Skip to main content

Implementing the Gen 2 MAC on the Intel-UW WISP

  • Chapter
  • First Online:
Wirelessly Powered Sensor Networks and Computational RFID

Abstract

We present the implementation and evaluation of the Gen 2 anti-collision protocol on the Intel-UW WISP. Because WISPs are wirelessly powered and highly energy constrained, appropriate MAC protocols are an open challenge. The previous approach to medium access on the WISP was to transmit data at every opportunity. This strategy consumes very little energy per data transmission, and works well when only one WISP is active at a time. However, when many tags are present and attempting to transmit simultaneously, their transmissions collide and no WISP can communicate with the reader. The Gen 2 RFID standard speci?es an anti-collision mechanism where tags randomize their transmissions across a number of slots, though this approach has been considered too energy intensive for use on the WISP. Through experimentation with a deployment of WISPs, we show that our Gen 2 MAC implementation allows all tags to communicate at a high rate, generally achieving better than 10 responses per second when close to a reader. This is in contrast to WISPs using the prior MAC approach where no tag can respond to the reader more than once per second in the same scenario. We additionally show that even for a single tag, the use of slotting does not degrade performance. This means that the full Gen 2 MAC is appropriate for use on the WISP, as it enables tags to communicate effectively in deployments consisting of one or many tags.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. M. Buettner et al. Revisiting smart dust with RFID sensor networks. In HotNets, 2008.

    Google Scholar 

  2. M. Buettner et al. Recognizing daily activities with RFID-based sensors. In Ubicomp, 2009.

    Google Scholar 

  3. H. J. Chae et al. Maximalist cryptography and computation on the WISP UHF RFID tag. In Proc. RFID Security, 2007.

    Google Scholar 

  4. A. Czeskis et al. RFIDs and secret handshakes: Defending against ghost-and-leech attacks and unauthorized reads with context-aware communications. In CCS, 2008.

    Google Scholar 

  5. EPCglobal. EPC radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 mhz–960 mhz version 1.0.9. 2005.

    Google Scholar 

  6. D. Halperin et al. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In IEEE Symposium on Security and Privacy, 2008.

    Google Scholar 

  7. D. E. Holcomb et al. Initial sram state as a fingerprint and source of true random numbers for RFID tags. In Proc. RFID Security, 2007.

    Google Scholar 

  8. L. G. Roberts. Aloha packet system with and without slots and capture. SIGCOMM Comput. Commun. Rev., 5(2):28–42, 1975.

    Article  Google Scholar 

  9. M. Salajegheh et al. CCCP: Secure remote storage for computational RFIDs. In Proc. of USENIX Security, 2009.

    Google Scholar 

  10. A. P. Sample et al. Design of an RFID-based battery-free programmable sensing platform. In IEEE Transactions on Instrumentation and Measurement, 2008.

    Google Scholar 

  11. Texas instruments application notes: Random number generation using the msp430. 2006.

    Google Scholar 

  12. B. Warneke, M. Last, B. Liebowitz, and K. S. Pister. Smart dust: Communicating with a cubic-millimeter computer. Computer, 34:44–51, 2001.

    Article  Google Scholar 

  13. D. Yeager, R. Prasad, D. Wetherall, P. Powledge, and J. Smith. Wirelessly-charged UHF tags for sensor data collection. In Proc. IEEE RFID, 2008.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michael Buettner .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this chapter

Cite this chapter

Buettner, M., Wetherall, D. (2013). Implementing the Gen 2 MAC on the Intel-UW WISP. In: Smith, J. (eds) Wirelessly Powered Sensor Networks and Computational RFID. Springer, New York, NY. https://doi.org/10.1007/978-1-4419-6166-2_8

Download citation

  • DOI: https://doi.org/10.1007/978-1-4419-6166-2_8

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4419-6165-5

  • Online ISBN: 978-1-4419-6166-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics