The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.10 - Oct. (2013 vol.24)
pp: 1972-1982
Zhipeng Yang , University of Louisiana at Lafayette, Lafayette
Ting Ning , University of Louisiana at Lafayette, Lafayette
Hongyi Wu , University of Louisiana at Lafayette, Lafayette
ABSTRACT
This paper focuses on distributed data query in intermittently connected passive RFID networks, which are characterized by extraordinarily limited communication capacity and asynchronous and opportunistic communication links. To address such unique challenges, we propose a distributed data query framework that clusters RFID readers and establishes a 0-1 Knapsack model based on dynamic packet appraisal to enable highly efficient data transmission. We implement a prototype by using Alien RFID gears and carry out experiments that involve 52 volunteers for 14 days to evaluate the proposed data query framework.
INDEX TERMS
Radiofrequency identification, Distributed databases, Portals, Vectors, Data communication, Animals, passive RFID, Distributed query, intermittent networks
CITATION
Zhipeng Yang, Ting Ning, Hongyi Wu, "Distributed Data Query in Intermittently Connected Passive RFID Networks", IEEE Transactions on Parallel & Distributed Systems, vol.24, no. 10, pp. 1972-1982, Oct. 2013, doi:10.1109/TPDS.2012.288
REFERENCES
[1] http://www.princeton.edu/mrmzebranet.html , 2013.
[2] T. Small and Z.J. Haas, "The Shared Wireless Infostation Model - A New Ad Hoc Networking Paradigm (or Where There Is a Whale, There Is a Way)," Proc. ACM MOBIHOC, pp. 233-244, 2003.
[3] http://www.wu.ece.ufl.edu/projects/DeerNet DeerNet.html, 2013.
[4] V. Dyo, S.A. Ellwood, D.W. Macdonald, A. Markham, C. Mascolo, B. Pasztor, S. Scellato, N. Trigoni, R. Wohlers, and K. Yousef, "Evolution and Sustainability of a Wildlife Monitoring Sensor Network," Proc. Eighth ACM Conf. Embedded Networked Sensor Systems (Sensys), 2010.
[5] M. Wikelski, R.W. Kays, N.J. Kasdin, K. Thorup, J.A. Smith, and G.W. Swenson, "Going Wild: What a Global Small-Animal Tracking System Could Do for Experimental Biologists," J. Experimental Biology, vol. 210, pp. 181-186, 2007.
[6] Z. Yang and H. Wu, "Featherlight Information Network with Delay-Endurable RFID Support (FINDERS)," Proc. IEEE Sixth Ann. IEEE Comm. Soc. Conf. Sensor, Mesh and Ad Hoc Comm. and Networks (SECON), pp. 55-63, 2009.
[7] Z. Yang and H. Wu, "FINDERS: A Featherlight Information Network with Delay-Endurable RFID Support," IEEE/ACM Trans. Networking, vol. 19, no. 4, pp. 961-974, Aug. 2011.
[8] Z. Yang and H. Wu, "Mobile Node Rostering in Intermittently Connected Passive RFID Networks," Proc. IEEE Int'l Conf. Pervasive Computing and Comm. (PerCom), pp. 138-146, 2011.
[9] Y. Qiao, S. Chen, T. Li, and S. Chen, "Energy-Efficient Polling Protocols in RFID Systems," Proc. ACM MOBIHOC, pp. 267-275, 2011.
[10] D.J. Yeager, A.P. Sample, and J.R. Smith, "WISP: A Passively Powered UHF RFID Tag with Sensing and Computation," RFID Handbook: Applications, Technology, Security, and Privacy. CRC Press, 2008.
[11] V. Cerf, S. Burleigh, A. Hooke, L. Torgerson, R. Durst, K. Scott, K. Fall, and H. Weiss, "Delay Tolerant Network Architecture," draft-irtf-dtnrg-arch-02.txt, 2004.
[12] J. Myung and W. Lee, "Adaptive Splitting Protocols for RFID Tag Collision Arbitration," Proc. ACM MOBIHOC, pp. 202-213, 2006.
[13] T. Li, S. Chen, and Y. Ling, "Identifying the Missing Tags in a Large RFID System," Proc. ACM MOBIHOC, pp. 1-10, 2010.
[14] H. Vogt, "Efficient Object Identification with Passive RFID Tags," Proc. Int'l Conf. Pervasive Computing, 2002.
