Efficient Techniques for Monitoring Missing RFID Tags

被引:53
作者
Tan, Chiu C. [1 ]
Sheng, Bo [2 ]
Li, Qun [1 ]
机构
[1] Coll William & Mary, Dept Comp Sci, Williamsburg, VA 23187 USA
[2] Northeastern Univ, Coll Comp & Informat Sci, Boston, MA 02115 USA
基金
美国国家科学基金会;
关键词
Authentication; privacy; RFID; search; security;
D O I
10.1109/TWC.2010.06.081301
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As RFID tags become more widespread, new approaches for managing larger numbers of RFID tags will be needed. In this paper, we consider the problem of how to accurately and efficiently monitor a set of RFID tags for missing tags. Our approach accurately monitors a set of tags without collecting IDs from them. It differs from traditional research which focuses on faster ways for collecting IDs from every tag. We present two monitoring protocols, one designed for a trusted reader and the other for an untrusted reader.
引用
收藏
页码:1882 / 1889
页数:8
相关论文
共 50 条
  • [31] RFID Authentication Protocol for Low-cost RFID Tags
    Kang, BooJoong
    Kim, Hye Seon
    Kim, Eui-Hyung
    Kim, Hyong-Shik
    Im, Eul Gyu
    [J]. INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (06): : 2041 - 2060
  • [32] An efficient ultralightweight authentication protocol for RFID systems
    Yeh K.-H.
    Lo N.W.
    Winata E.
    [J]. Cryptology and Information Security Series, 2010, 4 : 49 - 60
  • [33] Exposing Clone RFID Tags at the Reader
    Mirowski, Luke
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1669 - 1674
  • [34] A Novel Authentication Protocol Enabling RFID Tags Ownership Transfer
    Wang, Hong
    Yang, Xiaolong
    Huang, Qiong
    Long, Keping
    [J]. PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 855 - 860
  • [35] An Efficient Missing Tag Identification Approach in RFID Collisions
    Su, Jian
    Sheng, Zhengguo
    Liu, Alex X.
    Fu, Zhangjie
    Huang, Chenxi
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2023, 22 (02) : 720 - 731
  • [36] Keeping It Under Control: A New Authentication Scheme for RFID Tags
    Li, Tongliang
    Jin, Zhigang
    Yang, Hongguang
    Si, Xiaokun
    [J]. 2010 5TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2010,
  • [37] RFIDGuard: a lightweight privacy and authentication protocol for passive RFID tags
    Liu, Alex X.
    Bailey, LeRoy A.
    Krishnamurthy, Adithya H.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (05) : 384 - 393
  • [38] A solution based on combination of RFID tags and facial recognition for monitoring systems
    Van-Dung Hoang
    Van-Dat Dang
    Tien-Thanh Nguyen
    Diem-Phuc Tran
    [J]. PROCEEDINGS OF 2018 5TH NAFOSTED CONFERENCE ON INFORMATION AND COMPUTER SCIENCE (NICS 2018), 2018, : 384 - 387
  • [39] Security Monitoring System Using Magnetically-Activated RFID Tags
    Asci, Cihan
    Wang, Wei
    Sonkusale, Sameer
    [J]. 2020 IEEE SENSORS, 2020,
  • [40] Wireless Ice Detection and Monitoring Using Flexible UHF RFID Tags
    Wagih, Mahmoud
    Shi, Junjie
    [J]. IEEE SENSORS JOURNAL, 2021, 21 (17) : 18715 - 18724