The Community for Technology Leaders
RSS Icon
Issue No.10 - Oct. (2013 vol.12)
pp: 2012-2023
Zhipeng Yang , University of Louisiana at Lafayette, Lafayette
Ting Ning , University of Louisiana at Lafayette, Lafayette
Hongyi Wu , University of Louisiana at Lafayette, Lafayette
This paper focuses on the problem of rostering in intermittently connected passive RFID networks. It aims to report a list of tagged mobile nodes that appear in given interested area(s) and time interval(s). Such rostering faces several unique challenges. First, the network consists of two dramatically different types of nodes: powerful static readers and extremely resource-constrained mobile tags. Communication can be established from a reader to a tag only, but not tags to tags or readers to readers. Therefore, the connectivity is very low and intermittent. Besides connectivity, the tag's computation power is also intermittent. It is available only for a short interval when the tag is powered up by a nearby reader, rendering any continuous functions impossible. Moreover, the capacity of tags is so limited that it becomes the critical network resource and communication bottleneck. To address the above challenges, we propose a rostering algorithm that employs a dynamic space-efficient coding scheme to construct hypothetic packet candidates, appraises their values according to information redundancy and tag mobility, and establishes a 0-1 Knapsack model to choose the best set of packets, which together maximize their total (redundancy-excluded) value, but do not exceed the capacity of a tag. We carry out experiments that involve 38 volunteers for nine days and perform large-scale simulations to evaluate the proposed rostering scheme.
Mobile communication, Mobile computing, Passive RFID tags, Batteries, Wildlife, node rostering, Mobile communication, Mobile computing, Passive RFID tags, Batteries, Wildlife, intermittently connected network, Passive RFID, delay-tolerant network
Zhipeng Yang, Ting Ning, Hongyi Wu, "Efficient Rostering of Mobile Nodes in Intermittently Connected Passive RFID Networks", IEEE Transactions on Mobile Computing, vol.12, no. 10, pp. 2012-2023, Oct. 2013, doi:10.1109/TMC.2012.170
[1] , 2013.
[2] T. Small and Z.J. Haas, "The Shared Wireless Infostation Model—A New Ad Hoc Networking Paradigm (or Where There Is a Whale, There Is a Way)," Proc. ACM MobiHoc, pp. 233-244, 2003.
[3] DeerNet.html, 2013.
[4] V. Dyo, S.A. Ellwood, D.W. Macdonald, A. Markham, C. Mascolo, B. Pasztor, S. Scellato, N. Trigoni, R. Wohlers, and K. Yousef, "Evolution and Sustainability of a Wildlife Monitoring Sensor Network," Proc. ACM Conf. Embedded Networked Sensor Systems, 2010.
[5] M. Wikelski, R.W. Kays, N.J. Kasdin, K. Thorup, J.A. Smith, and G.W. Swenson, "Going Wild: What a Global Small-Animal Tracking System Could Do for Experimental Biologists," J. Experimental Biology, vol. 210, pp. 181-186, 2007.
[6] Z. Yang and H. Wu, "Featherlight Information Network with Delay-Endurable RFID Support (FINDERS)," Proc. Sixth Ann. IEEE Comm. Soc. Conf. Sensor, Mesh and Ad Hoc Comm. and Networks (SECON '09), pp. 55-63, 2009.
[7] Z. Yang and H. Wu, "FINDERS: A Featherlight Information Network with Delay-Endurable RFID Support," IEEE/ACM Trans. Networking, vol. 19, no. 4, pp. 961-974, Aug. 2011.
[8] V. Cerf, S. Burleigh, A. Hooke, L. Torgerson, R. Durst, K. Scott, K. Fall, and H. Weiss, "Delay Tolerant Network Architecture," IETF RFC 4838, 2004.
[9] M. Jelasity, A. Montresor, and O. Babaoglu, "Gossip-Based Aggregation in Large Dynamic Networks," ACM Trans. Computer Systems, vol. 23, pp. 219-252, 2005.
[10] D. Angluin, J. Aspnes, and D. Eisenstat, "Fast Computation by Population Protocols with a Leader," Proc. 20th Int'l Symp. Distributed Computing, pp. 61-75, 2006.
[11] J. Aspnes and E. Ruppert, "An Introduction to Population Protocols," Bull. of the European Assoc. for Theoretical Computer Science, vol. 93, pp. 98-117, 2007.
[12] B.D. Walker, J.K. Glenn, and T.C. Clancy, "Analysis of Simple Counting Protocols for Delay-Tolerant Networks," Proc. ACM Workshop Challenged Networks (CHANTS), pp. 19-26, 2007.
[13] M. Kodialam and T. Nandagopal, "Fast and Reliable Estimation Schemes in RFID Systems," Proc. ACM MobiHoc, pp. 322-333, 2006.
