›› 2012, Vol. 27 ›› Issue (1): 213-224.doi: 10.1007/s11390-012-1218-z

• Database and Data Management • Previous Articles    

A Reprocessing Model for Complete Execution of RFID Access Operations on Tag Memory

Wooseok Ryu1, Bonghee Hong1, Member, ACM, IEEE, Joonho Kwon2 and Ge Yu3 (于戈), Senior Member, CCF, Member, ACM, IEEE   

  1. 1. Department of Computer Engineering, Pusan National University, Busan 609-735, Korea;
    2. Institute of Logistics Information Technology, Pusan National University, Busan 609-735, Korea;
    3. School of Information Science and Engineering, Northeastern University, Shenyang 110004, China
  • Received:2010-04-21 Revised:2011-07-18 Online:2012-01-05 Published:2012-01-05
  • Supported by:

    This work was supported by the Grant of the Regional Core Research Program/Institute of Logistics Information Technology of Korean Ministry of Education, Science and Technology.

This paper investigates the problem of inconsistent states of radio frequency identification (RFID) tag data caused by incomplete execution of read/write operations during access to RFID tag memory. Passive RFID tags require RF communication to access memory data. This study is motivated by the volatility of RF communication, where instability is caused by intermittent connections and uncertain communication. If a given tag disappears from the communication area of the reader during the reading or writing of tag data, the operation is incomplete, resulting in an inconsistent state of tag data. To avoid this inconsistency, it is necessary to ensure that any operations on tag memory are completed. In this paper, we propose an asynchronous reprocessing model for finalizing any incomplete execution of read/write operations to remove inconsistent states. The basic idea is to resume incomplete operations autonomously by detecting a tag's re-observation from any reader. To achieve this, we present a concurrency control mechanism based on continuous query processing that enables the suspended tag operations to be re-executed. The performance study shows that our model improves the number of successful operations considerably in addition to suppressing inconsistent data access completely.

[1] Want R. An introduction to RFID technology. IEEE Perva-sive Comput., 2006, 5(1): 25-33.

[2] Banks J, Hanny D, Pachano M, Thompson L. RFID Applied.Wiley, Chichester, March 2007, pp.328-329.

[3] Weinstein R. RFID: A technical overview and its applicationto the enterprise. IT Professional, 2005, 7(3): 27-33.

[4] Fishkin K P, Jiang B, Philipose M, Roy S. I sense a distur-bance in the field: Unobtrusive detection of interactions withRFID-tagged object. In Proc. the 6th Int. Conf. UbiquitousComputing, Sept. 2004, pp.268-282.

[5] Jung S, Cho J, Kim S. FQTR: Novel hybrid tag anti-collisionprotocols in RFID system. Journal of KIISE: Software andApplications, 2009, 36(7): 560-570.

[6] EPCglobal Inc. Class 1 generation 2 UHF air interface proto-col standard "Gen 2", http://www.gs1.org/gsmp/kc/epcglo-bal/uhfc1g2.

[7] EPCglobal Inc. Low level reader protocol, http://www.gs1.org/gsmp/kc/epcglobal/llrp.

[8] EPCglobal Inc. Application level events (ALE) standard,http://www.gs1.org/gsmp/kc/epcglobal/ale.

[9] Golab L, ? Ozsu M T. Issues in data stream management. SIG-MOD Record, 2003, 32(2): 5-14.

[10] Silberschatz A, Korth H F, Sudarshan S. Database SystemConcepts, 4th edition, New York: McGraw-Hill, 2002, pp.709-722.

[11] Kisler J, Satyanarayanan M. Disconnected operation in theCoda File System. ACM Transactions on Computer Systems,1992, 10(1): 3-25.

[12] Wu K, Yu P S, Chen M. Energy efficient caching for wirelessmobile computing. In Proc. the 12th Int. Conference onData Engineering, Feb. 26-Mar. 1, 1996, pp.336-343.

