Nowhere to hide: An empirical study on hidden UHF RFID tags

Radio Frequency Identification (RFID) techniques are widely used in many ubiquitous applications. The most important usage of RFID techniques is to read the tags within a reader's interrogation area such that the objects attached with those tags can be identified. In real practice, it is common that a tag is physically in the interrogation range, but cannot be read by the reader, due to the multipath effect and other interference. This phenomenon, namely the hidden tag problem, is a big challenge to achieve high identification rate. To address this problem, most prior works depend on empirical or measurement-based methods to tune the transmission power for readers. Such a case-by-case solution is impractical for generic implementation. In this paper, we theoretically and experimentally explore the reasons why hidden tag problem occurs. To alleviate its impact, we propose a unified and measurable model, PAL, to formulate this problem and its impact. Different from previous works, our solution is generic and fully compatible with existing EPC C1G2 protocol. The analysis and measurement based on our model can help to design and deploy RFID systems with high identification rate.

[1]  Roy Want,et al.  An introduction to RFID technology , 2006, IEEE Pervasive Computing.

[2]  Shigang Chen,et al.  Efficient Protocols for Identifying the Missing Tags in a Large RFID System , 2013, IEEE/ACM Transactions on Networking.

[3]  David Wetherall,et al.  An empirical study of UHF RFID performance , 2008, MobiCom '08.

[4]  Deepak Ganesan,et al.  Flit: a bulk transmission protocol for RFID-scale sensors , 2012, MobiSys '12.

[5]  Lei Yang,et al.  Season: Shelving interference and joint identification in large-scale RFID systems , 2011, 2011 Proceedings IEEE INFOCOM.

[6]  Mo Li,et al.  P-MTI: Physical-Layer Missing Tag Identification via Compressive Sensing , 2013, IEEE/ACM Transactions on Networking.

[7]  Piotr Indyk,et al.  Efficient and reliable low-power backscatter networks , 2012, CCRV.

[8]  Xi Chen,et al.  Continuous scanning with mobile reader in RFID systems: an experimental study , 2013, MobiHoc.

[9]  Lawrence G. Roberts,et al.  ALOHA packet system with and without slots and capture , 1975, CCRV.

[10]  Giorgio Franceschetti,et al.  Wireless Networks: From the Physical Layer to Communication, Computing, Sensing and Control , 2006 .

[11]  Shiping Chen,et al.  Efficient missing tag detection in RFID systems , 2011, 2011 Proceedings IEEE INFOCOM.

[12]  Jue Wang,et al.  Dude, where's my card?: RFID positioning that works with multipath and non-line of sight , 2013, SIGCOMM.

[13]  Thomas F. La Porta,et al.  Anticollision Protocols for Single-Reader RFID Systems: Temporal Analysis and Optimization , 2011, IEEE Transactions on Mobile Computing.

[14]  Shigang Chen,et al.  Probabilistic missing-tag detection and energy-time tradeoff in large-scale RFID systems , 2012, MobiHoc '12.

[15]  Daniel D. Deavours,et al.  Evaluation of the State of Passive UHF RFID: An Experimental Approach , 2007, IEEE Systems Journal.

[16]  Murali S. Kodialam,et al.  Anonymous Tracking Using RFID Tags , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[17]  Deepak Ganesan,et al.  BLINK: a high throughput link layer for backscatter communication , 2012, MobiSys '12.

[18]  J. L. Norman Violette,et al.  An Introduction to Electromagnetic Compatibility , 1987 .

[19]  John Capetanakis,et al.  Tree algorithms for packet broadcast channels , 1979, IEEE Trans. Inf. Theory.

[20]  Bo Sheng,et al.  How to Monitor for Missing RFID tags , 2008, 2008 The 28th International Conference on Distributed Computing Systems.