Efficient Techniques for Monitoring Missing RFID Tags

被引:53
作者
Tan, Chiu C. [1 ]
Sheng, Bo [2 ]
Li, Qun [1 ]
机构
[1] Coll William & Mary, Dept Comp Sci, Williamsburg, VA 23187 USA
[2] Northeastern Univ, Coll Comp & Informat Sci, Boston, MA 02115 USA
基金
美国国家科学基金会;
关键词
Authentication; privacy; RFID; search; security;
D O I
10.1109/TWC.2010.06.081301
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As RFID tags become more widespread, new approaches for managing larger numbers of RFID tags will be needed. In this paper, we consider the problem of how to accurately and efficiently monitor a set of RFID tags for missing tags. Our approach accurately monitors a set of tags without collecting IDs from them. It differs from traditional research which focuses on faster ways for collecting IDs from every tag. We present two monitoring protocols, one designed for a trusted reader and the other for an untrusted reader.
引用
收藏
页码:1882 / 1889
页数:8
相关论文
共 50 条
  • [1] Efficient detection of missing tags for passive RFID systems
    Sanchez, Leonardo
    Ramos, Victor
    Ledesma, Oscar
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (09) : 1545 - 1567
  • [2] An Efficient Hash-based RFID Grouping Authentication Protocol Providing Missing Tags Detection
    Tan, Haowen
    Choi, Dongmin
    Kim, Pankoo
    Pan, Sungbum
    Chung, Ilyong
    JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (02): : 481 - 488
  • [3] Efficient collision-slot utilization for missing tags identification in RFID system
    Guo, Kaimin
    Xie, Xin
    Chen, Sheng
    Qi, Heng
    Li, Keqiu
    COMPUTER COMMUNICATIONS, 2022, 195 : 61 - 72
  • [4] EMAP: An Efficient Mutual Authentication Protocol for Passive RFID Tags
    Li, Guo-Rui
    Wang, Ying
    Wang, Cui-Rong
    He, Jing-Sha
    INTERNATIONAL JOURNAL OF AUTOMATION AND COMPUTING, 2012, 9 (01) : 108 - 112
  • [5] EMAP: An Efficient Mutual Authentication Protocol for Passive RFID Tags
    Guo-Rui Li1 Ying Wang2 Cui-Rong Wang1 Jing-Sha He3 1Electronic Information Department
    International Journal of Automation and Computing, 2012, (01) : 108 - 112
  • [6] An efficient mutual authentication protocol on RFID tags
    Huang, Hui-Feng
    EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, 4809 : 550 - +
  • [7] Anonymous Coexistence Proofs for RFID Tags
    Lo, Nai-Wei
    Yeh, Kuo-Hui
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2010, 26 (04) : 1213 - 1230
  • [8] Efficient and reliable estimation of tags in RFID
    Huang, Xu
    IMECS 2008: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2008, : 1169 - 1173
  • [9] An Efficient and Secure RFID Batch Authentication Protocol with Group Tags Ownership Transfer
    Zhang, Rong
    Zhu, Liehuang
    Xu, Chang
    Yi, Yi
    2015 IEEE CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2015, : 168 - 175
  • [10] Private Identification of RFID Tags
    Malek, Behzad
    Miri, Ali
    FOUNDATIONS AND PRACTICE OF SECURITY, 2011, 6888 : 49 - +