Skip to main content
Log in

A Reprocessing Model for Complete Execution of RFID Access Operations on Tag Memory

  • Regular Paper
  • Published:
Journal of Computer Science and Technology Aims and scope Submit manuscript

Abstract

This paper investigates the problem of inconsistent states of radio frequency identification (RFID) tag data caused by incomplete execution of read/write operations during access to RFID tag memory. Passive RFID tags require RF communication to access memory data. This study is motivated by the volatility of RF communication, where instability is caused by intermittent connections and uncertain communication. If a given tag disappears from the communication area of the reader during the reading or writing of tag data, the operation is incomplete, resulting in an inconsistent state of tag data. To avoid this inconsistency, it is necessary to ensure that any operations on tag memory are completed. In this paper, we propose an asynchronous reprocessing model for finalizing any incomplete execution of read/write operations to remove inconsistent states. The basic idea is to resume incomplete operations autonomously by detecting a tag’s re-observation from any reader. To achieve this, we present a concurrency control mechanism based on continuous query processing that enables the suspended tag operations to be re-executed. The performance study shows that our model improves the number of successful operations considerably in addition to suppressing inconsistent data access completely.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Want R. An introduction to RFID technology. IEEE Pervasive Comput., 2006, 5(1): 25–33.

    Article  Google Scholar 

  2. Banks J, Hanny D, Pachano M, Thompson L. RFID Applied. Wiley, Chichester, March 2007, pp.328–329.

    Book  Google Scholar 

  3. Weinstein R. RFID: A technical overview and its application to the enterprise. IT Professional, 2005, 7(3): 27–33.

    Article  Google Scholar 

  4. Fishkin K P, Jiang B, Philipose M, Roy S. I sense a disturbance in the field: Unobtrusive detection of interactions with RFID-tagged object. In Proc. the 6th Int. Conf. Ubiquitous Computing, Sept. 2004, pp.268–282.

  5. Jung S, Cho J, Kim S. FQTR: Novel hybrid tag anti-collision protocols in RFID system. Journal of KIISE: Software and Applications, 2009, 36(7): 560–570.

    Google Scholar 

  6. EPCglobal Inc. Class 1 generation 2 UHF air interface protocol standard “Gen 2”, http://www.gs1.org/gsmp/kc/epcglobal/uhfc1g2.

  7. EPCglobal Inc. Low level reader protocol, http://www.gs1.org/gsmp/kc/epcglobal/llrp.

  8. EPCglobal Inc. Application level events (ALE) standard, http://www.gs1.org/gsmp/kc/epcglobal/ale.

  9. Golab L, Özsu M T. Issues in data stream management. SIGMOD Record, 2003, 32(2): 5–14.

    Article  Google Scholar 

  10. Silberschatz A, Korth H F, Sudarshan S. Database System Concepts, 4th edition, New York: McGraw-Hill, 2002, pp.709–722.

    Google Scholar 

  11. Kisler J, Satyanarayanan M. Disconnected operation in the Coda File System. ACM Transactions on Computer Systems, 1992, 10(1): 3–25.

    Article  Google Scholar 

  12. Wu K, Yu P S, Chen M. Energy efficient caching for wireless mobile computing. In Proc. the 12th Int. Conference on Data Engineering, Feb. 26-Mar. 1, 1996, pp.336–343.

  13. Madria S K, Bhargava B. A transaction model for mobile computing. In Proc. Int. Database Engineering and Application Symposium, July 1998, pp.92–102.

  14. Rasheed A, Zaslavsky A. Ensuring database availability in dynamically changing mobile computing environments. In Proc. the 7th Australian Database Conference, Melbourne, Australia, Jan. 1996, pp.100–108.

  15. Ding Z, Meng X, Wang S. A transactional asynchronous replication scheme for mobile database systems. Journal of Computer Sci. and Tech., 2002, 17(4): 389–396.

    Article  MATH  Google Scholar 

  16. Madria S K, Mohania M, Bhowmick S S, Bhargava B. Mobile data and transaction management. Information Sciences, 2002, 141(3–4): 279–309.

    Article  MATH  Google Scholar 

  17. Gürgen L, Roncancio C, Labbé C, Olive V. Transactional issues in sensor data management. In Proc. the 3rd International Workshop on Data Management for Sensor Networks, Sept. 2006, pp.27–32.

  18. Wang B, Yang X, Wang G, Yu G. Continuous approximate window queries in wireless sensor networks. In Lecture Notes in Computer Science 4505, Dong G et al. (eds.), Springer-Verlag, 2007, pp.407–418.

  19. Floerkemeier C, Roduner C, Lampe M. RFID application development with the Accada middleware platform. IEEE Systems Journal, 2007, 1(2): 82–94.

    Article  Google Scholar 

  20. Ryu W, Hong B. A reprocessing model based on continuous queries for writing data to RFID tag memory. In Proc. the 14th International Conf. Database Systems for Advanced Applications, April 2009, pp.201–214.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bonghee Hong.

Additional information

This work was supported by the Grant of the Regional Core Research Program/Institute of Logistics Information Technology of Korean Ministry of Education, Science and Technology.

Electronic supplementary material

Below is the link to the electronic supplementary material.

(PDF 111 kb)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Ryu, W., Hong, B., Kwon, J. et al. A Reprocessing Model for Complete Execution of RFID Access Operations on Tag Memory. J. Comput. Sci. Technol. 27, 213–224 (2012). https://doi.org/10.1007/s11390-012-1218-z

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11390-012-1218-z

Keywords

Navigation