SixthSense RFID based Enterprise Intelligence Lenin Ravindranath, Venkat Padmanabhan Interns: Piyush Agrawal (IITK), SriKrishna (BITS Pilani)

Slides:



Advertisements
Similar presentations
RFID Access Control System March, 2003 Softrónica.
Advertisements

RFID: OPPORTUNITIES and CHALLENGES Yize Chen. History In 1969, Mario Cardullo presented a RFID business plan to investors. The application areas include:
1 Electrical and Computer Engineering Drebin Rescuing Firefighters in Distress FPR Team Ganz: Jonathan Bruso Michael Carney Daniel Fortin James Schafer.
FixtureFinder: Discovering the Existence of Electrical and Water Fixtures Vijay Srinivasan*, John Stankovic, Kamin Whitehouse University of Virginia *(Currently.
Location and Tracking Spring 2004: Location Recognition Larry Rudolph Location of what? Services applications, resources, sensors, actuators where.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
RFID Security CMPE 209, Spring 2009 Presented by:- Snehal Patel Hitesh Patel Submitted to:- Prof Richard Sinn.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
EMBEDDED RFID IN PRODUCT IDENTIFICATION Tommi Kallonen Jari Porras Lappeenranta University of Technology.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Group 9: Chill Geordi: RFID based location sensing Brian Loo (bloo) Geeta Shroff (gshroff) Zane Starr (zcs)
AutoID Automatic Identification Technologies at the MIT Media Lab Gregory Chittim – ES 112 – 03S.
Location Systems for Ubiquitous Computing Jeffrey Hightower and Gaetano Borriello.
Challenges: Device-free Passive Localization for Wireless Environments Moustafa Youssef, Matthew Mah, Ashok Agrawala University of Maryland College Park.
The Enforcer Laura Celentano Glenn Ramsey Michael Szalkowski.
R adio F requency Id entification Ta’Tyana McElroy Jeffrey Tuma.
TelosCAM: Identifying Burglar Through Networked Sensor-Camera Mates with Privacy Protection Presented by Qixin Wang Shaojie Tang, Xiang-Yang Li, Haitao.
Winter Retreat Connecting the Dots: Using Runtime Paths for Macro Analysis Mike Chen, Emre Kıcıman, Anthony Accardi, Armando Fox, Eric Brewer
RADIO FREQUENCY IDENTIFICATION By Basia Korel. Automatic Identification Technology for identifying items Three step process 1) Identify people/objects.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
RFID Inventory System Shaun Duncan, Thomas Keaten, Auroop Roy.
Smart Home Technologies CSE 4392 / CSE 5392 Spring 2006 Manfred Huber
 The Global Positioning System (GPS) is a navigational system involving satellites and computers that can determine the latitude and longitude of a receiver.
SixthSense: RFID-based Enterprise Intelligence Lenin Ravindranath, Venkat Padmanabhan (MSR India) Piyush Agrawal (IIT Kanpur)
Overview of Search Engines
McGraw-Hill/Irwin © The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B21 Mobile Technology.
Sharena Paripatyadar.  What are the differences?
Created by the Community for the Community Building a RFID solution in BTS 09.
David Molnar, David Wagner - Authors Eric McCambridge - Presenter.
Radio Frequency Identification Inventory Tracking and Status Monitoring of Blood Units Team 10 Mark Green Melissa Kronenberger Nadine Tribur Aaron Schlanser.
Smart Environments for Occupancy Sensing and Services Paper by Pirttikangas, Tobe, and Thepvilojanapong Presented by Alan Kelly December 7, 2011.
Developing RFID Application In Supply Chain
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
Wireless Network Security By Patrick Yount and CIS 4360 Fall 2009 CIS 4360 Fall 2009.
Khanh Huynh Project Leader Dat Tu Systems Analyst Sandy Fung Team Representative Patrick de Leon Lead Programmer Ching Fei Chan Documentation Specialist.
Classroom Collaborator Brandon Reagen, Matthew Ng, Runfeng Chen, Robert Connelly Faculty Advisor: Prof. Tessier Department of Electrical and Computer Engineering.
Radio Frequency Identification (RFID) Be Safe Security Solutions.
` Tangible Interaction with the R Software Environment Using the Meuse Dataset Rachel Bradford, Landon Rogge, Dr. Brygg Ullmer, Dr. Christopher White `
Cullen College of Engineering RFID-Based Solutions for Piping Technology Piping Tech & UH July, 2007.
Microsoft Research Faculty Summit Aman Kansal Researcher Networked Embedded Computing, MSR.
Ubiquitous Computing Computers everywhere. Where are we going? What happens when the input is your car pulls into the garage, and the output is the heat.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
CS3900 Richard Emerson1 Radio Frequency ID Tags Smart labels that send/receive data via radio waves Usually works like a barcode – contains a product code.
1 Intrusion Detection Methods “Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking.
4BP1 Electronic & Computer Engineering Paul Gildea th Year Final Project Presentation.
The Supply Chain Doctors Warehousing Fundamentals The Supply Chain Doctors Kimball Bullington, Ph.D. Cliff Welborn, Ph.D.
Network Community Behavior to Infer Human Activities.
TEMPLATE DESIGN © E-Eye : A Multi Media Based Unauthorized Object Identification and Tracking System Tolgahan Cakaloglu.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Workshop on Smart Object Systems Dietary-Aware Dining Table – Tracking What and How Much You Eat Keng-hao Chang, Shih-yen Liu, Jr-ben Tian, Hao-hua Chu,
Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph 1 Tracking Indoors.
Resolve today’s IT management dilemma Enable generalist operators to localize user perceptible connectivity problems Raise alerts prioritized by the amount.
Radio Frequency Tags Chandler Allen. The use of a wireless non-contact system that uses radio frequency electromagnetic fields to transfer data from a.
RAPT RFID based Asset and Personnel Tracker Team 24.
IMPROVED ASSET UTILIZATION Lack of visibility of assets and devices results in low equipment utilization rates, excess equipment purchasing and sometimes.
Nissanka Bodhi Priyantha Computer Science, Massachusetts Institute of Technology RTLab. Seolyoung, Jeong Dissertation, MIT, June 2005.
Digital Carpool Aid Mid-semester Presentation Senior Design I March 5, 2015.
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
I Sense a Disturbance in the Force: Unobtrusive Detection of Interactions with RFID-tagged Objects Presenter : 葉舜元.
Korea University Ubiquitous LAB. Chapter 11. RFID peripherals Ph.D Chang-Duk Jung.
Teng Wei and Xinyu Zhang
PARKING AUTOMATION SYSTEM
Radio Frequency Identification (RFID)
SixthSense RFID based Enterprise Intelligence
1st Draft for Defining IoT (1)
Tracking parameter optimization
Chapter 2: Input and output devices
Long-range capacitive sensors for indoor person location
Mobility, Networks, and Systems
JINI ICS 243F- Distributed Systems Middleware, Spring 2001
Presentation transcript:

SixthSense RFID based Enterprise Intelligence Lenin Ravindranath, Venkat Padmanabhan Interns: Piyush Agrawal (IITK), SriKrishna (BITS Pilani)

RFID  Radio Frequency Identification  Components  RFID Reader with Antennas  Tags (Active and Passive)  Electromagnetic waves induce current  Tag responds  Globally unique ID  Data 2

RFID Applications  Tracking  Inventory  Supply Chain  Authentication Mainly an Identification Technology 3

SixthSense Overview Goal  Use RFID to capture the rich interaction between people and their surroundings 4 Setting  Focus on Enterprise Environment  People and their interesting objects are tagged Methodology  Track people and objects  Infer their inter-relationship and interaction  Combine with other Enterprise systems/sensors (Camera, WiFi, Presence, Calendar)  Provide Useful Services

Challenges  Manual input is error prone and is best avoided  Erroneous mapping  Passive Tags are fragile  RFID Passive tags are inherently unreliable  Tag Orientation  Environment (Metal, Water) 5

Key Research Tasks  Addressing Challenges  Take human out of the loop/Verify manual input  Person-Object Differentiation  Object Ownership Inference  Person Identification  Person-Object Interaction  Reliability  Multiple Tagging 6

Person-Object Differentiation  Identify tags which cause movement of other tags  Objects moves with owner (person)  Person may move without objects  Co-Movement based Heuristic  At each node calculate conditional probability M cm (i,j) = N ij / N i  N ij - no. of times tag i and tag j moved from one zone to another together  N i - no. of times tag i moved across any two zones  Model as a directed weighted graph  Incoming degrees and outgoing degrees at each node 7

Person-Object Differentiation Person Cell Phone Laptop

Object Ownership Inference  Find all person nodes connected to an object node  The node with the highest edge weight is the owner of the object  No Information about owner in terms of movement (static objects)  Co-Presence M cp (i,j) = N ij / N i  N ij = no. of times tag i and tag j are found together  N i = no. of times tag i is found  Build a graph similar to Co-Movement graph 9

Person Identification  Find Workspace  Zone where the tag spent most of its time  Log Desktop Login/Active Events  Temporal Correlation  Trace of person entering workspace zone  Trace of desktop login/active events 10

Person Identification

Person Object Interaction  Identify interaction between person and objects  A person lifted an object  A person turned an object (orientation change)  Multiple tags in different orientations  Monitor the variation is Received Signal Strength from tags

Ensuring Reliability - Multiple Tagging  Multiple Tags on a object in Orthogonal Directions  Automatic inference of cluster of tags belonging to the same object  Elimination Algorithm  Each tag – one node (Entity graph)  Initially edge between every pair of nodes (one connected component)  Every time interval t, all antennas report  Tag IDs  Zone  Eliminate edge between two tags if found in different zone at same time  Connected components - Objects 13

Applications  Lost object Finder  Annotated Security Video  Enhanced Calendar and IM Presence  RFID based WiFi-Calibration 14

Lost Object Finder  Inferred object ownership  Inferred workspace  Raise alarm  When object misplaced and owner moving without it  Query for lost object information  I had the object in the evening but not with me right now 15

Annotating Videos with Events  Security Camera – Video Feed  Tagging videos with interesting RFID events  Person lifted an object  Person entered workspace  Rich video database  Support rich queries  Give me all videos where Person A interacted with Object B 16

Enhanced Calendar/Presence  Automatic Conference Room booking  If conference room not booked  And bunch of people go into the conference room  Enhanced Presence  Learn trajectory from one location to another  E.g. Workspace to Conference Room  Trajectory Mapping  Enhanced User Presence  On the way  Lost 17

RFID-Assisted Wi-Fi Calibration  Wi-Fi for intrusion detection systems  Wi-Fi Signal Fluctuates  When people move around  Using RFID as ground truth for people movement  Characterize Wi-Fi fluctuation  Calibrate to detect human movement 18

Architecture  BizTalk RFID  Tag Locator  Database  Inference Engine  Person Differentiation  Object Ownership  Person Identification  Event Identification  Enterprise Information  Calendar  Presence  Camera  Applications  Security System  Enhanced Calendar/IM  Object Tracker 19

SixthSense Visualizer 20

Relevance to Microsoft  BizTalk RFID (MS IDC)  Person Object Interaction  Walmart  Tracking User Interaction with Products  Purchase Behavior  Provide APIs on top of basic Reader APIs 21

Backup 22

Privacy – Tag ID Hopping  Read Tags using Pass Code  Pass Code – Easy to crack  Tag ID Hopping  Tag ID can be changed using Kill Code  Kill Code – Secret Code  Change Tag IDs of Tags frequently  Server maintains the mapping 23

Related Work  Ferret  RFID Localization for Pervasive Multimedia  I sense a disturbance in the force  Unobtrusive detection of Interactions with RFID-tagged Objects  Marked-up maps  Combining paper maps and electronic information resources  Fusion of RFID and Computer Vision  On Interactive Surfaces for Tangible User Interfaces  LANDMARC  Indoor Location Sensing Using Active RFID 24