Skip to main content
Log in

Generation of RFID test datasets using RSN tool

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

This paper presents an RSN Tool to generate input datasets for testing RFID middleware. As RFID middleware takes an important role in entire RFID systems, its performance should be carefully evaluated under various business conditions. In general, evaluation of the RFID middleware requires a huge cost because the numerous RFID readers and tags need to be deployed to acquire the tag event stream. To facilitate low-cost testing of the middleware, we propose the RSN Tool which provides means of designing a virtual RFID infrastructure and generates a tag event stream automatically for the virtual infrastructure. Using the RSN Tool, we can easily obtain a semantically valid dataset, which captures both physical characteristics of RF communications and business activities of tags’ movements. This is a major differentiation point of our work compared from previous works, which merely create the randomized dataset based on a set of virtual RFID readers. We also discuss a step-by-step usage of the RSN Tool from the creation of a virtual infrastructure to the generation of tag events. The experimental analysis shows that the RSN Tool can create the near-real dataset, which closely reflects business activities of the real RFID infrastructure.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  1. Wang F, Liu S, Liu P, Bai Y (2006) Bridging physical and virtual worlds: complex event processing for RFID data streams. In: Ioannidis Y et al (eds) Advances in data technology—EDBT 2006, pp 588–607

  2. Want R (2006) An introduction to RFID technology. IEEE Pervasive Comput 5(1):25–33

    Article  Google Scholar 

  3. Angles R (2005) RFID technologies: supply-chain application and implementation issues. Inf Syst Manag 22(1):51–65

    Article  Google Scholar 

  4. Zhou S, Ling W, Peng Z (2007) An RFID-based remote monitoring system for enterprise internal production management. J Adv Manuf Technol 33(7–8):837–844

    Article  Google Scholar 

  5. Catherine M (2005) EPC bag tagging takes wing. http://www.rfidjournal.com/article/articleview/2024/1/4/. Accessed 31 May 2008

  6. Banks J, Hanny D, Pachano M, Thompson L (2007) RFID applied. Wiley, Hoboken

    Book  Google Scholar 

  7. Welbourne E, Balazinska M, Borriello G, Brunette W (2007) Challenges for pervasive RFID-based infrastructures. In: Fifth annual IEEE international conference on pervasive computing and communications workshops, pp 388–394

  8. Derakhshan D, Orlowska ME, Li X (2007) RFID data management: challenges and opportunities. In: The IEEE international conference on RFID, pp 175–182

  9. Ahmed N, Kumar R, French RS, Ramachandran U (2007) RF2ID: A reliable middleware framework for RFID deployment. In: 21st international parallel and distributed processing symposium, pp 1–10

  10. Floerkemeier C, Roduner C, Lampe M (2008) RFID application development with the accada middleware platform. IEEE Syst J 1(2):82–94

    Article  Google Scholar 

  11. Wang Q, Ryu W, Kim S, Hong B (2009) Demonstration of an RFID middleware: LIT ALE manager, In: Proceedings of the 18th ACM conference on information and knowledge management (CIKM 2009), pp 2071–2072

  12. EPCglobal Inc. (2009) The application level events (ALE) specification, version 1.1.1, part I: core specification. http://www.gs1.org/gsmp/kc/epcglobal/ale. Accessed 24 June 2011

  13. Mohamad R, Hafeez WM, Salleh WM (2012) Multiband OFDM and OFDM simulation software using MATLAB® graphical user interface. J Convergence 3(1):1–4

    Google Scholar 

  14. Huang G, Wang W, Liu T, Mei H (2011) Simulation-based analysis of middleware service impact on system reliability: experiment on Java application server. J Syst Softw 84(7):1160–1170

    Article  Google Scholar 

  15. Hamad AA, Alsaad MA (2010) A software application for energy flow simulation of a grid connected photovoltaic system. Energy Convers Manag 51(8):1684–1689

    Article  Google Scholar 

  16. Li M, Wang F, Wang D (2011) Preheating simulation of temperature rising of power battery. J Convergence 2(2):9–12

    Google Scholar 

  17. Lee J, Kim N (2006) Performance test tool for RFID middleware: parameters, design, implementation, and features. In: The 8th international conference on advanced communication technology, pp 149–152

  18. Park C, Ryu W, Hong B (2009) RFID middleware evaluation toolkit based on a virtual reader emulator. In: Proceedings of the 1st international conference on emerging databases (EDB 2009), pp 154–157

  19. Pramari LLC (2007) Rifidi toolkit. http://www.rifidi.org/documentation_toolkit.html. Accessed 4 July 2011

  20. Zhang H, Kwon J, Hong B (2011) A graph model based simulation tool for generating RFID streaming data. In: Proceedings of the 13th Asia-Pacific web conference on Web technologies and applications, pp 290–300

  21. Arasu A, Cherniack M, Galvez E, Maier D, Maskey AS, Ryvkina E, Stonebraker M, Tibbetts R (2004) Linear road: a stream data management benchmark. In: Proceedings of the thirtieth international conference on very large data bases, vol 30, pp 480–491

  22. Ryu W, Kwon J, Hong B (2011) An RSN tool: a test dataset generator for evaluating RFID middleware, In: Proceedings of the 8th FTRA international conference on secure and trust computing, data management, and applications, CCIS, vol 186, pp 217–224

  23. Ryu W, Kwon J, Hong B (2011) A simulation network model to evaluate RFID middlewares. Int J Softw Eng Knowl Eng 21:779–801

    Article  Google Scholar 

  24. Ryu W (2012) A study on the reprocessing model for consistency control of the RFID transaction. PhD Dissertation, Pusan National University

  25. Peterson JL (1981) Petri net theory and the modeling of systems. Prentice Hall, Upper Saddle River

    Google Scholar 

  26. Holliday MA, Vernon MK (1987) A generalized timed petri net model for performance analysis. IEEE Trans Softw Eng 13:1297–1310

    Article  Google Scholar 

  27. Kristensen LM, Jørgensen JB, Jensen K (2004) Application of coloured petri nets in system development. In: Desel J, Reisig W, Rozenberg G (eds) Lecture notes in computer sciences, vol 3098, pp 19–27

  28. Jeffery SR, Garofalakis M, Franklin MJ (2006) Adaptive cleaning for RFID data streams. In: Proceedings of the 32nd international conference on very large data bases, pp 163–174

  29. EPCglobal Inc. (2006) Reader protocol standard, version 1.1. http://www.epcglobalinc.org/standards/rp. Accessed 17 Sep 2009

  30. Eberhardt N (2002) Towards RFID performance benchmark tests, Technical report, Auto-ID Center, Massachusetts Institute of Technology

Download references

Acknowledgments

This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MEST) (No. 2012014046).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Joonho Kwon.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Ryu, W., Kwon, J. & Hong, B. Generation of RFID test datasets using RSN tool. Pers Ubiquit Comput 17, 1409–1419 (2013). https://doi.org/10.1007/s00779-012-0576-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-012-0576-4

Keywords

Navigation