EFFICIENT UNKNOWN TAG DETECTION IN LARGE-SCALE RFID SYSTEMS WITH UNRELIABLE CHANNELS

 

ABSTRACT

One of the most important applications of radiofrequency identification (RFID) technology is to detect unknowntags brought by new tagged items, misplacement, or counterfeittags. While unknown tag identification is able to pinpointall the unknown tags, probabilistic unknown tag detection ispreferred in large-scale RFID systems that need to be frequentlychecked up, e.g., real-time inventory monitoring. Nevertheless,most of the previous solutions are neither efficient nor reliable.The communication efficiency of former schemes is not welloptimized due to the transmission of unhelpful data. Furthermore,they do not consider characteristics of unreliable wirelesschannels in RFID systems. In this paper, we propose a fast andreliable method for probabilistic unknown tag detection, whitepaper (WP) protocol. The key novelty of WP is to build a newdata structure of composite message that consists of all theinformative data from several independent detection synopses;thus it excludes useless data from communication. Furthermore,we employ packet loss differentiation and adaptive channelhopping techniques to combat unreliable backscatter channels.We implement a prototype system using USRP software-definedradio and WISP tags to show the feasibility of this design. We alsoconduct extensive simulations and comparisons to show thatWP outperforms previous methods. Compared with the state-ofthe-artprotocols, WP achieves more than 2× performance gainin terms of time-efficiency when all the channels are assumed freeof errors and the number of tags is 10000, and achieves up to12× success probability gain when the burstiness is morethan 80%.

 

CONCLUSION

In this paper, we have proposed a fast and reliableprobabilistic unknown tag detection scheme. At its core,we observed that much data in prior communication messageswas of no help in detecting unknown tags. Thus,we have proposed a compact message design that includedonly informative data, excluding all the unhelpful datafrom communication. In addition, various energy-time tradeoffshave also been achieved in our analytic framework.An extended protocol dealing with unreliable channels hasbeen considered using novel packet loss differentiation andadaptive channel hopping techniques. Our analysis and experimentshave showed that the proposed protocols can significantlyoutperform previous methods in terms of timeefficiency, energy efficiency, and robustness. In the future,we are going to investigate applications of the highly efficientdetection schemes in this work, e.g., efficient unknown tagidentification solution, tag search and missing-tag identificationin the presence of unknown tags.

REFERENCES

[1] X. Liu et al., “Sampling bloom filter-based detection of unknownRFID tags,” IEEE Trans. Commun., vol. 63, no. 4, pp. 1432–1442,Apr. 2015.

[2] J. Han et al., “GenePrint: Generic and accurate physical-layer identificationfor UHF RFID tags,” IEEE/ACM Trans. Netw., vol. 24, no. 2,pp. 846–858, Apr. 2016.

[3] Q. Xiao, B. Xiao, S. Chen, and J. Chen, “Collision-aware churn esti-mation in large-scale dynamic rfid systems,” IEEE/ACM Trans. Netw.,vol. 25, no. 1, pp. 392–405, Feb. 2017.

[4] L. Yang, J. Han, Y. Qi, and Y. Liu, “Identification-free batch authenticationfor RFID tags,” in Proc. IEEE ICNP, Oct. 2010, pp. 154–163.

[5] M. Shahzad and A. X. Liu, “Fast and reliable detection and identificationof missing RFID tags in the wild,” IEEE/ACM Trans. Netw., vol. 24,no. 6, pp. 3770–3784, Dec. 2016.

[6] X. Liu et al., “Efficient unknown tag identification protocols in largescaleRFID systems,” IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 12,pp. 3145–3155, Dec. 2014.

[7] Third Business Mission Focuses on Cargo-Tracking Technology.[Online]. Available: http://www.winnipegfreepress.com/business/centreport-heading-back-to-china-147708545.html

[8] S. Chunlin, “Sino-U.S.Cooperation on marine transportation security:Progress and problems,” Contemporary Int. Rel., vol. 5, 2010. [Online].Available: http://d.wanfangdata.com.cn/Periodical/xdgjgx201005008

[9] OpenBeacon, accessed on May 8, 2017. [Online]. Available:http://www.openbeacon.org/

[10] G. Bianchi, “Revisiting an RFID Identification-free batch authenticationapproach,” IEEE Commun. Lett., vol. 15, no. 6, pp. 632–634, Jun. 2011.

[11] Y. Zheng and M. Li, “Towards more efficient cardinality estimationfor large-scale RFID systems,” IEEE/ACM Trans. Netw., vol. 22, no. 6,pp. 1886–1896, Dec. 2014.

[12] W. Luo, S. Chen, Y. Qiao, and T. Li, “Missing-tag detection and energy–timetradeoff in large-scale RFID systems with unreliable channels,”IEEE/ACM Trans. Netw., vol. 22, no. 4, pp. 1079–1091, Aug. 2014.