面向物联网的RFID不确定数据清洗与存储技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
物联网技术旨在实现人类社会与物理世界的有机结合,使人类可以以更加精细和动态的方式认知世界,并进行管理与控制,从而提高整个社会的信息化水平。RFID技术是物联网中最重要的信息获取技术之一,被广泛应用于物流仓储、供应链管理、资产管理、人员监控和室内定位与跟踪等领域。RFID技术是一种非接触式的射频识别技术,通过对电子标签的扫描,阅读器可以实时地获取标签位置和相应时间等信息,从而实现对电子标签及相应物品的追踪与定位,相应的数据通常可以用三元组(tag_ID, loc, time)的形式表示。然而,由于大量漏读现象(约占30%)的存在使得通过阅读器采集到的原始数据存在严重的不确定性或不完整性,如何清洗出这些不确定数据,并进行高效的存储,是RFID技术在物联网应用领域的关键,也是本文研究的重点。
     本文基于对RFID数据的不确定性、高冗余性和海量性等特性深入分析的基础上,围绕提高基于RFID技术的物联网应用中信息查询的精度和效率,以及节约RFID数据的存储开销等问题,在物理层数据清洗、逻辑层数据填补,以及海量数据存储与查询优化等方面提出了相应的模型与解决方案。取得的主要成果有:
     1.提出了一种基于概率运动状态模型的RFID不确定数据清洗方法。在物理层数据清洗方面,针对由阅读器漏读现象导致的RFID物理层数据的缺失问题,首先通过伯努利二项分布对RFID数据流建模,并引入一种针对RFID标签的概率运动状态模型,建立RFID原始数据与标签运动状态信息(速率、方向和位移等)之间的转换关系,进而利用标签的运动状态信息对漏读数据进行填补,最后给出了一种数据序列逆向过滤机制,进一步确保捕获到标签的运动状态信息。实验结果表明,该清洗方法比经典的滑动窗口平滑技术具有更高的精确度。
     2.提出了一种基于隐马尔可夫模型的RFID运动轨迹清洗方法。在逻辑层数据填补方面,针对基于RFID技术的室内追踪与定位系统中存在的运动轨迹信息不完整问题,首先把系统中阅读器的读数序列映射为隐马尔科夫模型中的可观察状态序列,同时把标签对应的位置序列映射为隐马尔科夫模型中的隐藏状态序列,从而标签的运动轨迹清洗问题转化为一个经典的基于隐马尔科夫模型的解码问题;并在经典解码算法—维特比算法基础上,设计了一种关于标签路径解码的高效算法。实验结果表明,本文提出的算法可以对标签运动轨迹进行高效准确的填充,为相关信息的精确查询提供了保障,改进后的清洗算法在性能方面有明显提高,而且比传统方法具有更高的精确度。
     3.提出了一种基于贝叶斯推理的RFID不确定数据清洗模型。漏读问题可能造成供应链相关企业反应决策贻误,并带来损失,为实时准确地获取被跟踪物品的进出货等流通状态信息,本文首先设计了一种基于路径编码的路径匹配算法,可以高效的统计出与当前标签具有相同历史路径信息的标签分布状态;进而提出一种基于路径信息的差异决策模型,以贝叶斯推理为理论基础,为具有不同历史路径信息的漏读标签分别给出差异化的决策方案,使清洗结果更加准确;最后,引入一种滑动窗口时间模型,有效节省了模型的计算开销,并利用最大熵模型动态地调整时间窗口的大小,从而使模型计算的实时性与清洗结果的准确性之间达到较好平衡。实验结果表明,本文提出的清洗方案不但可以有效提高供应链等领域中数据清洗的精确度,而且表现出了较好的可扩展性。
     4.在RFID海量数据存储与查询优化方面,提出了一种基于拆分路径框架的RFID数据存储模型。针对RFID数据规模庞大和高冗余性带来的数据存储代价大与信息查询效率低等问题,本文首先在基于路径框架的存储方案基础上,设计了一种基于树结构的路径拆分算法,使系统可以根据用户需求智能地规划出路径拆分方案;进而通过基于拆分路径框架的RFID数据存储模型将RFID数据以路径段的形式进行组织、聚类并存储,以提高数据的聚合度,降低数据冗余度,节约存储空间;最后,构造了基于该存储模型的查询框架以支持数据的高效查询。实验结果表明,相比于直接基于路径框架的存储方案,本文所提出的存储模型可以显著提高面向路径的信息查询性能,且所需的存储开销仅为原始数据规模的约12%。
Internet of Things (IoT) is proposed to achieve the organic combination of humansociety and the physical world, which can make the human cognize the world in a morerefined and dynamic way and realize the management and control to improve theinformation level as a whole. RFID technology is one of the most important informationtechnologies in the field of Internet of Things, which is widely used in the field oflogistics warehousing, supply chain management, asset management, personnelmonitoring, indoor positioning and tracking, and so on. RFID technology is anon-contact radio frequency identification technology. By scanning the RFID tags,readers can obtain the location and time information of the tags in real-time in order toachieve the tracking and positioning of the RFID tags and the corresponding itemswhile the corresponding data is usually expressed in the form of (tag_ID, loc, time).However, due to plenty of miss reading phenomenon (approximately30%RFID datahave been missed), there is serious unreliability and incompleteness of the original datacollected by the RFID readers. How to clean these unreliable data and store themefficiently is the key of RFID technology in the field of Internet of Things applications,but also the focus of this paper.
     Based on the in-depth analysis on unreliability, highly redundancy and massivefeatures of RFID data, this paper focuses on improving the precision and efficiency ofinformation inquiry in the RFID technology based Internet of Things applications aswell as reducing RFID data storage overhead, and presents the corresponding modelsand solutions for data cleansing at the physical layer, data filling at the logical layer aswell as storage of massive data and query optimization. The main contributions of thispaper are as follows:
     1. We propose an unreliable RFID data cleaning method based on a probabilitymodel for the motion of tags. At the physical layer, in the light of the problem of RFIDdata leakage caused by miss reading, we model the RFID data stream by Bernoullibinomial distribution and introduce a probability model of RFID tag motion state. Thenwe create a conversion relationship between the raw RFID data and motion stateinformation of tags (speed, direction and displacement) so that the missed data can befilled according to the motion state information of tags. Finally, a reverse filteringmechanism for a data sequence is proposed to further ensure that the motion stateinformation of tags can be captured. Experimental results show that the cleaning methodhas higher accuracy than the classic sliding window smoothing technique.
     2. We propose a Hidden Markov Model based RFID trajectory data cleaningmethod. At the logical layer, in the light of the incompleteness of trajectoryinformation in the indoor tracking and positioning system based on RFID technology, we first map the reading sequence of readers in the system to the observable statesequence of the Hidden Markov Model while we map the position sequencecorresponding to the tag to the hidden state sequence in the Hidden Markov Model, sothat the trajectory cleaning problem of the tags is transformed into a classic decodingproblem based on the Hidden Markov Model. Based on the classical decodingalgorithm-Viterbi algorithm, an efficient algorithm for path decoding is presented.Experimental results show that the proposed algorithm can efficiently and accurately fillthe missed trajectories, provide a guarantee for the accurate information query, and theaccuracy and processing performance of data cleaning have been greatly improved thantraditional methods.
     3. We propose a Bayesian inference based approach for unreliable RFID datacleaning. Miss reading can cause supply-chain companies to mistakenly respond to themarket demand and bring huge economic losses. In order to accurately obtain thereal-time receiving and shipping information of the items being tracked, this paper firstpresents the path code schema based path matching algorithm, which can efficientlyobtain the distribution information of the tags which have the same historical path withthe current tag. Thus, a path information based differentiated decision model isproposed to provide differentiated decision program for the missed tags with differenthistorical path information and make the cleaning results more accurate. Finally, thesliding time window model which can effectively save the computational overhead ofthe model is introduced and it uses the maximum entropy model to dynamically adjustthe size of the time window so that the efficiency and accuracy of the model canperform a better balance. Experimental results show that the proposed cleaning methodnot only can effectively improve the data cleansing accuracy of the supply chain field,but also have better scalability.
     4. For the massive RFID data storage and query optimization, we propose asplit-path schema-based RFID data storage model. More and more space and time areneeded to store and process such huge RFID data, and there is an increasing realizationthat the existing approaches cannot satisfy the requirement of RFID data management.First, on the basis of the path framework based storage solutions, a tree structure basedpath splitting approach is proposed to split the movement paths of products intelligentlyand automatically according to the requirement of users. Further, we present a split-pathschema based RFID data storage model. With a data separation mechanism, the massiveRFID data produced in supply chain manage systems can be clustered, stored andprocessed more efficiently. Finally, based on the proposed new storage model, wedesign the relational schema to store the path information and time information of tags,and some typical query templates and SQL statements are defined. Experimental resultsshow that compared with the path encoding schema-based storage model, the proposedstorage model can significantly improve the path-oriented query performance. Moreover, the storage overhead of our model is only about12%of that of the raw RFID data.
引文
[1] Anne James,Joshua Cooper. Challenges for Database Management in theInternet of Things[M].2009:320-329.
    [2] Luigi Atzori,Antonio Iera,Giacomo Morabito. The Internet of Things: Asurvey[J]. Computer Networks,2010,54(15):2787-2805.
    [3] Ivan Lanese,Luca Bedogni,Marco Di Felice. Internet of things: a processcalculus approach[C]. In Proceedings of the28th Annual ACM Symposium onApplied Computing,2013:1339-1346.
    [4] Marc Langheinrich. A survey of RFID privacy approaches[J]. PersonalUbiquitous Comput,2009,13(6):413-421.
    [5] R. Jeffery Shawn,J. Franklin Michael,Garofalakis Minos. An adaptive RFIDmiddleware for supporting metaphysical data independence[J]. The VLDBJournal,2008,17(2):265-289.
    [6] EPC Global. Available online: http://www.gs1.org (accessed on20February2013).
    [7] Roberto De Virgilio,Pierpaolo Sugamiele,Riccardo Torlone. Incrementalaggregation of RFID data[C]. In Proceedings of the2009InternationalDatabase Engineering&Applications Symposium,2009:194-205.
    [8] Joanna Kulik, Wendi Heinzelman, Hari Balakrishnan. Negotiation-basedprotocols for disseminating information in wireless sensor networks[J]. WirelNetw,2002,8(2/3):169-185.
    [9] ITU Strategy and Policy Unit (SPU). ITU Internet Reports2005: TheInternet ofThings[R]. Geneva: International TelecommunicationUnion (ITU),2005.
    [10] Neil G. When Things Start to Think [M]. New York: Henry Holt,1999.
    [11] Petri Vuorinen. Applying the RFID technology for field force solution[C]. InProceedings of the2005joint conference on Smart objects and ambientintelligence: innovative context-aware services: usages and technologies,2005:39-41.
    [12] Andoni Lombide Carreton,Kevin Pinte,Wolfgang De Meuter. Distributedobject-oriented programming with RFID technology[C]. In Proceedings of the10th IFIP WG61international conference on Distributed Applications andInteroperable Systems,2010:56-69.
    [13] Marco Mamei,Franco Zambonelli. Physical deployment of digital pheromonesthrough RFID technology[C]. In Proceedings of the fourth international jointconference on Autonomous agents and multiagent systems,2005:1353-1354.
    [14] Besma R. Abidi,Nash R. Aragam,Yi Yao,Mongi A. Abidi. Survey andanalysis of multimodal sensor planning and integration for wide areasurveillance[J]. ACM Comput Surv,2009,41(1):1-36.
    [15] Stuart Reeves,Tony Pridmore,Andy Crabtree,Jonathan Green,SteveBenford,Claire O'Malley. The spatial character of sensor technology[C]. InProceedings of the6th conference on Designing Interactive systems,2006:31-40.
    [16] Robert W. Newcomb. Nanotechnology for biomedicine: past, present andfuture[C]. In Proceedings of the2nd International Conference on PErvasiveTechnologies Related to Assistive Environments,2009:1-4.
    [17] Oleg Sokolsky,Tarek Abdelzaher. Real-time and embedded technology andapplications symposium (RTAS '05)[J]. SIGBED Rev,2005,2(2):1-2.
    [18] Joanna Ng,Bart Vashaw. Smarter innovation process for the enablement of asmarter planet[C]. In Proceedings of the2010Conference of the Center forAdvanced Studies on Collaborative Research,2010:433-433.
    [19]刘强,崔莉,陈海明.物联网关键技术与应用[J].计算机科学,2010,37(6):1-4.
    [20]宁焕生,张瑜,刘芳丽等.中国物联网信息服务系统研究[J].电子学报,2006,34(z1):2514-2517.
    [21]陈海明,崔莉,谢开斌等.物联网体系结构与实现方法的比较研究[J].计算机学报,2013,36(1):168-188.
    [22]王保云.物联网技术研究综述[J].电子测量与仪器学报,2009,23(12):1-7.
    [23] Pankesh Patel,Animesh Pathak,Thiago Teixeira, et al. Towards applicationdevelopment for the internet of things[C]. In Proceedings of the8thMiddleware Doctoral Symposium,2011:1-6.
    [24] Sara Hachem,Thiago Teixeira,Val,#233,rie Issarny. Ontologies for theinternet of things[C]. In Proceedings of the8th Middleware DoctoralSymposium,2011:1-6.
    [25] Joakim Formo,Jarmo Laaksolahti,Marcus G. Internet of things marries socialmedia[C]. In Proceedings of the13th International Conference on HumanComputer Interaction with Mobile Devices and Services,2011:753-755.
    [26] Denis Kozlov,Jari Veijalainen,Yasir Ali. Security and privacy threats in IoTarchitectures[C]. In Proceedings of the7th International Conference on BodyArea Networks,2012:256-262.
    [27] W. Evan, B. Leilani, C. Garret, G. Kayla, R. Kyle, R. Samuel, B. Magdalenaand B. Gaetano, Building the internet of things using rfid: The rfid ecosystemexperience[J], IEEE Internet Computing,2009,13(3):48-55.
    [28] D. C. Ranasinghe, M. Harrison and P. H. Cole, EPC network architecturenetworked RFID systems and lightweight cryptography, Springer BerlinHeidelberg,2008:59-78.
    [29] Christof Bornh,Tao Lin,Stephan Haller,Joachim Schaper. Integratingautomatic data acquisition with business processes experiences with SAP'sauto-ID infrastructure[C]. In Proceedings of the Thirtieth internationalconference on Very large data bases-Volume30,2004:1182-1188.
    [30] EPCglobal Reader Protocol Standard1.0,2006.
    [31] Susanne Leist, Gregor Zellner. Evaluation of current architectureframeworks[C]. In Proceedings of the2006ACM symposium on Appliedcomputing,2006:1546-1553.
    [32] Ari Juels. Strengthening EPC tags against cloning[C]. In Proceedings of the4thACM workshop on Wireless security,2005:67-76.
    [33] Nong-Kun Chen,Jiann-Liang Chen,Teng-Hsun Chang,Hsi-Feng Lu. ReliableALE middleware for RFID network applications[J]. Int J Netw Manag,2009,19(3):203-216.
    [34] Jie Shi,Darren Sim,Yingjiu Li,Robert Deng. SecDS: a secure EPC discoveryservice system in EPCglobal network[C]. In Proceedings of the second ACMconference on Data and Application Security and Privacy,2012:267-274.
    [35] Frank Y. Shih,Yao-Chung Chang,Min-Chun Peng,Yu-Shan Lin. Cross layerdesign for RFID/EPC network[C]. In Proceedings of the InternationalConference on Mobile Technology, Applications, and Systems,2008:1-6.
    [36] Want Roy. The Magic of RFID[J]. ACM Queue,2004,2(7):40-48.
    [37] Welbourne Evan,Battle Leilani,Cole Garret,Gould Kayla,Rector Kyle,Raymer Samuel,Balazinska Magdalena,Borriello Gaetano. Building theInternet of Things Using RFID: The RFID Ecosystem Experience[J]. IEEEInternet Computing,2009,13(3):48-55.
    [38] Devi Prasad Dash. Supply Chain Management: The RFID Advantage[J]. IUPJournal of Supply Chain Management,2011,8(4):42-57.
    [39] Ioan Salomie,Mihaela Dinsoreanu,Cristina Bianca Pop,Sorin Liviu Suciu.Model and SOA solutions for traceability in logistic chains[C]. In Proceedingsof the10th International Conference on Information Integration and Web-basedApplications\&Services,2008:339-344.
    [40] Nikos Kefalakis,Nektarios Leontiadis,John Soldatos,Kiev Gama,DidierDonsez. Supply chain management and NFC picking demonstrations using theAspireRfid middleware platform[C]. In Proceedings of the ACM/IFIP/USENIXMiddleware '08Conference Companion,2008:66-69.
    [41] Bettina Fazzinga,Sergio Flesca,Elio Masciari,Filippo Furfaro. Efficient andeffective RFID data warehousing[C]. In Proceedings of the2009InternationalDatabase Engineering&Applications Symposium,2009:251-258.
    [42] Davide Zanetti,Boris Danev,Srdjan apkun. Physical-layer identification ofUHF RFID tags[C]. In Proceedings of the sixteenth annual internationalconference on Mobile computing and networking,2010:353-364.
    [43] Lejla Batina, Stefaan Seys, Dave Singel,#233, Ingrid Verbauwhede.Hierarchical ECC-Based RFID authentication protocol[C]. In Proceedings ofthe7th international conference on RFID Security and Privacy,2012:183-201.
    [44] Einar Sneve Martinussen, Timo Arnall. Designing with RFID[C]. InProceedings of the3rd International Conference on Tangible and EmbeddedInteraction,2009:343-350.
    [45] Yun Bae Kim,Jinsoo Park,Seho Kee,Kiburm Song,Mi Ae Han. Real timelocation system in support of bayesian network[C]. In Proceedings of theWinter Simulation Conference,2010:1957-1966.
    [46] Gregor Broll,Susanne Keck,Paul Holleis,Andreas Butz. Improving theaccessibility of NFC/RFID-based mobile interaction through learnability andguidance[C]. In Proceedings of the11th International Conference onHuman-Computer Interaction with Mobile Devices and Services,2009:1-10.
    [47] Apostolia Papapostolou,Hakima Chaouchi. Integrating RFID and WLAN forindoor positioning and IP movement detection[J]. Wirel Netw,2012,18(7):861-879.
    [48] Ben Kraal,Vesna Popovic,Philip J. Kirk. Passengers in the airport: artefactsand activities[C]. In Proceedings of the21st Annual Conference of theAustralian Computer-Human Interaction Special Interest Group: Design: Open24/7,2009:349-352.
    [49] Erik-Oliver Blass,Anil Kurmus,Refik Molva,Thorsten Strufe. PSP: privateand secure payment with RFID[C]. In Proceedings of the8th ACM workshopon Privacy in the electronic society,2009:51-60.
    [50] Rand A. Mahmood,Wasim A. Al-Hamdani. Is RFID technology secure andprivate?[C]. In Proceedings of the2011Information Security CurriculumDevelopment Conference,2011:42-49.
    [51] Lenin Ravindranath,Venkata N. Padmanabhan,Piyush Agrawal. SixthSense:RFID-based Enterprise Intelligence[C]. In Proceedings of the6th internationalconference on Mobile systems, applications, and services,2008:253-266.
    [52] Mike Burmester,Tri Van Le,Breno De Medeiros,Gene Tsudik. UniversallyComposable RFID Identification and Authentication Protocols[J]. ACM TransInf Syst Secur,2009,12(4):1-33.
    [53] Michael T. Ferreira,Ikechukwu K. Azogu,Hong Liu. Simulation of anti-relayattack schemes for RFID ETC system[C]. In Proceedings of the15thCommunications and Networking Simulation Symposium,2012:1-7.
    [54] Sun Sun Lim,Hichang Cho,Milagros Rivera Sanchez. Online privacy,government surveillance and national ID cards[J]. Commun ACM,2009,52(12):116-120.
    [55] Parvin Asadzadeh,Lars Kulik,Egemen Tanin. Gesture recognition using RFIDtechnology[J]. Personal Ubiquitous Comput,2012,16(3):225-234.
    [56] Dale R. Thompson. RFID technical tutorial[J]. J Comput Sci Coll,2006,21(5):8-9.
    [57] Abdelkarim Mercha. Technology and architecture for deep submicron RFCMOS technology[C]. In Proceedings of the18th annual symposium onIntegrated circuits and system design,2005:4-4.
    [58] A. Anny Leema,M. Hemalatha. A new deferred cleansing technique foreffective warehousing of RFID[C]. In Proceedings of the Second InternationalConference on Computational Science, Engineering and InformationTechnology,2012:626-631.
    [59] Yongli Wang,Jiangbo Qian. Measuring the uncertainty of RFID data based onparticle filter and particle swarm optimization[J]. Wirel Netw,2012,18(3):307-318.
    [60] Leonardo Weiss Ferreira Chaves,Erik Buchmann,Klemens B. Findingmisplaced items in retail by clustering RFID data[C]. In Proceedings of the13th International Conference on Extending Database Technology,2010:501-512.
    [61] Benjamin C. M. Fung,Ming Cao,Bipin C. Desai,Heng Xu. Privacy protectionfor RFID data[C]. In Proceedings of the2009ACM symposium on AppliedComputing,2009:1528-1535.
    [62] Daniel P. McCloskey,Michael E. Kress,Susan P. Imberman,Igor Kushnir,Susan Briffa-Mirabella. From market baskets to mole rats: using data miningtechniques to analyze RFID data describing laboratory animal behavior[C]. InProceedings of the17th ACM SIGKDD international conference onKnowledge discovery and data mining,2011:301-306.
    [63] Roberto De Virgilio,Franco Milicchio. RFID data analysis using tensorcalculus for supply chain management[C]. In Proceedings of the20th ACMinternational conference on Information and knowledge management,2011:1743-1748.
    [64] Elio Masciari. RFID data management for effective objects tracking[C]. InProceedings of the2007ACM symposium on Applied computing,2007:457-461.
    [65] Marco Mamei,Franco Zambonelli. Pervasive pheromone-based interactionwith RFID tags[J]. ACM Trans Auton Adapt Syst,2007,2(2):4.
    [66] Yu Gu,Ge Yu,Na Guo,Yueguo Chen. Probabilistic moving range query overRFID spatio-temporal data streams[C]. In Proceedings of the18th ACMconference on Information and knowledge management,2009:1413-1416.
    [67] Harinda Fernando,Jemal Abawajy. A RFID architecture framework for globalsupply chain applications[C]. In Proceedings of the11th InternationalConference on Information Integration and Web-based Applications&Services,2009:313-320.
    [68] Fred Niederman, Richard G. Mathieu, Roger Morley, Ik-Whan Kwon.Examining RFID applications in supply chain management[J]. Commun ACM,2007,50(7):92-101.
    [69] Florian Resatsch,Stephan Karpischek,Uwe Sandner,Stephan Hamacher.Mobile sales assistant: NFC for retailers[C]. In Proceedings of the9thinternational conference on Human computer interaction with mobile devicesand services,2007:313-316.
    [70] Young M. Lee,Feng Cheng,Ying Tat Leung. Exploring the impact of RFID onsupply chain dynamics[C]. In Proceedings of the36th conference on Wintersimulation,2004:1145-1152.
    [71] Bruce Eckfeldt. What does RFID do for the consumer?[J]. Commun ACM,2005,48(9):77-79.
    [72] Brian L. Dos Santos,Lars S. Smith. RFID in the supply chain: panacea orPandora's box?[J]. Commun ACM,2008,51(10):127-131.
    [73] Edwin van Huis. Strategy follows technology[C]. In Proceedings of the30thannual international ACM SIGIR conference on Research and development ininformation retrieval,2007:1-1.
    [74] Marco Mamei,Renzo Quaglieri,Franco Zambonelli. Making tuple spacesphysical with RFID tags[C]. In Proceedings of the2006ACM symposium onApplied computing,2006:434-439.
    [75] Shaorong Liu,Fusheng Wang,Peiya Liu. Integrated RFID data modeling: anapproach for querying physical objects in pervasive computing[C]. InProceedings of the15th ACM international conference on Information andknowledge management,2006:822-823.
    [76] Yile Wang,Junhuai Li,Jing Zhang,Lei Yu. An indoor tracking algorithm withthe virtual reference based positioning[C]. In Proceedings of the2010ACMSymposium on Applied Computing,2010:568-574.
    [77] Mika Luimula,Kirsti S skilahti,Timo Partala,Sakari Piesk,Juha Alasp.Remote navigation of a mobile robot in an RFID-augmented environment[J].Personal Ubiquitous Comput,2010,14(2):125-136.
    [78] Yi-Chao Chen,Ji-Rung Chiang,Hao-hua Chu,Polly Huang,Arvin Wen Tsui.Sensor-assisted wi-fi indoor location system for adapting to environmentaldynamics[C]. In Proceedings of the8th ACM international symposium onModeling, analysis and simulation of wireless and mobile systems,2005:118-125.
    [79] Christian S. Jensen, Hua Lu, Bin Yang. Graph Model Based IndoorTracking[C]. In Proceedings of the2009Tenth International Conference onMobile Data Management: Systems, Services and Middleware,2009:122-131.
    [80] Imad Afyouni, Cyril Ray, Christophe Claramunt. A fine-grainedcontext-dependent model for indoor spaces[C]. In Proceedings of the2nd ACMSIGSPATIAL International Workshop on Indoor Spatial Awareness,2010:33-38.
    [81] Antonio Coronato,Massimo Esposito,Giuseppe Pietro. A multimodal semanticlocation service for intelligent environments: an application for SmartHospitals[J]. Personal Ubiquitous Comput,2009,13(7):527-538.
    [82] Julian Randall,Oliver Amft,Jurgen Bohn,Martin Burri. LuxTrace: indoorpositioning using building illumination[J]. Personal Ubiquitous Comput,2007,11(6):417-428.
    [83] Hye-Young Kang,Joon-Seok Kim,Ki-Joune Li. sTrack: tracking in indoorsymbolic space with RFID sensors[C]. In Proceedings of the18thSIGSPATIAL International Conference on Advances in GeographicInformation Systems,2010:502-505.
    [84] Richard Kuntschke,Bernhard Stegmaier,Alfons Kemper,Angelika Reiser.StreamGlobe: processing and sharing data streams in grid-based P2Pinfrastructures[C]. In Proceedings of the31st international conference on Verylarge data bases,2005:1259-1262.
    [85] Hyeon-Seok Kim,Chan Jung Park,Seong Baeg Kim. Improvement of JejuNational Museum service using mobile RFID[C]. In Proceedings of the2ndInternational Conference on Interaction Sciences: Information Technology,Culture and Human,2009:1066-1071.
    [86]郇鹏,张仲义.基于射频技术的高速公路不停车收费系统[J].交通运输系统工程与信息,2004,4(2):121-124.
    [87]陈红华,李洁,王文骐等.ETC技术及其发展[J].公路交通科技,2001,18(3):71-74.
    [88] Veneta Dobreva,Martina-Cezara Albutiu,Robert Brunel,Thomas Neumann,Alfons Kemper. Get tracked: a triple store for RFID traceability data[C]. InProceedings of the16th East European conference on Advances in Databasesand Information Systems,2012:167-180.
    [89] Yingjiu Li,Xuhua Ding. Protecting RFID communications in supply chains[C].In Proceedings of the2nd ACM symposium on Information, computer andcommunications security,2007:234-241.
    [90] Thomas S. Heydt-Benjamin,Hee-Jin Chae,Benessa Defend,Kevin Fu. Privacyfor public transportation[C]. In Proceedings of the6th international conferenceon Privacy Enhancing Technologies,2006:1-19.
    [91] Florian Kerschbaum,Leonardo Weiss Ferreira Chaves. Encryption-enforcedaccess control for an RFID discovery service[C]. In Proceedings of the17thACM symposium on Access Control Models and Technologies,2012:127-130.
    [92]刘敏,谢芳全,康庄庄等.RFeel:一种RFID数据管理中间件[J].计算机研究与发展,2010,47(z1):459-464.
    [93] Zhou Zhao,Wilfred Ng. A model-based approach for RFID data streamcleansing[C]. In Proceedings of the21st ACM international conference onInformation and knowledge management,2012:862-871.
    [94]谷峪,于戈,胡小龙等.基于监控对象动态聚簇的高效RFID数据清洗模型[J].软件学报,2010,21(4):632-643.
    [95] R. Jeffery Shawn,J. Franklin Michael,Garofalakis Minos. An adaptive RFIDmiddleware for supporting metaphysical data independence[J]. The VLDBJournal,2008,17(2):265-289.
    [96] Shahina Ferdous, Leonidas Fegaras, Fillia Makedon. Applying datawarehousing technique in pervasive assistive environment[C]. In Proceedingsof the3rd International Conference on PErvasive Technologies Related toAssistive Environments,2010:1-7.
    [97]谷峪.不确定性RFID流数据管理关键技术研究[D].东北大学,2010.
    [98] Violino B. RFID opportunities and challenges[J]. RFID Journal,2003,31.
    [99] A D Rodi. Automation Control-Theory and Practice[M]. InTech,2009.
    [100] Fusheng Wang,Shaorong Liu,Peiya Liu. Complex RFID event processing[J].The VLDB Journal,2009,18(4):913-931.
    [101] Eugene Wu,Yanlei Diao,Shariq Rizvi. High-performance complex eventprocessing over streams[C]. In Proceedings of the2006ACM SIGMODinternational conference on Management of data,2006:407-418.
    [102] Nodira Khoussainova,Evan Welbourne,Magdalena Balazinska,GaetanoBorriello,Garrett Cole,Julie Letchner,Yang Li,Christopher R,#233,DanSuciu,Jordan Walke. A demonstration of Cascadia through a digital diaryapplication[C]. In Proceedings of the2008ACM SIGMOD internationalconference on Management of data,2008:1319-1322.
    [103] Karen Walzer,Alexander Schill,Alexander Loser. Temporal constraints forrule-based event processing[C]. In Proceedings of the ACM first PhDworkshop in CIKM,2007:93-100.
    [104] Peter Darcy,Bela Stantic,Abdul Sattar. X-CleLo: intelligent deterministicRFID data and event transformer[J]. Personal Ubiquitous Comput,2012,16(3):259-269.
    [105] Nihal Dindar,Baris Guc,Patrick Lau,Asli Ozal,Merve Soner,Nesime Tatbul.DejaVu: declarative pattern matching over live and archived streams ofevents[C]. In Proceedings of the2009ACM SIGMOD InternationalConference on Management of data,2009:1023-1026.
    [106] Benjamin Fabian,Oliver G. Security challenges of the EPCglobal network[J].Commun ACM,2009,52(7):121-125.
    [107] Florian Kerschbaum. An access control model for mobile physical objects[C].In Proceedings of the15th ACM symposium on Access control models andtechnologies,2010:193-202.
    [108] Jehan Wickramasuriya, Mahesh Datt, Sharad Mehrotra, NaliniVenkatasubramanian. Privacy protecting data collection in media spaces[C]. InProceedings of the12th annual ACM international conference on Multimedia,2004:48-55.
    [109] Vibhor Rastogi,Dan Suciu,Evan Welbourne. Access control over uncertaindata[J]. Proc VLDB Endow,2008,1(1):821-832.
    [110] Jani Peusaari,Raine Kelkka,Jouni Ikonen. An access control and timemanagement software solution using RFID[C]. In Proceedings of theInternational Conference on Computer Systems and Technologies andWorkshop for PhD Students in Computing,2009:1-6.
    [111] Julius Mueller,Yahya Al-Hazmi,Mohammad Fal Sadikin,Dragos Vingarzan,Thomas Magedanz. Secure and efficient validation of data traffic flows in fixedand mobile networks[C]. In Proceedings of the7th ACM workshop onPerformance monitoring and measurement of heterogeneous wireless and wirednetworks,2012:159-166.
    [112] Tao Li,Samuel S. Wu,Shigang Chen,Mark C. K. Yang. Generalizedenergy-efficient algorithms for the RFID estimation problem[J]. IEEE/ACMTrans Netw,2012,20(6):1978-1990.
    [113] Stefan Sackmann, Jens Strker, Rafael Accorsi. Personalization inprivacy-aware highly dynamic systems[J]. Commun ACM,2006,49(9):32-38.
    [114] Myrto Arapinis,Loretta Mancini,Eike Ritter,Mark Ryan,Nico Golde,KevinRedon,Ravishankar Borgaonkar. New privacy issues in mobile telephony: fixand verification[C]. In Proceedings of the2012ACM conference on Computerand communications security,2012:205-216.
    [115]郭志懋,周傲英.数据质量和数据清洗研究综述.软件学报,2002,13(11):2076-2082.
    [116] Rahm E, Do H H. Data cleaning: Problems and current approaches[J]. IEEEData Engineering Bulletin,2000,23(4):3-13.
    [117] Rizvi S, Jeffery S R, Krishnamurthy S, et al. Events on the edge[C]. InProceedings of the2005ACM SIGMOD international conference onManagement of data. ACM,2005:885-887.
    [118] Shawn R. Jeffery,Minos Garofalakis,Michael J. Franklin. Adaptive cleaningfor RFID data streams[C]. In Proceedings of the32nd international conferenceon Very large data bases,2006:163-174.
    [119] Libe Valentine Massawe,Johnson D. M. Kinyua,Herman Vermaak. ReducingFalse Negative Reads in RFID Data Streams Using an AdaptiveSliding-Window Approach[J]. Sensors,2012,12(4):4187-4212.
    [120] Gu Y, Yu G, Chen Y, et al. Efficient RFID data imputation by analyzing thecorrelations of monitored objects[C]. Database Systems for AdvancedApplications. Springer Berlin Heidelberg,2009:186-200.
    [121] Cocci R, Tran T, Diao Y, et al. Efficient data interpretation and compressionover RFID streams[C]. Data Engineering,2008. ICDE2008. IEEE24thInternational Conference on. IEEE,2008:1445-1447.
    [122] Jeffery S R, Alonso G, Franklin M J, et al. A pipelined framework for onlinecleaning of sensor data streams[C]. Data Engineering,2006. ICDE'06.Proceedings of the22nd International Conference on. IEEE,2006:140-140.
    [123] Haiquan Chen,Wei-Shinn Ku,Haixun Wang,Min-Te Sun. Leveragingspatio-temporal redundancy for RFID data cleansing[C]. In Proceedings of the2010ACM SIGMOD International Conference on Management of data,2010:51-62.
    [124] H. Gonzalez,Han Jiawei,Shen Xuehua. Cost-Conscious Cleaning of MassiveRFID Data Sets[C]. In Data Engineering,2007ICDE2007IEEE23rdInternational Conference on,15-20April2007, Year:1268-1272.
    [125] Chawathe S S, Krishnamurthy V, Ramachandran S, et al. Managing RFIDdata[C]. In Proceedings of the Thirtieth international conference on Very largedata bases-Volume30. VLDB Endowment,2004:1189-1195.
    [126] Wilfred Ng. Developing RFID database models for analysing moving tags insupply chain management[C]. In Proceedings of the30th internationalconference on Conceptual modeling,2011:204-218.
    [127] Ying Hu, Seema Sundara, Timothy Chorma, Jagannathan Srinivasan.Supporting RFID-based item tracking applications in Oracle DBMS using abitmap datatype[C]. In Proceedings of the31st international conference onVery large data bases,2005:1140-1151.
    [128] H. Gonzalez,Han Jiawei,Li Xiaolei,D. Klabjan. Warehousing and AnalyzingMassive RFID Data Sets[C]. In Data Engineering,2006ICDE '06Proceedingsof the22nd International Conference on,03-07April2006, Year:83-83.
    [129] Yu-Ru Lin,Yun Chi,Shenghuo Zhu,Hari Sundaram,Belle L. Tseng. Facetnet:a framework for analyzing communities and their evolutions in dynamicnetworks[C]. In Proceedings of the17th international conference on WorldWide Web,2008:685-694.
    [130] Christopher Re,Julie Letchner,Magdalena Balazinksa,Dan Suciu. Eventqueries on correlated probabilistic streams[C]. In Proceedings of the2008ACM SIGMOD international conference on Management of data,2008:715-728.
    [131] Tam Huynh,Mario Fritz,Bernt Schiele. Discovery of activity patterns usingtopic models[C]. In Proceedings of the10th international conference onUbiquitous computing,2008:10-19.
    [132] Graham Cormode,Minos Garofalakis. Sketching probabilistic data streams[C].In Proceedings of the2007ACM SIGMOD international conference onManagement of data,2007:281-292.
    [133] Boyeon Song,Chris J. Mitchell. RFID authentication protocol for low-costtags[C]. In Proceedings of the first ACM conference on Wireless networksecurity,2008:140-147.
    [134] Chun-Hee Lee, Chin-Wan Chung. Efficient storage scheme and queryprocessing for supply chain management using RFID[C]. In Proceedings of the2008ACM SIGMOD international conference on Management of data,2008:291-302.
    [135] Chun-Hee Lee, Chin-Wan Chung. RFID Data Processing in SupplyChainManagement Using a Path Encoding Scheme. IEEE Transactions onKnowledgeand Data Engineering (TKDE),23(5):742–758,2011.
    [136] Gonzalez H, Han J, Li X. Flowcube: constructing RFID flowcubes formulti-dimensional analysis of commodity flows[C]. In Proceedings of the32ndinternational conference on Very large data bases. VLDB Endowment,2006:834-845.
    [137] Ban C H, Hong B H, Kim D H. Time parameterized interval R-tree for tracingtags in RFID systems[C]. In Database and Expert Systems Applications.Springer Berlin Heidelberg,2005:503-513.
    [138] Zhao Cao,Charles Sutton,Yanlei Diao,Prashant Shenoy. Distributed inferenceand query processing for RFID tracking and monitoring[J]. Proc VLDB Endow,2011,4(5):326-337.
    [139] Laurie Sullivan. RFID Implementation Challenges Persist, All This Time Later.Information Week, Oct2005.
    [140] Barnaby J. Feder. Despite Wal-Mart’s Edict, Radio Tags Will Take Time. NewYork Times, Dec2004.
    [141] EPCglobal. The Application Level Events (ALE) Specification Version1.0.http://www.gs1.org.
    [142] Walsh W E, Wellman M P. Decentralized supply chain formation: A marketprotocol and competitive equilibrium analysis[J]. J. Artif. Intell. Res.(JAIR),2003,19:513-567.
    [143] Lee Y H, Jeong C S, Moon C. Advanced planning and scheduling withoutsourcing in manufacturing supply chain[J]. Computers&IndustrialEngineering,2002,43(1):351-374.
    [144] Pardal M L. Traceability cost model[J].
    [145] Garg D, Narahari Y, Foster E, et al. A mechanism design approach fordecentralized supply chain formation[M]. Planning Production and Inventoriesin the Extended Enterprise. Springer New York,2011:153-183.
    [146] Wu X, Lee M L, Hsu W. A prime number labeling scheme for dynamic orderedXML trees[C]. Data Engineering,2004. Proceedings.20th InternationalConference on. IEEE,2004:66-78.
    [147] Samuel P. On unique factorization domains[J]. Illinois J. Math,1961,5:1-17.
    [148] Baker K A, Pixley A F. Polynomial interpolation and the Chinese remaindertheorem for algebraic systems[J]. Mathematische Zeitschrift,1975,143(2):165-174.