{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:37:04Z","timestamp":1750307824315,"version":"3.41.0"},"reference-count":40,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0519817CNS-0519734"],"award-info":[{"award-number":["CNS-0519817CNS-0519734"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGMOBILE Mob. Comput. Commun. Rev."],"published-print":{"date-parts":[[2008,1]]},"abstract":"<jats:p>In this article, we outline a research agenda for developing protocols and algorithms for densely populated RFID based systems covering a wide geographic area. This will need multiple readers collaborating to read RFID tag data. We consider cases where the tag data is used for identification, or for sensing environmental parameters. We address performance issues related to 'accuracy' and 'efficiency' in such systems by exploiting 'diversity' and 'redundancy'. We discuss how tag multiplicity can be used to improve accuracy. In a similar fashion, we explore how reader diversity, achieved by using multiple readers with potentially partially overlapping coverage areas, can be exploited to improve accuracy and efficiency. Finally, we show how multiple antennas in a reader can be used to improve accuracy and access rates by utilizing antenna diversity. RFID tag\/sensor data can be highly redundant for the purpose of answering a higher level query. For example, often the higher level query needs to compute a statistic or a function on the sensory data obtained by the RFID sensors, and does not need all the individual sensor readings. We outline the need for efficient tag-to-reader communication, and reader-to-reader coordination to effectively compute such functions with low overhead.<\/jats:p>","DOI":"10.1145\/1374512.1374514","type":"journal-article","created":{"date-parts":[[2008,5,28]],"date-time":"2008-05-28T12:21:21Z","timestamp":1211977281000},"page":"2-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["RFID-based networks"],"prefix":"10.1145","volume":"12","author":[{"given":"Nitin","family":"Vaidya","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL"}]},{"given":"Samir R.","family":"Das","sequence":"additional","affiliation":[{"name":"Stony Brook University, Stony Brook, NY"}]}],"member":"320","published-online":{"date-parts":[[2008,1]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"EPC Global","author":"EPC","year":"2005","unstructured":"EPC radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 MHz - 960 MHz version 1.0.9. Technical report , EPC Global , January 2005 . EPC radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 MHz - 960 MHz version 1.0.9. Technical report, EPC Global, January 2005."},{"key":"e_1_2_1_2_1","volume-title":"Distributed Computing: Fundamentals, Simulations and Advanced Topics","author":"Attiya H.","year":"1998","unstructured":"H. Attiya and J. L. Welch . Distributed Computing: Fundamentals, Simulations and Advanced Topics . McGraw-Hill , London, UK , 1998 . H. Attiya and J. L. Welch. Distributed Computing: Fundamentals, Simulations and Advanced Topics. McGraw-Hill, London, UK, 1998."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832252"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2005.1557073"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.759318"},{"key":"e_1_2_1_6_1","volume-title":"October","author":"Federal Communications Commission","year":"2003","unstructured":"Federal Communications Commission . Part 15 - radio frequency devices , October 2003 . Available from http:\/\/www.fcc.gov\/oet\/info\/rules\/. Federal Communications Commission. Part 15 - radio frequency devices, October 2003. Available from http:\/\/www.fcc.gov\/oet\/info\/rules\/."},{"key":"e_1_2_1_8_1","first-page":"280","volume-title":"IEEE Pacific Rim Conference","volume":"1","author":"Egea-Lopez Esteban","year":"2003","unstructured":"Esteban Egea-Lopez , Alejandro Martinez-Sala , Francisco Monzo-Sachez , and Joan Garcia-Haro . A test-bed for a wireless identification and location system for industrial items. In Communications, Computers and signal Processing . IEEE Pacific Rim Conference , volume 1 , pages 280 -- 283 , August 2003 . Esteban Egea-Lopez, Alejandro Martinez-Sala, Francisco Monzo-Sachez, and Joan Garcia-Haro. A test-bed for a wireless identification and location system for industrial items. In Communications, Computers and signal Processing. IEEE Pacific Rim Conference, volume 1, pages 280--283, August 2003."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2002.1176117"},{"key":"e_1_2_1_10_1","doi-asserted-by":"crossref","DOI":"10.1002\/0470868023","volume-title":"RFID Handbook","author":"Finkenzeller K.","year":"2003","unstructured":"K. Finkenzeller . RFID Handbook . Wiley , 2003 . K. Finkenzeller. RFID Handbook. Wiley, 2003."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.1632656"},{"key":"e_1_2_1_12_1","volume-title":"IrDA and RFID. In Masters Thesis","author":"Hallberg Josef","year":"2002","unstructured":"Josef Hallberg and Marcus Nilsson . Positioning with Bluetooth , IrDA and RFID. In Masters Thesis , 2002 . Josef Hallberg and Marcus Nilsson. Positioning with Bluetooth, IrDA and RFID. In Masters Thesis, 2002."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/PACRIM.2001.953716"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379006"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAINT-W.2006.20"},{"key":"e_1_2_1_16_1","volume-title":"MIT","author":"Ho Junius K.","year":"2003","unstructured":"Junius K. Ho . Solving the reader collision problem with a hierarchical Q-learning algorithm. Master's thesis , MIT , 2003 . Electrical Engneering and Computer Science Department. Junius K. Ho. Solving the reader collision problem with a hierarchical Q-learning algorithm. Master's thesis, MIT, 2003. Electrical Engneering and Computer Science Department."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.1998.708695"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/977394.977448"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/977394.977448"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1160987.1160997"},{"key":"e_1_2_1_21_1","volume-title":"IEEE INFOCOM","author":"Ko Young-Bae","year":"2000","unstructured":"Young-Bae Ko , Vinaychandra Shankarkumar , and Nitin H. Vaidya . Medium access control protocols using directional antennas in ad hoc networks . In IEEE INFOCOM , March 2000 . Young-Bae Ko, Vinaychandra Shankarkumar, and Nitin H. Vaidya. Medium access control protocols using directional antennas in ad hoc networks. In IEEE INFOCOM, March 2000."},{"key":"e_1_2_1_22_1","unstructured":"KSW Microtec. http:\/\/www.ksw-microtec.de.  KSW Microtec. http:\/\/www.ksw-microtec.de."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/345848.345865"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031528"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/11853565_25"},{"key":"e_1_2_1_26_1","unstructured":"S. Muthukrishnan. Data streams: Algorithms and applications. Available via: http:\/\/www.cs.rutgers.edu\/muthu\/.  S. Muthukrishnan. Data streams: Algorithms and applications. Available via: http:\/\/www.cs.rutgers.edu\/muthu\/."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:WINE.0000044029.06344.dd"},{"key":"e_1_2_1_28_1","volume-title":"Proc of ICC","author":"Nosovic W.","year":"2002","unstructured":"W. Nosovic and T. D. Todd . Scheduled rendezvous and RFID wakeup in embedded wireless networks communications . In Proc of ICC , 2002 . W. Nosovic and T. D. Todd. Scheduled rendezvous and RFID wakeup in embedded wireless networks communications. In Proc of ICC, 2002."},{"key":"e_1_2_1_29_1","volume-title":"Ad hoc on demand distance vector (AODV) routing. RFC","author":"Perkins Charles","year":"2003","unstructured":"Charles Perkins , Elizabeth Royer , and Samir R. Das . Ad hoc on demand distance vector (AODV) routing. RFC 3561, July 2003 . Charles Perkins, Elizabeth Royer, and Samir R. Das. Ad hoc on demand distance vector (AODV) routing. RFC 3561, July 2003."},{"key":"e_1_2_1_30_1","unstructured":"Phase IV Engineering Inc. http:\/\/www.phaseivengr.com.  Phase IV Engineering Inc. http:\/\/www.phaseivengr.com."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1022630.1022636"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015706.1015738"},{"key":"e_1_2_1_33_1","volume-title":"body adopts RTLS standard","author":"Journal RFID","year":"2003","unstructured":"RFID Journal . U. S. body adopts RTLS standard , 2003 . Web site at http:\/\/www.rfidjournal.com\/article\/articleview\/533\/1\/1\/. RFID Journal. U.S. body adopts RTLS standard, 2003. Web site at http:\/\/www.rfidjournal.com\/article\/articleview\/533\/1\/1\/."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:WINE.0000044028.20424.85"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1035594.1035620"},{"key":"e_1_2_1_37_1","volume-title":"First IEEE International Conference on Pervasive Computing and Communications (PerCom)","author":"Siegemund F.","year":"2003","unstructured":"F. Siegemund and C. Floerkemeier . Interaction in pervasive computing settings using bluetoothenabled active tags and passive RFID technology together with mobile phones . In First IEEE International Conference on Pervasive Computing and Communications (PerCom) , 2003 . F. Siegemund and C. Floerkemeier. Interaction in pervasive computing settings using bluetoothenabled active tags and passive RFID technology together with mobile phones. In First IEEE International Conference on Pervasive Computing and Communications (PerCom), 2003."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2003.1204562"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.1297315"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SNPA.2003.1203364"},{"key":"e_1_2_1_41_1","volume-title":"Proc of PIMRC","author":"Zhen Bin","year":"2004","unstructured":"Bin Zhen , M. Kobayashi , and M Shimizu . To read transmitter-only RFID tags with confidence . In Proc of PIMRC , 2004 . Bin Zhen, M. Kobayashi, and M Shimizu. To read transmitter-only RFID tags with confidence. In Proc of PIMRC, 2004."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1013235.1013321"}],"container-title":["ACM SIGMOBILE Mobile Computing and Communications Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1374512.1374514","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1374512.1374514","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:57:50Z","timestamp":1750255070000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1374512.1374514"}},"subtitle":["exploiting diversity and redundancy"],"short-title":[],"issued":{"date-parts":[[2008,1]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2008,1]]}},"alternative-id":["10.1145\/1374512.1374514"],"URL":"https:\/\/doi.org\/10.1145\/1374512.1374514","relation":{},"ISSN":["1559-1662","1931-1222"],"issn-type":[{"type":"print","value":"1559-1662"},{"type":"electronic","value":"1931-1222"}],"subject":[],"published":{"date-parts":[[2008,1]]},"assertion":[{"value":"2008-01-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}