Fast Tracking the Population of Key Tags in Large-Scale Anonymous RFID Systems

被引:33
作者
Liu, Xiulong [1 ]
Xie, Xin [1 ]
Li, Keqiu [1 ]
Xiao, Bin [2 ]
Wu, Jie [3 ]
Qi, Heng [1 ]
Lu, Dawei [4 ]
机构
[1] Dalian Univ Technol, Sch Comp Sci & Technol, Dalian 116023, Peoples R China
[2] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Hong Kong, Peoples R China
[3] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
[4] Dalian Univ Technol, Sch Math Sci, Dalian 116023, Peoples R China
基金
中国国家自然科学基金; 美国国家科学基金会;
关键词
Key RFID tags; cardinality estimation; population tracking; time-efficiency; PROTOCOL; IDENTIFICATION; TREE;
D O I
10.1109/TNET.2016.2576904
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In large-scale radio frequency identification (RFID)enabled applications, we sometimes only pay attention to a small set of key tags, instead of all. This paper studies the problem of key tag population tracking, which aims at estimating how many key tags in a given set exist in the current RFID system and how many of them are absent. Previous work is slow to solve this problem due to the serious interference replies from a large number of ordinary (i.e., non-key) tags. However, time-efficiency is a crucial metric to the studied key tag tracking problem. In this paper, we propose a singleton slot-based estimator, which is time-efficient, because the RFID reader only needs to observe the status change of expected singleton slots corresponding to key tags instead of the whole time frame. In practice, the ratio of key tags to all current tags is small, because key members are usually rare. As a result, even when the whole time frame is long, the number of expected singleton slots is limited and the running of our protocol is very fast. To obtain good scalability in large-scale RFID systems, we exploit the sampling idea in the estimation process. A rigorous theoretical analysis shows that the proposed protocol can provide guaranteed estimation accuracy to end users. Extensive simulation results demonstrate that our scheme outperforms the prior protocols by significantly reducing the time cost.
引用
收藏
页码:278 / 291
页数:14
相关论文
共 41 条
  • [1] [Anonymous], 2013, P ACM MOBIHOC
  • [2] Bhandari N, 2006, ICIT 2006: 9TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, PROCEEDINGS, P46
  • [3] Chen B., 2013, Proceedings of the 19th annual international conference on Mobile computing networking, P291
  • [4] Chen M, 2013, IEEE INFOCOM SER, P899
  • [5] Han H.-D., 2010, PROC IEEE GLOBAL TEL, P1
  • [6] Jihoon Myung, 2006, MOBIHOC 2006. Proceedings of the Seventh ACM International Symposium on Mobile Ad Hoc Networking and Computing, P202, DOI 10.1145/1132905.1132928
  • [7] Anonymous tracking using RFID tags
    Kodialam, Murah
    Nandagopal, Thyaga
    Lau, Wing Cheong
    [J]. INFOCOM 2007, VOLS 1-5, 2007, : 1217 - +
  • [8] Kodialam M, 2006, MOBICOM 2006, P322
  • [9] Kong LH, 2014, IEEE INFOCOM SER, P154, DOI 10.1109/INFOCOM.2014.6847935
  • [10] Lee SR, 2005, Proceedings of MobiQuitous 2005, P166