SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
Reliability Techniques for RFID-Based Object Tracking Applications

                      Ahmad Rahmati, Lin Zhong                              Matti Hiltunen, Rittwik Jana
                     Dept. of ECE, Rice University                             AT&T Labs - Research
                          Houston, TX 77005                                    Florham Park, NJ 07932
                      {rahmati, lzhong}@rice.edu                         {hiltunen, rjana}@research.att.com


                            Abstract                                      rity challenges, such as remote spying on people and their
                                                                          possessions, have received considerable attention from both
   Radio Frequency Identification (RFID) technology has                    media and academia [5, 7, 8, 13]. Nevertheless, the reliabil-
the potential to dramatically improve numerous industrial                 ity challenges have only recently been noted [4, 6, 12, 15,
practices. However, it still faces many challenges, including             17]. Unfortunately, poor reliability may render RFID tech-
security and reliability, which may limit its use in many ap-             nology practically infeasible for many application scenar-
plication scenarios. While security has received consider-                ios, as highlighted by pilot studies in [1, 2, 3, 14].
able attention, reliability has escaped much of the research                  In this work, we experimentally examined and measured
scrutiny. In this work, we investigate the reliability chal-              the reliability challenges in RFID systems and their major
lenges in RFID-based tracking applications, where objects                 causes. Our focus is on the reliability of reading low-cost
(e.g., pallets, packages, and people) tagged with low-cost                passive UHF tags, particularly tracking tagged mobile ob-
passive RFID tags pass by the RFID reader’s read zone.                    jects that pass unimpeded by an RFID antenna. Our re-
Our experiments show that the reliability of tag identifica-               search highlights the reliability challenges in RFID tech-
tion is affected by several factors, including the inter-tag              nology: passive tags have a much weaker signal, a much
distance, the distance between the tag and antenna, the ori-              shorter communication range, and thus much lower read re-
entation of the tag with respect to the antenna, and the lo-              liability than battery-powered, active, RFID tags. Nonethe-
cation of the tag on the object. We demonstrate that RFID                 less, our techniques and results can be applied to other
system reliability can be significantly improved with the ap-              RFID systems as well, including active tag systems.
plication of simple redundancy techniques.                                    The rest of the paper is structured as follows. We start
                                                                          with an overview of RFID systems, their reliability chal-
                                                                          lenges, and related work in Section 2. We present our find-
1. Introduction                                                           ings on how the reliability depends on range, orientation,
                                                                          and the effect of multiple tags in Section 3. We also pro-
   RFID leverages electromagnetic or electrostatic cou-                   vide experimental results from two real world applications
pling in the radio frequency portion of the electromagnetic               of RFID systems, namely identification and tracking of ob-
spectrum to identify objects over a distance of potentially               jects and humans. We investigate the use of fault-tolerance
several meters. While its origins can be traced back to                   techniques and their impact on reliability in Section 4. Fi-
1940s (e.g., [16]), its commercial applications have started              nally, we conclude in Section 5.
expanding significantly recently as a replacement or supple-
ment to barcode technology, thanks in part to standardiza-                2. Overview
tion, availability of commercial off-the -shelf (COTS) com-
ponents, and their reducing cost1 . RFID systems are em-
                                                                             The application of RFID technology requires RFID tags
ployed to track shipments and manage supply-chains (e.g.,
                                                                          attached to objects and an infrastructure for reading the tags
Wal-Mart [2]) and to automate toll collection on highways,
                                                                          and processing tag information. The infrastructure typically
and are being deployed for many new application areas
                                                                          consists of antennas, readers (each typically controlling 1
(e.g., passports, airline boarding passes, luggage tags, etc.).
                                                                          to 4 antennas), and a back-end system with edge servers,
   However, practical applications of RFID technology face
                                                                          application servers, and databases. An antenna employs RF
significant security and reliability challenges. The secu-
                                                                          signal to activate the tag, which then responds with its data,
  1 For example, in May 2006, SmartCode announced a price of $0.05 per    typically a unique 96 bit identification code and some asset
EPC Gen 2 tag in volumes of 100 million (www.smartcodecorp.com).          related data. The reader collects the data and forwards it
to the back-end system. The back-end system implements            tags (e.g., removal of tag antenna [8] or removal of the
the logic and actions for when a tag is identified. The logic      whole tag), hiding of tags by shielding them, or interfering
can be as simple as opening a door, setting off an alarm,         with the read protocol [7]. Furthermore, we do not consider
updating an database, or complicated, such as an integrated       modifications to the RFID protocol itself such as better col-
management and monitoring for shipment tracking.                  lision control algorithms that can significantly improve re-
                                                                  liability in multiple tag situations [9, 18].
2.1. Reliability: Definitions and Challenges
                                                                  2.2. Related work
   We define the read reliability as the probability that an
RFID reader successfully detects and identifies an RFID tag           Several recent pilot studies have evaluated the reliabil-
when it is in the read range of one of the reader’s antennas.     ity aspects of RFID technology. A pilot study of a phar-
Similarly, we define the tracking reliability of an RFID sys-      maceutical supply-chain tracking system [1] observed read
tem as the probability that the system successfully detects       reliabilities ranging from under 10% to 100% for item-level
and identifies an object when it is present in a designated        and case-level tags in different stages of the shipping pro-
area. Note that the system-level definition of tracking relia-     cess. A performance benchmark [12] presented the results
bility obviates a one-to-one mapping between a tag and an         from number of experiments including read speed for a pop-
object. For example, an object may carry multiple tags or         ulation of stationary tags and read reliability for different
a human may be identified indirectly based on tagged ob-           tagged materials on a conveyer belt. However, neither work
jects in his possession. In this paper, we will only consider     attempted to develop techniques to improve reliability.
the reliability of detection and identification of tags and/or        Other research efforts have proposed techniques to im-
objects, not the reliability of the individual system compo-      prove the reliability of RFID systems. In [10], the authors
nents or the actions taken by the system logic.                   propose a cascaded tagging approach, where in addition to
   There are many factors that can impact read reliability,       normal item level tags, the cases, pallets, and truckloads are
including the type of material surrounding a tag (e.g., met-      tagged with ‘macro tags’. A macro tag provides informa-
als or liquids), the inter-tag distance, the orientation of the   tion about the tags contained in the macro tagged collec-
tags with respect to the antenna, the tag-antenna distance,       tion. The macro tags are typically different from the item-
the number of tags in the read range of the antenna, and the      level tags to make them easier to detect, for example, they
speed of the tagged objects. Materials such as metals and         may have larger antennas or be active tags. In this paper,
liquids not only block the signal when the material is placed     we only consider techniques that use identical tags. In [17],
between the antenna and the tag, but may act as a grounding       the authors propose redundancy and diversity of antennas,
plate if the tag is too close to the material even if the mate-   readers, and tags, as methods to increase system reliability.
rial is not between the tag and the antenna. Tags placed too      Neither of these two efforts evaluates the effectiveness of
close to one another also interfere with each others opera-       their proposed techniques. Finally, in [6], the authors pro-
tion. The orientation of the tags, specifically, the orientation   pose to use real-world constraints to correct missed reads
of the tag’s antenna with regard to the reader antenna has a      for tracking mobile objects. Specifically, they consider con-
large impact on how much of the reader signal the tag is          straints related to possible physical movement paths of ob-
able to absorb. The number of tags in the read range of an        jects (‘route constraint’) and known groupings of tagged ob-
antenna affects reliability because only one tag can be read      jects (‘accompany constraint’).
concurrently but multiple tags may respond in a given read
slot, causing collisions. State of the art RFID systems use       3. RFID Reliability Experiments and Results
sophisticated collision control mechanisms to reduce colli-
sions. Finally, higher object speeds limit the time when tags        To highlight the reliability challenge in current state of
are visible to an antenna.                                        the art EPC Gen 2 RFID systems, we have conducted nu-
   RFID measurements are particularly prone to false neg-         merous experiments that reproduce various real-world situ-
ative reads, where a tag present in the read range of an an-      ations in our lab using COTS components. We used single-
tenna is not detected. In some cases, it is also possible to      dipole Gen 2 tags from Symbol Technologies, which had an
get false positive reads, where RFID tags might be read           antenna patch size of 2.5 cm by 10 cm. We used the Matrix
from outside the region normally associated with the an-          AR400 reader along with a single area antenna. We used
tenna, leading to a misbelief that the object is near the an-     the default settings on the reader, which included a maxi-
tenna [3]. We focus on false negatives since false positives      mum power output of 30 dBm (1 watt). While our exper-
can typically be eliminated by increasing the distance be-        iments consider only one type of tags, readers, and anten-
tween antennas and/or by decreasing the power output of           nas, our results offer insights to (1) a number of important
the readers.                                                      parameters impacting RFID system reliability, and (2) the
   Note that we do not consider intentional destruction of        effectiveness of system-level reliability techniques. We de-
£¢ ¡ ¤                                                                                          32 cm
                                       £¢ ¡ 
                                                   £¢ ¦¥ ¤ 
                                                                                           Inter-tag
                                                                                           distance
                                               £¢ ¦¥ ¤                                                                                Antenna

                                                                                                                                                        72
                                         y                                                                                                              cm
                                                                                                                      1
                                                                                                                                  2
                                               x
                                                                                                                          3   4

                                                                                                                      5           6
                        Figure 1. Tag placement for read range exp.
                                                                                                 Movement direction
veloped software in Java to interface with the reader. Our
software sends commands to the reader over its HTTP in-                                    Figure 3. Tag orientation and antenna.
terface and the reader responds with a list of tags in XML
format. For all but the read range experiment, the readers                          and tag orientation with respect to the antenna, we per-
were operated in a buffered (continuous) read mode and our                          formed multiple experiments using 10 tags in parallel to
tracking results were independent of the application level                          each other. We mounted the tags on a cardboard box, and
polling speed.                                                                      used a cart to pass them in front of a single antenna with a
Read Range: The read range of RFID systems depends a                                speed of about 1 m/s and antenna-tag distance of 1 m. This
lot on their operating frequencies. For the UHF systems we                          represents a situation where items are carried by a conveyor
used, it is generally a few meters. To characterize the impact                      belt through a gate.
of the tag-antenna distance on read reliability, we placed 20                           We tested the combination of five different inter-tag dis-
tags in a single plane, parallel to the antenna. The tag place-                     tances: 0.3 mm, 4 mm, 10 mm, 20 mm, and 40 mm, and
ment is shown in Figure 1. Inter-tag distances were 12.5 cm                         six different tag orientations (Figure 3). We repeated each
and 20 cm along the x and y axes, respectively. Our exper-                          experiment at least 10 times. Figure 4 shows the average
iments showed that this distance is more than sufficient to                          number of tags read, and the upper and lower quartiles for
eliminate direct interference between tags. The tags were                           each experiment. We are interested in finding the minimum
fixed in position facing a single antenna, and a single read                         ‘safe’ distance between tags where they will not interfere
was performed each time. We repeated the read 40 times                              with each other. Our results show that, depending on ori-
for each distance. Figure 2 shows the average number of                             entation, tags require at least 20 to 40 mm spacing between
tags read, and the upper and lower quartiles. Our results                           them to operate in a reliable fashion. We can also see the ef-
show a 100% read reliability at a distance of 1 m. However,                         fect of tag orientation. It is not surprising that tag reads are
reliability gradually dropped between 2 m and 9 m.                                  least reliable when the tags are perpendicular to the antenna
                                                                                    (cases 1 and 5). Our results clearly indicate that current
Inter-Tag Distance and Tag Orientation: In many prac-
                                                                                    UHF tags would not work well for scenarios where tags are
tical scenarios, tags may be placed close to one other, in
                                                                                    placed very close to each other and are perpendicular to the
parallel, and/or in different orientations with regard to the
                                                                                    antenna, such as on book covers in a bookshelf.
antennas. To characterize the impacts of inter-tag distances
                                                                                    Object Tracking: In the previous experiments, the tags
                                                                                    were not attached to any objects. However, in real world
                                                                                    situations, tags are placed on objects that may interfere with
                        20                                                          RF signals. To measure RFID performance for realistic
                                                                                    case level and item level tagging, we individually tagged
Read tags (out of 20)




                                                                                    12 identical boxes, each containing a network router and
                        15
                                                                                    accessories in original packaging. The metal casing and
                                                                                    relatively large size of the routers compared to their packag-
                        10                                                          ing material would make them a challenging scenario for an
                                                                                    RFID system. We placed the boxes on a cart as three rows of
                         5                                                          2x2 boxes, and passed the cart in front of the antenna with a
                                                                                    speed of 1 m/s at a distance of 1 m. We performed this ex-
                         0                                                          periment for different tag locations, namely top, front, side
                             0     2            4          6         8         10   closer to antenna, and side farther from antenna. The ex-
                                                Distance (m )                       periments were repeated 12 times. Our results in Table 1
               Figure 2. Read reliability vs.                   antenna dis-        demonstrate that the location of a tag on an object has a
               tance.                                                               dramatic impact on the tag read reliability. Assuming that
 ¡                                                             @A                                                        cards and credit cards. We set out to evaluate the perfor-
      ©         1                                                     I       2                                                mance of passive RFID systems for human identification
      ¨                                                               H
 9
 8
 7
36
      §
                                                               x
                                                               w
                                                               sv
                                                                 y
                                                                      G                                                        and tracking.
45
3
 2
      ¦                                                        tu
                                                               s
                                                                 r
                                                                      F
                                                                                                                                  We experimented with multiple tag locations, and found
1     ¥                                                        q      E
&
0
)
(     ¤
                                                               f
                                                               p
                                                               h
                                                                i    D                                                         that for best performance, tags and antennas should be at
'                                                              g
&
%     £                                                        f
                                                               e      C
                                                                                                                               the same height, and tags should not touch the body. There-
      ¢                                                               B
       ¡                                                              A                                                        fore, we placed the tags at waist level, hanging from the belt
       
                        £             ¢               ¡    ¤
                                                                      @
                                                                          @          @C              @B              @A   @D
                                                                                                                               or pocket, as often seen with ID cards, to achieve best per-
                    $ # # " !                                      d c c b SaQ V R `Y X WV RU T S RQP
                                                                                                                               formance. We placed a tag on one or two volunteers and
                                                                     xy
                                                                                                                               they walked in front of an antenna at a distance of 1 meter.
                                                                              4
      €
       ‰        3                                                                                                             The volunteers tried to walk in parallel for the two person
 w
 v
 u
       ˆ
                                                                Ÿ
                                                                ž
                                                                
                                                                     €
                                                                     
                                                                                                                               tests to maximize blocking. This could resemble a typical
       ‡
qt
rs
q
       †
                                                               ™œ
                                                               š
                                                               ™
                                                                ›    ~                                                         case for people with a RFID tagged ID card passing through
o
j
n
m
 p
       …                                                       —
                                                               ’
                                                               –
                                                               •
                                                                ˜    }
                                                                                                                               a gate or doorway. It can also be used for human tracking
       „                                                             |
                                                                                                                               with room-level accuracy. We tested with multiple tag lo-
l                                                              ”
k                                                              “
j                                                              ’
                                                               ‘
i      ƒ                                                             {
       ‚                                                             z                                                         cations. Each test was repeated 20 times. From the results
                                                                      y
                                                                                                                               in Table 2, the read reliability averaged 63% for one sub-
       
       €                                                             x
           €           €ƒ             €‚
                    h g g f “e‘– ’ d™ ˜ —– ’•” “ ’‘
                                                     €   €„              x          x{              xz
                                                                                     Ž …ƒ ˆ „ Œ‹ Š ‰ˆ „‡† … „ƒ‚
                                                                                                                    xy    x|
                                                                                                                               ject. Blocking by the closer subject caused the two subject
                                                                                                                               read reliability to average 56%. Interestingly, read reliabili-
       ¡
       ©        5
                                                                     ÈÉ
                                                                      Ñ       6
                                                                                                                               ties for the closer subject in the two subject case was higher
 ÆÇ
       ¨
                                                                ï
                                                                      Ð                                                        than those for a single subject. Further tests showed the
                                                                î
                                                                                                                               reason was not the slightly closer distance. We attribute the
 Å     §                                                        í     Ï
ÁÄ                                                             éì
ÂÃ     ¦                                                       êë     Î
Á
¿
º
¾
  À
       ¥
                                                               é
                                                               ç
                                                               â
                                                               æ
                                                                è
                                                                      Í                                                        higher read reliabilities to signal reflections off the farther
 ½                                                             å
¼
»
º
¹
       ¤
       £
                                                               ä
                                                               ã
                                                               â
                                                               á
                                                                      Ì
                                                                      Ë
                                                                                                                               subject. The low reliability in all of these cases motivates
       ¢                                                              Ê                                                        us to apply simple fault-tolerance techniques.
       ¡                                                              É
                                                                      È
                        £             ¢
                    ¸ · · ¶ ­µ«° ¬ ´³² ±°¬¯ ® ­¬«ª
                                                    ¡      ¤              È          ÈË             ÈÊ
                                                                                  à ß ß Þ ÕÝÓØ Ô ÜÛ Ú ÙØ Ô× Ö Õ ÔÓÒ
                                                                                                                    ÈÉ    ÈÌ
                                                                                                                                  Table 2. Read reliability for tags on humans.
                                                                                                                                                    One                Two subjects
           Figure 4. Tag orientation and inter-tag dis-                                                                            Tag location     subject   Closer    Farther Average
           tance.                                                                                                                  Front / Back     75%       90%       50%        70%
                                                                                                                                   Side (closer)    90%       90%       50%        70%
tag read reliabilities are equal between the front and back                                                                        Side (farther)   10%       30%       0%         15%
of the box, and between the top and bottom of the box, the                                                                         Average          63%       75%       38%        56%
average read reliability for all locations is 63%. While guar-
anteeing the exact location of tags upon passing in front of
a reader is impractical for many scenarios, it is often prac-                                                                  4. Improving RFID Reliability
tical to avoid the worst locations (in this case, the top of the
box). Our measurements show determining and avoiding                                                                              We investigated the use of redundancy to improve the
the worst case locations can greatly improve average relia-                                                                    reliability of RFID systems and evaluated its effectiveness
bility. This is similar to the orientation tests, where two out                                                                through both analytical analysis and experimental measure-
of six orientations had considerably worse reliability.                                                                        ments. Redundancy in the form of replication is a widely
                                                                                                                               used fault-tolerance technique for improving reliability. It
                                                                                                                               can be applied to RFID systems in a number of ways: mul-
               Table 1. Read reliability for tags on objects.
                                           Tag location              Reliability                                               tiple antennas per portal, multiple readers per portal, or mul-
                                                  Front                87%                                                     tiple tags per object.
                                          Side (closer)                83%                                                        Multiple antennas mounted per portal is a widely used
                                          Side (farther)               63%                                                     technique and virtually all readers have built-in support for
                                                    Top                29%                                                     assigning two or more antennas to a single zone or portal.
                                               Average                 63%                                                     Even though readers employ measures such as TDMA to
                                                                                                                               prevent interference between two or more of their antennas,
Human Tracking: One application of RFID systems is                                                                             our initial observations showed a slight decrease in perfor-
tracking humans. Active tags have been employed for hu-                                                                        mance when blocking was not an issue. Nonetheless, in
man location sensing and tracking [11]. Passive RFID tags                                                                      realistic cases, there was a distinctive gain using multiple
are currently in use for identification purposes in access                                                                      antennas. For multiple antenna tests, we used two area an-
tennas placed at a distance of 2 meters from each other and                 Table 3. Redundancy for multiple objects.
                                                                    Antennas                tags/      Tag location               Avg reliability
connected to the same reader. While one might expect to
                                                                                            object                                RM      RC
see similar improvements for multiple readers per portal,
                                                                    2                       1          Front                      92%     98%
our measurement clearly showed the opposite: read relia-            2                       1          Side                       79%     94%
bility was severely reduced in our experiments. The reason                                             Average                    86%     96%
is reader-to-reader RF interference. While Gen 2 has stan-
                                                                    1                       2          Front + side (good)        97%     98%
dard measures to combat this problem, called dense-reader           1                       2          Front + side (bad)         96%     95%
mode, it is optional for readers. Our readers did not sup-                                             Average                    97%     97%
port dense-reader mode, and neither do most older Gen 2
                                                                    2                       2          Front + side               100% 99.9%
readers.
   While using multiple tags for each object seems straight-                 100%

forward, to the best of our knowledge it has not been eval-                        80%
uated before in scientific literature. Multiple tags on dif-                        60%




                                                                     Reliability
                                                                                                                                         Measured
ferent sides of an object and/or with different orientations                                                                             Calculated
                                                                                   40%
increases the probability that at least one of the tags is suc-
cessfully read by a reader. However, if the tags are too close,                    20%

they may interfere with one another and actually reduce the                        0%
read reliability. Furthermore, if the number of tags in the                              1 antenna, 2 antennas, 1 antenna, 2 antennas,
                                                                                            1 tag      1 tag      2 tags      2 tags
antenna read area gets large, it can take considerably longer
to read the tags.                                                        Figure 5. Object tracking with redundancy.
    We now use a simple analytical model for multiple tag
                                                                  4.2. Reliable Human Tracking
and/or antenna scenarios. We define every combination of
tag and antenna in the same area as a read opportunity. As-          To characterize the effect of reliability techniques for hu-
suming read opportunities are independent, if the reliabili-      man tracking, we repeated the same experiment as in Sec-
ties for read opportunities leading to an object identification    tion 3, while employing redundancy at different levels. We
are P1 , P2 ,, Pn , the expected object tracking reliability RC   present both experimental results and expected tracking re-
is:                                                               liability for the combination of two antennas per portal, and
        RC = 1 − ((1 − P1 )(1 − P2 )...(1 − Pn ))                 two or four tags per person. The results for 1-antenna and
                                                                  2-antenna cases are presented in Table 4 and Table 5 re-
We will next present our experimental results, and compare        spectively. The average performances for one-subject and
their performance with the analysis. All measurements and         two-subject cases are shown in Figure 6 and Figure 7, re-
conclusions in this section are dependent on not exceeding        spectively.
the minimum safe tag distances measured in Section 3.3,              Similar to object tracking, the performance of multiple
and allowing adequate time for all tags to be read, which is      tags per person is better than multiple antennas per portal.
around .02 sec per tag.                                           Using two tags instead of one, increases average reliability
                                                                  from 63% to 96% for 1-person cases, and from 56% to 83%
                                                                  in 2-person cases. Reliability virtually reaches 100% using
4.1. Reliable Object Tracking
                                                                  four tags per person or a combination of two tags per person
                                                                  and two antennas per portal.
   To characterize the effect of reliability techniques for ob-      We can clearly see that simple reliability techniques, es-
ject tracking, we repeated the same experiment as in Section      pecially using multiple tags per object, can significantly im-
3, while employing redundancy at different levels. We will        prove RFID system reliability to near 100%, even for appli-
present both the measured reliability RM and the expected         cations that previously seemed out of the domain of passive
reliability RC , where RC is calculated based on the read         RFID systems.
reliabilities measured in Section 3. We have investigated
the following cases: two antennas per portal instead of one,
                                                                                    Table 5. Human tracking, 2 antennas.
two tags per object instead of one, and two tags per object
                                                                    Tags per                                  One subject           Two Subjects
and two antennas per portal. The results for all cases are
                                                                    subject                Location         RM      RC             RM     RC
shown in Table 3 and Figure 5. Our measurements show                1                      Front/Back       80%     94%            90%    95%
the performance of multiple tags per object is better than          1                      Side             90%     91%            80%    78%
multiple antennas per portal, and very similar to the analyt-       2                      Front/Back       100% 99.6%             100% 99.8%
ical model. Using two tags instead of one, we increased the         2                      Sides            100% 99.2%             95%    97%
average object tracking reliability from 80% to 97%.                4                      F/B/Sides        100% 100%              100% 99.9%
Table 4. Human tracking reliability, 1 antenna.
                             Tags                                           One subject                                          Two Subjects
                             per                                                                                       RM                            RC
                             subject           Location                  RM                 RC              Closer    Farther    Avg      Closer    Farther    Avg
                             2                 Front/Back                100%               94%             100%      90%        95%      99%       75%        88%
                             2                 Sides                     93%                91%             90%       50%        70%      93%       50%        72%
                             4                 F/ B/Sides                100%               99.5%           100%      100%       100%     99%       88%        94%

    ¡  ¦
                                                                                                                     ture extensions of this work involve experimenting with ac-
     ¡ ¥                                                                                                             tive tags, and tag reliability for different tag designs.
   ¡ ¤ !
       
        
        
                                                                                             %$# §              References
                                                                                            % ©§'# ('§
        
   ¡ £ 
       
                                                                                                                      [1] Pharmaceutical RFID pilot finds promise, problems. In
     ¡ ¢
                                                                                                                          RFID Update, Nov. 15th, 2006, http://www.rfidupdate.com.
                                                                                                                      [2] Wal-Mart details RFID requirement. In RFID Journal, Nov.
      ¡                                                                                                                   6, 2003, http://www.rfidjournal.com.
             §¨¨ ©¨§ ¢ §¨¨©¨§ ¦  §¨¨ ©¨§ ¢ §¨¨ ©¨§ ¦  §¨¨ ©¨§ ¢ §¨¨ ©¨§ ¦
                § © £     § © £      § © ¢     § © ¢       § © ¦       § © ¦                                [3] D. Bradbury. RFID: It’s no supply chain savior - not yet any-
                                                                                                                          way. silicon.com, Sep. 8, 2004, http://management.silicon.-
             Figure 6. Tracking of one subject.                                                                           com/itdirector/.
                                                                                                                      [4] J. Brusey, C. Floerkemeier, M. Harrison, and M. Fletcher.
    0))5                                                                                                                  Reasoning about uncertainty in location identification with
                                                                                                                          RFID. In Workshop on Reasoning with Uncertainty in
     0)4                                                                                                                  Robotics at IJCAI, Aug. 2003.
                                                                                                                      [5] S. Garfinkel, A. Juels, and R. Pappu. RFID privacy: an
   0)3 PI
       H
        F
        E
        F                                                                                     T9SR B69Q                   overview of problems and proposed solutions. In IEEE Se-
       G
        F
   0)2 DE
                                                                                             T9 86VR WV6U                 curity and Privacy Magazine, 3(3): 34–43, 2005.
       C
                                                                                                                      [6] S. Inoue, D. Hagiwara, and H. Yasuura. Systematic error
     0)1                                                                                                                  detection for RFID reliability. In Conf. Avail., Rel. and Sec.
                                                                                                                          (ARES 2006), pages 280–286.
      0)                                                                                                              [7] A. Juels, R. Rivest, and M. Szydlo. The blocker tag: selective
            @ B6779 876 1 @6779 876 5 @ B6779 876 1 @6779 876 5 @ B6779 876 1 @6779 876 5
                BA6 8 2     BA6 8 2       BA6 8 1     BA6 8 1       A6 8 5       A6 8 5
                                                                                                                          blocking of RFID tags for consumer privacy. In 10th ACM
                                                                                                                          Conf. Comp. and Comm. Sec., pages 103–111, 2003.
               Figure 7. Tracking of 2 subjects.                                                                      [8] G. Karjoth and P. Moskowitz. Disabling RFID tags with vis-
                                                                                                                          ible confirmation: clipped tags are silenced. In 2005 ACM
                                                                                                                          Workshop on Privacy in the Electronic Society, pages 27–30.
5. Conclusion                                                                                                         [9] M. Kodialam and T. Nandagopal. Fast and reliable estima-
                                                                                                                          tion schemes in RFID systems. In Proc. 12th MOBICOM,
                                                                                                                          pages 322–333, Sep. 2006.
   In this work, we conducted extensive controlled mea-                                                              [10] J. Lindsay and W. Reade. Cascading RFID tags. Dec. 23,
surements to characterize the reliability of passive RFID                                                                 2003, http://www.jefflindsay.com/rfid3.shtml.
tags for tracking mobile objects and humans. Our measure-                                                            [11] L. Ni, Y. Liu, Y. Lau, and A. Patil. LANDMARC: Indoor
ments revealed critical insights into how reliability depends                                                             location sensing using active RFID. In Wireless Networks,
                                                                                                                          10(6): 701-710. 2004.
on various practical factors, such as inter-tag distances, lo-
                                                                                                                     [12] K. Ramakrishnan and D. Deavours. Performance bench-
cation of the tag on an object, and tag orientation. To                                                                   marks for passive UHF RFID tags. In 13th GI/ITG Conf.
improve reliability, we explored simple and cost-effective                                                                Measurement, Modeling, and Eval. of Comp. and Comm.
reliability techniques, namely redundancy at the tag level,                                                               Sys., pages 137-154, 2006.
the antenna level, and the reader level. Our measurement                                                             [13] M. Rieback, B. Crispo, and A. Tanenbaum. The evolution of
                                                                                                                          RFID security. In IEEE Perv. Comp. 5(1): 62-69, 2006.
clearly showed the high effectiveness of tag-level redun-
                                                                                                                     [14] E. Schuman. RFID trials show mixed results. eWEEK.com,
dancy, followed by antenna-level redundancy, in increas-                                                                  Nov. 15, 2006, http://www.eweek.com/.
ing system reliability. Because our readers did not sup-                                                             [15] R. Shawn, G. Minos, and J. Michael. Adaptive cleaning for
port dense-reader mode, reader-level redundancy severely                                                                  RFID data streams. In Proc. 32nd VLDB, pages 163–174,
reduced reliability in our experiments, due to reader-reader                                                              2006.
                                                                                                                     [16] H. Stockman. Communication by means of reflected power.
interference. To the best of our knowledge, our work is                                                                   In Proc. IRE, 36, pages 1196-1204, 1948.
the first that systematically characterizes the reliability of                                                        [17] N. Vaidya and S. Das. RFID-based networks - exploiting
RFID systems and its dependence on various practical fac-                                                                 diversity and redundancy, UIUC, WINGS Lab TR, 2006.
tors. Our results provide important guidelines for real-world                                                        [18] Vogt, H. Multiple object identification with passive RFID
deployment of RFID-based tracking applications as well as                                                                 tags. In IEEE Conf. Systems, Man and Cybernetics, Vol. 3,
                                                                                                                          pages 6-9, Oct 2002.
simple yet effective solutions to guarantee reliability. Fu-

Weitere ähnliche Inhalte

Was ist angesagt?

RFID Protocols and Privacy Models for RFID
RFID Protocols and Privacy Models for RFIDRFID Protocols and Privacy Models for RFID
RFID Protocols and Privacy Models for RFIDFaisal Razzak
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...ijasuc
 
Localization of rfid equipped assets during the operation phase of facilities...
Localization of rfid equipped assets during the operation phase of facilities...Localization of rfid equipped assets during the operation phase of facilities...
Localization of rfid equipped assets during the operation phase of facilities...Ferheen Khan
 
Passive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessPassive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessDavid Sweigert
 
A Novel RFID Readers Employee Management System
A Novel RFID Readers Employee Management SystemA Novel RFID Readers Employee Management System
A Novel RFID Readers Employee Management SystemIJMTST Journal
 
ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH A...
ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH A...ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH A...
ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH A...IJNSA Journal
 
IRJET - Designing a High Level Co-Orporeate Network Infrastructure with MPLS ...
IRJET - Designing a High Level Co-Orporeate Network Infrastructure with MPLS ...IRJET - Designing a High Level Co-Orporeate Network Infrastructure with MPLS ...
IRJET - Designing a High Level Co-Orporeate Network Infrastructure with MPLS ...IRJET Journal
 
Novel construction of Secure RFID Authentication Protocol
Novel construction of Secure RFID Authentication ProtocolNovel construction of Secure RFID Authentication Protocol
Novel construction of Secure RFID Authentication ProtocolCSCJournals
 
Radio Frequency identification (RFID)
Radio Frequency identification (RFID)Radio Frequency identification (RFID)
Radio Frequency identification (RFID)Kamel Alhomsi
 
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...CSCJournals
 
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Kumar Goud
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
 
Table-Based Identification Protocol of Compuatational RFID Tags
Table-Based Identification Protocol of Compuatational RFID Tags Table-Based Identification Protocol of Compuatational RFID Tags
Table-Based Identification Protocol of Compuatational RFID Tags csandit
 

Was ist angesagt? (19)

RFID Protocols and Privacy Models for RFID
RFID Protocols and Privacy Models for RFIDRFID Protocols and Privacy Models for RFID
RFID Protocols and Privacy Models for RFID
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
 
Localization of rfid equipped assets during the operation phase of facilities...
Localization of rfid equipped assets during the operation phase of facilities...Localization of rfid equipped assets during the operation phase of facilities...
Localization of rfid equipped assets during the operation phase of facilities...
 
Passive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessPassive monitoring to build Situational Awareness
Passive monitoring to build Situational Awareness
 
Rfid
Rfid Rfid
Rfid
 
A Novel RFID Readers Employee Management System
A Novel RFID Readers Employee Management SystemA Novel RFID Readers Employee Management System
A Novel RFID Readers Employee Management System
 
Jt2416841691
Jt2416841691Jt2416841691
Jt2416841691
 
ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH A...
ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH A...ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH A...
ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH A...
 
Ew25914917
Ew25914917Ew25914917
Ew25914917
 
Mit autoid-wh-007
Mit autoid-wh-007Mit autoid-wh-007
Mit autoid-wh-007
 
IRJET - Designing a High Level Co-Orporeate Network Infrastructure with MPLS ...
IRJET - Designing a High Level Co-Orporeate Network Infrastructure with MPLS ...IRJET - Designing a High Level Co-Orporeate Network Infrastructure with MPLS ...
IRJET - Designing a High Level Co-Orporeate Network Infrastructure with MPLS ...
 
Novel construction of Secure RFID Authentication Protocol
Novel construction of Secure RFID Authentication ProtocolNovel construction of Secure RFID Authentication Protocol
Novel construction of Secure RFID Authentication Protocol
 
Ii2514901494
Ii2514901494Ii2514901494
Ii2514901494
 
Radio Frequency identification (RFID)
Radio Frequency identification (RFID)Radio Frequency identification (RFID)
Radio Frequency identification (RFID)
 
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
 
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
 
RFID PROTOCOL
RFID PROTOCOLRFID PROTOCOL
RFID PROTOCOL
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
 
Table-Based Identification Protocol of Compuatational RFID Tags
Table-Based Identification Protocol of Compuatational RFID Tags Table-Based Identification Protocol of Compuatational RFID Tags
Table-Based Identification Protocol of Compuatational RFID Tags
 

Ähnlich wie 07.dsn.rfid reliability

A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodA Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodLuz Martinez
 
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)inventionjournals
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDEditor IJCATR
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDEditor IJCATR
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDEditor IJCATR
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDEditor IJCATR
 
RFID Taxonomy
RFID TaxonomyRFID Taxonomy
RFID Taxonomyshassant2
 
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleIJERA Editor
 
International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI) International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI) inventionjournals
 
Internet of Things and its Enabling Technologies - RFID
Internet of Things  and its Enabling Technologies - RFIDInternet of Things  and its Enabling Technologies - RFID
Internet of Things and its Enabling Technologies - RFIDSwetha Kogatam
 
RFID Technology: An Upgradation for Society
RFID Technology: An Upgradation for SocietyRFID Technology: An Upgradation for Society
RFID Technology: An Upgradation for SocietyIRJET Journal
 
A sector analysis for rfid human implantation
A sector analysis for rfid human implantationA sector analysis for rfid human implantation
A sector analysis for rfid human implantationAlexander Decker
 
A sector analysis for rfid human implantation
A sector analysis for rfid human implantationA sector analysis for rfid human implantation
A sector analysis for rfid human implantationAlexander Decker
 
Radio_Frequency_Identification_RFID_Based_Car_Park.pdf
Radio_Frequency_Identification_RFID_Based_Car_Park.pdfRadio_Frequency_Identification_RFID_Based_Car_Park.pdf
Radio_Frequency_Identification_RFID_Based_Car_Park.pdfManju Badiger
 
Running Head RFID Transportation2RFID in Tr.docx
Running Head RFID Transportation2RFID in Tr.docxRunning Head RFID Transportation2RFID in Tr.docx
Running Head RFID Transportation2RFID in Tr.docxtoltonkendal
 
The Locator Framework for Detecting Movement Indoors
The Locator Framework for Detecting Movement IndoorsThe Locator Framework for Detecting Movement Indoors
The Locator Framework for Detecting Movement IndoorsTELKOMNIKA JOURNAL
 
Rfid based road toll tax
Rfid based road toll taxRfid based road toll tax
Rfid based road toll taxangel300692
 
Implementation of radio frequency identification technology in accessing info...
Implementation of radio frequency identification technology in accessing info...Implementation of radio frequency identification technology in accessing info...
Implementation of radio frequency identification technology in accessing info...eSAT Journals
 

Ähnlich wie 07.dsn.rfid reliability (20)

Rfid3
Rfid3Rfid3
Rfid3
 
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodA Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
 
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFID
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFID
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFID
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFID
 
RFID Taxonomy
RFID TaxonomyRFID Taxonomy
RFID Taxonomy
 
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
 
International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI) International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI)
 
Internet of Things and its Enabling Technologies - RFID
Internet of Things  and its Enabling Technologies - RFIDInternet of Things  and its Enabling Technologies - RFID
Internet of Things and its Enabling Technologies - RFID
 
RFID security ppt
RFID security pptRFID security ppt
RFID security ppt
 
RFID Technology: An Upgradation for Society
RFID Technology: An Upgradation for SocietyRFID Technology: An Upgradation for Society
RFID Technology: An Upgradation for Society
 
A sector analysis for rfid human implantation
A sector analysis for rfid human implantationA sector analysis for rfid human implantation
A sector analysis for rfid human implantation
 
A sector analysis for rfid human implantation
A sector analysis for rfid human implantationA sector analysis for rfid human implantation
A sector analysis for rfid human implantation
 
Radio_Frequency_Identification_RFID_Based_Car_Park.pdf
Radio_Frequency_Identification_RFID_Based_Car_Park.pdfRadio_Frequency_Identification_RFID_Based_Car_Park.pdf
Radio_Frequency_Identification_RFID_Based_Car_Park.pdf
 
Running Head RFID Transportation2RFID in Tr.docx
Running Head RFID Transportation2RFID in Tr.docxRunning Head RFID Transportation2RFID in Tr.docx
Running Head RFID Transportation2RFID in Tr.docx
 
The Locator Framework for Detecting Movement Indoors
The Locator Framework for Detecting Movement IndoorsThe Locator Framework for Detecting Movement Indoors
The Locator Framework for Detecting Movement Indoors
 
Rfid based road toll tax
Rfid based road toll taxRfid based road toll tax
Rfid based road toll tax
 
Implementation of radio frequency identification technology in accessing info...
Implementation of radio frequency identification technology in accessing info...Implementation of radio frequency identification technology in accessing info...
Implementation of radio frequency identification technology in accessing info...
 

Kürzlich hochgeladen

A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdftbatkhuu1
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdftbatkhuu1
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 DelhiCall Girls in Delhi
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseri bangash
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 

Kürzlich hochgeladen (20)

A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdf
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdf
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 

07.dsn.rfid reliability

  • 1. Reliability Techniques for RFID-Based Object Tracking Applications Ahmad Rahmati, Lin Zhong Matti Hiltunen, Rittwik Jana Dept. of ECE, Rice University AT&T Labs - Research Houston, TX 77005 Florham Park, NJ 07932 {rahmati, lzhong}@rice.edu {hiltunen, rjana}@research.att.com Abstract rity challenges, such as remote spying on people and their possessions, have received considerable attention from both Radio Frequency Identification (RFID) technology has media and academia [5, 7, 8, 13]. Nevertheless, the reliabil- the potential to dramatically improve numerous industrial ity challenges have only recently been noted [4, 6, 12, 15, practices. However, it still faces many challenges, including 17]. Unfortunately, poor reliability may render RFID tech- security and reliability, which may limit its use in many ap- nology practically infeasible for many application scenar- plication scenarios. While security has received consider- ios, as highlighted by pilot studies in [1, 2, 3, 14]. able attention, reliability has escaped much of the research In this work, we experimentally examined and measured scrutiny. In this work, we investigate the reliability chal- the reliability challenges in RFID systems and their major lenges in RFID-based tracking applications, where objects causes. Our focus is on the reliability of reading low-cost (e.g., pallets, packages, and people) tagged with low-cost passive UHF tags, particularly tracking tagged mobile ob- passive RFID tags pass by the RFID reader’s read zone. jects that pass unimpeded by an RFID antenna. Our re- Our experiments show that the reliability of tag identifica- search highlights the reliability challenges in RFID tech- tion is affected by several factors, including the inter-tag nology: passive tags have a much weaker signal, a much distance, the distance between the tag and antenna, the ori- shorter communication range, and thus much lower read re- entation of the tag with respect to the antenna, and the lo- liability than battery-powered, active, RFID tags. Nonethe- cation of the tag on the object. We demonstrate that RFID less, our techniques and results can be applied to other system reliability can be significantly improved with the ap- RFID systems as well, including active tag systems. plication of simple redundancy techniques. The rest of the paper is structured as follows. We start with an overview of RFID systems, their reliability chal- lenges, and related work in Section 2. We present our find- 1. Introduction ings on how the reliability depends on range, orientation, and the effect of multiple tags in Section 3. We also pro- RFID leverages electromagnetic or electrostatic cou- vide experimental results from two real world applications pling in the radio frequency portion of the electromagnetic of RFID systems, namely identification and tracking of ob- spectrum to identify objects over a distance of potentially jects and humans. We investigate the use of fault-tolerance several meters. While its origins can be traced back to techniques and their impact on reliability in Section 4. Fi- 1940s (e.g., [16]), its commercial applications have started nally, we conclude in Section 5. expanding significantly recently as a replacement or supple- ment to barcode technology, thanks in part to standardiza- 2. Overview tion, availability of commercial off-the -shelf (COTS) com- ponents, and their reducing cost1 . RFID systems are em- The application of RFID technology requires RFID tags ployed to track shipments and manage supply-chains (e.g., attached to objects and an infrastructure for reading the tags Wal-Mart [2]) and to automate toll collection on highways, and processing tag information. The infrastructure typically and are being deployed for many new application areas consists of antennas, readers (each typically controlling 1 (e.g., passports, airline boarding passes, luggage tags, etc.). to 4 antennas), and a back-end system with edge servers, However, practical applications of RFID technology face application servers, and databases. An antenna employs RF significant security and reliability challenges. The secu- signal to activate the tag, which then responds with its data, 1 For example, in May 2006, SmartCode announced a price of $0.05 per typically a unique 96 bit identification code and some asset EPC Gen 2 tag in volumes of 100 million (www.smartcodecorp.com). related data. The reader collects the data and forwards it
  • 2. to the back-end system. The back-end system implements tags (e.g., removal of tag antenna [8] or removal of the the logic and actions for when a tag is identified. The logic whole tag), hiding of tags by shielding them, or interfering can be as simple as opening a door, setting off an alarm, with the read protocol [7]. Furthermore, we do not consider updating an database, or complicated, such as an integrated modifications to the RFID protocol itself such as better col- management and monitoring for shipment tracking. lision control algorithms that can significantly improve re- liability in multiple tag situations [9, 18]. 2.1. Reliability: Definitions and Challenges 2.2. Related work We define the read reliability as the probability that an RFID reader successfully detects and identifies an RFID tag Several recent pilot studies have evaluated the reliabil- when it is in the read range of one of the reader’s antennas. ity aspects of RFID technology. A pilot study of a phar- Similarly, we define the tracking reliability of an RFID sys- maceutical supply-chain tracking system [1] observed read tem as the probability that the system successfully detects reliabilities ranging from under 10% to 100% for item-level and identifies an object when it is present in a designated and case-level tags in different stages of the shipping pro- area. Note that the system-level definition of tracking relia- cess. A performance benchmark [12] presented the results bility obviates a one-to-one mapping between a tag and an from number of experiments including read speed for a pop- object. For example, an object may carry multiple tags or ulation of stationary tags and read reliability for different a human may be identified indirectly based on tagged ob- tagged materials on a conveyer belt. However, neither work jects in his possession. In this paper, we will only consider attempted to develop techniques to improve reliability. the reliability of detection and identification of tags and/or Other research efforts have proposed techniques to im- objects, not the reliability of the individual system compo- prove the reliability of RFID systems. In [10], the authors nents or the actions taken by the system logic. propose a cascaded tagging approach, where in addition to There are many factors that can impact read reliability, normal item level tags, the cases, pallets, and truckloads are including the type of material surrounding a tag (e.g., met- tagged with ‘macro tags’. A macro tag provides informa- als or liquids), the inter-tag distance, the orientation of the tion about the tags contained in the macro tagged collec- tags with respect to the antenna, the tag-antenna distance, tion. The macro tags are typically different from the item- the number of tags in the read range of the antenna, and the level tags to make them easier to detect, for example, they speed of the tagged objects. Materials such as metals and may have larger antennas or be active tags. In this paper, liquids not only block the signal when the material is placed we only consider techniques that use identical tags. In [17], between the antenna and the tag, but may act as a grounding the authors propose redundancy and diversity of antennas, plate if the tag is too close to the material even if the mate- readers, and tags, as methods to increase system reliability. rial is not between the tag and the antenna. Tags placed too Neither of these two efforts evaluates the effectiveness of close to one another also interfere with each others opera- their proposed techniques. Finally, in [6], the authors pro- tion. The orientation of the tags, specifically, the orientation pose to use real-world constraints to correct missed reads of the tag’s antenna with regard to the reader antenna has a for tracking mobile objects. Specifically, they consider con- large impact on how much of the reader signal the tag is straints related to possible physical movement paths of ob- able to absorb. The number of tags in the read range of an jects (‘route constraint’) and known groupings of tagged ob- antenna affects reliability because only one tag can be read jects (‘accompany constraint’). concurrently but multiple tags may respond in a given read slot, causing collisions. State of the art RFID systems use 3. RFID Reliability Experiments and Results sophisticated collision control mechanisms to reduce colli- sions. Finally, higher object speeds limit the time when tags To highlight the reliability challenge in current state of are visible to an antenna. the art EPC Gen 2 RFID systems, we have conducted nu- RFID measurements are particularly prone to false neg- merous experiments that reproduce various real-world situ- ative reads, where a tag present in the read range of an an- ations in our lab using COTS components. We used single- tenna is not detected. In some cases, it is also possible to dipole Gen 2 tags from Symbol Technologies, which had an get false positive reads, where RFID tags might be read antenna patch size of 2.5 cm by 10 cm. We used the Matrix from outside the region normally associated with the an- AR400 reader along with a single area antenna. We used tenna, leading to a misbelief that the object is near the an- the default settings on the reader, which included a maxi- tenna [3]. We focus on false negatives since false positives mum power output of 30 dBm (1 watt). While our exper- can typically be eliminated by increasing the distance be- iments consider only one type of tags, readers, and anten- tween antennas and/or by decreasing the power output of nas, our results offer insights to (1) a number of important the readers. parameters impacting RFID system reliability, and (2) the Note that we do not consider intentional destruction of effectiveness of system-level reliability techniques. We de-
  • 3. £¢ ¡ ¤ 32 cm £¢ ¡  £¢ ¦¥ ¤  Inter-tag distance £¢ ¦¥ ¤ Antenna 72 y cm 1 2 x 3 4 5 6 Figure 1. Tag placement for read range exp. Movement direction veloped software in Java to interface with the reader. Our software sends commands to the reader over its HTTP in- Figure 3. Tag orientation and antenna. terface and the reader responds with a list of tags in XML format. For all but the read range experiment, the readers and tag orientation with respect to the antenna, we per- were operated in a buffered (continuous) read mode and our formed multiple experiments using 10 tags in parallel to tracking results were independent of the application level each other. We mounted the tags on a cardboard box, and polling speed. used a cart to pass them in front of a single antenna with a Read Range: The read range of RFID systems depends a speed of about 1 m/s and antenna-tag distance of 1 m. This lot on their operating frequencies. For the UHF systems we represents a situation where items are carried by a conveyor used, it is generally a few meters. To characterize the impact belt through a gate. of the tag-antenna distance on read reliability, we placed 20 We tested the combination of five different inter-tag dis- tags in a single plane, parallel to the antenna. The tag place- tances: 0.3 mm, 4 mm, 10 mm, 20 mm, and 40 mm, and ment is shown in Figure 1. Inter-tag distances were 12.5 cm six different tag orientations (Figure 3). We repeated each and 20 cm along the x and y axes, respectively. Our exper- experiment at least 10 times. Figure 4 shows the average iments showed that this distance is more than sufficient to number of tags read, and the upper and lower quartiles for eliminate direct interference between tags. The tags were each experiment. We are interested in finding the minimum fixed in position facing a single antenna, and a single read ‘safe’ distance between tags where they will not interfere was performed each time. We repeated the read 40 times with each other. Our results show that, depending on ori- for each distance. Figure 2 shows the average number of entation, tags require at least 20 to 40 mm spacing between tags read, and the upper and lower quartiles. Our results them to operate in a reliable fashion. We can also see the ef- show a 100% read reliability at a distance of 1 m. However, fect of tag orientation. It is not surprising that tag reads are reliability gradually dropped between 2 m and 9 m. least reliable when the tags are perpendicular to the antenna (cases 1 and 5). Our results clearly indicate that current Inter-Tag Distance and Tag Orientation: In many prac- UHF tags would not work well for scenarios where tags are tical scenarios, tags may be placed close to one other, in placed very close to each other and are perpendicular to the parallel, and/or in different orientations with regard to the antenna, such as on book covers in a bookshelf. antennas. To characterize the impacts of inter-tag distances Object Tracking: In the previous experiments, the tags were not attached to any objects. However, in real world situations, tags are placed on objects that may interfere with 20 RF signals. To measure RFID performance for realistic case level and item level tagging, we individually tagged Read tags (out of 20) 12 identical boxes, each containing a network router and 15 accessories in original packaging. The metal casing and relatively large size of the routers compared to their packag- 10 ing material would make them a challenging scenario for an RFID system. We placed the boxes on a cart as three rows of 5 2x2 boxes, and passed the cart in front of the antenna with a speed of 1 m/s at a distance of 1 m. We performed this ex- 0 periment for different tag locations, namely top, front, side 0 2 4 6 8 10 closer to antenna, and side farther from antenna. The ex- Distance (m ) periments were repeated 12 times. Our results in Table 1 Figure 2. Read reliability vs. antenna dis- demonstrate that the location of a tag on an object has a tance. dramatic impact on the tag read reliability. Assuming that
  • 4.  ¡ @A cards and credit cards. We set out to evaluate the perfor- © 1 I 2 mance of passive RFID systems for human identification ¨ H 9 8 7 36 § x w sv y G and tracking. 45 3 2 ¦ tu s r F We experimented with multiple tag locations, and found 1 ¥ q E & 0 ) ( ¤ f p h i D that for best performance, tags and antennas should be at ' g & % £ f e C the same height, and tags should not touch the body. There- ¢ B ¡ A fore, we placed the tags at waist level, hanging from the belt      £  ¢  ¡  ¤ @ @ @C @B @A @D or pocket, as often seen with ID cards, to achieve best per- $ # # " ! d c c b SaQ V R `Y X WV RU T S RQP formance. We placed a tag on one or two volunteers and xy they walked in front of an antenna at a distance of 1 meter. 4 € ‰ 3  The volunteers tried to walk in parallel for the two person w v u ˆ Ÿ ž  €  tests to maximize blocking. This could resemble a typical ‡ qt rs q † ™œ š ™ › ~ case for people with a RFID tagged ID card passing through o j n m p … — ’ – • ˜ } a gate or doorway. It can also be used for human tracking „ | with room-level accuracy. We tested with multiple tag lo- l ” k “ j ’ ‘ i ƒ { ‚ z cations. Each test was repeated 20 times. From the results y in Table 2, the read reliability averaged 63% for one sub-  € x € €ƒ €‚ h g g f “e‘– ’ d™ ˜ —– ’•” “ ’‘ € €„ x x{ xz    Ž …ƒ ˆ „ Œ‹ Š ‰ˆ „‡† … „ƒ‚ xy x| ject. Blocking by the closer subject caused the two subject read reliability to average 56%. Interestingly, read reliabili-  ¡ © 5 ÈÉ Ñ 6 ties for the closer subject in the two subject case was higher ÆÇ ¨ ï Ð than those for a single subject. Further tests showed the î reason was not the slightly closer distance. We attribute the Å § í Ï ÁÄ éì Âà ¦ êë Î Á ¿ º ¾ À ¥ é ç â æ è Í higher read reliabilities to signal reflections off the farther ½ å ¼ » º ¹ ¤ £ ä ã â á Ì Ë subject. The low reliability in all of these cases motivates ¢ Ê us to apply simple fault-tolerance techniques. ¡ É   È    £  ¢ ¸ · · ¶ ­µ«° ¬ ´³² ±°¬¯ ® ­¬«ª  ¡  ¤ È ÈË ÈÊ à ß ß Þ ÕÝÓØ Ô ÜÛ Ú ÙØ Ô× Ö Õ ÔÓÒ ÈÉ ÈÌ Table 2. Read reliability for tags on humans. One Two subjects Figure 4. Tag orientation and inter-tag dis- Tag location subject Closer Farther Average tance. Front / Back 75% 90% 50% 70% Side (closer) 90% 90% 50% 70% tag read reliabilities are equal between the front and back Side (farther) 10% 30% 0% 15% of the box, and between the top and bottom of the box, the Average 63% 75% 38% 56% average read reliability for all locations is 63%. While guar- anteeing the exact location of tags upon passing in front of a reader is impractical for many scenarios, it is often prac- 4. Improving RFID Reliability tical to avoid the worst locations (in this case, the top of the box). Our measurements show determining and avoiding We investigated the use of redundancy to improve the the worst case locations can greatly improve average relia- reliability of RFID systems and evaluated its effectiveness bility. This is similar to the orientation tests, where two out through both analytical analysis and experimental measure- of six orientations had considerably worse reliability. ments. Redundancy in the form of replication is a widely used fault-tolerance technique for improving reliability. It can be applied to RFID systems in a number of ways: mul- Table 1. Read reliability for tags on objects. Tag location Reliability tiple antennas per portal, multiple readers per portal, or mul- Front 87% tiple tags per object. Side (closer) 83% Multiple antennas mounted per portal is a widely used Side (farther) 63% technique and virtually all readers have built-in support for Top 29% assigning two or more antennas to a single zone or portal. Average 63% Even though readers employ measures such as TDMA to prevent interference between two or more of their antennas, Human Tracking: One application of RFID systems is our initial observations showed a slight decrease in perfor- tracking humans. Active tags have been employed for hu- mance when blocking was not an issue. Nonetheless, in man location sensing and tracking [11]. Passive RFID tags realistic cases, there was a distinctive gain using multiple are currently in use for identification purposes in access antennas. For multiple antenna tests, we used two area an-
