Reliability based Radio Frequency Identification Reader Redundant Optimization Model in Electronic Product Code Network He Xu, Suo-ping Wang, Ru-chuan Wang Reliability based Radio Frequency Identification Reader Redundant Optimization Model in Electronic Product Code Network 1,3,4 He Xu, 2Suo-ping Wang, 1,3,4Ru-chuan Wang College of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210003, China, E-mail: [email protected] 2 College of Automation, Nanjing University of Posts and Telecommunications, Nanjing 210003, China, E-mail: [email protected] 3 Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Jiangsu, Nanjing 210003, China, E-mail: [email protected] 4 Key Lab of Broadband Wireless Communication and Sensor Network Technology (Nanjing University of Posts and Telecommunications), Ministry of Education Jiangsu Province, Nanjing 210003, China, E-mail: [email protected] *1, First Author, Corresponding Author Abstract The Electronic Product Code (EPC) Network, originally developed by the Auto-ID Center with its standards now managed by EPCglobal, is designed and implemented to enable all objects in the world to be linked via the Internet for all time. EPC is the next evolution of product identification, utilizing Radio Frequency Identification (RFID) technology to identify objects. RFID technology has been widely used in many areas, and how to deploy of a large number of readers becomes a core challenge due to the limited read range between reader and tag. This paper proposes a novel reader redundant optimization model for finding optimal redundant number of readers and their positions to cover all tags with using optimization algorithm in EPC network. Firstly, we give an overview of the collision problems in RFID system. Secondly, we propose reliability based RFID reader system model. Thirdly, we use ant colony algorithm to solve this optimization problem. Analysis results show the effectiveness of the proposed system model and simulation results show that the algorithm is effective in achieving the goal of this optimal solution. Keywords: RFID, Reliability, EPC Network, Ant Colony Optimization 1. Introduction Along with the advent of the Internet of Things (IoT), the humanity will use artificial intelligence to process the basic daily management all the time, which will make us extricate from the tedious low level management, thus more manpower and physical resource will be invested into this new technical research and development. Radio Frequency Identification (RFID) technology is one of the key technology of the IoT[1], and has been successfully applied to the areas of supply chain, transportation, healthcare, mobile payment and services to name a few[2-6]. An RFID system usually consists of three components: transponder, reader and middleware. The tag stores information, the reader is capable of reading data from and writing data to the tag, usually, the middleware usually is a data processing server which consists of a host computer utilizing data acquired through the reader and applications. There are two conflicts in RFID reader network, which is tag-tag conflict and reader-reader conflict. For the tag-tag conflict, ALOHA algorithm[7-9] and the binary tree algorithm[10] are usually used in RFID system. For the reader-reader conflict, there are also many works done in this problem. The reader collision problem in RFID system was first presented in [11]. When this problem was proposed, James Waldrop et al in [12, 13] presented the colorwave algorithm, which is an anti-collision algorithm for the reader collision problem and presented the colorwave which is a MAC for RFID reader networks. Colorwave is a distributed TDMA based algorithm, where each reader chooses a random time slot to transmit. If it collides, it selects a new timeslot and sends a kick (small control packet) to all its neighbors to indicate selection of new timeslot. If any neighbors has the same color, it chooses a new color and sends a kick and International Journal of Advancements in Computing Technology(IJACT) Volume4, Number18,October. 2012 doi:10.4156/ijact.vol4.issue18.68 577 Reliability based Radio Frequency Identification Reader Redundant Optimization Model in Electronic Product Code Network He Xu, Suo-ping Wang, Ru-chuan Wang this continues. If the percentage of successful transmission goes below certain threshold, the maxColors is incremented and if the percentage increases beyond certain threshold, the maxColors is decremented. But in [12, 13], there was a small numbers of readers in RFID network. Shailesh M. Birari and Sridhar Iyer proposed PULSE [14], which is a distributed protocol reducing reader collisions. In PULSE, there are two channels: data channel and control channel. The data channel is used for reader-tag communication whereas the control channel is used for reader-reader communication. It has an assumption that the reader is able to simultaneously receive on both the control and the data channel. But PULSE is based on a beaconing mechanism, while a reader is reading the tags, it periodically broadcasts a beacon on a separate control channel. Any other reader that wants to communicate with the tags first senses the control channel for a beacon. If it does not receive any beacon for a specified amount of time, it transmits a beacon and starts communicating with the tags. It then continues to periodically transmit a beacon as long as it is communicating with the tags. But this kind of periodic transmitter data for the peripheral neighbor will cause the reader energy consumption to speed up. DiCa[15] was proposed to suit for energy-efficient wireless mobile network environments cooperated with RFID, and the DiCa is capable not only of avoiding collisions, but also changing power states autonomously through simple interaction of adjacent readers. But DiCa algorithm has not considered reader’s concrete position, when it carry on the avoidance no matter whether to have the interference region. In the meanwhile, fairness question has not been considered among in reader competition data channel’s domination time. HiQ[16] is a hierarchical, online learning algorithm that finds dynamic solutions to the Reader Collision Problem in RFID systems. The algorithm is based on a type of reinforcement learning called Q-learning, which is used to determine frequency and time assignments. But the tag does not have the frequency recognition capability, while there are two different frequencies simultaneously reading the identical tag, the tag is unable to decide the information returns for which reader, and this condition causes collision’s occurrence. Because HiQ has used the intelligent processing method, and this increases the complexity of the reader protocol design. The goal of this paper is to study the potential to discover more redundant RFID readers. The novelty we suggest is that we set up a novel reliability based optimization model with using ant colony algorithm to solve this optimization model for finding optimal number of readers in RFID network. The next two sections will describe the proposed optimization model depicting all the entities, working process and the solution method for this optimization model. 2. Proposed Model The reliability of RFID reader system is described with the confidence and the coverage. Consider the reality stream R, and an RFID data stream D. Given R and D, define: (1) True Positives (TP) as the set of all readings that are present in R as well as D; (2) False Positives (FP) as the set of all readings that are present in D but not in R; (3) False Negatives (FN) as the set of all readings present in R but not in D. The confidence and coverage are defined by as follows[17]. Confidence: a per-reading value, gives the probability that the reading exists in the reality stream (i.e., that the object exists in reality at the given time and location). Ideally, confidence is 1 for all readings in TP and 0 for all readings in FP. This metric is naturally extended to the entire data stream D, or any subset of readings: The confidence for a set of readings is the average of the confidences of the individual readings. Coverage: Coverage is a window-level value assigned to a set of readings for a given time period T. It gives the fraction of readings from R in the time period T that are present in D. Hence, for the entire stream, or for any time-window having associated values of TP, FP and FN, TP . Coverage TP FN Redundant-Reader Problem[18]: Given a set of RFID tags and a set of RFID readers covering all the RFID tags, find the minimum cardinality subset of RFID readers, covering all the tags. Suppose there are n regions and m kinds of readers in RFID Reader system. The similar kind of 578 Reliability based Radio Frequency Identification Reader Redundant Optimization Model in Electronic Product Code Network He Xu, Suo-ping Wang, Ru-chuan Wang reader is used in each region. According to the above supposition, the redundancy optimization model for reader system is set up as follows: n m minCs cij xij (1) i 1 j 1 s.t. R s n m i 1 j 1 Rij ( xij ) R0 (2) 1 if reader is active xij 0 if reader is turned off (3) Where C s represents the cost of total reader system, Rs is the system reliability, coverage of readerij , represents the absence Rij ( xij ) represents or present status of reader, of the i-th m xi {0,1} ( xij cij is the ), reliability j 1 m subsystem, R ij ( x ij ) 1 (1 p ij ) j 1 x ij , pij is the confidence of readerij , R0 is the predetermined reliability which RFID reader system must achieve. 3. Optimization Algorithm Finding minimal set of readers to cover the entire region in RFID network is a NP-hard problem[18]. Hence suitable optimization algorithm may be applied to solve the problem. In this paper, we use the ant colony optimization (ACO) algorithm to solve the Reader Redundant Elimination (RRE) optimization problem, and name it ACO-RRE. In order to solve the proposed reliability based redundancy optimization model, we make the constraint equation as the penalty function added to Eq. (1), then the original constraint question is transformed to non-restraint optimization, which can be solved by ACO algorithm. Namely, n min m i 1 j 1 m n m xij j 1 R0 cij xij M min 0, (1 Rij ) i 1 j 1 2 (4) Where M is a very big positive number. Because of the limit power of reader, coverage area and entire RFID system, the redundant quantity m j 1 m xij (i=1,2,…, n) cannot be too big, suppose the maximum value of j 1 xij is x max . The reliability diagram is as Fig. 1 shown. There are x max readers in every column, totally x max n readers in RFID network. From Fig. 1 we can see that the 1st column level to the n-th column level are connected together, which composes a solution. As Fig. 1, it shows an probable solution (31,22,23, …,1n). 579 Reliability based Radio Frequency Identification Reader Redundant Optimization Model in Electronic Product Code Network He Xu, Suo-ping Wang, Ru-chuan Wang Figure 1. The reliability based network topology According to the literature [19], the template for defining ACO models is: M(<problem>,<update_rule>,<nr_of_ants>) (5) Where < problem > is the considered problem (or problem type, such as, for example, unconstrained problems), < update_rule > is the pheromone update rule that is considered, and < nr_of_ants > is the number of ants that build solutions at each iteration. Suppose each column level establishes 1 ant (it is also possible to be set more than 1) in reliability based RFID network, each ant only moves in its own column level among readers, the probability of the ant in the j-th column level transfers to i-th reader is q ij q ij : ij (6) x max i 1 ij The renewal equation is: ijnew ijold Q (7) Where ij represents the attraction intensity of the i-th reader in j-th column, durable coefficient of the intensity (generally it takes 0.5~0.9), represents the Q is a normal number. ij represents the target function difference of the Eq. (4). If ij 0 , because the goal function value reduces, then the ant moves from the i-th reader to the j-th reader; if ij 0 , the ant maintains the current condition. Fig. 2 shows the detailed steps to solve RRE using ACO-RRE, which has the following steps: 1)S = 0(S is the cycle-time), the matrix [ ij ]n m is bestowed the same value, and set the value of Q and . 2)Put each column an ant randomly. (This is similar to give an initial solution) . 3)The ant according to the probability q ij decides to choose the reader. If ij 0 , the ant moves and then set the corresponding xij = 1 ; If ij 0 , the ant doesn't move, and set the corresponding xij = 0. 580 Reliability based Radio Frequency Identification Reader Redundant Optimization Model in Electronic Product Code Network He Xu, Suo-ping Wang, Ru-chuan Wang 4) Update the ij according the renewal equation (Eq. (7)), and set S = S+1. 5)If S > predefined cycle times, we record current ant's position (current solution), then stop the ant’s movement. Otherwise go to step 3. ij ij ij 0 ij 0 ij Figure 2. Flow chart of ACO-RRE 4. Performance Evaluation In this section, we compare the performance of our ACO-RRE with traditional RRE[18]. In the experiment, we set: n=m=10, q ij = Random (0.5, 0.9), cij = Random (0.8, 1.0), M=107, [ ij ]n m=[10]n m, Q=10, R0=0.95. The experiment compares the performance of RRE and ACORRE when the number of RFID readers increases from 100 to 1000(that is m or n which changes from 10 to 100), when the total number of RFID tags is 5000. Fig. 3 shows the results of this experiment. For scarce RFID readers, few of the readers are redundant. As the number of reader increases, the number of the redundant readers increases, but RRE discovers fewer redundant readers than ACO-RRE. The experiment’s result shows that ACO-RRE is a stable solution with good performance for redundant reader elimination for RFID system. 581 Reliability based Radio Frequency Identification Reader Redundant Optimization Model in Electronic Product Code Network He Xu, Suo-ping Wang, Ru-chuan Wang Figure 3. Number of redundant readers discovered The second experiment measures the dependency between the number of redundant readers discovered by RRE and ACO-RRE and the interrogation radius of readers. We randomly deploy 800 RFID readers and 2000 RFID tags, and increase the interrogation radius of readers from 10 to 100m. Fig. 4 shows that with the increase in the interrogation radius of RFID readers, both RRE and ACORRE discover an increasing number of redundant readers. This is because active readers cover larger areas, effectively necessitating fewer active readers to cover all the tags. While RRE discovers fewer redundant readers than ACO-RRE, the difference is almost constant for smaller interrogation zone overlaps, and the difference between RRE and ACO-RRE increases gradually for large interrogation zones. Figure 4. Number of redundant readers discovered by different reader interrogation zone 5. Conclusions In this paper we firstly give an overview of RFID reader collision problems. Then we set up optimization model for redundant reader elimination in RFID network which is reliability-based redundant optimization method, and use ant colony algorithm to solve this problem. Simulation results 582 Reliability based Radio Frequency Identification Reader Redundant Optimization Model in Electronic Product Code Network He Xu, Suo-ping Wang, Ru-chuan Wang show the effectiveness of the proposed optimization model and also show that the ant colony algorithm is effective in achieving the goal of this optimal solution. However, the proposed RFID reader system and the optimal reader redundant model add the communication complex compared with the traditional RFID reader system. We need to develop a new reader protocol for RFID reader software, and the security of RFID system in EPC network also has to be studied in future work. 6. Acknowledgments The subject is sponsored by the National Natural Science Foundation of P. R. China ( No. 60973139, 61170065, 61171053, 61003039, 61003236, 61103195), the Natural Science Foundation of Jiangsu Province(BK2011755), Scientific & Technological Support Project (Industry) of Jiangsu Province (No.BE2010197, BE2010198, BE2011844, BE2011189), Natural Science Key Fund for Colleges and Universities in Jiangsu Province (11KJA520001), Project sponsored by Jiangsu provincial research scheme of natural science for higher education institutions(10KJB520013, 11KJB520014, 11KJB520016, 12KJB520009), Scientific Research & Industry Promotion Project for Higher Education Institutions(JH2010-14, JHB2011-9), Postdoctoral Foundation (20100480048), Science & Technology Innovation Fund for higher education institutions of Jiangsu Province(CX10B-196Z, CX10B-199Z, CX10B-200Z, CXZZ11-0405, CXZZ11-0406), Doctoral Fund of Ministry of Education of China(20103223120007, 20113223110002) and key Laboratory Foundation of Information Technology processing of Jiangsu Province (KJS1022), A Project Funded by the Priority Academic Program Development of Jiangsu Higher Education Institutions(PAPD). The authors would like to thank the editors and the anonymous reviewers, who provide insightful and constructive comments for improving this paper. 