RFID-based Distributed Memory for Mobile Applications
نویسنده
چکیده
The goal of our work is to give a user equipped with an RFID-enabled mobile handset (mobile phone, PDA, laptop. . . ) the ability to know the contents of distant passive RFID tags, without physically moving to them and without using a Wireless Area Network. The existing architectural patterns involving passive tags do not meet simultaneously all of these requirements. Our RFID-based distributed memory does. By associating vector clocks to tags, we replicate a view of this memory on each tag and each handset, and disseminate updates between all of the replicas. Thus a user can locally query the replica hold by their mobile handset without physically moving to a tag. We have developed a pervasive game as an application example. Using data collected during real game sessions, we evaluate the performance of our distributed memory. Then we discuss staleness and scalability issues. We conclude and give perspectives of our work.
منابع مشابه
RFID-based Distributed Shared Memory for Pervasive Games
The goal of our work is to give a user equipped with an RFID-enabled mobile handset (mobile phone, PDA, laptop. . . ) the ability to access contents of distant elements of the system (tags or handsets), without physically moving to them and without using a Wireless Area Network. Our solution consists in an RFID-based Distributed Shared Memory (RDSM). After describing RDSM, we present its demons...
متن کاملU-healthcare Enterprise Frameworks for Mobile Applications
The advances in mobile devices, frameworks and u-computing have given rise to a vast range of new services for RFID (Radio Frequency Identification) technology. In this paper, we propose a U-healthcare Enterprise Application Framework for interchanging the information on mobile devices in the RFID-based distributed computing environment. We describe the requirements of u-healthcare Enterprise A...
متن کاملA Secure ECC-based Mobile RFID Mutual Authentication Protocol and Its Application
Mobile RFID applications combine RFID technologies and mobile device to create a new convenient application area. However, most of the applications suffer from the security issues due to insecure communication channels among tags, readers and servers. In 2012, Zhou et al. proposed an ECC-based mutual authentication protocol to promote mobile RFID applications security. However, we found their p...
متن کاملSoftware abstractions for mobile RFID-enabled applications
Our everyday environments may soon be pervaded with radio frequency identification (RFID) tags integrated in physical objects. These RFID tags can store a digital representation of the physical object and transmit it wirelessly to pervasive, context-aware applications running on mobile devices. However, communicating with RFID tags is prone to many failures inherent to the technology. This hind...
متن کاملDiCa: Distributed Tag Access with Collision-Avoidance Among Mobile RFID Readers
Advances in wireless and mobile communication technologies have enabled the development of various RFID-based systems and applications in addition to the extension of the tag reading range of mobile readers. Thus, it has become commonplace that multiple readers concurrently attempt to read tags within ranges of the readers. However, this concurrent access among multiple mobile readers brings ab...
متن کامل