[14] C. Qian, H.-L. Ngan, and Y. Liu, "Cardinality Estimation for Large-Scale RFID Systems," Proc. IEEE Int'l Conf. Pervasive Computing and Comm. (PERCOM '08), 2008.
[15] T. Li, S. Wu, S. Chen, and M. Yang, "Energy Efficient Algorithms for the RFID Estimation Problem," Proc. IEEE INFOCOM, pp. 1019-1027, 2010.
[16] M.S. Kodialam, T. Nandagopal, and W.C. Lau, "Anonymous Tracking Using RFID Tags," Proc. IEEE INFOCOM, pp. 1217-1225, 2007.
[17] J. Myung and W. Lee, "Adaptive Splitting Protocols for RFID Tag Collision Arbitration," Proc. ACM MobiHoc, pp. 202-213, 2006.
[18] T. Li, S. Chen, and Y. Ling, "Identifying the Missing Tags in a Large RFID System," Proc. ACM MobiHoc, pp. 1-10, 2010.
[19] H. Vogt, "Efficient Object Identification with Passive RFID Tags," Proc. Int'l Conf. Pervasive Computing, 2002.
[20] V. Namboodiri and L. Gao, "Energy-Aware Tag Anti-Collision Protocols for RFID Systems," Proc. IEEE Int'l Conf. Pervasive Computing and Comm. (PERCOM '07), pp. 23-36, 2007.
[21] L. Xie, B. Sheng, C.C. Tan, H. Han, Q. Li, and D. Chen, "Efficient Tag Identification in Mobile RFID Systems," Proc. IEEE INFOCOM, pp. 1001-1009, 2010.
[22] W. Luo, S. Chen, T. Li, and S. Chen, "Efficient Missing Tag Detection in RFID Systems," Proc. IEEE INFOCOM, pp. 356-360, 2011.
[23] C.C. Tan, B. Sheng, and Q. Li, "How to Monitor for Missing RFID Tags," Proc. Int'l Conf. Distributed Computing Systems (ICDCS), 2008.
[24] L.M. Ni, Y. Liu, Y.C. Lau, and A.P. Patil, "LANDMARC: Indoor Location Sensing Using Active RFID," Proc. IEEE Conf. Pervasive Computing and Comm. (PERCOM '03), pp. 407-415, 2003.
[25] D. Hahnel, W. Burgard, D. Fox, K. Fishkin, and M. Philipose, "Mapping and Localization with RFID Technology," Proc. IEEE Int'l Conf. Robotics and Automation, pp. 1015-1020, 2004.
[26] K. Yamano, K. Tanaka, M. Hirayama, E. Kondo, Y. Kimuro, and M. Matsumoto, "Self-Localization of Mobile Robots with RFID System by Using Support Vector Machine," Proc. IEEE/RSJ Int'l Conf. Intelligent Robots and Systems, pp. 3756-3761, 2004.
[27] Y. Zhao, Y. Liu, and L.M. Ni, "VIRE: Active RFID-Based Localization Using Virtual Reference Elimination," Proc. Int'l Conf. Parallel Processing (ICPP '07), p. 56, 2007.
[28] C. Wang, H. Wu, and N.-F. Tzeng, "RFID-Based 3-D Positioning Schemes," Proc. IEEE INFOCOM, pp. 1235-1243, 2007.
[29] D. Henrici and P. Müller, "Providing Security and Privacy in RFID Systems Using Triggered Hash Chains," Proc. IEEE Int'l Conf. Pervasive Computing and Comm. (PERCOM '08), pp. 50-59, 2008.
[30] T. Dimitriou, "A Secure and Efficient RFID Protocol That Could Make Big Brother (Partially) Obsolete," Proc. IEEE Int'l Conf. Pervasive Computing and Comm. (PERCOM '06), pp. 269-275, 2006.
[31] L. Yang, J. Han, Y. Qi, C. Wang, T. Gu, and Y. Liu, "Season: Shelving Interference and Joint Identification in Large-Scale RFID Systems," Proc. IEEE INFOCOM, pp. 3092-3100, 2011.
[32] L. Yang, J. Han, Y. Qi, and Y. Liu, "Identification-Free Batch Authentication for RFID Tags," Proc. IEEE Int'l Conf. Network Protocols (ICNP '10), pp. 154-163, 2010.
[33] Introduction to Algorithms, pp. 382-283. MIT, 2001.
[34] J. Leguay, T. Friedman, and V. Conan, "DTN Routing in a Mobility Pattern Space," Proc. ACM Special Interest Group on Data Comm. (SIGCOMM '05), pp. 276-283, 2005.
30 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool