reliable and efficient rfid networks
play

Reliable and Efficient RFID Networks Jue Wang with Haitham - PowerPoint PPT Presentation

Reliable and Efficient RFID Networks Jue Wang with Haitham Hassanieh, Dina Katabi, Piotr Indyk Machine-Generated Data RFID will be a major source of such traffic In Oil & Gas about 30% annual growth rate In Healthcare $1.3B


  1. Reliable and Efficient RFID Networks Jue Wang with Haitham Hassanieh, Dina Katabi, Piotr Indyk

  2. Machine-Generated Data RFID will be a major source of such traffic • In Oil & Gas – about 30% annual growth rate • In Healthcare – $1.3B revenue annually • “number of RFID tags sold globally is projected to rise from 12 million in 2011 to 209 billion in 2021 .” – McKinsey Big Data Report 2011

  3. Are Our Wireless Protocols Ready? • Wireless protocols require power and computation • RFIDs are very wimpy • No power source • Ultra-low cost  not much circuitry RFIDs can’t perform typical functions like carrier sense or rate adaptation

  4. How Do we Deal with RFID Wimpy Nodes? The traditional approach to deal with wimpy technologies is to dial down functionality - e.g., client can’t adapt bit rate  fixed rate RFIDs are Inefficient and Unreliable [P05, JZF06, RZH07, BW08, BVG09, GZG12]

  5. Our Approach Do not give up on functions that make communication reliable and efficient - e.g., if one RFID can’t adapt rate, maybe collectively can perform rate adaptation Network As a Node: Build sophisticated protocols by making many wimpy RFIDs emulate one powerful node

  6. Rest of the Talk • Understanding RFID communication • Network As a Node • Empirical evaluation

  7. Backscatter Communication

  8. Backscatter Communication T ag reflects the reader’s signal using ON-OFF keying Reader shines an RF signal on nearby RFIDs

  9. Backscatter Communication RFIDs are synced by the reader's signal

  10. Challenges of Backscatter RFIDs cannot hear each other  Collisions Cannot adapt modulation to channel quality  Don’t exploit a good channel to send more bits per symbol  Don’t react to a bad channel

  11. Rest of the Talk • Understanding RFID communication • Network As a Node • Empirical evaluation

  12. Network As a Node Virtual Sender ID = 6 ... ID = 1 ID = 2 ID = 3 ID = 4 ID = 5 ID = N Collisions Collision becomes a code across the virtual sender’s bits Wireless Medium • Deals with collision by decoding collision-code • Adapts the rate by making collision-code rateless

  13. Network-As-a-Node Node Data Identification Communication

  14. The Node Identification Problem Each object has an ID Reader learns IDs of nearby objects Applications • Inventory management • Shopping cart Challenge: RFIDs cannot hear each other  Collisions

  15. Current Approach: Slotted Aloha Time is divided into slots; Each RFID transmits in a random slot Node1 Node2 Node1 Node2 Collision ID 1 ID 2 Few Time Slots OR Many Time Slots Inefficient Unreliable

  16. How can network-as-a-node help?

  17. ... ID = 1 ID = 2 ID = 3 ID = 4 ID = 5 ID = 6 ID = N A million RFIDs in the Wal-Mart store

  18. ... ID = 1 ID = 2 ID = 3 ID = 4 ID = 5 ID = 6 ID = N But only a few (e.g., 20) in the shopping cart

  19. ... ID = 1 ID = 2 ID = 3 ID = 4 ID = 5 ID = 6 ID = N 0 1 0 0 1 0 … 0

  20. 0 1 0 0 1 0 … 0

  21. 0 1 0 0 1 0 … 0 Want the network to emulate a compressive sensing sender

  22. A Virtual Compressive Sensing Sender Compressive sensing matrix

  23. A Virtual Compressive Sensing Sender Compressive sensing matrix How to implement this virtual sender using a network of RFIDs?

  24. Network can mix information using Collisions

  25. Network Compressive Sensing Using Collisions

  26. Example: Cart has only ID 2 and ID 30 ID = 2 TX/RX ID = 30 Reader

  27. Network-based compressive sensing solves node identification

  28. Network-As-a-Node Node Data Identification Communication

  29. Data communication in RFID networks performs poorly because it lacks rate adaptation RFIDs always send 1 bit/symbol Can’t exploit good channels to send more bits  Inefficiency Can’t reduce rate in bad channels  Unreliability

  30. Can network-as-a-node help?

  31. Network-Based Rate Adaptation • Nodes transmit messages and collide • Reader collects collisions until it can decode • good channel  decode from few collisions • worse channel  decode from more collisions Adapts bit rate to channel quality without feedback

  32. Collisions as a Distributed Code Collisions naturally act like a linear code y 1 = h 1 b 1 + h 2 b 2 + … + h K b K b 1 y 1 b 2 b 3 ⁞ b K

  33. But simply colliding is not a good code Repetition Code  Bad Code! y 1 = h 1 b 1 + h 2 b 2 + … + h K b K b 1 y 1 y 2 = h 1 b 1 + h 2 b 2 + … + h K b K b 2 y 2 b 3 y 3 y 3 = h 1 b 1 + h 2 b 2 + … + h K b K ⁞ ⁞ b K

  34. A good code for RFIDs  Different linear equations  Sparse  Easy to decode (e.g., LDPC)

  35. Collisions as Sparse Random Code Each node has a different pseudo random sequence Node transmits in a collision if bit in sequence is “1” y 1 = h 2 b 2 + h K b K b 1 y 1 y 2 = h 1 b 1 b 2 y 2 b 3 y 3 y 3 = h 2 b 2 + h 3 b 3 + h K b K ⁞ ⁞ b K

  36. How Does the Reader Decode? Sparse Code  Leverage ideas from LDPC b 1 y 1 Belief Propagation enables the reader b 2 y 2 to decode quickly b 3 y 3 ⁞ ⁞ Treat network of RFIDs as a single virtual node b K  Rate adaptation via rateless collision-code

  37. Rest of the Talk • Understanding RFID communication • Network as a node • Empirical evaluation

  38. Evaluation • Reader implementation on GNURadio USRP • 16 UMass Moo programmable RFIDs

  39. Evaluate Data Communication Compared schemes 1. Network-based Rate Adaptation 2. TDMA 3. CDMA

  40. Reliability 50% Message Loss Rate 40% 30% 20% 10% 0% 1 2 3

  41. Reliability 50% Message Loss Rate 40% TDMA 30% 27% 20% 12% 10% 0% 0% 1 2 3

  42. Reliability CDMA 50% 42% Message Loss Rate 40% TDMA 30% 27% 20% 16% 12% 10% 0% 0% 0% 1 2 3

  43. Reliability CDMA 50% 42% Message Loss Rate 40% TDMA 30% 27% Our 20% 16% Design 12% 10% 0% 0% 0% 0% 0% 0% 1 2 3

  44. Reliability CDMA 3.2 50% bits/symbol Message Loss Rate 40% TDMA 30% 1.7 bits/symbol Our 20% Design 0.57 10% bits/symbol 0% 1 2 3 Network as a node adapts bit rate to eliminate message loss

  45. Node Identification Compared Schemes - Network-based Compressive Sensing - Framed Slotted Aloha (standard)

  46. Node Identification 2000 Number of Symbols to 1500 Identify Nodes 1000 500 0 4 8 12 16 Number of Tags

  47. Node Identification 2000 Slotted Number of Symbols to Aloha 1500 Identify Nodes 5.5× reduction in symbols needed 1000 for identification 500 Our Design 0 4 8 12 16 Network compressive sensing improves efficiency of node identification by 5.5 × Number of Tags

  48. Conclusion • Network as a node enables wimpy RFIDs to implement sophisticated protocols • Efficient node identification via compressive sensing • Network-based rate adaptation using collisions as a rateless code • Empirical results show significant gains in efficiency and reliability

  49. Energy Efficiency 30 Energy Consumed (uJ) 25 20 CDMA 15 TDMA Buzz 10 5 0 3 4 5 Starting Voltage (V)

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend