Skip to main content
Log in

Treasures status monitoring based on dynamic link-sensing

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Locating problem has attracted more and more attention in mobile computing and crowd sensing research. Different from other applications, the fundamental task of intelligent protection of historic relic is to determine the position and posture of the treasure at the same time, as well as identifying the stock and monitoring the tourists. Some existing works usually focus on identity recognition and tourist action, however, they can’t monitor the treasure’s information including its position and posture which could be changed due to the slight shock. In this paper, we present the design and implementation of a historical relic position monitoring system (HPMs) based on passive RFID tags which is not only a simple device for identification but becomes a crucial approach of crowd sensing. By observing and analyzing the character of wireless signal, HPMs can estimate the treasure position and further judge its posture. In position estimation phase, we design a dynamic threshold to improve the accuracy of location. In posture judging phase, we propose the multi-link protocol to detect the posture change. Extensive simulations and real environment experiments illustrate the accuracy and efficiency of HPMs in historical relic protection.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19

Similar content being viewed by others

References

  1. Baldauf M, Dustdar S, Rosenberg F (2007) A survey on context-aware systems. International Journal of Ad Hoc and Ubiquitous Computing 2(4)

  2. Ren Q, Dunham, M.H. (2000) Using semantic caching to manage location dependent data in mobile computing. In Proceedings of the ACM International Conference on Mobile Computing and Networking (Mobicom’00), ACM, Boston, pp.210–221

  3. Guo B, Wang Z, ZW Y, Wang Y, Yen NY, Huang RH, Zhou XS (2015) Mobile crowd sensing and computing: the review of an emerging human-powered sensing paradigm. ACM Comput Surv 48(1):1–31

    Article  Google Scholar 

  4. Chen YF, Crespi N, Lv L, Ortiz A.M, Shu L. (2013) Locating using prior information: wireless indoor localization algorithm. In Proceedings of the ACM conference on Special Interest Group on Data Communication (SIGCOMM’13), ACM, Hong Kong, pp. 463–-464

  5. Wang J, Gao QH, Wang HY, Chen P, Xin KF (2015) Device-free localization with multidimensional wireless link information. IEEE Trans Veh Technol 64(1):356–366

    Article  Google Scholar 

  6. Zhang YM, He SB, Chen JM (2016) Data Gathering Optimization by Dynamic Sensing and Routing in Rechargeable Sensor Networks. ACM/IEEE Transactions on Networking 24(3):1632–1646

    Article  Google Scholar 

  7. Xiao F, Sha CH, Chen L, Sun LJ, Wang RC. (2015) Noise-tolerant Localization from Incomplete Range Measurements for Wireless Sensor Networks. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM’15), IEEE, Hong Kong, pp. 2794–-2802

  8. Liu ZD, Li ZJ, Li M, Xing W, Lu DM. (2014) Path Reconstruction in Dynamic Wireless Sensor Networks Using Compressive Sensing. In Proceedings of the ACM international symposium on Mobile ad hoc networking and computing (MobiHoc’14), ACM/IEEE, Pennsylvania, pp. 297–-306

  9. Liu TC, Yang L, Lin QZ, Guo Y, Liu YH. (2014) Anchor-free backscatter positioning for RFID tags with high accuracy. In Proceedings of IEEE International Conference on Computer Communications (INFOCOM 14′’), IEEE, Toronto, pp. 379- 387

  10. Dong GZ, Tan H, Chen R (2011) Applications of RFID Technology in Intelligent Museums. Software industry and. Engineering 11(5)

  11. Liiv I, Tammet T, Ruotsalo T, Kuusik A. (2009) Personalized Context-Aware Recommendations in SMARTMUSEUM: Combining Semantics with Statistics. In Proceedings of International Conference on Advances in Semantic Processing, IEEE, Sliema, pp. 50–-55

  12. Luo H, Tao HX, Ma HD, Das S.K. (2011) Data fusion with desired reliability in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 3, PP. 501–513

  13. Liu HB, Yang J, Sidhom S, Wang Y, Chen YY, Ye F (2014) Accurate WiFi based localization for smartphones using peer assistance. IEEE Trans Mob Comput 13(10):2199–2214

    Article  Google Scholar 

  14. Zhu WP, Cao JN, Chan H, Liu XF (2014) Mobile RFID with a high identification rate. IEEE Trans Comput 63(7):1778–1792

    Article  MathSciNet  Google Scholar 

  15. Ni LM, Liu YH, Lau YC, Patil AP (2004) LANDMARC: indoor location sensing using active RFID. Wirel Netw 10(6):701–710

    Article  Google Scholar 

  16. Liu XL, Xiao B., Li KQ, Wu J, Liu A.X, Qi H, Xie X. (2015) RFID cardinality estimation with blocker tags. In Proceedings of IEEE International Conference on Computer Communication (INFOCOM’15), IEEE, Hong Kong, pp.1679–-1687

  17. Guo B, Chen HH, ZW Y, Xie X, Huangfu SL, Zhang DQ (2015) FlierMeet: a mobile Crowdsensing system for cross-space public information reposting, tagging, and sharing. IEEE Trans Mob Comput 14(10):2020–2033

    Article  Google Scholar 

  18. Yang L, Chen YK, Li XY, Xiao CW, Li M, Liu YH. (2014) Tagoram: real-time tracking of mobile RFID tags to high precision using COTS devices. In Proceedings of the ACM International Conference on Mobile Computing and Networking (Mobicom’14), ACM, Hawaii, pp. 237–-248

  19. Wang J, Adib F, Knepper R, Katabi D, and Rus D. (2013) Rf-compass: robot object manipulation using rfids. In Proceedings of the ACM International Conference on Mobile Computing and Networking (MobiCom 13′), ACM, Miami, pp. 3–14, 2013

  20. He SB, Chen JM, Li X, Shen XM, Sun YX (2014) Mobility and intruder prior information improving the barrier coverage of sparse sensor networks. IEEE Trans Mob Comput 13(6):1268–1282

    Article  Google Scholar 

  21. Yang L, Lin QZ, Li XY, Liu CH, Liu YH. (2015) See Through Walls with COTS RFID System! In Proceedings of the ACM International Conference on Mobile Computing and Networking (MobiCom’15), ACM, Paris, pp. 487–-499

  22. Xiao F, Yang XK, Yang M, Sun LJ, Wang RC, Yang PL (2016) Surface Coverage Algorithm in Directional Sensor Networks for 3D Complex Terrains. Tsinghua Science and Technology 21(4):397–406

    Article  Google Scholar 

  23. Xu LM, Deng ZL, Ren WZ, Wang H. (2008) A Location Algorithm Integrating GPS and WSN in Pervasive Computing. In Proceedings of the 3rd International Conference on Pervasive Computing and Applications (ICPCA’08), IEEE, Beijing, pp. 461–-466

  24. Drawil NM, Amar HM, Basir O (2013) GPS localization accuracy Classi- fication: a context-based approach. IEEE Trans Intell Transp Syst 14(1):262–273

    Article  Google Scholar 

  25. Guo Y, Huang KD, Jiang NY, Guo XM, Li YF, Wang GL (2015) An exponential-Rayleigh model for RSS-based device-free localization and tracking. IEEE Trans Mob Comput 134(3):484–494

    Article  Google Scholar 

  26. Adib F, Kabelac Z, Katabi D, Miller R.C. (2014) 3D Tracking via Body Radio Reflections. In Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation (NSDI’14), ACM, Seattle, pp. 317–-329

  27. Lasla N, Younis MF, Ouadjaout A, Badache N (2015) An effective area-based localization algorithm for wireless networks. IEEE Trans Comput 64(8):2103–2118

    Article  MathSciNet  Google Scholar 

  28. Zheng YQ, Li M, (2013) ZOE: Fast cardinality estimation for large-scale RFID systems. In Proceedings of IEEE International Conference on Computer Communication (INFOCOM’13), IEEE, Turin, pp. 908–916

  29. Parr A, Miesen R, Vossiek M (2013) Inverse SAR approach for localization of moving RFID tags. In Proceedings of IEEE International Conference on RFID (RFID’13), IEEE, Penang, pp. 104–109

  30. Zheng YQ, Li M. (2014) Read bulk data from computational RFIDs. In Proceedings of IEEE International Conference on Computer Communications (INFOCOM 14′’), IEEE, Toronto, pp. 495–503

  31. Xu HP, Liu H. (2011) The Museum Access and Historical relic Manage System based on RFID technology. In Proceedings of 6th International Conference on Pervasive Computing and Applications (ICPCA’11), IEEE, Port Elizabeth pp. 22–-25

  32. Khoo B. (2011) RFID from Tracking to the Internet of Things: A Review of Developments. In Proceedings of the IEEE/ACM Int’l Conference on Green Computing and Communications and Int’l Conference on Cyber, Physical and Social Computing, IEEE/ACM, Hangzhou, pp. 94–-107

  33. Hameed B, Khan I, Durr F, Rothermel K. (2010) An RFID Based Consistency Management Framework for Production Monitoring In a Smart Real-Time Factory. In Proceedings of the Internet of Things (IOT'’10), IEEE, Tokyo, pp. 1–-8

  34. Shangguan LF, Li ZJ, Yang Z, Li M, Liu YH, Han JS (2012) OTrack: Towards order tracking for tags in mobile RFID systems. IEEE Transactions on Parallel and Distributed Systems 25(8):2114–2125

    Article  Google Scholar 

  35. XIN R, Wang XM (2012) Research of museum relics manage system based on RFID technology. Computer and digital. Engineering 40(3):40–42

    Google Scholar 

  36. Ayala I, Amor M, Pinto M, Fuentes L, Gamez N (2014) iMuseumA: An Agent-Based Context-Aware Intelligent Museum System. Sensors 14(11):21213–21246

    Article  Google Scholar 

  37. ZY Y, Zhou XS, ZW Y, Park JH, Ma JH (2008) iMuseum: a scalable context-aware intelligent museum system. Comput Commun 31(18):4376–4382

    Article  Google Scholar 

  38. Wang J, Katabi D. (2013) Dude, where’s my card?: Rfid positioning that works with multipath and non-line of sight. In Proceedings of Special Interest Group on Data Communication (SIGCOMM'’13), ACM, Hong Kong, pp. 51–-62

  39. Rappaport TS (1996) Wireless communications: principles and practice. New Jersey, Prentice Hall PTR 1996

  40. Zhang H, Cheng P, Shi L, Chen JM (2016) Optimal DoS attack scheduling in wireless networked control system. IEEE Transactions on Control System Technology 24(3):843–852

    Article  Google Scholar 

  41. Chen JM, Xu WQ, He SB, Sun YX, Thulasiraman P, Shen XM (2010) Utility-based asynchronous flow control algorithm for wireless sensor networks. IEEE Journal on Selected Areas in Communications 28(7):1116–1126

    Article  Google Scholar 

  42. Xiao F, Xie XH, Jiang ZF, Sun LJ, Wang RC (2016) Utility-aware Data Transmission Scheme for Delay Tolerant Networks. Peer-to-Peer Networking and Applications 9(5):936–944

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xia Zheng.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xing, T., Xie, B., Xian, T. et al. Treasures status monitoring based on dynamic link-sensing. Peer-to-Peer Netw. Appl. 10, 780–794 (2017). https://doi.org/10.1007/s12083-016-0508-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-016-0508-6

Keywords

Navigation