Professional Documents
Culture Documents
in Industrial Environments
Junchen Guo∗ , Ting Wang∗ , Yuan He∗ , Meng Jin∗ , Chengkun Jiang∗ and Yunhao Liu∗†
∗ School of Software and BNRist, Tsinghua University, † Computer Science and Engineering, Michigan State University
{gjc16, wangt18}@mails.tsinghua.edu.cn, {heyuan, mengj}@mail.tsinghua.edu.cn,
jck15@mails.tsinghua.edu.cn, yunhao@cse.msu.edu
Abstract—Liquid leakage detection is a crucial issue in modern Multi-Point Liquid Leakage Detection
industry, which concerns industrial safety. Traditional solutions,
which generally rely on specialized sensors, suffer from intrusive
deployment, high cost, and high power consumption. Such
problems prohibit applying those solutions for large-scale and
continuously industrial monitoring. In this work, we present a
RFID-based solution, TwinLeak, to detect liquid leakage using
COTS RFID devices. Detecting the leakage accurately with
coarse-grained RSSI and phase readings of tags has been a
daunting task, which is especially challenging when low detection
delay is required. Our system achieves these goals based on the
fact that the inductive coupling between two adjacent tags is
highly sensitive to the liquid leaked between them. Therefore, Twin-Tag Sensor Absorbent Cotton Deployment
instead of judging according to the signals of each individual tag,
A Twin of COTS RFID Tags
TwinLeak utilizes the relationship between the signals of two tags
as an effective feature for leakage detection. Specifically, Twin- Tag 1 (Position A)
Tag 2 (Position B)
Leak extracts discriminative signal features from short segments
of signals and instantly identifies leakage using a light-weight
classifier. A model-guided method for leakage progress tracking
AAA-BB-XXX-YYY
is further devised to simultaneously estimate the leakage volume Plastic Wrapper with Twin-Tag ID Twin-Tag Prototype
and rate. We implement TwinLeak, evaluate its performance
across various scenarios, and deploy it in a real-world industrial Fig. 1. Liquid Leakage Detection with Twin-Tag.
IoT system. In average, TwinLeak achieves a TPR higher than
97.2%, a FPR lower than 0.5%, and a relative property estimation
error around 10%, while triggering early alarms after only about
deployment and maintenance, high power consumption, and
4.6mL liquid leaks. difficulty of deployment into many machines.
Motivated by the recent research advances in RFID-based
I. I NTRODUCTION sensing ( [1] [2] [3] [4] [5] [6]), in this work we study the
In modern industry, auxiliary machines used for water problem of RFID-based liquid leakage detection in industrial
cooling, lubricant looping, and liquid purification are indis- environments. Recent related works (e.g., exploiting RF signal
pensable. Fig. 1 shows a real industrial scenario, where a for liquid identification [5] [7] and humidity sensing [8] [9])
number of flanges connect pumps and tanks. The flanges are have shown that the existence of liquid may change the
often not welded for convenient maintenance and replacement, characteristics of the RF signals, which might be exploited
potentially leading to the liquid leakage problem. Liquid as indicators for liquid leakage. But the liquid leakage de-
leakage is indeed a frequent accident that threatens the safety tection problem in industrial environments differs from the
(e.g. fire disasters caused by leakage of combustibles) and existing works, due to the following critical requirements and
incurs countless economic loss (e.g. machine damage caused challenges:
by leakage of cooling water or lubricant). Liquid leakage • Timeliness requirement. To minimum the damage
detection is therefore an extremely significant task in the caused by liquid leakage, we must detect the the leakage
operations of modern industry. event in a timely manner, i.e. once a few drops of
Conventional leakage detection still relies on the labor- liquid leak out. The corresponding signal variation in
intensive, high-delay, and inaccurate manual checking. Many this case, however, is too slight to be detected by COTS
efforts have been taken to achieve automatic leakage detection, RFID devices. Therefore, existing methods which identify
but the existing solutions remain inapplicable in complex and liquid based on the obvious signal variations caused by
large-scale industrial scenarios. For instances, vision-based more than 100 mL of liquid [5] [7] is not applicable in
approaches fail to work in dark environments or the none-line- the leakage detection scenario.
of-sight (NLOS) scenarios, which are common in industrial • High accuracy requirement. Our goal is to detect the
environments. Detection with specialized sensors seems an leakage events that occur exactly at the potential leakage
effective alternative, but most sensors suffer high cost of points (e.g., the flanges). However, many other confound-
883
ing events (such as the change in the indoor humidity, or and evaluation of the system. Finally, Sect. VIII summarizes
the dynamics in the surrounding environment) affect the TwinLeak and discusses potential research extensions.
signal propagation between the tags and the reader. Those
events also change the characteristics of the signals, II. R ELATED W ORKS
leading to false alarms. Excessive false alarms are an In this section, we give a brief review of the related works
equally serious problem, because they will incur extra of TwinLeak. They are mainly categorized into three groups.
labor cost to deal with the alarms, cause unnecessary
downtime of the machinery, or even lead to inappropriate A. Liquid leakage detection
operations. Many efforts have been made to detect liquid leakage in
• High precision requirement. Besides accurate detection, both research and application fields. Various sensors based
quantified properties of the leakage process (such as the on acoustic/vibration [10], pressure [11] and electrode [12]
leakage rate and volume) also act as important decision- are proposed to achieve the high accuracy and sensitivity.
making basis when leakage occurs. It is difficult to obtain However, most of them suffer from the issue of intrusive-
such fine-grained information from the coarse-grained deployment and the high maintenance cost. Although acoustic
RSSI and phase readings. sensors provide a promising coverage, they are not suitable
In this paper, we present TwinLeak, a ready-for-use solution for extremely noisy environment in most of the industrial
to accurately and timely detect liquid leakage and quantify the environments. TwinLeak outperforms these methods for its
leakage rate and volume using COTS RFID. Our idea is based non-intrusive, battery-free, low-cost and easy-to-deploy char-
on the inductive coupling effect between two adjacent tags. We acteristics as well as a relatively large wireless sensing range.
find through extensive experiments that even slight amount B. RF-based liquid detection and identification
of liquid may change the dielectric between two adjacent
tags, which leads to significant variation in the strength of Wireless signals are proved susceptible to the materials of
inductive coupling. Hence, observing the relationship between the medium that along the propagation path [5] [7] and near
the signals of two tags offers rich information to detect Tx/Rx antennas [8] [9] [13], which provides an opportunity
and quantify the liquid leakage process. We address non- for sensing the characters of the liquid. By modeling the rela-
trivial challenges in implementing the above idea and make tionship between the signal attenuation and the permittivity of
TwinLeak a practical solution. The contributions of this work the propagation medium, TagScan [5] and LiquID [7] achieve
are summarized as follows: liquid identification / classification with CTOS RFID devices
and UWB devices respectively. However, a large amount of
• We disclose and model the relationship between liquid liquid (usually > 100mL) is required to block the propagation
leakage and the inductive coupling effect between tags. path, which greatly restricts the practical deployment. Recent
Instead of judging according to the signals of each humidity sensing approaches have demonstrated that the near-
individual tag, we identify the relationship between the field coupling of the liquid and the antenna offers much better
signals of two tags as an effective feature for leakage sensitivity. However, existing approaches need either high-
detection. overhead operations, e.g. the power-on measurement under
• We propose the TwinLeak approach, which addresses different frequencies [8], or specially-designed tags to magnify
several unique technical challenges in leakage detection. corresponding signals [9] [13]. Compared with the above
(i) We extract discriminative signal features and design a mentioned methods, TwinLeak is able to detect just small
decision tree based classification method for instant leak- amount of leaked liquid at specific points by just analyzing
age detection; (ii) We provide a change point detection the RSSI and phase readings of COTS RFID tags.
algorithm to accurately localize the starting points of the
leakage; (iii) We design a model-guided method for leak- C. Exploration of coupling effect
age progress tracking, which simultaneously estimates the Although the coupling effect between tags has been con-
leakage properties e.g. volume and rate. sidered as detrimental in many existing RF-based sensing
• We implement TwinLeak on COTS RFID, deploy it in a methods, many works exploit such phenomenon for more
real-world industrial monitoring system (as shown in Fig. accurate sensing. For instance, Twins [14] tracks an object
1), and evaluate its performance across various scenarios. by observing the variation of the coupling effect between two
TwinLeak achieves a TPR higher than 97.2%, a FPR adjacent tags attached on its surface. HuFu [15] proposes that
lower than 0.5% and a relative property estimation error the coupling effect indeed creates a distinct fingerprint for the
about 10%, with the early alarms after only about 4.6mL signal from two adjacent tags, which offers an opportunity to
liquid leaks. resist the replay attacks. RIO [4] exploits the coupling effect to
The rest of this paper is organized as follows. We discuss sense and track human’s touch on a multi-tag array. Our work
the related works of TwinLeak in Sect. II. Sect. III introduces leverages the coupling effect for liquid leakage detection. We
the Twin-Tag sensor design and its intuition. The overview and observe that the coupling effect can not only enlarge the signal
design details of TwinLeak are described in Sect. IV and Sect. variation that caused by the liquid leakage, but also filter out
V&VI respectively. Sect. VII presents the implementation the variation that caused by other multipath interferences. This
884
(a) Quick Leakage (Single) (b) Quick Leakage (Twin) (c) Slow Leakage (Twin) (d) Unsaturated Leakage (Twin)
RSSI (dB)
Disturbed
Normal
CDF
0.5 Leakage
-60
III. L IQUID L EAKAGE P RIMITIVE
-70 0
In this section, we start with a introduction about the design 0 0.2 0.4 0.6 0.8 1 -80 -60 -40 -20
Gap Feature
0 20
Tag 1 Tag 2
of our Twin-Tag sensor, followed by the empirical observation
Gap Feature
Phase (rad) 6
30
and theoretical explanation about Twin-Tag’s distinct signal for 4 20
the leakage detection. 2
10
20 40 60 80 100
0
A. Twin-Tag sensor 0 0.2 0.4 0.6 0.8 1 Reader-Tag Distance
Normalized Time
Fig. 1 shows the structure of the Twin-Tag sensor, which
(a) Confounding Interferences (b) Validation of Gap Feature
consists of a pair of parallel and proximate COTS RFID tags,
a piece of absorbent cotton and a plastic wrapper. The twin Fig. 3. Interference signals and the robust feature of RSSI gap’s trend.
tags are attached to the cotton, which acts as a container
to collect the leaked liquid. Moreover, it separates the twin that tag’s signal is almost irrelevant to its location in the
tags from the monitored target (e.g., the flanges, which are sensor. (ii) The RSSI and phase measurements remain stable
generally metal) to avoid the electromagnetic shielding. A before the leakage. (iii) After the leakage starts, the RSSI rises
piece of plastic film wraps the twin tag and the cotton, which slightly at the beginning (termed as Stage I), then drops with
excludes the disturbances from external environmental factors, the increased amount of the liquid (termed as Stage II), and
e.g. humidity. Twin-Tag can be easily pasted or tied to the finally becomes stable again (termed as Stage III) when the
leakage points (Fig. 1). When the liquid starts to leak out, cotton is saturated (∼ 20mL). Meanwhile, the phase value
the cotton absorbs the liquid, which influences the RSSI and decreases monotonously.
phase of the sensor’s signal. (2) Signal of Twin-Tag. Now we show that Twin-Tag offers
The core intuition of Twin-Tag’s design is the integration a distinct evidence for the early-stage leakage detection due to
of two parallel and proximate tags. The reasons we use a pair the the interplay between the two tags (Fig. 2(b)). Specifically,
of tags instead of a single tag are: we find that (i) before the leakage, there is a gap between the
1) Signal variation of a single tag is too slight to be RSSI measurements of the two tags, although they suffer from
stably detected in the early stage. The mutual inductive similar reader-tag path loss. (ii) When the leakage starts, the
coupling of the twin tags can amplify such variation. RSSI of Tag 1 rises sharply, and hence the RSSI gap gets
2) Inductive coupling effect between two adjacent tag can narrowed rapidly in Stage I.
also filter out the variation that cased by other confound- The above observation brings dual benefits to the early-stage
ing events. leakage detection: (i) Compared to the single-tag design, the
Twin-Tag offers the distinguishable pattern in Stage I. (ii) And
B. How does leakage change the signal of Twin-Tag? such pattern can remarkably reduce the false alarms caused
Figure 2 demonstrates the backscatter signal of Twin-Tag by other confounding events, since the closely-deployed twin
that collected during leakage processes in various scenarios. tags experience similar interferences from other confounding
(1) Signal of a single tag. We first explore how the leaked events.
liquid affects the signal of a single tag. Specifically, Fig. 2(a) Fig. 3(a) shows signal of the Twin-Tag collected when
shows the RSSI and phase measurements obtained when a obstacles (metal objects and human bodies) move around the
single tag is located at different positions (termed as Position reader-tag LOS path. We can see that the RSSI gap stays
A and B shown in Fig. 1). We observe that (i) the signals almost unchanged even during rapid fluctuations while the
collected at different locations are almost identical, indicating phase readings of the two tags are almost identical. Therefore,
885
Parallel Equivalent ܼሾȲሿ
Impedance ܼԢ
ࡵ ܼ
ࡿ ࡵ V
Tag 1 ܼ ܼு
ࡸ
ࡵ Antenna Chip
Fig. 4. Asymmetric Mutual Inductive Coupling Effect. Fig. 5. RFID tag Model.
we can define a robust gap feature to recognize Stage I during where ± stands for the direction of the flux, Φ represents
leakage: its absolute value. Due to the symmetry of S1 and S2 to the
d(r2 − r1 ) dr1 reader, we assume that the original fluxes (ΦS1 and ΦS2 ),
f= · (1) and their mutual fluxes (ΦS2 →S1 and ΦS1 →S2 ) are identical.
dt dt
Besides, the fluxes induced by adjacent Li (ΦL1 →S1 and
where r1 , r2 stands for the RSSI readings of Tag 1 and Tag
ΦL2 →S2 ) are also identical. However, the fluxes induced by
2 respectively. Fig. 3(b-Top) shows the CDF of the gap feature
farther Li are totally different. According the Ampere’s right-
in various conditions, where we can conclude that the early
hand rule and the Biot-Savart Law, they are in the opposite
stage of the liquid leakage is distinguishable from normal state
directions and ΦL2 →S1 > ΦL1 →S2 . Therefore, according to
or other confounding events. By fixing the leakage rate, we
the Faraday’s law of electromagnetic induction, the inductive
further verify the robustness of the gap feature to distance, as
electromotive force of Tag 1 is smaller than Tag 2, which
shown in Fig. 3(b-Bottom).
explains the initial RSSI gap:
(3) Impact of the leakage rate and volume. We also
observe the impact of the leakage rate and volume to the signal
pattern of the Twin-Tag. As shown in Fig. 2(c)(d), we find d Σ d
ΔE = − (Φ − ΦΣ
S1 ) = (ΦL1 →S2 + ΦL2 →S1 ) > 0 (3)
that: (i) The leakage rate won’t change the shape of the signal dt S2 dt
pattern, but will only induce temporal stretching and shrinking.
(ii) The leakage volume only cause the spatial truncation (2) Signal variation during leakage. Since the leaked liq-
without changing the shape either. Thus, the ability of early- uid does not block the reader-tag LOS path, the backscattered
stage detection of Twin-Tag preserves, and in the meanwhile, signal variates due to the near-field coupling between the liquid
an opportunity is offered to estimate extra properties of the and the tag’s antenna. We model the liquid with an equivalent
leakage process. impedance Z(Ψ), where Ψ relates to its volume. Then, the
tag’s input impedance ZA becomes ZA (Ψ) = ZZAA+Z(Ψ) ·Z(Ψ)
.
C. Theoretical analysis of the signal pattern Denoting the tag’s chip impedance as ZC , now we can note
Next, we explain the signal pattern of the Twin-Tag. that the power-reflection coefficient K which represents the
(1) The initial RSSI gap. We notice that there exists an ratio of backscattered power becomes:
initial RSSI gap between Tag 1 and Tag 2 although they suffer
2
from similar reader-tag path loss. Since such phenomenon does ∗
ZC − ZA (Ψ)
K(Ψ) = |1 − ρ(Ψ)| = 1 − 2
(4)
ZC + ZA (Ψ)
not preserve in the single-tag measurement, we attribute it to
the asymmetric interaction called mutual inductive coupling
between the two adjacent tags, which results from the near- Along with the increasing of Ψ, the impedance matching
field electromagnetic induction [14] [15]. Next, we exploit the relationship ZC = ZA ∗
(Ψ) no long preserves, and the received
structure-aware and asymmetric model introduced by Twins signal at the reader side becomes weaker. We attribute the
[14] to explain the initial RSSI gap of the Twin-Tag. slight RSSI rise of a single tag in Stage I (Fig. 2(a)) to the
As shown in Fig. 4, the dipole antenna is deemed to be initial imperfect impedance matching [16].
equivalent to an electric dipole (denoted as a line L) and a However, such pattern is too slight to be robustly detected,
magnetic dipole (denoted as a rectangle S) in this model [14]. which motivates the design of the Twin-Tag: By considering
The equal currents induced by the reader on Li and Si , i ∈ the mutual coupling during the leakage, we ”magnify” the
{1, 2}, will generate a magnetic field around themselves, and signal variation in Stage I for early-stage detection. When
further mutually change the magnetic flux in S1 and S2 : the liquid leakage occurs, the mutual inductive coupling gets
weak, and thus ΔE gradually drops to zero. Therefore in Stage
ΦΣ
S1 = +ΦS1 − ΦL1 →S1 − ΦS2 →S1 + ΦL2 →S1 I, the RSSI value of Tag 1 rises rapidly closer to Tag 2, which
(2)
ΦΣ
S2 = +ΦS2 − ΦL2 →S2 − ΦS1 →S2 − ΦL1 →S2
contributes a distinct and detectable signal pattern.
886
Fast Detection Joint Estimation
1. State Identification: ܶ ൌ ሼܶ
ௐ
ሽ 3. Leakage Process Tracking: 50
ܹ Feature
Variance
0
Predict:
ܫ ܫܫ ܫܫ ܫܫ ܫܫ ܫܫ ܫ Deviation From “Stable”
Misclassification
Truncation Point
Linear-Fit Slot
2. Leakage Signal Extraction: Linear-Fit RMSE -50 Normal
Leakage - Stage II
ௐ
Diff. Variance Leakage - Stage I
ሼܫ ሽ
Coarse Segmentation 4. Property Estimation: Diff. Average -100
Interference
Temporal Scaling Ratio Spatial Truncation Ratio Fig. 7. Feature Table. Fig. 8. Clustering Visualization.
՜ Leakage Rate ՜ Leakage Volume
Refine Segmentation
887
results, and then localize the exact starting and ending points
800
1000
on the coarse segment, providing a refined segmentation result.
Step 1: Coarse segmentation. In the coarse segmentation 800
600
Truncation Point
Template Sequence
stage, TwinLeak identifies a succession of leakage-state win- ta
(4 drop/s, 20mL)
nd 600
dows and splices the signal contained in these windows to g Ba
400
earchin
generate a coarse signal segmentation result. The problem we ed S 400
rain
onst
el-C Ⱦ
200
meet here is how to tolerate the errors in state identification. Mod
200
Instead of treating each signal window independently, here we
Ƚ
explore its predecessors and successors to eliminate anomalies.
RSSI (dB)
-40
-40
-45
-50
-55
Specifically, given a sequence of labeled signal windows Target Sequence -45
(W ) (W ) RSSI (dB) tb
{Tj }, we calculate a parameter Ij for each window (1 drop/s, 12mL) -50
which indicates the ratio of its N contextual windows that -55
500 1000 1500
are identified as leakage states:
j+ N Fig. 9. Model-Guided Leakage Tracking.
2
(W ) 1 (W )
Ij = N I(Tk is leakage) (5) repeated for 30 times on different sensors and under different
2 2 + 1
k=j− N
2 leakage rate, during which the reader continuously reads the
(W ) tag to get the RSSI and phase streams. At last, an nearest-
Then, a succession of m signal windows {Tj }m which centroid algorithm called DBA [17] is exploited to generate
(W )
satisfies (i) all Ij > 0 and (ii) its length m > M is extracted the template based on the collected data.
as a coarse segmentation of leakage signal. We empirically set Step 2: Leakage progress estimation TwinLeak tracks
N = 3 and M = 4 in the implementation of TwinLeak. the leakage process using a Dynamic Time Warping (DTW)
Step 2: Refined segmentation. Next, we refine the ex- based search algorithm. A good overview of DTW algorithm
tracted leakage signal by identifying the specific starting point can be found in [18]. Broadly speaking, DTW compares two
of the leakage event. In Sect. III-B, we observe that the RSSI (1) (L )
sequence segments, denoted as Sa = {Sa , ..., Sa a } and
/ phase readings remain stable before the leakage or after the (1) (L )
Sb = {Sb , ..., Sb b } by warping (i.e., stretching and squeez-
cotton gets saturated. Thus, we can estimate the starting point ing) one of the sequences until an optimal match between them
by calculating the intersection point of the local linear fit of is found. More specifically, the target of DTW algorithm is to
normal samples and the local linear fit of leakage samples. Sa and Sb so as to
However, since our signal source contains four streams: La function fM between
find a matching
minimize i=1 (Sa [i] − Sb [fM (i)])2 .
RSSI and phase readings of the twin tags (denoted as Despite its wide usage, DTW cannot be directly applied
Ri , Pi , i ∈ {1, 2}, respectively), separately localizing the to track the leakage process for the following two reasons:
starting point sp[s] for each stream s ∈ S = {R1 , R2 , P1 , P2 } (i) The goal of DTW is to minimize the sequence distance
is error-prone and ambiguous. We choose a joint estimation after arbitrary warping, however when matching two leakage
from the result collection sp = {sp[s] |s ∈ S} that minimizes signals, the warping should be relatively “steady” rather than
the sum of the normalized fitting errors. “arbitrary”, due to the relatively stable leakage rate. (ii) The
VI. J OINT E STIMATION leakage process may be stopped before the cotton is saturated,
thus incomplete sequence matching should be considered.
As we observed in Sect. III-B, there exist temporal and
Therefore, to address the above problems, TwinLeak proposes
spatial relationships among the signal patterns under different
a model-guided DTW progress tracking method. As shown in
leakage volumes and rates. Therefore, after extracting the
Fig. 9, in this method, we constrain the DTW matching path
signal segments corresponding to the leakage process, Twin-
with 2 parameters α and β, where:
Leak then jointly estimates these properties and reconfirms the
early-stage detection. • α guides the direction of searching: since commonly the
leakage rate is relatively stable, α – the ratio of the
A. Model-Guided Leakage Tracking leakage rate of the two leakage signals is relatively stable.
To estimate leakage volume and rate, we should first track • β bounds the step length of searching: such step-
the leakage process. Therefore, a simple and low-overhead constrained DTW can somehow avoid arbitrary warping
calibration is first performed to get a complete and accurate and tolerate local jitters.
signal template of the leakage process. Then we track the • Together with α and β, the spatial truncation of “unsat-
leakage progress by matching the signal segments extracted urated” signal can also be achieved in advance to avoid
fast detection component to the target signal template. unexpected errors.
Step 1: Low overhead calibration Tag calibration is We formulate these limitations with the following:
conducted only once before the deployment of the tags.
During calibration, we manually trigger leakage process on |fM (ib ) − ia | = |α · ib − ia | ≤ β (6)
the Twin-Tag sensors, where the leakage rate is stable, and the
leakage volume is controlled at 20mL. The above process is The above limitations on the DTW matching path are
888
derived by the leakage signal model observed and analyzed
in Sect. III, thus we call it model-guided DTW matching. We
note that the value of α can be roughly estimated by comparing
the length ratio of leakage-Stage I of two leakage sequences,
Twin-Tag Sensor
and the value of β can be derived from the statistics of ̱ͲǤ݉
B. Property Estimation.
As shown in Fig. 2, the temporal and spatial transformation Fig. 10. Real-World Deployment of TwinLeak.
of the signal patterns are closely related to the leakage rate
continuous waves and receive the backscattered signals from
r and volume v respectively. Given the template sequence
Twin-Tag. Fig. 10 demonstrates the real-world deployment of
Sa and the target sequence Sb , we conclude the critical
TwinLeak in our industrial IoT project Pavatar for the power
observations as (i) r(Sb ) determines its temporal scaling of
industry [19].
the template Sa without the shape violation; (ii) v(Sb ) does
not scale up or down Sa but spatially truncates it by entering The software part has 3 main components: (1) a Websocket
the stable state in advance. Thus, based on these observations, data provider (implemented in Java) that continuously acquires
r(Sb ) and v(Sb ) can be estimated by inferring the temporal RSSI and phase readings through ImpinJ’s API; (2) an offline
scaling factor and spatial truncation ratio. trainer (implemented in MATLAB) that generates the gen-
eral signal templates; (3) an online detector (implemented in
In TwinLeak, we jointly estimate the probability of the leak-
Python) performs the liquid detection task with the processing
age event and infer the leakage rate and volume by inspecting
components described in Sect. V and VI.
the model-guided leakage tracking process. As shown in Fig.
9, the truncation point t = (ta , tb ) is detected through inversely B. Methodologies and Settings
traversing by maximizing the similarity between the truncated
subsequences Ŝa = fM (Sa [1 : ta ]) and Ŝb = fM (Sb [1 : tb ]). Our evaluation mainly focuses on the problem of detecting
whether the leakage event occurs or not in given signal
Then, we can tjointly estimate the average matched distance
d(Sb ) = 1t i=1 (Ŝa [i] − Ŝb [i])2 , the leakage rate r(Sb ) = sequences. TPR (True Positive Rate) evaluates the capability
r(Sa ) · ttab and volume v(Sb ) = v(Sa ) · Ltaa . To estimate the of TwinLeak to recognize the leakage event, and FPR (False
probability of the leakage event, we calculate the probability Positive Rate) evaluates the frequency of false alarm under the
that d(Sb ) belongs to a pre-derived distribution of the average multi-path interferences. We also focus on the impacts of the
matched distances of the training set. This probability could critical properties (e.g. rate and volume) of the leakage event
be further utilized as an reconfirmation of the early-stage on the detection accuracy.
detection made by fast detection component. The data for training the state identifier and extracting the
signal template is collected in various scenarios, e.g. different
VII. I MPLEMENTATION AND E VALUATION leakage rates and volumes as well as unrestricted reader-
In this section, we first detail the implementation of Twin- tag distances. The signals disturbed by the external multi-
Leak (Sect. VII-A) and then introduce the evaluation settings path interferences are also utilized for the offline classifier
and the metrics (Sect. VII-B). The experiment results of some training. Furthermore, we separately collect an evaluation
critical micro-benchmarks and the detection precision is shown dataset, in which the leakage rates (1, 4, 8drop/s) and volumes
in the subsequent subsections. (10, 15, 20mL) are the main variables, and reader-tag distance
is fixed to 60cm since we measure that such distance won’t
A. Implementation change the signal pattern in Sect. III-B. We collect 10 samples
The implementation of TwinLeak mainly consists of the for each combination of these two parameters.
hardware part and the software part. First, we handcraft
dozens of the Twin-Tag. Two important parameters of the C. Micro-benchmarks
Twin-Tag are: (1) the size of the absorbent cotton is around First, we evaluate some micro-benchmarks of the core
10cm × 2cm × 0.4cm, which can absorb about 20mL liquid components in TwinLeak.
before getting saturated; (2) the distance between the twin (1) State Identification. As the first step of TwinLeak,
tags is around 1mm, which can result in about 5dB RSSI gap. state identification gives the system a preliminary view of the
Apart from the sensor, an ImpinJ Speedway R420 RFID reader signal state. Fig. 11(a) plots the classification confusion matrix.
with a Laird circular polarized antenna is deployed to provide We can observe that, although we only use a simple but fast
889
Confusion Matrix Leakage Volume = 10mL Leakage Volume = 20mL
0.1 0.1
96.3% 4.7% 0.9% 8.9% 1 95.66% 96.14% 96.91%
Normal
1173 37 4 23
0.08 0.08
0.8
Relative Error
Relative Error
2.0% 90.7% 8.7% 1.2%
TPR/FPR
Output Class
(a) Confusion Matrix (b) Impact of Leakge Rate (a) Local. Error (v = 10mL) (b) Local. Error (v = 20mL)
Fig. 11. The evaluation of State Identification. Fig. 13. The evaluation of Refined Segmentation.
Leakage Volume = 10mL Leakage Volume = 20mL Leakage Volume = 10mL Leakage Volume = 20mL
100.00% 100.00% 100.00% 100.00% 100.00% 100.00% 100.00% 100.00%
1 1 96.15% 1 1
90.00% 90.00% 90.00%
TPR/FPR
TPR/FPR
TPR/FPR
TPR/FPR
(a) Coarse Seg. Acc. (v = 10mL) (b) Coarse Seg. Acc. (v = 20mL) (a) Temp. Match. Acc. (v = 10mL) (b) Temp. Match. Acc. (v = 20mL)
Fig. 12. The evaluation of Coarse Segmentation. Fig. 14. The evaluation of Model-Guided Leakage Tracking.
decision-tree classifier, three signal states can be well distin- D. Leakage Detection
guished from each other due to the good patterns provided by Second, we evaluate the main task of the leakage detection
Twin-Tag. Although “inner” misclassification of Stage I and II by examining the final detection accuracy and the prediction
of the leakage state is relative high, the TPR of overall leakage errors of property estimation.
state reaches 98.7%. Moreover, the false alarm induced by the (1) Detection Precision. We match all the segmented testing
interferences is acceptable although it might be misclassified data (3 × 3 × 10 = 90 samples), provided by our fast
as the normal state. Since state identification adopts a fixed detection module, to the pre-learned signal template with
time-window of length 10s for feature extraction, we evaluates the proposed model-guided leakage tracking algorithm. The
the impact of the rate of the signal variation by controlling average matched distance d is derived from the matching
the leakage rates. Fig. 11(b) shows that the FPR and TPR are process, which solely acts as the final indicator for the bi-
almost unaffected by the leakage rate, which mainly results nary classification. Fig. 14 demonstrates that TwinLeak can
from the good generalizability of Twin-Tag’s signal patterns. achieve a relatively high TPR and low FPR regardless of the
(2) Leakage Signal Extraction. The two-step signal ex- leakage rates and volumes. Although the segmentation might
traction method, which extracts the signals during the leakage be incomplete, the optimal average matched distance along
events from coarse to refined, is a critical pre-processing the restricted searching band can well describe the similarity
further false-alarm refusal and property estimation. between the template and the target sequences.
We denote the true positive of coarse segmentation as (2) Estimation Error rate. Then, given the leakage rate
the result that it generates a good proposal containing an rT = 4 drop/s and volume vT = 20mL (Saturated) of
ground truth leakage signal. We can tell from Fig. 12 that an the template, we evaluate the prediction error of the leakage
incomplete coarse segmentation is more likely to be proposed rate and volume. As shown in Fig. 15, we can tell the
due to the misclassification of data slices during the time when absolute prediction errors for both of the leakage rate and
the signal variation is relatively gentle. e.g. r = 1 drop/s. We volume are very small and not sensitive to the changes of the
will address later that these incomplete segmentations won’t other property. Moreover, we calculate the average relative
affect the final classification but might degrade the property prediction error as ẽr = 14.7% and ẽv = 15.3%.
estimation.
Besides, we measure the relative errors of refined segmenta- E. Application-Driven Metrics
tion on those good sequences proposed by the last step. Fig. 13 (1) Timeliness V.S. Accuracy. To satisfy the timeliness
shows that low relative errors (the absolute localization errors requirement, TwinLeak can directly raise an alarm when k
divided by the total length) around 1.5% can be obtained by successive windows are determined as the leakage state -
the algorithm. The rate of signal variation mainly affects the Stage I (denoted as TwinLeak-Fast). Compared to the full pro-
performance, because the deviations get more distinct if the cedure of TwinLeak (denoted as TwinLeak-Full), TwinLeak-
signals vary more sharply. Fast can improve much timeliness but might sacrifice some
890
4 400 50
Accuracy
0.8 30
TPR
0.6 0.6
2 200
0.6
20
0.4 0.4
0.4
1 100
0.2 10
0.2 0.2
0 0 0 0 0 0
1 4 8 12 4 6 8 10 12 14 16 18 x100 x500
10 15 20 1 4 8
Leakage Rate (drop/s) #(Twin-Tag)
Leakage Volume (mL) Leakage Rate (drop/s)
(a) Leakage Rate Estimation (b) Leakage Volume Estimation (a) Timeliness V.S. Accuracy (b) Multi-Point Surveillance
Fig. 15. The evaluation of Property Estimation. Fig. 16. The evaluation of Property Estimation.
891