[15] V. Namboodiri and L. Gao, "Energy-Aware Tag Anti-Collision Protocols for RFID Systems," Proc. IEEE Fifth Ann. Int'l Conf. Pervasive Computing and Comm. (PerCom), pp. 23-36, 2007.
[16] L. Xie, B. Sheng, C.C. Tan, H. Han, Q. Li, and D. Chen, "Efficient Tag Identification in Mobile RFID Systems," Proc. IEEE INFOCOM, pp. 1001-1009, 2010.
[17] W. Luo, S. Chen, T. Li, and S. Chen, "Efficient Missing Tag Detection in RFID Systems," Proc. IEEE INFOCOM, pp. 356-360, 2011.
[18] C.C. Tan, B. Sheng, and Q. Li, "How to Monitor for Missing RFID Tags," Proc. 28th Int'l Conf. Distributed Computing Systems (ICDCS), 2008.
[19] L.M. Ni, Y. Liu, Y.C. Lau, and A.P. Patil, "LANDMARC: Indoor Location Sensing Using Active RFID," Proc. IEEE First Int'l Conf. Pervasive Computing and Comm. (PerCom), pp. 407-415, 2003.
[20] D. Hahnel, W. Burgard, D. Fox, K. Fishkin, and M. Philipose, "Mapping and Localization with RFID Technology," Proc. IEEE Int'l Conf. Robotics and Automation, pp. 1015-1020, 2004.
[21] K. Yamano, K. Tanaka, M. Hirayama, E. Kondo, Y. Kimuro, and M. Matsumoto, "Self-Localization of Mobile Robots with RFID System by Using Support Vector Machine," Proc. IEEE/RSJ Int'l. Conf. Intelligent Robots and Systems, pp. 3756-3761, 2004.
[22] Y. Zhao, Y. Liu, and L.M. Ni, "VIRE: Active RFID-Based Localization Using Virtual Reference Elimination," Proc. Int'l Conf. Parallel Processing (ICPP), p. 56, 2007.
[23] C. Wang, H. Wu, and N.-F. Tzeng, "RFID-Based 3-D Positioning Schemes," Proc. IEEE INFOCOM, pp. 1235-1243, 2007.
[24] D. Henrici and P. Müller, "Providing Security and Privacy in RFID Systems Using Triggered Hash Chains," Proc. IEEE Sixth Int'l Conf. Pervasive Computing and Comm. (PerCom), pp. 50-59, 2008.
[25] T. Dimitriou, "A Secure and Efficient RFID Protocol That Could Make Big Brother (Partially) Obsolete," Proc. IEEE Int'l Conf. Pervasive Computing and Comm. (PerCom), pp. 269-275, 2006.
[26] L. Yang, J. Han, Y. Qi, C. Wang, T. Gu, and Y. Liu, "Season: Shelving Interference and Joint Identification in Large-Scale RFID Systems," Proc. IEEE INFOCOM, pp. 3092-3100, 2011.
[27] L. Yang, J. Han, Y. Qi, and Y. Liu, "Identification-Free Batch Authentication for RFID Tags," Proc. IEEE 18th Int'l Conf. Network Protocols (ICNP), pp. 154-163, 2010.
[28] Y. Wang and H. Wu, "DFT-MSN: The Delay Fault Tolerant Mobile Sensor Network for Pervasive Information Gathering," Proc. IEEE INFOCOM, pp. 1-12, 2006.
[29] Y. Wang and H. Wu, "Delay/Fault-Tolerant Mobile Sensor Network (DFT-MSN): A New Paradigm for Pervasive Information Gathering," IEEE Trans. Mobile Computing, vol. 6, no. 9, pp. 1021-1034, Sept. 2007.
[30] J. Edmonds and R.M. Karp, "Theoretical Improvements in Algorithmic Efficiency for Network Flow Problems," J. ACM, vol. 19, pp. 248-264, 1972.
[31] C. Bron and J. Kerbosch, "Algorithm 457: Finding All Cliques of An Undirected Graph," Comm. ACM, vol. 16, no. 9, pp. 575-577, 1973.
[32] Introduction to Algorithms, pp. 382-283. The MIT Press, 2001.
[33] S. Sahni, "Approximate Algorithms for the 0/1 Knapsack Problem," J. ACM, vol. 22, no. 1, pp. 115-124, 1975.
[34] J. Leguay, T. Friedman, and V. Conan, "DTN Routing in a Mobility Pattern Space," Proc. ACM SIGCOMM '05, pp. 276-283, 2005.
24 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool