Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1161089.1161126acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article

Fast and reliable estimation schemes in RFID systems

Published: 29 September 2006 Publication History
  • Get Citation Alerts
  • Abstract

    RFID tags are being used in many diverse applications in increasingly large numbers. These capabilities of these tags span from very dumb passive tags to smart active tags, with the cost of these tags correspondingly ranging from a few pennies to many dollars. One of the common problems that arise in any RFID deployment is the problem of quick estimation of the number of tags in the field up to a desired level of accuracy. Prior work in this area has focused on the identification of tags, which needs more time, and is unsuitable for many situations, especially where the tag set is dense. We take a different, more practical approach, and provide very fast and reliable estimation mechanisms. In particular, we analyze our estimation schemes and show that the time needed to estimate the number of tags in the system for a given accuracy is much better than schemes presented in related work. We show that one can estimate the cardinality of tag-sets of any size in near-constant time, for a given accuracy of estimation.

    References

    [1]
    "RFID:Wikipedia entry", http://en.wikipedia.org/wiki/RFID 2006.
    [2]
    K. Finkenzeller, "RFID handbook: Radio frequency identification fundamentals and applications", John Wiley & Sons 2000.
    [3]
    EPCglobal, "EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz .960 MHz Version 1.0.9 ", 2005.
    [4]
    ISO/IEC 15963, "Information technology. Radio frequency identification for item management. Unique identification for RF tags", 2004.
    [5]
    L. Burdet, "RFID multiple access methods", Technical Report ETH Zurich, 2004.
    [6]
    R. Want, "An introduction to RFID technology", IEEE Pervasive Computing Jan. 2006.
    [7]
    T. Hassan and S. Chatterjee, "A taxonomy for RFID", Hawaii International Conference on System Sciences Kauai, HI, Jan 2006.
    [8]
    RFID Journal, http://www.rfidjournal.com 2006.
    [9]
    Philips Semiconductors, "I-CODE Smart Label RFID Tags", http://www.semiconductors.philips.com/acrobat download/other/identification/SL092030.pdf
    [10]
    Feller, W., "An Introduction to Probability Theory and Its Applications", Vol 1 John Wiley, 1968.
    [11]
    K. Whang, B. Vander-Zanden, and H. Taylor, "A Linear Time Probabilistic Counting Algorithm for Database Applications", ACM Transactions on Database Systems June, 1990.
    [12]
    Rao, C. R., "Linear Statistical Inference and its Applications",
    [13]
    M. Kodialam and T. Nandagopal, "Fast Estimation Schemes in RFID Systems", Bell Labs Technical Report March 2006. Available at http://www.bell-labs.com/user/thyaga.
    [14]
    K. S. Leong, M. L. Ng and P. H. Cole, "Synchronization of RFID readers for dense RFID reader environments", International Symposium on Applications and Internet Workshops Phoenix, AZ. Jan 2006.
    [15]
    S. Chen and V. Thomas, "Optimization of inductive RFID technology", IEEE International Symposium on Electronics and Environment 2001.
    [16]
    D. Engels and S. Sarma, "The reader collision problem", IEEE Systems, Man and Cybernetics 2002.
    [17]
    J. Waldrop, D. Engels and S. Sarma, "Colorwave: An anticollision algorithm for the reader collision problem", IEEE ICC 2002.
    [18]
    H. Vogt, "Efficient Object Identification with Passive RFID Tags", Lecture Notes in Computer Science Springer-Verlag, vol. 2414, 2002.
    [19]
    P. Hernandez, J. D. Sandoval, F. Puente and F. Perez, "Mathematical Model for a Multi-read Anti-collision Protocol", IEEE Pacific Rim Conference on Communications, Computers and Signal Processing 2001.
    [20]
    B. Zhen, M. Kobayashi and M. Shimizu, "To read transmitter-only RFID tags with confidence", IEEE PIMRC '04 Barcelona, Spain. Sept 2004.
    [21]
    H. Choi, J. R. Cha and J. H. Kim, "Fastwireless anti-collision algorithm in ubiquitous ID system", IEEE VTC '04 Los Angeles, CA. Sep 2004.
    [22]