[13] Madria S K, Bhargava B. A transaction model for mobile com-puting. In Proc. Int. Database Engineering and ApplicationSymposium, July 1998, pp.92-102.

[14] Rasheed A, Zaslavsky A. Ensuring database availability indynamically changing mobile computing environments. InProc. the 7th Australian Database Conference, Melbourne,Australia, Jan. 1996, pp.100-108.

[15] Ding Z, Meng X,Wang S. A transactional asynchronous repli-cation scheme for mobile database systems. Journal of Com-puter Sci. and Tech., 2002, 17(4): 389-396.

[16] Madria S K, Mohania M, Bhowmick S S, Bhargava B. Mo-bile data and transaction management. Information Sciences,2002, 141(3-4): 279-309.

[17] G?urgen L, Roncancio C, Labb?e C, Olive V. Transactional is-sues in sensor data management. In Proc. the 3rd Interna-tional Workshop on Data Management for Sensor Networks,Sept. 2006, pp.27-32.

[18] Wang B, Yang X, Wang G, Yu G. Continuous approximatewindow queries in wireless sensor networks. In Lecture Notesin Computer Science 4505, Dong G et al. (eds.), Springer-Verlag, 2007, pp.407-418.

[19] Floerkemeier C, Roduner C, Lampe M. RFID application de-velopment with the Accada middleware platform. IEEE Sys-tems Journal, 2007, 1(2): 82-94.

[20] Ryu W, Hong B. A reprocessing model based on continuousqueries for writing data to RFID tag memory. In Proc. the14th International Conf. Database Systems for Advanced Ap-plications, April 2009, pp.201-214.
No related articles found!
Full text



[1] Huang Guoyong; Li Sanli;. TSP: A Heterogeneous Multiprocessor Supercomputing System Based on i860XP[J]. , 1994, 9(3): 285 -288 .
[2] Ma Zongmin; Yan Li;. Using Multivalued Logic in Relational Database Containing Null Value[J]. , 1996, 11(4): 421 -426 .
[3] Xiao-Qing Zheng, Hua-Jun Chen, Zhao-Hui Wu, and Yu-Xin Mao. Dynamic Query Optimization Approach for Semantic Database Grid[J]. , 2006, 21(4): 597 -608 .
[4] Pierre Bourque, Serge Oligny, Alain Abran, and Bertrand Fournier. Developing Project Duration Models in Software Engineering[J]. , 2007, 22(3): 348 -357 .
[5] Murat Ekinci and Murat Aykut. Human Gait Recognition Based on Kernel PCA Using Projections[J]. , 2007, 22(6): 867 -876 .
[6] Yongxi Cheng. Generating Combinations by Three Basic Operations[J]. , 2007, 22(6): 909 -913 .
[7] Xiao-Min Zhu and Pei-Zhong Lu. Multi-Dimensional Scheduling for Real-Time Tasks on Heterogeneous Clusters[J]. , 2009, 24(3): 434 -446 .
[8] De-Yi Li, Zhi-Yong Liu and Ke-Qing He. Preface[J]. , 2010, 25(6): 1101 -1102 .
[9] Feng Jin (金锋), Min-Lie Huang (黄民烈),and Xiao-Yan Zhu (朱小燕), Member, CCF. Guided Structure-Aware Review Summarization[J]. , 2011, 26(4): 676 -684 .
[10] Zhi-Hao Wu (武志昊), You-Fang Lin (林友芳), Steve Gregory, Huai-Yu Wan (万怀宇), Student Member, CCF, and Sheng-Feng Tian (田盛丰). Balanced Multi-Label Propagation for Overlapping Community Detection in Social Networks[J]. , 2012, 27(3): 468 -479 .

ISSN 1000-9000(Print)

CN 11-2296/TP

Editorial Board
Author Guidelines
Journal of Computer Science and Technology
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
E-mail: jcst@ict.ac.cn
  Copyright ©2015 JCST, All Rights Reserved