Longitudinal study of a building-scale RFID ecosystem

Radio Frequency IDentification (RFID) deployments are becoming increasingly popular in both industrial and consumer-oriented settings. To effectively exploit and operate such deployments, important challenges must be addressed, from managing RFID data streams to handling limitations in reader accuracy and coverage. Furthermore, deployments that support pervasive computing raise additional issues related to user acceptance and system utility. To better understand these challenges, we conducted a four-week study of a building-scale EPC Class-1 Generation-2 RFID deployment, the "RFID Ecosystem", with 47 readers (160 antennas) installed throughout an 8,000 square meter building. During the study, 67 participants having over 300 tags accessed the collected RFID data through applications including an object finder and a friend tracker and several tools for managing personal data. We found that our RFID deployment produces a very manageable amount of data overall, but with orders of magnitude difference among various participants and objects. We also find that the tag detection rates tend to be low with high variance across the type of tag, participant and object. Users need expert guidance to effectively mount their tags and are encouraged by compelling applications to wear tags more frequently. Finally, probabilistic modeling and inference techniques promise to enable more complex applications by smoothing over gaps and errors in the data, but must be applied with care as they add significant computational and storage overhead.

[1]  Yunhao Liu,et al.  ANDMARC: Indoor Location Sensing Using Active RFID , 2003, PerCom.

[2]  Yang Li,et al.  Cascadia: A System for Specifying, Detecting, and Managing RFID Events , 2008, MobiSys '08.

[3]  Prashant J. Shenoy,et al.  Ferret: RFID Localization for Pervasive Multimedia , 2006, UbiComp.

[4]  Bing Jiang,et al.  I Sense a Disturbance in the Force: Unobtrusive Detection of Interactions with RFID-tagged Objects , 2004, UbiComp.

[5]  Wolfram Burgard,et al.  Mapping and localization with RFID technology , 2004, IEEE International Conference on Robotics and Automation, 2004. Proceedings. ICRA '04. 2004.

[6]  David Wetherall,et al.  An empirical study of UHF RFID performance , 2008, MobiCom '08.

[7]  Bill N. Schilit,et al.  An overview of the PARCTAB ubiquitous computing experiment , 1995, IEEE Wirel. Commun..

[8]  Christopher Ré,et al.  Challenges for Event Queries over Markovian Streams , 2008, IEEE Internet Computing.

[9]  Prashant J. Shenoy,et al.  Probabilistic Inference over RFID Streams in Mobile Environments , 2009, 2009 IEEE 25th International Conference on Data Engineering.

[10]  David Kotz,et al.  Analysis of a Campus-Wide Wireless Network , 2002, MobiCom '02.

[11]  Roy Want,et al.  Bridging physical and virtual worlds with electronic tags , 1999, CHI '99.

[12]  Context-Aware Computing,et al.  Inferring Activities from Interactions with Objects , 2004 .

[13]  Leilani Battle,et al.  Building the Internet of Things Using RFID: The RFID Ecosystem Experience , 2009, IEEE Internet Computing.

[14]  Gaetano Borriello,et al.  Reminding About Tagged Objects Using Passive RFIDs , 2004, UbiComp.

[15]  Magdalena Balazinska,et al.  Challenges for Pervasive RFID-Based Infrastructures , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).

[16]  Lenin Ravindranath,et al.  SixthSense: RFID-based Enterprise Intelligence , 2008, MobiSys '08.

[17]  Magdalena Balazinska,et al.  Characterizing mobility and network usage in a corporate wireless local-area network , 2003, MobiSys '03.

[18]  David B. Dunson,et al.  Bayesian Data Analysis , 2010 .

[19]  Sherry Hsi,et al.  RFID enhances visitors' museum experience at the Exploratorium , 2005, CACM.

[20]  Daniel D. Deavours,et al.  Performance benchmarks for passive UHF RFID tags , 2006, MMB.

[21]  Fusheng Wang,et al.  Temporal Management of RFID Data , 2005, VLDB.

[22]  Jakob E. Bardram,et al.  Applications of context-aware computing in hospital work: examples and design principles , 2004, SAC '04.

[23]  Gaetano Borriello,et al.  Some sensor network elements for ubiquitous computing , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[24]  Prashant J. Shenoy,et al.  Sherlock: automatically locating objects for humans , 2008, MobiSys '08.

[25]  Jennifer Healey,et al.  A Long-Term Evaluation of Sensing Modalities for Activity Recognition , 2007, UbiComp.

[26]  Dieter Fox,et al.  Real-time particle filters , 2004, Proceedings of the IEEE.

[27]  R. Van der Togt,et al.  Electromagnetic interference from radio frequency identification inducing potentially hazardous incidents in critical care medical equipment. , 2008, JAMA.

[28]  Christopher Ré,et al.  Access Methods for Markovian Streams , 2009, 2009 IEEE 25th International Conference on Data Engineering.

[29]  Samuel Madden,et al.  MauveDB: supporting model-based user views in database systems , 2006, SIGMOD Conference.

[30]  Samuel Madden,et al.  Using Probabilistic Models for Data Management in Acquisitional Environments , 2005, CIDR.

[31]  Christopher Ré,et al.  Event queries on correlated probabilistic streams , 2008, SIGMOD Conference.

[32]  Timothy J. Robinson,et al.  Sequential Monte Carlo Methods in Practice , 2003 .

[33]  Lawrence R. Rabiner,et al.  A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.

[34]  Steve Hodges,et al.  Assessing and Optimizing the Range of UHF RFID to Enable Real-World Pervasive Computing Applications , 2007, Pervasive.

[35]  Yunhao Liu,et al.  LANDMARC: Indoor Location Sensing Using Active RFID , 2004, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[36]  Friedemann Mattern,et al.  Smart Playing Cards - Enhancing the Gaming Experience with RFID , 2006 .

[37]  Joshua R. Smith,et al.  RFID-based techniques for human-activity detection , 2005, Commun. ACM.

[38]  Sunny Consolvo,et al.  Learning and Recognizing the Places We Go , 2005, UbiComp.

[39]  Andy Hopper,et al.  Implementing a Sentient Computing System , 2001, Computer.

[40]  Minos N. Garofalakis,et al.  Adaptive cleaning for RFID data streams , 2006, VLDB.