Results 11 - 20
of
59
Fast identification of the missing tags in a large rfid system
- In Proc. of IEEE SECON
, 2011
"... Abstract—RFID (radio-frequency identification) is an emerg-ing technology with extensive applications such as transportation and logistics, object tracking, and inventory management. How to quickly identify the missing RFID tags and thus their associated objects is a practically important problem in ..."
Abstract
-
Cited by 12 (1 self)
- Add to MetaCart
(Show Context)
Abstract—RFID (radio-frequency identification) is an emerg-ing technology with extensive applications such as transportation and logistics, object tracking, and inventory management. How to quickly identify the missing RFID tags and thus their associated objects is a practically important problem in many large-scale RFID systems. This paper presents three novel methods to quickly identify the missing tags in a large-scale RFID system of thousands of tags. Our protocols can reduce the time for identifying all the missing tags by up to 75 % in comparison to the state of art. I.
Informative counting: Fine-grained batch authentication for large-scale rfid systems
- In ACM MobiHoc
, 2013
"... Many algorithms have been introduced to deterministically authenticate Radio Frequency Identification (RFID) tags, while little work has been done to address the scalability issue in batch authentications. Deterministic approaches verify tags one by one, and the communication overhead and time cost ..."
Abstract
-
Cited by 9 (0 self)
- Add to MetaCart
(Show Context)
Many algorithms have been introduced to deterministically authenticate Radio Frequency Identification (RFID) tags, while little work has been done to address the scalability issue in batch authentications. Deterministic approaches verify tags one by one, and the communication overhead and time cost grow linearly with increasing size of tags. We design a fine-grained batch authentication scheme, INfor-mative Counting (INC), which achieves sublinear authenti-cation time and communication cost in batch verifications. INC also provides authentication results with accurate esti-mates of the number of counterfeiting tags and genuine tags, while previous batch authentication methods merely provide 0/1 results indicating the existence of counterfeits. We con-duct detailed theoretical analysis and extensive experiments to examine this design and the results show that INC signif-icantly outperforms previous work in terms of effectiveness and efficiency.
A Time-efficient Information Collection Protocol for Large-scale RFID Systems
- PROCEEDINGS IEEE INFOCOM
, 2012
"... Sensor-enabled RFID technology has generated a lot of interest from industries lately. Integrated with miniaturized sensors, RFID tags could provide not only the IDs but also valuable real-time information about the state of the corresponding objects or the surrounding environment, which is benefici ..."
Abstract
-
Cited by 9 (0 self)
- Add to MetaCart
Sensor-enabled RFID technology has generated a lot of interest from industries lately. Integrated with miniaturized sensors, RFID tags could provide not only the IDs but also valuable real-time information about the state of the corresponding objects or the surrounding environment, which is beneficial to many practical applications, such as warehouse management and inventory control. In this paper, we study the problem on how to design efficient protocols to collect such sensor information from numerous tags in a large-scale RFID system with a number of readers deployed. Different from information collection in the small RFID system covered by only one reader, in the multireader scenario, each reader has to first find out which tags located in its interrogation region in order to read information from them. We start with two categories of warm-up solutions that are directly extended from the existing information collection protocols for single-reader RFID systems, and show that all of them do not work well for the multi-reader information collection problem due to their inefficiency of identifying the interrogated tags. Then, we propose a novel solution, called the Bloom filter based Information Collection protocol (BIC). In BIC, the interrogated tag identification can be efficiently achieved with a distributively constructed Bloom filter, which significantly reduces the communication overhead and thus the protocol execution time. Extensive simulations show that BIC performs better than all the warm-up solutions and its execution time is within 3 times of the lower bound.
Probabilistic Optimal Tree Hopping for RFID Identification
"... Radio Frequency Identification (RFID) systems are widely used in various applications such as supply chain management, inventory control, and object tracking. Identifying RFIDtags inagiventagpopulationis themostfundamental operation in RFID systems. While the Tree Walking (TW) protocol has become th ..."
Abstract
-
Cited by 8 (4 self)
- Add to MetaCart
(Show Context)
Radio Frequency Identification (RFID) systems are widely used in various applications such as supply chain management, inventory control, and object tracking. Identifying RFIDtags inagiventagpopulationis themostfundamental operation in RFID systems. While the Tree Walking (TW) protocol has become the industrial standard for identifying RFID tags, little is known about the mathematical nature of this protocol and only some ad-hoc heuristics exist for optimizing it. In this paper, first, we analytically model the TW protocol, and then using that model, propose the Tree Hopping (TH) protocol that optimizes TW both theoretically and practically. The key novelty of TH is to formulate tag identification as an optimization problem and find the optimal solution that ensures the minimal average number of queries. With this solid theoretical underpinning, for different tag population sizes ranging from 100 to 100K tags, TH significantly outperforms the best prior tag identification protocols on the metrics of the total number of queries per tag, thetotal identification timeper tag, andtheaverage number of responses per tag by an average of 50%, 10%, and 30%, respectively, when tag IDs are uniformly distributed in the ID space, and of 26%, 37%, and 26%, respectively, when tag IDs are non-uniformly distributed.
Understanding RFID Counting Protocols
"... Counting the number of RFID tags, or RFID counting, is needed by a wide array of important wireless applications. Motivated by its paramount practical importance, researchers have developed an impressive arsenal of techniques to improve the performance of RFID counting (i.e., to reduce the time need ..."
Abstract
-
Cited by 8 (0 self)
- Add to MetaCart
(Show Context)
Counting the number of RFID tags, or RFID counting, is needed by a wide array of important wireless applications. Motivated by its paramount practical importance, researchers have developed an impressive arsenal of techniques to improve the performance of RFID counting (i.e., to reduce the time needed to do the counting). This paper aims to gain deeper and fundamental insights in this subject to facilitate future research on this topic. As our central thesis, we find out that the overlooked key design aspect for RFID counting protocols to achieve near-optimal performance is a conceptual separation of a protocol into two phases. The first phase uses small overhead to obtain a rough estimate, and the second phase uses the rough estimate to further achieve an accuracy target. Our thesis also indicates that other performanceenhancing techniques or ideas proposed in the literature are only of secondary importance. Guided by our central thesis, we manage to design near-optimal protocols that are more efficient than existing ones and simultaneously simpler than most of them.
Continuous Scanning with Mobile Reader in RFID Systems: an Experimental Study
"... In this paper, we show the first comprehensive experimental study on mobile RFID reading performance based on a relatively large number of tags. By making a number of observations regarding the tag reading performance, we build a model to depict how various parameters affect the reading performance. ..."
Abstract
-
Cited by 7 (5 self)
- Add to MetaCart
(Show Context)
In this paper, we show the first comprehensive experimental study on mobile RFID reading performance based on a relatively large number of tags. By making a number of observations regarding the tag reading performance, we build a model to depict how various parameters affect the reading performance. Through our model, we have designed very efficient algorithms to maximize the time-efficiency and energy-efficiency by adjusting the reader’s power and moving speed. Our experiments show that our algorithms can reduce the total scanning time by 50 % and the total energy consumption by 83 % compared to the prior solutions.
Anonymous cardinality estimation in RFID systems with multiple readers
- in Proc. of IEEE Globecom
, 2009
"... Abstract — In this paper, we study the anonymous cardinality estimation problem in radio frequency identification (RFID) systems. To preserve privacy and anonymity, each tag only transmits a portion of its ID to the reader when it is being queried. To achieve complete system coverage and increase th ..."
Abstract
-
Cited by 5 (2 self)
- Add to MetaCart
(Show Context)
Abstract — In this paper, we study the anonymous cardinality estimation problem in radio frequency identification (RFID) systems. To preserve privacy and anonymity, each tag only transmits a portion of its ID to the reader when it is being queried. To achieve complete system coverage and increase the accuracy of measurement, multiple readers with overlapping interrogation zones are deployed. The cardinality estimation problem is to estimate the total number of tags (or the tag population) in an RFID system. We first propose an exclusive estimator to estimate the number of tags that are exclusively located in the interrogation zone of a selected reader. We then present a multiple-reader tag estimation (MRTE) algorithm that can accurately estimate the tag population using the measurement from different readers and the exclusive estimator. The accuracy of our proposed algorithm and the approximation are validated via simulations. We compare our proposed MRTE algorithm with the enhanced zero-based (EZB) and maximum a posteriori tag estimation (MPTE) algorithms. Although the mean of the estimation error for all three algorithms approaches zero under certain circumstances, the variance of the estimation error for MRTE algorithm increases linearly with the number of readers while it increases exponentially for EZB and MPTE algorithms. I.
FINDERS: A Featherlight Information Network With Delay-Endurable RFID Support
"... Abstract—In this paper, we investigate the use of radio frequency identification (RFID) gear for wireless sensor network construction, aiming to find events of interest and gather aggregate information. In particular, we develop a featherlight information network with delay-endurable RFID support (F ..."
Abstract
-
Cited by 4 (4 self)
- Add to MetaCart
(Show Context)
Abstract—In this paper, we investigate the use of radio frequency identification (RFID) gear for wireless sensor network construction, aiming to find events of interest and gather aggregate information. In particular, we develop a featherlight information network with delay-endurable RFID support (FINDERS), composed of passive RFID tags that are ultralight, durable, and flexible, without power supply for long-lasting applications. FINDERS faces unprecedented challenges in communication and networking due to its sporadic wireless links, unique asymmetric communication paradigm, intermittent computation capability, and extremely small memory of tags. Several effective techniques are proposed to address these challenges, arriving at an efficient communication protocol for FINDERS. A prototype system is developed, and test-bed experiments are carried out with 38 participants and for 9 days, yielding interesting experimental results that offer valuable insights into RFID-based delay-tolerant networks and provide useful practical guidance for the setup of FINDERS systems. Index Terms—Analysis, delay-tolerant network (DTN), experiments, passive radio frequency identification (RFID), wildlife tracking. I.
Towards Adaptive Continuous Scanning in Large-Scale RFID Systems
- In Proc. of IEEE INFOCOM
, 2014
"... plays an important role in supply chain logistics and inventory control. In these applications, a series of scanning operations at different locations are often needed to cover the entire inventory (tags). In such continuous scanning scenario, adjacent scans inevitably read overlapping tags multiple ..."
Abstract
-
Cited by 4 (0 self)
- Add to MetaCart
(Show Context)
plays an important role in supply chain logistics and inventory control. In these applications, a series of scanning operations at different locations are often needed to cover the entire inventory (tags). In such continuous scanning scenario, adjacent scans inevitably read overlapping tags multiple times. Most existing methods suffer from low scanning efficiency when the overlap is small, since they do not distinguish the size of overlap which is an important factor of scanning performance. In this paper, we analytically unveil the fundamental relationship between the performance of continuous scanning and the size of overlap, deriving a critical threshold for the selection of scanning strategy. Further, we design an accurate estimator to approximate the overlap. Combining the estimate and a compact data structure, an adaptive scanning scheme is introduced to achieve low communication time. Through detailed analysis and extensive simulations, we demonstrate that the proposed scheme significantly outperforms previous approach in total scanning time. I.
Focus and Shoot: Efficient Identification over RFID Tags in the Specified Area
"... Abstract. In RFID systems, the reader usually identifies all the RFID tags in the interrogation region with the maximum power. However, some applications may only need to identify the tags in a specified area, which is usually smaller than the reader’s default interrogation region. In this paper, we ..."
Abstract
-
Cited by 4 (4 self)
- Add to MetaCart
(Show Context)
Abstract. In RFID systems, the reader usually identifies all the RFID tags in the interrogation region with the maximum power. However, some applications may only need to identify the tags in a specified area, which is usually smaller than the reader’s default interrogation region. In this paper, we respectively present two solutions to identify the tags in the specified area. The principle of the solutions can be compared to the picture-taking process of a camera. It first focuses on the specified area and then shoots the tags. The design of the two solutions is based on the extensive empirical study on RFID tags. Realistic experiment results show that our solutions can reduce the execution time by 46 % compared to the baseline solution. Key words: RFID, tag identification, experimental study, algorithm design 1