作者: Xia Wang , Jia Liu , Yanyan Wang , Xingyu Chen , Lijun Chen
DOI: 10.1016/J.COMNET.2019.106894
关键词:
摘要: Abstract Due to limited on-chip resources, RFID tags may blindly respond any readers authorized or not, leading privacy leakage when sensitive data are exposed. A feasible solution this problem is deploying blocker that emulate and behave like the genuine tags. With deployment, there always a virtual tag produced by responds reader be protected replies, resulting in irreconcilable collisions thus preventing privacy-leakage. This paper studies of missing identification blocker-enabled systems. Unlike existing work, will get responses from even lost, which makes solutions unavailable. To address problem, we propose three efficient protocols. The first group-based protocol splits entire set into subsets separately deals with each them different ways. second called collision-reconciled turns some useless collision slots useful singleton slots, increasing slot availability thereby reducing execution time. third concurrent improves time efficiency missing-event detection running grouping parallel rather than sequence. Theoretical analyses extensive simulations show our protocols far superior benchmark. For example, best can improve factor 6.