Reliable and Efficient RFID Networks Jue Wang with Haitham - - PowerPoint PPT Presentation

reliable and efficient rfid networks
SMART_READER_LITE
LIVE PREVIEW

Reliable and Efficient RFID Networks Jue Wang with Haitham - - PowerPoint PPT Presentation

Reliable and Efficient RFID Networks Jue Wang with Haitham Hassanieh, Dina Katabi, Piotr Indyk Machine-Generated Data RFID will be a major source of such traffic In Oil & Gas about 30% annual growth rate In Healthcare $1.3B


slide-1
SLIDE 1

Reliable and Efficient RFID Networks

Jue Wang with Haitham Hassanieh, Dina Katabi, Piotr Indyk

slide-2
SLIDE 2

Machine-Generated Data RFID will be a major source of such traffic

  • “number of RFID tags sold globally is projected to

rise from 12 million in 2011 to 209 billion in 2021.” – McKinsey Big Data Report 2011

  • In Oil & Gas – about 30% annual growth rate
  • In Healthcare – $1.3B revenue annually
slide-3
SLIDE 3
  • Wireless protocols require power and computation
  • RFIDs are very wimpy
  • No power source
  • Ultra-low cost  not much circuitry

Are Our Wireless Protocols Ready? RFIDs can’t perform typical functions like carrier sense or rate adaptation

slide-4
SLIDE 4

RFIDs are Inefficient and Unreliable

[P05, JZF06, RZH07, BW08, BVG09, GZG12] The traditional approach to deal with wimpy technologies is to dial down functionality

  • e.g., client can’t adapt bit rate  fixed rate

How Do we Deal with RFID Wimpy Nodes?

slide-5
SLIDE 5

Network As a Node:

Build sophisticated protocols by making many wimpy RFIDs emulate one powerful node Our Approach

Do not give up on functions that make communication reliable and efficient

  • e.g., if one RFID can’t adapt rate, maybe

collectively can perform rate adaptation

slide-6
SLIDE 6

Rest of the Talk

  • Understanding RFID communication
  • Network As a Node
  • Empirical evaluation
slide-7
SLIDE 7

Backscatter Communication

slide-8
SLIDE 8

Reader shines an RF signal on nearby RFIDs Tag reflects the reader’s signal using ON-OFF keying

Backscatter Communication

slide-9
SLIDE 9

Backscatter Communication RFIDs are synced by the reader's signal

slide-10
SLIDE 10

Challenges of Backscatter

RFIDs cannot hear each other  Collisions Cannot adapt modulation to channel quality  Don’t exploit a good channel to send more bits per symbol  Don’t react to a bad channel

slide-11
SLIDE 11

Rest of the Talk

  • Understanding RFID communication
  • Network As a Node
  • Empirical evaluation
slide-12
SLIDE 12

Network As a Node

Wireless Medium ID = 1 ID = 2 ID = 4 ID = 3 ID = 5 ID = N ID = 6 ...

Virtual Sender Collisions

Collision becomes a code across the virtual sender’s bits

  • Deals with collision by decoding collision-code
  • Adapts the rate by making collision-code rateless
slide-13
SLIDE 13

Network-As-a-Node Node Identification Data Communication

slide-14
SLIDE 14

The Node Identification Problem Challenge: RFIDs cannot hear each other  Collisions

Applications

  • Inventory management
  • Shopping cart

Each object has an ID Reader learns IDs of nearby objects

slide-15
SLIDE 15

Current Approach: Slotted Aloha

Collision

Node1 Node2

Few Time Slots OR Many Time Slots

ID 1

ID 2

Unreliable Inefficient

Node1 Node2

Time is divided into slots; Each RFID transmits in a random slot

slide-16
SLIDE 16

How can network-as-a-node help?

slide-17
SLIDE 17

A million RFIDs in the Wal-Mart store

ID = 1 ID = 2 ID = 4 ID = 3 ID = 5 ID = N

...

ID = 6

slide-18
SLIDE 18

But only a few (e.g., 20) in the shopping cart

ID = 1

...

ID = 2 ID = 4 ID = 3 ID = 5 ID = N ID = 6

slide-19
SLIDE 19

ID = 1

...

ID = 2 ID = 4 ID = 3 ID = 5 ID = N ID = 6

1 1 …

slide-20
SLIDE 20

1 1 …

slide-21
SLIDE 21

1 1 …

Want the network to emulate a compressive sensing sender

slide-22
SLIDE 22

A Virtual Compressive Sensing Sender

Compressive sensing matrix

slide-23
SLIDE 23

A Virtual Compressive Sensing Sender

Compressive sensing matrix

How to implement this virtual sender using a network of RFIDs?

slide-24
SLIDE 24

Network can mix information using Collisions

slide-25
SLIDE 25

Network Compressive Sensing Using Collisions

slide-26
SLIDE 26

Example: Cart has only ID 2 and ID 30 TX/RX Reader

ID = 2 ID = 30

slide-27
SLIDE 27
slide-28
SLIDE 28
slide-29
SLIDE 29

Network-based compressive sensing solves node identification

slide-30
SLIDE 30

Network-As-a-Node Node Identification Data Communication

slide-31
SLIDE 31

Data communication in RFID networks performs poorly because it lacks rate adaptation RFIDs always send 1 bit/symbol Can’t exploit good channels to send more bits  Inefficiency Can’t reduce rate in bad channels  Unreliability

slide-32
SLIDE 32

Can network-as-a-node help?

slide-33
SLIDE 33
  • Nodes transmit messages and collide
  • Reader collects collisions until it can decode
  • good channel  decode from few collisions
  • worse channel  decode from more collisions

Adapts bit rate to channel quality without feedback

Network-Based Rate Adaptation

slide-34
SLIDE 34

Collisions as a Distributed Code

b1 b2 b3 ⁞ bK y1 y1 = h1 b1 + h2 b2 + … + hK bK Collisions naturally act like a linear code

slide-35
SLIDE 35

b1 b2 b3 ⁞ bK y1 y2 y3 y1 = h1 b1 + h2 b2 + … + hK bK ⁞ y2 = h1 b1 + h2 b2 + … + hK bK y3 = h1 b1 + h2 b2 + … + hK bK

But simply colliding is not a good code Repetition Code  Bad Code!

slide-36
SLIDE 36

A good code for RFIDs  Different linear equations  Sparse  Easy to decode (e.g., LDPC)

slide-37
SLIDE 37

Collisions as Sparse Random Code

b1 b2 b3 ⁞ bK y1 y2 y3 y1 = h2 b2 + hK bK ⁞ y2 = h1 b1 y3 = h2 b2 + h3 b3 + hK bK Each node has a different pseudo random sequence Node transmits in a collision if bit in sequence is “1”

slide-38
SLIDE 38

How Does the Reader Decode?

Sparse Code  Leverage ideas from LDPC

Belief Propagation enables the reader to decode quickly

b1 b2 b3 ⁞ bK y1 y2 y3 ⁞

Treat network of RFIDs as a single virtual node  Rate adaptation via rateless collision-code

slide-39
SLIDE 39

Rest of the Talk

  • Understanding RFID communication
  • Network as a node
  • Empirical evaluation
slide-40
SLIDE 40

Evaluation

  • Reader implementation on GNURadio USRP
  • 16 UMass Moo programmable RFIDs
slide-41
SLIDE 41

Evaluate Data Communication Compared schemes 1. Network-based Rate Adaptation 2. TDMA 3. CDMA

slide-42
SLIDE 42

Reliability

Message Loss Rate 0% 10% 20% 30% 40% 50%

1 2 3

slide-43
SLIDE 43

Reliability

Message Loss Rate

TDMA

27% 12% 0%

0% 10% 20% 30% 40% 50%

1 2 3

slide-44
SLIDE 44

Reliability

Message Loss Rate

TDMA CDMA

42% 16% 0% 27% 12% 0%

0% 10% 20% 30% 40% 50%

1 2 3

slide-45
SLIDE 45

Reliability

Message Loss Rate

TDMA CDMA Our Design

42% 16% 0% 27% 12% 0% 0% 0% 0%

0% 10% 20% 30% 40% 50%

1 2 3

slide-46
SLIDE 46

Reliability

Message Loss Rate

TDMA CDMA Our Design

0.57 bits/symbol 1.7 bits/symbol 3.2 bits/symbol 0% 10% 20% 30% 40% 50%

1 2 3

Network as a node adapts bit rate to eliminate message loss

slide-47
SLIDE 47

Node Identification Compared Schemes

  • Network-based Compressive Sensing
  • Framed Slotted Aloha (standard)
slide-48
SLIDE 48

500 1000 1500 2000 4 8 12 16

Number of Tags Number of Symbols to Identify Nodes

Node Identification

slide-49
SLIDE 49

500 1000 1500 2000 4 8 12 16

Node Identification

Number of Tags Our Design Slotted Aloha Number of Symbols to Identify Nodes

Network compressive sensing improves efficiency

  • f node identification by 5.5×

5.5× reduction in symbols needed for identification

slide-50
SLIDE 50

Conclusion

  • Network as a node enables wimpy RFIDs to

implement sophisticated protocols

  • Efficient node identification via compressive

sensing

  • Network-based rate adaptation using collisions

as a rateless code

  • Empirical results show significant gains in

efficiency and reliability

slide-51
SLIDE 51

Energy Efficiency

5 10 15 20 25 30 3 4 5

TDMA CDMA Buzz

Energy Consumed (uJ) Starting Voltage (V)