Advertisement

Personal and Ubiquitous Computing

, Volume 17, Issue 7, pp 1409–1419 | Cite as

Generation of RFID test datasets using RSN tool

  • Wooseok Ryu
  • Joonho Kwon
  • Bonghee Hong
Original Article

Abstract

This paper presents an RSN Tool to generate input datasets for testing RFID middleware. As RFID middleware takes an important role in entire RFID systems, its performance should be carefully evaluated under various business conditions. In general, evaluation of the RFID middleware requires a huge cost because the numerous RFID readers and tags need to be deployed to acquire the tag event stream. To facilitate low-cost testing of the middleware, we propose the RSN Tool which provides means of designing a virtual RFID infrastructure and generates a tag event stream automatically for the virtual infrastructure. Using the RSN Tool, we can easily obtain a semantically valid dataset, which captures both physical characteristics of RF communications and business activities of tags’ movements. This is a major differentiation point of our work compared from previous works, which merely create the randomized dataset based on a set of virtual RFID readers. We also discuss a step-by-step usage of the RSN Tool from the creation of a virtual infrastructure to the generation of tag events. The experimental analysis shows that the RSN Tool can create the near-real dataset, which closely reflects business activities of the real RFID infrastructure.

Keywords

RFID Test dataset Tag events Simulation network RFID middleware 

Notes

Acknowledgments

This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MEST) (No. 2012014046).

