The RFID Ecosystem Project Longitudinal Study of a Building-Scale RFID Ecosystem Evan Welbourne with Karl Koscher, Emad.

Slides:



Advertisements
Similar presentations
Designing for Context: Usability in a Ubiquitous Environment Jenna Burrell, Paul Treadwell, Geri K. Gay Human Computer Interaction Group Cornell University.
Advertisements

Processing New Herbarium Collections Using EMu The last bits of paper Nicole Tarnowsky.
Mobile technologies Bunch of disparate technologies Many cases of successful use in firms (000s) Costly to implement because mostly once off bespoke development.
Supporting Cooperative Caching in Disruption Tolerant Networks
SensMax People Counting Solutions Visitors counting makes the most efficient use of resources - people, time and money, which leads to higher profits in.
Chris Re, Julie Letchner, Magdalena Balazinska and Dan Suciu University of Washington.
1 UNIVERSITY OF BRADFORD IT SERVICES STUDENT SURVEY Prepared by Stuart Wright, Senior Research Executive, June 2009 J4130
Page 1 of 29 Net-Scale Technologies, Inc. Network Based Personal Information and Messaging Services Urs Muller Beat Flepp
The RFID Ecosystem Project Studying Next Generation RFID Applications in the Workplace Evan Welbourne University of Washington,
CSCD 433/533 Advanced Computer Networks Lecture 1 Course Overview Fall 2011.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Approximate data collection in sensor networks the appeal of probabilistic models David Chu Amol Deshpande Joe Hellerstein Wei Hong ICDE 2006 Atlanta,
Evan Welbourne University of Washington, Dept. of Computer Science & Engineering “ Radio Frequency Identification: What’s.
Jeffrey P. Bigham Anna C. Cavender, Jeremy T. Brudvik, Jacob O. Wobbrock * and Richard E. Ladner Computer Science & Engineering The Information School*
Privacy Research In the RFID Ecosystem Project Evan Welbourne joint work with Magdalena Balazinska, Gaetano Borriello, Tadayoshi.
Axis Intelligent Video Intelligence where you need it.
[Context to Make You More Aware] Presentation [Adrienne Andrew, Yaw Anokwa, Karl Koscher, Jonathan Lester, Gaetano Borriello Department of Computer Science.
Failure Avoidance through Fault Prediction Based on Synthetic Transactions Mohammed Shatnawi 1, 2 Matei Ripeanu 2 1 – Microsoft Online Ads, Microsoft Corporation.
EPC for Security Applications By Jacob Ammons & Joe D’Amato.
All content in this presentation is protected – © 2008 American Power Conversion Corporation Rael Haiboullin System Engineer Capacity Manager.
Apps VS Mobile Websites Which is better?. Bizness Apps Survey Bizness Apps surveyed over 500 small business owners with both a mobile app and a mobile.
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
Computer System Lifecycle Chapter 1. Introduction Computer System users, administrators, and designers are all interested in performance evaluation. Whether.
Analysis of Simulation Results Andy Wang CIS Computer Systems Performance Analysis.
Ambulation : a tool for monitoring mobility over time using mobile phones Computational Science and Engineering, CSE '09. International Conference.
Signatures As Threats to Privacy Brian Neil Levine Assistant Professor Dept. of Computer Science UMass Amherst.
Snooping based privacy attacks based on transmission timing and wireless fingerprinting Master’s project presentation Vijay Srinivasan University of Virginia.
Sensor Data Management: Challenges and (some) Solutions Amol Deshpande, University of Maryland.
GIS and Cloud Computing. Flickr  Upload and manage your photos online  Share your photos with your family and friends  Post your photos everywhere.
Geographic Information Systems Cloud GIS. ► The use of computing resources (hardware and software) that are delivered as a service over the Internet ►
DECS Community IT DIVISION OF ENGINEERING COMPUTING SERVICES Michigan State University College of Engineering.
6 Essential Apps for Connected Librarians Apps to Make You More Productive Vincent A. Alascia State Library of Arizona
Put it to the Test: Usability Testing of Library Web Sites Nicole Campbell, Washington State University.
Evaluating GPS Technology Used for Household Surveys Kathy Yu, Arash Mirzaei, Behruz Paschai North Central Texas Council of Governments (NCTCOG) 15 th.
MiLife Graduate Design Seminar II Discovery & Exploratory Research Synthesis.
Opportunities in M-Commerce Standards & Applications Nour El Kadri University of Ottawa.
Turducken: Hierarchical Power Management for Mobile Devices Jacob Sorber, Nilanjan Banerjee, Mark Corner, Sami Rollins University of Massachusetts, Amherst.
SixthSense RFID based Enterprise Intelligence Lenin Ravindranath, Venkat Padmanabhan Interns: Piyush Agrawal (IITK), SriKrishna (BITS Pilani)
Experiences with Location Sensing Systems at the University of Michigan Presented at 2005 NSF CISE/CNS CRI PI’s MeetingScott Gifford
Inseparable Keys: Phase III High-Tech Product Innovation (45-827) James Duan, Eric Lin, Ray Loo, Minh Vuong April 17, 2008.
World Community Grid Volunteer Study. World Community Grid Rationale for Study  World Community Grid has been around since 2004  Last significant changes.
Confidential and proprietary material for authorized Verizon Wireless personnel only. Use, disclosure or distribution of this material is not permitted.
Mobile Usage Patterns and Privacy Implications Michael Mitchell March 27, 2015 Ratnesh Patidar, Manik Saini, Parteek Singh, An-I Wang Florida State University.
WIRELESS NETWORKING TOT AK Agenda Introduction to Wireless Technologies Wireless Networking Overview Non-Technical considerations Other Comparable.
Task Analysis Methods IST 331. March 16 th
TITLE RFID FOR EDUCATIONAL INSTITUTIONS AND OFFICES.
Basics of testing mobile apps
Assistant Professor - University of Washington PhD from MIT in February 2006 Advisors: Hari Balakrishnan and Mike Stonebraker Topic: distributed stream.
Four or More: The New Demographic Mary Madden Pew Internet & American Life Project LITA President’s Program ALA – June 27, 2010 (and a bunch of other really.
Toolooa SHS BYOD Parent Information Night. Why is BYOD (Bring Your Own Device)happening? The current hire devices were Federally funded and the funding.
Event Detection and Notification in the World-Wide Sensor Web Magdalena Balazinska with Evan Welbourne, Garret Cole, Nodira Khoussainova, Julie Letchner,
1 Computing Support of Instruction Dr. H.E. (Buster) Dunsmore Purdue University Department of Computer Science PowerPoint slides.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Heather Gwaltney August 22, 2012, 9:00 a.m. - 10:30 a.m MOWAA Annual Conference Gaylord National Harbor Hotel Advanced E-Strategy.
1 Jong Hee Kang, William Welbourne, Benjamin Stewart, Gaetano Borriello, October 2004, Proceedings of the 2nd ACM international workshop on Wireless mobile.
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph 1 Tracking Indoors.
Approaches to Intrusion Detection statistical anomaly detection – threshold – profile based rule-based detection – anomaly – penetration identification.
There is a lot to talk about if we think of the advantages of a wireless connection, the most important of its aspects is mobility and everything that.
Ubiquitous means ‘everywhere’
Gang Wang, Sarita Y. Schoenebeck †, Haitao Zheng, Ben Y. Zhao UC Santa Barbara, † University of Michigan Understanding Bias and Misbehavior on Location-based.
Wireless Networking Presented by: Jeffrey D. Bombell, American Computer Technologies.
A significant Term to ensure flawless performance Mobile App Maintenance.
REDLANDS UNIFIED SCHOOL DISTRICT.  Stored in a secure room, the keys travel with the cart, but should not be stored with the cart  Lock the wheels.
1 Interaction in Pervasive Computing Settings using Bluetooth-enabled Active tags and passive RFID Technology tegether with Mobile Phones PerCom 2003 F.
Designing for Context: Usability in a Ubiquitous Environment
MobileMiner: Mining Your Frequent Behavior Patterns On Your Phone
SixthSense RFID based Enterprise Intelligence
Wireless Performance Prediction (WPP) - Addressing End-User Issues
Presentation transcript:

The RFID Ecosystem Project Longitudinal Study of a Building-Scale RFID Ecosystem Evan Welbourne with Karl Koscher, Emad Soroush, Magdalena Balazinska, Gaetano Borriello University of Washington, CSE MobiSys 2009 June 22, Kraków, Poland

Focus: Pervasive RFID Systems  RFID tags on people and objects  Higher-level events are inferred tagAntennaTime RFID Trace: Bob, notesC1 B4 A6 ……… “Working in Office”

Focus: Pervasive RFID Systems  RFID tags on people and objects  Higher-level events are inferred  High-performance passive tags [ Detect Care Milestones [ Track Hospital’s Equipment, Staff [ Active Tags Passive Tags  Battery-powered  $10 - $100 (US)  Reliable location stream  No batteries  < $1 (US)  Less reliable location VS. EPC Gen 2 tags  What does the data from a pervasive system look like?  How well do the tags perform?  Can performance be improved?  Will users adopt passive RFID tags?  Do users accept applications built on passive RFID?  Past studies are limited to lab-like settings…

 4-week study of a building-scale RFID deployment:  EPC Gen 2 RFID  67 participants  300+ tags  Location apps  Summary:  1.5M tag reads  38,000 antenna visits  9 lost or broken tags  9,000 application operations by participants  0 reported privacy breaches Longitudinal Study

 Deployment overview  Data rates and system load What does the data from a pervasive system look like?  Tag Performanc e How well do passive tags perform in practice?  Probabilistic Inference Can performance be improved in software?  End-user tag management Will users adopt passive tags?  Applications Do users accept applications based on passive RFID? Outline

 Deployment overview  Data rates and system load What does the data from a pervasive system look like?  Tag Performanc e How well do passive tags perform in practice?  Probabilistic Inference Can performance be improved in software?  End-user tag management Will users adopt passive tags?  Applications Do users accept applications based on passive RFID? Outline

 CSE Building (8,000 m 2 )  47 Readers, 160 Antennas  Installed in 3 configurations The RFID Ecosystem First Floor Entrance (not shown on map)

 Three tag designs  324 tags on 19 types of objects: RFID Tags  Personal Badges  Bags  Clothing  Keys  Wallets, Purses  Books  Paper, binders  iPods, Laptops, Phones  Food / Water Containers  And more…

 Tag Read Events (TREs) and STAYs  TRE: (tag, antenna, time)  STAY: (tag, antenna, start time, stop time) Example: RFID Data Streams

 Deployment overview  Data rates and system load What does the data from a pervasive system look like?  Tag Performanc e How well do passive tags perform in practice?  Probabilistic Inference Can performance be improved in software?  End-user tag management Will users adopt passive tags?  Applications Do users accept applications based on passive RFID? Outline

 Deployment overview  Data rates and system load What does the data from a pervasive system look like?  Tag Performanc e How well do passive tags perform in practice?  Probabilistic Inference Can performance be improved in software?  End-user tag management Will users adopt passive tags?  Applications Do users accept applications based on passive RFID? Outline

Data Rates and System Load Unlike supply chain RFID applications… Amount of data generated is very manageable Total raw data: 53 MB  Compresses to: 1 MB Peak Rate: 8400 TRE / hour Scale to 1M tags: ~ 100 MB / day Explanation:  Fewer tags than in the supply chain  No antennas inside offices  Many tagged objects never move  Supply chain numbers may not be compressed

Data Rates and System Load Like similar studies in wireless mobility… Load mirrors patterns of building occupancy US Veteran’s HolidayUS Thanksgiving Holiday Major Undergrad Project Due Implications:  Makes sense to allocate more resources to hot spots  Predictable off-peak times for batch processing  “Hot spot” antennas:  Outside research lab  Outside student store

 Deployment overview  Data rates and system load What does the data from a pervasive system look like?  Tag Performanc e How well do passive tags perform in practice?  Probabilistic Inference Can performance be improved in software?  End-user tag management Will users adopt passive tags?  Applications Do users accept applications based on passive RFID? Outline

 Deployment overview  Data rates and system load What does the data from a pervasive system look like?  Tag Performanc e How well do passive tags perform in practice?  Probabilistic Inference Can performance be improved in software?  End-user tag management Will users adopt passive tags?  Applications Do users accept applications based on passive RFID? Outline

web-surveys collected ground truth location data We compute Detection-Rate: Probability that a tag is detected by a nearby antenna Tag Performance

Key Factors: Tag Performance Compared to performance in controlled laboratory studies… Performance was significantly worse 1) Tag design 2) Object type ex: wallet, purse, keys More RF-absorbent Tags held tight against body ex: bag, hat, helmet, jacket Less RF-absorbent Tags more separated from body High variance: Differences in tag mounting (Also slight differences in material composition) Implications:  Must cope with high uncertainty in raw data  Performance engineering opportunities: 3) Mounting Larger antennas work better All lower than detection rate in lab studies Other factors: simultaneous mobile tags, RF interference,…  Best design  Better mounting  Redundancy*

 Deployment overview  Data rates and system load What does the data from a pervasive system look like?  Tag Performanc e How well do passive tags perform in practice?  Probabilistic Inference Can performance be improved in software?  End-user tag management Will users adopt passive tags?  Applications Do users accept applications based on passive RFID? Outline

 Deployment overview  Data rates and system load What does the data from a pervasive system look like?  Tag Performanc e How well do passive tags perform in practice?  Probabilistic Inference Can performance be improved in software?  End-user tag management Will users adopt passive tags?  Applications Do users accept applications based on passive RFID? Outline

 Tackle inherent uncertainty of event detection as well  Approach:  Probabilistic model of location w/particle filter  Process with probabilistic event detection engine  Evaluation: “Entered-Room” using survey results  Despite high uncertainty:  60% correct room, 80% correct vicinity  But doesn’t work when detection rate < 0.5  Probabilistic data is computationally expensive Probabilistic Inference To further improve performance on top of uncertain RFID data… Probabilities help, must be applied with care ? ? ? ?

