Nothing Special   »   [go: up one dir, main page]

Next Article in Journal
A Real-Time Measurement System for Long-Life Flood Monitoring and Warning Applications
Previous Article in Journal
A High Sensitivity Three-Dimensional-Shape Sensing Patch Prepared by Lithography and Inkjet Printing
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Reducing False Negative Reads in RFID Data Streams Using an Adaptive Sliding-Window Approach

by
Libe Valentine Massawe
1,*,
Johnson D. M. Kinyua
2 and
Herman Vermaak
1
1
School of Electrical and Computer Systems Engineering, Central University of Technology, Free State, Bloemfontein 9301, South Africa
2
School of Computer and Information Systems, Virginia International University, Fairfax, VA 22030, USA
*
Author to whom correspondence should be addressed.
Sensors 2012, 12(4), 4187-4212; https://doi.org/10.3390/s120404187
Submission received: 18 February 2012 / Revised: 16 March 2012 / Accepted: 21 March 2012 / Published: 28 March 2012
(This article belongs to the Section Sensor Networks)

Abstract

: Unreliability of the data streams generated by RFID readers is among the primary factors which limit the widespread adoption of the RFID technology. RFID data cleaning is, therefore, an essential task in the RFID middleware systems in order to reduce reading errors, and to allow these data streams to be used to make a correct interpretation and analysis of the physical world they are representing. In this paper we propose an adaptive sliding-window based approach called WSTD which is capable of efficiently coping with both environmental variation and tag dynamics. Our experimental results demonstrate the efficacy of the proposed approach.

1. Introduction

Radio frequency identification (RFID) is a technology that allows an object, a place or a person to be automatically identified with neither physical nor visual contact. Although RFID technology is not new [1], the current upsurge interest in this technology stems from the development of low-cost passive RFID tags and vigorous RFID standardisation efforts. RFID has recently been deployed in many different fields which include: distribution logistics, pharmaceutical and health care, library, contactless ID cards and tickets, asset management, manufacturing, the garment and automotive industries, animal identification, traffic applications, the aviation industry, the military and many more [2,3].

Although the performance of UHF passive RFID-based systems was improved significantly by the introduction of the EPC Class-1 Generation-2 protocol (C1G2) [4], several studies on the performance of the C1G2 RFID systems indicates that the overall performance of the system is still implementation dependent [58]. The empirical study of UHF RFID performance by Buettner et al. [6] shows that physical effects such as errors and multipath interference are significant factors that degrade the overall performance of commercial readers. These effects increase both the duration of each reader cycle and the number of cycles to read all tags in a tag set. They argue that the error rates are highly location dependent and the level of degradation is implementation specific. The work by Kawakita et al. [8] shows that the bit errors, due to erroneous communication links, significantly degrade C1G2 performance. In actual UHF passive RFID deployment, the RFIDs usually share the frequency band with other UHF wireless devices as well as neighbour RFIDs. While some interferences are predictable and controllable, others are unpredictable and uncontrollable, such as that due to mobile wireless devices. Therefore, despite the improvements on tag detection rates by using the C1G2 protocol, factors such as tag-reader configurations, multipath and unpredictable interferences in the deployment environment still contribute to degradation of the performance and reliability of the RFID system leading to noisy and incomplete data. RFID data cleaning is, therefore, essential in order to correct the reading errors, and to allow these data streams to be used to make correct interpretations and analysis of the physical world they are representing.

Methodologies for improving reliability of RFID data proposed in the literature can be divided into three main categories: physical solutions, middleware solutions and deferred solutions [9]. Physical solutions include improvement of hardware performance to improve the reliability of the data such as those described in [10]. Redundant techniques include using multiple tags and readers to identify the same object [11,12], and additional techniques to remove duplicate readings generated from such deployments [1315]. Middleware solutions include algorithms to correct the incoming sensor data streams before the data is passes into the database [1618]. The deferred solutions incorporate intelligent techniques which correct the data in the later stages within the data storage [9,19]. Our work falls in the category of middleware-based solutions; specifically window-based smoothing methods. We decided to use the window-based method because of their simplicity and our work extends the work proposed by Jeffrey et al. [16].

Many commercial RFID-middleware solutions [20,21] contain a fixed temporal-based sliding-window data-smoothing filter as a solution to RFID unreliability, and applications are required to set the window size. The goal is to reduce or eliminate dropped readings by giving each tag more opportunity to be read within the smoothing window. The study by Jeffery et al. in [16] shows that setting the appropriate smoothing-window size is a non-trivial task, especially in the mobile environment. It requires a carefully balance between the two opposing application requirements, which are: (1) to ensure completeness for the set of tag readings due to tag-reader system unreliability; and (2) to capture tag dynamic due to tag movement in and out of the reader's detection region. Large window sizes are good in ensuring completeness by smoothing out the missed readings, but they are not efficient in detecting tag transitions. On the other hand small window sizes are able to detect transitions, but they are not capable of compensating for the missed readings. Small windows lead to false negative errors in which the tag is mistakenly assumed to be absent while it is actually present. In the mobile tag environment big window sizes, while trying to compensate for the missed readings, introduce other errors which are known as false positive errors, which are readings in which the tags are mistakenly assumed to be present while they have already exited the detection region. False positive readings in our discussion are, therefore, by-products of the cleaning scheme caused by interpolation of readings within the big window size. Experimental results in [16] show that there is no single window size that can perform consistently well under variable environmental conditions. Taking into consideration the sensitivity of the tag-reader performance on the deployment environment, this means that a small change in the environment can render the initially optimised cleaning window unable to smooth the data.

Jeffery et al. [16] proposed an adaptive sliding-window cleaning method called Statistical sMoothing for Unreliable RFid data (SMURF). SMURF models the unreliability of RFID readings by viewing RFID streams as a statistical sample of tags in the physical world, and exploits techniques grounded in sampling theory to drive its cleaning processes. SMURF does not expose the smoothing-window parameter to the application; instead it automatically determines the most appropriate window size and continuously adapts it over the lifetime of the system based on observed readings. Adopting the statistical approaches proposed in SMURF, we developed our own adaptive cleaning scheme for RFID data streams, called WSTD, with a more efficient transition detection mechanism. WSTD is able to adapt its window size to cope with fluctuations of the tag-reader performance due to changes in the environment, while relatively accurately detecting the transition points. This is an integral part of our ongoing work on developing multi-agent based RFID middleware systems [22,23]. WSTD is used as a data cleaning mechanism for low-level RFID data processing tasks within our middleware system.

The remainder of this paper is structured as follows: Section 2 describes the statistical sampling perspective of RFID data streams. Section 3 describes the proposed WSTD algorithm to efficiently detect transition. Section 4 evaluates the performance of WSTD in comparison with SMURF; followed by conclusions in Section 5.

2. Statistical Sampling Perceptive of RFID Data Streams

According to the RFID reader-tag performance analysis presented in [57], the raw RFID data streams do not provide a correct representation of the physical world that they are representing. A significant number of tags which are within the reader's read range are not consistently read by the reader due to either their orientation with respect to the reader, distance from the reader, presence of metal, dielectric or water material close to the tag and other factors. These missing tags imply that typically only a subset of the tag population is actually observed on every read cycle. Therefore, the observed RFID readings can be viewed as a random sample of the population of tags in the physical world. The key insight is viewing each read cycle output as a random sampling trial and the smoothing window as repeated random sampling trials [16]. In our discussion we will refer to an atomic unit of time used by one read cycle as an epoch.

Let Nt denote the unknown size of the underlying tag population at epoch t and let St ⊆ {1, …, Nt} denote the subset of the tags observed (“sampled”) during that epoch. St can be viewed as unequal probability random sample of the tag population. Probability pi,t of selecting tag i at epoch t can be calculated from the epoch t output information using the number of reads (tag responses) for tag i in combination with the known number of interrogation cycles (number of requests) using Equation (1):

p i , t = number of responses number of requests

3. Window Sub-Range Transition Detection (WSTD) Scheme

In this section, we present our WSTD cleaning scheme. WSTD uses binomial sampling concepts to calculate the appropriate window size and π-estimator to estimate the number of tags as proposed by SMURF. WSTD then uses the comparison of the two window sub-range observations or estimated tag counts and some rules to detect when transition occurs within the window and then adjust the window size appropriately.

Our algorithms make the following assumptions: firstly, in our data model the probability of detection of the tag will be the same, given that the tag-distance and the environment conditions are the same. However, in real world RFID data does not exactly follow this model. Occasionally, a tag placed at a specific distance relative to the reader in a specific environment will cause the reader to generate readings with varying probability of detection. Secondly, since our transition detection mechanism is based on the characteristics of the underlying data stream, such variations in detection rate, may lead to false transition detection. Nevertheless, such behavior occurs rarely, and with improvements of tag-reader performance we expect it to have a minimal negative effect in practice. We first present how WSTD cleans individual tag data and then present how it cleans tag aggregates in the applications which only need to know the number of tags available.

3.1. Adaptive Individual Tag Cleaning

3.1.1. Completeness Requirement

Each epoch is viewed as an independent Bernoulli trial (i.e., a sample draw for tag i) with success probability pi,t using Equation (1) [16]. This implies that the number of successful observations of tag i in the window Wi with wi epochs (i.e., Wi= (twi, t)) is a random variable with a binomial distribution B(wi, pi,t). In the general case, assume that tag i is seen only in subset SiWi of all epochs in the window Wi. Assuming that, the tag probabilities within an approximately sized window calculated using Equation (1), are relatively homogeneous, taking their average will give a valid estimate of the actual probability of tag i during window Wi [16]. Therefore, the average empirical read rate p i avg over the observation epochs is given is given by Equation (2) [16]:

p i avg = ( 1 / | S i | ) t S i p i , t

Also Si can be seen as a binomial sample of epochs in Wii.e., a Bernoulli trial with probability p i avg for success and |Si| as a binomial random variable with binomial distribution B ( w i , p i avg ). Hence, from standard probability theory the expected value and variance of |Si| is given as:

E [ | S i | ] = w i p i avg and Var [ | S i | ] = w i p i avg ( 1 p i avg ) respectively .

The derived binomial sampling model is then used to set the window size to ensure that there are enough epochs in the window Wi such that tag i is read if it does exist in the reader's range. Setting the number of epochs within the smoothing window according to Equation (3) ensures that tag i is observed within the window Wi with probability >1 − δ [16]:

w i ( 1 / p i avg ) ln ( 1 / δ )

3.1.2. Adaptive Window Size Adjustment

In order to balance between guaranteeing completeness and capturing tag dynamics the WSTD algorithm uses simple rules, together with statistical analysis of the underlying data stream, to adaptively adjust the cleaning window size.

Assume Wi = (twi, t) is tag i current window, and let W1i = (twi, twi/2) denote the first half of window Wi and W2i = (twi/2, t) denote the second half of the window Wi. Let |S1i| and|S2i| denote the binomial sample size during W1i and W2i respectively. Note that the mid epoch (i.e., epoch at twi/2) in inclusive on both range as shown in Figure 1.

Rule 1: Similar to SMURF, variation within the window is detected if the number of observed readings is less than the expected number of readings (i.e., | S i | < w i p i avg) and there is statistically significant variation in the tag observations using the Central Limit Theorem (CLT) | | S i | w i p i avg | > 2 w i p i avg ( 1 p i avg ). However, we noted that this variation within the window could also be caused by missing tags and not necessarily only due to transition. Hence, to reduce the number of false positive due to transition and the number of false negative readings, which will be further introduced in case of wrong transition detection, the window size is reduced additively by reducing the window size by two epochs.

To improve the transition detection mechanism for the mobile tags we combine the mobile detection mechanism together with the observations of the second half of the window|S2i| to estimate when the tag is exiting the detection range. The slope of the best-fit line using the least squares fitting with the observed tag i probabilities in the window ( Δ p i , t epochs ) is used to determine if the tag is moving out. If the tag is detected with consistently falling pi,t, within the window it is inferred as the tag is moving out. Hence, the negative slope of the best-fit line indicates that the tag is moving out.

Rule 2: If the tag is moving out and it was not detected in the second half of the window (i.e., |S2i| = 0) the tag is assumed to have exited or is exiting the detection range. In this case the window size is halved to reduce the false positive readings. One weakness of this rule is that premature exit transition detection will also lead to a false negative reading due to a small window size.

Rule 3: The window size is increased if the computed window size using Equation (3) is greater than the current window size and the expected number of observation samples is less than the actual number of observed samples (i.e., | S i | > w i p i avg). Low expected observation samples indicates that the probability of detection p i avg is low, in this case we need to grow the window size to give more opportunity for the poor performing tag to be detected. Otherwise, if the expected observation sample is equal or greater than the actual sample size it means that, the p i avg is good enough and we do not have to increase the window size. This rule ensures that the window size is increased only when the read rate is poor.

Figure 2 shows a pseudo-code description of the WSTD adaptive per tag cleaning algorithm. Each individual tag is cleaned in its own window. The rules described above are used to adjust the tag's cleaning window size adaptively based on the statistical analysis of the underlying tag observations. Initially all new detected tag's windows are set to one epoch, the window sizes are then adjusted according to their detection rates with minimum window size set to three epochs.

Setting the minimum window size to three epochs strikes a balance between maintaining the smoothing effect of the algorithm and reducing the false positive errors. Similar to SMURF, WSTD also slides its window per single epoch (read cycle) and produces output readings corresponding to the midpoint of the window after the entire window has been read.

3.2. Multi-Tag Aggregate Cleaning

Some applications do not require information for each individual tags, but only need to track the number of tags in the detection region. These types of applications typically track large populations of tags. For instance, a retail store monitoring application may only need to know when the count of items on the shelf or store drop below a certain threshold level.

The per tag cleaning method could be used to clean tags in such scenarios, where by each tag in the population is individually cleaned and their result is aggregated across individual smoothing filters for each epoch. However, this solution can be highly affected by poor performing tags especially in the static environment. The per tag cleaning algorithm adapts the window size for each individual tag and because window sizes for individual tags might be different, based on their detection rates, the decision on whether the tag is present or not is taken at different epochs. Therefore, due to different window sizes, the tags that are not ready for processing (i.e., the readings for all epochs in its window have not be accumulated) will delay the output. To avoid this limitation caused by low performing tags, the multi-tag cleaning algorithm uses the same smoothing window for all the tags together with a statistical estimation technique to accurately estimate the tags population count without cleaning on a per-tag basis.

As with individual tag observation, the smoothing window size plays a critical role in capturing the underlying tag's population aggregate. A large window ensures that the tags are observed and aggregated with high probability, but a small window is also desired to ensure that variability in the population count is adequately captured.

The multi-tag cleaning mechanism uses some of the concepts proposed in SMURF whereby the Horvitz-Thompson (HT) estimator [24] also known as the π-estimator together with unequal-probability random sampling model is used to approximate the population aggregates. As with the per-tag cleaning method, the multi-tag cleaning mechanism also views each epoch as an independent Bernoulli trial with probability p i avg for success, where p i avg denotes the average empirical sampling probability for tag i during window W derived from the reader's tag list information using Equation (2).

Let Sw denote the sample of distinct tags read over the current smoothing window and let p avg = ( 1 / | S W | ) i S W p i avg denote the average per-epoch sampling probability over all observed tags. Following the similar rationale used in the per-tag cleaning, to ensure that the underlying tag population is read with high probability (≥1 − δ) we set the upper bound of the smoothing window size for multi-tag aggregate at w = [(1/pavg)ln(1/δ)]. According to binomial distribution, the probability of reading tag i at least once during window w = |W| is estimated as one minus probability of not detecting tag i in all the trials π i = 1 ( 1 p i avg ) w. Let SW ⊆ {1, …, NW} denote the subset of distinct observed (i.e., sampled) RFID tags over the window W and Nw denote the true tags count. The π-estimator for the population count based on the sample Sw is defined as N ^ W = i S W 1 π 1. The π-estimator uses the sampling probability πi to weigh the responses in estimating the population total. The poor performing tags with lower response probability are given higher weights while higher probability responses are given lower weights. The π-estimator gives unbiased estimation of tag population W with its estimated mean and variance given as E(W) = NW and V ^ a r ( N ^ W ) = i S W 1 π i π i 2, respectively.

3.2.1. Adaptive Window Size Adjustment

The WSTD cleaning algorithm employs the random-sampling model and π-estimator concepts proposed in SMURF together with comparison of the two-window sub-range estimated tag counts to dynamically adapt its smoothing window size. Transitions are detected as statistically significant changes in aggregate estimates over sub-ranges of its current smoothing window. The transition detection model used is the main difference between our multi-tag cleaning algorithm and the SMURF multi-tag cleaning algorithm.

Assume W = (tw, t) is current window, and let W1 = (tw, tw/2) denote the first half of window W and W2 = (tw/2, t) denote the second half of the window W. Let N ^ W 1 and N ^ W 2 denote the π-estimators for tag population counts during W1 andW2 respectively. Note that the mid epoch (i.e., epoch at tw/2) is inclusive in both ranges. The mid-point divides the window such that the numbers of epochs are equally spaced on either side of the window and this requires the use of an odd number window size. The transition is detected if there is significant change in tag counts between these two ranges.

In the SMURF multi-tag cleaning algorithm the transition is detected as a statistically significant transition in population count has occurred in the second half of the window compared to the whole window population count by using CLT condition | N ^ W N ^ W 2 | > 2 ( Var ( N ^ W ) + Var ( N ^ W 2 ) ). However in our model the transition is detected as a significant change in the population count by comparing the count estimates in the first half and the second half of the window by using the expression | N ^ W 1 N ^ W 2 | > 2 ( Var ( N ^ W 1 ) + Var ( N ^ W 2 ) ). Our experimental results verified that using the comparison of the sub-range population count estimates to detect population count variation within the window, gives a more accurate transition detection technique than comparison between full window count and the sub-range count estimates used by SMURF. SMURF detection condition detects any significant variation within the window, however, for transition detection mechanism we are more interested in detecting the edge transition, which signals that the tag is either entering or leaving the detection range and respond accordingly.

By comparing the population count of the two window sub ranges, it is possible to determine when the tag is exiting and entering the detection range eliminating the need to use mobile detection algorithm as proposed by SMURF. In the environment where tags are mobile there are two scenarios: one is tags exiting the detection range and the second is tags entering the detection range.

We use simple rules to detect when these transitions occur by comparing the estimated tag count in the two window sub ranges. The tags are said to be exiting the detection range if the transition is detected and there is more estimated tag counts in the first half of the window than in the second half of the window (i.e., N ^ W 1 > N ^ W 2 ). In this case, the window size is reduced multiplicatively (i.e., divided in half) to circumvent false positive readings. Similarly the tag is said to be entering the detection region if transition is detected and there is more estimated tag count in the second half of the window than in the first half of the window (i.e., N ^ W 2 > N ^ W 1 ). In this case, if the required window size is greater than twice the current window size, the window size is increased multiplicatively (i.e., doubled) if not, the window size is additively increased by two epochs. This is because as tag enters the detection range it is assumed to be on the far end of reader's detection ranges i.e., long distance from the reader's antenna. Increasing the window size gives more opportunity even for the weak performing tags to de detected.

When the tags are leaving and entering the detection range, false positive readings will be produced regardless of the window size because the readings are interpolated throughout the window. This problem is more prone to the bigger windows. To reduce false positive readings under these scenarios we made two estimation assumptions. These approximation assumptions are used to detect when the tag(s) completely exit(s) the detection range and when the tag(s) just entered the detection region as illustrated in Figure 3. In the first assumption, the tag(s) are said to have exited the reader's detection range if the overall window tag count is not zero, but the second half of the tag population count is zero (i.e., N ^ W > 0 N ^ W 2 = 0). This means that there was no tag observed in the second half of the window. In the second assumption, the tag(s) are said to have just entered the reader's detection range if the overall window tag count is not zero, but the first half of tag population count is zero (i.e., N ^ W > 0 N ^ W 1 = 0). This means that there was no tag observed in the first half of the window (tw, tw/2).

Considering that the cleaning window size slides by the midpoint, we assume that the observed tags under these scenarios are more likely to be a false positive readings caused by a bigger window size. Therefore, tag(s) observed in these scenarios are dropped and the window size is reduced for an exiting scenario and increased appropriately for an entering scenario.

By taking advantage of the π-estimator, which scales-up the reading in the window to estimate the underlying tag population, we can reduce the window sizes to enhance transition detection, hence the minimum window size can be reduced to 1 epoch. We introduce another estimation condition, which we call strong region detection. The aim of strong region detection is to detect when the tags within the window are observed with high probability of detection and when there is no significant variation in tag population within the two window sub-ranges.

Let Si be a binomial sample of epochs in the current window W in which a single tag is observed and p i avg be the average read rate as defined in the per-tag cleaning approach. Let Sw denote the sample of distinct tags read over the current smoothing window and p avg = ( 1 / | S W | ) i S W p i avg denote the average sampling probability over all observed tags and S avg = ( 1 / | S W | ) i S W S i denote the average sample of epochs in the window in which the tags where observed.

The tags are then said to be observed in the strong detection region if the following condition holds ( p avg > ( 1 / W ) S avg ) ( | N ^ W 1 N ^ W 2 | < 0.05 min ( N ^ W 1 , N ^ W 2 ) ). The second portion of the logical condition tests if the two window sub-range estimates have a relatively small difference of less than 5% of the lowest estimated tag counts. If the condition holds the window size is reduced by two epochs.

Figure 4 shows a pseudo-code description of the adaptive multi-tag cleaning algorithm. All the tags are cleaned using the same window. Similar to per-tag cleaning, the smoothing-window size is systematically adjusted based on the analysis of the observed tags binomial-sampling data and the transition is detected by comparing the window sub-range estimated population counts.

4. Experimental Evaluation

In this section we present our experimental evaluation of the proposed WSTD cleaning algorithms. The data sets for our experiments were generated by a synthetic data generator that simulates the operation of RFID readers under a wide variety of conditions using MATLAB. The generator is composed of two components. The first component simulates the movement of tags and the second component simulates tag detection by an RFID reader.

We investigated three tag movement behaviours. The first behaviour is that of static tag(s). This is simulated by randomly placing tags uniformly within the reader's detection region. This simulates static tagged items which are constantly monitored by the RFID system (i.e., both tags and readers are static). The second behaviour is that of tags moving with the same velocity. This simulates grouped tags, such as tagged items on a trolley or conveyor belt. The third behaviour is that of tags moving with different velocity. This behaviour simulates tracking environments, such as a digital work place where each tag displays independent random behaviour. Tag movements are simulated by moving the tags in and out of the reader detection range between 0 and 6 m at varying speed. We set the maximum detection range to be 4.6 m (∼15 feet) between 4.6 and 6 m the tag is out of the detection range. The tag velocities are varied between 0 and 90 cm/epoch.

The reader detection model is based on the RFID tag-reader detections regions. Generally there are three distinct regions of operations of a passive RFID reader tag system: strong-in-field, weak-in-field and out-of-field regions [5,16,25], as illustrated in Figure 5.

In the strong-in-field region, the tag responds to most of the attempts from the reader. Thus the response rate in the strong-in-field region varies between 100% and 77% [25]. The tag performance then degrades gradually with increasing distance in the weak-in-field region. In the out-of-field region, the response rate goes down to 0%. The main difference on this detection pattern when the tags are operated in different environments lies in the percentage of the reader's detection range corresponding to its strong-in-field region. When the tags are operating in a controlled environment with low RF interference, the strong-in-field region corresponds to roughly 75% of the full detection region, where as it makes only 25% of the range in the noisy environment with high RF interference [16]. Based on these observations, we derive a simplified reader detection model shown in Equation (4):

p i , t ( x ) = { MaxReadRate , x < StrongPercentage MaxReadRate ( x MaxDetectionRange ) StrongPercentage MaxDetectionRange , StrongPercentage x MaxDetectionRange 0 , x > MaxDetectionRange

In our experiments we used a maximum read rate (MaxReadRate) of 95% which is a read rate within the strong-in-field region. Maximum detection range (MaxDetectionRange) of 4.6 m and varied the strong-in-field percentage (StrongPercentage) and the distance between the tag and the reader (x). Varying the StrongPercentage parameter simulates the factors that affect the tag detection rates such as tag orientation and the RF interference while varying the distance (x) parameter simulates the tag-reader signal attenuation with distance. In the per-tag cleaning algorithms we used 25 tags while in the multi-tag aggregate algorithms we used 100 tags and the data were generated for 2,000 read cycles (epochs). We compare the performance effectiveness of the WSTD algorithms with that of SMURF using the generated synthetic data sets.

4.1. Individual Tag Cleaning

4.1.1. Experiment 1: Environment Reliability with Randomly Moving Tags

In this experiment we determine how each technique reacts to different levels of environment unreliability with the randomly moving tags. Each tag is moved with its own random velocity between 0 to 90 cm/epoch and after every 100 epochs on average the tag change its state from moving to rest state and vice versa. When the tag resumes movement it chooses another random velocity, this movement pattern is referred as Fido in [16]. The strong-in-field region percentage is varied between 0 and 100%. The lower StrongPercentage corresponds to unreliable environment and higher values of StrongPercentage corresponds to a more controlled environment. At each StrongPercentage we measure the average errors produced by each scheme. The average error per epoch is calculated as i = 1 NumEpochs ( FalsePositive i + FalseNegative i ) / NumEpochs. Figure 6 shows the result of this experiment, the “raw” trace is truncated to enable clear view of other traces.

The WSTD scheme performs better than SMURF producing an improvement of approximately 25% less overall error in comparison to that produced by SMURF. This performance is attributed to its improved transition detection mechanism as shown in Figure 7. Comparing their cleaning-window sizes, WSTD uses a smaller window size in comparison to that used by SMURF as shown in Figure 8. The cleaning-window sizes decrease along with the decrease in environment noise.

Because of its small window size, WSTD is more efficient in detecting transition than SMURF; however, it also produces slightly more negative errors than SMURF as show in Figure 9. The increase in false negative errors in the noisy environment by WSTD can be associated with the premature transition detection by rule2 of the WSTD algorithm. As the noise decreases, their performance in compensating for missed readings become competitive and their difference decreases.

4.1.2. Experiment 2: Effect of Tag Speed

The effectiveness of the individual tag cleaning schemes are then compared as the tag velocity is varied. The StrongPercentage parameter is fixed at 70% to represent the controlled environment and the tags are moved in and out of the detection range at the same constant velocity. The velocity is varied from 0 to 90 cm/epoch the average errors produced by each scheme were measured. Figure 10 shows the result of this experiment and Figure 11 shows their positive and negative error contributions as the tag velocities are varied.

The WSTD scheme performs better than SMURF producing an improvement of approximately 30% less overall errors in comparison to that produced by SMURF. This performance improvement is attributed to its improved transition detection as shown in Figure 12, due to its use of small window sizes as shown in Figure 13. The cleaning-window sizes decreases with the increase in tag speed.

4.1.3. Experiment 3: Environment Reliability with Static Tags

We also evaluated the performance of different cleaning schemes in the environment where tags are stationary. To simulate this scenario we randomly distribute the tags uniformly within the detection range and varied the StrongPercentage parameter and measured the average errors produced by each scheme. Figure 14 shows the result of this experiment and Figure 15 shows the average cleaning-window sizes for the SMURF and WSTD schemes as the environment noise is varied.

In the static environment, both WSTD and SMURF schemes exhibit closely matching performances which can be attributed to their use of similar cleaning-window sizes as shown in Figure 15. From this observation we can conclude that the main difference between WSTD and SMURF is in the transition detection mechanism, and WSTD performs better than SMURF in the mobile environment.

4.2. Tags Aggregate Cleaning

We then examined the cleaning techniques, which report the number of tags in the detection region instead of individual tag Id. The performances of different multi-tag aggregate cleaning schemes are compared as the tag movement and reliability of the environment are varied. Individual tag cleaning schemes, SMURF and WSTD, reports the number of distinct tags in each epoch, while WSTD-π scheme uses the π-estimator to estimate the number of distinct tags within the window.

The evaluation metric used for multi-tag cleaning is the root mean square (RMS) error of the count of reported tags compared to the actual tag count. The RMS error is calculated using Equation (5):

RMS Error = i = 1 NumEpochs ( ReportedCount i ActualCount i ) 2 NumEpochs

We also compared the mean error of the estimated tag count to see the contribution of the overestimate and underestimate tag count using Equation (6) and (7), respectively:

OverEstimateErrors = i = 1 NumEpochs ReportedCount i ActualCount i NumEpochs
UnderEstimateErrors = i = 1 NumEpochs ActualCount i ReportedCount i NumEpochs

4.2.1. Experiment 4: Effect of Tag Speed on Tags Aggregate Cleaning

We evaluate the tag count accuracy of the cleaning schemes as the tags' velocity is varied. The StrongPercentage parameter is fixed at 25% to represent the noisy environment and the tags are moved in and out of the detection range at the same velocity. The velocity is varied from 0 to 90 cm/epoch and we measured the RMS errors produced by each scheme. Figure 16 shows the result of this experiment.

Figure 17 shows the average number of overestimate and underestimate tag counts for the cleaning schemes and Figure 18 shows their average cleaning-window sizes as the tags' velocity is varied. The WSTD-π scheme has the smallest number of underestimate and overestimate errors and it also uses the smallest average cleaning-window sizes compared to other variable window schemes. The WSTD-π small overestimate errors are attributed to its smaller window size while its small underestimate errors are attributed to its use of π-estimator to estimate the number of tags.

Although we used an average number of overestimate and underestimate tag counts per epoch as a metric to compare the performance of these schemes, we noticed that most of the undercounting errors occur during the transition periods. This is caused by the nature of algorithms whereby the window size is reduced when an exit transition is detected. While this measure limits the false positive errors, it also leads to false negative errors due to resulting small window size in case of premature exit transition detection. In addition, when the tags are entering the detection region on the far edge of the detection range due to a small window size and a weak read rate, leads to a high number of undercounting errors. Figure 19 shows the comparison of the reported estimated tags count and that of the actual tag count for the three variable window schemes SMURF, WSTD and WSTD-π with the tags moving at a velocity of 0.4 m/epoch. WSTD-π provides close accurate tag-count estimation compared to other schemes.

4.2.2. Experiment 5: Effect of Environment Reliability with Randomly Moving Tags

In this experiment we determine how each multi-tag cleaning technique reacts to different levels of the environment's unreliability with the randomly moving tags. The experimental parameters are the same as the ones used for the individual tag-cleaning experiment, except that in this experiment we used 100 moving tags instead of 25 tags. The strong-in-field region percentage is varied between 0 and 100% and at each StrongPercentage we measure the RMS errors produced by each scheme. Figure 20 shows the result of this experiment, “raw” trace is truncate to enable a clear view of other traces.

Figure 21 shows average number of overestimate and underestimate tag counts and Figure 22 shows the average cleaning-window size of the variable window schemes as the environment noise is varied.

From Figure 21 looking at per-tag cleaning schemes; SMURF has consistently more overestimate errors than WSTD, while in a noisy environment WSTD has more underestimate errors than SMURF. However, as the noise decreases and the reader produce more reliable data, the WSTD-undercount errors also decrease and at a highly controlled environment, its performance outperforms that of SMURF. WSTD-π on the other hand, consistently produces relatively stable overestimate errors irrespective of the environment condition; however, its underestimate errors decrease with the decrease of the environment noise (see Figure 21). These constant overestimate errors might be caused by the fact that WSTD-π uses the same window size to clean all the tags. In this scenario each tag moves randomly in and out of detection range with random velocities. WSTD-π transition mechanism is not able to effectively detect transition in this scenario; as a result the π-estimator overestimates the tags' count. The per-tag variable window cleaning schemes—SMURF and WSTD—outperform a single variable window scheme—WSTD-π—in the noisy environment because they clean and adjust their window size for each single tag independently depending on its individual tag behaviour and how the environment is affecting that particular tag. Figure 23 shows the comparison of the reported estimated tags' count and that of the actual tag count for these three variable window schemes. The tags are operating in the semi-controlled environment with StrongPercentage parameter set to 50%. Hence, this experiment results demonstrate that in the environment where each tag displays its own independent random behaviour the best result is obtained by adjusting each individual tag cleaning window independently.

4.2.3. Experiment 6: Effect of Environment Reliability with Static Tags

We also evaluated the performance of different sliding-window based multi-tag cleaning schemes in the environment where tag(s) are stationary. To simulate this scenario we randomly distributed 100 tags uniformly within the detection range and varied the StrongPercentage parameter and measured the root mean square error produced by each scheme. Figure 24 shows the result of this experiment, the “raw” trace is truncate to enable clear view of other traces.

Similar to the per-tag cleaning in the static environment scenario, SMURF and WSTD schemes have the same performance in cleaning the tag aggregations in the static environment as shown in Figure 24.

Since they both count the distinct tag available within each tag's cleaning window they have no overestimate errors and their underestimate decrease with the decrease in noise as shown in Figure 25. In a highly noisy environment the performance of per tag cleaning schemes is highly affected by the poor performing tags on the far edge of the detection region. In the noisy environment the far edge static tags cleaning window grows linearly with distance and becomes very large (results not shown). Because the cleaning window sizes for individual tags might be different based on their detection rates, the decision at whether the tag is present or not is taken at different epochs. Therefore, the tags are not ready for processing (i.e., the readings for all epochs in its window have not been accumulated) will delay the output and highly affect the performance of the scheme.

On the other hand, the WSTD-π scheme, which estimates the tag count based on tag detections and π-estimator, produces both underestimate and overestimate errors as shown in Figure 25. Its performance increases with the reduction of environment noise with both its overestimate and underestimate errors decreasing. The WSTD-π scheme uses the smallest cleaning-window sizes compared to other schemes as shown in Figure 26. We can conclude that WSTD-π performance strikes a balance between accuracy and processing speed, by providing a considerably good estimate in a much shorter time.

5. Conclusions and Future Works

In this paper, we have proposed an adaptive window-based cleaning scheme called WSTD. WSTD uses binomial sampling concepts to calculate the appropriate window size and π-estimator to estimate the number of tags, and then uses the comparison of the two window sub-range observations or estimated tag counts to detect when transitions occurs within the window.

Our experimental results show that, in the mobile environment under a variable environment noise level, the WSTD scheme performs better than SMURF; producing an improvement of approximately 30% less overall errors than those produced by SMURF. This performance improvement is attributed to its improved transition detection mechanism. The WSTD scheme uses smaller window sizes compared to SMURF which means that WSTD also requires a shorter processing time than SMURF.

The WSTD algorithms have some limitations and we plan to investigate these limitations as part of our future work. Firstly, the WSTD transition detection algorithms are not very efficient in an extremely noisy environment. This is because in a noisy environment, the significant variation of tag observations or tag counts in the two windows sub-range, or lack of readings in one of the window sub-range, may be caused by missed readings rather than tag transition. Secondly, in the per-tag cleaning algorithm if the tag is detected with consistently falling probabilities within the window, it is inferred that the tag is moving out. However, if the tag is not completely moving out of detection range, and instead oscillate within the detection range, this mobile detection rule combined with observations of the second half of the window, in the noisy environment, may lead to false transition detection.

Acknowledgments

This research is supported in part by research grants from German Academic Exchange Service DAAD, South Africa NRF, CUT and UDSM under Project-ECSE-(C1A:1.1).

References

  1. Finkenzeller, K. RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, 2nd ed.; John Wiley & Sons Ltd.: Chichester, UK, 2003. [Google Scholar]
  2. Ahsan, K.; Shah, H.; Kingston, P. RFID applications: An introductory and exploratory study. Int. J. Comput. Sci. Issues 2010, 7, 1–7. [Google Scholar]
  3. Mitrokotsa, A.; Douligeris, C. Integrated RFID and Sensor Networks: Architectures and Applications. In RFID and Sensor Networks: Architectures, Protocols, Security and Integrations; Zhang, Y., Yang, L.T., Chen, J., Eds.; CRC Press: Boca Raton, FL, USA, 2010; pp. 511–535. [Google Scholar]
  4. EPC Radio Frequency Identification Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz–960 MHz; Standard Specification Version 1.2.0; EPCglobal Inc.: Washington, DC, USA, 2005.
  5. Bolic, M.; Athalye, A.; Hao Li, T. Performance of Passive UHF RFID Systems in Practice. In RFID Systems: Research Trends and Challenges; Bolic, M., Simplot-Ryl, D., Stojmenovic, I., Eds.; John Wiley & Sons Ltd: Chichester, West Sussex, UK, 2010. [Google Scholar]
  6. Buettner, M.; Wetherall, D. An Empirical Study of UHF RFID Performance. Proceedings of MobiCom'08, San Francisco, CA, USA, 14–19 September 2008.
  7. Aroor, S.; Deavours, D. Evaluation of the state of passive UHF RFID: An experimental approach. IEEE Syst. J. 2007, 1, 168–176. [Google Scholar]
  8. Kawakita, Y.; Mitsugi, J. Anti-Collision Performance of Gen2 Air Protocol in Random Error Communication Link. Proceedings of the International Symposium on Applications and Internet Workshops (SAINT'06), Phoenix, AZ, USA, 23–27 January 2006; pp. 68–71.
  9. Darcy, P.; Stantic, B.; Sattar, A. A Fusion of Data Analysis and Non-Monotonic Reasoning to Restore Missed RFID Readings. Proceedings of Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP 2009), Melbourne, Australia, 7–10 December 2009; pp. 313–318.
  10. Trotter, M.S.; Durgin, G.D. Survey of Range Improvement of Commercial RFID Tags with Power Optimized Waveforms. Proceedings of IEEE International Conference on RFID, Guangzhou, China, 14–16 April 2010; pp. 195–202.
  11. Rahmati, A.; Zhong, L.; Hiltunen, M.; Jana, R. Reliability Techniques for RFID-Based Object Tracking Applications. Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN '07), 25–28 June 2007; IEEE Computer Society: Edinburgh, UK; pp. 113–118.
  12. Chen, H.; Ku, W.; Wang, H.; Sun, M. Leveraging Spatio-Temporal Redundancy for RFID Data Cleansing. Proceedings of the 2010 International Conference on Management of Data, SIGMOD '10, Indiananpolis, IN, USA, 6–11 June 2010; pp. 51–62.
  13. Mahdin, H.; Abawajy, J. An approach for removing redundant data from RFID data streams. Sensors 2011, 11, 9863–9877. [Google Scholar]
  14. Bashir, A.K.; Lim, S.-J.; Hussain, C.S.; Park, M.-S. Energy efficient in-network RFID data filtering scheme in wireless sensor networks. Sensors 2011, 11, 7004–7021. [Google Scholar]
  15. Shen, H.; Zhang, Y. Improved approximate detection of duplicates for data streams over sliding windows. J. Comput. Sci. Technol. 2008, 23, 973–987. [Google Scholar]
  16. Jeffery, S.R.; Garofalakis, M.; Franklin, M.J. Adaptive Cleaning for RFID Data Streams. Proceedings of the 32nd International Conference on Very Large Data Bases, VLDB Endowment, Seoul, Korea, 12–15 September 2006; pp. 163–174.
  17. Gonzalez, H.; Han, J.; Shen, X. Cost-Conscious Cleaning of Massive RFID Data Sets. Proceedings of 2007 Int. Conference on Data Engineering (ICDE'07), Istanbul, Turkey, 15–20 April 2007; pp. 1268–1272.
  18. Song, B.; Qin, P.; Wang, H.; Xuan, W.; Yu, G. bSpace: A Data Cleaning Approach for RFID Data Streams Based on Virtual Spatial Granularity. Proceedings of HIS (3), Shenyang, China, 12–14 August 2009; pp. 252–256.
  19. Rao, J.; Doraiswamy, S.; Thakkar, H.; Colby, L.S. A Deferred Cleansing Method for RFID Data Analytics. Proceedings of 32nd International Conference on Very Large Data Bases, VLDB Endowment, Seoul, Korea, 12–15 September 2006; pp. 175–186.
  20. Bornhoevd, C.; Lin, T.; Haller, S.; Schaper, J. Integrating Automatic Data Acquisition with Business Processes—Experiences with SAP's Auto-ID Infrastructure. Proceedings of the 30th VLDB Conference, Toronto, ON, Canada, 29 August–3 September 2004; pp. 1182–1188.
  21. Gupta, A.; Srivastava, M. Developing Auto-ID Solutions Using Sun Java System RFID Software, 2004. Available online: http://java.sun.com/developer/technicalArticles/Ecommerce/rfid/sjsrfid/RFID.html (accessed on 22 March 2012).
  22. Massawe, L.V.; Aghdasi Kinyua, J. The Development of a Multi-Agent Based Middleware for RFID Asset Management System Using the PASSI Methodology. Proceedings of the Sixth ITNG Conference, Las Vegas, NV, USA, 27–29 April 2009; pp. 1042–1048.
  23. Massawe, L.V.; Aghdasi, F.; Kinyua, J. An Implementation of a Multi-Agent Based RFID Middleware for Asset Management System Using the JADE Platform. Proceedings of IST-Africa Conference, Durban, South Africa, 19–21 May 2010; pp. 1–8.
  24. Lohr, S.L. Sampling: Design and Analysis; Duxbury Press: New York, NY, USA, 1999. [Google Scholar]
  25. Deavours, D.D. A Performance Analysis of Commercially Available UHF RFID Tags Based on EPCglobal's Class 0 and Class 1; Specification Report 1; RFID Alliance Lab: Lawrence, KS, USA, 2004. [Google Scholar]
Figure 1. Illustration of the sub-ranges in the smoothing window.
Figure 1. Illustration of the sub-ranges in the smoothing window.
Sensors 12 04187f1 1024
Figure 2. WSTD individual tag cleaning algorithm.
Figure 2. WSTD individual tag cleaning algorithm.
Sensors 12 04187f2 1024
Figure 3. Illustration of mobile tag window sub-range as tags enters and exits the detection range. (a) Tags exiting; (b) Tags entering.
Figure 3. Illustration of mobile tag window sub-range as tags enters and exits the detection range. (a) Tags exiting; (b) Tags entering.
Sensors 12 04187f3 1024
Figure 4. WSTD-π multi-tag cleaning algorithm.
Figure 4. WSTD-π multi-tag cleaning algorithm.
Sensors 12 04187f4 1024
Figure 5. Passive RFID tag-reader detection regions.
Figure 5. Passive RFID tag-reader detection regions.
Sensors 12 04187f5 1024
Figure 6. Average errors per epoch as strong-in-field region percentage is varied.
Figure 6. Average errors per epoch as strong-in-field region percentage is varied.
Sensors 12 04187f6 1024
Figure 7. Comparison of WSTD and SMURF schemes' transition detection mechanisms as a tag moves at random velocity.
Figure 7. Comparison of WSTD and SMURF schemes' transition detection mechanisms as a tag moves at random velocity.
Sensors 12 04187f7 1024
Figure 8. Comparison of WSTD and SMURF schemes' cleaning-window sizes as the environment noise is varied.
Figure 8. Comparison of WSTD and SMURF schemes' cleaning-window sizes as the environment noise is varied.
Sensors 12 04187f8 1024
Figure 9. WSTD and SMURF schemes' false positive and false negative error contribution as the environment noise is varied.
Figure 9. WSTD and SMURF schemes' false positive and false negative error contribution as the environment noise is varied.
Sensors 12 04187f9 1024
Figure 10. Average errors per epoch as tag velocity varies.
Figure 10. Average errors per epoch as tag velocity varies.
Sensors 12 04187f10 1024
Figure 11. WSTD and SMURF schemes' false positive and false negative error contribution as the tag velocity is varied.
Figure 11. WSTD and SMURF schemes' false positive and false negative error contribution as the tag velocity is varied.
Sensors 12 04187f11 1024
Figure 12. Comparison of WSTD and SMURF schemes' transition detection mechanisms as a tag moves at constant velocity.
Figure 12. Comparison of WSTD and SMURF schemes' transition detection mechanisms as a tag moves at constant velocity.
Sensors 12 04187f12 1024
Figure 13. Comparison of WSTD and SMURF schemes' cleaning window sizes as the velocity is varied.
Figure 13. Comparison of WSTD and SMURF schemes' cleaning window sizes as the velocity is varied.
Sensors 12 04187f13 1024
Figure 14. Average errors per epoch as strong-in-field region percentage is varied in the static tag environment.
Figure 14. Average errors per epoch as strong-in-field region percentage is varied in the static tag environment.
Sensors 12 04187f14 1024
Figure 15. Comparison of WSTD and SMURF schemes' cleaning window sizes as the environment noise is varied.
Figure 15. Comparison of WSTD and SMURF schemes' cleaning window sizes as the environment noise is varied.
Sensors 12 04187f15 1024
Figure 16. The RMS error of different cleaning schemes counting 100 tags as their velocities varies from 0 to 0.9 m/epoch in the noisy environment with the StrongPercentage parameter set to 25%.
Figure 16. The RMS error of different cleaning schemes counting 100 tags as their velocities varies from 0 to 0.9 m/epoch in the noisy environment with the StrongPercentage parameter set to 25%.
Sensors 12 04187f16 1024
Figure 17. Variable window schemes overestimate and underestimate error contributions as the tags' velocity is varied.
Figure 17. Variable window schemes overestimate and underestimate error contributions as the tags' velocity is varied.
Sensors 12 04187f17 1024
Figure 18. Comparison of variable window schemes' cleaning windows as the tags velocity is varied.
Figure 18. Comparison of variable window schemes' cleaning windows as the tags velocity is varied.
Sensors 12 04187f18 1024
Figure 19. Comparison of variable window-cleaning schemes' reported tags count with the actual tag count. All the tags move with the same velocity of 0.4 m/epoch.
Figure 19. Comparison of variable window-cleaning schemes' reported tags count with the actual tag count. All the tags move with the same velocity of 0.4 m/epoch.
Sensors 12 04187f19 1024
Figure 20. RMS errors of the tags count for different cleaning schemes as the StrongPercentage parameter is varied with each tag moving with its own velocity.
Figure 20. RMS errors of the tags count for different cleaning schemes as the StrongPercentage parameter is varied with each tag moving with its own velocity.
Sensors 12 04187f20 1024
Figure 21. Variable window schemes' average overestimate and underestimate error contributions as the StrongPercentage parameter is varied with each tag moving with its own velocity.
Figure 21. Variable window schemes' average overestimate and underestimate error contributions as the StrongPercentage parameter is varied with each tag moving with its own velocity.
Sensors 12 04187f21 1024
Figure 22. Comparison of variable window schemes' cleaning window sizes as the StrongPercentage parameter is varied.
Figure 22. Comparison of variable window schemes' cleaning window sizes as the StrongPercentage parameter is varied.
Sensors 12 04187f22 1024
Figure 23. Comparison of variable window-cleaning schemes' tags count with the actual tag count. Each tag moves with its own velocity.
Figure 23. Comparison of variable window-cleaning schemes' tags count with the actual tag count. Each tag moves with its own velocity.
Sensors 12 04187f23 1024
Figure 24. The RMS error of different cleaning schemes as the StrongPercentage parameter varies in the static tags' environment.
Figure 24. The RMS error of different cleaning schemes as the StrongPercentage parameter varies in the static tags' environment.
Sensors 12 04187f24 1024
Figure 25. Variable window schemes' average overestimates and underestimates error contributions as the StrongPercentage parameter is varied in the static tag environment.
Figure 25. Variable window schemes' average overestimates and underestimates error contributions as the StrongPercentage parameter is varied in the static tag environment.
Sensors 12 04187f25 1024
Figure 26. Comparison of variable window schemes' cleaning-window sizes as the StrongPercentage parameter is varied in the static tag environment.
Figure 26. Comparison of variable window schemes' cleaning-window sizes as the StrongPercentage parameter is varied in the static tag environment.
Sensors 12 04187f26 1024

Share and Cite

MDPI and ACS Style

Massawe, L.V.; Kinyua, J.D.M.; Vermaak, H. Reducing False Negative Reads in RFID Data Streams Using an Adaptive Sliding-Window Approach. Sensors 2012, 12, 4187-4212. https://doi.org/10.3390/s120404187

AMA Style

Massawe LV, Kinyua JDM, Vermaak H. Reducing False Negative Reads in RFID Data Streams Using an Adaptive Sliding-Window Approach. Sensors. 2012; 12(4):4187-4212. https://doi.org/10.3390/s120404187

Chicago/Turabian Style

Massawe, Libe Valentine, Johnson D. M. Kinyua, and Herman Vermaak. 2012. "Reducing False Negative Reads in RFID Data Streams Using an Adaptive Sliding-Window Approach" Sensors 12, no. 4: 4187-4212. https://doi.org/10.3390/s120404187

APA Style

Massawe, L. V., Kinyua, J. D. M., & Vermaak, H. (2012). Reducing False Negative Reads in RFID Data Streams Using an Adaptive Sliding-Window Approach. Sensors, 12(4), 4187-4212. https://doi.org/10.3390/s120404187

Article Metrics

Back to TopTop