skip to main content
article

Pervasive pheromone-based interaction with RFID tags

Authors Info & Claims
Published:01 June 2007Publication History
Skip Abstract Section

Abstract

Despite the growing interest in pheromone-based interaction to enforce adaptive and context-aware coordination, the number of deployed systems exploiting digital pheromones to coordinate the activities of situated autonomous agents is still very limited. In this article, we present a simple low-cost and general-purpose implementation of a pheromone-based interaction mechanism for pervasive environments. This is realized by making use of RFID tags to store digital pheromones and by having humans or robots spread/sense pheromones by properly writing/reading RFID tags populating the surrounding physical environment. We exemplify and evaluate the effectiveness of our approach via an application for object-tracking. This application allows robots and humans to find forgotten-somewhere objects by following pheromones trails associated with them. In addition, we sketch further potential applications of our approach in pervasive computing scenarios, discuss related work in the area, and identify future research directions.

References

  1. Avoine, G. 2006. Bibliography on security and privacy in RFID systems. MIT Tech. Rep., MIT Press, Cambridge, MA.Google ScholarGoogle Scholar
  2. Babaoglu, O., Meling, H., and Montresor, A. 2002. A framework for the development of agent-based peer-to-peer systems. International Conference on Distributed Computing Systems. Vienna, Austria. IEE Computer Society. Google ScholarGoogle Scholar
  3. Bonabeau, E., Dorigo, M., and Theraulaz, G. 1999. Swarm Intelligence. Oxford University Press. Google ScholarGoogle Scholar
  4. Bornhovd, C., Lin, T., Haller, S., and Schaper, J. 2004. Integrating automatic data acquisition with business processes: Experiences with SAP's auto-ID infrastructure. International Conference on Very Large Databases, Toronto, Canada, IEEE Computer Society. Google ScholarGoogle Scholar
  5. Collins, G. 2004. Next stretch for plastic electronics. Scientific American 291, 74--81.Google ScholarGoogle Scholar
  6. Floerkemeier, C. and Lampe, M. 2005. RFID middleware design---addressing application requirements and RFID. Smart Objects and Ambient Intelligence Conference. Grenoble, France. Google ScholarGoogle Scholar
  7. Hähnel, D., Burgard, W., Fox, D., Fishkin, K., and Philipose, M. 2004. Mapping and localization with RFID technology. International Conference on Robotics and Automation. Barcelona, Spain, IEEE Computer Society.Google ScholarGoogle Scholar
  8. Holldobler, B. and Wilson, E. 1990. The Ants. Springer-Verlag, Berlin, Germany.Google ScholarGoogle Scholar
  9. Greene, K. 2006. Wireless wonder chip. Available at www.technologyreview.com/printer_friendly_article.aspx?id=17182.Google ScholarGoogle Scholar
  10. Hsi, S. and Fait, H. 2005. RFID enhances visitors: Experience at the exploratorium. Comm. ACM 48, 9, ACM Press, 60--65. Google ScholarGoogle Scholar
  11. Kleiner, A., Prediger, J., and Nebel, B. 2006. RFID technology-based exploration and SLAM for search and rescue. International Conference on Intelligent Robots and Systems, Beijing China, IEEE Computer Society.Google ScholarGoogle Scholar
  12. Kulyukin, V., Gharpure, C., Nicholson, J., and Pavithran, S. 2004. RFID in robot-assisted indoor navigation for visually impaired. International Conference on Intelligent Robots and Systems, Sendai Japan, IEEE Computer Society.Google ScholarGoogle Scholar
  13. Li, Q., De Rosa, M., and Rus, D. 2003. Distributed algorithms for guiding navigation across a sensor network. International Conference on Mobile Computing and Networking, San Diego, CA., ACM Press. Google ScholarGoogle Scholar
  14. McLurkin, J. and Smith, J. 2004. Distributed algorithms for dispersion in indoor environments using a swarm of autonomous mobile robots. International Symposium on Distributed Autonomous Robotic Systems. Toulouse, France, IEEE Computer Society.Google ScholarGoogle Scholar
  15. Mamei, M., Quaglieri, R., and Zambonelli, F. 2006. Making tuple spaces physical with RFID tags. Symposium on Applied Computing, Dijon, France, ACM Press. Google ScholarGoogle Scholar
  16. Mamei, M. and Zambonelli, F. 2005. Spreading pheromones in everyday environments through RFID technology. Symposium on Swarm Intelligence. Pasadena, CA. IEEE Computer Society.Google ScholarGoogle Scholar
  17. Menezes, R. and Tolksdorf, R. 2003. A new approach to scalable linda-systems based on swarms. Symposium on Applied Computing. Orlando, FL., ACM Press. Google ScholarGoogle Scholar
  18. Parunak, V. 2006. A survey of environments and mechanisms for human-human stigmergy. Environment for Multi-Agent Systems II. Lecture Notes in Computer Science, vol. 3830. Springer-Verlag, Berlin, Germany. Google ScholarGoogle Scholar
  19. Parunak, V. 1997. Go to the ant: Engineering principles from natural agent systems. Ann. Oper. Res., Kluwer Academic Publishers, 69--101.Google ScholarGoogle Scholar
  20. Parunak, V., Brueckner, S., and Sauter, J. 2005. Digital pheromones for coordination of unmanned vehicles. Environments for Multiagent Systems I. Lecture Notes in Computer Science vol. 3374. Springer-Verlag, Berlin, Germany. Google ScholarGoogle Scholar
  21. Philipose, M., Fishkin, K., Perkowitz, M., Patterson, D., Fox, D., Kautz, H., and Hahnel, D. 2004. Inferring activities from interactions with objects. IEEE Pervas. Comput. 3, 4, IEEE Computer Science, 50--57. Google ScholarGoogle Scholar
  22. Rieback, M. R., Crispo, B., and Tanenbaum, A. 2006. The evolution of RFID security. IEEE Pervas. Comput. 5, 1, IEEE Computer Society, 62--69. Google ScholarGoogle Scholar
  23. Satoh, I. 2005. A location model for pervasive computing environments. International Conference on Pervasive Computing and Communications. Kauai Island, HW., IEEE Computer Society. Google ScholarGoogle Scholar
  24. Savit, R., Manuca, R., and Riolo, R. 1999. Adaptive competition, market efficiency, and phase transitions. Phys. Rev. Lett. 82, 10, American Physical Society, 2203--2206.Google ScholarGoogle Scholar
  25. Shen, W., Salemi, B., and Will, P. 2002. Hormone-inspired adaptive communication and distributed control for CONRO self-reconfigurable robots. IEEE Trans. Robot. Autom. 18, 5, IEEE Computer Society, 1--12.Google ScholarGoogle Scholar
  26. Stajano, F. 2005. RFID Is X-ray vision. Comm. ACM, 48, 9, ACM Computer Society, 31--33. Google ScholarGoogle Scholar
  27. Svennebring, J. and Koenig, S. 2004. Building terrain covering ant robots: A feasibility study. Autonom. Robots 16, 3, Springer-Verlag, 313--332. Google ScholarGoogle Scholar
  28. Swedberg, C. 2006. First responders can tag victims for tracking. RFID J. Available at www.rfidjournal.com/article/articleview/2708/1/1.Google ScholarGoogle Scholar
  29. Want, R. 2004. Enabling ubiquitous sensing with RFID. IEEE Comput. 37, 4, IEEE Computer Society, 84--86. Google ScholarGoogle Scholar
  30. Want, R. 2006. An introduction to RFID technology. IEEE Pervas. Comput. 5, 1, IEEE Computer Society, 25--33. Google ScholarGoogle Scholar
  31. Werfel, J., Bar-Yam, Y., Rus, D., and Nagpal, R. 2006. Distributed construction by mobile robots with enhanced building blocks. International Conference on Robotics and Automation, Orlando, FL., IEEE Computer Society.Google ScholarGoogle Scholar
  32. Weyns, D., Boucke, N., and Holvoet, T. 2005. Gradient field-based task assignment in an AGV transportation system. International Joint Conference on Autonomous Agents and MultiAgent Systems, Hakodate, Japan, ACM Press. Google ScholarGoogle Scholar

Index Terms

  1. Pervasive pheromone-based interaction with RFID tags

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image ACM Transactions on Autonomous and Adaptive Systems
              ACM Transactions on Autonomous and Adaptive Systems  Volume 2, Issue 2
              June 2007
              81 pages
              ISSN:1556-4665
              EISSN:1556-4703
              DOI:10.1145/1242060
              Issue’s Table of Contents

              Copyright © 2007 ACM

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 June 2007
              Published in taas Volume 2, Issue 2

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • article

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader
            About Cookies On This Site

            We use cookies to ensure that we give you the best experience on our website.

            Learn more

            Got it!