Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1972457.1972478acmotherconferencesArticle/Chapter ViewAbstractPublication PagesnsdiConference Proceedingsconference-collections
Article

Dewdrop: an energy-aware runtime for computational RFID

Published: 30 March 2011 Publication History

Abstract

Computational RFID (CRFID) tags embed sensing and computation into the physical world. The operation of the tags is limited by the RF energy that can be harvested from a nearby power source. We present a CRFID run-time, Dewdrop, that makes effective use of the harvested energy. Dewdrop treats iterative tasks as a scheduling problem to balance task demands with available energy, both of which vary over time. It adapts the start time of the next task iteration to consistently run well over a range of distances between tags and a power source, for different numbers of tags in the vicinity, and for light and heavy tasks. We have implemented Dewdrop on top of the WISP CRFID tag. Our experiments show that, compared to normal WISP operation, Dewdrop doubles the operating range for heavy tasks and significantly increases the task rate for tags receiving the least energy, all without decreasing the rate in other situations. Using offline testing, we find that Dewdrop runs tasks at better than 90% of the best rate possible.

References

[1]
D. Brunelli, L. Benini, C. Moser, and L. Thiele. An efficient solar energy harvester for wireless sensor nodes. In DATE, 2008.
[2]
M. Buettner et al. Revisiting smart dust with RFID sensor networks. In HotNets, 2008.
[3]
M. Buettner et al. Recognizing daily activities with RFID-based sensors. In Ubicomp, 2009.
[4]
H. J. Chae et al. Maximalist cryptography and computation on the WISP UHF RFID tag. In RFID Security, 2007.
[5]
S. S. Clark et al. Towards autonomously-powered CRFIDs. In HotPower, 2009.
[6]
A. Czeskis et al. RFIDs and secret handshakes: Defending against ghost-and-leech attacks and unauthorized reads with context-aware communications. In CCS, 2008.
[7]
EPCglobal. EPC radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 mhz-960 mhz version 1.0.9. 2005.
[8]
J. Gummeson, S. S. Clark, K. Fu, and D. Ganesan. On the limits of effective micro-energy harvesting on mobile CRFID sensors. In MobiSys, 2010.
[9]
D. Halperin et al. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In IEEE Symposium on Security and Privacy, 2008.
[10]
S. Hodges et al. Assessing and optimizing the range of UHF RFID to enable real-world pervasive computing applications. In Pervasive Computing. Springer-Verlag, 2007.
[11]
D. E. Holcomb et al. Initial SRAM state as a fingerprint and source of true random numbers for RFID tags. In RFID Security, 2007.
[12]
X. Jiang, J. Polastre, and D. Culler. Perpetual environmentally powered sensor networks. In IPSN, 2005.
[13]
A. Kansal et al. Power management in energy harvesting sensor networks. In ACM Transactions on Embedded Computing Systems, 2006.
[14]
A. Mainwaring et al. Wireless sensor networks for habitat monitoring. In WSNA, 2002.
[15]
C. Moser, D. Brunelli, L. Thiele, and L. Benini. Real-time scheduling for energy harvesting sensor nodes. Real-Time Systems, 2007.
[16]
J. A. Paradiso and T. Starner. Energy scavenging for mobile and wireless electronics. IEEE Pervasive Computing, 2005.
[17]
M. Philipose et al. Inferring activities from interactions with objects. IEEE Pervasive Computing, 2004.
[18]
J. Polastre, R. Szewczyk, and D. Culler. Telos: Enabling Ultra-Low Power Wireless Research. In IPSN/SPOTS, 2005.
[19]
R. Prasad, M. Buettner, B. Greenstein, and D. Wetherall. Wisp monitoring and debugging. In Wirelessly Powered Sensor Networks and Computational RFID (to appear). Springer, 2011.
[20]
B. Ransford et al. Getting things done on computational RFIDs with energy-aware checkpointing and voltage-aware scheduling. In HotPower, 2008.
[21]
M. Reynolds and S. Thomas. The blue devil wisp: Expanding the frontiers of the passive RFID physical layer. WISP Summit Workshop, 2009.
[22]
M. Salajegheh et al. CCCP: Secure remote storage for computational RFIDs. In USENIX Security, 2009.
[23]
A. Sample et al. Experimental results with two wireless power transfer systems. In IEEE Radio and Wireless Symposium, 2009.
[24]
A. P. Sample et al. Design of an rfid-based battery-free programmable sensing platform. In IEEE Transactions on Instrumentation and Measurement, 2008.
[25]
F. Schoute. Dynamic frame length aloha. IEEE Transaction on Communications, 1983.
[26]
J. Sorber et al. Eon: A Language and Runtime System for Perpetual Systems. In SENSYS, 2007.
[27]
J. Taneja, J. Jeong, and D. Culler. Design, modeling, and capacity planning for micro-solar power sensor networks. In IPSN, 2008.
[28]
B. Warneke, M. Last, B. Liebowitz, and K. S. Pister. Smart dust: Communicating with a cubic-millimeter computer. Computer, 2001.
[29]
D. Yeager, P. Powledge, R. Prasad, D. Wetherall, and J. Smith. Wirelessly-charged UHF tags for sensor data collection. In IEEE RFID, 2008.
[30]
D. Yeager, F. Zhang, A. Zarrasvand, and B. Otis. A 9.2a gen 2 compatible UHF RFID sensing tag with -12dbm sensitivity and 1.25vrms input-referred noise floor. ISSCC, 2010.

