Computer Science ›› 2021, Vol. 48 ›› Issue (8): 41-46.doi: 10.11896/jsjkx.200700093

• Database & Big Data & Data Science • Previous Articles     Next Articles

Redundant RFID Data Removing Algorithm Based on Dynamic-additional Bloom Filter

DUAN Wen, ZHOU Liang   

  1. School of Computer Science and Technology,Nanjing University of Aeronautics and Astronautics,Nanjing 210016,China
  • Received:2020-07-14 Revised:2020-09-21 Published:2021-08-10
  • About author:DUAN Wen,born in 1996,postgra-duate,is a student member of China Computer Federation.Her main research interests include information system integration and so on.(duanwen076@163.com)ZHOU Liang,born in 1966,Ph.D,associate professor,master supervisor.His main research interests include information system integration and knowledge engineering.

Abstract: The high redundancy generated by RFID devices in reading tag information will result in pressure of real-time transmission,waste of storage space and unreliable analysis results of upper application.To slove these problems,a dynamic-additional Bloom filter algorithm (DATRBF) is proposed to remove redundant RFID data.Firstly,combining the characteristics of RFID data and considering the influence of time and reader,the basic Bloom filter (TRBF) is designed.Then,it is decided whether to adjust or add additional TRBF dynamically according to the change of data amount in a fixed time interval,and the misjudgment rate is controlled within the threshold by expanding bit array with additional TRBF.Finally,combining the two filters to judge whe-ther the data is redundant or not.The experiment proves that the DATRBF algorithm has obvious advantages over the traditional Bloom filter (BF) and temporal-spatial Bloom filter (TSBF) when filtering the redundant data stream of RFID.When the data amount fluctuates randomly,the misjudgment rate of DATRBF is about 49% of that of TSBF on average,and the DATRBF algorithm can maintain a stable and low misjudgment rate when the data amount continues to rise.

Key words: Bloom filter, Dynamic additional, Misjudgment rate, Redundant data, RFID

CLC Number: 

  • TP391
[1]CAO W,JIANG P Y,LU P,et al.Real-time data-driven monitoring in job-shop floor based on radio frequency identification[J].International Journal of Advanced Manufacturing Technology,2017,92(5/6/7/8):2099-2120.
[2]CAO W,JIANG P Y,JIANG K Y,et al.Radio frequency identification-based real-time data collecting and visual monitoring for discrete manufacturing workshop[J].Computer Integrated Manufacturing Systems,2017,23(2):273-284.
[3]KAMALUDIN H,MAHDIN H,ABAWWAJY J H,et al.Filtering Redundant Data from RFID Data Streams[J].Journal of Sensors,2015,2016:1-7.
[4]MA M,WANG P,CHU C H.Redundant Reader Elimination in Large-Scale Distributed RFID Networks[J].IEEE Internet of Things Journal,2018,5(2):884-894.
[5]LIAO G Q,ZHOU J,HUI N,et al.Approximately Filtering Redundant Data for Uncertain RFID Data Streams[C]//IEEE International Conference on Mobile Data Management.IEEE,2017.
[6]LIU L L,YUAN Z L,LIU X W,et al.RFID unreliable data filtering by integrating adaptive sliding window and Euclidean distance[J].Advances in Manufacturing,2014,2(2):121-129.
[7]YOUSIF A,KAFAFY A,ABDLKADER H M.Reducing RFID Data Uncertainty using Mean Field Variational Inference[C]//2018 14th International Computer Engineering Conference (ICENCO).2018:131-136.
[8]LIN Q M,XIAO Y,YE N,et al.A method of cleaning RFID data streams based on Naive Bayes classifier[J].International Journal of Ad Hoc & Ubiquitous Computing,2016,21(4):237.
[9]MAHDIN H.A Review on Bloom Filter Based Approaches for RFID Data Cleaning[C]//First International Conference on Advanced Data and Information Engineering.2014:79-86.
[10]BLOOM B H.Space/time trade-offs in hash coding with allowable errors[J].IPSJ Magazine,1970,12(7):422-426.
[11]MOUSAVI N,TRIPUNITARA M.Constructing CascadeBloom Filters for Efficient Access Enforcement[J].Computers &Security,2019,81:1-14.
[12]REVIRIEGO P,MARTINEZ J,PONTARELLI S.CFBF:Re-ducing the Insertion Time of Cuckoo Filters with an Integrated Bloom Filter[J].IEEE Communications Letters,2019,23(10):1857-1861.
[13]LU J,YANG T,WANG Y,et al.Low Computational CostBloom Filters[J].IEEE/ACM Transactions on Networking,2018,26(5):2254-2267.
[14]KLEYKO D,RAHIMI A,GAYLER R W,et al.AutoscalingBloom Filter:Controlling Trade-off Between True and False Positives[J].Neural Computing & Applications,2020,32:3675-3684.
[15]LEE C H,CHUNG C W.An approximate duplicate elimination in RFID data streams[J].Data & Knowledge Engineering,2011,70(12):1070-1087.
[16]WANG Y L,WANG C,JIANG X H,et al.RFID duplicate removing algorithm based on temporal-spatial Bloom filter[J].Journal of Nanjing University of Science and Technology,2015(3):253-259.
[17]ZHU W L.Warehouse Package Longitudinal Positioning Based on RFID Data Redundancy Cleaning and Clustering[D].Chongqing:Chongqing University,2017.
[18]HUANG W Q,ZHANG Y F,CAO Z W,et al.Redundant RFID Data Filtering Algorithm Research Based on Bloom Filter[J].Journal of Cyber Security,2019,4(3):93-105.
[19]GUO D,WU J,CHEN H,et al.Theory and Network Applica-tions of Dynamic Bloom Filters[C]//Proceedings IEEE INFOCOM 2006,25th IEEE International Conference on Computer Communications.IEEE,2006:2849-2860.
[20]XIE K,MIN Y H,ZHANG D F,et al.A Scalable Bloom Filter for Membership Queries[C]//IEEE Global Telecommunications Conference.IEEE,2007:543-547.
[1] LUO Wen-cong, ZHENG Jia-li, QUAN Yi-xuan, XIE Xiao-de, LIN Zi-han. Optimized Deployment of RFID Reader Antenna Based on Improved Multi-objective Salp Swarm Algorithm [J]. Computer Science, 2021, 48(9): 292-297.
[2] LI Li, ZHENG Jia-li, LUO Wen-cong, QUAN Yi-xuan. RFID Indoor Positioning Algorithm Based on Proximal Policy Optimization [J]. Computer Science, 2021, 48(4): 274-281.
[3] QUAN Yi-xuan, ZHENG Jia-li, LUO Wen-cong, LIN Zi-han, XIE Xiao-de. Improved Grey Wolf Optimizer for RFID Network Planning [J]. Computer Science, 2021, 48(1): 253-257.
[4] XU He, WU Man-xing, LI Peng. RFID Indoor Relative Position Positioning Algorithm Based on ARIMA Model [J]. Computer Science, 2020, 47(9): 252-257.
[5] LI Li,ZHENG Jia-li,WANG Zhe,YUAN Yuan,SHI Jing. RFID Indoor Positioning Algorithm Based on Asynchronous Advantage Actor-Critic [J]. Computer Science, 2020, 47(2): 233-238.
[6] FENG An-qi, QIAN Li-ping, HUANG Yu-pin, WU Yuan. RFID Data-driven Vehicle Speed Prediction Using Adaptive Kalman Filter [J]. Computer Science, 2019, 46(4): 100-105.
[7] HOU Pei-guo, WANG Zhi-xuan, YAN Chen. Improvement of Anti-collision Algorithm Based on RFID Tag [J]. Computer Science, 2019, 46(11A): 359-362.
[8] LI Lu-lu, DONG Qing-kuan, CHEN Meng-meng. Cloud-based Lightweight RFID Group Tag Authentication Protocol [J]. Computer Science, 2019, 46(1): 182-189.
[9] YANG Zi-wei, ZHENG Jia-li, YUE Shi-bin, YUAN Yuan, SHI Jing. New Q Value Anti-collision Algorithm Based on Label Grouping [J]. Computer Science, 2018, 45(9): 152-155.
[10] YAO Han-bing, XING Na-na, ZHOU Jun-wei and LI Yong-hua. Study on Secure Retrieval Scheme over Encrypted Data Supporting Result Ranking [J]. Computer Science, 2018, 45(5): 123-130.
[11] LIU Yao-zong, LIU Yun-heng. Security Provenance Model for RFID Big Data Based on Blockchain [J]. Computer Science, 2018, 45(11A): 367-368.
[12] GAN Yong, WANG Kai, HE Lei. New Ownership Transfer Protocol of RFID Tag [J]. Computer Science, 2018, 45(11A): 369-372.
[13] ZHANG Wen-bin, LI Er-tao, LI Fei, LI Yan-yan and ZHU Yi-hua. Negative Acknowledgement Based Data Delivery Scheme for WISP [J]. Computer Science, 2017, 44(Z6): 294-299.
[14] JIA Ning. Research and Implementation of Campus Education Interconnection System for Intelligent Terminal [J]. Computer Science, 2017, 44(Z11): 573-576.
[15] WANG Shan, SUN Li, WU Jie, FENG Feng and WANG Hong-wei. Research of Molecular Similarity Algorithm Based on Counting Bloom Filter [J]. Computer Science, 2017, 44(Z11): 552-556.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!