Protocol for Streaming Data from an RFID Sensor Network †
Abstract
:1. Introduction
2. Background
- Sensor tag: RFID tag which incorporates a sensor.
- Tag identification: process to read the tag identifier or the EPC stored in the tag’s memory.
- Slot: period of time that separates the tags’ responses. Conventionally, three types of slots can occur: single (only one tag replies), collision (more than one tag replies in the same slot), and idle (none of the tags reply).
- Frame: sequence of slots. An inventory round is composed of a set of frames and tags can respond in only one slot per frame.
- Inventory round: the period of time that begins when the reader transmits the initial command, and ends when the reader interrupts the Identification Phase.
- Reading round: the period of time that is used to receive the data from the sensor tags identified during the inventory round. This round is usually determined by a number of data samples to be collected from each sensor.
2.1. Related Work
- Focused on the anti-collision problem. The main existing anti-collision protocols can be classified into tree-based and aloha-based protocols. Tree-based protocols [14] split colliding tags into subsets, and further split the subsets repeatedly until the successful response of all tags within the interrogation zone. Aloha-based protocols [15], on the other hand, divide the time into slotted frames, where tags can only respond once per frame in a randomly chosen slot. The most popular aloha-based protocol is the Dynamic Frame Slotted Aloha used in the standard EPC C1G2 [13]. These protocols are relatively slow due to tag-collisions and the need to go through the inventory round to read sensor data. This increases the occupancy of the wireless channel and thus, they are not recommended to be used for highly time restricted applications.
- Focused on Wireless Sensor Networks (WSN) based on RFID [6,7]. These types of protocols [16,17] typically assume that all tag IDs are known to the system in advance. However, this assumption is not always true, since dynamic scenarios are very popular among RFID systems. Thus, unexpected replies will severely affect the reading performance. There are other alternatives such as [18] which consider this problem, however, physical implementations have not been provided to the author’s knowledge.
2.2. EPC Class 1 Generation 2 Standard
- The Identification Phase. During this phase, the reader tries to obtain the EPC, which uniquely identifies each particular tag. EPC C1G2 uses a Dynamic Frame Slotted Aloha (DFSA) protocol to arbitrate tags’ collisions [13]. It follows a Time Division Multiple Access (MAC) approach, scheduling the tags’ responses along time slots (see Figure 2a). The Identification process begins with the transmission of a Query command to set the frame size to a value of . Tags randomly select a slot within the frame. This initial value of their internal slot counter ranging from 0 to is decremented with every slot change. The tag then responds to the reader when , as stated in Figure 2b. Waiting tags decrease their counter every time the reader transmits a Query command to jump to the next slot. If tags’ responses collide, the tags will wait until the next frame, choose a different slot and re-transmit their message. The probability of collisions is sensitive to the choice of the frame size, whose optimum setting depends on the number of responding tags (typically unknown to the reader). Thus, when = 0, the tag transmits a 16-bit random number (RN16). Once it is acknowledged (), the tag transmits its unique EPC code. The Identification Phase ends when the reader has received and correctly decoded the EPC from each unique tag. The reader command flow to identify one tag would be as follows (assuming no collision occurred): Query-ACK. The higher the frame size with respect to the number of tags in the interrogation zone, the higher the number of idle slots that will occur. On the contrary, the lower the frame size, the higher the number of collided slots. According to [11], the optimal frame size is equal to the number of tags located in the reading range.
- The Sense phase. This time period starts once a particular tag has been identified. During the Sense phase the reader reads data from the sensor tag. To do so, the reader transmits a Req_RN16 command, requesting a smaller bit-string (16 bits), named , from the tag. The handle typically expires after the reading process. The read phase ends when the reader has received one dataset from the tag. The reader command flow during the Sense phase is: Req_RN16(RN16)-Read(handle).
3. The Sensor Frame Slotted Aloha (sFSA)
- Identification PhaseThis phase starts when the reader transmits the first command to identify the N tags inside the reader’s range, and it ends when the reader has received one from each sensor tag or when a previously determined number of queries have been sent. This fixed number prevents the reader from remaining in the Identification Phase for an undesired long time and not reaching the sense phase. After receiving the EPC, the reader requests the at the end of this phase, therefore, the reader ends up with a clear overview of all the tags into its antenna range, their EPCs and s. The reader commands flow to identify one tag would be as follows (assuming no collision occurred): Query-ACK(RN16)-Req_RN16(RN16).
- The Sense phaseIt starts when the reader transmits the first command. Then, the reader transmits consecutive Read commands to cyclically read one set of data from each sensor. This phase ends when the reader has received the required number of sensor reads S or after a determined number of commands have been sent. As well as in the Identification Phase, this fixed number prevents the reader from remaining in the sense phase for an undesired long time, and keeps the reading rounds time underneath an upper bound.For instance, Figure 4 assumes and , and the Sense phase would consist of the following reader commands flow: Read(handle 1)-Read(handle 2)-Read(handle 3) for 1 read round; the next round is similarly repeated. This procedure needs the reader to associate these strings to each EPC, and the tags to remember their until the Sensing phase is over.Moreover, the isolation of the reading round from the inventory round brings several benefits. The sensor sampling frequency increases with respect to other anti-collision protocols used for sensing, such as the EPC C1G2. Furthermore, the main advantage is that once the reading round has started, this sensor sampling frequency is kept during the whole reading round. That is, the measurements received are time equidistant which allows the usage of these sensors for industrial purposes or streaming applications.It can be also seen in Figure 4 that on the second round, tag A does not transmit into its slot. However, the reader waits for the time booked for the transmission of tag sensor A until it transmits a new command. This facilitates the streaming of sensors using constant intervals.
The Problem of the Handles’ Similarities
4. Implementation of the Sensing Protocols
4.1. Used Hardware
4.2. Slot Classification Procedure
4.3. Anti-Collision Capabilities and Additional Reader Commands
5. Performance Analysis
Discussion and Identified Limitations
6. Conclusions and Future Work
Author Contributions
Funding
Conflicts of Interest
References
- Perez, M.M.; Gonzalez, G.V.; Dafonte, C. The Development of an RFID Solution to Facilitate the Traceability of Patient and Pharmaceutical Data. Sensors 2017, 17, 2247. [Google Scholar] [CrossRef] [PubMed]
- Sample, A.P.; Yeager, D.J.; Powledge, P.S.; Mamishev, A.V.; Smith, J.R. Design of an RFID-Based Battery-Free Programmable Sensing Platform. IEEE Trans. Instrum. Meas. 2008, 57, 2608–2615. [Google Scholar] [CrossRef]
- Gummeson, J.; Clark, S.S.; Fu, K.; Ganesan, D. On the limits of effective hybrid micro-energy harvesting on mobile CRFID sensors. In Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services, San Francisco, CA, USA, 15–18 June 2018. [Google Scholar]
- Buettner, M.; Prasad, R.; Philipose, M.; Wetherall, D. Recognizing daily activities with RFID-based sensors. In Proceedings of the 11th International Conference on Ubiquitous Computing, Orlando, FL, USA, 30 September–3 October 2009; pp. 51–60. [Google Scholar]
- Naderiparizi, S.; Parks, A.N.; Kapetanovic, Z.; Ransford, B.; Smith, J.R. WISPCam: A battery-free RFID camera. In Proceedings of the 2015 IEEE International Conference on RFID (RFID), San Diego, CA, USA, 15–17 April 2015; pp. 166–173. [Google Scholar]
- Mitrokotsa, A.; Douligeris, C. Integrated RFID and Sensor Networks: Architectures and Applications. RFID Sens. Netw. 2009, 512, 511–535. [Google Scholar]
- Mason, A.; Shaw, A.; Al-Shammaa, A.I.; Welsby, T. RFID and wireless sensor integration for intelligent tracking systems. In Proceedings of the 2nd GERI Annual Research Symposium GARS-2006, Liverpool, UK, 15 June 2006. [Google Scholar]
- Arjona, L.; Landaluce, H.; Perallos, A.; Souto, G. Protocol for Streaming Data from an RFID Sensor Network. Proceedings 2018, 2, 1234. [Google Scholar] [CrossRef]
- Finkenzeller, K.; Waddington, R. RFID Handbook: Radio-Frequency Identification Fundamentals and Applications; Wiley: New York, NY, USA, 1999. [Google Scholar]
- Abraham, C.; Ahuja, V.; Ghosh, A.K.; Pakanati, P. Inventory Management Using Passive RFID Tags: A Survey; Department of Computer Science, The University of Texas at Dallas: Richardson, TX, USA, 2002; pp. 1–16. [Google Scholar]
- Klair, D.K.; Chin, K.-W.; Raad, R. A survey and tutorial of RFID anti-collision protocols. IEEE Commun. Surv. Tutor. 2010, 12, 400–421. [Google Scholar] [CrossRef]
- Liu, C.; Chen, L. Applications of RFID technology for improving production efficiency in an Integrated-circuit packaging house. Int. J. Prod. Res. 2009, 47, 2203–2216. [Google Scholar] [CrossRef]
- EPCglobal. EPC Radio Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz–960 MHz. Available online: https://www.gs1.org/sites/default/files/docs/epc/Gen2_Protocol_Standard.pdf (accessed on 17 July 2019).
- Landaluce, H.; Perallos, A.; Onieva, E.; Arjona, L.; Bengtsson, L. An Energy and Identification Time Decreasing Procedure for Memoryless RFID Tag Anticollision Protocols. IEEE Trans. Wirel. Commun. 2016, 15, 4234–4247. [Google Scholar] [CrossRef]
- Solic, P.; Radic, J.; Rozic, N. Energy Efficient Tag Estimation Method for ALOHA-Based RFID Systems. IEEE Sens. J. 2014, 14, 3637–3647. [Google Scholar] [CrossRef]
- Chen, S.; Zhang, M.; Xiao, B. Efficient information collection protocols for sensor-augmented RFID networks. In Proceedings of the 2011 IEEE INFOCOM, Shanghai, China, 10–15 April 2011; pp. 3101–3109. [Google Scholar]
- Qiao, Y.; Chen, S.; Li, T.; Chen, S. Tag-ordering polling protocols in RFID systems. IEEE/ACM Trans. Netw. 2016, 24, 1548–1561. [Google Scholar] [CrossRef]
- Liu, X.; Cao, J.; Yang, Y.; Qu, W.; Zhao, X.; Li, K.; Yao, D. Fast RFID Sensory Data Collection: Trade-off Between Computation and Communication Costs. IEEE/ACM Trans. Netw. 2019, 27, 1179–1191. [Google Scholar] [CrossRef]
- Kargas, N.; Mavromatis, F.; Bletsas, A. Fully-Coherent Reader With Commodity SDR for Gen2 FM0 and Computational RFID. IEEE Wirel. Commun. Lett. 2015, 4, 617–620. [Google Scholar] [CrossRef]
N | modFSA (Slots/Read) | sFSA (Slots/Read) |
---|---|---|
1 | 6.1 | 5.74 |
2 | 46.23 | 2.16 |
3 | 79.13 | 31.47 |
4 | 118.16 | 29.96 |
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Souto, G.; Muralter, F.; Arjona, L.; Landaluce, H.; Perallos, A. Protocol for Streaming Data from an RFID Sensor Network †. Sensors 2019, 19, 3148. https://doi.org/10.3390/s19143148
Souto G, Muralter F, Arjona L, Landaluce H, Perallos A. Protocol for Streaming Data from an RFID Sensor Network †. Sensors. 2019; 19(14):3148. https://doi.org/10.3390/s19143148
Chicago/Turabian StyleSouto, Gentza, Florian Muralter, Laura Arjona, Hugo Landaluce, and Asier Perallos. 2019. "Protocol for Streaming Data from an RFID Sensor Network †" Sensors 19, no. 14: 3148. https://doi.org/10.3390/s19143148
APA StyleSouto, G., Muralter, F., Arjona, L., Landaluce, H., & Perallos, A. (2019). Protocol for Streaming Data from an RFID Sensor Network †. Sensors, 19(14), 3148. https://doi.org/10.3390/s19143148