Cited By

View all
  • (2022)AdaMICAProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/35503046:3(1-30)Online publication date: 7-Sep-2022
  • (2021)REHASHProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/34780775:3(1-42)Online publication date: 14-Sep-2021
  • (2021)Failure sentinelsProceedings of the 48th Annual International Symposium on Computer Architecture10.1109/ISCA52012.2021.00058(665-678)Online publication date: 14-Jun-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
NSDI'11: Proceedings of the 8th USENIX conference on Networked systems design and implementation
March 2011
27 pages

Sponsors

  • VMware
  • NSF: National Science Foundation
  • Google Inc.
  • Infosys
  • USENIX Assoc: USENIX Assoc

In-Cooperation

Publisher

USENIX Association

United States

Publication History

Published: 30 March 2011

Check for updates

Qualifiers

  • Article

Conference

NSDI '11
Sponsor:
  • NSF
  • USENIX Assoc

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2022)AdaMICAProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/35503046:3(1-30)Online publication date: 7-Sep-2022
  • (2021)REHASHProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/34780775:3(1-42)Online publication date: 14-Sep-2021
  • (2021)Failure sentinelsProceedings of the 48th Annual International Symposium on Computer Architecture10.1109/ISCA52012.2021.00058(665-678)Online publication date: 14-Jun-2021
  • (2020)Demystifying Energy Consumption Dynamics in Transiently powered ComputersACM Transactions on Embedded Computing Systems10.1145/339189319:6(1-25)Online publication date: 29-Sep-2020
  • (2020)Intermittent LearningProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/33698373:4(1-30)Online publication date: 14-Sep-2020
  • (2019)Neuro.ZEROProceedings of the 17th Conference on Embedded Networked Sensor Systems10.1145/3356250.3360030(138-152)Online publication date: 10-Nov-2019
  • (2019)Efficient intermittent computing with differential checkpointingProceedings of the 20th ACM SIGPLAN/SIGBED International Conference on Languages, Compilers, and Tools for Embedded Systems10.1145/3316482.3326357(70-81)Online publication date: 23-Jun-2019
  • (2019)The betrayal of constant power × time: finding the missing Joules of transiently-powered computersProceedings of the 20th ACM SIGPLAN/SIGBED International Conference on Languages, Compilers, and Tools for Embedded Systems10.1145/3316482.3326348(97-109)Online publication date: 23-Jun-2019
  • (2019)Supporting peripherals in intermittent systems with just-in-time checkpointsProceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation10.1145/3314221.3314613(1101-1116)Online publication date: 8-Jun-2019
  • (2019)Transactional concurrency control for intermittent, energy-harvesting computing systemsProceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation10.1145/3314221.3314583(1085-1100)Online publication date: 8-Jun-2019
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media