Efficient Techniques for Monitoring Missing RFID Tags

被引:54
作者
Tan, Chiu C. [1 ]
Sheng, Bo [2 ]
Li, Qun [1 ]
机构
[1] Coll William & Mary, Dept Comp Sci, Williamsburg, VA 23187 USA
[2] Northeastern Univ, Coll Comp & Informat Sci, Boston, MA 02115 USA
基金
美国国家科学基金会;
关键词
Authentication; privacy; RFID; search; security;
D O I
10.1109/TWC.2010.06.081301
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As RFID tags become more widespread, new approaches for managing larger numbers of RFID tags will be needed. In this paper, we consider the problem of how to accurately and efficiently monitor a set of RFID tags for missing tags. Our approach accurately monitors a set of tags without collecting IDs from them. It differs from traditional research which focuses on faster ways for collecting IDs from every tag. We present two monitoring protocols, one designed for a trusted reader and the other for an untrusted reader.
引用
收藏
页码:1882 / 1889
页数:8
相关论文
共 50 条
[41]   RF-RES: Respiration Monitoring With COTS RFID Tags by Dopplershift [J].
Zhang, Jintao ;
Yu, Jiexiao ;
Ma, Yongtao ;
Liang, Xiuyan .
IEEE SENSORS JOURNAL, 2021, 21 (21) :24844-24854
[42]   An Efficient Anti-collision Protocol for Fast Identification of RFID Tags [J].
Joo, Yang-Ick ;
Seo, Dong-Hoan ;
Kim, Jae-Wan .
WIRELESS PERSONAL COMMUNICATIONS, 2014, 77 (01) :767-775
[43]   Focus and Shoot: Efficient Identification Over RFID Tags in the Specified Area [J].
Yin, Yafeng ;
Xie, Lei ;
Wu, Jie ;
Vasilakos, Athanasios V. ;
Lui, Sanglu .
MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING, AND SERVICES, 2014, 131 :344-357
[44]   An Efficient Anti-collision Protocol for Fast Identification of RFID Tags [J].
Yang-Ick Joo ;
Dong-Hoan Seo ;
Jae-Wan Kim .
Wireless Personal Communications, 2014, 77 :767-775
[45]   On sensor-based solutions for simultaneous presence of multiple RFID tags [J].
Piramuthu, Selwyn ;
Doss, Robin .
DECISION SUPPORT SYSTEMS, 2017, 95 :102-109
[46]   Solving the simultaneous scanning problem anonymously: Clumping proofs for RFID tags [J].
Peris-Lopez, Pedro ;
Hernandez-Castro, Julio C. ;
Estevez-Tapiador, Juan M. ;
Carlos, Arturo Ribagorda, III .
THIRD INTERNATIONAL WORKSHOP ON SECURITY, PRIVACY AND TRUST IN PERVASIVE AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, :55-+
[47]   RFID seeking: Finding a lost tag rather than only detecting its missing [J].
Xie, Wei ;
Xie, Lei ;
Zhang, Chen ;
Wang, Qiang ;
Xu, Jian ;
Zhang, Quan ;
Tang, Chaojing .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 42 :135-142
[48]   A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags [J].
Abughazalah, Sarah ;
Markantonakis, Konstantinos ;
Mayes, Keith .
SECURITY AND PRIVACY PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2013, 405 :102-110
[49]   Ultra Low-Power Techniques for Sensor-Enhanced RFID Tags [J].
Brenk, Daniel ;
Essel, Jochen ;
Heidrich, Juergen ;
Weigel, Robert .
IEEE MTT S INTERNATIONAL MICROWAVE WORKSHOP SERIES ON WIRELESS SENSING, LOCAL POSITIONING, AND RFID (IMWS 2009-CROATIA), 2009, :143-146
[50]   RFID-tags for anti-counterfeiting [J].
Tuyls, P ;
Batina, L .
TOPICS IN CRYPTOLOGY - CT-RSA 2006, PROCEEDINGS, 2006, 3860 :115-131