- About this Journal ·
- Abstracting and Indexing ·
- Aims and Scope ·
- Annual Issues ·
- Article Processing Charges ·
- Author Guidelines ·
- Bibliographic Information ·
- Citations to this Journal ·
- Contact Information ·
- Editorial Board ·
- Editorial Workflow ·
- Free eTOC Alerts ·
- Publication Ethics ·
- Recently Accepted Articles ·
- Reviewers Acknowledgment ·
- Submit a Manuscript ·
- Subscription Information ·
- Table of Contents
International Journal of Distributed Sensor Networks
Volume 2013 (2013), Article ID 148353, 12 pages
Tracer: Taming Anomalous Events with CRFID Tags for Trajectory Management
1School of Electronic and Information Engineering, Xi’an Jiaotong University, China
2Fok Ying Tung Graduate School, Hong Kong University of Science and Technology, Hong Kong
Received 3 July 2013; Accepted 8 September 2013
Academic Editor: Yuan He
Copyright © 2013 Rui Li et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Mitigating anomalies are crucial for trajectory management in logistics and supply chain systems. Among variant devices for trace detection, computational radio frequency identification (CRFID) tags are promising to draw precise trajectory from the data reported by their accelerometers. However, full coverage of the processing flow using RFID readers is usually cost inefficient, sometimes impractical. In this paper, we propose to employ CRFID tags as tagging devices and develop a working system, Tracer, for precise trajectory detection. Instead of covering the entire processing area, Tracer only deploys RFID readers in essential regions to detect the mishandling, loss, and other abnormal states of items. We design a tree-indexed Markov chain framework, which leverages statistical methods to enable fine-grained and dynamic trajectory management. Results from a preliminarily deployment on a real baggage handling system and trace-driven simulations demonstrate that Tracer is effective to detect the anomalous events with low cost and high accuracy.
Trajectory management is of importance to manage and control objects for inventory, logistics, and supply chain applications (for simplicity, we term those applications as logistics systems in the rest of this paper). There is a notoriously difficult problem in those logistics systems: achieving fine-grained trajectory management to timely report anomalous events of objects. For example, the air transport industry (ATI)  reported 25.8 million mishandled bags globally in 2011, which tenders to a $2.58 billion profit mitigation. In particular, about 53% cases occurred during the transfer processes, where the precise luggage tracking solution is lacking.
Prior works have adopted video cameras, cell phones, radio frequency identification (RFID) tags, and sensors to track movements of persons or objects for detecting whether the trajectories are in “normal” or “abnormal” situations. However, existing solutions have their intrinsic drawbacks. For example, video camera based monitoring  is cumbersome due to its fixed angle, inaccurate automatic video analysis, irregular activity detection, and high deployment cost. GPS-based cell phones  are cost inefficient if being implemented to locate numerous objects in large-scale logistics systems. People also use wearable sensors for personal localization and motion capturing , but those sensors are easily susceptible to interferences from other wireless devices and environments. RFID based systems often adopt active [5, 6] or passive  tag arrays to track the objects. Active tags have a penalty of high cost and poor scalability when replacing battery in the real deployment [6, 7]. Being low-cost and power-free, passive RFID tags have been widely used in logistics systems. However, passive tags can only report their IDs to the reader and hence support the trajectory management in far coarse granularity. If one tagged bag falls out of the conveyor, while still staying in the interrogation region of the reader, as shown in Figure 1 (we define such a situation as an anomalous event in the following), it is difficult to timely detect such an anomalous event. The anomalous event may be reported after a long period, causing unacceptable delivery delay or even loss of the passenger luggage.
With the disadvantages of the previous works in mind, we are motivated to pursue a precise trajectory management solution for logistics systems. Recently, the battery-free computational RFID (CRFID) tag [8, 9] is appealing to provide more context-aware information about objects. We propose to adopt CRFID tags in our trajectory management systems. Specifically, the collected vibration information from the 3D accelerometer allows CRFID tags to precisely and promptly detect the changes of objects trajectories, from which the legitimate trajectory pattern of objects can be derived.
To achieve this goal, we propose a CRFID based approach, Tracer, to obtain objects moving patterns for trajectory management. If the obtained patterns are anomalous, Tracer can alert the administrator to deal with the relevant objects in real time. Nevertheless, it is time consuming and costly to collect and process the accelerometer data from tags along the entire process flow in large-scale logistics systems. This becomes a key barrier that limits efficient processing and analysis of Tracer. We solve the problem twofold. First, instead of monitoring an object across the whole system, Tracer only interrogates the tags within the essential surveillance regions, such as the unloading point and junction areas between two conveyors (as shown in Figure 2). With the data collected from those essential segments, Tracer can reconstruct the trajectories of objects. Second, we adopt an efficient tree-indexed Markov chain framework into Tracer to detect the anomalous trajectories. The framework characterizes the legitimate patterns of objects based on the acceleration data. In particular, our framework takes the advantage of statistical methods for trajectory detection, which enables Tracer to be with relatively low deployment overhead and high accuracy of trajectory detection. The main contributions of our work are summarized as follows. (1)To the best of our knowledge, Tracer is among the first efforts to leverage CRFID devices for fine-grained trajectory management in real logistics applications. (2)Tracer adopts a tree-indexed Markov chain framework to reconstruct and monitor the trajectory patterns of objects. With the real accelerometer data as the input, this framework enables Tracer to react accurately and promptly upon anomalous events. (3)We perform extensive trace-driven simulations and preliminary implementation in a real baggage handling system in Beijing Airport. The result demonstrates the feasibility and effectiveness of Tracer.
The remainder of this paper is organized as follows. We provide an overview of related works in Section 2. In Section 3, we introduce backgrounds and fundamental observations that motivated this work. Section 4 elaborates the design of Tracer. In Section 5, we present the simulation results and evaluation. In Section 6, we conclude this paper and propose future direction.
2. Related Work
2.1. Motion and Body Trajectory
Motion capturing has been well studied in the body sensor networks and passive tag-based RFID systems, such as [4, 10–14]. The authors in  proposed a data processing technique that constructs motion transcripts from inertial sensors and identifies human movements by involving collaboration among the nodes into identification. Their work, however, targets on the distributed action recognition algorithm, while ignoring the detection of anomalous patterns that may affect the accuracy of movement classification. Klingbeil and Wark  proposed an indoor wireless sensor network (WSN) based approach for monitoring human motion and position. Their work requires prior knowledge about the environment, such as indoor map and seed nodes, to provide accurate position. Young et al.  presented an efficient distributed method which uses a model of the subject’s body structure to estimate and correct for linear acceleration. The work in  proposed a WSN based mobile countersniper system to estimate the trajectory and range of snipers, as well as the caliber and type of their weapons. Existing works in the literature mainly focus on motion or body trajectory. They seldom adopt efficient frameworks to judge whether the data is accurate for motion capturing  and trajectory management [12, 15]. The work in  reported an RFID positioning system that leverages antenna arrays to localize tags under non-line-of-sight and rich multipath environments. In this paper, we adopt a tree-indexed Markov chain framework to detect whether the accelerometer data collected from CRFID tags is accurate, in order to yield a fine-grained trajectory management.
2.2. Vibration and Detection
Vibration is always an important factor for detecting various object behaviors in many applications [3, 5, 17–21]. In , the authors used sensor nodes to monitor hand-arm vibrations, which is important for monitoring health conditions of workers. Cell phones are used for movement detection  but usually with constraints imposed by the inaccuracy of commodity sensors and the limited battery power. For achieving efficient trajectory detection, the authors in  provided a mobility estimation and prediction for GSM networks. Their system is similar to the wireless ad hoc structure. Active RFID techniques [5, 7] are also adopted for activity monitoring using frequent trajectory pattern mining . But the scalability problem  is a challenging issue due to the predeployment of tag array and poor scalability caused by the battery replacement. The work proposed in  aims to discover anomalous driving patterns from taxi’s GPS traces for detecting driving frauds or controlling the traffic in modern cites. For enabling the vibration and trajectory detection, prior works often deploy high-cost sensing devices or complex deploy strategies but still suffer from coarse granularity in trajectory detection. In this paper, we aim at providing an efficient trajectory management solution with only low-cost CRFID tags, which highlights the implementation of Tracer.
3. Backgrounds and Motivating Examples
In this section, we show the background of CRFID tags and observations that reflect the feasibility of adopting accelerometer-enabled CRFID tags to identify the anomalous trajectories of objects. The “normal” situation means that the luggage is moving along the legitimate path on the conveyor. “Abnormal” situation describes that the luggage may meet any anomalies that occurred in the procedure of transportation. We present four kinds of trials to illustrate our observation.
3.1. Computational RFID Tags
In our system, we select passive WISP tags as the CRFID tagging devices. WISP tags are developed by Intel. The WISP tag is compatible with the EPC protocol . A WISP tag is embedded with a 16-bit MCU (8 MHz clock rate, 8 KB flash memory, and 256 B RAM). As the first programmable passive RFID system, WISPs have been implemented to sense light, temperature, strain, and so forth. Specifically, the WISP tag has an onboard 3D accelerometer, which can sense the vibration and report the data of the three-axis to the backend server. We then leverage this function to support the moving pattern training and discrimination of trajectories. Note that Tracer only needs the accelerometer data of WISP tag. We will develop tailored and low-cost CRFID tags based on WISP in our future work.
3.2. Acceleration Pattern of Moving Objects
We report the average results of 30 similar moving traces of the tag. For visualization, only accelerometer readings are shown in Figure 3 and measured in degrees. Figure 3(a) shows the acceleration changes collected from a stable WISP tag, and the degrees around each axis remain stable over time. We chose various WISP tags and found the noise from WISP tags with a magnitude generally no larger than 7°. Thus, if the change of degrees is not larger than 7° on any axis, the object keeps static. When the WISP tag moves along a line, the acceleration changes smoothly with a magnitude no larger than 50° between two adjacent sample points, as shown in Figure 3(b).
Figures 3(c) and 3(d) show the accelerometer data produced by two typical movements in critical areas. We find that continuous fluctuations over 80 ms indicate turns at the corners, and the sudden drops can lead to severe accelerometer data changes over 200° on horizontal axis. Therefore, it is easy to build the correlation between the movement and the collected data using a simple training process, like CART or PCA . Each movement sample can be classified into a specific moving pattern, with which we can form the normal pattern of moving objects along legitimate routes.
4. Trajectory Management Framework
In this section, we first introduce the design of our CRFID based logistics system. We then present the tree-indexed Markov chain framework. By adopting our statistical framework, we can efficiently detect the anomalous trajectories instead of passive tag-based solutions. Table 1 summarizes some important notations used in this paper.
4.1. Framework Overview
Our computational RFID-based logistics system consists of WISP tags, RFID readers, and backend server. We employ off-the-shelf RFID readers which follow the EPC standard . The system architecture is illustrated in Figure 4. At the essential processing areas in logistics applications, we deploy RFID readers for monitoring. We attach each object, for example, a piece of luggage or a package containing a valuable item, with a WISP tag. The backend sever can log the trace of each WISP tag from its accelerometer data.
Our framework works in three phases.
In the first phase, we formulate the whole system status into a tree-indexed Markov chain. Before the real implementation, we perform a training process on all behaviors of tags to derive the legitimate patterns of correct trajectories’ transition probability matrix .
In the second phase, we then conduct a composite hypothesis test to verify whether the sequence has been generated from the legitimate trajectories () or other unknown trajectories generated from law .
In the third phase, we can derive the valid patterns from those legitimate trajectories and decide whether the trace of a given tag is “normal” or “abnormal” based on those patterns.
4.2. System Model and Problem Statement
We consider a general tree-indexed Markov model that represents the moving pattern of objects on the conveyor. The tree is initialized based on the data derived from the trained trajectories. When an object enters the system, its state will correspond to a node in the tree. If an object’s state is stable for a period, it will stay in the current node during this period. When its acceleration data changes in various forms, the object will transfer from its current node to one of its child nodes in the tree. There are two types of events that may cause acceleration change, turning, and dropping. Thus, the tree is a binary tree in our system. In the tree, an object moves to its left child if it experiences a drop, otherwise to its right child after a turn. For example, in Figure 5, when an object enters the system, it first turns in one conveyor. Later, it drops to another conveyor and then turns again. Correspondingly, the object traverses the tree along the path represented by the bold line. Based on the trained trajectory, we can initialize the tree containing legitimate trajectories of objects. The problem thereby becomes as follows: given all objects and their paths in the tree, how to detect the anomalous events?
Consider the example in Figure 5 again. If the object stays at a node for a long period that exceeds some time-out setting, or its path extends to some unknown states in the tree, an anomalous event may occur. For example, if an object drops out of the conveyor at the “A” point, it generates an unknown state, marked with a dash line in the tree. In this case, we need a proper tool to decide whether the corresponding trajectory is anomalous or not, where Tracer enters the picture.
Let the tree , where , , and denote the root, vertices, and edges, respectively. Each node in the tree represents a state selected from a finite set . We use to denote the state of node . Without loss of generality, we select . Then, we give a discrete probability law on and a transition probability matrix .
From the illustration of the tree-indexed Markov model, the problem we studied can be stated as follows.
First, we construct a new random tree starting from the root . We independently select nodes form as the ’s children. The is determined according to a discrete probability distribution such that . We then allocate a state to each node. Let represent the state of the random tree. For each node , let represent its states, conditioned on the state of its parent node by adopting the transition probability matrix . Here, we employ the acceleration pattern as a source of calculating .
In the application of trajectory management, if an anomalous event happens on one node, the trajectory tree remains stable. Furthermore, we suppose that a state measures a vector of quantities in its situation and passes the state information on to all nodes. We consider a fixed time interval [0, ] and define the state of a node depending on the average value of in [0, ] and the corresponding values of nodes that communicate with . As a consequence, the state of the children is influenced by the state of the parent.
Then, the transition probability matrix can be estimated from a sequence of past observations from the accelerometer data. The question now can be transformed as, given a recent trace of states (implying a path in the tree), we seek to detect whether this sequence has been generated from the law or from other unknown law . We aim to differentiate between a known law (hypothesis ) and an unknown law (hypothesis ) using composite hypothesis testing, and a decision test could be defined as follows.
Definition 1. A decision test is a sequence of maps with the interpretation that when is observed, is accepted ( is rejected) if ; otherwise is accepted ( is rejected) if .
The accuracy of a decision test is characterized by the type I and type II errors, which is known as false positive (FP) errors and false negative (FN) errors. The probabilities that the two types of errors occur are where is a probability evaluated by law . Since we cannot minimize both error probabilities at the same time, we consider the optimal criterion known as generalized Neyman-Pearson criterion .
Definition 2 (generalized Neyman-Pearson criterion). For a given , if a test is optimal among all tests that satisfy the test maximizes the asymptotic exponent of the FN error probability.
4.3. Probability of Anomalous Events
We consider a determinate instance of the random tree and a realization of the tree-indexed Markov chain, that is, a recent leaf-root path. Indeed, this path reflects the continuous state changes of the logistics system. The large deviation results can figure out the probability of anomalous events occurring under the condition mentioned in Section 4.2.
We define the empirical pair measure as where (, ) denotes an edge of the tree between the parent and child .
The authors in  prove a large deviation principle for with a -nodes tree. They assume the tree is critical. The assumption can be relaxed by redefining the . For each probability law on we let and denote the two marginals, so that and .
Let denote the convex dual of the generating function of the offspring law : It is known as Cramer’s theorem  that is the large deviation rate function correlated with the law . Therefore, we define as the vector with elements , , and let indicate strict inequality between vectors.
