The optimal k-covering tag deployment for RFID-based localization

Radio Frequency Identification (RFID) technologies are applied in many fields for a variety of applications today. Recently, new solutions are proposed to deploy RF tags on the ground instead of attaching them to objects for RFID-based monitoring and localization. However, the optimal tag deployment strategy is yet to be addressed. In this paper, we identify the optimal deployment patterns that guarantee k-covering (i.e., at least k RFID tags are accessible anywhere in the deployment region), where k=<3. In addition, we analyze the achievable minimum upper bound and the average of localization error when the optimal deployment patterns are applied. The numerical results show that our optimal deployment patterns significantly reduce the required number of tags for k-covering compared with the square pattern which is commonly used in RFID-based monitoring and localization systems. The comparison between simulation and analytical results shows that our analytical models provide very accurate estimations of localization error.

[1]  Myong-Soon Park,et al.  An indoor localization mechanism using active RFID tag , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).

[2]  Dong Xuan,et al.  On Deploying Wireless Sensors to Achieve Both Coverage and Connectivity , 2006, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.

[3]  Nael B. Abu-Ghazaleh,et al.  RFID based localization for a miniaturized robotic platform for wireless protocols evaluation , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.

[4]  Lakhmi C. Jain,et al.  Network and information security: A computational intelligence approach: Special Issue of Journal of Network and Computer Applications , 2007, J. Netw. Comput. Appl..

[5]  R. Kershner The Number of Circles Covering a Set , 1939 .

[6]  Dong-Ik Oh,et al.  CPR localization using the RFID tag-floor , 2006 .

[7]  Nael B. Abu-Ghazaleh,et al.  On the accuracy of RFID-based localization in a mobile wireless network testbed , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.

[8]  Wilhelm Moll,et al.  Library Technology Reports , 1965 .

[9]  Jennifer C. Hou,et al.  Maintaining Sensing Coverage and Connectivity in Large Sensor Networks , 2005, Ad Hoc Sens. Wirel. Networks.

[10]  Yunhao Liu,et al.  Mining Frequent Trajectory Patterns for Activity Monitoring Using Radio Frequency Tag Arrays , 2012, IEEE Transactions on Parallel and Distributed Systems.

[11]  Richard W. Boss,et al.  RFID Technology for Libraries , 2003 .

[12]  Dong-Ik Oh,et al.  CPR Localization Using the RFID Tag-Floor , 2006, PRICAI.

[13]  Roy Want,et al.  The Magic of RFID , 2004, ACM Queue.

[14]  Tomotaka Wada,et al.  An Adaptive Likelihood Distribution Algorithm for the Localization of Passive RFID Tags , 2008, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[15]  Philip S. Yu,et al.  A Sampling-Based Approach to Information Recovery , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[16]  Brian L. Dos Santos,et al.  RFID in the supply chain , 2008, Commun. ACM.

[17]  W. B. Lee,et al.  Design of a RFID case-based resource management system for warehouse operations , 2005, Expert Syst. Appl..

[18]  Nael B. Abu-Ghazaleh,et al.  Testbed design and localization in MiNT-2: A miniaturized robotic platform for wireless protocol development and emulation , 2009, 2009 First International Communication Systems and Networks and Workshops.

[19]  Weijia Jia,et al.  Complete optimal deployment patterns for full-coverage and k-connectivity (k≤6) wireless sensor networks , 2008, MobiHoc '08.