Efficient missing tag identification in blocker-enabled RFID systems

作者: Xia Wang , Jia Liu , Yanyan Wang , Xingyu Chen , Lijun Chen

DOI: 10.1016/J.COMNET.2019.106894

关键词:

摘要: Abstract Due to limited on-chip resources, RFID tags may blindly respond any readers authorized or not, leading privacy leakage when sensitive data are exposed. A feasible solution this problem is deploying blocker that emulate and behave like the genuine tags. With deployment, there always a virtual tag produced by responds reader be protected replies, resulting in irreconcilable collisions thus preventing privacy-leakage. This paper studies of missing identification blocker-enabled systems. Unlike existing work, will get responses from even lost, which makes solutions unavailable. To address problem, we propose three efficient protocols. The first group-based protocol splits entire set into subsets separately deals with each them different ways. second called collision-reconciled turns some useless collision slots useful singleton slots, increasing slot availability thereby reducing execution time. third concurrent improves time efficiency missing-event detection running grouping parallel rather than sequence. Theoretical analyses extensive simulations show our protocols far superior benchmark. For example, best can improve factor 6.

参考文章(49)
Kai Bu, Junze Bao, Minyu Weng, Jia Liu, Bin Xiao, Xuan Liu, Shigeng Zhang, Who stole my cheese ad hoc networks. ,vol. 36, pp. 111- 126 ,(2016) , 10.1016/J.ADHOC.2015.06.006
Xiulong Liu, Heng Qi, Keqiu Li, Ivan Stojmenovic, Alex X. Liu, Yanming Shen, Wenyu Qu, Weilian Xue, Sampling Bloom Filter-Based Detection of Unknown RFID Tags IEEE Transactions on Communications. ,vol. 63, pp. 1432- 1442 ,(2015) , 10.1109/TCOMM.2015.2402660
Tao Li, Shigang Chen, Yibei Ling, Efficient protocols for identifying the missing tags in a large RFID system IEEE ACM Transactions on Networking. ,vol. 21, pp. 1974- 1987 ,(2013) , 10.1109/TNET.2013.2245510
Lawrence G. Roberts, ALOHA packet system with and without slots and capture ACM SIGCOMM Computer Communication Review. ,vol. 5, pp. 28- 42 ,(1975) , 10.1145/1024916.1024920
Jia Liu, Bin Xiao, Kai Bu, Lijun Chen, Efficient distributed query processing in large RFID-enabled supply chains international conference on computer communications. pp. 163- 171 ,(2014) , 10.1109/INFOCOM.2014.6847936
Lei Xie, Hao Han, Qun Li, Jie Wu, Sanglu Lu, Efficient Protocols for Collecting Histograms in Large-Scale RFID Systems IEEE Transactions on Parallel and Distributed Systems. ,vol. 26, pp. 2421- 2433 ,(2015) , 10.1109/TPDS.2014.2357021
Wen Luo, Shigang Chen, Yan Qiao, Tao Li, Missing-tag detection and energy-time tradeoff in large-scale RFID systems with unreliable channels IEEE ACM Transactions on Networking. ,vol. 22, pp. 1079- 1091 ,(2014) , 10.1109/TNET.2013.2270444
Xuan Liu, Bin Xiao, Shigeng Zhang, Kai Bu, Unknown Tag Identification in Large RFID Systems: An Efficient and Complete Solution IEEE Transactions on Parallel and Distributed Systems. ,vol. 26, pp. 1775- 1788 ,(2015) , 10.1109/TPDS.2014.2326651
Xiulong Liu, Keqiu Li, Geyong Min, Yanming Shen, Alex X. Liu, Wenyu Qu, Completely Pinpointing the Missing RFID Tags in a Time-Efficient Way IEEE Transactions on Computers. ,vol. 64, pp. 87- 96 ,(2015) , 10.1109/TC.2013.197
Ari Juels, Ronald L. Rivest, Michael Szydlo, The blocker tag: selective blocking of RFID tags for consumer privacy computer and communications security. pp. 103- 111 ,(2003) , 10.1145/948109.948126