Abstract
We present the implementation and evaluation of the Gen 2 anti-collision protocol on the Intel-UW WISP. Because WISPs are wirelessly powered and highly energy constrained, appropriate MAC protocols are an open challenge. The previous approach to medium access on the WISP was to transmit data at every opportunity. This strategy consumes very little energy per data transmission, and works well when only one WISP is active at a time. However, when many tags are present and attempting to transmit simultaneously, their transmissions collide and no WISP can communicate with the reader. The Gen 2 RFID standard speci?es an anti-collision mechanism where tags randomize their transmissions across a number of slots, though this approach has been considered too energy intensive for use on the WISP. Through experimentation with a deployment of WISPs, we show that our Gen 2 MAC implementation allows all tags to communicate at a high rate, generally achieving better than 10 responses per second when close to a reader. This is in contrast to WISPs using the prior MAC approach where no tag can respond to the reader more than once per second in the same scenario. We additionally show that even for a single tag, the use of slotting does not degrade performance. This means that the full Gen 2 MAC is appropriate for use on the WISP, as it enables tags to communicate effectively in deployments consisting of one or many tags.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
M. Buettner et al. Revisiting smart dust with RFID sensor networks. In HotNets, 2008.
M. Buettner et al. Recognizing daily activities with RFID-based sensors. In Ubicomp, 2009.
H. J. Chae et al. Maximalist cryptography and computation on the WISP UHF RFID tag. In Proc. RFID Security, 2007.
A. Czeskis et al. RFIDs and secret handshakes: Defending against ghost-and-leech attacks and unauthorized reads with context-aware communications. In CCS, 2008.
EPCglobal. EPC radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 mhz–960 mhz version 1.0.9. 2005.
D. Halperin et al. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In IEEE Symposium on Security and Privacy, 2008.
D. E. Holcomb et al. Initial sram state as a fingerprint and source of true random numbers for RFID tags. In Proc. RFID Security, 2007.
L. G. Roberts. Aloha packet system with and without slots and capture. SIGCOMM Comput. Commun. Rev., 5(2):28–42, 1975.
M. Salajegheh et al. CCCP: Secure remote storage for computational RFIDs. In Proc. of USENIX Security, 2009.
A. P. Sample et al. Design of an RFID-based battery-free programmable sensing platform. In IEEE Transactions on Instrumentation and Measurement, 2008.
Texas instruments application notes: Random number generation using the msp430. 2006.
B. Warneke, M. Last, B. Liebowitz, and K. S. Pister. Smart dust: Communicating with a cubic-millimeter computer. Computer, 34:44–51, 2001.
D. Yeager, R. Prasad, D. Wetherall, P. Powledge, and J. Smith. Wirelessly-charged UHF tags for sensor data collection. In Proc. IEEE RFID, 2008.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this chapter
Cite this chapter
Buettner, M., Wetherall, D. (2013). Implementing the Gen 2 MAC on the Intel-UW WISP. In: Smith, J. (eds) Wirelessly Powered Sensor Networks and Computational RFID. Springer, New York, NY. https://doi.org/10.1007/978-1-4419-6166-2_8
Download citation
DOI: https://doi.org/10.1007/978-1-4419-6166-2_8
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4419-6165-5
Online ISBN: 978-1-4419-6166-2
eBook Packages: EngineeringEngineering (R0)