The RFID Ecosystem Project



Similar documents
Building the Internet of Things Using RFID

Physical Access Control for Captured RFID Data

Middleware support for the Internet of Things

Military Usage of Passive RFID 1

An Intelligent Middleware Platform and Framework for RFID Reverse Logistics

CSE 544 Principles of Database Management Systems. Magdalena Balazinska (magda) Fall 2007 Lecture 1 - Class Introduction

Enterprise RTLS Data Capture and Analysis

Wireless Particle Monitoring of Pharmaceutical Cleanrooms

Overview to the Cisco Mobility Services Architecture

Architectural Considerations for Distributed RFID Tracking and Monitoring. Department of Computer Science Univeristy of Massachusetts Amherst

Cloud Cruiser and Azure Public Rate Card API Integration

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1. Network Security. Canada France Meeting on Security, Dec 06-08

Redundant Data Removal Technique for Efficient Big Data Search Processing

TT-RFID platform - Introduction

CSE 544 Principles of Database Management Systems. Magdalena Balazinska (magda) Spring 2006 Lecture 1 - Class Introduction

RFID. Radio Frequency IDentification: Concepts, Application Domains and Implementation LOGO SPEAKER S COMPANY

Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things

A Meeting Detector and its Applications

Data Cleansing for Remote Battery System Monitoring

How To Spread Pheromone In An Rfid Tag

Dr. Alexander Zeier Director Strategic Projects SAP AG 14. Juli 2005, TU Dresden

Data-Intensive Programming. Timo Aaltonen Department of Pervasive Computing

Uncertain Data Management for Sensor Networks

BIG Data Analytics Move to Competitive Advantage

10/21/10. Formatvorlage des Untertitelmasters durch Klicken bearbeiten

Design and Implementation of an Integrated Contextual Data Management Platform for Context-Aware Applications

Software Requirements Specification. Schlumberger Scheduling Assistant. for. Version 0.2. Prepared by Design Team A. Rice University COMP410/539

Sustainable Development with Geospatial Information Leveraging the Data and Technology Revolution

Healthcare versus Biochemical Industries

Using Hybrid RFID for Improved Asset Tracking

entigral whitepaper Understanding RFID and Barcode Differences

A Demonstration of a Robust Context Classification System (CCS) and its Context ToolChain (CTC)

Introduction of Information Security Research Division

ENZO UNIFIED SOLVES THE CHALLENGES OF REAL-TIME DATA INTEGRATION

BENCHMARKING CLOUD DATABASES CASE STUDY on HBASE, HADOOP and CASSANDRA USING YCSB

Replicating to everything

CHAPTER 6 A NOVEL ARCHITECTURE FOR NETWORK-CODED ELECTRONIC HEALTH RECORD STORAGE SYSTEM

TRIAX- D. Consulting services to accelerate your supply chain automation outcomes. The resourceful services of Logi-D

Towards a Transparent Proactive User Interface for a Shopping Assistant

How To Understand The Power Of An Freddi Tag (Rfid) System

! E6893 Big Data Analytics Lecture 9:! Linked Big Data Graph Computing (I)

ACTIVITY THEORY (AT) REVIEW

mysensors mysensors Wireless Sensors and and Cellular Gateway Quick Start Guide Information to Users Inside the Box

Security and Privacy in RFID

Pramari Customer Base

Design of a Web-based Application for Wireless Sensor Networks

RFID Applications in the Healthcare and Pharmaceutical Industries

Hvor går RFID forskning og utvikling?

SAP HANA SPS 09 - What s New? Administration & Monitoring

A New Era Of Analytic

How Location Intelligence drives value in next-generation customer loyalty programs in Retail business

Dementia Ambient Care: Multi-Sensing Monitoring for Intelligent Remote Management and Decision Support

Industrial Track and Trace: Choosing the Technology that Measures Up to Your Application Demands A WHITE PAPER

BIG DATA HANDS-ON WORKSHOP Data Manipulation with Hive and Pig

Building Real-Time Analytics Apps with HANA

Decoding CAMS: Cloud, Analytics, Mobile, & Social Technologies: A Discussion of the Implications for Enterprises and their Providers

Implementing high-level Counterfeit Security using RFID and PKI

A Development of a Reliable and Trusted Mobile RFID-based Asset Management System using Android Apps

Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems. Christopher Roblee Vincent Berk George Cybenko

Unified Asset Visibility Solutions for Healthcare

Radio Frequency Identification (RFID) An Overview

The ROI for Automatic IT Asset Inventory, Location and Protection Using RFID. A Case Study Analysis based on U.S. Department of Defense

CHAPTER 1 Introduction 1

An RFID Agricultural Product and Food Security Tracking System Using GPS and Wireless Technologies

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

Leading precision components manufacturer adopts a RFID-enabled EMPLOYEE TRACKING SYSTEM

The Internet of Things and Big Data: Intro

Ching-Yung Lin, Ph.D. Adjunct Professor, Dept. of Electrical Engineering and Computer Science IBM Chief Scientist, Graph Computing. October 29th, 2015

Cosmos. Big Data and Big Challenges. Pat Helland July 2011

AccelOps NOC and SOC Analytics in a Single Pane of Glass Date: March 2016 Author: Tony Palmer, Senior ESG Lab Analyst

NIST Big Data PWG & RDA Big Data Infrastructure WG: Implementation Strategy: Best Practice Guideline for Big Data Application Development

Similarity Search and Mining in Uncertain Spatial and Spatio Temporal Databases. Andreas Züfle

How telcos can benefit from streaming big data analytics

Why big data? Lessons from a Decade+ Experiment in Big Data

TIBCO Spotfire Guided Analytics. Transferring Best Practice Analytics from Experts to Everyone

Practices for Using Passive, Low-Cost RFID for Improved Asset Tracking

CSE 544 Principles of Database Management Systems. Magdalena Balazinska (magda) Winter 2009 Lecture 1 - Class Introduction

SOURCE ID RFID Technologies and Data Capture Solutions

Capstone Overview Architecture for Big Data & Machine Learning. Debbie Marr ICRI-CI 2015 Retreat, May 5, 2015

Towards Supporting Contextual Privacy in Body Sensor Networks for Health Monitoring Service

Beyond Watson: The Business Implications of Big Data

RFID Asset Management Solutions. Distributed globally by

AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide

Top 10 IT Trends that will shape David Chin Chair BICSI Southeast Asia

Sensor Fusion Mobile Platform Challenges and Future Directions Jim Steele VP of Engineering, Sensor Platforms, Inc.

Fachbereich Informatik und Elektrotechnik SunSPOT. Ubiquitous Computing. Ubiquitous Computing, Helmut Dispert

Grid-In-Hand Mobile Grid Revised 1/27/15

Big Data & Scripting Part II Streaming Algorithms

Systems for Fun and Profit

Big Data The Next Phase Lessons from a Decade+ Experiment in Big Data

Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers

MiddleWare for Sensor Systems keeping things Open

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate

Reasoning Component Architecture

How To Handle Big Data With A Data Scientist

Synchro-Phasor Data Conditioning and Validation Project Phase 3, Task 1. Report on

Camera BOF SIGGRAPH Copyright Khronos Group Page 1

An Introduction to Data Virtualization as a Tool for Application Development

An Analysis of the Transitions between Mobile Application Usages based on Markov Chains

Big Data and Analytics (Fall 2015)

Transcription:

The RFID Ecosystem Project RFID Data Management for Pervasive Computing Applications Evan Welbourne University of Washington, CSE EMC Innovation Conference 2008 Franklin, MA

Outline What is RFID? Pervasive applications and challenges The Cascadia system: RFID Data Manager Handling holes in RFID data streams Extracting high-level events from low-level RFID data Supporting privacy Facilitating application development

What is RFID? Wireless ID and tracking Reader Captures information on: Identity Location Time Unique identification Passive (no batteries) Tag

Passive RFID Markets Today: $5 B industry, 2 billion tags In 2018: $25 B industry, 600+ billion tags (source: IDTechEx)

The RFID Ecosystem 100s of passive EPC Gen 2 tags 100s of RFID antennas 85,000 sq ft (8,000 sq m) building Simulating an RFID-saturated future

Outline What is RFID? Pervasive applications and challenges The Cascadia system: RFID Data Manager Handling holes in RFID data streams Extracting high-level events from low-level RFID data Supporting privacy Facilitating application development

Pervasive RFID Applications Personal asset tracking Is my advisor in her office? Where are my keys?

Pervasive RFID Applications Personal asset tracking Personal diary of physical events How did I spend my time?

Pervasive RFID Applications Personal asset tracking Personal diary of physical events Event-based search What emails did I send during the meeting a few weeks ago?

Pervasive RFID Applications Personal asset tracking Personal diary of physical events Event-based search Focus on mobile and web 2.0 applications

Pervasive RFID Applications Current trend: RFID in Hospitals Tracking equipment, patients, personnel Improved utilization of assets We extend with more sophisticated inference

Application Challenges Must cope with holes in RFID data stream Must ensure a reasonable level or privacy Application development is extremely difficult The Cascadia system answers these challenges:

Outline What is RFID? Pervasive applications and challenges The Cascadia system: RFID Data Manager Handling holes in RFID data streams Extracting high-level events from low-level RFID data Supporting privacy Facilitating application development

Holes and Uncertainty in Data Holes or gaps appear for two reasons: Missed tag reads

Holes and Uncertainty in Data Holes or gaps appear for two reasons: Missed tag reads Limited reader topology

Coping With Uncertainty Smooth the data using a particle filter Directly represent uncertainty with probabilistic data Raw RFID Data Raw(ID, loc, time) Particle Filter Smoothed, Probabilistic Data Smooth(ID, loc, time, prob) (tag_1,(47.65,-122.3),2), (tag_1,(47.65,-122.3),3), (tag_1,(47.65,-122.3),4), (tag_1,(47.65,-122.3),5),... Sensor Model Motion Model Connectivity Graph (tag_1, hall by 406,3,.2), (tag_1, office 406,3,.2), (tag_1, office 408,3,.2), (tag_1, lab,3,.2), (tag_1, hall by 408,3,.2), (tag_1, lab,2,.33), (tag_1, office 406,2,.33), (tag_1, office 408,2,.33),...

Coping With Uncertainty Smooth the data using a particle filter Directly represent uncertainty with probabilistic data Raw RFID data rate: Particle 50 tag reads / sec With on-the-fly compression: Filter 2 tag reads / sec Raw RFID Data Raw(ID, loc, time) (tag_1,(47.65,-122.3),2), (tag_1,(47.65,-122.3),3), (tag_1,(47.65,-122.3),4), (tag_1,(47.65,-122.3),5),... Note on Data Rates / Volume Average rates for 9am-5pm for 50 people, 300 tags: Smoothed, Probabilistic Data Smooth(ID, loc, time, prob) Raw data per week: Sensor Motion Connectivity 7,200,000 tag reads Model Model Graph Raw data per week, compressed: 300,000 tag reads (tag_1, hall by 406,3,.2), (tag_1, office 406,3,.2), (tag_1, office 408,3,.2), (tag_1, lab,3,.2), (tag_1, hall by 408,3,.2), Particle filter data rate: 500 particles / tag / sec (tag_1, lab,2,.33), (tag_1, office 406,2,.33), (tag_1, office 408,2,.33),... Smoothed data per week: 21B particles (20GB)

Outline What is RFID? Pervasive applications and challenges The Cascadia system: RFID Data Manager Handling holes in RFID data streams Extracting high-level events from low-level RFID data Supporting privacy Facilitating application development

Example: Higher-Level Event Location Data ID location time A B C D E Example Application: Track / verify patient treatments Nurse is tagged Equipment is tagged Detect and log treatment events

Example: Higher-Level Event Location Data ID location time Nurse A 4 IV A 4 A B C D E Example Application: Track / verify patient treatments Nurse is tagged Equipment is tagged Detect and log treatment events

Example: Higher-Level Event Location Data ID location time Nurse A 4 IV A 4 A B C D E Nurse B 5 IV B 5 Example Application: Track / verify patient treatments Nurse is tagged Equipment is tagged Detect and log treatment events

Example: Higher-Level Event Location Data ID location time Nurse A 4 IV A 4 A B C D E Nurse B 5 IV B 5 Example Application: Track / verify patient treatments Nurse is tagged Equipment is tagged Detect and log treatment events

Example: Higher-Level Event Location Data ID location time Nurse A 4 IV A 4 A B C D E Nurse B 5 IV B 5 Nurse treats patient in 407 Example Application: Track / verify patient treatments Nurse is tagged Equipment is tagged Detect and log treatment events

Extracting Events: Step 1 Translate to Event Specification Language PeexL Probabilistic Event Extraction Language SQL-like language SEQ sequencing construct

Extracting Events: Step 2 Declarative Event Specifications Probabilistic Event Streams Extract Specified Events PEEX Probabilistic Event Extractor Raw RFID Data Storage Extracted Events Smoothed Cascadia PEEX Particle Filter Accepts specifications in PeexL Periodically queries for new events Assigns probabilities to extracted events Events are stored or streamed to apps

Performance: Precision & Recall Extracting a common event: ENTERED-MEETING-ROOM 10 people, 30 tags, 30 minutes Precision: Fraction of extracted events that match ground truth. Recall: Fraction of ground truth events captured by extracted events.

Performance: Precision & Recall Extracting a common event: ENTERED-MEETING-ROOM 10 people, 30 tags, 30 minutes 75 th percentile 50 th percentile 25 th percentile All detected events Events which occur with certainty Precision: Fraction of extracted events that match ground truth. Recall: Fraction of ground truth events captured by extracted events.

1) Precision/Recall trade-off: developer chooses best threshold 2) Performance highly varied between tags For best tags at probability 0.3, Precision =.92, Recall =.85 3) These results are for a very uncertain dataset: There are no readers inside rooms, only in hallways

1) Precision/Recall trade-off: developer chooses best threshold Bottom Line 2) Performance Application only highly specifies varied event between and tags probability threshold -- Cascadia For best tags does at probability the rest 0.3, Precision =.92, Recall =.85 3) These results are for a very uncertain dataset: Ongoing improvement of event detection techniques! There are no readers inside rooms, only in hallways

Outline What is RFID? Pervasive applications and challenges The Cascadia system: RFID Data Manager Handling holes in RFID data streams Extracting high-level events from low-level RFID data Supporting privacy Facilitating application development

Default Policy: Physical Access Control Problem: Asymmetric visibility among peers How do I know who can see my data? Concept: Each user has a personal store of data / events Stores only events that occurred when and where user was physically present

Time: 0 s data store s data store s data store sightings timestamp sightings timestamp sightings timestamp 0 0 0

Time: 1 s data store s data store s data store sightings timestamp sightings timestamp sightings timestamp 0 0 0 1 1 1

Time: 2 s data store s data store s data store sightings timestamp sightings timestamp sightings timestamp 0 0 0 1 1 1 2 2 2

Default Policy: Physical Access Control Key Points: Each user must carry a personal RFID badge Enables applications that augment a user s memory Implemented as materialized authorization views in DB Other context-aware policies are possible: Only reveal my location during business hours Only reveal my activity when I am in a meeting Interesting adaptations for probabilistic data

Outline What is RFID? Pervasive applications and challenges The Cascadia system: RFID Data Manager Handling holes in RFID data streams Extracting high-level events from low-level RFID data Supporting privacy Facilitating application development

Supporting Applications Web 2.0 Personal Data Management Tool Suite: Create/Manage Objects, Associate Tags Specify Significant Places, Share with Others Specify Events, Share with Others Applications can integrate with tool suite Declarative event language removes burden from developer Event-based programming API simplifies development

Conclusions RFID is an increasingly ubiquitous technology More sophisticated applications face serious challenges: Uncertain data streams (gaps or holes in the data) Low-level data, high-level information needs Privacy risks Complex application development The Cascadia system addresses these challenges with: A probabilistic model of uncertainty Declarative event specifications A probabilistic event extractor Context-aware access control policies Suite of web-based personal data management tools

Thank You & Questions Misc notes: Thank you! See publications for details: publications.html Online demos available soon, see: Lots of ongoing and future work with Cascadia!