Fast and Scalable Counterfeits Estimation for Large-Scale RFID Systems

被引:26
作者
Gong, Wei [1 ]
Stojmenovic, Ivan [1 ]
Nayak, Amiya [1 ]
Liu, Kebin [2 ]
Liu, Haoxiang [3 ]
机构
[1] Univ Ottawa, Sch Elect Engn & Comp Sci, Ottawa, ON K1N 6N5, Canada
[2] Tsinghua Univ, Tsinghua Natl Lab Informat Sci & Technol, Beijing 100084, Peoples R China
[3] Hong Kong Univ Sci & Technol, Dept Comp Sci & Engn, Hong Kong, Hong Kong, Peoples R China
基金
加拿大自然科学与工程研究理事会;
关键词
Counterfeits estimation; informative counting; RFID tags; ALGORITHMS; TREE;
D O I
10.1109/TNET.2015.2406669
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many algorithms have been introduced to deterministically authenticate Radio Frequency Identification (RFID) tags, while little work has been done to address scalability issue in batch authentications. Deterministic approaches verify tags one by one, and the communication overhead and time cost grow linearly with increasing size of tags. We design a fast and scalable counterfeits estimation scheme, INformative Counting (INC), which achieves sublinear authentication time and communication cost in batch verifications. The key novelty of INC builds on an FM-Sketch variant authentication synopsis that can capture key counting information using only sublinear space. With the help of this well-designed data structure, INC is able to provide authentication results with accurate estimates of the number of counterfeiting tags and genuine tags, while previous batch authentication methods merely provide 0/1 results indicating the existence of counterfeits. We conduct detailed theoretical analysis and extensive experiments to examine this design and the results show that INC significantly outperforms previous work in terms of effectiveness and efficiency.
引用
收藏
页码:1052 / 1064
页数:13
相关论文
共 33 条
[1]  
[Anonymous], 2010, ECONOMIST
[2]  
[Anonymous], 2008, RAD FREQ ID PROT CLA
[3]  
Benedetti D., 2012, P IEEE MASS
[4]  
Bolotnyy L., 2007, P IEEE PERCOM
[5]  
Bullen P.S., 2003, Handbook of Means and Their Inequalities
[6]   TREE ALGORITHMS FOR PACKET BROADCAST CHANNELS [J].
CAPETANAKIS, JI .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1979, 25 (05) :505-515
[7]  
Counterfeiting Intelligence Bureau, 1997, COUNT COUNT GUID PRO
[8]  
Devadas S., 2008, P IEEE RFID
[9]  
Dimitriou T., 2006, P IEEE PERCOM
[10]   PROBABILISTIC COUNTING ALGORITHMS FOR DATABASE APPLICATIONS [J].
FLAJOLET, P ;
MARTIN, GN .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1985, 31 (02) :182-209