102Accesses
2Citations
Abstract
This paper investigates the problem of inconsistent states of radio frequency identification (RFID) tag data caused by incomplete execution of read/write operations during access to RFID tag memory. Passive RFID tags require RF communication to access memory data. This study is motivated by the volatility of RF communication, where instability is caused by intermittent connections and uncertain communication. If a given tag disappears from the communication area of the reader during the reading or writing of tag data, the operation is incomplete, resulting in an inconsistent state of tag data. To avoid this inconsistency, it is necessary to ensure that any operations on tag memory are completed. In this paper, we propose an asynchronous reprocessing model for finalizing any incomplete execution of read/write operations to remove inconsistent states. The basic idea is to resume incomplete operations autonomously by detecting a tag’s re-observation from any reader. To achieve this, we present a concurrency control mechanism based on continuous query processing that enables the suspended tag operations to be re-executed. The performance study shows that our model improves the number of successful operations considerably in addition to suppressing inconsistent data access completely.
This is a preview of subscription content,log in via an institution to check access.
Access this article
Subscribe and save
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
Buy Now
Price includes VAT (Japan)
Instant access to the full article PDF.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Want R. An introduction to RFID technology.IEEE Pervasive Comput., 2006, 5(1): 25–33.
Banks J, Hanny D, Pachano M, Thompson L. RFID Applied. Wiley, Chichester, March 2007, pp.328–329.
Weinstein R. RFID: A technical overview and its application to the enterprise.IT Professional, 2005, 7(3): 27–33.
Fishkin K P, Jiang B, Philipose M, Roy S. I sense a disturbance in the field: Unobtrusive detection of interactions with RFID-tagged object. InProc. the 6th Int. Conf. Ubiquitous Computing, Sept. 2004, pp.268–282.
Jung S, Cho J, Kim S. FQTR: Novel hybrid tag anti-collision protocols in RFID system.Journal of KIISE: Software and Applications, 2009, 36(7): 560–570.
EPCglobal Inc. Class 1 generation 2 UHF air interface protocol standard “Gen 2”,http://www.gs1.org/gsmp/kc/epcglobal/uhfc1g2.
EPCglobal Inc. Low level reader protocol,http://www.gs1.org/gsmp/kc/epcglobal/llrp.
EPCglobal Inc. Application level events (ALE) standard,http://www.gs1.org/gsmp/kc/epcglobal/ale.
Golab L, Özsu M T. Issues in data stream management.SIGMOD Record, 2003, 32(2): 5–14.
Silberschatz A, Korth H F, Sudarshan S. Database System Concepts, 4th edition, New York: McGraw-Hill, 2002, pp.709–722.
Kisler J, Satyanarayanan M. Disconnected operation in the Coda File System.ACM Transactions on Computer Systems, 1992, 10(1): 3–25.
Wu K, Yu P S, Chen M. Energy efficient caching for wireless mobile computing. InProc. the 12th Int. Conference on Data Engineering, Feb. 26-Mar. 1, 1996, pp.336–343.
Madria S K, Bhargava B. A transaction model for mobile computing. InProc. Int. Database Engineering and Application Symposium, July 1998, pp.92–102.
Rasheed A, Zaslavsky A. Ensuring database availability in dynamically changing mobile computing environments. InProc. the 7th Australian Database Conference, Melbourne, Australia, Jan. 1996, pp.100–108.
Ding Z, Meng X, Wang S. A transactional asynchronous replication scheme for mobile database systems.Journal of Computer Sci. and Tech., 2002, 17(4): 389–396.
Madria S K, Mohania M, Bhowmick S S, Bhargava B. Mobile data and transaction management.Information Sciences, 2002, 141(3–4): 279–309.
Gürgen L, Roncancio C, Labbé C, Olive V. Transactional issues in sensor data management. InProc. the 3rd International Workshop on Data Management for Sensor Networks, Sept. 2006, pp.27–32.
Wang B, Yang X, Wang G, Yu G. Continuous approximate window queries in wireless sensor networks. InLecture Notes in Computer Science 4505, Dong Get al. (eds.), Springer-Verlag, 2007, pp.407–418.
Floerkemeier C, Roduner C, Lampe M. RFID application development with the Accada middleware platform.IEEE Systems Journal, 2007, 1(2): 82–94.
Ryu W, Hong B. A reprocessing model based on continuous queries for writing data to RFID tag memory. InProc. the 14th International Conf. Database Systems for Advanced Applications, April 2009, pp.201–214.
Author information
Authors and Affiliations
Department of Computer Engineering, Pusan National University, Busan, 609-735, Korea
Wooseok Ryu & Bonghee Hong (Member, ACM, IEEE)
Institute of Logistics Information Technology, Pusan National University, Busan, 609-735, Korea
Joonho Kwon
School of Information Science and Engineering, Northeastern University, Shenyang, 110004, China
Ge Yu (Senior Member, CCF, Member, ACM, IEEE)
- Wooseok Ryu
You can also search for this author inPubMed Google Scholar
- Bonghee Hong
You can also search for this author inPubMed Google Scholar
- Joonho Kwon
You can also search for this author inPubMed Google Scholar
- Ge Yu
You can also search for this author inPubMed Google Scholar
Corresponding author
Correspondence toBonghee Hong.
Additional information
This work was supported by the Grant of the Regional Core Research Program/Institute of Logistics Information Technology of Korean Ministry of Education, Science and Technology.
Electronic supplementary material
Below is the link to the electronic supplementary material.
Rights and permissions
About this article
Cite this article
Ryu, W., Hong, B., Kwon, J.et al. A Reprocessing Model for Complete Execution of RFID Access Operations on Tag Memory.J. Comput. Sci. Technol.27, 213–224 (2012). https://doi.org/10.1007/s11390-012-1218-z
Received:
Revised:
Published:
Issue Date:
Share this article
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative