Efficient RFID Grouping Protocols

被引:25
|
作者
Liu, Jia [1 ]
Chen, Min [2 ]
Xiao, Bin [3 ]
Zhu, Feng [1 ]
Chen, Shigang [2 ]
Chen, Lijun [1 ]
机构
[1] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 210023, Jiangsu, Peoples R China
[2] Univ Florida, Dept Comp & Informat Sci & Engn, Gainesville, FL 32611 USA
[3] Hong Kong Polytech Univ, Dept Comp, Kowloon, Hong Kong, Peoples R China
基金
中国国家自然科学基金; 美国国家科学基金会;
关键词
Grouping; RFID; time efficiency; UNKNOWN TAG IDENTIFICATION; SEARCHING PROTOCOL; ARBITRATION; READER;
D O I
10.1109/TNET.2016.2514361
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The grouping problem in RFID systems is to efficiently group all tags according to a given partition such that tags in the same group will have the same group ID. Unlike previous research on unicast transmission from a reader to a tag, grouping provides a fundamental mechanism for efficient multicast transmissions and aggregate queries in large RFID-enabled applications. A message can be transmitted to a group of tags simultaneously in multicast, which improves the efficiency by times when comparing with unicast. This paper studies this practically important but not yet thoroughly investigated grouping problem in large RFID system. We start with a straightforward solution called the Enhanced Polling Grouping (EPG) protocol. We then propose a time-efficient Filter Grouping (FIG) protocol that uses Bloom filters to remove the costly ID transmissions. We point out the limitation of the Bloom-filter based solution due to its intrinsic false positive problem, which leads to our final ConCurrent Grouping (CCG) protocol. With a drastically different design, CCG is able to outperform FIG by exploiting collisions to inform multiple tags of their group ID simultaneously and by removing any wasteful slots in its frame-based execution. We further enhance CCG to make it perform better with very large groups. Simulation results demonstrate that our best protocol CCG can reduce the execution time by a factor of 11 when comparing with a baseline polling protocol.
引用
收藏
页码:3177 / 3190
页数:14
相关论文
共 50 条
  • [31] Algebraic Attacks on RFID Protocols
    van Deursen, Ton
    Radomirovic, Sasa
    [J]. INFORMATION SECURITY THEORY AND PRACTICE: SMART DEVICES, PERVASIVE SYSTEMS, AND UBIQUITOUS NETWORKS, PROCEEDINGS, 2009, 5746 : 38 - 51
  • [32] On Ultralightweight RFID Authentication Protocols
    D'Arco, Paolo
    De Santis, Alfredo
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (04) : 548 - 563
  • [33] Study Of RFID Authentication Protocols
    Jadhao, A. G.
    Ugale, S. P.
    [J]. 2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
  • [34] RFID Tags - Grouping Proof with Forward Security
    Sundaresan, Saravanan
    Doss, Robin
    Zhou, Wanlei
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON RFID-TECHNOLOGIES AND APPLICATIONS (RFID-TA), 2013,
  • [35] Offline Grouping Proof Protocol for RFID Systems
    Sundaresan, Saravanan
    Doss, Robin
    Zhou, Wanlei
    [J]. 2013 IEEE 9TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2013, : 247 - 252
  • [36] On Unequal Missing Protection of the Grouping of RFID Tags
    Su, Yi-Sheng
    Wang, Chung-Hsuan
    Siao, Huei-Yun
    [J]. 2015 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2015, : 2994 - 2998
  • [37] MID Tag Grouping Protocols Made Private
    Komori, Yudai
    Sakai, Kazuya
    Fukumoto, Satoshi
    [J]. 2017 47TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W 2017), 2017, : 105 - 106
  • [38] Attacks on and Countermeasures for Two RFID Protocols
    Chen, Xiuqing
    Cao, Tianjie
    Doss, Robin
    Zhai, Jingxuan
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (04) : 5825 - 5848
  • [39] Attacks on and Countermeasures for Two RFID Protocols
    Xiuqing Chen
    Tianjie Cao
    Robin Doss
    Jingxuan Zhai
    [J]. Wireless Personal Communications, 2017, 96 : 5825 - 5848
  • [40] Theoretical Analysis of RFID Security Protocols
    Zavvari, A.
    Islam, M. T.
    Shakiba, M.
    Mandeep, S. J.
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM), 2014, : 302 - 306