Next Article in Journal
Transverse Distribution of Concentrated Loads on Timber Composite Floors
Previous Article in Journal
Analysis of Drying of Brewers’ Spent Grain
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Proceeding Paper

Protocol for Streaming Data from an RFID Sensor Network †

DeustoTech, Fundacion Deusto, University of Deusto, 48940 Bilbao, Spain
*
Author to whom correspondence should be addressed.
Presented at the 12th International Conference on Ubiquitous Computing and Ambient Intelligence (UCAmI 2018), Punta Cana, Dominican Republic, 4–7 December 2018.
Proceedings 2018, 2(19), 1234; https://doi.org/10.3390/proceedings2191234
Published: 1 November 2018
(This article belongs to the Proceedings of UCAmI 2018)

Abstract

:
Currently, there is an increasing interest in the use of Radio Frequency Identification (RFID) tags which incorporate passive or battery-less sensors. These systems are known as computational RFID (CRFID). Several CRFID tags together with a reader set up an RFID sensor network. The reader powers up the tags’ microcontroller and their attached sensor using radio frequency waves, and tags backscatter, not only their E P C code but also the value of those sensors. The current standard for interrogating these CRFID tags is the EPC global Class 1 Generation 2 (EPC C1G2). When several tags are located inside the reader interrogation area, the EPC C1G2 results in very poor performance to obtain sensor data values. To solve this problem, a novel protocol for streaming sensor data is presented. The proposed protocol increases the Sensor Read Rate ( S R R ), defined as the number of sensor data reads per second, compared to the standard. Additionally, this paper presents a prototype of an RFID sensor network to compare the proposed custom protocol with the standard, obtaining a 53% of improvement in S R R with respect to the EPC C1G2.

1. Introduction

The straight adaptability of the Radio Frequency Identification (RFID) technology to the demands of the supply chain is continuously increasing its popularity. Applications such as the goods tracking and monitoring, traceability of patients or managing the medication of elderly in health-care have presented promising improvements thanks to RFID [1].
A basic RFID system is composed of a reader and one or several tags. The reader interrogates tags by transmitting radio frequency (RF) signals containing commands. Tags are simple devices that respond with their Electronic Product Code ( E P C ) and can be active or passive. Active tags are powered with batteries, whilst passive tags use the reader signal to power up their circuitry. The latter devices are becoming attractive due to their low cost (≈10 cents), a small sticker form factor, and the operation range of over 10 meters from the reader. Additionally, there is an increasing interest in passive tags thanks to Computational RFID (CRFID) systems [2]. Several research applications have been proposed exploiting the potential of CRFID in environment monitoring [3], activity recognition [4] or the battery-free camera [5]. These systems use passive tags containing a programmable micro-controller and a battery-less sensor which are powered using the reader RF signal and respond backscattering, not only their E P C code but also the value of their sensor.
These passive sensors together with the reader set up an RFID sensor network (see Figure 1) which offers the potential for densely distributed sensing that inherits the already mentioned attractive features of RFID. Several solutions are exposed in the literature in terms of integrating RFID with Wireless Sensor Networks (WSN) [6,7] to improve their capabilities and the applicability of both systems to the real world. A way of integrating RFID and WSNs is the incorporation of sensing capabilities to RFID tags. This paper is focused on the case where one reader interrogates several distributed CRFID tags.
RFID sensor networks use the same protocols and mechanisms for reading tags E P C codes and collecting their sensed data [8]. This fact makes the sensing process very inefficient because the reader has to face the tag collision problem first, identify all the tags in the range of the antenna, and then collect sensed data. The current standard used in RFID to identify tags overcoming the tag collision problem is the EPCglobal class 1 Gen 2 protocol (EPC C1G2) [9]. This is an arbitration oriented protocol used in every commercial reader, also included in ISO 18000-6C. However, the main purpose of this protocol is not sensor reading and therefore, it presents poor efficiency when streaming sensor data. The data coming from the sensors gets broken into packets, highly increasing the overhead of the reading process.
In order to improve the performance of the standard EPC C1G2 when streaming sensor data from passive sensors, a custom protocol is proposed. The analysis performed in this work show that the proposed protocol increases the Sensor Read Rate S R R , defined as the number of sensor data reads per second, compared to EPC C1G2.
Moreover, both the standard and the proposed protocol are tested on a physical RFID sensor network which consists of a software defined radio (SDR) reader and several Wireless Identification and Sensing Platform (WISP) tags [2]. WISP is a battery-free RFID sensor device powered via the RF energy transmitted by the reader. It carries a programmable micro-controller that allows the use of different identification and sensing protocols. Also, these tags contain an accelerometer sensor.
The paper is organized using the following structure: Section 2 presents the standard protocol for UHF tag identification; Section 3 presents an overview of the proposed protocol; Section 3 contains the experimentation details and the performance analysis; and Section 4 concludes this work and proposes future work.

