Who stole my cheese

作者: Kai Bu , Junze Bao , Minyu Weng , Jia Liu , Bin Xiao

DOI: 10.1016/J.ADHOC.2015.06.006

关键词:

摘要: Radio-Frequency Identification (RFID) technology has fostered many object monitoring applications. Along with this trend, a corresponding important problem is to verify the intactness of set objects using that their attached tags. Existing solutions necessitate knowledge tag identifiers (IDs), sharing intuition verifying whether any absent comes after knowing which tags are supposed be present. Such solutions, however, can hardly live up recent vision anonymous RFID systems isolate IDs from protocols design for privacy concern. In paper, we take first leap toward systems. We identify three critical solution requirements-deterministic verification, anonymity preservation, and scalability-for applications tolerating no absence. Without as priori, propose series crypto-free, lightweight satisfy requirements. The proposed explore tag-cardinality difference or leverage Direct-Sequence Spread Spectrum enabled RFID. validate performance in terms accuracy, privacy, scalability through both analytical simulation results. To cater tolerate losing some tagged objects, further probabilistic verification trade tiny accuracy boosted efficiency.

参考文章(42)
Kai Bu, Xuan Liu, Jiaqing Luo, Bin Xiao, Guiyi Wei, Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems IEEE Transactions on Information Forensics and Security. ,vol. 8, pp. 429- 439 ,(2013) , 10.1109/TIFS.2012.2237395
Shyamnath Gollakota, Haitham Hassanieh, Benjamin Ransford, Dina Katabi, Kevin Fu, They can hear your heartbeats: non-invasive security for implantable medical devices acm special interest group on data communication. ,vol. 41, pp. 2- 13 ,(2011) , 10.1145/2018436.2018438
Lawrence G. Roberts, ALOHA packet system with and without slots and capture ACM SIGCOMM Computer Communication Review. ,vol. 5, pp. 28- 42 ,(1975) , 10.1145/1024916.1024920
Kai Bu, Mingjie Xu, Xuan Liu, Jiaqing Luo, Shigeng Zhang, Toward Fast and Deterministic Clone Detection for Large Anonymous RFID Systems mobile adhoc and sensor systems. pp. 416- 424 ,(2014) , 10.1109/MASS.2014.12
Lei Xie, Hao Han, Qun Li, Jie Wu, Sanglu Lu, Efficient Protocols for Collecting Histograms in Large-Scale RFID Systems IEEE Transactions on Parallel and Distributed Systems. ,vol. 26, pp. 2421- 2433 ,(2015) , 10.1109/TPDS.2014.2357021
Xuan Liu, Bin Xiao, Shigeng Zhang, Kai Bu, Unknown Tag Identification in Large RFID Systems: An Efficient and Complete Solution IEEE Transactions on Parallel and Distributed Systems. ,vol. 26, pp. 1775- 1788 ,(2015) , 10.1109/TPDS.2014.2326651
Yi-Sheng Su, Ozan K. Tonguz, Using the Chinese Remainder Theorem for the Grouping of RFID Tags IEEE Transactions on Communications. ,vol. 61, pp. 4741- 4753 ,(2013) , 10.1109/TCOMM.2013.101113.130216
Yuanqing Zheng, Mo Li, P-MTI: Physical-layer Missing Tag Identification via compressive sensing 2013 Proceedings IEEE INFOCOM. pp. 917- 925 ,(2013) , 10.1109/INFCOM.2013.6566880
Xiulong Liu, Keqiu Li, Geyong Min, Yanming Shen, Alex X. Liu, Wenyu Qu, A Multiple Hashing Approach to Complete Identification of Missing RFID Tags IEEE Transactions on Communications. ,vol. 62, pp. 1046- 1057 ,(2014) , 10.1109/TCOMM.2014.011914.130089