Creating a Reliable Framework using Vulnerable Resources

Download Report

Transcript Creating a Reliable Framework using Vulnerable Resources

RF2ID: A Reliable Middleware Framework for
RFID Deployment
Nova Ahmed
Rajnish Kumar
Umakishore Ramachandran
College of Computing
Georgia Institute of Technology
RFID Devices
• Opportunity
– Low cost sensor solution
– No line of site problem
– Industry interest in large scale deployment
• Challenges
– Error prone in nature
– Vulnerable to physical environment
– Large amounts of data
Application Scenario
Physical path for item flow
Tagged item
Destinations
Sources
RFID readers
 Item Tracking
– Tagged Items are moving
– Readers are static
– Ex: Warehouse Distribution , Airport Baggage Claim Scenario
 Item Location
– Tagged Items are static
– Readers are moving
– Ex: Disaster Scenario
 A notion of Path in different scenarios
System Architecture
Application
System Interface
Path
Name
Server Server
Virtual
Reader 1
Virtual
Reader 2
Virtual
Reader n-1
Virtual
Reader n
Physical Reader Interface
RFID Readers




A Path based System
Virtual Readers (VRs) – Distributed Computational Element
Physical RFID Readers (PRs) – Sensor Input Device
Path Server and Name Server – Decision Making Elements
Physical Route in a Warehouse System
Source
A
Destination
D
v
VR1
VR2
VR4
Source
B
Destination
E
RFID reader
Flow of item on conveyor belt
Range of VR
v
VR3
Destination
C
Architectural Features meeting Design Goals
Application
•
Reliability
System Interface
– A virtual reader for a number of
physical readers
– Path using virtual readers
•
Load shedding
– VRs can drop data
•
Path Name
Server Server
Multiple flows
– Paths are shared
Virtual
Reader 1
Virtual
Reader 2
Virtual
Reader n-1
Physical Reader Interface
RFID Readers
Virtual
Reader n
Logical Connectivity of Virtual Readers
VR
Path
Information
Time
Stampted
Data
VR
Path1
Path
Information
VR
Path
Information
Time
Stampted
Data
Time
Stampted
Data
Name
Server
VR
Path
Server
Path
Information
• Data Management
• Path Management
• Query Management
Time
Stampted
Data
Path2
Implementation
 Prototype implementation complete
 Virtual Reader
 Paths
 Physical readers and simulated physical
readers
 Tunable parameters to change reader accuracy
– tag distance
– tag angular position
– reader power level
– VRs Implemented as nodes in a cluster
communicating using MPI
Physical Reader Performance (1)
Distance Dependency
Angular Position Dependency
7
Number of detected tags
in 1 tag
Number of detected tags
in 2 tags
Number of detected tags
in 3 tags
Number of detected tags
in 4 tags
Number of detected tags
in 5 tags
Number of total tags
6
5
4
3
2
1
0
0
20
40
60
80
Tag distance from antenna (perpendicular to antenna)
Total number of detected tags
Number of detected tags with respect to distance
Detected tags among
1 tag
Detected tags among
tags
Detected tags among
3 tags
Detected tags among
4 tags
Detected tags among
5 tags
Detected tags among
6 tags
6
5
4
3
2
1
0
0
30
60
90
120
150
180
Angle among tag and antenna
Angular Position: 90 Degree
Number of Reader Antenna : 2
Reader Power: 31.5 dB
Distance: 15 inches
Number of Reader Antenna : 2
Reader Power: 31.5 dB
ALR 9800 with 2 antennas from Alien Technologies
Physical Reader Performance (2)
Attenuation Dependency
Number of detected tags
Time Dependency
Number of detected tags
6
Detected Tags
(among 6 tags)
5
4
3
2
1
8
6
4
2
0
0
0
3
6
9
12
RF Attenuation (dB)
Angular Position: 90 Degree
Number of Reader Antenna : 2
Number of Tags: 6
0
20
40
60
80
100
Observation time (seconds)
Reader to Tag Distance: 15 inches
Number of Reader Antenna : 2
Reader Power: 31.5 dB
Number of Tags: 6
Improving Reliability using a Single VR
70
VR
False Negative (%)
60
50
Reader1
40
30
PR1
20
PR2
10
Path
0
30
60
90
120
150
180
210
240
270
300
Number of tags
Number of Reader Antenna : 2
Reader to Route Distance: 10 inches
Reader Power: 31.5 dB
Reader2
Improving Reliability using Multiple VRs (path)
Number of False Negative Tags (%)
100
Reader Accuracy40%
Reader Accuracy 50%
Reader Accuracy 60%
Reader Accuracy 70%
Reader Accuracy 80%
Reader Accuracy 90%
90
80
70
60
50
VR
Reader
40
30
20
10
0
0
5
10
15
20
25
Num ber of Virtual Readers
Total Number of Tags : 10000
Simulation Iteration: 100
30
Conclusions
• Experiments showing unreliability of RFID
devices
• A middleware architecture for improving
reliability
• A prototype implementation
• Performance results showing improvement in
reliability
Future Work
• Implementing the full functionality of the
architecture
• Detailed performance analysis using more
physical readers
• GUI base User Interface for RF2ID
deployment
Thanks to RF2ID group members
Robert Steven French
Echezona Ukah
Vladimir Urazov