1 Cardinality Estimation for Large-scale RFID Systems Chen Qian, Hoilun Ngan, and Yunhao Liu Hong Kong University of Science and Technology.

Slides:



Advertisements
Similar presentations
Victor K. Y. Wu Department of Electrical Engineering
Advertisements

Achieving Throughput Fairness in Wireless Mesh Network Based on IEEE Janghwan Lee and Ikjun Yeom Division of Computer Science KAIST
Design of a reliable communication system for grid-style traffic light networks Junghoon Lee Dept. of Computer science and statistics Jeju National University.
Presented by Zhu Jinshun Season: Shelving Interference and Joint Identification in Large- scale RFID Systems.
Distributed Systems Major Design Issues Presented by: Christopher Hector CS8320 – Advanced Operating Systems Spring 2007 – Section 2.6 Presentation Dr.
Chorus: Collision Resolution for Efficient Wireless Broadcast Xinyu Zhang, Kang G. Shin University of Michigan 1.
Winter 2004 UCSC CMPE252B1 CMPE 257: Wireless and Mobile Networking SET 3f: Medium Access Control Protocols.
Fast and Reliable Estimation Schemes in RFID Systems Murali Kodialam and Thyaga Nandagopal Bell Labs, Lucent Technologies.
Rumor Riding, IEEE ICNP2006, Jinsong Han & Yunhao Liu, HKUST, Nov 12 1 Rumor Riding Anonymizing Unstructured Peer- to-Peer System Jinsong Han and Yunhao.
Serverless Search and Authentication Protocols for RFID Chiu C. Tan, Bo Sheng and Qun Li Department of Computer Science College of William and Mary.
Every Bit Counts – Fast and Scalable RFID Estimation Muhammad Shahzad and Alex X. Liu Dept. of Computer Science and Engineering Michigan State University.
Adaptive Splitting Protocols for RFID Tag Collision Arbitration Jihoon Myung and Wonjun Lee ACM Mobihoc 06.
Modeling OFDM Radio Channel Sachin Adlakha EE206A Spring 2001.
Efficient Hop ID based Routing for Sparse Ad Hoc Networks Yao Zhao 1, Bo Li 2, Qian Zhang 2, Yan Chen 1, Wenwu Zhu 3 1 Lab for Internet & Security Technology,
Tributaries and Deltas: Efficient and Robust Aggregation in Sensor Network Streams Amit Manjhi, Suman Nath, Phillip B. Gibbons Carnegie Mellon University.
A Payment-based Incentive and Service Differentiation Mechanism for P2P Streaming Broadcast Guang Tan and Stephen A. Jarvis Department of Computer Science,
Privacy and Integrity Preserving in Distributed Systems Presented for Ph.D. Qualifying Examination Fei Chen Michigan State University August 25 th, 2009.
Effective Gaussian mixture learning for video background subtraction Dar-Shyang Lee, Member, IEEE.
RFID Cardinality Estimation with Blocker Tags
Admission Control and Dynamic Adaptation for a Proportional-Delay DiffServ-Enabled Web Server Yu Cai.
David Molnar, David Wagner - Authors Eric McCambridge - Presenter.
“SDJS: Efficient Statistics in Wireless Networks” Albert Krohn, Michael Beigl, Sabin Wendhack TecO (Telecooperation Office) Institut für Telematik Universität.
Localized Asynchronous Packet Scheduling for Buffered Crossbar Switches Deng Pan and Yuanyuan Yang State University of New York Stony Brook.
RFID and Positioning. Outline RFID Introduction Indoor Localization RFID positioning Algorithm – LANDMARC – RFID-Based 3-D Positioning Schemes RFID application.
Radio Frequency Identification Inventory Tracking and Status Monitoring of Blood Units Team 10 Mark Green Melissa Kronenberger Nadine Tribur Aaron Schlanser.
Fast and Reliable Estimation Schemes in RFID Systems Murali Kodialam and Thyaga Nandagopal Bell Labs, Lucent Technologies Presented by : Joseph Gunawan.
Anti-tag collision algorithms of RFID
Understanding RFID Counting Protocols Binbin Chen # Ziling Zhou ^# Haifeng Yu ^ # Advanced Digital Sciences Center ^ National University of Singapore MobiCom.
Tracking Port Scanners on the IP Backbone Tao Ye Sprint Burlingame, CA Avinash Sridharan University of Southern California.
Developing RFID Application In Supply Chain
INTERNET OF THINGS SUBBAIYA VASU UDAYARAJAN UOTTAWA CSI 5169 WIRELESS NETWORKS AND MOBILE COMPUTING SUBMITTED TO: PROFESSOR STOJMENOVIC.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Symbol Tables Symbol tables are used by compilers to keep track of information about variables functions class names type names temporary variables etc.
Da Yan, Zhou Zhao and Wilfred Ng The Hong Kong University of Science and Technology.
Min Xu1, Yunfeng Zhu2, Patrick P. C. Lee1, Yinlong Xu2
Department of Computer Science City University of Hong Kong Department of Computer Science City University of Hong Kong 1 A Statistics-Based Sensor Selection.
Probabilistic Optimal Tree Hopping for RFID Identification Muhammad Shahzad Alex X. Liu Dept. of Computer Science and Engineering Michigan State University.
Dave McKenney 1.  Introduction  Algorithms/Approaches  Tiny Aggregation (TAG)  Synopsis Diffusion (SD)  Tributaries and Deltas (TD)  OPAG  Exact.
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.
1 LD-Sketch: A Distributed Sketching Design for Accurate and Scalable Anomaly Detection in Network Data Streams Qun Huang and Patrick P. C. Lee The Chinese.
Privacy-preserving rule mining. Outline  A brief introduction to association rule mining  Privacy preserving rule mining Single party  Perturbation.
Wireless communications and mobile computing conference, p.p , July 2011.
A SURVEY OF MAC PROTOCOLS FOR WIRELESS SENSOR NETWORKS
RFID E STIMATION P ROBLEM Lee, Gunhee S URVEY. R EFERENCES Energy Efficient Algorithms for the RFID Estimation Problem –Tao Li, Samuel Wu, Shigang Chen.
STUMP: Exploiting Position Diversity in the Staggered TDMA Underwater MAC Protocol Kurtis Kredo II, Petar Djukic, Prasant Mohapatra IEEE INFOCOM 2009.
1 Utilizing Shared Vehicle Trajectories for Data Forwarding in Vehicular Networks IEEE INFOCOM MINI-CONFERENCE Fulong Xu, Shuo Gu, Jaehoon Jeong, Yu Gu,
D 陳怡安 R 解巽評 R 高榮泰 IEEE/ACM TRANSACTIONS ON NETWORKING OCTOBER 2006 Cristian Estan, George Varghese, Member, IEEE, and Michael Fisk.
Fairness Matters: Identification of Active RFID Tags with Statistically Guaranteed Fairness Michigan State University Muhammad Shahzad Alex X. Liu North.
Understanding RFID Counting Protocols Authors: Binbin Chen, Ziling Zhou, Haifeng Yu MobiCom 2013 Presenter: Musab Hameed.
Muhammad Shahzad Alex X. Liu Dept. of Computer Science and Engineering
Review of key networking techniques: –Reliable communication over unreliable channels –Error detection and correction –Medium access control –routing –Congestion.
Calculating frequency moments of Data Stream
Computer Science Department of University of Virginia  Voltage on a tag Radio Frequency Identification Systems New Ideas and Algorithms Introduction to.
A Framework with Behavior-Based Identification and PnP Supporting Architecture for Task Cooperation of Networked Mobile Robots Joo-Hyung Kiml, Yong-Guk.
Every Bit Counts – Fast and Scalable RFID Estimation
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
Identifying the Missing Tags in a Large RFID System Tao Li (University of Florida, US) Shigang Chen (University of Florida, US) Yibei Ling (Telcordia Technologies,
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
Sensing multiple passive tags simultaneously
Finding Frequent Items in Data Streams
Zahra Ahmadian Recursive Linear and Differential Cryptanalysis of Ultra-lightweight Authentication Protocols Zahra Ahmadian
ECF: an MPTCP Scheduler to Manage Heterogeneous Paths
Scheduling Mechanism in IEEE e
It Probably Works Jerome Vogt.
Randomized PRF Tree Walking Algorithm for Secure RFID
Javad Ghaderi, Tianxiong Ji and R. Srikant
An Improved Novel Key Management Protocol for RFID Systems
Heavy Hitters in Streams and Sliding Windows
Sofia Pediaditaki and Mahesh Marina University of Edinburgh
Lu Tang , Qun Huang, Patrick P. C. Lee
Presentation transcript:

1 Cardinality Estimation for Large-scale RFID Systems Chen Qian, Hoilun Ngan, and Yunhao Liu Hong Kong University of Science and Technology

2 RFID: Hot Topic Both in industry and academic society RFID: independent sessions (three or more papers) in PerCom 2007, ?

3 Research Issues (take our group as an example) Localization Object Tracking Security & Privacy Tag Counting & Estimation To be expanded…

4 RFID: Hot Topic Some RFID papers in other top confs. M. S. Kodialam, T. Nandagopal, “Fast and reliable estimation schemes in RFID systems”, MobiCom 2006 J. Myung, W. Lee, “Adaptive splitting protocols for RFID tag collision arbitration”, MobiHoc 2006 Qunfeng Dong, et. al., “Load Balancing in Large-Scale RFID Systems”, Infocom 2007 Z. Zhou, et. al., "Slotted Scheduled Tag Access in Multi-Reader RFID Systems", ICNP 2007

5 RFID Sys. Model RFID Readers –Carrying antennas, collect info from nearby tags. –Connected with servers RFID Tags –Labeled with unique serial #s –Simple structure –Large-deployed, but can not communicate with each other If multiple tags transmit to reader simultaneously, a collision happens, and reader cannot recognize these tags.

6 Real Problems RFID tags are used to label large- volume items. Hence, collecting the information of these items is the main goal of the RFID system. Two main kinds of information: –Identities Cardinality Identification Counting

7 Identification: ALOHA

8 Identification: Tree

9 Tag counting: Some applications Hong Kong International Airport Cargo transportations

10 Tag counting: Some applications Stadium RFID System Security and traffic control

11 Identification: Limitation We can obtain the tag cardinality via identification. But…. Extremely long latency –1000 sec for 3000 tags Not applicable for mobile objects

12 Estimation (Mobicom 06)

13 Estimation: Limitation Multiple-reading problem

14 Our Goal Design an estimation scheme that can –Eliminate replications from the sum of reader results. –Achieve a short processing time, –And high accuracy.

15 LPE Linear Probabilistic Estimation (LPE) Replication- insensitive

16 LPE: Limitation Processing time is still too long to be ideal One can never know in advance that how long the ALOHA frame should be set.

17 Can we design an estimation scheme that works well without pre-knowledge?

18 Galton Board

19 GD Galton Board Geometric Distribution

20 LoF Lottery Frame Approximately 1/2 (t+1) of the tag responses are in time slot t.

21 LoF The kth bit in bitmap BM[k] will be zero if k>>log2n, or be one if k<<log2n. The fringe consists zeros and ones for the k whose value is near log 2 n. R is the position of the right most zero

22 LoF P. Flajolet and G. N. Martin, "Probabilistic Counting Algorithms for Data Base Applications," Journal of Computer and System Science, vol. 31, 1985.

23 LoF: accuracy LoF estimation may not be accurate enough for some applications. Luckily the right most zero R is an unbiased estimator of log 2 n, which means If we make several independent estimations and compute the average result, the standard error will be reduced.

24 LoF: multiple hashes Consider the average value The variable has the expectation and standard deviation that satisfy Therefore, the improved estimator is

25 LoF: accuracy

26 LoF: processing time The number of time slots required for a frame is independent from the size of tag set. A frame with 16 slots is enough to estimate up to 2 16 = tags.

27 Simulation: setup Fixed 32-slot length for LoF estimation.

28 Simulation: Single reader

29 Simulation: Single reader

30 Simulation: Multiple reader

31 Simulation: Processing time Just the last time!

32 Summary LoF is a replication-insensitive estimation, working well in multi- reader environments. LoF can obtain higher accuracy and lower latency, comparing with previous schemes. Trade-off in LoF: the storage for hash functions.

33 Questions? Thank you !