    J. R. Cha and J. H. Kim, "Novel anti-collision algorithms for fast object identification in RFID system", IEEE International Conference on Parallel and Distributed Systems 2005.
    [23]
    C. Floerkemeier and M. Wille, "Comparison of Transmission Schemes for Framed ALOHA based RFID Protocols", Workshop on RFID and Extended Network Deployment of Technologies and Applications Phoenix, AZ. Jan 2006.
    [24]
    C. Floerkemeier, "Transmission control scheme for fast RFID object identification", IEEE PerCom Workshop on Pervasive Wireless Networking Mar 2006.
    [25]
    F. C. Schoute, "Dynamic framed length ALOHA", IEEE Transactions on Communications vol.31(4), Apr 1983.
    [26]
    A. Micic, A. Nayak, D. Simplot-Ryl and I. Stojmenovic, "A hybrid randomized protocol for RFID tag identification", IEEE International Workshop on Next Generation Wireless Networks Goa, India. 2005.
    [27]
    I. Cidon and M. Sidi, "Conflict multiplicity estimation and batch resolution algorithms", IEEE Transactions on Information Theory vol. 34(1), Jan 1988.
    [28]
    B. Zhen, M. Kobayashi and M. Shimizu, "Framed ALOHA for multiple RFID objects identification", IEICE Transactions on Communications vol. E88-B(3), Mar 2005.
    [29]
    P. F. Greenberg and R. E. Ladner, "Estimating the multiplicities of conflict to speed their resolution in multiple access channels", J. ACM vol. 34(2), Apr. 1987.
    [30]
    P. Popovski, F. H. P. Fitzek, and R. Prasad, "Batch Conflict Resolution Algorithm with Progressively Accurate Multiplicity Estimation", ACM DIALM-POMC Workshop Philadephia, PA. Oct. 2004.
    [31]
    K. Cho, H. Shin and J. Lee, "Performance analysis of HIPERLAN channel access control protocol", IEICE Transactions on Communications vol. E85-B(10), Oct 2002.
    [32]
    Y. C. Tay, K. Jamieson and H. Balakrishnan, "Collision-minimizing CSMA and its applications to wireless sensor networks", IEEE Journal on Selected Areas in Communications vol.22(6), Aug 2004.
    [33]
    J. Wieselthier, A. Ephremides and L. Michaels, "An exact analysis and performance evaluation of framed ALOHA with capture", IEEE Transactions on Communications vol.(37(2), Feb 1989.
    [34]
    S. Lee, S. Joo and C. Lee, "An enhanced dynamic framed slotted ALOHA algorithm for RFID tag identification", IEEE MobiQuitous 2005.
    [35]
    F. Cali, M. Conti and E. Gregori, "Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit", IEEE/ACM Transactions on Networking vol. 8(6), Dec 2000.
    [36]
    K. Jamieson, H. Balakrishnan, and Y. C. Tay, "Sift: a MAC Protocol for Event-Driven Wireless Sensor Networks", Proceedings of the Third European Workshop on Wireless Sensor Networks, Feb 2006.
    [37]
    M. Nanjundaiah and V. Chaudhary, "Improvement to the anticollision protocol specification for 900 MHz class 0 RFID tag", International Conference on Advanced Information Networking and Applications 2005.
    [38]
    F. Zhou, C. Chen, D. Jin, C. Huang and H. Min, "Evaluating and optimizing power consumption of anti-collision protocols for applications in RFID systems", ACM ISLPED '04 Aug 2004.
    [39]
    D. Hush and C. Wood, "Analysis of tree algorithms for RFID arbitration", IEEE Symposium on Information Theory Cambridge, MA. Aug 1998.
    [40]
    L. Bolotnyy and G. Robins, "Randomized pseudo-random function tree walking algorithm for secure radio-frequency identification", IEEE Workshop on Automatic Identification Advanced Technologies Oct 2005.
    [41]
    J. Kim, W. Lee, J. Yu, E. KimandC. Lee, "Effect of localized optimal clustering for reader anti-collision in RFID networks: fairness aspects to the readers", IEEE ICCCN 2005.
    [42]
    I. Chlamtac, C. Petrioli and J. Redi, "Energy conserving access protocols for identification networks", IEEE/ACM Transaction on Networking vol. 7(1), Feb 1999.
    [43]
    C. Law, K. Lee, and K. Siu, "Efficient Memoryless Protocol for Tag Identification", ACM DIAL-M Workshop Aug 2000.
    [44]
    J. Myung and W. Lee, "An Adaptive Memoryless Tag Anti-Collision Protocol for RFID Networks", IEEE ICC 2005.
    [45]
    A. Krohn, M. Beigl and S. Wendhack, "SDJS: Efficient Statistics in Wireless Networks", IEEE ICNP Berlin, Germany, Oct 2004.

    Cited By

    View all
    • (2023)Revisiting Cardinality Estimation in COTS RFID SystemsProceedings of the 29th Annual International Conference on Mobile Computing and Networking10.1145/3570361.3613295(1-14)Online publication date: 2-Oct-2023
    • (2023)Network Size Estimation for Direct-to-Satellite IoTIEEE Internet of Things Journal10.1109/JIOT.2022.322467810:7(6111-6125)Online publication date: 1-Apr-2023
    • (2023)Inventory Big Data Management for Internet of Things based on Privacy Preserving2023 IEEE 9th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS)10.1109/BigDataSecurity-HPSC-IDS58521.2023.00024(78-83)Online publication date: May-2023
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    MobiCom '06: Proceedings of the 12th annual international conference on Mobile computing and networking
    September 2006
    428 pages
    ISBN:1595932860
    DOI:10.1145/1161089
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 29 September 2006

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. ALOHA
    2. RFID
    3. algorithms
    4. estimation
    5. tags

    Qualifiers

    • Article

    Conference

    MobiCom06
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 440 of 2,972 submissions, 15%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)23
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 29 Jul 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Revisiting Cardinality Estimation in COTS RFID SystemsProceedings of the 29th Annual International Conference on Mobile Computing and Networking10.1145/3570361.3613295(1-14)Online publication date: 2-Oct-2023
    • (2023)Network Size Estimation for Direct-to-Satellite IoTIEEE Internet of Things Journal10.1109/JIOT.2022.322467810:7(6111-6125)Online publication date: 1-Apr-2023
    • (2023)Inventory Big Data Management for Internet of Things based on Privacy Preserving2023 IEEE 9th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS)10.1109/BigDataSecurity-HPSC-IDS58521.2023.00024(78-83)Online publication date: May-2023
    • (2023)Fast Counterfeit RFID Tags Detection With Slot ConstraintsIEEE Access10.1109/ACCESS.2023.326957111(42290-42301)Online publication date: 2023
    • (2022)When Tags ‘Read’ Each Other: Enabling Low-Cost and Convenient Tag Mutual IdentificationACM Transactions on Sensor Networks10.1145/349454118:2(1-22)Online publication date: 23-Mar-2022
    • (2022)Capture-Aware Identification of Mobile RFID Tags With Unreliable ChannelsIEEE Transactions on Mobile Computing10.1109/TMC.2020.302407621:4(1182-1195)Online publication date: 1-Apr-2022
    • (2022)DAP: Efficient Detection Against Probabilistic Cloning Attacks in Anonymous RFID SystemsIEEE Transactions on Industrial Informatics10.1109/TII.2021.307292918:1(345-355)Online publication date: Jan-2022
    • (2022)A reliable cardinality estimation for missing tags over a noisy channelComputer Communications10.1016/j.comcom.2022.03.007188(125-132)Online publication date: Apr-2022
    • (2021)Reader–Tag Commands via Modulation Cutoff Intervals in RFID SystemsFuture Internet10.3390/fi1309023513:9(235)Online publication date: 16-Sep-2021
    • (2021)Nowhere to Hide: Efficiently Identifying Probabilistic Cloning Attacks in Large-Scale RFID SystemsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2020.302378516(714-727)Online publication date: 2021
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media