 Deployment overview  Data rates and system load What does the data from a pervasive system look like?  Tag Performanc e How well do passive tags perform in practice?  Probabilistic Inference Can performance be improved in software?  End-user tag management Will users adopt passive tags?  Applications Do users accept applications based on passive RFID? Outline

 Deployment overview  Data rates and system load What does the data from a pervasive system look like?  Tag Performanc e How well do passive tags perform in practice?  Probabilistic Inference Can performance be improved in software?  End-user tag management Will users adopt passive tags?  Applications Do users accept applications based on passive RFID? Outline

 Participants mounted & managed their own tags  Only basic guidelines and reminders for 3 weeks  Experts remounted poorly performing tags in week 4  Exit survey for 67 participants also showed:  41 often forgot to carry tags  8 found tags socially awkward to carry/wear  19 said tags were inconvenient or uncomfortable  9 tags reported lost or broken End-User Tag Management To encourage optimal tag performance… Tag use must be supported and incentivized

 Deployment overview  Data rates and system load What does the data from a pervasive system look like?  Tag Performanc e How well do passive tags perform in practice?  Probabilistic Inference Can performance be improved in software?  End-user tag management Will users adopt passive tags?  Applications Do users accept applications based on passive RFID? Outline

 Deployment overview  Data rates and system load What does the data from a pervasive system look like?  Tag Performanc e How well do passive tags perform in practice?  Probabilistic Inference Can performance be improved in software?  End-user tag management Will users adopt passive tags?  Applications Do users accept applications based on passive RFID? Outline

 Standard location-aware applications  Built using Cascadia system (MobiSys 2008)  Event detection over deterministic raw data Applications

 Tool for deleting data was used “only as a test”  Relatively few operations to manage privacy  Many said: “Not concerned about tracking in CSE” “More concerned about employer or gov’t”  Only 7 participants removed tags for privacy reasons  12 reported behavior change (e.g., arriving earlier)  0 reported privacy breaches [See IEEE Pervasive 07, Internet Computing 09 for more on privacy] Applications – Privacy Contrary to expectation… Very few participants concerned w/personal privacy

 Exit-survey for 67 participants showed:  Most found apps novel, fun; 15 found them truly useful  Barriers: log-in (18), lack of friends (15), poor tags (5)  Requested features:  Push-based interfaces (Desktop Feed gadget)  More complex events, historical data (“Digital Diary”) Applications - Adoption Applications were “novel, fun, useful” depending on… Ease of use, participating friends, tag performance Future Work:  Push information to users rather than pull  Support more complex events, historical queries

Through longitudinal study in a pervasive deployment:  Data rates and system load are quite manageable  Tag performance worse than in lab but there’s hope  Probabilistic inference helps but must be applied w/care  End-users need substantial support in mounting tags, applications are a good incentive  Users accept applications (when they work), but more sophisticated functionality is desired Conclusion: Pervasive computing with passive RFID is feasible but extensive optimizations are required Summary

Thank you! See our website for more information:

Backup Slides Backup Slides…

 3 types of tags:  Lab benchmarks showing read-rate: EPC Gen 2 RFID Equipment FleXwingExcaliburPVC Card

 sent to Faculty, Staff, grads, undergrads  $30 for participation  + $10 for completing >= 25% of surveys  + $20 for completing >= 50% of surveys Recruiting Participants Recruited Participants Faculty Participants2 Staff Participants2 Grad Participants30 Undergrad Participants33 MALE46 FEMALE21

Hourly Data Rates  Total:  1.5M TREs  38K STAYs  Max Rate:  8408 TRE/hr  601 STAY/hr  Min Rate:  0 TRE/hr  0 STAY/hr

People and Objects  Participants: Almost no data or a lot of data  Some forgot tags often; Some not in bldg  Objects: Same trend  Mobility of object; Material of object

Load Distribution  Some antennas are “hot spots”  Similar to wifi mobility studies

Survey Responses  2226 Surveys Sent, 1358 Received  18 seconds to complete (avg)

 Usage varies by participant  0.37 correlation: data generated and app usage Application Usage

 Use Historical Data  View Trends More Recent Applications

Ambient AwarenessFriend and Object FindersTime Use Analysis ToolsContext-Aware Social NetworkingRFID-based Reminders Supported by Cascadia System  Welbourne, E. et al., MobiSys 2008

 Privacy Tools:  Data review tool  Access control tool Privacy Tools

Issue: Basic Insecurity of RFID  Case Study: WA State Enhanced Driver’s License  DHS claims RFID “removes risk of cloning”  Can be cloned easily in less than a second w/cheap device  Can be read more than 75 ft away  Sleeve doesn’t always work, worse when crumpled # EDL Reads, Week of Apr 27th Case study credit: Karl Koscher, Ari Juels, Tadayoshi Kohno, Vjekoslav Brajkovic