skip to main content
10.1145/1161089.1161126acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article

Fast and reliable estimation schemes in RFID systems

Published:29 September 2006Publication History

ABSTRACT

RFID tags are being used in many diverse applications in increasingly large numbers. These capabilities of these tags span from very dumb passive tags to smart active tags, with the cost of these tags correspondingly ranging from a few pennies to many dollars. One of the common problems that arise in any RFID deployment is the problem of quick estimation of the number of tags in the field up to a desired level of accuracy. Prior work in this area has focused on the identification of tags, which needs more time, and is unsuitable for many situations, especially where the tag set is dense. We take a different, more practical approach, and provide very fast and reliable estimation mechanisms. In particular, we analyze our estimation schemes and show that the time needed to estimate the number of tags in the system for a given accuracy is much better than schemes presented in related work. We show that one can estimate the cardinality of tag-sets of any size in near-constant time, for a given accuracy of estimation.

References

  1. "RFID:Wikipedia entry", http://en.wikipedia.org/wiki/RFID 2006.Google ScholarGoogle Scholar
  2. K. Finkenzeller, "RFID handbook: Radio frequency identification fundamentals and applications", John Wiley & Sons 2000.Google ScholarGoogle Scholar
  3. EPCglobal, "EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz .960 MHz Version 1.0.9 ", 2005.Google ScholarGoogle Scholar
  4. ISO/IEC 15963, "Information technology. Radio frequency identification for item management. Unique identification for RF tags", 2004.Google ScholarGoogle Scholar
  5. L. Burdet, "RFID multiple access methods", Technical Report ETH Zurich, 2004.Google ScholarGoogle Scholar
  6. R. Want, "An introduction to RFID technology", IEEE Pervasive Computing Jan. 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. T. Hassan and S. Chatterjee, "A taxonomy for RFID", Hawaii International Conference on System Sciences Kauai, HI, Jan 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. RFID Journal, http://www.rfidjournal.com 2006.Google ScholarGoogle Scholar
  9. Philips Semiconductors, "I-CODE Smart Label RFID Tags", http://www.semiconductors.philips.com/acrobat download/other/identification/SL092030.pdfGoogle ScholarGoogle Scholar
  10. Feller, W., "An Introduction to Probability Theory and Its Applications", Vol 1 John Wiley, 1968.Google ScholarGoogle Scholar
  11. K. Whang, B. Vander-Zanden, and H. Taylor, "A Linear Time Probabilistic Counting Algorithm for Database Applications", ACM Transactions on Database Systems June, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Rao, C. R., "Linear Statistical Inference and its Applications",Google ScholarGoogle Scholar
  13. M. Kodialam and T. Nandagopal, "Fast Estimation Schemes in RFID Systems", Bell Labs Technical Report March 2006. Available at http://www.bell-labs.com/user/thyaga.Google ScholarGoogle Scholar
  14. K. S. Leong, M. L. Ng and P. H. Cole, "Synchronization of RFID readers for dense RFID reader environments", International Symposium on Applications and Internet Workshops Phoenix, AZ. Jan 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. S. Chen and V. Thomas, "Optimization of inductive RFID technology", IEEE International Symposium on Electronics and Environment 2001.Google ScholarGoogle ScholarCross RefCross Ref
  16. D. Engels and S. Sarma, "The reader collision problem", IEEE Systems, Man and Cybernetics 2002.Google ScholarGoogle Scholar
  17. J. Waldrop, D. Engels and S. Sarma, "Colorwave: An anticollision algorithm for the reader collision problem", IEEE ICC 2002.Google ScholarGoogle Scholar
  18. H. Vogt, "Efficient Object Identification with Passive RFID Tags", Lecture Notes in Computer Science Springer-Verlag, vol. 2414, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. P. Hernandez, J. D. Sandoval, F. Puente and F. Perez, "Mathematical Model for a Multi-read Anti-collision Protocol", IEEE Pacific Rim Conference on Communications, Computers and Signal Processing 2001.Google ScholarGoogle Scholar
  20. B. Zhen, M. Kobayashi and M. Shimizu, "To read transmitter-only RFID tags with confidence", IEEE PIMRC '04 Barcelona, Spain. Sept 2004.Google ScholarGoogle Scholar
  21. H. Choi, J. R. Cha and J. H. Kim, "Fastwireless anti-collision algorithm in ubiquitous ID system", IEEE VTC '04 Los Angeles, CA. Sep 2004.Google ScholarGoogle Scholar
  22. J. R. Cha and J. H. Kim, "Novel anti-collision algorithms for fast object identification in RFID system", IEEE International Conference on Parallel and Distributed Systems 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. C. Floerkemeier and M. Wille, "Comparison of Transmission Schemes for Framed ALOHA based RFID Protocols", Workshop on RFID and Extended Network Deployment of Technologies and Applications Phoenix, AZ. Jan 2006.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. C. Floerkemeier, "Transmission control scheme for fast RFID object identification", IEEE PerCom Workshop on Pervasive Wireless Networking Mar 2006.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. F. C. Schoute, "Dynamic framed length ALOHA", IEEE Transactions on Communications vol.31(4), Apr 1983.Google ScholarGoogle ScholarCross RefCross Ref
  26. A. Micic, A. Nayak, D. Simplot-Ryl and I. Stojmenovic, "A hybrid randomized protocol for RFID tag identification", IEEE International Workshop on Next Generation Wireless Networks Goa, India. 2005.Google ScholarGoogle Scholar
  27. I. Cidon and M. Sidi, "Conflict multiplicity estimation and batch resolution algorithms", IEEE Transactions on Information Theory vol. 34(1), Jan 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. B. Zhen, M. Kobayashi and M. Shimizu, "Framed ALOHA for multiple RFID objects identification", IEICE Transactions on Communications vol. E88-B(3), Mar 2005.Google ScholarGoogle Scholar
  29. P. F. Greenberg and R. E. Ladner, "Estimating the multiplicities of conflict to speed their resolution in multiple access channels", J. ACM vol. 34(2), Apr. 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. P. Popovski, F. H. P. Fitzek, and R. Prasad, "Batch Conflict Resolution Algorithm with Progressively Accurate Multiplicity Estimation", ACM DIALM-POMC Workshop Philadephia, PA. Oct. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. K. Cho, H. Shin and J. Lee, "Performance analysis of HIPERLAN channel access control protocol", IEICE Transactions on Communications vol. E85-B(10), Oct 2002.Google ScholarGoogle Scholar
  32. Y. C. Tay, K. Jamieson and H. Balakrishnan, "Collision-minimizing CSMA and its applications to wireless sensor networks", IEEE Journal on Selected Areas in Communications vol.22(6), Aug 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. J. Wieselthier, A. Ephremides and L. Michaels, "An exact analysis and performance evaluation of framed ALOHA with capture", IEEE Transactions on Communications vol.(37(2), Feb 1989.Google ScholarGoogle ScholarCross RefCross Ref
  34. S. Lee, S. Joo and C. Lee, "An enhanced dynamic framed slotted ALOHA algorithm for RFID tag identification", IEEE MobiQuitous 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. F. Cali, M. Conti and E. Gregori, "Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit", IEEE/ACM Transactions on Networking vol. 8(6), Dec 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. K. Jamieson, H. Balakrishnan, and Y. C. Tay, "Sift: a MAC Protocol for Event-Driven Wireless Sensor Networks", Proceedings of the Third European Workshop on Wireless Sensor Networks, Feb 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. M. Nanjundaiah and V. Chaudhary, "Improvement to the anticollision protocol specification for 900 MHz class 0 RFID tag", International Conference on Advanced Information Networking and Applications 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. F. Zhou, C. Chen, D. Jin, C. Huang and H. Min, "Evaluating and optimizing power consumption of anti-collision protocols for applications in RFID systems", ACM ISLPED '04 Aug 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. D. Hush and C. Wood, "Analysis of tree algorithms for RFID arbitration", IEEE Symposium on Information Theory Cambridge, MA. Aug 1998.Google ScholarGoogle ScholarCross RefCross Ref
  40. L. Bolotnyy and G. Robins, "Randomized pseudo-random function tree walking algorithm for secure radio-frequency identification", IEEE Workshop on Automatic Identification Advanced Technologies Oct 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. J. Kim, W. Lee, J. Yu, E. KimandC. Lee, "Effect of localized optimal clustering for reader anti-collision in RFID networks: fairness aspects to the readers", IEEE ICCCN 2005.Google ScholarGoogle Scholar
  42. I. Chlamtac, C. Petrioli and J. Redi, "Energy conserving access protocols for identification networks", IEEE/ACM Transaction on Networking vol. 7(1), Feb 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. C. Law, K. Lee, and K. Siu, "Efficient Memoryless Protocol for Tag Identification", ACM DIAL-M Workshop Aug 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. J. Myung and W. Lee, "An Adaptive Memoryless Tag Anti-Collision Protocol for RFID Networks", IEEE ICC 2005.Google ScholarGoogle Scholar
  45. A. Krohn, M. Beigl and S. Wendhack, "SDJS: Efficient Statistics in Wireless Networks", IEEE ICNP Berlin, Germany, Oct 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Fast and reliable estimation schemes in RFID systems

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          MobiCom '06: Proceedings of the 12th annual international conference on Mobile computing and networking
          September 2006
          428 pages
          ISBN:1595932860
          DOI:10.1145/1161089

          Copyright © 2006 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 29 September 2006

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate440of2,972submissions,15%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader