Identifying the Missing Tags in a Large RFID System Tao Li (University of Florida, US) Shigang Chen (University of Florida, US) Yibei Ling (Telcordia Technologies,

Slides:



Advertisements
Similar presentations
Victor K. Y. Wu Department of Electrical Engineering
Advertisements

Presented by Zhu Jinshun Season: Shelving Interference and Joint Identification in Large- scale RFID Systems.
Min Song 1, Yanxiao Zhao 1, Jun Wang 1, E. K. Park 2 1 Old Dominion University, USA 2 University of Missouri at Kansas City, USA IEEE ICC 2009 A High Throughput.
An Application-Specific Protocol Architecture for Wireless Microsensor Networks Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan (MIT)
Fast and Reliable Estimation Schemes in RFID Systems Murali Kodialam and Thyaga Nandagopal Bell Labs, Lucent Technologies.
Every Bit Counts – Fast and Scalable RFID Estimation Muhammad Shahzad and Alex X. Liu Dept. of Computer Science and Engineering Michigan State University.
Dynamic Tuning of the IEEE Protocol to Achieve a Theoretical Throughput Limit Frederico Calì, Marco Conti, and Enrico Gregori IEEE/ACM TRANSACTIONS.
Adaptive Splitting Protocols for RFID Tag Collision Arbitration Jihoon Myung and Wonjun Lee ACM Mobihoc 06.
RFID Security and Privacy Part 2: security example.
Performance Evaluation of IPv6 Packet Classification with Caching Author: Kai-Yuan Ho, Yaw-Chung Chen Publisher: ChinaCom 2008 Presenter: Chen-Yu Chaug.
Self Organization and Energy Efficient TDMA MAC Protocol by Wake Up For Wireless Sensor Networks Zhihui Chen; Ashfaq Khokhar ECE/CS Dept., University of.
RFID Cardinality Estimation with Blocker Tags
1 Cryptographically Strong Pseudorandom Functions and Their Applications 陳昱升 碩士學位論文 中興大學 資訊科學系 2006 年 6 月.
David Molnar, David Wagner - Authors Eric McCambridge - Presenter.
Radio Frequency Identification Inventory Tracking and Status Monitoring of Blood Units Team 10 Mark Green Melissa Kronenberger Nadine Tribur Aaron Schlanser.
Fast and Reliable Estimation Schemes in RFID Systems Murali Kodialam and Thyaga Nandagopal Bell Labs, Lucent Technologies Presented by : Joseph Gunawan.
1 Cardinality Estimation for Large-scale RFID Systems Chen Qian, Hoilun Ngan, and Yunhao Liu Hong Kong University of Science and Technology.
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 8.
多媒體網路安全實驗室 An Efficient RFID Authentication Protocol for Low-cost Tags Date : Reporter : Hong Ji Wei Authors : Yanfei Liu From : 2008 IEEE/IFIP.
Multimedia & Networking Lab
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Distributed Detection of Node Replication Attacks in Sensor Networks Bryan Parno, Adrian perrig, Virgil Gligor IEEE Symposium on Security and Privacy 2005.
Probabilistic Optimal Tree Hopping for RFID Identification Muhammad Shahzad Alex X. Liu Dept. of Computer Science and Engineering Michigan State University.
Maximum Network Lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Cardei, M.; Jie Wu; Mingming Lu; Pervaiz, M.O.; Wireless And Mobile.
Energy-Conserving Access Protocols for Identification Networks By Imrich Chlamtac, Chiara Petrioli, and Jason Redi IEEE/ACM TRANSACTIONS ON NETWORKING,
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel.
1 Virtual Patrol : A New Power Conservation Design for Surveillance Using Sensor Networks Prasant Mohapatra, Chao Gui Computer Science Dept. Univ. California,
An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks Seema Bandyopadhyay and Edward J. Coyle Presented by Yu Wang.
Collision-free Time Slot Reuse in Multi-hop Wireless Sensor Networks
Inventory Management Chapter 12 Independent Demand A B(4) C(2) D(2)E(1) D(3) F(2) Dependent Demand Independent demand is uncertain. Dependent demand.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Qingchun Ren and Qilian Liang Department of Electrical Engineering, University of Texas at.
TOPOLOGY MANAGEMENT IN COGMESH: A CLUSTER-BASED COGNITIVE RADIO MESH NETWORK Tao Chen; Honggang Zhang; Maggio, G.M.; Chlamtac, I.; Communications, 2007.
1 Service Charge and Energy- Aware Vertical Handoff in Integrated IEEE e/ Networks Youngkyu Choi and Sunghyun Choi School of Electrical Engineering.
RFID E STIMATION P ROBLEM Lee, Gunhee S URVEY. R EFERENCES Energy Efficient Algorithms for the RFID Estimation Problem –Tao Li, Samuel Wu, Shigang Chen.
X. Li, W. LiuICC May 11, 2003A Joint Layer Design Smart Contention Resolution Random Access Wireless Networks With Unknown Multiple Users: A Joint.
Chih-Min Chao and Yao-Zong Wang Department of Computer Science and Engineering National Taiwan Ocean University, Taiwan IEEE WCNC 2010 A Multiple Rendezvous.
1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Dynamic Host Configuration Protocol (DHCP)
Self Organization and Energy Efficient TDMA MAC Protocol by Wake Up for Wireless Sensor Networks Zhihui Chen and Ashfaq Khokhar ECE Department, University.
Hybrid Indirect Transmissions (HIT) for Data Gathering in Wireless Micro Sensor Networks with Biomedical Applications Jack Culpepper(NASA), Lan Dung, Melody.
Fairness Matters: Identification of Active RFID Tags with Statistically Guaranteed Fairness Michigan State University Muhammad Shahzad Alex X. Liu North.
Hashtables. An Abstract data type that supports the following operations: –Insert –Find –Remove Search trees can be used for the same operations but require.
Muhammad Shahzad Alex X. Liu Dept. of Computer Science and Engineering
C. Savarese, J. Beutel, J. Rabaey; UC BerkeleyICASSP Locationing in Distributed Ad-hoc Wireless Sensor Networks Chris Savarese, Jan Beutel, Jan Rabaey.
SEA-MAC: A Simple Energy Aware MAC Protocol for Wireless Sensor Networks for Environmental Monitoring Applications By: Miguel A. Erazo and Yi Qian International.
Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China.
Po-Yu Chen, Zan-Feng Kao, Wen-Tsuen Chen, Chi-Han Lin Department of Computer Science National Tsing Hua University IEEE ICPP 2011 A Distributed Flow-Based.
Every Bit Counts – Fast and Scalable RFID Estimation
HARD: Hardware-Assisted lockset- based Race Detection P.Zhou, R.Teodorescu, Y.Zhou. HPCA’07 Shimin Chen LBA Reading Group Presentation.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Video Streaming Transmission Over Multi-channel Multi-path Wireless Mesh Networks Speaker : 吳靖緯 MA0G WiCOM '08. 4th International.
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
Wireless Cache Invalidation Schemes with Link Adaptation and Downlink Traffic Presented by Ying Jin.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
A Bit-Map-Assisted Energy- Efficient MAC Scheme for Wireless Sensor Networks Jing Li and Georgios Y. Lazarou Department of Electrical and Computer Engineering,
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
2005/8/2NTU NSLAB1 Self Organization and Energy Efficient TDMA MAC Protocol by Wake Up for Wireless Sensor Networks Zhihui Chen and Ashfag Khokhar ECE/CS.
Deploying Sensors for Maximum Coverage in Sensor Network Ruay-Shiung Chang Shuo-Hung Wang National Dong Hwa University IEEE International Wireless Communications.
COE-541 LAN / MAN Simulation & Performance Evaluation of CSMA/CA
Shadow Detection in Remotely Sensed Images Based on Self-Adaptive Feature Selection Jiahang Liu, Tao Fang, and Deren Li IEEE TRANSACTIONS ON GEOSCIENCE.
Sensing multiple passive tags simultaneously
Ming Zhang, Vishal Khanapure, Shigang Chen, Xuelian Xiao
Chapter 7 – Aloha-Based Protocol
Demand Paging Reference Reference on UNIX memory management
Make Random Access Contentions Transparent by Orthogonal Complementary Codes in Wireless Communications Xiaohua (Edward) Li Department of Electrical and.
Net301 lecture9 11/5/2015 Lect 9 NET301.
Demand Paging Reference Reference on UNIX memory management
Advanced Associative Structures
Maximizing MAC Throughputs by Dynamic RTS-CTS Threshold
IOT Technologies: Radio Frequency Identification (RFID)
Presentation transcript:

Identifying the Missing Tags in a Large RFID System Tao Li (University of Florida, US) Shigang Chen (University of Florida, US) Yibei Ling (Telcordia Technologies, US)

Identifying the Missing Tags in a Large RFID System2/41 Outline Introduction System Model Missing-tag Detection Protocols Simulation Results Conclusion

Identifying the Missing Tags in a Large RFID System3/41 Introduction RFID (radio-frequency identification) Used in: –Warehouse management –Object tracking –Inventory control –Australia Goats

Identifying the Missing Tags in a Large RFID System4/41 Introduction Other topics: –Tag-collection problem –Tag-estimation problem This paper studies missing-tag problem. Few research papers has investigated this problem before.

Identifying the Missing Tags in a Large RFID System5/41 Introduction The most important thing is to minimize the detection time. Two guidelines to achieve time efficiency: –Reduce radio collision –Report presence by each transmitting a bit instead of a whole tag duel.

Identifying the Missing Tags in a Large RFID System6/41 Outline Introduction System Model Missing-tag Detection Protocols Simulation Results Related Work Conclusion

Identifying the Missing Tags in a Large RFID System7/41 Problem and Assumption A large RFID system of N tags. Each tag carries a unique ID. Each tag can perform certain computations and communicating with the RFID reader wirelessly. RFID reader has access to database that stores the ID of the tags.

Identifying the Missing Tags in a Large RFID System8/41 Time Slots Empty slot, singleton slot, collision slot. t tag for tag slot, t l for long-response slot, t s for short-response slot. t s < t l < t tag. t s = 0.4ms, t l = 0.8ms, t tag = 2.4ms

Identifying the Missing Tags in a Large RFID System9/41 Outline Introduction System Model Missing-tag Detection Protocols Simulation Results Conclusion

Identifying the Missing Tags in a Large RFID System10/41 Baseline Protocol Because RFID reader has access to database, no need to read directly from tags. For each tag: –Broadcast the tag ID: t tag –Wait to receive short response: t s Total executing time: N(t tag +t s )

Identifying the Missing Tags in a Large RFID System11/41 Two-Phase Protocol (TPP) Reduce the number of tag IDs transmit. Two phase: –Frame phase –Polling phase

Identifying the Missing Tags in a Large RFID System12/41 Frame Phase of TPP RFID reader transmit –r is a random number, f is the frame size –pseudo-randomly mapped H(id, r) -> [0, f-1] Frame 0 to f-1 ID H(id, r)

Identifying the Missing Tags in a Large RFID System13/41 Frame Phase of TPP Hash function H(id, r): –String of 200 random bits stored in the tag –Return a certain number of bits after the rth bit in the ring. –If necessary, the number of bits can be larger than 200.

Identifying the Missing Tags in a Large RFID System14/41 Polling Phase of TPP Perform the baseline protocol on the tags that are mapped to the collision slots in the frame. Frame 0 to f-1 ID 2 ID 4 ID 1 ID 3

Identifying the Missing Tags in a Large RFID System15/41 Time Efficiency of TPP Set the value of the protocol parameter f. The executing time of TPP is T 1. The number of tags mapped to the collision slots is N 1.

Identifying the Missing Tags in a Large RFID System16/41 Time Efficiency of TPP

Identifying the Missing Tags in a Large RFID System17/41 Time Efficiency of TPP When N = 50,000, the optimal frame size is f = 104,028, and the minimum execution time of TPP is seconds.

Identifying the Missing Tags in a Large RFID System18/41 Two-Phase Protocol with Tag Removal (TPP/TR) In TPP, two tags mapped to a collision slot, we have to broadcast both tags. The information in the collision slot is totally unused. Remove tags from collision slot to make it a singleton slot.

Identifying the Missing Tags in a Large RFID System19/41 Two-Phase Protocol with Tag Removal (TPP/TR) Tow Phase: –Polling Phase (with tag removal) –Frame Phase For each k-collision slot, randomly removes k-1 tags to turn the slot a singleton.

Identifying the Missing Tags in a Large RFID System20/41 Tag Removal ID 3 is removed, it will be broadcast in polling phase. ID 4 will be checked in frame phase. Frame 0 to f-1 ID 2 ID 4 ID 1 ID 3

Identifying the Missing Tags in a Large RFID System21/41 Time Efficiency of TPP/TR Set the value of the protocol parameter f. The executing time of TPP/TR is T 2. The number of removal tags is N 2.

Identifying the Missing Tags in a Large RFID System22/41 Time Efficiency of TPP/TR

Identifying the Missing Tags in a Large RFID System23/41 Time Efficiency of TPP/TR When N = 50,000, the optimal frame size is f = 75,479.

Identifying the Missing Tags in a Large RFID System24/41 Three-Phase Protocol with Collision Sensitive Tag Removal (TPP/CSTR) When f is reasonably large, most collision slot are 2-collision slots. Long response is needed. The situation of the two tags response: –Empty: both are missing –Singleton: one is missing, check later –Collision: neither is missing.

Identifying the Missing Tags in a Large RFID System25/41 Three-Phase Protocol with Collision Sensitive Tag Removal (TPP/CSTR) Three Phase: –Polling Phase 1 (with tag removal) –Frame Phase –Polling Phase 2 For each k-collision slot with k>2, randomly removes k-2 tags to turn the slot 2-collision.

Identifying the Missing Tags in a Large RFID System26/41 Tag Removal ID 3 is removed, it will be broadcast in polling phase 1. ID 4 and ID 5 will be checked in frame phase and polling phase 2. Frame 0 to f-1 ID 2 ID 4 ID 1 ID 3 ID 5

Identifying the Missing Tags in a Large RFID System27/41 Time Efficiency of TPP/CSTR Set the value of the protocol parameter f. The executing time of TPP/TR is T 3. The number of removal tags is N 3. The number of tags broadcast in polling phase 2.

Identifying the Missing Tags in a Large RFID System28/41 Time Efficiency of TPP/CSTR

Identifying the Missing Tags in a Large RFID System29/41 Time Efficiency of TPP/CSTR When N = 50,000, the optimal frame size is f =

Identifying the Missing Tags in a Large RFID System30/41 Iterative ID-free protocol (IIP) Transmitting tag IDs is an expensive operation. IIP remove all the polling phase, it iteratively performs the frame phase.

Identifying the Missing Tags in a Large RFID System31/41 Frame Phase in IIP Transmitting a pre-frame vector: –‘0’ for empty and singleton, ‘1’ for collision –A tag in a collision slot decide with 50% probability to not participate in the current frame. –Using H’(id,r).

Identifying the Missing Tags in a Large RFID System32/41 Frame Phase in IIP Transmitting a post-frame vector: –‘0’ for empty and collision, ‘1’ for singleton –A tag in a singleton slot will not participate in the further execution. Pre-frame or post-frame will be divide into segments of 96 bits (length of ID), and transmit in t tag.

Identifying the Missing Tags in a Large RFID System33/41 Time Efficiency of IIP Set the value of the protocol parameter f. The executing time for a frame size of f of IIP is T 4. The expected number of tags whose presence will be verified by the frame is N’. N* tags not confirm.

Identifying the Missing Tags in a Large RFID System34/41 Time Efficiency of IIP

Identifying the Missing Tags in a Large RFID System35/41 Time Efficiency of IIP The average time for verifying the presence of one tag is

Identifying the Missing Tags in a Large RFID System36/41 Time Efficiency of IIP The optimal value the load factor is

Identifying the Missing Tags in a Large RFID System37/41 Outline Introduction System Model Missing-tag Detection Protocols Simulation Results Conclusion

Identifying the Missing Tags in a Large RFID System38/41 Simulation Results

Identifying the Missing Tags in a Large RFID System39/41 Simulation Results

Identifying the Missing Tags in a Large RFID System40/41 Outline Introduction System Model Missing-tag Detection Protocols Simulation Results Conclusion

Identifying the Missing Tags in a Large RFID System41/41 Conclusion Monitoring the set of tags in a large RFID system and identifying the missing ones. Proposing five missing-tag detection protocols with increasing time efficiencies.