RFID-based Distributed Memory for Mobile Applications

نویسنده

  • Michel Simatic
چکیده

The goal of our work is to give a user equipped with an RFID-enabled mobile handset (mobile phone, PDA, laptop. . . ) the ability to know the contents of distant passive RFID tags, without physically moving to them and without using a Wireless Area Network. The existing architectural patterns involving passive tags do not meet simultaneously all of these requirements. Our RFID-based distributed memory does. By associating vector clocks to tags, we replicate a view of this memory on each tag and each handset, and disseminate updates between all of the replicas. Thus a user can locally query the replica hold by their mobile handset without physically moving to a tag. We have developed a pervasive game as an application example. Using data collected during real game sessions, we evaluate the performance of our distributed memory. Then we discuss staleness and scalability issues. We conclude and give perspectives of our work.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

RFID-based Distributed Shared Memory for Pervasive Games

The goal of our work is to give a user equipped with an RFID-enabled mobile handset (mobile phone, PDA, laptop. . . ) the ability to access contents of distant elements of the system (tags or handsets), without physically moving to them and without using a Wireless Area Network. Our solution consists in an RFID-based Distributed Shared Memory (RDSM). After describing RDSM, we present its demons...

متن کامل

U-healthcare Enterprise Frameworks for Mobile Applications

The advances in mobile devices, frameworks and u-computing have given rise to a vast range of new services for RFID (Radio Frequency Identification) technology. In this paper, we propose a U-healthcare Enterprise Application Framework for interchanging the information on mobile devices in the RFID-based distributed computing environment. We describe the requirements of u-healthcare Enterprise A...

متن کامل

A Secure ECC-based Mobile RFID Mutual Authentication Protocol and Its Application

Mobile RFID applications combine RFID technologies and mobile device to create a new convenient application area. However, most of the applications suffer from the security issues due to insecure communication channels among tags, readers and servers. In 2012, Zhou et al. proposed an ECC-based mutual authentication protocol to promote mobile RFID applications security. However, we found their p...

متن کامل

Software abstractions for mobile RFID-enabled applications

Our everyday environments may soon be pervaded with radio frequency identification (RFID) tags integrated in physical objects. These RFID tags can store a digital representation of the physical object and transmit it wirelessly to pervasive, context-aware applications running on mobile devices. However, communicating with RFID tags is prone to many failures inherent to the technology. This hind...

متن کامل

DiCa: Distributed Tag Access with Collision-Avoidance Among Mobile RFID Readers

Advances in wireless and mobile communication technologies have enabled the development of various RFID-based systems and applications in addition to the extension of the tag reading range of mobile readers. Thus, it has become commonplace that multiple readers concurrently attempt to read tags within ranges of the readers. However, this concurrent access among multiple mobile readers brings ab...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009