Skip to main content

RFID-based Distributed Memory for Mobile Applications

  • Conference paper
  • 884 Accesses

Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST,volume 35)

Abstract

The goal of our work is to give a user equipped with an RFID-enabled mobile handset (mobile phone, PDA, laptop...) the ability to know the contents of distant passive RFID tags, without physically moving to them and without using a Wireless Area Network. The existing architectural patterns involving passive tags do not meet simultaneously all of these requirements. Our RFID-based distributed memory does. By associating vector clocks to tags, we replicate a view of this memory on each tag and each handset, and disseminate updates between all of the replicas. Thus a user can locally query the replica hold by their mobile handset without physically moving to a tag. We have developed a pervasive game as an application example. Using data collected during real game sessions, we evaluate the performance of our distributed memory. Then we discuss staleness and scalability issues. We conclude and give perspectives of our work.

Keywords

  • Distributed memory
  • RFID
  • NFC
  • Vector clocks
  • Gossip protocols
  • Pervasive application
  • Game

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-642-12607-9_12
  • Chapter length: 18 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   109.00
Price excludes VAT (USA)
  • ISBN: 978-3-642-12607-9
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   139.00
Price excludes VAT (USA)

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Armenio, F., Barthel, H., Burstein, L., Dietrich, P., Duker, J., Garrett, J., Hogan, B., Ryaboy, O., Sarma, S., Schmidt, J., Suen, K., Traub, K., Williams, J.: The EPCglobal architecture framework. Technical Report Version 1.2, GS1 EPCglobal (September 2007)

    Google Scholar 

  2. Birman, K.: The promise, and limitations, of gossip protocols. SIGOPS Oper. Syst. Rev. 41(5), 8–13 (2007)

    CrossRef  Google Scholar 

  3. CÉDRIC, L3i, Musée des arts et métiers, NET Innovations, Orange, Institut Télécom—Télécom & Management SudParis, Institut Télécom—Télécom ParisTech., and Tetraedge. PLUG: PLay Ubiquitous Games and play more (January 2009), http://cedric.cnam.fr/PLUG/

  4. Chandy, K.M., Lamport, L.: Distributed snapshots: determining global states of distributed systems. ACM Trans. Comput. Syst. 3(1), 63–75 (1985)

    CrossRef  Google Scholar 

  5. Christian, D.: 700 million of users of NFC mobiles in 5 years (September 2008) (in French), http://www.generation-nt.com/juniper-etude-technologie-nfc-mobile-utilisateurs-actualite-151831.html

  6. Couderc, P., Banâtre, M.: Beyond RFID: The Ubiquitous Near-Field Distributed Memory. ERCIM news (76), 35–36 (2009)

    Google Scholar 

  7. Demers, A., Greene, D., Hauser, C., Irish, W., Larson, J., Shenker, S., Sturgis, H., Swinehart, D., Terry, D.: Epidemic algorithms for replicated database maintenance. In: PODC 1987: Proceedings of the sixth annual ACM Symposium on Principles of distributed computing, pp. 1–12. ACM, New York (1987)

    CrossRef  Google Scholar 

  8. Fidge, C.J.: Timestamps in message-passing systems that preserve the partial ordering. In: Raymond, K. (ed.) Proc. of the 11th Australian Computer Science Conference (ACSC 1988), February 1988, pp. 56–66 (1988)

    Google Scholar 

  9. Gentes, A., Jutant, C., Guyot, A., Simatic, M.: RFID technology: Fostering human interactions. In: Blashki, K. (ed.) Proceedings of IADIS International Conference Game and Entertainment Technologies 2009, International Association for Development of the Information Society (IADIS), June 2009, pp. 67–74. IADIS Press (2009)

    Google Scholar 

  10. Ghellal, S., Holopainen, J., Honkakorpi, M., Waern, A.: Deliverable D4.7: Final business guidelines. Technical Report D4.7, Integrated Project on Pervasive Gaming (IPerG) (April 2008)

    Google Scholar 

  11. Golding, R.A.: Weak-consistency group communication and membership. PhD thesis, University of California Santa Cruz (December 1992)

    Google Scholar 

  12. Haselsteiner, E., Breitfuß, K.: Security in near field communication (NFC). In: Printed handout of Workshop on RFID Security RFIDSec 2006 (July 2006)

    Google Scholar 

  13. ITR Manager.com. City of Paris is taking care of its trees with RFID tags (December 2006) (in French), http://www.itrmanager.com/articles/59758/59758.html

  14. Juang, P., Oki, H., Wang, Y., Martonosi, M., Peh, L.S., Rubenstein, D.: Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with zebranet. In: ASPLOS-X: Proceedings of the 10th international conference on Architectural support for programming languages and operating systems, pp. 96–107. ACM, New York (2002)

    Google Scholar 

  15. Mattern, F.: Virtual time and global states of distributed systems. In: Proc. Workshop on Parallel and Distributed Algorithms, Chateau de Bonas, France, pp. 215–226. Elsevier, Amsterdam (1988)

    Google Scholar 

  16. Roussos, G., Kostakos, V.: RFID in pervasive computing: State-of-the-art and outlook. Pervasive Mob. Comput. 5(1), 110–131 (2009)

    CrossRef  Google Scholar 

  17. Saito, Y., Shapiro, M.: Optimistic replication. ACM Comput. Surv. 37(1), 42–81 (2005)

    CrossRef  MATH  Google Scholar 

  18. Simatic, M., Astic, I., Aunis, C., Gentes, A., Guyot-Mbodji, A., Jutant, C., Zaza, E.: “Plug: Secrets of the Museum”: A pervasive game taking place in a museum. In: Natkin, S., Dupire, J. (eds.) Entertainment Computing – ICEC 2009. LNCS, vol. 5709, pp. 302–303. Springer, Heidelberg (2009)

    CrossRef  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Simatic, M. (2010). RFID-based Distributed Memory for Mobile Applications. In: Phan, T., Montanari, R., Zerfos, P. (eds) Mobile Computing, Applications, and Services. MobiCASE 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 35. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12607-9_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-12607-9_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-12606-2

  • Online ISBN: 978-3-642-12607-9

  • eBook Packages: Computer ScienceComputer Science (R0)