SixthSense: RFID-based Enterprise Intelligence Lenin Ravindranath, Venkat Padmanabhan (MSR India) Piyush Agrawal (IIT Kanpur)

Slides:



Advertisements
Similar presentations
Victor K. Y. Wu Department of Electrical Engineering
Advertisements

RFID Access Control System March, 2003 Softrónica.
anywhere and everywhere. omnipresent A sensor network is an infrastructure comprised of sensing (measuring), computing, and communication elements.
The Cricket Compass for Context-Aware Mobile Applications Nissanka B. Priyantha.
Agile Route Shopper Tracker Shopperception: Using a KINECT to build real world Google Analytics.
1 Electrical and Computer Engineering Drebin Rescuing Firefighters in Distress FPR Team Ganz: Jonathan Bruso Michael Carney Daniel Fortin James Schafer.
Laboratoire d'InfoRmatique en Images et Systèmes d'information UMR /06/2015 Vasile-Marian Scuturici and Dejene Ejigu LIRIS-UMR 5205 CNRS, INSA de.
Design and Implementation of a Middleware for Sentient Spaces Bijit Hore, Hojjat Jafarpour, Ramesh Jain, Shengyue Ji, Daniel Massaguer Sharad Mehrotra,
The Science of Digital Media Microsoft Surface 7May Metropolia University of Applied Sciences Display Technologies Seminar.
Chess Review May 11, 2005 Berkeley, CA Tracking Multiple Objects using Sensor Networks and Camera Networks Songhwai Oh EECS, UC Berkeley
Location Systems for Ubiquitous Computing Jeffrey Hightower and Gaetano Borriello.
Challenges: Device-free Passive Localization for Wireless Environments Moustafa Youssef, Matthew Mah, Ashok Agrawala University of Maryland College Park.
RADIO FREQUENCY IDENTIFICATION By Basia Korel. Automatic Identification Technology for identifying items Three step process 1) Identify people/objects.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
RADAR: An In-Building RF-Based User Location and Tracking system Paramvir Bahl and Venkata N. Padmanabhan Microsoft Research Presented by: Ritu Kothari.
RFID Technology and Asset Tracking “Any sufficiently advanced technology is indistinguishable from magic.” Arthur C Clark.
Lecture Notes #7 Radio Frequency Identification (RFID)
RFID Object Localization Gabriel Robins and Kirti Chawla Department of Computer Science University of Virginia
Physical-layer Identification of RFID Devices Authors: Boris Danev, Thomas S. Heyde-Benjamin, and Srdjan Capkun Presented by Zhitao Yang 1.
RFID Inventory System Shaun Duncan, Thomas Keaten, Auroop Roy.
Created by the Community for the Community Building a RFID solution in BTS 09.
Chip tag A radio-frequency identification system uses tags readers send a signal to the tag and read its response RFID tags can be either passive active.
Use of RFID in Shipments between Shore Base Terminals and Oil Platforms in the Gulf of Mexico Yasemin Aksoy Tulane Consortium for Supply Chain Management.
Chapter 1 Performance of Passive UHF RFID Systems in Practice RFID Systems: Research Trends and Challenges Slides prepared by Dr. Miodrag Bolic.
Radio Frequency Identification Inventory Tracking and Status Monitoring of Blood Units Team 10 Mark Green Melissa Kronenberger Nadine Tribur Aaron Schlanser.
RFID – An Introduction Murari Raghavan UNC-Charlotte.
Smart Environments for Occupancy Sensing and Services Paper by Pirttikangas, Tobe, and Thepvilojanapong Presented by Alan Kelly December 7, 2011.
Developing RFID Application In Supply Chain
INTERNET OF THINGS SUBBAIYA VASU UDAYARAJAN UOTTAWA CSI 5169 WIRELESS NETWORKS AND MOBILE COMPUTING SUBMITTED TO: PROFESSOR STOJMENOVIC.
RFID TECHNOLOGY By: Sunil Patel Anat Krikunets Ge Qu Priya Pathmanathan.
Da Yan, Zhou Zhao and Wilfred Ng The Hong Kong University of Science and Technology.
A C JOSHI LIBRARY A C Joshi Library is considered to be one of the best libraries of India: Annual budget approx 5 Crores Annual budget approx 5 Crores.
Cullen College of Engineering RFID-Based Solutions for Piping Technology Piping Tech & UH July, 2007.
AOI: Health Adel Aleali, Khalifa Al marri, Dana Sheikhali.
Mapping and Localization with RFID Technology Matthai Philipose, Kenneth P Fishkin, Dieter Fox, Dirk Hahnel, Wolfram Burgard Presenter: Aniket Shah.
SixthSense RFID based Enterprise Intelligence Lenin Ravindranath, Venkat Padmanabhan Interns: Piyush Agrawal (IITK), SriKrishna (BITS Pilani)
I A I Infrared Security System and Method US Patent 7,738,008 June How Does It Work? June 2010 I A I = Infrared Applications Inc.
RFID Technology What is it? (And why should you care?)
CS3900 Richard Emerson1 Radio Frequency ID Tags Smart labels that send/receive data via radio waves Usually works like a barcode – contains a product code.
DISCERN: Cooperative Whitespace Scanning in Practical Environments Tarun Bansal, Bo Chen and Prasun Sinha Ohio State Univeristy.
Personal Server Model for Real-Space Networking Shirou WAKAYAMA KEIO University Japan.
Extending Traditional Algorithms for Cyber-Physical Systems Sumeet Gujrati and Gurdip Singh Kansas State University.
Physical-layer Identification of UHF RFID Tags Authors: Davide Zanetti, Boris Danev and Srdjan Capkun Presented by Zhitao Yang 1.
Nissanka B. PriyanthaAnit Chakraborty Hari Balakrishnan MIT Lab for Computer Science The Cricket Location-Support System.
The Supply Chain Doctors Warehousing Fundamentals The Supply Chain Doctors Kimball Bullington, Ph.D. Cliff Welborn, Ph.D.
Introduction of RFID Presented by Group 2
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
RFID SECURITY.
Computer Science Department of University of Virginia  Voltage on a tag Radio Frequency Identification Systems New Ideas and Algorithms Introduction to.
Radio Frequency Identification (RFID)
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
RFID Technology Lecture for week 5 Dhruba Sen
Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph 1 Tracking Indoors.
The Cricket Location-Support System N. Priyantha, A. Chakraborty, and H. Balakrishnan MIT Lab for Computer Science MOBICOM 2000 Presenter: Kideok Cho
IMPROVED ASSET UTILIZATION Lack of visibility of assets and devices results in low equipment utilization rates, excess equipment purchasing and sometimes.
Nissanka Bodhi Priyantha Computer Science, Massachusetts Institute of Technology RTLab. Seolyoung, Jeong Dissertation, MIT, June 2005.
ParkNet: Drive-by Sensing of Road-Side Parking Statistics Irfan Ullah Department of Information and Communication Engineering Myongji university, Yongin,
I Sense a Disturbance in the Force: Unobtrusive Detection of Interactions with RFID-tagged Objects Presenter : 葉舜元.
Using Radio Frequency Identification in Agent- Based Manufacturing Control Systems By: Lamar Alston ASQ Student Member.
Korea University Ubiquitous LAB. Chapter 11. RFID peripherals Ph.D Chang-Duk Jung.
Intelligent parking system based on RFID
By: Tarun Sharma Chinta Rahul SCSE VIT University
PARKING AUTOMATION SYSTEM
Radio Frequency Identification (RFID)
SixthSense RFID based Enterprise Intelligence
Long-range capacitive sensors for indoor person location
Vehicle Segmentation and Tracking in the Presence of Occlusions
Mobility, Networks, and Systems
Randomized PRF Tree Walking Algorithm for Secure RFID
RFID Object Localization
Presentation transcript:

SixthSense: RFID-based Enterprise Intelligence Lenin Ravindranath, Venkat Padmanabhan (MSR India) Piyush Agrawal (IIT Kanpur)

RFID  Radio Frequency Identification  Components  RFID Reader with Antennas  Tags (Active and Passive)  Electromagnetic waves induce current  Tag responds  Globally unique ID  Data  UHF ( MHz)  Range – up to 7m  Applications  Tracking, Inventory, Supply Chain, Authentication, …  Novel Research Applications

Motivating Scenario Lenin missed an object in the conference room – 2 nd floor Scientia

SixthSense Goal  Making people, objects and workspaces, the first class citizens of the enterprise computing Components  Use RFID to capture the rich interaction between people and their surroundings  Combine with other enterprise systems/sensors to make automated inferences  Enable Useful Services

Setting People and objects tagged Camera Calendar Presence RFID Antennas

Assumptions  Widespread coverage of RFID readers in the workspace  Users are free to pick up new tags and affix them to objects  Can put multiple tags on an object  No dependence on cataloging  Cataloging is an overhead  TagID  Entity  Antenna  Workspace  Error Prone  Tags are fragile – may have to be replaced  Readers/Antenna could be moved  Start with an undifferentiated mass of tags and infer everything Lenin missed an object in the conference room – 2 nd floor Scientia – Ant – Ant – Ant – Ant 1

Architecture People and objects tagged Camera Calendar Presence RFID Antennas SixthSense

 Automated Inference  Platform  Programming Model  Applications

Inference Engine  Person-Object Differentiation  Object Ownership Inference  Zone Identification  Person Identification  Person-Object Interaction

Person-Object Differentiation  People can move on their own  Objects move only when carried by a person Co-movement based heuristic  Relative Movement (RM) Zone 1 Zone 2Zone 3

Object Ownership Inference  Co-Presence  Calculate the amount of time the object is concurrently present in the same zone as a person  Owner is the person with which the object is co-present the most and greater than a threshold

Person Identification 1 xyz abc 1 2 Workspace Entrance Event Log-in event Coincidence count 1 xyz 1 time t1 t2 1

Object Interaction (only in zones of interest)  Intra zone  Identify interaction in zones of interest  A person lifted an object  A person turned the orientation an object  Signal Strength of tag varies  Change in distance  Change in orientation  Contact  Monitor variation in RSSI

Object Interaction  Sample the RSSI of each object tag every 200ms  Sliding 4-second wide window  Difference between the 10 th percentile and 90 th percentile of the RSSI  Object is said to be interacted - If the difference > threshold  Minimizing spurious detections  Use multiple antennas

Object Interaction Antenna 1 Antenna 2 Interacted

Ensuring Privacy  Enterprise will deploy and manage the system  Expose appropriate set of information  Trust - Analogous to the enterprise system  Defend against rogue readers  Relabeling approach [A. Juels, 2006]  EPC code rewritten at random times  SixthSense will be aware of the mapping between the old and new tag IDs

Implementation Simulator (Trace Generation) Experimental Setup (Real-time feed)

Experimental Setup

Results  Inter-zone movement detection ObjectReliability (1m)Reliability (2m) Badge on belt clip100%96% Small box in hand94%88%  Object Interaction  Testbed deployment  To make correct inferences  Average inter-zone movements needed – 4  Average log-ins required - 3 Distance between antennasDetection time 1.5m2.39s 2m3.4s 2.5m5.03s

Simulation  Probabilistic model to generate artificial traces  Simulated  Inter-zone movement (walk)  People carrying multiple objects  Log-in events  Untagged people Zone 1Zone 2Zone 3

Results  Person-object differentiation  Person Identification  Varying average walk length  Effects of untagged people

Person-Object differentiation and ownership  20 people, 100 tags, probability of walk – 0.1, walk length - 5

Person Identification  10% of users entering workspace simultaneously

Programming Model  Callbacks  InterZoneMovementEvent (tagID, startZone, endZone, Time)  ObjectInteractedEvent(tadID, Zone, Time)  Lookups  GetTagList()  GetPersonTags()  GetOwnedObjects(tagID)  GetTagType(tagID)  GetTagOwner(tagID)  GetPersonTagIdentity(tagID)  GetZoneType(zone)  GetTagsInZone(zone)  GetTagWorkspaceZone(tagID)  GetCurrentTagZone(tagID)  GetCalendarEntry(ID, Time)

Example  Misplaced Object Alert personTags = GetPersonTags() For each ownerTagID in personTags ObjTags = GetOwnedObject(ownerTagID) OwnerZone = GetCurrentTagZone(ownerTagId) OwnerWorkspace = GetTagWorkspaceZone(ownerTagId) For each obj in ObjTags objZone = GetCurrentTagZone(ownerTagId) if (objZone != OwnerZone && objZone != OwnerWorkspace) Raise Alert

Applications  Annotated video  Semi-automated image catalog  Misplaced object alert  Automatic conference room booking

Annotating video with physical events  Events  Inter-zone movements  Object Interaction  Tag video feed with events  Person X interacted an object Y  Rich video database  Support rich queries  Give me all videos where Person A interacted with Object B  Application: Integrate with enterprise security camera system

Semi-automated Image catalog  TagIDs are not user friendly  Catalog tagID with its Image  User picks up an object  Shows before the camera and takes a photo  Automatic cataloging (TagID, Image)

Annotating video with physical events

Related Work  Localization  LANDMARC  Indoor Location Sensing Using Active RFID  Sherlock (UMass)  Automatically locating objects for humans  Ferret (UMass)  RFID Localization for Pervasive Multimedia  Platform  Cascadia (UWashington)  Specifying, detecting and managing RFID events  Object Interaction  I sense a disturbance in the force (Intel Research, Seattle)  Unobtrusive detection of Interactions with RFID-tagged Objects  With other sensors  Fusion of RFID and Computer Vision (MSR)

Summary  SixthSense  Enterprise Setting  People and Objects tagged  RFID with other enterprise sensors  Components  Automated Inference  Platform  Applications Questions?

Backup

Semi-Automated Image Catalog  TagID-Image Cataloging  User picks up a tagged object  Hold it in front of the camera  Clicks a picture  Automatically identify the tagID of the object

SixthSense System Inference Engine, Database, Applications RFID Reader RFID Antennas Calendar DataPresence Data Applications Queries

 Industry  Tracking, Inventory, Supply Chain, Authentication  Research  Measurements  Improving reliability, security  Localization  RFID + Computer Vision  Interaction detection  RFID + other sensors RFID Applications

Person-Object Differentiation  People can move on their own  Objects move only when carried by a person Co-movement based heuristic  For every tag T, find co-movement tag set {T 1, T 2..T n }  m – total inter-zone movement of T  m i – total inter-zone movement of T i  c i – amount of co-movement exhibited by T i with T  Declare the tag with the highest RM as person  Eliminate this tags movements  Repeat the algorithm till RM is positive  Tags with negative RM are objects

Zone Identification  Individual workspace  If there is one person predominantly present in a zone  Workspace of that person  Shared workspace  If no one person is predominantly present in a zone  Length of time from a person entry to exit < threshold  Reserved shared workspace  Length of time people are present > threshold  Common meeting entries in their calendars  Common areas  Any space that is not classified as one of the above

Challenges – Improving Reliability  Multi-tagging scheme  Affix multiple tags in different orientation  Increases the probability that atleast one of the tags being detected  Automatic Inference  Initially assume all tags belong to one giant super object  Fully connected graph  When two tags are detected simultaneously in different zones  Tags belong to different objects  Delete edges between them  Connected components  Set of tags attached to the same object

Evaluation – with untagged people

Automatic Conference Room Booking  Conference Room Zone is automatically identified  Reserved Space  Automatically book conference room  If it is not reserved  And bunch of people go into the conference room  And spend say 5 minutes

Discussion  Privacy  Deployed and managed by enterprise  Limited access to users  Relabeling approach  Economic Feasibility  Passive Tags are cheap  Prices are RFID readers expected to drop (Intel R1000)  Health Implications  Transmitted RF power (up to 2W) is well within safe limits  this question will undoubtedly continue to receive much attention and study