Fairness Matters: Identification of Active RFID Tags with Statistically Guaranteed Fairness Michigan State University Muhammad Shahzad Alex X. Liu North.

Slides:



Advertisements
Similar presentations
Presented by Zhu Jinshun Season: Shelving Interference and Joint Identification in Large- scale RFID Systems.
Advertisements

Chorus: Collision Resolution for Efficient Wireless Broadcast Xinyu Zhang, Kang G. Shin University of Michigan 1.
1 EP2210 Fairness Lecture material: –Bertsekas, Gallager, Data networks, 6.5 –L. Massoulie, J. Roberts, "Bandwidth sharing: objectives and algorithms,“
VSMC MIMO: A Spectral Efficient Scheme for Cooperative Relay in Cognitive Radio Networks 1.
Interference Alignment and Cancellation EE360 Presentation Omid Aryan Shyamnath Gollakota, Samuel David Perli and Dina Katabi MIT CSAIL.
Min Song 1, Yanxiao Zhao 1, Jun Wang 1, E. K. Park 2 1 Old Dominion University, USA 2 University of Missouri at Kansas City, USA IEEE ICC 2009 A High Throughput.
Decision Trees and MPI Collective Algorithm Selection Problem Jelena Pje¡sivac-Grbovi´c,Graham E. Fagg, Thara Angskun, George Bosilca, and Jack J. Dongarra,
TDMA Scheduling in Wireless Sensor Networks
DBLA: D ISTRIBUTED B LOCK L EARNING A LGORITHM F OR C HANNEL S ELECTION I N C OGNITIVE R ADIO N ETWORKS Chowdhury Sayeed Hyder Department of Computer Science.
An Application-Specific Protocol Architecture for Wireless Microsensor Networks Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan (MIT)
Fast and Reliable Estimation Schemes in RFID Systems Murali Kodialam and Thyaga Nandagopal Bell Labs, Lucent Technologies.
Every Bit Counts – Fast and Scalable RFID Estimation Muhammad Shahzad and Alex X. Liu Dept. of Computer Science and Engineering Michigan State University.
KAIST Adaptive Triangular Deployment Algorithm for Unattended Mobile Sensor Networks Suho Yang (September 4, 2008) Ming Ma, Yuanyuan Yang IEEE Transactions.
Errol Lloyd Design and Analysis of Algorithms Approximation Algorithms for NP-complete Problems Bin Packing Computer Networks.
Dynamic Tuning of the IEEE Protocol to Achieve a Theoretical Throughput Limit Frederico Calì, Marco Conti, and Enrico Gregori IEEE/ACM TRANSACTIONS.
Adaptive Splitting Protocols for RFID Tag Collision Arbitration Jihoon Myung and Wonjun Lee ACM Mobihoc 06.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Peering in Infrastructure Ad hoc Networks Mentor : Linhai He Group : Matulya Bansal Sanjeev Kohli EE 228a Course Project.
SafeQ: Secure and Efficient Query Processing in Sensor Networks Fei Chen and Alex X. Liu Department of Computer Science and Engineering Michigan State.
Probabilistic Data Aggregation Ling Huang, Ben Zhao, Anthony Joseph Sahara Retreat January, 2004.
1 of 16 March 30, 2000 Bus Access Optimization for Distributed Embedded Systems Based on Schedulability Analysis Paul Pop, Petru Eles, Zebo Peng Department.
RFID Cardinality Estimation with Blocker Tags
Yanyan Yang, Yunhuai Liu, and Lionel M. Ni Department of Computer Science and Engineering, Hong Kong University of Science and Technology IEEE MASS 2009.
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
Fast and Reliable Estimation Schemes in RFID Systems Murali Kodialam and Thyaga Nandagopal Bell Labs, Lucent Technologies Presented by : Joseph Gunawan.
1 Cardinality Estimation for Large-scale RFID Systems Chen Qian, Hoilun Ngan, and Yunhao Liu Hong Kong University of Science and Technology.
Understanding RFID Counting Protocols Binbin Chen # Ziling Zhou ^# Haifeng Yu ^ # Advanced Digital Sciences Center ^ National University of Singapore MobiCom.
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
MAXIMIZING SPECTRUM UTILIZATION OF COGNITIVE RADIO NETWORKS USING CHANNEL ALLOCATION AND POWER CONTROL Anh Tuan Hoang and Ying-Chang Liang Vehicular Technology.
Tuning the Carrier Sensing Range of IEEE MAC Jing Deng,Ben Liang and Pramod K. Varshney Univ. of New Orleans Globecom 2004.
Distributed Fair Scheduling in a Wireless LAN
College of Engineering Non-uniform Grid- based Coordinated Routing Priyanka Kadiyala Major Advisor: Dr. Robert Akl Department of Computer Science and Engineering.
Probabilistic Optimal Tree Hopping for RFID Identification Muhammad Shahzad Alex X. Liu Dept. of Computer Science and Engineering Michigan State University.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
TRANSMISSION POWER CONTROL FOR AD HOC WIRELESS NETWORKS: THROUGHPUT, ENERGY AND FAIRNESS Lujun Jia; Xin Liu; Noubir, G.; Rajaraman, R.; Wireless Communications.
Yafeng Yin 1, Lei Xie 1, Jie Wu 2, Athanasios V. Vasilakos 3, Sanglu Lu 1 1 State Key Laboratory for Novel Software Technology, Nanjing University, China.
Energy-Conserving Access Protocols for Identification Networks By Imrich Chlamtac, Chiara Petrioli, and Jason Redi IEEE/ACM TRANSACTIONS ON NETWORKING,
An Energy-Aware Periodical Data Gathering Protocol Using Deterministic Clustering in Wireless Sensor Networks (WSN) Mohammad Rajiullah & Shigeru Shimamoto.
7-1 Introduction to Queueing Theory l Components of a queueing system n probability density function (pdf) of interarrival times n pdf of service times.
11/25/2015 Wireless Sensor Networks COE 499 Localization Tarek Sheltami KFUPM CCSE COE 1.
A Method for Distributed Computation of Semi-Optimal Multicast Tree in MANET Eiichi Takashima, Yoshihiro Murata, Naoki Shibata*, Keiichi Yasumoto, and.
X. Li, W. LiuICC May 11, 2003A Joint Layer Design Smart Contention Resolution Random Access Wireless Networks With Unknown Multiple Users: A Joint.
STUMP: Exploiting Position Diversity in the Staggered TDMA Underwater MAC Protocol Kurtis Kredo II, Petar Djukic, Prasant Mohapatra IEEE INFOCOM 2009.
1 Iterative Integer Programming Formulation for Robust Resource Allocation in Dynamic Real-Time Systems Sethavidh Gertphol and Viktor K. Prasanna University.
A Quorum-Based Energy-Saving MAC Protocol Design for Wireless Sensor Networks Chih-Min Chao, Yi-Wei Lee IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2010.
Cooperative Layered Wireless Video Multicast Ozgu Alay, Thanasis Korakis, Yao Wang, Elza Erkip, Shivendra Panwar.
June 30 - July 2, 2009AIMS 2009 Towards Energy Efficient Change Management in A Cloud Computing Environment: A Pro-Active Approach H. AbdelSalamK. Maly.
Rami Melhem Sameh Gobriel & Daniel Mosse Modeling an Energy-Efficient MAC Layer Protocol.
Understanding RFID Counting Protocols Authors: Binbin Chen, Ziling Zhou, Haifeng Yu MobiCom 2013 Presenter: Musab Hameed.
Muhammad Shahzad Alex X. Liu Dept. of Computer Science and Engineering
A Throughput-Adaptive MAC Protocol for Wireless Sensor Networks Zuo Luo, Liu Danpu, Ma Yan, Wu Huarui Beijing University of Posts and Telecommunications.
Every Bit Counts – Fast and Scalable RFID Estimation
Jingbin Zhang( 張靜斌 ) †, Gang Zhou †, Chengdu Huang ‡, Sang H. Son †, John A. Stankovic † TMMAC: An Energy Efficient Multi- Channel MAC Protocol for Ad.
Quality of Service Schemes for IEEE Wireless LANs-An Evaluation 主講人 : 黃政偉.
Identifying the Missing Tags in a Large RFID System Tao Li (University of Florida, US) Shigang Chen (University of Florida, US) Yibei Ling (Telcordia Technologies,
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
DRAND: Distributed Randomized TDMA Scheduling for Wireless Ad-Hoc Networks Injong Rhee (with Ajit Warrier, Jeongki Min, Lisong Xu) Department of Computer.
GholamHossein Ekbatanifard, Reza Monsefi, Mohammad H. Yaghmaee M., Seyed Amin Hosseini S. ELSEVIER Computer Networks 2012 Queen-MAC: A quorum-based energy-efficient.
Fair and Efficient multihop Scheduling Algorithm for IEEE BWA Systems Daehyon Kim and Aura Ganz International Conference on Broadband Networks 2005.
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
KAIS T Location-Aided Flooding: An Energy-Efficient Data Dissemination Protocol for Wireless Sensor Networks Harshavardhan Sabbineni and Krishnendu Chakrabarty.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
Network System Lab. Sungkyunkwan Univ. Differentiated Access Mechanism in Cognitive Radio Networks with Energy-Harvesting Nodes Network System Lab. Yunmin.
A Stochastic Frame Based Approach to RFID Tag Searching Ann L. Wang Dept. of Computer Science and Engineering Michigan State University Joint work with.
MapReduce MapReduce is one of the most popular distributed programming models Model has two phases: Map Phase: Distributed processing based on key, value.
Chapter 7 – Aloha-Based Protocol
IEEE Protocol: Design and Performance Evaluation of An Adaptive Backoff Mechanism JSAC, vol.18, No.9, Sept Authors: F. Cali, M. Conti and.
Presented by: Rohit Rangera
IOT Technologies: Radio Frequency Identification (RFID)
Presentation transcript:

Fairness Matters: Identification of Active RFID Tags with Statistically Guaranteed Fairness Michigan State University Muhammad Shahzad Alex X. Liu North Carolina State University

2 Radio Frequency Identification ActivePassive

3 Active RFID Tags RailwaysSeismology AutomotiveAircraft

4 Tree Walking

5 Problem Statement  Input ─ RFID tag population of unknown size ─ Required fairness = α  Output ─ IDs of all tags ─ Minimize identification time ─ Achieved fairness ≥ α

6 Interpreting Fairness  Example: ─ Tag battery depletes after 100,000 transmissions ─ One thousand identification rounds per day ─ Fairness = 0.84 ● 20% tags last for 33 days ● 30% tags last for 50 days ● 50% tags last for 100 days ─ Fairness = 0.99 ● 1% tags last for 50 days ● 99% tags last for 100 days

7 Communication Protocol Overview esscess esscess Frame size f i = 7 Number of empty slots: e i Number of successful slots: s i Number of collision slots: c i the tunable parameter

8 Proposed Approach 1.Estimate tag population size ─ Using ART [MobiCom 2012] ─ One time cost 2.Calculate optimal frame size and execute frame 3.Re-estimate unidentified tag population size ─ Go to step 2 optimal frame size

9 Jain’s Fairness Index  x l = amount of resource used by l th node  t = total number of nodes  Jain’s fairness index lies in the range [1/t, 1]

10 Jain’s Fairness Index for Tags  x l = number of times a tag with label l transmits  t = total number of tags

11 Jain’s Fairness Index for Tags where  Smaller the load factor, higher the fairness  Trade-off time for fairness load factor

12 Identification Time

13 Constraint Optimization Problem  Now we know load factor k  We already know t i from re-estimation  We get f i, because k = t i /f i Trading-off time for fairness Just optimal Aloha

14 Handling Large Frame Sizes  Max allowed frame size = f max  Divide population into 2 z groups of equal size ─ where, z = ceil ( log 2 { f i / f max } )  Execute frames of size ceil( f i / 2 z )  Use SELECT command to make t / 2 z tags participate for each frame ─ LSBs of tags are almost uniformly distributed ● Tags with IDs ending in 0 = Tags with IDs ending in 1 ─ Example: to divide into four groups 1.Use SELECT with 00 2.Use SELECT with 01 3.Use SELECT with 10 4.Use SELECT with 11  Proof of fairness for this method in paper

15 Experimental Evaluation  Implemented 9 protocols in addition to FRIP 1.BS (IEEE Trans. on Information Theory, 1979) 2.ABS (MobiHoc, 2006) 3.TW (DIAL-M 2000) 4.ATW (Tanenbaum, 2002) 5.STT (Infocom, 2009) 6.MAS (PerCom, 2007) 7.ASAP (ICDCS 2010) 8.Frame Slotted Aloha (IEEE Transactions on Communications, 2005) 9.TH (MobiCom 2012)

16 Fairness

17 Identification Time

18 Effect of Splitting Tag Population

19 Comparison: Fairness

20 Comparison: Time

21 Conclusion  First effort towards developing a fair RFID identification protocol  Proposed a method to achieve the required fairness while minimizing identification time  More in the paper ─ Formal proofs and derivations of various aspects ─ More comparisons of FRIP with prior protocols