Journal Home > Volume 25 , Issue 5

Computational Radio Frequency IDentification (CRFID) is a device that integrates passive sensing and computing applications, which is powered by electromagnetic waves and read by the off-the-shelf Ultra High Frequency Radio Frequency IDentification (UHF RFID) readers. Traditional RFID only identifies the ID of the tag, and CRFID is different from traditional RFID. CRFID needs to transmit a large amount of sensing and computing data in the mobile sensing scene. However, the current Electronic Product Code, Class-1 Generation-2 (EPC C1G2) protocol mainly aims at the transmission of multi-tag and minor data. When a large amount of data need to be fed back, a more reliable communication mechanism must be used to ensure the efficiency of data exchange. The main strategy of this paper is to adjust the data frame length of the CRFID response dynamically to improve the efficiency and reliability of CRFID backscattering communication according to energy acquisition and channel complexity. This is done by constructing a dynamic data frame length model and optimizing the command set of the interface protocol. Then, according to the actual situation of the uplink, a dynamic data validation method is designed, which reduces the data transmission delay and the probability of retransmitting, and improves the throughput. The simulation results show that the proposed scheme is superior to the existing methods. Under different energy harvesting and channel conditions, the dynamic data frame length and verification method can approach the theoretical optimum.


menu
Abstract
Full text
Outline
About this article

Optimal Data Transmission in Backscatter Communication for Passive Sensing Systems

Show Author's information Jumin ZhaoJi LiDengao Li( )Haizhu Yang
School of Information and Computer, Taiyuan University of Technology, Taiyuan 030600, China.
School of Big Data, Taiyuan University of Technology, Taiyuan 030600, China.

Abstract

Computational Radio Frequency IDentification (CRFID) is a device that integrates passive sensing and computing applications, which is powered by electromagnetic waves and read by the off-the-shelf Ultra High Frequency Radio Frequency IDentification (UHF RFID) readers. Traditional RFID only identifies the ID of the tag, and CRFID is different from traditional RFID. CRFID needs to transmit a large amount of sensing and computing data in the mobile sensing scene. However, the current Electronic Product Code, Class-1 Generation-2 (EPC C1G2) protocol mainly aims at the transmission of multi-tag and minor data. When a large amount of data need to be fed back, a more reliable communication mechanism must be used to ensure the efficiency of data exchange. The main strategy of this paper is to adjust the data frame length of the CRFID response dynamically to improve the efficiency and reliability of CRFID backscattering communication according to energy acquisition and channel complexity. This is done by constructing a dynamic data frame length model and optimizing the command set of the interface protocol. Then, according to the actual situation of the uplink, a dynamic data validation method is designed, which reduces the data transmission delay and the probability of retransmitting, and improves the throughput. The simulation results show that the proposed scheme is superior to the existing methods. Under different energy harvesting and channel conditions, the dynamic data frame length and verification method can approach the theoretical optimum.

Keywords: uplink multi-data, frame length optimization, Computational Radio Frequency IDentification (CRFID), Cyclic Redundancy Check (CRC)

References(26)

[1]
A. P. Sample, D. J. Yeager, and P. S. Powledge, Design of a passively-powered, programmable sensing platform for UHF RFID systems, in Proc. of IEEE International Conference on RFID, Grapevine, TX, USA, 2007, pp. 149-156.
DOI
[2]
M. Alhaideri, M. Rushanan, D. F. Kune, and K. V. Fu, The Moo and cement shoes: Future directions of a practical sense-control-actuate application, presented at the First International Workshop on the Swarm at the Edge of the Cloud (SEC’13@ESWeek), Montreal, Canada, 2013.
[3]
J. C. Guo, T. Wang, Y. He, and M. Jin, TwinLeak: RFID-based liquid leakage detection in industrial environments, in Proc. of IEEE International Conference on Computer Communications, Paris, France, 2019, pp. 883-891.
DOI
[4]
L. Yang, J. S. Han, Y. Qi, and Y. H. Liu, Identification-freebatch authentication for RFID tags, in Proc. of International Conference on Network Protocols, Kyoto, Japan, 2010, pp. 154-163.
DOI
[5]
J. Gummeson, S. S. Clark, and K. V. Fu, On the limits of effective hybrid micro-energy harvesting on mobile CRFID sensors, in Proc. of the 8th International Conference on Mobile Systems, Applications, and Services (MobiSys 2010), San Francisco, CA, USA, 2010, pp. 15-18.
DOI
[6]
W. Gong, K. B. Liu, X. Miao, and H. X. Liu, Arbitrarily accurate approximation scheme for large-scale RFID cardinality estimation, in Proc. of IEEE Conference on Computer Communications, Toronto, Canada, 2014, pp. 477-485.
DOI
[7]
C. C. Xiang, P. L. Yang, X. G. Wu, H. He, and S. C. Xiao, Qos-based service selection with lightweight description for large-scale service-oriented internet of things, Tsinghua Science and Technology, vol. 20, no. 4, pp. 336-347, 2015.
[8]
F. Li, J. G. Yu, F. Zhao, and H. L. Jiang, A novel analysis of delay and power consumption for polling schemes in the IoT, Tsinghua Science and Technology, vol. 22, no. 4, pp. 368-378, 2017.
[9]
M. Jin, Y. He, X. Meng, Y. L. Zheng, D. Fang, and X. Chen, FlipTracer: Practical parallel decoding for backscatter communication, in Proc. of International Conference on Mobile Computing Networking, Snowbird, UT, USA, 2017, pp. 275-287.
DOI
[10]
J. R. Smith, A. P. Sample, P. S. Powledge, S. Roy, and A. Mamishev, A wirelessly-powered platform for sensing and computation, in Proc. of International Conference of Ubiquitous Computing, Orange County, CA, USA, 2006, pp. 495-506.
DOI
[11]
D. J. Qiao and S. Y. Choi, Goodput enhancement of IEEE 802.11a wireless LAN via link adaptation, in Proc.of IEEE International Conference on Communications, Helsinki, Finland, 2001, pp. 1995-2000.
[12]
M. Simon and D. Divsalar, Some interesting observations for certain line codes with application to RFID, IEEE Transactions on Communications, vol. 54, no. 4, pp. 583-586, 2006.
[13]
W. Dong, X. Liu, C. Chen, Y. He, G. Chen, Y. H. Liu, and J. J. Bu, DPLC: Dynamic packet length control in wireless sensor networks, IEEE Transactions on Wireless Communications, vol. 13, no. 3, pp. 1172-1181, 2014.
[14]
J. Zhou, L. Hu, F. Wang, H. M. Lu, and K. Zhao, An efficient multidimensional fusion algorithm for IoT data based on partitioning, Tsinghua Science and Technology, vol. 18, no. 4, pp. 369-378, 2013.
[15]
M. Buettner and D. Wetherall, A Gen 2 RFID monitor based on the USRP, ACM SIGCOMM Computer Communication Review, vol. 40, no. 3, pp. 41-47, 2010.
[16]
S. Jiang and S. V. Georgakopoulos, Optimum wireless power transmission through reinforced concrete structure, in Proc. of IEEE International Conference on RFID, Orlando, FL, USA, 2011, pp. 50-56.
DOI
[17]
M. Philipose, J. R. Smith, B. Jiang, A. Mamishev, and S. Roy, Battery-free wireless identification and sensing, IEEE Pervasive Computing, vol. 4, no. 1, pp. 37-45, 2005.
[18]
F. Bolos, D. Belo, and A. Georgiadis, A UHF rectifier with one octave bandwidth based on a non-uniform transmission line, in Proc. of IEEE MTT-S International Microwave Symposium, San Francisco, CA, USA, 2016, pp. 1-3.
DOI
[19]
J. R. Smith, Wirelessly Powered Sensor Networks and Computational RFID. New York, NY, USA: Springer, 2013.
DOI
[20]
M. Buettner, B. Greenstein, and D. Wetherall, Dewdrop: An energy-aware runtime for computational RFID, in Proceedings of the 8th USENIX Conference on Networked systems Design and Implementation, Boston, MA, USA, 2011, pp. 197-210.
[21]
P. Y. Zhang, J. Gummeson, and D. P. Ganesan, Blink: A high throughput link layer for backscatter communication, in Proc. of the 10th International Conference on Mobile Systems, Applications, and Services, New York, NY, USA, 2012, pp. 99-112.
DOI
[22]
J. Gummeson, P. Y. Zhang, and D. Ganesan, Flit: A bulk transmission protocol for RFID-scale sensors, in Proc. of the 10th International Conference on Mobile Systems, Applications, and Services, Lake District, UK, 2012, pp. 71-84.
DOI
[23]
P. Zhang and D. Ganesan, Enabling bit-by-bit backscatter communication in severe energy harvesting environments, in Proc. of Usenix Conference on Networked Systems Design & Implementation, Seattle, WA, USA, 2014, pp. 345-357.
[24]
Y. Li, S. L. Fu, Y. Ying, Y. Sun, and K. Chi, Goodput optimization via dynamic frame length and charging time adaptation for backscatter communication, Peer-to-Peer Networking and Applications, vol. 10, no. 3, pp. 1-13, 2016.
[25]
J. C. Guo, T. Wang, Y. He, and M. Jin, TwinLeak: RFID-based liquid leakage detection in industrial environments, in Proc. of IEEE International Conference on Computer Communications, Paris, France, 2019, pp. 883-891.
DOI
[26]
D. Wu, M. J. Hussain, S. F. Li, and L. Lu, R2: Over-the-air reprogramming on computational RFIDs, in Proc. of IEEE International Conference on RFID, Orlando, FL, USA, 2016, pp. 1-8.
DOI
Publication history
Copyright
Acknowledgements
Rights and permissions

Publication history

Received: 19 April 2019
Revised: 18 July 2019
Accepted: 23 July 2019
Published: 16 March 2020
Issue date: October 2020

Copyright

© The author(s) 2020

Acknowledgements

The research was supported by the National Key Basic Research and Development Program of China (No. 2018YFB2200900), and the National Natural Science Foundation of China (Nos. 61772358 and 61972273), and the Transformation and Cultivation Project of Scientific and Technological Achievements of Universities in Shanxi Province.

Rights and permissions

The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).

Return