Advertisement

Wireless Networks

, Volume 18, Issue 7, pp 861–879 | Cite as

Integrating RFID and WLAN for indoor positioning and IP movement detection

  • Apostolia Papapostolou
  • Hakima Chaouchi
Article

Abstract

Location awareness in an indoor environment and wireless access to Internet applications are major research areas towards the overwhelming success of wireless and mobile communications. However, the unpredictable indoor radio propagation and handover latency due to node mobility are the main challenging issues that need to be addressed. For tackling efficiently both problems of indoor localization and handover management, we propose combining key benefits of two outstanding wireless technologies, i.e. radio frequency identification (RFID) and a wireless local area network (WLAN) infrastructure. WLANs, such as IEEE 802.11 (WiFi), are now very common in many indoor environments for providing wireless communication among WiFi-enabled devices by accessing an Access Point (infrastructure mode) or through peer to peer connections (ad hoc mode). However, the small cell size of the Access Points (APs) in a WiFi-based network drives the need for frequent handovers leading to increased latency. RFID is an emerging technology consisting of two basic components, a tag and a reader, and its main purpose is the automatic identification of tagged objects by a reader. However, in the presence of multiple readers, RFID suffers from the so-called reader collision problem, mainly due to the inability for direct communication among them. In this paper, we propose a hybrid RFID and WLAN system; the RFID technology is employed for collecting information that is used for both localization and handover management within the WLAN, whereas the WLAN itself is utilized for controlling and coordinating the RFID reading process. In our system architecture, tag IDs of a RFID tag deployment are correlated with both location and topology information in order to determine the position and predict the next subnetwork of a Mobile Node (MN) with a reader attached to its mobile device. The role of the WLAN is to coordinate the readers when accessing the RFID channel for retrieving tags’ IDs, hence compensating the persisting RFID collision problem among multiple readers. Numerical results based on extensive simulations validate the efficiency of the proposed hybrid system in providing accurate and time efficient localization and reducing the IP handover latency.