7. References [1]Welbourne E, Battle L, Cole G, Gould K, Rector K, Raymer S, Balazinska M, and Borriello G, "Building the internet of things using RFID: the RFID ecosystem experience", IEEE Internet Computing, vol. 13, no. 3, pp. 48-55, 2009. [2]Koralalage K S and Yoshiura N, "OTag: Architecture to Represent Real World Objects in RF Tags to improve future Intelligent Transportation Systems", Journal of Convergence Information Technology, vol. 4, no. 2, pp. 30-48, 2009. [3]Qadeer M A, Akhtar N, Govil S, and Varshney A, "A Novel Scheme for Mobile Payment Using RFID-Enabled Smart SIMcard", In Proceedings of the International Conference on Future Computer and Communication (ICFCC 2009), pp. 339-343, 2009. [4]Joseph K S, Liang G, Pang K, Sheng H, and Wang D, "Impact of RFID Technology on Tracking of Export Goods in Kenya", Journal of Convergence Information Technology, AICIT, vol. 5, no. 9, pp. 190-199, 2010. [5]Wang S W, Chen W H, Ong C S, Liu L, and Chuang Y W, "RFID application in hospitals: a case study on a demonstration RFID project in a Taiwan hospital", In Proceedings of the the 39th Annual Hawaii International Conference on System Sciences (HICSS '06), vol. 8, pp. 184a, 2006. [6]Nambiar A N, "RFID Technology: A Review of its Applications", In Proceedings of the Proceedings of the World Congress on Engineering and Computer Science, vol. 2, pp. 1253-1259, 2009. [7]Floerkemeier C, "Bayesian transmission strategy for framed ALOHA based RFID protocols", In Proceedings of the IEEE International Conference on RFID (2007), pp. 228-235, 2007. [8]Wang Y Q, Jiang G P and Wang J, "Framed slotted ALOHA with grouping tactic and binary selection for anti-collision in RFID systems", The Journal of China Universities of Posts and Telecommunications, vol. 16, no. 4, pp. 47-52, 2009. [9]Wang Y Q and Jiang G P, "Dynamic framed slotted ALOHA algorithm used in RFID system", Nanjing Youdian Daxue Xuebao(Ziran Kexue Ban), vol. 30, no. 1, pp. 26-32, 2010. [10]Zhang N and Vojcic B, "Binary search algorithms with interference cancellation rfid systems", In Proceedings of the IEEE Military Communications Conference (MILCOM 2005), pp. 950-955, 2006. [11]Engels D W and Sarma S E, "The reader collision problem", In Proceedings of the IEEE 583 Reliability based Radio Frequency Identification Reader Redundant Optimization Model in Electronic Product Code Network He Xu, Suo-ping Wang, Ru-chuan Wang International Conference on Systems, Man and Cybernetics, vol. 3, pp. 6-11, 2002. [12]Waldrop J, Engels D W and Sarma S E, "Colorwave: an anticollision algorithm for the reader collision problem", In Proceedings of the IEEE International Conference on Communications (ICC'03), vol. 2, pp. 1206-1210, 2003. [13]Waldrop J, Engels D W and Sarma S E, "Colorwave: A MAC for RFID reader networks", In Proceedings of the IEEE Wireless Communications and Networking (WCNC 2003), vol. 3, pp. 1701-1704, 2003. [14]Birari S and Iyer S, "Pulse: A mac protocol for RFID networks", Embedded and Ubiquitous Computing, Springer, pp. 1036-1046, 2005. [15]Hwang K, Kim K and Eom D, "DiCa: Distributed tag access with collision-avoidance among mobile RFID readers", Emerging Directions in Embedded and Ubiquitous Computing, Springer, pp. 413-422, 2006. [16]Ho J, Engels D W and Sarma S E, "HiQ: a hierarchical Q-learning algorithm to solve the reader collision problem", In Proceedings of the Proceedings of the International Symposium on Applications and the Internet Workshops (SAINTW’06), pp. 1-4, 2006. [17]Sarma A D, Jeffery S R, Franklin M J, and Widom J, "Estimating data stream quality for objectdetection applications", Technical Report, Citeseer, 2005. [18]Carbunar B, Ramanathan M K, Koyuturk M, Hoffmann C, and Grama A, "Redundant reader elimination in RFID systems", In Proceedings of the IEEE SECON, pp. 176-184, 2005. [19]Dorigo M and Blum C, "Ant colony optimization theory: A survey", Theoretical computer science, Elsevier, vol. 344, no. 2-3, pp. 243-278, 2005. 584
© Copyright 2024 ExpyDoc