2. EPC Class 1 Generation 2 Standard

The EPC C1G2 is the standard used in UHF RFID systems [9]. This standard contains the different layers that define the communication between the reader and the tags, and involves the Identification phase (anti-collision protocol) and the Sense phase (sensor read). The EPC C1G2 requires the reader to identify a tag right before reading its sensor value.
  • The Identification phase.
    In this phase the reader obtains the E P C that uniquely identifies a particular tag inside the reader’s range. EPC C1G2 employs a Dynamic Frame Slotted Aloha (DFSA) protocol to arbitrate tags’ collisions, known as the Slot Counter protocol [9]. It follows a Time Division Multiple Access MAC scheme, scheduling the tags’ responses along time slots (see Figure 2). The Identification process begins with the reader transmitting a Query command to set the frame size of value 2 Q ; then at the end of an old frame set a new frame size, or to jump from one slot to another. Then, tags randomly select a slot in the frame (the initial value of their internal slot counter S C going from 0 to 2 Q 1 ) and respond to the reader when S C = 0 . Waiting tags decrease their counter every time the reader transmits a Query command to jump to the next slot. If tags responses collide, they will have to wait until the next frame to choose another slot and transmit again. The probability of collision is sensitive to the choice of the frame size, whose optimum setting depends on the number of responding tags (unknown for the reader). Thus, when S C = 0, the tag transmits a 16-bit random number ( R N 16 ); and once it is acknowledged ( A C K ), the tag transmits its unique E P C code. The Identification phase ends when the reader has received the E P C from a particular tag. The reader commands flow to identify one tag would be as follows (assuming no collision occurred): Query-ACK(RN16).
  • The Sense phase.
    Once a particular tag has been identified in the previous phase, during the Sense phase the reader reads data from its sensor. The Sense phase starts when the reader transmits the Req_RN16(RN16) command, asking the tag for a smaller bit-string (16 bits) named h a n d l e which expires after the reading. This phase ends when the reader has received one sensor data from the tag. The reader commands flow to read one sensor data would be as follows: Req_RN16(RN16)-Read(handle).
Figure 2. Identification phase of the EPC C1G2 protocol.
Figure 2. Identification phase of the EPC C1G2 protocol.
Proceedings 02 01234 g002
Figure 3 shows an example of the procedure followed by the reader to obtain 2 sensor reads ( S = 2 ) from 2 tags ( N = 2 ), using the standard EPC C1G2. The reader commands flow would be as follows (assuming no collision occurred): Query-ACK(RN16)-Req_RN16(RN16)-Read(handle 1)-Query-ACK(RN16)-Req_RN16(RN16)-Read(handle 2).
It can be appreciated that in the standard protocol, the reader must receive the E P C and h a n d l e from a sensor tag before transmitting a Read command to read an additional sensor data. This paper proposes a custom protocol to improve the efficiency of sensors data streaming, by avoiding the overhead caused by having to identify again each sensor tag before reading an additional sensor data.

3. The Proposed Protocol

Using the EPC C1G2, the reader is forced to identify a tag before reading its sensor. This procedure results in a very inefficient strategy of streaming data from sensors. The proposed custom protocol for streaming sensor data provides a much higher reading rate than the protocol used in the current RFID standard. It slightly modifies the Identification phase of the EPC C1G2 extending it until the reception of at least one h a n d l e bit-string of the available tags in the antenna range. Then, the reader would be able to read data from all the sensors by using these previously obtained h a n d l e s.
The proposed protocol employs the interrogation and access commands from EPC C1G2. It is therefore compatible with sensor tags following the EPC C1G2 standard, with the particularity that tags must remember their last transmitted h a n d l e until they loose their state. The presented custom protocol is also separated in two phases: Identification and Sense phase.
  • Identification Phase
    It starts when the reader transmits the first Q u e r y command to identify the N tags inside the reader’s range, and it ends when the reader has received one h a n d l e from each sensor tag or when a timer expires. This timer prevents the reader from remaining in the identification phase for an undesired long time and not reaching the sense phase. At the end of this phase, therefore, the reader ends up with a clear overview of all the tags into its antenna range, their E P C s and h a n d l e s. The reader commands flow to identify one tag would be as follows (assuming no collision occurred): Query-ACK(RN16)-Req_RN16(RN16).
  • The Sense phase
    It starts when the reader transmits the first R e a d command. Then, the reader transmits consecutive Read commands to cyclically read one set of data from each sensor. This phase ends when the reader has received the required number of sensor reads S or after a timer expires. This timer prevents the reader from remaining in the sense phase for an undesired long time.
    For instance, Figure 4 assumes N = 2 and S = 2 , and the Sense phase would consist of the following reader commands flow: Read(handle 1)-Read(handle 2)-Read(handle 1)-Read(handle 2). This procedure needs the reader to associate these h a n d l e strings to each E P C , and the tags to remember their h a n d l e until the Sensing phase is over.
Figure 4. Example of the Sense phase with N = 2 and S = 2 for the custom protocol.
Figure 4. Example of the Sense phase with N = 2 and S = 2 for the custom protocol.
Proceedings 02 01234 g004
Figure 5 shows a comparison of both the EPC C1G2 procedure and the custom protocol.
It can be appreciated that in the standard EPC C1G2, in order to receive an additional sensor data, the reader must receive the E P C code and one h a n d l e from a sensor tag before transmitting a R e a d command. The custom protocol improves the efficiency of sensors data streaming, by avoiding the overhead caused by having to identify again each sensor tag before reading an additional sensor data.
Furthermore, the higher the number of sensor data reads in a dense RFID sensor network, the more notable the improvement of the proposed protocol in terms of S R R in relation to the protocol used in EPC C1G2. In a particular RFID scenario, with a particular set of parameters, if the reader uses the standard protocol, tags’ collisions will affect not only the process of tags identification but also the process of reading the sensors data. Therefore, any additional sensor data read will have a certain probability of tags collisions. In the proposed protocol, collisions only affect the identification phase (assuming that every tag in the system choses a unique h a n d l e ). Once tags are identified, the reader can read consecutive sensor data without experiencing tag collisions.

4. Performance Analysis

To validate the efficiency of the proposed protocol, an RFID sensor network for custom sensor data streaming has been developed with an SDR UHF RFID reader and accelerometer sensors included in WISP tags (version 5.1). The physical system is shown in Figure 6. The RFID reader consists of a commodity USRP N210, with a single SBX daughter-board, a Gigabit switch, and a Linux laptop. The transmit and receive ports of the daughter-board are connected with two circularly polarized patch antennas of 6dBi gain. All processing of the backscattered signal is performed on a laptop that controls the SDR. The WISP tags have been reconfigured to keep in memory their last transmitted h a n d l e until they loose their state. Each accelerometer sensor data consists of 32 bits organized in 16-bit words (a total of 2 words). Therefore, in order to request one accelerometer sensor data from a WISP tag, the reader configures the Read command with the field Word-count: {00000010}. These tags take the data from their accelerometer sensor and save it on memory with a periodic update.
The reader uses the software modules of the system presented in [10], built on GNU radio 3.7.11 (source, matched filter, gate, decoder, and reader), with extended functionalities, highlighting the differentiation of idle and collision/success tags responses, anti-collision capabilities, and the implementation of additional reader commands.
The SDR reader employs FM0 with T a r i = 12.5 u s for the commands transmissions, and it has been configured to decode WISP data transmitted with a backscatter-link-frequency, B L F , of 160 Khz. The reader transmission frequency is set to 915 MHz. An example of the Sense phase of the custom protocol for three different WISP accelerometer tags using the custom protocol is showed in Figure 7. This figure shows one accelerometer sensor read for each one of the three tags.
Next, the S R R is evaluated for the proposed custom protocol and the standard protocol for N = {1, 2, 3} and S = 5. All the WISP accelerometer tags were placed inside the reader’s range, 1 m away from the antennas. To evaluate S R R experimentally, a timer is started in the reader program when the reader transmits the first Query, and it is stopped when the reader decodes correctly at least five data packets from each accelerometer tag. Therefore, the experimental results also include the reader processing time. Additionally, S R R is evaluated analytically by measuring the number of transmitted reader queries (Query, ACK, Req_RN, Read), and received tag responses (RN16, EPC, handle, sensor data), and multiplying them by their corresponding duration, which the reader knows a priori. Results are shown in Figure 8.
Clearly, the proposed custom protocol achieves a higher S R R than the standard protocol, for the three set of tags analyzed. For both protocols, S R R decreases with increasing N, due to tag collisions. Also, experimental S R R is lower than the theoretical one, as expected, because the system requires some time for the processing and calculations tasks. The proposed protocol achieves an improvement in S R R of 74%, 54%, and 53% with respect to the standard for N = 1, N = 2, and N = 3, respectively.

4.1. Identified Limitations

The proposed protocol takes advantage of storing the tag h a n d l e produced after receiving the unique E P C to cyclically read a particular tag. The E P C has a usual length of 128 bits, and the length of the h a n d l e is 16 bits. The total number of distinguishable tags with the E P C is highly superior than with the h a n d l e code ( 2 16 = 65535 tags < < 2 128 tags). Thus, the probability of assigning the same h a n d l e to 2 different tags is higher. It is, thus, affordable to use a fixed h a n d l e in a local RFID sensor network since the probability of having 2 tags under the same h a n d l e is very small. Nevertheless, in case that could happen, if the reader receives a collided response while reading the tags, it will execute the identification phase again to solve that issue.
The E P C is designed to uniquely identify all the tags in the world, whilst the h a n d l e is only used to differentiate the sensors in a local sensor network, usually, with less than 50 sensors in the worst case. The proposed custom protocol has been designed to stream data from a real/physical RFID sensor network. This involves a reader interrogating and reading a feasible number of 10–15 sensor tags. Of course it does not mean that the custom protocol is not able to read a higher number, quite the opposite. The reader is able to do it, however, it may encounter reading problems, caused by the lack of reading transmitting power of the system used in the experimentation.

5. Conclusions and Future Work

A high read rate protocol to stream data from an RFID sensor network is presented in this work. The EPC C1G2 standard protocol results in a very poor performance when reading the sensor data values of several tags. A custom protocol that improves the S R R by 53% with respect to the standard is presented. These results have been obtained using a validation hardware composed of an SDR reader and WISP tags.
The experimentation performed determines a clear improvement capacity of the proposed custom protocol. As future work, a parameterizable protocol for N sensor tags is proposed. Also, inventory and access commands will be optimized for sensor data streaming, reducing some overhead not required for sensor reads. Experimentation will be performed for N>3 and S R R will be measured and compared with the current scenario with three tags.

References

  1. Perez, M.M.; Gonzalez, G.V.; Dafonte, C. The Development of an RFID Solution to Facilitate the Traceability of Patient and Pharmaceutical Data. Sensors 2017, 17, 2247. [Google Scholar] [CrossRef] [PubMed]
  2. Sample, A.P.; Yeager, D.J.; Powledge, P.S.; Mamishev, A.V.; Smith, J.R. Design of an RFID-Based Battery-Free Programmable Sensing Platform. IEEE Trans. Instrum. Meas. 2008, 57, 2608–2615. [Google Scholar] [CrossRef]
  3. Gummeson, J.; Clark, S.S.; Fu, K.; Ganesan, D. On the limits of effective hybrid micro-energy harvesting on mobile CRFID sensors. In Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services, San Francisco, CA, USA, 15–18 June 2018. [Google Scholar]
  4. Buettner, M.; Prasad, R.; Philipose, M.; Wetherall, D. Recognizing daily activities with RFID-based sensors. In Proceedings of the 11th International Conference on Ubiquitous Computing, Orlando, FL, USA, 30 September–3 October 2009; pp. 51–60. [Google Scholar]
  5. Naderiparizi, S.; Parks, A.N.; Kapetanovic, Z.; Ransford, B.; Smith, J.R. WISPCam: A battery-free RFID camera. In Proceedings of the 2015 IEEE International Conference on RFID (RFID), San Diego, CA, USA, 15–17 April 2015; pp. 166–173. [Google Scholar]
  6. Mitrokotsa, A.; Douligeris, C. Integrated RFID and Sensor Networks: Architectures and Applications. RFID Sens. Netw. 2009, 512, 511–535. [Google Scholar]
  7. Mason, A.; Shaw, A.; Al-Shammaa, A.I.; Welsby, T. RFID and wireless sensor integration for intelligent tracking systems. In Proceedings of the 2nd GERI Annual Research Symposium GARS-2006, Liverpool, UK, 15 June 2006. [Google Scholar]
  8. Liu, C.; Chen, L. Applications of RFID technology for improving production efficiency in an Integrated-circuit packaging house. Int. J. Prod. Res. 2009, 47, 2203–2216. [Google Scholar] [CrossRef]
  9. EPCglobal, EPC Radio Frequency Identity Protocols class-1 generation-2 UHF RFID protocol for communications at 860 MHz–960 MHz. In EPCglobal Specification for RFID Air Interface; Version 2.0.1; EPCglobal, EPC: Lawrenceville, NJ, USA, 2015.
  10. Kargas, N.; Mavromatis, F.; Bletsas, A. Fully-Coherent Reader With Commodity SDR for Gen2 FM0 and Computational RFID. IEEE Wirel. Commun. Lett. 2015, 4, 617–620. [Google Scholar] [CrossRef]
Figure 1. Example of an RFID sensor network.
Figure 1. Example of an RFID sensor network.
Proceedings 02 01234 g001
Figure 3. Example of the procedure followed by the standard protocol for N = 2 and S = 2.
Figure 3. Example of the procedure followed by the standard protocol for N = 2 and S = 2.
Proceedings 02 01234 g003
Figure 5. Comparison of the streaming procedure using (a) the standard EPC C1G2 and (b) the proposed custom protocol.
Figure 5. Comparison of the streaming procedure using (a) the standard EPC C1G2 and (b) the proposed custom protocol.
Proceedings 02 01234 g005
Figure 6. The physical RFID system used in the experimental validation. The photo shows an Ettus Research N210 Software Defined Radio, a laptop that controls the SDR, a switch to connect the SDR to the laptop, two circularly polarized antennas and three WISP tags on the front.
Figure 6. The physical RFID system used in the experimental validation. The photo shows an Ettus Research N210 Software Defined Radio, a laptop that controls the SDR, a switch to connect the SDR to the laptop, two circularly polarized antennas and three WISP tags on the front.
Proceedings 02 01234 g006
Figure 7. Three consecutive read commands and three WISP accelerometer tags responses.
Figure 7. Three consecutive read commands and three WISP accelerometer tags responses.
Proceedings 02 01234 g007
Figure 8. Comparison of Sensor Read Rate for the Custom and Standard protocol with N = 1, 2, 3 and S = 5.
Figure 8. Comparison of Sensor Read Rate for the Custom and Standard protocol with N = 1, 2, 3 and S = 5.
Proceedings 02 01234 g008
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Arjona, L.; Landaluce, H.; Perallos, A.; Souto, G. Protocol for Streaming Data from an RFID Sensor Network. Proceedings 2018, 2, 1234. https://doi.org/10.3390/proceedings2191234

AMA Style

Arjona L, Landaluce H, Perallos A, Souto G. Protocol for Streaming Data from an RFID Sensor Network. Proceedings. 2018; 2(19):1234. https://doi.org/10.3390/proceedings2191234

Chicago/Turabian Style

Arjona, Laura, Hugo Landaluce, Asier Perallos, and Gentza Souto. 2018. "Protocol for Streaming Data from an RFID Sensor Network" Proceedings 2, no. 19: 1234. https://doi.org/10.3390/proceedings2191234

Article Metrics

Back to TopTop