Keywords

Indoor localization Movement detection RFID WLAN 

References

  1. 1.
    Kaplan, E. D. (2005). Understanding GPS: Principles and applications. London: Artech House.Google Scholar
  2. 2.
    Pahlavan, K., & Levesque, A. H. (2005). Wireless information networks, 2nd edn. New York: Wiley.CrossRefGoogle Scholar
  3. 3.
    Perkins, C. (1996). IP mobility support. Internet Engineering Task Force (IETF), Request for Comments (RFC) 2002.Google Scholar
  4. 4.
    Want, R. (2006). An introduction to RFID technology. IEEE Pervasive Computing 5(1), 25–33.CrossRefGoogle Scholar
  5. 5.
    Baudin, M. (2005). RFID applications in manufacturing. Draft.Google Scholar
  6. 6.
    Joshi, G. P., & Kim, S. W. (2008). Survey, nomenclature and comparison of reader anti-collision protocols in RFID. IETE Technical Review, 25(5), 285–292.Google Scholar
  7. 7.
    (1999). IEEE. Part 11: Wireless LAN medium access control (MAC) and physical (PHY) layer specifications. IEEE Standard 802.11.Google Scholar
  8. 8.
    (1988). International Telecommunication Union, General characteristics of international telephone connections and international telephone circuits. ITU-TG.114.Google Scholar
  9. 9.
    Shirdokar, R., Kabara, J., & Krishnamurthy, P. (2001). A QoS-based indoor wireless data network design for VoIP. In Vehicular technology conference, 2001. VTC 2001 Fall. IEEE VTS 54th, Vol. 4, pp. 2594–2598.Google Scholar
  10. 10.
    Want, R., Hopper, A., Falcao, V., & Gibbons, J. (1992). The active badge location system. ACM Transactions on Information Systems 40(1): 91–102.CrossRefGoogle Scholar
  11. 11.
    Priyyantha, N. B., Chakraborty, A., & Balakrishnan, H. (2000). The cricket location-support system. In 6th international ACM MOBICOM.Google Scholar
  12. 12.
    Bahl, P., & Padmanbhan, V. N. (2000). RADAR: An in-building RF-based user location and tracking system. IEEE INFOCOM, Vol. 2, pp. 775–784.Google Scholar
  13. 13.
    Youssef, M., & Agrawala, A. (2005). The horus location determination system. ACM MOBISYS, pp. 205–219.Google Scholar
  14. 14.
    King, T., Kopf, S., Haenselmann, T., Lubberger, C., & Effelsberg, W. (2006). COMPASS: A probabilistic indoor positioning system based on 802.11 and digital compasses (pp. 24–40). WinTeck.Google Scholar
  15. 15.
    Papapostolou, A., & Chaouchi, H. (2009). WIFE: Wireless indoor positioning based on fingerprint evaluation, LNCS 5550. In IFIP Networking, pp. 234–247.Google Scholar
  16. 16.
  17. 17.
    Ingram, S. J., Harmer, D., & Quinlan, M. (2004). UltraWideBand indoor positioning systems and their use in emergencies. IEEE conference on position location and navigation symposium, pp.706–715.Google Scholar
  18. 18.
    Ni, L. M., Liu, Y., Lau, Y. C., & Patil A. P. (2003). LANDMARC: Indoor location sensing using active RFID. First IEEE international conference on pervasive computing and communications (PerCom’03), p. 407.Google Scholar
  19. 19.
    Hightower, J., Want, R., & Borriello, G. (2000). SpotON: An indoor 3D location sensing technology based on RF signal strength. University of Washington, Department of Computer Science and Engineering, Seattle, WA, UW CSE 00-02-02.Google Scholar
  20. 20.
    Wang, C., Wu, H., & Tzeng, N.F. (2007). RFID-based 3-D positioning schemes. In IEEE INFOCOM, pp. 1235–1243Google Scholar
  21. 21.
    Stelzer, A., Pourvoyeur, K., & Fischer, A. (2004). Concept and application of LPM—a novel 3-D local position measurement system. IEEE Transactions on Microwave Theory and Techniques 52(12), 2664–2669.CrossRefGoogle Scholar
  22. 22.
    Bekkali, A., Sanson, H., & Matsumoto, M. (2007). RFID indoor positioning based on probabilistic RFID map and kalman filtering. In 3rd IEEE international conference on wireless and mobile computing, networking and communications, IEEE WiMob.Google Scholar
  23. 23.
    Hightower, J., & Borriello, G. (2001). Location systems for ubiquitous computing. IEEE Computer 34, 57–66.CrossRefGoogle Scholar
  24. 24.
    Ken, H., & Mike, S. (1999). Touch-sensing input devices. Proceedings of the SIGCHI conference on human factors in computing systems, pp. 223–230.Google Scholar
  25. 25.
    Perkins, C., & Johnson, D. Route optimization in mobile IP Internet Draft: 09/06/2001. http://www.ietf.org/internet-drafts/draft-ietf-mobileip-optim-11.txt (work in progress).
  26. 26.
    (2001). IEEE, standards for local and metropolitan area networks: Standard for port based network access control. IEEE Draft P802.1X/D11.Google Scholar
  27. 27.
    (2002). IEEE. Recommended practice for multi-vendor access point interoperability via an inter-access point protocol across distribution systems supporting IEEE 802.11 Operation. IEEE Draft 802.1f/D3, Jan 2002.Google Scholar
  28. 28.
    Cornall, T., Pentland, B., & Khee, P. (2002). Improved handover performance in wireless mobile IPv6. In Communication Systems, 2002. ICCS 2002. The 8th international conference on, vol. 2, pp. 857–861, Nov 2002.Google Scholar
  29. 29.
    Al-Bin-Ali, F. K., Boddupalli, P., & Davies, N. (2003). An inter-access point handoff mechanism for wireless network management: The Sabino system. In ICNN 2003.Google Scholar
  30. 30.
    Mishra, A., Shin, M., & Arbaugh, W. (2003). An Empirical Analysis of the IEEE 802.11 MAC Layer Handoff Process. SIGCOM Computer Communication Review, 33(2), 93–102.CrossRefGoogle Scholar
  31. 31.
    Lee, J. et al. (2004). Analysis of handoff delay for mobile IPv6. IEEE Communications Letter 4, 2967–2969.Google Scholar
  32. 32.
    Fikouras, N. A., & Görg, C. (2001). Performance comparison of hinted- and advertisement-based movement detection methods for mobile IP hand-offs. Computer Networks 37(1), 55–62.CrossRefGoogle Scholar
  33. 33.
    Liebsch, M., Singh, A., & Chaskar, H., Funato, D. (2003). Candidate access router discovery. draft-ietf-seamoby-card-protocol-01.txt. work in progress.Google Scholar
  34. 34.
    Koodli, R. (2005) Fast handovers for mobile IPv6. Internet Engineering Task Force (IETF), Request for Comments (RFC) 4068.Google Scholar
  35. 35.
    Montavont, J., & Noel, T. (2006). IEEE 802.11 handovers assisted by GPS information. IEEE international conference on wireless and mobile computing, networking and communications (WiMob ’06) pp. 166–172.Google Scholar
  36. 36.
    Bahety, V., & Pendse, R. (2004). Scalable QoS provisioning for mobile networks using wireless sensors. IEEE Wireless Communications and Networking Conference (WCNC ’04) 3, 1528–1533.Google Scholar
  37. 37.
    Rappaport, T. (2002). Wireless communications: Principles and practice. Englewood Cliffs, NJ: Prentice Hall.Google Scholar
  38. 38.
  39. 39.
    ISO/IEC 18000-6:2003(E). (2003). Part 6: Parameters for air interface communications at 860–960 MHz.Google Scholar
  40. 40.
    Klair, D., Chin, K. W., & Raad, R. (2009). On the energy concuption of Pure and Slotted Aloha based RFID anti-collision protocols. Computer Communications, 32, 961-973.CrossRefGoogle Scholar
  41. 41.
    Caffery, J. J. Jr. (2000). A new approach to the geometry of TOA location. Proceedings of the 52nd IEEE vehicular technology conference (IEEE VTS-Fall VTC ’00), Vol. 4, pp. 1943–1949.Google Scholar
  42. 42.
    Camp, T., Boleng, J., & Davies, V. (2002). A survey of mobility models for Ad Hoc network research. Wireless Communications and Mobile Computing 2(5), 483–502.CrossRefGoogle Scholar
  43. 43.
    Schwartz, M. (1988). Telecommunication networks protocols modeling and analysis. USA: Addison-Wesley.Google Scholar
  44. 44.
    Kleinrock, L., & Lam, S. (1973). Packet-switching in a slotted satellite channel. AFIPS Conference Proceedings, pp. 703–710.Google Scholar
  45. 45.
    Papapostolou, A., & Chaouchi, H. (2011). RFID-assisted indoor localization and the impact of interference on its performance. Journal of Network and Computer Applications 34(3), 902–913.CrossRefGoogle Scholar
  46. 46.
  47. 47.
    Burdet, L. A. (2004). RFID multiple access methods, Technical Report ETH Zurich.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2012

Authors and Affiliations

  1. 1.LOR Department Telecom SudparisCNRS SAMOVAR, UMR 5157EvryFrance

Personalised recommendations