Time-Efficient Tag Identification in Blocker-Assisted RFID Systems

被引:0
|
作者
Wang, Yanyan [1 ,2 ]
Liu, Jia [1 ]
Wang, Xia [1 ]
Chen, Xingyu [1 ]
Jiang, Dong [1 ]
Chen, Lijun [1 ]
机构
[1] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 210023, Peoples R China
[2] Purple Mt Labs, Nanjing 211100, Peoples R China
基金
中国国家自然科学基金;
关键词
Protocols; Privacy; Radiofrequency identification; Mobile computing; Labeling; Interference; Wireless communication; RFID; privacy-protected; tag identification; time efficiency; PROTOCOL; RECOGNITION;
D O I
10.1109/TMC.2021.3065366
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In RFID systems, the privacy problem has attracted increasing attention as the tags have extremely limited on-chip resources and may blindly respond to unauthorized readers. To protect the privacy, one widely used solution is to deploy one or more blocker tags to collide the RF signal sent from protected tags all the time. In this paper, we investigate the problem of tag identification in privacy-sensitive RFID systems when we have the authorized reader(s). Due to the presence of blocker tags, the tag identification becomes more challenging since the protected tags and blocker tags will always respond concurrently, leading to unreconciled collisions. To overcome this challenge, we in this paper propose three efficient tag identification protocols IIP, SIP, and SUIP, which meet three application requirements: privacy, accuracy, and efficiency. IIP iteratively deactivates blocking tags as well as labeling genuine tags, and finally identifies tags by avoiding all the unreconciled collisions. On top of IIP, SIP further avoids the slot waste by carrying out a filter to separate genuine tags from others in advance. Furthermore, SUIP can identify the incremental unknown tags in an efficient way. It separates the incremental unknown tags from others by using a filter with improved performance and puts forward a collision reconciliation technique to accelerate the identification process. Simulation results demonstrate that our protocols are able to guarantee any identification accuracy in a privacy-protected way.
引用
收藏
页码:4139 / 4155
页数:17
相关论文
共 50 条
  • [1] Efficient Tag Identification in Blocker-assisted RFID Systems
    Wang, Yanyan
    Liu, Jia
    Wang, Xia
    Zhu, Feng
    Chen, Lijun
    2017 14TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON SENSING, COMMUNICATION, AND NETWORKING (SECON), 2017, : 64 - 72
  • [2] Time-efficient Missing Tag Identification in an Open RFID System
    Wang, Yanyan
    Liu, Jia
    Wang, Xia
    Chen, Xingyu
    Yan, Yingli
    Chen, Lijun
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2020, 16 (03)
  • [3] Time-efficient Missing Tag Identification in an Open RFID System
    Wang, Yanyan
    Liu, Jia
    Wang, Xia
    Chen, Xingyu
    Yan, Yingli
    Chen, Lijun
    Wang, Yanyan (wangyanyan@smail.nju.edu.cn), 1600, Association for Computing Machinery, 2 Penn Plaza, Suite 701, New York, NY 10121-0701, United States (16):
  • [4] A Time-Efficient Protocol for Unknown Tag Identification in Large-Scale RFID Systems
    Chu, Chu
    Niu, Jianyu
    Zheng, Wenxian
    Su, Jian
    Wen, Guangjun
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (15) : 13024 - 13040
  • [5] STEP: A Time-Efficient Tag Searching Protocol in Large RFID Systems
    Liu, Xuan
    Xiao, Bin
    Zhang, Shigeng
    Bu, Kai
    Chan, Alvin
    IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (11) : 3265 - 3277
  • [6] Efficient missing tag identification in blocker-enabled RFID systems
    Wang, Xia
    Liu, Jia
    Wang, Yanyan
    Chen, Xingyu
    Chen, Lijun
    COMPUTER NETWORKS, 2019, 164
  • [7] A High Time-Efficient Missing Tag Detection Scheme for Integrated RFID Systems
    Guo, Kaimin
    Xie, Xin
    Qi, Heng
    Li, Keqiu
    SENSORS, 2022, 22 (12)
  • [8] Enhanced M-Ary Detecting Tree: A Novel Time-Efficient Protocol for Tag Identification in Active RFID Systems
    Nguyen, Chuyen T.
    Hoang, Linh T.
    Dang, Khanh D.
    Pham, Anh T.
    IEEE ACCESS, 2024, 12 : 39517 - 39532
  • [9] Missing Tag Identification in Blocker-enabled RFID Systems
    Wang, Xia
    Liu, Jia
    Wang, Yanyan
    Zhu, Feng
    Chen, Lijun
    2017 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2017,
  • [10] Time-Efficient Cloning Attacks Identification in Large-Scale RFID Systems
    Zhao, Ju-min
    Feng, Ding
    Li, Deng-ao
    Gong, Wei
    Liu, Hao-xiang
    Huo, Shi-min
    SECURITY AND COMMUNICATION NETWORKS, 2017,