via collision reconciliation and data compression. IEEE Trans. Mob. Comput. 2020, 20, 1817–1831. [Google Scholar] [CrossRef]
- Rodić, L.D.; Stančić, I.; Zovko, K.; Perković, T.; Šolić, P. Tag Estimation Method for ALOHA RFID System Based on Machine Learning Classifiers. Electronics 2022, 11, 2605. [Google Scholar] [CrossRef]
- Lin, L.; Molina, V.H. Association Based Locationing for RFID. U.S. Patent 8,456,306, 4 June 2013. [Google Scholar]
- Dash, L.; Pattanayak, B.K.; Mishra, S.K.; Sahoo, K.S.; Jhanjhi, N.Z.; Baz, M.; Masud, M. A Data Aggregation Approach Exploiting Spatial and Temporal Correlation among Sensor Data in Wireless Sensor Networks. Electronics 2022, 11, 989. [Google Scholar] [CrossRef]
- Bhoi, S.K.; Panda, S.K.; Jena, K.K.; Sahoo, K.S.; Jhanjhi, N.Z.; Masud, M.; Aljahdali, S. IoT-EMS: An Internet of Things Based Environment Monitoring System in Volunteer Computing Environment. Intell. Autom. Soft Comput. 2022, 32, 1493–1507. [Google Scholar] [CrossRef]
Particulars | Specification |
---|---|
Initial Readers count | 25 |
Initial Tags count | 1000 |
Read capacity | 10 per min |
Read distance | 20 cm |
Cluster heads | 10 |
Parameters | Tags Count (#) | AOMD_SAPTV [29] | ODBC [30] | Clustered RFID |
---|---|---|---|---|
Accuracy (%) | 32 | 81 | 92 | 100 |
128 | 62 | 84 | 87 | |
512 | 23 | 57 | 62 | |
2048 | 11 | 19 | 23 | |
8192 | 4 | 9 | 11 | |
Success Rate (%) | 1 | 267 | 289 | 300 |
10 | 216 | 257 | 276 | |
100 | 124 | 167 | 175 | |
1000 | 64 | 65 | 80 | |
10,000 | 4 | 23 | 40 | |
Vulnerability (%) | 1000 | 12 | 4 | 2 |
2000 | 24 | 8 | 5 | |
3000 | 36 | 13 | 9 | |
4000 | 48 | 18 | 13 | |
5000 | 60 | 27 | 21 | |
Delay (seconds) | 1000 | 5 | 4 | 3 |
2000 | 7 | 6 | 4 | |
3000 | 11 | 10 | 7 | |
4000 | 16 | 15 | 11 | |
5000 | 27 | 21 | 16 | |
Throughput (%) | 1000 | 93 | 95 | 98 |
2000 | 84 | 86 | 91 | |
3000 | 69 | 69 | 80 | |
4000 | 51 | 57 | 65 | |
5000 | 30 | 27 | 40 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Pandian, M.T.; Chouhan, K.; Kumar, B.M.; Dash, J.K.; Jhanjhi, N.Z.; Ibrahim, A.O.; Abulfaraj, A.W. Improving Efficiency of Large RFID Networks Using a Clustered Method: A Comparative Analysis. Electronics 2022, 11, 2968. https://doi.org/10.3390/electronics11182968
Pandian MT, Chouhan K, Kumar BM, Dash JK, Jhanjhi NZ, Ibrahim AO, Abulfaraj AW. Improving Efficiency of Large RFID Networks Using a Clustered Method: A Comparative Analysis. Electronics. 2022; 11(18):2968. https://doi.org/10.3390/electronics11182968
Chicago/Turabian StylePandian, M. Thurai, Kuldeep Chouhan, B. Muthu Kumar, Jatindra Kumar Dash, N. Z. Jhanjhi, Ashraf Osman Ibrahim, and Anas W. Abulfaraj. 2022. "Improving Efficiency of Large RFID Networks Using a Clustered Method: A Comparative Analysis" Electronics 11, no. 18: 2968. https://doi.org/10.3390/electronics11182968