Welcome to Francis Academic Press

International Journal of New Developments in Engineering and Society, 2021, 5(3); doi: 10.25236/IJNDES.2021.050304.

RFID Technology Based on Internet of Things in Public Library

Author(s)

Hui Wang

Corresponding Author:
Hui Wang
Affiliation(s)

University Library, Jilin Agricultural University, No.2888 Xincheng Street, 130118, Changchun, Jilin, China

Abstract

The goal of this article is to study the application of Internet of Things RFID technology in public libraries, and to find better algorithms to improve the efficiency of RFID technology in public libraries. The method is to find the problems that affect the efficiency of the RFID system according to the actual needs of the system in the public library, and try to optimize and improve the algorithm. This article first uses the principle of RFID technology as an entry point and introduces the principle of pure ALOHA algorithm in detail. Given its throughput rate curve with the amount of communication tags, this paper introduces the improved frame slot ALOHA algorithm based on the slot ALOHA algorithm. Then it introduces the tag quantity estimation mechanism, tag polling mechanism and privacy protection mechanism, analyzes several commonly used RFID tag quantity estimation mechanisms, and discusses the three RFID privacy protection mechanisms in detail and compares them with each other. Finally, the application of RFID technology in public libraries in China and the United States in the past decade has been investigated. It is found that the number of public libraries in both countries adopting RFID technology is in a rapid growth trend and the use rate of book tags and bookshelf tags is high. The experimental results show that compared with the pure ALOHA algorithm, the frame slot ALOHA algorithm has a significant increase in throughput. When the frame length is equal to the number of tags to be read, the throughput rate reaches the highest 36.78%. As the frame length is closer to the value of the tag to be read, the system efficiency is higher, so in practical applications, the dynamic frame slot ALOHA algorithm can be used, so that the frame length can be adjusted in real time according to the number of tags, which can effectively maintain the highest efficiency in real time.

Keywords

Internet of Things, RFID Research, ALOHA Research, Public Library

Cite This Paper

Hui Wang. RFID Technology Based on Internet of Things in Public Library. International Journal of New Developments in Engineering and Society (2021) Vol.5, Issue 3: 31-41. https://doi.org/10.25236/IJNDES.2021.050304.

References

[1] Al-Fuqaha A, Guizani M, Mohammadi M. (2015). Internet of Things: A Survey on Enabling Technologies, Protocols and Applications. Communications Surveys & Tutorials, IEEE, 17(4), 2347-2376.

[2] Qingqing Yue. (2018). An Improved Dynamic Binary Anti-collision Algorithm. Software Guide, 17(03), 81-83.

[3] Xiaoxia He, Xiaolin Jia. (2020). Research on Parallel Binary Segmentation Anti-collision Algorithm Based on Locking. Computer Applications and Software, 37(04), 247-251.

[4] Xinghe Xue, Xiaohui Yang. (2019). Comparison and Optimization of RFID Binary Anti-collision Algorithms for Internet of Things. Journal of Changchun University of Science and Technology (Natural Science Edition), 42(02), 106-110.

[5] Lei Mo, Wei Chen, Ju Ren. (2018). Dual-slot Dynamic Binary Search RFID Anti-collision Algorithm. Television Technology, 42(06), 54-57.

[6] Xiaohong Zhang, Weihui Zhou. (2018). Research on Binary Tree RFID Anti-collision Algorithm for Dynamic Frame Time Slots. Journal of System Simulation, 30(03), 1063-1073.

[7] Hanwu Wang, Tao Yu. (2018). An Improved Adaptive Multi-tree Anti-collision Algorithm. Computer Science, 45(11), 66-69.

[8] Yu Fu, Zhihong Qian, Jie Meng, Xue Wang. (2016). Frame Slot Aloha Anti-collision Algorithm Based on Continuous Slot Prediction. Acta Electronica Sinica, 44(09), 2081-2086.

[9] Fugui Chen, Zhifeng Jiang, Lijuan Zhu, Zhonghua Yun. (2018). A Frame Length Improvement Method of ALOHA Algorithm. Modern Electronic Technology, 41(15), 97-100 + 104.

[10] Zhifeng Jiang, Zhonghua Yun, Lijuan Zhu, Fugui Chen. (2018). Improved Hybrid RFID Anti-collision Algorithm Based on CSMA / CD. Computer Technology and Development, 28(03), 78-82.

[11] Dan Wang, Kai Zhao. (2018). ALOHA Algorithm Based on Distance Prediction Grouping. Journal of Nanjing University of Science and Technology, 42(01), 102-106.

[12] Shaoke Zhou, Zhenping Zhang, Lin Cui. (2018). Research on ALOHA Algorithm for Dynamic Frame Slots Based on Dynamic Factor Mean. Computer Science, 45(S1), 328-331 + 374.

[13] Zhaohua Long, Tengfei Gong. (2016). RFID Tag Estimation Algorithm Based on the Number of Non-empty Time Slots. Computer Applications, 36(01), 101-106.

[14] Jiapeng Huang, Zhenzao Wen, Linghe Kong, Li Ge, Min-You Wu, Guihai Chen. (2019). Accelerate the Classification Statistics in RFID Systems. Elsevier B.V., 788.

[15] Jianli Ding, Yuchao Han, Jialiang Wang. (2017). RFID Tag Number Estimation Method Based on Coarse and Fine Second Estimation. Computer Applications, 37(09), 2722-2727.

[16] Yong Li, Qiong Wang. (2019). RFID Anti-collision Method for Multi-electronic Tag Recognition. Journal of Nanjing University of Posts and Telecommunications (Natural Science Edition), 39(04), 33-38.

[17] Xiaosi Cai, Guixiong Liu, Guoguang Wu. (2014). CFDSE-based Dynamic Estimation Method of RFID Tag Number. China Test, 40(03), 98-100 + 141.

[18] Qiang Zhang, Chang Wang, Liang Liu. (2015). Research on Standardization of Library RFID Tag Application Data Model. Internet of Things Technology, 5(03), 67-69.

[19] Yuting Zhang, Chenghua Yan. (2016). Research on an RFID Tag Authentication Technology Based on the Two-way Authentication Protocol. Information Network Security, 2016(01), 64-69.

[20] Chuanming Yang. (2015). Research on the Credibility of the Internet of Things RFID in A Low-carbon Supply Chain Environment. Microelectronics and Computers, 32(09), 144-147.

[21] Xiaohong Zhang, Yanhui Guo. (2018). Research on RFID System Security Authentication Protocol Based on Elliptic Curve Cryptography. Information Network Security, 2018(10), 51-61.

[22] Bing Zhang, Zhiguang Qin, Guogen Wan. (2015). Research on the Mixed Key Management Mechanism of RFID System Based on PKI and CPK. Journal of University of Electronic Science and Technology of China, 44(03), 415-421.

[23] Yijie Zhu, Yulong Yang, Yi Yang, Bin Shi, Dan Han. (2019). An RFID-SIM System Security Authentication Protocol Based on the National Secret Algorithm. Network Security Technology and Application, 2019(11), 34-36.

[24] Ying Zheng, Dantong Ouyang, Lili He, Hongtao Bai. (2015). RFID Security Authentication Protocol Against Loss of Synchronization Based on Hash Function. Journal of Jilin University (Science Edition), 53(03), 499-504.

[25] Libo Liu, Qiaozhen Zheng, Qiang Fu. (2019). An Enhanced RFID Two-way Authentication Protocol. Ship Electronic Engineering, 39(10), 96-100 + 105.