An Approach to Filtering Duplicate RFID Data Streams

  • Hairulnizam Mahdin
  • Jemal Abawajy
Part of the Communications in Computer and Information Science book series (CCIS, volume 124)


In a system where distributed network of Radio Frequency Identification (RFID) readers are used to collaboratively collect data from tagged objects, a scheme that detects and eliminates redundant data streams is required. To address this problem, we propose an approach that is based on Bloom filter to detect duplicate readings and filter redundant RFID data streams. We have evaluated the performance of the proposed approach and compared it with existing approaches. The experimental results demonstrate that the proposed approach provides superior performance as compared to the baseline approaches.


Data Stream Hash Function Reading Count Building Information Modelling Bloom Filter 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Pupunwiwat, P., Bela, S.: Location Filtering and Duplication Elimination for RFID Data Streams. In: International Journal of Principles and Applications of Information Science and Technology, vol. 1(1) (December 2007)Google Scholar
  2. 2.
    Leong, K.S., Ng, M.L., Grasso, A.R., Cole, P.H.: Synchronization of RFID readers for dense RFID reader environments. In: Proceedings of the 2006 International Symposium on Applications and the Internet Workshops (SAINT 2006), pp. 48–51 (2006)Google Scholar
  3. 3.
    Martinez-Sala, A.S., Egea-Lopez, E., Garcia-Sanchez, F., Garcia-Haro, J.: Tracking of Returnable Packaging and Transport Units with active RFID in the grocery supply chain. Computers in Industry 60(3), 161–171 (2009)CrossRefGoogle Scholar
  4. 4.
    Ko, C.-H.: RFID 3D location sensing algorithms. Automation in Construction. Building Information Modelling and Collaborative Working Environments 19(5), 588–595 (2010)Google Scholar
  5. 5.
    Derakhshan, R., Orlowska, M., Li, X.: RFID Data Management: Challenges and Opportunities. In: IEEE International Conference on RFID, pp. 175–182 (2007)Google Scholar
  6. 6.
    Bloom, B.: Space/time tradeoffs in hash coding with allowable errors. Commun. ACM 13(7), 422–426 (1970)CrossRefzbMATHGoogle Scholar
  7. 7.
    Bai, Y., Wang, F., Liu, P.: Efficiently Filtering RFID Data Streams. In: CleanDB Workshop, pp. 50–57 (2006)Google Scholar
  8. 8.
    Wang, X., Zhang, Q., Jia, Y.: Efficiently Filtering Duplicates over Distributed Data Streams. In: International Conference on Computer Science and Software Engineering, Wuhan, Hubei, pp. 631–634 (2008)Google Scholar
  9. 9.
    Jeffery, S.R., Alonso, G., Franklin, M.J., Hong, W., Widom, J.: A Pipelined Framework for Online Cleaning of Sensor Data Streams. In: Proceedings of the 22nd International Conference on Data Engineering (ICDE 2006), p. 140 (2006)Google Scholar
  10. 10.
    Rao, J., Doraiswamy, S., Thakkar, H., Colby, L.S.: A Deferred Cleansing Method For RFID Data Analytics. In: Int. Conf. on Very Large DataBases (VLDB 2006), pp. 175–186 (2006)Google Scholar
  11. 11.
    Gonzalez, H., Han, J., Li, X., Klabjan, D.: Warehousing and analysing massive RFID data sets. In: Proc. of the International Conference on Data Engineering (ICDE 2006), pp. 1–10 (2006)Google Scholar
  12. 12.
    Song, J., Hass, C.T., Caldas, C.H.: A Proximity-Based Method for Locating RFID Tagged Objects. Adv. Eng. Inform 21, 367–376 (2007)CrossRefGoogle Scholar
  13. 13.
    Shen, H., Zhang, Y.: Improved approximate detection of duplicates for data streams over sliding windows. Journal Of Computer Science And Technology 23(6), 973–987 (2008)CrossRefGoogle Scholar
  14. 14.
    Mahdin, H., Abawajy, J.: An Approach to Filtering RFID Data Streams. In: 10th International Symposium on Pervasive Systems, Algorithms, and Networks, pp. 742–746 (2009)Google Scholar
  15. 15.
    Fan, L., Cao, P., Almeida, J.: Broder A Z. Summary cache: A Scalable Wide-Area Web Cache Sharing Protocol. IEEE/ACM Trans. Networking 8(3), 281–293 (2000)CrossRefGoogle Scholar
  16. 16.
    Jeffery, S.R., Garofalakis, M., Franklin, M.J.: Adaptive cleaning for RFID data streams. In: Proceedings of the 32nd International Conference on Very Large Databases, pp. 163–174 (2006)Google Scholar
  17. 17.
    Chen, W.-T.: An accurate tag estimate method for improving the performance of an RFID anticollision algorithm based on dynamic frame length ALOHA. In: Chen, W.-T. (ed.) IEICE Trans. on Automatic Science and Engineering, pp. 9–15 (2009)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Hairulnizam Mahdin
    • 1
  • Jemal Abawajy
    • 2
  1. 1.Faculty of Comp. Sc. & Info. TechUniversity of Tun Hussein Onn MalaysiaJohorMalaysia
  2. 2.School of Information TechnologyDeakin UniversityVictoriaAustralia

Personalised recommendations