Abstract
The goal of our work is to give a user equipped with an RFID-enabled mobile handset (mobile phone, PDA, laptop...) the ability to know the contents of distant passive RFID tags, without physically moving to them and without using a Wireless Area Network. The existing architectural patterns involving passive tags do not meet simultaneously all of these requirements. Our RFID-based distributed memory does. By associating vector clocks to tags, we replicate a view of this memory on each tag and each handset, and disseminate updates between all of the replicas. Thus a user can locally query the replica hold by their mobile handset without physically moving to a tag. We have developed a pervasive game as an application example. Using data collected during real game sessions, we evaluate the performance of our distributed memory. Then we discuss staleness and scalability issues. We conclude and give perspectives of our work.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Armenio, F., Barthel, H., Burstein, L., Dietrich, P., Duker, J., Garrett, J., Hogan, B., Ryaboy, O., Sarma, S., Schmidt, J., Suen, K., Traub, K., Williams, J.: The EPCglobal architecture framework. Technical Report Version 1.2, GS1 EPCglobal (September 2007)
Birman, K.: The promise, and limitations, of gossip protocols. SIGOPS Oper. Syst. Rev. 41(5), 8–13 (2007)
CÉDRIC, L3i, Musée des arts et métiers, NET Innovations, Orange, Institut Télécom—Télécom & Management SudParis, Institut Télécom—Télécom ParisTech., and Tetraedge. PLUG: PLay Ubiquitous Games and play more (January 2009), http://cedric.cnam.fr/PLUG/
Chandy, K.M., Lamport, L.: Distributed snapshots: determining global states of distributed systems. ACM Trans. Comput. Syst. 3(1), 63–75 (1985)
Christian, D.: 700 million of users of NFC mobiles in 5 years (September 2008) (in French), http://www.generation-nt.com/juniper-etude-technologie-nfc-mobile-utilisateurs-actualite-151831.html
Couderc, P., Banâtre, M.: Beyond RFID: The Ubiquitous Near-Field Distributed Memory. ERCIM news (76), 35–36 (2009)
Demers, A., Greene, D., Hauser, C., Irish, W., Larson, J., Shenker, S., Sturgis, H., Swinehart, D., Terry, D.: Epidemic algorithms for replicated database maintenance. In: PODC 1987: Proceedings of the sixth annual ACM Symposium on Principles of distributed computing, pp. 1–12. ACM, New York (1987)
Fidge, C.J.: Timestamps in message-passing systems that preserve the partial ordering. In: Raymond, K. (ed.) Proc. of the 11th Australian Computer Science Conference (ACSC 1988), February 1988, pp. 56–66 (1988)
Gentes, A., Jutant, C., Guyot, A., Simatic, M.: RFID technology: Fostering human interactions. In: Blashki, K. (ed.) Proceedings of IADIS International Conference Game and Entertainment Technologies 2009, International Association for Development of the Information Society (IADIS), June 2009, pp. 67–74. IADIS Press (2009)
Ghellal, S., Holopainen, J., Honkakorpi, M., Waern, A.: Deliverable D4.7: Final business guidelines. Technical Report D4.7, Integrated Project on Pervasive Gaming (IPerG) (April 2008)
Golding, R.A.: Weak-consistency group communication and membership. PhD thesis, University of California Santa Cruz (December 1992)
Haselsteiner, E., Breitfuß, K.: Security in near field communication (NFC). In: Printed handout of Workshop on RFID Security RFIDSec 2006 (July 2006)
ITR Manager.com. City of Paris is taking care of its trees with RFID tags (December 2006) (in French), http://www.itrmanager.com/articles/59758/59758.html
Juang, P., Oki, H., Wang, Y., Martonosi, M., Peh, L.S., Rubenstein, D.: Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with zebranet. In: ASPLOS-X: Proceedings of the 10th international conference on Architectural support for programming languages and operating systems, pp. 96–107. ACM, New York (2002)
Mattern, F.: Virtual time and global states of distributed systems. In: Proc. Workshop on Parallel and Distributed Algorithms, Chateau de Bonas, France, pp. 215–226. Elsevier, Amsterdam (1988)
Roussos, G., Kostakos, V.: RFID in pervasive computing: State-of-the-art and outlook. Pervasive Mob. Comput. 5(1), 110–131 (2009)
Saito, Y., Shapiro, M.: Optimistic replication. ACM Comput. Surv. 37(1), 42–81 (2005)
Simatic, M., Astic, I., Aunis, C., Gentes, A., Guyot-Mbodji, A., Jutant, C., Zaza, E.: “Plug: Secrets of the Museum”: A pervasive game taking place in a museum. In: Natkin, S., Dupire, J. (eds.) Entertainment Computing – ICEC 2009. LNCS, vol. 5709, pp. 302–303. Springer, Heidelberg (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Simatic, M. (2010). RFID-based Distributed Memory for Mobile Applications. In: Phan, T., Montanari, R., Zerfos, P. (eds) Mobile Computing, Applications, and Services. MobiCASE 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 35. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12607-9_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-12607-9_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-12606-2
Online ISBN: 978-3-642-12607-9
eBook Packages: Computer ScienceComputer Science (R0)