Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1833515.1833674guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Efficient continuous scanning in RFID systems

Published: 14 March 2010 Publication History
  • Get Citation Alerts
  • Abstract

    RFID is an emerging technology with many potential applications such as inventory management for supply chain. In practice, these applications often need a series of continuous scanning operations to accomplish a task. For example, if one wants to scan all the products with RFID tags in a large warehouse, given a limited reading range of an RFID reader, multiple scanning operations have to be launched at different locations to cover the whole warehouse. Usually, this series of scanning operations are not completely independent as some RFID tags can be read by multiple processes. Simply scanning all the tags in the reading range during each process is inefficient because it collects a lot of redundant data and consumes a long time. In this paper, we develop efficient schemes for continuous scanning operations defined in both spatial and temporal domains. Our basic idea is to fully utilize the information gathered in the previous scanning operations to reduce the scanning time of the succeeding ones. We illustrate in the evaluation that our algorithms dramatically reduce the total scanning time when compared with other solutions.

    References

    [1]
    L. Ni, Y. Liu, Y. C. Lau, and A. Patil, "Landmarc: indoor location sensing using active RFID," in PerCom '03.
    [2]
    C. Wang, H. Wu, and N.-F. Tzeng, "RFID-based 3-d positioning schemes," in INFOCOM 2007.
    [3]
    C.-H. Lee and C.-W. Chung, "Efficient storage scheme and query processing for supply chain management using RFID," in SIGMOD '08.
    [4]
    A. Nemmaluri, M. D. Corner, and P. Shenoy, "Sherlock: automatically locating objects for humans," in MobiSys '08.
    [5]
    L. Ravindranath, V. N. Padmanabhan, and P. Agrawal, "Sixthsense: RFID-based enterprise intelligence," in MobiSys '08.
    [6]
    B. Metcalfe, "Steady-state analysis of a slotted and controlled ALOHA system with blocking," SIGCOMM Comput. Commun. Rev., vol. 5, no. 1, pp. 24-31, 1975.
    [7]
    F. C. Schoute, "Dynamic frame length ALOHA," IEEE Transactions on Communications, vol. 31, pp. 565-568, Apr. 1983.
    [8]
    EPCglobal. Class 1 generation 2 UHF air interface protocol standard version 1.0.9. {Online}. Available: http://www.epcglobalinc.org/standards/
    [9]
    J. Wieselthier, A. Ephremides, and L. Michaels, "An exact analysis and performance evaluation of framed ALOHA withcapture," IEEE Transactions on Communications, pp. 125-137, Feb. 1989.
    [10]
    P. Hernandez, J. Sandoval, F. Puente, and F. Perez, "Mathematical model for a multiread anticollision protocol," in IEEE Pacific Rim Conference on Communications, Computers and signal Processing, Aug. 2001.
    [11]
    H. Vogt, "Efficient Object Identification with Passive RFID Tags," in International Conference on Pervasive Computing, ser. LNCS, 2002.
    [12]
    J. Zhai and G.-N. Wang, "An anti-collision algorithm using twofunctioned estimation for RFID tags." in ICCSA (4), 2005, pp. 702-711.
    [13]
    S.-R. Lee, S.-D. Joo, and C.-W. Lee, "An enhanced dynamic framed slotted ALOHA algorithm for RFID tag identification," in MOBIQUITOUS '05, 2005.
    [14]
    C. Floerkemeier and M. Wille, "Comparison of transmission schemes for framed ALOHA based RFID protocols," in SAINT-W '06, 2006.
    [15]
    J.-R. Cha and J.-H. Kim, "Novel anti-collision algorithms for fast object identification in RFID system," in ICPADS '05, 2005.
    [16]
    B. Zhen, M. Kobayashi, and M. Shimizu, "Framed ALOHA for multiple RFID objects identification," in IEICE TRANSACTIONS on Communications, 2005.
    [17]
    M. A. Bonuccelli, F. Lonetti, and F. Martelli, "Tree slotted ALOHA: a new protocol for tag identification in RFID networks," in WOWMOM '06.
    [18]
    D. Hush and C. Wood, "Analysis of tree algorithms for RFID arbitration," in ISIT, 1998.
    [19]
    C. Law, K. Lee, and K.-Y. Siu, "Efficient memoryless protocol for tag identification," in Proceedings of the 1st International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, 2000.
    [20]
    F. Zhou, C. Chen, D. Jin, C. Huang, and H. Min, "Evaluating and optimizing power consumption of anti-collision protocols for applications in RFID systems," in ISLPED '04, 2004.
    [21]
    H.-S. Choi, J.-R. Cha, and J.-H. Kim, "Fast wireless anti-collision algorithm in ubiquitous id system," in Vehicular Technology Conference, 2004, pp. 4589-4592.
    [22]
    A. Micic, A. Nayak, D. Simplot-Ryl, and I. Stojmenovic, "A hybrid randomized protocol for RFID tag identification," in IEEE International Workshop on Next Generation Wireless Networks, 2005.
    [23]
    J. Myung and W. Lee, "An adaptive memoryless tag anti-collision protocol for RFID networks," in IEEE ICC, 2005.
    [24]
    J. Myung and W. Lee, "Adaptive splitting protocols for RFID tag collision arbitration," in MobiHoc '06, 2006.
    [25]
    M. Kodialam and T. Nandagopal, "Fast and reliable estimation schemes in RFID systems," in MobiCom '06, 2006.
    [26]
    M. Kodialam, T. Nandagopal, and W. C. Lau, "Anonymous tracking using rfid tags," in INFOCOM 2007.
    [27]
    C. Qian, H. Ngan, and Y. Liu, "Cardinality estimation for large-scale RFID systems," in PerCom '08.
    [28]
    M. Mitzenmacher, "Compressed bloom filters," IEEE/ACM Trans. Netw., vol. 10, no. 5, pp. 604-612, 2002.
    [29]
    S. Cohen and Y. Matias, "Spectral bloom filters," in SIGMOD '03.
    [30]
    B. Chazelle, J. Kilian, R. Rubinfeld, and A. Tal, "The bloomier filter: an efficient data structure for static support lookup tables," in SODA '04.
    [31]
    A. Pagh, R. Pagh, and S. S. Rao, "An optimal bloom filter replacement," in SODA '05.
    [32]
    F. Bonomi, M. Mitzenmacher, R. Panigrah, S. Singh, and G. Varghese, "Beyond bloom filters: from approximate membership checks to approximate state machines," SIGCOMM Comput. Commun. Rev., vol. 36, no. 4, pp. 315-326, 2006.
    [33]
    F. Hao, M. S. Kodialam, and T. V. Lakshman, "Building high accuracy bloom filters using partitioned hashing," in SIGMETRICS '07, 2007.
    [34]
    NXP Semiconductors. I-code smart label RFID tags. {Online}. Available: http://www.semiconductors.philips.com/acrobat download/ other/identification/SL092030.pdf

    Cited By

    View all

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    INFOCOM'10: Proceedings of the 29th conference on Information communications
    March 2010
    2990 pages
    ISBN:9781424458363

    Publisher

    IEEE Press

    Publication History

    Published: 14 March 2010

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 10 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2019)TashIEEE/ACM Transactions on Networking10.1109/TNET.2019.289634827:2(819-834)Online publication date: 1-Apr-2019
    • (2019)On Efficient Tree-Based Tag Search in Large-Scale RFID SystemsIEEE/ACM Transactions on Networking10.1109/TNET.2018.287997927:1(42-55)Online publication date: 1-Feb-2019
    • (2017)Analog On-Tag HashingProceedings of the 23rd Annual International Conference on Mobile Computing and Networking10.1145/3117811.3117835(301-314)Online publication date: 4-Oct-2017
    • (2016)Tag-ordering polling protocols in RFID systemsIEEE/ACM Transactions on Networking10.1109/TNET.2015.242331124:3(1548-1561)Online publication date: 1-Jun-2016
    • (2016)Fast and scalable counterfeits estimation for large-scale RFID systemsIEEE/ACM Transactions on Networking10.1109/TNET.2015.240666924:2(1052-1064)Online publication date: 1-Apr-2016
    • (2016)An efficient tag search protocol in large-scale RFID systems with noisy channelIEEE/ACM Transactions on Networking10.1109/TNET.2014.238631824:2(703-716)Online publication date: 1-Apr-2016
    • (2016)An efficient protocol for rfid multigroup threshold-based classification based on sampling and logical bitmapIEEE/ACM Transactions on Networking10.1109/TNET.2014.236752024:1(397-407)Online publication date: 1-Feb-2016
    • (2015)The Design and Implementation of A Cost-effective RFID Indoor Localization SystemProceedings of the 1st Workshop on Context Sensing and Activity Recognition10.1145/2820716.2820718(1-6)Online publication date: 1-Nov-2015
    • (2015)Temporally or Spatially Dispersed Joint RFID Estimation Using Snapshots of Variable LengthsProceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing10.1145/2746285.2746289(247-256)Online publication date: 22-Jun-2015
    • (2015)Energy-efficient active tag searching in large scale RFID systemsInformation Sciences: an International Journal10.1016/j.ins.2015.04.048317:C(143-156)Online publication date: 1-Oct-2015
    • Show More Cited By

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media