Integration of WSN and RFID networks, and redundant data filtering

Document Type : Research Paper


1 Department of Computer Engineering, Qom branch, Islamic Azad University, Qom, Iran.

2 Iran Telecommunication Research Center, ITRC, Tehran,


Abstract- Radio frequency identification (RFID) and wireless sensor networks (WSNs) are two important and widely applied wireless technologies with limitless future potential. RFID is used to detect object location, while WSN is used for environmental sensing and monitoring. The integration of RFID and WSN not only provides identity and location but also facilitates environmental condition sensing. However, RFID data contains excessive duplication, which results in time delay and increased energy consumption, resulting in wastage of various network resources. This paper proposes a hybrid network designed by the integration of WSN and RFID and consisting of seven types of nodes. In this architecture, the entire network is divided into clusters and this clustering is obtained by particle swarm optimization. In addition, it also proposes an algorithm to overcome the issue of redundant data on this hybrid network. Simulation results show that the proposed algorithm reduces both data redundancy and processing time compared to existing algorithms.


2- Yetgin, K. T. K. Cheung, M. El-Hajjar, L. H. Hanzo, “A survey of network life- time maximization techniques in wireless sensor networks,” IEEE Commun. Surv. Tutor, vol. 19, no. 2, pp. 828–854, Second quarter 2017.
3- Jain, ”MLBC: multi-objective Load Balancing Clustering technique in Wireless Sensor Networks,” Applied Soft Computing. vol. 74, pp. 66–89, Jan. 2019.
4- Abuelkhail, U. Baroudi, M. Raad, and T. Sheltami, “Internet of things for healthcare monitoring applications based on RFID clustering scheme,” Wireless Networks, vol. 27, pp.747-763, 2021.
5- Landaluce, L. Arjona, A. Peraiios, F. Falcone, I. Angulo, and F. Muralter, “A Review of IOT sensing Applications and challenges using RFID and wireless sensor networks,” Sensors, vol. 20, no. 9, Apr. 2020.
6- W. Nagpukar and S. K. Jaiawal, “An Overliew of WSN and RFID Network Integration,” 2nd International Conference on Electronics and Communication Systems (ICECS), 2015.
7- Alfian, J. Rhee, H. Ahm, J. lee, and U. Farooq, “Integration of RFID, wireless sensor network, and data mining in an e-pedigree food traceability system,” Journal of Food Engineering, vol. 212, pp. 65-75, Nov. 2017.
8- Zhao, “A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem,” Journal of Medical Systems, vol. 38, no. 5, pp. 1–7, 2014.
9- Jin, C. Xu, X. Zhang, and J. Zhao, “A secure RFID mutual authentication protocol for healthcare environments using elliptic curve cryptography,” Journal of Medical Systems, vol. 39, no. 3, pp. 1–8, 2015.
10- Piramuthu and W. Zhau, RFID and Sensor Network Automation in the Food Industry: Ensuring Quality and Safety through Supply Chain Visibility,  ch. 2, pp. 17-50, Jan.  2016.
11- Zhang, and Q. Qi, “An efficient RFID authentication protocol to enhance patient medication safety using elliptic curve cryp- tography,” Journal of Medical Systems, vol. 38, no. 5, pp. 1–7, 2014.
12- Kochar, R. Chhillar, “An Effective Data Warehousing System for RFID Using Novel Data Cleaning, Data Transformation and Loading Techniques,” The Intern. Arab Journal of Information Technology, vol. 9, no. 3, May 2012.
13- Kapoor, S. Piramuthu, “Single RFID tag ownership transfer protocols,” IEEE Trans. Systems man Cybernetics Part  C, vol. 42, no. 2, pp.167-173, 2012.
14- K. Bashir and S. J. Lim, ”Energy Efficient In-network RFID Data Filtering Scheme in Wireless Sensor Networks,” Sensor Journal, vol. 11, pp. 7004-7021, July 2011.
15- E. Sarma, Towards the five- cent tag. Technical report MIT.AUTOID- WH-006, MIT Auto-ID Center: New NY , USA 2001. Available online: http://www.autoidcenter. Org/research/MIT-AUTOID-WH-006-pdf(accessed on ganuary) , 2009.
16- Choi and M.S. Park, “In-network Phased Filtering Mechanism for a Large-Scale RFID Inventory Application,” In Proceedings of the 4th Intern. Conf. on IT & Applications (ICITA), Harbin, China, pp. 401-405, Jan. 2007.
17- S. Kim and A. Kashif, ” Energy Effcient In-Network Phase RFID Data filtering scheme,” 5th Intern. Conf. on Ubiquitous Intelligence and Computing UIC, pp.311-322, June 2008.
18- Sundaresan, R. Doss, S. Piramuthu, and W. L. Zhou, ” A robust grouping proof protocol for RFID EPC C1G2 tags,” IEEE Trans. Information Forensics and Security , vol. 9, no. 6, pp. 961-975, June 2014.
19- Wang and L.D. Xu, ”Data cleaning for RFID and WSN Integration,” IEEE Trans. Industrial Informatics., vol. 10, No. 1, pp. 408-418 Feb. 2014.
20- Zhang/RFID and Sensor Networks, AU7777_c018, May 2009, ch 18, pp.511-535. Available on internet.
21- Sundaresan, R. Doss, S. Piramuthu, and W. Zhou, ”Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner privacy,” Computer Communications, vol. 55, pp.112-124, Jan. 2015.
22- M. Aung, Y.S. Chang and J. Won, “Emerging  RFID /USN Application and Challenge,” In Intern. Journal of RFID Security and Cryptography (LJRFIDSC), vol. 1, March-June 2012
23- Wang, Y. Ji, and B. Zhao, “ An approximate  duplicate- elimination in RFID data streams based on d-left time bloom filter,” in Web Technologies and Applications, vol. 8709, pp. 413–424, Sept.  2014.
24- kuila and K. Jana, “Energy efficient clustering and routing algorithms for wireless sensor networks: particle swarm optimization approach,”  Eng. Appl. Artificial Intelligence, vol. 33, pp.127-140 , Aug. 2014.