A Review on Missing Tags Detection Approaches in RFID System

Nur'Aifaa Zainudin (1), Hairulnizam Mahdin (2), Rd Rohmat Saedudin (3), Mohd Sanusi Azmi (4), Mokhairi Makhtar (5), Norhailawati Misran (6)
(1) Faculty of Computer Science and Information Technology, Universiti Tun Hussien Onn Malaysia, 86400 Parit Raja, Batu Pahat, Johor, Malaysia
(2) Faculty of Computer Science and Information Technology, Universiti Tun Hussien Onn Malaysia, 86400 Parit Raja, Batu Pahat, Johor, Malaysia
(3) Faculty of Computer Science and Information Technology, Universiti Tun Hussien Onn Malaysia, 86400 Parit Raja, Batu Pahat, Johor, Malaysia
(4) Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka, Malaysia
(5) Faculty of Computer Science and Information Technology, Universiti Tun Hussien Onn Malaysia, 86400 Parit Raja, Batu Pahat, Johor, Malaysia
(6) Jabatan Teknologi Maklumat, Kolej Poly-Tech Mara, Batu Pahat, Johor, Malaysia
Fulltext View | Download
How to cite (IJASEIT) :
Zainudin, Nur’Aifaa, et al. “A Review on Missing Tags Detection Approaches in RFID System”. International Journal on Advanced Science, Engineering and Information Technology, vol. 8, no. 6, Dec. 2018, pp. 2635-40, doi:10.18517/ijaseit.8.6.5184.
Radio Frequency Identification (RFID) system can provides automatic detection on very large number of tagged objects within short time. With this advantage, it is been using in many areas especially in the supply chain management, manufacturing and many others. It has the ability to track individual object all away from the manufacturing factory until it reach the retailer store. However, due to its nature that depends on radio signal to do the detection, reading on tagged objects can be missing due to the signal lost. The signal lost can be caused by weak signal, interference and unknown source. Missing tag detection in RFID system is truly significant problem, because it makes system reporting becoming useless, due to the misleading information generated from the inaccurate readings. The missing detection also can invoke fake alarm on theft, or object left undetected and unattended for some period. This paper provides review regarding this issue and compares some of the proposed approaches including Window Sub-range Transition Detection (WSTD), Efficient Missing-Tag Detection Protocol (EMD) and Multi-hashing based Missing Tag Identification (MMTI) protocol. Based on the reviews it will give insight on the current challenges and open up for a new solution in solving the problem of missing tag detection.

H. Kamaludin, H. Mahdin, and J. H. Abawajy. "Clone tag detection in distributed RFID systems," PloS one, 13, no. 3, 2018.

X.Liu, S.Zhang, K.Bu, and A. Chan, "STEP: A time-efficient tag searching protocol in large RFID systems," IEEE Transactions on Computers, 2015, 64, no. 11. p. 3265-3277.

J.Yu, L.Chen, and K.Wang, "Finding needles in a haystack: Missing tag detection in large RFID systems," IEEE Transactions on Communications, 2017, 65, no. 5, p. 2036-2047.

F.Bibi, C. Guillaume, N. Gontard and B. Sorli, 2016. “A Review: RFID Technology having sensing aptitudes for the food industry and their contribution to tracking and monitoring of food products,” Trends in Food Science & Technology, 2016, vol 62. P. 91-103.

W.T. Chen, "Optimal frame length analysis and an efficient anti-collision algorithm with early adjustment of frame length for RFID systems," IEEE Transactions on Vehicular Technology, 2016, 65, no. 5, p. 3342-3348.

J.Zhao, WLi, & D.Li, “Identifying Missing Tags In Categorized RFID Systems,” International Journal of Distribution Sensor Networks, 2014, p. 1-11.

C.Ma, J.Lin and Y.Wang, “Efficient Missing Tag Detection in a Large RFID System,” in IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012, p. 185-192

Z. Xiong, Z.Y. Song, A. Scalera, F. Sottile, R. Tomasi, and M.A. Spirito, “Enhancing WSN-based Indoor Positioning and Tracking through RFID Technology,” in 4th International EURASIP Workshop on RFID Technology. 2012, p.107-114.

L.Xie, Y.Yin, A.V.Vasilakos and S. Lu, “Managing RFID Data: Challenges, Opportunities, and Solutions,” IEEE Communications Survey & Tutorials. 2013, 16, no.3, p. 1-18

M.Chen, W.Luo, Z.Mo, S.Chen, and Y.Fang, “An Efficient Tag Search Protocol in Large-Scale RFID systems with Noisy Channel,” IEEE/ACM Transaction on Networking, 2016, vol 24, no 2. p. 703-716.

