Skip to main content

RFID-based Distributed Memory for Mobile Applications

  • Conference paper
  • 937 Accesses

Abstract

The goal of our work is to give a user equipped with an RFID-enabled mobile handset (mobile phone, PDA, laptop...) the ability to know the contents of distant passive RFID tags, without physically moving to them and without using a Wireless Area Network. The existing architectural patterns involving passive tags do not meet simultaneously all of these requirements. Our RFID-based distributed memory does. By associating vector clocks to tags, we replicate a view of this memory on each tag and each handset, and disseminate updates between all of the replicas. Thus a user can locally query the replica hold by their mobile handset without physically moving to a tag. We have developed a pervasive game as an application example. Using data collected during real game sessions, we evaluate the performance of our distributed memory. Then we discuss staleness and scalability issues. We conclude and give perspectives of our work.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Armenio, F., Barthel, H., Burstein, L., Dietrich, P., Duker, J., Garrett, J., Hogan, B., Ryaboy, O., Sarma, S., Schmidt, J., Suen, K., Traub, K., Williams, J.: The EPCglobal architecture framework. Technical Report Version 1.2, GS1 EPCglobal (September 2007)

    Google Scholar 

  2. Birman, K.: The promise, and limitations, of gossip protocols. SIGOPS Oper. Syst. Rev. 41(5), 8–13 (2007)

    Article  Google Scholar 

  3. CÉDRIC, L3i, Musée des arts et métiers, NET Innovations, Orange, Institut Télécom—Télécom & Management SudParis, Institut Télécom—Télécom ParisTech., and Tetraedge. PLUG: PLay Ubiquitous Games and play more (January 2009), http://cedric.cnam.fr/PLUG/

  4. Chandy, K.M., Lamport, L.: Distributed snapshots: determining global states of distributed systems. ACM Trans. Comput. Syst. 3(1), 63–75 (1985)

    Article  Google Scholar 

  5. Christian, D.: 700 million of users of NFC mobiles in 5 years (September 2008) (in French), http://www.generation-nt.com/juniper-etude-technologie-nfc-mobile-utilisateurs-actualite-151831.html

  6. Couderc, P., Banâtre, M.: Beyond RFID: The Ubiquitous Near-Field Distributed Memory. ERCIM news (76), 35–36 (2009)

    Google Scholar 

  7. Demers, A., Greene, D., Hauser, C., Irish, W., Larson, J., Shenker, S., Sturgis, H., Swinehart, D., Terry, D.: Epidemic algorithms for replicated database maintenance. In: PODC 1987: Proceedings of the sixth annual ACM Symposium on Principles of distributed computing, pp. 1–12. ACM, New York (1987)

    Chapter  Google Scholar 

  8. Fidge, C.J.: Timestamps in message-passing systems that preserve the partial ordering. In: Raymond, K. (ed.) Proc. of the 11th Australian Computer Science Conference (ACSC 1988), February 1988, pp. 56–66 (1988)

    Google Scholar 

  9. Gentes, A., Jutant, C., Guyot, A., Simatic, M.: RFID technology: Fostering human interactions. In: Blashki, K. (ed.) Proceedings of IADIS International Conference Game and Entertainment Technologies 2009, International Association for Development of the Information Society (IADIS), June 2009, pp. 67–74. IADIS Press (2009)

    Google Scholar 

  10. Ghellal, S., Holopainen, J., Honkakorpi, M., Waern, A.: Deliverable D4.7: Final business guidelines. Technical Report D4.7, Integrated Project on Pervasive Gaming (IPerG) (April 2008)

    Google Scholar 

  11. Golding, R.A.: Weak-consistency group communication and membership. PhD thesis, University of California Santa Cruz (December 1992)

    Google Scholar 

  12. Haselsteiner, E., Breitfuß, K.: Security in near field communication (NFC). In: Printed handout of Workshop on RFID Security RFIDSec 2006 (July 2006)

    Google Scholar 

  13. ITR Manager.com. City of Paris is taking care of its trees with RFID tags (December 2006) (in French), http://www.itrmanager.com/articles/59758/59758.html

  14. Juang, P., Oki, H., Wang, Y., Martonosi, M., Peh, L.S., Rubenstein, D.: Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with zebranet. In: ASPLOS-X: Proceedings of the 10th international conference on Architectural support for programming languages and operating systems, pp. 96–107. ACM, New York (2002)

    Google Scholar 

  15. Mattern, F.: Virtual time and global states of distributed systems. In: Proc. Workshop on Parallel and Distributed Algorithms, Chateau de Bonas, France, pp. 215–226. Elsevier, Amsterdam (1988)

    Google Scholar 

  16. Roussos, G., Kostakos, V.: RFID in pervasive computing: State-of-the-art and outlook. Pervasive Mob. Comput. 5(1), 110–131 (2009)

    Article  Google Scholar 

  17. Saito, Y., Shapiro, M.: Optimistic replication. ACM Comput. Surv. 37(1), 42–81 (2005)

    Article  MATH  Google Scholar 

  18. Simatic, M., Astic, I., Aunis, C., Gentes, A., Guyot-Mbodji, A., Jutant, C., Zaza, E.: “Plug: Secrets of the Museum”: A pervasive game taking place in a museum. In: Natkin, S., Dupire, J. (eds.) Entertainment Computing – ICEC 2009. LNCS, vol. 5709, pp. 302–303. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Simatic, M. (2010). RFID-based Distributed Memory for Mobile Applications. In: Phan, T., Montanari, R., Zerfos, P. (eds) Mobile Computing, Applications, and Services. MobiCASE 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 35. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12607-9_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-12607-9_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-12606-2

  • Online ISBN: 978-3-642-12607-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics