retwork exploring reader network
play

Retwork: Exploring Reader Network with a COTS RFID System Jia Liu, - PowerPoint PPT Presentation

Retwork: Exploring Reader Network with a COTS RFID System Jia Liu, Xingyu Chen, Shigang Chen, Wei Wang, Dong Jiang, Lijun Chen 01 Background 02 System design 03 Evaluation 04 Conclusion What is RFID? 01 Background RFID System Antenna


  1. Retwork: Exploring Reader Network with a COTS RFID System Jia Liu, Xingyu Chen, Shigang Chen, Wei Wang, Dong Jiang, Lijun Chen

  2. 01 Background 02 System design 03 Evaluation 04 Conclusion

  3. What is RFID? 01 Background RFID System Antenna Access Control Computer Reader Tag Supply Chain

  4. Reader Network 01 Background An edge exists if and only if at least one tag is located at the overlapped read zone. • Network graph: G = ( V, E ) • Vertex set: V = {V1, V2, V3} • Edge set: E = {(V2,V3)}

  5. 01 Usage: Anti-Collision Background RFID Tags Reader Reader Tags under collision cannot be read!

  6. Our goal 02 System design Time efficiency The proposed system must be able to get the reader network as soon as possible. Gen2-Compatibility The proposed system must be Gen2-Compatible and work directly in commercial RFID systems.

  7. Naïve solution 02 System design Reader Reader With tag inventory, each reader can learn its neighbors by comparing its own tag list with others’.

  8. Basic idea 02 System design Phase 1 : Over-the-air Writing Index i Index j Index i Index i Index j Index j Reader Vj Reader Vi

  9. Basic idea 02 System design Phase 2 : Selective Reading Index i Index j Index i Index j Index i Index j Reader Vj Reader Vi If the reader vi detects any tags in the field-of- view, vi and vj are neighbors.

  10. 02 Challenge: One-to-many Write is out of Gen2 Phase 1 : Over-the-air Writing Index i Index j Index i Index i Index j Index j Reader Vj Reader Vi

  11. Gen2 protocol 02 System design  Related functions in EPCglobal Gen2 standard (Gen2) [1] : F1: Inventoried flag. F2: Select Command. F3: Query Command. [1] GS1 EPCglobal. EPC radio-frequency identity protocols generation-2 UHF RFID version 2.0.1, 2015.

  12. Inventoried flag 02 System design A reader can set all tags’ inventory Writing a reader’s ID to all tags in flag at once. its zone at once is not allowed. Index i Flag A Index i Flag A Index i Flag A Reader Vi Reader Vi VS Inventoried flag One to many write

  13. Select command 02 System design  Fields of Select command: Cmd Membank Pointer Length Mask Target Action Code SessionAction Bit mask Tags Reader Select 00101000 B 00111100 Target = 1 A 00001010 Action = 0 A MemBank = 1 00101000 B Pointer = 2 10101000 Length = 2 B Mask = 10 Set inventoried flags to either A or B

  14. Query command 02 System design  Fields of Query command: Cmd Target Sel Session Code Inventoried flag A (0) or B (1) Tags Reader Query 00101000 B 00111100 A 00001010 Target = 1 A 00101000 Session = 1 B 10101000 Sel = 0 B The tags with Target state B will reply to the reader

  15. 02 System design Detection of contention link Flag = A Flag = A 1. Vi: set all tags to A. 2.Close the reader and wait for T d . Flag = A Vi 3.Query B tags. 4.Return to Step 1 for the next iteration.

  16. 02 System design Detection of contention link Flag = B Flag = B 1. Vi: set all tags to A. 2. Vj: set all tags to B. Flag = B Vj 3.Query B tags. 4.Return to Step 1 for the next iteration.

  17. 02 System design Detection of contention link Flag = A Flag = B 1. Vi: set all tags to A. 2. Vj: set all tags to B. Flag = A Vi 3. Vi: queries B tags. 4.Return to Step 1 for the Vi queries B : next iteration.

  18. 02 System design Detection of contention link Flag = A Flag = B 1. Vi: set all tags to A. 2. Vj: set all tags to B. Flag = A Vi 3. Vi: queries B tags. 4.Check any two readers Reader network is formed.

  19. 02 Gen2-Compatible Commands System design 01 Target = 2: Select flag 2 Action = 0: Matching tag to A, nonmatching tag to B Bitmask = (1,0,0,0): All tags are matching

  20. 02 Gen2-Compatible Commands System design 01 02 Target = 2: Select flag 2 Action = 4: Matching tag to B, nonmatching tag to A Bitmask = (1,0,0,0): All tags are matching

  21. 02 Gen2-Compatible Commands System design 01 02 03 Sel = 0: Query according to Inventory flag Session = 2: Choose flag 2 Target = 1: Tags with flag B reply

  22. 02 Gen2-Compatible Commands System design 01 02 03 For each pair of vi and vj Reader network

  23. 02 Identification of reader network System design v1 v2 v1 v1 v2 v2 A A A A A A A A B A B v3 v4 v3 v4 v3 v4 ( m-1) flag->A 1 flag->B (m-1) query B Methods Basic Retwork Enhanced Retwork Number of commands 3(m- 1) ≈ 3m 2(m-1)+1 ≈ 2m

  24. Case study: redundancy detection 02 System design An RFID reader is redundant if all tags in its read zone are covered by other readers. Reader V1 Redundancy detection is to identify which readers Reader Vi are redundant in a multi- Reader Vj reader RFID system. Reader V2

  25. Case study: redundancy detection 02 System design Vi: set all tags to A . 01 Flag A Reader V1 V1-Vm: set all tags to B . 02 Flag A Flag A Vi: query A tags .. 03 Flag A Flag A Reader Vi Reader Vj Reader V2

  26. Case study: redundancy detection 02 System design Vi: set all tags to A . 01 Flag A Flag B Reader V1 V1-Vm: set all tags to B . 02 Flag B Flag A Flag B Flag A Vi: query A tags .. 03 Flag A Flag B Flag A Flag B Reader Vi Reader Vj Reader V2

  27. Case study: redundancy detection 02 System design A reader is redundant if it cannot detect Vi: set all tags to A . 01 tag with flag A. Flag A Flag B Reader V1 V1-Vm: set all tags to B . 02 Flag B Flag A Flag B Flag A Vi: query A tags .. 03 Flag B Flag A Flag A Flag B Reader Vi Reader Vj Reader V2

  28. Experimental setup 03 Evaluation Figure 2: System deployment. Figure 1: RFID readers and tags.

  29. 03 Compatibility Evaluation Table 1: Gen2-compatibility on Readers and Tags. Retwork functions properly on 4 reader models + ALL tag models

  30. Retwork vs. Inventory 03 Evaluation Retwork reduces the time from 55.9s to 3.9s 14.7 × performance gain Figure 3: Time comparison between Retwork and tag inventory.

  31. Accuracy 03 Evaluation FPR < 3.5% FNR<0.3% Figure 4: Accuracy.

  32. Reader Redundancy 03 Evaluation Retwork reduces the time from 40.2s to 4.1s An order of magnitude Figure 5: Time Efficiency for redundancy detection.

  33. 04 Conclusion We propose an efficient solution Retwork to the practically 01 important problem of identifying the contention relationship among multiple readers in a large RFID system. Our protocol exploits the flag-setting capability in Gen2. With a 02 carefully-designed series of flag-flipping operations, it is able to check two readers are neighbors or not. We implement a prototype of Retwork with 8,000 tags. Extensive 03 experiments show that it can improve the time efficiency by an order of magnitude.

  34. THANK YOU jialiu@nju.edu.cn

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend