ScienceDirect. Optimal Placement of RFID Antennas for Outdoor Applications

Similar documents
ScienceDirect. An Integrated Xbee arduino And Differential Evolution Approach for Localization in Wireless Sensor Networks

Available online at ScienceDirect. Procedia Computer Science 56 (2015 )

Available online at ScienceDirect. Procedia Engineering 120 (2015 ) EUROSENSORS 2015

Double Time Slot RFID Anti-collision Algorithm based on Gray Code

Anti-Collision RFID System Based on Combination of TD and Gold Code Techniques

UWB RFID Technology Applications for Positioning Systems in Indoor Warehouses

Novel Localization of Sensor Nodes in Wireless Sensor Networks using Co-Ordinate Signal Strength Database

Flexible RFID Location System Based on Artificial Neural Networks for Medical Care Facilities

Wireless Keyboard Without Need For Battery

RFID Systems, an Introduction Sistemi Wireless, a.a. 2013/2014

Available online at ScienceDirect. The 4th International Conference on Electrical Engineering and Informatics (ICEEI 2013)

Available online at ScienceDirect. Procedia Engineering 81 (2014 )

RFID Multi-hop Relay Algorithms with Active Relay Tags in Tag-Talks-First Mode

ScienceDirect. A comparison of dielectric constants of various asphalts calculated from time intervals and amplitudes

An Empirical Study of UHF RFID Performance. Michael Buettner and David Wetherall Presented by Qian (Steve) He CS Prof.

DATE: 17/08/2006 Issue No 2 e-plate Operation Overview

Analysis of RWPT Relays for Intermediate-Range Simultaneous Wireless Information and Power Transfer System

Cooperative anti-collision algorithm based on relay sensor in RFID system Xinxian Li, Xiaoling Sun2, b, Weiqin Li2, c, Daisong Shi2, d

Available online at ScienceDirect. The 4th International Conference on Electrical Engineering and Informatics (ICEEI 2013)

CHANNEL ASSIGNMENT AND LOAD DISTRIBUTION IN A POWER- MANAGED WLAN

Available online at ScienceDirect. Procedia Engineering 120 (2015 ) EUROSENSORS 2015

In this lecture, we will look at how different electronic modules communicate with each other. We will consider the following topics:

DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers

MOBILE COMPUTING 2/25/17. What is RFID? RFID. CSE 40814/60814 Spring Radio Frequency IDentification

Wireless Traffic Light Controller

Bloodhound RMS Product Overview

Multiple-Arm Dipoles Reader Antenna for UHF RFID Near-Field Applications

Available online at ScienceDirect. Procedia Engineering 153 (2016 )

ANALYTICAL EVALUATION OF RFID IDENTIFICATION PROTOCOLS. Gaia Maselli

Politecnico di Milano Advanced Network Technologies Laboratory. Radio Frequency Identification

Design of Chipless Rfid Tag Based on Stepped Impedance Resonator In Frequency Domain

Available online at ScienceDirect. Procedia Computer Science 76 (2015 )

Improving Reader Performance of an UHF RFID System Using Frequency Hopping Techniques

Available online at ScienceDirect. Procedia Computer Science 92 (2016 ) 30 35

RFID Integrated Teacher Monitoring

Fabrication of the kinect remote-controlled cars and planning of the motion interaction courses

Contactless snooping: Assessing the real threats

(TR4308I) RFID Transponder Inductor. Token Electronics Industry Co., Ltd. Version: January 13, Web:

Available online at ScienceDirect. Procedia Computer Science 56 (2015 )

ScienceDirect. A Novel DWT based Image Securing Method using Steganography

AN0503 Using swarm bee LE for Collision Avoidance Systems (CAS)

Antenna Array Layout for the Localization of Partial Discharges in Open-Air Substations

Internet of Things Application Practice and Information and Communication Technology

Design of UHF RFID Emulators with Applications to RFID Testing and Data Transport

Extending the range of NFC capable devices

Study on Reactive Automatic Compensation System Design

ScienceDirect. Analysis of Goal Line Technology from the perspective of an electromagnetic field based approach

Course Project. Project team forming deadline has passed Project teams will be announced soon Next step: project proposal presentation

Research of Initiative Personnel Orientation and Rescue System in Mine based on Synchronous Signal Sensei Technology

IMAGE TYPE WATER METER CHARACTER RECOGNITION BASED ON EMBEDDED DSP

Available online at ScienceDirect. Procedia Engineering 111 (2015 )

Available online at ScienceDirect. Procedia Computer Science 56 (2015 )

Simulation Study for the Decoding of UHF RFID Signals

Collision Avoidance in a Dense RFID Network

This is a repository copy of Electromagnetic Monitoring of Semiconductor Ageing.

Available online at ScienceDirect. Procedia Engineering 168 (2016 ) th Eurosensors Conference, EUROSENSORS 2016

RFID ACCESS CONTROL. SRðAN LALE FACULTY OF ELECTRICAL ENGINEERING EASTERN SARAJEVO

Available online at ScienceDirect. Procedia Technology 17 (2014 )

A Novel Water Quality Monitoring System Based on Solar Power Supply & Wireless Sensor Network

Beamforming for 4.9G/5G Networks

Study of multi physical parameter monitoring device based on FBG sensors demodulation system

Partial overlapping channels are not damaging

Available online at ScienceDirect. Procedia Computer Science 83 (2016 )

ScienceDirect. Unsupervised Speech Segregation Using Pitch Information and Time Frequency Masking

Student Seminars: Kickoff

Advances in SAW Devices for Sensing and RFID Applications

Final Project Introduction to RFID (Radio Frequency IDentification) Andreas G. Andreou

Politecnico di Milano Advanced Network Technologies Laboratory. Radio Frequency Identification

FAQs about OFDMA-Enabled Wi-Fi backscatter

Lecture 5. RFID Technologies

A CMOS Visual Sensing System for Welding Control and Information Acquirement in SMAW Process

An Improved DV-Hop Localization Algorithm Based on Hop Distance and Hops Correction

SMALL PROXIMITY COUPLED CERAMIC PATCH ANTENNA FOR UHF RFID TAG MOUNTABLE ON METALLIC OBJECTS

Available online at ScienceDirect. Procedia Computer Science 34 (2014 )

Integrating Correlation Acquisition with Location Optimization for Accurate Indoor Lightwave Robot Positioning

TOTAL DETECTOR COLLISION AVOIDANCE SYSTEM by Janus Technologies S.L. and Clock Technology S.L.

Available online at ScienceDirect. Procedia Computer Science 34 (2014 )

Non-Uniform Concentric Circular Antenna Array Design Using IPSO Technique for Side Lobe Reduction

SPECTRUM SHARING: OVERVIEW AND CHALLENGES OF SMALL CELLS INNOVATION IN THE PROPOSED 3.5 GHZ BAND

Definition of RF-ID. Lecture on RF-IDs

Measuring Crossing Times of Passenger Vehicles Using Bluetooth Technology at U.S. Mexico Border

REAL TIME INDOOR TRACKING OF TAGGED OBJECTS WITH A NETWORK OF RFID READERS

NEAR FIELD COMMUNICATION (NFC) A TECHNICAL OVERVIEW

2. RFID COLISSION AND INTERFERENCE PROBLEMS 1. INTRODUCTION /07/$ IEEE

Modulated Backscattering Coverage in Wireless Passive Sensor Networks

sensors ISSN

Available online at ScienceDirect. Procedia CIRP 27 (2015 ) th CIRP conference on Computer Aided Tolerancing

IoT. Indoor Positioning with BLE Beacons. Author: Uday Agarwal

Research on Flicker Measurement Algorithm Based on FFT

Dynamic Tag Estimation for Optimizing Tree Slotted Aloha in RFID Networks

Compact Microstrip UHF-RFID Tag Antenna on Metamaterial Loaded with Complementary Split-Ring Resonators

Engr 1202 ECE. Clean Room Project

RFID. Contents and form. Petr Bureš, Faculty of transportation sciences Czech technical university in Prague

Antenna efficiency calculations for electrically small, RFID antennas

LED-ID Systems Applying the Modulation and Coding Selection Scheme Based on Received Angle

Available online at ScienceDirect. Procedia Computer Science 76 (2015 ) 2 8

RFID/NFC TECHNOLOGY. With emphasis on physical layer. Ali Zaher Oslo

Available online at ScienceDirect. Procedia Computer Science 70 (2015 )

Before the FEDERAL COMMUNICATIONS COMMISSION Washington, DC ) ) ) ) ) COMMENTS OF REDLINE COMMUNICATIONS INC.

Data and Computer Communications. Tenth Edition by William Stallings

Transcription:

Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 34 (2014 ) 236 241 The 9th International Conference on Future Networks and Communications (FNC-2014) Optimal Placement of RFID s for Outdoor Applications Tayseer Alkhdour a *, Elhadi Shakshuki b a King Faisal University, Alahsa 31982, P.O. Box 400, Saudi Arabia b Acadia University, 27 University Avenue, Wolfville,NS, B4P1N6, Canada Abstract Radio frequency identification is widely used in many outdoor applications. In several outdoor application environments, a large of antennas as well as tags are required. One of the most critical issues in these environments is the placement of antennas. Towards this end, this paper proposes an optimization model to find the optimal placement of the antennas. The cost function of the proposed model is to minimize the of antennas needed and to minimize the collisions area for a specific area. To verify the feasibility of the proposed model, it is tested and solved using different configurations. 2014 Elsevier B.V. This is an open access article under the CC BY-NC-ND license 2014 The Authors. Published by Elsevier B.V. (http://creativecommons.org/licenses/by-nc-nd/3.0/). Peer-review under responsibility of the Program Chairs of FNC-2014. Selection and peer-review under responsibility of Conference Program Chairs Keywords: RFID; Optimal placement; 1. Introduction Radio Frequency Identification (RFID) technology provides wireless use of Radio Frequency (RF) fields for transferring data. RFID system consists of readers and tags to automatically identify and track the tags attached to different objects through readers [1]. RFID is emerging as the latest technological strategy in tracking objects using magnetic or electromagnetic response exchange. RFID technologies allow the transmission of a unique serial wirelessly, using radio frequency waves. RFID systems work by placing a chip containing data and an antenna on an object, enabling the data on that chip to be accessed by a reader. RFID system consists of an RFID reader and a finite of tags. An RFID reader is usually a powerful device with sufficient computational power and memory size. A reader is equipped with antennas for sending and receiving signals, a transceiver and a processor to decode data. * Corresponding author. Tel.: +966-3-5898116; fax: +966-3-5899236. E-mail address: talkhdour@kfu.edu.sa 1877-0509 2014 Elsevier B.V. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/3.0/). Selection and peer-review under responsibility of Conference Program Chairs doi:10.1016/j.procs.2014.07.017

Tayseer Alkhdour and Elhadi Shakshuki / Procedia Computer Science 34 ( 2014 ) 236 241 237 RFID tags are designed with limited resources so that it could be cost effective for several types of applications. RFID tags are classified into three types: active, passive or semi-passive [2]. Passive tags have the lowest complexity, no power source nor an on-tag transmitter. In contrast, semi-passive tags have an on-board power source to energize their microchip. Active tags contain transceivers and power source. Active tags can sense the channel and are able to operate without a reader. Active tags are usually used for manufacturing, such as tracking components on an assembly line, or for logistics where the tag may be reused. Conversely, passive and semi-passive tags do not have the ability to sense the channel and rely on the energy received from the reader to transmit their IDs. Passive tags have the lowest complexity and are considerably less expensive than active tags. Passive tags are readable only when activated by a RFID reader and normally have shorter reading ranges than active tags. 2. Problem Definition One example of outdoor applications using RFID system is an application for water flooding detection in a wide open area. In this application, active tags attached with water flooding sensors are deployed in the monitored area as shown in Figure 1. The location of each active tag is fixed and known. If a sensor detects water flooding in its neighborhood, an active tag that is attached with a sensor should forward the desired data to a central alarm system for action. Active tags forward data to the central alarm system through an antenna and RFID reader. This makes it natural to have at least one antenna within the range of each active tag. Usually an antenna can serve more than a single tag. Therefore, antennas must be deployed in the monitored area such that each active tag in the monitored area can communicate with an RFID reader. Figure 1 shows all possible and predefined locations of RFID tags and antennas. Since the monitored area in such an application is large, a lot of RFID antennas are needed to cover all the tags. Using large of antennas increases the cost. To minimize the cost of RFID antennas, it is recommended to use a minimum of antennas that cover all the tags. In addition, the optimal locations of antennas must be determined. The optimal locations of antennas are a subset of all possible locations such that all tags can communicate with a single antenna. Figure 1: Application Enviroment

238 Tayseer Alkhdour and Elhadi Shakshuki / Procedia Computer Science 34 ( 2014 ) 236 241 In this paper, we propose an integer linear programing (ILP) model to determine the minimum of antennas that are needed for a specific area of interest. In addition, the optimal placement of the antennas are determined. In our proposed model, we assume that the locations of active tags are pre-defined and the set of possible locations of antennas are known. It should be noted that the proposed model is solved for a specific deployment of active tags. 3. Related Work To deploy a minimum of RFID readers at the right locations with considering collisions is an important research issue. Many researchers have proposed several attempts to deal with these issues. For example, Huang and Chang have studied the problem of RFID deployment by employing an experimental design to determine the main factors that affecting the RFID interrogation range [3]. They performed a practical measurement to collect real data. The interrogation zone is represented by a set of discrete points. For capturing the interrogation zone of an RFID antenna, a simulating environment is constructed for the RFID system. They assumed that an electromagnetic field is symmetric and performance is uniformly distributed in each grid. However, they overlooked human and environmental errors. In their experiment, the reader is placed at a height of 90 cm from the ground. The tag is placed on a cardboard box to minimize the interference from the attached material. The reader read the tag and is monitored as to how many times it successfully read the tag within a predefined time interval. The of reads has been translated to a reading rate. After the data gathering process and mapping the data into the space is completed, the ellipse-like shape is chosen to represent and simulate the shape of interrogation zone. The main advantage of this approach is that the length and the width are adjustable to fit and describe a real reader. In another approach, Chang et. al discussed both optimizing the RFID reader deployment and adjusting reading speed to minimize reader collision [4]. In their approach, they used heuristic optimization techniques utilizing Tabu search to find the optimal deployment of RFID reader. Reader deployment performance is analyzed in terms of deployment cost, reader collision, system throughput, and hit-miss ratio. In their work, they assumed the environment is divided into regions. Each region contains immovable RFID tags and information gateway. The information gateway stores the unique IDs data of RFID tags in a connection table. This table is used to calculate the Query-hiT ratio (QT) in one of the regions. When a new RFID tag joins a region, it must notify the information gateway to record its unique ID data. Multiple RFID readers are able to monitor more than one region. If RFID tags read by readers, the information gateway would receive RFID reading events, which mark "read" tag in its connection table. Every RFID reader can arbitrarily move to search better location by means of intelligent RFID deployment agent. The RFID deployment agent consists of two mechanisms, namely: 1) superior mechanism in RFID reader deployment and 2) reading speed adjustment for anti-collision. The first mechanism utilizes the virtual reader model to estimate the backscatter power and the Tabu search to find better locations of deploying readers. In the second mechanism, the reading speed is adjusted to decrease the reader collision. Hung and Huy attempted to find the optimal deployment of RFID readers using genetic algorithm [5]. In their proposed model, first they divided the monitored area into smaller regions. Then, they applied approximate curve Bezier for sequence of the smaller regions. The control points of this curve are the s of tags in the region. Based on the approximate curves in the small regions, the collections of points that are close to the tags are determined. Each point can be considered as a candidate location of the reader. The genetic algorithm is used to find the optimal locations of the readers. In order for Hung and Huy to decrease collision, they used time division multiple access technique. 4. The ILP model This section describes the proposed model in detail. In this model, we assume that there are M active tags that are pre-deployed in an interest area to be monitored. The location of each active tag is known. The transmission range of an active tag is circular with radius of R m. We also assume that there is a set of possible locations where specific antennas could be placed. The of these possible locations is N. The objective of the proposed model is twofold. First, is to find the minimum of antennas needed for deployment in the monitored area. Second, is

Tayseer Alkhdour and Elhadi Shakshuki / Procedia Computer Science 34 ( 2014 ) 236 241 239 to identify the location of the antennas such that each tag communicates with one antenna only; this minimizes the collision in readings tags. In order to indicate whether an antenna is placed in the possible location q or not, we define a binary variable x q={0,1}. If an antenna is allocated at location q then x q is equal to 1. Otherwise, x q is equal to 0. The objective function of the proposed optimization model is to minimize the of antennas, which can be represented by Equation (1):. (1) To represent whether a tag at location p is able to communicate with an antenna at location q, we define a binary variable y qp= {0,1}. If there is no antenna at location q, then y qp is equal to 0. On the other hand, a tag at location p can communicate with an antenna placed at location q if and only if q is in the transmission range of the tag in location p. This means that the distance between location q and location p (D qp) is less than R m. Therefore, y qp is equal to 1; otherwise, y qp is equal to 0. This can be modeled by Equation (2). (2) From Equation (2), we can deduce that y qp is 0 if no antenna is placed at location q (i.e. x q=0). On the other hand, if an antenna is placed at location q, and the distance between location p and location q is greater than the tag transmission range, then is equal to 0. Therefore, y qp is 0. Similarly, if the distance between location p and location q is less than the tag transmission range, then is greater than 0. Therefore, y qp equals to 1. A tag at location p is able to communicate with at least one antenna; therefore: (3) In general, the ILP model is represented by the following formula: Such that ;. 5. Experimental Results To solve the ILP model, we assume that the monitored area is a square with dimension 1x1 km. The monitored area is divided into grids, each with 100x100 m in size. Active tags are deployed in the monitored area such that each tag is placed at the corner of each grid. The total of deployed tags is 100. The locations of the tags are shown in Figure 2. We also assume that all the possible locations of the antennas are known in advance. To show the possible locations of antennas, we assume that the whole monitored area is divided into smaller grids with 20x20 m

240 Tayseer Alkhdour and Elhadi Shakshuki / Procedia Computer Science 34 ( 2014 ) 236 241 in size. The corner of each grid can be a possible location of antenna. Therefore, the maximum of antennas are required is 2500. In addition, we assume that the transmission range of the active tag is 100 meter, as specified in [6]. The location of each tag and the possible location of each antenna are represented by (x,y). The of the first tag is (0,0). The of the second tag is (0,100). The of the last tag is (900,900). We consider the of the first possible location of antenna is (0,0), The of the second possible location of antenna is (0,20), The of the last possible location of antenna is (980,980). Figure 2: Locations of Tags and Possible locations of We solve the ILP model using Lingo solver [7]. The optimal solutions shows that the minimum of antennas is equal to 24. The optimal locations ( ) of the antennas are shown in Table 1. We observe from Table 1 that the distance between each pair of antennas is greater than 200 m. There is only a single pair of antenna where the distance between the two antennas is 200 m. The two antennas are: antenna-1 and antenna-2. This ensures that if a specific antenna-a is in the transmission range of an active tag, then the closest antenna to -A will not be in the transmission range of the tag, because we assume that the transmission range of an active tag is 100 m. Therefore, each active tag will communicate with a single antenna only as shown in Table 2. Table 1: Locations of antennas 1 (0,100) 7 (200,200) 13 (500,300) 19 (700,700) 2 (0,300) 8 (200,700) 14 (500,800) 20 (800,0) 3 (0,700) 9 (300,400) 15 (600,0) 21 (800,400) 4 (20,860) 10 (300,800) 16 (600,500) 22 (800,860) 5 (100,500) 11 (400.100) 17 (600,900) 23 (900,200) 6 (200,0) 12 (400,600) 18 (700,200) 24 (900,600)