  • 5. tennas placed at a distance of 2 meters from each other and Table 3. Redundancy for multiple objects. Antennas tags/ Tag location Avg reliability connected to the same reader. While one might expect to object RM RC see similar improvements for multiple readers per portal, 2 1 Front 92% 98% our measurement clearly showed the opposite: read relia- 2 1 Side 79% 94% bility was severely reduced in our experiments. The reason Average 86% 96% is reader-to-reader RF interference. While Gen 2 has stan- 1 2 Front + side (good) 97% 98% dard measures to combat this problem, called dense-reader 1 2 Front + side (bad) 96% 95% mode, it is optional for readers. Our readers did not sup- Average 97% 97% port dense-reader mode, and neither do most older Gen 2 2 2 Front + side 100% 99.9% readers. While using multiple tags for each object seems straight- 100% forward, to the best of our knowledge it has not been eval- 80% uated before in scientific literature. Multiple tags on dif- 60% Reliability Measured ferent sides of an object and/or with different orientations Calculated 40% increases the probability that at least one of the tags is suc- cessfully read by a reader. However, if the tags are too close, 20% they may interfere with one another and actually reduce the 0% read reliability. Furthermore, if the number of tags in the 1 antenna, 2 antennas, 1 antenna, 2 antennas, 1 tag 1 tag 2 tags 2 tags antenna read area gets large, it can take considerably longer to read the tags. Figure 5. Object tracking with redundancy. We now use a simple analytical model for multiple tag 4.2. Reliable Human Tracking and/or antenna scenarios. We define every combination of tag and antenna in the same area as a read opportunity. As- To characterize the effect of reliability techniques for hu- suming read opportunities are independent, if the reliabili- man tracking, we repeated the same experiment as in Sec- ties for read opportunities leading to an object identification tion 3, while employing redundancy at different levels. We are P1 , P2 ,, Pn , the expected object tracking reliability RC present both experimental results and expected tracking re- is: liability for the combination of two antennas per portal, and RC = 1 − ((1 − P1 )(1 − P2 )...(1 − Pn )) two or four tags per person. The results for 1-antenna and 2-antenna cases are presented in Table 4 and Table 5 re- We will next present our experimental results, and compare spectively. The average performances for one-subject and their performance with the analysis. All measurements and two-subject cases are shown in Figure 6 and Figure 7, re- conclusions in this section are dependent on not exceeding spectively. the minimum safe tag distances measured in Section 3.3, Similar to object tracking, the performance of multiple and allowing adequate time for all tags to be read, which is tags per person is better than multiple antennas per portal. around .02 sec per tag. Using two tags instead of one, increases average reliability from 63% to 96% for 1-person cases, and from 56% to 83% in 2-person cases. Reliability virtually reaches 100% using 4.1. Reliable Object Tracking four tags per person or a combination of two tags per person and two antennas per portal. To characterize the effect of reliability techniques for ob- We can clearly see that simple reliability techniques, es- ject tracking, we repeated the same experiment as in Section pecially using multiple tags per object, can significantly im- 3, while employing redundancy at different levels. We will prove RFID system reliability to near 100%, even for appli- present both the measured reliability RM and the expected cations that previously seemed out of the domain of passive reliability RC , where RC is calculated based on the read RFID systems. reliabilities measured in Section 3. We have investigated the following cases: two antennas per portal instead of one, Table 5. Human tracking, 2 antennas. two tags per object instead of one, and two tags per object Tags per One subject Two Subjects and two antennas per portal. The results for all cases are subject Location RM RC RM RC shown in Table 3 and Figure 5. Our measurements show 1 Front/Back 80% 94% 90% 95% the performance of multiple tags per object is better than 1 Side 90% 91% 80% 78% multiple antennas per portal, and very similar to the analyt- 2 Front/Back 100% 99.6% 100% 99.8% ical model. Using two tags instead of one, we increased the 2 Sides 100% 99.2% 95% 97% average object tracking reliability from 80% to 97%. 4 F/B/Sides 100% 100% 100% 99.9%
  • 6. Table 4. Human tracking reliability, 1 antenna. Tags One subject Two Subjects per RM RC subject Location RM RC Closer Farther Avg Closer Farther Avg 2 Front/Back 100% 94% 100% 90% 95% 99% 75% 88% 2 Sides 93% 91% 90% 50% 70% 93% 50% 72% 4 F/ B/Sides 100% 99.5% 100% 100% 100% 99% 88% 94% ¡  ¦ ture extensions of this work involve experimenting with ac- ¡ ¥ tive tags, and tag reliability for different tag designs. ¡ ¤ ! %$# § References % ©§'# ('§ ¡ £ [1] Pharmaceutical RFID pilot finds promise, problems. In ¡ ¢ RFID Update, Nov. 15th, 2006, http://www.rfidupdate.com. [2] Wal-Mart details RFID requirement. In RFID Journal, Nov. ¡  6, 2003, http://www.rfidjournal.com. §¨¨ ©¨§ ¢ §¨¨©¨§ ¦ §¨¨ ©¨§ ¢ §¨¨ ©¨§ ¦ §¨¨ ©¨§ ¢ §¨¨ ©¨§ ¦ § © £ § © £ § © ¢ § © ¢ § © ¦ § © ¦ [3] D. Bradbury. RFID: It’s no supply chain savior - not yet any- way. silicon.com, Sep. 8, 2004, http://management.silicon.- Figure 6. Tracking of one subject. com/itdirector/. [4] J. Brusey, C. Floerkemeier, M. Harrison, and M. Fletcher. 0))5 Reasoning about uncertainty in location identification with RFID. In Workshop on Reasoning with Uncertainty in 0)4 Robotics at IJCAI, Aug. 2003. [5] S. Garfinkel, A. Juels, and R. Pappu. RFID privacy: an 0)3 PI H F E F T9SR B69Q overview of problems and proposed solutions. In IEEE Se- G F 0)2 DE T9 86VR WV6U curity and Privacy Magazine, 3(3): 34–43, 2005. C [6] S. Inoue, D. Hagiwara, and H. Yasuura. Systematic error 0)1 detection for RFID reliability. In Conf. Avail., Rel. and Sec. (ARES 2006), pages 280–286. 0) [7] A. Juels, R. Rivest, and M. Szydlo. The blocker tag: selective @ B6779 876 1 @6779 876 5 @ B6779 876 1 @6779 876 5 @ B6779 876 1 @6779 876 5 BA6 8 2 BA6 8 2 BA6 8 1 BA6 8 1 A6 8 5 A6 8 5 blocking of RFID tags for consumer privacy. In 10th ACM Conf. Comp. and Comm. Sec., pages 103–111, 2003. Figure 7. Tracking of 2 subjects. [8] G. Karjoth and P. Moskowitz. Disabling RFID tags with vis- ible confirmation: clipped tags are silenced. In 2005 ACM Workshop on Privacy in the Electronic Society, pages 27–30. 5. Conclusion [9] M. Kodialam and T. Nandagopal. Fast and reliable estima- tion schemes in RFID systems. In Proc. 12th MOBICOM, pages 322–333, Sep. 2006. In this work, we conducted extensive controlled mea- [10] J. Lindsay and W. Reade. Cascading RFID tags. Dec. 23, surements to characterize the reliability of passive RFID 2003, http://www.jefflindsay.com/rfid3.shtml. tags for tracking mobile objects and humans. Our measure- [11] L. Ni, Y. Liu, Y. Lau, and A. Patil. LANDMARC: Indoor ments revealed critical insights into how reliability depends location sensing using active RFID. In Wireless Networks, 10(6): 701-710. 2004. on various practical factors, such as inter-tag distances, lo- [12] K. Ramakrishnan and D. Deavours. Performance bench- cation of the tag on an object, and tag orientation. To marks for passive UHF RFID tags. In 13th GI/ITG Conf. improve reliability, we explored simple and cost-effective Measurement, Modeling, and Eval. of Comp. and Comm. reliability techniques, namely redundancy at the tag level, Sys., pages 137-154, 2006. the antenna level, and the reader level. Our measurement [13] M. Rieback, B. Crispo, and A. Tanenbaum. The evolution of RFID security. In IEEE Perv. Comp. 5(1): 62-69, 2006. clearly showed the high effectiveness of tag-level redun- [14] E. Schuman. RFID trials show mixed results. eWEEK.com, dancy, followed by antenna-level redundancy, in increas- Nov. 15, 2006, http://www.eweek.com/. ing system reliability. Because our readers did not sup- [15] R. Shawn, G. Minos, and J. Michael. Adaptive cleaning for port dense-reader mode, reader-level redundancy severely RFID data streams. In Proc. 32nd VLDB, pages 163–174, reduced reliability in our experiments, due to reader-reader 2006. [16] H. Stockman. Communication by means of reflected power. interference. To the best of our knowledge, our work is In Proc. IRE, 36, pages 1196-1204, 1948. the first that systematically characterizes the reliability of [17] N. Vaidya and S. Das. RFID-based networks - exploiting RFID systems and its dependence on various practical fac- diversity and redundancy, UIUC, WINGS Lab TR, 2006. tors. Our results provide important guidelines for real-world [18] Vogt, H. Multiple object identification with passive RFID deployment of RFID-based tracking applications as well as tags. In IEEE Conf. Systems, Man and Cybernetics, Vol. 3, pages 6-9, Oct 2002. simple yet effective solutions to guarantee reliability. Fu-