Muhammad Shahzad Alex X. Liu Dept. of Computer Science and Engineering

Slides:



Advertisements
Similar presentations
Victor K. Y. Wu Department of Electrical Engineering
Advertisements

Computer Science and Engineering Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search Chengyuan Zhang 1,Ying Zhang 1,Wenjie Zhang 1, Xuemin.
A Deferred Cleansing Method for RFID Data Analytics IBM Almaden Research Center Jun Rao Sangeeta Doraiswamy Latha S. Colby University of California at.
Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks Venkata Nishanth Lolla, Lap Kong Law, Srikanth V. Krishnamurthy, Chinya Ravishankar,
School of Computer Science and Engineering Finding Top k Most Influential Spatial Facilities over Uncertain Objects Liming Zhan Ying Zhang Wenjie Zhang.
D EFENSE A GAINST S PECTRUM S ENSING D ATA F ALSIFICATION A TTACKS I N C OGNITIVE R ADIO N ETWORKS Li Xiao Department of Computer Science & Engineering.
Fast and Reliable Estimation Schemes in RFID Systems Murali Kodialam and Thyaga Nandagopal Bell Labs, Lucent Technologies.
1 An Approach to Real-Time Support in Ad Hoc Wireless Networks Mark Gleeson Distributed Systems Group Dept.
First Step Towards Automatic Correction of Firewall Policy Faults Fei Chen Alex X. Liu Computer Science and Engineering Michigan State University JeeHyun.
Serverless Search and Authentication Protocols for RFID Chiu C. Tan, Bo Sheng and Qun Li Department of Computer Science College of William and Mary.
A Convex Optimization Approach to Model (In)validation of Switched ARX Systems with Unknown Switches Northeastern University Yongfang Cheng 1, Yin Wang.
Every Bit Counts – Fast and Scalable RFID Estimation Muhammad Shahzad and Alex X. Liu Dept. of Computer Science and Engineering Michigan State University.
Secure Unlocking of Mobile Touch Screen Devices by Simple Gestures – You can see it but you can not do it Arjmand Samuel Microsoft Research Muhammad Shahzad.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Dynamic Tuning of the IEEE Protocol to Achieve a Theoretical Throughput Limit Frederico Calì, Marco Conti, and Enrico Gregori IEEE/ACM TRANSACTIONS.
Privacy-Preserving Cross-Domain Network Reachability Quantification
XEngine: A Fast and Scalable XACML Policy Evaluation Engine Fei Chen Dept. of Computer Science and Engineering Michigan State University Joint work with.
SafeQ: Secure and Efficient Query Processing in Sensor Networks Fei Chen and Alex X. Liu Department of Computer Science and Engineering Michigan State.
Probabilistic Data Aggregation Ling Huang, Ben Zhao, Anthony Joseph Sahara Retreat January, 2004.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Scheduling with Optimized Communication for Time-Triggered Embedded Systems Slide 1 Scheduling with Optimized Communication for Time-Triggered Embedded.
UIST 2004Kim, Seitz, Agrawala Video-Based Document Tracking: Unifying Your Physical and Electronic Desktops Jiwon KimSteven M. SeitzManeesh Agrawala University.
Better-Behaved Better- Performing Multimedia Networking Jae Chung and Mark Claypool (Avanish Tripathi) Computer Science Department Worcester Polytechnic.
RFID Cardinality Estimation with Blocker Tags
Lesson Title: Singulation Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This material.
FBRT: A Feedback-Based Reliable Transport Protocol for Wireless Sensor Networks Yangfan Zhou November, 2004 Supervisors: Dr. Michael Lyu and Dr. Jiangchuan.
PJSISSTA '001 Black-Box Test Reduction Using Input-Output Analysis ISSTA ‘00 Patrick J. Schroeder, Bogdan Korel Department of Computer Science Illinois.
“SDJS: Efficient Statistics in Wireless Networks” Albert Krohn, Michael Beigl, Sabin Wendhack TecO (Telecooperation Office) Institut für Telematik Universität.
Fast and Reliable Estimation Schemes in RFID Systems Murali Kodialam and Thyaga Nandagopal Bell Labs, Lucent Technologies Presented by : Joseph Gunawan.
1 Cardinality Estimation for Large-scale RFID Systems Chen Qian, Hoilun Ngan, and Yunhao Liu Hong Kong University of Science and Technology.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Authors: Sheng-Po Kuo, Yu-Chee Tseng, Fang-Jing Wu, and Chun-Yu Lin
1 A Discriminative Approach to Topic- Based Citation Recommendation Jie Tang and Jing Zhang Presented by Pei Li Knowledge Engineering Group, Dept. of Computer.
Beyond One-dollar Mouse: A Battery-free Device for 3D Human-Computer Interaction via RFID Tags Qiongzheng Lin Lei Yang,Yuxin Sun,Tianci Liu,Xiang-Yang.
Analytic Models and Empirical Search: A Hybrid Approach to Code Optimization A. Epshteyn 1, M. Garzaran 1, G. DeJong 1, D. Padua 1, G. Ren 1, X. Li 1,
A Dedicated Multi-channel MAC Protocol Design for VANET with Adaptive Broadcasting Ning Lu 1, Yusheng Ji 2, Fuqiang Liu 1, and Xinhong Wang 1 1 Dept. of.
Noise Can Help: Accurate and Efficient Per-flow Latency Measurement without Packet Probing and Time Stamping Dept. of Computer Science and Engineering.
Can Cloud Computing be Used for Planning? An Initial Study Authors: Qiang Lu*, You Xu†, Ruoyun Huang†, Yixin Chen† and Guoliang Chen* from *University.
CMCD: Count Matrix based Code Clone Detection Yang Yuan and Yao Guo Key Laboratory of High-Confidence Software Technologies (Ministry of Education) Peking.
Sign Classification Boosted Cascade of Classifiers using University of Southern California Thang Dinh Eunyoung Kim
Probabilistic Optimal Tree Hopping for RFID Identification Muhammad Shahzad Alex X. Liu Dept. of Computer Science and Engineering Michigan State University.
An Implementation and Performance Evaluation of Language with Fine-Grain Thread Creation on Shared Memory Parallel Computer Yoshihiro Oyama, Kenjiro Taura,
Prophet Address Allocation for Large Scale MANETs Matt W. Mutka Dept. of Computer Science & Engineering Michigan State University East Lansing, USA IEEE.
Yafeng Yin 1, Lei Xie 1, Jie Wu 2, Athanasios V. Vasilakos 3, Sanglu Lu 1 1 State Key Laboratory for Novel Software Technology, Nanjing University, China.
BING: Binarized Normed Gradients for Objectness Estimation at 300fps
WINLAB Improving RF-Based Device-Free Passive Localization In Cluttered Indoor Environments Through Probabilistic Classification Methods Rutgers University.
Immune Genetic Algorithms for Optimization of Task Priorities and FlexRay Frame Identifiers Soheil Samii 1, Yanfei Yin 1,2, Zebo Peng 1, Petru Eles 1,
RFID E STIMATION P ROBLEM Lee, Gunhee S URVEY. R EFERENCES Energy Efficient Algorithms for the RFID Estimation Problem –Tao Li, Samuel Wu, Shigang Chen.
Fast motion estimation and mode decision for H.264 video coding in packet loss environment Li Liu, Xinhua Zhuang Computer Science Department, University.
Self Organization and Energy Efficient TDMA MAC Protocol by Wake Up for Wireless Sensor Networks Zhihui Chen and Ashfaq Khokhar ECE Department, University.
Syed Hassan Ahmed Syed Hassan Ahmed, Safdar H. Bouk, Nadeem Javaid, and Iwao Sasase RIU Islamabad. IMNIC’12, RIU Islamabad.
Fairness Matters: Identification of Active RFID Tags with Statistically Guaranteed Fairness Michigan State University Muhammad Shahzad Alex X. Liu North.
Toward a Packet Duplication Control for Opportunistic Routing in WSNs Georgios Z. Papadopoulos, Julien Beaudaux, Antoine Gallais, Periklis Chatzimisios,
Secure Unlocking of Mobile Touch Screen Devices by Simple Gestures – You can see it but you can not do it Muhammad Shahzad, Alex X. Liu Michigan State.
A Scalable Architecture For High-Throughput Regular-Expression Pattern Matching Yao Song 11/05/2015.
Chapter 8 – Tree-based Anti-Collision Protocols for RFID tags
Every Bit Counts – Fast and Scalable RFID Estimation
Ahmad Salam AlRefai.  Introduction  System Features  General Overview (general process)  Details of each component  Simulation Results  Considerations.
September 28, 2000 Improved Simultaneous Data Reconciliation, Bias Detection and Identification Using Mixed Integer Optimization Methods Presented by:
Identifying the Missing Tags in a Large RFID System Tao Li (University of Florida, US) Shigang Chen (University of Florida, US) Yibei Ling (Telcordia Technologies,
Combined Human, Antenna Orientation in Elevation Direction and Ground Effect on RSSI in Wireless Sensor Networks Syed Hassan Ahmed, Safdar H. Bouk, Nadeem.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Euro-Par, HASTE: An Adaptive Middleware for Supporting Time-Critical Event Handling in Distributed Environments ICAC 2008 Conference June 2 nd,
On Detecting Termination in Cognitive Radio Networks Shantanu Sharma 1 and Awadhesh Kumar Singh 2 1 Ben-Gurion University of the Negev, Israel 2 National.
Frame counter: Achieving Accurate and Real-Time Link Estimation in Low Power Wireless Sensor Networks Daibo Liu, Zhichao Cao, Mengshu Hou and Yi Zhang.
A Stochastic Frame Based Approach to RFID Tag Searching Ann L. Wang Dept. of Computer Science and Engineering Michigan State University Joint work with.
Chapter 7 – Aloha-Based Protocol
BlueScan: Boosting Wi-Fi Scanning Efficiency Using Bluetooth Radio
Combating Tag Cloning with COTS RFID Devices
RFID SOCCER BALL IMPACT: PROBLEM: APPROACH:
Presentation transcript:

Expecting the Unexpected: Fast and Reliable Detection of Missing RFID Tags in the Wild Muhammad Shahzad Alex X. Liu Dept. of Computer Science and Engineering Michigan State University East Lansing, Michigan, 48824, USA

2011: Retailers lost 34.5 billion USD Motivation Shop Lifting Employee Theft 2011: Retailers lost 34.5 billion USD

Problem Statement Input Objective Set of IDs of expected tags RFID tag population containing: some or all expected tags unexpected tags Threshold on number of missing tags, T Required reliability, α ∈ [0,1) Objective Detect the event: missing tags ≥T Event detection probability ≥α Minimize detection time

Limitations of Prior Art Assume there are no unexpected tags ICDCS 2008: How to monitor for missing RFID tags; Tan, Sheng, and Li MobiHoc 2010: Identifying the missing tags in a large RFID system; Li, Sheng, and Lin SECON 2011: Fast identification of the missing tags in a large RFID system; Zhang, Liu, and Sun IEEE ToC 2013: Completely pinpointing the missing RFID tags in a time-efficient way; Liu et. al. However, in reality, there are unexpected tags Airline baggage Multi-tenant warehouse

Naïve Solutions Identification protocol Estimation protocol Slow: fastest RFID identification protocol is 14.3 times slower compared to our scheme SIGMETRICS 2013: Probabilistic Optimal Tree Hopping for RFID Identification; Shahzad and Liu Estimation protocol Inaccurate: if new tags join, can not tell whether some tags went missing

Communication Protocol Overview 1 2 3 4 5 6 7 1 C 1 1 C 1 1 3 2 6 4 7 4 Frame size 𝑓=7 Seed 𝑅 Faster to distinguish between empty and non-empty slots Singleton and collision » non-empty At the end of frame, reader gets a sequence of 0s and 1s 011C011 becomes 0111011

RUN: Missing Tags Detection 1 1 4 11 5 6 Expected tags to be monitored 1 2 3 4 5 6 7 8 9 10 11 Frame size 𝑓=11 Seed 𝑅 1 Pre-computed frame 1 Executed frame Unexpected false positive Unexpected tag detected Missing tag event detected Unexpected tags 8 4 10 10

RUN: Handling Unexpected FPs Repeat frame 𝑛 times 1 1 1 1 1 1

RUN: Parameter Selection Three unknown parameters Frame size 𝑓 Number of frames 𝑛 Persistence probability 𝑝 Two equations 𝑓= 𝑝(𝑇−|𝐸|−|𝑈|) ln {1−𝑞 }− ln {𝑝} where 𝑞= (1−α) 1/𝑛𝑇 obtained using the expression of false positive probability |𝐸| : number of expected tags |𝑈| : number of unexpected tags 𝑝=(1−𝑞) (1−α) 𝑞 𝑛𝑇(𝑞−1) Obtained using the required reliability condition Need the number of unexpected tags |𝑈|

RUN: Estimating Unexpected Tags 1 1 4 11 5 6 1 2 3 4 5 6 7 8 9 10 11 8 4 10 10 Number of total slots in frame 𝑓 Number of grey slots in frame 𝑘 Number of white slots that become green slots: 𝑁 01 𝑈 =− 𝑓 𝑝 ln 1− 𝑁 01 𝑓−𝑘

RUN: Experimental Evaluation Implemented 4 protocols in addition to RUN TRP (ICDCS, 2008) IIP (MobiHoc, 2010) MTI (SECON, 2011) SFMTI (IEEE ToC, 2013) TH (SIGMETRICS, 2013)

Actual Reliability vs. Missing Tags Number of expected tags = 1,000 Number of unexpected tags = 10,000

Actual Reliability vs. Unexpected Tags Number of expected tags = 1,000 Number of missing tags = 200

Effect of Threshold T Number of expected tags = 1,000 Number of unexpected tags = 10,000 Threshold = 200 Required reliability = 0.99

RUN vs. RFID Identification Compared RUN with TH (SIGMETRICS 2013) RUN is 14.3 times faster than TH for Number of expected tags = 1,000 Number of unexpected tags = 10,000 Threshold = 200 Required reliability = 0.99 TH is faster than RUN when Required reliability > 0.99999, OR Threshold < 0.001 tags, which is impossible

Conclusion Proposed a protocol to reliably detect missing tags in presence of unexpected tags Reliable Fast C1G2 compliant Handles multiple readers

Questions?