When Noise Can Help: Anonymous Group Writing in RFID-Enabled Backscatter Networks

被引:0
作者
Zhang, Rongrong [1 ]
Wang, Shuai [2 ]
Liu, Hao [3 ]
Huang, He [4 ]
Yu, Jihong [2 ]
Guan, Yong [1 ]
机构
[1] Capital Normal Univ, Informat Engn Coll, Beijing 100048, Peoples R China
[2] Beijing Inst Technol, Sch Informat & Elect, Beijing 100811, Peoples R China
[3] Commun Univ China, State Key Lab Media Convergence & Commun, Beijing 100024, Peoples R China
[4] Soochow Univ, Sch Comp Sci & Technol, Suzhou 215006, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
group writing; RFID; Backscatter; PROTOCOL;
D O I
10.1109/TMC.2024.3439024
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Efficient and secure group writing plays a crucial role in RFID-enabled multi-task backscatter systems. The prior works lay emphasis on the time efficiency of the group data transmission, but neglect its security. This paper is devoted to providing anonymous group writing. We propose the Overlapped Bloom Filter-based protocol (OBF) and its enhanced version (OBF+). The core is to construct an approximately random sequence as a noise by making transmission data for different tag groups overlap with each other, thus hiding the original information with a low computational complexity. The compact filter can guarantee the time efficiency while improving the security of the group writing. To make tags aware of the correctness of the decoded group data, the OBF+ introduces the complementary code-based check mechanism to eliminate the fault data. We prototype the system with USRP and programmable WISP tags, and conduct extensive simulations to evaluate our approaches in terms of the time efficiency, the accuracy, and the anonymity of the data transmission.
引用
收藏
页码:13760 / 13772
页数:13
相关论文
共 30 条
[1]  
[Anonymous], 2008, EPC radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 MHz - 960 MHz version 1.2.0
[2]  
Caihui Du, 2024, Proceedings of the 21st USENIX Symposium on Networked Systems Design and Implementation. NSDI '24, P1301
[3]  
Caihui Du, 2023, MobiSys '23: Proceedings of the 21st Annual International Conference on Mobile Systems, Applications and Services, P450, DOI 10.1145/3581791.3596858
[4]  
Chen K, 2022, INDIAN J SURG, V84, P789, DOI [10.1080/13675567.2021.1940112, 10.1007/s12262-021-02908-w]
[5]  
Chen M., 2016, PROC IEEE 24 INT C N, P1
[6]  
Du C., 2024, PROC IEEE C COMPUT C, P1
[7]   Low Cost RFID Security Protocol Based on Rabin Symmetric Encryption Algorithm [J].
Gao, Lijun ;
Zhang, Lu ;
Ma, Maode .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (01) :683-696
[8]  
Jia Liu, 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications, P1522, DOI 10.1109/INFOCOM.2019.8737609
[9]  
Jia Liu, 2015, 2015 IEEE Conference on Computer Communications (INFOCOM). Proceedings, P1948, DOI 10.1109/INFOCOM.2015.7218578
[10]   Computation-Communication Tradeoffs for Missing Multitagged Item Detection in RFID Networks [J].
Liu, Hao ;
Zhang, Rongrong ;
Chen, Lin ;
Yu, Jihong ;
Liu, Jiangchuan ;
An, Jianping ;
Chen, Qianbin .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (02) :1252-1264