Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

R3: Reliable Over-the-Air Reprogramming on Computational RFIDs

Published: 20 September 2017 Publication History

Abstract

Computational Radio Frequency Identification (CRFID) tags operate solely on harvested energy and have emerged as viable platforms for a variety of ubiquitous sensing and computation applications. Due to their battery-less nature, these tags can be permanently deployed in hard-to-reach places where the possibility of tag access is eliminated. In such scenarios, maintaining and upgrading the tag’s firmware becomes infeasible because programming tools, including wired interface and PC-based software, are required to erase, modify, or reprogram the microcontroller unit’s memory. Such limitations necessitate the demand for an over-the-air (OTA) scheme, which can wirelessly reprogram or upgrade the firmware in CRFID tags.
In this article, we present R3—a reliable OTA reprogramming scheme that is compliant with EPC protocol and requires no hardware upgrade to RFID reader or CRFID tag. We demonstrate our scheme on three platforms, which include both software-defined as well as chip-based CRFID tags, that is, WISP5.1 and Optimized WISP (Opt-WISP), and Spider tag, respectively. The selection also includes both the FLASH- and FRAM-based microcontrollers. We extensively evaluate our scheme in terms of several metrics, including overall system delay, time and energy overhead, and success rate in line with interrogation range. We foresee our endeavor to offer the viability of OTA reprogramming and firmware upgrade for CRFID tokens under practical situations.

References

[1]
ARMmbed. 2015. Firmware over the air FOTA updates. (March 2015). Retrieved March 21, 2017. Retrieved from https://developer.mbed.org/teams/Bluetooth-Low-Energy/wiki/Firmware-Over-the-Air-FOTA-Updates.
[2]
C. Bauer-Reich, Kay Chen Tan, F. Haring, N. Schneck, A. Wick, L. Berge, Jesse Hoey, Rudolf Sailer, and C. Ulven. 2014. An investigation of the viability of UHF RFID for subsurface soil sensors. In Proceedings of the IEEE International Conference on Electro/Information Technology (EIT’14). IEEE, 577--580.
[3]
Michael Buettner, Benjamin Greenstein, and David Wetherall. 2011. Dewdrop: An energy-aware runtime for computational RFID. In Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI’11).
[4]
Michael Buettner, Richa Prasad, Matthai Philipose, and David Wetherall. 2009. Recognizing daily activities with RFID-based sensors. In Proceedings of the 11th International Conference on Ubiquitous Computing. ACM, 51--60.
[5]
Michael Buettner and David Wetherall. 2011. A software radio-based UHF RFID reader for PHY/MAC experimentation. In Proceedings of the IEEE International Conference on RFID (RFID’11). IEEE, 134--141.
[6]
Rohit Chaudhri, Jonathan Lester, and Gaetano Borriello. 2008. An RFID based system for monitoring free weight exercises. In Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems. ACM, 431--432.
[7]
Adam Chlipala, Jonathan Hui, and Gilman Tolle. 2004. Deluge: Data dissemination for network reprogramming at scale. University of California, Berkeley, Technical Report (2004).
[8]
Crossbow Technology, Inc. 2003. Mote In-network programming user reference (Jan. 2003).
[9]
Artem Dementyev and Joshua R. Smith. 2013. A wearable UHF RFID-based EEG system. In Proceedings of the IEEE International Conference onRadio Frequency Identificaion (RFID’13). IEEE, 1--7.
[10]
Robert F. Dickerson, Eugenia I. Gorlin, and John A. Stankovic. 2011. Empath: A continuous remote emotional health monitoring system for depressive illness. In Proceedings of the 2nd Conference on Wireless Health. ACM, 5.
[11]
Wan Du, Zhenjiang Li, Jansen Christian Liando, and Mo Li. 2016. From rateless to distanceless: Enabling sparse sensor network deployment in large areas. IEEE/ACM Transactions on Networking 24, 4 (2016), 2498--2511.
[12]
Wan Du, Jansen Christian Liando, Huanle Zhang, and Mo Li. 2015. When pipelines meet fountain: Fast data dissemination in wireless sensor networks. In Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems. ACM, 365--378.
[13]
EPCglobal. 2015. EPC Radio-Frequency Identity Protocols, Generation-2 UHF RFID, Specification for RFID Air Interface Protocol for Communications at 860MHz-960MHz, Version 2.0.1 Ratified. (April 2015). Retrieved May 29, 2016 from http://www.gs1.org/sites/default/files/docs/epc/Gen2_Protocol_Standard.pdf.
[14]
Farsens. 2015. ANDY100 evaluation board with integrated start-up circuit. (Sept. 2015). Retrieved May 29, 2016 from http://www.farsens.com/media/document/26/ds-spider-h254-v01.pdf.
[15]
Federico Gasco, Paolo Feraboli, Jeff Braun, Joshua Smith, Patrick Stickler, and Luciano DeOto. 2011. Wireless strain measurement for structural testing and health monitoring of carbon fiber composites. Comp. Part A: Appl. Sci. Manufactur. 42, 9 (2011), 1263--1274.
[16]
Wei Gong, Kebin Liu, Xin Miao, and Haoxiang Liu. 2014. Arbitrarily accurate approximation scheme for large-scale RFID cardinality estimation. In Proceedings of IEEE INFOCOM. IEEE, 477--485.
[17]
Jeremy Gummeson, Shane S. Clark, Kevin Fu, and Deepak Ganesan. 2010. On the limits of effective hybrid micro-energy harvesting on mobile CRFID sensors. In Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services. ACM, 195--208.
[18]
Jeremy Gummeson, Pengyu Zhang, and Deepak Ganesan. 2012. Flit: A bulk transmission protocol for RFID-scale sensors. In Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services. ACM, 71--84.
[19]
Daniel Halperin, Thomas S. Heydt-Benjamin, Benjamin Ransford, Shane S. Clark, Benessa Defend, Will Morgan, Kevin Fu, Tadayoshi Kohno, and William H. Maisel. 2008. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In Proceedings of the IEEE Symposium on Security and Privacy (S&P’’’08). IEEE, 129--142.
[20]
Shibo He, Jiming Chen, Fachang Jiang, David K. Y. Yau, Guoliang Xing, and Youxian Sun. 2013. Energy provisioning in wireless rechargeable sensor networks. IEEE Trans. Mobile Comput. 12, 10 (2013), 1931--1942.
[21]
Enamul Hoque, Robert F. Dickerson, and John A. Stankovic. 2010. Monitoring body positions and movements during sleep using WISPs. In Proceedings of the 2010 Conference on Wireless Health. ACM, 44--53.
[22]
Impinj. 2015. Octane SDK. (Oct. 2015). Retrieved May 29, 2016 from https://support.impinj.com/hc/en-us/articles/202755268-Octane-SDK.
[23]
Shan Jiang and Stavros V. Georgakopoulos. 2011. Optimum wireless power transmission through reinforced concrete structure. In Proceedings of the IEEE International Conference on Radio Frequency Identification (RFID’11). IEEE, 50--56.
[24]
Bryce Kellogg, Aaron Parks, Shyamnath Gollakota, Joshua R. Smith, and David Wetherall. 2015. Wi-Fi backscatter: Internet connectivity for RF-powered devices. ACM SIGCOMM Comput. Commun. Rev. 44, 4 (2015), 607--618.
[25]
Libelium. 2016. Over the Air Programming (OTAP). (Jan. 2016). Retrieved May 29, 2016 from http://www.libelium.com/products/waspmote/ota/.
[26]
Vincent Liu, Aaron Parks, Vamsi Talla, Shyamnath Gollakota, David Wetherall, and Joshua R. Smith. 2013. Ambient backscatter: Wireless communication out of thin air. ACM SIGCOMM Comput. Commun. Rev. 43, 4 (2013), 39--50.
[27]
Brandon Lucia and Benjamin Ransford. 2015. A simpler, safer programming and execution model for intermittent systems. In ACM SIGPLAN Notices, Vol. 50. ACM, 575--585.
[28]
Pedro José Marrón, Andreas Lachenmann, Daniel Minder, Matthias Gauger, Olga Saukh, and Kurt Rothermel. 2005. Management and configuration issues for sensor networks. Int. J. Network Manage. 15, 4 (2005), 235--253.
[29]
Saman Naderiparizi, Aaron N. Parks, Zerina Kapetanovic, Benjamin Ransford, and Joshua R. Smith. 2015. Wispcam: A battery-free RFID camera. In Proceedings of the IEEE International Conference on Radio Frequency Identification (RFID’15). IEEE, 166--173.
[30]
Brian Otis and Dan Yeager. 2009. SoCWISP: Ultra-low power wireless sensing RFID chip. In Proceedings of the WISP Summit Workshop.
[31]
Aaron N. Parks, Angli Liu, Shyamnath Gollakota, and Joshua R. Smith. 2014. Turbocharging ambient backscatter communication. In ACM SIGCOMM Comput. Commun. Rev. Vol. 44. ACM, 619--630.
[32]
Aaron N. Parks and Joshua R. Smith. 2014. Sifting through the airwaves: Efficient and scalable multiband RF harvesting. In Proceedings of the IEEE International Conference on Radio Frequency Identification (RFID’14). IEEE, 74--81.
[33]
Matthai Philipose, Joshua R. Smith, Bing Jiang, Alexander Mamishev, Sumit Roy, and Kishore Sundara-Rajan. 2005. Battery-free wireless identification and sensing. IEEE Pervas. Comput. 4, 1 (2005), 37--45.
[34]
Lane A. Phillips. 2005. Aqueduct: Robust and Efficient Code Propagation in Heterogeneous Wireless Sensor Networks. Ph.D. Dissertation. University of Colorado.
[35]
Benjamin Ransford. 2010. A rudimentary bootloader for computational RFIDs. UMass Amherst, Technical Report UM-CS-2010-061 (2010).
[36]
Benjamin Ransford, Shane S. Clark, Mastooreh Salajegheh, and Kevin Fu. 2008. Getting things done on computational RFIDs with energy-aware checkpointing and voltage-aware scheduling. HotPower 8 (2008), 5--5.
[37]
Benjamin Ransford, Jacob Sorber, and Kevin Fu. 2012. Mementos: System support for long-running computation on RFID-scale devices. ACM SIGPLAN Notices 47, 4 (2012), 159--170.
[38]
Niels Reijers and Koen Langendoen. 2003. Efficient code distribution in wireless sensor networks. In Proceedings of the 2nd ACM International Conference on Wireless Sensor Networks and Applications. ACM, 60--67.
[39]
Matt Reynolds and Stewart Thomas. 2009. The blue devil WISP: Expanding the frontiers of the passive RFID physical layer. In Proceedings of the WISP Summit Workshop.
[40]
Mastooreh Salajegheh, Yue Wang, Anxiao Andrew Jiang, Erik Learned-Miller, and Kevin Fu. 2013. Half-wits: Software techniques for low-voltage probabilistic storage on microcontrollers with NOR flash memory. ACM Trans. Embed. Comput. Syst. (TECS) 12, 2s (2013), 91.
[41]
Yuanchao Shu, Yu Jason Gu, and Jiming Chen. 2014. Dynamic authentication with sensory information for the access control systems. IEEE Trans. Parallel Distrib. Syst. 25, 2 (2014), 427--436.
[42]
Joshua R. Smith. 2013. Wirelessly Powered Sensor Networks and Computational RFID. Springer Science 8 Business Media.
[43]
Thanos Stathopoulos, John Heidemann, and Deborah Estrin. 2003. A Remote Code Update Mechanism for Wireless Sensor Networks. Technical Report. DTIC Document.
[44]
Jethro Tan. 2015. Robust Downstream Communication and Storage for Computational RFIDs. Ph.D. Dissertation. Department of Software Technology, Delft University of Technology.
[45]
Texas Instruments. 2012. Mixed Signal Microcontroller. (Jan. 2012). Retrieved May 29, 2016 from http://www.ti.com/lit/ds/symlink/msp430f2132.pdf.
[46]
Texas Instruments. 2013. MSP430x2xx Family User’s Guide. (July 2013). Retrieved May 29, 2016 from http://www.ti.com/lit/ug/slau144j/slau144j.pdf.
[47]
Texas Instruments. 2015. MSP430FR59xx Mixed-Signal Microcontrollers. (March 2015). Retrieved May 29, 2016 from http://www.ti.com/lit/ds/symlink/msp430fr5969.pdf.
[48]
Texas Instruments. 2016. MSP430FR58xx, MSP430FR59xx,MSP430FR68xx, and MSP430FR69xx Family User’s Guide. (May 2016). Retrieved May 29, 2016 from http://www.ti.com/lit/ug/slau367j/slau367j.pdf.
[49]
Arnaud Vena, Brice Sorli, Alain Foucaran, and Yassin Belaizi. 2014. A RFID-enabled sensor platform for pervasive monitoring. In Proceedings of the 9th International Symposium on Reconfigurable and Communication-Centric Systems-on-Chip (ReCoSoC’14). IEEE, 1--4.
[50]
Jue Wang, Haitham Hassanieh, Dina Katabi, and Piotr Indyk. 2012. Efficient and reliable low-power backscatter networks. In Proceedings of the ACM SIGCOMM 2012 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication. ACM, 61--72.
[51]
Jennifer Wang, Erik Schluntz, Brian Otis, and Travis Deyle. 2015. A new vision for smart objects and the internet of things: Mobile robots and long-range UHF RFID sensor tags. arXiv:1507.02373 (2015).
[52]
Die Wu, Muhammad Jawad Hussain, Songfan Li, and Li Lu. 2016. R2: Over-the-air reprogramming on computational RFIDs. In Proceedings of the IEEE International Conference on Radio Frequency Identification (RFID’16). IEEE, 1--8.
[53]
Zhibin Xiao, Xi Tan, Xianliang Chen, Sizheng Chen, Zijian Zhang, Hualei Zhang, Junyu Wang, Yue Huang, Peng Zhang, Lirong Zheng, and Hao Min. 2015. An implantable RFID sensor tag toward continuous glucose monitoring. IEEE J. Biomed. Health Info. 19, 3 (2015), 910--919.
[54]
Wenyu Yang, Die Wu, Muhammad Jawad Hussain, and Li Lu. 2015. Wireless firmware execution control in computational RFID systems. In Proceedings of the IEEE International Conference on Radio Frequency Identification (RFID’15). IEEE, 129--136.
[55]
Daniel Yeager, Fan Zhang, Azin Zarrasvand, Nicole T. George, Thomas Daniel, and Brian P. Otis. 2010. A 9 uA, addressable gen2 sensor tag for biosignal acquisition. IEEE J. Solid-State Circ. 45, 10 (2010), 2198--2209.
[56]
Ibon Zalbide, Eduardo D’Entremont, Ainara Jimenez, Hector Solar, Andoni Beriain, and Roc Berenguer. 2014. Battery-free wireless sensors for industrial applications based on UHF RFID technology. In Proceedings of the IEEE 2014 Conference on Sensors. IEEE, 1499--1502.
[57]
Hong Zhang, Jeremy Gummeson, Benjamin Ransford, and Kevin Fu. 2011. Moo: A batteryless computational RFID and sensing platform. Department of Computer Science, University of Massachusetts Amherst, Technical Report (2011).
[58]
Pengyu Zhang and Deepak Ganesan. 2014. Enabling bit-by-bit backscatter communication in severe energy harvesting environments. In Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI’14). 345--357.
[59]
Pengyu Zhang, Jeremy Gummeson, and Deepak Ganesan. 2012. Blink: A high throughput link layer for backscatter communication. In Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services. ACM, 99--112.
[60]
Yuanqing Zheng and Mo Li. 2013. ZOE: Fast cardinality estimation for large-scale RFID systems. In Proceedings of the 2013 IEEE INFOCOM. IEEE, 908--916.
[61]
Yuanqing Zheng and Mo Li. 2014. Towards more efficient cardinality estimation for large-scale RFID systems. IEEE/ACM Trans. Network. 22, 6 (2014), 1886--1896.
[62]
Yuanqing Zheng and Mo Li. 2016. Read bulk data from computational RFIDs. IEEE/ACM Trans. Network. 24, 5 (2016), 3098--3108.

Cited By

View all
  • (2024)When Noise Can Help: Anonymous Group Writing in RFID-Enabled Backscatter NetworksIEEE Transactions on Mobile Computing10.1109/TMC.2024.343902423:12(13760-13772)Online publication date: Dec-2024
  • (2024)SCHEMATIC: Compile-Time Checkpoint Placement and Memory Allocation for Intermittent SystemsProceedings of the 2024 IEEE/ACM International Symposium on Code Generation and Optimization10.1109/CGO57630.2024.10444789(258-269)Online publication date: 2-Mar-2024
  • (2022)Wisecr: Secure Simultaneous Code Dissemination to Many Batteryless Computational RFID DevicesIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.3175313(1-1)Online publication date: 2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Embedded Computing Systems
ACM Transactions on Embedded Computing Systems  Volume 17, Issue 1
Special Issue on Autonomous Battery-Free Sensing and Communication, Special Issue on ESWEEK 2016 and Regular Papers
January 2018
630 pages
ISSN:1539-9087
EISSN:1558-3465
DOI:10.1145/3136518
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Journal Family

Publication History

Published: 20 September 2017
Accepted: 01 March 2017
Revised: 01 December 2016
Received: 01 June 2016
Published in TECS Volume 17, Issue 1

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Computational RFID
  2. EPC
  3. OTA reprogramming
  4. firmware upgrade

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)13
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)When Noise Can Help: Anonymous Group Writing in RFID-Enabled Backscatter NetworksIEEE Transactions on Mobile Computing10.1109/TMC.2024.343902423:12(13760-13772)Online publication date: Dec-2024
  • (2024)SCHEMATIC: Compile-Time Checkpoint Placement and Memory Allocation for Intermittent SystemsProceedings of the 2024 IEEE/ACM International Symposium on Code Generation and Optimization10.1109/CGO57630.2024.10444789(258-269)Online publication date: 2-Mar-2024
  • (2022)Wisecr: Secure Simultaneous Code Dissemination to Many Batteryless Computational RFID DevicesIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.3175313(1-1)Online publication date: 2022
  • (2021) SecuCode: Intrinsic PUF Entangled Secu re Wireless Code Dissemination for Computational RFID Devices IEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2019.293443818:4(1699-1717)Online publication date: 1-Jul-2021
  • (2020)Multi-Seed Group Labeling in RFID SystemsIEEE Transactions on Mobile Computing10.1109/TMC.2019.293444519:12(2850-2862)Online publication date: 1-Dec-2020

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media