Tayseer Alkhdour and Elhadi Shakshuki / Procedia Computer Science 34 ( 2014 ) 236 241 241 Table 2 shows each antenna and the tags that can communicate through it. We observe from Table 2 that each tag can communicate with a single antenna only which eliminate the collision in tags reading. From Table 2, we observe that although the of tags per antenna is not the same for all antennas, the variation in the of tags per antenna is small. The variance in of tags per antenna is 0.72222 which could be considered a reasonable variance. Table 2: s and their tags Tags Tags Tags Number 1 1,2,3,12 9 25,34,35,36,45 17 60,69,70,80 2 4,5,14 10 30,39,40,50 18 63,72,73,74 3 7,8 11 32,41,42,43,52 19 68,77,78,79,88 4 9,10,19,20 12 37,46,47,48,57 20 71,81,82,91 5 6,15,16,17,26 13 44,53,54,55,64 21 75,84,85,86,95 6 11,21,31 14 49,58,59 22 89,90,99,100 7 13,22,23,24,33 15 51,61,62 23 83,92,93,94 8 18,27,28,29,38 16 56,65,66,67,76 24 87,96,97,98 6. Conclusion This paper proposed an optimization model to find the optimal placement of antennas in outdoor application. The cost function of the proposed model is to minimize the of antennas needed and to minimize the collisions area for a specific area. To verify the feasibility of the proposed model, it is tested and solved assuming that 100 tags are deployed in the monitored area and the possible locations of antennas is 2500. The optimal solution showed that the of needed antennas to cover all tags is 24. Moreover, each tag can communicate by a single antenna that eliminated the collision in reading the tags. As a future work, the minimum of tags that are needed to cover the monitored area as well as the optimal placement of tags in the monitored area can be studied. 7. Acknowledgment The researchers thanks the Deanship of Scientific Research at King Faisal University for funding this research : (150167). References 1. RFID Journal, [Last accessed on September 2013]: http://www.rfidjournal.com/ 2. D. Majors, O. Swindle, T. Leary, P. Harbour, J. Leibowitz, RFID Radio Frequency Identification: Applications and Implications for Consumers. A Workshop Report from the Staff of the Federal Trade Commission. March 2005. P. 1-24. 3. Han-Pang Huang, Ying-Ting Chang, "Optimal layout and deployment for RFID systems", Advanced Engineering Informatics 25 (2011), pp. 4 10. 4. Yao-Chung Chang; Ci-Jhih Fong; Yu-Shan Lin; Jiann-Liang Chen, "Optimal deployment strategy of RFID networks using Tabu search mechanism," Advanced Communication Technology (ICACT), 2010 The 12th International Conference on, vol.2, no., pp.1397,1400, 7-10 Feb. 2010. 5. Tran Cong Hung, Nguyen Khac Huy, "RFID Reader Deployment Strategy using Genetic Algorithm", Journal of Selected Areas in Telecommunications (JSAT), September Edition, 2011. PP. 39-45. 6. Stephen A. Weis, RFID (Radio Frequency Identification): Principles and Applications, MIT CSAIL 7. http://www.lindo.com/ [Last accessed on May 2014).