Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Fast and Adaptive Continuous Scanning in Large-Scale RFID Systems

Published: 01 December 2016 Publication History

Abstract

Radio Frequency Identification RFID technology plays an important role in supply chain logistics and inventory control. In these applications, a series of scanning operations at different locations are often needed to cover the entire inventory tags. In such continuous scanning scenario, adjacent scans inevitably read overlapping tags multiple times. Most existing methods suffer from low scanning efficiency when the overlap is small, since they do not distinguish the size of overlap which is an important factor of scanning performance. In this paper, we analytically unveil the fundamental relationship between the performance of continuous scanning and the size of overlap, deriving a critical threshold for the selection of scanning strategy. Further, we design an accurate estimator to approximate the overlap. Combining the estimate and a compact data structure, an adaptive scanning scheme is introduced to achieve low communication time. Through detailed analysis and extensive simulations, we demonstrate that the proposed scheme significantly outperforms previous approach in total scanning time.

References

[1]
D. Sen, P. Sen, and A. M. Das, RFID for Energy and Utility Industries. Tulsa, OK, USA: Pennwell, 2009.
[2]
B. Sheng, Q. Li, and W. Mao, "Efficient continuous scanning in RFID systems," in Proc. IEEE INFOCOM, 2010, pp. 1-9.
[3]
A. Z. Broder, M. Charikar, A. M. Frieze, and M. Mitzenmacher, "Minwise independent permutations," in Proc. STOC, 1998, pp. 327-336.
[4]
S. Lee, S. Joo, and C. Lee, "An enhanced dynamic framed slotted ALOHA algorithm for RFID tag identification," in Proc. MobiQuitous, 2005, pp. 166-172.
[5]
J. R. Cha and J. H. Kim, "Dynamic framed slotted ALOHA algorithms using fast tag estimation method for RFID system," in Proc. IEEE CCNC, 2006, pp. 768-772.
[6]
J. Myung and W. Lee, "Adaptive splitting protocols for RFID tag collision arbitration," in Proc. MobiHoc, 2006, pp. 202-213.
[7]
M. Shahzad and A. Liu, "Probabilistic optimal tree hopping for RFID identification," IEEE/ACM Trans. Netw., vol. 23, no. 3, pp. 796-809, Jun. 2015.
[8]
X. Liu, B. Xiao, S. Zhang, and K. Bu, "Unknown tag identification in large RFID systems: An efficient and complete solution," IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 6, pp. 1775-1788, Jun. 2015.
[9]
X. Liu et al., "Efficient unknown tag identification protocols in largescale RFID systems," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 12, pp. 3145-3155, Dec. 2014.
[10]
L. Xie, Q. Li, X. Chen, S. Lu, and D. Chen, "Continuous scanning with mobile reader in RFID systems: An experimental study," in Proc. MobiHoc, 2013, pp. 11-20.
[11]
T. Li, S. Chen, and Y. Ling, "Efficient protocols for identifying the missing tags in a large RFID system," IEEE/ACM Trans. Netw., vol. 21, no. 6, pp. 1974-1987, Dec. 2013.
[12]
M. Chen, W. Luo, Z. Mo, S. Chen, and Y. Fang, "An efficient tag search protocol in large-scale RFID systems," in Proc. IEEE INFOCOM, 2013, pp. 899-907.
[13]
Y. Zheng and M. Li, "PET: Probabilistic estimating tree for large-scale RFID estimation," IEEE Trans. Mobile Comput., vol. 11, no. 11, pp. 1763-1774, Nov. 2012.
[14]
M. Shahzad and A. Liu, "Every bit counts: Fast and scalable RFID estimation," in Proc. Mobicom, 2012, pp. 365-376.
[15]
Z. Zhou, B. Chen, and H. Yu, "Understanding RFID counting protocols," IEEE/ACM Trans. Netw., 2014, to be published.
[16]
W. Gong, K. Liu, X. Miao, and H. Liu, "Arbitrarily accurate approximation scheme for large-scale RFID cardinality estimation," in Proc. IEEE INFOCOM, 2014, pp. 477-485.
[17]
"EPC radio-frequency identity protocols Class-1 Generation-2 UHF RFID Protocol for communications at 860 MHz-960 MHz," 2008.
[18]
M. Buettner and D. Wetherall, "An empirical study of UHF RFID performance," in Proc. MobiCom, 2008, pp. 223-234.
[19]
Impinj, "Understanding EPC Gen2 search modes and sessions," [Online]. Available: https://support.impinj.com/hc/en-us/articles/202756158-Understanding-EPC-Gen2-Search-Modes-and-Sessions
[20]
"Jaccard index," 2015 [Online]. Available: http://en.wikipedia.org/wiki/Jaccard_index
[21]
M. Mitzenmacher and E. Upfal, Probability and Computing: Randomized Algorithms and Probabilistic Analysis. Cambridge, U.K.: Cambridge Univ. Press, 2005.
[22]
B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors," Commun. ACM, vol. 13, no. 7, pp. 422-426, 1970.
[23]
"WISP platform," 2012 [Online]. Available: http://wisp.wikispaces.com/WISPFirmware
[24]
"OpenBeacon," [Online]. Available: http://www.openbeacon.org/
[25]
P. Indyk, "A small approximately min-wise independent family of hash functions," in Proc. SODA, 1999, pp. 454-456.
[26]
Philips Semiconductors, "Philips I-CODE UID smart label IC functional specification," 2004 [Online]. Available: http://www.nxp.com/documents/data_sheet/SL092030.pdf
[27]
H. Yue, C. Zhang, M. Pan, Y. Fang, and S. Chen, "Unknown-target information collection in sensor-enabled RFID systems," IEEE/ACM Trans. Netw., vol. 22, no. 4, pp. 1164-1175, Aug. 2014.

Cited By

View all
  • (2022)A protocol for detecting missing target tags in RFID systemsJournal of Network and Computer Applications10.1016/j.jnca.2019.01.027132:C(40-48)Online publication date: 18-Apr-2022
  1. Fast and Adaptive Continuous Scanning in Large-Scale RFID Systems

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image IEEE/ACM Transactions on Networking
    IEEE/ACM Transactions on Networking  Volume 24, Issue 6
    December 2016
    635 pages

    Publisher

    IEEE Press

    Publication History

    Published: 01 December 2016
    Published in TON Volume 24, Issue 6

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 13 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)A protocol for detecting missing target tags in RFID systemsJournal of Network and Computer Applications10.1016/j.jnca.2019.01.027132:C(40-48)Online publication date: 18-Apr-2022

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media