X. Zhu, S.K. Mukhopadhyay and H. Kurata, “A review of RFID technology and its managerial applications in different industries,” Journal of Engineering and Technology Management, 2012, 29, no.1, p. 152-167

C. Zhenxin and L. Zhuliang. “Multi-objective Optimization of Material Delivery for Mixed Model Automotive Assembly Line Based on Practical Swarm Algorithm,” in Proceedings of the 33rd Chinese Control Conference, 2014, p. 2972-2984.

L. Li Lan, Y. Zi Long and L. Xue Wei, “RFID unreliable data filtering by integrating adaptive sliding window and Euclidean distance,” Shanghai University and Springer-Verlag Berlin Heidelberg, 2014, p.121-129.

Mahdin. H. 2014. A Review on Bloom Filter Based Approaches for RFID Data Cleaning. Springer Science+Business Media Singapore 2014. Page 79-86

H. Mahdin, "A review on bloom filter based approaches for RFID data cleaning." in Proceedings of the First International Conference on Advanced Data and Information Engineering (DaEng-2013), Springer, Singapore, 2014, p. 79-86.

W.Liang, G. Tao, T. Xianping & L. Jian. 2017. Toward a Wearable RFID System for Real-Time Activity Recognition Using Radio Patterns. IEEE Transaction on Mobile Computing. Vol 16. No 1. Page 228-242

K.Hu, L.Li & Z.Lu. 2013. A Cleaning method of noise data in RFID data streams. In 2013 3rd International Conference on Consumer Electronics, Communications and Networks (CECNet). Page 1-4

Shahzad, Muhammad, and Alex X. Liu. "Expecting the unexpected: Fast and reliable detection of missing RFID tags in the wild." In Computer Communications (INFOCOM), 2015 IEEE Conference on, pp. 1939-1947. IEEE, 2015.

W. Luo, S. Chen, T. Li, S. Chen, "Efficient missing tag detection in RFID systems," Proc. IEEE INFOCOM Mini-Conf., pp. 356-360, 2011.

Massawe, Libe Valentine, Herman Vermaak, and Johnson DM Kinyua. "An adaptive data cleaning scheme for reducing false negative reads in RFID data streams." In International Conference on RFID (RFID), 2012, IEEE, pp. 157-164.

Liu, Xiulong, Keqiu Li, Geyong Min, Yanming Shen, Alex X. Liu, and Wenyu Qu. "Completely pinpointing the missing RFID tags in a time-efficient way." IEEE Transactions on Computers, 64, no. 1 (2015): 87-96.

L.Tang, H.C. Du, L.Tan, P. Guan & H. Zhang, “The research on electronic tag anti-collision technology based on RFID,.” In 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), IEEE, 2012, pp. 1455-1458,

Y. Zheng & M. Li. 2013, “Fast Tag Searching Protocol for Large-Scale RFID Systems,” IEEE/ACM Transaction on Networking, 2013, Vol 21. No 3. Page 924-934.

Pupunwiwat, Prapassara, and Bela Stantic. "Location filtering and duplication elimination for RFID data streams." International Journal of Principles and Applications of Information Science and Technology 1, no. 1, 2007, pp.29-43.

L. A. Anny and M. Hemalatha. "Proposed prediction algorithms based on a hybrid approach to deal with anomalies of RFID data in healthcare," Egyptian Informatics Journal 14, no. 2, 2013, pp. 135-145.

Y. Wang, Q.Yan and L.Liu, “Massive data processing technique and model in the internet of things,” International Conference on Information Technology and Management Innovation (ICITMI2015), 2015, pp. 662-665

Y.Zhu, W. Jiang, Q.Zhang and H.Guan, “Energy-Efficient Identification in Large-Scale RFID Systems with Handheld Reader,” IEEE Transaction on Parallel and Distributed Systems. 2014, 25(5), pp. 1211-1222.

C. Metzger, T. Frí©dí©ric, G. Stanley and F. Elgar, "The impact of false-negative reads on the performance of RFID-based shelf inventory control policies," Computers & Operations Research, 40, no. 7, 2013, pp.1864-1873.

B. Flavio, M. Mitzenmacher, R. Panigrahy, S. Singh, and George Varghese. "An improved construction for counting bloom filters." In European Symposium on Algorithms, pp. 684-695. Springer, Berlin, Heidelberg, 2006.

H. Kamaludin, H. Mahdin, and J. H. Abawajy, "Filtering redundant data from RFID data streams." Journal of Sensors. 2016, vol. 2016, Article ID 7107914.

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

Authors who publish with this journal agree to the following terms:

    1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
    2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
    3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).