Theorem 3. Assume that is a tree with offspring law such that , , and . Let be a Markov chain indexed by , which initially follows arbitrary distribution and an irreducible transition probability matrix . Then, for , the empirical pair measure conditioned on satisfies a large deviation principle in the space of probability vectors on with speed . The good rate function is where denotes the relative entropy between two probability vectors defined in  and and are the first and second marginal of and .
Note that the first term in (5) characterizes large deviations of the assignment of states to the nodes, while the second term is related to the structure of the tree. In fact, we could also adopt the result to deal with noncritical trees, since non-critical trees are also important for detecting anomalous object states.
4.4. Anomalous Trajectory Detection Test
In this section, we propose an anomalous trajectory detection test that can detect the anomalous trajectories with minimized false negative error. Therefore, we need to demonstrate the detection test is optimal in a generalized Neyman-Pearson criterion.
Given a sequence of realizations of the tree-indexed Markov chain, the tree is with nodes. We can approximate the offspring law and the transition probability matrix by taking the corresponding samples. Specifically, if is an empirical measure of the th realization (3), then converges to with the probability approaching one as . Alternatively, we can compute the frequencies on a single large tree when .
Suppose that we have estimated and from the previous trajectories. and determine whether a specific realization is anomalous. As discussed in Section 4.2, we need to differentiate and (hypothesis ) from other unknown law (hypothesis ).
Then, we denote the empirical measure of derived from (3) by , where the superscript indicates that the tree has nodes. The following theorem provides an optimal test for the tree-indexed Markov chain, which is the test of anomalous trajectory detection.
Theorem 4. The decision test is optimal according to the generalized Neyman-Pearson criterion.
As we concentrate on the anomaly detection approaches, proof of the theorem has been omitted, and a similar proof can be found in .
Based on these theories, the anomalous decision test can be executed in our system in order to judge whether the moving objects obey the legitimate patterns of correct trajectories’ transition probability matrix . If the decision test accepts the hypothesis , that addresses the trace is collected from a correct path of tree ; otherwise, otherwise, the decision test will accept and conclude that the trace is collected from anomalous trajectories. Furthermore, we can derive the valid patterns from those legitimate trajectories and decide whether the trace of a given tag is “normal” or “abnormal” based on those patterns.
We conduct trace-driven simulations and evaluate Tracer over training data sets and several real test samples. We perform the preliminary deployment of Tracer on the baggage handling system (BHS) at Terminal 2 of Beijing Airport, as shown in Figure 6.
5.1. Experimental Setup
During the implementation, we face a challenging issue of the interrogation range. The interrogation range depends on the communication range of backward channel. The reader usually adopts pulse-interval encoding (PIE) mechanism to code commands or data. This selection enables easy demodulation for the extremely resource-limited tags. On the contrary, the tag employs Miller 4 as the encoding mechanism for high throughput as well as low bit error rate. Meanwhile, much more energy consumed by MCU and sensors on WISP tags further shortens the interrogation range significantly compared to common passive tags .
In addition, existing commercial readers do not provide programming interfaces to achieve fine-grained interrogation parameters tuning. As a result, the communication between commercial readers and WISP tags is not well optimized. Therefore, we develop the reader specifically tailored for our system but still compatible with the EPC C1G2 Air protocol  and following the FCC regulation. It works on the frequency of 860–960 MHz and transmits at a power of 30 dBm over 8 dBi gain circularly polarized antennas. The interrogation range of tags can be expended to 1.5–3 m.
In our preliminary implementation, we test Tracer over 6 flights. We randomly attach WISP tags to some volunteer passengers’ luggage. The information of the passenger, for example, the flight number, is encoded and stored into the EPC field in the bag. Those bags then enter into the sorting area of BHS. The size of sorting area is around 50 m 20 m, with a rectangle belt conveyor and an incline belt conveyor. We deploy the RFID reader into two types of the processing regions, the junction between two conveyors and the corners of conveyors, as shown in Figure 7. The bags are sorted based on flight numbers. Tracer jointly works with the BHS. As we present in Section 3, the data collected by Tracer includes 6 dimensions, including the time of detection, sensor type, EPC code, and three-axis accelerometer data. Tracer injects the collected accelerometer data into its tree-based Markov chain framework and reports the anomalous trajectories of luggage during the process in real time. From the traces collected from WISP tags, we generate 3000 data sets for simulating large-scale logistics systems. Later, we also employ the real trace to examine the soundness of our simulation results.
5.2. Metric and Methodology
In our experiments, we employ the following metrics to evaluate the performance of Tracer.
Response time: we define the response time as the time that Tracer will consume after the anomalous events happen. This is a critical parameter to reflect the efficiency of Tracer in real logistics applications.
Error probability: we evaluate the accuracy of Tracer using the number of errors. There are two major types of errors that may occur in Tracer, false positive (FP) error and false negative (FN) error, as we have discussed in Section 4.2. An FP error means that Tracer reports an anomalous trajectory which indeed does not happen, while an FN error means that Tracer fails to report an anomalous trajectory which has really happened.
Following the model of Tracer proposed in Section 4.2, a tree is generated with an estimated probability distribution. The nodes in the tree monitor anomalous events and for each observed event, they send information back to the root. In our simulations, the events at each node occur according to independent Poisson processes. Our goal is to detect changes in the event generation rates as described in Section 4.4. The offspring law is uniform in . It can be easily found that the state of each node depends on the average times of event happening per unit time through the node. The average times of event happening are mapped to 10 states. The transition probability matrix is estimated from anomaly free traces.
Considering a determinate tree, the empirical measure is calculated in a distributed way; each node keeps a vector of counts of downstream nodes in a certain state. When a node changes its state, the corresponding value in this vector is changed and this update is propagated up the tree. Note that distributed computation is useful in implementing anomalous trajectory detection techniques. We employ the detection test of Theorem 3, where the anomaly free law and can be calculated from observations before the anomaly is introduced. We deliberately generate an anomalous trace which interferes with a state change on the tree. As a result, the node changes its parent and the anomalous trajectory can be detected.
5.3. Accuracy of Tracer
To aid the detection, we utilize trained data of “normal” trajectories as the ground truth. Consequently, Tracer can make correct decision during the trajectory detection. Tracer adopts the large deviation rule as described in Section 4.3. To testify the effectiveness of our method, we compare the large deviation rule adopted by Tracer with other average rules. The average rules are coming from grouped samples. We divide the trace into several groups (5, 10, 20, and 30) based on their depth of the tree. Average measurements are collected from the samples in the same group and compared to a threshold, which is derived from the estimation on our traces. If any groups that deviate from the threshold, then an anomalous event is detected.
The comparison results between Tracer (large deviation rule) and other average rules are reported in Figures 8–11. Figures 8 and 9 show that the FP error of large deviation rule is 1.5x smaller and 4x smaller than all average rules under linear scale and log scale, respectively. Figures 10 and 11 show the FN error in linear scale and log scale under different rules, and Tracer outperforms average rules (5 groups) almost 1x and 2x, respectively. Figures 15 and 16 plot the CDF of FP error probability and CDF of FN error probability. Both of the two figures demonstrate that the FP and FN error probability of Tracer are relatively smaller than other average rules. Figure 18 describes the detection accuracy of Tracer by adopting large deviation result; it outperforms other situations as expected. The ROC curves shown in Figure 19 are drawn for Tracer and other average rule approaches. The result demonstrates that the large deviation rule outperforms all average rules; that is, the large deviation rule has the smallest FN error probability for any fixed FP error probability.
It is clear that the amount of FP errors induced by Tracer is static. This demonstrates that Tracer performs well in terms of accuracy as well as scalability.
5.4. Efficiency of Tracer
From Figure 17, the average response time is calculated from 30 trials. Tracer remains a little longer than the theoretical results when the average response time is under 800 ms. Tracer performs better when the average response time is above 800 ms. With a relatively high average response time, the result of Tracer converges faster than the theoretical result.
Figure 12 shows the comparison between the minimum response time and maximum response time with 30 trials. The result demonstrates that the gap between the minimum response time and maximum response time is small, which provides us an efficiency guarantee on using Tracer to detect anomalous trajectory in logistics systems.
Figure 13 shows the response time comparison under different rules. We find that, in 70% of cases, the response time of Tracer is under 500 ms, indicating that Tracer outperforms other average rule methods; the detection response time is always at an acceptable state. Figure 14 describes the time used for the tree generation of the tree-indexed Markov model, and the tree generation time of other approaches is no better than Tracer.
In this paper, we propose a tree-indexed Markov chain to characterize the movements of objects in logistics applications. By adopting the statistical test and CRFID tags, our approach, Tracer, can effectively detect anomalous trajectories. Specifically, our framework is general to be applied for statistically detecting significant temporal or spatial changes. We believe this is a step towards fine-grained anomalous trajectory detection in logistics applications, even though some future works, for example, developing cost-efficient CRFID tags, are necessary before a large-scale deployment. We also expect that the experience achieved in this work can give useful design guidance of trajectory management to future logistics applications.
The authors thank the anonymous reviewers for their insightful comments and feedbacks. This work is partially supported by the NSFC Major Program under Grant 61190112, the NSFC under Grants 61373175 and 61228202, and the Fundamental Research Funds for the Central Universities of China under Project no. 2012jdgz02 (Xi’an Jiaotong University).
- SITA, “Baggage report 2012,” 2012, http://www.sita.aero/content/baggagereport-2012.
- A. Yilmaz, O. Javed, and M. Shah, “Object tracking: a survey,” ACM Computing Surveys, vol. 38, no. 4, p. 13, 2006.
- K. A. Li, T. Y. Sohn, S. Huang, and W. G. Griswold, “Peopletones: a systemfor the detection and notification of buddy proximity on mobile phones,” in Proceedings of the International Conference on Mobile Systems, Applications, and Services, June 2008.
- L. Klingbeil and T. Wark, “A wireless sensor network for real-time indoor localisation and motion monitoring,” in Proceedings of the International Conference on Information Processing in Sensor Networks (IPSN '08), pp. 39–50, April 2008.
- Y. Liu, L. Chen, J. Pei, Q. Chen, and Y. Zhao, “Mining frequent trajectory patterns for activity monitoring using radio frequency tag arrays,” in Proceedings of the 5th Annual IEEE International Conference on Pervasive Computing and Communications (PerCom '07), pp. 37–46, March 2007.
- M. N. Lionel, Y. Liu, Y. C. Lau, and A. P. Patil, “Landmarc: indoor location sensing using active RFID,” Wireless Networks, vol. 10, no. 6, pp. 701–710, 2004.
- C. Wang, H. Wu, and N.-F. Tzeng, “RFID-based 3-D positioning schemes,” in Proceedings of the 26th IEEE International Conference on Computer Communications, pp. 1235–1243, May 2007.
- M. Philipose, J. R. Smith, B. Jiang, A. Mamishev, S. Roy, and K. Sundara-Rajan, “Battery-free wireless identification and sensing,” IEEE Pervasive Computing, vol. 4, no. 1, pp. 37–45, 2005.
- H. Zhang, J. Gummeson, B. Ransford, and K. Fu, “Moo: a batterylesscomputational rfid and sensing platform,” Tech. Rep. UM-CS-2011-020, UMass Amherst, 2011.
- H. Ghasemzadeh, V. Loseu, and R. Jafari, “Collaborative signal processing for action recognition in body sensor networks: a distributed classification algorithm using motion transcripts,” in Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN '10), pp. 244–255, April 2010.
- S. Huang, S. Sun, Z. Huang et al., “Ambulatory real-time micro-sensor motion capture,” in Proceedings of the 11th ACM/IEEE Conference on Information Processing in Sensing Networks (IPSN'12), pp. 107–108, April 2012.
- R. Lange, T. Farrell, F. Dürr, and K. Rothermel, “Remote real-time trajectory simplification,” in Proceedings of the 7th Annual IEEE International Conference on Pervasive Computing and Communications (PerCom '09), March 2009.
- A. D. Young, M. J. Ling, and D. K. Arvind, “Distributed estimation of linear acceleration for improved accuracy in wireless inertial motion capture,” in Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN '10), pp. 256–267, April 2010.
- Y. Liu, Z. Yang, X. Wang, and L. Jian, “Location, localization, and localizability,” Journal of Computer Science and Technology, vol. 25, no. 2, pp. 274–297, 2010.
- P. Volgyesi, G. Balogh, A. Nadas, C. B. Nash, and A. Ledeczi, “Shooter localization and weapon classification with soldier-wearable networked sensors,” in Proceedings of the Proceedings of the 5th International Conference on Mobile Systems, Applications and Services, pp. 113–126, June 2007.
- J. Wang and D. Katabi, “Dude, where's my card?: rfid positioningthat works with multipath and non-line of sight,” in Proceedings of the 3rd ACM SIGCOMM Workshop on Information-Centric Networking (ICN '13), 2013.
- C. Efstratiou, N. Davies, G. Kortuem, J. Finney, R. Hooper, and M. Lowton, “Experiences of designing and deploying intelligent sensor nodes to monitor hand-arm vibrations in the field,” in Proceedings of the 5th International Conference on Mobile Systems, Applications and Services, pp. 127–138, June 2007.
- P. N. Pathirana, A. V. Savkin, and S. Jha, “Mobility modelling and trajectory prediction for cellular networks with mobile base stations,” in Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 213–221, June 2003.
- D. Zhang, N. Li, Z.-H. Zhou, C. Chen, L. Sun, and S. Li, “iBAT: Detecting anomalous taxi trajectories from GPS traces,” in Proceedings of the 13th International Conference on Ubiquitous Computing, UbiComp'11 and the Co-located Workshops, pp. 99–108, September 2011.
- Z. Yang, Y. Liu, and X.-Y. Li, “Beyond trilateration: on the localizability of wireless ad hoc networks,” IEEE/ACM Transactions on Networking, vol. 18, no. 6, pp. 1806–1814, 2010.
- R. Li, J. Zhao, K. Liu, and Y. He, “Ranking-based feature selection for anomaly detection in sensor networks,” Ad-Hoc & Sensor Wireless Networks, vol. 19, no. 1-2, pp. 119–139, 2013.
- M. C. O. ’Connor, “Gen 2 epc protocol approved as iso 18000-6c,” RFID Journal, vol. 1, no. 11, 2006.
- J. Han and M. Kamber, Data Mining: Concepts and Techniques, MorganKaufmann, 2006.
- W. Hoeffding, “Asymptotically optimal tests for multinomial distributions,” The Annals of Mathematical Statistics, pp. 369–401, 1965.
- A. Dembo, P. Morters, and S. Sheffield, “Large deviations of markov chains indexed by random trees,” in Annales de l’Institut Henri Poincare (B) Probability and Statistics, vol. 41, pp. 971–996, Elsevier, 2005.
- I. C. Paschalidis and Y. Chen, “Statistical anomaly detection with sensor networks,” ACM Transactions on Sensor Networks, vol. 7, no. 2, article 17, 2010.
- A. Dembo and O. Zeitouni, Large Deviations Techniques and Applications, vol. 38, Springer, 1998.
- O. Zeitouni, J. Ziv, and N. Merhav, “When is the generalized likelihood ratio test optimal?” IEEE Transactions on Information Theory, vol. 38, no. 5, pp. 1597–1602, 1992.
- J. Mitsugi and O. Tokumasu, “A practical method for UHF RFID interrogation area measurement using battery assisted passive tag,” IEICE Transactions on Communications, vol. 91, no. 4, pp. 1047–1054, 2008.