Abstract
Keywords
Introduction
It is widely recognized that the Internet of Things (IoT) will be the third innovation wave of Information and Communication Technology (ICT) world, following the computer in 1940s and the Internet in 1970s. 1 The IoT conceptually means ‘who’, ‘where’ and ‘how’ of physical objects, such as food packages in supermarkets, pharmaceutical boxes in stores and file folders in offices. It is anticipated that trillions of radio tags will be embedded into objects, monitoring their physical properties, providing automation identification, as well as geographic location information. Therefore, following the achievement of satellite-based positioning systems in outdoor environment, the provision of localization service for trillions of objects in indoor environment forms the major bottleneck preventing seamless localization. Due to its low cost, miniature size, ease deployment and ultra-low power consumption, ultra-high-frequency (UHF) radio frequency identification (RFID) continues to gain recognition as a pivot enabler for IoT indoor localization applications. 2
The majority of state-of-the-art UHF RFID localization methods are based on the fusion of relevant information of RF signals returned to RFID reader from tags. Examples of such information include received signal strength indicator (RSSI), 3 angle of arrival (AoA),4,5 time of arrival (ToA) 6 phase of arrival (PoA)7,8 and time difference of arrival (TDoA). 2 The major problem with the above methods is that they are easily affected by the non-line-of-sight (NLoS) conditions, severe multipath distortions and fast temporal changes of indoor environment. 9 Besides that, these methods suffer from cost and system complexity issues. For example, AoA-based methods require complex and customized designed reader hardware. ToA-, TDoA- and PoA-based methods require multiple reference points, which are expensive RFID readers. 10
One direction to address this problem is to apply proximity-based method, which relies on using binary measurements related to whether a target is within a small range of the reference landmarks. Existing approaches are to deploy passive tags at fixed locations as landmarks and attach the RFID reader to the mobile target and vice versa. Usually, the former approach is referred to as reader-based method, while the latter as tag-based method. In DiGiampaolo, 11 researchers deploy a grid of UHF RFID tags on the ceiling of the building. The read region of each tag is well defined, thus the floor environment is subdivided into a set of cells. When the target equipped with reader enters into the read region of UHF RFID tag, the tag ID or the equivalent tag coordinates are retrieved. The location of target is estimated according to retrieved data. Based on such reader-based technique, multiple indoor localization systems have been proposed.12–14 In Geng et al.,15,16 the area is covered by a mesh grid of a large set of RFID readers and associated antennas, whose locations are known. The objects with attached UHF RFID tags are localized and tracked using particle filter-based inference algorithm.
However, these approaches are strictly constrained by energy, cost and size. For example, the former approach is limited to relatively large and expensive objects that justify carrying the RFID reader, such as autonomous household robot. In the latter approach, it is not cost-efficient to densely deploy readers with tuned read range.
In our previous work, an EPCglobal Class1 Gen2 compliant UHF RFID component ST (from sense-a-tag) was proposed. 17 In the same way as passive tags, ST applies envelope detection to extract baseband signal in the receiving path, and backscatter modulation to talk back in the transmitting path respectively. The difference is that ST’s receiving path does not only capture RFID reader’s pulse-interval-encoding (PIE) command signal but also passive tags’ backscattering signal. Such unique functionality enables tag-to-tag backscattering communication link, which keeps both landmark and mobile tags simple and inexpensive.
We showed how to use ST in augmented ultra-high-frequency radio frequency identification system (AURIS) for indoor localization in Athalye et al. 9 The probabilistic model of detecting a tag by ST is introduced as the function of the distance between the tag to ST. 18 However, through investigation of tag-to-tag backscattering communication link, it is demonstrated that the carrier wave (CW) from RFID reader has a major effect on ST-to-tag detection probability.19–21 In this article, the probabilistic model is extended to be more realistic by integrating the distance and relative angle between the tag and the reader’s antenna, and considering the interference of reader’s CW on ST, the so-called phase cancellation effect.
We propose a novel particle filter with autoregressive model and auxiliary input (PF-AA) as inference algorithm for AURIS indoor localization. Some previous work dealing with particle filter-based RFID indoor localization possess strong assumption and constraints on the target state-space model, such as exact knowledge of the initial position of the moving object with ST, linear target motion model or exteroceptive sensor information.18,22,23 Additionally, according to ST’s Gen2-based locator protocol, the host computer controls reader to send out a fixed number of successive query rounds to the reference tags. Then, the inference algorithm localizes ST using aggregated binary information reported by ST. 17 Existing inference algorithms rely on false synchronous detection assumption that assumes that the detection measurements are received by ST at the same time instance.9,18,21 The novel PF-AA introduces current measurements into a constraint-free auto-regressive (AR) state evolution model, and it also addresses the asynchronous measurements with a minor modification of ST locator protocol which is still EPC Gen2 compliant.
In summary, this work makes two major contributions. It proposes a novel detection probability model for ST-to-tag communication link, which is based on the systematic analysis about the tag-to-tag backscattering communication scheme. We then propose PF-AA algorithm for the ST-based AURIS localization system. To this end, we identify two technical roadblocks of AURIS and existing localization algorithm as false synchronous detection assumption and state evolution model constraints. It is demonstrated that the proposed PF-AA algorithm overcomes such roadblocks. The rest of this article is organized as follows: in section ‘Background and related work’, we introduce the background and related work. The new probabilistic detection model is presented in section ‘Detection probability model’. In section ‘Proposed localization method’, the PF-AA algorithm is introduced. In ‘Performance evaluation’, we provide the simulation results which show the performance of the proposed localization methods, followed by the conclusion and future discussion in section ‘Conclusion’.
Background and related work
Augmented UHF RFID system (AURIS)
In Athalye et al., 17 we proposed a tag-like UHF RFID component, referred to as ST. The ST has dual functionality: it is capable of sensing the backscattering communication between RFID reader and nearby passive tags, and it can also communicate the sensed information with RFID reader via backscatter communication like a standard passive tag. By adding ST to the off-the-shelf UHF RFID system, the augmented UHF RFID system can offer fine-grain localization scheme in indoor scenario.
Figure 1 shows the block diagram of ST hardware. The antenna is followed by a backscatter modulator, a corresponding matching network and a conventional diode envelope detector circuit. The output of envelope detector is fed into the analogue section, which has the ability to process both reader’s PIE signal and the tag’s backscatter. The analogue processing of reader’s PIE signal is exactly the same as the standard passive tag, which employs a hysteresis comparator to generate digital signal. The processing circuit of tag’s backscattering signal is more complex, which consists of a band-pass filter for removing the DC offset, followed by a comparator acting as one-bit A/D converter. The output of analogue section is the input of digital section, which runs finite state machine (FSM) for Gen2-based ST locator protocol. The detailed description and performance evaluation of ST are presented in Athalye et al. 9

Block diagram of ST hardware.
Figure 2 shows a deployment scenario of AURIS for fine-grained proximity-based localization. The system is composed of a personal computer running the localization algorithm, an off-the-shelf RFID reader, a large set of passive tags placed at known position and an ST attached to mobile target of interest. The detection range of ST, where it can detect tag’s backscatter, is shown by a dotted circle in figure. Accroding to field experiment, the detection range of ST-to-tag is around 1 m. 21 Thus, ST can acquire the ID information of the tags within the detection range. Since the position of landmark tags are prior known, the host computer could aggregate the association information to localize ST.

Deployment scenario of AURIS.
Tag-to-tag backscattering communication
UHF RFID provides superior performance among passive RFID systems, ensuring a larger operating distance (up to several meters), a higher data rate (up to hundreds of kb/s) and a smaller antenna size. 1 The conventional UHF RFID system is characterized as asymmetric communication where the majority of communication burden is shifted to the carrier-modulated transceiver RFID reader. Both reader-to-tag and tag-to-reader communication links have been thoroughly studied.24–26 Unlike the conventional UHF RFID, tag-to-tag communication relies neither on an active radio for transmitting query signals nor on a full-scale IQ demodulator to the response. It relies purely on backscatter modulator to convey data to other tags and on passive envelope detector for the response. Tag-to-tag backscattering communication has been explored in literature, but mainly as a feasibility study.17,27 While the general feasibility has been established, virtually not much attention has been paid to characterize the tag-to-tag communication link. One of the pioneering works in the field characterizes inter-tags communication by the near-field mutual coupling model. 28 However, it is not applicable for the ever increasing tag-to-tag range. The rest of this section aims to present the propagation mechanism governing tag-to-tag backscattering communication, and then set up some design guidelines for modelling ST-to-tag detection probability.
Tag-to-tag link budget
Figure 3 depicts the scheme of tag-to-tag backscattering communication link wherein the CW signal is provided by RFID reader. The first radio link budget is the linear-scale, power-up link budget that describes the amount of power arriving at the transmitting tag’s antenna 24
where

Schematic depiction of tag-to-tag backscatter link.
The second link budget is the tag-to-tag backscatter link budget that governs the amount of modulated backscatter power received by the receiving tag
where
Phase cancellation effect
In tag-to-tag backscatter communication scheme, the RFID reader must transmit CW for the tag to backscatter. Consequently, the signal at the receiving tag’s antenna is the superposition of reader’s continuous CW and the transmitting tag’s backscattering signal. Unfortunately, due to the relative phase difference between them, the modulation depth of transmitting tag’s backscattering signal at receiving tag’s envelope detector could be significantly attenuated or even cancelled out. We refer such effect to as
PASS simulation framework
AURIS is modelled in our newly developed proximity-detection-based augmented RFID system simulator (PASS) framework. PASS is a time-domain system-level simulator, which is based on position-aware RFID system (PARIS) simulation framework. 31 The development environment is MATLAB 2012a on Windows 8.1 (64 bits). The development of PASS simulation framework aspires to facilitate the research for indoor localization with UHF RFID technology. From PARIS simulation framework, PASS inherits the behaviour model of a NXP UCODE G2XM–based passive UHF RFID tag and wireless propagation channel, as well as a core framework to perform simple control and logging. While PARIS mainly focuses on ranging rather than the system behaviour, we completed the functionality of generic reader and tag so that the simulator behaves according to ISO 18000-6C protocol. The ST model is designed to emulate the specific ST device. The detailed structure and component description are presented in Wang and Bolic. 20 Noteworthily, the Q selection algorithm in Gen2 protocol is not implemented in the simulator, since the simulation platform MATLAB is discommodious for scheduling algorithm and also slow for massive computation tasks. Having the whole system implemented in the simulator allows for much faster evaluation of the system and faster validation of the effectiveness of ideas. The software and tutorial are available on Github repository. 32
Detection probability model
The location inference algorithm of AURIS relies on the detection probability model of ST-to-tag, which describes the relationship between successive detection and the true state of reader, tag and ST. In our previous work, 18 the detection probability of ST-to-tag is proposed as a function of Euclidean distance between ST and tag, which is a common sensing model for active radios. 33
However, according to the research on tag-to-tag backscattering communication, the detection probability depends on other numerous factors including the distance from reader antenna, the orientation of antenna and phase cancellation effect. In this section, we therefore develop a more realistic detection probability model that is better suited for ST-to-tag communication link. First, the detection probability model is modelled as the function of the distance and (elevation, azimuth) angle pair from reader antenna to tag, as well as the distance between tag to ST. Secondly, augmented by phase cancellation effect-reducing techniques, phase cancellation has an insignificant effect on detection probability. Therefore, the detection probability model does not include the superposition of reader CW and tag’s backscattering.
Figure 4 depicts the distance
where

Representation of detection probability model parameters.
For comparison, the previous model, where the detection probability is a function of distance between tag and ST, is presented. We refer to this probability detection model as TS model
where
We evaluated the proposed detection probability model by the experiment data obtained from PASS simulation framework. In the experiment, the reader antenna is RFMAX S9028PCRJ, which is a circularly polarized panel antenna working at 902–928 MHz frequency band. The power level of reader antenna is set as 30 dBm. Figure 5 plots the antenna radiation pattern. The channel type is selected as “
where

Antenna radiation pattern.
We apply gradient descent method to estimate the model coefficient. Since the objective is to minimize the cost function
where

Estimated detection probability versus (a)

Detection probability versus
Figure 8 shows the calculated detection probability based on the samples from training dataset. In Figure 8(a), the data samples are collected within the region

Detection probability versus (a)
Finally, we obtain another 1000 measurement samples with the same simulation setup as test dataset. The cost is computed according to equation (5). The cost of RTS model on test dataset is 0.1278, while the cost of TS model is 0.1502. Therefore, we can conclude that RTS model has higher modelling accuracy than the TS model.
Proposed localization method
Overview of our method
The objective of this section is to propose an accurate method for continuous localization of moving objects using AURIS localization system. A possible deployment of AURIS localization system is shown in Figure 2. As briefly mentioned in earlier section, populated with passive tags with known locations in the environment, the ST-tagged objects can be localized based on the aggregated ST-to-tag detection binary information.
In some of our previous work,9,18,21 we have studied various inference algorithms for AURIS localization system. First, we introduced weighted centroid localization (WCL) method, which is commonly used in wireless sensor network localization application. 36 The key idea of WCL method is to apply the weighted average of the detected tags’ locations. The WCL method is computationally inexpensive, but yields coarse location estimation. We then propose a general method for continuous localization of ST using particle filtering (PF), by which the localization accuracy is improved but with higher computation cost. 18 Since the computation task is executed on the host server, the increased computation cost draws little concern. However, two fundamental issues, which deteriorate the localization accuracy, are identified in AURIS design itself and PF algorithm. These issues are discussed in the next section.
False synchronous detection assumption
EPCglobal Class1 Gen2 MAC protocol adopts a adaptive slotted Aloha variant.
29
ST locator protocol specifies two states for ST operation:

Representation of a set of queries
State evolution model constraints
In PF-like sequential Bayesian estimation algorithm, the state evolution model is used to approximate the current state based on the history. 37 Existing PF algorithms for AURIS localization application put strict constraints on the dynamic input of state evolution model.18,38 These state evolution models have remarkable performance when the dynamic pattern of target motion is a priori known and comparatively stable. However, the performance of these models degenerates severely when the dynamic pattern is different. Besides, these algorithms require prior knowledge about initial state of target.
PF-AA algorithm
Our method includes two simple ideas: (1) we estimate the velocity of the moving target based on the estimation state history and current measurement using AR model. The current measurement is introduced into the AR model by WCL method. In Yang and Wu, 12 the velocity of state evolution model is updated by the time duration of each landmark tag staying in the reader’s reading range. The estimation is highly inaccurate and unreliable. To the best of our knowledge, our method is the first to use WCL on fusing the current measurement into the state evolution model; (2) we implement a minor modification, that will be described later, to ST locator protocol, by which the host server is able to obtain the asynchronous detection time information. Based on such information, the estimation bias could be computed. With these two ideas, we design PF-AA algorithm for better accuracy and applicability in indoor target localization application.
As mentioned earlier, RFID reader sends out the number of
where
The state evolution model characterizes the location state
where
Now we address the velocity estimation given the target location
First, the current target location
where
The current velocity
where
The number of times that the tag is detected by ST is modelled as binomial distribution, that is, the probability of
where
With the state evolution model and measurement model, we are ready to implement particle filter scheme to localize ST. Suppose that at time instant
Upon receiving the current measurements
where
Current measurement is used to update dynamic input of state evolution model through WCL method. Therefore, the target state at time instant
where
where
Then, the weight of particles are normalized by
Once the weights are normalized, we form the random measure for the time instant
To avoid degeneration of the random measure, the resampling scheme is executed to eliminate particles with small weights and replicate particles with large weights.
37
After resampling, the current particles are replaced with the new one and the weights
Then, we utilize the current target location estimation to update the current velocity estimation
An additional step of the algorithm is to characterize the estimation bias from the synchronous detection assumption. When the speed estimation
thereby, the final estimate of target at the time instant
The PF-AA algorithm takes the above steps in a recursive fashion. A pseudo-code description of this algorithm is given by Algorithm 1.
Performance evaluation
In this section, the simulation is used to evaluate the effectiveness of the proposed algorithm. The simulation setup follows the deployment scenario of AURIS in PASS as shown in Figure 10. The area was 4 m × 3.2 m, and covered by 9 × 5 UHF RFID landmark tags. RFID reader’s panel antenna is placed at the centre of the area with 2 m height facing the ground. The PASS simulation framework is configured as given in section ‘Detection probability model’. As for simulation parameters, the state evolution noise vector is given as

Experiment setup with landmark tag’s deployment and ST trajectories.
In the first set of experiments, our goal was to obtain the speed threshold used for bias compensation of false synchronous detection assumption. We compared the localization performance of two implementations of PF-AA algorithms over moving speed at the range of

Performance of PF-AA bias compensation technique.
In the second set of experiments, we compared the localization performance of different PF algorithms: (a) PF-BIN algorithm in Savic et al.
18
and (b) PF-AA algorithm. For PF-BIN algorithm, it requires prior knowledge of initial state and movement speed. The process covariance matrix of its state evolution model was given by

Performance of PF-AA and PF-BIN with ST speed 0.5 m/s.

Performance of PF-AA and PF-BIN with ST speed 2.5 m/s.

CDFs of position erros of PF-AA and PF-BIN.
Finally, we simulated a scenario with random walk trajectory of ST to compare WCL and PF-AA. The random walk trajectory is implemented as that ST moves straight with a constant speed, whenever it arrives at the area boundary, it bounces back at random angle with random speed. The speed of ST is uniformly distributed over the range of

Performance of PF-AA and WCL with random walk trajectory.
Conclusion
In this article, we have proposed a new and realistic probability detection model of ST-to-tag, which is better suited to ST-to-tag communication link. The probability detection model of ST-to-tag is modelled as a function of the distance and relative angle between tag and RFID reader antenna in addition to the distance between tag to ST. The modelling accuracy of RTS model is improved compared to TS model in terms of cross-entropy cost function. We further proposed a particle filter-based location inference algorithm for AURIS. To this end, we identify two technical roadblocks of AURIS and existing localization algorithm as false synchronous detection assumption and state evolution model constraints. Our method to overcome such roadblocks includes two simple ideas. First, we estimate the velocity of ST based on the estimation state history and current measurement using AR model. The current measurement is introduced into the AR model by WCL method. Second, we implemented a minor modification to ST locator protocol, which is still Gen2 protocol compliant. Through such modification, the host server is able to obtain the asynchronous detection information. With these two ideas, we designed PF-AA algorithm for better accuracy and applicability in indoor localization application. Compared to PF-BIN algorithm, the localization capability of PF-AA is enhanced to handle the sharp manoeuvre and speed change of target.
There are several interesting topics that deserve to be explored in future: simultaneous mapping of unknown passive tags, localization with uncertain landmark location and exploring the situation where the number of working landmark tags will decrease in time due to their potential failures.