References

  1. 1.
    Wang F, Liu S, Liu P, Bai Y (2006) Bridging physical and virtual worlds: complex event processing for RFID data streams. In: Ioannidis Y et al (eds) Advances in data technology—EDBT 2006, pp 588–607Google Scholar
  2. 2.
    Want R (2006) An introduction to RFID technology. IEEE Pervasive Comput 5(1):25–33CrossRefGoogle Scholar
  3. 3.
    Angles R (2005) RFID technologies: supply-chain application and implementation issues. Inf Syst Manag 22(1):51–65CrossRefGoogle Scholar
  4. 4.
    Zhou S, Ling W, Peng Z (2007) An RFID-based remote monitoring system for enterprise internal production management. J Adv Manuf Technol 33(7–8):837–844CrossRefGoogle Scholar
  5. 5.
    Catherine M (2005) EPC bag tagging takes wing. http://www.rfidjournal.com/article/articleview/2024/1/4/. Accessed 31 May 2008
  6. 6.
    Banks J, Hanny D, Pachano M, Thompson L (2007) RFID applied. Wiley, HobokenCrossRefGoogle Scholar
  7. 7.
    Welbourne E, Balazinska M, Borriello G, Brunette W (2007) Challenges for pervasive RFID-based infrastructures. In: Fifth annual IEEE international conference on pervasive computing and communications workshops, pp 388–394Google Scholar
  8. 8.
    Derakhshan D, Orlowska ME, Li X (2007) RFID data management: challenges and opportunities. In: The IEEE international conference on RFID, pp 175–182Google Scholar
  9. 9.
    Ahmed N, Kumar R, French RS, Ramachandran U (2007) RF2ID: A reliable middleware framework for RFID deployment. In: 21st international parallel and distributed processing symposium, pp 1–10Google Scholar
  10. 10.
    Floerkemeier C, Roduner C, Lampe M (2008) RFID application development with the accada middleware platform. IEEE Syst J 1(2):82–94CrossRefGoogle Scholar
  11. 11.
    Wang Q, Ryu W, Kim S, Hong B (2009) Demonstration of an RFID middleware: LIT ALE manager, In: Proceedings of the 18th ACM conference on information and knowledge management (CIKM 2009), pp 2071–2072Google Scholar
  12. 12.
    EPCglobal Inc. (2009) The application level events (ALE) specification, version 1.1.1, part I: core specification. http://www.gs1.org/gsmp/kc/epcglobal/ale. Accessed 24 June 2011
  13. 13.
    Mohamad R, Hafeez WM, Salleh WM (2012) Multiband OFDM and OFDM simulation software using MATLAB® graphical user interface. J Convergence 3(1):1–4Google Scholar
  14. 14.
    Huang G, Wang W, Liu T, Mei H (2011) Simulation-based analysis of middleware service impact on system reliability: experiment on Java application server. J Syst Softw 84(7):1160–1170CrossRefGoogle Scholar
  15. 15.
    Hamad AA, Alsaad MA (2010) A software application for energy flow simulation of a grid connected photovoltaic system. Energy Convers Manag 51(8):1684–1689CrossRefGoogle Scholar
  16. 16.
    Li M, Wang F, Wang D (2011) Preheating simulation of temperature rising of power battery. J Convergence 2(2):9–12Google Scholar
  17. 17.
    Lee J, Kim N (2006) Performance test tool for RFID middleware: parameters, design, implementation, and features. In: The 8th international conference on advanced communication technology, pp 149–152Google Scholar
  18. 18.
    Park C, Ryu W, Hong B (2009) RFID middleware evaluation toolkit based on a virtual reader emulator. In: Proceedings of the 1st international conference on emerging databases (EDB 2009), pp 154–157Google Scholar
  19. 19.
    Pramari LLC (2007) Rifidi toolkit. http://www.rifidi.org/documentation_toolkit.html. Accessed 4 July 2011
  20. 20.
    Zhang H, Kwon J, Hong B (2011) A graph model based simulation tool for generating RFID streaming data. In: Proceedings of the 13th Asia-Pacific web conference on Web technologies and applications, pp 290–300Google Scholar
  21. 21.
    Arasu A, Cherniack M, Galvez E, Maier D, Maskey AS, Ryvkina E, Stonebraker M, Tibbetts R (2004) Linear road: a stream data management benchmark. In: Proceedings of the thirtieth international conference on very large data bases, vol 30, pp 480–491Google Scholar
  22. 22.
    Ryu W, Kwon J, Hong B (2011) An RSN tool: a test dataset generator for evaluating RFID middleware, In: Proceedings of the 8th FTRA international conference on secure and trust computing, data management, and applications, CCIS, vol 186, pp 217–224Google Scholar
  23. 23.
    Ryu W, Kwon J, Hong B (2011) A simulation network model to evaluate RFID middlewares. Int J Softw Eng Knowl Eng 21:779–801CrossRefGoogle Scholar
  24. 24.
    Ryu W (2012) A study on the reprocessing model for consistency control of the RFID transaction. PhD Dissertation, Pusan National UniversityGoogle Scholar
  25. 25.
    Peterson JL (1981) Petri net theory and the modeling of systems. Prentice Hall, Upper Saddle RiverGoogle Scholar
  26. 26.
    Holliday MA, Vernon MK (1987) A generalized timed petri net model for performance analysis. IEEE Trans Softw Eng 13:1297–1310CrossRefGoogle Scholar
  27. 27.
    Kristensen LM, Jørgensen JB, Jensen K (2004) Application of coloured petri nets in system development. In: Desel J, Reisig W, Rozenberg G (eds) Lecture notes in computer sciences, vol 3098, pp 19–27Google Scholar
  28. 28.
    Jeffery SR, Garofalakis M, Franklin MJ (2006) Adaptive cleaning for RFID data streams. In: Proceedings of the 32nd international conference on very large data bases, pp 163–174Google Scholar
  29. 29.
    EPCglobal Inc. (2006) Reader protocol standard, version 1.1. http://www.epcglobalinc.org/standards/rp. Accessed 17 Sep 2009
  30. 30.
    Eberhardt N (2002) Towards RFID performance benchmark tests, Technical report, Auto-ID Center, Massachusetts Institute of TechnologyGoogle Scholar

Copyright information

© Springer-Verlag London Limited 2012

Authors and Affiliations

  1. 1.Department of Computer EngineeringPusan National UniversityBusanRepublic of Korea
  2. 2.Institute of Logistics Information TechnologyPusan National UniversityBusanRepublic of Korea

Personalised recommendations